diff --git "a/results_retrieval/emb_potion_r32M/retrieval_recursivecharacterchunker_chunknorris.json" "b/results_retrieval/emb_potion_r32M/retrieval_recursivecharacterchunker_chunknorris.json" deleted file mode 100644--- "a/results_retrieval/emb_potion_r32M/retrieval_recursivecharacterchunker_chunknorris.json" +++ /dev/null @@ -1,22210 +0,0 @@ -[ - { - "top_k": 10, - "mrr": 0.39132407407407405, - "recall": 0.6833333333333333, - "count_empty_strings": 10 - }, - [ - { - "references": { - "source_file": "uksi_20200438_en.pdf", - "query": "What does \"new account\" mean according to the international tax compliance from 2020 ?", - "target_page": 2, - "target_passage": "“new account” means a financial account maintained by a reporting financial institution opened on or after 13th May 2020", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Management’s Discussion and Analysis of Financial Condition and Results of Operations 35\n\nAt December 31, 2004, we had $93 million of deferred tax assets and $1.9 billion\n\nof deferred tax liabilities. Except for certain New Jersey state net operating losses\n\nand certain other New Jersey state deferred tax assets, we believe that it is more\n\nlikely than not that our deferred tax assets are fully realizable because of the future\n\nreversal of existing taxable temporary differences and future projected taxable\n\nincome. The valuation allowance at December 31, 2004 related to the New Jersey\n\ndeferred tax assets was $6 million.\n\nOur income tax returns are subject to examination by the Internal Revenue Service\n\n(“IRS”) and other tax authorities. While positions taken in tax returns are some-\n\ntimes subject to uncertainty in the tax laws, we do not take such positions unless we\n\nhave “substantial authority” to do so under the Internal Revenue Code and applicable\n\nregulations. We may take positions on our tax returns based on substantial authority\n\nthat are not ultimately accepted by the IRS.\n\nWe assess such potential unfavorable outcomes based on the criteria of Statement of\n\nFinancial Accounting Standards No. 5, “Accounting for Contingencies” (“SFAS 5”).\n\nWe establish a tax reserve if an unfavorable outcome is probable and the amount of\n\nthe unfavorable outcome can be reasonably estimated. We assess the potential out-\n\ncomes of tax uncertainties on a quarterly basis. In determining whether the proba-\n\nble criterion of SFAS 5 is met, we presume that the taxing authority will focus on\n\nthe exposure and we assess the probable outcome of a particular issue based upon\n\nthe relevant legal and technical merits. We also apply our judgment regarding the\n\npotential actions by the tax authorities and resolution through the settlement process.\n\nWe maintain required tax reserves until such time as the underlying issue is\n\nresolved. When actual results differ from reserve estimates, we adjust the income tax\n\nprovision and our tax reserves in the period resolved. For tax years that are exam-\n\nined by taxing authorities, we adjust tax reserves in the year the tax examinations\n\nare settled. For tax years that are not examined by taxing authorities, we adjust tax\n\nreserves in the year that the statute of limitations expires. Our estimate of the\n\npotential outcome for any uncertain tax issue is highly judgmental, and we believe\n\nwe have adequately provided for any reasonable and foreseeable outcomes related to\n\nuncertain tax matters.\n\nIn December 2002, we settled the IRS audit of the Company’s 1995 and 1996 tax\n\nreturns, which did not result in a material impact on our results of operations or\n\nfinancial position. During 2003, we filed amended returns for tax years subsequent\n\nto 1996 to reflect the impact of the IRS audits of the 1993 through 1996 tax years\n\non those subsequent years. In the fourth quarter of 2003, the statutes of limitations\n\nexpired for the 1997 through 1999 tax years, resulting in a reduction of our tax\n\nreserves of $13 million and a corresponding reduction in our provision for income\n\ntaxes. In the third quarter of 2004, the statute of limitations expired for our 2000\n\ntax return, resulting in a reduction of our tax reserves of $6 million and a corre-\n\nsponding reduction in our provision for income taxes. Subsequent to December 31,\n\n2004, we received notice that the IRS will audit our 2001 and 2002 tax returns,\n\nand the tax returns for years after 2002 are subject to possible future examination.\n\nWe classify reserves for tax uncertainties within “other accrued liabilities” in the\n\naccompanying consolidated balance sheets, separate from any related income tax\n\npayable or deferred income taxes. Reserve amounts may relate to the deductibility\n\nof an item, as well as potential interest associated with those items.\n\nA portion of our tax reserves was assumed in the Mirage Acquisition. The IRS audit", - "page_start": 44, - "page_end": 44, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "(a) “new account” means a financial account maintained by a reporting financial\n\ninstitution( **a** ) opened on or after 13th May 2020;\n\n(b) “pre-existing account” means—\n\n(i) a financial account maintained by a reporting financial institution as of 12th\n\nMay 2020, or\n\n(ii) a financial account within Section VIII(C)(9)(b) of Annex 1 of the DAC( **b** ),\n\nbut in the application of that provision the references to “subparagraph\n\nC(9)(a)” are to be read as references to paragraph (i) of this sub-paragraph.\n\n(4) The accounts are—\n\n(a) non-registered pension arrangements where the annual contributions are limited to\n\n£50,000 and funds contributed cannot be accessed before the age of 55 except in\n\ncircumstances of serious ill health;\n\n(b) Premium Bonds issued by the UK National Savings and Investments;\n\n(c) Fixed Interest Savings Certificates issued by the UK National Savings and\n\nInvestments; and\n\n(d) Index Linked Savings Certificates issued by the UK National Savings and\n\nInvestments.”.\n\n(5) In Schedule 2, omit paragraphs 2, 6, 8 and 9.\n\n### **Transitional provision**\n\n**3.** —(1) For the purposes of the International Tax Compliance Regulations 2015, in relation to an\n\naccount that by virtue of regulation 2(5) ceases to be an excluded account, the calendar year 2020\n\nis treated as beginning on 13th May 2020 and ending on 31st December 2020.\n\n(2) Where in consequence of paragraph (1) it is necessary to apportion an amount for the\n\ncalendar year 2020 to the period ending immediately before 13th May 2020 and the period\n\nbeginning with that date, it is to be apportioned—\n\n(a) on a time basis according to the respective length of the periods, or\n\n(b) if that method would produce a result that is unjust or unreasonable, on a just and\n\nreasonable basis.\n\n*David Rutley*\n\n*Maggie Throup*\n\n20th April 2020 Two of the Lords Commissioners of Her Majesty’s Treasury\n\n### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal\n\nRegulations”) which give effect to agreements and arrangements reached between the United\n\nKingdom and other jurisdictions to improve international tax compliance.\n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into\n\nby the United Kingdom for the exchange of financial account information with other jurisdictions\n\nup to 19th April 2020, the date before the Regulations are made.\n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation\n\n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those\n\n( **a** ) “Financial account” and “reporting financial institution” are defined in the table in regulation 24(2) of the principal\n\nRegulations.\n\n( **b** ) “The DAC” is defined in regulation 1(3)(a) of the principal Regulations.", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "important consequences including:\n\n- requiring us to dedicate a substantial portion of cash flow from\n\noperations to pay dividends, interest and principal, which reduce\n\nfunds available for other business purposes including other financial\n\noperations\n\n- making us more vulnerable to adverse economic and industry\n\nconditions\n\n- limiting our flexibility in planning for, and/or reacting to, changes in\n\nour business and/or industry\n\n- putting us at a competitive disadvantage compared to competitors\n\nwho may have more financial resources and, or less financial\n\nleverage, or\n\n- restricting our ability to obtain additional financing to fund working\n\ncapital and capital expenditures and for other general corporate\n\npurposes.\n\nOur ability to satisfy our financial obligations depends on our future\n\noperating performance and economic, financial, competitive and other\n\nfactors, many of which are beyond our control. Our business may not\n\ngenerate sufficient cash flow and future financings may not be available\n\nto provide sufficient net proceeds to meet these obligations or to\n\nsuccessfully execute our business strategy.\n\n####### **Income Tax and Other Taxes**\n\nWe collect, pay and accrue significant amounts of income and other\n\ntaxes such as federal and provincial sales tax, employment taxes and\n\nproperty taxes, for and to various taxation authorities.\n\nWe have recorded significant amounts of deferred income tax liabilities\n\nand current income tax expense, and calculated these amounts based\n\non substantively enacted income tax rates in effect at the relevant time.\n\nA legislative change in these rates could have a material impact on the\n\namounts recorded and payable in the future.\n\nWe have also recorded the benefit of income and other tax positions\n\nthat are more likely than not of being sustained on examination and are\n\nmeasured at the amount expected to be realized when we have an\n\nultimate settlement with taxation authorities.\n\nWhile we believe we have paid and provided for adequate amounts of\n\ntax, our business is complex and significant judgement is required in\n\ninterpreting tax legislation and regulations. Our tax filings are subject to\n\naudit by the relevant government revenue authorities and the results of\n\nthe government audit could materially change the amount of our actual\n\nincome tax expense, income taxes payable or receivable, other taxes\n\npayable or receivable and deferred income tax assets or liabilities and\n\ncould, in certain circumstances, result in an assessment of interest and\n\npenalties.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 77", - "page_start": 80, - "page_end": 80, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be\n\nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments.\n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts\n\nwhich were previously excluded accounts.\n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015\n\nwas published on 18th March 2015 and is available on the HMRC website at\n\nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the-\n\nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the\n\nimpacts that apply to this instrument.\n\n© Crown copyright 2020\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "*Energy Generation and Storage Segment*\n\nEnergy Generation and Storage Sales\n\nWe record as deferred revenue any non-refundable amounts that are collected from customers related to prepayments,\n\nwhich is recognized as revenue ratably over the respective customer contract term. As of September 30, 2024 and\n\nDecember 31, 2023, deferred revenue related to such customer payments amounted to $1.73 billion and $1.60 billion,\n\nrespectively, mainly due to contractual payment terms. Revenue recognized from the deferred revenue balances as of\n\nDecember 31, 2023 and 2022 was $1.09 billion and $511 million for the nine months ended September 30, 2024 and 2023,\n\nrespectively. As of September 30, 2024, total transaction price allocated to performance obligations that were unsatisfied or\n\npartially unsatisfied for contracts with an original expected length of more than one year was $6.61 billion. Of this amount, we\n\nexpect to recognize $4.23 billion in the next 12 months and the rest over the remaining performance obligation period.\n\nWe have financing receivables on our consolidated balance sheets related to loans we provide for financing our energy\n\nproducts. As of September 30, 2024 and December 31, 2023, we had current net financing receivables of $32 million and $31\n\nmillion, respectively, in Accounts receivable, net, and $641 million and $578 million, respectively, in Other non-current assets\n\nfor the long-term portion.\n\n*Income Taxes*\n\nWe are subject to income taxes in the U.S. and in many foreign jurisdictions. Significant judgment is required in\n\ndetermining our provision for income taxes, our deferred tax assets and liabilities and any valuation allowance recorded against\n\nour net deferred tax assets that are not more likely than not to be realized. We monitor the realizability of our deferred tax assets\n\ntaking into account all relevant factors at each reporting period. In completing our assessment of realizability of our deferred\n\ntax assets, we consider our history of income (loss) measured at pre-tax income (loss) adjusted for permanent book-tax\n\ndifferences on a jurisdictional basis, volatility in actual earnings, excess tax benefits related to stock-based compensation in\n\nrecent prior years and impacts of the timing of reversal of existing temporary differences. We also rely on our assessment of the\n\nCompany’s projected future results of business operations, including uncertainty in future operating results relative to historical\n\nresults, volatility in the market price of our common stock and its performance over time, variable macroeconomic conditions\n\nimpacting our ability to forecast future taxable income, and changes in business that may affect the existence and magnitude of\n\nfuture taxable income. Our valuation allowance assessment is based on our best estimate of future results considering all\n\navailable information.\n\nOur provision for or benefit from income taxes for interim periods is determined using an estimate of our annual\n\neffective tax rate, adjusted for discrete items, if any, that are taken into account in the relevant period. Each quarter, we update\n\nour estimate of the annual effective tax rate, and if our estimated tax rate changes, we make a cumulative adjustment.\n\n*Net Income per Share of Common Stock Attributable to Common Stockholders*\n\nThe following table presents the reconciliation of net income attributable to common stockholders to net income used in\n\ncomputing basic and diluted net income per share of common stock (in millions):\n\n**Three Months Ended September 30, Nine Months Ended September 30,**\n\n**2024 2023 2024 2023**\n\nNet income attributable to common stockholders $ 2,167 $ 1,853 $ 4,774 $ 7,069\n\nLess: Buy-outs of noncontrolling interest — 2 (42) (3)\n\nNet income used in computing basic and diluted net\n\nincome per share of common stock $ 2,167 $ 1,851 $ 4,816 $ 7,072\n\n12", - "page_start": 15, - "page_end": 15, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "of financial performance is matched with\n\nthe accounting profit after allowing for\n\npermanent differences. Income tax on\n\ntiming differences, which arise from items\n\nbeing brought to account in different\n\nperiods for income tax and accounting\n\npurposes, is carried forward in the\n\nstatements of financial position as a\n\ndeferred tax asset or deferred tax liability.\n\nFuture income tax benefits relating to\n\nentities which incur losses are brought to\n\naccount where realisation of the benefits\n\nis considered to be virtually certain.\n\nSantos Ltd is the head entity in the\n\ntax-consolidated group comprising all\n\nthe Australian resident wholly-owned\n\ncontrolled entities set out in note 22.\n\nThe implementation date for the\n\ntax-consolidated group was\n\n1 January 2003.\n\nThe head entity recognises all of the\n\ncurrent and deferred tax assets and\n\nliabilities of the tax-consolidated group.\n\nThe tax-consolidated group has entered\n\ninto a tax funding agreement that requires\n\nwholly-owned subsidiaries to make\n\ncontributions to the head entity for tax\n\nliabilities and deferred tax balances arising\n\nfrom external transactions occurring after\n\nimplementation of tax consolidation. The\n\ncontributions are calculated as a\n\npercentage of profit from ordinary\n\nactivities before income tax expense.\n\nContributions are payable following\n\npayment of the liabilities by Santos Ltd.\n\nThe assets and liabilities arising under the\n\ntax funding agreement are recognised as\n\nintercompany assets and liabilities with a\n\nconsequential adjustment to income tax\n\nexpense or revenue.\n\nThe tax-consolidated group has also\n\nentered into a tax sharing agreement\n\npursuant to which the wholly-owned\n\ncontrolled entities may be required to\n\ncontribute to the tax liabilities of Santos\n\nLtd in the event of default by Santos Ltd\n\nor upon leaving the group.", - "page_start": 56, - "page_end": 56, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "(3) In regulation 4ZA—\n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel\n\nand Operator Liability) (England) Regulations 2021”;\n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus,\n\nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute\n\n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator\n\nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability\n\nRegulations”)”;\n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations”\n\nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator\n\nLiability Regulations”;\n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph\n\n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”.\n\n**2.** —(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations\n\n2020( **a** ) are amended as follows.\n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International\n\nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection\n\n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”.\n\n(3) In regulation 6(1)—\n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating\n\nworker”, for “regulation 4” substitute “regulation 9”;\n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health\n\nProtection (Coronavirus, International Travel and Operator Liability) (England)\n\nRegulations 2021”.\n\nSCHEDULE 16 Regulation 26(3)\n\n#### Transitional provision\n\n**1.** Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to\n\nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations\n\n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information\n\nprovided for the purposes of these Regulations where the person arrives in England on or after that\n\ndate.\n\n**2.** Confirmation given by the Foreign, Commonwealth and Development Office that a person is\n\nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that\n\nthe person is not required to comply with regulation 6 of these Regulations where the person\n\narrives in England on or after 4.00 a.m. on 17th May 2021.\n\n**3.** A designation by the Secretary of State of a person as an authorised person under regulation\n\n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person\n\nunder of regulation 11(11)(c) of these Regulations.\n\n**4.** Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who\n\nexercises the powers in that regulation in relation to a person who arrived in England before 4.00\n\na.m. on 17th May 2021.\n\n( **a** ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "liabilities for financial reporting purposes and\n\nthe amounts used for taxation purposes. The\n\namount of deferred tax provided is based on the\n\nexpected manner of realisation or settlement of\n\nthe carrying amount of assets and liabilities,\n\nusing tax rates enacted or substantively enacted\n\nat the reporting date.\n\nA deferred tax asset is recognised for unused tax\n\nlosses, tax credits and deductible temporary\n\ndifferences, to the extent that it is probable that\n\nfuture taxable profits will be available against\n\nwhich they can be utilised. Deferred tax assets\n\nare reviewed at each reporting date and are\n\nreduced to the extent that it is no longer prob-\n\nable that the related tax benefit will be realised.\n\nDeferred tax is not recognised for:\n\n〉 〉 temporary differences on the initial recogni-\n\ntion of assets or liabilities in a transaction\n\nthat is not a business combination and that\n\naffects neither accounting nor taxable profit\n\nor loss;\n\n〉 〉 temporary differences related to invest-\n\nments in subsidiaries where the Company is\n\nable to control the timing of the reversal of\n\nthe temporary differences and it is probable\n\nthat they will not reverse in the foreseeable\n\nfuture; and\n\n〉 〉 taxable temporary differences arising on the\n\ninitial recognition of goodwill.\n\nDeferred tax assets and liabilities are offset if\n\nthere is a legally enforceable right to offset\n\ncurrent tax liabilities and assets, and they relate\n\nto income taxes levied by the same tax authority\n\non the same taxable entity.\n\nAdditional income tax expenses that arise from\n\nthe distribution of cash dividends are recognised\n\nat the same time that the liability to pay the\n\nrelated dividend is recognised.\n\nTax consolidation\n\nThe Company and its wholly-owned Australian\n\nresident entities formed a tax-consolidation\n\ngroup with effect from 1 July 2003 and are\n\ntherefore taxed as a single entity from that date.\n\nThe head entity within the tax-consolidation\n\ngroup is Kingsgate Consolidated Limited.\n\nCurrent tax expense or benefit, deferred tax\n\nassets and deferred tax liabilities arising from\n\ntemporary differences of the members of the\n\ntax-consolidation group are recognised in the\n\nseparate financial statements of the members\n\nof the tax-consolidation group using the “stand\n\nalone taxpayer” approach by reference to the\n\ncarrying amounts in the separate financial\n\nstatements of each entity and the tax values\n\napplying under tax consolidation.\n\nCurrent tax assets or liabilities and deferred tax\n\nassets arising from unused tax losses assumed\n\nby the head entity from the subsidiaries in the\n\ntax-consolidation group, are recognised as\n\namounts receivable or payable to other entities\n\nin the tax-consolidation group in conjunction\n\nwith any tax funding agreement amounts.\n\nThe Company recognises deferred tax assets\n\narising from unused tax losses of the tax-consoli-\n\ndation group to the extent that it is probable\n\nthat future taxable profits of the tax-consolida-\n\ntion group will be available against which the\n\nasset can be utilised.\n\nTax funding and sharing agreements\n\nThe members of the tax-consolidation group\n\nhave entered into a funding agreement that sets\n\nout the funding obligations of members of the\n\ntax-consolidation group in respect of tax\n\namounts. The tax funding arrangements require\n\npayments to or from the head entity equal to\n\nthe current tax liability or asset assumed by the\n\nhead entity and any deferred tax asset assumed\n\nby the head entity, resulting in the head entity\n\nrecognising an intra-group receivable or payable\n\nin the separate financial statements of the\n\nmembers of the tax-consolidation group equal in\n\namount to the tax liability or asset assumed. The\n\nintra-group receivables or payables are at call.", - "page_start": 70, - "page_end": 70, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "reporting date, and including any adjustment to taxes payable or\n\nreceivable related to previous years.\n\nDeferred tax assets and liabilities arise from temporary differences\n\nbetween the carrying amounts of the assets and liabilities we record in\n\nour consolidated statements of financial position and their respective\n\ntax bases. We calculate deferred tax assets and liabilities using enacted\n\nor substantively enacted tax rates that will apply in the years the\n\ntemporary differences are expected to reverse.\n\nDeferred tax assets and liabilities are offset if there is a legally\n\nenforceable right to offset current tax liabilities and assets and they\n\nrelate to income taxes levied by the same authority on:\n\n- the same taxable entity, or\n\n- different tax entities where these entities intend to settle current tax\n\nliabilities and assets on a net basis or the tax assets and liabilities will\n\nbe realized simultaneously.\n\nWe recognize a deferred tax asset for unused losses, tax credits and\n\ndeductible temporary differences to the extent that it is probable that\n\nfuture taxable income will be available to use the asset. We use\n\njudgement to evaluate whether we can recover a deferred tax asset\n\nbased on our assessment on existing tax laws, estimates of future\n\nprofitability and tax planning strategies.\n\nWe rely on estimates and assumptions when determining the amount\n\nof current and deferred tax, and take into account the impact of\n\nuncertain tax positions and whether additional taxes and interest may\n\nbe due. If new information becomes available and changes our\n\njudgment on the adequacy of existing tax liabilities, these changes\n\nwould affect the income tax expense in the period that we make this\n\ndetermination.\n\nSee note 9 for more information about our income taxes.\n\n####### **Foreign Currency Translation**\n\nWe translate amounts denominated in foreign currencies into Canadian\n\ndollars as follows:\n\n- monetary assets and monetary liabilities - at the exchange rate in\n\neffect at the date of the consolidated statements of financial position\n\n- non-monetary assets, non-monetary liabilities and related\n\ndepreciation and amortization expenses - at the historical exchange\n\nrates\n\n- revenue and expenses other than depreciation and amortization - at\n\nthe average rate for the month when the transaction was recorded.\n\n####### **Financial Instruments**\n\n*Recognition*\n\nWe initially recognize cash and cash equivalents, accounts receivables,\n\ndebt securities and accounts payable and accrued liabilities on the date\n\nthey originate, and apply the criteria noted below. All other financial\n\nassets and financial liabilities are initially recognized on the trade date\n\nwhen we become a party to the contractual provision of the\n\ninstrument.\n\n96 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 99, - "page_end": 99, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "when the instruments are initially recognized. Upon conversion, no gain or loss is recognized.\n\n**(L) Taxation**\n\n*(i) Current income tax*\n\nCurrent income tax assets and liabilities are measured at the amount expected to be paid to tax authorities, net of recoveries, based on the\n\ntax rates and laws enacted or substantively enacted at the reporting date. Current income tax relating to items recognized directly in equity\n\nis recognized in equity and not profit or loss. Management periodically evaluates positions taken in tax returns with respect to situations in\n\nwhich applicable tax regulations are subject to interpretation and establishes provisions where appropriate.\n\n*(ii) Deferred income tax*\n\nDeferred income tax is provided using the liability method on all temporary differences at the reporting date between the tax bases of\n\nassets and liabilities and their carrying amounts for financial reporting purposes, except where the temporary difference arises from\n\nthe initial recognition of goodwill or of an asset or liability in a transaction that is not a business combination that, at the time of the\n\ntransaction, affects neither accounting nor taxable profit or loss.", - "page_start": 73, - "page_end": 73, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200438_en.pdf", - "query": "Under which conditions can the funds of a non-registered pension arrengements be obtained before the age of 55 ?", - "target_page": 2, - "target_passage": "non-registered pension arrangements where the annual contributions are limited to £50,000 and funds contributed cannot be accessed before the age of 55 except in circumstances of serious ill health", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\n\nNOTE 22: PENSIONS\n\nWe have contributory and non-contributory defined benefit pension\n\nplans that are made available to most of our employees. The plans\n\nprovide pensions based on years of service, years of contributions and\n\nearnings. We do not provide any non-pension post-retirement benefits.\n\nWe also provide unfunded supplemental pension benefits to certain\n\nexecutives.\n\nThe assets of the defined benefit pension plans are held in segregated\n\naccounts isolated from our assets. We administer the defined benefit\n\npension plans pursuant to applicable regulations, the Statement of\n\nInvestment Policies and Procedures and to the mandate of the Pension\n\nCommittee of the Board of Directors. The Pension Committee of the\n\nBoard of Directors oversees our administration of the defined benefits\n\npension plans, which includes the following principal areas:\n\n- overseeing the funding, administration, communication and\n\ninvestment management of the plans\n\n- selecting and monitoring the performance of all third parties\n\nperforming duties in respect of the plans, including audit, actuarial\n\nand investment management services\n\n- proposing, considering and approving amendments to the defined\n\nbenefit pension plans\n\n- proposing, considering and approving amendments of the Statement\n\nof Investment Policies and Procedures\n\n- reviewing management and actuarial reports prepared in respect of\n\nthe administration of the defined benefit pension plans\n\n- reviewing and approving the audited financial statements of the\n\ndefined benefit pension plan funds.\n\nThe assets of the defined benefit pension plans are invested and\n\nmanaged following all applicable regulations and the Statement of\n\nInvestment Policies and Procedures, and reflect the characteristics and\n\nasset mix of each defined benefit pension plan. Investment and market\n\nreturn risk is managed by:\n\n- contracting professional investment managers to execute the\n\ninvestment strategy following the Statement of Investment Policies\n\nand Procedures and regulatory requirements\n\n- specifying the kinds of investments that can be held in the plans and\n\nmonitoring compliance\n\n- using asset allocation and diversification strategies, and\n\n- purchasing annuities from time to time.\n\nThe funded pension plans are registered with the Office of the\n\nSuperintendent of Financial Institutions and are subject to the Federal\n\nPension Benefits Standards Act. The plans are also registered with the\n\nCanada Revenue Agency and are subject to the Canada Income Tax\n\nAct. The benefits provided under the plans and the contributions to the\n\nplans are funded and administered in accordance with all applicable\n\nlegislation and regulations.\n\nSignificant estimates are involved in determining pension related\n\nbalances. Actuarial estimates are based on projections of employees’\n\ncompensation levels at the time of retirement. Maximum retirement\n\nbenefits are primarily based on career average earnings, subject to\n\ncertain adjustments. The most recent actuarial valuations were\n\ncompleted as at January 1, 2013.\n\nThe table below sets out the estimated present value of accrued plan\n\nbenefits and the estimated market value of the net assets available to\n\nprovide these benefits for our funded plans at December 31, 2013 and\n\n2012.\n\n**2013** 2012\n\nPlan assets, at fair value **$ 1,037** $ 833\n\nAccrued benefit obligations **1,209** 1,167\n\nDeficiency of plan assets over accrued benefit obligations **(172)** (334)\n\nEffect of asset ceiling limit **(9)** -\n\nNet deferred pension liability **$ (181)** $ (334)\n\nConsists of:\n\nDeferred pension asset **$ 8** $ 9\n\nDeferred pension liability **(189)** (343)\n\nNet deferred pension liability **$ (181)** $ (334)\n\nThe table below shows our pension fund assets for the years ended\n\n2013 and 2012.\n\n**2013** 2012\n\nPlan assets, January 1 **$ 833** $ 684\n\nInterest income **40** 40\n\nRemeasurements, return on plan assets recognized in other", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "113. Tenure of office of Director of Public Prosecutions 114. Tenure of office of Auditor-General 115. Pensions laws and protection of pensions rights 116. Power of Commissions in relation to pensions, etc.\n\nCHAPTER VIII Finance 117. Consolidated Fund 118. Withdrawals from Consolidated Fund or other public funds 119. Authorization of expenditure 120. Authorization of expenditure in advance of appropriation 121. Contingencies Fund 122. Remuneration of certain officers 123. Public debt 124. Auditor-General\n\nCHAPTER IX Miscellaneous 125. Resignations 126. Reappointments and concurrent appointments 127. Interpretation\n\nFirst Schedule - Election of Specially Elected Members of the National Assembly Second Schedule - Division of Districts into regions for the purpose of selecting Members of *Ntlo ya Dikgosi*\n\nL.N. 83, 1966, Act 30, 1969, Act 43, 1969, Act 25, 1970, Act 28, 1972, Act 24, 1973, Act 28, 1978, S.I. 25, 1980, Act 32, 1982, Act 1, 1983, Act 22, 1987, S.I. 37, 1991, Act 27, 1992, S.I. 51, 1993, S.I. 119, 1993, Act 16, 1997, Act 18, 1997, Act 1, 1999, Act 2, 2002, Act 12, 2002, Act 9, 2005, S.I. 91, 2006.\n\n[ *Date of Commencement: 30th September, 1966* ]\n\n## **CHAPTER I**", - "page_start": 3, - "page_end": 3, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "investigated then- ( *a* ) the Assembly shall, by resolution, appoint a tribunal which shall consist of a Chairman and not less than two other members, who hold or have held high judicial office; ( *b* ) the tribunal shall enquire into the matter and report on the facts thereof to the Assembly; ( *c* ) the Assembly shall consider the report of the tribunal at the first convenient sitting of the Assembly after it is received and may, upon such consideration, by resolution, remove the Auditor-General from office. (4) If the question of removing a person holding the office of Auditor-General from office has been referred to a tribunal under this section, the National Assembly may, by resolution, suspend that person from performing the functions of his or her office, and any such suspension may at any time be revoked by the Assembly by resolution and shall in any case cease to have effect if, upon consideration of the report of the tribunal in accordance with the provisions of this section, the Assembly does not remove the Auditor-General from office. **115. Pensions laws and protection of pensions rights** (1) The law to be applied with respect to any pensions benefits that were granted to any person before the coming into operation of this Constitution shall be the law that was in force at the date on which those benefits were granted or any law in force at a later date that is not less favourable to that person. (2) The law to be applied with respect to any pensions benefits (not being benefits to which subsection (1) of this section applies) shall- ( *a* ) in so far as those benefits are wholly in respect of a period of service as a public officer that commenced before the date on which this Constitution comes into operation, be the law that was in force immediately before that date; and ( *b* ) in so far as those benefits are wholly or partly in respect of a period of service as a public officer that commenced after the date on which this Constitution comes into operation, be the law in force on the date on which that period of service commenced, or any law in force at a later date that is not less favourable to that person. (3) Where a person is entitled to exercise an option as to which of two or more laws shall apply in his or her case, the law for which he or she opts shall, for the purposes of this section, be deemed to be more favourable to him or her than the other law or laws. (4) All pensions benefits shall (except to the extent to which under any law providing for the funding of pensions benefits they are a charge on a fund established by that law and have been duly paid out of that fund to the person or authority to whom payment is due) be a charge on the Consolidated Fund. (5) In this section \"pensions benefits\" means any pensions, compensation, gratuities or other like allowances for persons in respect of their service as public officers or as members of the armed forces or for the widows, children, dependants or personal representatives of such persons in respect of such service. (6) References in this section to the law with respect to pensions benefits include (without prejudice to their generality) references to the law regulating the circumstances in which such benefits may be granted or in which the grant of such benefits may be refused, the law regulating the circumstances in which any such benefits that have been granted may be withheld, reduced in amount or suspended and the law regulating the amount of any such benefits. (7) In this section references to service as a public officer include references to service as a public officer of the former Protectorate of Bechuanaland.", - "page_start": 49, - "page_end": 49, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "### NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS\n\n### FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n\n##### **(p) Receivables**\n\nTrade receivables and other receivables are recorded at amounts due less any provision for\n\ndoubtful debts.\n\nBills of exchange are recorded at amortised cost, with revenue recognised on an effective yield\n\nbasis.\n\n##### **(q) Recoverable Amount of Non-Current Assets**\n\nNon-current assets are written down to recoverable amount where the carrying value of any\n\nnon-current asset exceeds recoverable amount. In determining the recoverable amount of non-\n\ncurrent assets, the expected net cash flows have not been discounted to their discount value.\n\n##### **(r) Revenue Recognition**\n\nSale of Goods and Disposal of Assets\n\nRevenue from the sale of goods and disposal of other assets is recognised when the economic\n\nentity has passed control of the goods or other assets to the buyer.\n\nRendering of Services\n\nRevenue from a contract to provide services is recognised by reference to the stage of\n\ncompletion of the contract.\n\nContribution of Assets\n\nRevenue arising from the contribution of assets is recognised when the economic entity gains\n\ncontrol of the contribution or the right to receive the contribution.\n\nLiabilities Forgiven\n\nThe gross amount of a liability forgiven by a credit provider is recognised as revenue.\n\n41", - "page_start": 44, - "page_end": 44, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "**116. Power of Commissions in relation to pensions, etc.** (1) Where under any law any person or authority has a discretion- ( *a* ) to decide whether or not any pensions benefits shall be granted; or ( *b* ) to withhold, reduce in amount or suspend any such benefits that have been granted, those benefits shall be granted and may not be withheld, reduced in amount or suspended unless the appropriate Commission concurs in the refusal to grant the benefits or, as the case may be, in the decision to withhold them, reduce them in amount or suspend them. (2) Where the amount of any pensions benefits that may be granted to any person is not fixed by law, the amount of the benefits to be granted to him or her shall be the greatest amount for which he or she is eligible unless the appropriate Commission concurs in his or her being granted benefits of a smaller amount. (3) The appropriate Commission shall not concur under subsection (1) or subsection (2) of this section in action taken on the ground that any person who holds or has held the office of a judge of the Court of Appeal or of the High Court or the Auditor- General or Director of Prosecutions has been guilty of misbehaviour unless he or she has been removed from office by reason of such misbehaviour. (4) In this section \"the appropriate Commission\" means- ( *a* ) in the case of benefits for which any person may be eligible in respect of the service in the public service of a person who, immediately before he or she ceased to be a public officer, was subject to the disciplinary control of the Judicial Service Commission or that have been granted in respect of such service, the Judicial Service Commission; ( *b* ) in any other case, the Public Service Commission. (5) In this section \"pensions benefits\" means any pensions, compensation, gratuities or other like allowances for persons in respect of their service as public officers (including service as public officers of the former Protectorate of Bechuanaland) or for the widows, children, dependants or personal representatives of such persons in respect of such service. **CHAPTER VIII** * **Finance** * **(ss 117-124) 117. Consolidated Fund** All revenues or other moneys raised or received for the purposes of the Government of Botswana (not being revenues or other moneys that are payable by or under any law into some other fund established for a specific purpose or that may by or under any law be retained by the department of Government that received them for the purposes of defraying the expenses of that department) shall be paid into and form one Consolidated Fund. **118. Withdrawals from Consolidated Fund or other public funds** (1) No moneys shall be withdrawn from the Consolidated Fund except- ( *a* ) to meet expenditure that is charged upon the Fund by this Constitution or by any Act of Parliament; ( *b* ) where the issue of those moneys has been authorized by an Appropriation Act, by a supplementary estimate approved by resolution of the National Assembly or by a law enacted in pursuance of section 120 of this Constitution. (2) No moneys shall be withdrawn from any public fund of Botswana other than the Consolidated Fund unless the issue of those moneys has been authorized by or under a law. (3) No moneys shall be withdrawn from the Consolidated Fund except in the manner prescribed by Parliament.", - "page_start": 50, - "page_end": 50, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**71**\n\nNotes to the Financial Statements\n\ncontinued\n\nwhich the Group becomes a party to the\n\ncontractual provisions of the instrument.\n\nThe Group derecognises a financial asset when\n\nthe contractual rights to the cash flows from the\n\nasset expire, or it transfers the rights to receive\n\nthe contractual cash flows on the financial asset\n\nin a transaction in which substantially all the\n\nrisks and rewards of ownership of the financial\n\nassets are transferred.\n\nFinancial assets and liabilities are offset and the\n\nnet amount presented in the statement of\n\nfinancial position when, and only when, the\n\nGroup has a legal right to offset the amounts\n\nand intends either to settle on a net basis or to\n\nrealise the asset and settle the liability\n\nsimultaneously.\n\n(i) \u0007Financial assets at fair value through\n\nprofit or loss\n\nFinancial assets at fair value through profit or loss\n\nare financial assets held for trading if acquired\n\nprincipally for the purpose of selling in the short\n\nterm. Derivatives are also categorised as held for\n\ntrading unless they are designated as hedges.\n\nAttributable transaction costs are recognised in\n\nthe profit or loss when incurred. Assets in this\n\ncategory are classified as current assets if they\n\nare expected to be settled within 12 months,\n\notherwise they are classified as non-current.\n\n(ii) Loans and receivables\n\nLoans and receivables are non-derivative finan-\n\ncial assets with fixed or determinable payments\n\nthat are not quoted in an active market. They\n\nare included in current assets, except for those\n\nwith maturities greater than 12 months after\n\nthe reporting date which are classified as non-\n\ncurrent assets.\n\nLoans and receivables are measured at amor-\n\ntised cost using the effective interest method,\n\nless any impairment losses.\n\n(iii) Available-for-sale financial assets\n\nAvailable-for-sale financial assets, comprising\n\nprincipally marketable equity securities, are\n\nnon-derivative financial assets that are either\n\ndesignated in this category or not classified in\n\nany of the other categories. They are included in\n\nnon-current assets unless management intends\n\nto dispose of the investment within 12 months\n\nof the reporting date. Investments are desig-\n\nnated as available-for-sale if they do not have\n\nfixed maturities and fixed or determinable\n\npayments and management intends to hold\n\nthem for the medium to long term.\n\nSubsequent to initial recognition, available-for-\n\nsale financial assets are measured at fair value\n\nand changes therein, other than impairment\n\nlosses, are recognised as a separate component\n\nof equity net of attributable tax. When an asset\n\nis derecognised the cumulative gain or loss in\n\nequity is transferred to the statement of\n\ncomprehensive income.\n\nImpairment\n\nThe Group assesses at each reporting date\n\nwhether there is objective evidence that a\n\nfinancial asset or group of financial assets is\n\nimpaired. In the case of equity securities classi-\n\nfied as available-for-sale, a significant or\n\nprolonged decline in the fair value of a security\n\nbelow its cost is considered as an indicator that\n\nthe securities are impaired. If any such evidence\n\nexists for available-for-sale financial assets, the\n\ncumulative loss measured as the difference\n\nbetween the acquisition cost and the current\n\nfair value, less any impairment loss on that\n\nfinancial asset previously recognised in profit or\n\nloss, is removed from equity and recognised in\n\nthe statement of comprehensive income.\n\nImpairment losses recognised in the profit or\n\nloss on equity instruments classified as avail-\n\nable-for-sale are not reversed through the state-\n\nment of comprehensive income.\n\nIf there is evidence of impairment for any of the\n\nGroup’s financial assets carried at amortised\n\ncost, the loss is measured as the difference\n\nbetween the asset’s carrying amount and the\n\npresent value of estimated future cash flows,\n\nexcluding future credit losses that have not been", - "page_start": 72, - "page_end": 72, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**122. Remuneration of certain officers** (1) There shall be paid to the holders of the offices to which this section applies such salaries and such allowances as may be prescribed by Parliament. (2) The salaries and any allowances payable to the holders of the offices to which this section applies shall be a charge on the Consolidated Fund. (3) The salary payable to the holder of any office to which this section applies and his or her terms of office, other than allowances, shall not be altered to his or her disadvantage after his or her appointment. (4) Where a person's salary or terms of office depend upon his or her option, the salary or terms for which he or she opts shall, for the purposes of subsection (3) of this section, be deemed to be more advantageous to him or her than any others for which he or she might have opted. (5) This section applies to the offices of judge of the Court of Appeal, judge of the High Court, member of the Public Service Commission, member of the Judicial Service Commission, member of the Delimitation Commission, Auditor-General, Director of Public Prosecutions and Attorney-General. **123. Public debt** (1) There shall be charged on the Consolidated Fund all debt charges for which Botswana is liable. (2) For the purposes of this section debt charges include interest, sinking fund charges, the repayment or amortization of debt, and all expenditure in connection with the raising of loans on the security of the revenues or the Consolidated Fund of the former Protectorate of Bechuanaland or Botswana, and the service and redemption of debt thereby created. **124. Auditor-General** (1) There shall be an Auditor-General, whose office shall be a public office. (2) The public accounts of Botswana and of all officers, courts and authorities of the Government of Botswana shall be audited and reported on by the Auditor-General and for that purpose the Auditor-General or any person authorized by him or her in that behalf shall have access to all books, records, reports and other documents relating to those accounts: Provided that, if it is so provided by Parliament in the case of any body corporate directly established by law, the accounts of that body corporate shall be audited and reported on by such person as may be specified by or under that law. (3) The Auditor-General shall submit his or her reports to the Minister responsible for finance, who shall cause them to be laid before the National Assembly. (4) The Auditor-General shall perform such other duties and exercise such other powers in relation to the accounts of the Government or the accounts of other public authorities or other bodies as may be prescribed by or under any Act of Parliament. (5) In the exercise of his or her functions the Auditor-General shall not be subject to the direction or control of any other person or authority. **CHAPTER IX** * **Miscellaneous** * **(ss 125-127) 125. Resignations** (1) Any person who is appointed or elected to any office established by this Constitution may resign from that office by writing under his or her hand addressed to the person or authority by whom he or she was appointed or elected: Provided that in the case of a person who holds office as President his or her resignation from that office shall be addressed to the Chief Justice, in the case of a person who holds office as Speaker or Deputy Speaker of the National Assembly his or her resignation from that office shall be addressed to the Assembly, in the case of an", - "page_start": 52, - "page_end": 52, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "on or after January 1, 2013. In November 2013, Chapter 6 of IFRS 9 on hedge accounting was published. At the same time, Chapter 7,\n\ncontaining the effective date and transition provisions was amended to remove the mandatory effective date of IFRS 9. This was intended\n\nto provide sufficient time for preparers to make the transition to the new requirements. The Company may still choose to apply IFRS\n\nimmediately, but is not required to do so. In subsequent phases, the IASB is addressing impairment of financial assets. The adoption of the\n\nfirst phase of IFRS will have an effect on the classification and measurement of the Company’s financial assets, but will not have an impact\n\non the classification measurements of financial liabilities. The Company is in the process of assessing the impact IFRS 9 may have on future\n\nfinancial statements.\n\nIFRIC Interpretation 21 ‑ Levies (“IFRIC 21”)\n\nIFRIC 21 clarifies that an entity recognises a liability for a levy when the activity that triggers payment, as identified by the relevant\n\nlegislation, occurs. IFRIC 21 is effective for annual periods beginning on or after January 1, 2014. The Company is in the process of assessing\n\nthe impact IFRIC 21 may have on future financial statements.", - "page_start": 76, - "page_end": 76, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "she has attained the age of 70 years or such other age as may be prescribed for the purposes of section 101 of this Constitution; (ii) a person appointed under this subsection, who is not a judge of the Court of Appeal, may, notwithstanding the assumption or resumption of the functions of the office of President of the Court of Appeal by the holder of that office, continue to act as a judge of the Court of Appeal for so long thereafter and to such extent as may be necessary to enable him or her to deliver judgment or to do any other thing in relation to proceedings that were commenced before him or her previously thereto. (6) If the office of a Justice of Appeal is vacant or if any Justice of Appeal is appointed to act as Chief Justice or President of the Court of Appeal or is for any reason unable to perform the functions of his or her office, the President, acting in accordance with the advice of the Judicial Service Commission, may appoint a person qualified for appointment as a Justice of Appeal to act as a Justice of Appeal: Provided that a person may be so appointed notwithstanding that he or she has attained the age of 70 years or such other age as may be prescribed for the purposes of section 101 of this Constitution. (7) Any person appointed under subsection (6) of this section to act as a Justice of Appeal, shall subject to the provisions of section 101(4) and (5) of this Constitution, continue to act for the period of his or her appointment or, if no such period is specified, until his or her appointment is revoked by the President, acting in accordance with the advice of the Judicial Service Commission: Provided that the President, acting in accordance with the advice of the Judicial Service Commission, may permit a person whose appointment to act as a Justice of Appeal has expired or been revoked to continue to act as such a judge for such period as may be necessary to enable him or her to deliver judgment or to do any other thing in relation to proceedings that were commenced before him or her previously thereto. **101. Tenure of office of judges of Court of Appeal** (1) Subject to the provisions of this section, a person holding the office of a judge of the Court of Appeal shall vacate that office on attaining the age of 70 years or such other age as may be prescribed by Parliament: Provided that- (i) the President, acting in accordance with the advice of the Judicial Service Commission, may permit a judge who has attained that age to continue in office for such period as may be necessary to enable him or her to deliver judgment or to do any other thing in relation to proceedings that were commenced before him or her before he or she attained that age; (ii) a person may be appointed as President of the Court of Appeal or as a Justice of Appeal for a fixed period of three years notwithstanding that he or she has attained the age referred to in this subsection or that he or she will before the expiry of his or her appointment have attained that age; and (iii) the appointment as President of the Court of Appeal or as Justice of Appeal serving for a fixed period under paragraph (ii) above shall not affect the date at which he or she is due to retire. (2) A judge of the Court of Appeal may be removed from office only for inability to perform the functions of his or her office (whether arising from infirmity of body or mind or from any other cause) or for misbehaviour, and shall not be so removed except in accordance with the provisions of this section. (3) If the President considers that the question of removing a judge of the Court of Appeal under this section ought to be investigated then- ( *a* ) he or she shall appoint a tribunal which shall consist of a Chairman and not less", - "page_start": 43, - "page_end": 43, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "( *d* ) the Industrial Court. (2) In this Constitution, unless the context otherwise requires, references to offices in the public service shall be construed as including references to the offices of judges of the Court of Appeal and judges of the High Court and the offices of members of all subordinate courts (being offices the emoluments attaching to which, or any part of the emoluments attaching to which, are paid directly out of moneys provided by Parliament). (3) For the purposes of this Constitution a person shall not be considered to be a public officer by reason only that he or she is in receipt of any remuneration or allowance as the President, Vice-President, a Minister or Assistant Minister, Speaker, Deputy Speaker or Member of the Assembly, a Member of the *Ntlo ya Dikgosi* or a member of any Commission established by this Constitution. (4) For the purposes of this Constitution, a person shall not be considered as holding a public office by reason only of the fact that he or she is in receipt of a pension or other like allowance in respect of service under the Government of Botswana or the former Protectorate of Bechuanaland. (5) In this Constitution, unless the context otherwise requires, a reference to the holder of an office by the term designating his or her office shall be construed as including a reference to any person for the time being lawfully acting in or performing the functions of that office: Provided that nothing in this subsection shall apply to references to the President or Vice-President in section 35, 36 or 39 of this Constitution. (6) In this Constitution, unless it is otherwise provided or required by the context, a reference to the power to make appointments to any office shall be construed as including a reference to the power to make appointments on promotion and transfer and to confirm appointments and to the power to appoint a person to act in or perform the functions of that office at any time when the office is vacant or the holder thereof is unable (whether by reason of absence or infirmity of mind or body or any other cause) to perform the functions of that office. (7) References in this Constitution to the power to remove a public officer from his or her office shall be construed as including references to any power conferred by any law to require or permit that officer to retire from the public service: Provided that nothing in this subsection shall be construed as conferring on any person or authority power to require a judge of the Court of Appeal or the High Court, the Auditor-General or the Director of Public Prosecutions to retire from the public service. (8) Any provision in this Constitution that vests in any person or authority power to remove any public officer from his or her office shall be without prejudice to the power of any person or authority to abolish any office or to any law providing for the compulsory retirement of public officers generally or in any class of public officer on attaining an age specified therein. (9) Where power is vested by this Constitution in any person or authority to appoint any person to act in or perform the functions of any office if the holder thereof is himself unable to perform those functions, no such appointment shall be called in question on the ground that the holder of the office was not unable to perform those functions. (10) No provision of this Constitution that any person or authority shall not be subject to the direction or control of any other person or authority in the exercise of any functions under this Constitution shall be construed as precluding a court of law from exercising jurisdiction in relation to any question whether that person or authority has performed those functions in accordance with this Constitution or any other law. (11) Where any power is conferred by this Constitution to make any Act, order,", - "page_start": 54, - "page_end": 54, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2538.pdf", - "query": "What metrics are good indicators of the coverage of gas molecules on carbon nanotubes ?", - "target_page": 1, - "target_passage": "the bind- ing energy and scattering resistance of the molecules", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## **Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes**\n\nJ. M. Garc´ıa-Lastra 1,2 , ** D. J. Mowbray 1,2 , K. S. Thygesen 2 , A. Rubio 1,3 , and K. W. Jacobsen 2 *1* *Nano-Bio Spectroscopy group and ETSF Scientific Development Centre,*\n\n*Dpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco,*\n\n*Centro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain* *2* *Center for Atomic-scale Materials Design, Department of Physics,*\n\n*Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark* *3* *Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany*\n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan-\n\notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH 3 , H 2 S) and the main components\n\nof air (N 2 , O 2 , H 2 O), we calculate the binding energy and change in conductance upon adsorption on a metal\n\natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis-\n\ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites\n\nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function\n\nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to\n\nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions.\n\nPACS numbers: 73.63.- b, 68.43.- h, 73.50.Lw\n\nThe ability to detect small concentrations of specific chem-\n\nical species is fundamental for a variety of industrial and sci-\n\nentific processes as well as for medical applications and en-\n\nvironmental monitoring [ 1 ]. In general, nanostructured mate-\n\nrials should be well suited for sensor applications because of\n\ntheir large surface to volume ratio which makes them sensi-\n\ntive to molecular adsorption. Specifically, carbon nanotubes\n\n(CNT) [ 2 ] have been shown to work remarkably well as de-\n\ntectors of small gas molecules. This has been demonstrated\n\nboth for individual CNTs [ 3 - 8 ] as well as for CNT networks\n\n[ 9 , 10 ].\n\nPristine CNTs are known to be chemically inert - a prop-\n\nerty closely related to their high stability. As a consequence,\n\nonly radicals bind strong enough to the CNT to notably affect\n\nits electrical properties [ 2 , 5 , 11 - 13 ]. To make CNTs attrac-\n\ntive for sensor applications thus requires some kind of func-\n\ntionalization, e.g. through doping or decoration of the CNT\n\nsidewall [ 13 - 21 ]. Ideally, this type of functionalization could\n\nbe used to control not only the reactivity of the CNT but also\n\nthe selectivity towards specific chemical species.\n\nIn this work we consider the possibility of using CNTs\n\ndoped by 3d transition metal atoms for chemical gas sens-\n\ning. We use computational screening to systematically iden-\n\ntify the most promising dopant candidates for detection of\n\nthree different target molecules (CO, NH 3 , H 2 S) under typi-\n\ncal atmospheric conditions. The screening procedure is based\n\non the calculation of two microscopic descriptors: the bind-\n\ning energy and scattering resistance of the molecules when\n\nadsorbed on a doped CNT. These two quantities give a good\n\nindication of the gas coverage and impact on the resistance.\n\nFor the most promising candidates we then employ a simple\n\nthermodynamic model of the CNT sensor. In this model, the\n\nbinding energies are used to obtain the fractional coverage of\n\nthe metallic sites as a function of the target molecule concen-\n\ntration under ambient conditions. Under the assumption of\n\ntransport in the diffusive rather than localization regime, the\n\nchange in CNT resistivity may then be obtained from the cal-\n\nculated coverages and single impurity conductances.\n\nWe find that oxidation of the active metal site passivates", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "all *N* impurities. At this point it suffices to see that the con-\n\nservative estimates obtained from Eq. ( 7 ) predict measurable\n\nsignals in response to small changes in concentration of the\n\ntarget molecules.\n\nTo our knowledge, controlled doping of CNTs with transi-\n\ntion metal atoms has so far not been achieved. It has, how-\n\never, been found that metal atoms incorporated into the CNT\n\nlattice during catalytic growth are afterwards very difficult to\n\nremove [ 30 ]. Furthermore, it has been shown that CNT vacan-\n\ncies, which are needed for the metallic doping, may be formed\n\nin a controlled way by irradiation by Ar ions [ 31 ]. This sug-\n\ngests that metallic doping of CNTs should be possible.\n\nIn summary, we have presented a general model of nanos-\n\ntructured chemical sensors which takes the adsorption en-\n\nergies of the relevant chemical species and their individual\n\nscattering resistances as the only input. On the basis of this\n\nmodel we have performed a computational screening of tran-\n\nsition metal doped CNTs, and found that Ni-doped CNTs are\n\npromising candidates for detecting CO in a background of air.\n\nThe model may be applied straightforwardly to other nanos-\n\ntructures than CNTs, other functionalizations than metal dop-\n\ning and other gas compositions than air.\n\nThe authors acknowledge financial support from Span-\n\nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados\n\nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF\n\nproject (Contract Number 211956), “Red Espa˜nola de Super-\n\ncomputaci´on”, NABIIT and the Danish Center for Scientific\n\nComputing. The Center for Atomic-scale Materials Design\n\n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L\n\nacknowledges funding from Spanish MICINN through Juan\n\nde la Cierva and Jos´e Castillejo programs.\n\n*∗* Electronic address: [ juanmaria.garcia@ehu.es](mailto:juanmaria.garcia@ehu.es)\n\n[1] *Gas Sensing Materials, MRS Bull.* , vol. 24 (1999).\n\n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport\n\nproperties of nanotubes”, Rev. Mod. Phys. **79** (2), 677 (May 2007), doi: [10.1103/RevModPhys.79.677](http://dx.doi.org/10.1103/RevModPhys.79.677) .\n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng,\n\nK. Cho, and H. Dai, “Nanotube molecular wires as\n\nchemical sensors”, Science **287** (5453), 622 (Jan. 2000), doi: [10.1126/science.287.5453.622](http://dx.doi.org/10.1126/science.287.5453.622) .\n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, “Ex-\n\ntreme oxygen sensitivity of electronic properties of car-\n\nbon nanotubes”, Science **287** (5459), 1801 (Mar. 2000), doi: [10.1126/science.287.5459.1801](http://dx.doi.org/10.1126/science.287.5459.1801) .\n\n[5] C. Hierold, *Carbon Nanotube Devices: Properties, Modeling,*\n\n*Integration and Applications* (Wiley-VCH, Weinheim, 2008).\n\n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval,\n\nL. M. Mart´ınez, H. Terrones, and M. Terrones, “Fabrica-\n\ntion of vapor and gas sensors using films of aligned CN *x*\n\nnanotubes”, Chem. Phys. Lett. **386** (1-3), 137 (Mar. 2004), doi: [10.1016/j.cplett.2004.01.052](http://dx.doi.org/10.1016/j.cplett.2004.01.052) .\n\n[7] A. R. Rocha, M. Rossi, A. Fazzio, and A. J. R.\n\nda Silva, “Designing real nanotube-based gas sen-\n\nsors”, Phys. Rev. Lett. **100** (17), 176803 (May 2008), doi: [10.1103/PhysRevLett.100.176803](http://dx.doi.org/10.1103/PhysRevLett.100.176803) .\n\n[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring\n\ngas sensing properties of carbon nanotubes”, J. Appl. Phys.\n\n**104** (2), 024502 (Jul. 2008), doi: [10.1063/1.2956395](http://dx.doi.org/10.1063/1.2956395) . [9] C. Morgan, Z. Alemipour, and M. Baxendale, “Variable\n\nrange hopping in oxygen-exposed single-wall carbon nanotube\n\nnetworks”, Phys. Stat. Solidi A **205** (6), 1394 (May 2008), doi: [10.1002/pssa.200778113](http://dx.doi.org/10.1002/pssa.200778113) .\n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, “In-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "In the global warming network, politics was the second-largest discourse cluster (20% of the\n\nnetwork), where “tcot”, short for “Top Conservatives on Twitter”, was the node ranked highest,\n\nand “p2”, short for “Progressives 2.0”, is also included. Several political figures, such as Obama and Al\n\nGore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster\n\n(16%), including both domestic e ff orts, such as “us”, “trump”, “climatechangeisreal”, “climateaction”,\n\nand “epa”, and two international items, like “china” and “india”. The fourth cluster (in blue) referred\n\nto emissions, including hashtags like “co2”, “green”, and “carbon”. The smallest cluster (8%) was\n\ncomposed of “snow”, “winter”, “heatwave”, and “summer”, referring to the temperature abnormalities\n\non the earth.\n\n### *4.3. Temporal Analysis of the Associations in the Two Discourses*\n\nThe online presentations of the climate change and global warming discourses are dynamic.\n\nAs shown in Table 2 , for the global warming discourse, 11 key concepts remained in the top 50 central\n\nhashtags each year for all 10 years, with 16 for the climate change”discourse. By comparing the 11\n\nnodes of the global warming discourse and the 16 nodes of the climate change discourse, we found that\n\nthe two lists shared nine concepts. We found “pollution” and “earth” were unique to the keyword list\n\nof the global warming discourse, and “economy”, “water”, “china”, “coal”, “solar”, “sustainability”,\n\nand “food” only occurred on the critical list for the climate change discourse.\n\n**Table 2.** Hashtags that remained on the top 50 list for the climate change or the global warming\n\ndiscourse from 2009 to 2018.\n\n**Unique Shared**\n\n#climatechange china, solar, water, food, economy, coal, sustainability co2, news, carbon, green, climate,\n\n#globalwarming pollution, earth us, energy, science, environment\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period,\n\nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies\n\nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary\n\nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more\n\nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of\n\nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the\n\n10 years, as shown in Figure 5 .\n\nFigure 3 depicts the associations of hashtags in the climate change discourse for each year\n\nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the\n\nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg”\n\n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global\n\nactions cluster (in yellow) because these hashtags were frequently used in the global action context and\n\nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags,\n\nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental\n\nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change),\n\nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political\n\nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political\n\nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining\n\n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of\n\nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased\n\nin the last two years of the period according to Figure 5 a.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "Santos’ Strategic Projects team\n\nfocuses on assets that have\n\nproven difficult to commercialise\n\nor that need to be considered\n\nin a regional context rather than\n\non an individual basis.\n\nThe other key activity for this\n\nteam has been to lead Santos’\n\ncontinuous improvement focus.\n\n**UNITED STATES GAS**\n\nThe US gas business was a major\n\nfocus in 2004 for a number of\n\nreasons, not the least of which\n\nare the higher gas prices in the\n\nUS compared with the domestic\n\nAustralian market, and the ability\n\nto rapidly commercialise new\n\ndiscoveries.\n\nAn ongoing development and\n\ndelineation program was carried\n\nout during the year, yielding\n\nbetter than planned production.\n\nThe exploration initiative also\n\ncontinued to seek higher risk\n\nbut more material prospects,\n\naimed at enhancing the move\n\ninto the shallow water area of\n\nthe Gulf of Mexico. Exploration\n\nresults in this area during 2005\n\nwill shape Santos’ future strategy\n\nin the US.\n\n**TIGHT GAS**\n\nHydrocarbons contained in traps\n\nwith poor permeability are known\n\nas ‘tight gas’. Large tight gas\n\nresources are known to exist in\n\nthe Cooper Basin. Under current\n\ncircumstances, this gas cannot\n\nbe economically developed but,\n\nwith the combination of improved\n\nproduction techniques and better\n\ncommercial terms, could prove\n\nattractive.\n\nSantos assessed the resources\n\nand potential technologies that\n\ncould be applied to unlock these\n\nresources during 2004 and is now\n\nworking up a range of possible\n\nevaluation projects to be\n\nundertaken in 2005.\n\n**NORTHERN AUSTRALIA GAS**\n\nSantos has a significant existing\n\ngas resource base and some\n\npromising exploration acreage\n\nin the waters offshore Darwin,\n\nwhere it intends to drill a gas\n\nexploration well later this year.\n\nThe Company currently operates\n\nthe Mereenie gas field in the\n\nAmadeus Basin in central\n\nAustralia, which supplies gas to\n\nDarwin. Santos’ first offshore gas\n\nproduction in northern Australia\n\nbegins in 2006, sending Bayu-\n\nUndan gas to Darwin for\n\nconversion to LNG. Santos plans\n\nto build upon its growing\n\nposition in the region to target\n\nfurther development which could\n\nensure long-term gas supplies\n\nfor the current market, or an\n\nexpanded Northern Territory\n\ndomestic market, or for export.\n\n**PAPUA NEW GUINEA GAS**\n\nSantos is in active discussions\n\nwith the PNG Gas Project\n\nparticipants to potentially\n\nre-enter the PNG Gas Project.\n\nSantos has a significant interest\n\nin a large part of the liquids-rich\n\nHides gas field which is integral\n\nto the development of\n\nthe Project.\n\nAnnual Report 2004 22\n\n**‘Our objective is to derive value**\n\n**from undeveloped assets which**\n\n**have been outside of Santos’**\n\n**base business.’**\n\n**BRUCE WOOD**\n\nVice President\n\nStrategic Projects\n\n## Managing Options\n\nUNLOCKING THE VALUE OF STRATEGIC ASSETS\n\n**2004 CONTINGENT RESOURCES**\n\n(TOTAL 1,443 mmboe)\n\nNorthern Australia\n\n709 mmboe\n\nWestern Australia\n\n71 mmboe\n\nCentral Australia\n\n240 mmboe\n\nSouthern Australia\n\n32 mmboe\n\nPapua New Guinea\n\n391 mmboe", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Page 44 10/02/2013\n\n## **Glossary of terms and abbreviations**\n\nAD - Activity Data\n\nAWMS - Animal Waste Management System\n\nBOD - Biochemical Oxygen Demand\n\nC - Carbon\n\nC 2 F 6\n\n- Hexafluoroethane\n\nCF 4\n\n- Tetrafluoromethane\n\nCH 4\n\n- Methane\n\nCO - Carbon Monoxide\n\nCO 2\n\n- Carbon dioxide\n\nCOD - Chemical Oxygen Demand\n\ndm - dry matter\n\nGg - Gigagram\n\nha - hectare\n\nHFC - Hydrofluorocarbon\n\nhl - hectolitre\n\nk - kilo\n\nkg - kilogram\n\nkha - kilo hectare\n\nkt - kilotonne\n\nLTO - Landing/Take Off\n\nLUCF - Land-Use Change and Forestry\n\nLULUCF - Land Use, Land-Use Change and Forestry\n\nm 3\n\n- cubic meter\n\nMCF - Methane Correction Factor\n\nMg - Megagram\n\nMha - Megahectare\n\nMSW - Municipal Solid Waste\n\nN - Nitrogen\n\nN 2 O - Nitrous Oxide\n\nNFP - National Focal Point\n\nNH 3\n\n- Ammonia\n\nNMVOC - Non-Methane Volatile Organic Compound\n\nNO X\n\n- Nitrogen Dioxide\n\nPFC - Perfluorocarbon\n\nRA - Reference Approach\n\nSE - Sectoral Expert\n\nSF 6\n\n- Sulphur Hexafluoride\n\nSO 2\n\n- Sulphur Dioxide\n\nSWDS - Solid Waste Disposal Site\n\nt - tonne\n\nTg - Teragram\n\nTJ - Terajoules\n\nXML - Extensible Markup Language\n\nyear t - inventory year", - "page_start": 43, - "page_end": 43, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "optimisation during 2004 to\n\nimprove product delivery and\n\nrecovery in order to reduce\n\nproduction costs per unit.\n\nTo this end, further reductions\n\nin costs for 2005 are targeted\n\nby increasing the focus on\n\nfit for purpose rigs and larger\n\ncampaigns. These efforts will be\n\nsupported by a significant boost\n\nin 3D seismic acquisition that\n\ncommenced at the end of 2003\n\nand continues in 2005.\n\nCoiled tubing underbalanced\n\ndrilling operations were performed\n\nat three gas wells and one oil\n\nwell, while multiple pinpoint\n\nfracture stimulations were\n\nperformed at five new gas wells,\n\nwith between three and six fracs\n\nperformed in each well.\n\nThese introductory programs\n\nare providing encouraging initial\n\nresults. The underbalanced drilling\n\nprogram achieved better than\n\npredicted rate improvements\n\nfor all three gas wells.\n\nThese programs will now be\n\nextended to a variety of more\n\ncomplex and possibly harsher\n\noil and gas wellbore/reservoir\n\nenvironments during 2005.\n\nSantos increased gas well\n\ndeliverability in the Cooper\n\nBasin by 63 TJ per day through\n\nnumerous projects brought on\n\nline during 2004. Some 8 PJ\n\nof incremental gas production\n\nresulted during 2004 from this\n\noptimisation program. These\n\nresults were achieved at a\n\nsignificantly lower cost than\n\nconventional development drilling\n\nand substantially exceeded\n\ntargets set at the beginning\n\nof the year.\n\nWhile the Cooper Basin\n\nis a mature hydrocarbon area,\n\nSantos is drilling wells which can\n\nbe commercialised quickly and\n\ncost-effectively, delivering strong\n\ncash flow which can be applied\n\nto other growth opportunities.\n\nA further focus in 2004 was\n\nto leverage Cooper Basin\n\ninfrastructure; for example, via\n\ngas swaps, and increase prices\n\nunder existing agreements.\n\nAn increased Gas Sales Agreement\n\nwas reached with CS Energy which\n\nresulted in an additional seven\n\nwells being drilled at the Scotia\n\ncoal seam methane gas field in\n\neastern Queensland.\n\n## Leveraging Base Business\n\nHARNESSING VALUE FROM OPERATIONS", - "page_start": 13, - "page_end": 13, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "issues and re-constructing them di ff erently. By comparing the persistent words used related to the two\n\ndiscourses in the 10-year period in Table 2 , we think that global warming showed a relative preference\n\ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change”\n\nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”.\n\nStudies have suggested that the public shows a preference for scientific publications with general\n\nkeywords compared with those with complicated scientific jargon [ 47 ], lacking a deep understanding of\n\nthe complicated issue [ 46 ] and the necessity for mitigation of the climate issue [ 47 ]. These conclusions\n\nseem to suit global warming more than climate change according to the current study, which is\n\nprobably because climate change receives more publicity and recognition than global warming in the\n\nscientific community. In the association network shown in Figure 2 , global warming was found to be\n\nmore connected with temperature abnormalities. This finding is in accordance with studies reporting\n\nthat short-term temperature anomalies [ 87 ] can increase the public’s belief about global warming by\n\nincreasing the understanding of this abstract issue [ 88 ], although scientists mostly make judgments\n\nbased on long-term weather statistics [ 89 ]. However, none of the four words, “snow”, “summer”,\n\n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes\n\nlist of the climate change network.\n\nEven when climate change and global warming shared concern about similar topics such as the\n\ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas\n\nclimate change preferred a more in-depth perspective, highlighting the importance of global action\n\nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to\n\ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long\n\nbeen regarded as two key reasons for low climate concern [ 90 ], the two terminologies’ di ff erences\n\nin connotations suggest that introducing these absent sub-topics into global warming discourse or\n\nhighlighting climate change for its inherent connotations may help communicators raise public concern\n\nabout climate.\n\n#### 5.1.2. Political Connotations\n\nStudies noted that frame preference between climate change and global warming reflects\n\nindividuals’ ideological spectrum, where climate change and global warming were favored by\n\nthe liberals and conservatives, respectively [ 10 ]. The cluster analysis of the semantic network in the\n\ncurrent study demonstrated that global warming triggered far more political responses than climate\n\nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored\n\nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes\n\nof the global warming discourse, but neither was included in the list of top nodes of the climate change\n\ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used\n\nby conservatives to question the reality of climate issue [ 11 ] and climate change is more commonly\n\nadopted when discussing action against the climate change issue [ 5 ], global warming had a stronger\n\npolitical connotation in public discussion.\n\n#### 5.1.3. Discourse Structure\n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action”\n\nrepresented the themes of the three largest clusters in the network. However, three popularly recurring\n\nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters\n\nabove, but formed another small tight cluster together, sitting in the most central part of the semantic\n\nnetwork, as shown in Figure 2 b. As each of the three hashtags can almost represent one sub-theme of", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "change in CNT resistivity may then be obtained from the cal-\n\nculated coverages and single impurity conductances.\n\nWe find that oxidation of the active metal site passivates\n\nthe sensor in the case of doping by Ti, V, Cr, and Mn un-\n\nder standard conditions (room temperature and 1 bar of pres-\n\nsure). Among the remaining metals, we identify Ni as is the\n\nmost promising candidate for CO detection. For this system\n\nthe change in resistance per active site is generally significant\n\n( *>* 1 Ω ) for small changes in CO concentration in the relevant\n\nrange of around 0.1- 10 ppm. Our approach is quite general\n\nand is directly applicable to other nanostructures than CNTs,\n\nother functionalizations than metal doping, and other back-\n\ngrounds than atmospheric air.\n\nAll total energy calculations and structure optimizations\n\nhave been performed with the real-space density functional\n\ntheory (DFT) code GPAW [ 22 ] which is based on the projector augmented wave method. We use a grid spacing of 0.2 ˚ A for\n\nrepresenting the density and wave functions and the PBE ex-\n\nchange correlation functional [ 23 ]. Transport calculations for\n\nthe optimized structures have been performed using the non-\n\nequilibrium Green’s function method [ 24 ] with an electronic\n\nHamiltonian obtained from the SIESTA code [ 25 ] in a dou-\n\nble zeta polarized (DZP) basis set. Spin polarization has been\n\ntaken into account in all calculations.\n\nMetallic doping of a (6,6) CNT has been modeled in a su-\n\npercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 ˚ A *×* 15 ˚ A *×* 14.622 ˚ A). For this size\n\nof supercell a Γ -point sampling of the Brillouin zone was\n\nfound to be sufficient. The formation energy for creating a\n\nvacancy (VC) occupied by a transition metal atom (M) was\n\ncalculated using the relation\n\n*E* form [ M @ VC ] = *E* [ M @ VC ] + *nE* [ C ] *−* *E* [ M@NT ] (1) where *E* [M@VC] is the total energy of a transition metal\n\natom occupying a vacancy in the nanotube, *n* is the number\n\nof carbon atoms removed to form the vacancy, *E* [C] is the en-\n\nergy per carbon atom in a pristine nanotube, and *E* [M@NT]\n\narXiv:1001.2538v1 [cond-mat.mes-hall] 14 Jan 2010 Ti V Cr Mn Fe Co Ni Cu Zn 0", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "Annual Report 2004 20\n\nOn top of exploration and new\n\nventures growth opportunities,\n\nSantos has a large inventory of\n\ngas fields that are yet to be\n\ncommitted to gas contracts.\n\nThese fields, known as contingent\n\nresources, represent significant\n\nopportunities for Santos.\n\nEach year Santos works towards\n\ncommercialising these fields by\n\nfinding new gas contracts or\n\nextending existing contracts\n\nso that they can be booked as\n\nProven (1P) or Proven plus\n\nProbable (2P) reserves.\n\nSantos’ contingent gas resources\n\nare largely located offshore\n\nsouthern Australia and Western\n\nAustralia, in the Bonaparte Basin\n\noffshore northern Australia and\n\nonshore Papua New Guinea.\n\nSantos continued to deliver on\n\ngas commercialisation during\n\n2004, commercialising 27 million\n\nboe during the year. Santos also\n\nachieved positive contract price\n\nreviews for gas sales that were\n\nwell above the indexed levels.\n\n**UNIQUE ENERGY HUBS DELIVER**\n\n**GAS SWAPS**\n\nSome of the most important gas\n\ncommercialisation achievements\n\nfor the year were the innovative\n\ngas swaps agreements that were\n\nonly possible because of Santos’\n\nunique spread of assets across key\n\nAustralian gas hubs.\n\nSantos and the other South\n\nWest Queensland Gas Producers\n\nannounced a coal seam methane\n\ngas swap in May to allow each\n\nparty to supply the other party’s\n\ncontractual obligations in\n\ndifferent states via the Moomba\n\ngas hub in central Australia. This\n\narrangement for 200 PJ meant\n\nthat Origin could avoid building\n\na pipeline and that Santos could\n\ncapture a share of the saving.\n\nGas swapping will commence in\n\n2005 and could continue until the\n\nend of 2011.\n\nA second gas swap, from eastern\n\nQueensland to Gippsland, moved\n\ngas through three states and five\n\njoint ventures, expanding market\n\nhorizons for partners and\n\nproviding backup options\n\nto customers.\n\n**EXPANDED CASINO CONTRACT**\n\n**ENHANCES VALUE**\n\nThe commercialisation of the\n\nCasino gas field in the Otway\n\nBasin, offshore southern Australia,\n\ncontinued during 2004 with an\n\nincrease in the quantity of gas\n\nbeing sold under the initial term\n\nsheet signed in September 2003\n\nwith TXU for 293 PJ.\n\nWhen the project was sanctioned\n\nin October 2004, the joint venture\n\nannounced an extension to the\n\noriginal Gas Sales Agreement to\n\nsupply up to 420 PJ of gas, and\n\npossibly another 105 PJ, over 12\n\nyears for the Victorian or South\n\nAustralian markets.\n\nThe Casino contracts are unique\n\nin that the reserves have been\n\ncontracted prior to the field being\n\nfully appraised to confirm the\n\nquantity of gas available. This\n\nhas allowed the joint venture\n\nto undertake appraisal drilling\n\nand near field exploration\n\nprograms with the knowledge\n\nthat all of the gas likely to be\n\ndiscovered will be taken, thereby\n\nsignificantly reducing the risk.\n\nThis shortens the time from\n\ndiscovery to production and\n\ndelivers profits to Santos and\n\nits shareholders sooner.\n\n**WA CONTRACTS FAST-TRACK**\n\n**JOHN BROOKES**\n\nSantos and its co-venturer\n\nApache won two significant gas\n\ncontracts in Western Australia\n\nwhich resulted in the fast\n\ntracking and sanctioning of the\n\nJohn Brookes gas field in the\n\nCarnarvon Basin.\n\nThe successful appraisal of the\n\nfield in late 2003 and early 2004\n\nsignificantly increased the\n\navailable gas reserves. The\n\ndecision to bring the field into\n\nproduction by mid-2005 enabled\n\nactive marketing of gas above\n\nthat already allocated to support\n\nthe declining East Spar field.\n\nIn a separate move, designed to\n\nenhance future commercialisation\n\nopportunities, the joint venture\n\nequity interests in the East Spar\n\nand the John Brookes fields were\n\naligned through an acquisition\n\nprogram which created an\n\nimportant production hub\n\nat Varanus Island.\n\nJohn Brookes has an expected\n\nfield life of more than 15 years\n\nwhich could be further extended\n\nby a development of the Reindeer\n\nfield in later years.\n\nIn the first contract, the joint\n\nventure agreed to supply\n\nNewcrest Mining with 120 PJ of\n\ngas over 15 years at a maximum", - "page_start": 21, - "page_end": 21, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "bilities are available potentially beginning in 2015.\n\n**Construction of U.S. gas-to-liquids (GTL) plants**\n\nConverting natural gas to a room temperature liquid\n\nwould allow U.S. natural gas producers to sell products\n\nbased on world oil prices instead of domestic natural gas\n\nprices. Technological advancements continue to gain\n\ntraction and may make GTL a realistic possibility by 2016.\n\n**U.S. natural gas producers are rapidly moving to a**\n\n**more liquids-rich production base**\n\nDue to the premium margins realized in the U.S. when\n\nproducing liquids as compared to natural gas, there is\n\na meaningful shift of producers targeting liquids-rich\n\ndrilling prospects. This shift will ultimately help bring\n\nU.S. natural gas markets back into balance by reducing the rigs\n\nand capital available for natural gas drilling.", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2648.pdf", - "query": "What is the source of inaccuracy of the MSA3 model at high ionic concentrations ?", - "target_page": 3, - "target_passage": "At high concentration (about 1 mol l−1), the MSA3 overestimates the free energy", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "r (Å)\n\n2\n\n4\n\n6\n\n8\n\n4 6 8\n\n0.5\n\n1\n\n1.5\n\n4 6 8\n\n| 0.5 mol.L -1 g 12 (r) | 1.5 mol.L -1 g 12 (r) |\n|:---|:---|\n| 1.5 mol.L -1 g 11 (r) | 1.5 mol.L -1 g 22 (r) |\n\nFIG. 5: (Color online) RDF obtained from MC simulations\n\n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed)\n\nat two concentrations.\n\nThe RDF obtained within BIMSA3 are compared with\n\nthe MC and MSA-fit results in Fig. 5 . Our BIMSA3\n\nmodel accounts for the strong molecular peak of the CIP\n\nand provides the correct distances of minimal approach;\n\nwhereas the naive MSA-fit procedure ignores the former\n\nand gives poor estimates for the latter. At larger sep-\n\narations, the BIMSA3 results do not reproduce the os-\n\ncillations observed in the MC simulations, but the cor-\n\nresponding energy oscillations in the effective potentials\n\nare less than k B T . In addition, the perturbation term\n\nof the BIMSA3 appears to be negligible compared to the\n\nreference term for concentrations less than 1 mol l 1 . The\n\nperturbation can then be omitted to obtain a fully ana-\n\nlytical theory, determined by the hard sphere diameters\n\nand the pair fraction given by LPT; with the free energy\n\nand the RDF given in terms of the BIMSA and MSA so-\n\nlutions, as described above. While the procedure we have\n\nfollowed uses two different approximations for the refer-\n\nence and perturbation terms (MSA vs BIMSA), these are\n\nknown to be accurate for the systems under consideration\n\nand do not appear to be inconsistent with each other.\n\nTo conclude, we have combined MD simulations with\n\nLPT to construct simple models of electrolyte solutions\n\nwhich account for the molecular nature of the solvent.\n\nThe final result is fully analytical and it yields the ther-\n\nmodynamic and structural properties of the solution, in\n\nagreement with the original molecular description. The\n\nmethodology can in principle be adapted to any molecu-\n\nlar description of the system (MD simulations involving\n\ninteraction potentials accounting for polarization effects\n\nor Car-Parrinello MD simulations for example) as long\n\nas the ion-ion RDF are known. It can also be generalized\n\nto study interfaces. The method appears to be a promis-\n\ning approach toward the description of the specific effects\n\nof ions, especially for complex systems whose modeling\n\nrequires an analytic solution.\n\nThe authors are particularly grateful to Werner Kunz\n\nfor fruitful discussions.\n\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13 ,\n\n276 (1945).\n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical\n\nChemistry of Electrolyte Solutions (Springer, 1998).\n\n[3] L. Blum, in Theoretical Chemistry: Advances and Per-\n\nspectives , edited by H. Eyring and D. Henderson (Aca-\n\ndemic Press, 1980), vol. 5, pp. 1- 66.\n\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79 , 569 (1995).\n\n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109 , 9873 (2005).\n\n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106 , 1259\n\n(2006).\n\n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin.\n\nColloid Interface Sci. 9 , 1 (2004).\n\n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett.\n\n96 , 147801 (2006).\n\n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130 , 134507\n\n(2009).\n\n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110 ,\n\n10878 (2006)\n\n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52 ,\n\n3730 (1995).\n\n[12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99 , 226104\n\n(2007).\n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev.\n\nLett. 100 , 258105 (2008).\n\n[14] S. Van Damme et al., J. Phys. Chem. B 113 , 3105 (2009).\n\n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq-\n\nuids (Academic Press, 1986).\n\n[16] J. C. Rasaiah and R. M. Lynden-Bell, Philos. Trans. R.\n\nSoc. London, Ser. A 359 , 1545 (2001).\n\n[17] A. P. Lyubartsev and S. Marcelja, Phys. Rev. E 65 ,\n\n041202 (2002).\n\n[18] V. M. M. Lobo, Electrolyte Solutions, Data on Thermo-\n\ndynamic and Transport Properties , vol. I-II (Coimbra Ed-\n\nitora, Lisbon, Portugal, 1984).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2648.pdf" - }, - { - "text": "This discrepancy can easily be understood by comparing\n\nthe diameters found within the MSA2 calculation with\n\nthe effective potentials given in Fig. 1 . The anion/cation\n\ncontact distance obtained within the MSA2 calculation\n\nis 4 . 2 ˚ A, which is in the region of the second minimum of\n\nthe effective potential and corresponds to the situation\n\nwhere there is a single layer of water molecules between\n\nthe ions. The first minimum of the potential, which cor-\n\nresponds to the contact ion pair (CIP) is thus completely\n\nignored by the MSA2 calculation. If the MSA diameters\n\nare directly fitted to reproduce the MC osmotic pres-\n\nsure, much smaller values are obtained. These MSA-fit\n\nhydrated diameters, which are compared to the MSA2\n\ndiameters in the bottom part of Fig. 2 , are averages of\n\nthe CIP and the solvent-separated ion pair.\n\nTo overcome this difficulty, we have explicitly intro-\n\nduced the CIP in our model (species 3). Straightforward\n\ncalculations, based on a characteristic-function formal-\n\nism, allow us to define an equivalent model in which\n\nthe free ions and the CIP are explicitly taken into ac-\n\ncount [19, 20]. We apply this formalism by defining a\n\npair as an anion and a cation at a distance less than\n\n4 ˚ A, which corresponds to the position of the effective\n\npotential maximum. The interaction between free, like\n\ncharges in this new system remains unchanged, and the\n\ncation-anion interactions are easily approximated by ex-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "**4** Rather than using the original CMIP5 ensemble as in previous studies, the aim is to allow for\n\nan improved representation of atmospheric and land surface processes including extremes by\n\nusing higher spatial resolution [ 11 ].\n\nHadGEM3 (Hadley Centre Global Environment Model version 3) is a configuration of the UK\n\nMet Office Unified Model (MetUM) which has been developed for use for both climate research\n\nand weather prediction applications. It is the result of converging the development of the Met\n\nOffice’s weather and climate global atmospheric model components so that, where possible,\n\natmospheric processes are modelled or parametrized seamlessly across spatial resolutions and\n\ntimescales.\n\nThe high-resolution simulations were performed using the HadGEM3A Global Atmosphere\n\n(GA) 3.0 model [ 12 - 14 ] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with\n\ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of\n\nthe HadGEM3-GC2 coupled climate model [ 15 , 16 ], which is part of the HadGEM3 family of\n\nclimate models [ 12 ]. This represents the third generation of HadGEM configurations, leading\n\non from the HadGEM2 family of climate model configurations [ 13 ] which was used for CMIP5.\n\nKey improvements over the previous model, HadGEM2, include increased vertical levels in the\n\natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [ 17 ].\n\nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met\n\nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution\n\nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher\n\nresolution [ 18 , 19 ].\n\nWe ran the model using only its atmosphere and land components, with time-varying sea-\n\nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This\n\napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications\n\nof the higher resolution for projections of climate extremes and impacts—an atmosphere-\n\nonly simulation requires considerably less computing time than a coupled ocean- atmosphere\n\ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in\n\nregional climate changes by using SSTs and SICs from different climate models. To explore these\n\nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric\n\nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5\n\nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial\n\ninfluence on regional patterns of climate change over land, so using a range of SST and SIC\n\npatterns in a single atmosphere model goes some way towards representing the range of regional\n\nclimate changes that would arise in a set of different coupled ocean- atmosphere GCMs. This\n\napproach will not capture the full range of uncertainty affecting regional climate changes over\n\nland, because it still relies on one atmosphere model and one land surface scheme, so responses\n\nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions\n\nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that\n\nour experimental design avoids the reliance on one single realization of climate and hence allows\n\nsome of the uncertainties in regional climate-change impacts to be illustrated and explored.\n\nThe SSTs and SICs were taken from a subset of the CMIP5 transient projections performed with\n\nthe RCP8.5 scenario from 1979 to 2100—the CMIP5 members were selected as representative of a\n\nrange of outcomes for future climate change, including high and low climate sensitivity, different\n\nbiases in baseline precipitation climatology, and different global patterns of precipitation change.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "ing the temporal dynamics of belief changes in experimental participants. Dynamic belief\n\ntrajectories can then be related to other (for example, physiological) measures, as is usual\n\nin model-based neuroscience [ 65 ]. This method can also, in principle, be used for fitting\n\nmodels to other types of experimentally observable systems, like animals, organoids [ 66 ],\n\nand simulated or emergent systems [ 67 ]. The package can also be used for agent-based\n\nmodelling in general, for repeating earlier analyses with sampling based model-fitting\n\nand for comparing POMDP-based AIF models directly to other types of models.\n\nSince they implement full approximate Bayesian inferences, AIF models are compu-\n\ntationally more demanding than many approaches traditionally used in cognitive and\n\nagent-based modelling, in particular when the dimensionality of the generative model is\n\nlarge. This means that models with highly multidimensional or complex behaviour and\n\nlarge numbers of agents can be computationally infeasible to implement, especially given\n\nthe additional computational demands introduced by fitting these models to empirical\n\ndata. Avenues for addressing this implicit scaling problem were proposed in the context of\n\nmachine learning applications [ 68 , 69 ], and with the use of simplifying assumptions—the\n\nuse of which are ubiquitous in computational modelling—AIF has been used to model\n\nmulti-agent phenomena, such as opinion dynamics [ 15 , 70 ], coordinated foraging [ 71 ] and\n\nfish school movements [ 12 ]. It remains to be explored how AIF models can be applied to\n\nhighly complex natural phenomena, such as a concrete election, which underscores the\n\nneed for efficient but flexible and accessible software tools in the field.\n\nThere are many ways in which ActiveInference can be improved. It would be useful\n\nto extend the set of dynamic belief states to include prediction errors since they are often\n\nused for model-based neuroscience. This would entail departing from discrete state-space\n\n(i.e., POMDP) models to consider continuous state-space models apt for Bayesian filtering\n\nor predictive coding (see below). An alternative would be to generate prediction errors\n\nfrom belief updating under discrete models, where prediction errors can be read as the\n\n(KL) divergence between posterior and prior beliefs (i.e., complexity or information gain).\n\nA simple interface could be added for creating custom parametrisations of the requisite\n\nparameters that could be parametrised with Boltzmann or Gibbs distributions, as opposed\n\nto Dirichlet distributions. Parameter learning could be extended to all generative model\n\nparameters, as well as in parametrised forms (e.g., so that the Boltzmann parameter or\n\ntemperature of the parameters that are learned); similarly for the precision over expected\n\nfree energies *γ* . Preference priors should also be implementable for environmental states,\n\nin addition to observations, and **A** can be made action dependent.\n\nA library of pre-made canonical POMDP models could be created so that users can eas-\n\nily implement them directly. Alternatives to the fixed-point iteration method for updating\n\nposteriors over environmental states could be included, like the marginal message passing\n\nalgorithm. There are various ways in which the package can be made more computationally\n\nefficient, and it could be compared with other software implementations. There are plenty\n\nof utility and plotting functions that could be added to the package to make it easier to\n\nuse and to facilitate integration with the model-fitting packages it relies on; for example,\n\nto allow for combining the models with linear regressions to compare parameters values\n\nof different populations in a single model. More complex types of POMDP models can\n\nalso be added, like hierarchical and temporally deep POMDPs. Model structure learning\n\ncould be considered, where different model structures are compared and chosen between", - "page_start": 28, - "page_end": 28, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "*Modeling and controlling the body in maladaptive ways* 5\n\nFigure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive)\n\nsensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with\n\ntemporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding ( Rao and\n\nBallard 1999 , Friston 2005 ), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are\n\nreciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally,\n\nthe pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on\n\nunits encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in\n\ncortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need\n\nto map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower\n\nand intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for\n\nexteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks that process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al.\n\n(2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their\n\nputative neuronal underpinnings. See online article for colored version of this figure.\n\nare reciprocally linked through top-down connections that convey\n\npredictions (black edges) and bottom-up connections that convey\n\nprediction errors (red edges), within and across levels. This predic-\n\ntive coding architecture permits inferring (in the Bayesian sense)\n\nthe most likely causes of sensations, across multiple modalities\n\nand multiple hierarchical levels, by minimizing prediction errors\n\nat all levels. The rationale is that predictions at all levels are con-\n\ntinuously adjusted (and synaptic weights adjusted at a slower time\n\nscale) until they match with incoming multimodal stimuli suf-\n\nficiently well, and, consequently, the prediction errors across all\n\nlevels are minimized. This process entails that even if a predictive\n\ncoding agent starts with an incorrect prediction (e.g. about what\n\nobject it is looking at) the prediction errors that measure a discrep-\n\nancy between the predicted sensations and the actual sensations can help revise the initial predictions. See Parr et al. (2022) for a\n\nmore detailed explanation of how to interpret these schematics.\n\nAnother critical aspect of Fig. 1 is that it illustrates two path-\n\nways in which prediction errors at the proprioceptive and inte-\n\nroceptive levels are used to steer physical actions (reflex arcs)\n\nand autonomic actions (autonomic reflexes). Endowing predictive\n\ncoding with these reflexes—hence realizing an “active inference”\n\narchitecture—permits minimizing prediction errors by changing\n\nthe state of the world (by physically acting) or the internal milieu\n\n(by engaging in autonomic actions) rather than only by changing\n\npredictions, as described later. Equipped with a generative model like the one shown in Fig. 1 ,\n\nan active inference agent can continuously infer (and act upon)\n\nthe state of the world and of the body, including the internal", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed1.pdf" - }, - { - "text": "� � # Give single observation to the agent\n\nobservation = [ 1 ]\n\naction = single_in put! (agent, observation)\n\n# Give multiple observations to the agent and simulate actions\n\nobservations = [ 1 , 2 , 1 , 2 , 3 ]\n\nactions = give_inputs!(agent, observations) � � Additionally, a set of convenience functions can extract and set parameters and (histories\n\nof) beliefs. We briefly show how to extract the current or histories of past states: � � # Get all current belief states\n\nstates = get_states(agent)\n\n# Get a specific state , like the expected free energies only\n\nefe = get_states(agent, \"expected_free_energies\" )\n\n# Get history for all states\n\nhistory = get_history(agent)\n\n# Get history of expected free energies only\n\nhistory_efe = get_history(agent, \"expected_free_energies\" ) � � And how to change the parameters of a created agent: � � # Set individual parameter , alpha to 1.0\n\nset_parameters!(agent, \"alpha\" , 1 .0 )\n\n# Set multiple parameters by passing a dictionary\n\nnew_parameters = Dict (\n\n\"alpha\" => 1 .0 , # Set alpha to 1.0\n\n\"lr_pA\" => 0 .5 # Set learning rate of A to 0.5\n\n)\n\nset_parameters!(agent, new_parameters) # Set new parameters to agent � � *3.3. Model Fitting with* ActionModels\n\nIn addition to simulating the behaviour and belief updating of agents, ActionModels\n\nalso makes it possible to fit models to data and perform parameter estimation. This is\n\nused in general to form better models and theories of mental processes, as well as to\n\nfind mechanistic differences (usually prior beliefs in AIF) between, for example, clinical\n\npopulations or investigating how computational constructs, like Bayesian beliefs, relate\n\nto, for example, neuronal dynamics. This is performed in fields like cognitive modelling\n\nand mathematical psychology [ 34 ], as well as computational psychiatry [ 14 , 53 ]. In the\n\nfollowing, we briefly describe the high-level functions needed to fit AIF models to empirical\n\ndata with ActionModels .\n\nWe have our agent object defined as above. We then need to specify priors for the\n\nparameters we want to estimate. Here, we estimate the *α* parameter, and use a gamma\n\ndistribution as prior: � � # Load package for specifying distributions\n\n**using** Distributions\n\n# Initialize priors\n\npriors = Dict ( \"alpha\" => Gamma( 4 , 4 )) � � We can now use the create_model function to instantiate a probabilistic model object with\n\ndata. This takes the agent object, the priors, and a set of observations and actions as\n\nthe arguments:", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "**Figure 5. A** learning for the actual reward condition (reward condition left). The agent correctly\n\nlearned the probability of receiving rewards in the rewarding arm. It did not learn the probabilities of\n\nthe non-rewarding arm since it did not explore that option. The color grading signifies the likelihood\n\nof an observation being generated by a specific state. The more saturated the color, the higher\n\nthe likelihood.\n\n### *4.3. Fitting the Model to the Data*\n\nSimulations are useful for a variety of purposes, like exploring the consequences of\n\ndifferent priors and parameters and establishing the face validity of hypothetical mech-\n\nanisms underlying behavioural phenomena. However, we often want to use models to\n\nmake inferences about specific observed phenomena, like the differences in behaviour\n\nbetween various populations, as in computational psychiatry [ 14 ]. One standard method\n\nhere is model fitting, where we estimate the parameter values (e.g., prior beliefs) of an AIF\n\nmodel that are the most likely given some observed behaviour of a participant. This is often\n\nperformed with approximate Bayesian methods. In the cognitive and behavioural sciences,\n\nthe predominant method is Markov Chain Monte Carlo (MCMC) methods [ 34 ], which are\n\nslower but in the limit can estimate parameter posteriors without making assumptions\n\nabout their functional form. An alternative, which is more often used in other fields and\n\nalso available in ActiveInference is variational methods, which are faster but require mak-\n\ning assumptions about the functional form of the posterior. In general, MCMC methods\n\nare favourable when making parameter inferences (i.e., comparing parameters of the same\n\nmodel fitted to different data, like two groups of subjects). When performing a Bayesian\n\nmodel comparison (i.e., comparing different models fitted to the same data), the different\n\napproaches rely on different approximations of the model evidence, with the variational", - "page_start": 23, - "page_end": 23, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "**ANNEX III**\n\n- Model for specific contracts\n\n- Model for order forms", - "page_start": 41, - "page_end": 41, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "*Modeling and controlling the body in maladaptive ways* 7\n\nFigure 2. A simplified example of (Bayesian) inference of one’s heart rate. First panel: simulated time series of heartbeat observations. Second panel:\n\nShannon surprise of a generative model composed of a fixed prior about heart rate (a Gaussian with a mean of 67 and a precision of 0.11) and a\n\nlikelihood (a Gaussian centered on the current heart rate with an additional bias of 15 pulses, with various precisions that vary between 0.47 and 10,\n\nsee the legend). Third panel: Bayesian surprise, which measures the discrepancy between posterior and prior probabilities over time. Bottom panels:\n\nthe two series of panels are organized in two (left and right) columns, which show the first five time steps of inference for the two cases with high\n\nprecision (of 10) and low precision (of 0.1) of the likelihood, respectively. See the main text for an explanation and online article for colored version of\n\nthis figure.\n\nthe current model generate significant surprise, and sometimes,\n\nthe surprise can remain relatively high for long periods before the\n\nmodel adapts (or the world changes), especially with some param-\n\neterizations of the generative model. This is particularly relevant\n\nin this context since active inference agents strive to minimize\n\ntheir surprise (and the long-term average of surprise, entropy,\n\nwhich is a measure of uncertainty) by changing their model, or\n\nchanging the world, or both.\n\nSecond, these examples illustrate the importance of precision\n\ncontrol and the appropriate setting of precision parameters in\n\nguiding inference. Remarkably, the inference can be more or less\n\naccurate or fast using the same data, depending on the precision parameters. Note that in Fig. 2 , we manipulated only the precision\n\nof the likelihood. However, it would also be possible to manipulate\n\nthe precision of the prior, together or in alternative to the precision\n\nof the likelihood. Generally speaking, when the precision of the", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed1.pdf" - }, - { - "text": "### **Extended Data Fig. 9 | Ancestry models of Viking Age individuals in**\n\n**Scandinavia. a** , MDS of each Scandinavian Viking group plotted on top of\n\npreceding Iron age and Roman individuals. **b** , All accepted qpAdm models using\n\nTwigstats-1000 for every Scandinavian Viking individual in Denmark, Sweden,\n\nand Norway, computed in a rotational qpAdm with source groups identical to\n\nFig. 4. We only retain models with feasible admixture proportions, standard\n\nerrors of <0.25, and show models with 1 source and a p-value greater than 0.01\n\nor otherwise with 2 sources and a p-value greater than 0.01. If several models\n\nsatisfy p > 0.05, we show all such models, otherwise we select the model with\n\nthe largest p-value. The -log10 p-values are shown to the left of each model.\n\nWe combine models involving related sources, if they exist, by averaging their\n\nrespective admixture proportions, standard errors, and p-values. We plot one\n\nstandard error.", - "page_start": 20, - "page_end": 20, - "source_file": "pubmed3.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210582_en.pdf", - "query": "In the health regulation regarding coronavirus, what is considered a \"device\" ?", - "target_page": 3, - "target_passage": "means an in vitro diagnostic medical device within the meaning given in regulation 2(1) of the Medical Devices Regulations 2002", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "**18.** Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the\n\n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these\n\nRegulations.\n\n###### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus,\n\nPublic Health Information for International Passengers) (England) Regulations 2020 and the\n\nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England)\n\n(Amendment) Regulations 2021.\n\nThey impose requirements on certain categories of person to provide information upon arrival in\n\nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the\n\nspread of infection or contamination from coronavirus or coronavirus disease. They also impose\n\nobligations on operators to ensure that passengers receive information and comply with the\n\nrequirements.\n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum\n\nhas been published alongside this instrument at www.legislation.gov.uk.\n\n© Crown copyright 2021\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local\n\nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the\n\nincidence or transmission of coronavirus.”.\n\n### **Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n\n## **2015**\n\n**18.** The Special Educational Needs and Disability (Detained Persons) Regulations 2015( **a** ) are\n\namended as follows.\n\n**19.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**20.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n\n(d) regulation 19 (requirement to consider mediation);\n\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to\n\npursue mediation);\n\n(f) regulation 21 (mediation);\n\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n\n(h) regulation 27(3) (steps to be taken by a home authority);\n\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n\n(j) regulation 30(3) and (6) (unopposed appeals).”.\n\n**21.** In regulation 4 (determination whether or not special educational provision may be\n\nnecessary), after paragraph (2) insert—\n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if\n\nit is impractical to do so because of a reason relating to the incidence or transmission of\n\ncoronavirus.”.\n\n**22.** In regulation 5(4) (decision whether or not to conduct a detained person’s EHC needs\n\nassessment)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“, or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n) S.I. 2015/62.", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(3) In regulation 4ZA—\n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel\n\nand Operator Liability) (England) Regulations 2021”;\n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus,\n\nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute\n\n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator\n\nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability\n\nRegulations”)”;\n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations”\n\nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator\n\nLiability Regulations”;\n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph\n\n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”.\n\n**2.** —(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations\n\n2020( **a** ) are amended as follows.\n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International\n\nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection\n\n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”.\n\n(3) In regulation 6(1)—\n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating\n\nworker”, for “regulation 4” substitute “regulation 9”;\n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health\n\nProtection (Coronavirus, International Travel and Operator Liability) (England)\n\nRegulations 2021”.\n\nSCHEDULE 16 Regulation 26(3)\n\n#### Transitional provision\n\n**1.** Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to\n\nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations\n\n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information\n\nprovided for the purposes of these Regulations where the person arrives in England on or after that\n\ndate.\n\n**2.** Confirmation given by the Foreign, Commonwealth and Development Office that a person is\n\nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that\n\nthe person is not required to comply with regulation 6 of these Regulations where the person\n\narrives in England on or after 4.00 a.m. on 17th May 2021.\n\n**3.** A designation by the Secretary of State of a person as an authorised person under regulation\n\n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person\n\nunder of regulation 11(11)(c) of these Regulations.\n\n**4.** Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who\n\nexercises the powers in that regulation in relation to a person who arrived in England before 4.00\n\na.m. on 17th May 2021.\n\n( **a** ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**23.** In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the\n\nend of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**24.** In regulation 10(4) (decision not to secure an EHC plan)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“; or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n**25.** In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”.\n\n**26.** In regulation 29 (compliance with the orders of the First-tier Tribunal)—\n\n(a) after paragraph (6) insert—\n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d)\n\napply.”.\n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”.\n\n**27.** In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”.\n\n### **Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n\n### **Recommendations Power) Regulations 2017**\n\n**28.** The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power)\n\nRegulations 2017( **a** ) are amended as follows.\n\n**29.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**30.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.\n\n*Vicky Ford*\n\nParliamentary Under Secretary of State\n\n28th April 2020 Department for Education\n\n) S.I. 2017/1306.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(e) where P is required to obtain a testing package or undertake a test under regulation 6 or\n\nSchedule 8—\n\n(i) information generated where P books, or attempts to book, a testing package for the\n\npurposes of regulation 6,\n\n(ii) a copy of any notice given to P which contains information about the requirement to\n\nbook a testing package or to undertake a test,\n\n(iii) information A obtained under paragraph 10(3) or (4) of Schedule 8,\n\n(iv) the results of a test undertaken by P in accordance with Schedule 8 (whether or not\n\nthat test was provided as part of a testing package),\n\n(v) information obtained by A in the course of providing a test that falls within\n\nparagraph (iv) and is undertaken, or in the course of arranging for such a test to be\n\nundertaken, by P (including confirmation that the test was undertaken, details of\n\nwhen and where it was undertaken, any reasons for a test not be being undertaken\n\nand the details of any replacement test to be undertaken);\n\n(f) information provided to an immigration officer pursuant to regulations 3(7), 4(4) or\n\n6(11);\n\n(g) where a sample taken in respect of a day 2 test under regulation 6 has been sequenced, the\n\nsorted BAM file relating to that sample containing all reads aligning to the SARS-CoV-2\n\nreference genome with unaligned and human reads removed;\n\n(h) information provided by, or on behalf of, A by way of explanation for failing to comply\n\nwith regulation 3, 4 or 6, or paragraph 3 of Schedule 8; or\n\n(i) information about any steps taken in relation to A, including details of any fixed penalty\n\nnotice issued under these Regulations.\n\n(3) A may only use relevant information where it is necessary—\n\n(a) for the purpose of carrying out a function under these Regulations;\n\n(b) for the purpose of—\n\n(i) preventing danger to public health as a result of the spread of infection or\n\ncontamination with coronavirus or coronavirus disease,\n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus\n\ndisease, or\n\n(iii) giving effect to any international agreement or arrangement relating to the spread of\n\ninfection or contamination with coronavirus or coronavirus disease; or\n\n(c) for a purpose connected with, or otherwise incidental to, a purpose described in sub-\n\nparagraph (a) or (b).\n\n(4) Subject to paragraph (7), A may only disclose relevant information to another person (the\n\n“recipient”) where it is necessary for the recipient to have the information —\n\n(a) for the purpose of carrying out a function of the recipient under—\n\n(i) these Regulations, or\n\n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of\n\nrequiring the isolation or quarantine of persons who have been outside the common\n\ntravel area, for any of the purposes described in sub-paragraph (b);\n\n(b) for the purpose of—\n\n(i) preventing danger to public health as a result of the spread of infection or\n\ncontamination with coronavirus or coronavirus disease,\n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus\n\ndisease, or\n\n(iii) giving effect to any international agreement or arrangement relating to the spread of\n\ninfection or contamination with coronavirus or coronavirus disease; or", - "page_start": 28, - "page_end": 28, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "and the Channel Islands. The British Overseas Territories are not in the common travel area. Public\n\nhealth requirements may vary depending upon in which nation of the UK you are staying.\n\nEngland: https://www.gov.uk/uk-border-control\n\nNorthern Ireland: https://www.nidirect.gov.uk/articles/coronavirus-covid-19-international-travel-\n\nadvice\n\nScotland: https://www.gov.scot/publications/coronavirus-covid-19-international-travel-quarantine/\n\nWales: https://gov.wales/arriving-wales-overseas\n\nFailure to comply with these measures is a criminal offence and you could be fined. There are a\n\nlimited set of exemptions from these measures. Check the list of exemptions carefully. You may\n\nbe fined if you fraudulently claim an exemption.\n\n#### PART 2\n\n###### **Onboard announcement**\n\nThe following is a public health message on behalf of the UK’s public health agencies.\n\nIf you have been in or transited through an amber or red country within the previous 10 days you\n\nmust quarantine for the first 10 days after you arrive. This is to protect yourself and others.\n\nThe symptoms of coronavirus are a new continuous cough, a high temperature or a loss of, or\n\nchange in, normal sense of taste or smell. If you experience any of these symptoms, however mild,\n\nyou are advised to make yourself known to the crew.\n\nSimple measures you can take to help protect yourself and family are:\n\nwash your hands\n\navoid touching your face with your hands\n\ncatch coughs and sneezes in a tissue and dispose of it immediately.\n\n#### PART 3\n\n##### Relevant websites\n\n**1.** The following are “the relevant websites” for the purposes of regulation 14—\n\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-uk-\n\nborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules\n\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-in-\n\nengland\n\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england\n\nhttp://www.gov.uk/travel-quarantine-and-testing\n\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england", - "page_start": 82, - "page_end": 82, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**10.** In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”.\n\n**11.** After regulation 18 (circumstances in which a local authority must review an EHC plan)\n\ninsert—\n\n“ **Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.** —(1) It is not necessary for a local authority to review an EHC plan in accordance\n\nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the\n\nincidence or transmission of coronavirus.\n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as\n\nsoon as reasonably practicable.”.\n\n**12.** In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert—\n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3)\n\nand (4) if it is impractical to do so because of a reason relating to the incidence or\n\ntransmission of coronavirus.”.\n\n**13.** In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)—\n\n(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**14.** In regulation 45 (unopposed appeals), after paragraph (7) insert—\n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e)\n\napply.”.\n\n### **Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.** The Special Educational Needs (Personal Budgets) Regulations 2014( **a** ) are amended as\n\nfollows.\n\n**16.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**17.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time period due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, the requirement for the local authority\n\nto review the making and use of direct payments within the first three months of them being\n\nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read\n\ninstead as a requirement for such action to be taken as soon as reasonably practicable.\n\n) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "3\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by\n\nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984( **a** ).\n\n#### PART 1\n\n##### Introductory\n\n###### **Citation, commencement, extent and application**\n\n**1.** —(1) These Regulations may be cited as the Health Protection (Coronavirus, International\n\nTravel and Operator Liability) (England) Regulations 2021.\n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021.\n\n(3) These Regulations extend to England and Wales and apply in relation to England only.\n\n###### **Interpretation and introduction of Schedules 1 to 4**\n\n**2.** —(1) In these Regulations—\n\n“category 1 arrival” means person who has arrived in England from a category 1 country or\n\nterritory, and has not been in a category 2 country or territory or a category 3 country or\n\nterritory in the period beginning with the 10th day before the date of their arrival in England;\n\n“category 1 country or territory” means a country or territory, or part of a country or territory,\n\nspecified in Schedule 1( **b** );\n\n“category 2 country or territory” means a country or territory or part of a country or territory\n\nspecified in Schedule 2( **c** );\n\n“category 3 country or territory” means a country or territory or part of a country or territory\n\nspecified in Schedule 3( **d** );\n\n“child” means a person under the age of 18;\n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act\n\n1971( **e** );\n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be\n\ncaused by coronavirus);\n\n“designated port” means a port designated for the purposes of Schedule 11;\n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation\n\n2(1) of the Medical Devices Regulations 2002( **f** );\n\n“disability” has the meaning given in the Equality Act 2010( **g** ) (see section 6 of, and Schedule\n\n1 to, that Act);\n\n“immigration officer” means a person appointed by the Secretary of State as an immigration\n\nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971( **h** );\n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11;\n\n“operator” except in regulation 18, means an operator of a relevant service;\n\n( **a** ) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14).\n\n( **b** ) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories.\n\n( **c** ) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories.\n\n( **d** ) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories.\n\n( **e** ) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland\n\nare collectively referred to in that Act as “the common travel area”.\n\n( **f** ) S.I. 2002/618.\n\n( **g** ) 2010 c. 15.\n\n( **h** ) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I.\n\n1993/1813.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15\n\nworking days), (4), (5), (7) (in relation to the second reference to 15 working days)\n\nand (8);\n\n(b) regulation 16(2) and (3) (change of responsible commissioning body);\n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school\n\nor other institution);\n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person\n\ndoes not attend a school or other institution);\n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess\n\neducational, health care and social care provision);\n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment);\n\n(g) regulation 33 (requirement to consider mediation);\n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails\n\nto pursue mediation);\n\n(i) regulation 35(2), (3) and (4) (mediation - health care issues);\n\n(j) regulation 36(2) (mediation - no health care issues);\n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5));\n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority);\n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier\n\nTribunal);\n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals);\n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and\n\n(p) regulation 56(3) (publication of comments on the local offer).”.\n\n**6.** In regulation 4 (determination whether or not special educational provision may be\n\nnecessary), after paragraph (2) insert—\n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if\n\nit is impractical to do so because of a reason relating to the incidence or transmission of\n\ncoronavirus.”.\n\n**7.** In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)—\n\n(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**8.** In regulation 8(2) (duty to co-operate in EHC needs assessments)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“; or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n**9.** In regulation 10(4) (decision not to secure an EHC plan)—", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S\n\n## **2020 No. 471**\n\n## **EDUCATION, ENGLAND**\n\n## The Special Educational Needs and Disability (Coronavirus)\n\n## (Amendment) Regulations 2020\n\n*Made* *-* *-* *-* *-* *28th April 2020*\n\n## *Laid before Parliament* *30th April* *2020*\n\n*Coming into force* *-* *-* *1st May* *2020*\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by\n\nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3)\n\nand 135(2) and (3) of the Children and Families Act 2014( **a** ) and sections 29(3) and 569(4) of the\n\nEducation Act 1996( **b** ).\n\n### **Citation and commencement**\n\n**1.** These Regulations may be cited as the Special Educational Needs and Disability\n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.\n\n### **Review and expiry**\n\n**2.** —(1) The Secretary of State must review the effectiveness of these Regulations during the\n\nperiod for which they have effect.\n\n(2) These Regulations cease to have effect on 25th September 2020.\n\n### **Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.** The Special Educational Needs and Disability Regulations 2014( **c** ) are amended as follows.\n\n**4.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**5.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\n( **a** ) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16).\n\n( **b** ) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and\n\nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education\n\n(Wales) Measure 2009.\n\n( **c** ) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210582_en.pdf", - "query": "Regarding the regulation of Enforcement of requirement to self-isolate concerning travel and coronavirus, who are considered an \"authorised persons\" ?", - "target_page": 19, - "target_passage": "For the purposes of this regulation, “authorised person” means— (a) a constable; (b) for the purposes of paragraphs (2) and (3) only, an immigration officer; or (c) a person designated by the Secretary of State for the purposes of this regulation.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**18.** Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the\n\n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these\n\nRegulations.\n\n###### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus,\n\nPublic Health Information for International Passengers) (England) Regulations 2020 and the\n\nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England)\n\n(Amendment) Regulations 2021.\n\nThey impose requirements on certain categories of person to provide information upon arrival in\n\nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the\n\nspread of infection or contamination from coronavirus or coronavirus disease. They also impose\n\nobligations on operators to ensure that passengers receive information and comply with the\n\nrequirements.\n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum\n\nhas been published alongside this instrument at www.legislation.gov.uk.\n\n© Crown copyright 2021\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local\n\nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the\n\nincidence or transmission of coronavirus.”.\n\n### **Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n\n## **2015**\n\n**18.** The Special Educational Needs and Disability (Detained Persons) Regulations 2015( **a** ) are\n\namended as follows.\n\n**19.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**20.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n\n(d) regulation 19 (requirement to consider mediation);\n\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to\n\npursue mediation);\n\n(f) regulation 21 (mediation);\n\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n\n(h) regulation 27(3) (steps to be taken by a home authority);\n\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n\n(j) regulation 30(3) and (6) (unopposed appeals).”.\n\n**21.** In regulation 4 (determination whether or not special educational provision may be\n\nnecessary), after paragraph (2) insert—\n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if\n\nit is impractical to do so because of a reason relating to the incidence or transmission of\n\ncoronavirus.”.\n\n**22.** In regulation 5(4) (decision whether or not to conduct a detained person’s EHC needs\n\nassessment)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“, or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n) S.I. 2015/62.", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "and the Channel Islands. The British Overseas Territories are not in the common travel area. Public\n\nhealth requirements may vary depending upon in which nation of the UK you are staying.\n\nEngland: https://www.gov.uk/uk-border-control\n\nNorthern Ireland: https://www.nidirect.gov.uk/articles/coronavirus-covid-19-international-travel-\n\nadvice\n\nScotland: https://www.gov.scot/publications/coronavirus-covid-19-international-travel-quarantine/\n\nWales: https://gov.wales/arriving-wales-overseas\n\nFailure to comply with these measures is a criminal offence and you could be fined. There are a\n\nlimited set of exemptions from these measures. Check the list of exemptions carefully. You may\n\nbe fined if you fraudulently claim an exemption.\n\n#### PART 2\n\n###### **Onboard announcement**\n\nThe following is a public health message on behalf of the UK’s public health agencies.\n\nIf you have been in or transited through an amber or red country within the previous 10 days you\n\nmust quarantine for the first 10 days after you arrive. This is to protect yourself and others.\n\nThe symptoms of coronavirus are a new continuous cough, a high temperature or a loss of, or\n\nchange in, normal sense of taste or smell. If you experience any of these symptoms, however mild,\n\nyou are advised to make yourself known to the crew.\n\nSimple measures you can take to help protect yourself and family are:\n\nwash your hands\n\navoid touching your face with your hands\n\ncatch coughs and sneezes in a tissue and dispose of it immediately.\n\n#### PART 3\n\n##### Relevant websites\n\n**1.** The following are “the relevant websites” for the purposes of regulation 14—\n\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-uk-\n\nborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules\n\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-in-\n\nengland\n\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england\n\nhttp://www.gov.uk/travel-quarantine-and-testing\n\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england", - "page_start": 82, - "page_end": 82, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(3) In regulation 4ZA—\n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel\n\nand Operator Liability) (England) Regulations 2021”;\n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus,\n\nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute\n\n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator\n\nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability\n\nRegulations”)”;\n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations”\n\nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator\n\nLiability Regulations”;\n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph\n\n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”.\n\n**2.** —(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations\n\n2020( **a** ) are amended as follows.\n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International\n\nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection\n\n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”.\n\n(3) In regulation 6(1)—\n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating\n\nworker”, for “regulation 4” substitute “regulation 9”;\n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health\n\nProtection (Coronavirus, International Travel and Operator Liability) (England)\n\nRegulations 2021”.\n\nSCHEDULE 16 Regulation 26(3)\n\n#### Transitional provision\n\n**1.** Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to\n\nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations\n\n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information\n\nprovided for the purposes of these Regulations where the person arrives in England on or after that\n\ndate.\n\n**2.** Confirmation given by the Foreign, Commonwealth and Development Office that a person is\n\nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that\n\nthe person is not required to comply with regulation 6 of these Regulations where the person\n\narrives in England on or after 4.00 a.m. on 17th May 2021.\n\n**3.** A designation by the Secretary of State of a person as an authorised person under regulation\n\n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person\n\nunder of regulation 11(11)(c) of these Regulations.\n\n**4.** Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who\n\nexercises the powers in that regulation in relation to a person who arrived in England before 4.00\n\na.m. on 17th May 2021.\n\n( **a** ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "###### **Form B: positive test result**\n\nYour coronavirus test result is positive. You had the virus when the test was done.\n\nIf you have not had symptoms of coronavirus, you must self-isolate for 10 days from the day after\n\nyour test date. If you have symptoms of coronavirus, you must self-isolate for 10 days from the\n\nday your symptoms started, if earlier than when you took your test.\n\nPeople you live with or are travelling with should also self-isolate for 10 days from the day after\n\nyou took the test.\n\nYou may be contacted for contact tracing and to check that you, and those who you live or are\n\ntravelling with, are self-isolating.\n\nYou must not travel, including to leave the UK, during self-isolation.\n\nContact 111 if you need medical help. In an emergency dial 999.\n\n###### **Form C: unclear test result**\n\nYour coronavirus test result is unclear. It is not possible to say if you had the virus when the test\n\nwas done.\n\nYou must, by law, continue self-isolating for the remainder of your self-isolation period as an\n\ninternational arrival travelling to the UK from an amber-list country, territory or region. You may\n\nbe contacted to check that you are self-isolating.\n\nIf you want to shorten your self-isolation period you will need to take another test for international\n\narrivals from amber list countries, territories or regions. For more information, go to\n\nhttps://www.gov.uk/guidance/coronavirus-covid-19-test-to-release-for-international-travel.\n\n(4) The test provider must, on request, provide a constable or any other person employed in or\n\nfor the purposes of any police force, with—\n\n(a) P’s passport number, or travel document reference number (as appropriate);\n\n(b) P’s test result;\n\n(c) the date on which P undertook the test;\n\n(d) the date on which the test result was notified or made available to P or X in accordance\n\nwith sub-paragraphs (2) and (3).\n\n(5) Where—\n\n(a) regulation 4 or 4A of the Health Protection (Notification) Regulations 2010( **a** ) applies in\n\nrelation to the test provider; or\n\n(b) if the test provider arranges with another person (“X”) for X to carry out any element of\n\nthe single end-to-end testing service on their behalf, either of those regulations applies to\n\nX in the carrying out of that element,\n\n( **a** ) S.I. 2010/659; regulation 4 was amended by S.I. 2013/235, 2020/1175, 2020/764, 2021/150 and regulation 4A was inserted\n\nby S.I. 2020/1175.", - "page_start": 72, - "page_end": 72, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "you have been traced as a contact of someone who tested positive\n\nFor advice on when you might need to self-isolate and what to do, go to\n\nwww.nhs.uk/conditions/coronavirus-covid-19 and read ‘Self-isolation and treating symptoms’.\n\n###### **Form B: positive test result**\n\nYour coronavirus test result is positive. You had the virus when the test was done.\n\nEven if you have not had symptoms of coronavirus, you must self-isolate for 10 days from the day\n\nafter your test date. Your test sample may be genome sequenced to check whether you have a\n\nvirus variant of concern or variant under investigation.\n\nPeople you live with or have travelled with should also self-isolate for 10 days from the day after\n\nyou took a test.\n\nIf you received a positive test result for the test taken you do not need to take any further tests.\n\nPeople you are travelling with must still take a day 8 test if they have travelled from an amber list\n\ncountry.\n\nYou may be contacted for contact tracing and to check that you, and those who you live or are\n\ntravelling with, are self-isolating.\n\nYou must not travel, including to leave the UK, during self-isolation.\n\nContact 111 if you need medical help. In an emergency dial 999.\n\n###### **Form C: unclear test result**\n\nYour coronavirus test result is unclear. It is not possible to say if you had the virus when the test\n\nwas done.\n\nYou must take another test or self-isolate for 10 days from the day after your test date.\n\nYou may be contacted to check that you are self-isolating.\n\n(4) Where—\n\n(a) regulation 4 or 4A of the Health Protection (Notification) Regulations 2010 applies in\n\nrelation to the test provider; or\n\n(b) if the test provider arranges with another person (“X”) for X to carry out any element of\n\nthe single end-to-end testing service on their behalf, either of those regulations applies to\n\nX in the carrying out of that element,\n\nthe regulation applies as if it required the information described in sub-paragraph (5) to be\n\nincluded in the notification to Public Health England.\n\n(5) The information mentioned in sub-paragraph (4) is—\n\n(a) the date on which P last departed from or transited through a category 2 country or\n\nterritory;\n\n(b) P’s coach number, flight number or vessel name (as appropriate);\n\n(c) the country or territory P was travelling from when P arrived in England, and any country\n\nor territory they transited through as part of that journey;\n\n(d) the date on which P undertook the appropriate test;\n\n(e) whether the test is—\n\n(i) a day 2 test for a category 1 arrival,\n\n(ii) a day 2 test for a person who is not a category 1 arrival, or\n\n(iii) a day 8 test.", - "page_start": 65, - "page_end": 65, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(e) where P is required to obtain a testing package or undertake a test under regulation 6 or\n\nSchedule 8—\n\n(i) information generated where P books, or attempts to book, a testing package for the\n\npurposes of regulation 6,\n\n(ii) a copy of any notice given to P which contains information about the requirement to\n\nbook a testing package or to undertake a test,\n\n(iii) information A obtained under paragraph 10(3) or (4) of Schedule 8,\n\n(iv) the results of a test undertaken by P in accordance with Schedule 8 (whether or not\n\nthat test was provided as part of a testing package),\n\n(v) information obtained by A in the course of providing a test that falls within\n\nparagraph (iv) and is undertaken, or in the course of arranging for such a test to be\n\nundertaken, by P (including confirmation that the test was undertaken, details of\n\nwhen and where it was undertaken, any reasons for a test not be being undertaken\n\nand the details of any replacement test to be undertaken);\n\n(f) information provided to an immigration officer pursuant to regulations 3(7), 4(4) or\n\n6(11);\n\n(g) where a sample taken in respect of a day 2 test under regulation 6 has been sequenced, the\n\nsorted BAM file relating to that sample containing all reads aligning to the SARS-CoV-2\n\nreference genome with unaligned and human reads removed;\n\n(h) information provided by, or on behalf of, A by way of explanation for failing to comply\n\nwith regulation 3, 4 or 6, or paragraph 3 of Schedule 8; or\n\n(i) information about any steps taken in relation to A, including details of any fixed penalty\n\nnotice issued under these Regulations.\n\n(3) A may only use relevant information where it is necessary—\n\n(a) for the purpose of carrying out a function under these Regulations;\n\n(b) for the purpose of—\n\n(i) preventing danger to public health as a result of the spread of infection or\n\ncontamination with coronavirus or coronavirus disease,\n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus\n\ndisease, or\n\n(iii) giving effect to any international agreement or arrangement relating to the spread of\n\ninfection or contamination with coronavirus or coronavirus disease; or\n\n(c) for a purpose connected with, or otherwise incidental to, a purpose described in sub-\n\nparagraph (a) or (b).\n\n(4) Subject to paragraph (7), A may only disclose relevant information to another person (the\n\n“recipient”) where it is necessary for the recipient to have the information —\n\n(a) for the purpose of carrying out a function of the recipient under—\n\n(i) these Regulations, or\n\n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of\n\nrequiring the isolation or quarantine of persons who have been outside the common\n\ntravel area, for any of the purposes described in sub-paragraph (b);\n\n(b) for the purpose of—\n\n(i) preventing danger to public health as a result of the spread of infection or\n\ncontamination with coronavirus or coronavirus disease,\n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus\n\ndisease, or\n\n(iii) giving effect to any international agreement or arrangement relating to the spread of\n\ninfection or contamination with coronavirus or coronavirus disease; or", - "page_start": 28, - "page_end": 28, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**23.** In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the\n\nend of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**24.** In regulation 10(4) (decision not to secure an EHC plan)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“; or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n**25.** In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”.\n\n**26.** In regulation 29 (compliance with the orders of the First-tier Tribunal)—\n\n(a) after paragraph (6) insert—\n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d)\n\napply.”.\n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”.\n\n**27.** In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”.\n\n### **Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n\n### **Recommendations Power) Regulations 2017**\n\n**28.** The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power)\n\nRegulations 2017( **a** ) are amended as follows.\n\n**29.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**30.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.\n\n*Vicky Ford*\n\nParliamentary Under Secretary of State\n\n28th April 2020 Department for Education\n\n) S.I. 2017/1306.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(4) In this regulation—\n\n“authorised person” means—\n\n(a) a constable,\n\n(b) the Civil Aviation Authority,\n\n(c) the Secretary of State, or\n\n(d) a person authorised by the Civil Aviation Authority or the Secretary of State under the\n\nAir Navigation Order 2016( **a** );\n\n“operator” has the meaning given in article 4 of the Air Navigation Order 2016;\n\n“pilot in command” and “private aircraft” have the meanings given in the Air Navigation\n\nOrder 2016 (see Schedule 1 to that Order);\n\n“relevant transport service”, in relation to an operator, means a transport service provided by\n\nor on behalf of that operator;\n\n“transport service” means—\n\n(a) a relevant service,\n\n(b) a shuttle service,\n\n(c) a service (other than a relevant service) which—\n\n(i) is carrying passengers travelling to England from outside the common travel area\n\n(whether for payment or valuable consideration or otherwise), and\n\n(ii) is provided by means of an aircraft (other than a private aircraft), or\n\n(d) a flight which—\n\n(i) is carrying passengers travelling to England from outside the common travel area\n\n(whether for payment or valuable consideration or otherwise), and\n\n(ii) is provided by means of a private aircraft.\n\n#### PART 5\n\n##### Offences, proceedings and information\n\n###### **Offences and penalties**\n\n**19.** —(1) A person (“P”) commits an offence where—\n\n(a) without reasonable excuse P contravenes a requirement in regulation 3 (requirement to\n\nprovide information);\n\n(b) without reasonable excuse P contravenes a requirement in regulation 4 (requirement to\n\npossess notification of negative test result);\n\n(c) without reasonable excuse P contravenes a requirement in regulation 6 (requirement to\n\nbook and undertake tests);\n\n(d) without reasonable excuse P contravenes a requirement in regulation 7 (requirement to\n\nundertake workforce tests);\n\n(e) without reasonable excuse P contravenes a requirement in regulation 8 (requirement for\n\noffshore installation workers to take tests);\n\n(f) P contravenes a requirement in regulation 9 (requirement to self-isolate);\n\n(g) without reasonable excuse P contravenes a requirement in or imposed under regulation 11\n\n(enforcement of requirement to self-isolate) apart from paragraph (2) of that regulation;\n\n( **a** ) S.I. 2016/765.", - "page_start": 22, - "page_end": 22, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "###### **Charge for managed self-isolation package**\n\n**9.** The Secretary of State or a person designated by the Secretary of State may impose a charge\n\nin relation to the accommodation, transport and testing package mentioned in the definition of a\n\n“managed self-isolation package” and the Secretary of State may recover any sum owed by P\n\npursuant to such a charge as a debt.\n\n###### **Duty to self-isolate and period of self-isolation**\n\n**10.** Unless P leaves the common travel area where P is permitted to do so under these\n\nRegulations, P must self-isolate in the place in the accommodation designated in the managed self-\n\nisolation package until whichever is the later of—\n\n(a) the end of the period of 10 days beginning with the day after P’s arrival in England;\n\n(b) the end of the period for which P is required to self-isolate under Schedule 8 (mandatory\n\ntesting after arrival in England).\n\n###### **Exceptions from duty to self-isolate**\n\n**11.** Paragraph 10 does not require P to remain in self-isolation—\n\n(a) from any person with whom they were travelling when they arrived in England and who\n\nis also self-isolating in the place where P is self-isolating;\n\n(b) from any person who is staying in the place where P is self-isolating whose assistance P\n\nreasonably requires by reason of—\n\n(i) P being a child, or\n\n(ii) any disability of P’s.\n\n**12.** Paragraph 10 does not require P to remain in self-isolation from a person (“V”) when V is at\n\nthe place where P is self-isolating in exceptional circumstances such as—\n\n(a) to provide emergency assistance;\n\n(b) to provide care or assistance, including relevant personal care within the meaning of\n\nparagraph 1(1B) or 7(3B) of Schedule 4 to the Safeguarding Vulnerable Groups Act\n\n2006( **a** );\n\n(c) to provide medical assistance to P or to any other person who is staying in the place\n\nwhere P is self-isolating where this is required urgently or on the advice of a registered\n\nmedical practitioner;\n\n(d) to provide veterinary services where this is required urgently or on the advice of a\n\nveterinary surgeon;\n\n(e) to provide critical public services including social services or services provided to victims\n\n(such as victims of crime).\n\n###### **Permitted reasons to leave or be outside place of self-isolation**\n\n**13.** —(1) During the period of their self-isolation P may not leave or be outside of the place\n\nwhere P is self-isolating except—\n\n(a) to travel directly to a port to leave the common travel area;\n\n(b) to fulfil a legal obligation, including attending court or satisfying bail conditions or to\n\nparticipate in legal proceedings;\n\n(c) to take exercise;\n\n( **a** ) 2006 c. 47 paragraph 1(1B) was inserted by section 64 the Protection of Freedoms Act 2012 (c. 9) and paragraph 7(3B) was\n\ninserted by section 66 of that Act.", - "page_start": 76, - "page_end": 76, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210582_en.pdf", - "query": "What is the expiracy date of the regulation regarding travel during the coronavirus pandemic made in 2021 ?", - "target_page": 31, - "target_passage": "These Regulations expire at the end of 16th May 2022.", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "**18.** Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the\n\n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these\n\nRegulations.\n\n###### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus,\n\nPublic Health Information for International Passengers) (England) Regulations 2020 and the\n\nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England)\n\n(Amendment) Regulations 2021.\n\nThey impose requirements on certain categories of person to provide information upon arrival in\n\nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the\n\nspread of infection or contamination from coronavirus or coronavirus disease. They also impose\n\nobligations on operators to ensure that passengers receive information and comply with the\n\nrequirements.\n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum\n\nhas been published alongside this instrument at www.legislation.gov.uk.\n\n© Crown copyright 2021\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(3) In regulation 4ZA—\n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel\n\nand Operator Liability) (England) Regulations 2021”;\n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus,\n\nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute\n\n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator\n\nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability\n\nRegulations”)”;\n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations”\n\nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator\n\nLiability Regulations”;\n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph\n\n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”.\n\n**2.** —(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations\n\n2020( **a** ) are amended as follows.\n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International\n\nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection\n\n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”.\n\n(3) In regulation 6(1)—\n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating\n\nworker”, for “regulation 4” substitute “regulation 9”;\n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health\n\nProtection (Coronavirus, International Travel and Operator Liability) (England)\n\nRegulations 2021”.\n\nSCHEDULE 16 Regulation 26(3)\n\n#### Transitional provision\n\n**1.** Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to\n\nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations\n\n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information\n\nprovided for the purposes of these Regulations where the person arrives in England on or after that\n\ndate.\n\n**2.** Confirmation given by the Foreign, Commonwealth and Development Office that a person is\n\nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that\n\nthe person is not required to comply with regulation 6 of these Regulations where the person\n\narrives in England on or after 4.00 a.m. on 17th May 2021.\n\n**3.** A designation by the Secretary of State of a person as an authorised person under regulation\n\n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person\n\nunder of regulation 11(11)(c) of these Regulations.\n\n**4.** Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who\n\nexercises the powers in that regulation in relation to a person who arrived in England before 4.00\n\na.m. on 17th May 2021.\n\n( **a** ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local\n\nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the\n\nincidence or transmission of coronavirus.”.\n\n### **Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n\n## **2015**\n\n**18.** The Special Educational Needs and Disability (Detained Persons) Regulations 2015( **a** ) are\n\namended as follows.\n\n**19.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**20.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n\n(d) regulation 19 (requirement to consider mediation);\n\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to\n\npursue mediation);\n\n(f) regulation 21 (mediation);\n\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n\n(h) regulation 27(3) (steps to be taken by a home authority);\n\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n\n(j) regulation 30(3) and (6) (unopposed appeals).”.\n\n**21.** In regulation 4 (determination whether or not special educational provision may be\n\nnecessary), after paragraph (2) insert—\n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if\n\nit is impractical to do so because of a reason relating to the incidence or transmission of\n\ncoronavirus.”.\n\n**22.** In regulation 5(4) (decision whether or not to conduct a detained person’s EHC needs\n\nassessment)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“, or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n) S.I. 2015/62.", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "and the Channel Islands. The British Overseas Territories are not in the common travel area. Public\n\nhealth requirements may vary depending upon in which nation of the UK you are staying.\n\nEngland: https://www.gov.uk/uk-border-control\n\nNorthern Ireland: https://www.nidirect.gov.uk/articles/coronavirus-covid-19-international-travel-\n\nadvice\n\nScotland: https://www.gov.scot/publications/coronavirus-covid-19-international-travel-quarantine/\n\nWales: https://gov.wales/arriving-wales-overseas\n\nFailure to comply with these measures is a criminal offence and you could be fined. There are a\n\nlimited set of exemptions from these measures. Check the list of exemptions carefully. You may\n\nbe fined if you fraudulently claim an exemption.\n\n#### PART 2\n\n###### **Onboard announcement**\n\nThe following is a public health message on behalf of the UK’s public health agencies.\n\nIf you have been in or transited through an amber or red country within the previous 10 days you\n\nmust quarantine for the first 10 days after you arrive. This is to protect yourself and others.\n\nThe symptoms of coronavirus are a new continuous cough, a high temperature or a loss of, or\n\nchange in, normal sense of taste or smell. If you experience any of these symptoms, however mild,\n\nyou are advised to make yourself known to the crew.\n\nSimple measures you can take to help protect yourself and family are:\n\nwash your hands\n\navoid touching your face with your hands\n\ncatch coughs and sneezes in a tissue and dispose of it immediately.\n\n#### PART 3\n\n##### Relevant websites\n\n**1.** The following are “the relevant websites” for the purposes of regulation 14—\n\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-uk-\n\nborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules\n\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-in-\n\nengland\n\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england\n\nhttp://www.gov.uk/travel-quarantine-and-testing\n\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england", - "page_start": 82, - "page_end": 82, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "#### PART 6\n\n##### Final provisions\n\n###### **Review of need for requirements**\n\n**24.** The Secretary of State must review the need for the requirements imposed by these\n\nRegulations by 14th June 2021 and at least once every 28 days thereafter.\n\n###### **Expiry of Regulations**\n\n**25.** These Regulations expire at the end of 16th May 2022.\n\n###### **Revocations, transitional provision consequential amendments and savings**\n\n**26.** —(1) The following Regulations are revoked—\n\n(a) the Health Protection (Coronavirus, Public Health Information for International\n\nPassengers) (England) Regulations 2020( **a** );\n\n(b) the Health Protection (Coronavirus, International Travel) (England) Regulations 2020\n\n(“the International Travel Regulations”)( **b** ); and\n\n(c) the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability)\n\n(England) (Amendment) Regulations 2021( **c** ).\n\n(2) Schedule 15 makes consequential amendments to other instruments specified in that\n\nSchedule.\n\n(3) Schedule 16 makes transitional provisions.\n\n(4) Nothing in these Regulations applies in relation to a person who arrived in England before\n\n4.00 a.m. on 17th May 2021 (and accordingly, the regulations mentioned in paragraph (1)\n\ncontinue to have effect in relation to such a person).\n\nSigned by authority of the Secretary of State\n\n*Robert Courts*\n\nParliamentary Under Secretary of State\n\nAt 10.32 a.m. on 14th May 2021 Department for Transport\n\n( **a** ) S.I. 2020/567.\n\n( **b** ) S.I. 2020/568.\n\n( **c** ) S.I. 2021/38.", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(e) where P is required to obtain a testing package or undertake a test under regulation 6 or\n\nSchedule 8—\n\n(i) information generated where P books, or attempts to book, a testing package for the\n\npurposes of regulation 6,\n\n(ii) a copy of any notice given to P which contains information about the requirement to\n\nbook a testing package or to undertake a test,\n\n(iii) information A obtained under paragraph 10(3) or (4) of Schedule 8,\n\n(iv) the results of a test undertaken by P in accordance with Schedule 8 (whether or not\n\nthat test was provided as part of a testing package),\n\n(v) information obtained by A in the course of providing a test that falls within\n\nparagraph (iv) and is undertaken, or in the course of arranging for such a test to be\n\nundertaken, by P (including confirmation that the test was undertaken, details of\n\nwhen and where it was undertaken, any reasons for a test not be being undertaken\n\nand the details of any replacement test to be undertaken);\n\n(f) information provided to an immigration officer pursuant to regulations 3(7), 4(4) or\n\n6(11);\n\n(g) where a sample taken in respect of a day 2 test under regulation 6 has been sequenced, the\n\nsorted BAM file relating to that sample containing all reads aligning to the SARS-CoV-2\n\nreference genome with unaligned and human reads removed;\n\n(h) information provided by, or on behalf of, A by way of explanation for failing to comply\n\nwith regulation 3, 4 or 6, or paragraph 3 of Schedule 8; or\n\n(i) information about any steps taken in relation to A, including details of any fixed penalty\n\nnotice issued under these Regulations.\n\n(3) A may only use relevant information where it is necessary—\n\n(a) for the purpose of carrying out a function under these Regulations;\n\n(b) for the purpose of—\n\n(i) preventing danger to public health as a result of the spread of infection or\n\ncontamination with coronavirus or coronavirus disease,\n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus\n\ndisease, or\n\n(iii) giving effect to any international agreement or arrangement relating to the spread of\n\ninfection or contamination with coronavirus or coronavirus disease; or\n\n(c) for a purpose connected with, or otherwise incidental to, a purpose described in sub-\n\nparagraph (a) or (b).\n\n(4) Subject to paragraph (7), A may only disclose relevant information to another person (the\n\n“recipient”) where it is necessary for the recipient to have the information —\n\n(a) for the purpose of carrying out a function of the recipient under—\n\n(i) these Regulations, or\n\n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of\n\nrequiring the isolation or quarantine of persons who have been outside the common\n\ntravel area, for any of the purposes described in sub-paragraph (b);\n\n(b) for the purpose of—\n\n(i) preventing danger to public health as a result of the spread of infection or\n\ncontamination with coronavirus or coronavirus disease,\n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus\n\ndisease, or\n\n(iii) giving effect to any international agreement or arrangement relating to the spread of\n\ninfection or contamination with coronavirus or coronavirus disease; or", - "page_start": 28, - "page_end": 28, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**23.** In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the\n\nend of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**24.** In regulation 10(4) (decision not to secure an EHC plan)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“; or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n**25.** In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”.\n\n**26.** In regulation 29 (compliance with the orders of the First-tier Tribunal)—\n\n(a) after paragraph (6) insert—\n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d)\n\napply.”.\n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”.\n\n**27.** In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”.\n\n### **Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n\n### **Recommendations Power) Regulations 2017**\n\n**28.** The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power)\n\nRegulations 2017( **a** ) are amended as follows.\n\n**29.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**30.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.\n\n*Vicky Ford*\n\nParliamentary Under Secretary of State\n\n28th April 2020 Department for Education\n\n) S.I. 2017/1306.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "3\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by\n\nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984( **a** ).\n\n#### PART 1\n\n##### Introductory\n\n###### **Citation, commencement, extent and application**\n\n**1.** —(1) These Regulations may be cited as the Health Protection (Coronavirus, International\n\nTravel and Operator Liability) (England) Regulations 2021.\n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021.\n\n(3) These Regulations extend to England and Wales and apply in relation to England only.\n\n###### **Interpretation and introduction of Schedules 1 to 4**\n\n**2.** —(1) In these Regulations—\n\n“category 1 arrival” means person who has arrived in England from a category 1 country or\n\nterritory, and has not been in a category 2 country or territory or a category 3 country or\n\nterritory in the period beginning with the 10th day before the date of their arrival in England;\n\n“category 1 country or territory” means a country or territory, or part of a country or territory,\n\nspecified in Schedule 1( **b** );\n\n“category 2 country or territory” means a country or territory or part of a country or territory\n\nspecified in Schedule 2( **c** );\n\n“category 3 country or territory” means a country or territory or part of a country or territory\n\nspecified in Schedule 3( **d** );\n\n“child” means a person under the age of 18;\n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act\n\n1971( **e** );\n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be\n\ncaused by coronavirus);\n\n“designated port” means a port designated for the purposes of Schedule 11;\n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation\n\n2(1) of the Medical Devices Regulations 2002( **f** );\n\n“disability” has the meaning given in the Equality Act 2010( **g** ) (see section 6 of, and Schedule\n\n1 to, that Act);\n\n“immigration officer” means a person appointed by the Secretary of State as an immigration\n\nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971( **h** );\n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11;\n\n“operator” except in regulation 18, means an operator of a relevant service;\n\n( **a** ) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14).\n\n( **b** ) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories.\n\n( **c** ) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories.\n\n( **d** ) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories.\n\n( **e** ) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland\n\nare collectively referred to in that Act as “the common travel area”.\n\n( **f** ) S.I. 2002/618.\n\n( **g** ) 2010 c. 15.\n\n( **h** ) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I.\n\n1993/1813.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S\n\n## **2020 No. 471**\n\n## **EDUCATION, ENGLAND**\n\n## The Special Educational Needs and Disability (Coronavirus)\n\n## (Amendment) Regulations 2020\n\n*Made* *-* *-* *-* *-* *28th April 2020*\n\n## *Laid before Parliament* *30th April* *2020*\n\n*Coming into force* *-* *-* *1st May* *2020*\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by\n\nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3)\n\nand 135(2) and (3) of the Children and Families Act 2014( **a** ) and sections 29(3) and 569(4) of the\n\nEducation Act 1996( **b** ).\n\n### **Citation and commencement**\n\n**1.** These Regulations may be cited as the Special Educational Needs and Disability\n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.\n\n### **Review and expiry**\n\n**2.** —(1) The Secretary of State must review the effectiveness of these Regulations during the\n\nperiod for which they have effect.\n\n(2) These Regulations cease to have effect on 25th September 2020.\n\n### **Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.** The Special Educational Needs and Disability Regulations 2014( **c** ) are amended as follows.\n\n**4.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**5.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\n( **a** ) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16).\n\n( **b** ) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and\n\nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education\n\n(Wales) Measure 2009.\n\n( **c** ) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**10.** In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”.\n\n**11.** After regulation 18 (circumstances in which a local authority must review an EHC plan)\n\ninsert—\n\n“ **Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.** —(1) It is not necessary for a local authority to review an EHC plan in accordance\n\nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the\n\nincidence or transmission of coronavirus.\n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as\n\nsoon as reasonably practicable.”.\n\n**12.** In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert—\n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3)\n\nand (4) if it is impractical to do so because of a reason relating to the incidence or\n\ntransmission of coronavirus.”.\n\n**13.** In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)—\n\n(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**14.** In regulation 45 (unopposed appeals), after paragraph (7) insert—\n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e)\n\napply.”.\n\n### **Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.** The Special Educational Needs (Personal Budgets) Regulations 2014( **a** ) are amended as\n\nfollows.\n\n**16.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**17.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time period due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, the requirement for the local authority\n\nto review the making and use of direct payments within the first three months of them being\n\nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read\n\ninstead as a requirement for such action to be taken as soon as reasonably practicable.\n\n) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia2.pdf", - "query": "Who first suggested the notions of \"hard\" and \"easy\" problems regarding consciousness ?", - "target_page": 1, - "target_passage": "The terms \"hard problem\" and \"easy problems\" were coined by the philosopher David Chalmers", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "patterns. A clock, a hurricane, and the easy problems, are all the sum of their parts (as are most\n\nthings). [27]\n\nThe easy problems relevant to consciousness concern mechanistic analysis of the neural processes that\n\naccompany behaviour. Examples of these include how sensory systems work, how sensory data is\n\nprocessed in the brain, how that data influences behaviour or verbal reports, the neural basis of thought\n\nand emotion, and so on. They are problems that can be analyzed through \"structures and functions\". [27]\n\nThe hard problem, in contrast, is the problem of *why* and *how* those processes are accompanied by\n\nexperience. [1] It may further include the question of why these processes are accompanied by this or that\n\nparticular experience, rather than some other kind of experience. In other words, the hard problem is the\n\nproblem of explaining why certain mechanisms are accompanied by conscious experience. [27] For\n\nexample, why should neural processing in the brain lead to the felt sensations of, say, feelings of hunger?\n\nAnd why should those neural firings lead to feelings of hunger rather than some other feeling (such as,\n\nfor example, feelings of thirst)?\n\nChalmers argues that it is conceivable that the relevant behaviours associated with hunger, or any other\n\n[feeling, could occur even in the absence of that feeling. This suggests that experience is irreducible to](https://en.wikipedia.org/wiki/Irreducibility)\n\nphysical systems such as the brain. This is the topic of the next section.\n\nChalmers believes that the hard problem is irreducible to the easy problems: solving the easy problems\n\nwill not lead to a solution to the hard problems. This is because the easy problems pertain to the causal\n\nstructure of the world while the hard problem pertains to consciousness, and facts about consciousness\n\ninclude facts that go beyond mere causal or structural description. [32]\n\nFor example, suppose someone were to stub their foot and yelp. In this scenario, the easy problems are\n\nmechanistic explanations that involve the activity of the nervous system and brain and its relation to the\n\nenvironment (such as the propagation of nerve signals from the toe to the brain, the processing of that\n\ninformation and how it leads to yelping, and so on). The hard problem is the question of why these\n\nmechanisms are accompanied by *the feeling of pain* , or why these feelings of pain feel the particular way\n\nthat they do. Chalmers argues that facts about the neural mechanisms of pain, and pain behaviours, do not\n\n[lead to facts about conscious experience. Facts about conscious experience are, instead, further facts, not](https://en.wikipedia.org/wiki/Further_facts)\n\nderivable from facts about the brain. [27][32]\n\nAn explanation for all of the relevant physical facts about neural processing would leave unexplained\n\nfacts about what it is like to feel pain. This is in part because functions and physical structures of any sort\n\ncould conceivably exist in the absence of experience. Alternatively, they could exist alongside a different\n\n[set of experiences. For example, it is logically possible for a perfect replica of Chalmers to have no](https://en.wikipedia.org/wiki/Logical_possibility)\n\nexperience at all, or for it to have a different set of experiences (such as an inverted visible spectrum, so\n\nthat the blue-yellow red-green axes of its visual field are flipped). [32]\n\nThe same cannot be said about clocks, hurricanes, or other physical things. In those cases, a structural or\n\nfunctional description is a complete description. A perfect replica of a clock is a clock, a perfect replica of\n\na hurricane is a hurricane, and so on. The difference is that physical things are nothing more than their\n\n##### **Hard problem**\n\n##### **How the easy and hard problems are related**", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Today there is a strong tendency to simply *equate* consciousness with the qualia. Yet there is\n\nclearly something not quite right about this. The \"itchiness of itches\" and the \"hurtfulness of\n\npain\" are qualities we are conscious *of* . So philosophy of mind tends to treat consciousness as\n\nif it consisted simply of the contents of consciousness (the phenomenal qualities), while it\n\nreally is precisely *consciousness* of contents, the very givenness of whatever is subjectively\n\ngiven. And therefore the problem of consciousness does not pertain so much to some alleged\n\n\"mysterious, nonpublic objects\", i.e. objects that seem to be only \"visible\" to the respective\n\nsubject, but rather to the nature of \"seeing\" itself (and in today’s philosophy of mind\n\nastonishingly little is said about the latter). [129]\n\nMost neuroscientists and cognitive scientists believe that Chalmers' alleged \"hard problem\" will be\n\nsolved, or be shown to not be a real problem, in the course of the solution of the so-called \"easy\n\nproblems\", although a significant minority disagrees. [9][130]\n\n[Since 1990, researchers including the molecular biologist Francis Crick and the neuroscientist Christof](https://en.wikipedia.org/wiki/Christof_Koch)\n\n[Koch have made significant progress toward identifying which neurobiological events occur concurrently](https://en.wikipedia.org/wiki/Christof_Koch)\n\nto the experience of subjective consciousness. [131] These postulated events are referred to as *neural*\n\n*correlates of consciousness* or NCCs. However, this research arguably addresses the question of *which*\n\nneurobiological mechanisms are linked to consciousness but not the question of *why* they should give rise\n\nto consciousness at all, the latter being the hard problem of consciousness as Chalmers formulated it. In\n\n\"On the Search for the Neural Correlate of Consciousness\", Chalmers said he is confident that, granting\n\nthe principle that something such as what he terms \"global availability\" can be used as an indicator of\n\nconsciousness, the neural correlates will be discovered \"in a century or two\". [132] Nevertheless, he stated\n\nregarding their relationship to the hard problem of consciousness:\n\nOne can always ask why these processes of availability should give rise to consciousness in\n\nthe first place. As yet we cannot explain why they do so, and it may well be that full details\n\nabout the processes of availability will still fail to answer this question. Certainly, nothing in\n\nthe standard methodology I have outlined answers the question; that methodology assumes a\n\nrelation between availability and consciousness, and therefore does nothing to explain it. [...]\n\nSo the hard problem remains. But who knows: Somewhere along the line we may be led to\n\nthe relevant insights that show why the link is there, and the hard problem may then be\n\nsolved. [132]\n\n[The neuroscientist and Nobel laureate Eric Kandel wrote that locating the NCCs would not solve the hard](https://en.wikipedia.org/wiki/Eric_Kandel)\n\nproblem, but rather one of the so-called easy problems to which the hard problem is contrasted. [133]\n\n[Kandel went on to note Crick and Koch's suggestion that once the binding problem—understanding what](https://en.wikipedia.org/wiki/Binding_problem)\n\naccounts for the unity of experience—is solved, it will be possible to solve the hard problem\n\nempirically. [133] [ However, neuroscientist Anil Seth argued that emphasis on the so-called hard problem is](https://en.wikipedia.org/wiki/Anil_Seth)\n\na distraction from what he calls the \"real problem\": understanding the neurobiology underlying\n\n### **Relationship to scientific frameworks**\n\n#### **Neural correlates of consciousness**", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia2.pdf" - }, - { - "text": "The philosophers Glenn Carruthers and Elizabeth Schier said in 2012 that the main arguments for the\n\n[existence of a hard problem—philosophical zombies, Mary's room, and Nagel's bats—are only persuasive](https://en.wikipedia.org/wiki/What_Is_it_Like_to_Be_a_Bat%3F)\n\nif one already assumes that \"consciousness must be independent of the structure and function of mental\n\n[states, i.e. that there is a hard problem.\" Hence, the arguments beg the question. The authors suggest that](https://en.wikipedia.org/wiki/Beg_the_question)\n\n\"instead of letting our conclusions on the thought experiments guide our theories of consciousness, we\n\nshould let our theories of consciousness guide our conclusions from the thought experiments.\" [64]\n\n[The philosopher Massimo Pigliucci argued in 2013 that the hard problem is misguided, resulting from a](https://en.wikipedia.org/wiki/Massimo_Pigliucci)\n\n\"category mistake\". [17] He said: \"Of course an explanation isn't the same as an experience, but that's\n\nbecause the two are completely independent categories, like colors and triangles. It is obvious that I\n\ncannot experience what it is like to be you, but I can potentially have a complete explanation of how and\n\nwhy it is possible to be you.\" [17]\n\n[In 2017, the philosopher Marco Stango, in a paper on John Dewey's approach to the problem of](https://en.wikipedia.org/wiki/John_Dewey)\n\nconsciousness (which preceded Chalmers' formulation of the hard problem by over half a century), noted\n\nthat Dewey's approach would see the hard problem as the consequence of an unjustified assumption that\n\nfeelings and functional behaviors are not the same physical process: \"For the Deweyan philosopher, the\n\n'hard problem' of consciousness is a 'conceptual fact' only in the sense that it is a *philosophical mistake* :\n\nthe mistake of failing to see that the physical can be had as an episode of immediate sentiency.\" [65]\n\n[The philosopher Thomas Metzinger likens the hard problem of consciousness to vitalism, a formerly](https://en.wikipedia.org/wiki/Vitalism)\n\nwidespread view in biology which was not so much solved as abandoned. [66] Brian Jonathan Garrett has\n\nalso argued that the hard problem suffers from flaws analogous to those of vitalism. [67]\n\n[The philosopher Peter Hacker argues that the hard problem is misguided in that it asks how consciousness](https://en.wikipedia.org/wiki/Peter_Hacker)\n\ncan emerge from matter, whereas in fact sentience emerges from the evolution of living organisms. [68] He\n\nstates: \"The hard problem isn’t a hard problem at all. The really hard problems are the problems the\n\nscientists are dealing with. [...] The philosophical problem, like all philosophical problems, is a confusion\n\nin the conceptual scheme.\" [68] Hacker's critique extends beyond Chalmers and the hard problem, being\n\ndirected against contemporary philosophy of mind and neuroscience more broadly. Along with the\n\n[neuroscientist Max Bennett, he has argued that most of contemporary neuroscience remains implicitly](https://en.wikipedia.org/wiki/Max_Bennett_(scientist))\n\n[dualistic in its conceptualizations and is predicated on the ](https://en.wikipedia.org/wiki/Dualism_(philosophy_of_mind)) *[mereological fallacy](https://en.wikipedia.org/wiki/Mereology)* of ascribing psychological\n\nconcepts to the brain that can properly be ascribed only to the person as a whole. [69] Hacker further states\n\nthat \"consciousness studies\", as it exists today, is \"literally a total waste of time\" and that \"the conception\n\nof consciousness which they have is incoherent\". [68]\n\n[Eliminative materialism or eliminativism is the view that many or all of the mental states used in folk](https://en.wikipedia.org/wiki/Folk_psychology)\n\n[psychology (i.e., common-sense ways of discussing the mind) do not, upon scientific examination,](https://en.wikipedia.org/wiki/Folk_psychology)", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[Weisberg, Josh. \"The hard problem of consciousness\" (http://www.iep.utm.edu/hard-con).](http://www.iep.utm.edu/hard-con)\n\n*[Internet Encyclopedia of Philosophy](https://en.wikipedia.org/wiki/Internet_Encyclopedia_of_Philosophy)* .\n\n[Retrieved from \"https://en.wikipedia.org/w/index.php?title=Hard_problem_of_consciousness&oldid=1261818884\"](https://en.wikipedia.org/w/index.php?title=Hard_problem_of_consciousness&oldid=1261818884)", - "page_start": 27, - "page_end": 27, - "source_file": "wikipedia2.pdf" - }, - { - "text": "from a variety of unconscious and otherwise autonomous networks in the brain and then broadcasts them\n\nto unconscious networks (represented in the metaphor by a broad, unlit \"audience\"). [140] The theory has\n\n[since been expanded upon by other scientists including cognitive neuroscientist Stanislas Dehaene.](https://en.wikipedia.org/wiki/Stanislas_Dehaene) [141]\n\nIn his original paper outlining the hard problem of consciousness, Chalmers discussed GWT as a theory\n\nthat only targets one of the \"easy problems\" of consciousness. [1] In particular, he said GWT provided a\n\npromising account of how information in the brain could become globally accessible, but argued that\n\n\"now the question arises in a different form: why should global accessibility give rise to conscious\n\nexperience? As always, this bridging question is unanswered.\" [1] J. W. Dalton similarly criticized GWT\n\non the grounds that it provides, at best, an account of the cognitive *function* of consciousness, and fails to\n\nexplain its experiential aspect. [142] By contrast, A. C. Elitzur argued: \"While [GWT] does not address the\n\n'hard problem', namely, the very nature of consciousness, it constrains any theory that attempts to do so\n\nand provides important insights into the relation between consciousness and cognition.\" [143]\n\n[For his part, Baars writes (along with two colleagues) that there is no hard problem of explaining qualia](https://en.wikipedia.org/wiki/Qualia)\n\nover and above the problem of explaining causal functions, because qualia are entailed by neural activity\n\nand themselves causal. [21] Dehaene, in his 2014 book *[Consciousness and the Brain](https://en.wikipedia.org/wiki/Consciousness_and_the_Brain)* , rejected the concept\n\nof qualia and argued that Chalmers' \"easy problems\" of consciousness are actually the hard problems. [20]\n\nHe further stated that the \"hard problem\" is based only upon ill-defined intuitions that are continually\n\nshifting as understanding evolves: [20]\n\nOnce our intuitions are educated by cognitive neuroscience and computer simulations,\n\nChalmers' hard problem will evaporate. The hypothetical concept of qualia, pure mental\n\nexperience, detached from any information-processing role, will be viewed as a peculiar idea\n\n[of the prescientific era, much like vitalism... [Just as science dispatched vitalism] the science](https://en.wikipedia.org/wiki/Vitalism)\n\nof consciousness will keep eating away at the hard problem of consciousness until it\n\nvanishes.\n\nIn 2018, Chalmers highlighted what he calls the \" **meta-problem of consciousness** \", another problem\n\nrelated to the hard problem of consciousness: [76]\n\nThe meta-problem of consciousness is (to a first approximation) the problem of explaining\n\nwhy we think that there is a [hard] problem of consciousness.\n\n[In his \"second approximation\", he says it is the problem of explaining the behavior of \"phenomenal](https://en.wikipedia.org/wiki/Consciousness#Types_of_consciousness)\n\nreports\", and the behavior of expressing a belief that there is a hard problem of consciousness. [76]\n\nExplaining its significance, he says: [76]\n\nAlthough the meta-problem is strictly speaking an easy problem, it is deeply connected to the\n\nhard problem. We can reasonably hope that a solution to the meta-problem will shed\n\nsignificant light on the hard problem. A particularly strong line holds that a solution to the\n\n### **Meta-problem**", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia2.pdf" - }, - { - "text": "The hard problem is often illustrated by\n\nappealing to the logical possibility of inverted\n\nvisible spectra. If there is no logical\n\ncontradiction in supposing that one's colour\n\nvision could be inverted, it follows that\n\nmechanistic explanations of visual processing\n\ndo not determine facts about what it is like to\n\nsee colours.\n\nA swarm of birds showing high\n\norder structure emerging from\n\nsimpler physical constituents\n\nphysical constituents. For example, water is nothing\n\nmore than H 2 O molecules, and understanding everything\n\nabout H 2 O molecules is to understand everything there is\n\nto know about water. But consciousness is not like this.\n\nKnowing everything there is to know about the brain, or\n\nany physical system, is not to know everything there is to\n\nknow about consciousness. Consciousness, then, must\n\nnot be purely physical. [27]\n\n[Chalmers's idea contradicts physicalism, sometimes](https://en.wikipedia.org/wiki/Physicalism)\n\n[labelled materialism. This is the view that everything that](https://en.wikipedia.org/wiki/Materialism)\n\nexists is a physical or material thing, so everything can\n\nbe reduced to microphysical things. For example, the\n\nrings of Saturn are a physical thing because they are\n\nnothing more than a complex arrangement of a large\n\nnumber of subatomic particles interacting in a certain way.\n\nAccording to physicalism, everything, including consciousness,\n\ncan be explained by appeal to its microphysical constituents.\n\nChalmers's *hard problem* [ presents a counterexample to this view](https://en.wikipedia.org/wiki/Counterexample)\n\nand to other phenomena like swarms of birds, since it suggests that\n\nconsciousness, like swarms of birds, cannot be reductively\n\nexplained by appealing to their physical constituents. Thus, if the\n\nhard problem is a real problem then physicalism must be false, and\n\nif physicalism is true then the hard problem must not be a real\n\nproblem.\n\n[Though Chalmers rejects physicalism, he is still a naturalist.](https://en.wikipedia.org/wiki/Naturalism_(philosophy)) [27]\n\nThe hard problem of consciousness has scholarly antecedents considerably earlier than Chalmers.\n\nChalmers himself notes that \"a number of thinkers in the recent and distant past\" have \"recognised the\n\nparticular difficulties of explaining consciousness.\" [33] He states that all his original 1996 paper\n\ncontributed to the discussion was \"a catchy name, a minor reformulation of philosophically familiar\n\npoints\". [33]\n\nAmong others, thinkers who have made arguments similar to Chalmers' formulation of the hard problem\n\n[include Isaac Newton,](https://en.wikipedia.org/wiki/Isaac_Newton) [34] [ John Locke,](https://en.wikipedia.org/wiki/John_Locke) [35] [ Gottfried Wilhelm Leibniz,](https://en.wikipedia.org/wiki/Gottfried_Wilhelm_Leibniz) [36][34] [ John Stuart Mill,](https://en.wikipedia.org/wiki/John_Stuart_Mill) [37] and\n\n[Thomas Henry Huxley.](https://en.wikipedia.org/wiki/Thomas_Henry_Huxley) [38][34] [ Likewise, Asian philosophers like Dharmakirti and Guifeng Zongmi](https://en.wikipedia.org/wiki/Guifeng_Zongmi)\n\ndiscussed the problem of how consciousness arises from unconscious matter. [34][39][40][41]\n\n##### **Implications for physicalism**\n\n#### **Historical precedents**\n\n#### **Related concepts**\n\n##### **The mind- body problem**", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[Chalmers on stage for an Alan Turing Year](https://en.wikipedia.org/wiki/Alan_Turing_Year)\n\n[event at De La Salle University, Manila, 27](https://en.wikipedia.org/wiki/De_La_Salle_University)\n\nMarch 2012\n\n## **Hard problem of consciousness**\n\n[In the philosophy of mind, the ](https://en.wikipedia.org/wiki/Philosophy_of_mind) **hard problem of consciousness** is to explain why and how humans and\n\n[other organisms have qualia, phenomenal consciousness, or subjective experience.](https://en.wikipedia.org/wiki/Subjective_character_of_experience) [1][2] It is contrasted\n\nwith the \"easy problems\" of explaining why and how physical systems give a (healthy) human being the\n\nability to discriminate, to integrate information, and to perform behavioral functions such as watching,\n\nlistening, speaking (including generating an utterance that appears to refer to personal behaviour or\n\nbelief), and so forth. [1] The easy problems are amenable to functional explanation—that is, explanations\n\nthat are mechanistic or behavioral—since each physical system can be explained (at least in principle)\n\npurely by reference to the \"structure and dynamics\" that underpin the phenomenon. [1][3]\n\nProponents of the hard problem argue that it is categorically different from the easy problems since no\n\nmechanistic or behavioral explanation could explain the character of an experience, not even in principle.\n\nEven after all the relevant functional facts are explicated, they argue, there will still remain a further\n\nquestion: \"why is the performance of these functions accompanied by experience?\" [1] To bolster their\n\ncase, proponents of the hard problem frequently turn to various philosophical thought experiments,\n\n[involving philosophical zombies (which, they claim, are conceivable) or inverted qualia, or the claimed](https://en.wikipedia.org/wiki/Inverted_spectrum)\n\n[ineffability of colour experiences, or the claimed unknowability of foreign states of consciousness, such](https://en.wikipedia.org/wiki/Knowledge_Argument)\n\n[as the experience of being a bat.](https://en.wikipedia.org/wiki/What_is_it_like_to_be_a_bat%3F)\n\nThe terms \"hard problem\" and \"easy problems\" were\n\n[coined by the philosopher David Chalmers in a 1994 talk](https://en.wikipedia.org/wiki/David_Chalmers)\n\n[given at The Science of Consciousness conference held in](https://en.wikipedia.org/wiki/The_Science_of_Consciousness)\n\nTucson, Arizona. [4] The following year, the main talking\n\npoints of Chalmers' talk were published in *[The Journal of](https://en.wikipedia.org/wiki/The_Journal_of_Consciousness_Studies)*\n\n*[Consciousness ](https://en.wikipedia.org/wiki/The_Journal_of_Consciousness_Studies)* *Studies* . [1] The publication gained\n\nsignificant attention from consciousness researchers and\n\nbecame the subject of a special volume of the journal, [5][6]\n\nwhich was later published into a book. [7] In 1996,\n\nChalmers published *[The Conscious Mind](https://en.wikipedia.org/wiki/The_Conscious_Mind)* , a book-length\n\ntreatment of the hard problem, in which he elaborated on\n\n[his core arguments and responded to counterarguments. His](https://en.wikipedia.org/wiki/Counterarguments)\n\nuse of the word *easy* is \"tongue-in-cheek\". [8] As the\n\n[cognitive psychologist Steven Pinker puts it, they are about as easy as going to Mars or curing cancer.](https://en.wikipedia.org/wiki/Mars)\n\n\"That is, scientists more or less know what to look for, and with enough brainpower and funding, they\n\nwould probably crack it in this century.\" [9]\n\n[The existence of the hard problem is disputed. It has been accepted by some philosophers of mind such as](https://en.wikipedia.org/wiki/Philosophy_of_mind)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia2.pdf" - }, - { - "text": "The mind- body problem is the problem of how the mind and the body relate. The mind-body problem is\n\nmore general than the hard problem of consciousness, since it is the problem of discovering how the mind\n\nand body relate in general, thereby implicating any theoretical framework that broaches the topic. The\n\nhard problem, in contrast, is often construed as a problem uniquely faced by physicalist or materialist\n\ntheories of mind.\n\nThe philosopher Thomas Nagel posited in his 1974 paper \"What Is It Like to Be a Bat?\" that experiences\n\nare essentially subjective (accessible only to the individual undergoing them—i.e., felt only by the one\n\nfeeling them), while physical states are essentially objective (accessible to multiple individuals). So he\n\nargued we have no idea what it could mean to claim that an essentially subjective state just *is* an\n\nessentially non-subjective state (i.e., that a felt state is nothing but a functional state). In other words, we\n\nhave no idea of what reductivism amounts to. [31] He believes \"every subjective phenomenon is\n\nessentially connected with a single point of view, and it seems inevitable that an objective, physical\n\ntheory will abandon that point of view.\" [31]\n\n[In 1983, the philosopher Joseph Levine proposed that there is an ](https://en.wikipedia.org/wiki/Joseph_Levine_(philosopher)) *explanatory gap* between our\n\nunderstanding of the physical world and our understanding of consciousness. [42]\n\nLevine's disputes that conscious states are reducible to neuronal or brain states. He uses the example of\n\n[pain (as an example of a conscious state) and its reduction to the firing of c-fibers (a kind of nerve cell).](https://en.wikipedia.org/wiki/Group_C_nerve_fiber)\n\nThe difficulty is as follows: even if consciousness is physical, it is not clear which physical states\n\ncorrespond to which conscious states. The bridges between the two levels of description will be\n\n[contingent, rather than necessary. This is significant because in most contexts, relating two scientific](https://en.wikipedia.org/wiki/Necessity_and_sufficiency)\n\nlevels of descriptions (such as physics and chemistry) is done with the assurance of necessary\n\nconnections between the two theories (for example, chemistry follows with necessity from physics). [43]\n\nLevine illustrates this with a thought experiment: Suppose that humanity were to encounter an alien\n\nspecies, and suppose it is known that the aliens do not have any c-fibers. Even if one knows this, it is not\n\nobvious that the aliens do not feel pain: that would remain an open question. This is because the fact that\n\naliens do not have c-fibers does not entail that they do not feel pain (in other words, feelings of pain do\n\nnot follow with logical necessity from the firing of c-fibers). Levine thinks such thought experiments\n\ndemonstrate an explanatory gap between consciousness and the physical world: even if consciousness is\n\nreducible to physical things, consciousness cannot be explained in terms of physical things, because the\n\nlink between physical things and consciousness is a contingent link. [43]\n\nLevine does not think that the explanatory gap means that consciousness is not physical; he is open to the\n\n[idea that the explanatory gap is only an epistemological problem for physicalism.](https://en.wikipedia.org/wiki/Epistemology) [43] In contrast,\n\nChalmers thinks that the hard problem of consciousness does show that consciousness is not physical. [27]\n\nPhilosophical zombies are a thought experiment commonly used in discussions of the hard\n\nproblem. [44][45] They are hypothetical beings physically identical to humans but that lack conscious\n\nexperience. [46] Philosophers such as Chalmers, Joseph Levine, and Francis Kripke take zombies as\n\n##### **\"What Is It Like to Be a Bat?\"**\n\n##### **Explanatory gap**\n\n##### **Philosophical zombies**", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia2.pdf" - }, - { - "text": "This stance has recently taken on the name of *illusionism* : the view that phenomenal consciousness is an\n\n[illusion. The term was popularized by the philosopher Keith Frankish.](https://en.wikipedia.org/wiki/Keith_Frankish) [60] Frankish argues that\n\n\"illusionism\" is preferable to \"eliminativism\" for labelling the view that phenomenal consciousness is an\n\nillusion. More substantively, Frankish argues that illusionism about phenomenal consciousness is\n\npreferable to realism about phenomenal consciousness. He states: \"Theories of consciousness typically\n\naddress the hard problem. They accept that phenomenal consciousness is real and aim to explain how it\n\ncomes to exist. There is, however, another approach, which holds that phenomenal consciousness is an\n\nillusion and aims to explain why it seems to exist.\" [19] Frankish concludes that illusionism \"replaces the\n\nhard problem with the illusion problem—the problem of explaining how the illusion of phenomenality\n\narises and why it is so powerful.\" [19]\n\n[The philosopher Daniel Dennett is another prominent figure associated with illusionism. After Frankish](https://en.wikipedia.org/wiki/Daniel_Dennett)\n\n[published a paper in the Journal of Consciousness Studies titled ](https://en.wikipedia.org/wiki/Journal_of_Consciousness_Studies) *Illusionism as a Theory of*\n\n*Consciousness,* [60] Dennett responded with his own paper with the spin-off title *Illusionism as the*\n\n*Obvious Default Theory of Consciousness.* [61] Dennett has been arguing for the illusory status of\n\nconsciousness since early on in his career. For example, in 1979 he published a paper titled *On the*\n\n*[Absence of Phenomenology](https://en.wikipedia.org/wiki/Phenomenology_(philosophy))* (where he argues for the nonexistence of phenomenal consciousness). [70]\n\n[Similar ideas have been explicated in his 1991 book Consciousness Explained.](https://en.wikipedia.org/wiki/Consciousness_Explained) [71] Dennett argues that the\n\nso-called \"hard problem\" will be solved in the process of solving what Chalmers terms the \"easy\n\nproblems\". [16] He compares consciousness to stage magic and its capability to create extraordinary\n\nillusions out of ordinary things. [72] To show how people might be commonly fooled into overstating the\n\n[accuracy of their introspective abilities, he describes a phenomenon called change blindness, a visual](https://en.wikipedia.org/wiki/Change_blindness)\n\nprocess that involves failure to detect scenery changes in a series of alternating images. [73] He\n\naccordingly argues that consciousness need not be what it seems to be based on introspection. To address\n\nthe question of the hard problem, or how and why physical processes give rise to experience, Dennett\n\nstates that the phenomenon of having experience is nothing more than the performance of functions or the\n\nproduction of behavior, which can also be referred to as the easy problems of consciousness. [16] Thus,\n\nDennett argues that the hard problem of experience is included among—not separate from—the easy\n\nproblems, and therefore they can only be explained together as a cohesive unit. [72]\n\n[Eliminativists differ on the role they believe intuitive judgement plays in creating the apparent reality of](https://en.wikipedia.org/wiki/Intuition)\n\n[consciousness. The philosopher Jacy Reese Anthis is of the position that this issue is born of an](https://en.wikipedia.org/wiki/Jacy_Reese_Anthis)\n\noverreliance on intuition, calling philosophical discussions on the topic of consciousness a form of\n\n\"intuition jousting\". [74] But when the issue is tackled with \"formal argumentation\" and \"precise\n\nsemantics\" then the hard problem will dissolve. [74] The philosopher Elizabeth Irvine, in contrast, can be\n\nread as having the opposite view, since she argues that phenomenal properties (that is, properties of", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[Steven Novella has dismissed it as \"the hard non-problem\".](https://en.wikipedia.org/wiki/Steven_Novella) [24] [ According to a 2020 PhilPapers survey, a](https://en.wikipedia.org/wiki/PhilPapers)\n\nmajority (62.42%) of the philosophers surveyed said they believed that the hard problem is a genuine\n\nproblem, while 29.72% said that it does not exist. [25]\n\n[There are a number of other potential philosophical problems that are related to the Hard Problem. Ned](https://en.wikipedia.org/wiki/List_of_philosophical_problems)\n\nBlock believes that there exists a \"Harder Problem of Consciousness\", due to the possibility of different\n\nphysical and functional neurological systems potentially having phenomenal overlap. [12] Another\n\n[potential philosophical problem which is closely related to Benj Hellie's vertiginous question, dubbed](https://en.wikipedia.org/wiki/Vertiginous_question)\n\n\"The Even Harder Problem of Consciousness\", refers to why a given individual has their own particular\n\n[personal identity, as opposed to existing as someone else.](https://en.wikipedia.org/wiki/Personal_identity) [26]\n\n[Cognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the](https://en.wikipedia.org/wiki/David_Chalmers)\n\nproblem of consciousness\" (1995) [1] and expanded upon it in *[The Conscious Mind](https://en.wikipedia.org/wiki/The_Conscious_Mind)* (1996). His works\n\n[provoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers](https://en.wikipedia.org/wiki/David_Lewis_(philosopher))\n\nfor his argumentative rigour and \"impeccable clarity\". [27] Pinker later said, in 2018, \"In the end I still\n\nthink that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a\n\nmeaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether\n\nthe same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with\n\nseveral other philosophers that it may be futile to hope for a solution at all, precisely because it is a\n\nconceptual problem, or, more accurately, a problem with our concepts.\" [28] [ Daniel Dennett and Patricia](https://en.wikipedia.org/wiki/Patricia_Churchland)\n\n[Churchland, among others, believe that the hard problem is best seen as a collection of easy problems that](https://en.wikipedia.org/wiki/Patricia_Churchland)\n\nwill be solved through further analysis of the brain and behaviour. [29][30]\n\nConsciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of\n\n[being awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \"](https://en.wikipedia.org/wiki/Thomas_Nagel) *the feeling of what*\n\n*it is like to be something.\"* Consciousness, in this sense, is synonymous with *experience.* [31][27]\n\n. . .even when we have explained the performance of all the cognitive and behavioral functions\n\nin the vicinity of experience—perceptual discrimination, categorization, internal access, verbal\n\nreport—there may still remain a further unanswered question: *Why is the performance of these*\n\n*functions accompanied by experience?*\n\n— David Chalmers, Facing up to the problem of consciousness\n\nThe problems of consciousness, Chalmers argues, are of two kinds: the *easy problems* and the *hard*\n\n*problem* .\n\n[The easy problems are amenable to reductive inquiry. They are a logical consequence of lower-level facts](https://en.wikipedia.org/wiki/Logical_consequence)\n\nabout the world, similar to how a clock's ability to tell time is a logical consequence of its clockwork and\n\nstructure, or a hurricane being a logical consequence of the structures and functions of certain weather\n\n### **Overview**\n\n#### **Chalmers' formulation**\n\n##### **Easy problems**", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia2.pdf", - "query": "What is David Chalmer's definition of \"consciousness\" ?", - "target_page": 2, - "target_passage": "Chalmers uses Thomas Nagel's definition of consciousness: \"the feeling of what it is like to be something.\"", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Today there is a strong tendency to simply *equate* consciousness with the qualia. Yet there is\n\nclearly something not quite right about this. The \"itchiness of itches\" and the \"hurtfulness of\n\npain\" are qualities we are conscious *of* . So philosophy of mind tends to treat consciousness as\n\nif it consisted simply of the contents of consciousness (the phenomenal qualities), while it\n\nreally is precisely *consciousness* of contents, the very givenness of whatever is subjectively\n\ngiven. And therefore the problem of consciousness does not pertain so much to some alleged\n\n\"mysterious, nonpublic objects\", i.e. objects that seem to be only \"visible\" to the respective\n\nsubject, but rather to the nature of \"seeing\" itself (and in today’s philosophy of mind\n\nastonishingly little is said about the latter). [129]\n\nMost neuroscientists and cognitive scientists believe that Chalmers' alleged \"hard problem\" will be\n\nsolved, or be shown to not be a real problem, in the course of the solution of the so-called \"easy\n\nproblems\", although a significant minority disagrees. [9][130]\n\n[Since 1990, researchers including the molecular biologist Francis Crick and the neuroscientist Christof](https://en.wikipedia.org/wiki/Christof_Koch)\n\n[Koch have made significant progress toward identifying which neurobiological events occur concurrently](https://en.wikipedia.org/wiki/Christof_Koch)\n\nto the experience of subjective consciousness. [131] These postulated events are referred to as *neural*\n\n*correlates of consciousness* or NCCs. However, this research arguably addresses the question of *which*\n\nneurobiological mechanisms are linked to consciousness but not the question of *why* they should give rise\n\nto consciousness at all, the latter being the hard problem of consciousness as Chalmers formulated it. In\n\n\"On the Search for the Neural Correlate of Consciousness\", Chalmers said he is confident that, granting\n\nthe principle that something such as what he terms \"global availability\" can be used as an indicator of\n\nconsciousness, the neural correlates will be discovered \"in a century or two\". [132] Nevertheless, he stated\n\nregarding their relationship to the hard problem of consciousness:\n\nOne can always ask why these processes of availability should give rise to consciousness in\n\nthe first place. As yet we cannot explain why they do so, and it may well be that full details\n\nabout the processes of availability will still fail to answer this question. Certainly, nothing in\n\nthe standard methodology I have outlined answers the question; that methodology assumes a\n\nrelation between availability and consciousness, and therefore does nothing to explain it. [...]\n\nSo the hard problem remains. But who knows: Somewhere along the line we may be led to\n\nthe relevant insights that show why the link is there, and the hard problem may then be\n\nsolved. [132]\n\n[The neuroscientist and Nobel laureate Eric Kandel wrote that locating the NCCs would not solve the hard](https://en.wikipedia.org/wiki/Eric_Kandel)\n\nproblem, but rather one of the so-called easy problems to which the hard problem is contrasted. [133]\n\n[Kandel went on to note Crick and Koch's suggestion that once the binding problem—understanding what](https://en.wikipedia.org/wiki/Binding_problem)\n\naccounts for the unity of experience—is solved, it will be possible to solve the hard problem\n\nempirically. [133] [ However, neuroscientist Anil Seth argued that emphasis on the so-called hard problem is](https://en.wikipedia.org/wiki/Anil_Seth)\n\na distraction from what he calls the \"real problem\": understanding the neurobiology underlying\n\n### **Relationship to scientific frameworks**\n\n#### **Neural correlates of consciousness**", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia2.pdf" - }, - { - "text": "read as having the opposite view, since she argues that phenomenal properties (that is, properties of\n\n[consciousness) do not exist in our common-sense view of the world. She states that \"the hard problem of](https://en.wikipedia.org/wiki/Folk_psychology)\n\nconsciousness may not be a genuine problem for non-philosophers (despite its overwhelming obviousness\n\nto philosophers).\" [75]\n\n[A complete illusionist theory of consciousness must include the description of a mechanism by which the](https://en.wikipedia.org/wiki/Mechanism_(biology))\n\nillusion of subjective experience is had and reported by people. Various philosophers and scientists have\n\nproposed possible theories. [76] For example, in his book *Consciousness and the Social Brain*\n\n[neuroscientist Michael Graziano advocates what he calls attention schema theory, in which our perception](https://en.wikipedia.org/wiki/Attention_schema_theory)", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia2.pdf" - }, - { - "text": "This stance has recently taken on the name of *illusionism* : the view that phenomenal consciousness is an\n\n[illusion. The term was popularized by the philosopher Keith Frankish.](https://en.wikipedia.org/wiki/Keith_Frankish) [60] Frankish argues that\n\n\"illusionism\" is preferable to \"eliminativism\" for labelling the view that phenomenal consciousness is an\n\nillusion. More substantively, Frankish argues that illusionism about phenomenal consciousness is\n\npreferable to realism about phenomenal consciousness. He states: \"Theories of consciousness typically\n\naddress the hard problem. They accept that phenomenal consciousness is real and aim to explain how it\n\ncomes to exist. There is, however, another approach, which holds that phenomenal consciousness is an\n\nillusion and aims to explain why it seems to exist.\" [19] Frankish concludes that illusionism \"replaces the\n\nhard problem with the illusion problem—the problem of explaining how the illusion of phenomenality\n\narises and why it is so powerful.\" [19]\n\n[The philosopher Daniel Dennett is another prominent figure associated with illusionism. After Frankish](https://en.wikipedia.org/wiki/Daniel_Dennett)\n\n[published a paper in the Journal of Consciousness Studies titled ](https://en.wikipedia.org/wiki/Journal_of_Consciousness_Studies) *Illusionism as a Theory of*\n\n*Consciousness,* [60] Dennett responded with his own paper with the spin-off title *Illusionism as the*\n\n*Obvious Default Theory of Consciousness.* [61] Dennett has been arguing for the illusory status of\n\nconsciousness since early on in his career. For example, in 1979 he published a paper titled *On the*\n\n*[Absence of Phenomenology](https://en.wikipedia.org/wiki/Phenomenology_(philosophy))* (where he argues for the nonexistence of phenomenal consciousness). [70]\n\n[Similar ideas have been explicated in his 1991 book Consciousness Explained.](https://en.wikipedia.org/wiki/Consciousness_Explained) [71] Dennett argues that the\n\nso-called \"hard problem\" will be solved in the process of solving what Chalmers terms the \"easy\n\nproblems\". [16] He compares consciousness to stage magic and its capability to create extraordinary\n\nillusions out of ordinary things. [72] To show how people might be commonly fooled into overstating the\n\n[accuracy of their introspective abilities, he describes a phenomenon called change blindness, a visual](https://en.wikipedia.org/wiki/Change_blindness)\n\nprocess that involves failure to detect scenery changes in a series of alternating images. [73] He\n\naccordingly argues that consciousness need not be what it seems to be based on introspection. To address\n\nthe question of the hard problem, or how and why physical processes give rise to experience, Dennett\n\nstates that the phenomenon of having experience is nothing more than the performance of functions or the\n\nproduction of behavior, which can also be referred to as the easy problems of consciousness. [16] Thus,\n\nDennett argues that the hard problem of experience is included among—not separate from—the easy\n\nproblems, and therefore they can only be explained together as a cohesive unit. [72]\n\n[Eliminativists differ on the role they believe intuitive judgement plays in creating the apparent reality of](https://en.wikipedia.org/wiki/Intuition)\n\n[consciousness. The philosopher Jacy Reese Anthis is of the position that this issue is born of an](https://en.wikipedia.org/wiki/Jacy_Reese_Anthis)\n\noverreliance on intuition, calling philosophical discussions on the topic of consciousness a form of\n\n\"intuition jousting\". [74] But when the issue is tackled with \"formal argumentation\" and \"precise\n\nsemantics\" then the hard problem will dissolve. [74] The philosopher Elizabeth Irvine, in contrast, can be\n\nread as having the opposite view, since she argues that phenomenal properties (that is, properties of", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia2.pdf" - }, - { - "text": "consciousness, namely the neural correlates of various conscious processes. [22] This more modest goal is\n\nthe focus of most scientists working on consciousness. [133] [ Psychologist Susan Blackmore believes, by](https://en.wikipedia.org/wiki/Susan_Blackmore)\n\ncontrast, that the search for the neural correlates of consciousness is futile and itself predicated on an\n\nerroneous belief in the hard problem of consciousness. [134]\n\n[A functionalist view in cognitive science holds that the mind is an information processing system, and](https://en.wikipedia.org/wiki/Cognitive_science)\n\n[that cognition and consciousness together are a form of computation. Cognition, distinct from](https://en.wikipedia.org/wiki/Computation)\n\n[consciousness, is explained by neural computation in the computational theory of cognition. The](https://en.wikipedia.org/wiki/Computational_cognition)\n\ncomputational theory of mind asserts that not only cognition, but also phenomenal consciousness or\n\n[qualia, are computational. While the computation system is realized by neurons rather than electronics, in](https://en.wikipedia.org/wiki/Qualia)\n\ntheory it would be possible for artificial intelligence to be conscious.\n\n[Integrated information theory (IIT), developed by the neuroscientist and psychiatrist Giulio Tononi in](https://en.wikipedia.org/wiki/Giulio_Tononi)\n\n2004 and more recently also advocated by Koch, is one of the most discussed models of consciousness in\n\nneuroscience and elsewhere. [135][136] [ The theory proposes an identity between consciousness and](https://en.wikipedia.org/wiki/Identity_(philosophy))\n\nintegrated information, with the latter item (denoted as Φ) defined mathematically and thus in principle\n\nmeasurable. [136][137] The hard problem of consciousness, write Tononi and Koch, may indeed be\n\nintractable when working from matter to consciousness. [15] However, because IIT inverts this relationship\n\nand works from phenomenological axioms to matter, they say it could be able to solve the hard\n\nproblem. [15] In this vein, proponents have said the theory goes beyond identifying human neural\n\ncorrelates and can be extrapolated to all physical systems. Tononi wrote (along with two colleagues):\n\nWhile identifying the \"neural correlates of consciousness\" is undoubtedly important, it is\n\nhard to see how it could ever lead to a satisfactory explanation of what consciousness is and\n\nhow it comes about. As will be illustrated below, IIT offers a way to analyze systems of\n\nmechanisms to determine if they are properly structured to give rise to consciousness, how\n\nmuch of it, and of which kind. [138]\n\nAs part of a broader critique of IIT, Michael Cerullo suggested that the theory's proposed explanation is in\n\n[fact for what he dubs (following Scott Aaronson) the \"Pretty Hard Problem\" of methodically inferring](https://en.wikipedia.org/wiki/Scott_Aaronson)\n\nwhich physical systems are conscious—but would not solve Chalmers' hard problem. [136] \"Even if IIT is\n\ncorrect,\" he argues, \"it does not explain why integrated information generates (or is) consciousness.\" [136]\n\nChalmers agrees that IIT, if correct, would solve the \"Pretty Hard Problem\" rather than the hard\n\nproblem. [139]\n\n[Global workspace theory (GWT) is a cognitive architecture and theory of consciousness proposed by the](https://en.wikipedia.org/wiki/Cognitive_architecture)\n\n[cognitive psychologist Bernard Baars in 1988.](https://en.wikipedia.org/wiki/Bernard_Baars) [140] Baars explains the theory with the metaphor of a\n\ntheater, with conscious processes represented by an illuminated stage. [140] This theater integrates inputs\n\n#### **Computational cognition**\n\n#### **Integrated information theory**\n\n#### **Global workspace theory**", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia2.pdf" - }, - { - "text": "of being conscious is merely an error in perception, held by brains which evolved to hold erroneous and\n\nincomplete models of their own internal workings, just as they hold erroneous and incomplete models of\n\ntheir own bodies and of the external world. [77][78]\n\nThe main criticisms of eliminative materialism and illusionism hinge on the counterintuitive nature of the\n\nview. Arguments of this form are called *Moorean Arguments* . A Moorean argument seeks to undermine\n\n[the conclusion of an argument by asserting that the negation of that conclusion is more certain than the](https://en.wikipedia.org/wiki/Negation)\n\n[premises of the argument.](https://en.wikipedia.org/wiki/Premise) [79]\n\n[The roots of the Moorean Argument against illusionism extend back to Augustine of Hippo who stated](https://en.wikipedia.org/wiki/Augustine_of_Hippo)\n\nthat he could not be deceived regarding his own existence, since the very act of being deceived secures\n\nthe existence of a being there to be the recipient of that deception. [note 1][80]\n\n[In the Early-Modern era, these arguments were repopularized by René Descartes, who coined the now](https://en.wikipedia.org/wiki/Ren%C3%A9_Descartes)\n\nfamous phrase *\"Je pense, donc je suis\"* (\"I think, therefore I am\"). [81] Descartes argued that even if he\n\nwas maximally deceived (because, for example, an evil demon was manipulating all his senses) he would\n\nstill know with certainty that his mind exists, because the state of being deceived requires a mind as a\n\nprerequisite. [82]\n\nThis same general argumentative structure is still in use today. For example, in 2002 David Chalmers\n\npublished an explicitly Moorean argument against illusionism. The argument goes like this: The reality of\n\nconsciousness is more certain than any theoretical commitments (to, for example, physicalism) that may\n\nbe motivating the illusionist to deny the existence of consciousness. The reason for this is because we\n\nhave direct \"acquaintance\" with consciousness, but we do not have direct acquaintance with anything else\n\n(including anything that could inform our beliefs in consciousness being an illusion). In other words:\n\nconsciousness can be known directly, so the reality of consciousness is more certain than any\n\nphilosophical or scientific theory that says otherwise. [83] Chalmers concludes that \"there is little doubt\n\nthat something like the Moorean argument is the reason that most people reject illusionism and many find\n\nit crazy.\" [84]\n\nEliminative materialism and illusionism have been the subject of criticism within the popular press. One\n\n[highly cited example comes from the philosopher Galen Strawson who wrote an article in the New York](https://en.wikipedia.org/wiki/New_York_Review_of_Books)\n\n[Review of Books titled \"The Consciousness Deniers\". In it, Strawson describes illusionism as the \"silliest](https://en.wikipedia.org/wiki/New_York_Review_of_Books)\n\nclaim ever made\", next to which \"every known religious belief is only a little less sensible than the belief\n\nthat the grass is green.\" [85] [ Another notable example comes from Christof Koch (a neuroscientist and one](https://en.wikipedia.org/wiki/Christof_Koch)\n\n[of the leading proponents of Integrated Information Theory) in his popular science book ](https://en.wikipedia.org/wiki/Integrated_Information_Theory) *The Feeling of*\n\n*Life Itself* . In the early pages of the book, Koch describes eliminativism as the \"metaphysical counterpart\n\nto Cotard's syndrome, a psychiatric condition in which patients deny being alive.\" [86] Koch takes the\n\nprevalence of eliminativism as evidence that \"much of twentieth-century analytic philosophy has gone to\n\nthe dogs\". [87]\n\nType-B Materialism, also known as *Weak Reductionism* or *[A Posteriori Physicalism](https://en.wikipedia.org/wiki/A_priori_and_a_posteriori)* , is the view that the", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[005.00296.x).](https://doi.org/10.1111%2Fj.0268-1064.2005.00296.x)\n\n[95. Chalmers, David (2006). \"Phenomenal Concepts and the Explanatory Gap\" (http://consc.ne](http://consc.net/papers/pceg.pdf)\n\n[t/papers/pceg.pdf) (PDF). In Alter, Torin; Walter, Sven (eds.). ](http://consc.net/papers/pceg.pdf) *Phenomenal Concepts and*\n\n*Phenomenal Knowledge: New Essays on Consciousness and Physicalism* . Oxford\n\n[University Press. ISBN 9780195171655. Retrieved 27 March 2019.](https://en.wikipedia.org/wiki/Special:BookSources/9780195171655)\n\n96. Wierzbicka, A. (2019). \"From 'Consciousness' to 'I Think, I Feel, I Know': A Commentary on\n\nDavid Chalmers\". *Journal of Consciousness Studies* . **26** (9- 10): 257- 269.\n\n97. Lau, Hakwan; Michel, Matthias (2019). \"A Socio-Historical Take on the Meta-Problem of\n\nConsciousness\". *Journal of Consciousness Studies* . **26** (9- 10): 136- 147.\n\n[98. \"Is the hard problem of consciousness really that hard? | Brian Greene and Pat Churchland](https://www.youtube.com/watch?v=hru5d_wsu7g)\n\n[lock horns\" (https://www.youtube.com/watch?v=hru5d_wsu7g). ](https://www.youtube.com/watch?v=hru5d_wsu7g) *[YouTube](https://en.wikipedia.org/wiki/YouTube)* . 9 July 2022.\n\n[99. \"Abiogenesis\" (https://www.allaboutscience.org/abiogenesis.htm).](https://www.allaboutscience.org/abiogenesis.htm)\n\n100. *Ignorance and Imagination: The Epistemic Origin of the Problem of Consciousness.* Daniel\n\nStoljar. Oxford University Press.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia2.pdf" - }, - { - "text": "example from nature showing that multiple minds with their own individual subjective experience could\n\ndevelop within a single universal mind.\n\n[Cognitive psychologist Donald D. Hoffman uses a mathematical model based around conscious agents,](https://en.wikipedia.org/wiki/Donald_D._Hoffman)\n\n[within a fundamentally conscious universe, to support conscious realism as a description of nature—one](https://en.wikipedia.org/wiki/Panpsychism#Conscious_realism)\n\nthat falls within the objective idealism approaches to the hard problem: \"The objective world, i.e., the\n\nworld whose existence does not depend on the perceptions of a particular conscious agent, consists\n\nentirely of conscious agents.\" [126]\n\n#### **Type-E Dualism**\n\n#### **Type-F Monism**\n\n##### **Idealism and cosmopsychism**", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[psychology (i.e., common-sense ways of discussing the mind) do not, upon scientific examination,](https://en.wikipedia.org/wiki/Folk_psychology)\n\ncorrespond to real brain mechanisms. [59] [ According the 2020 PhilPapers survey, 4.51% of philosophers](https://en.wikipedia.org/wiki/PhilPapers)\n\nsurveyed subscribe to eliminativism. [25]\n\n[While Patricia Churchland and Paul Churchland have famously applied eliminative materialism to](https://en.wikipedia.org/wiki/Paul_Churchland)\n\n[propositional attitudes, philosophers including Daniel Dennett, Georges Rey, and Keith Frankish have](https://en.wikipedia.org/wiki/Keith_Frankish)\n\n[applied it to qualia or phenomenal consciousness (i.e., conscious experience).](https://en.wikipedia.org/wiki/Phenomenal_consciousness) [59] On their view, it is\n\nmistaken not only to believe there is a hard problem of consciousness, but to believe phenomenal\n\nconsciousness exists at all. [19][61]\n\n##### **Eliminative materialism / Illusionism**", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia2.pdf" - }, - { - "text": "from a variety of unconscious and otherwise autonomous networks in the brain and then broadcasts them\n\nto unconscious networks (represented in the metaphor by a broad, unlit \"audience\"). [140] The theory has\n\n[since been expanded upon by other scientists including cognitive neuroscientist Stanislas Dehaene.](https://en.wikipedia.org/wiki/Stanislas_Dehaene) [141]\n\nIn his original paper outlining the hard problem of consciousness, Chalmers discussed GWT as a theory\n\nthat only targets one of the \"easy problems\" of consciousness. [1] In particular, he said GWT provided a\n\npromising account of how information in the brain could become globally accessible, but argued that\n\n\"now the question arises in a different form: why should global accessibility give rise to conscious\n\nexperience? As always, this bridging question is unanswered.\" [1] J. W. Dalton similarly criticized GWT\n\non the grounds that it provides, at best, an account of the cognitive *function* of consciousness, and fails to\n\nexplain its experiential aspect. [142] By contrast, A. C. Elitzur argued: \"While [GWT] does not address the\n\n'hard problem', namely, the very nature of consciousness, it constrains any theory that attempts to do so\n\nand provides important insights into the relation between consciousness and cognition.\" [143]\n\n[For his part, Baars writes (along with two colleagues) that there is no hard problem of explaining qualia](https://en.wikipedia.org/wiki/Qualia)\n\nover and above the problem of explaining causal functions, because qualia are entailed by neural activity\n\nand themselves causal. [21] Dehaene, in his 2014 book *[Consciousness and the Brain](https://en.wikipedia.org/wiki/Consciousness_and_the_Brain)* , rejected the concept\n\nof qualia and argued that Chalmers' \"easy problems\" of consciousness are actually the hard problems. [20]\n\nHe further stated that the \"hard problem\" is based only upon ill-defined intuitions that are continually\n\nshifting as understanding evolves: [20]\n\nOnce our intuitions are educated by cognitive neuroscience and computer simulations,\n\nChalmers' hard problem will evaporate. The hypothetical concept of qualia, pure mental\n\nexperience, detached from any information-processing role, will be viewed as a peculiar idea\n\n[of the prescientific era, much like vitalism... [Just as science dispatched vitalism] the science](https://en.wikipedia.org/wiki/Vitalism)\n\nof consciousness will keep eating away at the hard problem of consciousness until it\n\nvanishes.\n\nIn 2018, Chalmers highlighted what he calls the \" **meta-problem of consciousness** \", another problem\n\nrelated to the hard problem of consciousness: [76]\n\nThe meta-problem of consciousness is (to a first approximation) the problem of explaining\n\nwhy we think that there is a [hard] problem of consciousness.\n\n[In his \"second approximation\", he says it is the problem of explaining the behavior of \"phenomenal](https://en.wikipedia.org/wiki/Consciousness#Types_of_consciousness)\n\nreports\", and the behavior of expressing a belief that there is a hard problem of consciousness. [76]\n\nExplaining its significance, he says: [76]\n\nAlthough the meta-problem is strictly speaking an easy problem, it is deeply connected to the\n\nhard problem. We can reasonably hope that a solution to the meta-problem will shed\n\nsignificant light on the hard problem. A particularly strong line holds that a solution to the\n\n### **Meta-problem**", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia2.pdf" - }, - { - "text": "The mind- body problem is the problem of how the mind and the body relate. The mind-body problem is\n\nmore general than the hard problem of consciousness, since it is the problem of discovering how the mind\n\nand body relate in general, thereby implicating any theoretical framework that broaches the topic. The\n\nhard problem, in contrast, is often construed as a problem uniquely faced by physicalist or materialist\n\ntheories of mind.\n\nThe philosopher Thomas Nagel posited in his 1974 paper \"What Is It Like to Be a Bat?\" that experiences\n\nare essentially subjective (accessible only to the individual undergoing them—i.e., felt only by the one\n\nfeeling them), while physical states are essentially objective (accessible to multiple individuals). So he\n\nargued we have no idea what it could mean to claim that an essentially subjective state just *is* an\n\nessentially non-subjective state (i.e., that a felt state is nothing but a functional state). In other words, we\n\nhave no idea of what reductivism amounts to. [31] He believes \"every subjective phenomenon is\n\nessentially connected with a single point of view, and it seems inevitable that an objective, physical\n\ntheory will abandon that point of view.\" [31]\n\n[In 1983, the philosopher Joseph Levine proposed that there is an ](https://en.wikipedia.org/wiki/Joseph_Levine_(philosopher)) *explanatory gap* between our\n\nunderstanding of the physical world and our understanding of consciousness. [42]\n\nLevine's disputes that conscious states are reducible to neuronal or brain states. He uses the example of\n\n[pain (as an example of a conscious state) and its reduction to the firing of c-fibers (a kind of nerve cell).](https://en.wikipedia.org/wiki/Group_C_nerve_fiber)\n\nThe difficulty is as follows: even if consciousness is physical, it is not clear which physical states\n\ncorrespond to which conscious states. The bridges between the two levels of description will be\n\n[contingent, rather than necessary. This is significant because in most contexts, relating two scientific](https://en.wikipedia.org/wiki/Necessity_and_sufficiency)\n\nlevels of descriptions (such as physics and chemistry) is done with the assurance of necessary\n\nconnections between the two theories (for example, chemistry follows with necessity from physics). [43]\n\nLevine illustrates this with a thought experiment: Suppose that humanity were to encounter an alien\n\nspecies, and suppose it is known that the aliens do not have any c-fibers. Even if one knows this, it is not\n\nobvious that the aliens do not feel pain: that would remain an open question. This is because the fact that\n\naliens do not have c-fibers does not entail that they do not feel pain (in other words, feelings of pain do\n\nnot follow with logical necessity from the firing of c-fibers). Levine thinks such thought experiments\n\ndemonstrate an explanatory gap between consciousness and the physical world: even if consciousness is\n\nreducible to physical things, consciousness cannot be explained in terms of physical things, because the\n\nlink between physical things and consciousness is a contingent link. [43]\n\nLevine does not think that the explanatory gap means that consciousness is not physical; he is open to the\n\n[idea that the explanatory gap is only an epistemological problem for physicalism.](https://en.wikipedia.org/wiki/Epistemology) [43] In contrast,\n\nChalmers thinks that the hard problem of consciousness does show that consciousness is not physical. [27]\n\nPhilosophical zombies are a thought experiment commonly used in discussions of the hard\n\nproblem. [44][45] They are hypothetical beings physically identical to humans but that lack conscious\n\nexperience. [46] Philosophers such as Chalmers, Joseph Levine, and Francis Kripke take zombies as\n\n##### **\"What Is It Like to Be a Bat?\"**\n\n##### **Explanatory gap**\n\n##### **Philosophical zombies**", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia2.pdf", - "query": "What is the role of the PhilPapers organization ?", - "target_page": 6, - "target_passage": " PhilPapers is an organization that archives academic philosophy papers and periodically surveys professional philosophers about their views.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "[79. Scarfone, Matthew (2022). \"Using and Abusing Moorean Arguments\" (https://philpapers.org/](https://philpapers.org/rec/SCAUAA-2)\n\n[rec/SCAUAA-2). ](https://philpapers.org/rec/SCAUAA-2) *Journal of the American Philosophical Association* . **8** (1): 52- 71.\n\n[doi:10.1017/apa.2020.47 (https://doi.org/10.1017%2Fapa.2020.47). S2CID 239672728 (http](https://api.semanticscholar.org/CorpusID:239672728)\n\n[s://api.semanticscholar.org/CorpusID:239672728).](https://api.semanticscholar.org/CorpusID:239672728)\n\n80. Augustine of Hippo. \"Book 11, Chapter 26\". *City of God* .\n\n81. Descartes, René (1637). \"4\". *Discourse on the Method* .\n\n82. Descartes, René (1641). \"Second Meditation\". *Meditations on First Philosophy* .\n\n[83. Chalmers, David (2020). \"Debunking Arguments for Illusionism\" (https://philpapers.org/rec/C](https://philpapers.org/rec/CHADAF-2)\n\n[HADAF-2). ](https://philpapers.org/rec/CHADAF-2) *Journal of Consciousness Studies* . **27** (5- 6): 258- 281.\n\n[84. Chalmers, David (2002). \"Debunking Arguments for Illusionism\" (https://philpapers.org/rec/C](https://philpapers.org/rec/CHADAF-2)\n\n[HADAF-2). ](https://philpapers.org/rec/CHADAF-2) *Journal of Consciousness Studies* . **27** (5- 6): 258- 281.\n\n[85. Strawson, G. (2018). \"The Consciousness Deniers\" (https://www.nybooks.com/daily/2018/0](https://www.nybooks.com/daily/2018/03/13/the-consciousness-deniers/)\n\n[3/13/the-consciousness-deniers/). ](https://www.nybooks.com/daily/2018/03/13/the-consciousness-deniers/) *The New York Review of Books* .\n\n86. Koch, Christof (2019). *The Feeling of Life Itself: Why Consciousness is Everywhere But*\n\n*Can't be Computed* . MIT Press. p. 2.\n\n87. Koch, Christof (2019). *The Feeling of Life Itself: Why Consciousness is Everywhere But*\n\n*Can't be Computed* . MIT Press. p. 3.\n\n[88. Balmer, A. (2020). \"Soft-Wired Illusionism vs. the Meta-Problem of Consciousness\" (https://p](https://philpapers.org/rec/BALSIV)\n\n[hilpapers.org/rec/BALSIV). ](https://philpapers.org/rec/BALSIV) *Journal of Consciousness Studies* . **27** (5- 6): 26- 37.\n\n89. Chalmers, David (2020). \"Is the Hard Problem of Consciousness Universal?\". *Journal of*\n\n*Consciousness Studies* . **27** (5- 6): 227- 257.\n\n[90. Papineau, D. (2019). \"Response to Chalmers' 'The Meta-Problem of Consciousness' \" (http](https://philpapers.org/rec/PAPRTC-6)\n\n[s://philpapers.org/rec/PAPRTC-6). ](https://philpapers.org/rec/PAPRTC-6) *Journal of Consciousness Studies* . **26** (9- 10): 173- 181.\n\n91. J. Levine, \"Conceivability, Identity, and the Explanatory Gap\" in Stuart R. Hameroff, Alfred\n\nW. Kaszniak and David Chalmers (eds.), *Towards a Science of Consciousness III: The Third*\n\n*Tucson Discussions and Debates* , The MIT Press, 1999,. pp 3- 12.\n\n[92. Gennaro, Rocco J. \"Consciousness\" (https://www.iep.utm.edu/consciou). ](https://www.iep.utm.edu/consciou) *Internet*\n\n*Encyclopedia of Philosophy* .\n\n[93. Block, Ned; Stalnaker, Robert (1999). \"Conceptual Analysis, Dualism, and the Explanatory](http://www.nyu.edu/gsas/dept/philo/faculty/block/papers/ExplanatoryGap.pdf)\n\n[Gap\" (http://www.nyu.edu/gsas/dept/philo/faculty/block/papers/ExplanatoryGap.pdf) (PDF).](http://www.nyu.edu/gsas/dept/philo/faculty/block/papers/ExplanatoryGap.pdf)\n\n*The Philosophical Review* . **108** [ (1): 1- 46. CiteSeerX 10.1.1.693.2421 (https://citeseerx.ist.ps](https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.2421)\n\n[u.edu/viewdoc/summary?doi=10.1.1.693.2421). doi:10.2307/2998259 (https://doi.org/10.230](https://doi.org/10.2307%2F2998259)\n\n[7%2F2998259). JSTOR 2998259 (https://www.jstor.org/stable/2998259).](https://www.jstor.org/stable/2998259)\n\n94. Stoljar, Daniel (2005). \"Physicalism and Phenomenal Concepts\". *Mind & Language* . **20** (5):\n\n[469- 494. doi:10.1111/j.0268-1064.2005.00296.x (https://doi.org/10.1111%2Fj.0268-1064.2](https://doi.org/10.1111%2Fj.0268-1064.2005.00296.x)\n\n[005.00296.x).](https://doi.org/10.1111%2Fj.0268-1064.2005.00296.x)", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Aloni, Maria; Dekker, Paul (7 July 2016). *The Cambridge Handbook of Formal Semantics* .\n\n[Cambridge University Press. pp. 22- 23. ISBN 978-1-316-55273-5.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-316-55273-5)\n\nAngell, Richard B. (1964). *Reasoning and Logic* [. Ardent Media. p. 164. OCLC 375322 (http](https://search.worldcat.org/oclc/375322)\n\n[s://search.worldcat.org/oclc/375322).](https://search.worldcat.org/oclc/375322)\n\n[Audi, Robert (1999a). \"Informal logic\". ](https://en.wikipedia.org/wiki/Robert_Audi) *[The Cambridge Dictionary of Philosophy](https://philpapers.org/rec/AUDTCD-2)* (https://philp\n\n[apers.org/rec/AUDTCD-2). Cambridge University Press. p. 435. ISBN 978-1-107-64379-6.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-107-64379-6)\n\n[Archived (https://web.archive.org/web/20210414132344/https://philpapers.org/rec/AUDTCD-](https://web.archive.org/web/20210414132344/https://philpapers.org/rec/AUDTCD-2)\n\n[2) from the original on 14 April 2021. Retrieved 29 December 2021.](https://web.archive.org/web/20210414132344/https://philpapers.org/rec/AUDTCD-2)\n\n[Audi, Robert (1999b). \"Philosophy of logic\". ](https://en.wikipedia.org/wiki/Robert_Audi) *[The Cambridge Dictionary of Philosophy](https://philpapers.org/rec/AUDTCD-2)* (http\n\n[s://philpapers.org/rec/AUDTCD-2). Cambridge University Press. pp. 679- 681. ISBN 978-1-](https://en.wikipedia.org/wiki/Special:BookSources/978-1-107-64379-6)\n\n[107-64379-6. Archived (https://web.archive.org/web/20210414132344/https://philpapers.org/](https://web.archive.org/web/20210414132344/https://philpapers.org/rec/AUDTCD-2)\n\n[rec/AUDTCD-2) from the original on 14 April 2021. Retrieved 29 December 2021.](https://web.archive.org/web/20210414132344/https://philpapers.org/rec/AUDTCD-2)\n\n[Backmann, Marius (1 June 2019). \"Varieties of Justification—How (Not) to Solve the](https://doi.org/10.1007%2Fs12136-018-0371-6)\n\n[Problem of Induction\" (https://doi.org/10.1007%2Fs12136-018-0371-6). ](https://doi.org/10.1007%2Fs12136-018-0371-6) *Acta Analytica* . **34**\n\n[(2): 235- 255. doi:10.1007/s12136-018-0371-6 (https://doi.org/10.1007%2Fs12136-018-037](https://doi.org/10.1007%2Fs12136-018-0371-6)\n\n[1-6). ISSN 1874-6349 (https://search.worldcat.org/issn/1874-6349). S2CID 125767384 (http](https://api.semanticscholar.org/CorpusID:125767384)\n\n[s://api.semanticscholar.org/CorpusID:125767384).](https://api.semanticscholar.org/CorpusID:125767384)\n\n[Bagaria, Joan (2021). \"Set Theory\" (https://plato.stanford.edu/entries/set-theory/). ](https://plato.stanford.edu/entries/set-theory/) *The*\n\n*Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab, Stanford University.\n\nRetrieved 23 September 2022.\n\nBarnes, Jonathan (25 January 2007). *Truth, etc.: Six Lectures on Ancient Logic* . Clarendon\n\n[Press. p. 274. ISBN 978-0-19-151574-3.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-19-151574-3)\n\n[Benthem, Johan van. \"Modal Logic: Contemporary View: 1. Modal Notions and Reasoning](https://iep.utm.edu/modal-lo/#H1)\n\n[Patterns: a First Pass\" (https://iep.utm.edu/modal-lo/#H1). ](https://iep.utm.edu/modal-lo/#H1) *Internet Encyclopedia of*\n\n*Philosophy* . Retrieved 11 March 2023.\n\nBerlemann, Lars; Mangold, Stefan (10 July 2009). *Cognitive Radio and Dynamic Spectrum*\n\n*Access* [. John Wiley & Sons. p. 194. ISBN 978-0-470-75443-6.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-470-75443-6)\n\nBerman, Harold J. (1 July 2009). *Law and Revolution, the Formation of the Western Legal*\n\n*Tradition* [. Harvard University Press. ISBN 978-0-674-02085-6.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-674-02085-6)\n\nBimbo, Katalin (2 April 2016). *J. Michael Dunn on Information Based Logics* . Springer.\n\n[pp. 8- 9. ISBN 978-3-319-29300-4.](https://en.wikipedia.org/wiki/Special:BookSources/978-3-319-29300-4)", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Haack, Susan (1978). \"1. 'Philosophy of logics' \". ](https://en.wikipedia.org/wiki/Susan_Haack) *[Philosophy of Logics](https://philpapers.org/rec/HAAPOL-2)* (https://philpapers.or\n\n[g/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1- 10. ISBN 978-](https://en.wikipedia.org/wiki/Special:BookSources/978-0-521-29329-7)\n\n[0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o](https://web.archive.org/web/20211207200551/https://philpapers.org/rec/HAAPOL-2)\n\n[rg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021.](https://web.archive.org/web/20211207200551/https://philpapers.org/rec/HAAPOL-2)\n\n[Haack, Susan (1996). ](https://en.wikipedia.org/wiki/Susan_Haack) *Deviant Logic, Fuzzy Logic: Beyond the Formalism* . University of\n\n[Chicago Press. ISBN 978-0-226-31133-3.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-226-31133-3)\n\nHaaparanta, Leila (2009). \"1. Introduction\". *The Development of Modern Logic* . Oxford\n\n[University Press. pp. 4- 6. ISBN 978-0-19-513731-6.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-19-513731-6)\n\n[Hansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/). ](https://plato.stanford.edu/entries/fallacies/) *The Stanford*\n\n*Encyclopedia of Philosophy* [. Metaphysics Research Lab, Stanford University. Archived (http](https://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/)\n\n[s://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from](https://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/)\n\nthe original on 29 March 2021. Retrieved 18 March 2021.\n\nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\". *[The Routledge](https://philpapers.org/rec/BOVSIO)*\n\n*[Companion to Epistemology](https://philpapers.org/rec/BOVSIO)* (https://philpapers.org/rec/BOVSIO). London: Routledge.\n\n[pp. 609- 620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609](https://web.archive.org/web/20210516095047/https://philpapers.org/rec/BOVSIO)\n\n[5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved](https://web.archive.org/web/20210516095047/https://philpapers.org/rec/BOVSIO)\n\n4 January 2022.\n\n[Hasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\"](https://plato.stanford.edu/entries/arabic-islamic-influence/)\n\n[(https://plato.stanford.edu/entries/arabic-islamic-influence/). ](https://plato.stanford.edu/entries/arabic-islamic-influence/) *The Stanford Encyclopedia of*\n\n*Philosophy* . Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023.\n\n[Hawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv](https://plato.stanford.edu/entries/logic-inductive/)\n\n[e/). ](https://plato.stanford.edu/entries/logic-inductive/) *The Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab, Stanford\n\n[University. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed](https://web.archive.org/web/20220121081805/https://plato.stanford.edu/entries/logic-inductive/)\n\n[u/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022.](https://web.archive.org/web/20220121081805/https://plato.stanford.edu/entries/logic-inductive/)\n\n[Hintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph](https://www.britannica.com/topic/philosophy-of-logic)\n\n[y-of-logic). ](https://www.britannica.com/topic/philosophy-of-logic) *Encyclopædia Britannica* [. Archived (https://web.archive.org/web/2015042810173](https://web.archive.org/web/20150428101732/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic)", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Gamut, L.T.F. (1991). ](https://en.wikipedia.org/wiki/L.T.F._Gamut) *Logic, Language and Meaning Vol 1: Introduction to Logic* . University\n\n[of Chicago Press. 5.5. ISBN 978-0-226-28085-1.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-226-28085-1)\n\n[Garson, James (2023). \"Modal Logic\" (https://plato.stanford.edu/entries/logic-modal/). ](https://plato.stanford.edu/entries/logic-modal/) *The*\n\n*Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab, Stanford University.\n\nRetrieved 11 March 2023.\n\nGensler, Harry J. (2006). *The A to Z of Logic* [. Scarecrow Press. pp. xliii- xliv. ISBN 978-1-](https://en.wikipedia.org/wiki/Special:BookSources/978-1-4617-3182-5)\n\n[4617-3182-5.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-4617-3182-5)\n\nGoble, Lou (2001). \"Introduction\". *[The Blackwell Guide to Philosophical Logic](https://philpapers.org/rec/GOBTBG-2)* (https://philpa\n\n[pers.org/rec/GOBTBG-2). Wiley-Blackwell. pp. 1- 8. ISBN 978-0-631-20692-7. Archived (htt](https://web.archive.org/web/20211207184959/https://philpapers.org/rec/GOBTBG-2)\n\n[ps://web.archive.org/web/20211207184959/https://philpapers.org/rec/GOBTBG-2) from the](https://web.archive.org/web/20211207184959/https://philpapers.org/rec/GOBTBG-2)\n\noriginal on 7 December 2021. Retrieved 4 January 2022.\n\nGoodman, Lenn Evan (1992). *Avicenna* [. Routledge. p. 188. ISBN 978-0-415-01929-3.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-415-01929-3)\n\nGoodman, Lenn Evan (2003). *Islamic Humanism* . Oxford University Press. p. 155.\n\n[ISBN 978-0-19-513580-0.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-19-513580-0)\n\n[Groarke, Louis F. \"Aristotle: Logic\" (https://iep.utm.edu/aris-log/). ](https://iep.utm.edu/aris-log/) *Internet Encyclopedia of*\n\n*Philosophy* [. Archived (https://web.archive.org/web/20211229235433/https://iep.utm.edu/aris](https://web.archive.org/web/20211229235433/https://iep.utm.edu/aris-log/)\n\n[-log/) from the original on 29 December 2021. Retrieved 1 January 2022.](https://web.archive.org/web/20211229235433/https://iep.utm.edu/aris-log/)\n\n[Groarke, Leo (2021). \"Informal Logic\" (https://plato.stanford.edu/entries/logic-informal/). ](https://plato.stanford.edu/entries/logic-informal/) *The*\n\n*Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab, Stanford University.\n\n[Archived (https://web.archive.org/web/20220112030519/https://plato.stanford.edu/entries/lo](https://web.archive.org/web/20220112030519/https://plato.stanford.edu/entries/logic-informal/)\n\n[gic-informal/) from the original on 12 January 2022. Retrieved 31 December 2021.](https://web.archive.org/web/20220112030519/https://plato.stanford.edu/entries/logic-informal/)\n\n[Gómez-Torrente, Mario (2019). \"Logical Truth\" (https://plato.stanford.edu/entries/logical-trut](https://plato.stanford.edu/entries/logical-truth/)\n\n[h/). ](https://plato.stanford.edu/entries/logical-truth/) *The Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab, Stanford\n\n[University. Archived (https://web.archive.org/web/20211002190110/https://plato.stanford.ed](https://web.archive.org/web/20211002190110/https://plato.stanford.edu/entries/logical-truth/)\n\n[u/entries/logical-truth/) from the original on 2 October 2021. Retrieved 22 November 2021.](https://web.archive.org/web/20211002190110/https://plato.stanford.edu/entries/logical-truth/)\n\nGödel, Kurt (1984). \"Russell's mathematical logic\". In Benacerraf, Paul; Putnam, Hilary\n\n(eds.). *Philosophy of Mathematics: Selected Readings* [ (https://www.cambridge.org/core/boo](https://www.cambridge.org/core/books/abs/philosophy-of-mathematics/russells-mathematical-logic/4D82F215FABFE06149D03EF1EF5BE7E4)\n\n[ks/abs/philosophy-of-mathematics/russells-mathematical-logic/4D82F215FABFE06149D03](https://www.cambridge.org/core/books/abs/philosophy-of-mathematics/russells-mathematical-logic/4D82F215FABFE06149D03EF1EF5BE7E4)", - "page_start": 28, - "page_end": 28, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Shermer, Michael (25 October 2022). *Conspiracy: Why the Rational Believe the Irrational* .\n\n[JHU Press. ISBN 978-1-4214-4445-1.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-4214-4445-1)\n\n[Sider, Theodore (2010). ](https://en.wikipedia.org/wiki/Theodore_Sider) *Logic for Philosophy* [. Oxford University Press. ISBN 978-0-19-](https://en.wikipedia.org/wiki/Special:BookSources/978-0-19-957558-9)\n\n[957558-9.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-19-957558-9)\n\n[Siegel, Harvey; Biro, John (1997). \"Epistemic Normativity, Argumentation, and Fallacies\" (htt](https://philpapers.org/rec/SIEENA)\n\n[ps://philpapers.org/rec/SIEENA). ](https://philpapers.org/rec/SIEENA) *Argumentation* . **11** (3): 277- 292.\n\n[doi:10.1023/A:1007799325361 (https://doi.org/10.1023%2FA%3A1007799325361).](https://doi.org/10.1023%2FA%3A1007799325361)\n\n[S2CID 126269789 (https://api.semanticscholar.org/CorpusID:126269789). Archived (https://](https://web.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA)\n\n[web.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA) from the original](https://web.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA)\n\non 28 February 2022. Retrieved 4 January 2022.\n\nSimpson, R. L. (2008). *Essentials of Symbolic Logic* (3rd ed.). Broadview Press. p. 14.\n\n[ISBN 978-1-77048-495-5.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-77048-495-5)\n\n[Smith, Robin (2022). \"Aristotle's Logic\" (https://plato.stanford.edu/entries/aristotle-logic/).](https://plato.stanford.edu/entries/aristotle-logic/)\n\n*The Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab, Stanford University.\n\nRetrieved 11 March 2023.\n\n[Spade, Paul Vincent; Panaccio, Claude (2019). \"William of Ockham\" (https://plato.stanford.e](https://plato.stanford.edu/entries/ockham/#SummLogi)\n\n[du/entries/ockham/#SummLogi). ](https://plato.stanford.edu/entries/ockham/#SummLogi) *The Stanford Encyclopedia of Philosophy* . Metaphysics\n\nResearch Lab, Stanford University.\n\nSpriggs, John (2012). *GSN - The Goal Structuring Notation: A Structured Approach to*\n\n*Presenting Arguments* [. Springer Science & Business Media. pp. 20- 22. ISBN 978-1-4471-](https://en.wikipedia.org/wiki/Special:BookSources/978-1-4471-2312-5)\n\n[2312-5.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-4471-2312-5)\n\nStairs, Allen (2017). *A Thinker's Guide to the Philosophy of Religion* . Routledge. p. 343.\n\n[ISBN 978-1-351-21981-5.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-351-21981-5)\n\n[Sternberg, Robert J. \"Thought\" (https://www.britannica.com/topic/thought). ](https://www.britannica.com/topic/thought) *Encyclopædia*\n\n*Britannica* [. Archived (https://web.archive.org/web/20211013145532/https://www.britannica.c](https://web.archive.org/web/20211013145532/https://www.britannica.com/topic/thought)\n\n[om/topic/thought) from the original on 13 October 2021. Retrieved 14 October 2021.](https://web.archive.org/web/20211013145532/https://www.britannica.com/topic/thought)\n\nStolyar, Abram Aronovich (1 January 1984). *Introduction to Elementary Mathematical Logic* .\n\n[Courier Corporation. ISBN 978-0-486-64561-2.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-486-64561-2)\n\n[Stone, Mark A. (2012). \"Denying the Antecedent: Its Effective Use in Argumentation\" (https://](https://philpapers.org/rec/STODTA)\n\n[philpapers.org/rec/STODTA). ](https://philpapers.org/rec/STODTA) *Informal Logic* . **32** [ (3): 327- 356. doi:10.22329/il.v32i3.3681 (ht](https://doi.org/10.22329%2Fil.v32i3.3681)\n\n[tps://doi.org/10.22329%2Fil.v32i3.3681). Archived (https://web.archive.org/web/2022022812](https://web.archive.org/web/20220228123240/https://philpapers.org/rec/STODTA)\n\n[3240/https://philpapers.org/rec/STODTA) from the original on 28 February 2022. Retrieved](https://web.archive.org/web/20220228123240/https://philpapers.org/rec/STODTA)\n\n8 January 2022.", - "page_start": 35, - "page_end": 35, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Wolf, Robert G. (1978). \"Are Relevant Logics Deviant?\" (https://philpapers.org/rec/WOLAR](https://philpapers.org/rec/WOLARL)\n\n[L). ](https://philpapers.org/rec/WOLARL) *Philosophia* . **7** [ (2): 327- 340. doi:10.1007/BF02378819 (https://doi.org/10.1007%2FBF02](https://doi.org/10.1007%2FBF02378819)\n\n[378819). S2CID 143697796 (https://api.semanticscholar.org/CorpusID:143697796).](https://api.semanticscholar.org/CorpusID:143697796)\n\n[Archived (https://web.archive.org/web/20211216143955/https://philpapers.org/rec/WOLAR](https://web.archive.org/web/20211216143955/https://philpapers.org/rec/WOLARL)\n\n[L) from the original on 16 December 2021. Retrieved 4 January 2022.](https://web.archive.org/web/20211216143955/https://philpapers.org/rec/WOLARL)\n\nZegarelli, Mark (2010). *Logic For Dummies* [. John Wiley & Sons. p. 30. ISBN 978-1-118-](https://en.wikipedia.org/wiki/Special:BookSources/978-1-118-05307-2)\n\n[05307-2.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-118-05307-2)\n\n[Retrieved from \"https://en.wikipedia.org/w/index.php?title=Logic&oldid=1266818857\"](https://en.wikipedia.org/w/index.php?title=Logic&oldid=1266818857)\n\n### **External links**", - "page_start": 37, - "page_end": 37, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[s.org/rec/BLAILA-3). ](https://philpapers.org/rec/BLAILA-3) *Informal Logic* . **20** [ (2): 93- 107. doi:10.22329/il.v20i2.2262 (https://doi.o](https://doi.org/10.22329%2Fil.v20i2.2262)\n\n[rg/10.22329%2Fil.v20i2.2262). Archived (https://web.archive.org/web/20211209195317/http](https://web.archive.org/web/20211209195317/https://philpapers.org/rec/BLAILA-3)\n\n[s://philpapers.org/rec/BLAILA-3) from the original on 9 December 2021. Retrieved](https://web.archive.org/web/20211209195317/https://philpapers.org/rec/BLAILA-3)\n\n29 December 2021.\n\n[Blair, J. Anthony (20 October 2011). ](https://en.wikipedia.org/wiki/J._Anthony_Blair) *Groundwork in the Theory of Argumentation: Selected*\n\n*Papers of J. Anthony Blair* [. Springer Science & Business Media. p. 47. ISBN 978-94-007-](https://en.wikipedia.org/wiki/Special:BookSources/978-94-007-2363-4)\n\n[2363-4.](https://en.wikipedia.org/wiki/Special:BookSources/978-94-007-2363-4)\n\n[Bobzien, Susanne (2020). \"Ancient Logic: 2. Aristotle\" (https://plato.stanford.edu/entries/logi](https://plato.stanford.edu/entries/logic-ancient/#Ari)\n\n[c-ancient/#Ari). ](https://plato.stanford.edu/entries/logic-ancient/#Ari) *The Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab,\n\n[Stanford University. Archived (https://web.archive.org/web/20180828102117/https://plato.sta](https://web.archive.org/web/20180828102117/https://plato.stanford.edu/entries/logic-ancient/#Ari)\n\n[nford.edu/entries/logic-ancient/#Ari) from the original on 28 August 2018. Retrieved](https://web.archive.org/web/20180828102117/https://plato.stanford.edu/entries/logic-ancient/#Ari)\n\n3 January 2022.\n\nBorchert, Donald, ed. (2006a). \"Computability Theory\". *[Macmillan Encyclopedia of](https://philpapers.org/rec/BORMEO)*\n\n*[Philosophy Volume 2](https://philpapers.org/rec/BORMEO)* (https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 372-\n\n[390. ISBN 978-0-02-865782-0.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-02-865782-0)\n\nBorchert, Donald (2006b). \"Induction\". *[Macmillan Encyclopedia of Philosophy Volume 4](https://philpapers.org/rec/BORMEO)* (htt\n\n[ps://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 635- 648. ISBN 978-0-02-](https://en.wikipedia.org/wiki/Special:BookSources/978-0-02-865784-4)\n\n[865784-4. Archived (https://web.archive.org/web/20210112065913/https://philpapers.org/re](https://web.archive.org/web/20210112065913/https://philpapers.org/rec/BORMEO)\n\n[c/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022.](https://web.archive.org/web/20210112065913/https://philpapers.org/rec/BORMEO)\n\nBorchert, Donald (2006c). \"Logic, Non-Classical\". *[Macmillan Encyclopedia of Philosophy](https://philpapers.org/rec/BORMEO)*\n\n*Volume 5* [ (https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 485- 492.](https://philpapers.org/rec/BORMEO)\n\n[ISBN 978-0-02-865785-1. Archived (https://web.archive.org/web/20210112065913/https://ph](https://web.archive.org/web/20210112065913/https://philpapers.org/rec/BORMEO)\n\n[ilpapers.org/rec/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022.](https://web.archive.org/web/20210112065913/https://philpapers.org/rec/BORMEO)\n\nBoris, Kulik; Alexander, Fridman (30 November 2017). *N-ary Relations for Logical Analysis*\n\n*of Data and Knowledge* [. IGI Global. p. 74. ISBN 978-1-5225-2783-1.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-5225-2783-1)\n\nBridges, Douglas; Ishihara, Hajime; Rathjen, Michael; Schwichtenberg, Helmut (30 April\n\n2023). *Handbook of Constructive Mathematics* . Cambridge University Press. pp. 73- 4.\n\n[ISBN 978-1-316-51086-5.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-316-51086-5)\n\nBrody, Boruch A. (2006). *Encyclopedia of Philosophy* . Vol. 5. Donald M. Borchert (2nd ed.).\n\n[Thomson Gale/Macmillan Reference US. pp. 535- 536. ISBN 978-0-02-865780-6.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-02-865780-6)", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[16-a199-9679a49ce71c). ISSN 1573-0964 (https://search.worldcat.org/issn/1573-0964).](https://search.worldcat.org/issn/1573-0964)\n\n[S2CID 49729020 (https://api.semanticscholar.org/CorpusID:49729020).](https://api.semanticscholar.org/CorpusID:49729020)\n\n[Pietroski, Paul (2021). \"Logical Form: 1. Patterns of Reason\" (https://plato.stanford.edu/entri](https://plato.stanford.edu/entries/logical-form/#pat)\n\n[es/logical-form/#pat). ](https://plato.stanford.edu/entries/logical-form/#pat) *The Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab,\n\n[Stanford University. Archived (https://web.archive.org/web/20211002190116/https://plato.sta](https://web.archive.org/web/20211002190116/https://plato.stanford.edu/entries/logical-form/#pat)\n\n[nford.edu/entries/logical-form/#pat) from the original on 2 October 2021. Retrieved](https://web.archive.org/web/20211002190116/https://plato.stanford.edu/entries/logical-form/#pat)\n\n4 December 2021.\n\nPlanty-Bonjour, Guy (2012). *The Categories of Dialectical Materialism: Contemporary Soviet*\n\n*Ontology* [. Springer Science & Business Media. p. 62. ISBN 978-94-010-3517-0.](https://en.wikipedia.org/wiki/Special:BookSources/978-94-010-3517-0)\n\n[Possin, Kevin (2016). \"Conductive Arguments: Why is This Still a Thing?\" (https://philpapers.](https://philpapers.org/rec/POSCAW-4)\n\n[org/rec/POSCAW-4). ](https://philpapers.org/rec/POSCAW-4) *Informal Logic* . **36** [ (4): 563- 593. doi:10.22329/il.v36i4.4527 (https://do](https://doi.org/10.22329%2Fil.v36i4.4527)\n\n[i.org/10.22329%2Fil.v36i4.4527). Archived (https://web.archive.org/web/20220108171723/ht](https://web.archive.org/web/20220108171723/https://philpapers.org/rec/POSCAW-4)\n\n[tps://philpapers.org/rec/POSCAW-4) from the original on 8 January 2022. Retrieved](https://web.archive.org/web/20220108171723/https://philpapers.org/rec/POSCAW-4)\n\n8 January 2022.\n\n[Priest, Graham; Tanaka, Koji; Weber, Zach (2018). \"Paraconsistent Logic\" (https://plato.stan](https://plato.stanford.edu/entries/logic-paraconsistent/)\n\n[ford.edu/entries/logic-paraconsistent/). ](https://plato.stanford.edu/entries/logic-paraconsistent/) *The Stanford Encyclopedia of Philosophy* .\n\nMetaphysics Research Lab, Stanford University. Retrieved 14 December 2021.\n\nPépin, Jean (2004). \"Logos\". *[Encyclopedia of Religion](https://www.encyclopedia.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos)* (https://www.encyclopedia.com/philo\n\n[sophy-and-religion/philosophy/philosophy-terms-and-concepts/logos). ISBN 978-0-02-](https://en.wikipedia.org/wiki/Special:BookSources/978-0-02-865733-2)\n\n[865733-2. Archived (https://web.archive.org/web/20211229134626/https://www.encyclopedi](https://web.archive.org/web/20211229134626/https://www.encyclopedia.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos)\n\n[a.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos) from the](https://web.archive.org/web/20211229134626/https://www.encyclopedia.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos)\n\noriginal on 29 December 2021. Retrieved 29 December 2021.\n\n[Putnam, H. (1969). \"Is Logic Empirical?\". ](https://en.wikipedia.org/wiki/Hilary_Putnam) *Boston Studies in the Philosophy of Science* .\n\n[Vol. 5. pp. 216- 241. doi:10.1007/978-94-010-3381-7_5 (https://doi.org/10.1007%2F978-94-](https://doi.org/10.1007%2F978-94-010-3381-7_5)\n\n[010-3381-7_5). ISBN 978-94-010-3383-1.](https://en.wikipedia.org/wiki/Special:BookSources/978-94-010-3383-1)\n\n[Quine, Willard Van Orman (1981). ](https://en.wikipedia.org/wiki/Willard_Van_Orman_Quine) *Mathematical Logic* . Harvard University Press. p. 1.\n\n[ISBN 978-0-674-55451-1.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-674-55451-1)\n\n[Rathjen, Michael; Sieg, Wilfried (2022). \"Proof Theory\" (https://plato.stanford.edu/entries/pro](https://plato.stanford.edu/entries/proof-theory/)", - "page_start": 33, - "page_end": 33, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Thomson Gale/Macmillan Reference US. pp. 535- 536. ISBN 978-0-02-865780-6.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-02-865780-6)\n\n[OCLC 61151356 (https://search.worldcat.org/oclc/61151356). \"The two most important](https://search.worldcat.org/oclc/61151356)\n\ntypes of logical calculi are propositional (or sentential) calculi and functional (or predicate)\n\ncalculi. A propositional calculus is a system containing propositional variables and\n\nconnectives (some also contain propositional constants) but not individual or functional\n\nvariables or constants. In the extended propositional calculus, quantifiers whose operator\n\nvariables are propositional variables are added.\"\n\nBunnin, Nicholas; Yu, Jiyuan (27 January 2009). *The Blackwell Dictionary of Western*\n\n*Philosophy* [. John Wiley & Sons. p. 179. ISBN 978-1-4051-9112-8.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-4051-9112-8)\n\n[Burgess, John P. (2009). \"1. Classical logic\". ](https://en.wikipedia.org/wiki/John_P._Burgess) *[Philosophical Logic](https://philpapers.org/rec/BURPL-3)* (https://philpapers.org/rec/\n\n[BURPL-3). Princeton, NJ: Princeton University Press. pp. 1- 12. ISBN 978-0-691-15633-0.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-691-15633-0)\n\n[Archived (https://web.archive.org/web/20211216143954/https://philpapers.org/rec/BURPL-](https://web.archive.org/web/20211216143954/https://philpapers.org/rec/BURPL-3)\n\n[3) from the original on 16 December 2021. Retrieved 4 January 2022.](https://web.archive.org/web/20211216143954/https://philpapers.org/rec/BURPL-3)\n\nBäck, Allan T. (2016). *Aristotle's Theory of Predication* [. Brill. p. 317. ISBN 978-90-04-32109-](https://en.wikipedia.org/wiki/Special:BookSources/978-90-04-32109-0)\n\n[0.](https://en.wikipedia.org/wiki/Special:BookSources/978-90-04-32109-0)\n\n[Calderbank, Robert; Sloane, Neil J. A. (April 2001). \"Claude Shannon (1916- 2001)\" (https://](https://doi.org/10.1038%2F35071223)\n\n[doi.org/10.1038%2F35071223). ](https://doi.org/10.1038%2F35071223) *Nature* . **410** [ (6830): 768. doi:10.1038/35071223 (https://doi.](https://doi.org/10.1038%2F35071223)\n\n[org/10.1038%2F35071223). ISSN 1476-4687 (https://search.worldcat.org/issn/1476-4687).](https://search.worldcat.org/issn/1476-4687)\n\n[PMID 11298432 (https://pubmed.ncbi.nlm.nih.gov/11298432). S2CID 4402158 (https://api.s](https://api.semanticscholar.org/CorpusID:4402158)\n\n[emanticscholar.org/CorpusID:4402158).](https://api.semanticscholar.org/CorpusID:4402158)\n\nCarnielli, Walter; Pizzi, Claudio (2008). *Modalities and Multimodalities* . Springer Science &\n\n[Business Media. p. 3. ISBN 978-1-4020-8590-1.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-4020-8590-1)", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[118. Strawson, Galen (2006). \"Realistic monism: Why physicalism entails panpsychism\" (http://w](http://www.newdualism.org/papers/G.Strawson/strawson_on_panpsychism.pdf)\n\n[ww.newdualism.org/papers/G.Strawson/strawson_on_panpsychism.pdf) (PDF). ](http://www.newdualism.org/papers/G.Strawson/strawson_on_panpsychism.pdf) *Journal of*\n\n*Consciousness Studies* . **13** (10/11): 3- 31. Retrieved 15 September 2018.\n\n[119. Goff, Philip (2017). \"The Case for Panpsychism\" (https://philosophynow.org/issues/121/The_](https://philosophynow.org/issues/121/The_Case_For_Panpsychism)\n\n[Case_For_Panpsychism). ](https://philosophynow.org/issues/121/The_Case_For_Panpsychism) *Philosophy Now* . Retrieved 3 October 2018.\n\n[120. Kastrup, Bernardo (2018). \"The Universe in Consciousness\" (https://philpapers.org/rec/KAS](https://philpapers.org/rec/KASTUI)\n\n[TUI). ](https://philpapers.org/rec/KASTUI) *Journal of Consciousness Studies* . **25** (5- 6): 125- 155.\n\n[121. Shani, Itay; Keppler, Joachim (2018). \"Beyond combination: how cosmic consciousness](https://doi.org/10.1017%2Fapa.2018.30)\n\n[grounds ordinary experience\" (https://doi.org/10.1017%2Fapa.2018.30). ](https://doi.org/10.1017%2Fapa.2018.30) *Journal of the*\n\n*American Philosophical Association* . **4** [ (3): 390- 410. doi:10.1017/apa.2018.30 (https://doi.or](https://doi.org/10.1017%2Fapa.2018.30)\n\n[g/10.1017%2Fapa.2018.30). S2CID 125246376 (https://api.semanticscholar.org/CorpusID:1](https://api.semanticscholar.org/CorpusID:125246376)\n\n[25246376).](https://api.semanticscholar.org/CorpusID:125246376)\n\n122. Shani, Itay (2015). \"Cosmopsychism: A holistic approach to the metaphysics of experience\".\n\n*Philosophical Papers* . **44** [ (3): 389- 437. doi:10.1080/05568641.2015.1106709 (https://doi.or](https://doi.org/10.1080%2F05568641.2015.1106709)\n\n[g/10.1080%2F05568641.2015.1106709). S2CID 146624784 (https://api.semanticscholar.or](https://api.semanticscholar.org/CorpusID:146624784)\n\n[g/CorpusID:146624784).](https://api.semanticscholar.org/CorpusID:146624784)\n\n123. Albahari, Miri (2019). \"Perennial Idealism: A Mystical Solution to the Mind- Body Problem\".\n\n*Philosophers' Imprint* . **19** [ (44): 1- 37. S2CID 211538796 (https://api.semanticscholar.org/Cor](https://api.semanticscholar.org/CorpusID:211538796)\n\n[pusID:211538796).](https://api.semanticscholar.org/CorpusID:211538796)\n\n124. Kastrup, Bernardo (2018). \"Conflating abstraction with empirical observation: The false\n\nmind-matter dichotomy\". *Constructivist Foundations* . **13** (3).\n\n125. Kastrup, Bernardo (2019). *[Analytic Idealism: A consciousness-only ontology](https://philarchive.org/rec/KASAIA-3)* (https://philarch\n\n[ive.org/rec/KASAIA-3) (PhD Thesis). Radboud University Nijmegen.](https://philarchive.org/rec/KASAIA-3)\n\n126. Hoffman, Donald D. (2008). \"Conscious Realism and the Mind- Body Problem\". *Mind and*\n\n*Matter* . **6** [ (1): 87- 121. S2CID 3175512 (https://api.semanticscholar.org/CorpusID:3175512).](https://api.semanticscholar.org/CorpusID:3175512)\n\n[127. Chalmers, David J. (2020). \"Idealism and the Mind- Body Problem\" (http://consc.net/papers/i](http://consc.net/papers/idealism.pdf)\n\n[dealism.pdf) (PDF). In Seager, William (ed.). ](https://en.wikipedia.org/wiki/William_Seager_(philosopher)) *The Routledge Handbook of Panpsychism* .\n\n[Routledge. ISBN 978-1138817135. Retrieved 2 December 2019. \"Overall, I think cosmic](https://en.wikipedia.org/wiki/Special:BookSources/978-1138817135)\n\nidealism is the most promising version of idealism, and is about as promising as any version\n\nof panpsychism. It should be on the list of the handful of promising approaches to the mind-\n\nbody problem.\"\n\n128. McGinn, Colin (1989). \"Can We Solve the Mind- Body Problem?\". *Mind* . **98** (391): 349- 366.\n\n[doi:10.1093/mind/XCVIII.391.349 (https://doi.org/10.1093%2Fmind%2FXCVIII.391.349).](https://doi.org/10.1093%2Fmind%2FXCVIII.391.349)", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0510.pdf", - "query": "What explains mostly the physical behavior that occurs in region iii of thin films ?", - "target_page": 5, - "target_passage": "The observed behaviour in region iii) can be reason- ably attributed to the decreasing relevance of the con- tribution to the total energy of the system coming from the competitive interactions among NNN planes as the film thickness decreases", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "planes” inside the film, so that we are left with only a 2d\n\ntrend at T C ( n ), i.e. at the temperature where the order\n\nparameters defined in Eqs. (2) and (3) show a critical\n\nbehaviour.\n\nIV. DISCUSSION AND CONCLUSION\n\nA possible framework to analyze the results presented\n\nin the previous Section is suggested by Fig. 5, where we\n\ncan easily distinguish three significant regions: i ) high\n\nthickness, n ⩾ 16, where the films substantially display a\n\nbulk behaviour, with the single planes ordering tempera-\n\nture coinciding with the helical phase transition one; ii )\n\nintermediate thickness, 6 ≤ n ≲ 15, where the tempera-\n\nture corresponding to the onset of in-plane order, T C ( n ),\n\nis still ≃ T Ho N , but where the helical/fan arrangement sta- bilizes only below a finite temperature T N ( n ) < T C ( n );\n\niii ) low thickness,1 ≤ n ≤ 5, where T C ( n ) ≲ T Ho N but no\n\nfan phase is present at any temperature.\n\nThe observed behaviour in region iii ) can be reason-\n\nably attributed to the decreasing relevance of the con-\n\ntribution to the total energy of the system coming from\n\nthe competitive interactions among NNN planes as the\n\nfilm thickness decreases; moreover, the thinness of the", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0510.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "(iii)\n\n(iv)\n\n(ii)\n\n(i)\n\nFIG. 8: (Colour online) Space-time plots are given for (left) the film thickness *h* and (right) the nanoparticle\n\nlayer height *h* *p* = *hφ* . The plot corresponds to the complete evolution resulting in the ring profile of\n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright\n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four\n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning,\n\n(iii) slow motion after depinning, and (iv) final evaporation from the center.\n\nshould also be investigated further in the simple case presented here.\n\n## **IV. CONCLUSION**\n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating\n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of\n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and\n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics\n\non the mesoscale has been described as well as more microscopic models for the dynamics in the\n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film\n\nmodel.\n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to\n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures\n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic\n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n\n23", - "page_start": 22, - "page_end": 22, - "source_file": "1001.2669.pdf" - }, - { - "text": "also shift the spinodal and binodal lines as compared to the locations of these lines in the phase\n\ndiagram for the pure solvent [41]. As a consequence, the solute concentration influences the hole\n\nnucleation rate. More importantly, the solute particles may also destabilise the dewetting fronts.\n\nAs a result, one may find strongly ramified structures in all three systems [23, 25, 40, 42]. A\n\nselection of images exhibiting some of the possible structures is displayed in Fig.1.\n\nFor volatile solvents, the contact lines retract even for wetting fluids. It has been found that such\n\nevaporatively receding contact lines may deposit very regular line or ring patterns parallel to the\n\nmoving contact line [24, 43]. The deposition of a single ring of colloids from a evaporating\n\ndrop of colloidal suspension is well known as the ‘coffee stain effect’ [44]. Detailed investiga-\n\ntions reveal the emergence of rich structures including multiple irregular rings, networks, regular\n\ndroplet patterns, sawtooth patterns, Sierpinski carpets, and - in the case of DNA - liquid crys-\n\ntalline structures [22, 30, 45- 49]. The deposition of regularly spaced straight lines orthogonal to\n\nthe moving contact line has also been reported [50]. Droplet patterns may as well be created em-\n\nploying solvent-induced dewetting of glassy polymer layers below the glass transition temperature\n\n[51- 53].\n\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and\n\ntheoretically [55- 58]. In this case, different contact line instabilities have been observed for evap-\n\norating liquid drops [59, 60].\n\nIn the present article we review and preview the experiments and in particular the various mod-\n\nelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting sol-\n\nvents. After reviewing the basic experimental results in Section II, we discuss in Section III sev-\n\neral theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A,\n\na dynamic density functional theory in Section III B, and a thin film evolution equation in Sec-\n\ntion III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the\n\nindividual approaches and future challenges to all of them.\n\n## **II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS**\n\nWe focus on experiments that use monodisperse colloidal suspensions of thiol-passivated gold\n\nnanoparticles in toluene [33, 34, 37- 40, 61]. The gold core of 2 - 3 nm diameter is coated by a layer\n\nof alkyl-thiol molecules. The length of the carbon backbone of the thiol used in the experiments\n\nranges from 6 to 12 carbon atoms ( *C* 6 to *C* 12 ) [40]. By varying the chain length, one can control\n\n4", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" - }, - { - "text": "fast evaporation [104, 105]. These complex experimental systems all represent systems of high\n\npractical interest that the theories presented here are not (yet) able to describe. Such experiments\n\ndo, however, provide a strong motivation for further work to extend the theories presented here, as\n\nwell as to develop new approaches.\n\nLet us finally mention that several topics were entirely excluded from our discussion here. First, we\n\nfocused on a limited range of descriptions and did, for instance, not mention lattice Boltzmann,\n\nmolecular dynamics or dissipative particle dynamics approaches that may also be employed to\n\ndescribe fluid suspensions [106- 109]. Second, we have only discussed spatially homogeneous\n\nsubstrates. Patterned substrates are widely used in dewetting experiments [38, 110- 112]. Theoret-\n\nical descriptions are well developed for the dewetting of films of pure non-volatile liquids on such\n\nsubstrates [68, 113- 119]. However, in the case of volatile liquids on heterogeneous substrates,\n\nmuch less work has been done. A third topic that we did not touch upon are possible continuum\n\nthin film approaches to demixing dewetting suspensions. We believe it is feasible to extend the\n\ndiffuse interface theories such as model-H [120] to include the influence of evaporation in dewet-\n\nting nanoparticle suspensions. For instance, such models have already been adapted to describe\n\ndemixing free surface films of polymer blends [121- 123].\n\n## **Acknowledgments**\n\nAJA and MJR gratefully acknowledge RCUK and EPSRC, respectively, for financial support. We\n\nacknowledge support by the European Union via the FP6 and FP7 Marie Curie schemes [Grants\n\nMRTN-CT-2004005728 (PATTERNS) and PITN-GA-2008-214919 (MULTIFLOW)].\n\n[1] G. Reiter, “Dewetting of thin polymer films,” Phys. Rev. Lett. **68** , 75- 78 (1992).\n\n[2] G. Reiter, “Mobility of polymers in films thinner than their unperturbed size,” Europhys. Lett. **23** ,\n\n579- 584 (1993).\n\n[3] A. Sharma and G. Reiter, “Instability of thin polymer films on coated substrates: Rupture, dewetting\n\nand drop formation,” J. Colloid Interface Sci. **178** , 383- 399 (1996).\n\n[4] P.-G. de Gennes, “Wetting: Statics and dynamics,” Rev. Mod. Phys. **57** , 827- 863 (1985).\n\n25", - "page_start": 24, - "page_end": 24, - "source_file": "1001.2669.pdf" - }, - { - "text": "####### **REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n####### **NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n####### **(All tables in millions, except per share data) Ì (Continued)**\n\n**Depreciation,**\n\n**Amortization,**\n\n**Gross Intercompany Net Depletion and Operating Capital Total**\n\n**2003 Revenue Revenue(b) Revenue Accretion(c) Income Expenditures(d) Assets**\n\nEastern Region ÏÏÏÏÏÏÏÏÏ $ 600.2 $ (93.0) $ 507.2 $ 36.4 $ 71.3 $ 40.7 $ 826.9\n\nCentral Region ÏÏÏÏÏÏÏÏÏ 671.7 (151.6) 520.1 74.0 106.6 75.7 960.5\n\nSouthern RegionÏÏÏÏÏÏÏÏ 680.3 (76.9) 603.4 62.8 107.5 69.9 865.6\n\nSouthwestern Region ÏÏÏÏ 332.6 (31.2) 301.4 28.7 50.2 28.9 409.4\n\nWestern Region ÏÏÏÏÏÏÏÏ 729.4 (143.9) 585.5 46.2 148.8 51.4 813.2\n\nCorporate Entities(a)ÏÏÏÏ .2 Ì .2 3.7 (71.7) 6.6 678.5\n\nTotalÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $3,014.4 $(496.6) $2,517.8 $251.8 $412.7 $273.2 $4,554.1\n\n**Depreciation,**\n\n**Amortization, Other**\n\n**Gross Intercompany Net and Charges Operating Capital Total**\n\n**2002 Revenue Revenue(b) Revenue Depletion(c) (Income) Income Expenditures(d) Assets**\n\nEastern Region ÏÏÏÏÏÏÏÏ $ 564.1 $ (79.7) $ 484.4 $ 32.0 $(4.1) $ 87.0 $ 39.2 $ 822.2\n\nCentral Region ÏÏÏÏÏÏÏÏ 589.6 (120.2) 469.4 53.6 (1.5) 105.3 77.1 950.9\n\nSouthern RegionÏÏÏÏÏÏÏ 643.1 (65.5) 577.6 52.7 Ì 118.3 58.0 830.7\n\nSouthwestern Region ÏÏÏ 311.8 (29.1) 282.7 22.8 Ì 41.9 30.6 374.6\n\nWestern Region ÏÏÏÏÏÏÏ 690.0 (139.1) 550.9 41.3 Ì 145.5 47.3 826.7\n\nCorporate Entities(a)ÏÏÏ .2 (.1) .1 (2.8) Ì (38.5) 6.4 404.0\n\nTotalÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $2,798.8 $(433.7) $2,365.1 $199.6 $(5.6) $459.5 $258.6 $4,209.1\n\n(a) Corporate functions include legal, tax, treasury, information technology, risk management, human\n\nresources, national accounts and other typical administrative functions. The increase in operating income\n\nfor Corporate Entities from 2003 to 2004 is due primarily to higher self-insurance expense recorded\n\nduring 2003.\n\n(b) Intercompany operating revenue reÖects transactions within and between segments and are generally\n\nmade on a basis intended to reÖect the market value of such services.\n\n(c) EÅective January 1, 2003, the Company adopted SFAS 143. (See Note 1, Basis of Presentation, for\n\nfurther information.)\n\n(d) Capital expenditures for 2002 exclude $72.6 million used to purchase equipment consisting primarily of\n\nrevenue-producing vehicles originally placed into service pursuant to an operating lease.\n\nGoodwill is the cost of acquired businesses in excess of the fair value of net assets acquired. The activity\n\nin goodwill, net of accumulated amortization, during 2004 and 2003 is as follows:\n\n**Balance as of Balance as of**\n\n**December 31, December 31,**\n\n**2003 Acquisitions Transfers 2004**\n\nEastern Region ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $ 435.9 $ 2.6 $(2.1) $ 436.4\n\nCentral Region ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 350.5 10.7 (3.6) 357.6\n\nSouthern Region ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 325.8 2.0 (1.3) 326.5\n\nSouthwestern Region ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 135.0 .2 (1.6) 133.6\n\nWestern RegionÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 310.9 (2.3) Ì 308.6\n\nTotalÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $1,558.1 $13.2 $(8.6) $1,562.7\n\n81", - "page_start": 88, - "page_end": 88, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "[5] F. Brochard-Wyart and J. Daillant, ��Drying of solids wetted by thin liquid films,” Can. J. Phys. **68** ,\n\n1084- 1088 (1989).\n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real\n\nand reciprocal space,” J. Phys.-Condes. Matter **15** , R1549- R1582 (2003).\n\n[7] R. Seemann, S. Herminghaus, C. Neto, S. Schlagowski, D. Podzimek, R. Konrad, H. Mantz, and\n\nK. Jacobs, “Dynamics and structure formation in thin polymer melt films,” J. Phys.-Condes. Matter\n\n**17** , S267- S290 (2005).\n\n[8] U. Thiele, “Structure formation in thin liquid films,” in S. Kalliadasis and U. Thiele, editors, “Thin\n\nfilms of Soft Matter,” pages 25- 93, Springer, Wien (2007).\n\n[9] R. Xie, A. Karim, J. F. Douglas, C. C. Han, and R. A. Weiss, “Spinodal dewetting of thin polymer\n\nfilms,” Phys. Rev. Lett. **81** , 1251- 1254 (1998).\n\n[10] R. Seemann, S. Herminghaus, and K. Jacobs, “Dewetting patterns and molecular forces: A reconcil-\n\niation,” Phys. Rev. Lett. **86** , 5534- 5537 (2001).\n\n[11] U. Thiele, M. G. Velarde, and K. Neuffer, “Dewetting: Film rupture by nucleation in the spinodal\n\nregime,” Phys. Rev. Lett. **87** , 016104 (2001).\n\n[12] M. Bestehorn and K. Neuffer, “Surface patterns of laterally extended thin liquid films in three di-\n\nmensions,” Phys. Rev. Lett. **87** , 046101 (2001).\n\n[13] J. Becker, G. Gr¨un, R. Seemann, H. Mantz, K. Jacobs, K. R. Mecke, and R. Blossey, “Complex\n\ndewetting scenarios captured by thin-film models,” Nat. Mater. **2** , 59- 63 (2003).\n\n[14] C. Redon, F. Brochard-Wyart, and F. Rondelez, “Dynamics of dewetting,” Phys. Rev. Lett. **66** , 715-\n\n718 (1991).\n\n[15] R. Seemann, S. Herminghaus, and K. Jacobs, “Shape of a liquid front upon dewetting,” Phys. Rev.\n\nLett. **87** , 196101 (2001).\n\n[16] R. Fetzer, K. Jacobs, A. M¨unch, B. Wagner, and T. P. Witelski, “New slip regimes and the shape of\n\ndewetting thin liquid films,” Phys. Rev. Lett. **95** , 127801 (2005).\n\n[17] F. Brochard-Wyart and C. Redon, “Dynamics of liquid rim instabilities,” Langmuir **8** , 2324- 2329\n\n(1992).\n\n[18] G. Reiter and A. Sharma, “Auto-optimization of dewetting rates by rim instabilities in slipping poly-\n\nmer films,” Phys. Rev. Lett. **87** , 166103 (2001).\n\n[19] A. M¨unch and B. Wagner, “Contact-line instability of dewetting thin films,” Physica D **209** , 178- 190\n\n(2005).\n\n26", - "page_start": 25, - "page_end": 25, - "source_file": "1001.2669.pdf" - }, - { - "text": "The hard problem is often illustrated by\n\nappealing to the logical possibility of inverted\n\nvisible spectra. If there is no logical\n\ncontradiction in supposing that one's colour\n\nvision could be inverted, it follows that\n\nmechanistic explanations of visual processing\n\ndo not determine facts about what it is like to\n\nsee colours.\n\nA swarm of birds showing high\n\norder structure emerging from\n\nsimpler physical constituents\n\nphysical constituents. For example, water is nothing\n\nmore than H 2 O molecules, and understanding everything\n\nabout H 2 O molecules is to understand everything there is\n\nto know about water. But consciousness is not like this.\n\nKnowing everything there is to know about the brain, or\n\nany physical system, is not to know everything there is to\n\nknow about consciousness. Consciousness, then, must\n\nnot be purely physical. [27]\n\n[Chalmers's idea contradicts physicalism, sometimes](https://en.wikipedia.org/wiki/Physicalism)\n\n[labelled materialism. This is the view that everything that](https://en.wikipedia.org/wiki/Materialism)\n\nexists is a physical or material thing, so everything can\n\nbe reduced to microphysical things. For example, the\n\nrings of Saturn are a physical thing because they are\n\nnothing more than a complex arrangement of a large\n\nnumber of subatomic particles interacting in a certain way.\n\nAccording to physicalism, everything, including consciousness,\n\ncan be explained by appeal to its microphysical constituents.\n\nChalmers's *hard problem* [ presents a counterexample to this view](https://en.wikipedia.org/wiki/Counterexample)\n\nand to other phenomena like swarms of birds, since it suggests that\n\nconsciousness, like swarms of birds, cannot be reductively\n\nexplained by appealing to their physical constituents. Thus, if the\n\nhard problem is a real problem then physicalism must be false, and\n\nif physicalism is true then the hard problem must not be a real\n\nproblem.\n\n[Though Chalmers rejects physicalism, he is still a naturalist.](https://en.wikipedia.org/wiki/Naturalism_(philosophy)) [27]\n\nThe hard problem of consciousness has scholarly antecedents considerably earlier than Chalmers.\n\nChalmers himself notes that \"a number of thinkers in the recent and distant past\" have \"recognised the\n\nparticular difficulties of explaining consciousness.\" [33] He states that all his original 1996 paper\n\ncontributed to the discussion was \"a catchy name, a minor reformulation of philosophically familiar\n\npoints\". [33]\n\nAmong others, thinkers who have made arguments similar to Chalmers' formulation of the hard problem\n\n[include Isaac Newton,](https://en.wikipedia.org/wiki/Isaac_Newton) [34] [ John Locke,](https://en.wikipedia.org/wiki/John_Locke) [35] [ Gottfried Wilhelm Leibniz,](https://en.wikipedia.org/wiki/Gottfried_Wilhelm_Leibniz) [36][34] [ John Stuart Mill,](https://en.wikipedia.org/wiki/John_Stuart_Mill) [37] and\n\n[Thomas Henry Huxley.](https://en.wikipedia.org/wiki/Thomas_Henry_Huxley) [38][34] [ Likewise, Asian philosophers like Dharmakirti and Guifeng Zongmi](https://en.wikipedia.org/wiki/Guifeng_Zongmi)\n\ndiscussed the problem of how consciousness arises from unconscious matter. [34][39][40][41]\n\n##### **Implications for physicalism**\n\n#### **Historical precedents**\n\n#### **Related concepts**\n\n##### **The mind- body problem**", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia2.pdf" - }, - { - "text": "**ANNEX III**\n\n- Model for specific contracts\n\n- Model for order forms", - "page_start": 41, - "page_end": 41, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "[110] L. Rockford, Y. Liu, P. Mansky, T. P. Russell, M. Yoon, and S. G. J. Mochrie, “Polymers on nanope-\n\nriodic, heterogeneous surfaces,” Phys. Rev. Lett. **82** , 2602- 2605 (1999).\n\n[111] A. Sehgal, V. Ferreiro, J. F. Douglas, E. J. Amis, and A. Karim, “Pattern-directed dewetting of\n\nultrathin polymer films,” Langmuir **18** , 7041- 7048 (2002).\n\n[112] M. Geoghegan and G. Krausch, “Wetting at polymer surfaces and interfaces,” Prog. Polym. Sci. **28** ,\n\n261- 302 (2003).\n\n[113] P. Lenz and R. Lipowsky, “Morphological transitions of wetting layers on structured surfaces,” Phys.\n\nRev. Lett. **80** , 1920- 1923 (1998).\n\n[114] C. Bauer, S. Dietrich, and A. O. Parry, “Morphological phase transitions of thin fluid films on chem-\n\nically structured substrates,” Europhys. Lett. **47** , 474- 480 (1999).\n\n[115] R. Konnur, K. Kargupta, and A. Sharma, “Instability and morphology of thin liquid films on chemi-\n\ncally heterogeneous substrates,” Phys. Rev. Lett. **84** , 931- 934 (2000).\n\n[116] M. Brinkmann and R. Lipowsky, “Wetting morphologies on substrates with striped surface domains,”\n\nJ. Appl. Phys. **92** , 4296- 4306 (2002).\n\n[117] L. Brusch, H. K¨uhne, U. Thiele, and M. B¨ar, “Dewetting of thin films on heterogeneous substrates:\n\nPinning vs. coarsening,” Phys. Rev. E **66** , 011602 (2002).\n\n[118] U. Thiele, L. Brusch, M. Bestehorn, and M. B¨ar, “Modelling thin-film dewetting on structured sub-\n\nstrates and templates: Bifurcation analysis and numerical simulations,” Eur. Phys. J. E **11** , 255- 271\n\n(2003).\n\n[119] U. Thiele, “Open questions and promising new fields in dewetting,” Eur. Phys. J. E **12** , 409- 416\n\n(2003).\n\n[120] D. M. Anderson, G. B. McFadden, and A. A. Wheeler, “Diffuse-interface methods in fluid mechan-\n\nics,” Ann. Rev. Fluid Mech. **30** , 139- 165 (1998).\n\n[121] U. Thiele, S. Madruga, and L. Frastia, “Decomposition driven interface evolution for layers of binary\n\nmixtures: I. Model derivation and stratified base states,” Phys. Fluids **19** , 122106 (2007).\n\n[122] O. A. Frolovskaya, A. A. Nepomnyashchy, A. Oron, and A. A. Golovin, “Stability of a two-layer\n\nbinary-fluid system with a diffuse interface,” Phys. Fluids **20** , 112105 (2008).\n\n[123] S. Madruga and U. Thiele, “Decomposition driven interface evolution for layers of binary mixtures:\n\nII. Influence of convective transport on linear stability,” Phys. Fluids **21** , 062104 (2009).\n\n33", - "page_start": 32, - "page_end": 32, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0510.pdf", - "query": "Where are located the magnetic ions in the lattice of the studied layers ?", - "target_page": 2, - "target_passage": "the magnetic ions are located on the sites of a body-centered tetragonal (BCT) lattice", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "gin of the interface magnetism then had to be inferred by\n\ncomparison to a series of reference samples 7 . Demonstra- tion of coupling between the bulk of the layers, i.e. , an\n\nexchange bias effect, would provide direct evidence of the\n\ninterface magnetic order. Moreover, such coupling would\n\noffer new means of manipulating the FM semiconductor\n\nspin state and utilizing the proximity polarization effect\n\nin a spintronic device.\n\nHere, we demonstrate an antiferromagnetic coupling\n\nand exchange bias in Fe/(Ga,Mn)As bilayer films, by\n\ncombining element-specific XMCD measurements and\n\nbulk-sensitive superconducting quantum interference de-\n\nvice (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers 4,5 (and in con-\n\ntrast to AFM coupled FM metal/FM metal exchange bias\n\nstructures 10,11 ) the layers are in direct contact without\n\na non-magnetic spacer in between. We distinguish in-\n\nterface and bulk (Ga,Mn)As layers that are respectively\n\nstrongly and weakly antiferromagnetically coupled to the\n\nFe overlayer. In agreement with Ref. 7 , the interface layer\n\nremains polarized at room temperature.\n\nThe Fe and (Ga,Mn)As layers of the present study\n\nwere both grown by molecular beam epitaxy in the same\n\nultra-high vacuum system, in order to ensure a clean in-\n\nterface between them. The (Ga,Mn)As layer of thickness\n\n10 to 50 nm was deposited on a GaAs(001) substrate\n\nat a temperature of 260 C, using previously established\n\nmethods 3,8 . A low Mn concentration of x ≈ 0 . 03 was\n\nchosen in order to avoid the formation of compensating\n\nMn interstitials. The substrate temperature was then\n\nreduced to ∼ 0 C, before depositing a 2 nm Fe layer,\n\nplus a 2 nm Al capping layer. In-situ reflection high\n\nenergy electron diffraction and ex-situ x-ray reflectivity\n\nand diffraction measurements confirmed that the layers\n\nare single-crystalline with sub-nm interface roughness.\n\nSQUID magnetometry measurements were performed us-\n\ning a Quantum Design Magnetic Property Measurement\n\nSystem. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "*x*\n\n*z*\n\n*y*\n\n## *J* *J*\n\n## *J*\n\n*1*\n\n*0*\n\n*2*\n\nFIG. 1: (colors online) (a) : body-centered tetragonal (BCT)\n\nlattice with J 0 in-plane coupling constant, and out-of-plane\n\nJ 1 , and J 2 competing interactions.\n\nbe achieved with different number of interacting layers:\n\nnotably, nearest and next-nearest layers competitive in-\n\nteractions are enough to get a helical structure with a\n\nwhatever pitch wavevector. Such observation gives us a\n\npossible way to solve the conundrum previously emerged,\n\nas we have the possibility of varying the range of inter-\n\nactions without modifying the helical pitch, thus decou-\n\npling the two relevant length scales along the film growth\n\ndirection, and making accessible a range of n of the or-\n\nder of, or smaller than, the helical pitch, but still large\n\nenough that a substantial number of layers can behave\n\nas “bulk” layers. Therefore, while in the previous papers\n\nwe have studied the properties of ultrathin magnetic films\n\nof Ho assuming a model with six interlayer exchange in-\n\nteractions, here we investigate by MC simulations the\n\nproperties of the same system by making use of the sim-\n\nplest model Hamiltonian able to describe the onset of a\n\nhelical magnetic order in Holmium, i.e. we consider only\n\ntwo inter-layer coupling constants, as previously done in\n\nRef. 11.\n\nThe paper is organized as follows: In Sec. II the model\n\nHamiltonian will be defined, and the MC techniques, and\n\nall the thermodynamic quantities relevant for this study,\n\nwill be introduced. In Sec. III the results obtained for\n\ndifferent thicknesses will be presented, both in the matter\n\nof the critical properties of the model and of the magnetic\n\nordered structures observed. Finally, in Sec. IV we shall\n\ndiscuss such results, drawing also some conclusions.\n\nII. MODEL HAMILTONIAN AND MONTE\n\nCARLO OBSERVABLES\n\nThe model Hamiltonian we use in our simulations is the\n\nminimal one able to describe helimagnetic structures:\n\nH = −   J 0 � ⟨ ij ⟩\n\n⃗S i · ⃗S j + J 1 � ⟨ ik ⟩\n\n⃗S i · ⃗S k + J 2 � ⟨ il ⟩\n\n⃗S i · ⃗S l   .\n\n(1)\n\n⃗S i are classical planar unit vectors representing the di-\n\nrection of the total angular momentum of the magnetic\n\nions, whose magnitude � j ( j + 1) ( j = 8 for Holmium\n\nions) is already encompassed within the definition of the\n\ninteraction constants J 0 , 1 , 2 . As sketched in Fig. 1, the\n\nmagnetic ions are located on the sites of a body-centered\n\ntetragonal (BCT) lattice; the first sum appearing in the\n\nHamiltonian describes the in-plane ( xy ) nearest neigh-\n\nbor (NN) interaction, which is taken ferromagnetic (FM),\n\nwith exchange strength J 0 > 0; the second sum rep-\n\nresents the coupling, of exchange strength J 1 , between\n\nspins belonging to nearest neighbor (NN) planes along\n\nthe z -direction (which we will assume to coincide with\n\nthe film growth direction); finally, the third sum takes\n\ninto account the interaction, of exchange strength J 2 , be-\n\ntween spins lying on next-nearest neighbor (NNN) planes\n\nalong z . In order to have frustration, giving rise to non-\n\ncollinear order along z in the bulk, NN interaction J 1\n\ncan be taken both ferro- or antiferromagnetic, but NNN\n\ncoupling J 2 has necessarily to be antiferromagnetic, and\n\nthe condition | J 2 | > | J 1 | / 4 must be fulfilled. Such simpli-\n\nfied Hamiltonian was already employed to simulate he- lical ordering in bulk systems by Diep 1,17 and Loison 18 .\n\nIn the bulk limit, the state of minimal energy of a sys-\n\ntem described by Eq.(1) corresponds to a helical arrange-\n\nment of spins. The ground state energy per spin is equal\n\nto e g ( Q z ) = [ − 4 J 0 − 2 J 1 (4 cos ( Q z c ) + δ cos (2 Q z c ))] where c is the distance between NN layers, δ = J 2\n\nJ 1 ,\n\nand Q z c = arccos � − 1 δ � is the angle between spins ly-\n\ning on adjacent planes along the z -direction. The ob-\n\nserved helical arrangement in bulk holmium corresponds", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "measurements were performed on beamline I06 at the\n\nDiamond Light Source, and on beamline 4.0.2 at the Ad-\n\nvanced Light Source. Total-electron yield (TEY) and\n\nfluorescence yield (FY) were monitored simultaneously\n\nusing the sample drain current and the photocurrent of a\n\ndiode mounted at 90 to the incident beam, respectively.\n\nSQUID magnetometry measurements were\n\nfirst performed on control Fe/GaAs(001) and\n\n(Ga,Mn)As/GaAs(001) samples, grown under the\n\nsame conditions as the bilayers, to determine the\n\nmagnetic anisotropies of the individual layers and the\n\nCurie temperature of the (Ga,Mn)As layer. The Fe film\n\nhas a uniaxial magnetic anisotropy with easy axis along\n\nthe [110] orientation, similar to previous studies 6 . For\n\nthe (Ga,Mn)As control sample, there is a competition\n\nbetween cubic and uniaxial magnetic anisotropies, with\n\nthe former dominant at low temperatures and favoring\n\neasy axes along the in-plane ⟨ 100 ⟩ orientations, and the\n\nlatter dominant close to T C ( ∼ 35 K) giving an easy axis\n\nalong the [1 ¯ 10] orientation. Figure 1 shows [110] magne-\n\ntization versus temperature curves and low temperature\n\nhysteresis loops for a bilayer film containing a 20 nm\n\nthick (Ga,Mn)As layer. The total remnant moment of\n\nthe bilayer film decreases on cooling under zero magnetic\n\nfield below the T C of the (Ga,Mn)As, indicating that\n\nthis layer aligns antiparallel to the Fe magnetization\n\nat zero field. The hysteresis curve shows a two-step\n\nmagnetization reversal, indicating different behavior of\n\nthe Fe and (Ga,Mn)As layers, with the smaller loop\n\nattributed to the dilute moment (Ga,Mn)As film. The\n\nminor hysteresis loop shown in Fig. 1 clearly shows a\n\nshift from zero field by a bias field H E , indicating that\n\nthe Fe layer induces an exchange bias in the magnetic\n\nsemiconductor. The shape and size of the minor loop\n\nis in agreement with the hysteresis loop for the control\n\n(Ga,Mn)As sample, also shown in Fig. 1. This strongly\n\nindicates that the exchange bias affects the whole of the\n\n(Ga,Mn)As layer in the bilayer sample.\n\nSimilar behavior is observed for bilayer samples con-\n\ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a\n\nbias field which is approximately inversely proportional\n\nto the thickness d of the ferromagnetic semiconductor\n\nlayer (Fig. 1, inset). This 1/ d dependence of H E was found previously for MnAs/(Ga,Mn)As bilayers 4 , and\n\nis generally observed in exchanged-biased thin films 12 .\n\nFrom this dependence it is possible to describe the ex-\n\nchange bias in terms of an interface energy per unit area,\n\n∆ E = M F S H E d = 0 . 003 erg/cm 2 . This value is rather\n\nsmall compared to typical exchange bias systems 12 , re-\n\nflecting the low moment density M F S of the diluted\n\nFM semiconductor layer. However, the bias field for a\n\ngiven (Ga,Mn)As thickness is larger than is observed for\n\nMnO/(Ga,Mn)As structures 13 , while the reproducibility\n\nand flexibility of the present structures is much higher\n\ndue to the single-crystalline ferromagnetic nature of the\n\nFe layer.\n\nTo confirm the presence of AFM interlayer coupling,\n\nwe performed XMCD measurements at the Mn and Fe\n\nL 2 , 3 absorption edges in order to determine the magnetic\n\nresponse of the individual elements. In L 2 , 3 XMCD, elec-\n\ntrons are excited from a 2 p core level to the unoccupied\n\n3 d valence states of the element of interest by circularly\n\npolarized x-rays at the resonance energies of the transi-\n\ntions. The difference in absorption for opposite polariza-\n\ntions gives a direct and element-specific measurement of\n\nthe projection of the 3 d magnetic moment along the x-\n\nray polarization vector. The absorption cross-section is\n\nconventionally obtained by measuring the decay products\n\n- either fluorescent x-rays or electrons - of the photoex-\n\ncited core hole. The type of decay product measured\n\ndetermines the probing depth of the technique. For Mn", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "modeling of bulk Holmium. Such Hamiltonian, proposed\n\nby Bohr et al. 16 , allows for competitive middle-range in-\n\nteractions by including six different exchange constants\n\nalong the c crystallographic axis, and gives a helix pitch\n\nwave-vector Q z such that Q z c ≃ 30 , where c = c/ 2 is\n\nthe distance between nearest neighboring spin layers par-\n\nallel to the ab crystallographic planes, henceforth denoted\n\nalso as x − y planes, while z will be taken parallel to c .\n\nFor n > 16, n being the number of spin layers in the film,\n\na correct bulk limit is reached, while for lower n the film\n\nproperties are clearly affected by the strong competition\n\namong the helical pitch and the surface effects, which in-\n\nvolve the majority of the spin layers. In the thickness\n\nrange n = 9 − 16, i.e. right for thickness values com-\n\nparable with the helical pitch, three different magnetic\n\nphases emerged, with the high-temperature, disordered,\n\nparamagnetic phase and the low-temperature, long-range\n\nordered one separated by an intriguing, intermediate-\n\ntemperature block phase, where outer ordered layers co-\n\nexist with some inner disordered ones, the phase tran-\n\nsition of the latter eventually displaying the signatures\n\nof a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film\n\ncollapses once and for all to a quasi-collinear order.\n\nThe complex phase diagram unveiled by such MC sim-\n\nulations awaken however a further intriguing question:\n\nto what extent the observed behavior may be considered\n\na simple consequence of the competition between helical\n\norder and surface effects? I.e., is it just a matter of hav-\n\ning such a competition or does the range of interactions\n\nalso play a relevant role? Indeed, when the range of the\n\ninteractions is large enough we have a greater number of\n\nplanes which can be thought of as ”surface planes”, i.e.\n\nfor which the number of interacting neighbors are sig-\n\nnificantly reduced with respect to the bulk layers; there-\n\nfore, we expect that the larger the interaction range, the\n\nstronger should be the surface effects. But, at the same\n\ntime, the same modulation of the magnetic order can", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0510.pdf" - }, - { - "text": "- either fluorescent x-rays or electrons - of the photoex-\n\ncited core hole. The type of decay product measured\n\ndetermines the probing depth of the technique. For Mn\n\nL 2 , 3 absorption, the probing depths for FY and TEY de-\n\ntection are λ F Y ≈ 100 nm and λ T EY ≈ 3 nm. In the\n\ncurrent experiment, the Mn XMCD measured using FY\n\nand TEY are thus sensitive to the bulk of the (Ga,Mn)As\n\nfilm and the near-interface layers, respectively.\n\nFigure 2(a)-(c) shows the magnetic field dependence of\n\nXMCD asymmetry, defined as ( I l − I r ) / ( I l + I r ) where\n\nI l ( r ) is the absorption for left- (right-) circularly polarized\n\nx-rays. This is measured at the Fe and Mn L 3 absorption\n\npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K.\n\nThe external field is applied along the photon incidence\n\ndirection, which is at 70 to the surface normal with\n\nan in-plane projection along the [110] axis. The XMCD\n\ndata show that the Fe film displays a square hysteresis\n\nloop with a single magnetization switch, as expected for\n\na monocrystalline Fe film with strong uniaxial magnetic\n\nanisotropy. The Mn XMCD shows a more complicated\n\nloop due to the effect of the interlayer coupling. The pro-\n\njected Mn moment aligns antiparallel to the Fe moment\n\nat remanence, and undergoes a magnetization reversal of\n\nopposite sign to the Fe. With further increase of the ex-\n\nternal magnetic field, the Mn moment gradually rotates\n\naway from antiparallel alignment with the Fe layer, and\n\ninto the field direction. Qualitatively similar behavior\n\nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam-\n\nple: the (Ga,Mn)As layer is aligned antiparallel to the\n\nFe layer at zero field, although the bias field is lower by\n\napproximately a factor of two.\n\nClear differences are observed between the Mn XMCD\n\nhysteresis loops obtained using TEY and FY detection\n\nmodes. For FY the magnitude of the XMCD is similar\n\n(but of opposite sign) at remanence and at high mag-\n\nnetic fields, whereas for TEY at remanence it is approx-\n\nimately a factor of two larger than at 1000 Oe. The\n\nMn L 2 , 3 XMCD spectra recorded at remanence and at\n\n1000 Oe, shown in Fig. 3, confirm this result. At re-\n\nmanence the FY and TEY detected XMCD have similar\n\nmagnitudes. However, under a large external field the\n\nXMCD is substantially smaller in TEY than in FY, con-\n\nfirming that the net magnetization of the Mn ions near\n\nthe interface is significantly less than in the bulk of the\n\n(Ga,Mn)As film. This is the case even up to the high-\n\nest field applied (20 kOe). By applying the XMCD sum rules 14 to the TEY data, and by comparing the spectra to\n\nprevious measurements on well-characterized (Ga,Mn)As", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "[arXiv:1001.0266v2 [cond-mat.str-el] 4 May 2010](http://arxiv.org/abs/1001.0266v2)\n\n## Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin\n\n## Rotation Invariant System\n\nFa Wang 1\n\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\n\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil-\n\ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low\n\nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series\n\nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and\n\ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model\n\nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet\n\nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre-\n\nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this\n\nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2\n\nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the\n\nhigh order spin interactions from more natural couplings, which involves perturbative expansions\n\nthus breaks the exact mapping, although in a controlled manner.\n\nPACS numbers: 75.10.Jm, 75.10.Kt\n\nContents\n\nI. Introduction. 1\n\nII. Formulation of the Pseudo-spin-1/2 from\n\nFour-spin Cluster. 2\n\nIII. Realization of the Kitaev Model. 3\n\nIV. Generate the High Order Physical Spin\n\nInteractions by Perturbative Expansion. 5\n\nA. Generate the High Order Terms by Coupling\n\nto Optical Phonon. 5\n\nB. Generate the High Order Terms by Magnetic\n\nInteractions between Clusters. 7\n\nV. Conclusions. 8\n\nAcknowledgments 8\n\nA. Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins 8\n\nB. Derivation of the Terms Generated by\n\nSecond Order Perturbation of Inter-cluster\n\nMagnetic Interactions 9\n\nReferences 10\n\nI. INTRODUCTION.\n\nKitaev’s exactly solvable spin-1/2 honeycomb lattice model 1 (noted as the Kitaev model hereafter) has in-\n\nspired great interest since its debut, due to its exact\n\nsolvability, fractionalized excitations, and the potential\n\nto realize non-Abelian anyons. The model simply reads\n\nH Kitaev = − � x − links \n\nJ x τ x j τ x k � y − links \n\nJ y τ y j τ y k\n\n− � z − links \n\nJ z τ z j τ z k\n\n(1)\n\nwhere τ x,y,z are Pauli matrices, and x, y, z -links are de- fined in FIG. 1. It was shown by Kitaev 1 that this spin-\n\n1/2 model can be mapped to a model with one Majo-\n\nrana fermion per site coupled to Ising gauge fields on the\n\nlinks. And as the Ising gauge flux has no fluctuation, the\n\nmodel can be regarded as, under each gauge flux config-\n\nuration, a free Majorana fermion problem. The ground\n\nstate is achieved in the sector of zero gauge flux through\n\neach hexagon. The Majorana fermions in this sector have\n\nDirac-like gapless dispersion resembling that of graphene,\n\nas long as | J x | , | J y | , and | J z | satisfy the triangular rela- tion, sum of any two of them is greater than the third\n\none 1 . It was further proposed by Kitaev 1 that opening of\n\nfermion gap by magnetic field can give the Ising vortices\n\nnon-Abelian anyonic statistics, because the Ising vortex\n\nwill carry a zero-energy Majorana mode, although mag-\n\nnetic field destroys the exact solvability.\n\nGreat efforts have been invested to better understand\n\nthe properties of the Kitaev model. For example, sev-\n\neral groups have pointed out that the fractionalized Ma-\n\njorana fermion excitations may be understood from the\n\nmore familiar Jordan-Wigner transformation of 1D spin", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "simulations using the same set of interaction constants\n\nemployed in Refs. 14,15, but using a BCT lattice: the\n\nresults we obtained for ∆ ϕ l with n = 12 are reported in\n\nFig. 9. The latter is absolutely similar to Fig.7 of Ref. 15\n\nand clearly displays the footmarks of the block phase (see\n\ndown-triangle), with two external blocks of ordered layers\n\n( l =1. . . 5 and 8. . . 12 ), where ∆ ϕ l is roughly 10 , sep-\n\narated by a block of disordered layers, and with almost", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0510.pdf" - }, - { - "text": "and Q z c = arccos � − 1 δ � is the angle between spins ly-\n\ning on adjacent planes along the z -direction. The ob-\n\nserved helical arrangement in bulk holmium corresponds\n\nto Q z c ≃ 30 . 5 10 : such value can be obtained from\n\nthe formula above with the set of coupling constants\n\nJ 0 =67.2 K, J 1 =20.9 K, and J 2 = − 24.2 K, that we have\n\nemployed in our simulations. The given values for the ex-\n\nchange constants are the same already used by Weschke\n\net al. in Ref. 13 to interpret experimental data on\n\nHolmium films on the basis of a J 1 − J 2 model, after\n\na proper scaling by the numbers of NN and NNN on\n\nneighboring layers of a BCT lattice.\n\nIn the following we will denote with n the film thick-\n\nness, i.e. the number of spin layers along the z direction,\n\nand with L × L the number of spins in each layer (i.e., L\n\nis the lattice size along both the x and y directions). In\n\nour simulations thickness values from 1 to 24 were con-\n\nsidered, while the range of lateral size L was from 8 to\n\n64. Periodic boundary conditions were applied along x\n\nand y , while free boundaries were obviously taken along\n\nthe film growth direction z .\n\nThermal equilibrium was attained by the usual\n\nMetropolis algorithm 19 , supplemented by the over- relaxed technique 20 in order to speed-up the sampling\n\nof the spin configuration space: a typical “Monte Carlo\n\nstep” was composed by four Metropolis and four-five\n\nover-relaxed moves per particle. Such judicious mix of\n\nmoves is able both to get faster the thermal equilibrium\n\nand to minimize the correlation “time” between succes-\n\nsive samples, i.e. the undesired effects due to lack of in-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "y x z z z\n\nz z z z\n\nz z\n\ny y\n\ny\n\nx\n\nx x\n\nx x x\n\ny y y\n\ny\n\nx\n\ny\n\nx\n\nz\n\nz\n\ny y\n\nx x x\n\ny\n\nz x\n\nx\n\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled\n\nand open circles indicate two sublattices. x, y, z label the links\n\nalong three different directions used in (1).\n\nderived as well. There have been several proposals to\n\nopen the fermion gap for the non-Abelian phase without\n\nspoiling exact solvability 4,6 . And many generalizations\n\nto other(even 3D) lattices have been developed in the\n\nlast few years 10- 16 . All these efforts have significantly\n\nenriched our knowledge of exactly solvable models and\n\nquantum phases of matter.\n\nHowever, in the original Kitaev model and its later\n\ngeneralizations in the form of spin models, spin rotation\n\nsymmetry is explicitly broken. This makes them harder\n\nto realize in solid state systems. There are many pro-\n\nposals to realized the Kitaev model in more controllable\n\nsituations, e.g. in cold atom optical lattices 17,18 , or in\n\nsuperconducting circuits 19 . But it is still desirable for\n\ntheoretical curiosity and practical purposes to realize the\n\nKitaev-type models in spin rotation invariant systems.\n\nIn this paper we realize the Kitaev honeycomb lattice\n\nmodel as the low energy Hamiltonian for a spin rotation\n\ninvariant system. The trick is not to use the physical spin\n\nas the spin in the Kitaev model, instead the spin-1/2 in\n\nKitaev model is from some emergent two-fold degener-\n\nate low energy states in the elementary unit of physical\n\nsystem. This type of idea has been explored recently by\n\nJackeli and Khaliullin 20 , in which the spin-1/2 in the Ki-\n\ntaev model is the low energy Kramers doublet created by\n\nstrong spin-orbit coupling of t 2 g orbitals. In the model\n\npresented below, the Hilbert space of spin-1/2 in the Ki-\n\ntaev model is actually the two dimensional spin singlet\n\nsector of four antiferromagnetically coupled spin-1/2 mo-\n\nments, and the role of spin-1/2 operators(Pauli matrices)\n\nin the Kitaev model is replaced by certain combinations\n\nof S j · S k [or the spin-chirality S j · ( S k × S ℓ )] between the\n\nfour spins.\n\nOne major drawback of the model to be presented is\n\nthat it contains high order spin interactions(involves up\n\nto six or eight spins), thus is still unnatural. However it\n\nopens the possibility to realize exotic (exactly solvable)\n\nmodels from spin-1/2 Hamiltonian with spin rotation in-\n\nvariant interactions. We will discuss two possible routes\n\nto reduce this artificialness through controlled perturba-\n\ntive expansions, by coupling to optical phonons or by\n\nmagnetic couplings between the elementary units.\n\nThe outline of this paper is as follows. In Section II\n\nwe will lay out the pseudo-spin-1/2 construction. In Sec-\n\n4\n\n2 3\n\n1\n\n*z* *z*\n\n*x*\n\n*x*\n\n*y*\n\n*y*\n\n2 3\n\n4\n\n1\n\nFIG. 2: Left: the physical spin lattice for the model (8). The\n\ndash circles are honeycomb lattice sites, each of which is ac-\n\ntually a cluster of four physical spins. The dash straight lines\n\nare honeycomb lattice bonds, with their type x, y, z labeled.\n\nThe interaction between clusters connected by x, y, z bonds\n\nare the J x,y,z terms in (8) or (9) respectively. Note this is not the 3-12 lattice used in Ref. 9,10 . Right: enlarged picture of\n\nthe clusters with the four physical spins labeled as 1 , . . . , 4.\n\nThick solid bonds within one cluster have large antiferromag-\n\nnetic Heisenberg coupling J cluster .\n\ntion III the Kitaev model will be explicitly constructed\n\nusing this formalism, and some properties of this con-\n\nstruction will be discussed. In Section IV we will discuss\n\ntwo possible ways to generate the high order spin in-\n\nteractions involved in the construction of Section III by\n\nperturbative expansions. Conclusions and outlook will\n\nbe summarized in Section V.\n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2\n\nFROM FOUR-SPIN CLUSTER.\n\nIn this Section we will construct the pseudo-spin-1/2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "ment at T N (16). However, due to helix distortion in the\n\nsurface regions, the maximum of S (0 , 0 , q z ) stabilizes at\n\nvalues of q z sensibly smaller (e.g. Q z ( T N (16)) ≈ 16 ,\n\nand Q z ( T = 10 K ) ≈ 28 ) with respect to the bulk one\n\n( Q Ho z = 30 . 5 ).\n\nThe MC simulations outcomes for n = 16 we just pre-\n\nsented appear quite different with respect to those ob-\n\ntained at the same thickness for the model with six cou-\n\npling constants along the z direction 14,15 . Indeed, for\n\nthe J 1 - J 2 model here investigated, we observe that all\n\nlayers order at the same temperature, and we do not find\n\nany hint of the block-phase, with inner disordered planes\n\nintercalated to antiparallel quasi -FM four-layer blocks,\n\npreviously observed; sample MC runs we made using the\n\nsame hcp lattice employed in Refs. 14,15 shows that the\n\npresence or absence of the block phase is not related to\n\nthe lattice geometry, but it is a consequence of the inter-\n\naction range only.\n\nWe now move to describe and discuss MC simulation\n\ndata for thinner samples. A graphical synthesis of the\n\nresults obtained for n = 8 in reported in Fig. 4a-d. The\n\nspecific heat c v , shown in Figs. 4a, reveals very small\n\nfinite-size effects, which, however, cannot be unambigu-\n\nously detected for the largest lattice size ( L = 64), as\n\nthey fall comfortably within the error range. Surpris-\n\ningly, the specific heat maximum is located close to the\n\nbulk transition temperature as found for n = 16, and", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0510.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0510.pdf", - "query": "What is the minimum number of spin layers in a film before a correct bulk is reached ?", - "target_page": 1, - "target_passage": "For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "modeling of bulk Holmium. Such Hamiltonian, proposed\n\nby Bohr et al. 16 , allows for competitive middle-range in-\n\nteractions by including six different exchange constants\n\nalong the c crystallographic axis, and gives a helix pitch\n\nwave-vector Q z such that Q z c ≃ 30 , where c = c/ 2 is\n\nthe distance between nearest neighboring spin layers par-\n\nallel to the ab crystallographic planes, henceforth denoted\n\nalso as x − y planes, while z will be taken parallel to c .\n\nFor n > 16, n being the number of spin layers in the film,\n\na correct bulk limit is reached, while for lower n the film\n\nproperties are clearly affected by the strong competition\n\namong the helical pitch and the surface effects, which in-\n\nvolve the majority of the spin layers. In the thickness\n\nrange n = 9 − 16, i.e. right for thickness values com-\n\nparable with the helical pitch, three different magnetic\n\nphases emerged, with the high-temperature, disordered,\n\nparamagnetic phase and the low-temperature, long-range\n\nordered one separated by an intriguing, intermediate-\n\ntemperature block phase, where outer ordered layers co-\n\nexist with some inner disordered ones, the phase tran-\n\nsition of the latter eventually displaying the signatures\n\nof a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film\n\ncollapses once and for all to a quasi-collinear order.\n\nThe complex phase diagram unveiled by such MC sim-\n\nulations awaken however a further intriguing question:\n\nto what extent the observed behavior may be considered\n\na simple consequence of the competition between helical\n\norder and surface effects? I.e., is it just a matter of hav-\n\ning such a competition or does the range of interactions\n\nalso play a relevant role? Indeed, when the range of the\n\ninteractions is large enough we have a greater number of\n\nplanes which can be thought of as ”surface planes”, i.e.\n\nfor which the number of interacting neighbors are sig-\n\nnificantly reduced with respect to the bulk layers; there-\n\nfore, we expect that the larger the interaction range, the\n\nstronger should be the surface effects. But, at the same\n\ntime, the same modulation of the magnetic order can", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0510.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has\n\nbeen proposed 38 .\n\nOur model (8) is achieved at second order of the per-\n\nturbation series. Higher order terms become trunca-\n\ntion errors but may be controlled by small parameters\n\nλ x,y,z /J cluster ∼ � | J x,y,z | /J cluster .\n\nV. CONCLUSIONS.\n\nWe constructed the exactly solvable Kitaev honeycomb model 1 as the exact low energy effective Hamiltonian of\n\na spin-1/2 model [equations (8) or (9)] with spin-rotation\n\nand time reversal symmetry. The spin in Kitaev model is\n\nrepresented as the pseudo-spin in the two-fold degenerate\n\nspin singlet subspace of a cluster of four antiferromag-\n\nnetically coupled spin-1/2 moments. The physical spin\n\nmodel is a honeycomb lattice of such four-spin clusters,\n\nwith certain inter-cluster interactions. The machinery\n\nfor the exact mapping to pseudo-spin Hamiltonian was\n\ndeveloped (see e.g. TABLE I), which is quite general\n\nand can be used to construct other interesting (exactly\n\nsolvable) spin-1/2 models from spin rotation invariant\n\nsystems.\n\nIn this construction the pseudo-spin correlations in the\n\nKitaev model will be mapped to dimer or spin-chirality\n\ncorrelations in the physical spin system. The correspond-\n\ning picture of the fractionalized Majorana fermion exci-\n\ntations and Ising vortices still remain to be clarified.\n\nThis exact construction contains high order physical\n\nspin interactions, which is undesirable for practical im-\n\nplementation. We described two possible approaches to\n\nreduce this problem: generating the high order spin in-\n\nteractions by perturbative expansion of the coupling to\n\noptical phonon, or the magnetic coupling between clus-\n\nters. This perturbative construction will introduce trun-\n\ncation error of perturbation series, which may be con-\n\ntrolled by small expansion parameters. Whether these\n\nconstructions can be experimentally engineered is how-\n\never beyond the scope of this study. It is conceivable that\n\nother perturbative expansion can also generate these high\n\norder spin interactions, but this possibility will be left for\n\nfuture works.\n\nAcknowledgments\n\nThe author thanks Ashvin Vishwanath, Yong-Baek\n\nKim and Arun Paramekanti for inspiring discussions, and\n\nTodadri Senthil for critical comments. The author is sup-\n\nported by the MIT Pappalardo Fellowship in Physics.\n\nAppendix A: Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins\n\nIn this Appendix we reproduce from Ref. 35 the cou-\n\nplings of all tetrahedron distortion modes to the spin\n\nsystem. And convert them to pseudo-spin notation in\n\nthe physical spin singlet sector.\n\nConsider a general small distortion of the tetrahedron,\n\nthe spin Hamiltonian becomes\n\nH cluster , SL = ( J cluster / 2)( � ℓ\n\nS ℓ ) 2 + J ′ is the derivative of J cluster with respect to\n\nbond length.\n\nThere are six orthogonal distortion modes of the tetra-\n\nhedron [TABLE 1.1 in Ref. 35 ]. One of the modes A is the\n\ntrivial representation of the tetrahedral group T d ; two E\n\nmodes form the two dimensional irreducible representa-\n\ntion of T d ; and three T 2 modes form the three dimen-\n\nsional irreducible representation. The E modes are also\n\nillustrated in FIG. 3.\n\nThe generic couplings in (A1) [second term] can be\n\nconverted to couplings to these orthogonal modes,\n\nJ ( Q A f A + Q E 1 f E 1 + Q E 2 f E 2 + Q T 2 1 f T 2 1 + Q T 2 2 f T 2 2 + Q T 2 3 f T 2 3 )", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "[arXiv:1001.0266v2 [cond-mat.str-el] 4 May 2010](http://arxiv.org/abs/1001.0266v2)\n\n## Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin\n\n## Rotation Invariant System\n\nFa Wang 1\n\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\n\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil-\n\ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low\n\nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series\n\nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and\n\ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model\n\nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet\n\nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre-\n\nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this\n\nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2\n\nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the\n\nhigh order spin interactions from more natural couplings, which involves perturbative expansions\n\nthus breaks the exact mapping, although in a controlled manner.\n\nPACS numbers: 75.10.Jm, 75.10.Kt\n\nContents\n\nI. Introduction. 1\n\nII. Formulation of the Pseudo-spin-1/2 from\n\nFour-spin Cluster. 2\n\nIII. Realization of the Kitaev Model. 3\n\nIV. Generate the High Order Physical Spin\n\nInteractions by Perturbative Expansion. 5\n\nA. Generate the High Order Terms by Coupling\n\nto Optical Phonon. 5\n\nB. Generate the High Order Terms by Magnetic\n\nInteractions between Clusters. 7\n\nV. Conclusions. 8\n\nAcknowledgments 8\n\nA. Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins 8\n\nB. Derivation of the Terms Generated by\n\nSecond Order Perturbation of Inter-cluster\n\nMagnetic Interactions 9\n\nReferences 10\n\nI. INTRODUCTION.\n\nKitaev’s exactly solvable spin-1/2 honeycomb lattice model 1 (noted as the Kitaev model hereafter) has in-\n\nspired great interest since its debut, due to its exact\n\nsolvability, fractionalized excitations, and the potential\n\nto realize non-Abelian anyons. The model simply reads\n\nH Kitaev = − � x − links \n\nJ x τ x j τ x k � y − links \n\nJ y τ y j τ y k\n\n− � z − links \n\nJ z τ z j τ z k\n\n(1)\n\nwhere τ x,y,z are Pauli matrices, and x, y, z -links are de- fined in FIG. 1. It was shown by Kitaev 1 that this spin-\n\n1/2 model can be mapped to a model with one Majo-\n\nrana fermion per site coupled to Ising gauge fields on the\n\nlinks. And as the Ising gauge flux has no fluctuation, the\n\nmodel can be regarded as, under each gauge flux config-\n\nuration, a free Majorana fermion problem. The ground\n\nstate is achieved in the sector of zero gauge flux through\n\neach hexagon. The Majorana fermions in this sector have\n\nDirac-like gapless dispersion resembling that of graphene,\n\nas long as | J x | , | J y | , and | J z | satisfy the triangular rela- tion, sum of any two of them is greater than the third\n\none 1 . It was further proposed by Kitaev 1 that opening of\n\nfermion gap by magnetic field can give the Ising vortices\n\nnon-Abelian anyonic statistics, because the Ising vortex\n\nwill carry a zero-energy Majorana mode, although mag-\n\nnetic field destroys the exact solvability.\n\nGreat efforts have been invested to better understand\n\nthe properties of the Kitaev model. For example, sev-\n\neral groups have pointed out that the fractionalized Ma-\n\njorana fermion excitations may be understood from the\n\nmore familiar Jordan-Wigner transformation of 1D spin", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "be summarized in Section V.\n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2\n\nFROM FOUR-SPIN CLUSTER.\n\nIn this Section we will construct the pseudo-spin-1/2\n\nfrom a cluster of four physical spins, and map the phys-\n\nical spin operators to pseudo-spin operators. The map-\n\nping constructed here will be used in later Sections to\n\nconstruct the effective Kitaev model. In this Section we\n\nwill work entirely within the four-spin cluster, all unspec-\n\nified physical spin subscripts take values 1 , . . . , 4.\n\nConsider a cluster of four spin-1/2 moments(called\n\nphysical spins hereafter), labeled by S 1 ,..., 4 , antiferro-\n\nmagnetically coupled to each other (see the right bot-\n\ntom part of FIG. 2). The Hamiltonian within the clus-\n\nter(up to a constant) is simply the Heisenberg antiferro-\n\nmagnetic(AFM) interactions,\n\nH cluster = ( J cluster / 2) ( S 1 + S 2 + S 3 + S 4 ) 2 (2)\n\nThe energy levels should be apparent from this form:\n\none group of spin-2 quintets with energy 3 J cluster , three\n\ngroups of spin-1 triplets with energy J cluster , and two spin\n\nsinglets with energy zero. We will consider large positive", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "Another note to take is that it is not necessary to have\n\nsuch a highly symmetric cluster Hamiltonian (2). The\n\nmappings to pseudo-spin-1/2 should work as long as the\n\nground states of the cluster Hamiltonian are the two-fold\n\ndegenerate singlets. One generalization, which conforms\n\nthe symmetry of the lattice in FIG. 2, is to have\n\nH cluster = ( J cluster / 2)( r · S 1 + S 2 + S 3 + S 4 ) 2 (11)\n\nwith J cluster > 0 and 0 < r < 3. However this is not\n\nconvenient for later discussions and will not be used.\n\nWe briefly describe some of the properties of (8). Its\n\nlow energy states are entirely in the space that each of the\n\nclusters is a physical spin singlet (called cluster singlet\n\nsubspace hereafter). Therefore physical spin correlations\n\nare strictly confined within each cluster. The excitations\n\ncarrying physical spin are gapped, and their dynamics\n\nare ‘trivial’ in the sense that they do not move from one\n\ncluster to another. But there are non-trivial low energy\n\nphysical spin singlet excitations, described by the pseudo-\n\nspins defined above. The correlations of the pseudo-spins\n\ncan be mapped to correlations of their corresponding\n\nphysical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ x,y correlations become certain dimer-dimer correlations, τ z correlation\n\nbecomes chirality-chirality correlation, or four-dimer cor-\n\nrelation. It will be interesting to see the corresponding\n\npicture of the exotic excitations in the Kitaev model, e.g.\n\nthe Majorana fermion and the Ising vortex. However this\n\nwill be deferred to future studies.\n\nIt is tempting to call this as an exactly solved spin liq-\n\nuid with spin gap ( ∼ J cluster ), an extremely short-range\n\nresonating valence bond(RVB) state, from a model with\n\nspin rotation and time reversal symmetry. However it\n\nshould be noted that the unit cell of this model contains\n\nan even number of spin-1/2 moments (so does the orig-\n\ninal Kitaev model) which does not satisfy the stringent\n\ndefinition of spin liquid requiring odd number of elec-\n\ntrons per unit cell. Several parent Hamiltonians of spin\n\nliquids have already been constructed. See for example,\n\nRef. 24- 27 .\n\nIV. GENERATE THE HIGH ORDER PHYSICAL\n\nSPIN INTERACTIONS BY PERTURBATIVE\n\nEXPANSION.\n\nOne major drawback of the present construction is that\n\nit involves high order interactions of physical spins[see\n\n(8) and (9)], thus is ‘unnatural’. In this Section we will\n\nmake compromises between exact solvability and natu-\n\nralness. We consider two clusters j and k and try to\n\ngenerate the J x,y,z interactions in (7) from perturbation\n\nseries expansion of more natural(lower order) physical\n\nspin interactions. Two different approaches for this pur-\n\npose will be laid out in the following two Subsections. In\n\nSubsection IV A we will consider the two clusters as two\n\ntetrahedra, and couple the spin system to certain opti-\n\ncal phonons, further coupling between the phonon modes\n\n(a) (b) (c) (d)\n\n(b) (c) (d)\n\n### Q E 2\n\n### Q E 1\n\n(a)\n\n1 1 1 1\n\n1 1 1\n\n2\n\n2\n\n2\n\n2\n\n2\n\n2 2\n\n2\n\n3\n\n3\n\n3 3 3\n\n3 3 4 4\n\n4 4\n\n3\n\n4\n\n4\n\n4\n\n4\n\n1\n\nFIG. 3: Illustration of the tetragonal to orthorhombic\n\nQ E 1 (top) and Q E 2 (bottom) distortion modes. (a) Perspective\n\nview of the tetrahedron. 1 , . . . , 4 label the spins. Arrows in-\n\ndicate the motion of each spin under the distortion mode. (b)\n\nTop view of (a). (c)(d) Side view of (a).\n\nof the two clusters can generate at lowest order the de-\n\nsired high order spin interactions. In Subsection IV B we\n\nwill introduce certain magnetic, e.g. Heisenberg-type, in-\n\nteractions between physical spins of different clusters, at\n\nlowest order(second order) of perturbation theory the de-\n\nsired high order spin interactions can be achieved. These\n\napproaches involve truncation errors in the perturbation\n\nseries, thus the mapping to low energy effect Hamilto-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "(16)\n\nIn (16), we have been able to reduce the four spin in-\n\nteractions in (8) to inter-cluster Heisenberg interactions,\n\nand the six-spin interactions in (8) to inter-cluster spin-\n\nchirality interactions. The inter-cluster Heisenberg cou-\n\nplings in H perturbation x,y may be easier to arrange. The\n\ninter-cluster spin-chirality coupling in H perturbation z ex-\n\nplicitly breaks time reversal symmetry and is probably\n\nharder to implement in solid state systems. However\n\nspin-chirality order may have important consequences\n\nin frustrated magnets 36,37 , and a realization of spin-", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0266.pdf" - }, - { - "text": "gin of the interface magnetism then had to be inferred by\n\ncomparison to a series of reference samples 7 . Demonstra- tion of coupling between the bulk of the layers, i.e. , an\n\nexchange bias effect, would provide direct evidence of the\n\ninterface magnetic order. Moreover, such coupling would\n\noffer new means of manipulating the FM semiconductor\n\nspin state and utilizing the proximity polarization effect\n\nin a spintronic device.\n\nHere, we demonstrate an antiferromagnetic coupling\n\nand exchange bias in Fe/(Ga,Mn)As bilayer films, by\n\ncombining element-specific XMCD measurements and\n\nbulk-sensitive superconducting quantum interference de-\n\nvice (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers 4,5 (and in con-\n\ntrast to AFM coupled FM metal/FM metal exchange bias\n\nstructures 10,11 ) the layers are in direct contact without\n\na non-magnetic spacer in between. We distinguish in-\n\nterface and bulk (Ga,Mn)As layers that are respectively\n\nstrongly and weakly antiferromagnetically coupled to the\n\nFe overlayer. In agreement with Ref. 7 , the interface layer\n\nremains polarized at room temperature.\n\nThe Fe and (Ga,Mn)As layers of the present study\n\nwere both grown by molecular beam epitaxy in the same\n\nultra-high vacuum system, in order to ensure a clean in-\n\nterface between them. The (Ga,Mn)As layer of thickness\n\n10 to 50 nm was deposited on a GaAs(001) substrate\n\nat a temperature of 260 C, using previously established\n\nmethods 3,8 . A low Mn concentration of x ≈ 0 . 03 was\n\nchosen in order to avoid the formation of compensating\n\nMn interstitials. The substrate temperature was then\n\nreduced to ∼ 0 C, before depositing a 2 nm Fe layer,\n\nplus a 2 nm Al capping layer. In-situ reflection high\n\nenergy electron diffraction and ex-situ x-ray reflectivity\n\nand diffraction measurements confirmed that the layers\n\nare single-crystalline with sub-nm interface roughness.\n\nSQUID magnetometry measurements were performed us-\n\ning a Quantum Design Magnetic Property Measurement\n\nSystem. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain\n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally\n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding\n\nexcess thiol one can also vary the properties of the solvent [40].\n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin-\n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the\n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds\n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo-\n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For\n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin-\n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing\n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by\n\nthe solvent. This allows for a better control of the process and enables the use of contrast-enhanced\n\nmicroscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the\n\nregion of the receding contact line of toluene, silicon and air. With both techniques one may find\n\nmono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched\n\npatterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a\n\nmore controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the\n\ninteraction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold\n\ncores. For short chains (C 5 and C 8 ) no formation of branched structures is observed. At similar\n\nconcentrations, well-developed branched structures are formed for longer chains (C 10 and C 12 ).\n\nFor even longer chains (C 14 ), however, one again finds less branching. It also depends on the\n\namount of excess thiol in the solvent (for details see Ref. [40]).\n\nWhen following the evolution of the branched patterns in situ (see the complementary video\n\nmaterial of Ref. [40]), one clearly observes that different processes occur on different lenght\n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate.\n\nThe macroscopic front can be transversely unstable resulting in large-scale ( *>* 100 *µ* m) strongly\n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc-\n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be-\n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this\n\nstage it is possible to appreciate that the seemingly dry region left behind by the front is not at all\n\ndry, but covered by an ultrathin ‘postcursor’ film that is itself unstable. The thickness of this film\n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2669.pdf" - }, - { - "text": "NAWWEPS DO-BOT-BO STABILITY AND CONTROL\n\nattack is capable of producing pro-spin mo- ments of considerable magnitude which con- tribute to the self-sustaining nature of the spin. Also, the large distributed mass of the fuselage in rolling-yawing rotation contributes to inertia moments which flatten the spin and place the aircraft at extreme angles of attack. The spin recovery of the modern high speed airplane involves principles which are similar to those of the spin recovery of the conven- tional airplane. However, the nature of the spin for the modern configuration may involve specific differences in technique necessary to reduce the sideslip and angle of attack. The use of opposite rudder to control the sideslip and effect recovery will depend on the effective- ness of the rudder when the airplane is in the spin. At high positive angles of attack and high sideslip the rudder effectiveness may be reduced and additional anti-spin moments must be provided for rapid recovery. The deflection of ailerons into the spin reduces the autorota- tion rolling moment and can produce adverse yaw to aid the rudder yawing moment in effecting recovery. There may be many other specific differences in the technique necessary to effect spin re- covery . The effectiveness of the rudder during recovery may be altered by the position of elevators or horizontal tail. Generally, full aft stick may be necessary during the initial phase of recovery to increase the effectiveness of the rudder. The use of power during the spin recovery of a propeller powered airplane may or may not aid recovery depending on the specific airplane and the particular nature of the slipstream effects. The use of power during the spin recovery of a jet powered airplane induces no significant or helpful flow but does offer the possibility of a severe compressor stall and adverse gyroscopic moments. Since the airplane is at high angle of attack and sideslip, the flow at the inlet may be very poor and the staI1 limits considerably reduced. These items serve to point out possible dif- ferences in technique required for various con- figurations. The spin recovery specific for\n\n31.1", - "page_start": 328, - "page_end": 328, - "source_file": "00-80T-80.pdf" - }, - { - "text": "and Q z c = arccos � − 1 δ � is the angle between spins ly-\n\ning on adjacent planes along the z -direction. The ob-\n\nserved helical arrangement in bulk holmium corresponds\n\nto Q z c ≃ 30 . 5 10 : such value can be obtained from\n\nthe formula above with the set of coupling constants\n\nJ 0 =67.2 K, J 1 =20.9 K, and J 2 = − 24.2 K, that we have\n\nemployed in our simulations. The given values for the ex-\n\nchange constants are the same already used by Weschke\n\net al. in Ref. 13 to interpret experimental data on\n\nHolmium films on the basis of a J 1 − J 2 model, after\n\na proper scaling by the numbers of NN and NNN on\n\nneighboring layers of a BCT lattice.\n\nIn the following we will denote with n the film thick-\n\nness, i.e. the number of spin layers along the z direction,\n\nand with L × L the number of spins in each layer (i.e., L\n\nis the lattice size along both the x and y directions). In\n\nour simulations thickness values from 1 to 24 were con-\n\nsidered, while the range of lateral size L was from 8 to\n\n64. Periodic boundary conditions were applied along x\n\nand y , while free boundaries were obviously taken along\n\nthe film growth direction z .\n\nThermal equilibrium was attained by the usual\n\nMetropolis algorithm 19 , supplemented by the over- relaxed technique 20 in order to speed-up the sampling\n\nof the spin configuration space: a typical “Monte Carlo\n\nstep” was composed by four Metropolis and four-five\n\nover-relaxed moves per particle. Such judicious mix of\n\nmoves is able both to get faster the thermal equilibrium\n\nand to minimize the correlation “time” between succes-\n\nsive samples, i.e. the undesired effects due to lack of in-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_JWN_2014.pdf", - "query": "What the rough sales amount of the nordstrom.com website ?", - "target_page": 3, - "target_passage": "$2 billion in nordstrom.com sales", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Nordstrom, Inc. and subsidiaries 19\n\nNet Sales (2014 vs. 2013)\n\nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we\n\nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the\n\nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These\n\nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014.\n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared\n\nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number\n\nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics\n\nand Men’s Apparel.\n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top-\n\nperforming geographic regions for full-line stores were the Southeast and Southwest.\n\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales\n\nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and\n\nongoing technology investments to enhance the customer experience.\n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of\n\n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories\n\nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was\n\nflat.\n\nNet Sales (2013 vs. 2012)\n\nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at\n\nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one\n\nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our\n\nsquare footage by 2.9%. The 53 rd week in 2012 contributed approximately $162 in additional net sales.\n\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at\n\nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold\n\nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel.\n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales\n\ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast.\n\nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up\n\n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology\n\ninvestments to enhance the customer experience.\n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013.\n\nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the\n\naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.\n\n####### **Retail Business Gross Profit**\n\nThe following table summarizes the Retail Business gross profit:\n\n**Fiscal year 2014 2013 2012**", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "4\n\n**PART I**\n\n**Item 1. Business.**\n\n####### **DESCRIPTION OF BUSINESS**\n\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one\n\nof the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a\n\nrobust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two\n\nNordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have\n\ntwo reportable segments: Retail and Credit.\n\nAs of March 16, 2015, the **Retail** segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price\n\nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club\n\nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through\n\nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality\n\nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores\n\nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that\n\nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar\n\nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids\n\nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom\n\nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels\n\nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in\n\nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During\n\nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of\n\nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and\n\nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer\n\nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at\n\nany Nordstrom Rack location.\n\nOur **Credit** segment includes our wholly owned federal savings bank, Nordstrom fsb, through which we provide a private label credit card,\n\ntwo Nordstrom Visa credit cards and a debit card. The credit and debit cards feature a loyalty program designed to increase customer visits\n\nand spending. Although the primary purposes of our Credit segment are to foster greater customer loyalty and drive more sales, we also\n\ngenerate revenues from finance charges and other fees on these cards. In addition, we save on interchange fees that the Retail segment\n\nwould incur if our customers used third-party cards.\n\nFor more information about our business and our reportable segments, see Item 7: Management’s Discussion and Analysis of Financial\n\nCondition and Results of Operations and Note 16: Segment Reporting in Item 8: Financial Statements and Supplementary Data.\n\n####### **FISCAL YEAR**\n\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31 st . References to 2014 and all years within this", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**Nordstrom, Inc.**\n\n**Notes to Consolidated Financial Statements**\n\nDollar and share amounts in millions except per share, per option and per unit amounts\n\nNordstrom, Inc. and subsidiaries 41\n\n####### **NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n####### **The Company**\n\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a\n\nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This\n\nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience.\n\nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116\n\n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price\n\nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one\n\nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada.\n\nThrough our Credit segment, we provide our customers with a variety of payment products and services, including a Nordstrom private label\n\ncard, two Nordstrom Visa credit cards and a debit card for Nordstrom purchases. These products also allow our customers to participate in\n\nour loyalty program designed to increase customer visits and spending. Although the primary purposes of our Credit segment are to foster\n\ngreater customer loyalty and drive more sales, we also generate revenues from finance charges and other fees on these cards. In addition,\n\nwe save on interchange fees that the Retail segment would incur if our customers used third-party cards.\n\n####### **Fiscal Year**\n\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31 st . References to 2014 and all years within this\n\ndocument are based on a 52-week fiscal year, except 2012, which is based on a 53-week fiscal year.\n\n####### **Principles of Consolidation**\n\nThe consolidated financial statements include the balances of Nordstrom, Inc. and its subsidiaries. All intercompany transactions and\n\nbalances are eliminated in consolidation.\n\n####### **Use of Estimates**\n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the U.S. requires management to make\n\nestimates and assumptions that affect the reported amounts of assets, liabilities, revenues and expenses, and disclosure of contingent assets\n\nand liabilities during the reporting period. Uncertainties regarding such estimates and assumptions are inherent in the preparation of financial\n\nstatements and actual results may differ from these estimates and assumptions. Our most significant accounting judgments and estimates\n\ninclude the allowance for credit losses, revenue recognition, inventory, goodwill, stock-based compensation and income taxes.\n\n####### **Net Sales**\n\nWe recognize revenue from sales at our retail stores at the point of sale, net of estimated returns and excluding sales taxes. Revenue from\n\nsales to customers shipped directly from our stores, website and catalog, which includes shipping revenue when applicable, is recognized\n\nupon estimated receipt by the customer. We estimate customer merchandise returns based on historical return patterns and reduce sales\n\nand cost of sales accordingly. Activity in the allowance for sales returns, net, for the past three fiscal years is as follows:\n\n**Fiscal year 2014 2013 2012**\n\nAllowance at beginning of year **$128** $116 $103\n\nAdditions **2,129** 1,880 1,724\n\nReturns, net 1 **(2,097)** (1,868) (1,711)\n\n**Allowance at end of year $160** $128 $116", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "16\n\n**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\n\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts\n\n####### **OVERVIEW**\n\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer\n\nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line\n\nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including\n\nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As\n\nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our\n\ncustomers a Nordstrom Rewards loyalty program along with a variety of payment products and services, including credit and debit cards.\n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making\n\nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online.\n\nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer\n\nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there\n\nare significant synergies across channels to create a unique customer experience to gain market share.\n\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom\n\nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected\n\ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales\n\ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position\n\nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations.\n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with\n\nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another\n\nway to provide sought-after brands that appeal to new and existing customers.\n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique\n\nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this\n\nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our\n\npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto\n\nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin.\n\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27\n\nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%.\n\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of\n\nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "to be within two-day ground delivery of\n\napproximately half the population of the\n\nUnited States, which will help improve\n\ndelivery times for customers and help us\n\nmeet their rising expectations.\n\nFinally, in 2014, we acquired Trunk Club,\n\na high-growth personalized men’s clothing\n\nbusiness based on a service model that is highly\n\ncomplementary to our own. We believe Trunk\n\nClub is a natural extension of our business,\n\nand together we will continue to evolve and\n\nbring together the online and ofine worlds\n\nto deliver a great shopping experience.\n\n**OFF-PRICE: NORDSTROM RACK,**\n\n**NORDSTROMRACK.COM AND HAUTELOOK**\n\nWe opened a record 27 new Nordstrom Rack\n\nstores, ending 2014 with 167 stores and on\n\ntrack to meet our long-term growth plans\n\nof 300 stores by 2020. Customers continue\n\nto respond favorably to the treasure-hunt\n\nexperience that defines Nordstrom Rack\n\nstores. As we expand in many markets for the\n\nfirst time, we hope to continue delivering a\n\ngreat experience, as this business represents\n\na terrific opportunity for us to attract new\n\ncustomers. Last year, Nordstrom Rack\n\nwas our biggest source of new customers,\n\nattracting nearly 4 million. Also, a year ago,\n\nwe began accepting returns of HauteLook\n\nand Nordstromrack.com merchandise at any\n\nNordstrom Rack store. This drove nearly\n\n1 million trips to Nordstrom Rack stores in\n\n2014. The Nordstrom Rack customer also\n\ntends to be younger than our full-line customer,\n\nand there is a meaningful opportunity for these\n\ncustomers to begin shopping our full-price\n\nchannels as well. We plan to open 27 more\n\nNordstrom Racks in 2015 across the U.S.\n\n7\n\n**OUR NEW LOOK** FROM WINDOWS THAT BRING THE OUTSIDE IN TO DEPARTMENTS THAT SEAMLESSLY FLOW TOGETHER—\n\nOUR NEW STORE DESIGN CREATES AN EXCITING SPACE THAT CAN CHANGE WITH HOW OUR CUSTOMERS SHOP.\n\n**“** * **I love how you used models with** *\n\n* **physical challenges in your** *\n\n* **Anniversary catalog. Nice work!** *\n\n**”** OUR CUSTOMER, DONNA A.", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 25\n\nNordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter\n\nof 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise\n\nincreased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack.\n\nGross Profit\n\nOur total company gross profit rate decreased 53 basis points compared with the same period in the prior year, primarily due to increased\n\nmarkdowns at Nordstrom Rack.\n\nRetail Selling, General, and Administrative Expenses\n\nOur Retail SG&A rate increased 80 basis points primarily due to expenses related to the acquisition of Trunk Club and ongoing technology\n\nand fulfillment expenses.\n\nCredit Expenses\n\nIn the fourth quarter, expenses for our Credit segment of $54 increased from $38 in the prior year. The increase was primarily driven by\n\nhigher operational expenses resulting from a 6% increase in credit volume during the fourth quarter of 2014. The fourth quarter of 2013 also\n\nincluded the impact of the conversion of our Nordstrom Rewards travel benefit into Nordstrom Notes, which decreased operational expenses\n\nin the prior year.\n\nFor further information on our quarterly results in 2014 and 2013, refer to Note 17: Selected Quarterly Data in the Notes to Consolidated\n\nFinancial Statements in Item 8: Financial Statements and Supplementary Data.\n\n## **2015 Outlook**\n\nOur expectations for 2015 are as follows:\n\nNet sales 7 percent to 9 percent increase\n\nComparable sales 2 percent to 4 percent increase\n\nEarnings per diluted share 1 $3.65 to $3.80\n\n1 This outlook does not include the impact of any future share repurchases.\n\nCapital expenditures, net of property incentives, of approximately $1.2 billion are expected in 2015, an increase from $751 in 2014. The\n\nincrease relates to store expansion, including Canada and Manhattan, and ongoing investments to improve the customer experience through\n\nflagship store remodels and a third fulfillment center expected to open in the second half of the year. To date in 2015, we have opened our\n\nsecond full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional Nordstrom full-line stores in the U.S. and\n\nanother full-line store in Canada during 2015. Planned net store openings are expected to increase our retail square footage by\n\napproximately 6.1%.", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "»› **THE RACK GOES ONLINE** SHOPPING GENIUSES CAN NOW CONTINUE THEIR\n\nSTYLE SEARCH AT NORDSTROMRACK.COM, WHERE CUSTOMERS CAN EASILY\n\nCHOOSE HOW THEY SHOP BOTH HAUTELOOK AND NORDSTROM RACK.\n\nour engagement with customers. In 2014,\n\nwe added more than 1 million new Rewards\n\naccounts, a 15% increase from the previous\n\nyear. We want to give customers more choices\n\nwith our loyalty program, and our goal is to\n\nprovide an integrated multi-tender program in\n\nall stores and online later this year. We know\n\nour Rewards members are many of our most\n\nloyal and best customers. So growing these\n\nrelationships by ofering programs that\n\nappeal to more customers will be beneficial\n\nin the long term.\n\n**CONCLUSION**\n\nOur strategy is based on the customer and will\n\nremain so. Customers’ expectations of speed,\n\nconvenience, personalization and mobile are\n\nincreasing. As we continue on our journey, we\n\nrecognize it’s imperative for us to invest for the\n\nfuture and find ways to make our stores more\n\nconvenient and our online experience richer.\n\nWe believe we are well positioned to deliver a\n\ngreat experience for our customers—no matter\n\nhow they choose to shop with Nordstrom.\n\n9\n\n**Erik B. Nordstrom**\n\nPresident of Nordstrom.com, Nordstrom, Inc.\n\n**Blake W. Nordstrom**\n\nPresident, Nordstrom, Inc.\n\n**Peter E. Nordstrom**\n\nPresident of Merchandising, Nordstrom, Inc.\n\n«‹ **THAT’S A RECORD!** WE OPENED 27 NEW NORDSTROM RACK STORES\n\nIN 2014—THE MOST WE’VE EVER OPENED IN ONE YEAR.\n\n**“** * **I don’t think I could’ve** *\n\n* **received better news today.** *\n\n* **Nordstrom Rack has now** *\n\n* **launched online!** *\n\n**”** OUR CUSTOMER, JOANNA D.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "####### **FISCAL YEAR**\n\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31 st . References to 2014 and all years within this\n\ndocument are based on a 52-week fiscal year, except 2012, which is based on a 53-week fiscal year.\n\n####### **TRADEMARKS**\n\nWe have 156 trademarks, each of which is the subject of one or more trademark registrations and/or trademark applications. Our most\n\nnotable trademarks include Nordstrom, Nordstrom Rack, HauteLook, Halogen, BP., Zella, Caslon and Trunk Club. Each of our trademarks is\n\nrenewable indefinitely, provided that it is still used in commerce at the time of the renewal.\n\n####### **RETURN POLICY**\n\nWe have a fair and liberal approach to returns as part of our objective to provide high-quality customer service. We do not have a formal\n\nreturn policy at our Nordstrom full-line stores or online at Nordstrom.com. Our goal is to take care of our customers, which includes making\n\nreturns and exchanges easy, whether in stores or online, where we offer free shipping and free returns. Our Nordstrom Rack stores generally\n\naccept returns up to 90 days from the date of purchase with the original price tag and sales receipt, and also accept returns of\n\nNordstromrack.com and HauteLook merchandise. Nordstromrack.com and HauteLook generally accept returns of apparel, footwear and\n\naccessories within 90 days from the date of shipment.\n\n####### **SEASONALITY**\n\nDue to our Anniversary Sale in July and the holidays in December, our sales are typically higher in the second and fourth quarters than in the\n\nfirst and third quarters of the fiscal year.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 21\n\nCREDIT SEGMENT\n\nThe Nordstrom credit and debit card products are designed to strengthen customer relationships and grow retail sales by providing loyalty\n\nbenefits, valuable services and payment products. We believe our credit business allows us to build deeper relationships with our customers\n\nby fully integrating the Nordstrom Rewards program with our retail stores and providing better service, which in turn fosters greater customer\n\nloyalty. Our cardholders tend to visit our stores more frequently and spend more with us than non-cardholders. Our Nordstrom private label\n\ncredit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com,\n\nNordstromrack.com and HauteLook (“inside volume”), while our Nordstrom Visa credit cards also may be used for purchases outside of\n\nNordstrom (“outside volume”). Cardholders participate in the Nordstrom Rewards program through which cardholders accumulate points for\n\ntheir purchases. Upon reaching a certain points threshold, cardholders receive Nordstrom Notes ® , which can be redeemed for goods or\n\nservices at Nordstrom full-line stores in the U.S. and Canada, Nordstrom Rack stores and at Nordstrom.com. Nordstrom Rewards customers\n\nreceive reimbursements for alterations, get Personal Triple Points days and have early access to sales events. With increased spending,\n\nthey can receive additional amounts of these benefits as well as access to exclusive fashion and shopping events.\n\nIn May 2014, we announced our plan to review options for a potential financial partner for our credit card receivables portfolio. We intend to\n\nexecute a transaction only if our strategic and financial requirements are met. In the event a transaction is finalized, we will classify the\n\nrelevant credit card receivables as held for sale, which could result in a gain or loss upon reclassification.\n\n####### **Summary**\n\nThe table below provides a detailed view of the operational results of our Credit segment, consistent with Note 16: Segment Reporting in the\n\nNotes to Consolidated Financial Statements of Item 8: Financial Statements and Supplementary Data. In order to better reflect the economic\n\ncontribution of our credit and debit card program, intercompany merchant fees are also included in the table below, which represent the\n\nestimated costs that would be incurred if our cardholders used third-party cards instead of ours.\n\nInterest expense at the Credit segment is equal to the amount of interest related to securitized debt plus an amount assigned to the Credit\n\nsegment in proportion to the estimated debt and equity needed to fund our credit card receivables. Based on our research, debt as a\n\npercentage of credit card receivables for other credit card companies ranges from 70% to 90%. As such, we believe a mix of 80% debt and\n\n20% equity is appropriate, and therefore assign interest expense to the Credit segment as if it carried debt of up to 80% of the credit card\n\nreceivables. Our average credit card receivable investment metric below represents the remaining 20% to fund our credit card receivables.\n\n**Fiscal year 2014 2013 2012**\n\n**Amount**\n\n**% of average credit card receivables 1 Amount**\n\n**% of average credit card receivables 1 Amount**\n\n**% of average credit card receivables 1**\n\nCredit card revenues **$396 18.2%** $374 17.7% $372 17.9%\n\nCredit expenses **(194) (8.9%)** (186) (8.8%) (190) (9.1%)\n\n**Earnings before interest and income taxes 2 202 9.3%** 188 8.9% 182 8.8%\n\nInterest expense **(18) (0.8%)** (24) (1.2%) (26) (1.2%)\n\nIntercompany merchant fees **108 5.0%** 97 4.6% 89 4.3%\n\n**Credit segment contribution, before income taxes $292 13.5%** $261 12.4% $245 11.8%\n\nCredit and debit card volume 3 :\n\nOutside **$4,331** $4,273 $4,305\n\nInside **5,475** 4,935 4,484\n\nTotal volume **$9,806** $9,208 $8,789", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "20\n\nGross Profit (2014 vs. 2013)\n\nOur Retail gross profit rate decreased 52 basis points compared with 2013 due to increased markdowns and Nordstrom Rack’s accelerated\n\nstore expansion. The growth in Nordstrom Rack stores resulted in a higher occupancy expense as sales volume at new stores typically take\n\nseveral years to reach the average of our mature stores and also have substantial pre-opening costs. Retail gross profit increased $275 in\n\n2014 due to an increase in net sales, partially offset by increased markdowns.\n\nOur inventory turnover rate decreased to 4.67 times in 2014, from 5.07 times in 2013. Ending inventory per square foot increased 8.8%\n\ncompared with the same period in 2013, which outpaced the total sales per square foot increase of 3.9% primarily due to planned inventory\n\ngrowth related to Nordstrom Rack and Nordstromrack.com and HauteLook.\n\nGross Profit (2013 vs. 2012)\n\nOur Retail gross profit rate decreased 41 basis points compared with 2012 primarily due to higher expenses associated with the growth in the\n\nNordstrom Rewards customer loyalty program and higher occupancy costs related to Nordstrom Rack’s accelerated store expansion. Retail\n\ngross profit increased $99 in 2013 compared with 2012 due to an increase in net sales at Nordstrom.com and Nordstrom Rack, which was\n\npartially offset by a decrease in full-line net sales and increased occupancy costs related to Nordstrom Rack’s accelerated store expansion.\n\nOur inventory turnover rate decreased to 5.07 times in 2013, from 5.37 times in 2012. This was primarily due to our increased investment in\n\npack and hold inventory at Nordstrom Rack, which helped fuel the growth in that channel. On a per square foot basis, we ended the year with\n\na 9.4% increase in our ending inventory on a 0.8% increase in sales compared with 2012. The increase in ending inventory per square foot\n\nrelative to the increase in sales per square foot was primarily due to the impact of the 53 rd week in 2012, which decreased inventory levels in\n\nour full-line stores and included an additional week of sales in 2012. In 2013, we also planned inventory increases in full-line stores to fuel\n\ngrowth in well-performing merchandise categories and increased our pack and hold inventory at Nordstrom Rack.\n\n####### **Retail Business Selling, General and Administrative Expenses**\n\nRetail Business selling, general and administrative expenses (“Retail SG&A”) are summarized in the following table:\n\n**Fiscal year 2014 2013 2012**\n\nSelling, general and administrative expenses **$3,588** $3,272 $3,172\n\nSelling, general and administrative expenses as a % of net sales **27.4%** 26.9% 27.0%\n\nSelling, General and Administrative Expenses (2014 vs. 2013)\n\nOur Retail SG&A rate increased 48 basis points in 2014 compared with 2013 primarily due to expenses related to the acquisition of Trunk\n\nClub and ongoing fulfillment and technology investments. Our Retail SG&A increased $316 in 2014 due primarily to growth-related\n\ninvestments in fulfillment and technology.\n\nSelling, General and Administrative Expenses (2013 vs. 2012)\n\nOur Retail SG&A rate decreased 8 basis points in 2013 compared with 2012 due to expense leverage from increased sales volume. Our\n\nRetail SG&A expenses increased $100 in 2013 compared with 2012 due primarily to growth-related investments in our ecommerce business,\n\nNordstrom Rack’s accelerated store expansion and Canada pre-opening expenses. The increase also reflected expenses associated with\n\nhigher sales volume and the opening of 22 Nordstrom Rack stores in 2013.", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_JWN_2014.pdf", - "query": "How many employees did Nordstrom count in 2014 ?", - "target_page": 17, - "target_passage": "During 2014, we employed approximately 67,000 employees on a full- or part-time basis.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Nordstrom, Inc.**\n\n**Notes to Consolidated Financial Statements**\n\nDollar and share amounts in millions except per share, per option and per unit amounts\n\nNordstrom, Inc. and subsidiaries 41\n\n####### **NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n####### **The Company**\n\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a\n\nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This\n\nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience.\n\nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116\n\n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price\n\nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one\n\nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada.\n\nThrough our Credit segment, we provide our customers with a variety of payment products and services, including a Nordstrom private label\n\ncard, two Nordstrom Visa credit cards and a debit card for Nordstrom purchases. These products also allow our customers to participate in\n\nour loyalty program designed to increase customer visits and spending. Although the primary purposes of our Credit segment are to foster\n\ngreater customer loyalty and drive more sales, we also generate revenues from finance charges and other fees on these cards. In addition,\n\nwe save on interchange fees that the Retail segment would incur if our customers used third-party cards.\n\n####### **Fiscal Year**\n\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31 st . References to 2014 and all years within this\n\ndocument are based on a 52-week fiscal year, except 2012, which is based on a 53-week fiscal year.\n\n####### **Principles of Consolidation**\n\nThe consolidated financial statements include the balances of Nordstrom, Inc. and its subsidiaries. All intercompany transactions and\n\nbalances are eliminated in consolidation.\n\n####### **Use of Estimates**\n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the U.S. requires management to make\n\nestimates and assumptions that affect the reported amounts of assets, liabilities, revenues and expenses, and disclosure of contingent assets\n\nand liabilities during the reporting period. Uncertainties regarding such estimates and assumptions are inherent in the preparation of financial\n\nstatements and actual results may differ from these estimates and assumptions. Our most significant accounting judgments and estimates\n\ninclude the allowance for credit losses, revenue recognition, inventory, goodwill, stock-based compensation and income taxes.\n\n####### **Net Sales**\n\nWe recognize revenue from sales at our retail stores at the point of sale, net of estimated returns and excluding sales taxes. Revenue from\n\nsales to customers shipped directly from our stores, website and catalog, which includes shipping revenue when applicable, is recognized\n\nupon estimated receipt by the customer. We estimate customer merchandise returns based on historical return patterns and reduce sales\n\nand cost of sales accordingly. Activity in the allowance for sales returns, net, for the past three fiscal years is as follows:\n\n**Fiscal year 2014 2013 2012**\n\nAllowance at beginning of year **$128** $116 $103\n\nAdditions **2,129** 1,880 1,724\n\nReturns, net 1 **(2,097)** (1,868) (1,711)\n\n**Allowance at end of year $160** $128 $116", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 19\n\nNet Sales (2014 vs. 2013)\n\nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we\n\nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the\n\nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These\n\nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014.\n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared\n\nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number\n\nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics\n\nand Men’s Apparel.\n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top-\n\nperforming geographic regions for full-line stores were the Southeast and Southwest.\n\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales\n\nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and\n\nongoing technology investments to enhance the customer experience.\n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of\n\n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories\n\nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was\n\nflat.\n\nNet Sales (2013 vs. 2012)\n\nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at\n\nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one\n\nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our\n\nsquare footage by 2.9%. The 53 rd week in 2012 contributed approximately $162 in additional net sales.\n\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at\n\nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold\n\nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel.\n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales\n\ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast.\n\nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up\n\n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology\n\ninvestments to enhance the customer experience.\n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013.\n\nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the\n\naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.\n\n####### **Retail Business Gross Profit**\n\nThe following table summarizes the Retail Business gross profit:\n\n**Fiscal year 2014 2013 2012**", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "4\n\n**PART I**\n\n**Item 1. Business.**\n\n####### **DESCRIPTION OF BUSINESS**\n\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one\n\nof the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a\n\nrobust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two\n\nNordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have\n\ntwo reportable segments: Retail and Credit.\n\nAs of March 16, 2015, the **Retail** segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price\n\nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club\n\nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through\n\nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality\n\nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores\n\nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that\n\nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar\n\nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids\n\nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom\n\nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels\n\nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in\n\nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During\n\nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of\n\nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and\n\nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer\n\nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at\n\nany Nordstrom Rack location.\n\nOur **Credit** segment includes our wholly owned federal savings bank, Nordstrom fsb, through which we provide a private label credit card,\n\ntwo Nordstrom Visa credit cards and a debit card. The credit and debit cards feature a loyalty program designed to increase customer visits\n\nand spending. Although the primary purposes of our Credit segment are to foster greater customer loyalty and drive more sales, we also\n\ngenerate revenues from finance charges and other fees on these cards. In addition, we save on interchange fees that the Retail segment\n\nwould incur if our customers used third-party cards.\n\nFor more information about our business and our reportable segments, see Item 7: Management’s Discussion and Analysis of Financial\n\nCondition and Results of Operations and Note 16: Segment Reporting in Item 8: Financial Statements and Supplementary Data.\n\n####### **FISCAL YEAR**\n\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31 st . References to 2014 and all years within this", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Stores acquired **4** — — **—** —\n\nStores closed **(3)** (2) (1) **(0.4)** — (0.1)\n\n**Total, end of year 292** 260 240 **27.1** 26.0 25.3\n\n1 Other stores include Jeffrey boutiques, Trunk Club showrooms, our Nordstrom Canada full-line store and Last Chance.\n\nWe had no store relocations in 2014, compared with one Nordstrom full-line store and two Nordstrom Rack relocations in 2013 and three\n\nNordstrom Rack relocations in 2012. Our 2014 new store openings increased our square footage by 5.5%.\n\nTo date in 2015, we have opened our second full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional\n\nNordstrom full-line stores in the U.S. and another full-line store in Canada during 2015. Planned net store openings are expected to increase\n\nour retail square footage by approximately 6.1%.", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 21\n\nCREDIT SEGMENT\n\nThe Nordstrom credit and debit card products are designed to strengthen customer relationships and grow retail sales by providing loyalty\n\nbenefits, valuable services and payment products. We believe our credit business allows us to build deeper relationships with our customers\n\nby fully integrating the Nordstrom Rewards program with our retail stores and providing better service, which in turn fosters greater customer\n\nloyalty. Our cardholders tend to visit our stores more frequently and spend more with us than non-cardholders. Our Nordstrom private label\n\ncredit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com,\n\nNordstromrack.com and HauteLook (“inside volume”), while our Nordstrom Visa credit cards also may be used for purchases outside of\n\nNordstrom (“outside volume”). Cardholders participate in the Nordstrom Rewards program through which cardholders accumulate points for\n\ntheir purchases. Upon reaching a certain points threshold, cardholders receive Nordstrom Notes ® , which can be redeemed for goods or\n\nservices at Nordstrom full-line stores in the U.S. and Canada, Nordstrom Rack stores and at Nordstrom.com. Nordstrom Rewards customers\n\nreceive reimbursements for alterations, get Personal Triple Points days and have early access to sales events. With increased spending,\n\nthey can receive additional amounts of these benefits as well as access to exclusive fashion and shopping events.\n\nIn May 2014, we announced our plan to review options for a potential financial partner for our credit card receivables portfolio. We intend to\n\nexecute a transaction only if our strategic and financial requirements are met. In the event a transaction is finalized, we will classify the\n\nrelevant credit card receivables as held for sale, which could result in a gain or loss upon reclassification.\n\n####### **Summary**\n\nThe table below provides a detailed view of the operational results of our Credit segment, consistent with Note 16: Segment Reporting in the\n\nNotes to Consolidated Financial Statements of Item 8: Financial Statements and Supplementary Data. In order to better reflect the economic\n\ncontribution of our credit and debit card program, intercompany merchant fees are also included in the table below, which represent the\n\nestimated costs that would be incurred if our cardholders used third-party cards instead of ours.\n\nInterest expense at the Credit segment is equal to the amount of interest related to securitized debt plus an amount assigned to the Credit\n\nsegment in proportion to the estimated debt and equity needed to fund our credit card receivables. Based on our research, debt as a\n\npercentage of credit card receivables for other credit card companies ranges from 70% to 90%. As such, we believe a mix of 80% debt and\n\n20% equity is appropriate, and therefore assign interest expense to the Credit segment as if it carried debt of up to 80% of the credit card\n\nreceivables. Our average credit card receivable investment metric below represents the remaining 20% to fund our credit card receivables.\n\n**Fiscal year 2014 2013 2012**\n\n**Amount**\n\n**% of average credit card receivables 1 Amount**\n\n**% of average credit card receivables 1 Amount**\n\n**% of average credit card receivables 1**\n\nCredit card revenues **$396 18.2%** $374 17.7% $372 17.9%\n\nCredit expenses **(194) (8.9%)** (186) (8.8%) (190) (9.1%)\n\n**Earnings before interest and income taxes 2 202 9.3%** 188 8.9% 182 8.8%\n\nInterest expense **(18) (0.8%)** (24) (1.2%) (26) (1.2%)\n\nIntercompany merchant fees **108 5.0%** 97 4.6% 89 4.3%\n\n**Credit segment contribution, before income taxes $292 13.5%** $261 12.4% $245 11.8%\n\nCredit and debit card volume 3 :\n\nOutside **$4,331** $4,273 $4,305\n\nInside **5,475** 4,935 4,484\n\nTotal volume **$9,806** $9,208 $8,789", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**Nordstrom, Inc.**\n\n**Notes to Consolidated Financial Statements**\n\nDollar and share amounts in millions except per share, per option and per unit amounts\n\n62\n\n####### **NOTE 16: SEGMENT REPORTING**\n\n####### **Segments**\n\nWe have two reportable segments: **Retail** and **Credit** . Our **Retail** segment includes our “Nordstrom” operating segment, which is composed\n\nof our Nordstrom full-line stores in the U.S. and our online store at Nordstrom.com. Through our multi-channel initiatives, we have integrated\n\nthe operations, merchandising and technology of our Nordstrom full-line and online stores, consistent with our customers’ expectations of a\n\nseamless shopping experience regardless of channel. Our internal reporting to our president, who is our chief operating decision maker, is\n\nconsistent with these multi-channel initiatives. We aggregate our Nordstrom Rack operating segment into the Retail reporting segment, based\n\non similar economic and other qualitative characteristics. Additionally, we include Nordstromrack.com, HauteLook, Jeffrey, Trunk Club and our\n\nCanadian operations in the Retail reporting segment.\n\nThrough our **Credit** segment, we provide our customers with a variety of payment products and services, including a Nordstrom private label\n\ncard, two Nordstrom Visa credit cards and a debit card for Nordstrom purchases. Our credit and debit card products also include a loyalty\n\nprogram that provides benefits to our cardholders based on their level of spending.\n\nAmounts in the **Corporate/Other** column include unallocated corporate expenses and assets, sales return reserve, inter-segment\n\neliminations and other adjustments to segment results necessary for the presentation of consolidated financial results in accordance with\n\ngenerally accepted accounting principles.\n\n####### **Accounting Policy**\n\nIn general, we use the same measurements to compute earnings before income taxes for reportable segments as we do for the consolidated\n\ncompany. However, redemptions of our Nordstrom Notes are included in net sales for our Retail segment. The sales amount in our\n\nCorporate/Other column includes an entry to eliminate these transactions from our consolidated net sales. The related Nordstrom Notes\n\nexpenses are included in our Retail segment at face value. Our Corporate/Other column includes an adjustment to reduce the Nordstrom\n\nNotes expense from face value to their estimated cost. In addition, our sales return reserve and other corporate adjustments are recorded in\n\nthe Corporate/Other column. Other than as described above, the accounting policies of the operating segments are the same as those\n\ndescribed in Note 1: Nature of Operations and Summary of Significant Accounting Policies.", - "page_start": 73, - "page_end": 73, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 25\n\nNordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter\n\nof 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise\n\nincreased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack.\n\nGross Profit\n\nOur total company gross profit rate decreased 53 basis points compared with the same period in the prior year, primarily due to increased\n\nmarkdowns at Nordstrom Rack.\n\nRetail Selling, General, and Administrative Expenses\n\nOur Retail SG&A rate increased 80 basis points primarily due to expenses related to the acquisition of Trunk Club and ongoing technology\n\nand fulfillment expenses.\n\nCredit Expenses\n\nIn the fourth quarter, expenses for our Credit segment of $54 increased from $38 in the prior year. The increase was primarily driven by\n\nhigher operational expenses resulting from a 6% increase in credit volume during the fourth quarter of 2014. The fourth quarter of 2013 also\n\nincluded the impact of the conversion of our Nordstrom Rewards travel benefit into Nordstrom Notes, which decreased operational expenses\n\nin the prior year.\n\nFor further information on our quarterly results in 2014 and 2013, refer to Note 17: Selected Quarterly Data in the Notes to Consolidated\n\nFinancial Statements in Item 8: Financial Statements and Supplementary Data.\n\n## **2015 Outlook**\n\nOur expectations for 2015 are as follows:\n\nNet sales 7 percent to 9 percent increase\n\nComparable sales 2 percent to 4 percent increase\n\nEarnings per diluted share 1 $3.65 to $3.80\n\n1 This outlook does not include the impact of any future share repurchases.\n\nCapital expenditures, net of property incentives, of approximately $1.2 billion are expected in 2015, an increase from $751 in 2014. The\n\nincrease relates to store expansion, including Canada and Manhattan, and ongoing investments to improve the customer experience through\n\nflagship store remodels and a third fulfillment center expected to open in the second half of the year. To date in 2015, we have opened our\n\nsecond full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional Nordstrom full-line stores in the U.S. and\n\nanother full-line store in Canada during 2015. Planned net store openings are expected to increase our retail square footage by\n\napproximately 6.1%.", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "to be within two-day ground delivery of\n\napproximately half the population of the\n\nUnited States, which will help improve\n\ndelivery times for customers and help us\n\nmeet their rising expectations.\n\nFinally, in 2014, we acquired Trunk Club,\n\na high-growth personalized men’s clothing\n\nbusiness based on a service model that is highly\n\ncomplementary to our own. We believe Trunk\n\nClub is a natural extension of our business,\n\nand together we will continue to evolve and\n\nbring together the online and ofine worlds\n\nto deliver a great shopping experience.\n\n**OFF-PRICE: NORDSTROM RACK,**\n\n**NORDSTROMRACK.COM AND HAUTELOOK**\n\nWe opened a record 27 new Nordstrom Rack\n\nstores, ending 2014 with 167 stores and on\n\ntrack to meet our long-term growth plans\n\nof 300 stores by 2020. Customers continue\n\nto respond favorably to the treasure-hunt\n\nexperience that defines Nordstrom Rack\n\nstores. As we expand in many markets for the\n\nfirst time, we hope to continue delivering a\n\ngreat experience, as this business represents\n\na terrific opportunity for us to attract new\n\ncustomers. Last year, Nordstrom Rack\n\nwas our biggest source of new customers,\n\nattracting nearly 4 million. Also, a year ago,\n\nwe began accepting returns of HauteLook\n\nand Nordstromrack.com merchandise at any\n\nNordstrom Rack store. This drove nearly\n\n1 million trips to Nordstrom Rack stores in\n\n2014. The Nordstrom Rack customer also\n\ntends to be younger than our full-line customer,\n\nand there is a meaningful opportunity for these\n\ncustomers to begin shopping our full-price\n\nchannels as well. We plan to open 27 more\n\nNordstrom Racks in 2015 across the U.S.\n\n7\n\n**OUR NEW LOOK** FROM WINDOWS THAT BRING THE OUTSIDE IN TO DEPARTMENTS THAT SEAMLESSLY FLOW TOGETHER—\n\nOUR NEW STORE DESIGN CREATES AN EXCITING SPACE THAT CAN CHANGE WITH HOW OUR CUSTOMERS SHOP.\n\n**“** * **I love how you used models with** *\n\n* **physical challenges in your** *\n\n* **Anniversary catalog. Nice work!** *\n\n**”** OUR CUSTOMER, DONNA A.", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "16\n\n**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\n\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts\n\n####### **OVERVIEW**\n\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer\n\nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line\n\nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including\n\nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As\n\nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our\n\ncustomers a Nordstrom Rewards loyalty program along with a variety of payment products and services, including credit and debit cards.\n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making\n\nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online.\n\nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer\n\nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there\n\nare significant synergies across channels to create a unique customer experience to gain market share.\n\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom\n\nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected\n\ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales\n\ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position\n\nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations.\n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with\n\nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another\n\nway to provide sought-after brands that appeal to new and existing customers.\n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique\n\nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this\n\nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our\n\npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto\n\nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin.\n\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27\n\nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%.\n\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of\n\nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "»› **THE RACK GOES ONLINE** SHOPPING GENIUSES CAN NOW CONTINUE THEIR\n\nSTYLE SEARCH AT NORDSTROMRACK.COM, WHERE CUSTOMERS CAN EASILY\n\nCHOOSE HOW THEY SHOP BOTH HAUTELOOK AND NORDSTROM RACK.\n\nour engagement with customers. In 2014,\n\nwe added more than 1 million new Rewards\n\naccounts, a 15% increase from the previous\n\nyear. We want to give customers more choices\n\nwith our loyalty program, and our goal is to\n\nprovide an integrated multi-tender program in\n\nall stores and online later this year. We know\n\nour Rewards members are many of our most\n\nloyal and best customers. So growing these\n\nrelationships by ofering programs that\n\nappeal to more customers will be beneficial\n\nin the long term.\n\n**CONCLUSION**\n\nOur strategy is based on the customer and will\n\nremain so. Customers’ expectations of speed,\n\nconvenience, personalization and mobile are\n\nincreasing. As we continue on our journey, we\n\nrecognize it’s imperative for us to invest for the\n\nfuture and find ways to make our stores more\n\nconvenient and our online experience richer.\n\nWe believe we are well positioned to deliver a\n\ngreat experience for our customers—no matter\n\nhow they choose to shop with Nordstrom.\n\n9\n\n**Erik B. Nordstrom**\n\nPresident of Nordstrom.com, Nordstrom, Inc.\n\n**Blake W. Nordstrom**\n\nPresident, Nordstrom, Inc.\n\n**Peter E. Nordstrom**\n\nPresident of Merchandising, Nordstrom, Inc.\n\n«‹ **THAT’S A RECORD!** WE OPENED 27 NEW NORDSTROM RACK STORES\n\nIN 2014—THE MOST WE’VE EVER OPENED IN ONE YEAR.\n\n**“** * **I don’t think I could’ve** *\n\n* **received better news today.** *\n\n* **Nordstrom Rack has now** *\n\n* **launched online!** *\n\n**”** OUR CUSTOMER, JOANNA D.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_JWN_2014.pdf", - "query": "How many stores did Nordstrom posses at the end of 2014 ?", - "target_page": 22, - "target_passage": "Number of stores, end of year : 292", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "4\n\n**PART I**\n\n**Item 1. Business.**\n\n####### **DESCRIPTION OF BUSINESS**\n\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one\n\nof the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a\n\nrobust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two\n\nNordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have\n\ntwo reportable segments: Retail and Credit.\n\nAs of March 16, 2015, the **Retail** segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price\n\nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club\n\nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through\n\nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality\n\nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores\n\nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that\n\nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar\n\nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids\n\nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom\n\nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels\n\nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in\n\nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During\n\nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of\n\nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and\n\nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer\n\nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at\n\nany Nordstrom Rack location.\n\nOur **Credit** segment includes our wholly owned federal savings bank, Nordstrom fsb, through which we provide a private label credit card,\n\ntwo Nordstrom Visa credit cards and a debit card. The credit and debit cards feature a loyalty program designed to increase customer visits\n\nand spending. Although the primary purposes of our Credit segment are to foster greater customer loyalty and drive more sales, we also\n\ngenerate revenues from finance charges and other fees on these cards. In addition, we save on interchange fees that the Retail segment\n\nwould incur if our customers used third-party cards.\n\nFor more information about our business and our reportable segments, see Item 7: Management’s Discussion and Analysis of Financial\n\nCondition and Results of Operations and Note 16: Segment Reporting in Item 8: Financial Statements and Supplementary Data.\n\n####### **FISCAL YEAR**\n\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31 st . References to 2014 and all years within this", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Stores acquired **4** — — **—** —\n\nStores closed **(3)** (2) (1) **(0.4)** — (0.1)\n\n**Total, end of year 292** 260 240 **27.1** 26.0 25.3\n\n1 Other stores include Jeffrey boutiques, Trunk Club showrooms, our Nordstrom Canada full-line store and Last Chance.\n\nWe had no store relocations in 2014, compared with one Nordstrom full-line store and two Nordstrom Rack relocations in 2013 and three\n\nNordstrom Rack relocations in 2012. Our 2014 new store openings increased our square footage by 5.5%.\n\nTo date in 2015, we have opened our second full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional\n\nNordstrom full-line stores in the U.S. and another full-line store in Canada during 2015. Planned net store openings are expected to increase\n\nour retail square footage by approximately 6.1%.", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 19\n\nNet Sales (2014 vs. 2013)\n\nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we\n\nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the\n\nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These\n\nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014.\n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared\n\nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number\n\nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics\n\nand Men’s Apparel.\n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top-\n\nperforming geographic regions for full-line stores were the Southeast and Southwest.\n\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales\n\nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and\n\nongoing technology investments to enhance the customer experience.\n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of\n\n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories\n\nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was\n\nflat.\n\nNet Sales (2013 vs. 2012)\n\nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at\n\nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one\n\nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our\n\nsquare footage by 2.9%. The 53 rd week in 2012 contributed approximately $162 in additional net sales.\n\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at\n\nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold\n\nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel.\n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales\n\ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast.\n\nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up\n\n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology\n\ninvestments to enhance the customer experience.\n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013.\n\nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the\n\naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.\n\n####### **Retail Business Gross Profit**\n\nThe following table summarizes the Retail Business gross profit:\n\n**Fiscal year 2014 2013 2012**", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**Nordstrom, Inc.**\n\n**Notes to Consolidated Financial Statements**\n\nDollar and share amounts in millions except per share, per option and per unit amounts\n\nNordstrom, Inc. and subsidiaries 41\n\n####### **NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n####### **The Company**\n\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a\n\nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This\n\nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience.\n\nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116\n\n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price\n\nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one\n\nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada.\n\nThrough our Credit segment, we provide our customers with a variety of payment products and services, including a Nordstrom private label\n\ncard, two Nordstrom Visa credit cards and a debit card for Nordstrom purchases. These products also allow our customers to participate in\n\nour loyalty program designed to increase customer visits and spending. Although the primary purposes of our Credit segment are to foster\n\ngreater customer loyalty and drive more sales, we also generate revenues from finance charges and other fees on these cards. In addition,\n\nwe save on interchange fees that the Retail segment would incur if our customers used third-party cards.\n\n####### **Fiscal Year**\n\nWe operate on a 52/53-week fiscal year ending on the Saturday closest to January 31 st . References to 2014 and all years within this\n\ndocument are based on a 52-week fiscal year, except 2012, which is based on a 53-week fiscal year.\n\n####### **Principles of Consolidation**\n\nThe consolidated financial statements include the balances of Nordstrom, Inc. and its subsidiaries. All intercompany transactions and\n\nbalances are eliminated in consolidation.\n\n####### **Use of Estimates**\n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the U.S. requires management to make\n\nestimates and assumptions that affect the reported amounts of assets, liabilities, revenues and expenses, and disclosure of contingent assets\n\nand liabilities during the reporting period. Uncertainties regarding such estimates and assumptions are inherent in the preparation of financial\n\nstatements and actual results may differ from these estimates and assumptions. Our most significant accounting judgments and estimates\n\ninclude the allowance for credit losses, revenue recognition, inventory, goodwill, stock-based compensation and income taxes.\n\n####### **Net Sales**\n\nWe recognize revenue from sales at our retail stores at the point of sale, net of estimated returns and excluding sales taxes. Revenue from\n\nsales to customers shipped directly from our stores, website and catalog, which includes shipping revenue when applicable, is recognized\n\nupon estimated receipt by the customer. We estimate customer merchandise returns based on historical return patterns and reduce sales\n\nand cost of sales accordingly. Activity in the allowance for sales returns, net, for the past three fiscal years is as follows:\n\n**Fiscal year 2014 2013 2012**\n\nAllowance at beginning of year **$128** $116 $103\n\nAdditions **2,129** 1,880 1,724\n\nReturns, net 1 **(2,097)** (1,868) (1,711)\n\n**Allowance at end of year $160** $128 $116", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "to be within two-day ground delivery of\n\napproximately half the population of the\n\nUnited States, which will help improve\n\ndelivery times for customers and help us\n\nmeet their rising expectations.\n\nFinally, in 2014, we acquired Trunk Club,\n\na high-growth personalized men’s clothing\n\nbusiness based on a service model that is highly\n\ncomplementary to our own. We believe Trunk\n\nClub is a natural extension of our business,\n\nand together we will continue to evolve and\n\nbring together the online and ofine worlds\n\nto deliver a great shopping experience.\n\n**OFF-PRICE: NORDSTROM RACK,**\n\n**NORDSTROMRACK.COM AND HAUTELOOK**\n\nWe opened a record 27 new Nordstrom Rack\n\nstores, ending 2014 with 167 stores and on\n\ntrack to meet our long-term growth plans\n\nof 300 stores by 2020. Customers continue\n\nto respond favorably to the treasure-hunt\n\nexperience that defines Nordstrom Rack\n\nstores. As we expand in many markets for the\n\nfirst time, we hope to continue delivering a\n\ngreat experience, as this business represents\n\na terrific opportunity for us to attract new\n\ncustomers. Last year, Nordstrom Rack\n\nwas our biggest source of new customers,\n\nattracting nearly 4 million. Also, a year ago,\n\nwe began accepting returns of HauteLook\n\nand Nordstromrack.com merchandise at any\n\nNordstrom Rack store. This drove nearly\n\n1 million trips to Nordstrom Rack stores in\n\n2014. The Nordstrom Rack customer also\n\ntends to be younger than our full-line customer,\n\nand there is a meaningful opportunity for these\n\ncustomers to begin shopping our full-price\n\nchannels as well. We plan to open 27 more\n\nNordstrom Racks in 2015 across the U.S.\n\n7\n\n**OUR NEW LOOK** FROM WINDOWS THAT BRING THE OUTSIDE IN TO DEPARTMENTS THAT SEAMLESSLY FLOW TOGETHER—\n\nOUR NEW STORE DESIGN CREATES AN EXCITING SPACE THAT CAN CHANGE WITH HOW OUR CUSTOMERS SHOP.\n\n**“** * **I love how you used models with** *\n\n* **physical challenges in your** *\n\n* **Anniversary catalog. Nice work!** *\n\n**”** OUR CUSTOMER, DONNA A.", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "16\n\n**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\n\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts\n\n####### **OVERVIEW**\n\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer\n\nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line\n\nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including\n\nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As\n\nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our\n\ncustomers a Nordstrom Rewards loyalty program along with a variety of payment products and services, including credit and debit cards.\n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making\n\nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online.\n\nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer\n\nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there\n\nare significant synergies across channels to create a unique customer experience to gain market share.\n\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom\n\nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected\n\ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales\n\ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position\n\nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations.\n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with\n\nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another\n\nway to provide sought-after brands that appeal to new and existing customers.\n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique\n\nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this\n\nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our\n\npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto\n\nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin.\n\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27\n\nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%.\n\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of\n\nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 25\n\nNordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter\n\nof 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise\n\nincreased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack.\n\nGross Profit\n\nOur total company gross profit rate decreased 53 basis points compared with the same period in the prior year, primarily due to increased\n\nmarkdowns at Nordstrom Rack.\n\nRetail Selling, General, and Administrative Expenses\n\nOur Retail SG&A rate increased 80 basis points primarily due to expenses related to the acquisition of Trunk Club and ongoing technology\n\nand fulfillment expenses.\n\nCredit Expenses\n\nIn the fourth quarter, expenses for our Credit segment of $54 increased from $38 in the prior year. The increase was primarily driven by\n\nhigher operational expenses resulting from a 6% increase in credit volume during the fourth quarter of 2014. The fourth quarter of 2013 also\n\nincluded the impact of the conversion of our Nordstrom Rewards travel benefit into Nordstrom Notes, which decreased operational expenses\n\nin the prior year.\n\nFor further information on our quarterly results in 2014 and 2013, refer to Note 17: Selected Quarterly Data in the Notes to Consolidated\n\nFinancial Statements in Item 8: Financial Statements and Supplementary Data.\n\n## **2015 Outlook**\n\nOur expectations for 2015 are as follows:\n\nNet sales 7 percent to 9 percent increase\n\nComparable sales 2 percent to 4 percent increase\n\nEarnings per diluted share 1 $3.65 to $3.80\n\n1 This outlook does not include the impact of any future share repurchases.\n\nCapital expenditures, net of property incentives, of approximately $1.2 billion are expected in 2015, an increase from $751 in 2014. The\n\nincrease relates to store expansion, including Canada and Manhattan, and ongoing investments to improve the customer experience through\n\nflagship store remodels and a third fulfillment center expected to open in the second half of the year. To date in 2015, we have opened our\n\nsecond full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional Nordstrom full-line stores in the U.S. and\n\nanother full-line store in Canada during 2015. Planned net store openings are expected to increase our retail square footage by\n\napproximately 6.1%.", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "»› **THE RACK GOES ONLINE** SHOPPING GENIUSES CAN NOW CONTINUE THEIR\n\nSTYLE SEARCH AT NORDSTROMRACK.COM, WHERE CUSTOMERS CAN EASILY\n\nCHOOSE HOW THEY SHOP BOTH HAUTELOOK AND NORDSTROM RACK.\n\nour engagement with customers. In 2014,\n\nwe added more than 1 million new Rewards\n\naccounts, a 15% increase from the previous\n\nyear. We want to give customers more choices\n\nwith our loyalty program, and our goal is to\n\nprovide an integrated multi-tender program in\n\nall stores and online later this year. We know\n\nour Rewards members are many of our most\n\nloyal and best customers. So growing these\n\nrelationships by ofering programs that\n\nappeal to more customers will be beneficial\n\nin the long term.\n\n**CONCLUSION**\n\nOur strategy is based on the customer and will\n\nremain so. Customers’ expectations of speed,\n\nconvenience, personalization and mobile are\n\nincreasing. As we continue on our journey, we\n\nrecognize it’s imperative for us to invest for the\n\nfuture and find ways to make our stores more\n\nconvenient and our online experience richer.\n\nWe believe we are well positioned to deliver a\n\ngreat experience for our customers—no matter\n\nhow they choose to shop with Nordstrom.\n\n9\n\n**Erik B. Nordstrom**\n\nPresident of Nordstrom.com, Nordstrom, Inc.\n\n**Blake W. Nordstrom**\n\nPresident, Nordstrom, Inc.\n\n**Peter E. Nordstrom**\n\nPresident of Merchandising, Nordstrom, Inc.\n\n«‹ **THAT’S A RECORD!** WE OPENED 27 NEW NORDSTROM RACK STORES\n\nIN 2014—THE MOST WE’VE EVER OPENED IN ONE YEAR.\n\n**“** * **I don’t think I could’ve** *\n\n* **received better news today.** *\n\n* **Nordstrom Rack has now** *\n\n* **launched online!** *\n\n**”** OUR CUSTOMER, JOANNA D.", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "10\n\n**Item 1B. Unresolved Staff Comments.**\n\nNone.\n\n**Item 2. Properties.**\n\nThe following table summarizes the number of retail stores we own or lease, and the percentage of total store square footage represented by\n\neach listed category as of January 31, 2015:\n\n**Number of stores % of total store square footage**\n\nLeased stores on leased land **195 38%**\n\nOwned stores on leased land **61 40%**\n\nOwned stores on owned land **35 21%**\n\nPartly owned and partly leased store **1 1%**\n\n**Total 292 100%**\n\nThe following table summarizes our store activity during the last three years:\n\n**Fiscal year 2014 2013 2012**\n\nNumber of stores, beginning of year **260** 240 225\n\nStores opened **31** 22 16\n\nStores acquired **4** — —\n\nStores closed **(3)** (2) (1)\n\n**Number of stores, end of year 292** 260 240\n\nNordstrom full-line stores - U.S. **116** 117 117\n\nNordstrom Rack **167** 140 119\n\nOther 1 **9** 3 4\n\n1 Other includes Jeffrey boutiques, Trunk Club showrooms, our Nordstrom Canada full-line store and Last Chance.\n\nIn 2014, we opened three Nordstrom full-line stores (The Woodlands, Texas; Calgary, Alberta; and Jacksonville, Florida) and 27 Nordstrom\n\nRack stores (Palm Desert, California; San Francisco, California; Chicago, Illinois; Riverside, California; Skokie, Illinois; Tulsa, Oklahoma;\n\nWauwatosa, Wisconsin; Brooklyn, New York; Columbus, Ohio; Houston, Texas; Manhassett, New York; Chicago, Illinois; Dayton, Ohio;\n\nHouston, Texas; Queens, New York; Brentwood, Tennessee; Greenville, South Carolina; Madison, Wisconsin; Tempe, Arizona; Brooklyn,\n\nNew York; Livingston, New Jersey; West Palm Beach, Florida; Brandon, Florida; Columbia, South Carolina; Des Moines, Iowa; Philadelphia,\n\nPennsylvania; and Summerlin, Nevada). As part of our purchase of Trunk Club in August 2014, we acquired four Trunk Club showrooms (Los\n\nAngeles, California; Chicago, Illinois; Dallas, Texas; and Washington D.C.) and opened one additional Trunk Club showroom (New York City,\n\nNew York) in December 2014. Additionally, in 2014, we closed three Nordstrom full-line stores (Orlando, Florida; Vancouver, Washington; and\n\nPortland, Oregon).\n\nTo date in 2015, we have opened one Nordstrom full-line store in Ottawa, Ontario. During the remainder of 2015, we have announced the\n\nopening of four additional Nordstrom full-line stores (San Juan, Puerto Rico; Vancouver, British Columbia; Minneapolis, Minnesota; and\n\nWauwatosa, Wisconsin) and the opening of 27 additional Nordstrom Rack stores (Bakersfield, California; Redlands, California; Reno,\n\nNevada; Princeton, New Jersey; Westwood, Massachusetts; Webster, Texas; Laguna Niguel, California; Miami, Florida; Springfield, Virginia;\n\nSt. Louis Park, Minnesota; Dublin, California; Albany, New York; Anchorage, Alaska; Baton Rouge, Louisiana; Buffalo, New York; Cerritos,\n\nCalifornia; Clearwater, Florida; Eatontown, New Jersey; Emeryville, California; Fort Collins, Colorado; Long Beach, California; Mount\n\nPleasant, South Carolina; Newark, Delaware; Rockaway, New Jersey; Syracuse, New York; Thousand Oaks, California; and Wayne, New\n\nJersey).\n\nWe also own six merchandise distribution centers (Portland, Oregon; Dubuque, Iowa; Ontario, California; Newark, California; Upper\n\nMarlboro, Maryland; and Gainesville, Florida) and we own one fulfillment center on leased land (Cedar Rapids, Iowa), all of which are utilized\n\nby our Retail segment. Trunk Club and HauteLook, which are included in our Retail segment, lease three administrative offices (Chicago,\n\nIllinois; Los Angeles, California and New York City, New York) and one fulfillment center (San Bernardino, California). We plan to open a third,\n\nowned fulfillment center (Elizabethtown, Pennsylvania) in the second half of 2015. We lease office buildings in Centennial, Colorado and\n\nScottsdale, Arizona, both for use by our Credit segment. Our administrative offices in Seattle, Washington are a combination of leased and", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 21\n\nCREDIT SEGMENT\n\nThe Nordstrom credit and debit card products are designed to strengthen customer relationships and grow retail sales by providing loyalty\n\nbenefits, valuable services and payment products. We believe our credit business allows us to build deeper relationships with our customers\n\nby fully integrating the Nordstrom Rewards program with our retail stores and providing better service, which in turn fosters greater customer\n\nloyalty. Our cardholders tend to visit our stores more frequently and spend more with us than non-cardholders. Our Nordstrom private label\n\ncredit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com,\n\nNordstromrack.com and HauteLook (“inside volume”), while our Nordstrom Visa credit cards also may be used for purchases outside of\n\nNordstrom (“outside volume”). Cardholders participate in the Nordstrom Rewards program through which cardholders accumulate points for\n\ntheir purchases. Upon reaching a certain points threshold, cardholders receive Nordstrom Notes ® , which can be redeemed for goods or\n\nservices at Nordstrom full-line stores in the U.S. and Canada, Nordstrom Rack stores and at Nordstrom.com. Nordstrom Rewards customers\n\nreceive reimbursements for alterations, get Personal Triple Points days and have early access to sales events. With increased spending,\n\nthey can receive additional amounts of these benefits as well as access to exclusive fashion and shopping events.\n\nIn May 2014, we announced our plan to review options for a potential financial partner for our credit card receivables portfolio. We intend to\n\nexecute a transaction only if our strategic and financial requirements are met. In the event a transaction is finalized, we will classify the\n\nrelevant credit card receivables as held for sale, which could result in a gain or loss upon reclassification.\n\n####### **Summary**\n\nThe table below provides a detailed view of the operational results of our Credit segment, consistent with Note 16: Segment Reporting in the\n\nNotes to Consolidated Financial Statements of Item 8: Financial Statements and Supplementary Data. In order to better reflect the economic\n\ncontribution of our credit and debit card program, intercompany merchant fees are also included in the table below, which represent the\n\nestimated costs that would be incurred if our cardholders used third-party cards instead of ours.\n\nInterest expense at the Credit segment is equal to the amount of interest related to securitized debt plus an amount assigned to the Credit\n\nsegment in proportion to the estimated debt and equity needed to fund our credit card receivables. Based on our research, debt as a\n\npercentage of credit card receivables for other credit card companies ranges from 70% to 90%. As such, we believe a mix of 80% debt and\n\n20% equity is appropriate, and therefore assign interest expense to the Credit segment as if it carried debt of up to 80% of the credit card\n\nreceivables. Our average credit card receivable investment metric below represents the remaining 20% to fund our credit card receivables.\n\n**Fiscal year 2014 2013 2012**\n\n**Amount**\n\n**% of average credit card receivables 1 Amount**\n\n**% of average credit card receivables 1 Amount**\n\n**% of average credit card receivables 1**\n\nCredit card revenues **$396 18.2%** $374 17.7% $372 17.9%\n\nCredit expenses **(194) (8.9%)** (186) (8.8%) (190) (9.1%)\n\n**Earnings before interest and income taxes 2 202 9.3%** 188 8.9% 182 8.8%\n\nInterest expense **(18) (0.8%)** (24) (1.2%) (26) (1.2%)\n\nIntercompany merchant fees **108 5.0%** 97 4.6% 89 4.3%\n\n**Credit segment contribution, before income taxes $292 13.5%** $261 12.4% $245 11.8%\n\nCredit and debit card volume 3 :\n\nOutside **$4,331** $4,273 $4,305\n\nInside **5,475** 4,935 4,484\n\nTotal volume **$9,806** $9,208 $8,789", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2538.pdf", - "query": "What type of nanostructured material works notably well to build gas nanosensors ?", - "target_page": 1, - "target_passage": "carbon nanotubes (CNT) [2] have been shown to work remarkably well as de- tectors of small gas molecules", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## **Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes**\n\nJ. M. Garc´ıa-Lastra 1,2 , ** D. J. Mowbray 1,2 , K. S. Thygesen 2 , A. Rubio 1,3 , and K. W. Jacobsen 2 *1* *Nano-Bio Spectroscopy group and ETSF Scientific Development Centre,*\n\n*Dpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco,*\n\n*Centro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain* *2* *Center for Atomic-scale Materials Design, Department of Physics,*\n\n*Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark* *3* *Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany*\n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan-\n\notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH 3 , H 2 S) and the main components\n\nof air (N 2 , O 2 , H 2 O), we calculate the binding energy and change in conductance upon adsorption on a metal\n\natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis-\n\ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites\n\nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function\n\nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to\n\nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions.\n\nPACS numbers: 73.63.- b, 68.43.- h, 73.50.Lw\n\nThe ability to detect small concentrations of specific chem-\n\nical species is fundamental for a variety of industrial and sci-\n\nentific processes as well as for medical applications and en-\n\nvironmental monitoring [ 1 ]. In general, nanostructured mate-\n\nrials should be well suited for sensor applications because of\n\ntheir large surface to volume ratio which makes them sensi-\n\ntive to molecular adsorption. Specifically, carbon nanotubes\n\n(CNT) [ 2 ] have been shown to work remarkably well as de-\n\ntectors of small gas molecules. This has been demonstrated\n\nboth for individual CNTs [ 3 - 8 ] as well as for CNT networks\n\n[ 9 , 10 ].\n\nPristine CNTs are known to be chemically inert - a prop-\n\nerty closely related to their high stability. As a consequence,\n\nonly radicals bind strong enough to the CNT to notably affect\n\nits electrical properties [ 2 , 5 , 11 - 13 ]. To make CNTs attrac-\n\ntive for sensor applications thus requires some kind of func-\n\ntionalization, e.g. through doping or decoration of the CNT\n\nsidewall [ 13 - 21 ]. Ideally, this type of functionalization could\n\nbe used to control not only the reactivity of the CNT but also\n\nthe selectivity towards specific chemical species.\n\nIn this work we consider the possibility of using CNTs\n\ndoped by 3d transition metal atoms for chemical gas sens-\n\ning. We use computational screening to systematically iden-\n\ntify the most promising dopant candidates for detection of\n\nthree different target molecules (CO, NH 3 , H 2 S) under typi-\n\ncal atmospheric conditions. The screening procedure is based\n\non the calculation of two microscopic descriptors: the bind-\n\ning energy and scattering resistance of the molecules when\n\nadsorbed on a doped CNT. These two quantities give a good\n\nindication of the gas coverage and impact on the resistance.\n\nFor the most promising candidates we then employ a simple\n\nthermodynamic model of the CNT sensor. In this model, the\n\nbinding energies are used to obtain the fractional coverage of\n\nthe metallic sites as a function of the target molecule concen-\n\ntration under ambient conditions. Under the assumption of\n\ntransport in the diffusive rather than localization regime, the\n\nchange in CNT resistivity may then be obtained from the cal-\n\nculated coverages and single impurity conductances.\n\nWe find that oxidation of the active metal site passivates", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "all *N* impurities. At this point it suffices to see that the con-\n\nservative estimates obtained from Eq. ( 7 ) predict measurable\n\nsignals in response to small changes in concentration of the\n\ntarget molecules.\n\nTo our knowledge, controlled doping of CNTs with transi-\n\ntion metal atoms has so far not been achieved. It has, how-\n\never, been found that metal atoms incorporated into the CNT\n\nlattice during catalytic growth are afterwards very difficult to\n\nremove [ 30 ]. Furthermore, it has been shown that CNT vacan-\n\ncies, which are needed for the metallic doping, may be formed\n\nin a controlled way by irradiation by Ar ions [ 31 ]. This sug-\n\ngests that metallic doping of CNTs should be possible.\n\nIn summary, we have presented a general model of nanos-\n\ntructured chemical sensors which takes the adsorption en-\n\nergies of the relevant chemical species and their individual\n\nscattering resistances as the only input. On the basis of this\n\nmodel we have performed a computational screening of tran-\n\nsition metal doped CNTs, and found that Ni-doped CNTs are\n\npromising candidates for detecting CO in a background of air.\n\nThe model may be applied straightforwardly to other nanos-\n\ntructures than CNTs, other functionalizations than metal dop-\n\ning and other gas compositions than air.\n\nThe authors acknowledge financial support from Span-\n\nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados\n\nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF\n\nproject (Contract Number 211956), “Red Espa˜nola de Super-\n\ncomputaci´on”, NABIIT and the Danish Center for Scientific\n\nComputing. The Center for Atomic-scale Materials Design\n\n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L\n\nacknowledges funding from Spanish MICINN through Juan\n\nde la Cierva and Jos´e Castillejo programs.\n\n*∗* Electronic address: [ juanmaria.garcia@ehu.es](mailto:juanmaria.garcia@ehu.es)\n\n[1] *Gas Sensing Materials, MRS Bull.* , vol. 24 (1999).\n\n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport\n\nproperties of nanotubes”, Rev. Mod. Phys. **79** (2), 677 (May 2007), doi: [10.1103/RevModPhys.79.677](http://dx.doi.org/10.1103/RevModPhys.79.677) .\n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng,\n\nK. Cho, and H. Dai, “Nanotube molecular wires as\n\nchemical sensors”, Science **287** (5453), 622 (Jan. 2000), doi: [10.1126/science.287.5453.622](http://dx.doi.org/10.1126/science.287.5453.622) .\n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, “Ex-\n\ntreme oxygen sensitivity of electronic properties of car-\n\nbon nanotubes”, Science **287** (5459), 1801 (Mar. 2000), doi: [10.1126/science.287.5459.1801](http://dx.doi.org/10.1126/science.287.5459.1801) .\n\n[5] C. Hierold, *Carbon Nanotube Devices: Properties, Modeling,*\n\n*Integration and Applications* (Wiley-VCH, Weinheim, 2008).\n\n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval,\n\nL. M. Mart´ınez, H. Terrones, and M. Terrones, “Fabrica-\n\ntion of vapor and gas sensors using films of aligned CN *x*\n\nnanotubes”, Chem. Phys. Lett. **386** (1-3), 137 (Mar. 2004), doi: [10.1016/j.cplett.2004.01.052](http://dx.doi.org/10.1016/j.cplett.2004.01.052) .\n\n[7] A. R. Rocha, M. Rossi, A. Fazzio, and A. J. R.\n\nda Silva, “Designing real nanotube-based gas sen-\n\nsors”, Phys. Rev. Lett. **100** (17), 176803 (May 2008), doi: [10.1103/PhysRevLett.100.176803](http://dx.doi.org/10.1103/PhysRevLett.100.176803) .\n\n[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring\n\ngas sensing properties of carbon nanotubes”, J. Appl. Phys.\n\n**104** (2), 024502 (Jul. 2008), doi: [10.1063/1.2956395](http://dx.doi.org/10.1063/1.2956395) . [9] C. Morgan, Z. Alemipour, and M. Baxendale, “Variable\n\nrange hopping in oxygen-exposed single-wall carbon nanotube\n\nnetworks”, Phys. Stat. Solidi A **205** (6), 1394 (May 2008), doi: [10.1002/pssa.200778113](http://dx.doi.org/10.1002/pssa.200778113) .\n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, “In-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "change in CNT resistivity may then be obtained from the cal-\n\nculated coverages and single impurity conductances.\n\nWe find that oxidation of the active metal site passivates\n\nthe sensor in the case of doping by Ti, V, Cr, and Mn un-\n\nder standard conditions (room temperature and 1 bar of pres-\n\nsure). Among the remaining metals, we identify Ni as is the\n\nmost promising candidate for CO detection. For this system\n\nthe change in resistance per active site is generally significant\n\n( *>* 1 Ω ) for small changes in CO concentration in the relevant\n\nrange of around 0.1- 10 ppm. Our approach is quite general\n\nand is directly applicable to other nanostructures than CNTs,\n\nother functionalizations than metal doping, and other back-\n\ngrounds than atmospheric air.\n\nAll total energy calculations and structure optimizations\n\nhave been performed with the real-space density functional\n\ntheory (DFT) code GPAW [ 22 ] which is based on the projector augmented wave method. We use a grid spacing of 0.2 ˚ A for\n\nrepresenting the density and wave functions and the PBE ex-\n\nchange correlation functional [ 23 ]. Transport calculations for\n\nthe optimized structures have been performed using the non-\n\nequilibrium Green’s function method [ 24 ] with an electronic\n\nHamiltonian obtained from the SIESTA code [ 25 ] in a dou-\n\nble zeta polarized (DZP) basis set. Spin polarization has been\n\ntaken into account in all calculations.\n\nMetallic doping of a (6,6) CNT has been modeled in a su-\n\npercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 ˚ A *×* 15 ˚ A *×* 14.622 ˚ A). For this size\n\nof supercell a Γ -point sampling of the Brillouin zone was\n\nfound to be sufficient. The formation energy for creating a\n\nvacancy (VC) occupied by a transition metal atom (M) was\n\ncalculated using the relation\n\n*E* form [ M @ VC ] = *E* [ M @ VC ] + *nE* [ C ] *−* *E* [ M@NT ] (1) where *E* [M@VC] is the total energy of a transition metal\n\natom occupying a vacancy in the nanotube, *n* is the number\n\nof carbon atoms removed to form the vacancy, *E* [C] is the en-\n\nergy per carbon atom in a pristine nanotube, and *E* [M@NT]\n\narXiv:1001.2538v1 [cond-mat.mes-hall] 14 Jan 2010 Ti V Cr Mn Fe Co Ni Cu Zn 0", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "2\n\n4\n\n6\n\n8\n\nFormation Energy *E*\n\n*form*\n\n[eV] Empty Monovacancy\n\nEmpty Divacancy II\n\nEmpty Divacancy I\n\nMonovacancy Divacancy I Divacancy II\n\nCarbon Nanotube Axis\n\nFIG. 1: Structural schematics and formation energy for a 3d tran-\n\nsition metal occupied monovacancy (black), divacancy I (gray), or\n\ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies\n\nof the empty vacancies are indicated by dashed lines.\n\nis the total energy of the pristine nanotube with a physisorbed\n\ntransition metal atom. We have considered the monovacancy\n\nand two divacancies shown in Fig. 1 . The energy required to\n\nform an empty vacancy is obtained from\n\n*E* form [ VC ] = *E* [ VC ] + *nE* [ C ] *−* *E* [ NT ] *,* (2)\n\nwhere *E* [VC] is the total energy of the nanotube with a va-\n\ncancy of *n* atoms.\n\nThe calculated formation energies for the 3d transition met-\n\nals are shown in Fig. 1 . From the horizontal lines we see that\n\nboth divacancies are more stable than the monovacancy. This\n\nmay be attributed to the presence of a two-fold coordinated C\n\natom in the monovacancy, while all C atoms remain three-fold\n\ncoordinated in the divacancies. When a transition metal atom\n\noccupies a vacancy, the strongest bonding to the C atoms is\n\nthrough its *d* orbitals [ 26 ]. For this reason, Cu and Zn, which\n\nboth have filled d-bands, are rather unstable in the CNT. For\n\nthe remaining metals, adsorption in the monovacancies leads\n\nto quite stable structures. This is because the three-fold coor-\n\ndination of the C atoms and the CNT’s hexagonal structure are\n\nrecovered when the metal atom is inserted. On the other hand,\n\nmetal adsorption in divacancies is slightly less stable because\n\nof the resulting pentagon defects, see upper panel in Fig. 1 . A\n\nsimilar behaviour has been reported by Krasheninnikov *et al.*\n\nfor transition metal atoms in graphene [ 21 ].\n\nThe adsorption energies for N 2 , O 2 , H 2 O, CO, NH 3 , and\n\nH 2 S on the metallic site of the doped (6,6) CNTs are shown in\n\nFig. 2 (a). The adsorption energy of a molecule *X* is defined\n\nby\n\n*E* ads [ *X* @M@VC ] = *E* [ *X* @M@VC ] *−* *E* [ *X* ] *−* *E* [ M@VC ] *,* (3)\n\nN 2\n\nO 2\n\nN 2\n\nO 2\n\nN 2\n\nO 2\n\nCO 2 H O\n\n3 NH\n\n2 H S\n\nCO\n\nCO\n\n2 H O\n\n3 NH\n\n2 H S\n\n2 H O\n\n3 NH\n\n2 H S\n\nN 2\n\nO 2\n\nN 2\n\nO 2\n\nN 2\n\nO 2\n\nCO 2 H O\n\n3 NH\n\n2 H S\n\nCO\n\nCO\n\n2 H O\n\n3 NH\n\n2 H S\n\n2 H O\n\n3 NH\n\n2 H S\n\nMonovacancy\n\nDivacancy II\n\nDivacancy I\n\nDivacancy II\n\nDivacancy I\n\nMonovacancy\n\nCr Fe Co Ni Cu Zn Mn Ti V\n\n0.0 (a) Adsorption Energy [eV] −2.0 −1.5 −1.0 −0.5\n\nCr Fe Co Ni Cu Zn Mn Ti V\n\n0.0 +0.5 +1.0 0 (b) Conductance Change [G ] −1.0 −0.5\n\nFIG. 2: Calculated (a) adsorption energy *E* ads in eV and (b) change in conductance ∆ *G* in units of *G* 0 = 2 *e* 2 */h* for N 2 , O 2 , H 2 O, CO, NH 3 ,\n\nand H 2 S on 3d transition metals occupying a monovacancy (top),\n\ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon\n\nnanotube.\n\nwhere *E* [ *X* @M@VC] is the total energy of molecule *X* on\n\na transition metal atom occupying a vacancy, and *E* [ *X* ] is the\n\ngas phase energy of the molecule.\n\nFrom the adsorption energies plotted in Fig. 2 (a), we see\n\nthat the earlier transition metals tend to bind the adsorbates\n\nstronger than the late transition metals. The latest metals in\n\nthe series (Cu and Zn) bind adsorbates rather weakly in the\n\ndivacancy structures. We also note that O 2 binds significantly stronger than any of the three target molecules on Ti, V, Cr,\n\nand Mn (except for Cr in divacancy I where H 2 S is found to\n\ndissociate). Active sites containing these metals are therefore\n\nexpected to be completely passivated if oxygen is present in\n\nthe background. Further, we find H 2 O is rather weakly bound\n\nto most of the active sites. This ensures that these types of\n\nsensors are robust against changes in humidity.\n\nIn thermodynamic equilibrium [ 27 ], the coverage of the ac-\n\ntive sites follows from", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "[34] P. Moriarty, M. D. R. Taylor, and M. Brust, “Nanostructured cellular networks,” Phys. Rev. Lett. **89** ,\n\n248303 (2002).\n\n[35] E. Rabani, D. R. Reichman, P. L. Geissler, and L. E. Brus, “Drying-mediated self-assembly of\n\nnanoparticles,” Nature **426** , 271- 274 (2003).\n\n[36] L. V. Govor, G. Reiter, J. Parisi, and G. H. Bauer, “Self-assembled nanoparticle deposits formed at\n\nthe contact line of evaporating micrometer-size droplets,” Phys. Rev. E **69** , 061609 (2004).\n\n[37] C. P. Martin, M. O. Blunt, and P. Moriarty, “Nanoparticle networks on silicon: Self-organized or\n\ndisorganized?” Nano Lett. **4** , 2389- 2392 (2004).\n\n[38] C. P. Martin, M. O. Blunt, E. Pauliac-Vaujour, A. Stannard, P. Moriarty, I. Vancea, and U. Thiele,\n\n“Controlling pattern formation in nanoparticle assemblies via directed solvent dewetting,” Phys. Rev.\n\nLett. **99** , 116103 (2007).\n\n[39] A. Stannard, C. P. Martin, E. Pauliac-Vaujour, P. Moriarty, and U. Thiele, “Dual-scale pattern forma-\n\ntion in nanoparticle assemblies,” J. Chem. Phys. C **112** , 15195- 15203 (2008).\n\n[40] E. Pauliac-Vaujour, A. Stannard, C. P. Martin, M. O. Blunt, I. Notingher, P. J. Moriarty, I. Vancea,\n\nand U. Thiele, “Fingering instabilities in dewetting nanofluids,” Phys. Rev. Lett. **100** , 176102 (2008).\n\n[41] I. Vancea, U. Thiele, E. Pauliac-Vaujour, A. Stannard, C. P. Martin, M. O. Blunt, and P. J. Moriarty,\n\n“Front instabilities in evaporatively dewetting nanofluids,” Phys. Rev. E **78** , 041601 (2008).\n\n[42] U. Thiele, *Entnetzung von Kollagenfilmen* , Ph.D. thesis, Technische Universit¨at Dresden (1998).\n\n[43] H. Yabu and M. Shimomura, “Preparation of self-organized mesoscale polymer patterns on a solid\n\nsubstrate: Continuous pattern formation from a receding meniscus,” Adv. Funct. Mater. **15** , 575- 581\n\n(2005).\n\n[44] R. D. Deegan, O. Bakajin, T. F. Dupont, G. Huber, S. R. Nagel, and T. A. Witten, “Capillary flow as\n\nthe cause of ring stains from dried liquid drops,” Nature **389** , 827- 829 (1997).\n\n[45] E. Adachi, A. S. Dimitrov, and K. Nagayama, “Stripe patterns formed on a glass-surface during\n\ndroplet evaporation,” Langmuir **11** , 1057- 1060 (1995).\n\n[46] R. D. Deegan, “Pattern formation in drying drops,” Phys. Rev. E **61** , 475- 485 (2000).\n\n[47] R. D. Deegan, O. Bakajin, T. F. Dupont, G. Huber, S. R. Nagel, and T. A. Witten, “Contact line\n\ndeposits in an evaporating drop,” Phys. Rev. E **62** , 756- 765 (2000).\n\n[48] L. Shmuylovich, A. Q. Shen, and H. A. Stone, “Surface morphology of drying latex films: Multiple\n\nring formation,” Langmuir **18** , 3441- 3445 (2002).\n\n[49] V. X. Nguyen and K. J. Stebe, “Patterning of small particles by a surfactant-enhanced Marangoni-\n\n28", - "page_start": 27, - "page_end": 27, - "source_file": "1001.2669.pdf" - }, - { - "text": "gin of the interface magnetism then had to be inferred by\n\ncomparison to a series of reference samples 7 . Demonstra- tion of coupling between the bulk of the layers, i.e. , an\n\nexchange bias effect, would provide direct evidence of the\n\ninterface magnetic order. Moreover, such coupling would\n\noffer new means of manipulating the FM semiconductor\n\nspin state and utilizing the proximity polarization effect\n\nin a spintronic device.\n\nHere, we demonstrate an antiferromagnetic coupling\n\nand exchange bias in Fe/(Ga,Mn)As bilayer films, by\n\ncombining element-specific XMCD measurements and\n\nbulk-sensitive superconducting quantum interference de-\n\nvice (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers 4,5 (and in con-\n\ntrast to AFM coupled FM metal/FM metal exchange bias\n\nstructures 10,11 ) the layers are in direct contact without\n\na non-magnetic spacer in between. We distinguish in-\n\nterface and bulk (Ga,Mn)As layers that are respectively\n\nstrongly and weakly antiferromagnetically coupled to the\n\nFe overlayer. In agreement with Ref. 7 , the interface layer\n\nremains polarized at room temperature.\n\nThe Fe and (Ga,Mn)As layers of the present study\n\nwere both grown by molecular beam epitaxy in the same\n\nultra-high vacuum system, in order to ensure a clean in-\n\nterface between them. The (Ga,Mn)As layer of thickness\n\n10 to 50 nm was deposited on a GaAs(001) substrate\n\nat a temperature of 260 C, using previously established\n\nmethods 3,8 . A low Mn concentration of x ≈ 0 . 03 was\n\nchosen in order to avoid the formation of compensating\n\nMn interstitials. The substrate temperature was then\n\nreduced to ∼ 0 C, before depositing a 2 nm Fe layer,\n\nplus a 2 nm Al capping layer. In-situ reflection high\n\nenergy electron diffraction and ex-situ x-ray reflectivity\n\nand diffraction measurements confirmed that the layers\n\nare single-crystalline with sub-nm interface roughness.\n\nSQUID magnetometry measurements were performed us-\n\ning a Quantum Design Magnetic Property Measurement\n\nSystem. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "networks”, Phys. Stat. Solidi A **205** (6), 1394 (May 2008), doi: [10.1002/pssa.200778113](http://dx.doi.org/10.1002/pssa.200778113) .\n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, “In-\n\nfluence of O 2 and N 2 on the conductivity of carbon nan- otube networks”, Phys. Rev. B **79** (19), 195431 (May 2009), doi: [10.1103/PhysRevB.79.195431](http://dx.doi.org/10.1103/PhysRevB.79.195431) .\n\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi,\n\nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of\n\ndefects on the gas sensing properties of carbon nanotubes thin\n\nfilms: experiment and theory”, Chem. Phys. Lett. **387** (4-6), 356 (Apr. 2004), doi: [10.1016/j.cplett.2004.02.038](http://dx.doi.org/10.1016/j.cplett.2004.02.038) .\n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for\n\nsingle-molecule sensing”, Phys. Rev. B **80** (15), 155447 (Oct. 2009), doi: [10.1103/PhysRevB.80.155447](http://dx.doi.org/10.1103/PhysRevB.80.155447) .\n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and ´Angel Rubio, “Conductance of sidewall-functionalized\n\ncarbon nanotubes: Universal dependence on adsorption\n\nsites”, Phys. Rev. Lett. **101** (23), 236806 (Dec. 2008), doi: [10.1103/PhysRevLett.101.236806](http://dx.doi.org/10.1103/PhysRevLett.101.236806) .\n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “ *Ab*\n\n*initio* study of an iron atom interacting with single-wall car-\n\nbon nanotubes”, Phys. Rev. B **67** (20), 205414 (May 2003), doi: [10.1103/PhysRevB.67.205414](http://dx.doi.org/10.1103/PhysRevB.67.205414) .\n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian,\n\nand Y. Kawazoe, “Stable geometries and magnetic properties of\n\nsingle-walled carbon nanotubes doped with 3 *d* transition met-\n\nals: A first-principles study”, Phys. Rev. B **69** (7), 075414 (Feb 2004), doi: [10.1103/PhysRevB.69.075414](http://dx.doi.org/10.1103/PhysRevB.69.075414) .\n\n[16] S. H. Yang, W. H. Shin, J. W. Lee, S. Y. Kim, S. I. Woo, and\n\nJ. K. Kang, “Interaction of a transition metal atom with intrinsic\n\ndefects in single-walled carbon nanotubes”, J. Phys. Chem. B\n\n**110** (28), 13941 (Jun. 2006), doi: [10.1021/jp061895q](http://dx.doi.org/10.1021/jp061895q) . [17] K. T. Chan, J. B. Neaton, and M. L. Cohen, “First-principles\n\nstudy of metal adatom adsorption on graphene”, Phys. Rev. B\n\n**77** , 235430 (Jun. 2008), doi: [10.1103/PhysRevB.77.235430](http://dx.doi.org/10.1103/PhysRevB.77.235430) . [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, “Adsorption\n\nof small gas molecules onto Pt-doped single-walled carbon\n\nnanotubes”, J. Phys. Chem. C **112** (19), 7401 (Apr. 2008), doi: [10.1021/jp0753981](http://dx.doi.org/10.1021/jp0753981) .\n\n[19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, “Structures, in-\n\nteractions, and ferromagnetism of Fe-carbon nanotube sys-\n\ntems”, J. Phys. Chem. C **112** (22), 400 (May 2008), doi: [10.1021/jp0761968](http://dx.doi.org/10.1021/jp0761968) .\n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “ *Ab*\n\n*initio* study of spin-dependent transport in carbon nanotubes\n\nwith iron and vanadium adatoms”, Phys. Rev. B **78** (19), 195405 (Nov. 2008), doi: [10.1103/PhysRevB.78.195405](http://dx.doi.org/10.1103/PhysRevB.78.195405) .\n\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster,\n\nP. Pyykk¨o, and R. M. Nieminen, “Embedding transition-\n\nmetal atoms in graphene: Structure, bonding, and mag-\n\nnetism”, Phys. Rev. Lett. **102** (12), 126807 (Mar. 2009), doi: [10.1103/PhysRevLett.102.126807](http://dx.doi.org/10.1103/PhysRevLett.102.126807) .\n\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen,\n\n“Real-space grid implementation of the projector augmented\n\nwave method”, Phys. Rev. B **71** (3), 035109 (Jan. 2005), doi: [10.1103/PhysRevB.71.035109](http://dx.doi.org/10.1103/PhysRevB.71.035109) .\n\n[23] J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized gradi-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "Santos’ Strategic Projects team\n\nfocuses on assets that have\n\nproven difficult to commercialise\n\nor that need to be considered\n\nin a regional context rather than\n\non an individual basis.\n\nThe other key activity for this\n\nteam has been to lead Santos’\n\ncontinuous improvement focus.\n\n**UNITED STATES GAS**\n\nThe US gas business was a major\n\nfocus in 2004 for a number of\n\nreasons, not the least of which\n\nare the higher gas prices in the\n\nUS compared with the domestic\n\nAustralian market, and the ability\n\nto rapidly commercialise new\n\ndiscoveries.\n\nAn ongoing development and\n\ndelineation program was carried\n\nout during the year, yielding\n\nbetter than planned production.\n\nThe exploration initiative also\n\ncontinued to seek higher risk\n\nbut more material prospects,\n\naimed at enhancing the move\n\ninto the shallow water area of\n\nthe Gulf of Mexico. Exploration\n\nresults in this area during 2005\n\nwill shape Santos’ future strategy\n\nin the US.\n\n**TIGHT GAS**\n\nHydrocarbons contained in traps\n\nwith poor permeability are known\n\nas ‘tight gas’. Large tight gas\n\nresources are known to exist in\n\nthe Cooper Basin. Under current\n\ncircumstances, this gas cannot\n\nbe economically developed but,\n\nwith the combination of improved\n\nproduction techniques and better\n\ncommercial terms, could prove\n\nattractive.\n\nSantos assessed the resources\n\nand potential technologies that\n\ncould be applied to unlock these\n\nresources during 2004 and is now\n\nworking up a range of possible\n\nevaluation projects to be\n\nundertaken in 2005.\n\n**NORTHERN AUSTRALIA GAS**\n\nSantos has a significant existing\n\ngas resource base and some\n\npromising exploration acreage\n\nin the waters offshore Darwin,\n\nwhere it intends to drill a gas\n\nexploration well later this year.\n\nThe Company currently operates\n\nthe Mereenie gas field in the\n\nAmadeus Basin in central\n\nAustralia, which supplies gas to\n\nDarwin. Santos’ first offshore gas\n\nproduction in northern Australia\n\nbegins in 2006, sending Bayu-\n\nUndan gas to Darwin for\n\nconversion to LNG. Santos plans\n\nto build upon its growing\n\nposition in the region to target\n\nfurther development which could\n\nensure long-term gas supplies\n\nfor the current market, or an\n\nexpanded Northern Territory\n\ndomestic market, or for export.\n\n**PAPUA NEW GUINEA GAS**\n\nSantos is in active discussions\n\nwith the PNG Gas Project\n\nparticipants to potentially\n\nre-enter the PNG Gas Project.\n\nSantos has a significant interest\n\nin a large part of the liquids-rich\n\nHides gas field which is integral\n\nto the development of\n\nthe Project.\n\nAnnual Report 2004 22\n\n**‘Our objective is to derive value**\n\n**from undeveloped assets which**\n\n**have been outside of Santos’**\n\n**base business.’**\n\n**BRUCE WOOD**\n\nVice President\n\nStrategic Projects\n\n## Managing Options\n\nUNLOCKING THE VALUE OF STRATEGIC ASSETS\n\n**2004 CONTINGENT RESOURCES**\n\n(TOTAL 1,443 mmboe)\n\nNorthern Australia\n\n709 mmboe\n\nWestern Australia\n\n71 mmboe\n\nCentral Australia\n\n240 mmboe\n\nSouthern Australia\n\n32 mmboe\n\nPapua New Guinea\n\n391 mmboe", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Environmental Technologies is another growth business for us,\n\nand one in which we are focusing a significant portion of our\n\noverall R&D investment. We have helped shape this industry since\n\nour invention of the ceramic catalytic converter substrate in the\n\n1970s. Today, we are working globally with the automotive\n\nand truck industries to develop and manufacture innovative new\n\nsubstrate and filter products to further reduce emissions from\n\nboth gasoline- and diesel-powered vehicles. By around 2008, the\n\ndiesel emission control business could be as big as our automotive\n\nemission control business is today. Our new clean-air products plant\n\nin Erwin, N.Y., is expected to be up and running by mid-decade\n\nin support of this great diesel opportunity.\n\nOur Semiconductor Optics business — with some exciting new\n\ndevelopments in the production of calcium fluoride crystals and continued breakthroughs in the creation of HPFS ® fused silica\n\n— is helping the semiconductor industry develop faster and\n\nmore powerful integrated circuits. Our long-standing leadership\n\nin optical materials composition and optics design continues to be\n\nbased on our unique set of skills in basic materials science, glass\n\nchemistry and metrology.\n\nS E M I C O N D U C T O R O P T I C S : C A L C I U M F L U O R I D E C R Y S T A L S\n\nE N A B L I N G : M I C R O C I R C U I T L I N E S A T 1 / 1 0 0 0 T H E W I D T H O F A H U M A N H A I R\n\n5\n\nC O R N I N G T E C H N O L O G I E S", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_GLW_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2538.pdf", - "query": "What seems to be a great technique to ensure vacancies are formed in carbon nanotubes (CNT) ?", - "target_page": 4, - "target_passage": "Furthermore, it has been shown that CNT vacan- cies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ion", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "2\n\n4\n\n6\n\n8\n\nFormation Energy *E*\n\n*form*\n\n[eV] Empty Monovacancy\n\nEmpty Divacancy II\n\nEmpty Divacancy I\n\nMonovacancy Divacancy I Divacancy II\n\nCarbon Nanotube Axis\n\nFIG. 1: Structural schematics and formation energy for a 3d tran-\n\nsition metal occupied monovacancy (black), divacancy I (gray), or\n\ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies\n\nof the empty vacancies are indicated by dashed lines.\n\nis the total energy of the pristine nanotube with a physisorbed\n\ntransition metal atom. We have considered the monovacancy\n\nand two divacancies shown in Fig. 1 . The energy required to\n\nform an empty vacancy is obtained from\n\n*E* form [ VC ] = *E* [ VC ] + *nE* [ C ] *−* *E* [ NT ] *,* (2)\n\nwhere *E* [VC] is the total energy of the nanotube with a va-\n\ncancy of *n* atoms.\n\nThe calculated formation energies for the 3d transition met-\n\nals are shown in Fig. 1 . From the horizontal lines we see that\n\nboth divacancies are more stable than the monovacancy. This\n\nmay be attributed to the presence of a two-fold coordinated C\n\natom in the monovacancy, while all C atoms remain three-fold\n\ncoordinated in the divacancies. When a transition metal atom\n\noccupies a vacancy, the strongest bonding to the C atoms is\n\nthrough its *d* orbitals [ 26 ]. For this reason, Cu and Zn, which\n\nboth have filled d-bands, are rather unstable in the CNT. For\n\nthe remaining metals, adsorption in the monovacancies leads\n\nto quite stable structures. This is because the three-fold coor-\n\ndination of the C atoms and the CNT’s hexagonal structure are\n\nrecovered when the metal atom is inserted. On the other hand,\n\nmetal adsorption in divacancies is slightly less stable because\n\nof the resulting pentagon defects, see upper panel in Fig. 1 . A\n\nsimilar behaviour has been reported by Krasheninnikov *et al.*\n\nfor transition metal atoms in graphene [ 21 ].\n\nThe adsorption energies for N 2 , O 2 , H 2 O, CO, NH 3 , and\n\nH 2 S on the metallic site of the doped (6,6) CNTs are shown in\n\nFig. 2 (a). The adsorption energy of a molecule *X* is defined\n\nby\n\n*E* ads [ *X* @M@VC ] = *E* [ *X* @M@VC ] *−* *E* [ *X* ] *−* *E* [ M@VC ] *,* (3)\n\nN 2\n\nO 2\n\nN 2\n\nO 2\n\nN 2\n\nO 2\n\nCO 2 H O\n\n3 NH\n\n2 H S\n\nCO\n\nCO\n\n2 H O\n\n3 NH\n\n2 H S\n\n2 H O\n\n3 NH\n\n2 H S\n\nN 2\n\nO 2\n\nN 2\n\nO 2\n\nN 2\n\nO 2\n\nCO 2 H O\n\n3 NH\n\n2 H S\n\nCO\n\nCO\n\n2 H O\n\n3 NH\n\n2 H S\n\n2 H O\n\n3 NH\n\n2 H S\n\nMonovacancy\n\nDivacancy II\n\nDivacancy I\n\nDivacancy II\n\nDivacancy I\n\nMonovacancy\n\nCr Fe Co Ni Cu Zn Mn Ti V\n\n0.0 (a) Adsorption Energy [eV] −2.0 −1.5 −1.0 −0.5\n\nCr Fe Co Ni Cu Zn Mn Ti V\n\n0.0 +0.5 +1.0 0 (b) Conductance Change [G ] −1.0 −0.5\n\nFIG. 2: Calculated (a) adsorption energy *E* ads in eV and (b) change in conductance ∆ *G* in units of *G* 0 = 2 *e* 2 */h* for N 2 , O 2 , H 2 O, CO, NH 3 ,\n\nand H 2 S on 3d transition metals occupying a monovacancy (top),\n\ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon\n\nnanotube.\n\nwhere *E* [ *X* @M@VC] is the total energy of molecule *X* on\n\na transition metal atom occupying a vacancy, and *E* [ *X* ] is the\n\ngas phase energy of the molecule.\n\nFrom the adsorption energies plotted in Fig. 2 (a), we see\n\nthat the earlier transition metals tend to bind the adsorbates\n\nstronger than the late transition metals. The latest metals in\n\nthe series (Cu and Zn) bind adsorbates rather weakly in the\n\ndivacancy structures. We also note that O 2 binds significantly stronger than any of the three target molecules on Ti, V, Cr,\n\nand Mn (except for Cr in divacancy I where H 2 S is found to\n\ndissociate). Active sites containing these metals are therefore\n\nexpected to be completely passivated if oxygen is present in\n\nthe background. Further, we find H 2 O is rather weakly bound\n\nto most of the active sites. This ensures that these types of\n\nsensors are robust against changes in humidity.\n\nIn thermodynamic equilibrium [ 27 ], the coverage of the ac-\n\ntive sites follows from", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" - }, - { - "text": "change in CNT resistivity may then be obtained from the cal-\n\nculated coverages and single impurity conductances.\n\nWe find that oxidation of the active metal site passivates\n\nthe sensor in the case of doping by Ti, V, Cr, and Mn un-\n\nder standard conditions (room temperature and 1 bar of pres-\n\nsure). Among the remaining metals, we identify Ni as is the\n\nmost promising candidate for CO detection. For this system\n\nthe change in resistance per active site is generally significant\n\n( *>* 1 Ω ) for small changes in CO concentration in the relevant\n\nrange of around 0.1- 10 ppm. Our approach is quite general\n\nand is directly applicable to other nanostructures than CNTs,\n\nother functionalizations than metal doping, and other back-\n\ngrounds than atmospheric air.\n\nAll total energy calculations and structure optimizations\n\nhave been performed with the real-space density functional\n\ntheory (DFT) code GPAW [ 22 ] which is based on the projector augmented wave method. We use a grid spacing of 0.2 ˚ A for\n\nrepresenting the density and wave functions and the PBE ex-\n\nchange correlation functional [ 23 ]. Transport calculations for\n\nthe optimized structures have been performed using the non-\n\nequilibrium Green’s function method [ 24 ] with an electronic\n\nHamiltonian obtained from the SIESTA code [ 25 ] in a dou-\n\nble zeta polarized (DZP) basis set. Spin polarization has been\n\ntaken into account in all calculations.\n\nMetallic doping of a (6,6) CNT has been modeled in a su-\n\npercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 ˚ A *×* 15 ˚ A *×* 14.622 ˚ A). For this size\n\nof supercell a Γ -point sampling of the Brillouin zone was\n\nfound to be sufficient. The formation energy for creating a\n\nvacancy (VC) occupied by a transition metal atom (M) was\n\ncalculated using the relation\n\n*E* form [ M @ VC ] = *E* [ M @ VC ] + *nE* [ C ] *−* *E* [ M@NT ] (1) where *E* [M@VC] is the total energy of a transition metal\n\natom occupying a vacancy in the nanotube, *n* is the number\n\nof carbon atoms removed to form the vacancy, *E* [C] is the en-\n\nergy per carbon atom in a pristine nanotube, and *E* [M@NT]\n\narXiv:1001.2538v1 [cond-mat.mes-hall] 14 Jan 2010 Ti V Cr Mn Fe Co Ni Cu Zn 0", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "all *N* impurities. At this point it suffices to see that the con-\n\nservative estimates obtained from Eq. ( 7 ) predict measurable\n\nsignals in response to small changes in concentration of the\n\ntarget molecules.\n\nTo our knowledge, controlled doping of CNTs with transi-\n\ntion metal atoms has so far not been achieved. It has, how-\n\never, been found that metal atoms incorporated into the CNT\n\nlattice during catalytic growth are afterwards very difficult to\n\nremove [ 30 ]. Furthermore, it has been shown that CNT vacan-\n\ncies, which are needed for the metallic doping, may be formed\n\nin a controlled way by irradiation by Ar ions [ 31 ]. This sug-\n\ngests that metallic doping of CNTs should be possible.\n\nIn summary, we have presented a general model of nanos-\n\ntructured chemical sensors which takes the adsorption en-\n\nergies of the relevant chemical species and their individual\n\nscattering resistances as the only input. On the basis of this\n\nmodel we have performed a computational screening of tran-\n\nsition metal doped CNTs, and found that Ni-doped CNTs are\n\npromising candidates for detecting CO in a background of air.\n\nThe model may be applied straightforwardly to other nanos-\n\ntructures than CNTs, other functionalizations than metal dop-\n\ning and other gas compositions than air.\n\nThe authors acknowledge financial support from Span-\n\nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados\n\nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF\n\nproject (Contract Number 211956), “Red Espa˜nola de Super-\n\ncomputaci´on”, NABIIT and the Danish Center for Scientific\n\nComputing. The Center for Atomic-scale Materials Design\n\n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L\n\nacknowledges funding from Spanish MICINN through Juan\n\nde la Cierva and Jos´e Castillejo programs.\n\n*∗* Electronic address: [ juanmaria.garcia@ehu.es](mailto:juanmaria.garcia@ehu.es)\n\n[1] *Gas Sensing Materials, MRS Bull.* , vol. 24 (1999).\n\n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport\n\nproperties of nanotubes”, Rev. Mod. Phys. **79** (2), 677 (May 2007), doi: [10.1103/RevModPhys.79.677](http://dx.doi.org/10.1103/RevModPhys.79.677) .\n\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng,\n\nK. Cho, and H. Dai, “Nanotube molecular wires as\n\nchemical sensors”, Science **287** (5453), 622 (Jan. 2000), doi: [10.1126/science.287.5453.622](http://dx.doi.org/10.1126/science.287.5453.622) .\n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, “Ex-\n\ntreme oxygen sensitivity of electronic properties of car-\n\nbon nanotubes”, Science **287** (5459), 1801 (Mar. 2000), doi: [10.1126/science.287.5459.1801](http://dx.doi.org/10.1126/science.287.5459.1801) .\n\n[5] C. Hierold, *Carbon Nanotube Devices: Properties, Modeling,*\n\n*Integration and Applications* (Wiley-VCH, Weinheim, 2008).\n\n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval,\n\nL. M. Mart´ınez, H. Terrones, and M. Terrones, “Fabrica-\n\ntion of vapor and gas sensors using films of aligned CN *x*\n\nnanotubes”, Chem. Phys. Lett. **386** (1-3), 137 (Mar. 2004), doi: [10.1016/j.cplett.2004.01.052](http://dx.doi.org/10.1016/j.cplett.2004.01.052) .\n\n[7] A. R. Rocha, M. Rossi, A. Fazzio, and A. J. R.\n\nda Silva, “Designing real nanotube-based gas sen-\n\nsors”, Phys. Rev. Lett. **100** (17), 176803 (May 2008), doi: [10.1103/PhysRevLett.100.176803](http://dx.doi.org/10.1103/PhysRevLett.100.176803) .\n\n[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring\n\ngas sensing properties of carbon nanotubes”, J. Appl. Phys.\n\n**104** (2), 024502 (Jul. 2008), doi: [10.1063/1.2956395](http://dx.doi.org/10.1063/1.2956395) . [9] C. Morgan, Z. Alemipour, and M. Baxendale, “Variable\n\nrange hopping in oxygen-exposed single-wall carbon nanotube\n\nnetworks”, Phys. Stat. Solidi A **205** (6), 1394 (May 2008), doi: [10.1002/pssa.200778113](http://dx.doi.org/10.1002/pssa.200778113) .\n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, “In-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" - }, - { - "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain\n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally\n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding\n\nexcess thiol one can also vary the properties of the solvent [40].\n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin-\n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the\n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds\n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo-\n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For\n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin-\n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing\n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by\n\nthe solvent. This allows for a better control of the process and enables the use of contrast-enhanced\n\nmicroscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the\n\nregion of the receding contact line of toluene, silicon and air. With both techniques one may find\n\nmono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched\n\npatterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a\n\nmore controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the\n\ninteraction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold\n\ncores. For short chains (C 5 and C 8 ) no formation of branched structures is observed. At similar\n\nconcentrations, well-developed branched structures are formed for longer chains (C 10 and C 12 ).\n\nFor even longer chains (C 14 ), however, one again finds less branching. It also depends on the\n\namount of excess thiol in the solvent (for details see Ref. [40]).\n\nWhen following the evolution of the branched patterns in situ (see the complementary video\n\nmaterial of Ref. [40]), one clearly observes that different processes occur on different lenght\n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate.\n\nThe macroscopic front can be transversely unstable resulting in large-scale ( *>* 100 *µ* m) strongly\n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc-\n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be-\n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this\n\nstage it is possible to appreciate that the seemingly dry region left behind by the front is not at all\n\ndry, but covered by an ultrathin ‘postcursor’ film that is itself unstable. The thickness of this film\n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2669.pdf" - }, - { - "text": "## **Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes**\n\nJ. M. Garc´ıa-Lastra 1,2 , ** D. J. Mowbray 1,2 , K. S. Thygesen 2 , A. Rubio 1,3 , and K. W. Jacobsen 2 *1* *Nano-Bio Spectroscopy group and ETSF Scientific Development Centre,*\n\n*Dpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco,*\n\n*Centro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain* *2* *Center for Atomic-scale Materials Design, Department of Physics,*\n\n*Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark* *3* *Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany*\n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan-\n\notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH 3 , H 2 S) and the main components\n\nof air (N 2 , O 2 , H 2 O), we calculate the binding energy and change in conductance upon adsorption on a metal\n\natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis-\n\ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites\n\nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function\n\nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to\n\nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions.\n\nPACS numbers: 73.63.- b, 68.43.- h, 73.50.Lw\n\nThe ability to detect small concentrations of specific chem-\n\nical species is fundamental for a variety of industrial and sci-\n\nentific processes as well as for medical applications and en-\n\nvironmental monitoring [ 1 ]. In general, nanostructured mate-\n\nrials should be well suited for sensor applications because of\n\ntheir large surface to volume ratio which makes them sensi-\n\ntive to molecular adsorption. Specifically, carbon nanotubes\n\n(CNT) [ 2 ] have been shown to work remarkably well as de-\n\ntectors of small gas molecules. This has been demonstrated\n\nboth for individual CNTs [ 3 - 8 ] as well as for CNT networks\n\n[ 9 , 10 ].\n\nPristine CNTs are known to be chemically inert - a prop-\n\nerty closely related to their high stability. As a consequence,\n\nonly radicals bind strong enough to the CNT to notably affect\n\nits electrical properties [ 2 , 5 , 11 - 13 ]. To make CNTs attrac-\n\ntive for sensor applications thus requires some kind of func-\n\ntionalization, e.g. through doping or decoration of the CNT\n\nsidewall [ 13 - 21 ]. Ideally, this type of functionalization could\n\nbe used to control not only the reactivity of the CNT but also\n\nthe selectivity towards specific chemical species.\n\nIn this work we consider the possibility of using CNTs\n\ndoped by 3d transition metal atoms for chemical gas sens-\n\ning. We use computational screening to systematically iden-\n\ntify the most promising dopant candidates for detection of\n\nthree different target molecules (CO, NH 3 , H 2 S) under typi-\n\ncal atmospheric conditions. The screening procedure is based\n\non the calculation of two microscopic descriptors: the bind-\n\ning energy and scattering resistance of the molecules when\n\nadsorbed on a doped CNT. These two quantities give a good\n\nindication of the gas coverage and impact on the resistance.\n\nFor the most promising candidates we then employ a simple\n\nthermodynamic model of the CNT sensor. In this model, the\n\nbinding energies are used to obtain the fractional coverage of\n\nthe metallic sites as a function of the target molecule concen-\n\ntration under ambient conditions. Under the assumption of\n\ntransport in the diffusive rather than localization regime, the\n\nchange in CNT resistivity may then be obtained from the cal-\n\nculated coverages and single impurity conductances.\n\nWe find that oxidation of the active metal site passivates", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "**26** | ENVIRONMENTAL, HEALTH & SAFETY\n\nAs we explore for and produce clean, affordable, abundant, American\n\nnatural gas, we provide an important solution to our nation’s energy\n\nchallenges and its quest for energy independence. With at least a 200-\n\nyear supply of natural gas located right here in the U.S., this versatile\n\nfuel can be used to not only heat homes, create electricity and meet\n\nAmerica’s transportation needs, but also to fuel the country’s future\n\nby creating jobs and stimulating local and national economies through\n\ninvestment and taxes.\n\n**Environmentally Friendly Operations**\n\nAt Chesapeake, we realize that the way a great product is produced is\n\nas important as the product itself. For example, we have helped pioneer\n\nthe use of multiwell padsites to drill up to 16 wells from a single loca­\n\ntion, greatly reducing our land and road use and overall environmental\n\nfootprint. We use the latest horizontal and directional drilling technology\n\nto place wells at a safe distance from homes, schools and businesses. In\n\naddition, we build and maintain access roads and work to eliminate soil\n\nerosion near our sites, as well as restore local vegetation.\n\nWe implement advanced, modern protective measures known as Best\n\nManagement Practices (BMPs) to help ensure energy development is con­\n\nducted in an environmentally responsible manner. Procedures are imple­\n\nmented throughout our operations to protect freshwater aquifers and\n\nreduce environmental impacts. BMPs protect wildlife, air quality, water and\n\nlandscapes as we work to develop vitally needed domestic energy sources.\n\nImplemented throughout the entire life cycle of a well, BMPs can be\n\nas simple as strategically placing a berm, or land barrier, on locations\n\nto control surface water runoff. Others involve cutting-edge operational\n\ntechnologies such as utilizing the most advanced techniques offered in\n\ndrilling fluids, well casing and cement design. Regardless of complex­\n\nity, all BMPs are based on the idea that the environmental footprint of\n\nenergy development should be as small and temporary as possible.\n\nThese practices are continually evolving and further improving as\n\nChesapeake and the industry develop new innovative techniques and\n\napproaches to business.\n\nIn addition to our BMPs, Chesapeake has also initiated several\n\ninnovative internal programs focused on water recycling and greener\n\nhydraulic fracturing processes.\n\n* **Aqua Renew** * **®**\n\nCreated to meet the challenge of reducing our water usage, Chesapeake’s\n\n*Aqua Renew* ® program uses state-of-the-art technology to recycle pro­\n\nduced water. Since the\n\ncompany’s preliminary\n\nreclamation project in\n\n2006, our focus on water reuse and conservation has become a company-\n\nwide endeavor, stretching from the Barnett Shale of North Texas to the\n\nMarcellus Shale of northern Pennsylvania.\n\nThe *Aqua Renew* program has yet to find a limit to how much\n\nrecycled water could be used without compromising well production.\n\nIn fact, our Marcellus Shale operations are treating and recycling virtu­\n\nally 100% of produced water (more than 10 million gallons per month)\n\nfor reuse in our hydraulic fracturing operations. Properly conducted\n\nmodern fracking is a highly engineered, controlled, sophisticated and\n\nsafe procedure.\n\nWith such large volumes of recycled water, the company is see­\n\ning more than just environmental advantages. We estimate that this\n\n##### INVESTING IN OUR WORLD AND OUR PEOPLE »\n\n*Green operations — Chesapeake’s Best Management Practices ensure our*\n\n*operations are as environmentally friendly as possible, while protecting*\n\n*our employees, neighbors and the areas where we operate.*", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "gin of the interface magnetism then had to be inferred by\n\ncomparison to a series of reference samples 7 . Demonstra- tion of coupling between the bulk of the layers, i.e. , an\n\nexchange bias effect, would provide direct evidence of the\n\ninterface magnetic order. Moreover, such coupling would\n\noffer new means of manipulating the FM semiconductor\n\nspin state and utilizing the proximity polarization effect\n\nin a spintronic device.\n\nHere, we demonstrate an antiferromagnetic coupling\n\nand exchange bias in Fe/(Ga,Mn)As bilayer films, by\n\ncombining element-specific XMCD measurements and\n\nbulk-sensitive superconducting quantum interference de-\n\nvice (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers 4,5 (and in con-\n\ntrast to AFM coupled FM metal/FM metal exchange bias\n\nstructures 10,11 ) the layers are in direct contact without\n\na non-magnetic spacer in between. We distinguish in-\n\nterface and bulk (Ga,Mn)As layers that are respectively\n\nstrongly and weakly antiferromagnetically coupled to the\n\nFe overlayer. In agreement with Ref. 7 , the interface layer\n\nremains polarized at room temperature.\n\nThe Fe and (Ga,Mn)As layers of the present study\n\nwere both grown by molecular beam epitaxy in the same\n\nultra-high vacuum system, in order to ensure a clean in-\n\nterface between them. The (Ga,Mn)As layer of thickness\n\n10 to 50 nm was deposited on a GaAs(001) substrate\n\nat a temperature of 260 C, using previously established\n\nmethods 3,8 . A low Mn concentration of x ≈ 0 . 03 was\n\nchosen in order to avoid the formation of compensating\n\nMn interstitials. The substrate temperature was then\n\nreduced to ∼ 0 C, before depositing a 2 nm Fe layer,\n\nplus a 2 nm Al capping layer. In-situ reflection high\n\nenergy electron diffraction and ex-situ x-ray reflectivity\n\nand diffraction measurements confirmed that the layers\n\nare single-crystalline with sub-nm interface roughness.\n\nSQUID magnetometry measurements were performed us-\n\ning a Quantum Design Magnetic Property Measurement\n\nSystem. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "## **I. INTRODUCTION**\n\nThe patterns formed in dewetting processes have attracted strong interest since Reiter analysed the\n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in\n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is\n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The\n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a\n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines\n\nof small drops due to a Rayleigh-type instability [1- 3]. The related problems of retracting contact\n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also\n\nbeen studied [4, 5].\n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple\n\nnon-volatile liquids and polymers (for reviews see Refs. [6- 8]). All stages of the dewetting of a\n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal\n\ndewetting) [1, 9- 13], the growth process of individual holes [14- 16], the evolution of the resulting\n\nhole pattern [3, 13], and the stability of the individual dewetting fronts [17- 19]. We note in\n\npassing, that descriptions of dewetting patterns may also be found in historic papers, particularly\n\nfor the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40]\n\nconsidered turpentine on water and Marangoni [21, p. 352f] oil on water.\n\nMore recently, interest has turned to the dewetting processes of solutions and suspensions. How-\n\never, these systems have not yet been investigated in any great depth. Such systems are compli-\n\ncated because their behaviour is determined by the interplay between the various solute (or colloid)\n\nand solvent transport processes. Furthermore, the solvents that are used often evaporate, i.e., one\n\nhas to distinguish between ‘normal’ convective dewetting and evaporative dewetting. A number\n\nof experiments have been performed employing (colloidal) solutions of polymers [22- 25], macro-\n\nmolecules like collagen and DNA [26- 31] and nanoparticles [32- 40]. The latter are sometimes\n\nreferred to as ‘nanofluids’. The initial focus of much of the research in the field has been on\n\ninvestigating the structures that are formed which are similar to the ones observed in the ‘classi-\n\ncal’ dewetting of non-volatile liquids. Labyrinthine structures and polygonal networks result from\n\nspinodal dewetting and heterogeneous nucleation and growth, respectively. They are ‘decorated’\n\nwith the solute and therefore conserve the transient dewetting pattern as a dried-in structure when\n\nall the solvent has evaporated [28, 34]. The picture is, however, not complete. The solute may\n\n3", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2669.pdf" - }, - { - "text": "(a) (b)\n\n(c) (d)\n\nFIG. 1: (Colour online) Images of strongly ramified dewetting structures obtained using Atomic Force\n\nMicroscopy in the case of (a) an aqueous collagen solution on graphite (courtesy of U. Thiele, M. Mertig\n\nand W. Pompe; see also Ref. [42]. Image size: 5 *µ* m *×* 5 *µ* m); (b) poly(acrylic acid) in water spin-coated onto\n\na polystyrene substrate (reprinted with permission of John Wiley & Sons, Inc. from Ref. [23]; copyright\n\nJohn Wiley & Sons, Inc. 2002; Image size: 2 *.* 5 *µ* m *×* 2 *.* 5 *µ* m); and in both (c) and (d), a solution of gold\n\nnanoparticles in toluene, spin-coated onto native oxide terminated silicon substrates (scale bars given in\n\npanels). In all the images the lighter areas correspond to the deposited solute and the dark areas to the\n\nempty substrate.\n\n5", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2669.pdf" - }, - { - "text": "Martha Burger\n\nSenior Vice President -\n\nHuman and Corporate Resources\n\n**What innovations and advancements have led to CHK’s ability to produce liquids from**\n\n**shales and other tight reservoirs?**\n\nDuring the past five years, Chesapeake and a few other leaders in the independent E&P industry have developed\n\nexpertise in exploiting shales and other tight reservoir formations targeting natural gas through the combination of\n\nhorizontal drilling and advanced fracture stimulation techniques. This has allowed the commercialization of plays that\n\nwere previously uneconomic, most notably in shale formations. Part of our success in producing liquids from tight\n\nreservoirs has come from the company’s ability to extend the technological advances gained in the development of\n\ntight natural gas formations to new formations known to contain substantial liquids. This led to our first liquids-rich\n\nplay discovery in the Colony Granite Wash in 2007. As we have increased our focus on liquids-rich plays, we have ben­\n\nefited from a growing understanding and mapping of petrophysical properties in unconventional formations as well\n\nas an enhanced understanding of the geochemical nature of liquids-rich reservoirs. This has allowed Chesapeake to\n\nbetter identify formations most likely to generate liquids-rich production, including more than a dozen new plays for\n\nthe company. We have subsequently improved the success of our liquids-rich plays through the use of optimal well­\n\nbore lateral lengths, better placement of well laterals though advanced wellbore steering techniques and customized\n\nfracture stimulation designs for liquids-rich plays that allow the company to achieve a greater stimulated rock volume\n\nin low permeability reservoirs. Finally, the advancements Chesapeake has made in developing liquids-rich plays have\n\nbeen made possible through the use of our proprietary Reservoir Technology Center that has become the industry’s most advanced shale core laboratory.\n\n**It is often said that the energy industry has an aging work force that is fast approaching**\n\n**retirement age. How is Chesapeake addressing this?**\n\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down­\n\nturn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong compe­\n\ntition from other industries lured away many of the best and brightest science and technology graduates, and today\n\nmany experienced professionals who stayed in the industry through the downturn are approaching retirement age.\n\nAs a result, one of our industry’s greatest challenges over the past 10 years has been to develop a new generation\n\nof natural gas and oil professionals who have the knowledge and experience required to meet the nation’s growing\n\nenergy needs.\n\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting\n\nand training a new generation of energy professionals would impact the company’s future success and its ability to\n\ncompete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs\n\nand decided to create a world-class college recruiting and intern program to recruit the most promising industry\n\ntalent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go\n\non to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive\n\nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads\n\nand career counselors at the more than 31 universities where we actively recruit.\n\nAs a result of these efforts, young professionals in a wide range of disciplines, from scientists and engineers to land management and legal", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HNI_2003.pdf", - "query": "How many employees did HON Industries count in 2003 ?", - "target_page": 15, - "target_passage": "Members (employees) at year-end : 8,926", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "32\n\nThe following discussion of the Company’s historical results of opera-\n\ntions and of its liquidity and capital resources should be read in\n\nconjunction with the Consolidated Financial Statements of the\n\nCompany and related notes.\n\n####### **Overview**\n\nThe Company has two reportable core operating segments: office furni-\n\nture and hearth products. The Company is the second largest office\n\nfurniture manufacturer in the United States and the nation’s leading\n\nmanufacturer and marketer of gas- and wood-burning fireplaces.\n\nFrom 2000 to 2003, the office furniture industry experi-\n\nenced an unprecedented three-year decline due to the challenging\n\neconomic environment. In 2003, this decline negatively impacted the\n\nCompany’s office furniture segment. In contrast, the housing market\n\nwas at record high levels during 2003, which positively impacted the\n\nCompany’s hearth segment. The Company outperformed its peers in\n\nboth segments in which it competes. The Company gained market\n\nshare by providing strong brands, innovative products and services,\n\nand greater value to its end-users. Fiscal 2003 also included an extra\n\nweek of activity due to the Company’s 52/53-week fiscal year.\n\nNet sales were $1.8 billion in 2003, as compared to $1.7 bil-\n\nlion in 2002. The increase in net sales reflects the 9% increase in the\n\nhearth segment and the additional week of business activity. In 2003\n\nand 2002, the Company recorded restructuring charges and accelerated\n\ndepreciation related to the closure and consolidation of office furniture\n\nfacilities totaling $15.2 million and $3.0 million, respectively. Gross\n\nmargins increased to 36.4% in 2003 from 35.4% in 2002 due to benefits\n\nfrom restructuring initiatives and its rapid continuous improvement\n\nprogram, new products, and increased price realization. The Company\n\nalso invested aggressively in brand building and selling initiatives in\n\n2003. Net income was $98.1 million or $1.68 per diluted share in 2003,\n\nas compared to $91.4 million or $1.55 per diluted share in 2002.\n\nThe Company generated $141.3 million in cash flow from\n\noperating activities and increased its cash position, including short-\n\nterm investments, by $48.6 million to $204.2 million. The Company\n\npaid dividends of $30.3 million and repurchased $21.5 million of its\n\ncommon stock, while investing $35.7 million in net capital expendi-\n\ntures and repaying $20.2 million of debt.\n\n####### **Critical Accounting Policies and Estimates**\n\n* **GEN ERAL** *\n\nManagement’s Discussion and Analysis of Financial Condition and\n\nResults of Operations is based upon the Consolidated Financial\n\nStatements, which have been prepared in accordance with GAAP. The\n\npreparation of these financial statements requires management to\n\nmake estimates and assumptions that affect the reported amounts of\n\nassets, liabilities, revenue and expenses, and related disclosure of con-\n\ntingent assets and liabilities. Management bases its estimates on\n\nhistorical experience and on various other assumptions that are\n\nbelieved to be reasonable under the circumstances, the results of which\n\nform the basis for making judgments about the carrying values of assets\n\nand liabilities that are not readily apparent from other sources. Senior\n\nmanagement has discussed the development, selection and disclosure\n\nof these estimates with the Audit Committee of our Board of Directors.\n\nActual results may differ from these estimates under different assump-\n\ntions or conditions.\n\nAn accounting policy is deemed to be critical if it requires an\n\naccounting estimate to be made based on assumptions about matters\n\nthat are uncertain at the time the estimate is made, and if different\n\nestimates that reasonably could have been used, or changes in the\n\naccounting estimates that are reasonably likely to occur periodically,\n\ncould materially impact the financial statements. Management believes\n\nthe following critical accounting policies reflect its more significant", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Revenues from continuing operations $ 62,803,000\n\n| $ 59,533,000 5,782,000 4,065,000 $ 2.18 1,863,000 |\n|:---|\n| 2002 |\n| $ 60,807,000 14,787,000 10,337,000 $ 41,691,000 |\n\nOperating income 6,923,000\n\nIncome from continuing operations 4,892,000\n\nEarnings per diluted share from continuing operations $ 2.66\n\nWeighted average diluted shares outstanding 1,839,000\n\nTotal assets $ 60,050,000\n\nWorking capital 13,803,000\n\nLong-term debt 4,287,000\n\nStockholders’ equity $ 44,604,000\n\nFor the year ended December 31, 2003 2002\n\nAs of December 31, 2003\n\n1999 2000 2001 2002 2003 1999 2000 2001 2002 2003 1999 2000 2001 2002 2003\n\n.50\n\n1.00\n\n1.50\n\n2.00\n\n2.50\n\n$3.00\n\n60\n\n$70\n\n50\n\n40\n\n30\n\n20\n\n10\n\n6.0 $7.0\n\n5.0\n\n4.0\n\n3.0\n\n2.0\n\n1.0\n\n*Earnings Per Diluted Share From*\n\n*Continuing Operations*\n\n*Revenues*\n\n*(In millions)*\n\n*Operating Income*\n\n*(In millions)*\n\n#### 2 0 0 3 F I N A N C I A L H I G H L I G H T S\n\n## 1", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "61\n\n####### **Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is\n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement\n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that\n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day.\n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining\n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to\n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors.\n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s\n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and\n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years.\n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the\n\nNew York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that\n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules.\n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man-\n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance.\n\nSincerely,\n\nThe HON INDUSTRIES Board of Directors\n\nA MESSA GE FR OM T H E B OA R D OF DI R ECT OR S\n\nStan A. Askren\n\nGary M. Christensen\n\nCheryl A. Francis\n\nRobert L. Katz\n\nDennis J. Martin\n\nJack D. Michaels\n\nJoseph Scalzo\n\nAbbie J. Smith\n\nRichard H. Stanley\n\nBrian E. Stern\n\nRonald V. Waters, III", - "page_start": 60, - "page_end": 60, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "33 ■ 2003 ANNUAL REPORT\n\n#### **SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n##### **Note 10. Stock Incentive Plan (Continued)**\n\n**2003** 2002 2001\n\nDividend rate **1.68% to 2.35%** 1.52% 1.78%\n\nRisk-free interest rate **3.00% to 3.18%** 4.24% 4.31%\n\nExpected lives of options **5 to 10 years** 5 years 5 years\n\nPrice volatility **38.83% to 51.02%** 30.03% 38.29%\n\nA summary of the status of the Plan at December 31, 2003, 2002 and 2001 and changes during the years ended on those dates is as follows:\n\nShares\n\nWeighted Average Grant Price Per Share Fair Value Per Share Outstanding January 1, 2001 117,122 $12.50\n\nGranted 39,938 15.79 $ 5.51 Cancelled (6,580) 14.86 Exercised (12,426) 10.72\n\nOutstanding December 31, 2001 138,054 13.51\n\nGranted 47,646 17.59 4.08 Cancelled (19,758) 13.95 Exercised (16,238) 11.27\n\nOutstanding December 31, 2002 149,704 14.99\n\nGranted 75,396 18.89 4.24 to 11.37 Cancelled (11,892) 16.62 Exercised (40,988) 11.89\n\n##### **Outstanding December 31, 2003 172,220**\n\nThere were 85,670, 91,658 and 83,114 shares exercisable at December 31, 2003, 2002 and 2001, at weighted average exercise prices per share of, $15.94, $13.70, and $11.71, respectively. During 2002, the Company issued 4,654 shares of Company stock to employees valued at $100 thousand in recognition of the Company’s 100 th year anniversary. The following table summarizes information about stock options outstanding at December 31, 2003:\n\nExercise Prices Shares Outstanding Option Life Remaining Shares Exercisable\n\n1999 $ 9.97 9,700 1 year 9,700\n\n2000 17.19 25,900 2 years 25,900\n\n2001 15.79 31,626 3 years 31,626\n\n2002 17.59 36,888 4 years 18,444\n\n2003 **17.98-22.01 68,106 5 to 10 years** -\n\n##### **Note 11. Major Customers**\n\nThe Company has one major customer and relationship that is a significant source of revenue. In 2003, as during the past number of years, the Company's relationship with Sprint continued to increase, due to growth in the PCS business segment. Approximately 61.2% of total revenues in 2003 were generated by or through Sprint and its customers using the Company's portion of Sprint’s nationwide PCS network. This was compared to 57.6% in 2002, and 47.1% of total revenue in 2001. No other customer relationship on a stand-alone basis generates more than 2.5% of the Company’s total revenue for 2003, 2002 and 2001.\n\n$\n\n$\n\n$", - "page_start": 34, - "page_end": 34, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "afkljdf aojvoaipdddd SEEKI NG\n\n#### I NVEST OR S\n\nFOR A P ER FECT\n\n#### MA T CH\n\nJoin us in the dynamic, aggressive, profitable\n\ngrowth of HON INDUSTRIES.\n\nT H E B EST I S YET T O COME!\n\nManagement’s Discussion and Analysis … 32\n\nConsolidated Financial Statements and Notes … 39\n\nEleven-Year Summary … 56\n\nReports of Independent Auditors … 58\n\nA Message from the Board of Directors … 61\n\nBoard of Directors and Officers … 62", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "51\n\nNumber of Weighted-Average\n\nShares Exercise Price\n\n*Outstanding at December 30, 2000* 918,250 $ 21.89\n\nGranted 266,500 23.39\n\nExercised (17,500) 18.31\n\nForfeited (37,000) 21.57\n\n*Outstanding at December 29, 2001* 1,130,250 $ 22.32\n\nGranted 290,000 25.77\n\nExercised - -\n\nForfeited (17,000) 21.69\n\n*Outstanding at December 28, 2002* 1,403,250 $ 23.03\n\nGranted 446,500 26.78\n\nExercised (362,000) 23.10\n\nForfeited (18,500) 23.57\n\n*Outstanding at January 3, 2004* **1,469,250 $ 24.15**\n\nOptions exercisable at:\n\nJanuary 3, 2004 **202,250 $ 25.47**\n\nDecember 28, 2002 **156,250 25.02**\n\nDecember 29, 2001 **105,000 24.86**\n\nThe following table summarizes information about fixed stock options\n\noutstanding at January 3, 2004:\n\nOptions\n\nOptions Outstanding Exercisable\n\nWeighted- Weighted- Number\n\nAverage Average Exercisable\n\nRange of Number Remaining Exercise at January 3,\n\nExercise Prices Outstanding Contractual Life Price 2004\n\n$24.50- $28.25 31,000 2.9 years $ 25.71 31,000\n\n$32.22 20,000 4.1 years $ 32.22 20,000\n\n$23.47 101,250 5.1 years $ 23.47 101,250\n\n$18.31- $26.69 411,000 6.6 years $ 20.42 50,000\n\n$23.32- $25.27 223,500 7.1 years $ 23.41 -\n\n$25.75- $25.77 261,000 8.1 years $ 25.77 -\n\n$25.50- $42.98 421,500 9.2 years $ 26.83 -\n\n####### **Retirement Benefits**\n\nThe Company has defined contribution profit-sharing plans cover-\n\ning substantially all employees who are not participants in certain\n\ndefined benefit plans. The Company’s annual contribution to the de-\n\nfined contribution plans is based on employee eligible earnings and\n\nresults of operations and amounted to $26,489,000, $23,524,000,\n\nand $24,826,000 in 2003, 2002, and 2001, respectively.\n\nThe Company sponsors defined benefit plans which include\n\na limited number of salaried and hourly employees at certain subsidiar-\n\nies. The Company’s funding policy is generally to contribute annually\n\nthe minimum actuarially computed amount. Net pension costs relating\n\nto these plans were $176,000; $0; and $0 for 2003, 2002, and 2001,\n\nrespectively. The actuarial present value of obligations, less related plan\n\nassets at fair value, is not significant.\n\nThe Company also participates in a multiemployer plan,\n\nwhich provides defined benefits to certain of the Company’s union\n\nemployees. Pension expense for this plan amounted to $309,000,\n\n$309,000, and $310,000 in 2003, 2002, and 2001, respectively.\n\n####### **Postretirement Health Care**\n\nIn accordance with the guidelines of revised SFAS No. 132, “Employers’\n\nDisclosures about Pensions and other Postretirement Benefits,” the fol-\n\nlowing table sets forth the funded status of the plan, reconciled to the\n\naccrued postretirement benefits cost recognized in the Company’s bal-\n\nance sheet at:\n\n*(In thousands)* **2003** 2002 2001\n\n*Change in benefit obligation*\n\nBenefit obligation at beginning\n\nof year $ 17,351 $ 12,229\n\n| $ 17,617 249 1,105 (1,206) 566 - |\n|:---|\n| $ 18,331 |\n| $ - 11,456 (1,206) |\n| $ 10,250 |\n| $ (8,081) 1,105 5,361 1,122 |\n| $ (493) |\n| $ (493) |\n\nService cost 398 278\n\nInterest cost 1,091 941\n\nBenefits paid (1,356) (952)\n\nActuarial (gain) or loss 133 3,042\n\nCurrent year prior service cost - 1,813\n\nBenefit obligation at end of year $ 17,617 $ 17,351\n\n*Change in plan assets*\n\nFair value at beginning of year $ - $ -\n\nEmployer contributions 1,356 952\n\nBenefits paid (1,356) (952)\n\nFair value at end of year $ - $ -\n\n*Reconciliation of funded status*\n\nFunded status $ (17,617) $ (17,351)\n\nUnrecognized actuarial (gain)\n\nor loss 539 364\n\nUnrecognized transition\n\nobligation or (asset) 5,942 6,523\n\nUnrecognized prior service cost 1,352 1,582\n\nNet amount recognized at\n\nyear-end $ (9,784) $ (8,882)\n\n*Amounts recognized in the*\n\n*statement of financial position*\n\n*consist of:*\n\nAccrued benefit liability $ (9,784) $ (8,882)\n\nNet amount recognized at\n\nyear-end, included in\n\nOther Liabilities $ (9,784) $ (8,882)", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY ■ 6\n\n0\n\n20\n\n40\n\n60\n\n80\n\n00\n\n1999 2000 2001 2002 2003\n\nWholesale\n\nPost-paid\n\n47\n\n10\n\n22\n\n70\n\n68 68\n\n89 89\n\n98\n\n0\n\n20\n\n40\n\n60\n\n80\n\n100\n\n1999 2000 2001 2002 2003\n\n69\n\n30\n\n44\n\n93\n\n106\n\n0\n\n10\n\n20\n\n30\n\n40\n\n1999 2000 2001 2002 2003\n\n29\n\n16\n\n44\n\n23\n\n12\n\n0\n\n20\n\n40\n\n60\n\n80\n\n100\n\n1999 2000 2001 2002 2003\n\nN t I\n\n6\n\n10\n\n16\n\n5\n\n32\n\n3\n\n10\n\n(-3)\n\n5\n\n10\n\nIncome from\n\nContinuing Operations\n\nNet Income\n\n*(Front, left to right): Earle A. MacKenzie, Executive VP, Len L. Greisz, Director of Internal Control, Christopher E. French, President,*\n\n*Daniel R. Detamore-Hunsberger, Controller, Marcy J. Engle, Human Resources Manager.*\n\n*(Back, left to right): David K. MacDonald, VP - Operations, David E. Ferguson, VP - Customer Services, Lori W. Warren, Director of*\n\n*Regulatory Affairs, Chris S. Kyle, Director of Planning, William L. Pirtle, VP - Sales, Laurence F. Paxton, VP - Information Technology*\n\n### **PCS Customers**\n\n##### **(thousands)**\n\n### **Revenue**\n\n##### **($ millions)**\n\n### **Capital Expenditures**\n\n##### **($ millions)**\n\n### **Net Income**\n\n##### **($ millions)**\n\n(-3)", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "-\n\n-\n\n-\n\n-\n\n18 June 2002\n\n18 June 2005\n\n17 June 2007\n\n6.20\n\n750,000\n\n-\n\n50,000\n\n-\n\n700,000\n\n-\n\n-\n\n-\n\n-\n\n12 December 2003\n\n22 December 2004\n\n22 December 2007\n\n6.38\n\n-\n\n208,314\n\n-\n\n-\n\n208,314\n\n-\n\n-\n\n-\n\n-\n\n12 December 2003\n\n12 December 2006\n\n22 December 2008\n\n6.38\n\n-\n\n100,000\n\n-\n\n-\n\n100,000\n\n-\n\n-\n\n-\n\n-\n\n7,140,000\n\n308,314\n\n200,000\n\n1,250,000\n\n5,998,314\n\n1,365,000\n\n5,721,600\n\n1,250,000\n\n7,348,850\n\n1\n\nShares issued on the exercise of options have occurred at varying dates throughout the 2003 financial year.\n\n2\n\nThe fair value of shares issued as a result of exercising options during the 2003 financial year has been determined using the market price of the Company’s ordinary shares on the Australian Stock Exchange as at close of trading on the respective issue dates.", - "page_start": 67, - "page_end": 67, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**SHAREHOLDER INQUIRIES**\n\nRequests to transfer Applied Industrial\n\nTechnologies, Inc. shares and all\n\ncorrespondence regarding address change\n\ninformation, duplicate mailings, missing\n\ncertificates, failure to receive dividend\n\nchecks in a timely manner or to participate\n\nin the Company’s direct stock purchase\n\nprogram should be directed to the\n\nCompany’s transfer agent and registrar:\n\n**COMPUTERSHARE TRUST COMPANY, N.A.**\n\n250 Royall Street\n\nCanton, MA 02021\n\n800/988-5291\n\n**INVESTOR RELATIONS INQUIRIES SHOULD**\n\n**BE DIRECTED TO:**\n\n**MARK O. EISELE**\n\nVice President - Chief Financial Officer\n\n& Treasurer\n\nApplied Industrial Technologies\n\n1 Applied Plaza\n\nCleveland, OH 44115-5014\n\nTelephone: 216/426-4000, Fax: 216/426-4845\n\n**ANNUAL REPORT ON FORM 10-K**\n\n**The Applied Industrial Technologies, Inc.**\n\n**Annual Report on Form 10-K for the fiscal**\n\n**year ended June 30, 2012, including the**\n\n**financial statements and schedules thereto,**\n\n**is available at our website at**\n\n**www.Applied.com. It is also available**\n\n**without charge upon written request to the**\n\n**Vice President - Chief Financial Officer &**\n\n**Treasurer at the address shown.**\n\n**ANNUAL MEETING**\n\nThe Annual Meeting of Shareholders will be held\n\nat 10:00 a.m., Tuesday, October 23, 2012, at the\n\nCorporate Headquarters of Applied Industrial\n\nTechnologies, 1 Applied Plaza, East 36th and\n\nEuclid Avenue, Cleveland, Ohio 44115.\n\n**2007 2008 2009 2010 2011 2012**\n\nApplied Industrial Technologies, Inc. $100.00 $83.63 $70.22 $92.62 $133.17 $141.07\n\nStandard & Poor’s 500 100.00 86.88 64.11 73.36 95.88 101.10\n\nPeer Group 100.00 86.96 74.77 100.34 148.47 170.81\n\nAssumes $100 invested at the close of trading 6/30/07 in\n\nApplied Industrial Technologies, Inc. common stock, Standard\n\n& Poor’s 500, and Peer Group.\n\nCumulative total return assumes reinvestment of dividends.\n\nThe returns of the companies in the Peer Group are weighted\n\nbased on the companies’ relative stock market capitalization.\n\nPeer Group companies selected on a line-of-business basis\n\ninclude: DXP Enterprises, Inc.; Fastenal Company; Genuine\n\nParts Company; W. W. Grainger, Inc.; Kaman Corporation;\n\nLawson Products, Inc.; MSC Industrial Direct Co., Inc.; and\n\nWESCO International, Inc.\n\nSource: Value Line Publishing LLC\n\nApplied Industrial Technologies, Inc., Standard & Poor’s 500, and Peer Group\n\n(Performance Results from 7/1/2007 through 6/30/2012)\n\nApplied Industrial Technologies, Inc. common stock is listed on the New York Stock Exchange under the symbol AIT. The Company is identified in most\n\nfinancial listings as “AppliedIndlTch.”\n\n**BB&T CAPITAL MARKETS**\n\nHolden Lewis, 703/471-3894\n\n**CJS SECURITIES**\n\nJonathan Tanwanteng, 914/287-7600\n\n**CLEVELAND RESEARCH COMPANY**\n\nAdam Uhlman, 216/649-7241\n\n**KEYBANC CAPITAL MARKETS**\n\nJeffrey D. Hammond, 216/689-0236\n\n**SIDOTI & CO.**\n\nJoseph Mondillo, 212/894-3339\n\n**GREAT LAKES REVIEW - Division of**\n\n**Wellington Shields & Co.**\n\nElliott Schlang, 216/767-1340\n\n**STEPHENS INC.**\n\nMatt Duncan, 501/377-3723\n\n**WELLS FARGO SECURITIES, LLC**\n\nAllison Poliniak-Cusic, 212/214-5062\n\n**WUNDERLICH SECURITIES**\n\nBrent D. Rakers, 901/251-2236\n\n**RESEARCH ON APPLIED INDUSTRIAL TECHNOLOGIES IS AVAILABLE THROUGH:**\n\n**COMPARISON OF FIVE-YEAR CUMULATIVE TOTAL RETURN**\n\n$0.00\n\n$50.00\n\n$100.00\n\n$150.00\n\n$200.00\n\n2007 2008 2009 2010 2011 2012\n\nApplied Industrial Technologies, Inc.\n\nStandard & Poor's 500\n\nPeer Group", - "page_start": 46, - "page_end": 46, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "29\n\nH ON I NDUST R I ES 2 0 0 3\n\nOFFI CE FUR NI T UR E A T -A -GLA NCE\n\nHolga Inc. provides filing and storage solu-\n\ntions to contract, commercial, and institutional\n\nmarkets. Signature products include high-den-\n\nsity shelving and mobile storage systems\n\ndesigned for efficient space utilization. Holga\n\nalso offer a broad range of traditional metal\n\nfiling and storage products.\n\n**HI GHLI GHTS / AWARD S :**\n\n**-** Introduced 8000 Series Stackable Storage\n\nunits, which provide a wide array of customiz-\n\nable storage options within a standard plat-\n\nform. The Series complements our new 8000\n\nSeries Pedestals, which offer a unique inter-\n\nlocking system and end tab filing capabilities.\n\n**W W W . H O L G A . C O M**\n\nHON International Inc. is responsible for HON\n\nINDUSTRIES’ sales and business develop-\n\nment outside the United States and Canada.\n\nOur members in local countries market the\n\nHON INDUSTRIES’ brands through a global\n\ndistribution network. With an extensive prod-\n\nuct selection, HON International is able to\n\nprovide dealers and customers with the widest\n\ncollection of “compelling value” office furni-\n\nture in the world. The international team is\n\ndedicated to providing customers with world-\n\nclass service, from initial inquiry to com-\n\nplete-and-on-time installation. Extensive\n\ninternational experience helps to ensure cus-\n\ntomers are provided with solutions for even\n\ntheir most challenging international needs\n\nand opportunities.\n\n**HI GHLI GHTS / AWARD S :**\n\n**-** A lead exhibitor in the first-ever Office\n\nFurniture Expo in Mexico City.\n\n**-** Successfully completed projects for key\n\nmultinational accounts in Ireland, Barbados,\n\nJamaica, Egypt, and Hong Kong, among others.\n\n**-** Opened the first HON INDUSTRIES’ show-\n\nroom outside the United States in Monterrey,\n\nMexico.\n\n**W W W . H O N I N T E R N A T I O N A L . C O M**\n\nMaxon Furniture Inc. targets small to mid-\n\nsized businesses seeking “planned” offices fea-\n\nturing workstations and compatible storage\n\nand seating. Maxon’s customers appreciate\n\noffice furniture that efficiently organizes space\n\nand creates a positive working environment.\n\n**HI GHLI GHTS / AWARD S :**\n\n**-** Gave the Empower ® product line a com-\n\nplete makeover; including a new trim design,\n\nsegmented panels, and redesigned storage\n\ncabinets.\n\n**W W W . M A X O N F U R N I T U R E . C O M**\n\nPaoli Inc. is a leading provider of wood case\n\ngoods, modular desking, conference pro-\n\nducts, and seating through its well-known\n\nbrands Paoli ® and Whitehall ® . Founded in\n\n1926, it is the newest member of the HON\n\nINDUSTRIES family, acquired in January\n\n2004. Outstanding product design at a great\n\nvalue makes Paoli a highly sought after solu-\n\ntion in the market for wood private offices.\n\nPaoli’s production capability and resources\n\nallow the company to respond quickly to\n\nchanging market needs. Paoli’s strong, inde-\n\npendent representative sales and dealer net-\n\nworks support its broad product offering in the\n\nmid-market and contract furniture segments.\n\n**HI GHLI GHTS / AWARD S :**\n\n**-** Introduced the Reflect TM product line of\n\nmodular, traditional case goods in 2003.\n\n**-** Created CAP TM — a comprehensive family of\n\nlibrary products designed to effectively fur-\n\nnish today’s diverse learning environments\n\nand sports stadium suites.\n\n**W W W . P A O L I . C O M**", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed8.pdf", - "query": "Did automating the writing of EM-to-IP handoffs notes using LLM lead to life-threatening outputs ?", - "target_page": 8, - "target_passage": "none of the incorrect output text elements reached life-threatening risk", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "##### **Original Investigation | Emergency Medicine**\n\n## DevelopingandEvaluatingLargeLanguageModel- GeneratedEmergencyMedicine HandoffNotes\n\nVince Hartman, MS; Xinyuan Zhang, PhD; Ritika Poddar, MS; Matthew McCarty, MD; Alexander Fortenko, MD, MPH; Evan Sholle, MS; Rahul Sharma, MD, MBA;\n\nThomas Campion Jr, PhD; Peter A. D. Steel, MA, MBBS\n\n### **Abstract**\n\n**IMPORTANCE** An emergency medicine (EM) handoff note generated by a large language model\n\n(LLM) has the potential to reduce physician documentation burden without compromising the safety\n\nof EM-to-inpatient (IP) handoffs.\n\n**OBJECTIVE** To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and\n\nsafety compared with physician-written notes.\n\n**DESIGN, SETTING, AND PARTICIPANTS** This cohort study used EM patient medical records with\n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical\n\nCenter. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated\n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented\n\nunderstudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers\n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE])\n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written\n\nnotes were compared. Data were analyzed from October 2023 to March 2024.\n\n**EXPOSURE** LLM-generated EM handoff notes.\n\n**MAIN OUTCOMES AND MEASURES** LLM-generated handoff notes were evaluated for (1) lexical\n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with\n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness,\n\nusefulness, and implications for patient safety using a novel framework.\n\n**RESULTS** In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9\n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher\n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456),\n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by\n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD)\n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean\n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written).\n\nNone of the LLM-generated summaries were classified as a critical patient safety risk.\n\n**CONCLUSIONS AND RELEVANCE** In this cohort study of 1600 EM patient medical records,\n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written\n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness\n\n*(continued)*\n\n#### **Key Points**\n\n**Question** Can a large language model\n\n(LLM) generate emergency medicine\n\n(EM)-to-inpatient (IP) handoff notes\n\nthat are useful and safe for EM care?\n\n**Findings** In this cohort study of 1600\n\nEM patient medical records using a\n\nnovel evaluation framework, the\n\nLLM-generated EM-to-IP handoff notes\n\nhad a mean usefulness of 4.04 out of 5\n\n(compared with 4.36 for\n\nphysician-written) and a mean patient\n\nsafety of 4.06 out of 5 (compared with\n\n4.50 for physician-written) with no\n\ncritical patient safety risks.\n\n**Meaning** These findings suggest the\n\nvalue of a manual, patient safety-\n\nfocused clinical evaluation of LLM\n\nmodels and the potential of\n\nLLM-generated handoff notes to create\n\na new standard of care in EM.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "evaluation frameworks may not address the anticipated effect LLM performance limitations could\n\nhave on patient safety. 38-41\n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate\n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care\n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP\n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in\n\n[Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) ). We fine-tune pretrained LLMs on well curated datasets of structured and\n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the\n\ncorrectness of model generations and customized the summaries in a structured format designed\n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel\n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’\n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies.\n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting\n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient\n\nsafety-focused clinical evaluation framework and automated benchmark-driven methods. We used\n\nthe physician-written EM-to-IP handoff notes as the active control and used the scores from both\n\nevaluation frameworks for the margin of inferiority of the intervention.\n\n### **Methods**\n\n#### **Data Collection**\n\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was\n\nconducted at an urban academic 840-bed quaternary-care hospital in New York City, with\n\napproximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600\n\nindividual EM patient encounters leading to acute hospital admission were randomly selected from\n\nvisits occurring between April and September of 2023. We limited our analysis to EM patient\n\nencounters occurring after April 2023, as the study site had updated the EM-handoff at that time.\n\nEncounters before this date used an earlier version of the EM-handoff note that would have provided\n\nsuboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then\n\ngenerated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants),\n\nWeill Cornell Medicine IRB approved a waiver of informed consent because the study used\n\nretrospective data and posed minimal risk to patients. We used Strengthening the Reporting of\n\nObservational Studies in Epidemiology ( [STROBE](http://www.equator-network.org/reporting-guidelines/strobe/) ) reporting guidelines.\n\n#### **EM-to-IP Handoff Note Template**\n\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff\n\nnote structure used at the study site. The generated EM handoff note consists of components\n\ngenerated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult\n\norders, and radiology impressions) and components generated by the trained abstractive\n\nsummarization model (history of present illness [HPI], differential diagnoses, immediate care plans,\n\nin-ED events, and disposition). Each summary also included a header with the timestamp of ED triage\n\nand discharge, patient’s birth date, patient’s unique identifier, patient’s encounter number, and the\n\ntotal time of patient’s stay in the ED.\n\n#### **Data Curation for Automated ED Note Generation**\n\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule-", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "Orders Medications, consults, and radiology results\n\nAbbreviations: EM, emergency medicine; IP, inpatient.\n\na Automated EM handoff notes are generated from\n\nthe curation of the data through both rule-based and\n\nlarge language model- summarization approaches.\n\nDecember 3, 2024 4/12", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" - }, - { - "text": "*Abstract (continued)*\n\nand safety via a novel evaluation framework. This study suggests the importance of a physician-in-\n\nloop implementation design for this model and demonstrates an effective strategy to measure\n\npreimplementation patient safety of LLM models.\n\n*JAMA Network Open.* 2024;7(12):e2448723. doi: [10.1001/jamanetworkopen.2024.48723](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723)\n\n### **Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of clinical responsibility, have been identified as a critical source of medical errors. 1,2 The Joint\n\nCommission, the Accreditation Council for Graduate Medical Education, and the Association of\n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized handoff processes to address the substantial patient risk of this ubiquitous event. 3,4 Implementing handoff tools has previously demonstrated significant reductions in medical errors. 5,6 High-quality\n\nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by medical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints. 7-10 The\n\nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly\n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff systems. 11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with\n\nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high\n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most desired assistive tool in improving ED transitions of care. 15-18 Limited work to date has demonstrated EM electronic handoff tools as feasible, efficient, and effective. 19-21 In April 2023, EM and internal\n\nmedicine leadership of the study site collaboratively developed and launched a mandatory,\n\nEHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real-\n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal\n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured\n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of\n\nthe handoff notes.\n\nIn recent years there has been an accelerated interest in using LLMs to automate clinical tasks in an effort to unburden physicians and reduce burnout. 22 Computer-generated text within clinical\n\nnotes using natural language processing (NLP) have been overall shown to improve note completion rates, physician satisfaction, and patient outcomes. 23 Since 2018, NLP has made rapid advancements\n\nin health care with the discovery of the transformer model architecture, the building block of large language models (LLMs). LLMs can automate workflows such as discharge summaries, 24 radiology reports, 25 patient messaging, 26 after-visit summaries, 27 and ambient dictation 28 with various levels of perceived quality in each workflow. 29 LLMs are particularly effective at summarizing large unstructured clinical datasets, such as ED patient medical records. 30 A common concern of LLMs is\n\ntheir ability to hallucinate data, or LLMs generating output text that is not factually consistent with the original source content. 31 Much work has been done in health care to reduce hallucinations", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - }, - { - "text": "total time of patient’s stay in the ED.\n\n#### **Data Curation for Automated ED Note Generation**\n\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule-\n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail\n\nin eAppendix 1 in [ Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) . The rule-based framework was designed by the 3 board certified EM\n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in **Table 1** :\n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The\n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for\n\n##### **JAMA Network Open | Emergency Medicine**\n\nDecember 3, 2024 3/12", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "superior performance. However, while the manual clinical evaluation demonstrated the majority of\n\nthe LLM-generated notes were of promising comparative quality (scores of 4-5), they were, on\n\naverage, inferior to the clinician-written notes.\n\nOur novel clinical evaluation’s findings suggest the majority of identified quality limitations and\n\nincorrectness would have minimal impact on patient safety, even when extrapolated to the worst-\n\ncase scenario of the LLM-generated summary content not being reviewed and edited by a clinician\n\nbefore completion. This was designed to address contemporary LLM concerns of user trust, reliance and expertise. 49 As such, none of the incorrect output text elements reached life-threatening risk.\n\nHowever, incompleteness and faulty logic identified in the automated summaries were not always\n\nnegligible, with just under 1 in 10 of these performance gaps determined to have the potential to\n\ncreate significant patient safety risk compared with the physician-written summaries. These critical\n\nimplementation safety findings will inform (1) directionality of further model refinement; (2) further\n\nclinical evaluation of postrefinement model output; and (3) irrespective of downstream model\n\nperformance, an EHR-implementation plan constrained to a user-interface design that will allow EM\n\nclinicians to review and edit the LLM-generated handoff note as a draft before finalizing (see\n\neAppendix 1 in [ Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) ). This physician-in-the-loop process has also been identified as critical\n\nin other recent work implementing LLMs into clinical workflows. 29,53\n\nWhile the automated methods of SCALE and MPNet-based sentence transformers\n\ndemonstrated a cursory view of the faithfulness performance of the models, the clinical evaluation\n\nprovided the nuanced context of the true factuality of our system on a word by word level. When\n\ncomparing with the source notes, the automatic evaluations rewarded the summaries with more\n\ndetails, more semantic similarities, and more entailment logics, while physician-written notes tended\n\nto be more concise with more shortcuts and clinical jargon, which are penalized by automatic\n\nevaluation metrics. In addition, LLM-generated summaries are completely based on the source\n\nnotes, while physician-written summaries are often composed with additional knowledge that\n\ncannot be found from the source notes.\n\nThe divergence of the automated and clinical evaluation results of an LLM intended for\n\nintegration into a critical clinical workflow is an important finding. First, this observed finding\n\nvalidates the importance of clinical evaluations in addition to conventional automated evaluations to determine accuracy. 54 While other LLM clinical evaluation frameworks have been described to\n\nmeasure conventional model output quality categories (such as incorrectness domains and other performance gaps), 30,35 to our knowledge, our novel framework is the first to incorporate\n\nanticipated patient safety implications for each individual category deficiency.\n\n#### **Limitations**\n\nThere were several limitations to the study that were primarily driven from constraints of\n\ninfrastructure, as well as regulations, legal governance, and labor requirements. At the study location,\n\nthe data were required to remain on premise at all times and the infrastructure that was provided\n\nhad a GPU limitation of 24 GB. Given these infrastructure restrictions, the best open-source model\n\navailable during the study was LLM 2. Furthermore, we were not able to demonstrate the comparable difference between our fine-tuned LLM 2 model and third party LLMs 32,55 because of the study", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed8.pdf" - }, - { - "text": "Chapter 11. Advanced Copy Services\n\nDuring the VLAN configuration for each IP address, the VLAN settings for the local and\n\nfailover ports on two nodes of an I/O Group can differ. To avoid any service disruption,\n\nswitches must be configured so that the failover VLANs are configured on the local switch\n\nports and the failover of IP addresses from a failing node to a surviving node succeeds. If\n\nfailover VLANs are not configured on the local switch ports, there are no paths to the IBM\n\nSpectrum Virtualize system nodes during a node failure and the replication fails.\n\nConsider the following requirements and procedures when implementing VLAN tagging:\n\n� VLAN tagging is supported for IP partnership traffic between two systems.\n\n� VLAN provides network traffic separation at the layer 2 level for Ethernet transport.\n\n� VLAN tagging by default is disabled for any IP address of a node port. You can use the CLI\n\nor GUI to optionally set the VLAN ID for port IPs on both systems in the IP partnership.\n\n� When a VLAN ID is configured for the port IP addresses that are used in remote copy port\n\ngroups, appropriate VLAN settings on the Ethernet network must also be configured to\n\nprevent connectivity issues.\n\nSetting VLAN tags for a port is disruptive. Therefore, VLAN tagging requires that you stop the\n\npartnership first before you configure VLAN tags. Restart the partnership after the\n\nconfiguration is complete.\n\n#### **11.8.5 IP partnership and terminology**\n\nThe IP partnership terminology and abbreviations that are used are listed in Table 11-12.\n\n*Table 11-12 Terminology for IP partnership*\n\n| IP partnership terminology | Description |\n|:---|:---|\n| Remote copy group or Remote copy port group | The following numbers group a set of IP addresses that are connected to the same physical link. Therefore, only IP addresses that are part of the same remote copy group can form remote copy connections with the partner system: � 0 - Ports that are not configured for remote copy � 1 - Ports that belong to remote copy port group 1 � 2 - Ports that belong to remote copy port group 2 Each IP address can be shared for iSCSI host attach and remote copy functionality. Therefore, appropriate settings must be applied to each IP address. |\n| IP partnership | Two systems that are partnered to perform remote copy over native IP links. |\n| FC partnership | Two systems that are partnered to perform remote copy over native Fibre Channel links. |\n| Failover | Failure of a node within an I/O group causes the volume access to go through the surviving node. The IP addresses fail over to the surviving node in the I/O group. When the configuration node of the system fails, management IPs also fail over to an alternative node. |\n| Failback | When the failed node rejoins the system, all failed over IP addresses are failed back from the surviving node to the rejoined node, and volume access is restored through this node. |\n| linkbandwidthmbits | Aggregate bandwidth of all physical links between two sites in Mbps. |", - "page_start": 574, - "page_end": 574, - "source_file": "sg247938.pdf" - }, - { - "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of responses [31, 45, 57, 58].\n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes do. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying models to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, but route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference costs by using fewer and/or less complex underlying models.\n\n**Applications of LLM routers.** A key use case for LLM routers is to help LLM-based application reduce cost. Several commercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a few lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The service selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant cost savings: up to 98% in the case of Martian [5], and 10 *×* in the case of NotDiamond [7].\n\n## **3 LLM Control Plane Integrity**\n\nIn this section, we define *LLM control plane integrity* . Informally, it means that decisions made about underlying LLM queries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus on one class of control plane: predictive LLM routing as used to manage cost.\n\n**Formalizing control planes.** An LLM control plane *R* *ω* is a potentially randomized algorithm. It is parameterized by a string *ω* , called the parameters. It utilizes some number *n* of LLMs denoted by *M* . We will mostly focus on the case of *n* = 2 , and, for reasons that will be clear in a moment, use *M* s (“strong”) and *M* w (“weak”) to denote the two underlying LLMs. Then inference on an input *x* *∈X* for some set *X* of allowed queries is performed by computing a response via *y* *←* $ *R* *M* *ω* ( *x* ) . Here we use ** $ to denote running *R* with fresh random coins; we use ** when *R* is deterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control planes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a function of a sequence of queries and responses.\n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying LLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive control plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, predictive binary routers use relatively simple classifiers to determine which of *M* s or *M* w should be used to respond to a query.\n\n**Inference flow.** Given a set of LLMs *M* , a control plane *R* *ω* , and an input *x* , an LLM inference flow is the sequence of LLM invocations *M* *i* *j* ( *z* *j* ) for 1 *≤* *j* *≤* *m* and *i* *j* *∈{* w *,* s *}* made when executing *R* *M* *ω* ( *x* ) . Here *m* is the total number of LLM invocations, and *z* 1 *, . . . , z* *m* are the queries made to the underlying LLMs. Should *R* be randomized, the sequence and its length are random variables. An inference flow can be written as a transcript\n\n*T* = ( *i* 1 *, z* 1 ) *,* ( *i* 2 *, z* 2 ) *, . . . ,* ( *i* *m* *, z* *m* )", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "Chapter 11. Advanced Copy Services\n\nc. Configure IP ports for remote copy on System A1 by using the following settings:\n\n- Node 1:\n\n- Port 1, remote copy port group 1\n\n- Host: Yes\n\n- Assign IP address\n\n- Node 2:\n\n- Port 4, Remote Copy Port Group 2\n\n- Host: Yes\n\n- Assign IP address\n\nd. Configure IP ports for remote copy on System B1 by using the following settings:\n\n- Node 1:\n\n- Port 1, remote copy port group 1\n\n- Host: Yes\n\n- Assign IP address\n\n- Node 2:\n\n- Port 4, remote copy port group 2\n\n- Host: Yes\n\n- Assign IP address\n\ne. Check the MTU levels across the network as set (default MTU is 1500 on IBM SAN\n\nVolume Controller and Storwize V7000).\n\nf. Establish IP partnerships from both systems.\n\ng. After the partnerships are in the Fully_Configured state, you can create the remote\n\ncopy relationships.\n\n### **11.9 Managing Remote Copy by using the GUI**\n\nIt is often easier to control MM/GM with the GUI if you have few mappings. When many\n\nmappings are used, run your commands by using the CLI. This section describes the tasks\n\nthat you can perform at a remote copy level.\n\n**Note:** The **Copy Services** → **Consistency Groups** menu relates to FlashCopy\n\nconsistency groups only, not Remote Copy ones.", - "page_start": 590, - "page_end": 590, - "source_file": "sg247938.pdf" - }, - { - "text": "an extra potentially expensive LLM invocation for each query processed by the router. Second, it may degrade the quality of responses from the destination LLMs, which are sensitive to the phrasing of queries and prompts.\n\n**Detecting anomalous user workloads.** Another possible defense requires the router to monitor individual user work- loads, and identify those users whose queries are routed to the strongest model with an abnormally high frequency. The router can then impose a user-specific threshold. Of course such workloads may have a benign explanation, e.g., the user’s queries may be unusually complex. Even so, routers could potentially be designed to perform user-specific routing. For example, one could imagine using per-user thresholds that are calibrated dynamically to attempt to maintain a consistent fraction of queries being routed to the strong model.\n\nSuch user-specific routing would complicate implementations, and would make inaccurate decisions for a user until there is sufficient data about their queries. The latter is relevant in adversarial settings, since such an approach would still be circumventable should attackers be able to mount Sybil attacks in which the attacker creates a new user for, in the limit, each query.\n\n## **9 Related Work**\n\n**Evasion attacks against ML systems.** A large body of work has investigated evasion attacks against ML systems [25, 43, 60], also referred to as adversarial examples [32, 48, 49], and these attacks are now being explored in the context of multi-modal LLMs [28] as well as text-only LLMs (for just one example, see [22]). We discussed in Section 3 how our results compare: LLM control plane integrity is a distinct AI safety issue, but related in that: (1) control plane integrity attacks may use evasion-style techniques, and (2) control plane integrity attacks might be useful for performing evasion.\n\n**Prompt injection against LLMs.** Prompt injection is a class of attacks against LLMs in which the adversary manipulates the prompt, i.e., the textual input fed directly to the LLM, causing the LLM to generate outputs that satisfy some adver- sarial objective [50, 64]. Evasion attacks as discussed above can use prompt injection, jailbreaking attacks being a widely explored example in which the adversary aims to bypass some safety guardrail included in the LLM system, such as “do not output expletives” [23, 42, 54, 66, 72, 73].\n\nPrompt injection is also used for extraction attacks that aim to infer some information from or about the model, for example, the system prompt [50, 54, 70], training data samples [46], or model parameters [18]. In indirect prompt injection attacks [33], the adversaries do not directly interact with the target LLM, and instead inject adversarial inputs into third- party data, which is then added to the LLM prompt (intentionally or unintentionally) by the victim application and/or its users. This relates to another category of attacks that target LLM-based applications, such as RAG systems, and invalidate their integrity by exploiting the weaknesses of the underlying LLM [19, 55].\n\nOur attacks also modify queries, but with a different aim than the above types of attacks: undermining the integrity of the control plane routing, rather than the LLM itself. Future work might investigate indirect control plane integrity attacks that, analogously to indirect prompt injection, serve to somehow trick users of a routing system into forming control- plane-confounding queries.", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed8.pdf", - "query": "How did automating the writing of EM-to-IP handoffs notes using LLM affect the usefulness of these notes ?", - "target_page": 1, - "target_passage": "LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "##### **Original Investigation | Emergency Medicine**\n\n## DevelopingandEvaluatingLargeLanguageModel- GeneratedEmergencyMedicine HandoffNotes\n\nVince Hartman, MS; Xinyuan Zhang, PhD; Ritika Poddar, MS; Matthew McCarty, MD; Alexander Fortenko, MD, MPH; Evan Sholle, MS; Rahul Sharma, MD, MBA;\n\nThomas Campion Jr, PhD; Peter A. D. Steel, MA, MBBS\n\n### **Abstract**\n\n**IMPORTANCE** An emergency medicine (EM) handoff note generated by a large language model\n\n(LLM) has the potential to reduce physician documentation burden without compromising the safety\n\nof EM-to-inpatient (IP) handoffs.\n\n**OBJECTIVE** To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and\n\nsafety compared with physician-written notes.\n\n**DESIGN, SETTING, AND PARTICIPANTS** This cohort study used EM patient medical records with\n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical\n\nCenter. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated\n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented\n\nunderstudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers\n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE])\n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written\n\nnotes were compared. Data were analyzed from October 2023 to March 2024.\n\n**EXPOSURE** LLM-generated EM handoff notes.\n\n**MAIN OUTCOMES AND MEASURES** LLM-generated handoff notes were evaluated for (1) lexical\n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with\n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness,\n\nusefulness, and implications for patient safety using a novel framework.\n\n**RESULTS** In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9\n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher\n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456),\n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by\n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD)\n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean\n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written).\n\nNone of the LLM-generated summaries were classified as a critical patient safety risk.\n\n**CONCLUSIONS AND RELEVANCE** In this cohort study of 1600 EM patient medical records,\n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written\n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness\n\n*(continued)*\n\n#### **Key Points**\n\n**Question** Can a large language model\n\n(LLM) generate emergency medicine\n\n(EM)-to-inpatient (IP) handoff notes\n\nthat are useful and safe for EM care?\n\n**Findings** In this cohort study of 1600\n\nEM patient medical records using a\n\nnovel evaluation framework, the\n\nLLM-generated EM-to-IP handoff notes\n\nhad a mean usefulness of 4.04 out of 5\n\n(compared with 4.36 for\n\nphysician-written) and a mean patient\n\nsafety of 4.06 out of 5 (compared with\n\n4.50 for physician-written) with no\n\ncritical patient safety risks.\n\n**Meaning** These findings suggest the\n\nvalue of a manual, patient safety-\n\nfocused clinical evaluation of LLM\n\nmodels and the potential of\n\nLLM-generated handoff notes to create\n\na new standard of care in EM.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "evaluation frameworks may not address the anticipated effect LLM performance limitations could\n\nhave on patient safety. 38-41\n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate\n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care\n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP\n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in\n\n[Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) ). We fine-tune pretrained LLMs on well curated datasets of structured and\n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the\n\ncorrectness of model generations and customized the summaries in a structured format designed\n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel\n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’\n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies.\n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting\n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient\n\nsafety-focused clinical evaluation framework and automated benchmark-driven methods. We used\n\nthe physician-written EM-to-IP handoff notes as the active control and used the scores from both\n\nevaluation frameworks for the margin of inferiority of the intervention.\n\n### **Methods**\n\n#### **Data Collection**\n\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was\n\nconducted at an urban academic 840-bed quaternary-care hospital in New York City, with\n\napproximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600\n\nindividual EM patient encounters leading to acute hospital admission were randomly selected from\n\nvisits occurring between April and September of 2023. We limited our analysis to EM patient\n\nencounters occurring after April 2023, as the study site had updated the EM-handoff at that time.\n\nEncounters before this date used an earlier version of the EM-handoff note that would have provided\n\nsuboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then\n\ngenerated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants),\n\nWeill Cornell Medicine IRB approved a waiver of informed consent because the study used\n\nretrospective data and posed minimal risk to patients. We used Strengthening the Reporting of\n\nObservational Studies in Epidemiology ( [STROBE](http://www.equator-network.org/reporting-guidelines/strobe/) ) reporting guidelines.\n\n#### **EM-to-IP Handoff Note Template**\n\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff\n\nnote structure used at the study site. The generated EM handoff note consists of components\n\ngenerated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult\n\norders, and radiology impressions) and components generated by the trained abstractive\n\nsummarization model (history of present illness [HPI], differential diagnoses, immediate care plans,\n\nin-ED events, and disposition). Each summary also included a header with the timestamp of ED triage\n\nand discharge, patient’s birth date, patient’s unique identifier, patient’s encounter number, and the\n\ntotal time of patient’s stay in the ED.\n\n#### **Data Curation for Automated ED Note Generation**\n\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule-", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "total time of patient’s stay in the ED.\n\n#### **Data Curation for Automated ED Note Generation**\n\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule-\n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail\n\nin eAppendix 1 in [ Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) . The rule-based framework was designed by the 3 board certified EM\n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in **Table 1** :\n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The\n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for\n\n##### **JAMA Network Open | Emergency Medicine**\n\nDecember 3, 2024 3/12", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "Orders Medications, consults, and radiology results\n\nAbbreviations: EM, emergency medicine; IP, inpatient.\n\na Automated EM handoff notes are generated from\n\nthe curation of the data through both rule-based and\n\nlarge language model- summarization approaches.\n\nDecember 3, 2024 4/12", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" - }, - { - "text": "*Abstract (continued)*\n\nand safety via a novel evaluation framework. This study suggests the importance of a physician-in-\n\nloop implementation design for this model and demonstrates an effective strategy to measure\n\npreimplementation patient safety of LLM models.\n\n*JAMA Network Open.* 2024;7(12):e2448723. doi: [10.1001/jamanetworkopen.2024.48723](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723)\n\n### **Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of clinical responsibility, have been identified as a critical source of medical errors. 1,2 The Joint\n\nCommission, the Accreditation Council for Graduate Medical Education, and the Association of\n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized handoff processes to address the substantial patient risk of this ubiquitous event. 3,4 Implementing handoff tools has previously demonstrated significant reductions in medical errors. 5,6 High-quality\n\nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by medical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints. 7-10 The\n\nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly\n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff systems. 11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with\n\nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high\n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most desired assistive tool in improving ED transitions of care. 15-18 Limited work to date has demonstrated EM electronic handoff tools as feasible, efficient, and effective. 19-21 In April 2023, EM and internal\n\nmedicine leadership of the study site collaboratively developed and launched a mandatory,\n\nEHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real-\n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal\n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured\n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of\n\nthe handoff notes.\n\nIn recent years there has been an accelerated interest in using LLMs to automate clinical tasks in an effort to unburden physicians and reduce burnout. 22 Computer-generated text within clinical\n\nnotes using natural language processing (NLP) have been overall shown to improve note completion rates, physician satisfaction, and patient outcomes. 23 Since 2018, NLP has made rapid advancements\n\nin health care with the discovery of the transformer model architecture, the building block of large language models (LLMs). LLMs can automate workflows such as discharge summaries, 24 radiology reports, 25 patient messaging, 26 after-visit summaries, 27 and ambient dictation 28 with various levels of perceived quality in each workflow. 29 LLMs are particularly effective at summarizing large unstructured clinical datasets, such as ED patient medical records. 30 A common concern of LLMs is\n\ntheir ability to hallucinate data, or LLMs generating output text that is not factually consistent with the original source content. 31 Much work has been done in health care to reduce hallucinations", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - }, - { - "text": "superior performance. However, while the manual clinical evaluation demonstrated the majority of\n\nthe LLM-generated notes were of promising comparative quality (scores of 4-5), they were, on\n\naverage, inferior to the clinician-written notes.\n\nOur novel clinical evaluation’s findings suggest the majority of identified quality limitations and\n\nincorrectness would have minimal impact on patient safety, even when extrapolated to the worst-\n\ncase scenario of the LLM-generated summary content not being reviewed and edited by a clinician\n\nbefore completion. This was designed to address contemporary LLM concerns of user trust, reliance and expertise. 49 As such, none of the incorrect output text elements reached life-threatening risk.\n\nHowever, incompleteness and faulty logic identified in the automated summaries were not always\n\nnegligible, with just under 1 in 10 of these performance gaps determined to have the potential to\n\ncreate significant patient safety risk compared with the physician-written summaries. These critical\n\nimplementation safety findings will inform (1) directionality of further model refinement; (2) further\n\nclinical evaluation of postrefinement model output; and (3) irrespective of downstream model\n\nperformance, an EHR-implementation plan constrained to a user-interface design that will allow EM\n\nclinicians to review and edit the LLM-generated handoff note as a draft before finalizing (see\n\neAppendix 1 in [ Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) ). This physician-in-the-loop process has also been identified as critical\n\nin other recent work implementing LLMs into clinical workflows. 29,53\n\nWhile the automated methods of SCALE and MPNet-based sentence transformers\n\ndemonstrated a cursory view of the faithfulness performance of the models, the clinical evaluation\n\nprovided the nuanced context of the true factuality of our system on a word by word level. When\n\ncomparing with the source notes, the automatic evaluations rewarded the summaries with more\n\ndetails, more semantic similarities, and more entailment logics, while physician-written notes tended\n\nto be more concise with more shortcuts and clinical jargon, which are penalized by automatic\n\nevaluation metrics. In addition, LLM-generated summaries are completely based on the source\n\nnotes, while physician-written summaries are often composed with additional knowledge that\n\ncannot be found from the source notes.\n\nThe divergence of the automated and clinical evaluation results of an LLM intended for\n\nintegration into a critical clinical workflow is an important finding. First, this observed finding\n\nvalidates the importance of clinical evaluations in addition to conventional automated evaluations to determine accuracy. 54 While other LLM clinical evaluation frameworks have been described to\n\nmeasure conventional model output quality categories (such as incorrectness domains and other performance gaps), 30,35 to our knowledge, our novel framework is the first to incorporate\n\nanticipated patient safety implications for each individual category deficiency.\n\n#### **Limitations**\n\nThere were several limitations to the study that were primarily driven from constraints of\n\ninfrastructure, as well as regulations, legal governance, and labor requirements. At the study location,\n\nthe data were required to remain on premise at all times and the infrastructure that was provided\n\nhad a GPU limitation of 24 GB. Given these infrastructure restrictions, the best open-source model\n\navailable during the study was LLM 2. Furthermore, we were not able to demonstrate the comparable difference between our fine-tuned LLM 2 model and third party LLMs 32,55 because of the study", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed8.pdf" - }, - { - "text": "curation (4.24 [0.58] vs 4.76 [0.48]), readability (4.00 [0.64] vs 4.64 [0.49]), correctness (4.52\n\n[0.64] vs 4.90 [0.39]), and patient safety (4.06 [0.86] vs 4.50 [0.56]).\n\nIn extrapolating the estimated worst-case scenario impact of these performance gaps on\n\npatient safety, the 3 expert clinicians determined none of the identified model performance issues\n\nwere anticipated to create a level 1 (life-threatening) safety event (see examples of worst case\n\nscenarios in eTable 2 in [ Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) ). While the incompleteness and faulty logic identified in the\n\nautomated summaries received mean (SD) safety scores of 4.20 (0.93) and 4.60 (0.75), respectively;\n\n13 (8.7%) and 11 (7.3%) of these events, respectively, were determined to have the potential to create\n\na level 2 patient safety event following EM-to-IP handoff, substantially higher compared with the\n\nphysician-written summaries (0%). All of the 5 hallucinations had patient safety scores between 4\n\nand 5 and a mean (SD) score of 4.96 (0.14), which is defined as the hallucinations posing mild to no\n\npatient safety risk. LLM-generated notes demonstrated a higher rate of incorrectness (9.6%)\n\ncompared with the physician-written notes (2.0%), although very few hallucinations.\n\nICC were 0.79 for completeness, 0.70 for curation, 0.59 for readability, 0.76 for correctness,\n\nand 0.74 for usefulness. These numbers suggest good reliability of agreement for completeness,\n\ncuration, correctness, and usefulness and suggest fair reliability for readability among the 3 raters.\n\n### **Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned,\n\npretrained LLM and rule-based approaches within an end user- developed note template. It is\n\nimportant to note that (largely due to time constraints within the EM care delivery model) the\n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s\n\nunique electronic handoff process enabled a comparison between physician-written and\n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested\n\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)- Generated and Physician-Written\n\nCriteria\n\nLLM-generated Physician-written\n\nMean score (SD)\n\nLikert rating 1-5, No. (%) a\n\nMean score (SD)\n\nLikert rating 1-5, No. (%) a\n\n1 2 3 4 5 1 2 3 4 5\n\nCompleteness 4.00 (0.88) 0 12 (8) 31 (20.7) 69 (46) 38 (25.3) 4.16 (0.84) 0 3 (2) 31 (20.7) 48 (32) 68 (45.3)\n\nCuration 4.24 (0.58) 0 1 (0.7) 13 (8.7) 85 (56.7) 51 (34) 4.76 (0.48) 0 0 6 (4) 39 (26) 105 (70)\n\nReadability 4.00 (0.64) 0 8 (5.3) 17 (11.3) 87 (58) 38 (25.3) 4.64 (0.49) 0 0 5 (3.3) 38 (25.3) 107 (71.3)\n\nCorrectness 4.52 (0.64) 0 0 13 (8.7) 39 (26) 98 (65.3) 4.90 (0.39) 0 0 2 (1.3) 12 (8) 136 (90.7)\n\nUsefulness 4.04 (0.86) 0 12 (8) 30 (20) 59 (39.3) 49 (32.7) 4.36 (0.71) 0 5 (3.3) 13 (8.7) 53 (35.3) 79 (52.7)\n\na Likert scores and score distributions over 50 notes for 3 annotators. There are no 1 ratings for either physician or LLM summaries in the 150 evaluation results.\n\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)- Generated and Physician-Written\n\nCriteria\n\nLLM-generated Physician-written\n\nMean (SD)\n\nLikert score 1-5, No. (%) a\n\nMean (SD)\n\nLikert score 1-5, No. (%) a\n\n1 2 3 4 5 1 2 3 4 5\n\nCompleteness 4.20 (0.93) 0 13 (8.7) 19 (12.7) 58 (38.7) 60 (40) 4.50 (0.65) 0 0 17 (11.3) 43 (28.7) 90 (60)\n\nCuration 4.82 (0.32) 0 1 (0.7) 3 (2) 21 (14) 125 (83.3) 4.90 (0.31) 0 0 3 (2) 8 (5.3) 139 (92.7)\n\nReadability 4.74 (0.37) 0 1 (0.7) 6 (4) 23 (15.3) 120 (80) 4.94 (0.14) 0 0 0 10 (6.7) 140 (93.3)\n\nCorrectness: hallucination 4.96 (0.14) 0 0 0 5 (3.3) 145 (96.7) 5.00 0 0 0 0 150 (100)", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of responses [31, 45, 57, 58].\n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes do. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying models to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, but route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference costs by using fewer and/or less complex underlying models.\n\n**Applications of LLM routers.** A key use case for LLM routers is to help LLM-based application reduce cost. Several commercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a few lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The service selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant cost savings: up to 98% in the case of Martian [5], and 10 *×* in the case of NotDiamond [7].\n\n## **3 LLM Control Plane Integrity**\n\nIn this section, we define *LLM control plane integrity* . Informally, it means that decisions made about underlying LLM queries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus on one class of control plane: predictive LLM routing as used to manage cost.\n\n**Formalizing control planes.** An LLM control plane *R* *ω* is a potentially randomized algorithm. It is parameterized by a string *ω* , called the parameters. It utilizes some number *n* of LLMs denoted by *M* . We will mostly focus on the case of *n* = 2 , and, for reasons that will be clear in a moment, use *M* s (“strong”) and *M* w (“weak”) to denote the two underlying LLMs. Then inference on an input *x* *∈X* for some set *X* of allowed queries is performed by computing a response via *y* *←* $ *R* *M* *ω* ( *x* ) . Here we use ** $ to denote running *R* with fresh random coins; we use ** when *R* is deterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control planes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a function of a sequence of queries and responses.\n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying LLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive control plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, predictive binary routers use relatively simple classifiers to determine which of *M* s or *M* w should be used to respond to a query.\n\n**Inference flow.** Given a set of LLMs *M* , a control plane *R* *ω* , and an input *x* , an LLM inference flow is the sequence of LLM invocations *M* *i* *j* ( *z* *j* ) for 1 *≤* *j* *≤* *m* and *i* *j* *∈{* w *,* s *}* made when executing *R* *M* *ω* ( *x* ) . Here *m* is the total number of LLM invocations, and *z* 1 *, . . . , z* *m* are the queries made to the underlying LLMs. Should *R* be randomized, the sequence and its length are random variables. An inference flow can be written as a transcript\n\n*T* = ( *i* 1 *, z* 1 ) *,* ( *i* 2 *, z* 2 ) *, . . . ,* ( *i* *m* *, z* *m* )", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "3. When the form is completed, click **Continue** to open the input window (see Figure 13-74).\n\n*Figure 13-74 ECuRep File upload*\n\n4. Select one or more files, click **Upload** to continue, and follow the directions.\n\n### **13.10 Service Assistant Tool**\n\nThe Service Assistant Tool (SAT) is a web-based GUI that is used to service individual node\n\ncanisters, primarily when a node has a fault and is in a service state. A node is not an active\n\npart of a clustered system while it is in service state.\n\nTypically, the IBM Storwize V7000 is configured with the following IP addresses:\n\n� One service IP address for each of control canisters.\n\n� One cluster management IP address, which is set when the cluster is created.\n\nThe SAT is available even when the management GUI is not accessible. The following\n\ninformation and tasks can be accomplished with the SAT:\n\n� Status information about the connections and the node canister\n\n� Basic configuration information, such as configuring IP addresses\n\n� Service tasks, such as restarting the Common Information Model (CIM) object manager\n\n(CIMOM) and updating the worldwide node name (WWNN)\n\n� Details about node error codes\n\n� Details about the hardware, such as IP address, Media Access Control (MAC) addresses\n\nThe SAT GUI is available by using a service assistant IP address that is configured on each\n\nStorwize V7000 node. It can also be accessed through the cluster IP addresses by appending\n\n/service to the cluster management IP.", - "page_start": 755, - "page_end": 755, - "source_file": "sg247938.pdf" - }, - { - "text": "**92** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\n### **4.3 System setup**\n\nThis section provides instructions about how to define the basic settings of the system with\n\nthe system setup wizard, and how to add nodes and optional expansion enclosures.\n\n#### **4.3.1 System setup wizard**\n\nWhether you are redirected from your PC or notebook after completing system initialization or\n\nyou browse to the management IP address manually, you must complete the system setup\n\nwizard to define the basic settings of the system.\n\n**Note:** Make sure that your PC or notebook has a network route to the system IP\n\naddress that you specified. In particular, you can access the management GUI from\n\nany management console that is connected to the same subnet as the system. Enter\n\nthe system IP address on a supported browser to access the management GUI.\n\n**Note:** The first time that you connect to the management GUI, you are prompted to accept\n\nuntrusted certificates because the system certificates are self-signed.\n\nYou can install certificates that are signed by a trusted certificate authority after you\n\ncomplete system setup. For more information about how to perform this task, see 4.5,\n\n“Configuring secure communications” on page 117.", - "page_start": 113, - "page_end": 113, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv5_ccby4license.pdf", - "query": "What company released MegatronLM ?", - "target_page": 2, - "target_passage": "NVIDIA released the MegatronLM", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Table 1: Overview of recent large language models**\n\nthe maximum development F1 score in 10 epochs as opposed to 486 without ELMo. This model furthermore achieved the same F1 score with 1% of the data as the baseline model achieved with 10% of the training data. Increasing the number of model parameters, however, did not yield noticeable increases for LSTMs [e.g. 82]. Transformer models, on the other hand, have been able to con- tinuously benefit from larger architectures and larger quantities of data. Devlin et al. [ 39 ] in particular noted that training on a large dataset and fine-tuning for specific tasks leads to strictly increasing results on the GLUE tasks [ 138 ] for English as the hyperparameters of the model were increased. Initially developed as Chinese LMs, the ERNIE family [ 130 , 131 , 145 ] produced ERNIE-Gen, which was also trained on the original (English) BERT dataset, joining the ranks of very large LMs. NVIDIA released the MegatronLM which has 8.3B parameters and was trained on 174GB of text from the English Wikipedia, OpenWebText, RealNews and CC-Stories datasets [ 122 ]. Trained on the same dataset, Microsoft released T-NLG, 1 an LM with 17B parameters. OpenAI’s GPT-3 [ 25 ] and Google’s GShard [ 73 ] and Switch-C [ 43 ] have increased the definition of large LM by orders of magnitude in terms of parameters at 175B, 600B, and 1.6T parameters, respectively. Table 1 summarizes a selection of these LMs in terms of training data size and parameters. As increasingly large amounts of text are collected from the web in datasets such as the Colossal Clean Crawled Corpus [ 107 ] and the Pile [ 51 ], this trend of increasingly large LMs can be expected to continue as long as they correlate with an increase in performance. A number of these models also have multilingual variants such as mBERT [ 39 ] and mT5 [ 148 ] or are trained with some amount of multilingual data such as GPT-3 where 7% of the training data was not in English [ 25 ]. The performance of these multilingual mod- els across languages is an active area of research. Wu and Drezde [ 144 ] found that while mBERT does not perform equally well across all 104 languages in its training data, it performed better at NER, POS tagging, and dependency parsing than monolingual models trained with comparable amounts of data for four low-resource languages. Conversely, [ 95 ] surveyed monolingual BERT models developed with more specific architecture considerations or addi- tional monolingual data and found that they generally outperform\n\n1 https://www.microsoft.com/en-us/research/blog/turing-nlg-a-17-billion-parameter- language-model-by-microsoft/", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "*Figure 12-32 Configuration of the primary SKLM server*\n\n5. If you want to add secondary SKLM servers, click the “ **+** ” symbol and enter the data for\n\nsecondary SKLM servers, as shown on Figure 12-33. You can define up to four SKLM\n\nservers. Click **Next** when you are done.\n\n*Figure 12-33 Configuring multiple SKLM servers*", - "page_start": 651, - "page_end": 651, - "source_file": "sg247938.pdf" - }, - { - "text": "cell death and apoptosis with more than 10 genes were\n\nexamined. Filtered count data of expressed and nondifferentially\n\nexpressed genes were used as a background.\n\n2.8. Dorsal root ganglion culture\n\nDorsal root ganglia were dissected from MrgD CreERT2 ;Ai32 and\n\nCalca CreERT2 ;Ai32 mice . 1 week after dosing with tamoxifen and\n\nenzymatically digested at 37˚˚C for 80 minutes in dispase type II\n\n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington Biochemical), as described previously. 63 Mechanically dissoci-\n\nated cells were plated onto laminin/poly-D-lysine (R&D Systems,\n\nMinneapolis, MN) treated coverslips in complete Neurobasal Plus\n\nmedium (Neurobasal Plus media supplemented with 2% (vol/vol)\n\nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic- antimycotic\n\n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth\n\nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech,\n\nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor\n\n(GDNF, PeproTech) were added to the media under some\n\nconditions. Cytosine b -D-arabinofuranoside (4 m M) was added to\n\nthe media for 24 hours the day after plating to reduce the\n\nproliferation of nonneuronal cells. Media was refreshed 3 times\n\nper week thereafter. Cultures were fixed for 10 minutes at room\n\ntemperature with 4% paraformaldehyde and subsequently\n\nprocessed by immunocytochemistry (described earlier).\n\n2.9. Statistical analysis\n\nData are expressed as mean 6 SEM unless otherwise specified,\n\nand P values of less than 0.05 were considered significant. Power calculations were performed using G*Power 3.1.9.7. 15 A quantitative Venn diagram was created using BioVenn. 25 All\n\nother statistical analyses were performed in Prism 10 (GraphPad\n\nSoftware, Inc, Boston, MA) or R using paired t tests or 1- or 2-way\n\nRM ANOVAs (repeated measures analysis of variance), where\n\nappropriate. Normality was assessed by the Shapiro- Wilk test. If\n\nthe main analysis of variance effect was significant, ˇ S´ıd ´ak or\n\nTukey multiple comparisons tests were performed. To compare\n\npopulation distributions of soma cross-sectional area or volume,\n\nKolmogorov- Smirnov tests were performed.\n\n3. Results\n\n3.1. Peripheral nerve injury induces a loss of small neurons\n\nfrom the dorsal root ganglion\n\nTo assess the gross loss of neurons from DRG following nerve\n\ninjury, we generated the Avil FlpO ;Atf3 CreERT2 ;RC::FLTG mouse\n\nline in which na¨ıve and axotomized sensory neurons were\n\ndifferentially labelled. In this mouse line, all neurons express\n\ntdTomato (Flp-dependent) in the na¨ıve state and switch to\n\nexpressing green fluorescent protein (GFP) upon axonal damage\n\nand concurrent tamoxifen treatment (Flp- and Cre-dependent)\n\n( Figs. 1A and B ). Following pilot experiments to optimize\n\ntamoxifen dosing regimen, this approach was both highly efficient\n\nand specific (with the caveat that it was necessary to wait for\n\nseveral days after nerve injury for Cre-induced GFP expression):\n\n14 days after SNI trans surgery, GFP was expressed by 99.1 6\n\n0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we\n\nobserved GFP in only 4.6 6 0.7% of contralateral DRG neurons\n\n[(Figs. S2A- D, http://links.lww.com/PAIN/C84). We then used](http://links.lww.com/PAIN/C84)\n\na stereological approach to quantify the total number of neurons\n\nin L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNI trans, as\n\nwell as contralateral to injury. One week after SNI trans , we\n\nobserved 7809 6 153 neurons per DRG; this was not significantly\n\ndifferent to the number of neurons in the contralateral DRG\n\n(7917 6 349), whereas cell number approximately halved by\n\n8 weeks postinjury to 3963 6 410 neurons per DRG ( Fig. 1C ).\n\nSeparating analysis into intact vs axotomized afferents revealed\n\nthat only axotomized afferents were lost, with no difference\n\nobserved in numbers of intact afferents ( Fig. 1D ). Between 1 and", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "**Observations of Soft Gamma Ray Sources** *>* 100 **keV Using Earth Occultation**\n\n**with GBM**\n\nG.L. Case, M.L. Cherry, J. Rodi\n\n*Dept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA*\n\nA. Camero-Arranz\n\n*Fundaci´on Espa˜nola de Ciencia y Tecnolog´ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain*\n\nE. Beklen\n\n*Middle East Technical University (METU), 06531, Ankara, Turkey*\n\nC. A. Wilson-Hodge\n\n*NASA Marshall Space Flight Center, Huntsville, AL 35812*\n\nP. Jenke\n\n*NASA Postdoctoral Program Fellow, NASA Marshall Space Flight Center, Huntsville, AL 35812*\n\nP.N. Bhat, M.S. Briggs, V. Chaplin, V. Connaughton, R. Preece\n\n*University of Alabama in Huntsville, Huntsville, AL 35899*\n\nM.H. Finger\n\n*USRA, National Space Science and Technology Center, Huntsville, AL 35899*\n\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being\n\nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth\n\noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma\n\nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient\n\noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage\n\nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies\n\nbelow *∼* 25 keV and above *∼* 1 *.* 5 MeV. We describe the technique and present preliminary results after the first *∼* 17 months of observations at energies above 100 keV. Seven sources are detected: the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source\n\nXTE J1752-223.\n\n## **I. INTRODUCTION**\n\nThe Gamma ray Burst Monitor (GBM) on Fermi is\n\ncurrently the only instrument in orbit providing nearly\n\ncontinuous full sky coverage in the hard X-ray/low\n\nenergy gamma ray energy range. The Earth occul-\n\ntation technique, used very successfully on BATSE,\n\nhas been adapted to GBM. An initial catalog of 64\n\nsources is currently being monitored and continuously\n\naugmented. At energies above 100 keV, six steady\n\nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E\n\n1740-29, Cen A, GRS 1915+105) and one transient\n\nsource (XTE J1752-223) have been detected in the\n\nfirst year of observation. We describe the instrument,\n\noutline the technique, and present light curves for the\n\nseven sources.\n\n**II. GBM AND THE EARTH OCCULTATION**\n\n**OBSERVATIONAL TECHNIQUE**\n\nThe Gamma ray Burst Monitor is the secondary\n\ninstrument onboard the Fermi satellite [1, 2]. It con-\n\nsists of 12 NaI detectors 5 *′′* in diameter by 0.5 *′′* thick\n\nmounted on the corners of the spacecraft and oriented\n\nsuch that they view the entire sky not occulted by the Earth. GBM also contains 2 BGO detectors 5 *′′* in di- ameter by 5 *′′* thick located on opposite sides of the\n\nspacecraft. None of the GBM detectors have direct\n\nimaging capability.\n\nKnown sources of gamma ray emission can be mon-\n\nitored with non-imaging detectors using the Earth oc-\n\ncultation technique, as was successfully demonstrated\n\nwith BATSE [3, 4]. When a source of gamma rays\n\nis occulted by the Earth, the count rate measured by\n\nthe detector will drop, producing a step-like feature.\n\nWhen the source reappears from behind the Earths\n\nlimb, the count rate will increase, producing another\n\nstep. The diameter of the Earth seen from Fermi is\n\n*∼* 140 ** , so roughly 30% of the sky is occulted by the\n\nEarth at any one time. Coupled with the *±* 35 ** slew-\n\ning of the pointing direction every orbit, this means\n\nthat the entire sky is occulted every two orbits. With\n\nan altitude of 565 km, a period of 96 minutes, and\n\nan orbital inclination of 26 *.* 5 ** , individual occultation\n\nsteps last for *∼* 10 seconds (Fig. 1).\n\n**eConf C091122**", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "vdisk_w_io 0 0 181101215930\n\nvdisk_w_ms 0 0 181101215930\n\nmdisk_r_mb 0 0 181101215930\n\nmdisk_r_io 0 0 181101215930\n\nmdisk_r_ms 0 0 181101215930\n\nmdisk_w_mb 1 2 181101215920\n\nmdisk_w_io 2 4 181101215900\n\nmdisk_w_ms 6 7 181101215720\n\ndrive_r_mb 18 34 181101215825\n\ndrive_r_io 77 140 181101215525\n\ndrive_r_ms 4 13 181101215545\n\ndrive_w_mb 708 752 181101215510\n\ndrive_w_io 2800 2971 181101215510\n\ndrive_w_ms 11 13 181101215855\n\npower_w 374 384 181101215555\n\ntemp_c 24 24 181101215930\n\ntemp_f 75 75 181101215930\n\niplink_mb 0 0 181101215930\n\niplink_io 0 0 181101215930\n\niplink_comp_mb 0 0 181101215930\n\ncloud_up_mb 0 0 181101215930\n\ncloud_up_ms 0 0 181101215930\n\ncloud_down_mb 0 0 181101215930\n\ncloud_down_ms 0 0 181101215930\n\niser_mb 0 0 181101215930\n\niser_io 0 0 181101215930\n\nTable A-1 gives the description of the different counters that are presented by the\n\n**lssystemstats** and **lsnodecanisterstats** commands.\n\n*Table A-1 List of counters in lssystemstats and lsnodecanisterstats*\n\n| Value | Description |\n|:---|:---|\n| compression_cpu_pc | Displays the percentage of allocated CPU capacity that is used for compression. |\n| cpu_pc | Displays the percentage of allocated CPU capacity that is used for the system. |\n| fc_mb | Displays the total number of megabytes transferred per second for Fibre Channel traffic on the system. This value includes host I/O and any bandwidth that is used for communication within the system. |\n| fc_io | Displays the total I/O operations that are transferred per second for Fibre Channel traffic on the system. This value includes host I/O and any bandwidth that is used for communication within the system. |\n| sas_mb | Displays the total number of megabytes transferred per second for serial-attached SCSI (SAS) traffic on the system. This value includes host I/O and bandwidth that is used for background RAID activity. |\n| sas_io | Displays the total I/O operations that are transferred per second for SAS traffic on the system. This value includes host I/O and bandwidth that is used for background RAID activity. |\n| iscsi_mb | Displays the total number of megabytes transferred per second for iSCSI traffic on the system. |", - "page_start": 767, - "page_end": 767, - "source_file": "sg247938.pdf" - }, - { - "text": "**MANAGEMENT’S DISCUSSION AND ANALYSIS** Understanding Our Business\n\nRogers Communications is one of Canada’s leading diversified communications and media companies.\n\n**Our vision** is to be known for leading the enablement and delivery of seamless, customer-driven communications,\n\nentertainment, information and transactional experiences across any device, place or time.\n\n**Wireless** provides wireless voice and data communication services,\n\nincluding machine to machine to both consumer and enterprise\n\nbusinesses, governments and other telecommunications service\n\nproviders. **Cable** provides voice and data communications, home\n\nmonitoring, television and high-speed Internet services to both\n\nconsumers and businesses. **Business Solutions** provides voice and data\n\ncommunications and advanced services including data centre based\n\nsolutions and cloud computing services to a wide range of medium to\n\nlarge businesses, including other service providers, and government\n\neither wirelessly or over our terrestrial network. Revenue generated\n\nfrom these segments is generally based on monthly subscription and\n\nnetwork usage rates. Costs include attracting, setting-up and retaining\n\ncustomers, content, and the costs of upgrading and maintaining the\n\nunderlying network.\n\nOur wireless network is currently one of the most extensive and\n\nadvanced independent high-speed wireless data networks in Canada,\n\ncapable of supporting wireless services on smartphones, tablets,\n\ncomputers and a broad variety of machine-to-machine and specialized\n\ndevices. We built the first Long Term Evolution (LTE) high speed\n\nnetwork in Canada, reaching nearly 73% of the Canadian population\n\nat December 31, 2013. We also have roaming agreements with\n\ninternational carriers in more than 200 other countries, including 5 LTE\n\nroaming operators and have network sharing arrangements with several\n\ncarriers in Canada.\n\nOur expansive fibre and hybrid fibre coaxial infrastructure delivers\n\nservices to consumers and businesses in Ontario, New Brunswick and\n\nNewfoundland. We also operate a North American transcontinental\n\nfibre-optic network that extends over 41,000 route kilometres that is\n\nused to serve enterprise customers, including government and other\n\ntelecommunications service providers. In Canada, the network extends\n\ncoast to coast and includes local and regional fibre, transmission\n\nelectronics and systems, hubs, POPs and IP Routing and switching\n\ninfrastructure. The network also extends to the US, from Vancouver\n\nsouth to Seattle, from the Manitoba-Minnesota border through\n\nMinneapolis, Milwaukee and Chicago, and from Toronto, through\n\nBuffalo, and Montreal, through Albany, to New York City, allowing us\n\nto connect Canada’s largest markets, while also reaching key US\n\nmarkets for the exchange of data and voice traffic.\n\n**Media** provides television and radio broadcasting services to end\n\ncustomers over both traditional broadcast networks and new digital\n\nnetworks as well as multi-platform shopping, consumer and trade\n\npublications and sports media and entertainment experiences, primarily\n\nthrough its ownership of the Toronto Blue Jays. Revenue is largely\n\ndriven by advertising and, in the case of TV broadcasting and publishing\n\nby additional revenues from monthly subscriptions. Revenue is also\n\ngenerated by the sale of merchandise and event tickets. Costs include\n\nsports programming, broadcast content (including TV studios, writers\n\nand on air and on field talent), the cost of merchandise and the\n\nproduction costs associated with each medium.\n\nWe report our results of operations in four segments, which reflect how\n\nwe manage our operations and measure our performance.\n\n####### **WIRELESS**\n\nsee page 37\n\nCanada’s largest provider of\n\nwireless communications services.\n\n####### **MEDIA**\n\nsee page 47\n\nA diversified Canadian media\n\ncompany that engages in\n\ntelevision and radio\n\nbroadcasting, multi-platform\n\nshopping, publishing, digital,\n\nand sports media and", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "#### *New, sophisticated electronic payment solutions are*\n\n#### *providing multiple customer touchpoints for replenishing*\n\n#### *prepaid mobile airtime.*\n\nrepaid service has become one of the fastest growing segments of the mobile phone\n\nmarket, enticing more and more consumers to become mobile phone clients. Recharge\n\nservices are now appealing to mobile subscribers as an easy, convenient and flexible\n\nbilling alternative.\n\nThe mobile phone market is enormous in Europe with 300\n\nmillion subscribers, 1 where today as many as 57% of all mobile\n\nphone activations are prepaid. 2 In the United States, analysts\n\nexpect an upsurge in the number of prepaid mobile subscribers\n\nto 34 million by 2003. 3\n\nOne of the biggest challenges for mobile operators is to distribute\n\nmobile airtime to their customers. In many markets, the predominant\n\nrecharge method for consumers still involves purchasing minutes via\n\nplastic or paper scratch-off cards. Euronet ® Electronic ReCharge\n\nprovides a secure, less costly alternative to traditional scratch-off\n\ncards with four electronic recharge solutions for mobile operators.\n\nSubscribers may purchase additional prepaid airtime in one step over\n\ntheir mobile handset, at a POS terminal, over the Internet or at any\n\nATM operated by any financial institution.\n\nOur growing list of ReCharge clients now includes EuroTel in the\n\nCzech Republic, Pannon GSM in Hungary and VIPnet in Croatia. In\n\nPoland, Euronet dominates the market, providing ReCharge services to\n\nall three mobile operators: Plus GSM, ERA GSM and Centertel.\n\nThrough a strategic alliance with Gemplus, the world’s number one\n\nprovider of smart card-based solutions, Euronet’s expanding suite of mobile\n\npayment solutions will be promoted to GSM mobile operators around the world.\n\nAs the popularity of prepaid mobile airtime services continues to increase, the need for cost-effective\n\nelectronic distibution methods becomes more and more critical to mobile operators. We believe that our\n\nReCharge product line has unlimited global opportunities.\n\n### P\n\n**Pannon GSM, Hungary**\n\n*Convenient Prepaid*\n\n*Mobile Solutions*\n\n*Pannon, one of the*\n\n*largest GSM mobile*\n\n*phone service compa-*\n\n*nies in Hungary, now offers the convenience of*\n\n*purchasing prepaid mobile phone airtime at*\n\n*Euronet ATMs throughout the country. Up to*\n\n*70% of Pannon’s more than 1.2 million cus-*\n\n*tomers subscribe to prepaid services.*\n\n*“We are astonished by our customers’*\n\n*response to Euronet’s ReCharge service,” says*\n\n*Tamás Tus, Sales Manager, Pannon GSM.*\n\n*“Sales have dramatically exceeded our expec-*\n\n*tations. And our customers love the conve-*\n\n*nience and ease-of-use. What a success!”*\n\n#### **Electronic payment solutions span prepaid distribution gap**\n\n1 GSM World (February 2001), 2 Business Wire (October 2000), 3 The Yankee Group (1999)", - "page_start": 10, - "page_end": 10, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "Page 44 10/02/2013\n\n## **Glossary of terms and abbreviations**\n\nAD - Activity Data\n\nAWMS - Animal Waste Management System\n\nBOD - Biochemical Oxygen Demand\n\nC - Carbon\n\nC 2 F 6\n\n- Hexafluoroethane\n\nCF 4\n\n- Tetrafluoromethane\n\nCH 4\n\n- Methane\n\nCO - Carbon Monoxide\n\nCO 2\n\n- Carbon dioxide\n\nCOD - Chemical Oxygen Demand\n\ndm - dry matter\n\nGg - Gigagram\n\nha - hectare\n\nHFC - Hydrofluorocarbon\n\nhl - hectolitre\n\nk - kilo\n\nkg - kilogram\n\nkha - kilo hectare\n\nkt - kilotonne\n\nLTO - Landing/Take Off\n\nLUCF - Land-Use Change and Forestry\n\nLULUCF - Land Use, Land-Use Change and Forestry\n\nm 3\n\n- cubic meter\n\nMCF - Methane Correction Factor\n\nMg - Megagram\n\nMha - Megahectare\n\nMSW - Municipal Solid Waste\n\nN - Nitrogen\n\nN 2 O - Nitrous Oxide\n\nNFP - National Focal Point\n\nNH 3\n\n- Ammonia\n\nNMVOC - Non-Methane Volatile Organic Compound\n\nNO X\n\n- Nitrogen Dioxide\n\nPFC - Perfluorocarbon\n\nRA - Reference Approach\n\nSE - Sectoral Expert\n\nSF 6\n\n- Sulphur Hexafluoride\n\nSO 2\n\n- Sulphur Dioxide\n\nSWDS - Solid Waste Disposal Site\n\nt - tonne\n\nTg - Teragram\n\nTJ - Terajoules\n\nXML - Extensible Markup Language\n\nyear t - inventory year", - "page_start": 43, - "page_end": 43, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "9\n\n**T** he worst of 2001 brought out the best in The\n\nHartford’s people.\n\nAs the world watched the horrors of Sept. 11,\n\nsome 330 of our New York employees fled their offices\n\nin 7 World Trade Center. Though many were caught in\n\nthe debris and dust from the nearby Twin Towers, all\n\nescaped safely.\n\nBy the time the 47-story 7 World Trade Center\n\nbuilding collapsed at about 5:20 p.m., The Hartford had\n\nalready arranged for temporary space in several of the\n\ncompany’s other offices. Employees and suppliers\n\nimmediately began working around the clock to get\n\nthe business up and running again. Despite the\n\ndestruction, back-up systems kept distributors’ and\n\ncustomers’ data secure.\n\nA hundred miles from Ground Zero, home office\n\nemployees in Hartford, Conn., began shuttling equip-\n\nment and supplies to our temporary offices. Some\n\nbooked Long Island Sound ferries from Connecticut to\n\nLong Island within 48 hours of the attack. Others spent\n\nthe weekend driving supplies to the new locations so\n\nemployees could concentrate on customers instead of\n\non finding pens and paper. Employees and suppliers\n\nwere determined to get the company, its distributors\n\nand its customers through the crisis.\n\nBy Monday, Sept. 17, all of The Hartford’s business\n\nunits in New York were serving customers again.\n\nEmployees had new furniture, phones, servers and PCs.\n\nDistributors’ and customers’ access to company e-mail\n\nwas never interrupted. Calls to old phone numbers were\n\nrerouted to cell phones or new office phones. Print and\n\nradio ads—along with The Hartford’s Web site—\n\ngave customers instructions for filing claims quickly.\n\nCustomer relationships were stronger than ever. The\n\nHartford Experience—customer solutions, ease of doing\n\nbusiness and extraordinary service—was never better\n\ndemonstrated.\n\n### *people*", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "#### about emmis\n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM\n\ndomestic radio stations serving the nation’s largest markets of New\n\nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin,\n\nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television\n\nstations, award-winning regional and specialty magazines, a radio net-\n\nwork, international radio interests, and ancillary businesses in broadcast\n\nsales and publishing.\n\nEmmis was founded in 1980, and the company launched its first radio\n\nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for\n\n“truth”) acquired more radio stations across the nation, it established a\n\nreputation for sound operations and emerged as a radio industry leader\n\nand innovator. Emmis was the first broadcast company to own top-\n\nrated radio stations in both L.A. and New York, and it pioneered such\n\nconcepts as the all-sports format.\n\nThe company launched its magazine division in 1988 with the purchase\n\nof *Indianapolis Monthly* , and moved into the world of international radio\n\nin 1997, when it was awarded a license to operate a national radio\n\nnetwork in Hungary. In 1998, Emmis expanded into television by buying\n\nsix television stations in markets throughout the United States. In the last\n\nsix years, the company has added properties in each of its divisions.\n\nWith its emphasis on solid operations, integrity, community involvement\n\nand fun, the company’s culture has been repeatedly lauded by both its\n\nemployees and its peers. Trade publications have regularly cited the\n\ncompany’s leaders as being among the best in the business.\n\nEmmis became a public company in 1994. It maintains its worldwide\n\nheadquarters in Indianapolis, where the company was founded.\n\n*This annual report contains certain non-GAAP measures. For a presen-*\n\n*tation of the directly comparable GAAP measure and a reconciliation of*\n\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n\n*the back of our Form 10-K in this Annual Report.*", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv5_ccby4license.pdf", - "query": "What is the average emission of a human being per year in terms of CO2eq ?", - "target_page": 3, - "target_passage": "the average human is responsible for an estimated 5t CO2e per year", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "In the global warming network, politics was the second-largest discourse cluster (20% of the\n\nnetwork), where “tcot”, short for “Top Conservatives on Twitter”, was the node ranked highest,\n\nand “p2”, short for “Progressives 2.0”, is also included. Several political figures, such as Obama and Al\n\nGore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster\n\n(16%), including both domestic e ff orts, such as “us”, “trump”, “climatechangeisreal”, “climateaction”,\n\nand “epa”, and two international items, like “china” and “india”. The fourth cluster (in blue) referred\n\nto emissions, including hashtags like “co2”, “green”, and “carbon”. The smallest cluster (8%) was\n\ncomposed of “snow”, “winter”, “heatwave”, and “summer”, referring to the temperature abnormalities\n\non the earth.\n\n### *4.3. Temporal Analysis of the Associations in the Two Discourses*\n\nThe online presentations of the climate change and global warming discourses are dynamic.\n\nAs shown in Table 2 , for the global warming discourse, 11 key concepts remained in the top 50 central\n\nhashtags each year for all 10 years, with 16 for the climate change”discourse. By comparing the 11\n\nnodes of the global warming discourse and the 16 nodes of the climate change discourse, we found that\n\nthe two lists shared nine concepts. We found “pollution” and “earth” were unique to the keyword list\n\nof the global warming discourse, and “economy”, “water”, “china”, “coal”, “solar”, “sustainability”,\n\nand “food” only occurred on the critical list for the climate change discourse.\n\n**Table 2.** Hashtags that remained on the top 50 list for the climate change or the global warming\n\ndiscourse from 2009 to 2018.\n\n**Unique Shared**\n\n#climatechange china, solar, water, food, economy, coal, sustainability co2, news, carbon, green, climate,\n\n#globalwarming pollution, earth us, energy, science, environment\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period,\n\nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies\n\nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary\n\nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more\n\nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of\n\nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the\n\n10 years, as shown in Figure 5 .\n\nFigure 3 depicts the associations of hashtags in the climate change discourse for each year\n\nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the\n\nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg”\n\n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global\n\nactions cluster (in yellow) because these hashtags were frequently used in the global action context and\n\nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags,\n\nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental\n\nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change),\n\nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political\n\nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political\n\nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining\n\n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of\n\nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased\n\nin the last two years of the period according to Figure 5 a.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "issues and re-constructing them di ff erently. By comparing the persistent words used related to the two\n\ndiscourses in the 10-year period in Table 2 , we think that global warming showed a relative preference\n\ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change”\n\nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”.\n\nStudies have suggested that the public shows a preference for scientific publications with general\n\nkeywords compared with those with complicated scientific jargon [ 47 ], lacking a deep understanding of\n\nthe complicated issue [ 46 ] and the necessity for mitigation of the climate issue [ 47 ]. These conclusions\n\nseem to suit global warming more than climate change according to the current study, which is\n\nprobably because climate change receives more publicity and recognition than global warming in the\n\nscientific community. In the association network shown in Figure 2 , global warming was found to be\n\nmore connected with temperature abnormalities. This finding is in accordance with studies reporting\n\nthat short-term temperature anomalies [ 87 ] can increase the public’s belief about global warming by\n\nincreasing the understanding of this abstract issue [ 88 ], although scientists mostly make judgments\n\nbased on long-term weather statistics [ 89 ]. However, none of the four words, “snow”, “summer”,\n\n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes\n\nlist of the climate change network.\n\nEven when climate change and global warming shared concern about similar topics such as the\n\ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas\n\nclimate change preferred a more in-depth perspective, highlighting the importance of global action\n\nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to\n\ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long\n\nbeen regarded as two key reasons for low climate concern [ 90 ], the two terminologies’ di ff erences\n\nin connotations suggest that introducing these absent sub-topics into global warming discourse or\n\nhighlighting climate change for its inherent connotations may help communicators raise public concern\n\nabout climate.\n\n#### 5.1.2. Political Connotations\n\nStudies noted that frame preference between climate change and global warming reflects\n\nindividuals’ ideological spectrum, where climate change and global warming were favored by\n\nthe liberals and conservatives, respectively [ 10 ]. The cluster analysis of the semantic network in the\n\ncurrent study demonstrated that global warming triggered far more political responses than climate\n\nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored\n\nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes\n\nof the global warming discourse, but neither was included in the list of top nodes of the climate change\n\ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used\n\nby conservatives to question the reality of climate issue [ 11 ] and climate change is more commonly\n\nadopted when discussing action against the climate change issue [ 5 ], global warming had a stronger\n\npolitical connotation in public discussion.\n\n#### 5.1.3. Discourse Structure\n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action”\n\nrepresented the themes of the three largest clusters in the network. However, three popularly recurring\n\nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters\n\nabove, but formed another small tight cluster together, sitting in the most central part of the semantic\n\nnetwork, as shown in Figure 2 b. As each of the three hashtags can almost represent one sub-theme of", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "Vol.:(0123456789)\n\nFirstly, the period of 1986- 2005 is defined as the baseline, of which the simulated average value is recog- nized as 0.61 °C above pre-industrial (the period of 1850- 1900) levels; the baseline is selected according to the accessibility and operability of data, which is used for the determination of the periods with global warming by 1.5 °C and 2.0 °C and the comparison of maize yield between different periods. Secondly, the simulated values of global mean temperature in the future years are subtracted from the simulated average value of 1986- 2005; then the values should be plus with 0.61 °C, which are the global warming results above pre-industrial levels; then 20 years moving average of the above results are calculated. Thirdly, the climate data of global warming by 1.5 °C is defined according to the principles provided in the fifth IPCC Assessment Report, for which it should be within 1.5- 2.0 °C above pre-industrial levels at the end of the twenty-first century; the climate data of global warming by 2.0 °C is defined according to the principles provided in the fifth IPCC Assessment Report, for which it should be within 2.0- 2.5 °C above pre-industrial levels at the end of the twenty-first century and the period of global warming by 2.0 °C should not be earlier than 2050. Finally, the climate models, scenarios and periods of global warming by 1.5 °C and 2.0 °C are separately confirmed; the data of global warming by 1.5 °C, simulated by IPSL-CM5A-LR under RCP2.6 scenario during 2020- 2039 and simulated by GFDL-ESM2M under RCP4.5 scenario during 2041- 2060; the data of global warming by 2.0 °C, simulated by NorESM1-M under RCP4.5 scenario during 2060- 2079 and simulated by GFDL-ESM2M under RCP6.0 scenario during 2065- 2084.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "**2** Model Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration\n\nscenario. To provide more detailed representations of climate processes and impacts, the\n\nspatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution\n\nthan the CMIP5 models. We used a set of impacts-relevant indices and a global land surface\n\nmodel to examine the projected changes in weather extremes and their implications for\n\nfreshwater availability and vulnerability to food insecurity. Uncertainties in regional climate\n\nresponses are assessed, examining ranges of outcomes in impacts to inform risk assessments.\n\nDespite some degree of inconsistency between components of the study due to the need to\n\ncorrect for systematic biases in some aspects, the outcomes from different ensemble members\n\ncould be compared for several different indicators. The projections for weather extremes\n\nindices and biophysical impacts quantities support expectations that the magnitude of change\n\nis generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with\n\nincreases being more intense than seen in CMIP5 projections. Precipitation-related extremes\n\nshow more geographical variation with some increases and some decreases in both heavy\n\nprecipitation and drought. There are substantial regional uncertainties in hydrological impacts\n\nat local scales due to different climate models producing different outcomes. Nevertheless,\n\nhydrological impacts generally point towards wetter conditions on average, with increased\n\nmean river flows, longer heavy rainfall events, particularly in South and East Asia with the\n\nmost extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global\n\nwarming. Some areas are projected to experience shorter meteorological drought events and\n\nless severe low flows, although longer droughts and/or decreases in low flows are projected\n\nin many other areas, particularly southern Africa and South America. Flows in the Amazon\n\nare projected to decline by up to 25%. Increases in either heavy rainfall or drought events\n\nimply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this\n\nvulnerability is projected to remain smaller than at 2°C global warming in approximately 76%\n\nof developing countries. At 2°C, four countries are projected to reach unprecedented levels of\n\nvulnerability to food insecurity.\n\nThis article is part of the theme issue ‘The Paris Agreement: understanding the physical and\n\nsocial challenges for a warming world of 1.5°C above pre-industrial levels’.\n\n## 1. Introduction\n\nThe majority of climate-change impacts assessments have tended to be framed in terms of future\n\ntime horizons, e.g. impacts by the middle or end of the twenty-first century [ 1 , 2 ]. However,\n\nwith international climate policy now largely focused on limiting warming to specific levels of\n\nglobal mean temperature such as 2°C [ 3 ] or 1.5°C [ 4 ], policy-relevant climate impacts assessments\n\nincreasingly need to be framed in terms of such warming levels.\n\nThere are two major research questions concerning the impacts of climate change at 1.5°C and\n\n2°C global warming, which are relevant to both mitigation and adaptation policy areas.\n\n(i) How much larger are the impacts at 2°C compared to 1.5°C? This is the primary question\n\narising from the Paris Agreement [ 4 ] and is relevant to mitigation policy, informing\n\njudgements and actions on holding the global temperature rise to ‘well below 2°C’ and\n\n‘pursuing efforts to limit the temperature increase to 1.5°C’.\n\n(ii) What regional climate conditions and related hydrological and ecological conditions\n\ncould occur at a particular level of global warming, such as 2°C? This is relevant to\n\nadaptation policy and planning—exploring the possible outcomes for these levels of\n\nwarming will help facilitate adaptation and improved resilience to account for a 1.5°C or", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "The Japan Research Institute has built up a The Japan Research Institute has built up a\n\nsuccessful track record in the course of its successful track record in the course of its\n\nadvisory activities in China, in joint research advisory activities in China, in joint research\n\ninto local-level microgrid construction at into local-level microgrid construction at\n\nthe Tianjin Eco-City, and in policy-making the Tianjin Eco-City, and in policy-making\n\nrelating to renewable energy management relating to renewable energy management\n\nsys systems and other areas. ems and other areas.\n\nIn partnership with the Guangdong Provincial In partnership with the Guangdong Provincial\n\nDepartment of Science and Technology, the Department of Science and Technology, the\n\nJapan Research Institute also advises Japan Research Institute also advises\n\ngovernment departments on system government departments on system\n\nestablishment for new energy-saving establishment for new energy-saving\n\nbusinesses. Guangdong is China businesses. Guangdong is China’s richest s richest\n\nprovince by gross provincial product, and province by gross provincial product, and\n\nhere both needs and potential in the field here both needs and potential in the field\n\nof energy-saving are very great. The Japan of energy-saving are very great. The Japan\n\nResearch Institute also supports industrial Research Institute also supports industrial\n\nrestructuring and low-carbon projects in the restructuring and low-carbon projects in the\n\nprovince through model projects. province through model projects.\n\nIn the battle against global warming, both In the battle against global warming, both\n\npublic and private sectors are facing mounting public and private sectors are facing mounting\n\npressure to curb carbon dioxide pollution from pressure to curb carbon dioxide pollution from\n\ntransportation, one of the major sources of transportation, one of the major sources of\n\nemissions. Against this backdrop, the Japan emissions. Against this backdrop, the Japan\n\nResearch Institute is supporting environmental Research Institute is supporting environmental\n\nbusinesses that map out pathways and businesses that map out pathways and\n\ndevelop projects, tailored to the needs of develop projects, tailored to the needs of\n\nparticular localities, to bring about a particular localities, to bring about a\n\nlow-carbon society. Experimental projects are low-carbon society. Experimental projects are\n\ncurrently underway in Kanagawa Prefecture, currently underway in Kanagawa Prefecture,\n\nSaitama Prefecture, Kyoto and Sapporo. Saitama Prefecture, Kyoto and Sapporo.\n\nThese initiatives are aimed at hastening the These initiatives are aimed at hastening the\n\nadoption of electric vehicles and car-sharing adoption of electric vehicles and car-sharing\n\nto cut carbon dioxide emissions. The Institute to cut carbon dioxide emissions. The Institute\n\nis working in cooperation with government is working in cooperation with government\n\nbodies, car-rental, commercial vehicle-leasing bodies, car-rental, commercial vehicle-leasing\n\nand parking-facility management companies, and parking-facility management companies,\n\nrailways, communications providers and railways, communications providers and\n\nother entities. other entities.\n\nElectric vehicles not only emit no carbon dioxide,\n\nbut offer a comfortable drive as well\n\nIGEM2010 greeted many visitors\n\nSumitomo Mitsui Financial Group CSR Report\n\n**Taking a leading role in**\n\n**environmental businesses**\n\n**in Asia**\n\n**Promoting energy-saving**\n\n**and low-emission**\n\n**industries in China**\n\n**Support for adoption of**\n\n**electric vehicles and**\n\n**car-sharing**\n\n**International initiatives in Asian countries and others**\n\n#### **Environmental**\n\n#### **Activities**\n\n**For further details, please see our website.**", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "make global action salient for people talking about global warming than people talking about climate\n\nchange [ 40 ], even though the facts of climate issues are highly recognized in both discourses.\n\n## **6. Conclusions**\n\nAs social media is gradually overtaking the role of legacy media providing a forum for public\n\ndiscussion, the semantic associations contained in social media discussions reflect and reinforce how\n\nindividuals portray global climate issues. By examining hashtag co-occurrence patterns on Twitter\n\nbetween 2009 and 2018, we identified distinct climate perceptions hidden behind two competing\n\nclimate discourses and discovered how these two discourses evolved.\n\nWe found that broad scientific, social, political, and international discussions are the topics\n\nof public climate discourse. Although the semantic di ff erence between climate change and global\n\nwarming seems subtle, the di ff erences in their cognitive associations are not trivial. Despite some\n\nshared concerns between the two discourses, “global warming” is more politicized and focuses more on\n\ngeneral phenomena, especially temperature abnormalities, whereas climate change is a more compact\n\ntopic with a more scientific perspective and tends to refer to specific issues. The temporal analysis\n\nrevealed that traditional political discussions decreased in both discourses but climate change started to\n\nbuild a discourse alliance with diverse domestic issues to show political intentions. Global warming’s\n\nassociations to extreme events and temperature change were suddenly strengthened around 2012.\n\nClimate change is becoming dominant compared with global warming in public discussions. Although\n\nthe two discourses are becoming increasingly similar in the rank order of climate concepts, a notable\n\ndiscrepancy still exists in the way in which they get concepts associated. These observations may\n\nprovide climate communicators with theoretical and practical hints to narrow the discrepancy between\n\ndiverse climate perceptions.\n\n*Limitation and Future Directions*\n\nThough big data allowed us to decrease the bias by dealing with the whole set of social media\n\ndata rather than samples, discrepancies still exist between social media users and the public. As most\n\nTwitter users do not disclose their age, education, income, and gender in users’ profile, demographics\n\nwere not introduced as moderator factors in this study. Previous studies noted that in 1970s, global\n\ncooling was a prominent climate concern amongst the public [ 105 ]. While in the 1980s, ozone layer\n\ndepletion, species extinction and rainforest destruction became salient on the mass media agenda [ 106 ].\n\nConsidering the historical background of climate issues, age might influence how individuals perceive\n\nclimate issues. According to the statistics in 2017 [ 107 ], only 16 % of older people (older than 60)\n\nin America use Twitter, while the proportion is 39% for people between 30- 59 years old and 47%\n\nfor people younger than 30 years old (Stastista, 2017). Our results reflect the climate perception of\n\nolder people who use Twitter, as well as younger people amongst whom Twitter is more popular.\n\nAlthough some scholars reported that it is statistically reliable to take data on Twitter as a substitute\n\nand supplement for polling [ 108 ], we thought our results should be further examined before being\n\ngeneralized to the whole population.\n\nIn this study, we characterized the di ff erences between two popular climate discourses and\n\nexamined how two discourses evolved over a 10-year period. We did not focus on the interactions\n\nbetween public climate discourse and external factors. However, the evolution of climate discourse\n\nmight be driven by several external forces such as scientific e ff orts, natural events, politics and\n\nonline information (or misinformation) campaigns. The prevalence of certain climate concepts may", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" - }, - { - "text": "**24** but also a result of the different forcings influencing the atmosphere model at the time of passing\n\neach GWL, and the interaction with the climate sensitivity of HadGEM3. The radiative forcing\n\nof non-CO 2 forcings has previously been highlighted as a potentially important influence on\n\npatterns of climate change at 1.5°C and 2°C global warming [ 39 ]. Furthermore, despite some\n\ndifferences in regional climate responses between ensemble members, there were also some\n\nremarkable consistencies especially in the changes that might be considered inconsistent with\n\na warming climate, such as regions such as northern South America where heavy rainfall\n\n(Rx5day) decreases rather increasing as might be expected under a warming climate. Again, these\n\nconsistencies point to some common forcing of all simulations.\n\nOne key factor is the different times of passing a particular GWL, because the net radiative\n\nforcing would be different even though the same emissions and concentration scenario was used\n\nin all simulations. A given GWL was reached at a different time in each ensemble member, so\n\nthe CO 2 and aerosol concentrations vary between ensemble members; in members reaching a\n\nGWL early, such as that driven by IPSL-CM5A-LR, the CO 2 concentration is relatively lower\n\nthan in other members, and the total aerosol concentration would be relatively higher (CO 2\n\nconcentrations are projected to increase in RCP8.5, but aerosol concentrations are projected\n\ndecline). The net radiative forcing is smaller, because in RCP8.5 the increase positive radiative\n\nforcing from CO 2 is greater than the decrease in net negative radiative forcing from aerosols.\n\nMoreover, the physiological effect of CO 2 is also smaller, meaning that the consequent reduction\n\nin transpiration and associated additional land surface warming influence would also be expected\n\nto be smaller.\n\nConversely, in members reaching the same GWL later, such as that driven by GFDL-ESM2M,\n\nCO 2 concentration is relatively higher, and aerosol concentrations are lower. So, net radiative\n\nforcing, CO 2 physiological effects and the regional-scale radiative forcings from individual\n\naerosol types could, therefore, be quite different in the GFDL-driven HadGEM3 simulation when\n\nit reaches 2°C global warming 25 years later than the IPSL-CM5A-LR-driven simulation.\n\nThe spatial pattern of changes in the different ensemble members may also play a role in\n\ninfluencing the global mean changes, for example, with large changes in some regions due to\n\nfaster snow-melt or changes in cloud cover in one ensemble member leading to particular changes\n\nin regional warming that are not seen in other ensemble members. Moreover, the individual\n\nforcings of the different aerosol components such as sulfate and black carbon differ in sign and\n\nspatial pattern, so the overall impact on local radiative forcing and hence regional temperature\n\npatterns is more complex. Therefore, the global mean changes may not necessarily be expected to\n\nrelative to global mean forcings.\n\nA further complexity in identifying precise mechanisms for regional changes is the\n\nexperimental design used here, with one atmospheric model and concentration/emissions\n\nscenario but six different SST and SIC patterns, means that the impact of spatial heterogeneity in\n\nradiative forcings is complex and involves a mix of effects in HadGEM3 and the original CMIP5\n\nmodels. In the case of aerosols, for example, our HadGEM3 simulations are driven with RCP8.5\n\naerosol emissions and the aerosol concentrations are then calculated within the model itself. The\n\nspatial distributions of aerosol optical depth and radiative forcing can, therefore, be expected\n\nto be reasonably similar, because they arise from the same emissions scenario, although some\n\ndifferences may occur due to the different regional climate-change patterns. However, the impact\n\nof aerosols is also seen in the SST and SIC changes, because these will have responded to changes", - "page_start": 23, - "page_end": 23, - "source_file": "pubmed11.pdf" - }, - { - "text": "**7** In the present study, processing errors in the input data for one ensemble member, the\n\nHadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the\n\nHCVI are, therefore, not presented here.\n\n### (d) Freshwater resources: run-off\n\nImpacts on freshwater were assessed with a version of the JULES land surface model [ 24 , 25 ], a\n\ncoupled ecosystem- hydrology- surface exchange model which simulates land-atmosphere fluxes\n\nof water, energy and carbon in an internally consistent way, typically applied at global scales.\n\nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System\n\nModels [ 26 , 27 ] and have been used to assess impacts of climate change on global terrestrial\n\necosystems and hydrology [ 28 - 30 ] within such models. JULES can also be used outside of the\n\nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of\n\na wider range of climate projections [ 6 , 8 ]. Here we use a new, higher-resolution configuration of\n\nJULES on a global grid of 0.5° resolution [ 31 ].\n\nIt has been noted that hydrological impacts models driven by climate-change projections\n\nfrom climate models tend to give more severe drying than simulated in the climate models\n\nthemselves [ 32 - 34 ]. This is largely attributed to the inclusion of plant stomatal closure in\n\nresponse to elevated CO 2 in the climate model land surface schemes, which generally reduces\n\nevapotranspiration relative to climate projections without this process and hence further increases\n\nrun-off/streamflow or ameliorates decreases [ 34 ]. This process is often omitted from standard\n\nhydrological models. Plant physiological responses to CO 2 are included in the JULES model, so\n\nour projections of changes in run-off here do account for this process.\n\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to\n\nthe effects of climate change and CO 2 rise on precipitation, evaporation and transpiration. We\n\nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to\n\npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for\n\nthe lowest 10% of time).\n\n### (e) Correctingbiasesinclimatemodeloutputandimplicationsfordefininglevelsofglobal\n\nwarming\n\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed\n\nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there\n\nwere some differences in how these data were applied, with different approaches to the treatment\n\nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered\n\nimportant to assess changes in the raw climate model output, because this directly represents\n\nthe behaviour of the model itself. The main focus was on the changes relative to the present-\n\nday baseline climate, defined as 1981- 2010, with absolute values in either the baseline or the\n\nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off\n\nanalyses, however, it was considered important to correct for systematic biases in the climate\n\nmodel output, because these can lead to unrealistic representations of the key quantities in the\n\npresent-day simulation [ 35 ]. A bias-correction methodology was, therefore, applied for these two\n\nparts of the analysis, whereby the model output was adjusted to make it consistent with an\n\nobserved climatology [ 36 ]. We used a multi-segment statistical bias-correction methodology for\n\nprecipitation [ 37 ], and a modification of this for other variables [ 37 ].\n\nThis difference in approach led to inconsistencies in the definitions of the dates of GWLs\n\nin the two parts of the study. In the extremes analysis using raw model output, the dates of\n\npassing GWLs were defined on the basis of the global mean temperatures in the driving CMIP5", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "biases in baseline precipitation climatology, and different global patterns of precipitation change.\n\nSpecific levels of global warming such as 1.5°C or 2°C were defined on the basis of the global\n\nmean temperature in the original CMIP5 projections. The time of reaching a specific level of global\n\nwarming, therefore, varied between ensemble members. The CMIP5 SSTs were not bias-corrected,\n\nwhich means that the results here may be sensitive to systematic errors arising from biases in the\n\npresent-day SST patterns.\n\nAtmospheric greenhouse gas concentrations were prescribed from the standard RCP8.5\n\nconcentration scenario. Aerosol concentrations were calculated within the model, with aerosol\n\nemissions prescribed again from the standard RCP8.5 scenario. This means that the greenhouse\n\ngas and aerosol concentrations, and hence radiative forcing, were the same in all ensemble", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "complex changes in the state of the climate [ 7 ], which may be caused by natural process, external forces,\n\nor human interventions [ 8 ]. By randomly assigning respondents to climate change or global warming\n\nquestionnaires, scholars confirmed that the di ff erent connotations contained in the two definitions are\n\nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [ 9 ], which\n\nmay inhibit collaboration and joint e ff orts to mitigate the global challenge.\n\nPublic preference between climate change and global warming is even more apparent when\n\nconsidering the ideology spectrum [ 10 ]. Some scholars concluded that conservatives, who are\n\nless concerned with environmental issues, tended to use global warming as a narrative strategy\n\nbecause global warming has a more direct connection with temperature rise, making it easier to find\n\ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change\n\nfacts [ 11 ]. The associations between global warming and human activities may contribute to more\n\ncontroversies as well [ 12 ], connecting global warming more with the “hoax” frame [ 5 ] and evoking\n\ngreater negative sentiment [ 13 ].\n\nAlthough these existing studies have often attempted to identify the di ff erences between these two\n\nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause\n\nand e ff ect, were examined in each study [ 3 , 9 , 13 ]. However, the associate network model introduced by\n\npsychologists suggests that human recognition and memory have a network-shaped architecture [ 14 ],\n\nwhere individual understanding of particular objects is connected with numerous other objects in\n\nthe mind. According to the associate network model, individual understanding of the global climate\n\nconcern is a network composed of numerous inter-connected concepts, in which climate change and\n\nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue,\n\nthe preference between the two understandings may represent two distinct climate discourses by\n\ndi ff erently organizing numerous climate concepts. Examining the di ff erences between two discourses\n\nwith an associative perspective may provide communicators with unique insights into narrowing the\n\ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study\n\nof how concepts associated with each other have evolved with time.\n\nLarge amounts of user-generated data on social media, which have been valued in computer science,\n\ncommunication, and environmental studies [ 5 , 9 , 15 - 18 ], have enabled the acquistion of the social media\n\nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence\n\npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009\n\nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify\n\nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to\n\nobserve the evolution of the two discourses and to measure whether the discrepancy between the two\n\nhas widened or narrowed within the 10-year period.\n\nTo be specific, we formulated three research questions (RQs) to be explored in this study:\n\nRQ1: What is the di ff erence in how the two the discourses are associated with important climate\n\nconcepts in people’s minds?\n\nRQ2: How did the two competing climate discourses evolve from 2009 to 2018?\n\nRQ3: Did the two competing discourses converge or diverge in this decade?\n\n## **2. Background**\n\n### *2.1. Climate Change, Global Warming, and Frames*\n\nExisting studies have noted that the subtle di ff erence between climate change and global warming\n\nevokes di ff erent public cognitive responses, where global warming“indicates heat-related impacts,", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv5_ccby4license.pdf", - "query": "How did the Black Lives Matter movement influence the writing of Wikipedia articles ?", - "target_page": 5, - "target_passage": " the Black Lives Matter movement (BLM) influenced Wikipedia article generation and editing such that, as the BLM movement grew, articles covering shootings of Black people in- creased in coverage and were generated with reduced latency", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "meta-problem will solve or dissolve the hard problem. A weaker line holds that it will not\n\nremove the hard problem, but it will constrain the form of a solution.\n\nIn other words, the 'strong line' holds that the solution to the meta-problem would provide an explanation\n\nof our beliefs about consciousness that is independent of consciousness. That would debunk our beliefs\n\nabout consciousness, in the same way that explaining beliefs about god in evolutionary terms may\n\nprovide arguments against theism itself. [144]\n\n[Tom Stoppard's play ](https://en.wikipedia.org/wiki/Tom_Stoppard) *[The Hard Problem](https://en.wikipedia.org/wiki/The_Hard_Problem)* , first produced in 2015, is named after the hard problem of\n\nconsciousness, which Stoppard defines as having \"subjective First Person experiences\". [145]\n\n* **[Philosophy portal](https://en.wikipedia.org/wiki/Portal:Philosophy)** *\n\n[Animal consciousness](https://en.wikipedia.org/wiki/Animal_consciousness)\n\n[Artificial consciousness](https://en.wikipedia.org/wiki/Artificial_consciousness)\n\n[Binding problem](https://en.wikipedia.org/wiki/Binding_problem)\n\n[Blindsight](https://en.wikipedia.org/wiki/Blindsight)\n\n[Chinese room](https://en.wikipedia.org/wiki/Chinese_room)\n\n*[Cogito, ergo sum](https://en.wikipedia.org/wiki/Cogito,_ergo_sum)*\n\n[Cryonics](https://en.wikipedia.org/wiki/Cryonics)\n\n[Free will](https://en.wikipedia.org/wiki/Free_will)\n\n[Ideasthesia](https://en.wikipedia.org/wiki/Ideasthesia)\n\n[Introspection](https://en.wikipedia.org/wiki/Introspection)\n\n[Knowledge by acquaintance](https://en.wikipedia.org/wiki/Knowledge_by_acquaintance)\n\n[List of unsolved problems in biology](https://en.wikipedia.org/wiki/List_of_unsolved_problems_in_biology)\n\n[Mind- body problem](https://en.wikipedia.org/wiki/Mind%E2%80%93body_problem)\n\n[Phenomenalism](https://en.wikipedia.org/wiki/Phenomenalism)\n\n[Philosophy of self](https://en.wikipedia.org/wiki/Philosophy_of_self)\n\n[Primary- secondary quality distinction](https://en.wikipedia.org/wiki/Primary%E2%80%93secondary_quality_distinction)\n\n[Problem of mental causation](https://en.wikipedia.org/wiki/Problem_of_mental_causation)\n\n[Problem of other minds](https://en.wikipedia.org/wiki/Problem_of_other_minds)\n\n[Vertiginous question](https://en.wikipedia.org/wiki/Vertiginous_question)\n\n[Von Neumann- Wigner interpretation](https://en.wikipedia.org/wiki/Von_Neumann%E2%80%93Wigner_interpretation)\n\n1. \"But, without any delusive representations of images or phantasms, I am most certain that I\n\nam, and that I know and delight in this. In respect to these truths I am not at all afraid of the\n\narguments of the Academians, who say, What if you are deceived? For if I am deceived, I\n\nam. For he who is not, cannot be deceived...\"\n\n2. There has been debate over how best to characterize James' position. The *Stanford*\n\n*Encyclopedia of Philosophy* states: \"James’s commitment to panpsychism remains\n\nsomewhat controversial, since he also advanced a cogent set of objections against a\n\nversion of the view, which he labelled the 'mind dust' theory, in chapter six of The Principles\n\nof Psychology ([1890] 1981). These objections are the inspiration for the so-called\n\n'combination problem', around which much of the twenty first century literature on\n\npanpsychism focuses.\"\n\n### **In popular culture**\n\n### **See also**\n\n### **Notes**\n\n### **References**", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia2.pdf" - }, - { - "text": "the dogs\". [87]\n\nType-B Materialism, also known as *Weak Reductionism* or *[A Posteriori Physicalism](https://en.wikipedia.org/wiki/A_priori_and_a_posteriori)* , is the view that the\n\n[hard problem stems from human psychology, and is therefore not indicative of a genuine ontological gap](https://en.wikipedia.org/wiki/Ontology)\n\nbetween consciousness and the physical world. [43] Like Type-A Materialists, Type-B Materialists are\n\n##### **Criticisms**\n\n#### **Type-B Materialism**", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[Gleick, James, \"The Fate of Free Will\" (review of Kevin J. Mitchell, ](https://en.wikipedia.org/wiki/Gleick,_James) *Free Agents: How Evolution*\n\n*Gave Us Free Will* , Princeton University Press, 2023, 333 pp.), *[The New York Review of](https://en.wikipedia.org/wiki/The_New_York_Review_of_Books)*\n\n*[Books](https://en.wikipedia.org/wiki/The_New_York_Review_of_Books)* [, vol. LXXI, no. 1 (18 January 2024), pp. 27- 28, 30. \"Agency is what distinguishes us](https://en.wikipedia.org/wiki/Agency_(philosophy))\n\n[from machines. For biological creatures, reason and purpose come from acting in the world](https://en.wikipedia.org/wiki/Motivation)\n\nand experiencing the consequences. Artificial intelligences - disembodied, strangers to\n\nblood, sweat, and tears - have no occasion for that.\" (p. 30.)\n\n[Halpern, Sue, \"The Coming Tech Autocracy\" (review of Verity Harding, ](https://en.wikipedia.org/wiki/Verity_Harding) *AI Needs You: How We*\n\n*Can Change AI's Future and Save Our Own* [, Princeton University Press, 274 pp.; Gary](https://en.wikipedia.org/wiki/Gary_Marcus)\n\n[Marcus, ](https://en.wikipedia.org/wiki/Gary_Marcus) *Taming Silicon Valley: How We Can Ensure That AI Works for Us* , MIT Press, 235\n\n[pp.; Daniela Rus and Gregory Mone, ](https://en.wikipedia.org/w/index.php?title=Gregory_Mone&action=edit&redlink=1) *The Mind's Mirror: Risk and Reward in the Age of AI* ,\n\n[Norton, 280 pp.; Madhumita Murgia, ](https://en.wikipedia.org/wiki/Madhumita_Murgia) *Code Dependent: Living in the Shadow of AI* , Henry\n\nHolt, 311 pp.), *[The New York Review of Books](https://en.wikipedia.org/wiki/The_New_York_Review_of_Books)* , vol. LXXI, no. 17 (7 November 2024), pp.\n\n44- 46. \"'We can't realistically expect that those who hope to get rich from AI are going to\n\nhave the interests of the rest of us close at heart,' ... writes [Gary Marcus]. 'We can't count\n\n[on governments driven by campaign finance contributions [from tech companies] to push](https://en.wikipedia.org/wiki/Campaign_finance)\n\nback.'... Marcus details the demands that citizens should make of their governments and the\n\n[tech companies. They include transparency on how AI systems work; compensation for](https://en.wikipedia.org/wiki/Transparency_(behavior))\n\n[individuals if their data [are] used to train LLMs (large language model)s and the right to](https://en.wikipedia.org/wiki/Large_language_model)\n\nconsent to this use; and the ability to hold tech companies liable for the harms they cause\n\n[by eliminating Section 230, imposing cash penalties, and passing stricter product liability](https://en.wikipedia.org/wiki/Product_liability)\n\n[laws... Marcus also suggests... that a new, AI-specific federal agency, akin to the FDA, the](https://en.wikipedia.org/wiki/FDA)\n\n[FCC, or the FTC, might provide the most robust oversight.... [T]he Fordham law professor](https://en.wikipedia.org/wiki/Fordham_University)\n\n[Chinmayi Sharma... suggests... establish[ing] a professional licensing regime for engineers](https://en.wikipedia.org/w/index.php?title=Chinmayi_Sharma&action=edit&redlink=1)\n\n[that would function in a similar way to medical licenses, malpractice suits, and the](https://en.wikipedia.org/wiki/Malpractice)\n\n[Hippocratic oath in medicine. 'What if, like doctors,' she asks..., 'AI engineers also vowed to](https://en.wikipedia.org/wiki/Hippocratic_oath)\n\n[do no harm?'\" (p. 46.)](https://en.wikipedia.org/wiki/Primum_non_nocere)\n\n[Henderson, Mark (24 April 2007). \"Human rights for robots? We're getting carried away\" (http://](http://www.thetimes.co.uk/tto/technology/article1966391.ece)\n\n[www.thetimes.co.uk/tto/technology/article1966391.ece). ](http://www.thetimes.co.uk/tto/technology/article1966391.ece) *The Times Online* . London.\n\n[Archived (https://web.archive.org/web/20140531104850/http://www.thetimes.co.uk/tto/techn](https://web.archive.org/web/20140531104850/http://www.thetimes.co.uk/tto/technology/article1966391.ece)", - "page_start": 67, - "page_end": 67, - "source_file": "wikipedia3.pdf" - }, - { - "text": "defended versions of both positions as plausible. [52] Traditional dualists such as Descartes believed the\n\n[mental and the physical to be two separate substances, or fundamental types of entities (hence \"substance](https://en.wikipedia.org/wiki/Substance_dualism)\n\n[dualism\"); some more recent dualists, however, accept only one substance, the physical, but state it has](https://en.wikipedia.org/wiki/Substance_dualism)\n\n[both mental and physical properties (hence \"property dualism\").](https://en.wikipedia.org/wiki/Property_dualism) [107]\n\n[Meanwhile, panpsychism and neutral monism, broadly speaking, view consciousness as intrinsic to](https://en.wikipedia.org/wiki/Neutral_monism)\n\nmatter. [52] In its most basic form, panpsychism holds that all physical entities have minds (though its\n\nproponents take more qualified positions), [112] while neutral monism, in at least some variations, holds\n\nthat entities are composed of a substance with mental and physical aspects—and is thus sometimes\n\ndescribed as a type of panpsychism. [113]\n\nForms of panpsychism and neutral monism were defended in the early twentieth century by the\n\n[psychologist William James,](https://en.wikipedia.org/wiki/William_James) [114][115][note 2] [ the philosopher Alfred North Whitehead,](https://en.wikipedia.org/wiki/Alfred_North_Whitehead) [115] the physicist\n\n[Arthur Eddington,](https://en.wikipedia.org/wiki/Arthur_Eddington) [116][117] [ and the philosopher Bertrand Russell,](https://en.wikipedia.org/wiki/Bertrand_Russell) [112][113] and interest in these views has\n\n[been revived in recent decades by philosophers including Thomas Nagel,](https://en.wikipedia.org/wiki/Thomas_Nagel) [115] [ Galen Strawson,](https://en.wikipedia.org/wiki/Galen_Strawson) [115][118]\n\n[Philip Goff,](https://en.wikipedia.org/wiki/Philip_Goff_(philosopher)) [115] and David Chalmers. [112] Chalmers describes his overall view as \"naturalistic\n\ndualism\", [1] but he says panpsychism is in a sense a form of physicalism, [52] as does Strawson. [118]\n\nProponents of panpsychism argue it solves the hard problem of consciousness parsimoniously by making\n\nconsciousness a fundamental feature of reality. [43][119]\n\n[A traditional solution to the hard problem is idealism, according to which consciousness is fundamental](https://en.wikipedia.org/wiki/Idealism)\n\nand not simply an emergent property of matter. It is claimed that this avoids the hard problem\n\nentirely. [120] [ Objective idealism and cosmopsychism consider mind or consciousness to be the](https://en.wikipedia.org/wiki/Cosmopsychism)\n\nfundamental substance of the universe. Proponents claim that this approach is immune to both the hard\n\n[problem of consciousness and the combination problem that affects panpsychism.](https://en.wikipedia.org/wiki/Combination_problem) [121][122][123]\n\nFrom an idealist perspective, matter is a representation or image of mental processes. Supporters suggest\n\nthat this avoids the problems associated with the materialist view of mind as an emergent property of a\n\nphysical brain. [124] Critics argue that this then leads to a decombination problem: how is it possible to\n\nsplit a single, universal conscious experience into multiple, distinct conscious experiences? In response,\n\n[Bernardo Kastrup claims that nature hints at a mechanism for this in the condition dissociative identity](https://en.wikipedia.org/wiki/Dissociative_identity_disorder)\n\n[disorder (previously known as Multiple Personality Disorder).](https://en.wikipedia.org/wiki/Dissociative_identity_disorder) [125] Kastrup proposes dissociation as an\n\nexample from nature showing that multiple minds with their own individual subjective experience could\n\ndevelop within a single universal mind.", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia2.pdf" - }, - { - "text": "The philosophers Glenn Carruthers and Elizabeth Schier said in 2012 that the main arguments for the\n\n[existence of a hard problem—philosophical zombies, Mary's room, and Nagel's bats—are only persuasive](https://en.wikipedia.org/wiki/What_Is_it_Like_to_Be_a_Bat%3F)\n\nif one already assumes that \"consciousness must be independent of the structure and function of mental\n\n[states, i.e. that there is a hard problem.\" Hence, the arguments beg the question. The authors suggest that](https://en.wikipedia.org/wiki/Beg_the_question)\n\n\"instead of letting our conclusions on the thought experiments guide our theories of consciousness, we\n\nshould let our theories of consciousness guide our conclusions from the thought experiments.\" [64]\n\n[The philosopher Massimo Pigliucci argued in 2013 that the hard problem is misguided, resulting from a](https://en.wikipedia.org/wiki/Massimo_Pigliucci)\n\n\"category mistake\". [17] He said: \"Of course an explanation isn't the same as an experience, but that's\n\nbecause the two are completely independent categories, like colors and triangles. It is obvious that I\n\ncannot experience what it is like to be you, but I can potentially have a complete explanation of how and\n\nwhy it is possible to be you.\" [17]\n\n[In 2017, the philosopher Marco Stango, in a paper on John Dewey's approach to the problem of](https://en.wikipedia.org/wiki/John_Dewey)\n\nconsciousness (which preceded Chalmers' formulation of the hard problem by over half a century), noted\n\nthat Dewey's approach would see the hard problem as the consequence of an unjustified assumption that\n\nfeelings and functional behaviors are not the same physical process: \"For the Deweyan philosopher, the\n\n'hard problem' of consciousness is a 'conceptual fact' only in the sense that it is a *philosophical mistake* :\n\nthe mistake of failing to see that the physical can be had as an episode of immediate sentiency.\" [65]\n\n[The philosopher Thomas Metzinger likens the hard problem of consciousness to vitalism, a formerly](https://en.wikipedia.org/wiki/Vitalism)\n\nwidespread view in biology which was not so much solved as abandoned. [66] Brian Jonathan Garrett has\n\nalso argued that the hard problem suffers from flaws analogous to those of vitalism. [67]\n\n[The philosopher Peter Hacker argues that the hard problem is misguided in that it asks how consciousness](https://en.wikipedia.org/wiki/Peter_Hacker)\n\ncan emerge from matter, whereas in fact sentience emerges from the evolution of living organisms. [68] He\n\nstates: \"The hard problem isn’t a hard problem at all. The really hard problems are the problems the\n\nscientists are dealing with. [...] The philosophical problem, like all philosophical problems, is a confusion\n\nin the conceptual scheme.\" [68] Hacker's critique extends beyond Chalmers and the hard problem, being\n\ndirected against contemporary philosophy of mind and neuroscience more broadly. Along with the\n\n[neuroscientist Max Bennett, he has argued that most of contemporary neuroscience remains implicitly](https://en.wikipedia.org/wiki/Max_Bennett_(scientist))\n\n[dualistic in its conceptualizations and is predicated on the ](https://en.wikipedia.org/wiki/Dualism_(philosophy_of_mind)) *[mereological fallacy](https://en.wikipedia.org/wiki/Mereology)* of ascribing psychological\n\nconcepts to the brain that can properly be ascribed only to the person as a whole. [69] Hacker further states\n\nthat \"consciousness studies\", as it exists today, is \"literally a total waste of time\" and that \"the conception\n\nof consciousness which they have is incoherent\". [68]\n\n[Eliminative materialism or eliminativism is the view that many or all of the mental states used in folk](https://en.wikipedia.org/wiki/Folk_psychology)\n\n[psychology (i.e., common-sense ways of discussing the mind) do not, upon scientific examination,](https://en.wikipedia.org/wiki/Folk_psychology)", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[committed to physicalism. Unlike Type-A Materialists, however, Type-B Materialists ](https://en.wikipedia.org/wiki/Physicalism) *do* accept\n\ninconceivability arguments often cited in support of the hard problem, but with a key caveat: that\n\ninconceivability arguments give us insight only into how the human mind *tends to conceptualize* the\n\nrelationship between mind and matter, but not into what the true nature of this relationship actually\n\nis. [43][52] According to this view, there is a gap between two ways of knowing (introspection and\n\nneuroscience) that will not be resolved by understanding all the underlying neurobiology, but still believe\n\nthat consciousness and neurobiology are one and the same in reality. [43]\n\nWhile Type-B Materialists all agree that intuitions about the hard problem are psychological rather than\n\nontological in origin, they differ as to whether our intuitions about the hard problem are innate or\n\nculturally conditioned. This has been dubbed the \"hard-wired/soft-wired distinction.\" [88][89] In relation to\n\nType-B Materialism, those who believe that our intuitions about the hard problem are innate (and\n\ntherefore common to all humans) subscribe to the \"hard-wired view\". [89] Those that believe our intuitions\n\nare culturally conditioned subscribe to the \"soft-wired view\". Unless otherwise specified, the term *Type-B*\n\n*Materialism* refers to the hard-wired view. [89]\n\n[Notable philosophers who subscribe to Type-B Materialism include David Papineau,](https://en.wikipedia.org/wiki/David_Papineau) [90] [ Joseph](https://en.wikipedia.org/wiki/Joseph_Levine_(philosopher))\n\n[Levine,](https://en.wikipedia.org/wiki/Joseph_Levine_(philosopher)) [91] and Janet Levine. [55]\n\n[Joseph Levine (who formulated the notion of the explanatory gap) states: \"The explanatory gap argument](https://en.wikipedia.org/wiki/Explanatory_gap)\n\ndoesn't demonstrate a gap in nature, but a gap in our understanding of nature.\" [91] He nevertheless\n\ncontends that full scientific understanding will not close the gap, [43] and that analogous gaps do not exist\n\n[for other identities in nature, such as that between water and H](https://en.wikipedia.org/wiki/Identity_(philosophy)) 2 O. [92] [ The philosophers Ned Block and](https://en.wikipedia.org/wiki/Ned_Block)\n\n[Robert Stalnaker agree that facts about what a conscious experience is like to the one experiencing it](https://en.wikipedia.org/wiki/Robert_Stalnaker)\n\ncannot be deduced from knowing all the facts about the underlying physiology, but by contrast argue that\n\nsuch gaps of knowledge *are* also present in many other cases in nature, such as the distinction between\n\nwater and H 2 O. [93][12]\n\nTo explain why these two ways of knowing (i.e. third-person scientific observation and first-person\n\nintrospection) yield such different understandings of consciousness, weak reductionists often invoke the\n\n*phenomenal concepts strategy* [, which argues the difference stems from our inaccurate phenomenal](https://en.wikipedia.org/wiki/Phenomenal_consciousness)\n\nconcepts (i.e., how we think about consciousness), not from the nature of consciousness itself. [94][95] By\n\nthis view, the hard problem of consciousness stems from a dualism of concepts, not from a dualism of\n\nproperties or substances. [43]\n\nSome consciousness researchers have argued that the hard problem is a cultural artifact, unique to\n\ncontemporary Western Culture. This is similar to Type-B Materialism, but it makes the further claim that\n\nthe psychological facts that cause us to intuit the hard problem are not innate, but culturally conditioned.\n\n[Notable researchers who hold this view include Anna Wierzbicka,](https://en.wikipedia.org/wiki/Anna_Wierzbicka) [96] Hakwan Lau and Matthias\n\nMichel. [97]", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia2.pdf" - }, - { - "text": "philosophers \"were to use panhuman concepts expressed in crosstranslatable words\" (such as *know* , *think* ,\n\nor *feel* ) then the hard problem would dissolve. [96] David Chalmers has responded to these criticisms by\n\nsaying that he will not \"apologize for using technical terms in an academic article . . . they play a key role\n\nin efficient communication in every discipline, including Wierzbicka’s\". [89]\n\nType-C materialists acknowledge a distinction between knowledge and experience [98] without asserting a\n\nmore complete explanation for the experiential phenomenon. One taking this view would admit that there\n\n[is an explanatory gap for which no answer to date may be satisfactory, but trust that inevitably the gap](https://en.wikipedia.org/wiki/Explanatory_gap)\n\nwill be closed. [52] [ This is described by analogy to progression in other areas of science, such as mass-](https://en.wikipedia.org/wiki/Mass-energy_equivalence)\n\n[energy equivalence which would have been unfathomable in ancient times,](https://en.wikipedia.org/wiki/Mass-energy_equivalence) [52] [ abiogenesis which was](https://en.wikipedia.org/wiki/Abiogenesis)\n\nonce considered paradoxical from an evolutionary framework, [99][98] [ or a suspected future theory of](https://en.wikipedia.org/wiki/Theory_of_everything)\n\n[everything combining relativity and quantum mechanics. Similarly, type-C materialism posits that the](https://en.wikipedia.org/wiki/Theory_of_everything)\n\nproblem of consciousness is a consequence of our ignorance [71][100] but just as resolvable as any other\n\n[question in neuroscience.](https://en.wikipedia.org/wiki/Neuroscience)\n\nBecause the explanatory question of consciousness is evaded, type-C materialism does not\n\npresuppose [101] the descriptive question, for instance that there is any self-consciousness, wakefulness, or\n\neven sentience [102] in a rock. Principally, the basis for the argument arises from the apparently high\n\ncorrelation of consciousness with living brain tissue, [103] [ thereby rejecting panpsychism](https://en.wikipedia.org/wiki/Panpsychism) [101] without\n\nexplicitly formulating physical causation. More specifically this position denies the existence of\n\n[philosophical zombies](https://en.wikipedia.org/wiki/Philosophical_zombies) [64] for which there is an absence of data and no proposed method of\n\ntesting. [104][105] Whether via the inconceivability or actual nonexistence of zombies, a contradiction is\n\nexposed nullifying the premise of the consciousness problem's \"hardness\".\n\nType-C materialism is compatible with several cases and could collapse into one of these other\n\nmetaphysical views [52] depending on scientific discovery and its interpretation. With evidence of\n\n[emergence, it resolves to strong reductionism under type A. With a different, possibly cultural paradigm](https://en.wikipedia.org/wiki/Emergence)\n\nfor understanding consciousness, it resolves to type-B materialism. [32] If consciousness is explained by\n\n[the quantum mind, then it resolves to property dualism under type D.](https://en.wikipedia.org/wiki/Quantum_mind) [106] With characterization of\n\nintrinsic properties in physics extending beyond structure and dynamics, it could resolve to type-F\n\nmonism. [52]\n\n[Dualism views consciousness as either a non-physical substance separate from the brain or a non-physical](https://en.wikipedia.org/wiki/Substance_theory)\n\n[property of the physical brain.](https://en.wikipedia.org/wiki/Property_(philosophy)) [107] Dualism is the view that the mind is irreducible to the physical\n\nbody. [107] There are multiple dualist accounts of the causal relationship between the mental and the\n\nphysical, of which interactionism and epiphenomenalism are the most common today. Interactionism", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia2.pdf" - }, - { - "text": "The hard problem is often illustrated by\n\nappealing to the logical possibility of inverted\n\nvisible spectra. If there is no logical\n\ncontradiction in supposing that one's colour\n\nvision could be inverted, it follows that\n\nmechanistic explanations of visual processing\n\ndo not determine facts about what it is like to\n\nsee colours.\n\nA swarm of birds showing high\n\norder structure emerging from\n\nsimpler physical constituents\n\nphysical constituents. For example, water is nothing\n\nmore than H 2 O molecules, and understanding everything\n\nabout H 2 O molecules is to understand everything there is\n\nto know about water. But consciousness is not like this.\n\nKnowing everything there is to know about the brain, or\n\nany physical system, is not to know everything there is to\n\nknow about consciousness. Consciousness, then, must\n\nnot be purely physical. [27]\n\n[Chalmers's idea contradicts physicalism, sometimes](https://en.wikipedia.org/wiki/Physicalism)\n\n[labelled materialism. This is the view that everything that](https://en.wikipedia.org/wiki/Materialism)\n\nexists is a physical or material thing, so everything can\n\nbe reduced to microphysical things. For example, the\n\nrings of Saturn are a physical thing because they are\n\nnothing more than a complex arrangement of a large\n\nnumber of subatomic particles interacting in a certain way.\n\nAccording to physicalism, everything, including consciousness,\n\ncan be explained by appeal to its microphysical constituents.\n\nChalmers's *hard problem* [ presents a counterexample to this view](https://en.wikipedia.org/wiki/Counterexample)\n\nand to other phenomena like swarms of birds, since it suggests that\n\nconsciousness, like swarms of birds, cannot be reductively\n\nexplained by appealing to their physical constituents. Thus, if the\n\nhard problem is a real problem then physicalism must be false, and\n\nif physicalism is true then the hard problem must not be a real\n\nproblem.\n\n[Though Chalmers rejects physicalism, he is still a naturalist.](https://en.wikipedia.org/wiki/Naturalism_(philosophy)) [27]\n\nThe hard problem of consciousness has scholarly antecedents considerably earlier than Chalmers.\n\nChalmers himself notes that \"a number of thinkers in the recent and distant past\" have \"recognised the\n\nparticular difficulties of explaining consciousness.\" [33] He states that all his original 1996 paper\n\ncontributed to the discussion was \"a catchy name, a minor reformulation of philosophically familiar\n\npoints\". [33]\n\nAmong others, thinkers who have made arguments similar to Chalmers' formulation of the hard problem\n\n[include Isaac Newton,](https://en.wikipedia.org/wiki/Isaac_Newton) [34] [ John Locke,](https://en.wikipedia.org/wiki/John_Locke) [35] [ Gottfried Wilhelm Leibniz,](https://en.wikipedia.org/wiki/Gottfried_Wilhelm_Leibniz) [36][34] [ John Stuart Mill,](https://en.wikipedia.org/wiki/John_Stuart_Mill) [37] and\n\n[Thomas Henry Huxley.](https://en.wikipedia.org/wiki/Thomas_Henry_Huxley) [38][34] [ Likewise, Asian philosophers like Dharmakirti and Guifeng Zongmi](https://en.wikipedia.org/wiki/Guifeng_Zongmi)\n\ndiscussed the problem of how consciousness arises from unconscious matter. [34][39][40][41]\n\n##### **Implications for physicalism**\n\n#### **Historical precedents**\n\n#### **Related concepts**\n\n##### **The mind- body problem**", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia2.pdf" - }, - { - "text": "read as having the opposite view, since she argues that phenomenal properties (that is, properties of\n\n[consciousness) do not exist in our common-sense view of the world. She states that \"the hard problem of](https://en.wikipedia.org/wiki/Folk_psychology)\n\nconsciousness may not be a genuine problem for non-philosophers (despite its overwhelming obviousness\n\nto philosophers).\" [75]\n\n[A complete illusionist theory of consciousness must include the description of a mechanism by which the](https://en.wikipedia.org/wiki/Mechanism_(biology))\n\nillusion of subjective experience is had and reported by people. Various philosophers and scientists have\n\nproposed possible theories. [76] For example, in his book *Consciousness and the Social Brain*\n\n[neuroscientist Michael Graziano advocates what he calls attention schema theory, in which our perception](https://en.wikipedia.org/wiki/Attention_schema_theory)", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[Chalmers on stage for an Alan Turing Year](https://en.wikipedia.org/wiki/Alan_Turing_Year)\n\n[event at De La Salle University, Manila, 27](https://en.wikipedia.org/wiki/De_La_Salle_University)\n\nMarch 2012\n\n## **Hard problem of consciousness**\n\n[In the philosophy of mind, the ](https://en.wikipedia.org/wiki/Philosophy_of_mind) **hard problem of consciousness** is to explain why and how humans and\n\n[other organisms have qualia, phenomenal consciousness, or subjective experience.](https://en.wikipedia.org/wiki/Subjective_character_of_experience) [1][2] It is contrasted\n\nwith the \"easy problems\" of explaining why and how physical systems give a (healthy) human being the\n\nability to discriminate, to integrate information, and to perform behavioral functions such as watching,\n\nlistening, speaking (including generating an utterance that appears to refer to personal behaviour or\n\nbelief), and so forth. [1] The easy problems are amenable to functional explanation—that is, explanations\n\nthat are mechanistic or behavioral—since each physical system can be explained (at least in principle)\n\npurely by reference to the \"structure and dynamics\" that underpin the phenomenon. [1][3]\n\nProponents of the hard problem argue that it is categorically different from the easy problems since no\n\nmechanistic or behavioral explanation could explain the character of an experience, not even in principle.\n\nEven after all the relevant functional facts are explicated, they argue, there will still remain a further\n\nquestion: \"why is the performance of these functions accompanied by experience?\" [1] To bolster their\n\ncase, proponents of the hard problem frequently turn to various philosophical thought experiments,\n\n[involving philosophical zombies (which, they claim, are conceivable) or inverted qualia, or the claimed](https://en.wikipedia.org/wiki/Inverted_spectrum)\n\n[ineffability of colour experiences, or the claimed unknowability of foreign states of consciousness, such](https://en.wikipedia.org/wiki/Knowledge_Argument)\n\n[as the experience of being a bat.](https://en.wikipedia.org/wiki/What_is_it_like_to_be_a_bat%3F)\n\nThe terms \"hard problem\" and \"easy problems\" were\n\n[coined by the philosopher David Chalmers in a 1994 talk](https://en.wikipedia.org/wiki/David_Chalmers)\n\n[given at The Science of Consciousness conference held in](https://en.wikipedia.org/wiki/The_Science_of_Consciousness)\n\nTucson, Arizona. [4] The following year, the main talking\n\npoints of Chalmers' talk were published in *[The Journal of](https://en.wikipedia.org/wiki/The_Journal_of_Consciousness_Studies)*\n\n*[Consciousness ](https://en.wikipedia.org/wiki/The_Journal_of_Consciousness_Studies)* *Studies* . [1] The publication gained\n\nsignificant attention from consciousness researchers and\n\nbecame the subject of a special volume of the journal, [5][6]\n\nwhich was later published into a book. [7] In 1996,\n\nChalmers published *[The Conscious Mind](https://en.wikipedia.org/wiki/The_Conscious_Mind)* , a book-length\n\ntreatment of the hard problem, in which he elaborated on\n\n[his core arguments and responded to counterarguments. His](https://en.wikipedia.org/wiki/Counterarguments)\n\nuse of the word *easy* is \"tongue-in-cheek\". [8] As the\n\n[cognitive psychologist Steven Pinker puts it, they are about as easy as going to Mars or curing cancer.](https://en.wikipedia.org/wiki/Mars)\n\n\"That is, scientists more or less know what to look for, and with enough brainpower and funding, they\n\nwould probably crack it in this century.\" [9]\n\n[The existence of the hard problem is disputed. It has been accepted by some philosophers of mind such as](https://en.wikipedia.org/wiki/Philosophy_of_mind)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2648.pdf", - "query": "Concerning electrolyte solutions, what assumption makes the primitive model (PM) regarding ions?", - "target_page": 1, - "target_passage": "simple phenomenological models such as the primitive model (PM), for which the ions are assimi- lated to charged hard spheres", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "This discrepancy can easily be understood by comparing\n\nthe diameters found within the MSA2 calculation with\n\nthe effective potentials given in Fig. 1 . The anion/cation\n\ncontact distance obtained within the MSA2 calculation\n\nis 4 . 2 ˚ A, which is in the region of the second minimum of\n\nthe effective potential and corresponds to the situation\n\nwhere there is a single layer of water molecules between\n\nthe ions. The first minimum of the potential, which cor-\n\nresponds to the contact ion pair (CIP) is thus completely\n\nignored by the MSA2 calculation. If the MSA diameters\n\nare directly fitted to reproduce the MC osmotic pres-\n\nsure, much smaller values are obtained. These MSA-fit\n\nhydrated diameters, which are compared to the MSA2\n\ndiameters in the bottom part of Fig. 2 , are averages of\n\nthe CIP and the solvent-separated ion pair.\n\nTo overcome this difficulty, we have explicitly intro-\n\nduced the CIP in our model (species 3). Straightforward\n\ncalculations, based on a characteristic-function formal-\n\nism, allow us to define an equivalent model in which\n\nthe free ions and the CIP are explicitly taken into ac-\n\ncount [19, 20]. We apply this formalism by defining a\n\npair as an anion and a cation at a distance less than\n\n4 ˚ A, which corresponds to the position of the effective\n\npotential maximum. The interaction between free, like\n\ncharges in this new system remains unchanged, and the\n\ncation-anion interactions are easily approximated by ex-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" - }, - { - "text": "ing the temporal dynamics of belief changes in experimental participants. Dynamic belief\n\ntrajectories can then be related to other (for example, physiological) measures, as is usual\n\nin model-based neuroscience [ 65 ]. This method can also, in principle, be used for fitting\n\nmodels to other types of experimentally observable systems, like animals, organoids [ 66 ],\n\nand simulated or emergent systems [ 67 ]. The package can also be used for agent-based\n\nmodelling in general, for repeating earlier analyses with sampling based model-fitting\n\nand for comparing POMDP-based AIF models directly to other types of models.\n\nSince they implement full approximate Bayesian inferences, AIF models are compu-\n\ntationally more demanding than many approaches traditionally used in cognitive and\n\nagent-based modelling, in particular when the dimensionality of the generative model is\n\nlarge. This means that models with highly multidimensional or complex behaviour and\n\nlarge numbers of agents can be computationally infeasible to implement, especially given\n\nthe additional computational demands introduced by fitting these models to empirical\n\ndata. Avenues for addressing this implicit scaling problem were proposed in the context of\n\nmachine learning applications [ 68 , 69 ], and with the use of simplifying assumptions—the\n\nuse of which are ubiquitous in computational modelling—AIF has been used to model\n\nmulti-agent phenomena, such as opinion dynamics [ 15 , 70 ], coordinated foraging [ 71 ] and\n\nfish school movements [ 12 ]. It remains to be explored how AIF models can be applied to\n\nhighly complex natural phenomena, such as a concrete election, which underscores the\n\nneed for efficient but flexible and accessible software tools in the field.\n\nThere are many ways in which ActiveInference can be improved. It would be useful\n\nto extend the set of dynamic belief states to include prediction errors since they are often\n\nused for model-based neuroscience. This would entail departing from discrete state-space\n\n(i.e., POMDP) models to consider continuous state-space models apt for Bayesian filtering\n\nor predictive coding (see below). An alternative would be to generate prediction errors\n\nfrom belief updating under discrete models, where prediction errors can be read as the\n\n(KL) divergence between posterior and prior beliefs (i.e., complexity or information gain).\n\nA simple interface could be added for creating custom parametrisations of the requisite\n\nparameters that could be parametrised with Boltzmann or Gibbs distributions, as opposed\n\nto Dirichlet distributions. Parameter learning could be extended to all generative model\n\nparameters, as well as in parametrised forms (e.g., so that the Boltzmann parameter or\n\ntemperature of the parameters that are learned); similarly for the precision over expected\n\nfree energies *γ* . Preference priors should also be implementable for environmental states,\n\nin addition to observations, and **A** can be made action dependent.\n\nA library of pre-made canonical POMDP models could be created so that users can eas-\n\nily implement them directly. Alternatives to the fixed-point iteration method for updating\n\nposteriors over environmental states could be included, like the marginal message passing\n\nalgorithm. There are various ways in which the package can be made more computationally\n\nefficient, and it could be compared with other software implementations. There are plenty\n\nof utility and plotting functions that could be added to the package to make it easier to\n\nuse and to facilitate integration with the model-fitting packages it relies on; for example,\n\nto allow for combining the models with linear regressions to compare parameters values\n\nof different populations in a single model. More complex types of POMDP models can\n\nalso be added, like hierarchical and temporally deep POMDPs. Model structure learning\n\ncould be considered, where different model structures are compared and chosen between", - "page_start": 28, - "page_end": 28, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "*Modeling and controlling the body in maladaptive ways* 9\n\n### Discussion\n\nCurrent theories of predictive processing and active inference\n\nassume that, to steer adaptive perception and action, the brain\n\nforms internal generative models of the environment and of the\n\nbody within it. Various studies reveal that the brain has rich\n\nmodels of the body; for example, it integrates somatosensory\n\nand proprioceptive information into a coherent representation\n\nof things like body size and limb position—i.e. a “body schema.”\n\nMore recently, this model-based perspective has been extended to\n\ninteroception—and the rich sensations we constantly receive from\n\nthe internal body. Theories of interoceptive processing propose\n\nthat the brain continuously estimates key bodily and homeo-\n\nstatic variables, such as thirst or fatigue levels, perhaps forming\n\nsomething like an “interoceptive schema.”\n\nA key reason for forming bodily or interoceptive models is\n\nthat they permit us to exert accurate control over the variety of\n\nsignals (e.g. somatosensory and interoceptive) that the body pro-\n\nduces. Forming an accurate body schema is prominent for motor\n\ncontrol, whereas modeling interoceptive variables (e.g. thirst)\n\nis key to keeping them under control by engaging autonomic\n\nreflexes (e.g. vasodilation) and allostatic or goal-directed actions\n\n(e.g. drinking) when they have incorrect values. The generative\n\nmodeling perspective can also be extended hierarchically to con-\n\nsider richer models of multimodal experiences and “embodied\n\nself” that persists in time and anchors our experiences, permit-\n\nting us to select adaptive courses of action to achieve our favorite\n\ngoals.\n\nWhile it seems obvious that controlling bodily variables and\n\nachieving goals are crucial for survival, this perspective poses a\n\nfundamental challenge. In control theory and active inference,\n\n“controlling” the body ensures that the body generates the pre- ferred outcomes with high (hedonic or pragmatic) value, e.g. safe\n\nlevels for thirst and fatigue. This idea applies naturally to many\n\nof our activities that pursue some form of biologically adaptive\n\nfunction or well-being, such as ensuring that we keep our bodies\n\nhealthy and consume good food ( Sterling and Eyer 1988 , Sterling\n\n2012 ). However, it fails to explain why we engage in some activi-\n\nties that are apparently maladaptive and contradict our primary\n\nbiological imperative to ensure body health. Perhaps the most\n\npuzzling examples are pathological behaviors (e.g. non-suicidal\n\nself-harm or starvation), which are common across psychopatho-\n\nlogical conditions. In these cases, the control exerted over the\n\nbody and its sensations might serve the purpose of generating out-\n\ncomes with high (hedonic or pragmatic) values that nevertheless\n\nrun against our homeostatic and survival imperatives (e.g. pain\n\nand excessive levels of hunger).\n\nIn this article, we started with formal accounts of brain pro-\n\ncessing based on active inference to discuss the mechanisms and\n\nfunctional purpose of the (apparently) maladaptive ways to “con-\n\ntrol the body” that arise in these and other psychopathological\n\nbehaviors. We first discussed how we build models of the world,\n\nof our bodily and interoceptive processes, of our emotions, and\n\nof the embodied self, which provides a sense of understanding of\n\nreality and affords adaptive control at many levels, from the allo-\n\nstatic regulation of our physiological states to the achievement of\n\nour individual and social goals. Then, we discussed under which\n\nconditions we can become highly uncertain about our current\n\nstate and the future course of action. These conditions include\n\nboth contextual factors (e.g. periods of noteworthy changes or\n\nstress) and factors related to the person’s internal models (e.g.\n\npoor models in which precision parameters are incorrectly set).\n\nWe next turned to active inference and discussed how reduc-", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed1.pdf" - }, - { - "text": "r (Å)\n\n2\n\n4\n\n6\n\n8\n\n4 6 8\n\n0.5\n\n1\n\n1.5\n\n4 6 8\n\n| 0.5 mol.L -1 g 12 (r) | 1.5 mol.L -1 g 12 (r) |\n|:---|:---|\n| 1.5 mol.L -1 g 11 (r) | 1.5 mol.L -1 g 22 (r) |\n\nFIG. 5: (Color online) RDF obtained from MC simulations\n\n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed)\n\nat two concentrations.\n\nThe RDF obtained within BIMSA3 are compared with\n\nthe MC and MSA-fit results in Fig. 5 . Our BIMSA3\n\nmodel accounts for the strong molecular peak of the CIP\n\nand provides the correct distances of minimal approach;\n\nwhereas the naive MSA-fit procedure ignores the former\n\nand gives poor estimates for the latter. At larger sep-\n\narations, the BIMSA3 results do not reproduce the os-\n\ncillations observed in the MC simulations, but the cor-\n\nresponding energy oscillations in the effective potentials\n\nare less than k B T . In addition, the perturbation term\n\nof the BIMSA3 appears to be negligible compared to the\n\nreference term for concentrations less than 1 mol l 1 . The\n\nperturbation can then be omitted to obtain a fully ana-\n\nlytical theory, determined by the hard sphere diameters\n\nand the pair fraction given by LPT; with the free energy\n\nand the RDF given in terms of the BIMSA and MSA so-\n\nlutions, as described above. While the procedure we have\n\nfollowed uses two different approximations for the refer-\n\nence and perturbation terms (MSA vs BIMSA), these are\n\nknown to be accurate for the systems under consideration\n\nand do not appear to be inconsistent with each other.\n\nTo conclude, we have combined MD simulations with\n\nLPT to construct simple models of electrolyte solutions\n\nwhich account for the molecular nature of the solvent.\n\nThe final result is fully analytical and it yields the ther-\n\nmodynamic and structural properties of the solution, in\n\nagreement with the original molecular description. The\n\nmethodology can in principle be adapted to any molecu-\n\nlar description of the system (MD simulations involving\n\ninteraction potentials accounting for polarization effects\n\nor Car-Parrinello MD simulations for example) as long\n\nas the ion-ion RDF are known. It can also be generalized\n\nto study interfaces. The method appears to be a promis-\n\ning approach toward the description of the specific effects\n\nof ions, especially for complex systems whose modeling\n\nrequires an analytic solution.\n\nThe authors are particularly grateful to Werner Kunz\n\nfor fruitful discussions.\n\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13 ,\n\n276 (1945).\n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical\n\nChemistry of Electrolyte Solutions (Springer, 1998).\n\n[3] L. Blum, in Theoretical Chemistry: Advances and Per-\n\nspectives , edited by H. Eyring and D. Henderson (Aca-\n\ndemic Press, 1980), vol. 5, pp. 1- 66.\n\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79 , 569 (1995).\n\n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109 , 9873 (2005).\n\n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106 , 1259\n\n(2006).\n\n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin.\n\nColloid Interface Sci. 9 , 1 (2004).\n\n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett.\n\n96 , 147801 (2006).\n\n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130 , 134507\n\n(2009).\n\n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110 ,\n\n10878 (2006)\n\n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52 ,\n\n3730 (1995).\n\n[12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99 , 226104\n\n(2007).\n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev.\n\nLett. 100 , 258105 (2008).\n\n[14] S. Van Damme et al., J. Phys. Chem. B 113 , 3105 (2009).\n\n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq-\n\nuids (Academic Press, 1986).\n\n[16] J. C. Rasaiah and R. M. Lynden-Bell, Philos. Trans. R.\n\nSoc. London, Ser. A 359 , 1545 (2001).\n\n[17] A. P. Lyubartsev and S. Marcelja, Phys. Rev. E 65 ,\n\n041202 (2002).\n\n[18] V. M. M. Lobo, Electrolyte Solutions, Data on Thermo-\n\ndynamic and Transport Properties , vol. I-II (Coimbra Ed-\n\nitora, Lisbon, Portugal, 1984).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2648.pdf" - }, - { - "text": "processesing business. And, I get excited about\n\nthe opportunity to expand our transaction base with\n\nour mobile banking, bill payment and mobile operator\n\nsolutions.\n\nThe real value of our company is in our transaction\n\nprocessing. Because of the low incremental cost of\n\nconnecting to a new customer, anytime we sign a new\n\ncontract most of the incremental revenue will now be\n\nflowing to our bottom line. The infrastructure is in place\n\nto leverage additional growth and bring us closer to\n\nbeing EBITDA and cash flow positive in the near term.\n\n**What role will strategic alliances play in extending**\n\n**your reach into new markets?**\n\nAlliances are an important part of our strategic direc-\n\ntion. Recently, we announced several partnerships that\n\nhelp us expand sales channels and distribution of our\n\nproducts and services. Our partners were looking for\n\nwireless transaction solutions to complement their own\n\nofferings, and they selected Euronet’s products, proving\n\nthat our solutions are rock solid.\n\nGemplus, the world’s number one provider of smart\n\ncard-based solutions, chose us as their global partner to\n\nprovide electronic recharge solutions to mobile opera-\n\ntors. We also have agreements with Sila Communications\n\nto help us market our suite of mobile banking solutions\n\nthroughout Europe, the Middle East and Asia Pacific\n\nand with Aether Systems which is offering our mobile\n\nbanking solutions in the United States.\n\n**Why did you change your corporate name to Euronet**\n\n**Worldwide last year?**\n\nWe became Euronet Worldwide to more\n\naccurately reflect the company’s grow-\n\ning presence in the global marketplace.\n\nWe are no longer focused solely on\n\nEurope, and today, deliver comprehen-\n\nsive solutions to more than 200\n\ncustomers in over 60 countries.\n\n**What was your biggest**\n\n**challenge in 2000?**\n\nI think it was restructuring our software business late in\n\nthe year. When Euronet purchased Arkansas Systems,\n\nInc. over two years ago, the division was expected to\n\n## **4**\n\nachieve high growth. As banks began moving to out-\n\nsourcing rather than purchasing software to manage\n\ntheir transactions, we realized that this high growth\n\nwould not materialize. We’ve basically downsized to\n\nreduce expenses to better correspond to revenue expec-\n\ntations, so we\n\nexpect this division\n\nto be an EBITDA\n\ncontributor from\n\nthis point forward.\n\nThe trend towards\n\noutsourcing nega-\n\ntively impacted our\n\nsoftware business,\n\nbut positively ben-\n\nefits our network\n\nservices division.\n\nIt’s important to\n\npoint out that our\n\nsoftware is an asset\n\nto our business of\n\nselling transactions. For example, our software\n\nsales doubled in the Asia Pacific region over 1999.\n\nRelationships with large financial institutions like\n\nWestpac Banking Corporation have cemented our\n\nposition in Asia Pacific as a leading supplier of\n\ntransaction processing solutions.\n\n**Why is ATM outsourcing important?**\n\nIncreasingly, financial institutions are choosing to\n\noutsource their ATM operations to free up resources\n\nand concentrate on their core banking\n\nbusiness. Some analysts predict that\n\noutsourcing by the European banking\n\nand finance sector will total $91 bil-\n\nlion by 2003. We are expanding our\n\noutsourcing business with wireless\n\nand Internet banking services.\n\nOur outsourcing business is thriving.\n\nCurrently we provide ATM outsourc-\n\ning for some of the biggest banks in\n\nthe world - banks like Citibank, ABN\n\nAMRO, Deutsche Bank, Millennium\n\nand Raiffeisenbank - as they expand into emerging\n\nmarkets. We have contracts with Citibank in five coun-\n\ntries, most recently in Greece and the Czech Republic.\n\n**USA**\n\n**31%**\n\n**Central Europe**\n\n**25%**\n\n**Central & South America**\n\n**16%**\n\n**Asia**\n\n**12%**\n\n**M. East & Africa**\n\n**9%**\n\n**W.**\n\n**Europe**\n\n**7%**\n\n**Customers by Region**", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**Figure 5. A** learning for the actual reward condition (reward condition left). The agent correctly\n\nlearned the probability of receiving rewards in the rewarding arm. It did not learn the probabilities of\n\nthe non-rewarding arm since it did not explore that option. The color grading signifies the likelihood\n\nof an observation being generated by a specific state. The more saturated the color, the higher\n\nthe likelihood.\n\n### *4.3. Fitting the Model to the Data*\n\nSimulations are useful for a variety of purposes, like exploring the consequences of\n\ndifferent priors and parameters and establishing the face validity of hypothetical mech-\n\nanisms underlying behavioural phenomena. However, we often want to use models to\n\nmake inferences about specific observed phenomena, like the differences in behaviour\n\nbetween various populations, as in computational psychiatry [ 14 ]. One standard method\n\nhere is model fitting, where we estimate the parameter values (e.g., prior beliefs) of an AIF\n\nmodel that are the most likely given some observed behaviour of a participant. This is often\n\nperformed with approximate Bayesian methods. In the cognitive and behavioural sciences,\n\nthe predominant method is Markov Chain Monte Carlo (MCMC) methods [ 34 ], which are\n\nslower but in the limit can estimate parameter posteriors without making assumptions\n\nabout their functional form. An alternative, which is more often used in other fields and\n\nalso available in ActiveInference is variational methods, which are faster but require mak-\n\ning assumptions about the functional form of the posterior. In general, MCMC methods\n\nare favourable when making parameter inferences (i.e., comparing parameters of the same\n\nmodel fitted to different data, like two groups of subjects). When performing a Bayesian\n\nmodel comparison (i.e., comparing different models fitted to the same data), the different\n\napproaches rely on different approximations of the model evidence, with the variational", - "page_start": 23, - "page_end": 23, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "2 of 33\n\nminimisation [ 9 ]. Choosing actions that minimise the expected free energy ( *EFE* ) of their\n\nconsequences provides a natural balance between exploratory and exploitative behaviour;\n\ngeneralises descriptive approaches to behavioural modelling, like reinforcement learning\n\nand expected utility maximisation; and provides a singular approach to adaptive behaviour\n\nthat can be used across different environments. AIF was argued to be applicable to any self-\n\norganising system that actively maintains a stable boundary that defines its integrity [ 10 ],\n\na broad category that includes cells and plants [ 11 ], as well as humans [ 2 ] and even\n\ncollectives [ 12 ]. Owing to its generality, AIF has seen a rise in popularity across multiple\n\nfields. It is used for theoretical simulations of the mechanisms underlying various types of\n\nbehaviour [ 2 ], computational phenotyping in computational psychiatry [ 13 , 14 ], and agent-\n\nbased simulations of population dynamics [ 15 ], as well as in engineering and robotics [ 16 ].\n\nIn AIF, perception and concurrent action are based on performing a variational Bayesian\n\ninversion of a generative model of the environment (i.e., a model of how the environment\n\nchanges and brings about sensory observations). This belief updating includes inferring\n\n(hidden) states of the environment, learning parameters of the generative model and\n\nlearning the structure of the generative model. Since the requisite inference schemes come\n\npre-specified, the main task in AIF modelling becomes specifying an appropriate generative\n\nmodel. This includes specifying priors over environmental states, as well as what might\n\nbe called *prior preferences* , *preference priors* or *goal priors* : immutable prior expectations that\n\nmake up an agents’ preferences by furnishing a set of predictions over future states or\n\nobservations; in fulfilling these predictions, free energy is minimised. The space of possible\n\ngenerative models is vast, and they often have to be handcrafted for a given environment.\n\nHowever, there are some families of generative models that can be considered “universal”\n\nin the sense that they can be used for most environments. Currently, the most popular of\n\nthese is the discrete state-space Partially Observable Markov Decision Process (POMDP)-\n\nbased generative models. Since they are ubiquitous in the literature, we focus here on\n\nmaking these types of generative models available to researchers. There are, however, other\n\ntypes of universal generative models, like generalised filtering models [ 17 ] or Hierarchical\n\nGaussian Filtering-based models [ 18 , 19 ], that will be implemented in the future.\n\nTools for simulating POMDP-AIF models were originally developed as part of the\n\nDEM [ 20 ] library for M ATLAB [ 21 ] (part of the larger SPM library [ 22 ]). Since then, a\n\nmodal and flexible software package pymdp [ 23 ] was created for Python [ 24 ], as well as a\n\nperformance-oriented package cpp-AIF [ 25 ] for C++ [ 26 ] that can be used across platforms.\n\nFinally, the factor graph library RxInfer [ 27 ] for Julia [ 28 ] has also been used to implement\n\nsome AIF models on an efficient factor graph back-end [ 29 - 31 ]. The important tools\n\nthat these packages provide make AIF available for researchers to perform simulation\n\nstudies and for use in engineering contexts. They do not, however, usually allow for\n\nfitting models to empirically observed data, which is a fundamental method used in\n\ncognitive modelling [ 32 ], often in the context of computational psychiatry [ 13 ], to infer the\n\nmechanisms underlying variations in behaviour or to investigate the differences between\n\n(for example, clinical) populations. Smith and colleagues [ 33 ] provided a guide for manually\n\ndoing variational Bayesian parameter estimation based on empirical data, but only in\n\nM ATLAB and restricted to a particular class of variational parameter estimation methods", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "� � # Initialize model for single subject\n\nsingle_subject_model = create_model(\n\nagent, # ActionModels agent object\n\npriors, # Dictionary with parameter priors\n\nobservations, # Vector of observations\n\nactions, # Vector of actions\n\n) � � If we have multiple subjects whose parameters we wish to estimate, we can achieve this\n\nby passing a dataframe object to the same function. Here, we specify which columns are\n\nactions and inputs, as well as which column to use for grouping the specific time series: � � # Initialize model for multiple subjects\n\nmultiple_subjects_model = create_model(\n\nagent, # ActionModels agent\n\npriors, # Dictionary with parameter priors\n\ndata; # Dataframe with data from multiple subjects\n\ngrouping_cols = [ \"ID\" ], # Column to split dataframe\n\ninput_cols = [ \"observations\" ], # Columns with observations\n\naction_cols = [ \"actions\" ], # Columns with actions\n\n) � � This model can be used as a normal Turing model object. ActionModels provides a conve-\n\nnience function for doing this with appropriate defaults: � � results = fit_model(\n\nsingle_subject_model; # Model object\n\nn_iterations = 1000 , # Number of iterations\n\nn_chains = 1 # Number of chains\n\n) � � The output of the fit_model function is an object containing the standard Turing chains,\n\nwhich we can use to access the chain statistics: � � # Extract the Chains object\n\nchains = results.chains\n\n#Rename the chains for interpretable parameter names\n\nrename_chains(chains, model) � � ActionModels provides a range of convenience functions for behavioural modelling. We can\n\nextract the posterior parameter estimates for each participant, and extract it in a convenient\n\ndata frame structure for later processing: � � # Extract quantities from the chain\n\nagent_parameters = extract_quantities(single_subject_model, chains)\n\n# Get posterior median\n\nestimates = get_estimates(agent_parameters) � � We can also sample parameter values from the prior and plot the posteriors against the priors: � � #Sample from the prior\n\nprior_chains = sample(single_subject_model, Prior(), 1000 )\n\n# Plot parameter distribution.\n\nplot_parameter_distribution(chains, prior_chains) � � See the documentation for ActionModels at [ github.com/ilabcode/ActionModels.jl](https://github.com/ilabcode/ActionModels.jl) for vari-\n\nous other functionalities, including modelling how parameters vary across a population ,", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "where *γ* is the liquid-gas surface tension and *f* ( *h* ) is a local free energy term that describes the\n\nwettability of the surface. Since *µ* corresponds to a chemical potential, the term *µh* may either bias\n\nthe system towards the liquid or towards the gas state. The variation of *F* w.r.t. *h* gives the pressure.\n\nIt contains the curvature (Laplace) pressure *−* *γ* ∆ *h* and the disjoining pressure Π( *h* ) = *−* *∂* *h* *f* ( *h* ) .\n\nMany different forms for the latter are in use (see, e.g., Refs. [4, 8, 63, 70- 73]).\n\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanopar-\n\nticles are not taken into account. However, under certain conditions one can augment equation (1)\n\nfor the evolution of the film thickness by coupling it to an equation for the evolution of the mean\n\nparticle concentration. The resulting model is able to describe the behaviour of an evaporating so-\n\nlution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C.\n\nWe should expect such a model to describe the mesoscopic dewetting front discussed above. How-\n\never, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor\n\nfilm.\n\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a dis-\n\ncrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on\n\nevaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The va-\n\nlidity of this strong assumption regarding the relevant transport processes can be confirmed from\n\nan estimate based on Eq. (1): The pressure *p* = *δF/δh* drives convection and evaporation. The\n\nconvective mobility is proportional to *h* 3 , i.e., it is large for thick films but decreases strongly with\n\nreduced film thickness. The evaporative mobility, however, is a constant, implying that evapora-\n\ntion will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57]\n\nand a small contact angle ( *≈* 0 *.* 01 ), the cross-over thickness is in the range of 1-5 nanometers. This estimate justifies the neglect of convective transport in a description of the postcursor film\n\nand may explain why one has such good agreement between the experimentally observed patterns\n\nand the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model\n\n[35]. We introduce the KMC model below in Section III A.\n\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its po-\n\ntential applications. For instance, the thermodynamic chemical potential as well as any wetting\n\ninteraction of the solvent with the substrate are collected in a single parameter - an effective chem-\n\nical potential. This implies that any influence of a disjoining pressure is ‘smeared out’ over the\n\nwhole system and that no distinction between the short- and the long-range parts of the disjoining\n\npressure is possible. It is furthermore based on the assumption that evaporation/condensation is\n\n8", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" - }, - { - "text": "8 Barca *et* *al.*\n\nprior is very high, the posterior will closely reflect the prior, ren-\n\ndering the inference rigid and incapable of adapting to changing\n\nenvironmental conditions—which might be especially problem-\n\natic in periods of significant changes, such as adolescence or more\n\nsimply when one changes city, working environment, and friends. Furthermore, as shown in Fig. 1 , hierarchical predictive coding\n\narchitectures have precision values associated with every hierar- chical level (whereas, for simplicity, the inference shown in Fig. 2\n\nis not hierarchical). The correct balance of precision parameters\n\nwithin and across layers is crucial for accurate inference, as it\n\nensures that the correct levels of confidence are assigned to data\n\nand prior information.\n\nFinally, and importantly, aberrant precision control (as well\n\nas various combinations of other factors discussed earlier, such\n\nas noisy bodily sensations and poor bodily mode) can render\n\ninference not just incorrect but also highly ambiguous, leaving a\n\nperson in a permanent condition of uncertainty about whether\n\none is fatigued (when considering the bodily state), happy, or sad\n\n(when considering the emotional state), what kind of person one\n\nis or what are one’s desires (when considering self-models), etc.\n\nImportantly, this condition of uncertainty is not limited to percep-\n\ntual inference but has a cascade effect on decision-making and\n\naction selection. Indeed, an uncertain estimate of one’s state auto-\n\nmatically implies that one has low confidence in the effects of\n\none’s plans; for example, it renders more difficult the prediction\n\nof whether a run would be too fatiguing or a party too stressful.\n\nIt is exactly this kind of uncertainty (about the present and the\n\nfuture, the body state or the outcomes of social interactions, etc.)\n\nthat active inference agents strive to avoid.\n\n#### **Avoiding excessive uncertainty in maladaptive ways**\n\nOur previous discussion clarified that active inference agents have\n\nsophisticated (hierarchically deep, temporally extended) models\n\nof themselves that permit making inferences at multiple levels\n\nabout hidden bodily states (which comprise both the classical\n\n“body schema” and other states that are relevant for allostasis,\n\nsuch as hunger, thirst, and fatigue) and other states related to\n\nthe emotional and embodied self. These models are essential for\n\nensuring effective regulation and control at multiple levels, from\n\nsimple reflexes to sophisticated goal-directed behaviors ( Tschantz et al. 2022 ). However, in some cases, the aforementioned inferen-\n\ntial process might not work properly (e.g. if the sensory channels\n\nare too noisy or are assigned excessively high or low precision).\n\nAs a consequence, a person could experience an excessive or\n\nirreducible uncertainty about her bodily and emotional states or\n\nabout the self, which in turn translates into a loss of confidence\n\nabout which future courses of action could produce desired out-\n\ncomes. Crucially, active inference agents follow the imperative\n\nto avoid such an uncertainty about the present or the future.\n\nNormally, uncertainty minimization strategies are adaptive (e.g.\n\nseeking advice if one is uncertain about the direction of the pre-\n\nferred restaurant). However, in some conditions, such as when\n\na person experiences excessive and irreducible uncertainty and\n\nwhen the uncertainty is particularly distressing or related to fun-\n\ndamental life concerns, she might potentially seek “maladaptive”\n\nways to reduce it—or methods that reduce uncertainty at the cost\n\nof hindering fundamental imperatives of well-being and survival\n\n(see also Linson et al. 2020 ).\n\nIn this perspective, apparently paradoxical actions, such as\n\nfood restriction and self-injurious behaviors, might be pursued\n\nbecause they could contribute to reducing the (otherwise unman-\n\nageable) uncertainty about bodily and emotional states or the self.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed1.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2648.pdf", - "query": "What is the principle of the liquid perturbation theory (LPT) ?", - "target_page": 2, - "target_passage": "The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the differ- ence between them treated as a perturbation in the ref- erence potential", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion\n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid-\n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ-\n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport\n\nregime where the instability is almost completely independent of the interaction strengths and\n\na demixing regime where particles and liquid demix at the receding front thereby increasing its\n\ntransverse instability.\n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of\n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional\n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo-\n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by\n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend\n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between\n\nshort- and long-range interactions of solvent and/or solute with the substrate. We have, however,\n\nrestricted the examples given here to situations that can also be described using the KMC model.\n\nA further exploration will be presented elsewhere.\n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It\n\nresults from a long-wave approximation and consists of coupled evolution equations for the film\n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning\n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee-\n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the\n\ncombined effects of convection and evaporation.\n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques\n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica-\n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly\n\ntowards increasingly complex systems. For example, there have been investigations of the influ-\n\nence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal\n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap-\n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of\n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102],\n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding\n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather\n\n24", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "on the model (see above). The purely two-dimensional character of the KMC was extended to\n\na ‘pseudo three-dimensional’ one by making the effective chemical potential dependent on the\n\nmean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to\n\nthe introduction of a ‘global’ thickness-dependent disjoining pressure into the evaporation term\n\nwithout an explicit consideration of a film thickness. The amended model can reproduce bimodal\n\nstructures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully three-\n\ndimensional models are also discussed in the literature [76, 77].\n\n### **B. Dynamical Density Functional theory**\n\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related\n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle.\n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid,\n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to\n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the\n\nsubstrate, as all such interactions are absorbed into the effective chemical potential.\n\nHowever, using dynamical density functional theory (DDFT) [78- 83] one can develop a model\n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit\n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to\n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes\n\nthe coupled dynamics of the density fields of the liquid *ρ* *l* and the nanoparticles *ρ* *n* . The densities\n\n*ρ* *l* and *ρ* *n* are defined as the probabilities of finding a given lattice site on the surface to be occupied\n\nby a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond\n\nto number densities as we use the lattice spacing *σ* = 1 as our unit of length.\n\nTo develop the DDFT, one must first derive the underlying free energy functional *F* [ *ρ* *l* *, ρ* *n* ] , and\n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the\n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively.\n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams)\n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution\n\nand contributions from the interactions between the different species (nanoparticles and liquid).\n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is\n\ncoupled to a reservoir with chemical potential *µ* ), whereas the nanoparticles are treated in the\n\n14", - "page_start": 13, - "page_end": 13, - "source_file": "1001.2669.pdf" - }, - { - "text": "where *γ* is the liquid-gas surface tension and *f* ( *h* ) is a local free energy term that describes the\n\nwettability of the surface. Since *µ* corresponds to a chemical potential, the term *µh* may either bias\n\nthe system towards the liquid or towards the gas state. The variation of *F* w.r.t. *h* gives the pressure.\n\nIt contains the curvature (Laplace) pressure *−* *γ* ∆ *h* and the disjoining pressure Π( *h* ) = *−* *∂* *h* *f* ( *h* ) .\n\nMany different forms for the latter are in use (see, e.g., Refs. [4, 8, 63, 70- 73]).\n\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanopar-\n\nticles are not taken into account. However, under certain conditions one can augment equation (1)\n\nfor the evolution of the film thickness by coupling it to an equation for the evolution of the mean\n\nparticle concentration. The resulting model is able to describe the behaviour of an evaporating so-\n\nlution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C.\n\nWe should expect such a model to describe the mesoscopic dewetting front discussed above. How-\n\never, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor\n\nfilm.\n\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a dis-\n\ncrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on\n\nevaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The va-\n\nlidity of this strong assumption regarding the relevant transport processes can be confirmed from\n\nan estimate based on Eq. (1): The pressure *p* = *δF/δh* drives convection and evaporation. The\n\nconvective mobility is proportional to *h* 3 , i.e., it is large for thick films but decreases strongly with\n\nreduced film thickness. The evaporative mobility, however, is a constant, implying that evapora-\n\ntion will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57]\n\nand a small contact angle ( *≈* 0 *.* 01 ), the cross-over thickness is in the range of 1-5 nanometers. This estimate justifies the neglect of convective transport in a description of the postcursor film\n\nand may explain why one has such good agreement between the experimentally observed patterns\n\nand the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model\n\n[35]. We introduce the KMC model below in Section III A.\n\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its po-\n\ntential applications. For instance, the thermodynamic chemical potential as well as any wetting\n\ninteraction of the solvent with the substrate are collected in a single parameter - an effective chem-\n\nical potential. This implies that any influence of a disjoining pressure is ‘smeared out’ over the\n\nwhole system and that no distinction between the short- and the long-range parts of the disjoining\n\npressure is possible. It is furthermore based on the assumption that evaporation/condensation is\n\n8", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" - }, - { - "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle\n\ndeposits. The concentration of particles is much higher at the network nodes - an effect that can\n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid\n\non the substrate where the nanoparticles are.\n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front.\n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be\n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7\n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger\n\nnumber remains constant, although new branches are continuously created and old branches join\n\neach other. In general, the results on fingering agree well with results obtained using the KMC\n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor\n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion\n\nconstant that is independent of the nanoparticle concentration. The DDFT is better suited than the\n\nKMC for investigations of the early instability stages: they are more easy to discern without the\n\ndiscrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of\n\nthe one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations\n\n(in analogy to the approach used in Refs. [19, 86, 87]).\n\n### **C. Thin film hydrodynamics**\n\nThe previous two sections focused on two approaches to describe the experimentally observed\n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet-\n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional\n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to\n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the\n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach\n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do\n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface-\n\nactive particles resulting in thermal and solutal Marangoni stresses, see Ref. [88]. A description of\n\nspreading particle solutions incorporating a structural disjoining pressure has also been considered\n\n[89]. For related work on particle-laden film flow on an incline see Refs. [90, 91].\n\nOne starts from the Stokes equations, together with continuity, no-slip boundary conditions at the\n\n18", - "page_start": 17, - "page_end": 17, - "source_file": "1001.2669.pdf" - }, - { - "text": "also shift the spinodal and binodal lines as compared to the locations of these lines in the phase\n\ndiagram for the pure solvent [41]. As a consequence, the solute concentration influences the hole\n\nnucleation rate. More importantly, the solute particles may also destabilise the dewetting fronts.\n\nAs a result, one may find strongly ramified structures in all three systems [23, 25, 40, 42]. A\n\nselection of images exhibiting some of the possible structures is displayed in Fig.1.\n\nFor volatile solvents, the contact lines retract even for wetting fluids. It has been found that such\n\nevaporatively receding contact lines may deposit very regular line or ring patterns parallel to the\n\nmoving contact line [24, 43]. The deposition of a single ring of colloids from a evaporating\n\ndrop of colloidal suspension is well known as the ‘coffee stain effect’ [44]. Detailed investiga-\n\ntions reveal the emergence of rich structures including multiple irregular rings, networks, regular\n\ndroplet patterns, sawtooth patterns, Sierpinski carpets, and - in the case of DNA - liquid crys-\n\ntalline structures [22, 30, 45- 49]. The deposition of regularly spaced straight lines orthogonal to\n\nthe moving contact line has also been reported [50]. Droplet patterns may as well be created em-\n\nploying solvent-induced dewetting of glassy polymer layers below the glass transition temperature\n\n[51- 53].\n\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and\n\ntheoretically [55- 58]. In this case, different contact line instabilities have been observed for evap-\n\norating liquid drops [59, 60].\n\nIn the present article we review and preview the experiments and in particular the various mod-\n\nelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting sol-\n\nvents. After reviewing the basic experimental results in Section II, we discuss in Section III sev-\n\neral theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A,\n\na dynamic density functional theory in Section III B, and a thin film evolution equation in Sec-\n\ntion III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the\n\nindividual approaches and future challenges to all of them.\n\n## **II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS**\n\nWe focus on experiments that use monodisperse colloidal suspensions of thiol-passivated gold\n\nnanoparticles in toluene [33, 34, 37- 40, 61]. The gold core of 2 - 3 nm diameter is coated by a layer\n\nof alkyl-thiol molecules. The length of the carbon backbone of the thiol used in the experiments\n\nranges from 6 to 12 carbon atoms ( *C* 6 to *C* 12 ) [40]. By varying the chain length, one can control\n\n4", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" - }, - { - "text": "[65] J. P. Burelbach, S. G. Bankoff, and S. H. Davis, “Nonlinear stability of evaporating/condensing liquid\n\nfilms,” J. Fluid Mech. **195** , 463- 494 (1988).\n\n[66] A. Oron and S. G. Bankoff, “Dewetting of a heated surface by an evaporating liquid film under\n\nconjoining/disjoining pressures,” J. Colloid Interface Sci. **218** , 152- 166 (1999).\n\n[67] L. W. Schwartz, R. V. Roy, R. R. Eley, and S. Petrash, “Dewetting patterns in a drying liquid film,”\n\nJ. Colloid Interface Sci. **214** , 363- 374 (2001).\n\n[68] K. Kargupta, R. Konnur, and A. Sharma, “Spontaneous dewetting and ordered patterns in evaporating\n\nthin liquid films on homogeneous and heterogeneous substrates,” Langmuir **17** , 1294- 1305 (2001).\n\n[69] M. Bestehorn and D. Merkt, “Regular surface patterns on Rayleigh-Taylor unstable evaporating films\n\nheated from below,” Phys. Rev. Lett. **97** , 127802 (2006).\n\n[70] G. F. Teletzke, H. T. Davis, and L. E. Scriven, “Wetting hydrodynamics,” Rev. Phys. Appl. **23** , 989-\n\n1007 (1988).\n\n[71] J. N. Israelachvili, *Intermolecular and Surface Forces* , Academic Press, London (1992).\n\n[72] V. S. Mitlin, “Dewetting of solid surface: Analogy with spinodal decomposition,” J. Colloid Interface\n\nSci. **156** , 491- 497 (1993).\n\n[73] L. M. Pismen and Y. Pomeau, “Disjoining potential and spreading of thin liquid layers in the diffuse\n\ninterface model coupled to hydrodynamics,” Phys. Rev. E **62** , 2480- 2492 (2000).\n\n[74] L. Onsager, “Crystal statistics. I. A two-dimensional model with an order-disorder transition,” Phys.\n\nRev. **65** , 117- 149 (1944).\n\n[75] G. Reiter, “Unstable thin polymer films: Rupture and dewetting processes,” Langmuir **9** , 1344- 1351\n\n(1993).\n\n[76] C. G. Sztrum, O. Hod, and E. Rabani, “Self-assembly of nanoparticles in three-dimensions: Forma-\n\ntion of stalagmites,” J. Phys. Chem. B **109** , 6741- 6747 (2005).\n\n[77] G. Yosef and E. Rabani, “Self-assembly of nanoparticles into rings: A lattice-gas model,” J. Phys.\n\nChem. B **110** , 20965- 20972 (2006).\n\n[78] J. F. Gouyet, M. Plapp, W. Dieterich, and P. Maass, “Description of far-from-equilibrium processes\n\nby mean-field lattice gas models,” Adv. Phys. **52** , 523- 638 (2003).\n\n[79] U. M. B. Marconi and P. Tarazona, “Dynamic density functional theory of fluids,” J. Chem. Phys.\n\n**110** , 8032- 8044 (1999).\n\n[80] U. M. B. Marconi and P. Tarazona, “Dynamic density functional theory of fluids,” J. Phys.-Condes.\n\nMatter **12** , A413- A418 (2000).\n\n30", - "page_start": 29, - "page_end": 29, - "source_file": "1001.2669.pdf" - }, - { - "text": "time scales for evaporation and diffusion. A large mobility *M* indicates fast diffusion as compared\n\nto evaporation. A trial move is accepted with the probability *p* acc = min[1 *,* exp( *−* ∆ *E/kT* )] where *k* is the Boltzmann constant, *T* the temperature and ∆ *E* is the change in energy resulting from the\n\npotential move. Note that particles are only allowed to move into wet areas of the substrate, i.e.,\n\nonto cells with *l* = 1 . This models zero diffusivity of the particles on a dry substrate. The replaced\n\nliquid fills the site left by the nanoparticle.\n\nWithout nanoparticles, the behaviour of the model is well known as it reduces to the classical\n\ntwo-dimensional Ising model [74]. For *kT < kT* *c* *≈* 0 *.* 567 liquid and vapour coexist when *µ* =\n\n*µ* coex = *−* 2 . For *µ >* *−* 2 [ *µ <* *−* 2 ] eventually the liquid [vapour] dominates. A straight liquid- gas interface will recede [advance] for *µ <* *−* 2 [ *µ >* *−* 2 ], i.e. one finds evaporative dewetting [wetting] fronts. If one starts, however, with a substrate covered homogeneously by the liquid,\n\nfor *µ <* *−* 2 the film will dewet via a nucleation or spinodal-like process. If the nanoparticles are present, they form dried-in structures when all the liquid evaporates. The final structures do not\n\nnormally change any further - at least on short time scales. However, if the liquid wets the particles\n\n(i.e. is attracted to the particles), over long times there might be a coarsening of the structures,\n\nfacilitated by the adsorbed liquid. The dried-in patterns depend on the particular pathway taken by\n\nthe evaporative dewetting process. They range from labyrinthine to polygonal network structures\n\nor holes in a dense particle layer. Some typical patterns are displayed in Fig. 2, for cases when\n\nthe average surface coverage of the nanoparticles *ρ* *av* *n* = 0 *.* 2 . Panels (a) and (b) result from a\n\nspinodal-like and nucleation and growth process, respectively. At first sight they look very similar\n\nto the patterns seen for the pure solvent and one might argue that the particles solely act as passive\n\ntracers and preserve the transient volatile dewetting structures of the solvent. This was suggested\n\nin Refs. [26- 28] for dewetting collagen solutions. However, panels (c) and (d) indicate that the\n\nparticles may at times play a rather more significant role. When the diffusion of the particles is\n\nslow, the evaporative dewetting fronts become transversely unstable and may result in strongly\n\nramified patterns. This instability is caused by the nanoparticles. The lower their mobility, the\n\nstronger the fingering effect, i.e., there are more fingers in (c) than in (d) because in the latter the\n\nmobility is larger.\n\nThe front instability is intriguing as it results in strongly branched structures. As the dewetting\n\nfront moves, new branches are continuously created and existing branches merge at the moving\n\ncontact line. However, the mean finger number in the streamwise direction of the resulting ramified\n\npattern is a constant. This behaviour is in contrast to the front instabilities found for dewetting\n\n10", - "page_start": 9, - "page_end": 9, - "source_file": "1001.2669.pdf" - }, - { - "text": "(iii)\n\n(iv)\n\n(ii)\n\n(i)\n\nFIG. 8: (Colour online) Space-time plots are given for (left) the film thickness *h* and (right) the nanoparticle\n\nlayer height *h* *p* = *hφ* . The plot corresponds to the complete evolution resulting in the ring profile of\n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright\n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four\n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning,\n\n(iii) slow motion after depinning, and (iv) final evaporation from the center.\n\nshould also be investigated further in the simple case presented here.\n\n## **IV. CONCLUSION**\n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating\n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of\n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and\n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics\n\non the mesoscale has been described as well as more microscopic models for the dynamics in the\n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film\n\nmodel.\n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to\n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures\n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic\n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n\n23", - "page_start": 22, - "page_end": 22, - "source_file": "1001.2669.pdf" - }, - { - "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the\n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an\n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in\n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen\n\nfrom processes in similar ultrathin ‘postcursor’ films.\n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on\n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how-\n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is\n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension\n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso-\n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration\n\nsuspension from the higher concentration suspension on the surface of the substrate.\n\n## **III. MODELLING APPROACHES**\n\nModels of dewetting thin films of pure liquids or polymers are often based on thin film hydro-\n\ndynamics. Starting from the Stokes equations, together with continuity and boundary conditions\n\nat the substrate and free surface, one applies a long-wave approximation (assuming small surface\n\nslopes and contact angles) [8, 63] and obtains a non-linear evolution equation for the film thickness\n\nprofile *h* ( *x, y, t* ) . In the case of volatile liquids one finds [55- 58, 64]\n\n*∂* *t* *h* = *∇·* � *Q* c *∇* *δF* *δh* � *−* *Q* e\n\n*δF* *δh* *,* (1)\n\nwith the mobility functions *Q* c ( *h* ) = *h* 3 */* 3 *η* *≥* 0 (assuming Poiseuille flow in the film and no slip at the substrate; *η* is the dynamic viscosity) and *Q* e *≥* 0 for the convective and evaporative part\n\nof the dynamics, respectively. *Q* e is a rate constant that can be obtained from gas kinetic theory\n\nor from experiment [57]. Note that Eq. (1) only applies if the pressure in the vapour above the\n\nfilm is close to the saturation pressure. For alternative expressions that are used to describe the\n\nnon-conserved evaporative dynamics see, e.g., Refs. [56, 57, 65- 69]. Finally, *∇* = ( *∂* *x* *, ∂* *y* ) , and\n\n*∂* *t* , *∂* *x* and *∂* *y* denote partial derivatives w.r.t. time and the coordinates.\n\nFocusing on the influence of capillarity and wettability only, the energy functional *F* [ *h* ] is given\n\nby\n\n*F* [ *h* ] = � *dx* � *dy* � *γ* 2 ( ** *h* ) 2 + *f* ( *h* ) ** *µh* � (2)\n\n7", - "page_start": 6, - "page_end": 6, - "source_file": "1001.2669.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HIG_2001.pdf", - "query": "By how much did the Hartford group's link to AARP website account concerning buisness made over the internet ?", - "target_page": 16, - "target_passage": "In 2001 the company’s link to AARP’s Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "14\n\nmost dynamic sources of business growth. In 2001 the\n\ncompany’s link to AARP’s Web site accounted for much\n\nof the $55 million worth of auto business The Hartford\n\ngenerated over the Internet.\n\nBecause The Hartford quotes and issues this busi-\n\nness online (and added online billing in 2001), acquisi-\n\ntion and processing costs are 15 to 20 percent lower\n\nthan those of traditional direct-marketing or face-to-\n\nface sales. Because of this and other factors, the\n\nexpense ratio for AARP business is 30 percent below\n\nthat of the industry in general. And the customer\n\nrenewal rate is 96 percent, versus the industry’s 88 per-\n\ncent, making the AARP program yield some of the most\n\nprofitable auto business The Hartford writes.\n\nThe relationship also has The Hartford thinking\n\nahead toward new business and an even stronger rela-\n\ntionship with AARP members. The Hartford can cross-\n\nmarket auto insurance to homeowner’s customers and\n\nhomeowner’s insurance to auto customers, which\n\npresents a tremendous growth opportunity. In addition,\n\nThe Hartford is committed to providing value to AARP\n\nmembers in many ways. An example: The Hartford and\n\nAARP work with the MIT Age Lab to produce informa-\n\ntion—available in print and on both partners’ Web\n\nsites—advising AARP members about Alzheimer’s dis-\n\nease and other forms of dementia as they affect driving\n\nability. The information guides caregivers struggling\n\nwith difficult decisions about family members’ safety\n\nbehind the wheel. The resource—a customer solution\n\nlike no other—helps enhance the superior value The\n\nHartford provides to AARP members.\n\nAlthough it’s the most comprehensive, the AARP\n\nrelationship isn’t The Hartford’s only affinity program.\n\nThe company also has affinity arrangements with\n\nUSAA and other companies. Regardless of the pro-\n\ngram’s size, the affinity partners share the right quali-\n\nties: strong name-brand recognition, first-class\n\nmarketing and a broad and loyal customer base.\n\nIn other words, they share some of The Hartford’s\n\ncore attributes.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "13\n\n### *partners*\n\n**“P** artnering” is a popular business buzzword that may\n\nvanish as quickly as it appeared. The Hartford’s partner-\n\nships, on the other hand, are built for the long term and\n\nhave played a major role in the company’s growth and\n\nsuccess.\n\nThe company enjoys outstanding partnerships\n\nwith several of the world’s top asset managers. It also\n\nvalues its thousands of relationships with financial\n\nintermediaries such as large broker-dealers, banks and\n\nindependent financial planners—and with affinity part-\n\nners who extend The Hartford’s reach into large, grow-\n\ning markets.\n\n“A lot of people talk about having the right part-\n\nners, but The Hartford views it differently from most,”\n\nsays Gary Trippe, CEO of Fort Myers, Fla., property-\n\ncasualty agency Oswald, Trippe and Company, Inc.\n\n“They look for partners who share their core values,\n\nand the relationship is based on trust and respect. It’s\n\nall about compatibility.” Trippe should know. His\n\nagency writes three times as much business with\n\nThe Hartford, in both personal and commercial lines, as\n\nit writes with any other insurer.\n\nMutually beneficial partnerships with successful\n\nbusinesses of all sizes are the foundation of The\n\nHartford’s business model.\n\nPerhaps no relationship represents shared values\n\nand shared success better than the one with AARP,\n\nwhich signed a new eight-year contract with The\n\nHartford that began Jan. 1, 2002. The AARP insurance\n\nprogram with The Hartford is a model of affinity mar-\n\nketing and distribution savvy. AARP’s membership—\n\nthose age 50 and over—is the fastest-growing segment\n\nof the U.S. population. Computer use among this group\n\nis growing by an estimated 20 percent per year, and the\n\npopulation segment respects established brands and\n\nseeks value, convenience and extraordinary service.\n\nThat right combination of factors helps make\n\nAARP’s World Wide Web site one of The Hartford’s", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "21\n\n**N** ew technology tools made The Hartford Experience—\n\ncustomer solutions, ease of doing business and\n\nextraordinary service—more real than ever for our cus-\n\ntomers in 2001.\n\nIt was a year that saw the debut of life operations’\n\nHartford Investor Web portal, expanded Web portals for\n\ngroup benefits administrators, and enhancements to\n\ntechnology for The Hartford’s property-casualty agents\n\nand customers.\n\nHartford Investor is both a versatile personal\n\nassistant and an aid in wholesaling, especially for the\n\nindependent financial planner channel. Broker-dealers\n\nand financial advisors can use it to research The\n\nHartford’s full complement of individual life and invest-\n\nment products, update their books of business in\n\nseconds, track daily fund performance, run financial-\n\nplanning models, receive online product training,\n\nproduce customized presentations and even submit\n\nbusiness electronically.\n\nIn short, the portal allows The Hartford to bring\n\nproducts and functions from a variety of sources into\n\none convenient online environment.\n\nHartford Investor has two strategic objectives:\n\nOne, deepen current intermediaries’ loyalty to The\n\nHartford by extending The Hartford Experience right to\n\ntheir desktops. Two, expand the network of intermedi-\n\naries by giving them the technological support they\n\nneed to grow their businesses.\n\nMore than 153,000 licensed intermediaries—from\n\nsolo advisors to members of large financial institu-\n\ntions—are appointed to sell The Hartford’s products.\n\nYet fewer than 60,000 actively write business for the\n\ncompany. The untapped potential is vast, especially\n\namong independents, the fastest-growing distribution\n\nchannel and the only one in which The Hartford doesn’t\n\nhold the largest market share.\n\nThat’s bound to change. With Hartford Investor\n\navailable on their desktops, intermediaries will have far\n\n### *technology*", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "36\n\n**Corporate Information**\n\n####### **Corporate Headquarters**\n\nThe Hartford Financial\n\nServices Group, Inc.\n\n690 Asylum Avenue\n\nHartford, Connecticut 06115\n\n860-547-5000\n\n####### **Internet Address**\n\nhttp://www.thehartford.com\n\n####### **Annual Meeting**\n\nShareholders are cordially invited to attend The Hartford’s\n\nAnnual Meeting of Shareholders, which will be held on\n\nThursday, April 18, 2002 at 9:00a.m. in the Wallace Stevens\n\nTheater at The Hartford Financial Services Group, Inc.’s\n\nhome office at 690 Asylum Avenue, Hartford, Connecticut.\n\nShareholders of record as of February 28, 2002 are entitled\n\nto notice of, and to vote at, the Annual Meeting.\n\n####### **Form 10-K and Other Information**\n\nShareholders may receive, without charge, a copy of\n\nThe Hartford’s Form 10-K (without exhibits) filed with the\n\nSecurities and Exchange Commission for the year ended\n\nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms\n\n10-Q, press releases, and other shareholder communications\n\nare also available through this toll-free number.\n\n####### **Transfer Agent/Shareholder Records**\n\nFor information or assistance regarding stock records,\n\ndividend checks or stock certificates, please contact\n\nThe Hartford’s transfer agent:\n\nThe Bank of New York\n\nShareholder Relations Department- 11E\n\nP.O. Box 11258\n\nChurch Street Station\n\nNew York, NY 10286\n\n800-254-2823\n\nTo send certificates for transfer and address changes:\n\nThe Bank of New York\n\nReceive and Deliver Department- 11W\n\nP.O. Box 11002\n\nChurch Street Station\n\nNew York, NY 10286\n\nAddress inquiries about The Hartford’s Dividend\n\nReinvestment and Cash Payment Plan to:\n\nThe Bank of New York\n\nDividend Reinvestment Department\n\nP.O. Box 1958\n\nNewark, NJ 07101-9774\n\nE-mail: shareowner-svcs@bankofny.com\n\nInternet address: www.stockbny.com\n\n####### **Investor Relations**\n\nThe Hartford Financial\n\nServices Group, Inc.\n\nHartford Plaza, HO-1-01\n\nHartford, Connecticut 06115\n\nAttn: Investor Relations\n\n860-547-2537\n\n####### **Media Inquiries**\n\nThe Hartford Financial\n\nServices Group, Inc.\n\nMedia Relations\n\nHartford Plaza, T-12-56\n\nHartford, CT 06115\n\n860-547-5200\n\n####### **Common Stock and Dividend Information**\n\nThe Hartford’s common stock is traded on the New York\n\nStock Exchange (NYSE) under the trading symbol “HIG.”\n\nThe following table presents the high and low closing prices\n\nfor the common stock of The Hartford on the NYSE for\n\nthe periods indicated, and the quarterly dividends declared\n\nper share.\n\nCommon Stock Price Dividends\n\nHigh Low Declared\n\n## **2001**\n\nFirst quarter $ 67.75 $ 55.15 $0.25\n\nSecond quarter 70.46 56.88 0.25\n\nThird quarter 69.28 50.10 0.25\n\nFourth quarter 62.83 53.91 0.26\n\n## **2000**\n\nFirst quarter $ 52.75 $ 29.38 $0.24\n\nSecond quarter 64.00 44.25 0.24\n\nThird quarter 73.75 56.38 0.24\n\nFourth quarter 79.31 65.44 0.25\n\nAs of February 28, 2002 there were approximately 120,000\n\nshareholders of The Hartford. Design: Gene Mayer Associates, Inc. www.shareholderfocus.com Text: Daniel D. Elman", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "18\n\nIntermediary Service Award and the first-ever Life\n\nInsurance Service Award. The triple win reflected the\n\noverall excellence of The Hartford’s service, a natural\n\ncomplement to the company’s quality products. DAL-\n\nBAR also recognized The Hartford’s mutual funds as the\n\nindustry leader in several categories, including invest-\n\nment management.\n\nIn managing its product portfolio, The Hartford fol-\n\nlows its own advice: think ahead and diversify. The com-\n\npany’s earnings base derives from a variety of\n\nbusinesses. Diversification is a key element in managing\n\nrisk and ensuring profitability—a time-tested philosophy\n\nthat held especially true in 2001, as the company’s other\n\nbusinesses evolved to anticipate changing market\n\ndemands and to offer protection from new risks.\n\nThe property-casualty Business Insurance group,\n\nfor example, extended its coverage to include common\n\nrisks associated with e-commerce. Hartford Financial\n\nProducts’ (HFP) coverage continued to meet emerging\n\nrisks in an extremely volatile business environment.\n\nThe Hartford helped customers manage risk by\n\ndeveloping a new category of commercial coverage\n\ncalled CyberFlex. TM This targets the previously unmet\n\nneeds of small and mid-sized businesses that are inte-\n\ngrating the Internet and other communications tools\n\ninto their regular operations.\n\nA 2001 survey by The Hartford revealed that 80\n\npercent of small and mid-sized businesses weren’t sure\n\nif their current insurance policies covered specific—and\n\nincreasingly common—risks such as e-mail viruses,\n\nWeb site business interruption and online copyright\n\ninfringement. CyberFlex coverage protects middle-mar-\n\nket and small-business policyholders against the risk of\n\nthose potentially debilitating conditions.\n\nCyberFlex is part of a broad array of industry-\n\nspecific coverages in The Hartford’s SPECTRUM ® busi-\n\nness-owner’s policy, including protection against\n\nemployment practices liability, equipment breakdown\n\nand business interruption. As the economic environ-\n\nment changes rapidly, The Hartford thinks ahead by\n\nproviding those flexible coverages. And the company’s", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**The Hartford Financial Services Group, Inc.**\n\n**Hartford Plaza, 690 Asylum Avenue**\n\n**Hartford, Connecticut 06115**\n\nFORM 100025[2001]", - "page_start": 39, - "page_end": 39, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "17\n\n**H** ow do you secure the future when the present is\n\npuzzling enough? It’s a big challenge, and The Hartford’s\n\nprimary objective. Everything we do is designed to help\n\nour customers deal with the uncertainties that lie ahead.\n\nThe Hartford believes the best way to secure the\n\nfuture is to provide customers with the right products,\n\nand then back those products with outstanding per-\n\nformance and great service. Staying focused on this\n\nobjective was never more important—or more chal-\n\nlenging—than in 2001.\n\nTrue to form, The Hartford’s life operations’ annu-\n\nities and mutual funds delivered high-quality perform-\n\nance in a time of market turmoil. Despite an anemic stock\n\nmarket, 87 percent of the funds in The Hartford’s Director\n\nvariable annuity remained in the first or second quartile\n\nof three-year returns within the Lipper Peer Group in\n\n2001. Sixty-four percent of the funds in the Leaders suite\n\nof annuities and 91 percent of The Hartford’s mutual\n\nfunds remained in the first or second quartile over the\n\nthree-year period.\n\nThe ability to deliver that kind of performance\n\ncan be traced to our money managers—Wellington\n\nManagement Co., American Funds, Franklin Templeton\n\nInvestments, MFS Investment Management, AIM\n\nFunds Management, Inc., Putnam Investment\n\nManagement and The Hartford’s own Hartford\n\nInvestment Management Co.\n\nAll of The Hartford’s money managers have years\n\nof experience and are among the most respected firms\n\nin the industry. Their experience and expertise were\n\nespecially important during the market volatility we\n\nsaw in 2001. They always stay focused on long-term\n\nperformance, which is the true measuring stick of The\n\nHartford’s value to its customers.\n\nBesides outstanding products and excellent man-\n\nagement, great service is a critical component in deliv-\n\nering the right solutions to our customers. In 2001,\n\nThe Hartford won an unprecedented sixth consecutive\n\nDALBAR Annuity Service Award, as well as the\n\n#### *products* *&* *services*", - "page_start": 18, - "page_end": 18, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "All this translates into increased shareholder value. Since 1995, our market cap has\n\nincreased from $5.7 billion to $15.4 billion—an 18 percent compound annual growth rate.\n\nOur share price has increased nearly 160 percent since The Hartford became a public com-\n\npany. During the same period, the S&P 500 increased 89 percent, and the Dow Jones\n\nIndustrial Average 97 percent.\n\nIt’s no surprise that our management team is highly regarded within the financial\n\nservices industry and on Wall Street. We’ve built a strong leadership team, complemented\n\nby more than 27,000 dedicated employees who are nurtured and energized by a culture of\n\nsuccess. Consequently, we had a smooth leadership transition over the past year. Tom Marra\n\nsucceeded Lon Smith as president of our life operations and joined our board of directors.\n\nLon retired after a 33-year career with The Hartford, and we owe him a tremendous amount\n\nof gratitude for building a strong and successful operation.\n\nDuring 2001 we also welcomed two new members to our board of directors. Edward J.\n\nKelly III, president and CEO of Mercantile Bankshares Corp., joined us in May, and we welcomed\n\nCharles B. Strauss, president and CEO of Unilever United States, Inc., in November.\n\nWe’re well-positioned for growth in 2002. On Jan. 1 we renewed our relationship with\n\nAARP by signing a new eight-year contract to market auto and homeowner’s insurance to\n\nits 35 million members. Our small-business property-casualty operation continues to\n\ngrow—premiums surpassed $1.2 billion in annual sales in 2001.\n\nWe’re also in a leading position to take advantage of demographic shifts and to provide\n\nestate planning and investment and insurance products to baby boomers. We are very excited,\n\ntoo, about our new SMART 529 college savings program, which offers flexible features and\n\nnumerous tax advantages. And the growing small-business market segment is a key target for\n\nour 401(k) and group-benefits businesses. In fact, with $2 billion in fully insured premiums and\n\n$106 million in net income, the Group Benefits Division (GBD) had its best year ever.\n\nAs our markets continue to grow and evolve, we stay intensely focused on the key\n\nstrategies in all our businesses.\n\n* **Soon after the Sept. 11 attack,** *\n\n* **The Hartford Chairman, President** *\n\n* **and CEO Ramani Ayer, left fore-** *\n\n* **ground, joined other industry** *\n\n* **CEOs in meeting with President** *\n\n* **Bush at the White House. During** *\n\n* **the meeting, the executives** *\n\n* **assured the president of industry** *\n\n* **support as the nation recovers.** *", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "9\n\n**T** he worst of 2001 brought out the best in The\n\nHartford’s people.\n\nAs the world watched the horrors of Sept. 11,\n\nsome 330 of our New York employees fled their offices\n\nin 7 World Trade Center. Though many were caught in\n\nthe debris and dust from the nearby Twin Towers, all\n\nescaped safely.\n\nBy the time the 47-story 7 World Trade Center\n\nbuilding collapsed at about 5:20 p.m., The Hartford had\n\nalready arranged for temporary space in several of the\n\ncompany’s other offices. Employees and suppliers\n\nimmediately began working around the clock to get\n\nthe business up and running again. Despite the\n\ndestruction, back-up systems kept distributors’ and\n\ncustomers’ data secure.\n\nA hundred miles from Ground Zero, home office\n\nemployees in Hartford, Conn., began shuttling equip-\n\nment and supplies to our temporary offices. Some\n\nbooked Long Island Sound ferries from Connecticut to\n\nLong Island within 48 hours of the attack. Others spent\n\nthe weekend driving supplies to the new locations so\n\nemployees could concentrate on customers instead of\n\non finding pens and paper. Employees and suppliers\n\nwere determined to get the company, its distributors\n\nand its customers through the crisis.\n\nBy Monday, Sept. 17, all of The Hartford’s business\n\nunits in New York were serving customers again.\n\nEmployees had new furniture, phones, servers and PCs.\n\nDistributors’ and customers’ access to company e-mail\n\nwas never interrupted. Calls to old phone numbers were\n\nrerouted to cell phones or new office phones. Print and\n\nradio ads—along with The Hartford’s Web site—\n\ngave customers instructions for filing claims quickly.\n\nCustomer relationships were stronger than ever. The\n\nHartford Experience—customer solutions, ease of doing\n\nbusiness and extraordinary service—was never better\n\ndemonstrated.\n\n### *people*", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**MANAGEMENT’S DISCUSSION AND ANALYSIS** Understanding Our Business\n\nRogers Communications is one of Canada’s leading diversified communications and media companies.\n\n**Our vision** is to be known for leading the enablement and delivery of seamless, customer-driven communications,\n\nentertainment, information and transactional experiences across any device, place or time.\n\n**Wireless** provides wireless voice and data communication services,\n\nincluding machine to machine to both consumer and enterprise\n\nbusinesses, governments and other telecommunications service\n\nproviders. **Cable** provides voice and data communications, home\n\nmonitoring, television and high-speed Internet services to both\n\nconsumers and businesses. **Business Solutions** provides voice and data\n\ncommunications and advanced services including data centre based\n\nsolutions and cloud computing services to a wide range of medium to\n\nlarge businesses, including other service providers, and government\n\neither wirelessly or over our terrestrial network. Revenue generated\n\nfrom these segments is generally based on monthly subscription and\n\nnetwork usage rates. Costs include attracting, setting-up and retaining\n\ncustomers, content, and the costs of upgrading and maintaining the\n\nunderlying network.\n\nOur wireless network is currently one of the most extensive and\n\nadvanced independent high-speed wireless data networks in Canada,\n\ncapable of supporting wireless services on smartphones, tablets,\n\ncomputers and a broad variety of machine-to-machine and specialized\n\ndevices. We built the first Long Term Evolution (LTE) high speed\n\nnetwork in Canada, reaching nearly 73% of the Canadian population\n\nat December 31, 2013. We also have roaming agreements with\n\ninternational carriers in more than 200 other countries, including 5 LTE\n\nroaming operators and have network sharing arrangements with several\n\ncarriers in Canada.\n\nOur expansive fibre and hybrid fibre coaxial infrastructure delivers\n\nservices to consumers and businesses in Ontario, New Brunswick and\n\nNewfoundland. We also operate a North American transcontinental\n\nfibre-optic network that extends over 41,000 route kilometres that is\n\nused to serve enterprise customers, including government and other\n\ntelecommunications service providers. In Canada, the network extends\n\ncoast to coast and includes local and regional fibre, transmission\n\nelectronics and systems, hubs, POPs and IP Routing and switching\n\ninfrastructure. The network also extends to the US, from Vancouver\n\nsouth to Seattle, from the Manitoba-Minnesota border through\n\nMinneapolis, Milwaukee and Chicago, and from Toronto, through\n\nBuffalo, and Montreal, through Albany, to New York City, allowing us\n\nto connect Canada’s largest markets, while also reaching key US\n\nmarkets for the exchange of data and voice traffic.\n\n**Media** provides television and radio broadcasting services to end\n\ncustomers over both traditional broadcast networks and new digital\n\nnetworks as well as multi-platform shopping, consumer and trade\n\npublications and sports media and entertainment experiences, primarily\n\nthrough its ownership of the Toronto Blue Jays. Revenue is largely\n\ndriven by advertising and, in the case of TV broadcasting and publishing\n\nby additional revenues from monthly subscriptions. Revenue is also\n\ngenerated by the sale of merchandise and event tickets. Costs include\n\nsports programming, broadcast content (including TV studios, writers\n\nand on air and on field talent), the cost of merchandise and the\n\nproduction costs associated with each medium.\n\nWe report our results of operations in four segments, which reflect how\n\nwe manage our operations and measure our performance.\n\n####### **WIRELESS**\n\nsee page 37\n\nCanada’s largest provider of\n\nwireless communications services.\n\n####### **MEDIA**\n\nsee page 47\n\nA diversified Canadian media\n\ncompany that engages in\n\ntelevision and radio\n\nbroadcasting, multi-platform\n\nshopping, publishing, digital,\n\nand sports media and", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HIG_2001.pdf", - "query": "How many licensed intermediaries did Hartford group have in 2001 ?", - "target_page": 23, - "target_passage": "More than 153,000 licensed intermediaries", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "21\n\n**N** ew technology tools made The Hartford Experience—\n\ncustomer solutions, ease of doing business and\n\nextraordinary service—more real than ever for our cus-\n\ntomers in 2001.\n\nIt was a year that saw the debut of life operations’\n\nHartford Investor Web portal, expanded Web portals for\n\ngroup benefits administrators, and enhancements to\n\ntechnology for The Hartford’s property-casualty agents\n\nand customers.\n\nHartford Investor is both a versatile personal\n\nassistant and an aid in wholesaling, especially for the\n\nindependent financial planner channel. Broker-dealers\n\nand financial advisors can use it to research The\n\nHartford’s full complement of individual life and invest-\n\nment products, update their books of business in\n\nseconds, track daily fund performance, run financial-\n\nplanning models, receive online product training,\n\nproduce customized presentations and even submit\n\nbusiness electronically.\n\nIn short, the portal allows The Hartford to bring\n\nproducts and functions from a variety of sources into\n\none convenient online environment.\n\nHartford Investor has two strategic objectives:\n\nOne, deepen current intermediaries’ loyalty to The\n\nHartford by extending The Hartford Experience right to\n\ntheir desktops. Two, expand the network of intermedi-\n\naries by giving them the technological support they\n\nneed to grow their businesses.\n\nMore than 153,000 licensed intermediaries—from\n\nsolo advisors to members of large financial institu-\n\ntions—are appointed to sell The Hartford’s products.\n\nYet fewer than 60,000 actively write business for the\n\ncompany. The untapped potential is vast, especially\n\namong independents, the fastest-growing distribution\n\nchannel and the only one in which The Hartford doesn’t\n\nhold the largest market share.\n\nThat’s bound to change. With Hartford Investor\n\navailable on their desktops, intermediaries will have far\n\n### *technology*", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**The Hartford Financial Services Group, Inc.**\n\n**Hartford Plaza, 690 Asylum Avenue**\n\n**Hartford, Connecticut 06115**\n\nFORM 100025[2001]", - "page_start": 39, - "page_end": 39, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "36\n\n**Corporate Information**\n\n####### **Corporate Headquarters**\n\nThe Hartford Financial\n\nServices Group, Inc.\n\n690 Asylum Avenue\n\nHartford, Connecticut 06115\n\n860-547-5000\n\n####### **Internet Address**\n\nhttp://www.thehartford.com\n\n####### **Annual Meeting**\n\nShareholders are cordially invited to attend The Hartford’s\n\nAnnual Meeting of Shareholders, which will be held on\n\nThursday, April 18, 2002 at 9:00a.m. in the Wallace Stevens\n\nTheater at The Hartford Financial Services Group, Inc.’s\n\nhome office at 690 Asylum Avenue, Hartford, Connecticut.\n\nShareholders of record as of February 28, 2002 are entitled\n\nto notice of, and to vote at, the Annual Meeting.\n\n####### **Form 10-K and Other Information**\n\nShareholders may receive, without charge, a copy of\n\nThe Hartford’s Form 10-K (without exhibits) filed with the\n\nSecurities and Exchange Commission for the year ended\n\nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms\n\n10-Q, press releases, and other shareholder communications\n\nare also available through this toll-free number.\n\n####### **Transfer Agent/Shareholder Records**\n\nFor information or assistance regarding stock records,\n\ndividend checks or stock certificates, please contact\n\nThe Hartford’s transfer agent:\n\nThe Bank of New York\n\nShareholder Relations Department- 11E\n\nP.O. Box 11258\n\nChurch Street Station\n\nNew York, NY 10286\n\n800-254-2823\n\nTo send certificates for transfer and address changes:\n\nThe Bank of New York\n\nReceive and Deliver Department- 11W\n\nP.O. Box 11002\n\nChurch Street Station\n\nNew York, NY 10286\n\nAddress inquiries about The Hartford’s Dividend\n\nReinvestment and Cash Payment Plan to:\n\nThe Bank of New York\n\nDividend Reinvestment Department\n\nP.O. Box 1958\n\nNewark, NJ 07101-9774\n\nE-mail: shareowner-svcs@bankofny.com\n\nInternet address: www.stockbny.com\n\n####### **Investor Relations**\n\nThe Hartford Financial\n\nServices Group, Inc.\n\nHartford Plaza, HO-1-01\n\nHartford, Connecticut 06115\n\nAttn: Investor Relations\n\n860-547-2537\n\n####### **Media Inquiries**\n\nThe Hartford Financial\n\nServices Group, Inc.\n\nMedia Relations\n\nHartford Plaza, T-12-56\n\nHartford, CT 06115\n\n860-547-5200\n\n####### **Common Stock and Dividend Information**\n\nThe Hartford’s common stock is traded on the New York\n\nStock Exchange (NYSE) under the trading symbol “HIG.”\n\nThe following table presents the high and low closing prices\n\nfor the common stock of The Hartford on the NYSE for\n\nthe periods indicated, and the quarterly dividends declared\n\nper share.\n\nCommon Stock Price Dividends\n\nHigh Low Declared\n\n## **2001**\n\nFirst quarter $ 67.75 $ 55.15 $0.25\n\nSecond quarter 70.46 56.88 0.25\n\nThird quarter 69.28 50.10 0.25\n\nFourth quarter 62.83 53.91 0.26\n\n## **2000**\n\nFirst quarter $ 52.75 $ 29.38 $0.24\n\nSecond quarter 64.00 44.25 0.24\n\nThird quarter 73.75 56.38 0.24\n\nFourth quarter 79.31 65.44 0.25\n\nAs of February 28, 2002 there were approximately 120,000\n\nshareholders of The Hartford. Design: Gene Mayer Associates, Inc. www.shareholderfocus.com Text: Daniel D. Elman", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "17\n\n**H** ow do you secure the future when the present is\n\npuzzling enough? It’s a big challenge, and The Hartford’s\n\nprimary objective. Everything we do is designed to help\n\nour customers deal with the uncertainties that lie ahead.\n\nThe Hartford believes the best way to secure the\n\nfuture is to provide customers with the right products,\n\nand then back those products with outstanding per-\n\nformance and great service. Staying focused on this\n\nobjective was never more important—or more chal-\n\nlenging—than in 2001.\n\nTrue to form, The Hartford’s life operations’ annu-\n\nities and mutual funds delivered high-quality perform-\n\nance in a time of market turmoil. Despite an anemic stock\n\nmarket, 87 percent of the funds in The Hartford’s Director\n\nvariable annuity remained in the first or second quartile\n\nof three-year returns within the Lipper Peer Group in\n\n2001. Sixty-four percent of the funds in the Leaders suite\n\nof annuities and 91 percent of The Hartford’s mutual\n\nfunds remained in the first or second quartile over the\n\nthree-year period.\n\nThe ability to deliver that kind of performance\n\ncan be traced to our money managers—Wellington\n\nManagement Co., American Funds, Franklin Templeton\n\nInvestments, MFS Investment Management, AIM\n\nFunds Management, Inc., Putnam Investment\n\nManagement and The Hartford’s own Hartford\n\nInvestment Management Co.\n\nAll of The Hartford’s money managers have years\n\nof experience and are among the most respected firms\n\nin the industry. Their experience and expertise were\n\nespecially important during the market volatility we\n\nsaw in 2001. They always stay focused on long-term\n\nperformance, which is the true measuring stick of The\n\nHartford’s value to its customers.\n\nBesides outstanding products and excellent man-\n\nagement, great service is a critical component in deliv-\n\nering the right solutions to our customers. In 2001,\n\nThe Hartford won an unprecedented sixth consecutive\n\nDALBAR Annuity Service Award, as well as the\n\n#### *products* *&* *services*", - "page_start": 18, - "page_end": 18, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "13\n\n### *partners*\n\n**“P** artnering” is a popular business buzzword that may\n\nvanish as quickly as it appeared. The Hartford’s partner-\n\nships, on the other hand, are built for the long term and\n\nhave played a major role in the company’s growth and\n\nsuccess.\n\nThe company enjoys outstanding partnerships\n\nwith several of the world’s top asset managers. It also\n\nvalues its thousands of relationships with financial\n\nintermediaries such as large broker-dealers, banks and\n\nindependent financial planners—and with affinity part-\n\nners who extend The Hartford’s reach into large, grow-\n\ning markets.\n\n“A lot of people talk about having the right part-\n\nners, but The Hartford views it differently from most,”\n\nsays Gary Trippe, CEO of Fort Myers, Fla., property-\n\ncasualty agency Oswald, Trippe and Company, Inc.\n\n“They look for partners who share their core values,\n\nand the relationship is based on trust and respect. It’s\n\nall about compatibility.” Trippe should know. His\n\nagency writes three times as much business with\n\nThe Hartford, in both personal and commercial lines, as\n\nit writes with any other insurer.\n\nMutually beneficial partnerships with successful\n\nbusinesses of all sizes are the foundation of The\n\nHartford’s business model.\n\nPerhaps no relationship represents shared values\n\nand shared success better than the one with AARP,\n\nwhich signed a new eight-year contract with The\n\nHartford that began Jan. 1, 2002. The AARP insurance\n\nprogram with The Hartford is a model of affinity mar-\n\nketing and distribution savvy. AARP’s membership—\n\nthose age 50 and over—is the fastest-growing segment\n\nof the U.S. population. Computer use among this group\n\nis growing by an estimated 20 percent per year, and the\n\npopulation segment respects established brands and\n\nseeks value, convenience and extraordinary service.\n\nThat right combination of factors helps make\n\nAARP’s World Wide Web site one of The Hartford’s", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "10\n\nMeanwhile, in midtown Manhattan, The\n\nHartford’s negotiations for permanent offices—a\n\nprocess that normally takes 12 to 15 months—were\n\ncomplete.\n\nThe feverish pace was in some ways therapeutic.\n\nIt helped take people’s minds off the tragedy and the\n\nmonumental loss of life, including the lives of many\n\ngood friends and business colleagues at Aon, Marsh &\n\nMcLennan, Bank of America and Morgan Stanley—major\n\npartners of The Hartford with offices in the Twin Towers.\n\nLike many Americans watching the heroism of\n\nfirefighters, police and emergency crews, thousands of\n\nour employees asked, “How can we help?” Fortunately,\n\nthey found ways. Lots of them. Employees crowded\n\ninto bloodmobiles and dropped food and\n\nsupplies into overflowing bins. With the company’s\n\nmatch, employees also donated more than $700,000 to\n\nrelief efforts, and The Hartford provided a special tele-\n\nphone hotline for employees who needed counseling.\n\n“Focused resolve” is how New York-based\n\nRegional Vice President Brandon Hickey characterizes\n\nThe Hartford’s response. “It solidified in my mind how\n\nstrong the culture is at this company,” he says. “The\n\nemotional stress of Sept. 11 will be with us for a long\n\ntime. But as a tribute to the people who were there, we\n\ncame back as quickly as we did because we knew we\n\nhad a job to do, and we were committed to succeed.”\n\nBy early November—less than 60 days after the\n\nattack—The Hartford’s New York employees were in\n\ntheir new permanent offices at 2 Park Ave.\n\nNo less impressive—and certainly no less swift—\n\nwas The Hartford’s claims service during Sept. 11’s\n\naftermath. “Catastrophe Team”—CAT—adjusters were\n\non the ground within days, fulfilling obligations to poli-\n\ncyholders who suffered losses. As an example, The\n\nHartford advanced $1 million within 72 hours of the dis-\n\naster to help the Thacher, Proffitt & Wood law firm\n\nestablish temporary midtown Manhattan offices. All\n\nthe firm’s employees had evacuated the World Trade\n\nCenter’s south tower before everything in their offices\n\nwas destroyed. Within a week, Thacher, Proffitt & Wood\n\nwas back in business.\n\nThe Hartford assigned extra resources to expedite\n\nservice requests, and customers received premium\n\npayment extensions as needed. One adjuster wrote a\n\n$250,000 check on the spot to help a lower Manhattan\n\nsoftware-development company begin its recovery.\n\nCAT team members and call center customer service\n\nrepresentatives received special training to help them\n\ncope with traumatized customers, and the company\n\ndistributed disaster-recovery literature and forms to\n\nhelp customers get back to business.\n\nThe Hartford’s Group Benefits Division (GBD)\n\noffered crisis-counseling services to policyholders in", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "9\n\n**T** he worst of 2001 brought out the best in The\n\nHartford’s people.\n\nAs the world watched the horrors of Sept. 11,\n\nsome 330 of our New York employees fled their offices\n\nin 7 World Trade Center. Though many were caught in\n\nthe debris and dust from the nearby Twin Towers, all\n\nescaped safely.\n\nBy the time the 47-story 7 World Trade Center\n\nbuilding collapsed at about 5:20 p.m., The Hartford had\n\nalready arranged for temporary space in several of the\n\ncompany’s other offices. Employees and suppliers\n\nimmediately began working around the clock to get\n\nthe business up and running again. Despite the\n\ndestruction, back-up systems kept distributors’ and\n\ncustomers’ data secure.\n\nA hundred miles from Ground Zero, home office\n\nemployees in Hartford, Conn., began shuttling equip-\n\nment and supplies to our temporary offices. Some\n\nbooked Long Island Sound ferries from Connecticut to\n\nLong Island within 48 hours of the attack. Others spent\n\nthe weekend driving supplies to the new locations so\n\nemployees could concentrate on customers instead of\n\non finding pens and paper. Employees and suppliers\n\nwere determined to get the company, its distributors\n\nand its customers through the crisis.\n\nBy Monday, Sept. 17, all of The Hartford’s business\n\nunits in New York were serving customers again.\n\nEmployees had new furniture, phones, servers and PCs.\n\nDistributors’ and customers’ access to company e-mail\n\nwas never interrupted. Calls to old phone numbers were\n\nrerouted to cell phones or new office phones. Print and\n\nradio ads—along with The Hartford’s Web site—\n\ngave customers instructions for filing claims quickly.\n\nCustomer relationships were stronger than ever. The\n\nHartford Experience—customer solutions, ease of doing\n\nbusiness and extraordinary service—was never better\n\ndemonstrated.\n\n### *people*", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "14\n\nmost dynamic sources of business growth. In 2001 the\n\ncompany’s link to AARP’s Web site accounted for much\n\nof the $55 million worth of auto business The Hartford\n\ngenerated over the Internet.\n\nBecause The Hartford quotes and issues this busi-\n\nness online (and added online billing in 2001), acquisi-\n\ntion and processing costs are 15 to 20 percent lower\n\nthan those of traditional direct-marketing or face-to-\n\nface sales. Because of this and other factors, the\n\nexpense ratio for AARP business is 30 percent below\n\nthat of the industry in general. And the customer\n\nrenewal rate is 96 percent, versus the industry’s 88 per-\n\ncent, making the AARP program yield some of the most\n\nprofitable auto business The Hartford writes.\n\nThe relationship also has The Hartford thinking\n\nahead toward new business and an even stronger rela-\n\ntionship with AARP members. The Hartford can cross-\n\nmarket auto insurance to homeowner’s customers and\n\nhomeowner’s insurance to auto customers, which\n\npresents a tremendous growth opportunity. In addition,\n\nThe Hartford is committed to providing value to AARP\n\nmembers in many ways. An example: The Hartford and\n\nAARP work with the MIT Age Lab to produce informa-\n\ntion—available in print and on both partners’ Web\n\nsites—advising AARP members about Alzheimer’s dis-\n\nease and other forms of dementia as they affect driving\n\nability. The information guides caregivers struggling\n\nwith difficult decisions about family members’ safety\n\nbehind the wheel. The resource—a customer solution\n\nlike no other—helps enhance the superior value The\n\nHartford provides to AARP members.\n\nAlthough it’s the most comprehensive, the AARP\n\nrelationship isn’t The Hartford’s only affinity program.\n\nThe company also has affinity arrangements with\n\nUSAA and other companies. Regardless of the pro-\n\ngram’s size, the affinity partners share the right quali-\n\nties: strong name-brand recognition, first-class\n\nmarketing and a broad and loyal customer base.\n\nIn other words, they share some of The Hartford’s\n\ncore attributes.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "18\n\nIntermediary Service Award and the first-ever Life\n\nInsurance Service Award. The triple win reflected the\n\noverall excellence of The Hartford’s service, a natural\n\ncomplement to the company’s quality products. DAL-\n\nBAR also recognized The Hartford’s mutual funds as the\n\nindustry leader in several categories, including invest-\n\nment management.\n\nIn managing its product portfolio, The Hartford fol-\n\nlows its own advice: think ahead and diversify. The com-\n\npany’s earnings base derives from a variety of\n\nbusinesses. Diversification is a key element in managing\n\nrisk and ensuring profitability—a time-tested philosophy\n\nthat held especially true in 2001, as the company’s other\n\nbusinesses evolved to anticipate changing market\n\ndemands and to offer protection from new risks.\n\nThe property-casualty Business Insurance group,\n\nfor example, extended its coverage to include common\n\nrisks associated with e-commerce. Hartford Financial\n\nProducts’ (HFP) coverage continued to meet emerging\n\nrisks in an extremely volatile business environment.\n\nThe Hartford helped customers manage risk by\n\ndeveloping a new category of commercial coverage\n\ncalled CyberFlex. TM This targets the previously unmet\n\nneeds of small and mid-sized businesses that are inte-\n\ngrating the Internet and other communications tools\n\ninto their regular operations.\n\nA 2001 survey by The Hartford revealed that 80\n\npercent of small and mid-sized businesses weren’t sure\n\nif their current insurance policies covered specific—and\n\nincreasingly common—risks such as e-mail viruses,\n\nWeb site business interruption and online copyright\n\ninfringement. CyberFlex coverage protects middle-mar-\n\nket and small-business policyholders against the risk of\n\nthose potentially debilitating conditions.\n\nCyberFlex is part of a broad array of industry-\n\nspecific coverages in The Hartford’s SPECTRUM ® busi-\n\nness-owner’s policy, including protection against\n\nemployment practices liability, equipment breakdown\n\nand business interruption. As the economic environ-\n\nment changes rapidly, The Hartford thinks ahead by\n\nproviding those flexible coverages. And the company’s", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "* **There’s only** *\n\n* **to run a business...** *\n\n**The Hartford Financial Services Group, Inc. 2001 Summary Annual Report**", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_HIG_2001.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HIG_2001.pdf", - "query": "When did the annual sherholder meeting of Hartford happen in 2002 ?", - "target_page": 38, - "target_passage": "Shareholders are cordially invited to attend The Hartford’s Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "36\n\n**Corporate Information**\n\n####### **Corporate Headquarters**\n\nThe Hartford Financial\n\nServices Group, Inc.\n\n690 Asylum Avenue\n\nHartford, Connecticut 06115\n\n860-547-5000\n\n####### **Internet Address**\n\nhttp://www.thehartford.com\n\n####### **Annual Meeting**\n\nShareholders are cordially invited to attend The Hartford’s\n\nAnnual Meeting of Shareholders, which will be held on\n\nThursday, April 18, 2002 at 9:00a.m. in the Wallace Stevens\n\nTheater at The Hartford Financial Services Group, Inc.’s\n\nhome office at 690 Asylum Avenue, Hartford, Connecticut.\n\nShareholders of record as of February 28, 2002 are entitled\n\nto notice of, and to vote at, the Annual Meeting.\n\n####### **Form 10-K and Other Information**\n\nShareholders may receive, without charge, a copy of\n\nThe Hartford’s Form 10-K (without exhibits) filed with the\n\nSecurities and Exchange Commission for the year ended\n\nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms\n\n10-Q, press releases, and other shareholder communications\n\nare also available through this toll-free number.\n\n####### **Transfer Agent/Shareholder Records**\n\nFor information or assistance regarding stock records,\n\ndividend checks or stock certificates, please contact\n\nThe Hartford’s transfer agent:\n\nThe Bank of New York\n\nShareholder Relations Department- 11E\n\nP.O. Box 11258\n\nChurch Street Station\n\nNew York, NY 10286\n\n800-254-2823\n\nTo send certificates for transfer and address changes:\n\nThe Bank of New York\n\nReceive and Deliver Department- 11W\n\nP.O. Box 11002\n\nChurch Street Station\n\nNew York, NY 10286\n\nAddress inquiries about The Hartford’s Dividend\n\nReinvestment and Cash Payment Plan to:\n\nThe Bank of New York\n\nDividend Reinvestment Department\n\nP.O. Box 1958\n\nNewark, NJ 07101-9774\n\nE-mail: shareowner-svcs@bankofny.com\n\nInternet address: www.stockbny.com\n\n####### **Investor Relations**\n\nThe Hartford Financial\n\nServices Group, Inc.\n\nHartford Plaza, HO-1-01\n\nHartford, Connecticut 06115\n\nAttn: Investor Relations\n\n860-547-2537\n\n####### **Media Inquiries**\n\nThe Hartford Financial\n\nServices Group, Inc.\n\nMedia Relations\n\nHartford Plaza, T-12-56\n\nHartford, CT 06115\n\n860-547-5200\n\n####### **Common Stock and Dividend Information**\n\nThe Hartford’s common stock is traded on the New York\n\nStock Exchange (NYSE) under the trading symbol “HIG.”\n\nThe following table presents the high and low closing prices\n\nfor the common stock of The Hartford on the NYSE for\n\nthe periods indicated, and the quarterly dividends declared\n\nper share.\n\nCommon Stock Price Dividends\n\nHigh Low Declared\n\n## **2001**\n\nFirst quarter $ 67.75 $ 55.15 $0.25\n\nSecond quarter 70.46 56.88 0.25\n\nThird quarter 69.28 50.10 0.25\n\nFourth quarter 62.83 53.91 0.26\n\n## **2000**\n\nFirst quarter $ 52.75 $ 29.38 $0.24\n\nSecond quarter 64.00 44.25 0.24\n\nThird quarter 73.75 56.38 0.24\n\nFourth quarter 79.31 65.44 0.25\n\nAs of February 28, 2002 there were approximately 120,000\n\nshareholders of The Hartford. Design: Gene Mayer Associates, Inc. www.shareholderfocus.com Text: Daniel D. Elman", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "**The Hartford Financial Services Group, Inc.**\n\n**Hartford Plaza, 690 Asylum Avenue**\n\n**Hartford, Connecticut 06115**\n\nFORM 100025[2001]", - "page_start": 39, - "page_end": 39, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "17\n\n**H** ow do you secure the future when the present is\n\npuzzling enough? It’s a big challenge, and The Hartford’s\n\nprimary objective. Everything we do is designed to help\n\nour customers deal with the uncertainties that lie ahead.\n\nThe Hartford believes the best way to secure the\n\nfuture is to provide customers with the right products,\n\nand then back those products with outstanding per-\n\nformance and great service. Staying focused on this\n\nobjective was never more important—or more chal-\n\nlenging—than in 2001.\n\nTrue to form, The Hartford’s life operations’ annu-\n\nities and mutual funds delivered high-quality perform-\n\nance in a time of market turmoil. Despite an anemic stock\n\nmarket, 87 percent of the funds in The Hartford’s Director\n\nvariable annuity remained in the first or second quartile\n\nof three-year returns within the Lipper Peer Group in\n\n2001. Sixty-four percent of the funds in the Leaders suite\n\nof annuities and 91 percent of The Hartford’s mutual\n\nfunds remained in the first or second quartile over the\n\nthree-year period.\n\nThe ability to deliver that kind of performance\n\ncan be traced to our money managers—Wellington\n\nManagement Co., American Funds, Franklin Templeton\n\nInvestments, MFS Investment Management, AIM\n\nFunds Management, Inc., Putnam Investment\n\nManagement and The Hartford’s own Hartford\n\nInvestment Management Co.\n\nAll of The Hartford’s money managers have years\n\nof experience and are among the most respected firms\n\nin the industry. Their experience and expertise were\n\nespecially important during the market volatility we\n\nsaw in 2001. They always stay focused on long-term\n\nperformance, which is the true measuring stick of The\n\nHartford’s value to its customers.\n\nBesides outstanding products and excellent man-\n\nagement, great service is a critical component in deliv-\n\nering the right solutions to our customers. In 2001,\n\nThe Hartford won an unprecedented sixth consecutive\n\nDALBAR Annuity Service Award, as well as the\n\n#### *products* *&* *services*", - "page_start": 18, - "page_end": 18, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "21\n\n**N** ew technology tools made The Hartford Experience—\n\ncustomer solutions, ease of doing business and\n\nextraordinary service—more real than ever for our cus-\n\ntomers in 2001.\n\nIt was a year that saw the debut of life operations’\n\nHartford Investor Web portal, expanded Web portals for\n\ngroup benefits administrators, and enhancements to\n\ntechnology for The Hartford’s property-casualty agents\n\nand customers.\n\nHartford Investor is both a versatile personal\n\nassistant and an aid in wholesaling, especially for the\n\nindependent financial planner channel. Broker-dealers\n\nand financial advisors can use it to research The\n\nHartford’s full complement of individual life and invest-\n\nment products, update their books of business in\n\nseconds, track daily fund performance, run financial-\n\nplanning models, receive online product training,\n\nproduce customized presentations and even submit\n\nbusiness electronically.\n\nIn short, the portal allows The Hartford to bring\n\nproducts and functions from a variety of sources into\n\none convenient online environment.\n\nHartford Investor has two strategic objectives:\n\nOne, deepen current intermediaries’ loyalty to The\n\nHartford by extending The Hartford Experience right to\n\ntheir desktops. Two, expand the network of intermedi-\n\naries by giving them the technological support they\n\nneed to grow their businesses.\n\nMore than 153,000 licensed intermediaries—from\n\nsolo advisors to members of large financial institu-\n\ntions—are appointed to sell The Hartford’s products.\n\nYet fewer than 60,000 actively write business for the\n\ncompany. The untapped potential is vast, especially\n\namong independents, the fastest-growing distribution\n\nchannel and the only one in which The Hartford doesn’t\n\nhold the largest market share.\n\nThat’s bound to change. With Hartford Investor\n\navailable on their desktops, intermediaries will have far\n\n### *technology*", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "13\n\n### *partners*\n\n**“P** artnering” is a popular business buzzword that may\n\nvanish as quickly as it appeared. The Hartford’s partner-\n\nships, on the other hand, are built for the long term and\n\nhave played a major role in the company’s growth and\n\nsuccess.\n\nThe company enjoys outstanding partnerships\n\nwith several of the world’s top asset managers. It also\n\nvalues its thousands of relationships with financial\n\nintermediaries such as large broker-dealers, banks and\n\nindependent financial planners—and with affinity part-\n\nners who extend The Hartford’s reach into large, grow-\n\ning markets.\n\n“A lot of people talk about having the right part-\n\nners, but The Hartford views it differently from most,”\n\nsays Gary Trippe, CEO of Fort Myers, Fla., property-\n\ncasualty agency Oswald, Trippe and Company, Inc.\n\n“They look for partners who share their core values,\n\nand the relationship is based on trust and respect. It’s\n\nall about compatibility.” Trippe should know. His\n\nagency writes three times as much business with\n\nThe Hartford, in both personal and commercial lines, as\n\nit writes with any other insurer.\n\nMutually beneficial partnerships with successful\n\nbusinesses of all sizes are the foundation of The\n\nHartford’s business model.\n\nPerhaps no relationship represents shared values\n\nand shared success better than the one with AARP,\n\nwhich signed a new eight-year contract with The\n\nHartford that began Jan. 1, 2002. The AARP insurance\n\nprogram with The Hartford is a model of affinity mar-\n\nketing and distribution savvy. AARP’s membership—\n\nthose age 50 and over—is the fastest-growing segment\n\nof the U.S. population. Computer use among this group\n\nis growing by an estimated 20 percent per year, and the\n\npopulation segment respects established brands and\n\nseeks value, convenience and extraordinary service.\n\nThat right combination of factors helps make\n\nAARP’s World Wide Web site one of The Hartford’s", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "10\n\nMeanwhile, in midtown Manhattan, The\n\nHartford’s negotiations for permanent offices—a\n\nprocess that normally takes 12 to 15 months—were\n\ncomplete.\n\nThe feverish pace was in some ways therapeutic.\n\nIt helped take people’s minds off the tragedy and the\n\nmonumental loss of life, including the lives of many\n\ngood friends and business colleagues at Aon, Marsh &\n\nMcLennan, Bank of America and Morgan Stanley—major\n\npartners of The Hartford with offices in the Twin Towers.\n\nLike many Americans watching the heroism of\n\nfirefighters, police and emergency crews, thousands of\n\nour employees asked, “How can we help?” Fortunately,\n\nthey found ways. Lots of them. Employees crowded\n\ninto bloodmobiles and dropped food and\n\nsupplies into overflowing bins. With the company’s\n\nmatch, employees also donated more than $700,000 to\n\nrelief efforts, and The Hartford provided a special tele-\n\nphone hotline for employees who needed counseling.\n\n“Focused resolve” is how New York-based\n\nRegional Vice President Brandon Hickey characterizes\n\nThe Hartford’s response. “It solidified in my mind how\n\nstrong the culture is at this company,” he says. “The\n\nemotional stress of Sept. 11 will be with us for a long\n\ntime. But as a tribute to the people who were there, we\n\ncame back as quickly as we did because we knew we\n\nhad a job to do, and we were committed to succeed.”\n\nBy early November—less than 60 days after the\n\nattack—The Hartford’s New York employees were in\n\ntheir new permanent offices at 2 Park Ave.\n\nNo less impressive—and certainly no less swift—\n\nwas The Hartford’s claims service during Sept. 11’s\n\naftermath. “Catastrophe Team”—CAT—adjusters were\n\non the ground within days, fulfilling obligations to poli-\n\ncyholders who suffered losses. As an example, The\n\nHartford advanced $1 million within 72 hours of the dis-\n\naster to help the Thacher, Proffitt & Wood law firm\n\nestablish temporary midtown Manhattan offices. All\n\nthe firm’s employees had evacuated the World Trade\n\nCenter’s south tower before everything in their offices\n\nwas destroyed. Within a week, Thacher, Proffitt & Wood\n\nwas back in business.\n\nThe Hartford assigned extra resources to expedite\n\nservice requests, and customers received premium\n\npayment extensions as needed. One adjuster wrote a\n\n$250,000 check on the spot to help a lower Manhattan\n\nsoftware-development company begin its recovery.\n\nCAT team members and call center customer service\n\nrepresentatives received special training to help them\n\ncope with traumatized customers, and the company\n\ndistributed disaster-recovery literature and forms to\n\nhelp customers get back to business.\n\nThe Hartford’s Group Benefits Division (GBD)\n\noffered crisis-counseling services to policyholders in", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "14\n\nmost dynamic sources of business growth. In 2001 the\n\ncompany’s link to AARP’s Web site accounted for much\n\nof the $55 million worth of auto business The Hartford\n\ngenerated over the Internet.\n\nBecause The Hartford quotes and issues this busi-\n\nness online (and added online billing in 2001), acquisi-\n\ntion and processing costs are 15 to 20 percent lower\n\nthan those of traditional direct-marketing or face-to-\n\nface sales. Because of this and other factors, the\n\nexpense ratio for AARP business is 30 percent below\n\nthat of the industry in general. And the customer\n\nrenewal rate is 96 percent, versus the industry’s 88 per-\n\ncent, making the AARP program yield some of the most\n\nprofitable auto business The Hartford writes.\n\nThe relationship also has The Hartford thinking\n\nahead toward new business and an even stronger rela-\n\ntionship with AARP members. The Hartford can cross-\n\nmarket auto insurance to homeowner’s customers and\n\nhomeowner’s insurance to auto customers, which\n\npresents a tremendous growth opportunity. In addition,\n\nThe Hartford is committed to providing value to AARP\n\nmembers in many ways. An example: The Hartford and\n\nAARP work with the MIT Age Lab to produce informa-\n\ntion—available in print and on both partners’ Web\n\nsites—advising AARP members about Alzheimer’s dis-\n\nease and other forms of dementia as they affect driving\n\nability. The information guides caregivers struggling\n\nwith difficult decisions about family members’ safety\n\nbehind the wheel. The resource—a customer solution\n\nlike no other—helps enhance the superior value The\n\nHartford provides to AARP members.\n\nAlthough it’s the most comprehensive, the AARP\n\nrelationship isn’t The Hartford’s only affinity program.\n\nThe company also has affinity arrangements with\n\nUSAA and other companies. Regardless of the pro-\n\ngram’s size, the affinity partners share the right quali-\n\nties: strong name-brand recognition, first-class\n\nmarketing and a broad and loyal customer base.\n\nIn other words, they share some of The Hartford’s\n\ncore attributes.", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "9\n\n**T** he worst of 2001 brought out the best in The\n\nHartford’s people.\n\nAs the world watched the horrors of Sept. 11,\n\nsome 330 of our New York employees fled their offices\n\nin 7 World Trade Center. Though many were caught in\n\nthe debris and dust from the nearby Twin Towers, all\n\nescaped safely.\n\nBy the time the 47-story 7 World Trade Center\n\nbuilding collapsed at about 5:20 p.m., The Hartford had\n\nalready arranged for temporary space in several of the\n\ncompany’s other offices. Employees and suppliers\n\nimmediately began working around the clock to get\n\nthe business up and running again. Despite the\n\ndestruction, back-up systems kept distributors’ and\n\ncustomers’ data secure.\n\nA hundred miles from Ground Zero, home office\n\nemployees in Hartford, Conn., began shuttling equip-\n\nment and supplies to our temporary offices. Some\n\nbooked Long Island Sound ferries from Connecticut to\n\nLong Island within 48 hours of the attack. Others spent\n\nthe weekend driving supplies to the new locations so\n\nemployees could concentrate on customers instead of\n\non finding pens and paper. Employees and suppliers\n\nwere determined to get the company, its distributors\n\nand its customers through the crisis.\n\nBy Monday, Sept. 17, all of The Hartford’s business\n\nunits in New York were serving customers again.\n\nEmployees had new furniture, phones, servers and PCs.\n\nDistributors’ and customers’ access to company e-mail\n\nwas never interrupted. Calls to old phone numbers were\n\nrerouted to cell phones or new office phones. Print and\n\nradio ads—along with The Hartford’s Web site—\n\ngave customers instructions for filing claims quickly.\n\nCustomer relationships were stronger than ever. The\n\nHartford Experience—customer solutions, ease of doing\n\nbusiness and extraordinary service—was never better\n\ndemonstrated.\n\n### *people*", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "18\n\nIntermediary Service Award and the first-ever Life\n\nInsurance Service Award. The triple win reflected the\n\noverall excellence of The Hartford’s service, a natural\n\ncomplement to the company’s quality products. DAL-\n\nBAR also recognized The Hartford’s mutual funds as the\n\nindustry leader in several categories, including invest-\n\nment management.\n\nIn managing its product portfolio, The Hartford fol-\n\nlows its own advice: think ahead and diversify. The com-\n\npany’s earnings base derives from a variety of\n\nbusinesses. Diversification is a key element in managing\n\nrisk and ensuring profitability—a time-tested philosophy\n\nthat held especially true in 2001, as the company’s other\n\nbusinesses evolved to anticipate changing market\n\ndemands and to offer protection from new risks.\n\nThe property-casualty Business Insurance group,\n\nfor example, extended its coverage to include common\n\nrisks associated with e-commerce. Hartford Financial\n\nProducts’ (HFP) coverage continued to meet emerging\n\nrisks in an extremely volatile business environment.\n\nThe Hartford helped customers manage risk by\n\ndeveloping a new category of commercial coverage\n\ncalled CyberFlex. TM This targets the previously unmet\n\nneeds of small and mid-sized businesses that are inte-\n\ngrating the Internet and other communications tools\n\ninto their regular operations.\n\nA 2001 survey by The Hartford revealed that 80\n\npercent of small and mid-sized businesses weren’t sure\n\nif their current insurance policies covered specific—and\n\nincreasingly common—risks such as e-mail viruses,\n\nWeb site business interruption and online copyright\n\ninfringement. CyberFlex coverage protects middle-mar-\n\nket and small-business policyholders against the risk of\n\nthose potentially debilitating conditions.\n\nCyberFlex is part of a broad array of industry-\n\nspecific coverages in The Hartford’s SPECTRUM ® busi-\n\nness-owner’s policy, including protection against\n\nemployment practices liability, equipment breakdown\n\nand business interruption. As the economic environ-\n\nment changes rapidly, The Hartford thinks ahead by\n\nproviding those flexible coverages. And the company’s", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "3\n\nIt would be difficult to imagine a more tumultuous year than 2001. But if one major test of\n\na company’s character is its performance in the face of extreme adversity, The Hartford\n\naced that test.\n\nSuccessfully managing our company through a turbulent stock market and the begin-\n\nning of a recession was challenge enough through the first eight months of the year.\n\nThen came the morning of Sept. 11. What followed, in retrospect, almost made those\n\n“normal” challenges seem like child’s play.\n\nNone of us will ever forget where we were when we heard the shocking news. I had just\n\nstopped at the home of Stuart Carlisle, The Hartford’s director of investor relations. We were on\n\nour way to an analysts’ meeting in Manhattan, but that meeting, of course, never took place.\n\nWith our eyes glued to the horrific events unfolding on television, our thoughts turned\n\nimmediately to our 330 employees in 7 World Trade Center and our partners at Aon, Marsh &\n\nMcLennan, Bank of America and Morgan Stanley, who had offices in the Twin Towers.\n\nAs you’ll read in this report, we were profoundly thankful that all of our people sur-\n\nvived the devastation. Our New York offices were back up and running within a week, thanks\n\nto a superb group of people I’m proud to call our employees. Tragically, not all our partners\n\nwere as fortunate. Many of us lost friends, relatives or long-time business colleagues.\n\nIt’s almost a cliché now, but that morning changed our lives. Entire industries, includ-\n\ning the financial services industry, will feel its effects for many years.\n\nSept. 11 also taught us some harsh business lessons. There are suddenly new risks in\n\ninsuring large sections of neighborhoods filled with top-quality office buildings. Horribly, we\n\nhave to alter our view of workers’ compensation risks, even for employers in low-risk pro-\n\nfessions, like accountants and attorneys.\n\nBut even with all that, we know one thing didn’t change on Sept. 11: a determination,\n\nbacked by 190 years of experience, to run The Hartford’s business the right way. The right\n\nway means always thinking ahead and doing the things that ensure we have the unshake-\n\nable financial strength to pay over $1.2 billion in gross losses (before taxes and reinsurance)\n\nrelating to Sept. 11. In a broader context, it means taking the long-term view and sticking to\n\n###### Dear Fellow Shareholders,", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HIG_2001.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed11.pdf", - "query": "Regarding climate change, to what corresponds the \"average length of flood events ?", - "target_page": 11, - "target_passage": "The average length of flood events (number of days in which the cumulative daily rainfall excess is positive, compared to the 95th percentile of the baseline", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "issues and re-constructing them di ff erently. By comparing the persistent words used related to the two\n\ndiscourses in the 10-year period in Table 2 , we think that global warming showed a relative preference\n\ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change”\n\nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”.\n\nStudies have suggested that the public shows a preference for scientific publications with general\n\nkeywords compared with those with complicated scientific jargon [ 47 ], lacking a deep understanding of\n\nthe complicated issue [ 46 ] and the necessity for mitigation of the climate issue [ 47 ]. These conclusions\n\nseem to suit global warming more than climate change according to the current study, which is\n\nprobably because climate change receives more publicity and recognition than global warming in the\n\nscientific community. In the association network shown in Figure 2 , global warming was found to be\n\nmore connected with temperature abnormalities. This finding is in accordance with studies reporting\n\nthat short-term temperature anomalies [ 87 ] can increase the public’s belief about global warming by\n\nincreasing the understanding of this abstract issue [ 88 ], although scientists mostly make judgments\n\nbased on long-term weather statistics [ 89 ]. However, none of the four words, “snow”, “summer”,\n\n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes\n\nlist of the climate change network.\n\nEven when climate change and global warming shared concern about similar topics such as the\n\ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas\n\nclimate change preferred a more in-depth perspective, highlighting the importance of global action\n\nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to\n\ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long\n\nbeen regarded as two key reasons for low climate concern [ 90 ], the two terminologies’ di ff erences\n\nin connotations suggest that introducing these absent sub-topics into global warming discourse or\n\nhighlighting climate change for its inherent connotations may help communicators raise public concern\n\nabout climate.\n\n#### 5.1.2. Political Connotations\n\nStudies noted that frame preference between climate change and global warming reflects\n\nindividuals’ ideological spectrum, where climate change and global warming were favored by\n\nthe liberals and conservatives, respectively [ 10 ]. The cluster analysis of the semantic network in the\n\ncurrent study demonstrated that global warming triggered far more political responses than climate\n\nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored\n\nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes\n\nof the global warming discourse, but neither was included in the list of top nodes of the climate change\n\ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used\n\nby conservatives to question the reality of climate issue [ 11 ] and climate change is more commonly\n\nadopted when discussing action against the climate change issue [ 5 ], global warming had a stronger\n\npolitical connotation in public discussion.\n\n#### 5.1.3. Discourse Structure\n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action”\n\nrepresented the themes of the three largest clusters in the network. However, three popularly recurring\n\nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters\n\nabove, but formed another small tight cluster together, sitting in the most central part of the semantic\n\nnetwork, as shown in Figure 2 b. As each of the three hashtags can almost represent one sub-theme of", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "**2** Model Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration\n\nscenario. To provide more detailed representations of climate processes and impacts, the\n\nspatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution\n\nthan the CMIP5 models. We used a set of impacts-relevant indices and a global land surface\n\nmodel to examine the projected changes in weather extremes and their implications for\n\nfreshwater availability and vulnerability to food insecurity. Uncertainties in regional climate\n\nresponses are assessed, examining ranges of outcomes in impacts to inform risk assessments.\n\nDespite some degree of inconsistency between components of the study due to the need to\n\ncorrect for systematic biases in some aspects, the outcomes from different ensemble members\n\ncould be compared for several different indicators. The projections for weather extremes\n\nindices and biophysical impacts quantities support expectations that the magnitude of change\n\nis generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with\n\nincreases being more intense than seen in CMIP5 projections. Precipitation-related extremes\n\nshow more geographical variation with some increases and some decreases in both heavy\n\nprecipitation and drought. There are substantial regional uncertainties in hydrological impacts\n\nat local scales due to different climate models producing different outcomes. Nevertheless,\n\nhydrological impacts generally point towards wetter conditions on average, with increased\n\nmean river flows, longer heavy rainfall events, particularly in South and East Asia with the\n\nmost extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global\n\nwarming. Some areas are projected to experience shorter meteorological drought events and\n\nless severe low flows, although longer droughts and/or decreases in low flows are projected\n\nin many other areas, particularly southern Africa and South America. Flows in the Amazon\n\nare projected to decline by up to 25%. Increases in either heavy rainfall or drought events\n\nimply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this\n\nvulnerability is projected to remain smaller than at 2°C global warming in approximately 76%\n\nof developing countries. At 2°C, four countries are projected to reach unprecedented levels of\n\nvulnerability to food insecurity.\n\nThis article is part of the theme issue ‘The Paris Agreement: understanding the physical and\n\nsocial challenges for a warming world of 1.5°C above pre-industrial levels’.\n\n## 1. Introduction\n\nThe majority of climate-change impacts assessments have tended to be framed in terms of future\n\ntime horizons, e.g. impacts by the middle or end of the twenty-first century [ 1 , 2 ]. However,\n\nwith international climate policy now largely focused on limiting warming to specific levels of\n\nglobal mean temperature such as 2°C [ 3 ] or 1.5°C [ 4 ], policy-relevant climate impacts assessments\n\nincreasingly need to be framed in terms of such warming levels.\n\nThere are two major research questions concerning the impacts of climate change at 1.5°C and\n\n2°C global warming, which are relevant to both mitigation and adaptation policy areas.\n\n(i) How much larger are the impacts at 2°C compared to 1.5°C? This is the primary question\n\narising from the Paris Agreement [ 4 ] and is relevant to mitigation policy, informing\n\njudgements and actions on holding the global temperature rise to ‘well below 2°C’ and\n\n‘pursuing efforts to limit the temperature increase to 1.5°C’.\n\n(ii) What regional climate conditions and related hydrological and ecological conditions\n\ncould occur at a particular level of global warming, such as 2°C? This is relevant to\n\nadaptation policy and planning—exploring the possible outcomes for these levels of\n\nwarming will help facilitate adaptation and improved resilience to account for a 1.5°C or", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "**25** A detailed investigation of these factors is beyond the scope of this paper; nevertheless, this\n\nresult illustrates the important point that the nature and patterns of the climate forcing at a\n\nparticular level of global warming can play an important role in determining the patterns of\n\nregional impacts.\n\n## 5. Conclusion\n\nThe higher-resolution HadGEM3 simulations project consistent increases in temperature-related\n\nextremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the\n\nglobal annual mean. There is a higher degree of spatial variation in our projections compared\n\nwith CMIP5-based studies.\n\nIn the model projections examined here, changes relating to the water cycle are complex, both\n\nin their geographical pattern and in the variation between different models. The length of flooding\n\nevents generally increases across world in all models, but maximum rainfall can either increase or\n\ndecrease depending on locations. Global patterns of increase and decrease show some consistency\n\nbetween the different GWLs, but also some local differences. Worldwide, most impacts broadly\n\ntend to increase with global warming in most areas. For global mean changes, even when the sign\n\nof change is uncertain, individual realizations generally show reduced impact at 1.5°C compared\n\nwith 2°C. However, this does not always hold even at the scale of major global river basins.\n\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in\n\napproximately three-quarters of countries assessed. The vulnerability increase can arise from\n\nincreases in either flooding or drought. Reduced drought leads to decreased vulnerability in a\n\nlimited number of cases.\n\nMost simulations here project a general increase in mean streamflow in most of the basins\n\nexamined, but with a number of notable exceptions in the tropics. While flows in the Ganges are\n\nconsistently projected to increase by 30- 110% at 2°C, Amazon flows could either increase by 3%\n\nor decrease by 25%. Ensemble-mean changes in river flow often do not give a full impression of\n\nthe magnitude of changes that may be possible, so adaptation planning in particular should not\n\nrely on ensemble-mean projections and instead consider a range of outcomes. The seasonal low\n\nstreamflows also increase in many basins, but not as many as for the mean flows—many basins\n\nsee decreased low flows in some or all projections.\n\nBroadly, changes in weather extremes at 1.5°C global warming could be estimated by scaling-\n\nback the impacts at 2°C, if this is done with individual ensemble members rather than the\n\nensemble mean. However, this was not always the case for impacts that depend on more complex\n\nprocess or interactions between more than one climate variable, such as run-off and an indicator\n\nof vulnerability to food insecurity.\n\nData accessibility. This article has no additional data.\n\nCompeting interests. We declare we have no competing interests.\n\nFunding. This research received funding from the European Union Seventh Framework Programme FP7/2007-\n\n2013 under grant agreement no. 603864 (HELIX: ‘High-End cLimate Impacts and eXtremes’; www.\n\nhelixclimate.eu ). The work of R.A.B., C.B., J.C., L.G., K.L. and K.R. was additionally supported by the Joint\n\nUK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101).\n\nAcknowledgements. The authors thank Ed Pope, Jason Lowe and Dann Mitchell for advice and discussion,\n\nAlissa Haward and Maria Pearce for project management and administration of HELIX, and two anonymous\n\nreviewers whose comments substantially improved the paper.\n\n## References\n\n1. IPCC. 2014 Summary for policymakers. In *Climate change 2014: impacts, adaptation, and*\n\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n\n*Assessment Report of the Intergovernmental Panel on Climate Change* (eds CB Field *et al* .), pp.\n\n1- 32. Cambridge, UK: Cambridge University Press.", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed11.pdf" - }, - { - "text": "evokes di ff erent public cognitive responses, where global warming“indicates heat-related impacts,\n\nhuman causes, increased UV light penetration, ozone depletion, and the greenhouse e ff ect, whereas\n\nclimate change is more associated with a wide range of influences on climate, including drought and\n\nagriculture [ 9 ]. An N-gram analysis suggested that global warming showed a closer connection with\n\nice, snow, and sea, whereas climate change was always connected with scientific investigations, such as", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "studies have noticed that the Maya inscription about doomsday, which seemed rather ridiculous for\n\nscientists, might lead to unexpected public associations with climate issues. However, science fiction\n\nmay influence the public’s attitude toward scientific issues. Frankenstein’s monster, a well-known\n\nfictional character who was a human-built creature in the novel written by Mary Shelley, has long been\n\nlinked to transgenic technology by referring genetically-modified food as “Frankenstein Food” [ 98 ].\n\nScientists found that these associations successfully symbolized the the public’s uncertainty about the\n\nrisk of transgenic technology, anxiety toward the human-made living creature, and moral discomfort\n\nabout reducing life to genetic code [ 99 ], even though people all know Frankenstein was only a fictional\n\ncharacter created 100 years ago. In the current study, we concludd that a similar mechanism may exist\n\nin global warming communication. Though “the end of world in 2012” and its adapted popular movie\n\nsounded unconvincing for scientists, the public, especially who have limited scientific literacy, were\n\ndefenceless against fiction [ 100 ]. Some of the public may accept the indications of temperature rise and\n\nextreme weather, and cannot help but strengthen their associations with global warming. However, no\n\nsimilar associations were discovered in the climate change discourse in 2012, which may suggest that\n\nglobal warming is more likely to be associated with disasters, risk, or negative sentiment compared\n\nwith climate change.\n\n### *5.3. Discrepancy between the Two Discourses*\n\nThe status of the two discourses varied significantly in the more recent years in the study period.\n\nData from Google in prior study suggested that the search record for global warming was larger\n\nthan that of climate change in earlier times [ 13 ]. The authors found that in the battle to be the most\n\nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and\n\nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange\n\nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute\n\ndimensions. Comparatively, the popularity of the global warming discourse among social media\n\nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when\n\nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse\n\ntoward climate change from global warming may be attributed to the high exposure of climate change\n\nin the media and scientific reports in recent years [ 13 ]. Previous studies noted that perceived scientific\n\nconsensus can increase acceptance of science [ 101 ]. Though global warming has been commonly used\n\nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to\n\nrefer a range of complex changes of climate [ 102 ]. Pew found science-related accounts draw millions\n\nof followers on Facebook and volume of posts they released climbed in past years [ 103 ]. Climate\n\nscientists are found to be opinion makers on Twitter [ 104 ]. As social media has become an emerging\n\nplatform for science popularization, scientific community might contribute to the prevalence of climate\n\nchange discourse by talking about climate change facts and mitigating measures [ 75 ].\n\nHowever, di ff erences between two discourses were not eliminated. Even though two discourses\n\nshowed more similarities in the rank order of key concepts, the QAP analysis of two matrices of\n\nsemantic network showed that two discourses still embody distinct public perceptions of climate issues\n\nby associating these hashtags in di ff erent manners.\n\nTo be specific, although “ipcc”, “cop”, and “un” were mentioned in both discourses (yellow\n\nin Figures 3 and 4 ) in earlier years, the clusters to which they belonged had significantly di ff erent", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed10.pdf" - }, - { - "text": "7. Caitlyn Kennedy, R.L. What’s the Di ff erence between Global Warming and Climate Change? 2015. Available\n\nonline: https: // www.climate.gov / news-features / climate-qa / whats-di ff [erence-between-global-warming-and-](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change)\n\n[climate-change](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change) (accessed on 10 October 2019).\n\n8. Pachauri, R.K.; Allen, M.R.; Barros, V.R.; Broome, J.; Cramer, W.; Christ, R.; Church, J.A.; Clarke, L.; Dahe, Q.;\n\nDasgupta, P.; et al. *Climate Change 2014: Synthesis Report. Contribution of Working Groups I, II and III to the Fifth*\n\n*Assessment Report of the Intergovernmental Panel on Climate Change* ; IPCC: Geneva, Switzerland, 2014.\n\n9. Whitmarsh, L. What’s in a name? Commonalities and di ff erences in public understanding of “climate\n\nchange” and “global warming”. *Public Underst. Sci.* **2009** , *18* , 401- 420. [ [CrossRef](http://dx.doi.org/10.1177/0963662506073088) ]\n\n10. Shehata, A.; Hopmann, D.N. Framing climate change: A study of US and Swedish press coverage of global\n\nwarming. *Journal. Stud.* **2012** , *13* , 175- 192. [ [CrossRef](http://dx.doi.org/10.1080/1461670X.2011.646396) ]\n\n11. Schuldt, J.P.; Roh, S. Of accessibility and applicability: How heat-related cues a ff ect belief in “global warming”\n\nversus “climate change”. *Soc. Cogn.* **2014** , *32* , 217- 238. [ [CrossRef](http://dx.doi.org/10.1521/soco.2014.32.3.217) ]\n\n12. McCright, A.M.; Dunlap, R.E. Challenging global warming as a social problem: An analysis of the conservative\n\nmovement’s counter-claims. *Soc. Probl.* **2000** , *47* , 499- 522. [ [CrossRef](http://dx.doi.org/10.2307/3097132) ]\n\n13. Lineman, M.; Do, Y.; Kim, J.Y.; Joo, G.J. Talking about climate change and global warming. *PLoS ONE* **2015** ,\n\n*10* , e0138996. [ [CrossRef](http://dx.doi.org/10.1371/journal.pone.0138996) ]\n\n14. Anderson, J.R. *The Architecture of Cognition* ; Psychology Press: London, UK, 2013.\n\n15. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of tra ffi c anomalies based on human mobility\n\nand social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in\n\nGeographic Information Systems, Orlando, FL, USA, 5- 8 November 2013; pp. 344- 353.\n\n16. Rogstadius, J.; Vukovic, M.; Teixeira, C.A.; Kostakos, V.; Karapanos, E.; Laredo, J.A. CrisisTracker:\n\nCrowdsourced social media curation for disaster awareness. *IBM J. Res. Dev.* **2013** , *57* , 4:1- 4:13. [ [CrossRef](http://dx.doi.org/10.1147/JRD.2013.2260692) ]\n\n17. Leetaru, K.; Wang, S.; Cao, G.; Padmanabhan, A.; Shook, E. Mapping the global Twitter heartbeat: The\n\ngeography of Twitter. *First Monday* **2013** , *18* . [ [CrossRef](http://dx.doi.org/10.5210/fm.v18i5.4366) ]\n\n18. Kirilenko, A.P.; Molodtsova, T.; Stepchenkova, S.O. People as sensors: Mass media and local temperature\n\ninfluence climate change discussion on Twitter. *Glob. Environ. Chang.* **2015** , *30* , 92- 100. [ [CrossRef](http://dx.doi.org/10.1016/j.gloenvcha.2014.11.003) ]\n\n19. Gamson, W.A.; Modigliani, A. Media discourse and public opinion on nuclear power: A constructionist\n\napproach. *Am. J. Sociol.* **1989** , *95* , 1- 37. [ [CrossRef](http://dx.doi.org/10.1086/229213) ]\n\n20. Entman, R.M. Framing: Toward clarification of a fractured paradigm. *J. Commun.* **1993** , *43* , 51- 58. [ [CrossRef](http://dx.doi.org/10.1111/j.1460-2466.1993.tb01304.x) ]\n\n21. McCombs, M.; Llamas, J.P.; Lopez-Escobar, E.; Rey, F. Candidate images in Spanish elections: Second-level\n\nagenda-setting e ff ects. *Journal. Mass Commun. Q.* **1997** , *74* , 703- 717. [ [CrossRef](http://dx.doi.org/10.1177/107769909707400404) ]", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - }, - { - "text": "**3** A combination of the above questions is also relevant—how does the range of outcomes at 2°C\n\ncompare to that at 1.5°C? This is also relevant to adaptation policy, as it can inform assessment on\n\nwhether to adapt to potential impacts at 2°C or just 1.5°C. Putting in place adaptation measures\n\nto deal with potential impacts at 1.5°C and then increasing these to deal with 2°C later may\n\nbe more expensive and difficult than adapting to potential risks at 2°C at the outset. On the\n\nother hand, because adaptation actions may themselves have consequences, unnecessary over-\n\nadaptation may have undesirable effects which it may be preferable to avoid or at least delay\n\nuntil absolutely necessary.\n\nBoth questions require an appropriate assessment of uncertainty. There are considerable\n\nuncertainties in projections of regional climate change, with different climate models projecting\n\nregional climate changes that can differ in magnitude or even, in the case of precipitation\n\nand impacts quantities strongly related to this, differ in sign [ 5 , 6 ]. This may have important\n\nimplications for regional impacts at specific levels of global warming. A common approach to\n\nexploring and presenting such uncertainties is to examine the ensemble mean and the level of\n\nconsensus among the ensemble members on the sign of the change. While this can often be useful\n\nin informing an assessment of the level of confidence in future projections, it may not always be\n\nsufficient to fully inform decisions. Risk assessment approaches require consideration of a range\n\nof possible risks, not just the most likely. This paper explores a range of regional climate states\n\nand related impacts that occur at global warming of 2°C, and a range of differences with warming\n\nlimited to 1.5°C.\n\nWe examine the implications of our new climate projections by applying some commonly\n\nused indices of climate extremes, and a further index quantifying relative vulnerability to food\n\ninsecurity which combines climate extremes indices with information on a range of factors\n\nrepresenting sensitivity and adaptability of food systems to climate hazards. We also use the\n\nclimate projections to drive a global land surface model to simulate changes in run-off as\n\nan indicator of freshwater availability. We assess whether regional extremes are projected to\n\nincrease or decrease at 2°C global warming, and whether the consequent impact on drought and\n\nvulnerability to food insecurity become greater or smaller. We also assess whether these changes\n\nare reduced by limiting global warming to 1.5°C. We explore some of the uncertainties in these\n\nprojections, and, in particular, examine whether the use of ensemble-mean projections is a useful\n\nsimple guide to impacts projections or whether this can lead to a misleading impression for some\n\nimpacts. Regarding vulnerability to food insecurity, we consider the impacts of global warming\n\nat 1.5°C and 2°C alongside socio-economic influences that affect the sensitivity to climate change.\n\nWe also consider our climate-change impacts results in comparison with other studies using older,\n\nlower-resolution climate projections.\n\nA large number of previous studies have assessed potential impacts of future climate change\n\nusing the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [ 7 ],\n\nand some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [ 8 , 9 ]. We\n\nalso base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere\n\nmodel to provide greater spatial detail and improved representation of atmospheric processes.\n\n## 2. Methods and models\n\n### (a) Global climate simulations at 1.5 ° C and 2 ° C global warming\n\nThere are a number of ways in which 1.5°C or 2°C global warming can be defined—one could\n\nbe the long-term climate state following a stabilization of warming at that level, another could", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" - }, - { - "text": "**7** In the present study, processing errors in the input data for one ensemble member, the\n\nHadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the\n\nHCVI are, therefore, not presented here.\n\n### (d) Freshwater resources: run-off\n\nImpacts on freshwater were assessed with a version of the JULES land surface model [ 24 , 25 ], a\n\ncoupled ecosystem- hydrology- surface exchange model which simulates land-atmosphere fluxes\n\nof water, energy and carbon in an internally consistent way, typically applied at global scales.\n\nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System\n\nModels [ 26 , 27 ] and have been used to assess impacts of climate change on global terrestrial\n\necosystems and hydrology [ 28 - 30 ] within such models. JULES can also be used outside of the\n\nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of\n\na wider range of climate projections [ 6 , 8 ]. Here we use a new, higher-resolution configuration of\n\nJULES on a global grid of 0.5° resolution [ 31 ].\n\nIt has been noted that hydrological impacts models driven by climate-change projections\n\nfrom climate models tend to give more severe drying than simulated in the climate models\n\nthemselves [ 32 - 34 ]. This is largely attributed to the inclusion of plant stomatal closure in\n\nresponse to elevated CO 2 in the climate model land surface schemes, which generally reduces\n\nevapotranspiration relative to climate projections without this process and hence further increases\n\nrun-off/streamflow or ameliorates decreases [ 34 ]. This process is often omitted from standard\n\nhydrological models. Plant physiological responses to CO 2 are included in the JULES model, so\n\nour projections of changes in run-off here do account for this process.\n\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to\n\nthe effects of climate change and CO 2 rise on precipitation, evaporation and transpiration. We\n\nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to\n\npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for\n\nthe lowest 10% of time).\n\n### (e) Correctingbiasesinclimatemodeloutputandimplicationsfordefininglevelsofglobal\n\nwarming\n\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed\n\nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there\n\nwere some differences in how these data were applied, with different approaches to the treatment\n\nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered\n\nimportant to assess changes in the raw climate model output, because this directly represents\n\nthe behaviour of the model itself. The main focus was on the changes relative to the present-\n\nday baseline climate, defined as 1981- 2010, with absolute values in either the baseline or the\n\nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off\n\nanalyses, however, it was considered important to correct for systematic biases in the climate\n\nmodel output, because these can lead to unrealistic representations of the key quantities in the\n\npresent-day simulation [ 35 ]. A bias-correction methodology was, therefore, applied for these two\n\nparts of the analysis, whereby the model output was adjusted to make it consistent with an\n\nobserved climatology [ 36 ]. We used a multi-segment statistical bias-correction methodology for\n\nprecipitation [ 37 ], and a modification of this for other variables [ 37 ].\n\nThis difference in approach led to inconsistencies in the definitions of the dates of GWLs\n\nin the two parts of the study. In the extremes analysis using raw model output, the dates of\n\npassing GWLs were defined on the basis of the global mean temperatures in the driving CMIP5", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "In the global warming network, politics was the second-largest discourse cluster (20% of the\n\nnetwork), where “tcot”, short for “Top Conservatives on Twitter”, was the node ranked highest,\n\nand “p2”, short for “Progressives 2.0”, is also included. Several political figures, such as Obama and Al\n\nGore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster\n\n(16%), including both domestic e ff orts, such as “us”, “trump”, “climatechangeisreal”, “climateaction”,\n\nand “epa”, and two international items, like “china” and “india”. The fourth cluster (in blue) referred\n\nto emissions, including hashtags like “co2”, “green”, and “carbon”. The smallest cluster (8%) was\n\ncomposed of “snow”, “winter”, “heatwave”, and “summer”, referring to the temperature abnormalities\n\non the earth.\n\n### *4.3. Temporal Analysis of the Associations in the Two Discourses*\n\nThe online presentations of the climate change and global warming discourses are dynamic.\n\nAs shown in Table 2 , for the global warming discourse, 11 key concepts remained in the top 50 central\n\nhashtags each year for all 10 years, with 16 for the climate change”discourse. By comparing the 11\n\nnodes of the global warming discourse and the 16 nodes of the climate change discourse, we found that\n\nthe two lists shared nine concepts. We found “pollution” and “earth” were unique to the keyword list\n\nof the global warming discourse, and “economy”, “water”, “china”, “coal”, “solar”, “sustainability”,\n\nand “food” only occurred on the critical list for the climate change discourse.\n\n**Table 2.** Hashtags that remained on the top 50 list for the climate change or the global warming\n\ndiscourse from 2009 to 2018.\n\n**Unique Shared**\n\n#climatechange china, solar, water, food, economy, coal, sustainability co2, news, carbon, green, climate,\n\n#globalwarming pollution, earth us, energy, science, environment\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period,\n\nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies\n\nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary\n\nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more\n\nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of\n\nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the\n\n10 years, as shown in Figure 5 .\n\nFigure 3 depicts the associations of hashtags in the climate change discourse for each year\n\nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the\n\nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg”\n\n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global\n\nactions cluster (in yellow) because these hashtags were frequently used in the global action context and\n\nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags,\n\nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental\n\nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change),\n\nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political\n\nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political\n\nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining\n\n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of\n\nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased\n\nin the last two years of the period according to Figure 5 a.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "lead to some degree of inconsistency between the analysis of the ClimPACT extremes and the\n\nHCVI and JULES impacts projections.\n\n## 3. Results\n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the\n\nlevel of agreement between models for a particular projected change, and hence an indication\n\nof potential robustness of the projected changes for informing adaptation. We then make a\n\ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would\n\nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in\n\nregional climate outcomes, we address this in a number of ways. For individual realizations, we\n\ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C,\n\neven if the sign of the change is uncertain. We also compare the range of outcomes at different\n\nGWLs, to see if the regional-scale uncertainty itself increases with global warming.\n\n### (a) Climate-change impacts at 2 ° C global warming\n\nFor 2°C global warming, the ensemble-mean increase in annual daily maximum temperature was\n\nabove 2°C for most of the land surface, with the exception of the Indian subcontinent, most of\n\nAustralia and Antarctica ( figure 2 ). The increase was higher still in many regions; most of North\n\nAmerica, much of China and north Asia, northwestern South America and all of Europe. In the\n\nnorthern and eastern USA and much of northern and western Europe, the annual daily maximum\n\ntemperature increased by over 4°C for 2°C global warming. The global mean TXx increased by\n\nmore than 2°C in all ensemble members ( table 5 ), so the maximum temperature warming more\n\nthan the global annual mean is a consistent result across all projections here, as found in previous\n\nstudies with other models [ 9 ] ( table 5 ).\n\nThe different ensemble members give somewhat different results at regional scales, although\n\nthere is a strong consensus on the temperature extremes examined here becoming warmer. In\n\nthe simulations driven by SSTs and SICs from the two IPSL CMIP5 models, most of the global", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed11.pdf", - "query": "What is the projected situation of India regarding HCVI (Hunger and Climate Vulnerability Index)?", - "target_page": 12, - "target_passage": "India is projected to see increased HCVI by all ensemble members, due to a consistent increase in length of flood events projected in all members, outweighing the beneficial impact of decreased length of drought which is again projected in all members", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "HCVI which makes use of gridded climate model projections to understand the impact of climate\n\nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios\n\nof adaptation investment [ 23 ]. This iteration of the HCVI only considers in-country production\n\nof food and does not account for food trade. For this reason, the HCVI is only calculated for\n\n122 developing and least-developed countries (defined here as countries not in the OECD or EU\n\nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km 2 ).\n\nThe index provides quantification at the national level across the globe of the scale and\n\ndirection of impact of climate change on food insecurity. As such, it aims to provide the following:\n\n(i) information to help policy-makers understand the level of challenge to global food security that\n\nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the\n\nrelative benefits of mitigation and adaptation responses.\n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the\n\nnature of the top-level threat to food insecurity that climate change presents, thereby supporting\n\nprioritization of effort.\n\nThe HCVI consists of three equally weighted components: exposure to climate-related hazards,\n\nsensitivity of national agricultural production to climate-related hazards, and adaptive capacity—\n\na measure of a country’s ability to cope with climate-related food shocks. The sensitivity and\n\nadaptive capacity components are based on data from the World Bank, World Resources Institute,", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "**14**\n\nACCESS1-0\n\n- 1.00 - 0.75 - 0.50 - 0.25 0 0.25 0.50 0.75 1.00\n\nIPSL-CM5A-LR\n\nensemble mean\n\nchange in vulnerability to food insecurity\n\nIPSL-CM5A-MR MIROC-ESM-CHEM\n\nGFDL-ESM2M\n\n**Figure 8.** Change in Hunger and Climate Vulnerability Index relative to baseline calculated for simulated climate states at 2 ° C\n\nglobalwarming,forfiveindividualHadGEM3simulationsdrivenbySSTsandSICsfromdifferentmembersoftheCMIP5ensemble,\n\nand the ensemble mean.\n\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher\n\nthan any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen.\n\nThe implication of such HCVI values is that climate change at 2°C is projected to cause levels\n\nof vulnerability to food insecurity that are greater than any seen in the present day. For\n\nindividual ensemble members, the number of countries with ‘unprecedented’ HCVI values at\n\n2°C varies from three to seven. Conversely, many countries in the baseline climate have levels\n\nof vulnerability to food insecurity that are greater than those expected in other countries under\n\n2°C global warming. This suggests that other factors are already posing greater risk for food\n\ninsecurity than 2°C climate change is expected to cause in other countries, so the increased risk\n\nfrom climate change should not overshadow the need to reduce vulnerability to food insecurity\n\narising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by\n\naddressing various socio-economic issues in such counties.\n\nThe JULES simulations show a general tendency towards increased run-off over\n\napproximately half of the land surface ( figure 9 ) and the majority of the major river basins\n\nassessed ( figure 10 ), but with large regional uncertainties including the possibility of decreased\n\nflows in many basins. The ensemble-mean change in mean streamflow shows an increase of\n\nbetween 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing\n\nan increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and\n\nsouthcentral USA, which see less than a 5% change in run-off, and the already very dry region of\n\nthe Sahara Desert where the existing very small run-off become even smaller.\n\nEnsemble-mean projected changes in low run-off flows are generally larger ( figure 11 ), with\n\nthe regions seeing an increase in mean run-off seeing a larger percentage increase in low\n\nrun-off—over 75% increases over much of North America, Eastern Europe and Asia. Note that\n\nthis does not necessarily imply a larger increase in absolute low flow compared to absolute mean\n\nflow, because the baseline is (by definition) smaller for low flows. In western Europe, where the\n\nchanges in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed11.pdf" - }, - { - "text": "**12** ensemble mean\n\nIPSL-CM5A-LR GFDL-ESM2M\n\n- 20 - 10 0 10 20\n\nmm\n\nHadGEM2-ES\n\nIPSL-CM5A-MR MIROC-ESM-CHEM ACCESS1-0\n\n**Figure 5.** Simulated changes in the annual maximum rainfall over 5 days relative to 1981- 2010, at 2 ° C global warming, for\n\nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble\n\nmean. The labels above each panel identify the driving CMIP5 model (or ensemble mean).\n\n2°C, although the geographical variation is still dominated by the non-climatic factors ( figure 7 ).\n\nTherefore, the ensemble-mean change is a reasonable guide to the results.\n\nThe ensemble mean is higher in nearly all assessed countries relative to the baseline ( figure 8 ).\n\nThe greatest increase was in Oman, followed by India, Bangladesh and Saudi Arabia, then Brazil\n\nand a number of its neighbouring countries. Smaller increases in HCVI were seen across Africa.\n\nSoutheastern Africa showed larger increases than Central Africa. The HCVI decreased in three\n\ncountries: Mali, Burkino Faso and Sudan.\n\nThe ensemble members showed broadly consistent changes in HCVI at 2°C global warming,\n\nwith increases in most assessed countries and generally similar sets of countries experiencing the\n\nlargest and smallest changes. Southeastern Africa consistently showed larger increases in HCVI\n\nthan Central Africa, due to increased length of drought events projected in all ensemble members\n\n(not shown). The length of flood events was not projected to increase in this region. The Sahel\n\nregion consistently showed one or more countries with a small decrease in the HCVI, although\n\nthe precise country or countries varied between ensemble members. The decrease in HCVI here\n\nwas due to projected decreases in length of drought, with length of flood events projected to\n\nchange little.\n\nIndia is projected to see increased HCVI by all ensemble members, due to a consistent increase\n\nin length of flood events projected in all members, outweighing the beneficial impact of decreased\n\nlength of drought which is again projected in all members.\n\nBrazil is projected to see increased HCVI, but for reasons which vary between ensemble\n\nmembers. Although the location of projected longer flood events varies across the country in\n\ndifferent members, the aggregation of the HCVI to the country level renders this geographical\n\nvariability irrelevant for such a large country because only the median value across the country\n\nis used in the HCVI. Some ensemble members project longer drought for Brazil, which again\n\ncontributed to increased HCVI.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed11.pdf" - }, - { - "text": "**2** Model Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration\n\nscenario. To provide more detailed representations of climate processes and impacts, the\n\nspatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution\n\nthan the CMIP5 models. We used a set of impacts-relevant indices and a global land surface\n\nmodel to examine the projected changes in weather extremes and their implications for\n\nfreshwater availability and vulnerability to food insecurity. Uncertainties in regional climate\n\nresponses are assessed, examining ranges of outcomes in impacts to inform risk assessments.\n\nDespite some degree of inconsistency between components of the study due to the need to\n\ncorrect for systematic biases in some aspects, the outcomes from different ensemble members\n\ncould be compared for several different indicators. The projections for weather extremes\n\nindices and biophysical impacts quantities support expectations that the magnitude of change\n\nis generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with\n\nincreases being more intense than seen in CMIP5 projections. Precipitation-related extremes\n\nshow more geographical variation with some increases and some decreases in both heavy\n\nprecipitation and drought. There are substantial regional uncertainties in hydrological impacts\n\nat local scales due to different climate models producing different outcomes. Nevertheless,\n\nhydrological impacts generally point towards wetter conditions on average, with increased\n\nmean river flows, longer heavy rainfall events, particularly in South and East Asia with the\n\nmost extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global\n\nwarming. Some areas are projected to experience shorter meteorological drought events and\n\nless severe low flows, although longer droughts and/or decreases in low flows are projected\n\nin many other areas, particularly southern Africa and South America. Flows in the Amazon\n\nare projected to decline by up to 25%. Increases in either heavy rainfall or drought events\n\nimply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this\n\nvulnerability is projected to remain smaller than at 2°C global warming in approximately 76%\n\nof developing countries. At 2°C, four countries are projected to reach unprecedented levels of\n\nvulnerability to food insecurity.\n\nThis article is part of the theme issue ‘The Paris Agreement: understanding the physical and\n\nsocial challenges for a warming world of 1.5°C above pre-industrial levels’.\n\n## 1. Introduction\n\nThe majority of climate-change impacts assessments have tended to be framed in terms of future\n\ntime horizons, e.g. impacts by the middle or end of the twenty-first century [ 1 , 2 ]. However,\n\nwith international climate policy now largely focused on limiting warming to specific levels of\n\nglobal mean temperature such as 2°C [ 3 ] or 1.5°C [ 4 ], policy-relevant climate impacts assessments\n\nincreasingly need to be framed in terms of such warming levels.\n\nThere are two major research questions concerning the impacts of climate change at 1.5°C and\n\n2°C global warming, which are relevant to both mitigation and adaptation policy areas.\n\n(i) How much larger are the impacts at 2°C compared to 1.5°C? This is the primary question\n\narising from the Paris Agreement [ 4 ] and is relevant to mitigation policy, informing\n\njudgements and actions on holding the global temperature rise to ‘well below 2°C’ and\n\n‘pursuing efforts to limit the temperature increase to 1.5°C’.\n\n(ii) What regional climate conditions and related hydrological and ecological conditions\n\ncould occur at a particular level of global warming, such as 2°C? This is relevant to\n\nadaptation policy and planning—exploring the possible outcomes for these levels of\n\nwarming will help facilitate adaptation and improved resilience to account for a 1.5°C or", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "7 [https://www.aljazeera.com/news/2020/9/25/over-800000-affected-in-sudan-flooding-](https://www.aljazeera.com/news/2020/9/25/over-800000-affected-in-sudan-flooding-un) [un](https://www.aljazeera.com/news/2020/9/25/over-800000-affected-in-sudan-flooding-un) 8 By this comment, we do not intend to erase existing work on low-resource languages. One particularly exciting example is the Masakhane project [ 91 ], which explores participatory research techniques for developing MT for African languages. These promising directions do not involve amassing terabytes of data. 9 [https://www.voanews.com/south-central-asia/monsoons-cause-havoc-india-climate-](https://www.voanews.com/south-central-asia/monsoons-cause-havoc-india-climate-change-alters-rainfall-patterns) [change-alters-rainfall-patterns](https://www.voanews.com/south-central-asia/monsoons-cause-havoc-india-climate-change-alters-rainfall-patterns) 10 [https://www.cnn.com/2020/07/28/asia/australia-fires-wildlife-report-scli-intl-](https://www.cnn.com/2020/07/28/asia/australia-fires-wildlife-report-scli-intl-scn/index.html) [scn/index.html](https://www.cnn.com/2020/07/28/asia/australia-fires-wildlife-report-scli-intl-scn/index.html) 11 [http://commoncrawl.org/](http://commoncrawl.org/)", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "**3** A combination of the above questions is also relevant—how does the range of outcomes at 2°C\n\ncompare to that at 1.5°C? This is also relevant to adaptation policy, as it can inform assessment on\n\nwhether to adapt to potential impacts at 2°C or just 1.5°C. Putting in place adaptation measures\n\nto deal with potential impacts at 1.5°C and then increasing these to deal with 2°C later may\n\nbe more expensive and difficult than adapting to potential risks at 2°C at the outset. On the\n\nother hand, because adaptation actions may themselves have consequences, unnecessary over-\n\nadaptation may have undesirable effects which it may be preferable to avoid or at least delay\n\nuntil absolutely necessary.\n\nBoth questions require an appropriate assessment of uncertainty. There are considerable\n\nuncertainties in projections of regional climate change, with different climate models projecting\n\nregional climate changes that can differ in magnitude or even, in the case of precipitation\n\nand impacts quantities strongly related to this, differ in sign [ 5 , 6 ]. This may have important\n\nimplications for regional impacts at specific levels of global warming. A common approach to\n\nexploring and presenting such uncertainties is to examine the ensemble mean and the level of\n\nconsensus among the ensemble members on the sign of the change. While this can often be useful\n\nin informing an assessment of the level of confidence in future projections, it may not always be\n\nsufficient to fully inform decisions. Risk assessment approaches require consideration of a range\n\nof possible risks, not just the most likely. This paper explores a range of regional climate states\n\nand related impacts that occur at global warming of 2°C, and a range of differences with warming\n\nlimited to 1.5°C.\n\nWe examine the implications of our new climate projections by applying some commonly\n\nused indices of climate extremes, and a further index quantifying relative vulnerability to food\n\ninsecurity which combines climate extremes indices with information on a range of factors\n\nrepresenting sensitivity and adaptability of food systems to climate hazards. We also use the\n\nclimate projections to drive a global land surface model to simulate changes in run-off as\n\nan indicator of freshwater availability. We assess whether regional extremes are projected to\n\nincrease or decrease at 2°C global warming, and whether the consequent impact on drought and\n\nvulnerability to food insecurity become greater or smaller. We also assess whether these changes\n\nare reduced by limiting global warming to 1.5°C. We explore some of the uncertainties in these\n\nprojections, and, in particular, examine whether the use of ensemble-mean projections is a useful\n\nsimple guide to impacts projections or whether this can lead to a misleading impression for some\n\nimpacts. Regarding vulnerability to food insecurity, we consider the impacts of global warming\n\nat 1.5°C and 2°C alongside socio-economic influences that affect the sensitivity to climate change.\n\nWe also consider our climate-change impacts results in comparison with other studies using older,\n\nlower-resolution climate projections.\n\nA large number of previous studies have assessed potential impacts of future climate change\n\nusing the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [ 7 ],\n\nand some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [ 8 , 9 ]. We\n\nalso base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere\n\nmodel to provide greater spatial detail and improved representation of atmospheric processes.\n\n## 2. Methods and models\n\n### (a) Global climate simulations at 1.5 ° C and 2 ° C global warming\n\nThere are a number of ways in which 1.5°C or 2°C global warming can be defined—one could\n\nbe the long-term climate state following a stabilization of warming at that level, another could", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" - }, - { - "text": "2\n\nVol:.(1234567890)\n\n##### www.nature.com/scientificreports/\n\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- ing the impacts comparison of global warming by 1.5 °C versus 2.0 °C 44 . It is necessary to do more quantitative impacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research gaps and support the requirement of the scientific community and governments. In this paper, the future climate situations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and 2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. Then the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were analyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from 1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we examine the effects of the resulting maize production shocks in different countries; the market price of maize is simulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of maize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward for maize cultivation.\n\n**Materials and methods Data processing.** In this study, historical daily weather data (1986- 2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series ­data 45 . For future (2020- 2099), the original climate scenario data (Table 1 ) were extracted from output archives of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) under four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data was interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations to remove systematic ­errors 46 . The data of maize-planting regions are from the gridded global dataset in 2000 by combining two data ­products 47 , 48 .\n\n**Simulation of climate scenarios with global warming by 1.5 °C and 2.0 °C.** In this study, climate data of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models driven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a total of 20 sets of data under four RCP scenarios of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL- CM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sun- shine hours (Fig. 1 ).\n\n**Table 1.** Basic information of 5 ESMs in CMIP5. Horizontal resolution means the number of longitudinal grids × the number of latitudinal grids.\n\n| Model | Research institute | Country | Horizontal resolution |\n|:---|:---|:---|:---|\n| GFDL-ESM2M | Geophysical Fluid Dynamics Laboratory | The United States | 144 × 90 |\n| HadGEM2-ES | Hadley Center for Climate Prediction and Research | The United Kingdom | 192 × 145 |\n| IPSL-CM5A-LR | L’ Institute Pierre-Simon Laplace | France | 96 × 96 |\n| NorESM1-M | Norway Climate Center | Norway | 144 × 96 |\n| MIROC-ESM | Center for Climate System Research, National Institute for Environmental Studies, and Frontier Research Center for Global Change | Japan | 128 × 64 |", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - }, - { - "text": "In the global warming network, politics was the second-largest discourse cluster (20% of the\n\nnetwork), where “tcot”, short for “Top Conservatives on Twitter”, was the node ranked highest,\n\nand “p2”, short for “Progressives 2.0”, is also included. Several political figures, such as Obama and Al\n\nGore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster\n\n(16%), including both domestic e ff orts, such as “us”, “trump”, “climatechangeisreal”, “climateaction”,\n\nand “epa”, and two international items, like “china” and “india”. The fourth cluster (in blue) referred\n\nto emissions, including hashtags like “co2”, “green”, and “carbon”. The smallest cluster (8%) was\n\ncomposed of “snow”, “winter”, “heatwave”, and “summer”, referring to the temperature abnormalities\n\non the earth.\n\n### *4.3. Temporal Analysis of the Associations in the Two Discourses*\n\nThe online presentations of the climate change and global warming discourses are dynamic.\n\nAs shown in Table 2 , for the global warming discourse, 11 key concepts remained in the top 50 central\n\nhashtags each year for all 10 years, with 16 for the climate change”discourse. By comparing the 11\n\nnodes of the global warming discourse and the 16 nodes of the climate change discourse, we found that\n\nthe two lists shared nine concepts. We found “pollution” and “earth” were unique to the keyword list\n\nof the global warming discourse, and “economy”, “water”, “china”, “coal”, “solar”, “sustainability”,\n\nand “food” only occurred on the critical list for the climate change discourse.\n\n**Table 2.** Hashtags that remained on the top 50 list for the climate change or the global warming\n\ndiscourse from 2009 to 2018.\n\n**Unique Shared**\n\n#climatechange china, solar, water, food, economy, coal, sustainability co2, news, carbon, green, climate,\n\n#globalwarming pollution, earth us, energy, science, environment\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period,\n\nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies\n\nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary\n\nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more\n\nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of\n\nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the\n\n10 years, as shown in Figure 5 .\n\nFigure 3 depicts the associations of hashtags in the climate change discourse for each year\n\nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the\n\nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg”\n\n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global\n\nactions cluster (in yellow) because these hashtags were frequently used in the global action context and\n\nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags,\n\nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental\n\nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change),\n\nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political\n\nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political\n\nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining\n\n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of\n\nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased\n\nin the last two years of the period according to Figure 5 a.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "10\n\n**Market price of maize in main countries.** In this study, we elaborate on the endogenous response of our economic models. This response can be theoretically elaborated as: due to the effect of climate change on yield reduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and raising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive (cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond by changing farm-level management practices and increasing (decreasing) the amount of acreage under these crops. At a global scale, the reallocation of production and consumption through international trade further alters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ region due to climate change. In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among different countries and regions under both climate change scenarios (Fig. 7 ). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C scenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed due to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa would decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the domestic production, the climate change will also induce changes in international trade of maize, resulting in changing levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically produced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, the countries that face positive effects on yields and/or are relatively less dependent on imports, are positively (less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would improve under both scenarios (Fig. 8 ). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh and Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline.\n\n**Discussion and conclusion Discussion.** Our analysis highlights the effects of climate change on global- and regional-specific maize yields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the reduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- ing by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. Although the precipitation is also increasing, the evapotranspiration would become more intense. The limitation of water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by 1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought and heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the\n\n**Figure 6.** Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed9.pdf" - }, - { - "text": "issues and re-constructing them di ff erently. By comparing the persistent words used related to the two\n\ndiscourses in the 10-year period in Table 2 , we think that global warming showed a relative preference\n\ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change”\n\nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”.\n\nStudies have suggested that the public shows a preference for scientific publications with general\n\nkeywords compared with those with complicated scientific jargon [ 47 ], lacking a deep understanding of\n\nthe complicated issue [ 46 ] and the necessity for mitigation of the climate issue [ 47 ]. These conclusions\n\nseem to suit global warming more than climate change according to the current study, which is\n\nprobably because climate change receives more publicity and recognition than global warming in the\n\nscientific community. In the association network shown in Figure 2 , global warming was found to be\n\nmore connected with temperature abnormalities. This finding is in accordance with studies reporting\n\nthat short-term temperature anomalies [ 87 ] can increase the public’s belief about global warming by\n\nincreasing the understanding of this abstract issue [ 88 ], although scientists mostly make judgments\n\nbased on long-term weather statistics [ 89 ]. However, none of the four words, “snow”, “summer”,\n\n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes\n\nlist of the climate change network.\n\nEven when climate change and global warming shared concern about similar topics such as the\n\ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas\n\nclimate change preferred a more in-depth perspective, highlighting the importance of global action\n\nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to\n\ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long\n\nbeen regarded as two key reasons for low climate concern [ 90 ], the two terminologies’ di ff erences\n\nin connotations suggest that introducing these absent sub-topics into global warming discourse or\n\nhighlighting climate change for its inherent connotations may help communicators raise public concern\n\nabout climate.\n\n#### 5.1.2. Political Connotations\n\nStudies noted that frame preference between climate change and global warming reflects\n\nindividuals’ ideological spectrum, where climate change and global warming were favored by\n\nthe liberals and conservatives, respectively [ 10 ]. The cluster analysis of the semantic network in the\n\ncurrent study demonstrated that global warming triggered far more political responses than climate\n\nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored\n\nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes\n\nof the global warming discourse, but neither was included in the list of top nodes of the climate change\n\ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used\n\nby conservatives to question the reality of climate issue [ 11 ] and climate change is more commonly\n\nadopted when discussing action against the climate change issue [ 5 ], global warming had a stronger\n\npolitical connotation in public discussion.\n\n#### 5.1.3. Discourse Structure\n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action”\n\nrepresented the themes of the three largest clusters in the network. However, three popularly recurring\n\nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters\n\nabove, but formed another small tight cluster together, sitting in the most central part of the semantic\n\nnetwork, as shown in Figure 2 b. As each of the three hashtags can almost represent one sub-theme of", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed11.pdf", - "query": "Regarding climate change simulation, what is JULES ?", - "target_page": 7, - "target_passage": "Impacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**7** In the present study, processing errors in the input data for one ensemble member, the\n\nHadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the\n\nHCVI are, therefore, not presented here.\n\n### (d) Freshwater resources: run-off\n\nImpacts on freshwater were assessed with a version of the JULES land surface model [ 24 , 25 ], a\n\ncoupled ecosystem- hydrology- surface exchange model which simulates land-atmosphere fluxes\n\nof water, energy and carbon in an internally consistent way, typically applied at global scales.\n\nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System\n\nModels [ 26 , 27 ] and have been used to assess impacts of climate change on global terrestrial\n\necosystems and hydrology [ 28 - 30 ] within such models. JULES can also be used outside of the\n\nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of\n\na wider range of climate projections [ 6 , 8 ]. Here we use a new, higher-resolution configuration of\n\nJULES on a global grid of 0.5° resolution [ 31 ].\n\nIt has been noted that hydrological impacts models driven by climate-change projections\n\nfrom climate models tend to give more severe drying than simulated in the climate models\n\nthemselves [ 32 - 34 ]. This is largely attributed to the inclusion of plant stomatal closure in\n\nresponse to elevated CO 2 in the climate model land surface schemes, which generally reduces\n\nevapotranspiration relative to climate projections without this process and hence further increases\n\nrun-off/streamflow or ameliorates decreases [ 34 ]. This process is often omitted from standard\n\nhydrological models. Plant physiological responses to CO 2 are included in the JULES model, so\n\nour projections of changes in run-off here do account for this process.\n\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to\n\nthe effects of climate change and CO 2 rise on precipitation, evaporation and transpiration. We\n\nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to\n\npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for\n\nthe lowest 10% of time).\n\n### (e) Correctingbiasesinclimatemodeloutputandimplicationsfordefininglevelsofglobal\n\nwarming\n\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed\n\nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there\n\nwere some differences in how these data were applied, with different approaches to the treatment\n\nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered\n\nimportant to assess changes in the raw climate model output, because this directly represents\n\nthe behaviour of the model itself. The main focus was on the changes relative to the present-\n\nday baseline climate, defined as 1981- 2010, with absolute values in either the baseline or the\n\nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off\n\nanalyses, however, it was considered important to correct for systematic biases in the climate\n\nmodel output, because these can lead to unrealistic representations of the key quantities in the\n\npresent-day simulation [ 35 ]. A bias-correction methodology was, therefore, applied for these two\n\nparts of the analysis, whereby the model output was adjusted to make it consistent with an\n\nobserved climatology [ 36 ]. We used a multi-segment statistical bias-correction methodology for\n\nprecipitation [ 37 ], and a modification of this for other variables [ 37 ].\n\nThis difference in approach led to inconsistencies in the definitions of the dates of GWLs\n\nin the two parts of the study. In the extremes analysis using raw model output, the dates of\n\npassing GWLs were defined on the basis of the global mean temperatures in the driving CMIP5", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "issues and re-constructing them di ff erently. By comparing the persistent words used related to the two\n\ndiscourses in the 10-year period in Table 2 , we think that global warming showed a relative preference\n\ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change”\n\nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”.\n\nStudies have suggested that the public shows a preference for scientific publications with general\n\nkeywords compared with those with complicated scientific jargon [ 47 ], lacking a deep understanding of\n\nthe complicated issue [ 46 ] and the necessity for mitigation of the climate issue [ 47 ]. These conclusions\n\nseem to suit global warming more than climate change according to the current study, which is\n\nprobably because climate change receives more publicity and recognition than global warming in the\n\nscientific community. In the association network shown in Figure 2 , global warming was found to be\n\nmore connected with temperature abnormalities. This finding is in accordance with studies reporting\n\nthat short-term temperature anomalies [ 87 ] can increase the public’s belief about global warming by\n\nincreasing the understanding of this abstract issue [ 88 ], although scientists mostly make judgments\n\nbased on long-term weather statistics [ 89 ]. However, none of the four words, “snow”, “summer”,\n\n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes\n\nlist of the climate change network.\n\nEven when climate change and global warming shared concern about similar topics such as the\n\ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas\n\nclimate change preferred a more in-depth perspective, highlighting the importance of global action\n\nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to\n\ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long\n\nbeen regarded as two key reasons for low climate concern [ 90 ], the two terminologies’ di ff erences\n\nin connotations suggest that introducing these absent sub-topics into global warming discourse or\n\nhighlighting climate change for its inherent connotations may help communicators raise public concern\n\nabout climate.\n\n#### 5.1.2. Political Connotations\n\nStudies noted that frame preference between climate change and global warming reflects\n\nindividuals’ ideological spectrum, where climate change and global warming were favored by\n\nthe liberals and conservatives, respectively [ 10 ]. The cluster analysis of the semantic network in the\n\ncurrent study demonstrated that global warming triggered far more political responses than climate\n\nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored\n\nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes\n\nof the global warming discourse, but neither was included in the list of top nodes of the climate change\n\ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used\n\nby conservatives to question the reality of climate issue [ 11 ] and climate change is more commonly\n\nadopted when discussing action against the climate change issue [ 5 ], global warming had a stronger\n\npolitical connotation in public discussion.\n\n#### 5.1.3. Discourse Structure\n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action”\n\nrepresented the themes of the three largest clusters in the network. However, three popularly recurring\n\nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters\n\nabove, but formed another small tight cluster together, sitting in the most central part of the semantic\n\nnetwork, as shown in Figure 2 b. As each of the three hashtags can almost represent one sub-theme of", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "7. Caitlyn Kennedy, R.L. What’s the Di ff erence between Global Warming and Climate Change? 2015. Available\n\nonline: https: // www.climate.gov / news-features / climate-qa / whats-di ff [erence-between-global-warming-and-](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change)\n\n[climate-change](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change) (accessed on 10 October 2019).\n\n8. Pachauri, R.K.; Allen, M.R.; Barros, V.R.; Broome, J.; Cramer, W.; Christ, R.; Church, J.A.; Clarke, L.; Dahe, Q.;\n\nDasgupta, P.; et al. *Climate Change 2014: Synthesis Report. Contribution of Working Groups I, II and III to the Fifth*\n\n*Assessment Report of the Intergovernmental Panel on Climate Change* ; IPCC: Geneva, Switzerland, 2014.\n\n9. Whitmarsh, L. What’s in a name? Commonalities and di ff erences in public understanding of “climate\n\nchange” and “global warming”. *Public Underst. Sci.* **2009** , *18* , 401- 420. [ [CrossRef](http://dx.doi.org/10.1177/0963662506073088) ]\n\n10. Shehata, A.; Hopmann, D.N. Framing climate change: A study of US and Swedish press coverage of global\n\nwarming. *Journal. Stud.* **2012** , *13* , 175- 192. [ [CrossRef](http://dx.doi.org/10.1080/1461670X.2011.646396) ]\n\n11. Schuldt, J.P.; Roh, S. Of accessibility and applicability: How heat-related cues a ff ect belief in “global warming”\n\nversus “climate change”. *Soc. Cogn.* **2014** , *32* , 217- 238. [ [CrossRef](http://dx.doi.org/10.1521/soco.2014.32.3.217) ]\n\n12. McCright, A.M.; Dunlap, R.E. Challenging global warming as a social problem: An analysis of the conservative\n\nmovement’s counter-claims. *Soc. Probl.* **2000** , *47* , 499- 522. [ [CrossRef](http://dx.doi.org/10.2307/3097132) ]\n\n13. Lineman, M.; Do, Y.; Kim, J.Y.; Joo, G.J. Talking about climate change and global warming. *PLoS ONE* **2015** ,\n\n*10* , e0138996. [ [CrossRef](http://dx.doi.org/10.1371/journal.pone.0138996) ]\n\n14. Anderson, J.R. *The Architecture of Cognition* ; Psychology Press: London, UK, 2013.\n\n15. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of tra ffi c anomalies based on human mobility\n\nand social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in\n\nGeographic Information Systems, Orlando, FL, USA, 5- 8 November 2013; pp. 344- 353.\n\n16. Rogstadius, J.; Vukovic, M.; Teixeira, C.A.; Kostakos, V.; Karapanos, E.; Laredo, J.A. CrisisTracker:\n\nCrowdsourced social media curation for disaster awareness. *IBM J. Res. Dev.* **2013** , *57* , 4:1- 4:13. [ [CrossRef](http://dx.doi.org/10.1147/JRD.2013.2260692) ]\n\n17. Leetaru, K.; Wang, S.; Cao, G.; Padmanabhan, A.; Shook, E. Mapping the global Twitter heartbeat: The\n\ngeography of Twitter. *First Monday* **2013** , *18* . [ [CrossRef](http://dx.doi.org/10.5210/fm.v18i5.4366) ]\n\n18. Kirilenko, A.P.; Molodtsova, T.; Stepchenkova, S.O. People as sensors: Mass media and local temperature\n\ninfluence climate change discussion on Twitter. *Glob. Environ. Chang.* **2015** , *30* , 92- 100. [ [CrossRef](http://dx.doi.org/10.1016/j.gloenvcha.2014.11.003) ]\n\n19. Gamson, W.A.; Modigliani, A. Media discourse and public opinion on nuclear power: A constructionist\n\napproach. *Am. J. Sociol.* **1989** , *95* , 1- 37. [ [CrossRef](http://dx.doi.org/10.1086/229213) ]\n\n20. Entman, R.M. Framing: Toward clarification of a fractured paradigm. *J. Commun.* **1993** , *43* , 51- 58. [ [CrossRef](http://dx.doi.org/10.1111/j.1460-2466.1993.tb01304.x) ]\n\n21. McCombs, M.; Llamas, J.P.; Lopez-Escobar, E.; Rey, F. Candidate images in Spanish elections: Second-level\n\nagenda-setting e ff ects. *Journal. Mass Commun. Q.* **1997** , *74* , 703- 717. [ [CrossRef](http://dx.doi.org/10.1177/107769909707400404) ]", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - }, - { - "text": "studies have noticed that the Maya inscription about doomsday, which seemed rather ridiculous for\n\nscientists, might lead to unexpected public associations with climate issues. However, science fiction\n\nmay influence the public’s attitude toward scientific issues. Frankenstein’s monster, a well-known\n\nfictional character who was a human-built creature in the novel written by Mary Shelley, has long been\n\nlinked to transgenic technology by referring genetically-modified food as “Frankenstein Food” [ 98 ].\n\nScientists found that these associations successfully symbolized the the public’s uncertainty about the\n\nrisk of transgenic technology, anxiety toward the human-made living creature, and moral discomfort\n\nabout reducing life to genetic code [ 99 ], even though people all know Frankenstein was only a fictional\n\ncharacter created 100 years ago. In the current study, we concludd that a similar mechanism may exist\n\nin global warming communication. Though “the end of world in 2012” and its adapted popular movie\n\nsounded unconvincing for scientists, the public, especially who have limited scientific literacy, were\n\ndefenceless against fiction [ 100 ]. Some of the public may accept the indications of temperature rise and\n\nextreme weather, and cannot help but strengthen their associations with global warming. However, no\n\nsimilar associations were discovered in the climate change discourse in 2012, which may suggest that\n\nglobal warming is more likely to be associated with disasters, risk, or negative sentiment compared\n\nwith climate change.\n\n### *5.3. Discrepancy between the Two Discourses*\n\nThe status of the two discourses varied significantly in the more recent years in the study period.\n\nData from Google in prior study suggested that the search record for global warming was larger\n\nthan that of climate change in earlier times [ 13 ]. The authors found that in the battle to be the most\n\nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and\n\nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange\n\nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute\n\ndimensions. Comparatively, the popularity of the global warming discourse among social media\n\nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when\n\nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse\n\ntoward climate change from global warming may be attributed to the high exposure of climate change\n\nin the media and scientific reports in recent years [ 13 ]. Previous studies noted that perceived scientific\n\nconsensus can increase acceptance of science [ 101 ]. Though global warming has been commonly used\n\nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to\n\nrefer a range of complex changes of climate [ 102 ]. Pew found science-related accounts draw millions\n\nof followers on Facebook and volume of posts they released climbed in past years [ 103 ]. Climate\n\nscientists are found to be opinion makers on Twitter [ 104 ]. As social media has become an emerging\n\nplatform for science popularization, scientific community might contribute to the prevalence of climate\n\nchange discourse by talking about climate change facts and mitigating measures [ 75 ].\n\nHowever, di ff erences between two discourses were not eliminated. Even though two discourses\n\nshowed more similarities in the rank order of key concepts, the QAP analysis of two matrices of\n\nsemantic network showed that two discourses still embody distinct public perceptions of climate issues\n\nby associating these hashtags in di ff erent manners.\n\nTo be specific, although “ipcc”, “cop”, and “un” were mentioned in both discourses (yellow\n\nin Figures 3 and 4 ) in earlier years, the clusters to which they belonged had significantly di ff erent", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed10.pdf" - }, - { - "text": "1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of\n\nclimate change on their operations and present proposals for adaptation. **https://www.gov.uk/government/collections/climate-change-**\n\n**adaptationreporting-second-round-reports**\n\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the\n\nCommittee on Climate Change (ASC): **https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate\n\nchange on their operations and present proposals for adaptation: **https://www.gov.uk/government/collections/climate-change-adaptation-**\n\n**reporting-second-round-reports**\n\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate\n\nchange to be assessed consistently over larger study areas.\n\n5 **http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n\n6 Coupled model intercomparison project phase 5, see **http://cmip-pcmdi.llnl.gov/cmip5/**\n\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25,\n\n5791- 5806 (2012) **http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**\n\n## **UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n#### What is UKCP18\n\n#### and why do we need it?\n\nFollowing the historic Paris Agreement on Climate\n\nChange in December 2015, the Department of\n\nEnvironment, Food and Rural Affairs announced a\n\nmajor upgrade to the UK Climate Projections.\n\nThe UKCP18 project will build upon the current set\n\nof projections (UKCP09) to provide the most up-to-\n\ndate assessment of how the climate of the UK may\n\nchange over the 21st century. This information\n\nwill be essential to future Climate Change Risk\n\nAssessments 1 and to equip the UK with information\n\nto help adapt to the challenges and opportunities of\n\nclimate change in line with the National Adaptation\n\nProgramme 2 .\n\nOrganisations and individual users will use UKCP18\n\nto inform risk assessments and adaptation plans\n\nto ensure they are resilient to extreme weather\n\nand climate change. Some organisations will use\n\nUKCP18 in responding to the Adaptation Reporting\n\nPower 3 for example.\n\n#### What improvements\n\n#### does UKCP18 deliver?\n\nUKCP18 will benefit from a range of developments\n\nsince the release of UKCP09, including:\n\n- Greater understanding of user needs as a result\n\nof the adaptation community’s use of UKCP09\n\nprojections and the subsequent feedback - user\n\nworkshops indicated that users supported the\n\ncontinued use of probabilistic projections and the\n\nimportance of spatially coherent information 4 .\n\n- Advances in climate models in recent years, such\n\nas the Met Office Hadley Centre HadGEM3 5 model\n\nand the CMIP5 6 set of models. Improvements\n\ninclude better representation of the past\n\nclimate, the inclusion of more cloud and aerosol\n\nprocesses and the ability to model important\n\nclimate phenomena such as the El-Niño Southern\n\nOscillation (ENSO).\n\n- Groundbreaking Met Office research on\n\nmodelling of extreme events in high resolution\n\nregional climate models 7 .\n\n- The increased quantity and range of observations\n\navailable since 2009.\n\n- Use of the new Met Office supercomputer,\n\nenabling a credible range of climate projections to\n\nbe generated in greater spatial detail.", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "complex changes in the state of the climate [ 7 ], which may be caused by natural process, external forces,\n\nor human interventions [ 8 ]. By randomly assigning respondents to climate change or global warming\n\nquestionnaires, scholars confirmed that the di ff erent connotations contained in the two definitions are\n\nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [ 9 ], which\n\nmay inhibit collaboration and joint e ff orts to mitigate the global challenge.\n\nPublic preference between climate change and global warming is even more apparent when\n\nconsidering the ideology spectrum [ 10 ]. Some scholars concluded that conservatives, who are\n\nless concerned with environmental issues, tended to use global warming as a narrative strategy\n\nbecause global warming has a more direct connection with temperature rise, making it easier to find\n\ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change\n\nfacts [ 11 ]. The associations between global warming and human activities may contribute to more\n\ncontroversies as well [ 12 ], connecting global warming more with the “hoax” frame [ 5 ] and evoking\n\ngreater negative sentiment [ 13 ].\n\nAlthough these existing studies have often attempted to identify the di ff erences between these two\n\nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause\n\nand e ff ect, were examined in each study [ 3 , 9 , 13 ]. However, the associate network model introduced by\n\npsychologists suggests that human recognition and memory have a network-shaped architecture [ 14 ],\n\nwhere individual understanding of particular objects is connected with numerous other objects in\n\nthe mind. According to the associate network model, individual understanding of the global climate\n\nconcern is a network composed of numerous inter-connected concepts, in which climate change and\n\nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue,\n\nthe preference between the two understandings may represent two distinct climate discourses by\n\ndi ff erently organizing numerous climate concepts. Examining the di ff erences between two discourses\n\nwith an associative perspective may provide communicators with unique insights into narrowing the\n\ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study\n\nof how concepts associated with each other have evolved with time.\n\nLarge amounts of user-generated data on social media, which have been valued in computer science,\n\ncommunication, and environmental studies [ 5 , 9 , 15 - 18 ], have enabled the acquistion of the social media\n\nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence\n\npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009\n\nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify\n\nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to\n\nobserve the evolution of the two discourses and to measure whether the discrepancy between the two\n\nhas widened or narrowed within the 10-year period.\n\nTo be specific, we formulated three research questions (RQs) to be explored in this study:\n\nRQ1: What is the di ff erence in how the two the discourses are associated with important climate\n\nconcepts in people’s minds?\n\nRQ2: How did the two competing climate discourses evolve from 2009 to 2018?\n\nRQ3: Did the two competing discourses converge or diverge in this decade?\n\n## **2. Background**\n\n### *2.1. Climate Change, Global Warming, and Frames*\n\nExisting studies have noted that the subtle di ff erence between climate change and global warming\n\nevokes di ff erent public cognitive responses, where global warming“indicates heat-related impacts,", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "lead to some degree of inconsistency between the analysis of the ClimPACT extremes and the\n\nHCVI and JULES impacts projections.\n\n## 3. Results\n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the\n\nlevel of agreement between models for a particular projected change, and hence an indication\n\nof potential robustness of the projected changes for informing adaptation. We then make a\n\ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would\n\nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in\n\nregional climate outcomes, we address this in a number of ways. For individual realizations, we\n\ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C,\n\neven if the sign of the change is uncertain. We also compare the range of outcomes at different\n\nGWLs, to see if the regional-scale uncertainty itself increases with global warming.\n\n### (a) Climate-change impacts at 2 ° C global warming\n\nFor 2°C global warming, the ensemble-mean increase in annual daily maximum temperature was\n\nabove 2°C for most of the land surface, with the exception of the Indian subcontinent, most of\n\nAustralia and Antarctica ( figure 2 ). The increase was higher still in many regions; most of North\n\nAmerica, much of China and north Asia, northwestern South America and all of Europe. In the\n\nnorthern and eastern USA and much of northern and western Europe, the annual daily maximum\n\ntemperature increased by over 4°C for 2°C global warming. The global mean TXx increased by\n\nmore than 2°C in all ensemble members ( table 5 ), so the maximum temperature warming more\n\nthan the global annual mean is a consistent result across all projections here, as found in previous\n\nstudies with other models [ 9 ] ( table 5 ).\n\nThe different ensemble members give somewhat different results at regional scales, although\n\nthere is a strong consensus on the temperature extremes examined here becoming warmer. In\n\nthe simulations driven by SSTs and SICs from the two IPSL CMIP5 models, most of the global", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - }, - { - "text": "make global action salient for people talking about global warming than people talking about climate\n\nchange [ 40 ], even though the facts of climate issues are highly recognized in both discourses.\n\n## **6. Conclusions**\n\nAs social media is gradually overtaking the role of legacy media providing a forum for public\n\ndiscussion, the semantic associations contained in social media discussions reflect and reinforce how\n\nindividuals portray global climate issues. By examining hashtag co-occurrence patterns on Twitter\n\nbetween 2009 and 2018, we identified distinct climate perceptions hidden behind two competing\n\nclimate discourses and discovered how these two discourses evolved.\n\nWe found that broad scientific, social, political, and international discussions are the topics\n\nof public climate discourse. Although the semantic di ff erence between climate change and global\n\nwarming seems subtle, the di ff erences in their cognitive associations are not trivial. Despite some\n\nshared concerns between the two discourses, “global warming” is more politicized and focuses more on\n\ngeneral phenomena, especially temperature abnormalities, whereas climate change is a more compact\n\ntopic with a more scientific perspective and tends to refer to specific issues. The temporal analysis\n\nrevealed that traditional political discussions decreased in both discourses but climate change started to\n\nbuild a discourse alliance with diverse domestic issues to show political intentions. Global warming’s\n\nassociations to extreme events and temperature change were suddenly strengthened around 2012.\n\nClimate change is becoming dominant compared with global warming in public discussions. Although\n\nthe two discourses are becoming increasingly similar in the rank order of climate concepts, a notable\n\ndiscrepancy still exists in the way in which they get concepts associated. These observations may\n\nprovide climate communicators with theoretical and practical hints to narrow the discrepancy between\n\ndiverse climate perceptions.\n\n*Limitation and Future Directions*\n\nThough big data allowed us to decrease the bias by dealing with the whole set of social media\n\ndata rather than samples, discrepancies still exist between social media users and the public. As most\n\nTwitter users do not disclose their age, education, income, and gender in users’ profile, demographics\n\nwere not introduced as moderator factors in this study. Previous studies noted that in 1970s, global\n\ncooling was a prominent climate concern amongst the public [ 105 ]. While in the 1980s, ozone layer\n\ndepletion, species extinction and rainforest destruction became salient on the mass media agenda [ 106 ].\n\nConsidering the historical background of climate issues, age might influence how individuals perceive\n\nclimate issues. According to the statistics in 2017 [ 107 ], only 16 % of older people (older than 60)\n\nin America use Twitter, while the proportion is 39% for people between 30- 59 years old and 47%\n\nfor people younger than 30 years old (Stastista, 2017). Our results reflect the climate perception of\n\nolder people who use Twitter, as well as younger people amongst whom Twitter is more popular.\n\nAlthough some scholars reported that it is statistically reliable to take data on Twitter as a substitute\n\nand supplement for polling [ 108 ], we thought our results should be further examined before being\n\ngeneralized to the whole population.\n\nIn this study, we characterized the di ff erences between two popular climate discourses and\n\nexamined how two discourses evolved over a 10-year period. We did not focus on the interactions\n\nbetween public climate discourse and external factors. However, the evolution of climate discourse\n\nmight be driven by several external forces such as scientific e ff orts, natural events, politics and\n\nonline information (or misinformation) campaigns. The prevalence of certain climate concepts may", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" - }, - { - "text": "There are a number of ways in which 1.5°C or 2°C global warming can be defined—one could\n\nbe the long-term climate state following a stabilization of warming at that level, another could\n\nbe the state over a shorter period around the time of first reaching that level. Here we choose the\n\nsecond definition, which is what is seen first and hence needs to be adapted to. There are also\n\na number of methods with which such changes can be assessed [ 10 ]. We take the opportunity\n\nof availability of a new set of higher-resolutions transient climate and impacts simulations, and\n\nuse a time-sampling methodology [ 10 ] to assess global-scale impacts at these resolutions for the\n\nfirst time.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" - }, - { - "text": "**4** Rather than using the original CMIP5 ensemble as in previous studies, the aim is to allow for\n\nan improved representation of atmospheric and land surface processes including extremes by\n\nusing higher spatial resolution [ 11 ].\n\nHadGEM3 (Hadley Centre Global Environment Model version 3) is a configuration of the UK\n\nMet Office Unified Model (MetUM) which has been developed for use for both climate research\n\nand weather prediction applications. It is the result of converging the development of the Met\n\nOffice’s weather and climate global atmospheric model components so that, where possible,\n\natmospheric processes are modelled or parametrized seamlessly across spatial resolutions and\n\ntimescales.\n\nThe high-resolution simulations were performed using the HadGEM3A Global Atmosphere\n\n(GA) 3.0 model [ 12 - 14 ] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with\n\ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of\n\nthe HadGEM3-GC2 coupled climate model [ 15 , 16 ], which is part of the HadGEM3 family of\n\nclimate models [ 12 ]. This represents the third generation of HadGEM configurations, leading\n\non from the HadGEM2 family of climate model configurations [ 13 ] which was used for CMIP5.\n\nKey improvements over the previous model, HadGEM2, include increased vertical levels in the\n\natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [ 17 ].\n\nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met\n\nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution\n\nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher\n\nresolution [ 18 , 19 ].\n\nWe ran the model using only its atmosphere and land components, with time-varying sea-\n\nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This\n\napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications\n\nof the higher resolution for projections of climate extremes and impacts—an atmosphere-\n\nonly simulation requires considerably less computing time than a coupled ocean- atmosphere\n\ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in\n\nregional climate changes by using SSTs and SICs from different climate models. To explore these\n\nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric\n\nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5\n\nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial\n\ninfluence on regional patterns of climate change over land, so using a range of SST and SIC\n\npatterns in a single atmosphere model goes some way towards representing the range of regional\n\nclimate changes that would arise in a set of different coupled ocean- atmosphere GCMs. This\n\napproach will not capture the full range of uncertainty affecting regional climate changes over\n\nland, because it still relies on one atmosphere model and one land surface scheme, so responses\n\nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions\n\nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that\n\nour experimental design avoids the reliance on one single realization of climate and hence allows\n\nsome of the uncertainties in regional climate-change impacts to be illustrated and explored.\n\nThe SSTs and SICs were taken from a subset of the CMIP5 transient projections performed with\n\nthe RCP8.5 scenario from 1979 to 2100—the CMIP5 members were selected as representative of a\n\nrange of outcomes for future climate change, including high and low climate sensitivity, different\n\nbiases in baseline precipitation climatology, and different global patterns of precipitation change.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed10.pdf", - "query": "Which of #climatechange and #globalwarming is the most used ?", - "target_page": 5, - "target_passage": "A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, and 887,731 contained #globalwarming", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Table 1.** *Cont.*\n\n**No. #Climatechange #Globalwarming**\n\n**Hashtag Centrality Hashtag Centrality**\n\n23 co2 0.174 snow 0.161\n\n24 weather 0.169 world 0.157\n\n25 solar 0.165 gop * 0.156\n\n26 economy 0.164 arctic 0.150\n\n27 auspol 0.163 * winter 0.145\n\n28 education 0.155 p2 * 0.144\n\n29 news 0.152 drought 0.142\n\n30 drought 0.150 epa * 0.141\n\n31 coal 0.147 global 0.137\n\n32 sustainable 0.147 eco 0.137\n\n33 cdnpoli 0.144 * actonclimate 0.136\n\n34 sdgs 0.143 * health 0.134\n\n35 china 0.143 un * 0.133\n\n36 gop 0.143 * solar 0.132\n\n37 food 0.141 economy 0.131\n\n38 un 0.141 * hoax 0.131\n\n39 cop24 * 0.140 california 0.130\n\n40 agriculture 0.138 politics 0.129\n\n41 environmental 0.136 india 0.128\n\n42 fossilfuels 0.134 china 0.127\n\n43 arctic 0.134 planet 0.127\n\n44 epa * 0.133 parisagreement * 0.126\n\n45 biodiversity 0.132 heatwave 0.125\n\n46 future 0.131 summer 0.121\n\n47 canada 0.128 nyc * 0.118\n\n48 emissions 0.128 nasa 0.118\n\n49 obama 0.127 future 0.118\n\n50 politics 0.125 oil 0.117\n\n### *4.2. Association Network Analysis*\n\nThe association networks of #climatechange and #globalwarming are shown in Figure 2 . Nodes\n\nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of\n\nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and\n\nfive in the #globalwarming network, where clusters are di ff erentiated by color (resolution is 0.75 for\n\nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each\n\ncluster are also summarized and represented in the network depicted in Figure 2 .\n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer\n\nto general facts about global climate issues, sharing words about the causes or e ff ects concerning\n\nsustainability. The di ff erence is that the largest cluster of #globalwarming (46% of the network) includes\n\nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the\n\nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as\n\nagriculture, biodiversity, education, and politics.\n\nFor the climate change discourse, the second-largest cluster (34%) is indicated in red and focuses\n\non the responsibility to tackle climate change, where several global action hashtags are included, such\n\nas “un”, “parisagreement”, “cop21”, and “cop24”. The theme of the third largest cluster (20%) in\n\nthe climate change discourse was energy (in blue). The smallest cluster (6%) in yellow sits in the\n\ncentral part of the network with a mixed theme composed of three highly ranked hashtags, including\n\n“environment” (No. 2), “climateaction” (No. 3), and “energy” (No. 6).", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "issues and re-constructing them di ff erently. By comparing the persistent words used related to the two\n\ndiscourses in the 10-year period in Table 2 , we think that global warming showed a relative preference\n\ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change”\n\nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”.\n\nStudies have suggested that the public shows a preference for scientific publications with general\n\nkeywords compared with those with complicated scientific jargon [ 47 ], lacking a deep understanding of\n\nthe complicated issue [ 46 ] and the necessity for mitigation of the climate issue [ 47 ]. These conclusions\n\nseem to suit global warming more than climate change according to the current study, which is\n\nprobably because climate change receives more publicity and recognition than global warming in the\n\nscientific community. In the association network shown in Figure 2 , global warming was found to be\n\nmore connected with temperature abnormalities. This finding is in accordance with studies reporting\n\nthat short-term temperature anomalies [ 87 ] can increase the public’s belief about global warming by\n\nincreasing the understanding of this abstract issue [ 88 ], although scientists mostly make judgments\n\nbased on long-term weather statistics [ 89 ]. However, none of the four words, “snow”, “summer”,\n\n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes\n\nlist of the climate change network.\n\nEven when climate change and global warming shared concern about similar topics such as the\n\ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas\n\nclimate change preferred a more in-depth perspective, highlighting the importance of global action\n\nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to\n\ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long\n\nbeen regarded as two key reasons for low climate concern [ 90 ], the two terminologies’ di ff erences\n\nin connotations suggest that introducing these absent sub-topics into global warming discourse or\n\nhighlighting climate change for its inherent connotations may help communicators raise public concern\n\nabout climate.\n\n#### 5.1.2. Political Connotations\n\nStudies noted that frame preference between climate change and global warming reflects\n\nindividuals’ ideological spectrum, where climate change and global warming were favored by\n\nthe liberals and conservatives, respectively [ 10 ]. The cluster analysis of the semantic network in the\n\ncurrent study demonstrated that global warming triggered far more political responses than climate\n\nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored\n\nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes\n\nof the global warming discourse, but neither was included in the list of top nodes of the climate change\n\ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used\n\nby conservatives to question the reality of climate issue [ 11 ] and climate change is more commonly\n\nadopted when discussing action against the climate change issue [ 5 ], global warming had a stronger\n\npolitical connotation in public discussion.\n\n#### 5.1.3. Discourse Structure\n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action”\n\nrepresented the themes of the three largest clusters in the network. However, three popularly recurring\n\nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters\n\nabove, but formed another small tight cluster together, sitting in the most central part of the semantic\n\nnetwork, as shown in Figure 2 b. As each of the three hashtags can almost represent one sub-theme of", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "column name to create two matrices. One matrix was created for the climate change discourse, and we\n\nfilled the cell whose column name and row name were among the top 50 list in the climate change\n\ndiscourse with the frequency at which the two hashtags were associated in this discourse, and the\n\nother cells were filled with 0. This was repeated for the global warming matrix. We thus obtained\n\ntwo matrices with the same row and column names but di ff erent values in the cells. Then, the two\n\nmatrices were input to the quadratic assignment procedure (QAP) [ 85 ] analysis provided by UCINET\n\nsoftware [ 86 ] to assess their correlation for each year.\n\n## **4. Results**\n\n### *4.1. General Descriptions*\n\nAssociation networks surrounding #climatechange and #globalwarming showed di ff erent\n\nproperties. The climate change discourse included 38,821 hashtags, whereas the global warming\n\ndiscourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the\n\ntwo discourses based on centrality. As some hashtags were used in the form of an abbreviation or\n\nphrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant\n\nwords. Hashtags “canada”, “cdnpoli”, “sdgs”, “biodiversity”, “education”, “environmental”, “cop24”,\n\n“sustainable”, “auspol”, “food”, “agriculture”, “cleanenergy”, “renewableenergy”, “renewables”,\n\n“emissions”, “coal”, “fossilfuels”, and “cop21” only showed up on the top 50 list of the “climate change”\n\nnetwork. Hashtags “tcot”, “california”, “p2”, “nyc”, “snow”, “agw”, “summer”, “global”, “winter”,\n\n“india”, “planet”, “heatwave”, “hoax”, “nasa”, “algore”, “world”, “oil”, and “eco” were unique on the\n\ntop 50 list of the global warming network. The two lists only shared three out of the top five hashtags.\n\nIn the #climatechange network, “climateaction” was ranked third place and “sustainability” was\n\nranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the\n\n#globalwarming network. In the #globalwarming network, “earth” and “weather” were among the\n\ntop five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.\n\n**Table 1.** The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from\n\n2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\n\n**No. #Climatechange #Globalwarming**\n\n**Hashtag Centrality Hashtag Centrality**\n\n1 climate 0.466 climate 0.530\n\n2 environment 0.465 environment 0.446\n\n3 climateaction 0.391 science 0.319\n\n4 sustainability 0.316 earth 0.296\n\n5 science 0.314 weather 0.280\n\n6 energy 0.283 us * 0.280\n\n7 trump 0.257 trump 0.263\n\n8 us * 0.247 pollution 0.256\n\n9 cop21 * 0.232 co2 0.244\n\n10 parisagreement * 0.232 green 0.239\n\n11 actonclimate * 0.225 tcot * 0.229\n\n12 water 0.221 nature 0.213\n\n13 pollution 0.210 news 0.198\n\n14 earth 0.207 energy 0.192\n\n15 green 0.200 climatechangeisreal 0.187\n\n16 climatechangeisreal 0.195 obama 0.181\n\n17 renewableenergy * 0.194 climateaction 0.175\n\n18 health 0.193 algore * 0.174\n\n19 nature 0.187 water 0.171\n\n20 renewables 0.186 agw * 0.164\n\n21 cleanenergy 0.176 carbon 0.164\n\n22 carbon 0.175 sustainability 0.163", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "In the global warming network, politics was the second-largest discourse cluster (20% of the\n\nnetwork), where “tcot”, short for “Top Conservatives on Twitter”, was the node ranked highest,\n\nand “p2”, short for “Progressives 2.0”, is also included. Several political figures, such as Obama and Al\n\nGore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster\n\n(16%), including both domestic e ff orts, such as “us”, “trump”, “climatechangeisreal”, “climateaction”,\n\nand “epa”, and two international items, like “china” and “india”. The fourth cluster (in blue) referred\n\nto emissions, including hashtags like “co2”, “green”, and “carbon”. The smallest cluster (8%) was\n\ncomposed of “snow”, “winter”, “heatwave”, and “summer”, referring to the temperature abnormalities\n\non the earth.\n\n### *4.3. Temporal Analysis of the Associations in the Two Discourses*\n\nThe online presentations of the climate change and global warming discourses are dynamic.\n\nAs shown in Table 2 , for the global warming discourse, 11 key concepts remained in the top 50 central\n\nhashtags each year for all 10 years, with 16 for the climate change”discourse. By comparing the 11\n\nnodes of the global warming discourse and the 16 nodes of the climate change discourse, we found that\n\nthe two lists shared nine concepts. We found “pollution” and “earth” were unique to the keyword list\n\nof the global warming discourse, and “economy”, “water”, “china”, “coal”, “solar”, “sustainability”,\n\nand “food” only occurred on the critical list for the climate change discourse.\n\n**Table 2.** Hashtags that remained on the top 50 list for the climate change or the global warming\n\ndiscourse from 2009 to 2018.\n\n**Unique Shared**\n\n#climatechange china, solar, water, food, economy, coal, sustainability co2, news, carbon, green, climate,\n\n#globalwarming pollution, earth us, energy, science, environment\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period,\n\nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies\n\nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary\n\nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more\n\nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of\n\nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the\n\n10 years, as shown in Figure 5 .\n\nFigure 3 depicts the associations of hashtags in the climate change discourse for each year\n\nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the\n\nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg”\n\n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global\n\nactions cluster (in yellow) because these hashtags were frequently used in the global action context and\n\nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags,\n\nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental\n\nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change),\n\nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political\n\nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political\n\nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining\n\n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of\n\nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased\n\nin the last two years of the period according to Figure 5 a.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "studies have noticed that the Maya inscription about doomsday, which seemed rather ridiculous for\n\nscientists, might lead to unexpected public associations with climate issues. However, science fiction\n\nmay influence the public’s attitude toward scientific issues. Frankenstein’s monster, a well-known\n\nfictional character who was a human-built creature in the novel written by Mary Shelley, has long been\n\nlinked to transgenic technology by referring genetically-modified food as “Frankenstein Food” [ 98 ].\n\nScientists found that these associations successfully symbolized the the public’s uncertainty about the\n\nrisk of transgenic technology, anxiety toward the human-made living creature, and moral discomfort\n\nabout reducing life to genetic code [ 99 ], even though people all know Frankenstein was only a fictional\n\ncharacter created 100 years ago. In the current study, we concludd that a similar mechanism may exist\n\nin global warming communication. Though “the end of world in 2012” and its adapted popular movie\n\nsounded unconvincing for scientists, the public, especially who have limited scientific literacy, were\n\ndefenceless against fiction [ 100 ]. Some of the public may accept the indications of temperature rise and\n\nextreme weather, and cannot help but strengthen their associations with global warming. However, no\n\nsimilar associations were discovered in the climate change discourse in 2012, which may suggest that\n\nglobal warming is more likely to be associated with disasters, risk, or negative sentiment compared\n\nwith climate change.\n\n### *5.3. Discrepancy between the Two Discourses*\n\nThe status of the two discourses varied significantly in the more recent years in the study period.\n\nData from Google in prior study suggested that the search record for global warming was larger\n\nthan that of climate change in earlier times [ 13 ]. The authors found that in the battle to be the most\n\nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and\n\nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange\n\nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute\n\ndimensions. Comparatively, the popularity of the global warming discourse among social media\n\nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when\n\nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse\n\ntoward climate change from global warming may be attributed to the high exposure of climate change\n\nin the media and scientific reports in recent years [ 13 ]. Previous studies noted that perceived scientific\n\nconsensus can increase acceptance of science [ 101 ]. Though global warming has been commonly used\n\nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to\n\nrefer a range of complex changes of climate [ 102 ]. Pew found science-related accounts draw millions\n\nof followers on Facebook and volume of posts they released climbed in past years [ 103 ]. Climate\n\nscientists are found to be opinion makers on Twitter [ 104 ]. As social media has become an emerging\n\nplatform for science popularization, scientific community might contribute to the prevalence of climate\n\nchange discourse by talking about climate change facts and mitigating measures [ 75 ].\n\nHowever, di ff erences between two discourses were not eliminated. Even though two discourses\n\nshowed more similarities in the rank order of key concepts, the QAP analysis of two matrices of\n\nsemantic network showed that two discourses still embody distinct public perceptions of climate issues\n\nby associating these hashtags in di ff erent manners.\n\nTo be specific, although “ipcc”, “cop”, and “un” were mentioned in both discourses (yellow\n\nin Figures 3 and 4 ) in earlier years, the clusters to which they belonged had significantly di ff erent", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed10.pdf" - }, - { - "text": "lead to some degree of inconsistency between the analysis of the ClimPACT extremes and the\n\nHCVI and JULES impacts projections.\n\n## 3. Results\n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the\n\nlevel of agreement between models for a particular projected change, and hence an indication\n\nof potential robustness of the projected changes for informing adaptation. We then make a\n\ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would\n\nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in\n\nregional climate outcomes, we address this in a number of ways. For individual realizations, we\n\ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C,\n\neven if the sign of the change is uncertain. We also compare the range of outcomes at different\n\nGWLs, to see if the regional-scale uncertainty itself increases with global warming.\n\n### (a) Climate-change impacts at 2 ° C global warming\n\nFor 2°C global warming, the ensemble-mean increase in annual daily maximum temperature was\n\nabove 2°C for most of the land surface, with the exception of the Indian subcontinent, most of\n\nAustralia and Antarctica ( figure 2 ). The increase was higher still in many regions; most of North\n\nAmerica, much of China and north Asia, northwestern South America and all of Europe. In the\n\nnorthern and eastern USA and much of northern and western Europe, the annual daily maximum\n\ntemperature increased by over 4°C for 2°C global warming. The global mean TXx increased by\n\nmore than 2°C in all ensemble members ( table 5 ), so the maximum temperature warming more\n\nthan the global annual mean is a consistent result across all projections here, as found in previous\n\nstudies with other models [ 9 ] ( table 5 ).\n\nThe different ensemble members give somewhat different results at regional scales, although\n\nthere is a strong consensus on the temperature extremes examined here becoming warmer. In\n\nthe simulations driven by SSTs and SICs from the two IPSL CMIP5 models, most of the global", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - }, - { - "text": "**25** A detailed investigation of these factors is beyond the scope of this paper; nevertheless, this\n\nresult illustrates the important point that the nature and patterns of the climate forcing at a\n\nparticular level of global warming can play an important role in determining the patterns of\n\nregional impacts.\n\n## 5. Conclusion\n\nThe higher-resolution HadGEM3 simulations project consistent increases in temperature-related\n\nextremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the\n\nglobal annual mean. There is a higher degree of spatial variation in our projections compared\n\nwith CMIP5-based studies.\n\nIn the model projections examined here, changes relating to the water cycle are complex, both\n\nin their geographical pattern and in the variation between different models. The length of flooding\n\nevents generally increases across world in all models, but maximum rainfall can either increase or\n\ndecrease depending on locations. Global patterns of increase and decrease show some consistency\n\nbetween the different GWLs, but also some local differences. Worldwide, most impacts broadly\n\ntend to increase with global warming in most areas. For global mean changes, even when the sign\n\nof change is uncertain, individual realizations generally show reduced impact at 1.5°C compared\n\nwith 2°C. However, this does not always hold even at the scale of major global river basins.\n\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in\n\napproximately three-quarters of countries assessed. The vulnerability increase can arise from\n\nincreases in either flooding or drought. Reduced drought leads to decreased vulnerability in a\n\nlimited number of cases.\n\nMost simulations here project a general increase in mean streamflow in most of the basins\n\nexamined, but with a number of notable exceptions in the tropics. While flows in the Ganges are\n\nconsistently projected to increase by 30- 110% at 2°C, Amazon flows could either increase by 3%\n\nor decrease by 25%. Ensemble-mean changes in river flow often do not give a full impression of\n\nthe magnitude of changes that may be possible, so adaptation planning in particular should not\n\nrely on ensemble-mean projections and instead consider a range of outcomes. The seasonal low\n\nstreamflows also increase in many basins, but not as many as for the mean flows—many basins\n\nsee decreased low flows in some or all projections.\n\nBroadly, changes in weather extremes at 1.5°C global warming could be estimated by scaling-\n\nback the impacts at 2°C, if this is done with individual ensemble members rather than the\n\nensemble mean. However, this was not always the case for impacts that depend on more complex\n\nprocess or interactions between more than one climate variable, such as run-off and an indicator\n\nof vulnerability to food insecurity.\n\nData accessibility. This article has no additional data.\n\nCompeting interests. We declare we have no competing interests.\n\nFunding. This research received funding from the European Union Seventh Framework Programme FP7/2007-\n\n2013 under grant agreement no. 603864 (HELIX: ‘High-End cLimate Impacts and eXtremes’; www.\n\nhelixclimate.eu ). The work of R.A.B., C.B., J.C., L.G., K.L. and K.R. was additionally supported by the Joint\n\nUK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101).\n\nAcknowledgements. The authors thank Ed Pope, Jason Lowe and Dann Mitchell for advice and discussion,\n\nAlissa Haward and Maria Pearce for project management and administration of HELIX, and two anonymous\n\nreviewers whose comments substantially improved the paper.\n\n## References\n\n1. IPCC. 2014 Summary for policymakers. In *Climate change 2014: impacts, adaptation, and*\n\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n\n*Assessment Report of the Intergovernmental Panel on Climate Change* (eds CB Field *et al* .), pp.\n\n1- 32. Cambridge, UK: Cambridge University Press.", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed11.pdf" - }, - { - "text": "*Int. J. Environ. Res. Public Health* **2020** , *xx* , 5 12 of 22\n\n( **a** ) ( **b** )\n\n**Figure 5.** The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to\n\n2018 ( **a** ); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to\n\n2018 ( **b** ).\n\nAs the climate change and global warming discourses evolved over the past years, their relative\n\nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people\n\nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of\n\n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame\n\npreference. Figure 1 a displays that in 2009, the number of tweets with #climatechange was 2.69 times\n\nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02\n\nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into\n\ndiscussions, according to Figure 1 b. In 2009, the hashtags that co-occurred with #climatechange were\n\n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018.\n\nThe rank- order correlation coefficient of nodes between the two networks maintained a stable\n\nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6 a, except for 2010 and\n\n2011, when the *p* -values were larger than 0.05 and no significant correlations were identified. The QAP\n\nanalysis showed that the associations between the two discourses were correlated in the 10-year period\n\n(the *p* -value for 2015 was 0.011; *p* -values for all the other years were less than 0.001). Figure 6 b reveals\n\nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did\n\nnot show a rising trend with the correlation of nodes’ rank order .\n\n( **a** ) ( **b** )\n\n**Figure 6.** Rank order correlation between hashtags in the climate change and global warming discourses\n\nfrom 2009 to 2018 ( **a** ); correlation between matrices of the climate change discourse and the global\n\nwarming discourse from 2009 to 2018 ( **b** ).\n\n## **5. Discussion**\n\n### *5.1. Themes and Structure of the Two Discourses*\n\n#### 5.1.1. Phenomenon vs. Mechanism of Action\n\nClimate change and global warming have long been two competing frameworks shaping the\n\npublic’s perceptions, memory, and interpretations of climate issue by highlighting different aspects of\n\n**Figure 5.** The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to\n\n2018 ( **a** ); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to\n\n2018 ( **b** ).\n\nAs the climate change and global warming discourses evolved over the past years, their relative\n\nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people\n\nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of\n\n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame\n\npreference. Figure 1 a displays that in 2009, the number of tweets with #climatechange was 2.69 times\n\nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02\n\nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into\n\ndiscussions, according to Figure 1 b. In 2009, the hashtags that co-occurred with #climatechange were\n\n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018.\n\nThe rank- order correlation coe ffi cient of nodes between the two networks maintained a stable\n\nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6 a, except for 2010 and", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed10.pdf" - }, - { - "text": "**14**\n\nACCESS1-0\n\n- 1.00 - 0.75 - 0.50 - 0.25 0 0.25 0.50 0.75 1.00\n\nIPSL-CM5A-LR\n\nensemble mean\n\nchange in vulnerability to food insecurity\n\nIPSL-CM5A-MR MIROC-ESM-CHEM\n\nGFDL-ESM2M\n\n**Figure 8.** Change in Hunger and Climate Vulnerability Index relative to baseline calculated for simulated climate states at 2 ° C\n\nglobalwarming,forfiveindividualHadGEM3simulationsdrivenbySSTsandSICsfromdifferentmembersoftheCMIP5ensemble,\n\nand the ensemble mean.\n\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher\n\nthan any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen.\n\nThe implication of such HCVI values is that climate change at 2°C is projected to cause levels\n\nof vulnerability to food insecurity that are greater than any seen in the present day. For\n\nindividual ensemble members, the number of countries with ‘unprecedented’ HCVI values at\n\n2°C varies from three to seven. Conversely, many countries in the baseline climate have levels\n\nof vulnerability to food insecurity that are greater than those expected in other countries under\n\n2°C global warming. This suggests that other factors are already posing greater risk for food\n\ninsecurity than 2°C climate change is expected to cause in other countries, so the increased risk\n\nfrom climate change should not overshadow the need to reduce vulnerability to food insecurity\n\narising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by\n\naddressing various socio-economic issues in such counties.\n\nThe JULES simulations show a general tendency towards increased run-off over\n\napproximately half of the land surface ( figure 9 ) and the majority of the major river basins\n\nassessed ( figure 10 ), but with large regional uncertainties including the possibility of decreased\n\nflows in many basins. The ensemble-mean change in mean streamflow shows an increase of\n\nbetween 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing\n\nan increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and\n\nsouthcentral USA, which see less than a 5% change in run-off, and the already very dry region of\n\nthe Sahara Desert where the existing very small run-off become even smaller.\n\nEnsemble-mean projected changes in low run-off flows are generally larger ( figure 11 ), with\n\nthe regions seeing an increase in mean run-off seeing a larger percentage increase in low\n\nrun-off—over 75% increases over much of North America, Eastern Europe and Asia. Note that\n\nthis does not necessarily imply a larger increase in absolute low flow compared to absolute mean\n\nflow, because the baseline is (by definition) smaller for low flows. In western Europe, where the\n\nchanges in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed11.pdf" - }, - { - "text": "7. Caitlyn Kennedy, R.L. What’s the Di ff erence between Global Warming and Climate Change? 2015. Available\n\nonline: https: // www.climate.gov / news-features / climate-qa / whats-di ff [erence-between-global-warming-and-](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change)\n\n[climate-change](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change) (accessed on 10 October 2019).\n\n8. Pachauri, R.K.; Allen, M.R.; Barros, V.R.; Broome, J.; Cramer, W.; Christ, R.; Church, J.A.; Clarke, L.; Dahe, Q.;\n\nDasgupta, P.; et al. *Climate Change 2014: Synthesis Report. Contribution of Working Groups I, II and III to the Fifth*\n\n*Assessment Report of the Intergovernmental Panel on Climate Change* ; IPCC: Geneva, Switzerland, 2014.\n\n9. Whitmarsh, L. What’s in a name? Commonalities and di ff erences in public understanding of “climate\n\nchange” and “global warming”. *Public Underst. Sci.* **2009** , *18* , 401- 420. [ [CrossRef](http://dx.doi.org/10.1177/0963662506073088) ]\n\n10. Shehata, A.; Hopmann, D.N. Framing climate change: A study of US and Swedish press coverage of global\n\nwarming. *Journal. Stud.* **2012** , *13* , 175- 192. [ [CrossRef](http://dx.doi.org/10.1080/1461670X.2011.646396) ]\n\n11. Schuldt, J.P.; Roh, S. Of accessibility and applicability: How heat-related cues a ff ect belief in “global warming”\n\nversus “climate change”. *Soc. Cogn.* **2014** , *32* , 217- 238. [ [CrossRef](http://dx.doi.org/10.1521/soco.2014.32.3.217) ]\n\n12. McCright, A.M.; Dunlap, R.E. Challenging global warming as a social problem: An analysis of the conservative\n\nmovement’s counter-claims. *Soc. Probl.* **2000** , *47* , 499- 522. [ [CrossRef](http://dx.doi.org/10.2307/3097132) ]\n\n13. Lineman, M.; Do, Y.; Kim, J.Y.; Joo, G.J. Talking about climate change and global warming. *PLoS ONE* **2015** ,\n\n*10* , e0138996. [ [CrossRef](http://dx.doi.org/10.1371/journal.pone.0138996) ]\n\n14. Anderson, J.R. *The Architecture of Cognition* ; Psychology Press: London, UK, 2013.\n\n15. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of tra ffi c anomalies based on human mobility\n\nand social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in\n\nGeographic Information Systems, Orlando, FL, USA, 5- 8 November 2013; pp. 344- 353.\n\n16. Rogstadius, J.; Vukovic, M.; Teixeira, C.A.; Kostakos, V.; Karapanos, E.; Laredo, J.A. CrisisTracker:\n\nCrowdsourced social media curation for disaster awareness. *IBM J. Res. Dev.* **2013** , *57* , 4:1- 4:13. [ [CrossRef](http://dx.doi.org/10.1147/JRD.2013.2260692) ]\n\n17. Leetaru, K.; Wang, S.; Cao, G.; Padmanabhan, A.; Shook, E. Mapping the global Twitter heartbeat: The\n\ngeography of Twitter. *First Monday* **2013** , *18* . [ [CrossRef](http://dx.doi.org/10.5210/fm.v18i5.4366) ]\n\n18. Kirilenko, A.P.; Molodtsova, T.; Stepchenkova, S.O. People as sensors: Mass media and local temperature\n\ninfluence climate change discussion on Twitter. *Glob. Environ. Chang.* **2015** , *30* , 92- 100. [ [CrossRef](http://dx.doi.org/10.1016/j.gloenvcha.2014.11.003) ]\n\n19. Gamson, W.A.; Modigliani, A. Media discourse and public opinion on nuclear power: A constructionist\n\napproach. *Am. J. Sociol.* **1989** , *95* , 1- 37. [ [CrossRef](http://dx.doi.org/10.1086/229213) ]\n\n20. Entman, R.M. Framing: Toward clarification of a fractured paradigm. *J. Commun.* **1993** , *43* , 51- 58. [ [CrossRef](http://dx.doi.org/10.1111/j.1460-2466.1993.tb01304.x) ]\n\n21. McCombs, M.; Llamas, J.P.; Lopez-Escobar, E.; Rey, F. Candidate images in Spanish elections: Second-level\n\nagenda-setting e ff ects. *Journal. Mass Commun. Q.* **1997** , *74* , 703- 717. [ [CrossRef](http://dx.doi.org/10.1177/107769909707400404) ]", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed10.pdf", - "query": "Is the #climateaction hashtag more bound the #globalwarming of #climatechange ?", - "target_page": 7, - "target_passage": "In the #climatechange network, “climateaction” was ranked third place and “sustainability” was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "issues and re-constructing them di ff erently. By comparing the persistent words used related to the two\n\ndiscourses in the 10-year period in Table 2 , we think that global warming showed a relative preference\n\ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change”\n\nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”.\n\nStudies have suggested that the public shows a preference for scientific publications with general\n\nkeywords compared with those with complicated scientific jargon [ 47 ], lacking a deep understanding of\n\nthe complicated issue [ 46 ] and the necessity for mitigation of the climate issue [ 47 ]. These conclusions\n\nseem to suit global warming more than climate change according to the current study, which is\n\nprobably because climate change receives more publicity and recognition than global warming in the\n\nscientific community. In the association network shown in Figure 2 , global warming was found to be\n\nmore connected with temperature abnormalities. This finding is in accordance with studies reporting\n\nthat short-term temperature anomalies [ 87 ] can increase the public’s belief about global warming by\n\nincreasing the understanding of this abstract issue [ 88 ], although scientists mostly make judgments\n\nbased on long-term weather statistics [ 89 ]. However, none of the four words, “snow”, “summer”,\n\n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes\n\nlist of the climate change network.\n\nEven when climate change and global warming shared concern about similar topics such as the\n\ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas\n\nclimate change preferred a more in-depth perspective, highlighting the importance of global action\n\nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to\n\ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long\n\nbeen regarded as two key reasons for low climate concern [ 90 ], the two terminologies’ di ff erences\n\nin connotations suggest that introducing these absent sub-topics into global warming discourse or\n\nhighlighting climate change for its inherent connotations may help communicators raise public concern\n\nabout climate.\n\n#### 5.1.2. Political Connotations\n\nStudies noted that frame preference between climate change and global warming reflects\n\nindividuals’ ideological spectrum, where climate change and global warming were favored by\n\nthe liberals and conservatives, respectively [ 10 ]. The cluster analysis of the semantic network in the\n\ncurrent study demonstrated that global warming triggered far more political responses than climate\n\nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored\n\nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes\n\nof the global warming discourse, but neither was included in the list of top nodes of the climate change\n\ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used\n\nby conservatives to question the reality of climate issue [ 11 ] and climate change is more commonly\n\nadopted when discussing action against the climate change issue [ 5 ], global warming had a stronger\n\npolitical connotation in public discussion.\n\n#### 5.1.3. Discourse Structure\n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action”\n\nrepresented the themes of the three largest clusters in the network. However, three popularly recurring\n\nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters\n\nabove, but formed another small tight cluster together, sitting in the most central part of the semantic\n\nnetwork, as shown in Figure 2 b. As each of the three hashtags can almost represent one sub-theme of", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "In the global warming network, politics was the second-largest discourse cluster (20% of the\n\nnetwork), where “tcot”, short for “Top Conservatives on Twitter”, was the node ranked highest,\n\nand “p2”, short for “Progressives 2.0”, is also included. Several political figures, such as Obama and Al\n\nGore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster\n\n(16%), including both domestic e ff orts, such as “us”, “trump”, “climatechangeisreal”, “climateaction”,\n\nand “epa”, and two international items, like “china” and “india”. The fourth cluster (in blue) referred\n\nto emissions, including hashtags like “co2”, “green”, and “carbon”. The smallest cluster (8%) was\n\ncomposed of “snow”, “winter”, “heatwave”, and “summer”, referring to the temperature abnormalities\n\non the earth.\n\n### *4.3. Temporal Analysis of the Associations in the Two Discourses*\n\nThe online presentations of the climate change and global warming discourses are dynamic.\n\nAs shown in Table 2 , for the global warming discourse, 11 key concepts remained in the top 50 central\n\nhashtags each year for all 10 years, with 16 for the climate change”discourse. By comparing the 11\n\nnodes of the global warming discourse and the 16 nodes of the climate change discourse, we found that\n\nthe two lists shared nine concepts. We found “pollution” and “earth” were unique to the keyword list\n\nof the global warming discourse, and “economy”, “water”, “china”, “coal”, “solar”, “sustainability”,\n\nand “food” only occurred on the critical list for the climate change discourse.\n\n**Table 2.** Hashtags that remained on the top 50 list for the climate change or the global warming\n\ndiscourse from 2009 to 2018.\n\n**Unique Shared**\n\n#climatechange china, solar, water, food, economy, coal, sustainability co2, news, carbon, green, climate,\n\n#globalwarming pollution, earth us, energy, science, environment\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period,\n\nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies\n\nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary\n\nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more\n\nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of\n\nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the\n\n10 years, as shown in Figure 5 .\n\nFigure 3 depicts the associations of hashtags in the climate change discourse for each year\n\nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the\n\nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg”\n\n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global\n\nactions cluster (in yellow) because these hashtags were frequently used in the global action context and\n\nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags,\n\nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental\n\nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change),\n\nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political\n\nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political\n\nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining\n\n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of\n\nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased\n\nin the last two years of the period according to Figure 5 a.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "studies have noticed that the Maya inscription about doomsday, which seemed rather ridiculous for\n\nscientists, might lead to unexpected public associations with climate issues. However, science fiction\n\nmay influence the public’s attitude toward scientific issues. Frankenstein’s monster, a well-known\n\nfictional character who was a human-built creature in the novel written by Mary Shelley, has long been\n\nlinked to transgenic technology by referring genetically-modified food as “Frankenstein Food” [ 98 ].\n\nScientists found that these associations successfully symbolized the the public’s uncertainty about the\n\nrisk of transgenic technology, anxiety toward the human-made living creature, and moral discomfort\n\nabout reducing life to genetic code [ 99 ], even though people all know Frankenstein was only a fictional\n\ncharacter created 100 years ago. In the current study, we concludd that a similar mechanism may exist\n\nin global warming communication. Though “the end of world in 2012” and its adapted popular movie\n\nsounded unconvincing for scientists, the public, especially who have limited scientific literacy, were\n\ndefenceless against fiction [ 100 ]. Some of the public may accept the indications of temperature rise and\n\nextreme weather, and cannot help but strengthen their associations with global warming. However, no\n\nsimilar associations were discovered in the climate change discourse in 2012, which may suggest that\n\nglobal warming is more likely to be associated with disasters, risk, or negative sentiment compared\n\nwith climate change.\n\n### *5.3. Discrepancy between the Two Discourses*\n\nThe status of the two discourses varied significantly in the more recent years in the study period.\n\nData from Google in prior study suggested that the search record for global warming was larger\n\nthan that of climate change in earlier times [ 13 ]. The authors found that in the battle to be the most\n\nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and\n\nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange\n\nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute\n\ndimensions. Comparatively, the popularity of the global warming discourse among social media\n\nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when\n\nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse\n\ntoward climate change from global warming may be attributed to the high exposure of climate change\n\nin the media and scientific reports in recent years [ 13 ]. Previous studies noted that perceived scientific\n\nconsensus can increase acceptance of science [ 101 ]. Though global warming has been commonly used\n\nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to\n\nrefer a range of complex changes of climate [ 102 ]. Pew found science-related accounts draw millions\n\nof followers on Facebook and volume of posts they released climbed in past years [ 103 ]. Climate\n\nscientists are found to be opinion makers on Twitter [ 104 ]. As social media has become an emerging\n\nplatform for science popularization, scientific community might contribute to the prevalence of climate\n\nchange discourse by talking about climate change facts and mitigating measures [ 75 ].\n\nHowever, di ff erences between two discourses were not eliminated. Even though two discourses\n\nshowed more similarities in the rank order of key concepts, the QAP analysis of two matrices of\n\nsemantic network showed that two discourses still embody distinct public perceptions of climate issues\n\nby associating these hashtags in di ff erent manners.\n\nTo be specific, although “ipcc”, “cop”, and “un” were mentioned in both discourses (yellow\n\nin Figures 3 and 4 ) in earlier years, the clusters to which they belonged had significantly di ff erent", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed10.pdf" - }, - { - "text": "column name to create two matrices. One matrix was created for the climate change discourse, and we\n\nfilled the cell whose column name and row name were among the top 50 list in the climate change\n\ndiscourse with the frequency at which the two hashtags were associated in this discourse, and the\n\nother cells were filled with 0. This was repeated for the global warming matrix. We thus obtained\n\ntwo matrices with the same row and column names but di ff erent values in the cells. Then, the two\n\nmatrices were input to the quadratic assignment procedure (QAP) [ 85 ] analysis provided by UCINET\n\nsoftware [ 86 ] to assess their correlation for each year.\n\n## **4. Results**\n\n### *4.1. General Descriptions*\n\nAssociation networks surrounding #climatechange and #globalwarming showed di ff erent\n\nproperties. The climate change discourse included 38,821 hashtags, whereas the global warming\n\ndiscourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the\n\ntwo discourses based on centrality. As some hashtags were used in the form of an abbreviation or\n\nphrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant\n\nwords. Hashtags “canada”, “cdnpoli”, “sdgs”, “biodiversity”, “education”, “environmental”, “cop24”,\n\n“sustainable”, “auspol”, “food”, “agriculture”, “cleanenergy”, “renewableenergy”, “renewables”,\n\n“emissions”, “coal”, “fossilfuels”, and “cop21” only showed up on the top 50 list of the “climate change”\n\nnetwork. Hashtags “tcot”, “california”, “p2”, “nyc”, “snow”, “agw”, “summer”, “global”, “winter”,\n\n“india”, “planet”, “heatwave”, “hoax”, “nasa”, “algore”, “world”, “oil”, and “eco” were unique on the\n\ntop 50 list of the global warming network. The two lists only shared three out of the top five hashtags.\n\nIn the #climatechange network, “climateaction” was ranked third place and “sustainability” was\n\nranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the\n\n#globalwarming network. In the #globalwarming network, “earth” and “weather” were among the\n\ntop five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.\n\n**Table 1.** The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from\n\n2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\n\n**No. #Climatechange #Globalwarming**\n\n**Hashtag Centrality Hashtag Centrality**\n\n1 climate 0.466 climate 0.530\n\n2 environment 0.465 environment 0.446\n\n3 climateaction 0.391 science 0.319\n\n4 sustainability 0.316 earth 0.296\n\n5 science 0.314 weather 0.280\n\n6 energy 0.283 us * 0.280\n\n7 trump 0.257 trump 0.263\n\n8 us * 0.247 pollution 0.256\n\n9 cop21 * 0.232 co2 0.244\n\n10 parisagreement * 0.232 green 0.239\n\n11 actonclimate * 0.225 tcot * 0.229\n\n12 water 0.221 nature 0.213\n\n13 pollution 0.210 news 0.198\n\n14 earth 0.207 energy 0.192\n\n15 green 0.200 climatechangeisreal 0.187\n\n16 climatechangeisreal 0.195 obama 0.181\n\n17 renewableenergy * 0.194 climateaction 0.175\n\n18 health 0.193 algore * 0.174\n\n19 nature 0.187 water 0.171\n\n20 renewables 0.186 agw * 0.164\n\n21 cleanenergy 0.176 carbon 0.164\n\n22 carbon 0.175 sustainability 0.163", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" - }, - { - "text": "**Table 1.** *Cont.*\n\n**No. #Climatechange #Globalwarming**\n\n**Hashtag Centrality Hashtag Centrality**\n\n23 co2 0.174 snow 0.161\n\n24 weather 0.169 world 0.157\n\n25 solar 0.165 gop * 0.156\n\n26 economy 0.164 arctic 0.150\n\n27 auspol 0.163 * winter 0.145\n\n28 education 0.155 p2 * 0.144\n\n29 news 0.152 drought 0.142\n\n30 drought 0.150 epa * 0.141\n\n31 coal 0.147 global 0.137\n\n32 sustainable 0.147 eco 0.137\n\n33 cdnpoli 0.144 * actonclimate 0.136\n\n34 sdgs 0.143 * health 0.134\n\n35 china 0.143 un * 0.133\n\n36 gop 0.143 * solar 0.132\n\n37 food 0.141 economy 0.131\n\n38 un 0.141 * hoax 0.131\n\n39 cop24 * 0.140 california 0.130\n\n40 agriculture 0.138 politics 0.129\n\n41 environmental 0.136 india 0.128\n\n42 fossilfuels 0.134 china 0.127\n\n43 arctic 0.134 planet 0.127\n\n44 epa * 0.133 parisagreement * 0.126\n\n45 biodiversity 0.132 heatwave 0.125\n\n46 future 0.131 summer 0.121\n\n47 canada 0.128 nyc * 0.118\n\n48 emissions 0.128 nasa 0.118\n\n49 obama 0.127 future 0.118\n\n50 politics 0.125 oil 0.117\n\n### *4.2. Association Network Analysis*\n\nThe association networks of #climatechange and #globalwarming are shown in Figure 2 . Nodes\n\nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of\n\nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and\n\nfive in the #globalwarming network, where clusters are di ff erentiated by color (resolution is 0.75 for\n\nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each\n\ncluster are also summarized and represented in the network depicted in Figure 2 .\n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer\n\nto general facts about global climate issues, sharing words about the causes or e ff ects concerning\n\nsustainability. The di ff erence is that the largest cluster of #globalwarming (46% of the network) includes\n\nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the\n\nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as\n\nagriculture, biodiversity, education, and politics.\n\nFor the climate change discourse, the second-largest cluster (34%) is indicated in red and focuses\n\non the responsibility to tackle climate change, where several global action hashtags are included, such\n\nas “un”, “parisagreement”, “cop21”, and “cop24”. The theme of the third largest cluster (20%) in\n\nthe climate change discourse was energy (in blue). The smallest cluster (6%) in yellow sits in the\n\ncentral part of the network with a mixed theme composed of three highly ranked hashtags, including\n\n“environment” (No. 2), “climateaction” (No. 3), and “energy” (No. 6).", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" - }, - { - "text": "*Int. J. Environ. Res. Public Health* **2020** , *xx* , 5 12 of 22\n\n( **a** ) ( **b** )\n\n**Figure 5.** The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to\n\n2018 ( **a** ); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to\n\n2018 ( **b** ).\n\nAs the climate change and global warming discourses evolved over the past years, their relative\n\nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people\n\nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of\n\n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame\n\npreference. Figure 1 a displays that in 2009, the number of tweets with #climatechange was 2.69 times\n\nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02\n\nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into\n\ndiscussions, according to Figure 1 b. In 2009, the hashtags that co-occurred with #climatechange were\n\n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018.\n\nThe rank- order correlation coefficient of nodes between the two networks maintained a stable\n\nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6 a, except for 2010 and\n\n2011, when the *p* -values were larger than 0.05 and no significant correlations were identified. The QAP\n\nanalysis showed that the associations between the two discourses were correlated in the 10-year period\n\n(the *p* -value for 2015 was 0.011; *p* -values for all the other years were less than 0.001). Figure 6 b reveals\n\nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did\n\nnot show a rising trend with the correlation of nodes’ rank order .\n\n( **a** ) ( **b** )\n\n**Figure 6.** Rank order correlation between hashtags in the climate change and global warming discourses\n\nfrom 2009 to 2018 ( **a** ); correlation between matrices of the climate change discourse and the global\n\nwarming discourse from 2009 to 2018 ( **b** ).\n\n## **5. Discussion**\n\n### *5.1. Themes and Structure of the Two Discourses*\n\n#### 5.1.1. Phenomenon vs. Mechanism of Action\n\nClimate change and global warming have long been two competing frameworks shaping the\n\npublic’s perceptions, memory, and interpretations of climate issue by highlighting different aspects of\n\n**Figure 5.** The sum of centrality for nodes in four clusters in the climate change discourse from 2009 to\n\n2018 ( **a** ); (the sum of centrality for nodes in four clusters in the global warming discourse from 2009 to\n\n2018 ( **b** ).\n\nAs the climate change and global warming discourses evolved over the past years, their relative\n\nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people\n\nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of\n\n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame\n\npreference. Figure 1 a displays that in 2009, the number of tweets with #climatechange was 2.69 times\n\nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02\n\nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into\n\ndiscussions, according to Figure 1 b. In 2009, the hashtags that co-occurred with #climatechange were\n\n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018.\n\nThe rank- order correlation coe ffi cient of nodes between the two networks maintained a stable\n\nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6 a, except for 2010 and", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed10.pdf" - }, - { - "text": "complex changes in the state of the climate [ 7 ], which may be caused by natural process, external forces,\n\nor human interventions [ 8 ]. By randomly assigning respondents to climate change or global warming\n\nquestionnaires, scholars confirmed that the di ff erent connotations contained in the two definitions are\n\nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [ 9 ], which\n\nmay inhibit collaboration and joint e ff orts to mitigate the global challenge.\n\nPublic preference between climate change and global warming is even more apparent when\n\nconsidering the ideology spectrum [ 10 ]. Some scholars concluded that conservatives, who are\n\nless concerned with environmental issues, tended to use global warming as a narrative strategy\n\nbecause global warming has a more direct connection with temperature rise, making it easier to find\n\ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change\n\nfacts [ 11 ]. The associations between global warming and human activities may contribute to more\n\ncontroversies as well [ 12 ], connecting global warming more with the “hoax” frame [ 5 ] and evoking\n\ngreater negative sentiment [ 13 ].\n\nAlthough these existing studies have often attempted to identify the di ff erences between these two\n\nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause\n\nand e ff ect, were examined in each study [ 3 , 9 , 13 ]. However, the associate network model introduced by\n\npsychologists suggests that human recognition and memory have a network-shaped architecture [ 14 ],\n\nwhere individual understanding of particular objects is connected with numerous other objects in\n\nthe mind. According to the associate network model, individual understanding of the global climate\n\nconcern is a network composed of numerous inter-connected concepts, in which climate change and\n\nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue,\n\nthe preference between the two understandings may represent two distinct climate discourses by\n\ndi ff erently organizing numerous climate concepts. Examining the di ff erences between two discourses\n\nwith an associative perspective may provide communicators with unique insights into narrowing the\n\ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study\n\nof how concepts associated with each other have evolved with time.\n\nLarge amounts of user-generated data on social media, which have been valued in computer science,\n\ncommunication, and environmental studies [ 5 , 9 , 15 - 18 ], have enabled the acquistion of the social media\n\nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence\n\npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009\n\nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify\n\nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to\n\nobserve the evolution of the two discourses and to measure whether the discrepancy between the two\n\nhas widened or narrowed within the 10-year period.\n\nTo be specific, we formulated three research questions (RQs) to be explored in this study:\n\nRQ1: What is the di ff erence in how the two the discourses are associated with important climate\n\nconcepts in people’s minds?\n\nRQ2: How did the two competing climate discourses evolve from 2009 to 2018?\n\nRQ3: Did the two competing discourses converge or diverge in this decade?\n\n## **2. Background**\n\n### *2.1. Climate Change, Global Warming, and Frames*\n\nExisting studies have noted that the subtle di ff erence between climate change and global warming\n\nevokes di ff erent public cognitive responses, where global warming“indicates heat-related impacts,", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "7. Caitlyn Kennedy, R.L. What’s the Di ff erence between Global Warming and Climate Change? 2015. Available\n\nonline: https: // www.climate.gov / news-features / climate-qa / whats-di ff [erence-between-global-warming-and-](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change)\n\n[climate-change](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change) (accessed on 10 October 2019).\n\n8. Pachauri, R.K.; Allen, M.R.; Barros, V.R.; Broome, J.; Cramer, W.; Christ, R.; Church, J.A.; Clarke, L.; Dahe, Q.;\n\nDasgupta, P.; et al. *Climate Change 2014: Synthesis Report. Contribution of Working Groups I, II and III to the Fifth*\n\n*Assessment Report of the Intergovernmental Panel on Climate Change* ; IPCC: Geneva, Switzerland, 2014.\n\n9. Whitmarsh, L. What’s in a name? Commonalities and di ff erences in public understanding of “climate\n\nchange” and “global warming”. *Public Underst. Sci.* **2009** , *18* , 401- 420. [ [CrossRef](http://dx.doi.org/10.1177/0963662506073088) ]\n\n10. Shehata, A.; Hopmann, D.N. Framing climate change: A study of US and Swedish press coverage of global\n\nwarming. *Journal. Stud.* **2012** , *13* , 175- 192. [ [CrossRef](http://dx.doi.org/10.1080/1461670X.2011.646396) ]\n\n11. Schuldt, J.P.; Roh, S. Of accessibility and applicability: How heat-related cues a ff ect belief in “global warming”\n\nversus “climate change”. *Soc. Cogn.* **2014** , *32* , 217- 238. [ [CrossRef](http://dx.doi.org/10.1521/soco.2014.32.3.217) ]\n\n12. McCright, A.M.; Dunlap, R.E. Challenging global warming as a social problem: An analysis of the conservative\n\nmovement’s counter-claims. *Soc. Probl.* **2000** , *47* , 499- 522. [ [CrossRef](http://dx.doi.org/10.2307/3097132) ]\n\n13. Lineman, M.; Do, Y.; Kim, J.Y.; Joo, G.J. Talking about climate change and global warming. *PLoS ONE* **2015** ,\n\n*10* , e0138996. [ [CrossRef](http://dx.doi.org/10.1371/journal.pone.0138996) ]\n\n14. Anderson, J.R. *The Architecture of Cognition* ; Psychology Press: London, UK, 2013.\n\n15. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of tra ffi c anomalies based on human mobility\n\nand social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in\n\nGeographic Information Systems, Orlando, FL, USA, 5- 8 November 2013; pp. 344- 353.\n\n16. Rogstadius, J.; Vukovic, M.; Teixeira, C.A.; Kostakos, V.; Karapanos, E.; Laredo, J.A. CrisisTracker:\n\nCrowdsourced social media curation for disaster awareness. *IBM J. Res. Dev.* **2013** , *57* , 4:1- 4:13. [ [CrossRef](http://dx.doi.org/10.1147/JRD.2013.2260692) ]\n\n17. Leetaru, K.; Wang, S.; Cao, G.; Padmanabhan, A.; Shook, E. Mapping the global Twitter heartbeat: The\n\ngeography of Twitter. *First Monday* **2013** , *18* . [ [CrossRef](http://dx.doi.org/10.5210/fm.v18i5.4366) ]\n\n18. Kirilenko, A.P.; Molodtsova, T.; Stepchenkova, S.O. People as sensors: Mass media and local temperature\n\ninfluence climate change discussion on Twitter. *Glob. Environ. Chang.* **2015** , *30* , 92- 100. [ [CrossRef](http://dx.doi.org/10.1016/j.gloenvcha.2014.11.003) ]\n\n19. Gamson, W.A.; Modigliani, A. Media discourse and public opinion on nuclear power: A constructionist\n\napproach. *Am. J. Sociol.* **1989** , *95* , 1- 37. [ [CrossRef](http://dx.doi.org/10.1086/229213) ]\n\n20. Entman, R.M. Framing: Toward clarification of a fractured paradigm. *J. Commun.* **1993** , *43* , 51- 58. [ [CrossRef](http://dx.doi.org/10.1111/j.1460-2466.1993.tb01304.x) ]\n\n21. McCombs, M.; Llamas, J.P.; Lopez-Escobar, E.; Rey, F. Candidate images in Spanish elections: Second-level\n\nagenda-setting e ff ects. *Journal. Mass Commun. Q.* **1997** , *74* , 703- 717. [ [CrossRef](http://dx.doi.org/10.1177/107769909707400404) ]", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - }, - { - "text": "lead to some degree of inconsistency between the analysis of the ClimPACT extremes and the\n\nHCVI and JULES impacts projections.\n\n## 3. Results\n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the\n\nlevel of agreement between models for a particular projected change, and hence an indication\n\nof potential robustness of the projected changes for informing adaptation. We then make a\n\ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would\n\nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in\n\nregional climate outcomes, we address this in a number of ways. For individual realizations, we\n\ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C,\n\neven if the sign of the change is uncertain. We also compare the range of outcomes at different\n\nGWLs, to see if the regional-scale uncertainty itself increases with global warming.\n\n### (a) Climate-change impacts at 2 ° C global warming\n\nFor 2°C global warming, the ensemble-mean increase in annual daily maximum temperature was\n\nabove 2°C for most of the land surface, with the exception of the Indian subcontinent, most of\n\nAustralia and Antarctica ( figure 2 ). The increase was higher still in many regions; most of North\n\nAmerica, much of China and north Asia, northwestern South America and all of Europe. In the\n\nnorthern and eastern USA and much of northern and western Europe, the annual daily maximum\n\ntemperature increased by over 4°C for 2°C global warming. The global mean TXx increased by\n\nmore than 2°C in all ensemble members ( table 5 ), so the maximum temperature warming more\n\nthan the global annual mean is a consistent result across all projections here, as found in previous\n\nstudies with other models [ 9 ] ( table 5 ).\n\nThe different ensemble members give somewhat different results at regional scales, although\n\nthere is a strong consensus on the temperature extremes examined here becoming warmer. In\n\nthe simulations driven by SSTs and SICs from the two IPSL CMIP5 models, most of the global", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - }, - { - "text": "as these two hashtags exactly correspond to climate change and global warming, respectively, the two\n\ncompeting definitions of climate issues. We did not follow [ 79 ] to include #AGW (anthropogenic\n\nglobal warming) as query hashtags in our research because we think that this refers to global\n\nwarming in a defined category so cannot be regarded in parallel with the two considered hashtags.\n\nWe limited the scope of the search to English-language tweets generated between 1 January 2009\n\nand 31 December 2018. We only collected tweets containing either of the two hashtags in the body\n\nof the tweets rather than those containing these hashtags in the retweeted or quoted text, as we\n\nthink that retweeted text or quoted texts cannot directly represent the tweeter’s usage pattern of the\n\ntwo terminologies.\n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to\n\nselect hashtags, language, start date, and end date as inputs. Once the first request was completed,\n\nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending\n\norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain\n\nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler was\n\nautomatically terminated when all the qualified tweets publicly available were collected. Our crawler\n\nrespected Twitter’s robot.txt and we did not collect, analyze or display any user information in\n\nour study.\n\nGiven our goal of exploring the difference between the two discourses, the 615,816 tweets\n\ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets\n\nfollowing [ 67 , 80 ]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained\n\n#climatechange, and 887,731 contained “#globalwarming”. The number of qualified tweets containing\n\n#climatechange and #globalwarming in each year is displayed in Figure 1 a.\n\n( **a** ) ( **b** )\n\n**Figure 1.** The number of tweets containing #climatechange or #globalwarming, and their ratio from\n\n2009 to 2018 ( **a** ). The number of hashtags contained in the “climate change” or “global warming”\n\ndatasets, and their ratio from 2009 to 2018 ( **b** ).\n\n**Figure 1.** The number of tweets containing #climatechange or #globalwarming, and their ratio from\n\n2009 to 2018 ( **a** ). The number of hashtags contained in the “climate change” or “global warming”\n\ndatasets, and their ratio from 2009 to 2018 ( **b** ).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed10.pdf", - "query": "What are two main reasons for one's low climate concern ?", - "target_page": 13, - "target_passage": "As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "issues and re-constructing them di ff erently. By comparing the persistent words used related to the two\n\ndiscourses in the 10-year period in Table 2 , we think that global warming showed a relative preference\n\ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change”\n\nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”.\n\nStudies have suggested that the public shows a preference for scientific publications with general\n\nkeywords compared with those with complicated scientific jargon [ 47 ], lacking a deep understanding of\n\nthe complicated issue [ 46 ] and the necessity for mitigation of the climate issue [ 47 ]. These conclusions\n\nseem to suit global warming more than climate change according to the current study, which is\n\nprobably because climate change receives more publicity and recognition than global warming in the\n\nscientific community. In the association network shown in Figure 2 , global warming was found to be\n\nmore connected with temperature abnormalities. This finding is in accordance with studies reporting\n\nthat short-term temperature anomalies [ 87 ] can increase the public’s belief about global warming by\n\nincreasing the understanding of this abstract issue [ 88 ], although scientists mostly make judgments\n\nbased on long-term weather statistics [ 89 ]. However, none of the four words, “snow”, “summer”,\n\n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes\n\nlist of the climate change network.\n\nEven when climate change and global warming shared concern about similar topics such as the\n\ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas\n\nclimate change preferred a more in-depth perspective, highlighting the importance of global action\n\nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to\n\ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long\n\nbeen regarded as two key reasons for low climate concern [ 90 ], the two terminologies’ di ff erences\n\nin connotations suggest that introducing these absent sub-topics into global warming discourse or\n\nhighlighting climate change for its inherent connotations may help communicators raise public concern\n\nabout climate.\n\n#### 5.1.2. Political Connotations\n\nStudies noted that frame preference between climate change and global warming reflects\n\nindividuals’ ideological spectrum, where climate change and global warming were favored by\n\nthe liberals and conservatives, respectively [ 10 ]. The cluster analysis of the semantic network in the\n\ncurrent study demonstrated that global warming triggered far more political responses than climate\n\nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored\n\nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes\n\nof the global warming discourse, but neither was included in the list of top nodes of the climate change\n\ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used\n\nby conservatives to question the reality of climate issue [ 11 ] and climate change is more commonly\n\nadopted when discussing action against the climate change issue [ 5 ], global warming had a stronger\n\npolitical connotation in public discussion.\n\n#### 5.1.3. Discourse Structure\n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action”\n\nrepresented the themes of the three largest clusters in the network. However, three popularly recurring\n\nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters\n\nabove, but formed another small tight cluster together, sitting in the most central part of the semantic\n\nnetwork, as shown in Figure 2 b. As each of the three hashtags can almost represent one sub-theme of", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "complex changes in the state of the climate [ 7 ], which may be caused by natural process, external forces,\n\nor human interventions [ 8 ]. By randomly assigning respondents to climate change or global warming\n\nquestionnaires, scholars confirmed that the di ff erent connotations contained in the two definitions are\n\nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [ 9 ], which\n\nmay inhibit collaboration and joint e ff orts to mitigate the global challenge.\n\nPublic preference between climate change and global warming is even more apparent when\n\nconsidering the ideology spectrum [ 10 ]. Some scholars concluded that conservatives, who are\n\nless concerned with environmental issues, tended to use global warming as a narrative strategy\n\nbecause global warming has a more direct connection with temperature rise, making it easier to find\n\ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change\n\nfacts [ 11 ]. The associations between global warming and human activities may contribute to more\n\ncontroversies as well [ 12 ], connecting global warming more with the “hoax” frame [ 5 ] and evoking\n\ngreater negative sentiment [ 13 ].\n\nAlthough these existing studies have often attempted to identify the di ff erences between these two\n\nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause\n\nand e ff ect, were examined in each study [ 3 , 9 , 13 ]. However, the associate network model introduced by\n\npsychologists suggests that human recognition and memory have a network-shaped architecture [ 14 ],\n\nwhere individual understanding of particular objects is connected with numerous other objects in\n\nthe mind. According to the associate network model, individual understanding of the global climate\n\nconcern is a network composed of numerous inter-connected concepts, in which climate change and\n\nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue,\n\nthe preference between the two understandings may represent two distinct climate discourses by\n\ndi ff erently organizing numerous climate concepts. Examining the di ff erences between two discourses\n\nwith an associative perspective may provide communicators with unique insights into narrowing the\n\ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study\n\nof how concepts associated with each other have evolved with time.\n\nLarge amounts of user-generated data on social media, which have been valued in computer science,\n\ncommunication, and environmental studies [ 5 , 9 , 15 - 18 ], have enabled the acquistion of the social media\n\nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence\n\npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009\n\nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify\n\nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to\n\nobserve the evolution of the two discourses and to measure whether the discrepancy between the two\n\nhas widened or narrowed within the 10-year period.\n\nTo be specific, we formulated three research questions (RQs) to be explored in this study:\n\nRQ1: What is the di ff erence in how the two the discourses are associated with important climate\n\nconcepts in people’s minds?\n\nRQ2: How did the two competing climate discourses evolve from 2009 to 2018?\n\nRQ3: Did the two competing discourses converge or diverge in this decade?\n\n## **2. Background**\n\n### *2.1. Climate Change, Global Warming, and Frames*\n\nExisting studies have noted that the subtle di ff erence between climate change and global warming\n\nevokes di ff erent public cognitive responses, where global warming“indicates heat-related impacts,", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "make global action salient for people talking about global warming than people talking about climate\n\nchange [ 40 ], even though the facts of climate issues are highly recognized in both discourses.\n\n## **6. Conclusions**\n\nAs social media is gradually overtaking the role of legacy media providing a forum for public\n\ndiscussion, the semantic associations contained in social media discussions reflect and reinforce how\n\nindividuals portray global climate issues. By examining hashtag co-occurrence patterns on Twitter\n\nbetween 2009 and 2018, we identified distinct climate perceptions hidden behind two competing\n\nclimate discourses and discovered how these two discourses evolved.\n\nWe found that broad scientific, social, political, and international discussions are the topics\n\nof public climate discourse. Although the semantic di ff erence between climate change and global\n\nwarming seems subtle, the di ff erences in their cognitive associations are not trivial. Despite some\n\nshared concerns between the two discourses, “global warming” is more politicized and focuses more on\n\ngeneral phenomena, especially temperature abnormalities, whereas climate change is a more compact\n\ntopic with a more scientific perspective and tends to refer to specific issues. The temporal analysis\n\nrevealed that traditional political discussions decreased in both discourses but climate change started to\n\nbuild a discourse alliance with diverse domestic issues to show political intentions. Global warming’s\n\nassociations to extreme events and temperature change were suddenly strengthened around 2012.\n\nClimate change is becoming dominant compared with global warming in public discussions. Although\n\nthe two discourses are becoming increasingly similar in the rank order of climate concepts, a notable\n\ndiscrepancy still exists in the way in which they get concepts associated. These observations may\n\nprovide climate communicators with theoretical and practical hints to narrow the discrepancy between\n\ndiverse climate perceptions.\n\n*Limitation and Future Directions*\n\nThough big data allowed us to decrease the bias by dealing with the whole set of social media\n\ndata rather than samples, discrepancies still exist between social media users and the public. As most\n\nTwitter users do not disclose their age, education, income, and gender in users’ profile, demographics\n\nwere not introduced as moderator factors in this study. Previous studies noted that in 1970s, global\n\ncooling was a prominent climate concern amongst the public [ 105 ]. While in the 1980s, ozone layer\n\ndepletion, species extinction and rainforest destruction became salient on the mass media agenda [ 106 ].\n\nConsidering the historical background of climate issues, age might influence how individuals perceive\n\nclimate issues. According to the statistics in 2017 [ 107 ], only 16 % of older people (older than 60)\n\nin America use Twitter, while the proportion is 39% for people between 30- 59 years old and 47%\n\nfor people younger than 30 years old (Stastista, 2017). Our results reflect the climate perception of\n\nolder people who use Twitter, as well as younger people amongst whom Twitter is more popular.\n\nAlthough some scholars reported that it is statistically reliable to take data on Twitter as a substitute\n\nand supplement for polling [ 108 ], we thought our results should be further examined before being\n\ngeneralized to the whole population.\n\nIn this study, we characterized the di ff erences between two popular climate discourses and\n\nexamined how two discourses evolved over a 10-year period. We did not focus on the interactions\n\nbetween public climate discourse and external factors. However, the evolution of climate discourse\n\nmight be driven by several external forces such as scientific e ff orts, natural events, politics and\n\nonline information (or misinformation) campaigns. The prevalence of certain climate concepts may", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" - }, - { - "text": "**2** Model Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration\n\nscenario. To provide more detailed representations of climate processes and impacts, the\n\nspatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution\n\nthan the CMIP5 models. We used a set of impacts-relevant indices and a global land surface\n\nmodel to examine the projected changes in weather extremes and their implications for\n\nfreshwater availability and vulnerability to food insecurity. Uncertainties in regional climate\n\nresponses are assessed, examining ranges of outcomes in impacts to inform risk assessments.\n\nDespite some degree of inconsistency between components of the study due to the need to\n\ncorrect for systematic biases in some aspects, the outcomes from different ensemble members\n\ncould be compared for several different indicators. The projections for weather extremes\n\nindices and biophysical impacts quantities support expectations that the magnitude of change\n\nis generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with\n\nincreases being more intense than seen in CMIP5 projections. Precipitation-related extremes\n\nshow more geographical variation with some increases and some decreases in both heavy\n\nprecipitation and drought. There are substantial regional uncertainties in hydrological impacts\n\nat local scales due to different climate models producing different outcomes. Nevertheless,\n\nhydrological impacts generally point towards wetter conditions on average, with increased\n\nmean river flows, longer heavy rainfall events, particularly in South and East Asia with the\n\nmost extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global\n\nwarming. Some areas are projected to experience shorter meteorological drought events and\n\nless severe low flows, although longer droughts and/or decreases in low flows are projected\n\nin many other areas, particularly southern Africa and South America. Flows in the Amazon\n\nare projected to decline by up to 25%. Increases in either heavy rainfall or drought events\n\nimply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this\n\nvulnerability is projected to remain smaller than at 2°C global warming in approximately 76%\n\nof developing countries. At 2°C, four countries are projected to reach unprecedented levels of\n\nvulnerability to food insecurity.\n\nThis article is part of the theme issue ‘The Paris Agreement: understanding the physical and\n\nsocial challenges for a warming world of 1.5°C above pre-industrial levels’.\n\n## 1. Introduction\n\nThe majority of climate-change impacts assessments have tended to be framed in terms of future\n\ntime horizons, e.g. impacts by the middle or end of the twenty-first century [ 1 , 2 ]. However,\n\nwith international climate policy now largely focused on limiting warming to specific levels of\n\nglobal mean temperature such as 2°C [ 3 ] or 1.5°C [ 4 ], policy-relevant climate impacts assessments\n\nincreasingly need to be framed in terms of such warming levels.\n\nThere are two major research questions concerning the impacts of climate change at 1.5°C and\n\n2°C global warming, which are relevant to both mitigation and adaptation policy areas.\n\n(i) How much larger are the impacts at 2°C compared to 1.5°C? This is the primary question\n\narising from the Paris Agreement [ 4 ] and is relevant to mitigation policy, informing\n\njudgements and actions on holding the global temperature rise to ‘well below 2°C’ and\n\n‘pursuing efforts to limit the temperature increase to 1.5°C’.\n\n(ii) What regional climate conditions and related hydrological and ecological conditions\n\ncould occur at a particular level of global warming, such as 2°C? This is relevant to\n\nadaptation policy and planning—exploring the possible outcomes for these levels of\n\nwarming will help facilitate adaptation and improved resilience to account for a 1.5°C or", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed11.pdf" - }, - { - "text": "In the global warming network, politics was the second-largest discourse cluster (20% of the\n\nnetwork), where “tcot”, short for “Top Conservatives on Twitter”, was the node ranked highest,\n\nand “p2”, short for “Progressives 2.0”, is also included. Several political figures, such as Obama and Al\n\nGore, are frequently mentioned. Action toward the global climate issue was the third-largest cluster\n\n(16%), including both domestic e ff orts, such as “us”, “trump”, “climatechangeisreal”, “climateaction”,\n\nand “epa”, and two international items, like “china” and “india”. The fourth cluster (in blue) referred\n\nto emissions, including hashtags like “co2”, “green”, and “carbon”. The smallest cluster (8%) was\n\ncomposed of “snow”, “winter”, “heatwave”, and “summer”, referring to the temperature abnormalities\n\non the earth.\n\n### *4.3. Temporal Analysis of the Associations in the Two Discourses*\n\nThe online presentations of the climate change and global warming discourses are dynamic.\n\nAs shown in Table 2 , for the global warming discourse, 11 key concepts remained in the top 50 central\n\nhashtags each year for all 10 years, with 16 for the climate change”discourse. By comparing the 11\n\nnodes of the global warming discourse and the 16 nodes of the climate change discourse, we found that\n\nthe two lists shared nine concepts. We found “pollution” and “earth” were unique to the keyword list\n\nof the global warming discourse, and “economy”, “water”, “china”, “coal”, “solar”, “sustainability”,\n\nand “food” only occurred on the critical list for the climate change discourse.\n\n**Table 2.** Hashtags that remained on the top 50 list for the climate change or the global warming\n\ndiscourse from 2009 to 2018.\n\n**Unique Shared**\n\n#climatechange china, solar, water, food, economy, coal, sustainability co2, news, carbon, green, climate,\n\n#globalwarming pollution, earth us, energy, science, environment\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period,\n\nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies\n\nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary\n\nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more\n\nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of\n\nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the\n\n10 years, as shown in Figure 5 .\n\nFigure 3 depicts the associations of hashtags in the climate change discourse for each year\n\nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the\n\nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg”\n\n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global\n\nactions cluster (in yellow) because these hashtags were frequently used in the global action context and\n\nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags,\n\nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental\n\nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change),\n\nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political\n\nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political\n\nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining\n\n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of\n\nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased\n\nin the last two years of the period according to Figure 5 a.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed10.pdf" - }, - { - "text": "**3** A combination of the above questions is also relevant—how does the range of outcomes at 2°C\n\ncompare to that at 1.5°C? This is also relevant to adaptation policy, as it can inform assessment on\n\nwhether to adapt to potential impacts at 2°C or just 1.5°C. Putting in place adaptation measures\n\nto deal with potential impacts at 1.5°C and then increasing these to deal with 2°C later may\n\nbe more expensive and difficult than adapting to potential risks at 2°C at the outset. On the\n\nother hand, because adaptation actions may themselves have consequences, unnecessary over-\n\nadaptation may have undesirable effects which it may be preferable to avoid or at least delay\n\nuntil absolutely necessary.\n\nBoth questions require an appropriate assessment of uncertainty. There are considerable\n\nuncertainties in projections of regional climate change, with different climate models projecting\n\nregional climate changes that can differ in magnitude or even, in the case of precipitation\n\nand impacts quantities strongly related to this, differ in sign [ 5 , 6 ]. This may have important\n\nimplications for regional impacts at specific levels of global warming. A common approach to\n\nexploring and presenting such uncertainties is to examine the ensemble mean and the level of\n\nconsensus among the ensemble members on the sign of the change. While this can often be useful\n\nin informing an assessment of the level of confidence in future projections, it may not always be\n\nsufficient to fully inform decisions. Risk assessment approaches require consideration of a range\n\nof possible risks, not just the most likely. This paper explores a range of regional climate states\n\nand related impacts that occur at global warming of 2°C, and a range of differences with warming\n\nlimited to 1.5°C.\n\nWe examine the implications of our new climate projections by applying some commonly\n\nused indices of climate extremes, and a further index quantifying relative vulnerability to food\n\ninsecurity which combines climate extremes indices with information on a range of factors\n\nrepresenting sensitivity and adaptability of food systems to climate hazards. We also use the\n\nclimate projections to drive a global land surface model to simulate changes in run-off as\n\nan indicator of freshwater availability. We assess whether regional extremes are projected to\n\nincrease or decrease at 2°C global warming, and whether the consequent impact on drought and\n\nvulnerability to food insecurity become greater or smaller. We also assess whether these changes\n\nare reduced by limiting global warming to 1.5°C. We explore some of the uncertainties in these\n\nprojections, and, in particular, examine whether the use of ensemble-mean projections is a useful\n\nsimple guide to impacts projections or whether this can lead to a misleading impression for some\n\nimpacts. Regarding vulnerability to food insecurity, we consider the impacts of global warming\n\nat 1.5°C and 2°C alongside socio-economic influences that affect the sensitivity to climate change.\n\nWe also consider our climate-change impacts results in comparison with other studies using older,\n\nlower-resolution climate projections.\n\nA large number of previous studies have assessed potential impacts of future climate change\n\nusing the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [ 7 ],\n\nand some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [ 8 , 9 ]. We\n\nalso base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere\n\nmodel to provide greater spatial detail and improved representation of atmospheric processes.\n\n## 2. Methods and models\n\n### (a) Global climate simulations at 1.5 ° C and 2 ° C global warming\n\nThere are a number of ways in which 1.5°C or 2°C global warming can be defined—one could\n\nbe the long-term climate state following a stabilization of warming at that level, another could", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" - }, - { - "text": "There are a number of ways in which 1.5°C or 2°C global warming can be defined—one could\n\nbe the long-term climate state following a stabilization of warming at that level, another could\n\nbe the state over a shorter period around the time of first reaching that level. Here we choose the\n\nsecond definition, which is what is seen first and hence needs to be adapted to. There are also\n\na number of methods with which such changes can be assessed [ 10 ]. We take the opportunity\n\nof availability of a new set of higher-resolutions transient climate and impacts simulations, and\n\nuse a time-sampling methodology [ 10 ] to assess global-scale impacts at these resolutions for the\n\nfirst time.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" - }, - { - "text": "**14**\n\nACCESS1-0\n\n- 1.00 - 0.75 - 0.50 - 0.25 0 0.25 0.50 0.75 1.00\n\nIPSL-CM5A-LR\n\nensemble mean\n\nchange in vulnerability to food insecurity\n\nIPSL-CM5A-MR MIROC-ESM-CHEM\n\nGFDL-ESM2M\n\n**Figure 8.** Change in Hunger and Climate Vulnerability Index relative to baseline calculated for simulated climate states at 2 ° C\n\nglobalwarming,forfiveindividualHadGEM3simulationsdrivenbySSTsandSICsfromdifferentmembersoftheCMIP5ensemble,\n\nand the ensemble mean.\n\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher\n\nthan any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen.\n\nThe implication of such HCVI values is that climate change at 2°C is projected to cause levels\n\nof vulnerability to food insecurity that are greater than any seen in the present day. For\n\nindividual ensemble members, the number of countries with ‘unprecedented’ HCVI values at\n\n2°C varies from three to seven. Conversely, many countries in the baseline climate have levels\n\nof vulnerability to food insecurity that are greater than those expected in other countries under\n\n2°C global warming. This suggests that other factors are already posing greater risk for food\n\ninsecurity than 2°C climate change is expected to cause in other countries, so the increased risk\n\nfrom climate change should not overshadow the need to reduce vulnerability to food insecurity\n\narising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by\n\naddressing various socio-economic issues in such counties.\n\nThe JULES simulations show a general tendency towards increased run-off over\n\napproximately half of the land surface ( figure 9 ) and the majority of the major river basins\n\nassessed ( figure 10 ), but with large regional uncertainties including the possibility of decreased\n\nflows in many basins. The ensemble-mean change in mean streamflow shows an increase of\n\nbetween 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing\n\nan increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and\n\nsouthcentral USA, which see less than a 5% change in run-off, and the already very dry region of\n\nthe Sahara Desert where the existing very small run-off become even smaller.\n\nEnsemble-mean projected changes in low run-off flows are generally larger ( figure 11 ), with\n\nthe regions seeing an increase in mean run-off seeing a larger percentage increase in low\n\nrun-off—over 75% increases over much of North America, Eastern Europe and Asia. Note that\n\nthis does not necessarily imply a larger increase in absolute low flow compared to absolute mean\n\nflow, because the baseline is (by definition) smaller for low flows. In western Europe, where the\n\nchanges in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed11.pdf" - }, - { - "text": "evokes di ff erent public cognitive responses, where global warming“indicates heat-related impacts,\n\nhuman causes, increased UV light penetration, ozone depletion, and the greenhouse e ff ect, whereas\n\nclimate change is more associated with a wide range of influences on climate, including drought and\n\nagriculture [ 9 ]. An N-gram analysis suggested that global warming showed a closer connection with\n\nice, snow, and sea, whereas climate change was always connected with scientific investigations, such as", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "studies have noticed that the Maya inscription about doomsday, which seemed rather ridiculous for\n\nscientists, might lead to unexpected public associations with climate issues. However, science fiction\n\nmay influence the public’s attitude toward scientific issues. Frankenstein’s monster, a well-known\n\nfictional character who was a human-built creature in the novel written by Mary Shelley, has long been\n\nlinked to transgenic technology by referring genetically-modified food as “Frankenstein Food” [ 98 ].\n\nScientists found that these associations successfully symbolized the the public’s uncertainty about the\n\nrisk of transgenic technology, anxiety toward the human-made living creature, and moral discomfort\n\nabout reducing life to genetic code [ 99 ], even though people all know Frankenstein was only a fictional\n\ncharacter created 100 years ago. In the current study, we concludd that a similar mechanism may exist\n\nin global warming communication. Though “the end of world in 2012” and its adapted popular movie\n\nsounded unconvincing for scientists, the public, especially who have limited scientific literacy, were\n\ndefenceless against fiction [ 100 ]. Some of the public may accept the indications of temperature rise and\n\nextreme weather, and cannot help but strengthen their associations with global warming. However, no\n\nsimilar associations were discovered in the climate change discourse in 2012, which may suggest that\n\nglobal warming is more likely to be associated with disasters, risk, or negative sentiment compared\n\nwith climate change.\n\n### *5.3. Discrepancy between the Two Discourses*\n\nThe status of the two discourses varied significantly in the more recent years in the study period.\n\nData from Google in prior study suggested that the search record for global warming was larger\n\nthan that of climate change in earlier times [ 13 ]. The authors found that in the battle to be the most\n\nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and\n\nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange\n\nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute\n\ndimensions. Comparatively, the popularity of the global warming discourse among social media\n\nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when\n\nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse\n\ntoward climate change from global warming may be attributed to the high exposure of climate change\n\nin the media and scientific reports in recent years [ 13 ]. Previous studies noted that perceived scientific\n\nconsensus can increase acceptance of science [ 101 ]. Though global warming has been commonly used\n\nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to\n\nrefer a range of complex changes of climate [ 102 ]. Pew found science-related accounts draw millions\n\nof followers on Facebook and volume of posts they released climbed in past years [ 103 ]. Climate\n\nscientists are found to be opinion makers on Twitter [ 104 ]. As social media has become an emerging\n\nplatform for science popularization, scientific community might contribute to the prevalence of climate\n\nchange discourse by talking about climate change facts and mitigating measures [ 75 ].\n\nHowever, di ff erences between two discourses were not eliminated. Even though two discourses\n\nshowed more similarities in the rank order of key concepts, the QAP analysis of two matrices of\n\nsemantic network showed that two discourses still embody distinct public perceptions of climate issues\n\nby associating these hashtags in di ff erent manners.\n\nTo be specific, although “ipcc”, “cop”, and “un” were mentioned in both discourses (yellow\n\nin Figures 3 and 4 ) in earlier years, the clusters to which they belonged had significantly di ff erent", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed10.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic3.pdf", - "query": "How many scholarly articles are published every year ?", - "target_page": 1, - "target_passage": "over 3 million scholarly articles published per year", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "institutional requirements. The participants provided their written\n\ninformed consent to participate in this study.\n\n### Author contributions\n\nSD: Conceptualization, Data curation, Formal Analysis,\n\nInvestigation, Methodology, Project administration, Resources,\n\nVisualization, Writing - original draft, Writing - review &\n\nediting. EA: Conceptualization, Formal Analysis, Methodology,\n\nSupervision, Writing - review & editing. BN: Conceptualization,\n\nFormal Analysis, Funding acquisition, Methodology, Project\n\nadministration, Resources, Supervision, Writing - review & editing.\n\n### Funding\n\nThe author(s) declare that fi nancial support was received for\n\nthe research, authorship, and/or publication of this article.\n\nThe development of the CoreDISTparticipation and the RCT is\n\nfunded by the Northern Norway Health Authority (Helse Nord\n\nRHF). This interview study was funded by Nord University\n\n(PhD salary).\n\n### Acknowledgments\n\nThe authors would like to thank the participants in this study\n\nand the user representatives from Nordland MS Association for\n\ntheir valuable contributions. The authors also acknowledge\n\nphilosopher of the mind and cognitive sciences Hanne De\n\nJaegher for the valuable comments on the interpretations and\n\ndiscussions of the results.\n\n### Con fl ict of interest\n\nThe authors declare that the research was conducted in the\n\nabsence of any commercial or fi nancial relationships that could\n\nbe construed as a potential con fl ict of interest.\n\n### Publisher ’ s note\n\nAll claims expressed in this article are solely those of the authors\n\nand do not necessarily represent those of their af fi liated organizations,\n\nor those of the publisher, the editors and the reviewers. Any product\n\nthat may be evaluated in this article, or claim that may be made by its\n\nmanufacturer, is not guaranteed or endorsed by the publisher.\n\n### References\n\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising\n\nprevalence of multiple sclerosis worldwide: insights from the Atlas of MS, third\n\nedition. Mult Scler . (2020) 26(14):1816 - [21. doi: 10.1177/1352458520970841](https://doi.org/10.1177/1352458520970841)\n\n2. Casey B, Coote S, Galvin R, Donnelly A. Objective physical activity levels in\n\npeople with multiple sclerosis: meta-analysis. Scand J Med Sci Sports . (2018) 28\n\n(9):1960 - [9. doi: 10.1111/sms.13214](https://doi.org/10.1111/sms.13214)\n\n3. Kinnett-Hopkins D, Adamson B, Rougeau K, Motl RW. People with MS are less\n\nphysically active than healthy controls but as active as those with other chronic\n\ndiseases: an updated meta-analysis. Mult Scler Relat Disord . (2017) 13:38 - 43.\n\n[doi: 10.1016/j.msard.2017.01.016](https://doi.org/10.1016/j.msard.2017.01.016)\n\n4. Hoang PD, Lord S, Gandevia S, Menant J. Exercise and sports science Australia\n\n(ESSA) position statement on exercise for people with mild to moderate multiple\n\nsclerosis. J Sci Med Sport . (2022) 25(2):146 - [54. doi: 10.1016/j.jsams.2021.08.015](https://doi.org/10.1016/j.jsams.2021.08.015)\n\n5. Dalgas U, Langeskov-Christensen M, Stenager E, Riemenschneider M, Hvid LG.\n\nExercise as medicine in multiple sclerosis — time for a paradigm shift: preventive,\n\nsymptomatic, and disease-modifying aspects and perspectives. Curr Neurol Neurosci\n\nRep . (2019) 19(11):1 - [12. doi: 10.1007/s11910-019-1002-3](https://doi.org/10.1007/s11910-019-1002-3)\n\n6. Riemenschneider M, Hvid LG, Ringgaard S, Nygaard MKE, Eskildsen SF,\n\nGaemelke T, et al. Investigating the potential disease-modifying and neuroprotective\n\nef fi cacy of exercise therapy early in the disease course of multiple sclerosis: the early\n\nmultiple sclerosis exercise study (EMSES). Mult Scler . (2022) 28(10):1620 - [9. doi: 10.](https://doi.org/10.1177/13524585221079200)\n\n[1177/13524585221079200](https://doi.org/10.1177/13524585221079200)\n\n7. Kalb R, Brown TR, Coote S, Costello K, Dalgas U, Garmon E, et al. Exercise and\n\nlifestyle physical activity recommendations for people with multiple sclerosis", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "All rights reserved. No part of this publication may be reproduced or transmitted\n\nin any form or by any means, electronic or mechanical, including photocopying,\n\nrecording, or any information storage or retrieval system, without prior permission in\n\nwriting from the publisher. Subject to any applicable licensing terms and conditions in\n\nthe case of electronically supplied publications, a person may engage in fair dealing\n\nwith a copy of this publication for his or her personal or private use, or his or her\n\nresearch or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978.\n\nThe authors and the publisher have made every effort to obtain permission for and\n\nto acknowledge the use of copyright material. Should any infringement of copyright\n\nhave occurred, please contact the publisher, and every effort will be made to rectify\n\nomissions or errors in the event of a reprint or new edition.\n\nDeveloped for Oxbridge Academy - 2015", - "page_start": 1, - "page_end": 1, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "[00unse). Cambridge University Press. ISBN 978-0-5214-1910-9.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-5214-1910-9)\n\nMansel, Philip. *King of the World: The Life of Louis XIV* (University of Chicago Press, 2020) scholarly biography;\n\n[online review (https://www.wsj.com/articles/king-of-the-world-review-solar-power-11602860424) Archived (https://](https://web.archive.org/web/20201020070226/https://www.wsj.com/articles/king-of-the-world-review-solar-power-11602860424)\n\n[web.archive.org/web/20201020070226/https://www.wsj.com/articles/king-of-the-world-review-solar-power-116028](https://web.archive.org/web/20201020070226/https://www.wsj.com/articles/king-of-the-world-review-solar-power-11602860424)\n\n[60424) 20 October 2020 at the Wayback Machine](https://en.wikipedia.org/wiki/Wayback_Machine)\n\nMerriman, John (2019) [1996]. *A History of Modern Europe* [ (4th ed.). W.W. Norton & Co. ISBN 978-0-3939-6888-0.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-3939-6888-0)\n\nMerryman, John Henry (2007). *The Civil Law Tradition: An Introduction to the Legal Systems of Europe and Latin*\n\n*America* [ (3rd ed.). Stanford University Press. ISBN 978-0-8047-5568-9.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-8047-5568-9)\n\nMontoya, Alicia (2013). *[Medievalist Enlightenment: From Charles Perrault to Jean-Jacques Rousseau](https://books.google.com/books?id=syb6-0eW-_sC&pg=PA47)* (https://books.g\n\n[oogle.com/books?id=syb6-0eW-_sC&pg=PA47). DS Brewer. ISBN 978-1-8438-4342-9.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-8438-4342-9)\n\nMungello, David E. (2005). *The Great Encounter of China and the West, 1500- 1800* [ (https://archive.org/details/greate](https://archive.org/details/greatencounterof0000mung_m1v1)\n\n[ncounterof0000mung_m1v1). Rowman & Littlefield. ISBN 978-0-7425-3815-3.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-7425-3815-3)\n\n[Nathan, James (Autumn 1993). \"Force, Order, and Diplomacy in the Age of Louis XIV\" (https://www.vqronline.org/ess](https://www.vqronline.org/essay/force-order-and-diplomacy-age-louis-xiv)\n\n[ay/force-order-and-diplomacy-age-louis-xiv). ](https://www.vqronline.org/essay/force-order-and-diplomacy-age-louis-xiv) *[Virginia Quarterly Review](https://en.wikipedia.org/wiki/Virginia_Quarterly_Review)* . **69** [ (4). Charlottesville: University of](https://en.wikipedia.org/wiki/University_of_Virginia)\n\n[Virginia. Archived (https://web.archive.org/web/20191211194226/https://www.vqronline.org/essay/force-order-and-](https://web.archive.org/web/20191211194226/https://www.vqronline.org/essay/force-order-and-diplomacy-age-louis-xiv)\n\n[diplomacy-age-louis-xiv) from the original on 11 December 2019. Retrieved 11 September 2019.](https://web.archive.org/web/20191211194226/https://www.vqronline.org/essay/force-order-and-diplomacy-age-louis-xiv)\n\nNolan, Cathal J. (2008). *Wars of the Age of Louis XIV, 1650- 1715: An Encyclopedia of Global Warfare and*\n\n*Civilization* [. Greenwood Press. ISBN 978-0-3133-3046-9.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-3133-3046-9)\n\nNorton, Lucy (1982). *The Sun King and His Loves* . The Folio Society.\n\n[Ó Gráda, Cormac; Chevet, Jean-Michel (2002). \"Famine And Market In ](http://researchrepository.ucd.ie/bitstream/10197/368/3/ogradac_article_pub_039.pdf) *Ancient Régime* France\" (http://researchrepos\n\n[itory.ucd.ie/bitstream/10197/368/3/ogradac_article_pub_039.pdf) (PDF). ](http://researchrepository.ucd.ie/bitstream/10197/368/3/ogradac_article_pub_039.pdf) *The Journal of Economic History* . **62** (3):\n\n[706- 733. doi:10.1017/S0022050702001055 (https://doi.org/10.1017%2FS0022050702001055) (inactive 1](https://doi.org/10.1017%2FS0022050702001055)\n\n[November 2024). hdl:10197/368 (https://hdl.handle.net/10197%2F368). PMID 17494233 (https://pubmed.ncbi.nl](https://pubmed.ncbi.nlm.nih.gov/17494233)", - "page_start": 31, - "page_end": 31, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[Newell, Allen; Simon, H. A. (1976). \"Computer Science as Empirical Inquiry: Symbols and](https://doi.org/10.1145%2F360018.360022)\n\n[Search\" (https://doi.org/10.1145%2F360018.360022). ](https://doi.org/10.1145%2F360018.360022) *Communications of the ACM* . **19** (3):\n\n[113- 126. doi:10.1145/360018.360022 (https://doi.org/10.1145%2F360018.360022).](https://doi.org/10.1145%2F360018.360022)\n\n[Nicas, Jack (7 February 2018). \"How YouTube Drives People to the Internet's Darkest Corners\"](https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478)\n\n[(https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1](https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478)\n\n[518020478). ](https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478) *[The Wall Street Journal](https://en.wikipedia.org/wiki/The_Wall_Street_Journal)* [. ISSN 0099-9660 (https://search.worldcat.org/issn/009](https://search.worldcat.org/issn/0099-9660)\n\n[9-9660). Archived (https://web.archive.org/web/20241005171230/https://www.wsj.com/articl](https://web.archive.org/web/20241005171230/https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478)\n\n[es/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478) from the](https://web.archive.org/web/20241005171230/https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478)\n\noriginal on 5 October 2024. Retrieved 16 June 2018.\n\n[Nilsson, Nils (1983). \"Artificial Intelligence Prepares for 2001\" (https://ai.stanford.edu/~nilsson/O](https://ai.stanford.edu/~nilsson/OnlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf)\n\n[nlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF). ](https://ai.stanford.edu/~nilsson/OnlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf) *AI Magazine* . **1** (1).\n\n[Archived (https://web.archive.org/web/20200817194457/http://ai.stanford.edu/~nilsson/Onlin](https://web.archive.org/web/20200817194457/http://ai.stanford.edu/~nilsson/OnlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf)\n\n[ePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF) from the original on 17 August](https://web.archive.org/web/20200817194457/http://ai.stanford.edu/~nilsson/OnlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf)\n\n[2020. Retrieved 22 August 2020. Presidential Address to the Association for the](https://en.wikipedia.org/wiki/Association_for_the_Advancement_of_Artificial_Intelligence)\n\n[Advancement of Artificial Intelligence.](https://en.wikipedia.org/wiki/Association_for_the_Advancement_of_Artificial_Intelligence)\n\n[NRC (United States National Research Council) (1999). \"Developments in Artificial](https://en.wikipedia.org/wiki/United_States_National_Research_Council)\n\nIntelligence\". *Funding a Revolution: Government Support for Computing Research* . National\n\nAcademy Press.\n\n[Omohundro, Steve (2008). ](https://en.wikipedia.org/wiki/Steve_Omohundro) *The Nature of Self-Improving Artificial Intelligence* . presented and\n\ndistributed at the 2007 Singularity Summit, San Francisco, CA.\n\n[Oudeyer, P-Y. (2010). \"On the impact of robotics in behavioral and cognitive sciences: from](http://www.pyoudeyer.com/IEEETAMDOudeyer10.pdf)\n\n[insect navigation to human cognitive development\" (http://www.pyoudeyer.com/IEEETAMD](http://www.pyoudeyer.com/IEEETAMDOudeyer10.pdf)\n\n[Oudeyer10.pdf) (PDF). ](http://www.pyoudeyer.com/IEEETAMDOudeyer10.pdf) *IEEE Transactions on Autonomous Mental Development* . **2** (1): 2-\n\n[16. doi:10.1109/tamd.2009.2039057 (https://doi.org/10.1109%2Ftamd.2009.2039057).](https://doi.org/10.1109%2Ftamd.2009.2039057)\n\n[S2CID 6362217 (https://api.semanticscholar.org/CorpusID:6362217). Archived (https://web.](https://web.archive.org/web/20181003202543/http://www.pyoudeyer.com/IEEETAMDOudeyer10.pdf)", - "page_start": 61, - "page_end": 61, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[4.2331885). ISSN 1936-1610 (https://search.worldcat.org/issn/1936-1610).](https://search.worldcat.org/issn/1936-1610)\n\n144. Razi, Afsaneh; Kim, Seunghyun; Alsoubai, Ashwaq; Stringhini, Gianluca; Solorio, Thamar;\n\n[De Choudhury, Munmun; Wisniewski, Pamela J. (13 October 2021). \"A Human-Centered](https://dl.acm.org/doi/10.1145/3479609)\n\n[Systematic Literature Review of the Computational Approaches for Online Sexual Risk](https://dl.acm.org/doi/10.1145/3479609)\n\n[Detection\" (https://dl.acm.org/doi/10.1145/3479609). ](https://dl.acm.org/doi/10.1145/3479609) *Proceedings of the ACM on Human-*\n\n*Computer Interaction* . **5** [ (CSCW2): 1- 38. doi:10.1145/3479609 (https://doi.org/10.1145%2F](https://doi.org/10.1145%2F3479609)\n\n[3479609). ISSN 2573-0142 (https://search.worldcat.org/issn/2573-0142).](https://search.worldcat.org/issn/2573-0142)\n\n[145. Grant, Eugene F.; Lardner, Rex (25 July 1952). \"The Talk of the Town - It\" (https://www.new](https://www.newyorker.com/magazine/1952/08/02/it)\n\n[yorker.com/magazine/1952/08/02/it). ](https://www.newyorker.com/magazine/1952/08/02/it) *The New Yorker* [. ISSN 0028-792X (https://search.worl](https://search.worldcat.org/issn/0028-792X)\n\n[dcat.org/issn/0028-792X). Archived (https://web.archive.org/web/20200216034025/https://w](https://web.archive.org/web/20200216034025/https://www.newyorker.com/magazine/1952/08/02/it)\n\n[ww.newyorker.com/magazine/1952/08/02/it) from the original on 16 February 2020.](https://web.archive.org/web/20200216034025/https://www.newyorker.com/magazine/1952/08/02/it)\n\nRetrieved 28 January 2024.\n\n[146. Anderson, Mark Robert (11 May 2017). \"Twenty years on from Deep Blue vs Kasparov: how](https://theconversation.com/twenty-years-on-from-deep-blue-vs-kasparov-how-a-chess-match-started-the-big-data-revolution-76882)\n\n[a chess match started the big data revolution\" (https://theconversation.com/twenty-years-on-](https://theconversation.com/twenty-years-on-from-deep-blue-vs-kasparov-how-a-chess-match-started-the-big-data-revolution-76882)\n\n[from-deep-blue-vs-kasparov-how-a-chess-match-started-the-big-data-revolution-76882).](https://theconversation.com/twenty-years-on-from-deep-blue-vs-kasparov-how-a-chess-match-started-the-big-data-revolution-76882)\n\n*The Conversation* [. Archived (https://web.archive.org/web/20240917000827/https://theconver](https://web.archive.org/web/20240917000827/https://theconversation.com/twenty-years-on-from-deep-blue-vs-kasparov-how-a-chess-match-started-the-big-data-revolution-76882)\n\n[sation.com/twenty-years-on-from-deep-blue-vs-kasparov-how-a-chess-match-started-the-bi](https://web.archive.org/web/20240917000827/https://theconversation.com/twenty-years-on-from-deep-blue-vs-kasparov-how-a-chess-match-started-the-big-data-revolution-76882)\n\n[g-data-revolution-76882) from the original on 17 September 2024. Retrieved 28 January](https://web.archive.org/web/20240917000827/https://theconversation.com/twenty-years-on-from-deep-blue-vs-kasparov-how-a-chess-match-started-the-big-data-revolution-76882)\n\n2024.\n\n[147. Markoff, John (16 February 2011). \"Computer Wins on 'Jeopardy!': Trivial, It's Not\" (https://w](https://www.nytimes.com/2011/02/17/science/17jeopardy-watson.html)\n\n[ww.nytimes.com/2011/02/17/science/17jeopardy-watson.html). ](https://www.nytimes.com/2011/02/17/science/17jeopardy-watson.html) *The New York Times* .\n\n[ISSN 0362-4331 (https://search.worldcat.org/issn/0362-4331). Archived (https://web.archive.](https://web.archive.org/web/20141022023202/http://www.nytimes.com/2011/02/17/science/17jeopardy-watson.html)\n\n[org/web/20141022023202/http://www.nytimes.com/2011/02/17/science/17jeopardy-watson.](https://web.archive.org/web/20141022023202/http://www.nytimes.com/2011/02/17/science/17jeopardy-watson.html)\n\n[html) from the original on 22 October 2014. Retrieved 28 January 2024.](https://web.archive.org/web/20141022023202/http://www.nytimes.com/2011/02/17/science/17jeopardy-watson.html)", - "page_start": 36, - "page_end": 36, - "source_file": "wikipedia3.pdf" - }, - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most\n\nare not actively managed by their rightsholders. There is no official registry of copyrighted\n\nworks and their owners, and existing datasets can be incomplete or erroneous. 16\n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially\n\nthose that have or have had limited commercial value. Put differently, the barrier to using 17\n\nmost books is not simply to pay publishers; even if one had significant financial resources,\n\nlicensing would not enable access to most works.\n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as\n\nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular\n\nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their\n\nfollow-on use).\n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion\n\ndepends on whether the license’s terms can be complied with in the context of AI training.\n\nFor instance, in the context of CC licensed works, there are requirements for proper\n\nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public\n\nDomain Mark (PDM) are not licenses and do not require attribution). 18\n\nSee e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary 16\n\nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper\n\nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181 .\n\nAccessed 4 Jan. 2020, at [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181) ; Rosen,\n\nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?” *The Atlantic* , 18 Mar.\n\n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century-\n\navailable-as-ebooks/284486/ . See also “Google Book Search Settlement and Access to Out of Print\n\nBooks.” *Google Public Policy Blog* , [publicpolicy.googleblog.com/2009/06/google-book-search-](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html)\n\n[settlement-and.html](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html) . Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class-\n\naction settlement between Google, the Authors Guild, and the Association of American Publishers).\n\nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying\n\nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at [https://](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[google_final_approval_support.pdf](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf) . The Authors Guild and Association of American Publishers also\n\njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding\n\ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly\n\n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether\n\nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out-", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "[3240/https://philpapers.org/rec/STODTA) from the original on 28 February 2022. Retrieved](https://web.archive.org/web/20220228123240/https://philpapers.org/rec/STODTA)\n\n8 January 2022.\n\n[Stump, David J. \"Fallacy, Logical\" (https://www.encyclopedia.com/history/dictionaries-thesau](https://www.encyclopedia.com/history/dictionaries-thesauruses-pictures-and-press-releases/fallacy-logical)\n\n[ruses-pictures-and-press-releases/fallacy-logical). ](https://www.encyclopedia.com/history/dictionaries-thesauruses-pictures-and-press-releases/fallacy-logical) *encyclopedia.com* [. Archived (https://web.](https://web.archive.org/web/20210215112403/https://www.encyclopedia.com/history/dictionaries-thesauruses-pictures-and-press-releases/fallacy-logical)\n\n[archive.org/web/20210215112403/https://www.encyclopedia.com/history/dictionaries-thesau](https://web.archive.org/web/20210215112403/https://www.encyclopedia.com/history/dictionaries-thesauruses-pictures-and-press-releases/fallacy-logical)\n\n[ruses-pictures-and-press-releases/fallacy-logical) from the original on 15 February 2021.](https://web.archive.org/web/20210215112403/https://www.encyclopedia.com/history/dictionaries-thesauruses-pictures-and-press-releases/fallacy-logical)\n\nRetrieved 20 March 2021.\n\n[Talbott, William (2016). \"Bayesian Epistemology\" (https://plato.stanford.edu/entries/epistemo](https://plato.stanford.edu/entries/epistemology-bayesian/)\n\n[logy-bayesian/). ](https://plato.stanford.edu/entries/epistemology-bayesian/) *The Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab,\n\n[Stanford University. Archived (https://web.archive.org/web/20210401034856/https://plato.sta](https://web.archive.org/web/20210401034856/https://plato.stanford.edu/entries/epistemology-bayesian/)\n\n[nford.edu/entries/epistemology-bayesian/) from the original on 1 April 2021. Retrieved](https://web.archive.org/web/20210401034856/https://plato.stanford.edu/entries/epistemology-bayesian/)\n\n6 March 2021.\n\n[Tarski, Alfred (1994). ](https://en.wikipedia.org/wiki/Alfred_Tarski) *Introduction to Logic and to the Methodology of the Deductive*\n\n*Sciences* [. Oxford University Press. p. 40. ISBN 978-0-19-802139-1.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-19-802139-1)\n\nTondl, L. (2012). *Problems of Semantics: A Contribution to the Analysis of the Language*\n\n*Science* [. Springer Science & Business Media. p. 111. ISBN 978-94-009-8364-9.](https://en.wikipedia.org/wiki/Special:BookSources/978-94-009-8364-9)\n\nVelleman, Daniel J. (2006). *How to Prove It: A Structured Approach* . Cambridge University\n\n[Press. p. 8, 103. ISBN 978-0-521-67599-4.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-521-67599-4)\n\n[Vickers, John M. (2022). \"Inductive Reasoning\" (https://www.oxfordbibliographies.com/displ](https://www.oxfordbibliographies.com/display/document/obo-9780195396577/obo-9780195396577-0171.xml)\n\n[ay/document/obo-9780195396577/obo-9780195396577-0171.xml). ](https://www.oxfordbibliographies.com/display/document/obo-9780195396577/obo-9780195396577-0171.xml) *Oxford Bibliographies* .\n\nOxford University Press. Retrieved 18 January 2023.", - "page_start": 35, - "page_end": 35, - "source_file": "wikipedia1.pdf" - }, - { - "text": "## * **3. Why Books are Important to Training AI** *\n\nDespite the proliferation of online content and some speculating that books would simply die\n\nout with the advent of the Internet, books remain a critical vehicle for disseminating 9\n\nknowledge. The more scientists study how books can impact people, the less surprising this\n\nis. Our brains have been shown to interact with longform books in meaningful ways: we\n\ndevelop bigger vocabularies when we read books; we develop more empathy when we read\n\nliterary fiction; and connectivity between different regions of our brain increases when we\n\nread. 10\n\nIn that light, it might be unsurprising that books are important for training AI models. A\n\nbroadly accessible books dataset could be useful not only for building LLMs, but also for\n\nmany other types of AI research and development.\n\n###### *Performance and Quality*\n\nThe performance and versatility of an AI model can significantly depend on whether the\n\ntraining corpus includes books or not. Books are uniquely valuable for AI training due to\n\nseveral characteristics.\n\n- **Length:** Books tend to represent longer-form content, and fiction books, in particular,\n\nrepresent long-form narrative. An AI trained on this longer-form, narrative type of\n\ncontent is able to make connections over a longer context, so instead of putting\n\nwords together to form a single sentence, the AI becomes more able to string\n\nconcepts together into a coherent whole; even after a book is divided into many\n\n“chunks” before the process of tokenization, that will still provide long stretches of\n\ntext that are longer than the average web page. While Web documents, for instance,\n\ntend to be longer than a single sentence, they are not typically hundreds of pages long\n\nlike a book.\n\n- **Quality:** The qualities of the training data impact the outputs a tool can produce.\n\nConsider an LLM trained on gibberish; it can learn the patterns of that gibberish and,\n\nin turn, produce related gibberish, but will not be very useful for writing an argument\n\nor a story, for instance. In contrast, training an LLM on books with well-constructed\n\narguments or crafted stories could serve those purposes. While “well-constructed”\n\nand “crafted” are necessarily subjective, the traditional role of editors and the\n\npublishing process can provide a useful indicator for the quality of writing inside of\n\nbooks. What’s more, metadata for books — information such as the title, author and\n\nyear of publication — is often more comprehensive than metadata for information\n\n“the novel, too, as we know it, has come to its end” — “The End of Books.” *Archive.nytimes.com* , 21 June 9\n\n1992, [archive.nytimes.com/www.nytimes.com/books/98/09/27/specials/coover-end.html](http://archive.nytimes.com/www.nytimes.com/books/98/09/27/specials/coover-end.html) . Accessed\n\n27 Aug. 2021.\n\nStanborough, Rebecca Joy. “Benefits of Reading Books: For Your Physical and Mental Health.” 10\n\n*Healthline* , 15 Oct. 2019, www.healthline.com/health/benefits-of-reading-books#prevents-cognitive-\n\ndecline .", - "page_start": 5, - "page_end": 5, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "It is also an example predicated on copyright’s limitations and exceptions — in this case, on\n\nU.S. fair use. While the Authors Guild filed a copyright infringement suit against HathiTrust,\n\nfederal courts in 2012 and 2014 ruled that HathiTrust’s use of books was fair use. 32\n\nA nonprofit founded in 2008, HathiTrust grew out of a partnership among major US university\n\nlibraries and today is “an international community of research libraries committed to the\n\nlong-term curation and availability of the cultural record.” It started in what it calls the “early 33\n\ndays of mass digitization” — that is, at a time when it started to become economical to take\n\nexisting physical artifacts in libraries and turn them into digital files at a large scale.\n\nThe founding members of HathiTrust were among the initial partners for Google’s Book\n\nSearch product, which allows people to search across and view small snippets of text from\n\nin-copyright books and read full copies of public domain books scanned from libraries’ 34\n\ncollections. The libraries provided Google with books from their collections, Google would\n\nthen scan the books for use in Book Search, and return to the libraries a digital copy for their\n\nown uses. These uses included setting up HathiTrust not only to ensure long-term\n\npreservation of the digital books and their metadata, but also to facilitate other uses,\n\nincluding full text search of books and accessibility for people with print disabilities. In\n\nseparate court cases, both Google and HathiTrust’s uses of the books were deemed\n\nconsistent with copyright law.\n\nThe uses most relevant to this paper are those enabled by what HathiTrust refers to today as\n\nthe Research Center. The Center grew in part out of a research discipline called “digital\n\nhumanities,” which, among other things, seeks to use computational resources or other\n\ndigital technologies to analyze information and contribute to the study of literature, media,\n\nhistory, and other areas. For instance, imagine you want to understand how a given term\n\n(e.g., “war on drugs”) became used; one might seek to analyze when the term was first used\n\nand how often it was used over time by analyzing a vast quantity of sources, searching out\n\nthe term’s use. The insight here is that there is much to be learned not just from reading or\n\notherwise consuming specific material, but also from “non-consumptive research,” or\n\n\"research in which computational analysis is performed on one or more volumes (textual or\n\nimage objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use.\n\nToday, the Center “[s]upports large-scale computational analysis of the works in the\n\nHathiTrust Digital Library to facilitate non-profit and educational research.” It includes over 18\n\nmillion books in over 400 languages from the HathiTrust Digital Library collection. Roughly\n\n58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has\n\nlimitations in terms of its representation across subject matter, language, geography, and\n\nother dimensions. In terms of subject matter, the corpus is skewed towards humanities\n\n(64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English,\n\n*Authors Guild v. HathiTrust,* 902 F.Supp.2d 445 (SDNY October 10, 2012) and *Authors Guild v.* 32\n\n*HathiTrust* , 755 F.3d 87 (2d Cir. 2014).\n\nSee [https://www.hathitrust.org/member-libraries/member-list/ ](https://www.hathitrust.org/member-libraries/member-list/) — the membership is principally US 33\n\ninstitutions, and most of the non-US members are from English speaking countries or institutions that\n\nuse English as the primary language of operations.\n\nThis functionality is limited to scanned books provided by library partners in the US. 34", - "page_start": 14, - "page_end": 14, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "## * **4. Copyright, Licensing, & Access to Books for** * * **Training** *\n\nEven if books can be acquired, digitized, and made technically useful for AI training, the\n\ndevelopment of a books data commons would necessarily need to navigate and comply with\n\ncopyright law.\n\n**Out-of-Copyright Books:** A minority of books are old enough to be in the public domain and\n\nout of copyright, and an AI developer could use them in training without securing any\n\ncopyright permission. In the United States, all books published or released before 1929 are in\n\nthe public domain. While use of these books provides maximal certainty for the AI developer\n\nto train on, it is worth noting that the status of whether a book is in the public domain can be\n\ndifficult to determine. For instance, books released between 1929 and 1963 in the U.S. are 14\n\nout of copyright if they were not subject to a copyright renewal; however, data on copyright\n\nrenewals is not easily accessible.\n\nWhat’s more, copyright definitions and term lengths vary among countries. Even if a work is\n\nin the public domain in the US, it may not be in other countries. Countries generally use the 15\n\nlife of the last living author + “x” years to determine the term of copyright protection. For\n\nmost countries, “x” is either 50 years (the minimum required by the Berne Convention) or 70\n\nyears (this is the case for all member states of the European Union and for all works\n\npublished in the U.S. after 1978). This approach makes it difficult to determine copyright\n\nterms with certainty because it requires information about the date of death of each author,\n\nwhich is often not readily available.\n\n**In-Copyright Books:** The vast majority of books are in copyright, and, insofar as the training\n\nprocess requires making a copy of the book, the use in AI training may implicate copyright\n\nlaw. Our workshop covered three possible paths for incorporating such works.\n\n**Direct licensing**\n\nOne could directly license books from rightsholders. There may be some publishers who are\n\nwilling to license their works for this purpose, but it is hard to determine the scale of such\n\naccess, and, in any event, there are significant limits on this approach. Along with the\n\nchallenge (and expense) of reaching agreements with relevant rightsholders, there is also the\n\npractical difficulty of simply identifying and finding the rightsholder that one must negotiate\n\nFor a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler. *Finding the Public Domain:* 14\n\n*Copyright Review Management System Toolkit* . 2016, [quod.lib.umich.edu/c/crmstoolkit/](http://quod.lib.umich.edu/c/crmstoolkit/14616082.0001.001)\n\n[14616082.0001.001](http://quod.lib.umich.edu/c/crmstoolkit/14616082.0001.001) . Accessed 20 Mar. 2024.; Kopel, Matthew. “LibGuides: Copyright at Cornell Libraries:\n\nCopyright Term and the Public Domain.” [guides.library.cornell.edu/copyright/publicdomain](http://guides.library.cornell.edu/copyright/publicdomain) ;\n\nMannapperuma, Menesha, et al. *Is It in the Public Domain? A HANDBOOK for EVALUATING the*\n\n*COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES* . 1923.\n\nSee e.g. Moody, Glyn. “Project Gutenberg Blocks Access in Germany to All Its Public Domain Books 15\n\nbecause of Local Copyright Claim on 18 of Them.” *Techdirt* , 7 Mar. 2018, www.techdirt.com/\n\n2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-local-\n\ncopyright-claim-18-them/ . Accessed 20 Mar. 2024.", - "page_start": 8, - "page_end": 8, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic3.pdf", - "query": "For what reason a researcher's name is not a good tools to track back its works and affiliations ?", - "target_page": 1, - "target_passage": "Many people have the same name Names may change through marriage or other circumstances Individuals use different alphabets, abbreviations, or naming conventions People use different versions of their name during their career", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Safety and health at work is everyone’s concern. It’s good for you. It’s good for business.\n\nOccupational safety and health in Europe: state and trends 2023\n\nEuropean Agency for Safety and Health at Work **EN**", - "page_start": 0, - "page_end": 0, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "### **Safer and healthier technologies and organisation**\n\nTo support the **practical implementation of preventive safety and health measures** , numerous\n\nactors (e.g. organisations of OSH professionals and practitioners, and standardisation institutes such\n\nas the European Committee for Standardisation and the International Organisation for Standardisation)\n\nissued safety and health guidance or standards, or developed new and advanced OSH management\n\nsystems, the engineering sciences worked on better technical preventive technologies, on measuring\n\nand monitoring technologies, the medical sciences introduced better medical diagnosis and treatment\n\nof work-related diseases, and the social sciences contributed with better knowledge on the legal and\n\neconomic determinants of OSH, or analysed the characteristics of awareness raising, knowledge\n\ndevelopment and healthy work organisation.\n\nIt is obvious that **better technical and organisational prevention at work** contributed to more safety\n\nand the evident strong reduction in accidents. **Prominent fields and examples** of such improvements\n\nare: technically safer design of moving vehicles (e.g. for fork lifts or heavy trucks and machines, light\n\nand noise warning signals for moving vehicles); safer design of machines like automatic shutdowns or\n\ndisconnections, two-hand operating of machines (e.g. for pressing and punching), safer cranes including\n\nbetter technologies for communication between co-workers, coverage of moving parts, safer company\n\ncars (e.g. safety belts and airbags), safer tools (e.g. for drilling or cutting); improved personal protective\n\nequipment like air-supplied breathing apparatus, steel mesh gloves for meat workers, trousers for forest\n\nworkers that resist a chainsaw; minimum safety requirements for buildings (e.g. forms and size of stairs\n\nand handrails, fire exits and fire alarms, safer ladders and scaffolds), emergency equipment like eye\n\nwash and emergency showers; better monitoring of acute hazards (e.g. in sewage water systems),\n\nexhaust and ventilation technologies to avoid fumes, dusts, chemicals or contact with hazardous\n\nbiological agents; strong safety obligations for work in confined spaces, or for work at height and work\n\nin trenches; introduction of explosion zones and of non-sparking tools, a comprehensive system of\n\nwarning signals, warning signals for slippery floors and unsafe grounds, better warning systems and\n\nequipment in particularly dangerous work environments like road maintenance, combined with better\n\norganisational measures; quality systems that promote continuous repair and maintenance of tools;\n\nregular instructions by safety representatives and safety coordinators, and guarantee of minimum safety\n\nstandards of machines and products by European standards like CE (‘European Conformity’).\n\n### **Major technological developments**\n\nThe widespread **introduction of new or advanced technologies** — automation, digitalisation/ICT,\n\ngreen technologies, new material technologies and so on — results in substantial changes in work\n\norganisation and work processes, and replacement of (traditional) materials (screws by glues, metal and\n\nwood by plastics, nanomaterials). For OSH regulators and practitioners, it is a constant challenge to\n\nassess these changes regarding their impact on risks for health and safety and to develop adequate\n\nrisk prevention and mitigation measures.\n\n**Foresight studies** (e.g. by EU-OSHA) have shown that such technological change can help improve\n\nworking conditions, for example, by taking over heavy, dangerous or routine work (automation,\n\nrobotisation, exoskeletons), or by better communication and remote control via ICT tools. At the same\n\ntime, they can also pose new risks, creating rigid work processes without much decision latitude, along\n\nwith technical options for extreme surveillance and control (e.g. by constant geolocation), or pose new", - "page_start": 13, - "page_end": 13, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "When we think about our careers, and what we need to do to establish them, we\n\noften forget about the need to develop an essential skill: communication. If you\n\nstart reading through the job descriptions in a industry, you will find that the vast\n\nmajority of jobs require one or more of the following:\n\n- Effective communication skills\n\n- Interpersonal skills\n\n- Ability to work in a team\n\n- Negotiation skills\n\n- Conflict resolution skills\n\n- Report writing skills\n\nWhat all of these skills have in common is that they involve the use of\n\nlanguage to achieve a particular purpose. And for this reason, having good\n\nlanguage skills is essential in any working environment.\n\nIn a career context, good language skills can also:\n\n- Affect your credibility. Poor grammar indicates to a prospective\n\nemployer that you are sloppy, while flawless grammar indicates that\n\nyou pay attention to detail.\n\n- Improve your relationships with your co- workers. If you are able\n\nto express yourself clearly, you can eliminate the confusion and\n\nmisunderstanding that often leads to conflict.\n\n- Increase your chances of being promoted .\n\n- Help you to create a good impression.\n\n- Improve your ability to persuade others (which is a valuable skill in the\n\nworking world).", - "page_start": 4, - "page_end": 4, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "#### P R A CT I CA L\n\n###### A ND\n\n###### PROFESSIONAL\n\nSomething of a paradox, too; highly competi-\n\ntive but approachable; stylish but never a slave\n\nto fashion. I have a true talent for leadership.\n\nI’m stable, steady, reliable, and efficient. At\n\nthe same time, I’m good-looking, good-natured,\n\nand good-humored. Seek successful business\n\nperson driven by values, with a “whatever it\n\ntakes” attitude — just like me, practical and\n\nprofessional.\n\nT H E\n\n###### H ON COMP A NY", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Some important questions remain at the end of such a report:\n\n- The **quality of statistics and surveys fades the more irregular are the working** conditions\n\nbeing studied. Which research methods are adequate for a clearer and more reliable evidence\n\nbase on these working conditions? It might require research methods different from those used\n\ntoday, for example, more investigative case studies; it might also be helpful to evaluate the\n\n**existing national working conditions surveys or statistics** under this aspect.\n\n- **Fading employer- employee relations.** There are special research efforts necessary to study\n\nthe application of OSH regulations of work with weak or no employer- employee relations, for\n\nexample, for the self-employed and new forms of employment.\n\n- **Surveys usually suffer a participation bias, for example, for the migrant workforce.** The\n\nlow participation rate of migrants can contribute to a particular underestimation regarding their\n\noften unfavourable working conditions.\n\n- **Workers in manual occupations** report **better health than administrative workers** but **less**\n\n**expectations to do the job until being 60 years old** . What are the reasons behind this? Is it\n\nthe healthy worker effect, strong occupation-related differences regarding the perception of\n\nhealth and the expression of health problems? 502,503\n\n- High work intensity is a major cause for low wellbeing and high psychosocial risks. Survey data\n\nsuggest that **work intensification stopped after 2005** . What might be the reasons? Are the\n\ncurrent indicators not specific enough to measure developments of work intensity? Has since\n\nthen the major burden of intensification been put on other types of workers, for example,\n\nsubcontracted or self-employed, temporary and seasonal workers, or on workers in the global\n\nsupply chain?\n\n- How much evidence is there that **dangerous work has been increasingly contracted out to**\n\n**small and medium-size enterprises and the self-employed** ? Are there sufficiently detailed\n\ndata on whether a larger share of service and client-related work at atypical times or work\n\nrequiring long working hours has been taken over by self-employed or subcontractors?\n\n- The **influence of enterprise size** is often difficult to explain. In several aspects, the SMEs\n\nperform better, and in other important aspects worse. What might be the reason for this?\n\n- **How is it possible to overcome the ‘prevention gap’ that in general exists between mobile**\n\n**and stationary workplaces?** Can the solutions be technical or must there be organisational\n\nand legal measures, for example, a limitation of the prolonged use of ergonomically inadequate\n\nequipment like mobile phones?\n\n- Impact of **international and global supply chains on OSH: Does it improve or worsen the**\n\n**working conditions in the EU?** Research could try to estimate the risk-reducing impact of the\n\nshift of some high-risk productions to enterprises outside the EU, for example, mining, base\n\nchemicals, recycling and so on (export of risks), and to estimate the OSH impact of EU export\n\nproduction, for example, vehicles, specialty chemicals, machines for risks at work inside the EU\n\n(import of risks).\n\n- It would also be a big step forward if research could achieve an agreed **standard value or a**\n\n**standard range** (as reliable as possible) for the **attributable fraction of work** to widespread\n\ndiseases, that is, cardiovascular diseases, mental and behavioural disorders, musculoskeletal\n\ndiseases and cancer.\n\n- **Compliance** with and impact of legislation. Currently, there are data on the percentage of\n\nenterprises with a risk assessment but very limited information about the **quality of these risk**\n\n**assessments and of implemented risk management and reduction measures** . Previous\n\nstudies indicate that in many cases the risk assessment is conducted by an enterprise just to", - "page_start": 139, - "page_end": 139, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "###### CHAPTER 11:\n\nLANGUAGE SKILLS AT WORK HOW TO WRITE A RESIGNATION LETTER\n\nNo matter what the reason, resigning from your job is likely to be an\n\nuncomfortable experience.\n\nIf you are leaving for personal reasons (such as moving away, starting a\n\nfamily, or retiring), you may feel sad about leaving. But if you are leaving\n\nfor a better opportunity, or you’ve simply had enough of your current job,\n\nyou may be glad to be moving on.\n\nEither way, it’s always going to be in your best interests to leave on a\n\npositive note, and to resign in a professional manner.", - "page_start": 47, - "page_end": 47, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Example:\n\n“I have been offered an opportunity to work as an IT Manager abroad,\n\nand I have decided to accept the offer.”\n\n4.\n\nA sentence or two in which you thank your employer for the opportunities\n\nyou have been given during your time with the organisation.\n\nExample:\n\n“I would like to thank you for the wonderful opportunities you have given\n\nme, both to develop my skills, and to work with such knowledgeable and\n\ninspiring people.”\n\n5.\n\nAn offer to help with the transition.\n\nOnly include this if you are sincere, and don’t make any promises\n\nthat you won’t be able to keep. You could, for example, assure your\n\nemployer that you will finish your current projects or hand them over to\n\na colleague. You could also offer to train the person who will be replacing\n\nyou.\n\nExample:\n\n“During the next two weeks, I will do everything I can to ensure a\n\nsmooth transition for the company. If required, I am more than willing to\n\nassist with the hiring and training of the new Assistant IT Manager.”\n\n6.\n\nA suitable closing.\n\nIt is important to use a closing that is appropriate in the circumstances.\n\nIf you have a good relationship with your employer, you may want to\n\nwish him/her well for the future, and provide contact details that he/she\n\ncan use to get in touch with you once you have left the organisation. You\n\ncan then end your letter with a greeting such as “Kind regards,” followed\n\nby your signature.", - "page_start": 49, - "page_end": 49, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "OUR VI SI ON\n\nWe, the members of HON INDUSTRIES, are dedicated to creating long-term value for all of our stakeholders, to\n\nexceeding our customers’ expectations, and to making our company a great place to work. We will always treat each\n\nother, as well as customers, suppliers, shareholders, and our communities, with fairness and respect.\n\nOur success depends upon business simplification, rapid continuous improvement, and innovation in every-\n\nthing we do, individual and collective integrity, and the relentless pursuit of the following long-standing beliefs:\n\n**WE WI L L BE PRO FI TABLE.**\n\nWe pursue mutually profitable relationships with customers and suppliers. Only when our company achieves an ade-\n\nquate profit can the other elements of this Vision be realized.\n\n**WE WI L L CREATE LO NG- TERM VAL UE FO R S HAREHO L D ERS .**\n\nWe create long-term value for shareholders by earning financial returns significantly greater than our cost of capital and\n\npursuing profitable growth opportunities. We will safeguard our shareholders’ equity by maintaining a strong balance\n\nsheet to allow flexibility in responding to a continuously changing market and business environment.\n\n**WE WI L L PURS UE PRO FI TABL E GRO WTH.**\n\nWe pursue profitable growth on a global basis in order to provide continued job opportunities for members and finan-\n\ncial success for all stakeholders.\n\n**WE WILL BE A SUPPLIER OF QUALITY PRODUCTS AND SERVICES.**\n\nWe provide reliable products and services of high quality and brand value to our end-users. Our products and services\n\nexceed our customers’ expectations and enable our distributors and our company to make a fair profit.\n\n**WE WI L L BE A GREAT PL ACE TO WO RK .**\n\nWe pursue a participative environment and support a culture that encourages and recognizes excellence, active\n\ninvolvement, ongoing learning, and contributions of each member; that seeks out and values diversity; and that\n\nattracts and retains the most capable people who work safely, are motivated, and are devoted to making our company\n\nand our members successful.\n\n**WE WI L L BE A RES PO NS I BL E CO RPO RATE CI TI ZEN.**\n\nWe conduct our business in a way that sustains the well-being of society, our environment, and the economy in which\n\nwe live and work. We follow ethical and legal business practices. Our company supports our volunteer efforts and\n\nprovides charitable contributions so that we can actively participate in the civic, cultural, educational, environmental,\n\nand governmental affairs of our society.\n\n**TO O UR S TAK EHO L D ERS :**\n\nWhen our company is appreciated by its *members,* favored by its *customers,* supported by its *suppliers,* respected by\n\n*the public,* and admired by its *shareholders,* this Vision is fulfilled.\n\n**HO N I ND US TRI ES I n c. ( HNI )**\n\n**414 East Third Street, P.O. Box 1109, Muscatine, IA 52761-0071**\n\n**www.honi.com**", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "### MARKETING\n\n**Better information,**\n\n**Better decision**\n\nO U R W O R K\n\nASAKO HOSHINO\n\nVice President\n\n**Market Intelligence**\n\n“Why does a company conduct market research on\n\nconsumers? It is not just about asking the customer\n\nif they prefer A or B, which is often what managers\n\nwant to know. Accumulating knowledge on consumer\n\nbehavior and emerging trends is how you come up\n\nwith ideas that are truly focused on the customer.\n\nOur aim is to gain the deepest understanding of the\n\ncustomer possible, and use that insight to identify\n\nfuture trends.\n\nThe Market Intelligence department is relatively\n\nnew, formed by combining the research functions\n\nonce carried out separately by various divisions.\n\nThe merger and our independent status have brought\n\nseveral practical benefits. We now have uniform\n\nprocedures for conducting research, better research\n\nmethodologies, and greater objectivity in the\n\ninterpretation of the data. Today, we’re a team of\n\nexperts in this field, not simply coordinators between\n\nresearch organizations and the decision makers.\n\nWe are often benchmarked by other industries.\n\nWhen the department was first established, Mr. Ghosn\n\nmade one thing very clear: Do not attack the methodology!\n\nDifferent business areas may complain when we release\n\ninformation that is negative or differs from their objectives.\n\nHowever, they cannot attack how we came to our\n\nconclusions, because our methodology is considered the\n\nbest within the organization. We are transparent in our\n\nselection of methodologies and how we approach\n\nconclusions. Among the various areas, we aim to be the\n\ndepartment that most effectively utilizes the PDCA—plan,\n\ndo, check and action—cycle. We are always working to get\n\nbetter and more accurate information to upgrade our\n\nmethodology. Every year we hold a PDCA session to review\n\nour methodology with other departments. Anyone can\n\nassess Market Intelligence at this time. This is also a great\n\nopportunity to share methodologies and approaches with\n\nvarious functions.\n\nWe also conduct trend review meetings with all\n\ndecision-makers, including non-marketing officers, to\n\nunderstand social, consumer and value trends so that we\n\ncan identify sources of innovation for all areas. This makes\n\nus unique. Our analysts enrich the analysis, interpretation\n\nand forecast because they are aware of global social and\n\nconsumer trends. The trend review meetings also remind\n\npeople in all departments—even those not directly involved\n\nwith sales and marketing—that customers are truly the\n\ncenter of our business.\n\nWe work with different research experts and\n\ncompanies as our partners. They offer a variety of high-\n\ntech techniques such as glasses with cameras that track\n\neye movement, instruments that measure brainwaves or\n\npupil dilation to detect preferences, and non-categorical\n\nmeasures that help us find personal evaluations of\n\nperceived quality or design. Our job is to evaluate these\n\nresearch companies and their output, and to develop the\n\nbest methodology for our issues. We are always refining\n\nthe tools we have and looking for new ones that will boost\n\nour accuracy. Our strong ties with outside experts are a\n\nsource of competitive advantage for Nissan.\n\nAgain, it all goes back to being customer-oriented.\n\nConfirming that customer-oriented stance will create value\n\nfor Nissan. Market Intelligence must be a dedicated\n\nevangelist for this change.”", - "page_start": 41, - "page_end": 41, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "way by OSH legislation or OSH practice. The principle of employer responsibility for working conditions\n\nof workers is undermined or at least blurred in such situations.\n\nFuture solutions could focus on several aspects — a **new definition of ‘work’ or of ‘employment’,**\n\n**stronger individual responsibility, or extended state interventions to guarantee OSH** also in such\n\nworking and employment conditions. There are some examples of such solutions but to date most of\n\nthem focus on better information, that is, stronger individual responsibility.\n\n**Undeclared and illegal employment is scarcely visible** in the statistics. Due to the difficult conditions\n\nfor research, the overall OSH situation in these types of work is widely unknown; in case study-based\n\ninvestigative studies, the working conditions — including safety and health — for this group are mostly\n\nregarded as worse compared to workers with a regular work contract. It seems to be necessary to\n\nconsider different research and action initiatives for this type of work, also in collaboration with other\n\nstate supervising authorities.\n\nThe health data clearly show an ever-growing **share of work tasks that go along with or even require**\n\n**physical inactivity** . Inactive work is often characterised by permanent sitting combined with high\n\nrequirements for visual and mental focusing during work, for example, towards digital equipment or to\n\ntraffic situations. Serious indirect health consequences of such inactivity can be seen in the strong\n\nincrease in certain widespread diseases or disease-supporting factors, like obesity.\n\nEven 15 years after the enlargement of the EU in 2004, **significant differences between Member**\n\n**States** can still be observed regarding several working conditions. The data demonstrate that the worst\n\nstatus concerning physical risks, wellbeing, and expectations to do the job until the age of 60 — is almost\n\nalways present in eastern EU Member States, followed by southern Member States, all compared to the\n\nstatus in central, western and northern Member States **.** For psychosocial risks, it is just the other way\n\naround, these are more often reported in central, western and northern Member States.\n\n**International organisations complain about an unfair divide of OSH risks in globalised supply**\n\n**chains** , be it in mining, metallurgy, textile production, disposal of hazardous waste or other sectors. The\n\nILO decided in June 2022 to make OSH one of the Fundamental Principles and Rights at Work. In this\n\ncontext, 10 ILO conventions and instruments are considered now as fundamental, including two OSH\n\nconventions: the Occupational Safety and Health Convention, of 1981 (No. 155) and the Promotional\n\nFramework for Occupational Safety and Health Convention, of 2006 (No. 187). Ethical, fairness and\n\njustice considerations have led to more activities on decent, safe and healthy work in developing\n\ncountries and a fair share of risks at work in global supply chains. These are important initiatives, but\n\nuntil now they only slightly changed the overall situation when looking at the global scale of the issue.", - "page_start": 18, - "page_end": 18, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic3.pdf", - "query": "What is an ORCID iD ?", - "target_page": 1, - "target_passage": "ORCID iD is a 16-digit identifier that researchers can register for and use for free.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "*Figure 14-6 Adding a recipient list*\n\n#### **14.2.3 Adding a report ID**\n\nThe next step is to define the reports to ODF. The report ID identifies the application group\n\nand application to which the report belongs. Figure 14-7 shows the window where you add\n\nthe report ID.\n\n*Figure 14-7 Adding a report ID*\n\nTo create a report ID, specify the identifier and then choose the application group and\n\napplication from the drop-down selection.", - "page_start": 345, - "page_end": 345, - "source_file": "sg246915.pdf" - }, - { - "text": "The following scenario shows the how to create a new copy of a volume in a different storage\n\npool. As shown in Example 7-7, the volume initially has a single copy with copy_id 0 that is\n\nprovisioned in pool Pool0 .\n\n*Example 7-7 The lsvdisk command*\n\nIBM_Storwize:ITSO:superuser>lsvdisk 2\n\nid 2\n\nname vdisk0\n\nIO_group_id 0\n\nIO_group_name io_grp0\n\nstatus online\n\nmdisk_grp_id 0\n\nmdisk_grp_name Pool0\n\ncapacity 10.00GB\n\ntype striped\n\nformatted yes\n\nformatting no\n\nmdisk_id\n\nmdisk_name\n\nFC_id\n\nFC_name\n\nRC_id\n\nRC_name\n\nvdisk_UID 6005076400F580049800000000000004\n\npreferred_node_id 2\n\nfast_write_state empty\n\ncache readonly\n\nudid\n\nfc_map_count 0\n\nsync_rate 50\n\ncopy_count 1\n\nse_copy_count 0\n\nFile system\n\nmirror_write_priority latency\n\nRC_change no\n\ncompressed_copy_count 0\n\naccess_IO_group_count 1\n\nlast_access_time\n\nparent_mdisk_grp_id 0\n\nparent_mdisk_grp_name Pool0\n\nowner_type none\n\nowner_id\n\nowner_name\n\nencrypt yes\n\nvolume_id 2\n\nvolume_name vdisk0\n\nfunction\n\nthrottle_id\n\nthrottle_name\n\nIOPs_limit\n\nbandwidth_limit_MB\n\nvolume_group_id\n\nvolume_group_name\n\ncloud_backup_enabled no\n\ncloud_account_id\n\ncloud_account_name\n\nbackup_status off\n\nlast_backup_time\n\nrestore_status none\n\nbackup_grain_size", - "page_start": 315, - "page_end": 315, - "source_file": "sg247938.pdf" - }, - { - "text": "All IDC research is © 2018 by IDC. All rights reserved. All IDC materials are licensed with IDC's permission and in no\n\nway does the use or publication of IDC research indicate IDC's endorsement of ORCID’s products/or strategies.\n\nIDC #US44453318\n\n**An IDC Infographic, sponsored by ORCID | November 2018**\n\n**What’s in a Name? Most names are not unique**\n\nMany people have the same name People use diferent versions of their name during their career\n\nFor example,\n\n**30% OF THE SCIENTISTS WHO GOT THEIR PhD IN THE UNITED KINGDOM NOW LIVE ELSEWHERE**\n\n**Researchers are mobile!**\n\n**Names may change through marriage or other circumstances**\n\n**Individuals use diferent alphabets, abbreviations, or naming conventions**\n\nResearch institutions and organizations therefore find it hard to\n\n**Identify, track, and report on researchers’ afliations and contributions (publications, peer reviews, grants, and more)**\n\n**Benchmark their organization against others**\n\n##### **Institutions Face a Rising Tide of Research**\n\n**scholarly articles published per year**\n\nSource: The STM Report, October 2018\n\nSource: Science Magazine\n\n## 42,500 ACTIVE SCHOLARLY PEER- REVIEWED JOURNALS\n\nSource: The STM Report, October 2018\n\n##### **Tackling Information Overload**\n\nORCID is a non-profit organization, which provides a fully open and interoperable identifier to reliably connect researchers with their research contributions. The ORCID iD is a 16-digit identifier that researchers can register for and use for free.\n\n**Connects individuals and**\n\n**their professional**\n\n**contributions across**\n\n**disciplines,**\n\n**organizations, and time**\n\n**Helps research institutions, funders,**\n\n**publishers, and other organizations**\n\n**better track and support research work**\n\n**Enables recognition of**\n\n**all types of research**\n\n**contributions and**\n\n**innovation**\n\n##### **How ORCID Works**\n\n**It's a registry of unique persistent identifiers for researchers**\n\n**It's a global community that enables researchers to share their data with other individuals, organizations, and systems**\n\n**It's a hub that connects researchers with their professional activities and contributions**\n\n##### **Why Connect with ORCID?**\n\n**Hundreds of members and systems use ORCID globally**\n\n**Connections to ORCID records**\n\n**live ORCID iDs registered since its 2012 launch**\n\nSource: Orcid.org/statistics as of November 2018\n\n##### **Evidence of Institutional Value**\n\nExamples of time/staf savings achieved by implementing ORCID from around the world\n\n**UK:** 0.2 - 0.4 FTEs per institution 1 **Portugal:** 100,000 researcher hours per year 2 **Australia:** 15-30 minutes per grant application 3\n\n##### **How Organizations and Researchers Benefit**\n\nSave time and reduce errors\n\nwith automated\n\ninformation-sharing and\n\ncross-system interoperability\n\nManage your organization\n\nname and your researchers'\n\nconnections with it\n\nMaintain links with your\n\nresearchers - past,\n\npresent, and future\n\nSponsored by ORCID\n\n**RESEARCHERS INSTITUTIONS**\n\nSpend more time doing\n\nresearch, less time managing it\n\nImprove recognition and\n\ndiscoverability of their\n\nresearch\n\nControl and manage a trusted\n\nand easily shareable record of\n\ntheir research activities and\n\nafliations - for free\n\n**To learn more go to https://orcid.org**\n\n##### **Three Ways to Get Involved**\n\n**1. Encourage and support your researchers in getting, sharing, and using their ORCID iD**\n\n**2. Invest in integrating ORCID into your systems**\n\n**3. Connect data to and from your researchers’ ORCID records to support information use and reuse across organizations**\n\n## **The Value of Using Unique Identifiers for Researchers**\n\n#### **OVER 3 MILLION 5.5 MILLION+**\n\n**3.7 ORCID iDs created every minute**\n\n**193 diferent languages included in ORCID records**\n\n**73.6% of records have granted update permissions**\n\n**1.97 record updates made per second**", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "When you are ready to create your striped volume, use the **mkvdisk** command. The command\n\nshown in Example 7-2 creates a 10 gigabyte (GB) striped volume with volume ID 8 within the\n\nstorage pool Pool0 and assigns it to the I/O group io_grp0 . Its preferred node is node 1 .\n\n*Example 7-2 The mkvdisk command*\n\nIBM_Storwize:ITSO:superuser>mkvdisk -mdiskgrp Pool0 -iogrp io_grp0 -size 10 -unit gb -name\n\nTiger\n\nVirtual Disk, id [8], successfully created\n\nTo verify the results, use the **lsvdisk** command providing the volume ID as the command\n\nparameter, as shown in Example 7-3.\n\n*Example 7-3 The lsvdisk command*\n\nIBM_Storwize:ITSO:superuser>lsvdisk 8\n\nid 8\n\nname Tiger\n\nIO_group_id 0\n\nIO_group_name io_grp0\n\nstatus online\n\nmdisk_grp_id 0\n\nmdisk_grp_name Pool0\n\ncapacity 10.00GB\n\ntype striped\n\nformatted no\n\nformatting yes\n\nmdisk_id\n\nmdisk_name\n\nFC_id\n\nFC_name\n\nRC_id\n\nRC_name\n\nvdisk_UID 6005076400F580049800000000000010\n\npreferred_node_id 2\n\nfast_write_state not_empty\n\ncache readwrite\n\nudid\n\nfc_map_count 0\n\nsync_rate 50\n\ncopy_count 1\n\nse_copy_count 0\n\nFile system\n\nmirror_write_priority latency\n\nRC_change no\n\ncompressed_copy_count 0\n\naccess_IO_group_count 1\n\nlast_access_time\n\nparent_mdisk_grp_id 0\n\nparent_mdisk_grp_name Pool0\n\nowner_type none\n\nowner_id\n\nowner_name\n\nencrypt yes\n\nvolume_id 8\n\nvolume_name Tiger\n\nfunction\n\nthrottle_id\n\nthrottle_name\n\nIOPs_limit", - "page_start": 311, - "page_end": 311, - "source_file": "sg247938.pdf" - }, - { - "text": "*Example 7-9 Synchronization*\n\nIBM_Storwize:ITSO:superuser>lsvdisksyncprogress\n\nvdisk_id vdisk_name copy_id progress estimated_completion_time\n\n2 vdisk0 1 0 171018232305\n\nIBM_Storwize:ITSO:superuser>lsvdisksyncprogress\n\nvdisk_id vdisk_name copy_id progress estimated_completion_time\n\n2 vdisk0 1 100\n\nAs shown in Example 7-10, the new volume copy ( copy_id 1 ) was added and appears in the\n\noutput of the **lsvdisk** command.\n\n*Example 7-10 The lsvdisk command*\n\nIBM_Storwize:ITSO:superuser>lsvdisk vdisk0\n\nid 2\n\nname vdisk0\n\nIO_group_id 0\n\nIO_group_name io_grp0\n\nstatus online\n\nmdisk_grp_id many\n\nmdisk_grp_name many\n\ncapacity 10.00GB\n\ntype many\n\nformatted yes\n\nformatting no\n\nmdisk_id many\n\nmdisk_name many\n\nFC_id\n\nFC_name\n\nRC_id\n\nRC_name\n\nvdisk_UID 6005076400F580049800000000000004\n\npreferred_node_id 2\n\nfast_write_state empty\n\ncache readonly\n\nudid\n\nfc_map_count 0\n\nsync_rate 50\n\ncopy_count 2\n\nse_copy_count 0\n\nFile system\n\nmirror_write_priority latency\n\nRC_change no\n\ncompressed_copy_count 0\n\naccess_IO_group_count 1\n\nlast_access_time\n\nparent_mdisk_grp_id many\n\nparent_mdisk_grp_name many\n\nowner_type none\n\nowner_id\n\nowner_name\n\nencrypt yes\n\nvolume_id 2\n\nvolume_name vdisk0\n\nfunction\n\nthrottle_id\n\nthrottle_name\n\nIOPs_limit\n\nbandwidth_limit_MB\n\nvolume_group_id", - "page_start": 317, - "page_end": 317, - "source_file": "sg247938.pdf" - }, - { - "text": "Another example is a sales team that generates a monthly sales report for each person on\n\nthe sales team. The sales manager needs a copy of these reports. A distribution can be set\n\nup to email the documents to the appropriate sales manager.\n\nThe applications for using ODF are endless, but the basis for using it is the same. Documents\n\nare loaded regularly and are needed by one or more users as they become available in\n\nContent Manager OnDemand. Let us look at a specific example from our fictitious company\n\nthat was introduced in 1.2.1, “Background information of an example company” on page 6.\n\nAFinancial Co generates monthly credit card statements for all its customers. These\n\ncustomers can choose to receive a hardcopy of the statement or have the statement sent to\n\nthem as an email attachment.\n\nIn this example, even though separate customer statements are created each month, they are\n\nloaded into the system at the same time, so only one load occurs each month. This\n\ninformation is important when you are determining the best way to set up the distribution.\n\nBefore a distribution is set up, ask yourself the following questions:\n\n� What documents are needed?\n\n� Who receives the documents?\n\n� When are the documents retrieved and delivered?\n\n� Where are they delivered?\n\n#### **14.1.1 What documents are needed**\n\nIn our example, we identified our documents as the customer statements. How do you identify\n\nthe customer report that you need from the hundreds of thousands of documents that are\n\nstored in Content Manager OnDemand? Certain customers might receive multiple monthly\n\nstatements.\n\nIn general, you identify the documents by creating an SQL query that uses index fields and\n\nvalues that uniquely identify the documents that you want to retrieve when they are loaded.\n\nYou can then define the distribution to include multiple report bundles with different SQL\n\nqueries for each bundle. If the SQL must retrieve the document that is the same except for a\n\nvalue that identifies the recipient, a single distribution can be used with a recipient list. In this\n\ncase, the SQL specifies a wildcard value. When processing, ODF fills in the recipient ID in the\n\nSQL statement. For example, a recipient list contains recipients 100001, 100002, and 100003\n\nand an SQL statement of “ Where branch_id = '$ODF_RECIPIENT '”. When this recipient list is\n\nprocessed, ODF creates a distribution for recipient 100001 with all reports where branch_id =\n\n'100001', recipient 100002 will receive a distribution that contains all reports where branch_id\n\n= '100002', and so on.\n\n#### **14.1.2 Who receives the documents**\n\nIn our example, each customer needs a statement copy every month. To identify the\n\ncustomers to Content Manager OnDemand, an ODF recipient must be created for each\n\ncustomer. Depending on how the documents are delivered, a destination must be set up. For\n\nexample, if a set of documents will be delivered to a recipient by using email, an email\n\naddress must be specified in the recipient definition.\n\n#### **14.1.3 When the documents are retrieved and delivered**\n\nODF operates throughout the 24-hour day. You can schedule your distributions to be\n\nprocessed at a specific time of day or processed as they are loaded. To specify when the\n\ndistribution is delivered, choose the method, which is either Loaded, All Ready, Time of Day,\n\nTime of Print, or external.", - "page_start": 341, - "page_end": 341, - "source_file": "sg246915.pdf" - }, - { - "text": "Example 7-15 shows the **splitvdiskcopy** command, which is used to split a mirrored volume.\n\nIt creates a volume named SPLIT_VOL from copy with ID 1 of the volume named\n\nVOLUME_WITH_MIRRORED_COPY .\n\n*Example 7-15 Split volume*\n\nIBM_Storwize:ITSO:superuser>splitvdiskcopy -copy 1 -iogrp 0 -name SPLIT_VOL\n\nVOLUME_WITH_MIRRORED_COPY\n\nVirtual Disk, id [1], successfully created\n\nAs you can see in Example 7-16, the new volume is created as an independent volume.\n\n*Example 7-16 The lsvdisk command*\n\nIBM_Storwize:ITSO:superuser>lsvdisk SPLIT_VOL\n\nid 1\n\nname SPLIT_VOL\n\nIO_group_id 0\n\nIO_group_name io_grp0\n\nstatus online\n\nmdisk_grp_id 1\n\nmdisk_grp_name Pool1\n\ncapacity 10.00GB\n\ntype striped\n\nformatted yes\n\nformatting no\n\nmdisk_id\n\nmdisk_name\n\nFC_id\n\nFC_name\n\nRC_id\n\nRC_name\n\nvdisk_UID 6005076400F580049800000000000012\n\npreferred_node_id 1\n\nfast_write_state empty\n\ncache readwrite\n\nudid\n\nfc_map_count 0\n\nsync_rate 50\n\ncopy_count 1\n\nse_copy_count 0\n\nFile system\n\nmirror_write_priority latency\n\nRC_change no\n\ncompressed_copy_count 0\n\naccess_IO_group_count 1\n\nlast_access_time\n\nparent_mdisk_grp_id 1\n\nparent_mdisk_grp_name Pool1\n\nowner_type none\n\nowner_id\n\nowner_name\n\nencrypt yes\n\nvolume_id 1\n\nvolume_name SPLIT_VOL\n\nfunction\n\nthrottle_id\n\nthrottle_name\n\nIOPs_limit\n\nbandwidth_limit_MB", - "page_start": 321, - "page_end": 321, - "source_file": "sg247938.pdf" - }, - { - "text": "**3.7 ORCID iDs created every minute**\n\n**193 diferent languages included in ORCID records**\n\n**73.6% of records have granted update permissions**\n\n**1.97 record updates made per second**\n\n**1. Jisc/ARMA Institutional ORCID Implementation and Cost Benefit Analysis Report 2015**\n\n**2. Cátia Laranjeira, FCT - Fundação para a Ciência e a Tecnologia 2017**\n\n**3. Australian Research Council governance meeting, September 2018**\n\n\"Having ORCID iDs for most of our researchers has helped in providing\n\nauthoritative accounts in our various databases, ensuring accuracy in\n\nreviewer identities, and helping editors find reviewers and check expertise.\"\n\n**—Brooks Hanson, Executive Vice President, Science, American Geophysical Union**\n\n**Institutions must increasingly recognize and demonstrate**\n\n**the impact of all types of research contributions**\n\n■ **Live ORCID iDs**\n\n■ **w/at least 1 education**\n\n■ **w/at least 1 employee**\n\n■ **w/at least 1 work**\n\n6M\n\n5M\n\n4M\n\n3M\n\n2M\n\n1M\n\n2012 2013 2014 2015 2016 2017 2018", - "page_start": 0, - "page_end": 0, - "source_file": "infographic3.pdf" - }, - { - "text": "2. To map a volume, select it and click **Next** to map it to the host. The volume is assigned the\n\nnext available SCSI ID if you leave **System Assign** selected. However, by selecting **Self**\n\n**Assign** , you can manually set SCSI IDs, as shown in Figure 8-30.\n\n*Figure 8-30 Modify Host Volume Mappings: Assign SCSI ID*\n\nIf you select a SCSI ID that is in use for the host, you cannot proceed. As shown in\n\nFigure 8-29 on page 347, we selected SCSI ID 0. However, you can see in the right\n\ncolumn SCSI ID 0 is allocated. By changing to SCSI ID 1, we can click **Next** .", - "page_start": 369, - "page_end": 369, - "source_file": "sg247938.pdf" - }, - { - "text": "arn:partition:service:region:account-id:resource-type/resource-id\n\narn:partition:service:region:account-id:resource-type:resource-id\n\n- arn means this string is an ARN\n\n- partition is one of the three AWS partitions: AWS regions, AWS China regions, or AWS\n\nGovCloud (US) regions\n\n- service is the specific AWS service, for example: EC2\n\n- region is the AWS region, for example: us-east-1 (North Virginia)\n\n- account-id is the AWS account ID\n\n- resource-id is the unique resource ID. (Could also be in the form resource-type/\n\nresource-id )\n\n**Related resource(s):**\n\n- [ IAM identifiers](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html) provides an exhaustive list in the docs for IAM ARNs\n\n###### **Conditions**\n\n*Conditions* are specific rules for which the access is valid.\n\n###### **Other Elements**\n\n- All IAM policies have an *Effect* field which is set to either Allow or Deny .\n\n- Version field defines which IAM service API version to use when evaluating the policy.\n\n- Statement field consists of one or many JSON objects that contain the specific Action, Effect,\n\nResource, and Condition fields described previously\n\n- Sid (statement ID) is an optional identifier for a policy statement; some services like Amazon\n\nSimple Queue Service and Amazon Simple Notification Service might require this element and\n\nhave uniqueness requirements for it\n\n##### **Policies**\n\nWhen you set permissions, you attach a JSON policy to a principal. In the following example, an\n\nAWS managed policy named **AWSLambdaInvocation-DynamoDB** will be attached to a role that is\n\nrelated to a Lambda function:\n\nFundamentals", - "page_start": 44, - "page_end": 44, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2669.pdf", - "query": "What type of instability causes rims in ruptured polystyrene thin films to decay into small drops ?", - "target_page": 3, - "target_passage": " The rims may further decay into lines of small drops due to a Rayleigh-type instability", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion\n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid-\n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ-\n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport\n\nregime where the instability is almost completely independent of the interaction strengths and\n\na demixing regime where particles and liquid demix at the receding front thereby increasing its\n\ntransverse instability.\n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of\n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional\n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo-\n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by\n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend\n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between\n\nshort- and long-range interactions of solvent and/or solute with the substrate. We have, however,\n\nrestricted the examples given here to situations that can also be described using the KMC model.\n\nA further exploration will be presented elsewhere.\n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It\n\nresults from a long-wave approximation and consists of coupled evolution equations for the film\n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning\n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee-\n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the\n\ncombined effects of convection and evaporation.\n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques\n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica-\n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly\n\ntowards increasingly complex systems. For example, there have been investigations of the influ-\n\nence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal\n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap-\n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of\n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102],\n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding\n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather\n\n24", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "## **I. INTRODUCTION**\n\nThe patterns formed in dewetting processes have attracted strong interest since Reiter analysed the\n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in\n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is\n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The\n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a\n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines\n\nof small drops due to a Rayleigh-type instability [1- 3]. The related problems of retracting contact\n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also\n\nbeen studied [4, 5].\n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple\n\nnon-volatile liquids and polymers (for reviews see Refs. [6- 8]). All stages of the dewetting of a\n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal\n\ndewetting) [1, 9- 13], the growth process of individual holes [14- 16], the evolution of the resulting\n\nhole pattern [3, 13], and the stability of the individual dewetting fronts [17- 19]. We note in\n\npassing, that descriptions of dewetting patterns may also be found in historic papers, particularly\n\nfor the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40]\n\nconsidered turpentine on water and Marangoni [21, p. 352f] oil on water.\n\nMore recently, interest has turned to the dewetting processes of solutions and suspensions. How-\n\never, these systems have not yet been investigated in any great depth. Such systems are compli-\n\ncated because their behaviour is determined by the interplay between the various solute (or colloid)\n\nand solvent transport processes. Furthermore, the solvents that are used often evaporate, i.e., one\n\nhas to distinguish between ‘normal’ convective dewetting and evaporative dewetting. A number\n\nof experiments have been performed employing (colloidal) solutions of polymers [22- 25], macro-\n\nmolecules like collagen and DNA [26- 31] and nanoparticles [32- 40]. The latter are sometimes\n\nreferred to as ‘nanofluids’. The initial focus of much of the research in the field has been on\n\ninvestigating the structures that are formed which are similar to the ones observed in the ‘classi-\n\ncal’ dewetting of non-volatile liquids. Labyrinthine structures and polygonal networks result from\n\nspinodal dewetting and heterogeneous nucleation and growth, respectively. They are ‘decorated’\n\nwith the solute and therefore conserve the transient dewetting pattern as a dried-in structure when\n\nall the solvent has evaporated [28, 34]. The picture is, however, not complete. The solute may\n\n3", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2669.pdf" - }, - { - "text": "also shift the spinodal and binodal lines as compared to the locations of these lines in the phase\n\ndiagram for the pure solvent [41]. As a consequence, the solute concentration influences the hole\n\nnucleation rate. More importantly, the solute particles may also destabilise the dewetting fronts.\n\nAs a result, one may find strongly ramified structures in all three systems [23, 25, 40, 42]. A\n\nselection of images exhibiting some of the possible structures is displayed in Fig.1.\n\nFor volatile solvents, the contact lines retract even for wetting fluids. It has been found that such\n\nevaporatively receding contact lines may deposit very regular line or ring patterns parallel to the\n\nmoving contact line [24, 43]. The deposition of a single ring of colloids from a evaporating\n\ndrop of colloidal suspension is well known as the ‘coffee stain effect’ [44]. Detailed investiga-\n\ntions reveal the emergence of rich structures including multiple irregular rings, networks, regular\n\ndroplet patterns, sawtooth patterns, Sierpinski carpets, and - in the case of DNA - liquid crys-\n\ntalline structures [22, 30, 45- 49]. The deposition of regularly spaced straight lines orthogonal to\n\nthe moving contact line has also been reported [50]. Droplet patterns may as well be created em-\n\nploying solvent-induced dewetting of glassy polymer layers below the glass transition temperature\n\n[51- 53].\n\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and\n\ntheoretically [55- 58]. In this case, different contact line instabilities have been observed for evap-\n\norating liquid drops [59, 60].\n\nIn the present article we review and preview the experiments and in particular the various mod-\n\nelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting sol-\n\nvents. After reviewing the basic experimental results in Section II, we discuss in Section III sev-\n\neral theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A,\n\na dynamic density functional theory in Section III B, and a thin film evolution equation in Sec-\n\ntion III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the\n\nindividual approaches and future challenges to all of them.\n\n## **II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS**\n\nWe focus on experiments that use monodisperse colloidal suspensions of thiol-passivated gold\n\nnanoparticles in toluene [33, 34, 37- 40, 61]. The gold core of 2 - 3 nm diameter is coated by a layer\n\nof alkyl-thiol molecules. The length of the carbon backbone of the thiol used in the experiments\n\nranges from 6 to 12 carbon atoms ( *C* 6 to *C* 12 ) [40]. By varying the chain length, one can control\n\n4", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" - }, - { - "text": "fast evaporation [104, 105]. These complex experimental systems all represent systems of high\n\npractical interest that the theories presented here are not (yet) able to describe. Such experiments\n\ndo, however, provide a strong motivation for further work to extend the theories presented here, as\n\nwell as to develop new approaches.\n\nLet us finally mention that several topics were entirely excluded from our discussion here. First, we\n\nfocused on a limited range of descriptions and did, for instance, not mention lattice Boltzmann,\n\nmolecular dynamics or dissipative particle dynamics approaches that may also be employed to\n\ndescribe fluid suspensions [106- 109]. Second, we have only discussed spatially homogeneous\n\nsubstrates. Patterned substrates are widely used in dewetting experiments [38, 110- 112]. Theoret-\n\nical descriptions are well developed for the dewetting of films of pure non-volatile liquids on such\n\nsubstrates [68, 113- 119]. However, in the case of volatile liquids on heterogeneous substrates,\n\nmuch less work has been done. A third topic that we did not touch upon are possible continuum\n\nthin film approaches to demixing dewetting suspensions. We believe it is feasible to extend the\n\ndiffuse interface theories such as model-H [120] to include the influence of evaporation in dewet-\n\nting nanoparticle suspensions. For instance, such models have already been adapted to describe\n\ndemixing free surface films of polymer blends [121- 123].\n\n## **Acknowledgments**\n\nAJA and MJR gratefully acknowledge RCUK and EPSRC, respectively, for financial support. We\n\nacknowledge support by the European Union via the FP6 and FP7 Marie Curie schemes [Grants\n\nMRTN-CT-2004005728 (PATTERNS) and PITN-GA-2008-214919 (MULTIFLOW)].\n\n[1] G. Reiter, “Dewetting of thin polymer films,” Phys. Rev. Lett. **68** , 75- 78 (1992).\n\n[2] G. Reiter, “Mobility of polymers in films thinner than their unperturbed size,” Europhys. Lett. **23** ,\n\n579- 584 (1993).\n\n[3] A. Sharma and G. Reiter, “Instability of thin polymer films on coated substrates: Rupture, dewetting\n\nand drop formation,” J. Colloid Interface Sci. **178** , 383- 399 (1996).\n\n[4] P.-G. de Gennes, “Wetting: Statics and dynamics,” Rev. Mod. Phys. **57** , 827- 863 (1985).\n\n25", - "page_start": 24, - "page_end": 24, - "source_file": "1001.2669.pdf" - }, - { - "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. **68** ,\n\n1084- 1088 (1989).\n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real\n\nand reciprocal space,” J. Phys.-Condes. Matter **15** , R1549- R1582 (2003).\n\n[7] R. Seemann, S. Herminghaus, C. Neto, S. Schlagowski, D. Podzimek, R. Konrad, H. Mantz, and\n\nK. Jacobs, “Dynamics and structure formation in thin polymer melt films,” J. Phys.-Condes. Matter\n\n**17** , S267- S290 (2005).\n\n[8] U. Thiele, “Structure formation in thin liquid films,” in S. Kalliadasis and U. Thiele, editors, “Thin\n\nfilms of Soft Matter,” pages 25- 93, Springer, Wien (2007).\n\n[9] R. Xie, A. Karim, J. F. Douglas, C. C. Han, and R. A. Weiss, “Spinodal dewetting of thin polymer\n\nfilms,” Phys. Rev. Lett. **81** , 1251- 1254 (1998).\n\n[10] R. Seemann, S. Herminghaus, and K. Jacobs, “Dewetting patterns and molecular forces: A reconcil-\n\niation,” Phys. Rev. Lett. **86** , 5534- 5537 (2001).\n\n[11] U. Thiele, M. G. Velarde, and K. Neuffer, “Dewetting: Film rupture by nucleation in the spinodal\n\nregime,” Phys. Rev. Lett. **87** , 016104 (2001).\n\n[12] M. Bestehorn and K. Neuffer, “Surface patterns of laterally extended thin liquid films in three di-\n\nmensions,” Phys. Rev. Lett. **87** , 046101 (2001).\n\n[13] J. Becker, G. Gr¨un, R. Seemann, H. Mantz, K. Jacobs, K. R. Mecke, and R. Blossey, “Complex\n\ndewetting scenarios captured by thin-film models,” Nat. Mater. **2** , 59- 63 (2003).\n\n[14] C. Redon, F. Brochard-Wyart, and F. Rondelez, “Dynamics of dewetting,” Phys. Rev. Lett. **66** , 715-\n\n718 (1991).\n\n[15] R. Seemann, S. Herminghaus, and K. Jacobs, “Shape of a liquid front upon dewetting,” Phys. Rev.\n\nLett. **87** , 196101 (2001).\n\n[16] R. Fetzer, K. Jacobs, A. M¨unch, B. Wagner, and T. P. Witelski, “New slip regimes and the shape of\n\ndewetting thin liquid films,” Phys. Rev. Lett. **95** , 127801 (2005).\n\n[17] F. Brochard-Wyart and C. Redon, “Dynamics of liquid rim instabilities,” Langmuir **8** , 2324- 2329\n\n(1992).\n\n[18] G. Reiter and A. Sharma, “Auto-optimization of dewetting rates by rim instabilities in slipping poly-\n\nmer films,” Phys. Rev. Lett. **87** , 166103 (2001).\n\n[19] A. M¨unch and B. Wagner, “Contact-line instability of dewetting thin films,” Physica D **209** , 178- 190\n\n(2005).\n\n26", - "page_start": 25, - "page_end": 25, - "source_file": "1001.2669.pdf" - }, - { - "text": "(iii)\n\n(iv)\n\n(ii)\n\n(i)\n\nFIG. 8: (Colour online) Space-time plots are given for (left) the film thickness *h* and (right) the nanoparticle\n\nlayer height *h* *p* = *hφ* . The plot corresponds to the complete evolution resulting in the ring profile of\n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright\n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four\n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning,\n\n(iii) slow motion after depinning, and (iv) final evaporation from the center.\n\nshould also be investigated further in the simple case presented here.\n\n## **IV. CONCLUSION**\n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating\n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of\n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and\n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics\n\non the mesoscale has been described as well as more microscopic models for the dynamics in the\n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film\n\nmodel.\n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to\n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures\n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic\n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n\n23", - "page_start": 22, - "page_end": 22, - "source_file": "1001.2669.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "dewetted liquid. The front recedes until all liquid is collected in a central drop. Since no liquid\n\nevaporates [ *Q* nc = 0 in Eq. (1)], the particle concentration does not change during the process.\n\nThe situation changes when allowing for evaporation ( *Q* nc *>* 0 ). Now the front may retract\n\nby convection *and/or* evaporation. Evaporation leads to the possibility of a strong increase in\n\nthe particle concentration at the contact line as evaporation is strongest there. Due to the strong\n\nnonlinear dependence of the viscosity on the particle concentration, this may lead to a dramatic\n\ndecrease of the convective contribution to the front velocity. For moderate evaporation rates, this\n\nmay result in a (temporary) self-pinning of the front. Within the present basic model, the process\n\ncan (after complete dry-in) result in three different basic deposition patterns: (i) for very fast\n\nevaporation rates, all other processes occur over time scales that are much larger. In particular, the\n\neffects of convective redistribution of the liquid are neglectable. As a result one finds that a nearly\n\nhomogeneous film of nanoparticles of thickness *h* *p* = *φ* 0 *h* 0 is deposited (see Fig. 6(a)). Convection\n\nonly results in the small heap of material visible at the left hand side of Fig. 6(a). The decrease\n\nin *h* *p* on the right side of Fig. 6(a) arises due to the diffusion of particles to the right of the initial\n\nfront position; (ii) for very low evaporation rates, the film dynamics is dominated by convective\n\ndewetting as this process acts on a much shorter time scale than evaporation. As a result, all the\n\nliquid is collected into a drop before evaporation slowly removes the remaining solvent. Under\n\nthese conditions most of the nanoparticles are deposited in a single heap (see Fig. 6(c)). Depending\n\non the diffusivity, the heap might be highest at the centre or show a depression there; (iii) at\n\nintermediate evaporation rates, one may observe the deposition of a nanoparticle ring around a\n\nregion with a nanoparticle film of much lower height. At the centre deposition might increase\n\nagain (see Fig. 6(b)).\n\nThe most intriguing feature is the ring formation that has been observed experimentally for sus-\n\npensions of very different particle sizes ranging from nanometers [32, 36, 46, 47] to hundreds of\n\nmicrometers. Pinning of the contact line and thermal Marangoni effects are often mentioned as\n\nnecessary conditions for the ring formation. The contact line pinning is often assumed to result\n\nfrom substrate heterogeneities. Film height and concentration profiles at various instants during\n\nthe dewetting process are displayed in Fig. 7. The profiles are from before, at and after self-pinning\n\nof the contact line. In Fig. 8 we display a space-time plot for the complete process. At first, the\n\nfront recedes in the same manner as when there is no evaporation, but now driven by convection\n\nand evaporation. A small capillary rim forms that collects all the dewetted liquid that does not\n\nevaporate. The particle concentration slowly increases at the contact line (Fig. 7(a) and regime\n\n21", - "page_start": 20, - "page_end": 20, - "source_file": "1001.2669.pdf" - }, - { - "text": "NAVWEPS 00-EOT-80 OPERATING STRENGTH LIMITATIONS\n\nSTATIC STRENGTH OF TYPICAL AIRCRAFT METAL\n\nULTIMATE\n\nSTRENGTH -Cc\n\nCYCLIC STRESS (PSI)\n\nSTRESSES APPLIED ABOVE THIS POINT RESULT IN OBJECTIONABLE PERMANENT DEFORMATION\n\nQ\n\nFAILURE\n\n-I STRAIN PERMANENT (IN/IN)\n\nSET II: -I I--\n\nFATIGUE STRENGTH OF TYPICAL AIRCRAFT METAL\n\nHIGH CYCLIC STRESS\n\nVERY FEW CYCLES REQUIRED TO CAUSE FAILURE\n\nMODERATE CYCLIC STRESS\n\nRELATIVELY LARGE NUMBER OF APPLICATIONS NECESSARY TO CAUSE FAILURE LOW CYCLIC STRESS\n\nALMOST INFINITE CYCLES TO CREATE FATIGUE FAILURE\n\nNUMBER OF APPLICATIONS TO CAUSE FATIGUE FAILURE\n\n### Egu,e 5.1. Strength Chomctorirfics\n\n327", - "page_start": 344, - "page_end": 344, - "source_file": "00-80T-80.pdf" - }, - { - "text": "polymers which only result in fingers without side-branches [75] or fields of droplets left behind\n\n[18].\n\nA quantitative analysis shows that the mean number of fingers depends only very weakly on the av-\n\nerage concentration of the nanoparticles *ρ* *av* *n* ; only the mean finger width increases with increasing\n\nconcentration. However, decreasing the mobility (i.e., decreasing the diffusivity of the particles)\n\nleads to a much denser finger pattern and also causes the front instability to appear at an earlier\n\nstage, i.e., when the front instability is in its initial linear regime, it has a higher growth rate and a\n\nsmaller characteristic wavelength (cf. Fig. 2(c) and (d)). Decreasing the effective chemical poten-\n\ntial (increasing its absolute value) has a similar but less strong effect. For details see [41]. These\n\nfindings lead to the conclusion that the determining factor for the front instability is the ratio of\n\nthe time-scales of the different transport processes. In particular, the front becomes more unstable\n\nwhen the velocity of the dewetting front increases as compared to the mean diffusion velocity of\n\nthe nanoparticles.\n\nIf the particle diffusivity is low, the front ‘collects’ the particles, resulting in a build up of the\n\nparticles at the front that itself is slowed down. This makes the front unstable and any fluctuation\n\nalong the front will trigger a transverse instability that results in an evolving fingering pattern. This\n\nhappens even when the particle-liquid and particle-particle attractive interactions do not favour\n\nclustering (i.e. demixing of the liquid and the nanoparticles). In this regime, the instability is a\n\npurely dynamic effect and energetics plays no role in determining the number of fingers. We call\n\nthis the ‘transport regime’.\n\nTo illustrate the influence of energetics (characterized by the interaction parameters *ε* *ij* ) on finger-\n\ning in Fig. 3 we display the dependence of the mean finger number on particle-liquid interaction\n\nstrength *ε* *nl* . For *ε* *nl* *≥* 1 *.* 5 the mean finger number *< f >* is nearly constant; this is the trans-\n\nport regime. However, on decreasing *ε* *nl* below 1.5, we observe a marked increase in the value\n\nof *< f >* , indicating that energy plays an important role in determining the number of fingers in\n\nthis regime. In this parameter range, demixing of particles and liquid occurs at the moving front\n\nand increases its transverse instability. In this ‘demixing regime’, the wavelength of the fingering\n\ninstability is determined by the dynamics *and* the energetics of the system. Decreasing *ε* *nl* further\n\n(below 1 *.* 4 in Fig. 3) one first observes in regime (iii) a slight decrease in the average finger num-\n\nber. This is a geometric effect resulting from our one-dimensional finger counting routine: The\n\nfingers increasingly break up and the dried-in pattern looks progressively isotropic. In regime (iv),\n\nthe measure *⟨* *f* *⟩* does not represent a finger number but instead indicates a decrease in the typical\n\n12", - "page_start": 11, - "page_end": 11, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2669.pdf", - "query": "Concerning the dewetting of nanoparticle solutions, how does the concentration of nanoparticle affect the main finger's width ?", - "target_page": 12, - "target_passage": "A quantitative analysis shows that the mean number of fingers depends only very weakly on the av- erage concentration of the nanoparticles ; only the mean finger width increases with increasing concentration", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "## **I. INTRODUCTION**\n\nThe patterns formed in dewetting processes have attracted strong interest since Reiter analysed the\n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in\n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is\n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The\n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a\n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines\n\nof small drops due to a Rayleigh-type instability [1- 3]. The related problems of retracting contact\n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also\n\nbeen studied [4, 5].\n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple\n\nnon-volatile liquids and polymers (for reviews see Refs. [6- 8]). All stages of the dewetting of a\n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal\n\ndewetting) [1, 9- 13], the growth process of individual holes [14- 16], the evolution of the resulting\n\nhole pattern [3, 13], and the stability of the individual dewetting fronts [17- 19]. We note in\n\npassing, that descriptions of dewetting patterns may also be found in historic papers, particularly\n\nfor the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40]\n\nconsidered turpentine on water and Marangoni [21, p. 352f] oil on water.\n\nMore recently, interest has turned to the dewetting processes of solutions and suspensions. How-\n\never, these systems have not yet been investigated in any great depth. Such systems are compli-\n\ncated because their behaviour is determined by the interplay between the various solute (or colloid)\n\nand solvent transport processes. Furthermore, the solvents that are used often evaporate, i.e., one\n\nhas to distinguish between ‘normal’ convective dewetting and evaporative dewetting. A number\n\nof experiments have been performed employing (colloidal) solutions of polymers [22- 25], macro-\n\nmolecules like collagen and DNA [26- 31] and nanoparticles [32- 40]. The latter are sometimes\n\nreferred to as ‘nanofluids’. The initial focus of much of the research in the field has been on\n\ninvestigating the structures that are formed which are similar to the ones observed in the ‘classi-\n\ncal’ dewetting of non-volatile liquids. Labyrinthine structures and polygonal networks result from\n\nspinodal dewetting and heterogeneous nucleation and growth, respectively. They are ‘decorated’\n\nwith the solute and therefore conserve the transient dewetting pattern as a dried-in structure when\n\nall the solvent has evaporated [28, 34]. The picture is, however, not complete. The solute may\n\n3", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2669.pdf" - }, - { - "text": "also shift the spinodal and binodal lines as compared to the locations of these lines in the phase\n\ndiagram for the pure solvent [41]. As a consequence, the solute concentration influences the hole\n\nnucleation rate. More importantly, the solute particles may also destabilise the dewetting fronts.\n\nAs a result, one may find strongly ramified structures in all three systems [23, 25, 40, 42]. A\n\nselection of images exhibiting some of the possible structures is displayed in Fig.1.\n\nFor volatile solvents, the contact lines retract even for wetting fluids. It has been found that such\n\nevaporatively receding contact lines may deposit very regular line or ring patterns parallel to the\n\nmoving contact line [24, 43]. The deposition of a single ring of colloids from a evaporating\n\ndrop of colloidal suspension is well known as the ‘coffee stain effect’ [44]. Detailed investiga-\n\ntions reveal the emergence of rich structures including multiple irregular rings, networks, regular\n\ndroplet patterns, sawtooth patterns, Sierpinski carpets, and - in the case of DNA - liquid crys-\n\ntalline structures [22, 30, 45- 49]. The deposition of regularly spaced straight lines orthogonal to\n\nthe moving contact line has also been reported [50]. Droplet patterns may as well be created em-\n\nploying solvent-induced dewetting of glassy polymer layers below the glass transition temperature\n\n[51- 53].\n\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and\n\ntheoretically [55- 58]. In this case, different contact line instabilities have been observed for evap-\n\norating liquid drops [59, 60].\n\nIn the present article we review and preview the experiments and in particular the various mod-\n\nelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting sol-\n\nvents. After reviewing the basic experimental results in Section II, we discuss in Section III sev-\n\neral theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A,\n\na dynamic density functional theory in Section III B, and a thin film evolution equation in Sec-\n\ntion III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the\n\nindividual approaches and future challenges to all of them.\n\n## **II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS**\n\nWe focus on experiments that use monodisperse colloidal suspensions of thiol-passivated gold\n\nnanoparticles in toluene [33, 34, 37- 40, 61]. The gold core of 2 - 3 nm diameter is coated by a layer\n\nof alkyl-thiol molecules. The length of the carbon backbone of the thiol used in the experiments\n\nranges from 6 to 12 carbon atoms ( *C* 6 to *C* 12 ) [40]. By varying the chain length, one can control\n\n4", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" - }, - { - "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle\n\ndeposits. The concentration of particles is much higher at the network nodes - an effect that can\n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid\n\non the substrate where the nanoparticles are.\n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front.\n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be\n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7\n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger\n\nnumber remains constant, although new branches are continuously created and old branches join\n\neach other. In general, the results on fingering agree well with results obtained using the KMC\n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor\n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion\n\nconstant that is independent of the nanoparticle concentration. The DDFT is better suited than the\n\nKMC for investigations of the early instability stages: they are more easy to discern without the\n\ndiscrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of\n\nthe one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations\n\n(in analogy to the approach used in Refs. [19, 86, 87]).\n\n### **C. Thin film hydrodynamics**\n\nThe previous two sections focused on two approaches to describe the experimentally observed\n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet-\n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional\n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to\n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the\n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach\n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do\n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface-\n\nactive particles resulting in thermal and solutal Marangoni stresses, see Ref. [88]. A description of\n\nspreading particle solutions incorporating a structural disjoining pressure has also been considered\n\n[89]. For related work on particle-laden film flow on an incline see Refs. [90, 91].\n\nOne starts from the Stokes equations, together with continuity, no-slip boundary conditions at the\n\n18", - "page_start": 17, - "page_end": 17, - "source_file": "1001.2669.pdf" - }, - { - "text": "[34] P. Moriarty, M. D. R. Taylor, and M. Brust, “Nanostructured cellular networks,” Phys. Rev. Lett. **89** ,\n\n248303 (2002).\n\n[35] E. Rabani, D. R. Reichman, P. L. Geissler, and L. E. Brus, “Drying-mediated self-assembly of\n\nnanoparticles,” Nature **426** , 271- 274 (2003).\n\n[36] L. V. Govor, G. Reiter, J. Parisi, and G. H. Bauer, “Self-assembled nanoparticle deposits formed at\n\nthe contact line of evaporating micrometer-size droplets,” Phys. Rev. E **69** , 061609 (2004).\n\n[37] C. P. Martin, M. O. Blunt, and P. Moriarty, “Nanoparticle networks on silicon: Self-organized or\n\ndisorganized?” Nano Lett. **4** , 2389- 2392 (2004).\n\n[38] C. P. Martin, M. O. Blunt, E. Pauliac-Vaujour, A. Stannard, P. Moriarty, I. Vancea, and U. Thiele,\n\n“Controlling pattern formation in nanoparticle assemblies via directed solvent dewetting,” Phys. Rev.\n\nLett. **99** , 116103 (2007).\n\n[39] A. Stannard, C. P. Martin, E. Pauliac-Vaujour, P. Moriarty, and U. Thiele, “Dual-scale pattern forma-\n\ntion in nanoparticle assemblies,” J. Chem. Phys. C **112** , 15195- 15203 (2008).\n\n[40] E. Pauliac-Vaujour, A. Stannard, C. P. Martin, M. O. Blunt, I. Notingher, P. J. Moriarty, I. Vancea,\n\nand U. Thiele, “Fingering instabilities in dewetting nanofluids,” Phys. Rev. Lett. **100** , 176102 (2008).\n\n[41] I. Vancea, U. Thiele, E. Pauliac-Vaujour, A. Stannard, C. P. Martin, M. O. Blunt, and P. J. Moriarty,\n\n“Front instabilities in evaporatively dewetting nanofluids,” Phys. Rev. E **78** , 041601 (2008).\n\n[42] U. Thiele, *Entnetzung von Kollagenfilmen* , Ph.D. thesis, Technische Universit¨at Dresden (1998).\n\n[43] H. Yabu and M. Shimomura, “Preparation of self-organized mesoscale polymer patterns on a solid\n\nsubstrate: Continuous pattern formation from a receding meniscus,” Adv. Funct. Mater. **15** , 575- 581\n\n(2005).\n\n[44] R. D. Deegan, O. Bakajin, T. F. Dupont, G. Huber, S. R. Nagel, and T. A. Witten, “Capillary flow as\n\nthe cause of ring stains from dried liquid drops,” Nature **389** , 827- 829 (1997).\n\n[45] E. Adachi, A. S. Dimitrov, and K. Nagayama, “Stripe patterns formed on a glass-surface during\n\ndroplet evaporation,” Langmuir **11** , 1057- 1060 (1995).\n\n[46] R. D. Deegan, “Pattern formation in drying drops,” Phys. Rev. E **61** , 475- 485 (2000).\n\n[47] R. D. Deegan, O. Bakajin, T. F. Dupont, G. Huber, S. R. Nagel, and T. A. Witten, “Contact line\n\ndeposits in an evaporating drop,” Phys. Rev. E **62** , 756- 765 (2000).\n\n[48] L. Shmuylovich, A. Q. Shen, and H. A. Stone, “Surface morphology of drying latex films: Multiple\n\nring formation,” Langmuir **18** , 3441- 3445 (2002).\n\n[49] V. X. Nguyen and K. J. Stebe, “Patterning of small particles by a surfactant-enhanced Marangoni-\n\n28", - "page_start": 27, - "page_end": 27, - "source_file": "1001.2669.pdf" - }, - { - "text": "polymers which only result in fingers without side-branches [75] or fields of droplets left behind\n\n[18].\n\nA quantitative analysis shows that the mean number of fingers depends only very weakly on the av-\n\nerage concentration of the nanoparticles *ρ* *av* *n* ; only the mean finger width increases with increasing\n\nconcentration. However, decreasing the mobility (i.e., decreasing the diffusivity of the particles)\n\nleads to a much denser finger pattern and also causes the front instability to appear at an earlier\n\nstage, i.e., when the front instability is in its initial linear regime, it has a higher growth rate and a\n\nsmaller characteristic wavelength (cf. Fig. 2(c) and (d)). Decreasing the effective chemical poten-\n\ntial (increasing its absolute value) has a similar but less strong effect. For details see [41]. These\n\nfindings lead to the conclusion that the determining factor for the front instability is the ratio of\n\nthe time-scales of the different transport processes. In particular, the front becomes more unstable\n\nwhen the velocity of the dewetting front increases as compared to the mean diffusion velocity of\n\nthe nanoparticles.\n\nIf the particle diffusivity is low, the front ‘collects’ the particles, resulting in a build up of the\n\nparticles at the front that itself is slowed down. This makes the front unstable and any fluctuation\n\nalong the front will trigger a transverse instability that results in an evolving fingering pattern. This\n\nhappens even when the particle-liquid and particle-particle attractive interactions do not favour\n\nclustering (i.e. demixing of the liquid and the nanoparticles). In this regime, the instability is a\n\npurely dynamic effect and energetics plays no role in determining the number of fingers. We call\n\nthis the ‘transport regime’.\n\nTo illustrate the influence of energetics (characterized by the interaction parameters *ε* *ij* ) on finger-\n\ning in Fig. 3 we display the dependence of the mean finger number on particle-liquid interaction\n\nstrength *ε* *nl* . For *ε* *nl* *≥* 1 *.* 5 the mean finger number *< f >* is nearly constant; this is the trans-\n\nport regime. However, on decreasing *ε* *nl* below 1.5, we observe a marked increase in the value\n\nof *< f >* , indicating that energy plays an important role in determining the number of fingers in\n\nthis regime. In this parameter range, demixing of particles and liquid occurs at the moving front\n\nand increases its transverse instability. In this ‘demixing regime’, the wavelength of the fingering\n\ninstability is determined by the dynamics *and* the energetics of the system. Decreasing *ε* *nl* further\n\n(below 1 *.* 4 in Fig. 3) one first observes in regime (iii) a slight decrease in the average finger num-\n\nber. This is a geometric effect resulting from our one-dimensional finger counting routine: The\n\nfingers increasingly break up and the dried-in pattern looks progressively isotropic. In regime (iv),\n\nthe measure *⟨* *f* *⟩* does not represent a finger number but instead indicates a decrease in the typical\n\n12", - "page_start": 11, - "page_end": 11, - "source_file": "1001.2669.pdf" - }, - { - "text": "dewetted liquid. The front recedes until all liquid is collected in a central drop. Since no liquid\n\nevaporates [ *Q* nc = 0 in Eq. (1)], the particle concentration does not change during the process.\n\nThe situation changes when allowing for evaporation ( *Q* nc *>* 0 ). Now the front may retract\n\nby convection *and/or* evaporation. Evaporation leads to the possibility of a strong increase in\n\nthe particle concentration at the contact line as evaporation is strongest there. Due to the strong\n\nnonlinear dependence of the viscosity on the particle concentration, this may lead to a dramatic\n\ndecrease of the convective contribution to the front velocity. For moderate evaporation rates, this\n\nmay result in a (temporary) self-pinning of the front. Within the present basic model, the process\n\ncan (after complete dry-in) result in three different basic deposition patterns: (i) for very fast\n\nevaporation rates, all other processes occur over time scales that are much larger. In particular, the\n\neffects of convective redistribution of the liquid are neglectable. As a result one finds that a nearly\n\nhomogeneous film of nanoparticles of thickness *h* *p* = *φ* 0 *h* 0 is deposited (see Fig. 6(a)). Convection\n\nonly results in the small heap of material visible at the left hand side of Fig. 6(a). The decrease\n\nin *h* *p* on the right side of Fig. 6(a) arises due to the diffusion of particles to the right of the initial\n\nfront position; (ii) for very low evaporation rates, the film dynamics is dominated by convective\n\ndewetting as this process acts on a much shorter time scale than evaporation. As a result, all the\n\nliquid is collected into a drop before evaporation slowly removes the remaining solvent. Under\n\nthese conditions most of the nanoparticles are deposited in a single heap (see Fig. 6(c)). Depending\n\non the diffusivity, the heap might be highest at the centre or show a depression there; (iii) at\n\nintermediate evaporation rates, one may observe the deposition of a nanoparticle ring around a\n\nregion with a nanoparticle film of much lower height. At the centre deposition might increase\n\nagain (see Fig. 6(b)).\n\nThe most intriguing feature is the ring formation that has been observed experimentally for sus-\n\npensions of very different particle sizes ranging from nanometers [32, 36, 46, 47] to hundreds of\n\nmicrometers. Pinning of the contact line and thermal Marangoni effects are often mentioned as\n\nnecessary conditions for the ring formation. The contact line pinning is often assumed to result\n\nfrom substrate heterogeneities. Film height and concentration profiles at various instants during\n\nthe dewetting process are displayed in Fig. 7. The profiles are from before, at and after self-pinning\n\nof the contact line. In Fig. 8 we display a space-time plot for the complete process. At first, the\n\nfront recedes in the same manner as when there is no evaporation, but now driven by convection\n\nand evaporation. A small capillary rim forms that collects all the dewetted liquid that does not\n\nevaporate. The particle concentration slowly increases at the contact line (Fig. 7(a) and regime\n\n21", - "page_start": 20, - "page_end": 20, - "source_file": "1001.2669.pdf" - }, - { - "text": "Benard instability,” Phys. Rev. Lett. **88** , 164501 (2002).\n\n[50] J. Huang, F. Kim, A. R. Tao, S. Connor, and P. Yang, “Spontaneous formation of nanoparticle stripe\n\npatterns through dewetting,” Nat. Mater. **4** , 896- 900 (2005).\n\n[51] S. H. Lee, P. J. Yoo, S. J. Kwon, and H. H. Lee, “Solvent-driven dewetting and rim instability,” J.\n\nChem. Phys. **121** , 4346- 4351 (2004).\n\n[52] L. Xu, T. F. Shi, P. K. Dutta, and L. An, “Rim instability by solvent-induced dewetting,” J. Chem.\n\nPhys. **127** , 144704 (2007).\n\n[53] L. Xu, T. F. Shi, and L. J. An, “The dewetting dynamics of the polymer thin film by solvent anneal-\n\ning,” J. Chem. Phys. **129** , 044904 (2008).\n\n[54] M. Elbaum and S. G. Lipson, “How does a thin wetted film dry up?” Phys. Rev. Lett. **72** , 3562- 3565\n\n(1994).\n\n[55] N. Samid-Merzel, S. G. Lipson, and D. S. Tannhauser, “Pattern formation in drying water films,”\n\nPhys. Rev. E **57** , 2906- 2913 (1998).\n\n[56] A. Padmakar, K. Kargupta, and A. Sharma, “Instability and dewetting of evaporating thin water films\n\non partially and completely wettable substrates,” J. Chem. Phys. **110** , 1735- 1744 (1999).\n\n[57] A. V. Lyushnin, A. A. Golovin, and L. M. Pismen, “Fingering instability of thin evaporating liquid\n\nfilms,” Phys. Rev. E **65** , 021602 (2002).\n\n[58] L. M. Pismen, “Spinodal dewetting in a volatile liquid film,” Phys. Rev. E **70** , 021601 (2004).\n\n[59] C. Poulard, O. Benichou, and A. M. Cazabat, “Freely receding evaporating droplets,” Langmuir **19** ,\n\n8828- 8834 (2003).\n\n[60] Y. Gotkis, I. Ivanov, N. Murisic, and L. Kondic, “Dynamic structure formation at the fronts of volatile\n\nliquid drops,” Phys. Rev. Lett. **97** , 186101 (2006).\n\n[61] E. Pauliac-Vaujour and P. Moriarty, “Meniscus-mediated organization of colloidal nanoparticles,” J.\n\nPhys. Chem. C **111** , 16255- 16260 (2007).\n\n[62] C. Gigault, K. Dalnoki-Veress, and J. R. Dutcher, “Changes in the morphology of self-assembled\n\npolystyrene microsphere monolayers produced by annealing,” J. Colloid Interface Sci. **243** , 143- 155\n\n(2001).\n\n[63] A. Oron, S. H. Davis, and S. G. Bankoff, “Long-scale evolution of thin liquid films,” Rev. Mod. Phys.\n\n**69** , 931- 980 (1997).\n\n[64] U. Thiele, “Thin film evolution equations from (evaporating) dewetting liquid layers to epitaxial\n\ngrowth,” J. Phys.-Cond. Mat. (2010), (at press).\n\n29", - "page_start": 28, - "page_end": 28, - "source_file": "1001.2669.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain\n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally\n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding\n\nexcess thiol one can also vary the properties of the solvent [40].\n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin-\n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the\n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds\n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo-\n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For\n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin-\n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing\n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by\n\nthe solvent. This allows for a better control of the process and enables the use of contrast-enhanced\n\nmicroscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the\n\nregion of the receding contact line of toluene, silicon and air. With both techniques one may find\n\nmono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched\n\npatterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a\n\nmore controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the\n\ninteraction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold\n\ncores. For short chains (C 5 and C 8 ) no formation of branched structures is observed. At similar\n\nconcentrations, well-developed branched structures are formed for longer chains (C 10 and C 12 ).\n\nFor even longer chains (C 14 ), however, one again finds less branching. It also depends on the\n\namount of excess thiol in the solvent (for details see Ref. [40]).\n\nWhen following the evolution of the branched patterns in situ (see the complementary video\n\nmaterial of Ref. [40]), one clearly observes that different processes occur on different lenght\n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate.\n\nThe macroscopic front can be transversely unstable resulting in large-scale ( *>* 100 *µ* m) strongly\n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc-\n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be-\n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this\n\nstage it is possible to appreciate that the seemingly dry region left behind by the front is not at all\n\ndry, but covered by an ultrathin ‘postcursor’ film that is itself unstable. The thickness of this film\n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2669.pdf" - }, - { - "text": "time scales for evaporation and diffusion. A large mobility *M* indicates fast diffusion as compared\n\nto evaporation. A trial move is accepted with the probability *p* acc = min[1 *,* exp( *−* ∆ *E/kT* )] where *k* is the Boltzmann constant, *T* the temperature and ∆ *E* is the change in energy resulting from the\n\npotential move. Note that particles are only allowed to move into wet areas of the substrate, i.e.,\n\nonto cells with *l* = 1 . This models zero diffusivity of the particles on a dry substrate. The replaced\n\nliquid fills the site left by the nanoparticle.\n\nWithout nanoparticles, the behaviour of the model is well known as it reduces to the classical\n\ntwo-dimensional Ising model [74]. For *kT < kT* *c* *≈* 0 *.* 567 liquid and vapour coexist when *µ* =\n\n*µ* coex = *−* 2 . For *µ >* *−* 2 [ *µ <* *−* 2 ] eventually the liquid [vapour] dominates. A straight liquid- gas interface will recede [advance] for *µ <* *−* 2 [ *µ >* *−* 2 ], i.e. one finds evaporative dewetting [wetting] fronts. If one starts, however, with a substrate covered homogeneously by the liquid,\n\nfor *µ <* *−* 2 the film will dewet via a nucleation or spinodal-like process. If the nanoparticles are present, they form dried-in structures when all the liquid evaporates. The final structures do not\n\nnormally change any further - at least on short time scales. However, if the liquid wets the particles\n\n(i.e. is attracted to the particles), over long times there might be a coarsening of the structures,\n\nfacilitated by the adsorbed liquid. The dried-in patterns depend on the particular pathway taken by\n\nthe evaporative dewetting process. They range from labyrinthine to polygonal network structures\n\nor holes in a dense particle layer. Some typical patterns are displayed in Fig. 2, for cases when\n\nthe average surface coverage of the nanoparticles *ρ* *av* *n* = 0 *.* 2 . Panels (a) and (b) result from a\n\nspinodal-like and nucleation and growth process, respectively. At first sight they look very similar\n\nto the patterns seen for the pure solvent and one might argue that the particles solely act as passive\n\ntracers and preserve the transient volatile dewetting structures of the solvent. This was suggested\n\nin Refs. [26- 28] for dewetting collagen solutions. However, panels (c) and (d) indicate that the\n\nparticles may at times play a rather more significant role. When the diffusion of the particles is\n\nslow, the evaporative dewetting fronts become transversely unstable and may result in strongly\n\nramified patterns. This instability is caused by the nanoparticles. The lower their mobility, the\n\nstronger the fingering effect, i.e., there are more fingers in (c) than in (d) because in the latter the\n\nmobility is larger.\n\nThe front instability is intriguing as it results in strongly branched structures. As the dewetting\n\nfront moves, new branches are continuously created and existing branches merge at the moving\n\ncontact line. However, the mean finger number in the streamwise direction of the resulting ramified\n\npattern is a constant. This behaviour is in contrast to the front instabilities found for dewetting\n\n10", - "page_start": 9, - "page_end": 9, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2669.pdf", - "query": "Which of ultrathin film or mesoscale hydrodynamics are best explained by kinetic Monte Carlo models ? ", - "target_page": 18, - "target_passage": "lthough both the kinetic Monte Carlo model and the dynamical density functional theory are able to describe well the processes in the ultrathin film, they can not be employed to describe mesoscale hydrodynamics", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "(iii)\n\n(iv)\n\n(ii)\n\n(i)\n\nFIG. 8: (Colour online) Space-time plots are given for (left) the film thickness *h* and (right) the nanoparticle\n\nlayer height *h* *p* = *hφ* . The plot corresponds to the complete evolution resulting in the ring profile of\n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright\n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four\n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning,\n\n(iii) slow motion after depinning, and (iv) final evaporation from the center.\n\nshould also be investigated further in the simple case presented here.\n\n## **IV. CONCLUSION**\n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating\n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of\n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and\n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics\n\non the mesoscale has been described as well as more microscopic models for the dynamics in the\n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film\n\nmodel.\n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to\n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures\n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic\n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n\n23", - "page_start": 22, - "page_end": 22, - "source_file": "1001.2669.pdf" - }, - { - "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle\n\ndeposits. The concentration of particles is much higher at the network nodes - an effect that can\n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid\n\non the substrate where the nanoparticles are.\n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front.\n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be\n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7\n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger\n\nnumber remains constant, although new branches are continuously created and old branches join\n\neach other. In general, the results on fingering agree well with results obtained using the KMC\n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor\n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion\n\nconstant that is independent of the nanoparticle concentration. The DDFT is better suited than the\n\nKMC for investigations of the early instability stages: they are more easy to discern without the\n\ndiscrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of\n\nthe one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations\n\n(in analogy to the approach used in Refs. [19, 86, 87]).\n\n### **C. Thin film hydrodynamics**\n\nThe previous two sections focused on two approaches to describe the experimentally observed\n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet-\n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional\n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to\n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the\n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach\n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do\n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface-\n\nactive particles resulting in thermal and solutal Marangoni stresses, see Ref. [88]. A description of\n\nspreading particle solutions incorporating a structural disjoining pressure has also been considered\n\n[89]. For related work on particle-laden film flow on an incline see Refs. [90, 91].\n\nOne starts from the Stokes equations, together with continuity, no-slip boundary conditions at the\n\n18", - "page_start": 17, - "page_end": 17, - "source_file": "1001.2669.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "where *γ* is the liquid-gas surface tension and *f* ( *h* ) is a local free energy term that describes the\n\nwettability of the surface. Since *µ* corresponds to a chemical potential, the term *µh* may either bias\n\nthe system towards the liquid or towards the gas state. The variation of *F* w.r.t. *h* gives the pressure.\n\nIt contains the curvature (Laplace) pressure *−* *γ* ∆ *h* and the disjoining pressure Π( *h* ) = *−* *∂* *h* *f* ( *h* ) .\n\nMany different forms for the latter are in use (see, e.g., Refs. [4, 8, 63, 70- 73]).\n\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanopar-\n\nticles are not taken into account. However, under certain conditions one can augment equation (1)\n\nfor the evolution of the film thickness by coupling it to an equation for the evolution of the mean\n\nparticle concentration. The resulting model is able to describe the behaviour of an evaporating so-\n\nlution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C.\n\nWe should expect such a model to describe the mesoscopic dewetting front discussed above. How-\n\never, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor\n\nfilm.\n\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a dis-\n\ncrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on\n\nevaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The va-\n\nlidity of this strong assumption regarding the relevant transport processes can be confirmed from\n\nan estimate based on Eq. (1): The pressure *p* = *δF/δh* drives convection and evaporation. The\n\nconvective mobility is proportional to *h* 3 , i.e., it is large for thick films but decreases strongly with\n\nreduced film thickness. The evaporative mobility, however, is a constant, implying that evapora-\n\ntion will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57]\n\nand a small contact angle ( *≈* 0 *.* 01 ), the cross-over thickness is in the range of 1-5 nanometers. This estimate justifies the neglect of convective transport in a description of the postcursor film\n\nand may explain why one has such good agreement between the experimentally observed patterns\n\nand the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model\n\n[35]. We introduce the KMC model below in Section III A.\n\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its po-\n\ntential applications. For instance, the thermodynamic chemical potential as well as any wetting\n\ninteraction of the solvent with the substrate are collected in a single parameter - an effective chem-\n\nical potential. This implies that any influence of a disjoining pressure is ‘smeared out’ over the\n\nwhole system and that no distinction between the short- and the long-range parts of the disjoining\n\npressure is possible. It is furthermore based on the assumption that evaporation/condensation is\n\n8", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" - }, - { - "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion\n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid-\n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ-\n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport\n\nregime where the instability is almost completely independent of the interaction strengths and\n\na demixing regime where particles and liquid demix at the receding front thereby increasing its\n\ntransverse instability.\n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of\n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional\n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo-\n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by\n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend\n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between\n\nshort- and long-range interactions of solvent and/or solute with the substrate. We have, however,\n\nrestricted the examples given here to situations that can also be described using the KMC model.\n\nA further exploration will be presented elsewhere.\n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It\n\nresults from a long-wave approximation and consists of coupled evolution equations for the film\n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning\n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee-\n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the\n\ncombined effects of convection and evaporation.\n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques\n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica-\n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly\n\ntowards increasingly complex systems. For example, there have been investigations of the influ-\n\nence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal\n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap-\n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of\n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102],\n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding\n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather\n\n24", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the\n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an\n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in\n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen\n\nfrom processes in similar ultrathin ‘postcursor’ films.\n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on\n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how-\n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is\n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension\n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso-\n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration\n\nsuspension from the higher concentration suspension on the surface of the substrate.\n\n## **III. MODELLING APPROACHES**\n\nModels of dewetting thin films of pure liquids or polymers are often based on thin film hydro-\n\ndynamics. Starting from the Stokes equations, together with continuity and boundary conditions\n\nat the substrate and free surface, one applies a long-wave approximation (assuming small surface\n\nslopes and contact angles) [8, 63] and obtains a non-linear evolution equation for the film thickness\n\nprofile *h* ( *x, y, t* ) . In the case of volatile liquids one finds [55- 58, 64]\n\n*∂* *t* *h* = *∇·* � *Q* c *∇* *δF* *δh* � *−* *Q* e\n\n*δF* *δh* *,* (1)\n\nwith the mobility functions *Q* c ( *h* ) = *h* 3 */* 3 *η* *≥* 0 (assuming Poiseuille flow in the film and no slip at the substrate; *η* is the dynamic viscosity) and *Q* e *≥* 0 for the convective and evaporative part\n\nof the dynamics, respectively. *Q* e is a rate constant that can be obtained from gas kinetic theory\n\nor from experiment [57]. Note that Eq. (1) only applies if the pressure in the vapour above the\n\nfilm is close to the saturation pressure. For alternative expressions that are used to describe the\n\nnon-conserved evaporative dynamics see, e.g., Refs. [56, 57, 65- 69]. Finally, *∇* = ( *∂* *x* *, ∂* *y* ) , and\n\n*∂* *t* , *∂* *x* and *∂* *y* denote partial derivatives w.r.t. time and the coordinates.\n\nFocusing on the influence of capillarity and wettability only, the energy functional *F* [ *h* ] is given\n\nby\n\n*F* [ *h* ] = � *dx* � *dy* � *γ* 2 ( ** *h* ) 2 + *f* ( *h* ) ** *µh* � (2)\n\n7", - "page_start": 6, - "page_end": 6, - "source_file": "1001.2669.pdf" - }, - { - "text": "on the model (see above). The purely two-dimensional character of the KMC was extended to\n\na ‘pseudo three-dimensional’ one by making the effective chemical potential dependent on the\n\nmean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to\n\nthe introduction of a ‘global’ thickness-dependent disjoining pressure into the evaporation term\n\nwithout an explicit consideration of a film thickness. The amended model can reproduce bimodal\n\nstructures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully three-\n\ndimensional models are also discussed in the literature [76, 77].\n\n### **B. Dynamical Density Functional theory**\n\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related\n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle.\n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid,\n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to\n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the\n\nsubstrate, as all such interactions are absorbed into the effective chemical potential.\n\nHowever, using dynamical density functional theory (DDFT) [78- 83] one can develop a model\n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit\n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to\n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes\n\nthe coupled dynamics of the density fields of the liquid *ρ* *l* and the nanoparticles *ρ* *n* . The densities\n\n*ρ* *l* and *ρ* *n* are defined as the probabilities of finding a given lattice site on the surface to be occupied\n\nby a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond\n\nto number densities as we use the lattice spacing *σ* = 1 as our unit of length.\n\nTo develop the DDFT, one must first derive the underlying free energy functional *F* [ *ρ* *l* *, ρ* *n* ] , and\n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the\n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively.\n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams)\n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution\n\nand contributions from the interactions between the different species (nanoparticles and liquid).\n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is\n\ncoupled to a reservoir with chemical potential *µ* ), whereas the nanoparticles are treated in the\n\n14", - "page_start": 13, - "page_end": 13, - "source_file": "1001.2669.pdf" - }, - { - "text": "and Q z c = arccos � − 1 δ � is the angle between spins ly-\n\ning on adjacent planes along the z -direction. The ob-\n\nserved helical arrangement in bulk holmium corresponds\n\nto Q z c ≃ 30 . 5 10 : such value can be obtained from\n\nthe formula above with the set of coupling constants\n\nJ 0 =67.2 K, J 1 =20.9 K, and J 2 = − 24.2 K, that we have\n\nemployed in our simulations. The given values for the ex-\n\nchange constants are the same already used by Weschke\n\net al. in Ref. 13 to interpret experimental data on\n\nHolmium films on the basis of a J 1 − J 2 model, after\n\na proper scaling by the numbers of NN and NNN on\n\nneighboring layers of a BCT lattice.\n\nIn the following we will denote with n the film thick-\n\nness, i.e. the number of spin layers along the z direction,\n\nand with L × L the number of spins in each layer (i.e., L\n\nis the lattice size along both the x and y directions). In\n\nour simulations thickness values from 1 to 24 were con-\n\nsidered, while the range of lateral size L was from 8 to\n\n64. Periodic boundary conditions were applied along x\n\nand y , while free boundaries were obviously taken along\n\nthe film growth direction z .\n\nThermal equilibrium was attained by the usual\n\nMetropolis algorithm 19 , supplemented by the over- relaxed technique 20 in order to speed-up the sampling\n\nof the spin configuration space: a typical “Monte Carlo\n\nstep” was composed by four Metropolis and four-five\n\nover-relaxed moves per particle. Such judicious mix of\n\nmoves is able both to get faster the thermal equilibrium\n\nand to minimize the correlation “time” between succes-\n\nsive samples, i.e. the undesired effects due to lack of in-", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "[arXiv:1001.0510v1 [cond-mat.stat-mech] 4 Jan 2010](http://arxiv.org/abs/1001.0510v1)\n\n### Interplay among helical order, surface effects and range of interacting layers in\n\n### ultrathin films.\n\nF. Cinti (1 , 2 , 3) , A. Rettori (2 , 3) , and A. Cuccoli (2) (1) Department of Physics, University of Alberta, Edmonton, Alberta, Canada T6G 2J1\n\n(2) CNISM and Department of Physics, University of Florence, 50019 Sesto Fiorentino (FI), Italy. and\n\n(3) CNR-INFM S 3 National Research Center, I-41100 Modena, Italy\n\n(Dated: June 8, 2022)\n\nThe properties of helical thin films have been thoroughly investigated by classical Monte Carlo\n\nsimulations. The employed model assumes classical planar spins in a body-centered tetragonal\n\nlattice, where the helical arrangement along the film growth direction has been modeled by nearest\n\nneighbor and next-nearest neighbor competing interactions, the minimal requirement to get helical\n\norder. We obtain that, while the in-plane transition temperatures remain essentially unchanged with\n\nrespect to the bulk ones, the helical/fan arrangement is stabilized at more and more low temperature\n\nwhen the film thickness, n , decreases; in the ordered phase, increasing the temperature, a softening\n\nof the helix pitch wave-vector is also observed. Moreover, we show also that the simulation data\n\naround both transition temperatures lead us to exclude the presence of a first order transition for all\n\nanalyzed sizes. Finally, by comparing the results of the present work with those obtained for other\n\nmodels previously adopted in literature, we can get a deeper insight about the entwined role played\n\nby the number (range) of interlayer interactions and surface effects in non-collinear thin films.\n\nPACS numbers: 64.60.an,64.60.De,75.10.Hk,75.40.Cx,75.70.Ak.\n\nI. INTRODUCTION\n\nThe study of low dimensional frustrated magnetic systems 1 still raises great interest, both in consequence\n\nof theoretical aspects, related to their peculiar criti-\n\ncal properties 2 , and in view of possible technological\n\napplications 3 . Indeed, beside conventional ferromagnetic\n\nor antiferromagnetic phase transitions, in many new ma-\n\nterials other nontrivial and unconventional forms of or-\n\ndering have been observed 4,5 . A quantity of particular\n\ninterest in this context is the spin chirality, an order pa-\n\nrameter which turned out to be extremely relevant in,\n\ne.g., magnetoelectric materials 6 , itinerant MnSi 7 , binary\n\ncompounds as FeGe 8 , glass transition of spins 9 , and XY\n\nhelimagnets, as Holmium, Terbium or Dysprosium 10 . In\n\nthe latter case, a new universality class was predicted be-\n\ncause a Z 2 × SO (2) symmetry is spontaneously broken\n\nin the ordered phase 2 : In fact, when dealing with such\n\nsystems, in addition to the SO (2) symmetry of the spin\n\ndegrees of freedom S i , one has to consider also the Z 2\n\nsymmetry of the spin chirality κ ij ∝ � ⃗S i × ⃗S j � z\n\n.\n\nFor these rare-earth elements, the development of new and sophisticated experimental methods 11 has allowed to\n\nobtain ultra-thin films where the non-collinear modula-\n\ntion is comparable with the film thickness. Under such\n\nconditions the lack of translational invariance due to the\n\npresence of surfaces results decisive in order to observe\n\na drastic change of the magnetic structures 12 . Recent experimental data on ultra-thin Holmium films 13 have been lately interpreted and discussed 14,15 on the basis\n\nof detailed classical Monte Carlo (MC) simulations of a\n\nspin Hamiltonian, which is believed to give a realistic\n\nmodeling of bulk Holmium. Such Hamiltonian, proposed\n\nby Bohr et al. 16 , allows for competitive middle-range in-\n\nteractions by including six different exchange constants", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0510.pdf" - }, - { - "text": "[81] A. J. Archer and M. Rauscher, “Dynamical density functional theory for interacting brownian parti-\n\ncles: Stochastic or deterministic?” J. Phys. A-Math. Gen. **37** , 9325- 9333 (2004).\n\n[82] A. J. Archer and R. Evans, “Dynamical density functional theory and its application to spinodal\n\ndecomposition,” J. Chem. Phys. **121** , 4246- 4254 (2004).\n\n[83] P. A. Monson, “Mean field kinetic theory for a lattice gas model of fluids confined in porous materi-\n\nals,” J. Chem. Phys. **128** , 084701 (2008).\n\n[84] P. M. Chaikin and T. C. Lubensky, *Principles of condensed matter physics* , Cambridge University\n\nPress (1997).\n\n[85] J. S. Langer, “An introduction to the kinetics of first-order phase transitions,” in C. Godreche, editor,\n\n“Solids far from Equilibrium,” pages 297- 363, Cambridge University Press (1992).\n\n[86] M. A. Spaid and G. M. Homsy, “Stability of Newtonian and viscoelastic dynamic contact lines,”\n\nPhys. Fluids **8** , 460- 478 (1996).\n\n[87] U. Thiele and E. Knobloch, “Front and back instability of a liquid film on a slightly inclined plate,”\n\nPhys. Fluids **15** , 892- 907 (2003).\n\n[88] M. R. E. Warner, R. V. Craster, and O. K. Matar, “Surface patterning via evaporation of ultrathin\n\nfilms containing nanoparticles,” J. Colloid Interface Sci. **267** , 92- 110 (2003).\n\n[89] O. K. Matar, R. V. Craster, and K. Sefiane, “Dynamic spreading of droplets containing nanoparticles,”\n\nPhys. Rev. E **76** , 056315 (2007).\n\n[90] J. J. Zhou, B. Dupuy, A. L. Bertozzi, and A. E. Hosoi, “Theory for shock dynamics in particle-laden\n\nthin films,” Phys. Rev. Lett. **94** , 117803 (2005).\n\n[91] B. P. Cook, A. L. Bertozzi, and A. E. Hosoi, “Shock solutions for particle-laden thin films,” SIAM J.\n\nAppl. Math. **68** , 760- 783 (2008).\n\n[92] R. V. Craster, O. K. Matar, and K. Sefiane, “Pinning, retraction, and terracing of evaporating droplets\n\ncontaining nanoparticles,” Langmuir (2009), online available.\n\n[93] D. Quemada, “Rheology of concentrated disperse systems and minimum energy-dissipation principle\n\nI. Viscosity-concentration relationship,” Rheol. Acta **16** , 82- 94 (1977).\n\n[94] D. Quemada and C. Berli, “Energy of interaction in colloids and its implications in rheological\n\nmodeling,” Adv. Colloid Interface Sci. **98** , 51- 85 (2002).\n\n[95] J. J. Stickel and R. L. Powell, “Fluid mechanics and rheology of dense suspensions,” Annu. Rev.\n\nFluid Mech. **37** , 129- 149 (2005).\n\n[96] J. K. G. Dhont, *An Introduction to Dynamics of Colloids* , Elsevier, Amsterdam (1996).\n\n31", - "page_start": 30, - "page_end": 30, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed9.pdf", - "query": "What is AgMERRA ?", - "target_page": 2, - "target_passage": " historical daily weather data (1986–2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series data", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Notes to Consolidated Financial Statements 62\n\npremises within the complex. The agreement is subject to the implementation of\n\nproposed gaming law reforms and a tax structure acceptable to the Company, and\n\nobtaining required planning and other approvals.\n\n**Macau.** In connection with the Company’s pending joint venture in Macau (see\n\nNote 1), the Company has committed to invest up to $280 million in the entity\n\nin the form of capital contributions and shareholder loans.\n\n**New York Racing Association.** The Company has an understanding with the New\n\nYork Racing Association (“NYRA”) to manage video lottery terminals (“VLTs”) at\n\nNYRA’s Aqueduct horseracing facility in metropolitan New York. The Company\n\nwould assist in the development of the facility, including providing project\n\nfinancing, and would manage the facility for a fee. Work was halted on the VLT\n\nfacility in August 2003 pending the outcome of an investigation of certain aspects\n\nof NYRA’s operations by Federal prosecutors. In December 2003, NYRA reached\n\nagreement with the Justice Department whereby NYRA was indicted with\n\nprosecution deferred. NYRA agreed to pay a fine and the indictment will be\n\ndismissed with prejudice upon NYRA implementing certain reforms and otherwise\n\ncomplying with the terms of the agreement. The Company’s participation is subject\n\nto a definitive agreement, regulatory approvals and certain legislative changes by the\n\nState of New York.\n\n**The Residences at MGM Grand.** In July 2004, the venture obtained construction\n\nfinancing for up to $210 million for the development of the first tower. The\n\nCompany has provided a guaranty for up to 50% of the interest and principal\n\npayment obligations on the construction financing as well as a joint and several\n\ncompletion guaranty with its partners. The Company recorded the value of the\n\nguaranty obligation, approximately $2 million, in other long-term liabilities.\n\n**Other Guarantees.** The Company is party to various guarantee contracts in the\n\nnormal course of business, which are generally supported by letters of credit issued\n\nby financial institutions. The Company’s Senior Credit Facility limits the amount\n\nof letters of credit that can be issued to $200 million, and the amount of available\n\nborrowings under the Senior Credit Facility is reduced by any outstanding letters\n\nof credit. At December 31, 2004, the Company had provided a $50 million letter\n\nof credit to support the Economic Development Corporation of the City of Detroit\n\nbonds referred to above, which are a liability of the Company.\n\n**Litigation.** The Company is a party to various legal proceedings, most of which\n\nrelate to routine matters incidental to its business. Management does not believe\n\nthat the outcome of such proceedings will have a material adverse effect on the\n\nCompany’s financial position or results of operations.", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "2\n\nVol:.(1234567890)\n\n##### www.nature.com/scientificreports/\n\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- ing the impacts comparison of global warming by 1.5 °C versus 2.0 °C 44 . It is necessary to do more quantitative impacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research gaps and support the requirement of the scientific community and governments. In this paper, the future climate situations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and 2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. Then the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were analyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from 1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we examine the effects of the resulting maize production shocks in different countries; the market price of maize is simulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of maize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward for maize cultivation.\n\n**Materials and methods Data processing.** In this study, historical daily weather data (1986- 2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series ­data 45 . For future (2020- 2099), the original climate scenario data (Table 1 ) were extracted from output archives of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) under four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data was interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations to remove systematic ­errors 46 . The data of maize-planting regions are from the gridded global dataset in 2000 by combining two data ­products 47 , 48 .\n\n**Simulation of climate scenarios with global warming by 1.5 °C and 2.0 °C.** In this study, climate data of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models driven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a total of 20 sets of data under four RCP scenarios of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL- CM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sun- shine hours (Fig. 1 ).\n\n**Table 1.** Basic information of 5 ESMs in CMIP5. Horizontal resolution means the number of longitudinal grids × the number of latitudinal grids.\n\n| Model | Research institute | Country | Horizontal resolution |\n|:---|:---|:---|:---|\n| GFDL-ESM2M | Geophysical Fluid Dynamics Laboratory | The United States | 144 × 90 |\n| HadGEM2-ES | Hadley Center for Climate Prediction and Research | The United Kingdom | 192 × 145 |\n| IPSL-CM5A-LR | L’ Institute Pierre-Simon Laplace | France | 96 × 96 |\n| NorESM1-M | Norway Climate Center | Norway | 144 × 96 |\n| MIROC-ESM | Center for Climate System Research, National Institute for Environmental Studies, and Frontier Research Center for Global Change | Japan | 128 × 64 |", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - }, - { - "text": "The Company has committed to invest up to $280 million in the entity in the\n\nform of capital contributions and shareholder loans. The complete design, timing,\n\ncost and scope of the project are at a preliminary stage and are subject to the risks\n\nattendant to large-scale projects.\n\n**New York Racing Association.** We have an understanding with the New York\n\nRacing Association (“NYRA”) to manage VLTs at NYRA’s Aqueduct horseracing\n\nfacility in metropolitan New York. We would assist in the development of the\n\nfacility, including providing project financing, and would manage the facility for a\n\nfee. Work was halted on the VLT facility in August 2003 pending the outcome of", - "page_start": 39, - "page_end": 39, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "4.2 Using a Reasoner You may notice that one or more of your classes is highlighted in red as in Figure 4.5. This is because we\n\nhaven’t run the reasoner yet so Protégé has not been able to verify that our new classes have no\n\ninconsistencies. When just creating classes and subclasses in a new ontology there is little chance of an inconsistency. However, it is a good idea to run the reasoner often. When there is an inconsistency the sooner it is discovered the easier it is to fix. One common mistake that new users make is to do a lot of development and then run the reasoner only to find that there are multiple inconsistencies which can make\n\ndebugging significantly more difficult. So let’s get into the good habit of running the reasoner often.\n\nProtégé comes with some reasoners bundled in and others available as plugins. Since we are going to write some SWRL rules later in the tutorial, we want to use the Pellet reasoner. It has the best support for SWRL at the time this tutorial is being written.\n\n###### **Exercise 5: Install and Run the Pellet Reasoner**\n\n_____________________________________________________________________________________\n\n1. Check to see if the Pellet reasoner is installed. Click on the Reasoner menu. At the bottom of the menu there will be a list of the installed reasoners such as Hermit and possibly Pellet. If Pellet is visible in that menu then select it and skip to step 3.\n\n2. If Pellet is not visible then do File>Check for plugins and select Pellet from the list of available plugins and then select Install. This will install Pellet and you should get a message that says it will take effect the next time you start Protégé. Do a File>Save to save your work then quit Protégé and restart it. Then go to File>Open recent. You should see your saved Pizza tutorial in the list of recent ontologies. Select it to load it. Now you should see Pellet under the Reasoner menu and be able to select it so do so.\n\n3. With Pellet selected in the Reasoner menu execute the command Reasoner>Start reasoner. The reasoner should run very quickly since the ontology is so simple. You will notice that the little text message in the lower right corner of the Protégé window has changed to now say Reasoner active. The next time you make a change to the ontology that text will change to say: Reasoner state out of sync with active ontology. With small ontologies the reasoner runs very quickly, and it is a good idea to get into the habit of running it often, as much as after every change.\n\n4. It is possible that one or more of your classes will still be highlighted in red after you run the reasoner. If that happens do: Window>Refresh user interface and any red highlights should go away. Whenever your user interface seems to show something you don’t expect the first thing to do is to try this command.\n\nThere are no mandatory naming conventions for OWL entities. In chapter 7, we will discuss\n\nnames and labels in more detail. A best practice is to select one set of naming conventions and\n\nthen abide by that convention across your organization. For this tutorial we will follow the\n\nstandard where class and individual names start with a capital letter for each word and do not\n\ncontain spaces. This is known as CamelBack notation. For example: Pizza , PizzaTopping ,\n\netc. Also, we will follow the standard that class names are always singular rather than plural.\n\nE.g., Pizza rather than Pizzas, PizzaTopping rather than PizzaToppings .", - "page_start": 15, - "page_end": 15, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "**OpenRouter.** This framework offers a unified interface for LLMs, and additionally offers a system that routes users’ queries between three specific models: Llama-3-70b, Claude-3.5-Sonnet, and GPT-4o. Queries are routed “depending on their size, subject, and complexity,” as described in the documentation. 2\n\nWith OpenRouter, 96% of the original queries are routed to Llama, 4% to GPT, and none to Claude. Based on the pricing and number of input-output tokens, the queries’ total cost is $0 *.* 03 for processing all evaluated queries. After adding\n\n2 [https://openrouter.ai/openrouter/auto](https://openrouter.ai/openrouter/auto)\n\n13", - "page_start": 12, - "page_end": 12, - "source_file": "arxiv1.pdf" - }, - { - "text": "### D I R E C TO R S ’ R E P O R T\n\n27\n\n#### JAMES HENRY C ARVER\n\n##### **Executive Director - Appointed 29 June 1998**\n\nCaptain James Carver is a Ships Master with over 30 years direct\n\nexperience in the marine industry. He was Woodside Petroleum’s first\n\nships master, carrying out marine operations in the LNG development.\n\nCaptain Carver was involved in exploration, construction and\n\nproduction of most oil and gas projects on the North West Shelf. He has\n\nin-depth knowledge of the industry, its needs and its future. Establishing\n\nthe company in 1982, Jim pursued a “can do” attitude at sea and on shore. Under his direction\n\nthe fleet grew from 1 to 15 vessels and the Base at Dampier secured for the present expansion\n\nand exiting future.\n\n#### DERRICE-ANN DILLON\n\n##### **Executive Director - Corporate - Appointed 12 August 1998**\n\nDerrice Dillon has considerable experience in management,\n\nadministration and finance acquired over the last 22 years and has\n\nheld a number of senior positions in Australia and overseas. From the\n\nearly 1990’s Derrice developed a strong knowledge of the oil and gas\n\nindustry from her previous position as a director and head of\n\nadministration of Slimdrill Pty Ltd. She was responsible for the design\n\nand implementation of all accounting and administration systems, including complex\n\ndatabases to track information for the construction and manufacture of the Slimdrill oil\n\ndrilling rigs. She was also responsible for all legal matters and the production of promotional\n\nand marketing material for worldwide distribution.\n\nDerrice took a leading role in the listing of Mermaid Marine in 1999 and has since headed up\n\naccounting, systems and administration. As Chairman of the Board of Management she plays a\n\nsenior role in Mermaid’s operations.\n\nDerrice has also recently been appointed to the Seacare Authority by the Minister of\n\nEmployment, Workplace Relations and Small Business as National Representative for the\n\nOffshore Maritime Industry.", - "page_start": 30, - "page_end": 30, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "[transparent is crucial\" (https://www.theguardian.com/science/2017/nov/05/computer-says-no](https://www.theguardian.com/science/2017/nov/05/computer-says-no-why-making-ais-fair-accountable-and-transparent-is-crucial)\n\n[-why-making-ais-fair-accountable-and-transparent-is-crucial). ](https://www.theguardian.com/science/2017/nov/05/computer-says-no-why-making-ais-fair-accountable-and-transparent-is-crucial) *The Guardian* [. Archived (http](https://web.archive.org/web/20221010134155/https://theguardian.com/science/2017/nov/05/computer-says-no-why-making-ais-fair-accountable-and-transparent-is-crucial)\n\n[s://web.archive.org/web/20221010134155/https://theguardian.com/science/2017/nov/05/co](https://web.archive.org/web/20221010134155/https://theguardian.com/science/2017/nov/05/computer-says-no-why-making-ais-fair-accountable-and-transparent-is-crucial)\n\n[mputer-says-no-why-making-ais-fair-accountable-and-transparent-is-crucial) from the](https://web.archive.org/web/20221010134155/https://theguardian.com/science/2017/nov/05/computer-says-no-why-making-ais-fair-accountable-and-transparent-is-crucial)\n\noriginal on 10 October 2022. Retrieved 30 January 2018.\n\n[Rothman, Denis (7 October 2020). \"Exploring LIME Explanations and the Mathematics Behind](https://www.codemotion.com/magazine/ai-ml/lime-explainable-ai)\n\n[It\" (https://www.codemotion.com/magazine/ai-ml/lime-explainable-ai). ](https://www.codemotion.com/magazine/ai-ml/lime-explainable-ai) *Codemotion* [. Archived](https://web.archive.org/web/20231125045932/https://www.codemotion.com/magazine/ai-ml/lime-explainable-ai/)\n\n[(https://web.archive.org/web/20231125045932/https://www.codemotion.com/magazine/ai-m](https://web.archive.org/web/20231125045932/https://www.codemotion.com/magazine/ai-ml/lime-explainable-ai/)\n\n[l/lime-explainable-ai/) from the original on 25 November 2023. Retrieved 25 November](https://web.archive.org/web/20231125045932/https://www.codemotion.com/magazine/ai-ml/lime-explainable-ai/)\n\n2023.\n\nScassellati, Brian (2002). \"Theory of mind for a humanoid robot\". *Autonomous Robots* . **12** (1):\n\n[13- 24. doi:10.1023/A:1013298507114 (https://doi.org/10.1023%2FA%3A1013298507114).](https://doi.org/10.1023%2FA%3A1013298507114)\n\n[S2CID 1979315 (https://api.semanticscholar.org/CorpusID:1979315).](https://api.semanticscholar.org/CorpusID:1979315)\n\n[Schmidhuber, J. (2015). \"Deep Learning in Neural Networks: An Overview\". ](https://en.wikipedia.org/wiki/J%C3%BCrgen_Schmidhuber) *Neural Networks* .\n\n**61** [: 85- 117. arXiv:1404.7828 (https://arxiv.org/abs/1404.7828).](https://arxiv.org/abs/1404.7828)\n\n[doi:10.1016/j.neunet.2014.09.003 (https://doi.org/10.1016%2Fj.neunet.2014.09.003).](https://doi.org/10.1016%2Fj.neunet.2014.09.003)\n\n[PMID 25462637 (https://pubmed.ncbi.nlm.nih.gov/25462637). S2CID 11715509 (https://api.](https://api.semanticscholar.org/CorpusID:11715509)\n\n[semanticscholar.org/CorpusID:11715509).](https://api.semanticscholar.org/CorpusID:11715509)\n\n[Schmidhuber, Jürgen (2022). \"Annotated History of Modern AI and Deep Learning\" (https://peop](https://people.idsia.ch/~juergen/)\n\n[le.idsia.ch/~juergen/). Archived (https://web.archive.org/web/20230807173414/https://peopl](https://web.archive.org/web/20230807173414/https://people.idsia.ch/~juergen/)\n\n[e.idsia.ch/~juergen/) from the original on 7 August 2023. Retrieved 5 October 2024.](https://web.archive.org/web/20230807173414/https://people.idsia.ch/~juergen/)\n\n[Searle, John (1980). \"Minds, Brains and Programs\" (http://cogprints.org/7150/1/10.1.1.83.5248.](http://cogprints.org/7150/1/10.1.1.83.5248.pdf)\n\n[pdf) (PDF). ](http://cogprints.org/7150/1/10.1.1.83.5248.pdf) *Behavioral and Brain Sciences* . **3** (3): 417- 457.\n\n[doi:10.1017/S0140525X00005756 (https://doi.org/10.1017%2FS0140525X00005756).](https://doi.org/10.1017%2FS0140525X00005756)", - "page_start": 62, - "page_end": 62, - "source_file": "wikipedia3.pdf" - }, - { - "text": "can be compared to Philadelphia, Mumbai or Athens with regard to its international\n\nposition. The city of Lyon is working in partnership to more easily enable the\n\n[establishment of new headquarters in the territory (ADERLY, Chambre du commerce](https://en.wikipedia.org/wiki/Chambre_de_commerce_et_d%27industrie_de_Lyon)\n\n[et d'industrie, Grand Lyon...). High-tech industries such as biotechnology, software](https://en.wikipedia.org/wiki/Urban_Community_of_Lyon)\n\n[development, video game (Arkane Studios, Ivory Tower, Eden Games, EA France,](https://en.wikipedia.org/w/index.php?title=EA_France&action=edit&redlink=1)\n\nBandai Namco Entertainment Europe), and internet services are also growing. Other\n\nimportant sectors include medical research and technology, non-profit institutions,\n\nand universities. Lyon is home to the P4-Inserm- ean Merieux Laboratory which\n\nconducts top-level vaccine research. [47]\n\n[The city is home to the headquarters of many large companies such as Groupe SEB, Sanofi Pasteur, Renault Trucks, Norbert](https://en.wikipedia.org/wiki/Norbert_Dentressangle)\n\n[Dentressangle, LCL S.A., Descours & Cabaud, Merial, Point S, BioMérieux, Iveco Bus, Compagnie Nationale du Rhône, GL](https://en.wikipedia.org/wiki/GL_Events)\n\n[Events, April Group, Boiron, Feu Vert, Panzani, Babolat, Lyon Airports, LVL Medical, and inter-governmental agencies](https://en.wikipedia.org/wiki/Lyon_Airports)\n\n[IARC and Interpol. The specialisation of some sectors of activities has led to the creation of many main business centres: La](https://en.wikipedia.org/wiki/International_Agency_for_Research_on_Cancer)\n\n[Part-Dieu, located in the 3rd arrondissement is the second biggest business quarter after La Défense in Paris with over](https://en.wikipedia.org/wiki/La_D%C3%A9fense)\n\n#### **Parks and gardens**\n\n### **Economy**", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia4.pdf" - }, - { - "text": "This is just the most basic introduction to SHACL. For a more sophisticated tutorial see the Top Quadrant tutorial: [https://www.topquadrant.com/technology/shacl/tutorial/](https://www.topquadrant.com/technology/shacl/tutorial/) Also, this presentation: [https://www.slideshare.net/jelabra/shacl-by-example](https://www.slideshare.net/jelabra/shacl-by-example) gives much more detail on SHACL.", - "page_start": 82, - "page_end": 82, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "following significant announcements by the\n\nCompany, including the release of the quarterly\n\nreport, half-yearly results, the preliminary annual\n\nresults and the lodgement of the Company’s\n\nAnnual Report (subject to the prohibition of\n\ndealing in the Company’s securities if they\n\npossess unpublished price sensitive information).\n\nDirectors and senior management must also\n\nreceive approval from the Chairman before\n\nbuying or selling Company securities.\n\nThe Company’s Share Trading Policy is available\n\nin the ‘Corporate Governance’ section of the\n\nCompany’s website.\n\nCommunication with Shareholders and Continuous Disclosure\n\nThe Company is committed to providing relevant\n\nand timely information to its shareholders in\n\naccordance with its continuous disclosure\n\nobligations under the ASX Listing Rules and the\n\n*Corporations Act 2001* (Cth).\n\nInformation is communicated to shareholders\n\nthrough the distribution of the Company’s\n\nAnnual Report and other communications. All\n\nreleases are posted on the Company’s website\n\nand released to the ASX in a timely manner.\n\nThe Company has practices in place throughout\n\nthe year governing who may authorise and make\n\ndisclosures and the method by which the market\n\nis to be informed of any price sensitive\n\ninformation.\n\nThe Company Secretary is responsible for\n\ncommunications with the ASX and ensuring that\n\nthe Company meets its continuous disclosure\n\nobligations.\n\nThe Company’s Continuous Disclosure is avail-\n\nable in the ‘Corporate Governance’ section of\n\nthe Company’s website.\n\nAnnual General Meeting\n\nAll shareholders are encouraged to attend and\n\nparticipate in the Company’s Annual General\n\nMeeting. Shareholders may attend in person or\n\nsend a proxy as their representative.\n\nThe Company’s external auditor is routinely\n\ninvited to and attends the Annual General\n\nMeeting in order to respond to questions raised\n\nby shareholders relating to the content and\n\nconduct of the audit and accounting policies\n\nadopted by the Company in relation to the\n\npreparation of the financial statements.\n\nCorporate Governance Disclosure\n\nThe Company’s governance policies and proce-\n\ndures comply in all substantial respects with the\n\nAustralian Securities Exchange Corporate\n\nGovernance Principles and Recommendations\n\nwith 2010 Amendments. The following table\n\ncompares the ASX Recommendations and the\n\nCompany’s corporate governance policies and\n\npractices.\n\ncontinued", - "page_start": 38, - "page_end": 38, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed9.pdf", - "query": "In 2018, what was the global proportion of maize grown in the US ?", - "target_page": 5, - "target_passage": "According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. The United States accounts for more than 32%", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "**Yield change of maize under global warming by 1.5 °C and 2.0 °C.** Maize production is affected by climate change apparently. According to the simulation results of CERES-maize, the yield of maize would decrease in the worldwide relative to 1986- 2005 under global warming by 2.0 °C; it would increase little under global warming by 1.5 °C. The distributions of maize yield loss under the two scenarios are similar to each other, mostly located in the middle and low latitude, which are the main regions for maize planting in the world. The loss risk of maize under global warming by 2.0 °C is much more serious than that under global warming of 1.5 °C. However, there are increasing potentials of maize yield in many regions, nearly half of the whole maize planting area in the world, in which the climate situation would become more proper for maize under global\n\n**Figure 2.** (continued)", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed9.pdf" - }, - { - "text": "by 1.5 °C. According to the simulation results, comparing to 1986- 2005, the maize yield in the United States, China and Brazil would decrease under global warming by 2.0 °C; the yield loss rate would reach more than 24% in Brazil; the United States would decrease by 13.3%; China would decrease by 11.5%. However, there would be increasing trends in Argentina and Mexico; the maize yield would increase by 16.8% in Argentina; the yield increasing rate would exceed 40% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 11.4% under global warming by 2.0 °C. By comparing the maize production in different countries, it can be found that the reduction trend of total maize production in the top five countries is more obvious, especially under the scenario of global warming by 2.0 °C, the global food trade and food security may face greater risks. From the view of continents, there are different trends of maize yield changes in the 6 continents (except Ant- arctica) under global warming by 1.5 °C and 2.0 °C (Fig. 6 ). From the results of simulated by CRESE-maize under global warming by 1.5 °C, the maize yield in 3 continents would decline apparently, including South America, Europe and Oceania; the average yield loss rates are respectively − 15.6%, − 12.4%, − 36.4%; in the other 3 con- tinents the average maize yield would go up, especially in Africa more than 30%; the increasing trends are slight in Asia and North America, in which the yield increasing rates are separately 0.7% and 0.4%. However, the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are different in 2 continents, including Asia and North America. From the results of simulated by CRESE-maize under global warming by 2.0 °C, the maize yield in 5 continents would decline apparently, except Africa; the average yield loss rates are respectively − 7.9% (Asia), − 14.1% (North America), − 9.3% (South America), − 22.5% (Europe), − 25.5% (Oceania); only in Africa the average maize yield would go up also more than 30%; meanwhile the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are the same in each continent. Comparing the two global warming scenarios, there would be apparent variations in maize yield in Asia and North America, in which the annual maize yield accounts for a great proportion of the whole world, leading to a much more serious yield loss under global warming by 2.0 °C than that under global warming by 1.5 °C. There would be an obvious crisis of food supply under global warming by 2.0 °C with the increasing population in the future. So, it is important to make full preparation for adaptation to climate change in the whole world.\n\n**Figure 5.** (continued)", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed9.pdf" - }, - { - "text": "8\n\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should be taken from now on. Food security would be a significant challenge in this century.\n\n**Yield change of maize in main countries.** There are huge differences in impacts on maize yield under climate change, which would influence the food crisis in different regions. There are 159 countries in the whole world which plant maize. The gross yield of maize the top 20 countries accounts for more than 90% of the total yield in the 159 countries. So, the changes in the top 20 countries under future scenarios would influence the food security of the whole world (Fig. 5 ). From the results of simulated by CRESE-maize under global warming by 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become 33.5%. There would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly increase. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which the mean yield loss rate is approximate to that under global warming by 1.5 °C. There would be 77 countries experiencing yield increase; however, the mean yield increase is apparently smaller than that under global warm- ing by 1.5 °C. Generally, the global maize yield would decrease. The results show that the adverse effect of warm- ing up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to develop forward-looking adaptation measures to cope with future climate change. According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. The United States accounts for more than 32%; China accounts for about 24%; Brazil, Argentina and Mexico account for about 23%. The fluctuation of maize production in these five top countries will have a significant impact on the global maize trade. Based on the simulation results, comparing to 1986- 2005, the maize yield in China, Brazil and Argentina would decrease under global warming by 1.5 °C; the yield loss rate would reach more than 20% in Brazil; Argentina would decrease by 14.7%; China would decrease by 3.7%. However, there would be increasing trends in the United States and Mexico; the change in the United States would not be significant and the maize yield would increase by 0.5%; the yield increasing rate would exceed 50% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 2% under global warming\n\n**Figure 5.** Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed9.pdf" - }, - { - "text": "6\n\nwarming by 1.5 °C and 2.0 °C. So, there are apparent challenges and opportunities for maize production in the whole world under climate change. We should grasp the opportunities and expand the yield increasing poten- tials; meanwhile, the threat of maize yield loss should be controlled and compressed to the minimum in the high-risk regions. From the results simulated by IPSL-CM5A-LR model under RCP 2.6 scenario, the gross yield of maize in the world between 2020 and 2039 would decrease by 6.8% relative to 1986- 2005. The area is 37.7% of the whole maize planting regions in the world, in which the yield loss would be less than 50%, mainly located in the low and middle latitude of South America and Asia, and the middle latitude of Africa and North America. The area is 16.4% of the whole maize planting regions, in which the yield loss would be more than 50%, mainly located in the low latitude of South America and the middle latitude of Asia and Europe. The area is 45.8% of the whole maize planting regions, in which the yield would increase, mainly located in the low latitude of Africa, Asia and North America, the high latitude of Europe. From the results simulated by the GFDL-ESM2M model under RCP 4.5 scenario, the gross yield of maize in the world between 2041 and 2060 would increase by 7.2% relative to 1986- 2005. There are opposite trends of maize yield under global warming by 1.5 °C, which are simulated by different global climate models. However, the spatial distributions of maize yield change are similar to each other. The difference is that the regions of high yield loss rate are decreasing, and the regions of yield increasing are going up. In a comprehensive perspective, under global warming by 1.5 °C, maize yield in the whole world would increase 0.18% relative to 1986- 2005 (Fig. 3 ). According to Paris Agreement, all countries should do their best to limit the global warming by 1.5 °C until the end of 21 century. If that objective could be accomplished, gross maize production of the whole world would not be influenced so much by climate change, but the food\n\n**Figure 3.** Distribution of yield loss rate on maize in the world under global warming by 1.5 °C (up: IPSL- CM5A-LR model, RCP 2.6; down: GFDL-ESM2M model, RCP 4.5). The figure has been generated using ArcGIS 10.2 and Natural Earth-Free vector and raster map data @ [https://​natur​alear​thdata.​com](https://naturalearthdata.com) .", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed9.pdf" - }, - { - "text": "security of the whole world would still be attacked violently. There are huge differences among the continents; South America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming by 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, it should be cautious to cope with the maize changes under global warming by 1.5 °C. From the results of simulated by the NorESM1-M model under RCP 4.5 scenario, the gross yield of maize in the world between 2060 and 2079 would decrease by 18.7% relative to 1986- 2005. The area is 41.7% of the whole maize planting regions in the world, in which the yield loss would be less than 50%. The area is 15.6% of the whole maize planting regions, in which the yield loss would be more than 50%. The area is 42.7% of the whole maize planting regions, in which the yield would increase. The distribution of maize yield change is similar to that under global warming by 1.5 °C. From the results simulated by the GFDL-ESM2M model under RCP 6.0 scenario, the gross yield of maize in the world between 2065 and 2084 would decrease by 3% relative to 1986- 2005. Comparing to the results of the NorESM1-M model, the regions of high yield loss rate are increasing, and the regions of yield increases are going down; but the per unit area yields are increasing quickly in the regions of yield increasing. So, the gross maize yield in the whole world simulated by the GFDL-ESM2M model is more than the NorESM1-M model. In a comprehensive perspective, under global warming by 2.0 °C, maize yield in the whole world would decrease 10.8% relative to 1986- 2005 (Fig. 4 ). Compared to the results under global warming by 1.5 °C, the risk of yield loss is much higher. According to the new results from the Emission Gap Report in 2019, the target of global warming by 1.5 °C would not be implemented according to the reality of mitigation actions; the chance become much bigger for all countries in the world, who will be facing the severe challenge of global temperature rise of 2.0 °C or even higher (3.0 °C or 4.0 °C) in the future. So it is critical to cope with the serious condition\n\n**Figure 4.** Distribution of yield loss rates on maize in the world under global warming by 2.0 °C (up: NorESM1-M model, RCP 4.5; down: GFDL-ESM2M model, RCP 6.0). The figure has been generated using ArcGIS 10.2 and Natural Earth-Free vector and raster map data @ [https://​natur​alear​thdata.​com](https://naturalearthdata.com) .", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed9.pdf" - }, - { - "text": "10\n\n**Market price of maize in main countries.** In this study, we elaborate on the endogenous response of our economic models. This response can be theoretically elaborated as: due to the effect of climate change on yield reduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and raising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive (cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond by changing farm-level management practices and increasing (decreasing) the amount of acreage under these crops. At a global scale, the reallocation of production and consumption through international trade further alters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ region due to climate change. In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among different countries and regions under both climate change scenarios (Fig. 7 ). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C scenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed due to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa would decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the domestic production, the climate change will also induce changes in international trade of maize, resulting in changing levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically produced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, the countries that face positive effects on yields and/or are relatively less dependent on imports, are positively (less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would improve under both scenarios (Fig. 8 ). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh and Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline.\n\n**Discussion and conclusion Discussion.** Our analysis highlights the effects of climate change on global- and regional-specific maize yields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the reduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- ing by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. Although the precipitation is also increasing, the evapotranspiration would become more intense. The limitation of water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by 1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought and heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the\n\n**Figure 6.** Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Simulation of maize yield using DSSAT.** According to the data of global warming by 1.5 °C and 2.0 °C selected above, we simulated global maize yield changes compared with the average yield during 1986- 2005 on grid level using CERES-Maize, which is part of DSSAT version 4.6 49 . The inputs for DSSAT simulation include daily weather data, soil parameters, crop calendar data and man- agement information. All the inputs are formatted at a 0.5° × 0.5° grid resolution which are computed by high- performance computers. Weather data is from the AgMERRA dataset, including maximum and minimum tem- peratures, precipitation, total radiation and humidity. Crop calendar data were from the Center for Sustainability and Global Environment (SAGE), in which the existing observations of crop planting and harvesting dates are gridded formatted at a resolution of 5 ­min 50 . For management information, fertilizer applications, irrigation and other management practices are required. A crop-specific gridded dataset of nitrogen fertilizer application for the world was developed by integrating national and subnational fertilizer application data from a variety of sources, which is used to set up current fertilizer application rates for maize in each grid cell. Soil parameters are from the International Soil Profile Dataset (WISE), including soil texture, bulk density, pH, organic carbon content and fraction of calcium carbonate for each of five 20 cm thick soil ­layers 51 . All the soil data is allocated to be in accordance with the request of DSSAT simulation; the missing soil parameters for organic soils were adopted from FAO soil dataset. First maize yields across the world during the historical period 1986- 2005 were simulated at the 0.5° × 0.5° grid scale with two main production systems, including Spring maize and Summer maize. Historical national maize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from the gridded global dataset by combining two data ­products 47 . Second, genetic parameters of specific cultivars of maize from previous works were adopted for the initial parameters; model parameters related to crop genotype characteristics were calibrated and tuned following the method in Xiong et al. 52 , in which the simulated yields from 1986- 2005 were comparable to the statistical data. Third, maize yields across the world were simulated under global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from grid- ded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, comparing maize yield average for 1986- 2005.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "11\n\nmeantime, the huge differences in yield changes in different regions provide a small chance for the world, espe- cially under global warming by 1.5 °C. In the near future, if the global temperature can be effectively controlled under 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. All regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the potentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the yield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by 1.5 °C and 2.0 °C. Meanwhile, the risk of price fluctuations caused by global corn trade due to future climate change should be paid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, the population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, the supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify the contradiction between supply and demand, which would threaten the food security and sustainable develop- ment in the whole world. In this study, 5 climate models are selected, which are recommended by ISI-MIP (The Inter-Sectoral Impact Model Intercomparison Project); compared with other climate models, the five models could more effectively support impact assessment in different sectors and provide more reliable results. Based on the simulation results\n\n**-20**\n\n**-15**\n\n**-10**\n\n**-5**\n\n**0**\n\n**5**\n\n**10**\n\n**15**\n\n**20**\n\n**25**\n\n**30**\n\n**India Mexico Russia South Africa Rest of Africa Argentina Ukraine Canada Rest of World Japan AUS/NZL USA China Brazil EU26 Bangladesh Southeast Asia Iran Global**\n\n### **1.5°C 2.0°C**\n\n**% change**\n\n**Figure 7.** Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C.\n\n**Figure 8.** Changes in Self-sufficiency ratio of maize in main countries under global warming by 1.5 °C and 2.0 °C.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed9.pdf" - }, - { - "text": "**Conclusion.** According to the simulation results, the yield of maize under global warming by 2.0 °C would decrease between 3.0 and 18.7% in the worldwide relative to 1986- 2005; the maize yield would fluctuate between − 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 high-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% under global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among different countries and regions. So, it is urgent for all countries to pay enough attention to the loss risk of maize yield and take actions of mitigation and adaptation to climate change. The time left for changing our minds and actions is becoming less and less.\n\n**Data availability** The historical weather data (1986- 2005) that support the analysis with ESMs in this study are publicly available online at [https://​data.​giss.​nasa.​gov/​impac​ts/​agmip​cf/](https://data.giss.nasa.gov/impacts/agmipcf/) ; the future climate scenario data (2006- 2099) that support the analysis with ESMs in this study are publicly available online at [https://​pcmdi.​llnl.​gov/?​cmip5](https://pcmdi.llnl.gov/?cmip5) and [https://​](https://esgf-node.llnl.gov/projects/esgf-llnl/) [esgf-​node.​llnl.​gov/​proje​cts/​esgf-​llnl/](https://esgf-node.llnl.gov/projects/esgf-llnl/) . The spatial data of harvest area, yield, crop calendar, irrigation portion and chemical N input for maize that support the simulation with crop model (DSSAT) in this study are publicly available at [http://​mapsp​am.​info/](http://mapspam.info/) (SPAM) and [http://​www.​sage.​wisc.​edu](http://www.sage.wisc.edu) (SAGE); the soil data that support the simulation with crop model (DSSAT) in this study are publicly available from the WISE database ( [https://​www.​](https://www.isric.online/index.php/) [isric.​online/​index.​php/](https://www.isric.online/index.php/) ) and the Digital Soil Map of the World (DSMW) ( [http://​www.​fao.​org/​land-​water/​land/​](http://www.fao.org/land-water/land/land-governance/land-resources-planning-toolbox/category/details/en/c/1026564/) [land-​gover​nance/​land-​resou​rces-​plann​ing-​toolb​ox/​categ​ory/​detai​ls/​en/c/​10265​64/](http://www.fao.org/land-water/land/land-governance/land-resources-planning-toolbox/category/details/en/c/1026564/) ). All other relevant data are available from the corresponding authors.\n\nReceived: 6 June 2022; Accepted: 11 October 2022", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed9.pdf" - }, - { - "text": "2\n\nVol:.(1234567890)\n\n##### www.nature.com/scientificreports/\n\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- ing the impacts comparison of global warming by 1.5 °C versus 2.0 °C 44 . It is necessary to do more quantitative impacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research gaps and support the requirement of the scientific community and governments. In this paper, the future climate situations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and 2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. Then the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were analyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from 1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we examine the effects of the resulting maize production shocks in different countries; the market price of maize is simulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of maize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward for maize cultivation.\n\n**Materials and methods Data processing.** In this study, historical daily weather data (1986- 2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series ­data 45 . For future (2020- 2099), the original climate scenario data (Table 1 ) were extracted from output archives of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) under four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data was interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations to remove systematic ­errors 46 . The data of maize-planting regions are from the gridded global dataset in 2000 by combining two data ­products 47 , 48 .\n\n**Simulation of climate scenarios with global warming by 1.5 °C and 2.0 °C.** In this study, climate data of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models driven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a total of 20 sets of data under four RCP scenarios of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL- CM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sun- shine hours (Fig. 1 ).\n\n**Table 1.** Basic information of 5 ESMs in CMIP5. Horizontal resolution means the number of longitudinal grids × the number of latitudinal grids.\n\n| Model | Research institute | Country | Horizontal resolution |\n|:---|:---|:---|:---|\n| GFDL-ESM2M | Geophysical Fluid Dynamics Laboratory | The United States | 144 × 90 |\n| HadGEM2-ES | Hadley Center for Climate Prediction and Research | The United Kingdom | 192 × 145 |\n| IPSL-CM5A-LR | L’ Institute Pierre-Simon Laplace | France | 96 × 96 |\n| NorESM1-M | Norway Climate Center | Norway | 144 × 96 |\n| MIROC-ESM | Center for Climate System Research, National Institute for Environmental Studies, and Frontier Research Center for Global Change | Japan | 128 × 64 |", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed9.pdf", - "query": "What would be the price increase resulting from maize production changes due to 1.5°C and 2°C global temperature increase ?", - "target_page": 10, - "target_passage": "In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "**Yield change of maize under global warming by 1.5 °C and 2.0 °C.** Maize production is affected by climate change apparently. According to the simulation results of CERES-maize, the yield of maize would decrease in the worldwide relative to 1986- 2005 under global warming by 2.0 °C; it would increase little under global warming by 1.5 °C. The distributions of maize yield loss under the two scenarios are similar to each other, mostly located in the middle and low latitude, which are the main regions for maize planting in the world. The loss risk of maize under global warming by 2.0 °C is much more serious than that under global warming of 1.5 °C. However, there are increasing potentials of maize yield in many regions, nearly half of the whole maize planting area in the world, in which the climate situation would become more proper for maize under global\n\n**Figure 2.** (continued)", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed9.pdf" - }, - { - "text": "**16**\n\n**Figure 10.** Distributions of changes in run-off for mean flows simulated by the JULES ecosystem- hydrology model under the\n\nensemble of six climate projections at 1.5 ° C (blue) and 2 ° C (orange) global warming. Boxes show the 25th and 75th percentile\n\nchanges, whiskers show the range, circles show the four projections that do not define the ends of the range, and crosses\n\nshow the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, in millimetres of rain\n\nequivalent.\n\nall members ( figure 12 ). This is not the case for the precipitation and run-off results; for those\n\nquantities, there is substantial overlap in the ranges of changes at 2°C and 1.5°C, so there is not a\n\nconsistent picture of how much wetter or drier the world is projected to be in this ensemble, even\n\nthough it involves a single atmosphere model.\n\nFor TXx, the difference between 2°C and 1.5°C global warming is larger than the 0.5°C\n\ndifference in global mean temperature across most of the land surface in all ensemble members\n\n( figure 14 ). Although some ensemble members simulate local temperatures to be higher at 1.5°C\n\nglobal warming than 2°C in some small regions, these are relatively localized and most regions\n\nare cooler at 1.5°C global warming than 2°C. In many regions, the difference is between 0.5°C and\n\n1.0°C, but many other regions see larger differences. In several ensemble members, the difference\n\nis 1.5°C, 2°C or larger in large parts of North America, South America, Europe and China.\n\nFor example, over parts of Europe, where annual maximum daily temperature was projected\n\nto increase by over 5°C for a 2°C global warming, the local increase is limited to 3- 4°C for\n\n1.5°C global warming. Limiting global warming by half a degree Celsius would, therefore, limit\n\nmaximum temperatures by three or four times as much in those areas ( figure 14 ).\n\nAt 1.5°C global warming, although the increases in TXx are smaller than at 2°C, these increases\n\nshow similar geographical patterns as for 2°C in all ensemble members, with larger changes in\n\ncontinental interiors especially in the mid-latitudes (not shown).\n\nThe percentage of days exceeding the 90th percentile of daily temperature (Tx90p) also\n\nincreases less at 1.5°C global warming than at 2°C ( figure 15 ). The largest reductions are in the\n\ntropics, where the largest increase was seen at 2°C; whereas at 2°C global warming, 50% or more", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed11.pdf" - }, - { - "text": "lead to some degree of inconsistency between the analysis of the ClimPACT extremes and the\n\nHCVI and JULES impacts projections.\n\n## 3. Results\n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the\n\nlevel of agreement between models for a particular projected change, and hence an indication\n\nof potential robustness of the projected changes for informing adaptation. We then make a\n\ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would\n\nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in\n\nregional climate outcomes, we address this in a number of ways. For individual realizations, we\n\ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C,\n\neven if the sign of the change is uncertain. We also compare the range of outcomes at different\n\nGWLs, to see if the regional-scale uncertainty itself increases with global warming.\n\n### (a) Climate-change impacts at 2 ° C global warming\n\nFor 2°C global warming, the ensemble-mean increase in annual daily maximum temperature was\n\nabove 2°C for most of the land surface, with the exception of the Indian subcontinent, most of\n\nAustralia and Antarctica ( figure 2 ). The increase was higher still in many regions; most of North\n\nAmerica, much of China and north Asia, northwestern South America and all of Europe. In the\n\nnorthern and eastern USA and much of northern and western Europe, the annual daily maximum\n\ntemperature increased by over 4°C for 2°C global warming. The global mean TXx increased by\n\nmore than 2°C in all ensemble members ( table 5 ), so the maximum temperature warming more\n\nthan the global annual mean is a consistent result across all projections here, as found in previous\n\nstudies with other models [ 9 ] ( table 5 ).\n\nThe different ensemble members give somewhat different results at regional scales, although\n\nthere is a strong consensus on the temperature extremes examined here becoming warmer. In\n\nthe simulations driven by SSTs and SICs from the two IPSL CMIP5 models, most of the global", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - }, - { - "text": "10\n\n**Market price of maize in main countries.** In this study, we elaborate on the endogenous response of our economic models. This response can be theoretically elaborated as: due to the effect of climate change on yield reduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and raising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive (cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond by changing farm-level management practices and increasing (decreasing) the amount of acreage under these crops. At a global scale, the reallocation of production and consumption through international trade further alters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ region due to climate change. In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among different countries and regions under both climate change scenarios (Fig. 7 ). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C scenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed due to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa would decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the domestic production, the climate change will also induce changes in international trade of maize, resulting in changing levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically produced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, the countries that face positive effects on yields and/or are relatively less dependent on imports, are positively (less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would improve under both scenarios (Fig. 8 ). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh and Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline.\n\n**Discussion and conclusion Discussion.** Our analysis highlights the effects of climate change on global- and regional-specific maize yields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the reduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- ing by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. Although the precipitation is also increasing, the evapotranspiration would become more intense. The limitation of water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by 1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought and heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the\n\n**Figure 6.** Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed9.pdf" - }, - { - "text": "8\n\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should be taken from now on. Food security would be a significant challenge in this century.\n\n**Yield change of maize in main countries.** There are huge differences in impacts on maize yield under climate change, which would influence the food crisis in different regions. There are 159 countries in the whole world which plant maize. The gross yield of maize the top 20 countries accounts for more than 90% of the total yield in the 159 countries. So, the changes in the top 20 countries under future scenarios would influence the food security of the whole world (Fig. 5 ). From the results of simulated by CRESE-maize under global warming by 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become 33.5%. There would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly increase. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which the mean yield loss rate is approximate to that under global warming by 1.5 °C. There would be 77 countries experiencing yield increase; however, the mean yield increase is apparently smaller than that under global warm- ing by 1.5 °C. Generally, the global maize yield would decrease. The results show that the adverse effect of warm- ing up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to develop forward-looking adaptation measures to cope with future climate change. According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. The United States accounts for more than 32%; China accounts for about 24%; Brazil, Argentina and Mexico account for about 23%. The fluctuation of maize production in these five top countries will have a significant impact on the global maize trade. Based on the simulation results, comparing to 1986- 2005, the maize yield in China, Brazil and Argentina would decrease under global warming by 1.5 °C; the yield loss rate would reach more than 20% in Brazil; Argentina would decrease by 14.7%; China would decrease by 3.7%. However, there would be increasing trends in the United States and Mexico; the change in the United States would not be significant and the maize yield would increase by 0.5%; the yield increasing rate would exceed 50% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 2% under global warming\n\n**Figure 5.** Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed9.pdf" - }, - { - "text": "security of the whole world would still be attacked violently. There are huge differences among the continents; South America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming by 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, it should be cautious to cope with the maize changes under global warming by 1.5 °C. From the results of simulated by the NorESM1-M model under RCP 4.5 scenario, the gross yield of maize in the world between 2060 and 2079 would decrease by 18.7% relative to 1986- 2005. The area is 41.7% of the whole maize planting regions in the world, in which the yield loss would be less than 50%. The area is 15.6% of the whole maize planting regions, in which the yield loss would be more than 50%. The area is 42.7% of the whole maize planting regions, in which the yield would increase. The distribution of maize yield change is similar to that under global warming by 1.5 °C. From the results simulated by the GFDL-ESM2M model under RCP 6.0 scenario, the gross yield of maize in the world between 2065 and 2084 would decrease by 3% relative to 1986- 2005. Comparing to the results of the NorESM1-M model, the regions of high yield loss rate are increasing, and the regions of yield increases are going down; but the per unit area yields are increasing quickly in the regions of yield increasing. So, the gross maize yield in the whole world simulated by the GFDL-ESM2M model is more than the NorESM1-M model. In a comprehensive perspective, under global warming by 2.0 °C, maize yield in the whole world would decrease 10.8% relative to 1986- 2005 (Fig. 4 ). Compared to the results under global warming by 1.5 °C, the risk of yield loss is much higher. According to the new results from the Emission Gap Report in 2019, the target of global warming by 1.5 °C would not be implemented according to the reality of mitigation actions; the chance become much bigger for all countries in the world, who will be facing the severe challenge of global temperature rise of 2.0 °C or even higher (3.0 °C or 4.0 °C) in the future. So it is critical to cope with the serious condition\n\n**Figure 4.** Distribution of yield loss rates on maize in the world under global warming by 2.0 °C (up: NorESM1-M model, RCP 4.5; down: GFDL-ESM2M model, RCP 6.0). The figure has been generated using ArcGIS 10.2 and Natural Earth-Free vector and raster map data @ [https://​natur​alear​thdata.​com](https://naturalearthdata.com) .", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed9.pdf" - }, - { - "text": "11\n\nmeantime, the huge differences in yield changes in different regions provide a small chance for the world, espe- cially under global warming by 1.5 °C. In the near future, if the global temperature can be effectively controlled under 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. All regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the potentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the yield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by 1.5 °C and 2.0 °C. Meanwhile, the risk of price fluctuations caused by global corn trade due to future climate change should be paid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, the population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, the supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify the contradiction between supply and demand, which would threaten the food security and sustainable develop- ment in the whole world. In this study, 5 climate models are selected, which are recommended by ISI-MIP (The Inter-Sectoral Impact Model Intercomparison Project); compared with other climate models, the five models could more effectively support impact assessment in different sectors and provide more reliable results. Based on the simulation results\n\n**-20**\n\n**-15**\n\n**-10**\n\n**-5**\n\n**0**\n\n**5**\n\n**10**\n\n**15**\n\n**20**\n\n**25**\n\n**30**\n\n**India Mexico Russia South Africa Rest of Africa Argentina Ukraine Canada Rest of World Japan AUS/NZL USA China Brazil EU26 Bangladesh Southeast Asia Iran Global**\n\n### **1.5°C 2.0°C**\n\n**% change**\n\n**Figure 7.** Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C.\n\n**Figure 8.** Changes in Self-sufficiency ratio of maize in main countries under global warming by 1.5 °C and 2.0 °C.", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed9.pdf" - }, - { - "text": "**19**\n\n( *b* )\n\n( *a* )\n\n( *c* )\n\nPmean (%)\n\n6.0\n\n5.0\n\n4.0\n\n3.0\n\n2.0\n\n1.0\n\n0\n\n10.0\n\n8.0\n\n6.0\n\n4.0\n\n2.0\n\n0\n\n12.0\n\n8.0\n\n4.0\n\n0.0\n\n- 4.0\n\nRmean (%)\n\nRlow (%)\n\nIPSL-CM5A-LR IPSL-CM5A-MR GFDL-ESM2M MIROC-ESM-CHEM ACCESS1-0 HadGEM2-ES\n\n1.5°C 2°C\n\n**Figure13.** Globalmeanpercentagechangesrelativeto1981- 2010in( *a* )precipitationoverland,( *b* )meanrun-offflows,( *c* )low\n\nrun-off lows (10th percentile), at 2 ° C and 1.5 ° C global warming.\n\nthis comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be\n\ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at\n\neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the\n\npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries.\n\nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food\n\ninsecurity generally increases with global warming, and for approximately three-quarters of\n\ncountries assessed, this increase is larger at 2°C than 1.5°C.\n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global\n\nwarming compared to 1.5°C ( figure 20 ). This is often the case for both increases and decreases\n\nin flows—increasing the level of global warming magnifies the pattern of river flow changes,\n\nalthough not in all cases.\n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins,\n\nbut this was not always the case, with many basins showing similar or smaller ranges at\n\n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed11.pdf" - }, - { - "text": "**25** A detailed investigation of these factors is beyond the scope of this paper; nevertheless, this\n\nresult illustrates the important point that the nature and patterns of the climate forcing at a\n\nparticular level of global warming can play an important role in determining the patterns of\n\nregional impacts.\n\n## 5. Conclusion\n\nThe higher-resolution HadGEM3 simulations project consistent increases in temperature-related\n\nextremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the\n\nglobal annual mean. There is a higher degree of spatial variation in our projections compared\n\nwith CMIP5-based studies.\n\nIn the model projections examined here, changes relating to the water cycle are complex, both\n\nin their geographical pattern and in the variation between different models. The length of flooding\n\nevents generally increases across world in all models, but maximum rainfall can either increase or\n\ndecrease depending on locations. Global patterns of increase and decrease show some consistency\n\nbetween the different GWLs, but also some local differences. Worldwide, most impacts broadly\n\ntend to increase with global warming in most areas. For global mean changes, even when the sign\n\nof change is uncertain, individual realizations generally show reduced impact at 1.5°C compared\n\nwith 2°C. However, this does not always hold even at the scale of major global river basins.\n\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in\n\napproximately three-quarters of countries assessed. The vulnerability increase can arise from\n\nincreases in either flooding or drought. Reduced drought leads to decreased vulnerability in a\n\nlimited number of cases.\n\nMost simulations here project a general increase in mean streamflow in most of the basins\n\nexamined, but with a number of notable exceptions in the tropics. While flows in the Ganges are\n\nconsistently projected to increase by 30- 110% at 2°C, Amazon flows could either increase by 3%\n\nor decrease by 25%. Ensemble-mean changes in river flow often do not give a full impression of\n\nthe magnitude of changes that may be possible, so adaptation planning in particular should not\n\nrely on ensemble-mean projections and instead consider a range of outcomes. The seasonal low\n\nstreamflows also increase in many basins, but not as many as for the mean flows—many basins\n\nsee decreased low flows in some or all projections.\n\nBroadly, changes in weather extremes at 1.5°C global warming could be estimated by scaling-\n\nback the impacts at 2°C, if this is done with individual ensemble members rather than the\n\nensemble mean. However, this was not always the case for impacts that depend on more complex\n\nprocess or interactions between more than one climate variable, such as run-off and an indicator\n\nof vulnerability to food insecurity.\n\nData accessibility. This article has no additional data.\n\nCompeting interests. We declare we have no competing interests.\n\nFunding. This research received funding from the European Union Seventh Framework Programme FP7/2007-\n\n2013 under grant agreement no. 603864 (HELIX: ‘High-End cLimate Impacts and eXtremes’; www.\n\nhelixclimate.eu ). The work of R.A.B., C.B., J.C., L.G., K.L. and K.R. was additionally supported by the Joint\n\nUK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101).\n\nAcknowledgements. The authors thank Ed Pope, Jason Lowe and Dann Mitchell for advice and discussion,\n\nAlissa Haward and Maria Pearce for project management and administration of HELIX, and two anonymous\n\nreviewers whose comments substantially improved the paper.\n\n## References\n\n1. IPCC. 2014 Summary for policymakers. In *Climate change 2014: impacts, adaptation, and*\n\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n\n*Assessment Report of the Intergovernmental Panel on Climate Change* (eds CB Field *et al* .), pp.\n\n1- 32. Cambridge, UK: Cambridge University Press.", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed11.pdf" - }, - { - "text": "by 1.5 °C. According to the simulation results, comparing to 1986- 2005, the maize yield in the United States, China and Brazil would decrease under global warming by 2.0 °C; the yield loss rate would reach more than 24% in Brazil; the United States would decrease by 13.3%; China would decrease by 11.5%. However, there would be increasing trends in Argentina and Mexico; the maize yield would increase by 16.8% in Argentina; the yield increasing rate would exceed 40% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 11.4% under global warming by 2.0 °C. By comparing the maize production in different countries, it can be found that the reduction trend of total maize production in the top five countries is more obvious, especially under the scenario of global warming by 2.0 °C, the global food trade and food security may face greater risks. From the view of continents, there are different trends of maize yield changes in the 6 continents (except Ant- arctica) under global warming by 1.5 °C and 2.0 °C (Fig. 6 ). From the results of simulated by CRESE-maize under global warming by 1.5 °C, the maize yield in 3 continents would decline apparently, including South America, Europe and Oceania; the average yield loss rates are respectively − 15.6%, − 12.4%, − 36.4%; in the other 3 con- tinents the average maize yield would go up, especially in Africa more than 30%; the increasing trends are slight in Asia and North America, in which the yield increasing rates are separately 0.7% and 0.4%. However, the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are different in 2 continents, including Asia and North America. From the results of simulated by CRESE-maize under global warming by 2.0 °C, the maize yield in 5 continents would decline apparently, except Africa; the average yield loss rates are respectively − 7.9% (Asia), − 14.1% (North America), − 9.3% (South America), − 22.5% (Europe), − 25.5% (Oceania); only in Africa the average maize yield would go up also more than 30%; meanwhile the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are the same in each continent. Comparing the two global warming scenarios, there would be apparent variations in maize yield in Asia and North America, in which the annual maize yield accounts for a great proportion of the whole world, leading to a much more serious yield loss under global warming by 2.0 °C than that under global warming by 1.5 °C. There would be an obvious crisis of food supply under global warming by 2.0 °C with the increasing population in the future. So, it is important to make full preparation for adaptation to climate change in the whole world.\n\n**Figure 5.** (continued)", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia1.pdf", - "query": "What is a formal fallacy ?", - "target_page": 8, - "target_passage": "For formal fallacies, the source of the error is found in the form of the argument", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Young America's dilemma: Shall I be wise and great, or\n\nrich and powerful? (poster from 1901) This is an\n\n[example of a false dilemma: an informal fallacy using a](https://en.wikipedia.org/wiki/Informal_fallacy)\n\ndisjunctive premise that excludes viable alternatives.\n\nburglar broke into the house last night, got hungry on the job, and had a midnight snack, would also\n\nexplain the state of the kitchen. But this conclusion is not justified because it is not the best or most likely\n\nexplanation. [82][83]\n\nNot all arguments live up to the standards of correct reasoning. When they do not, they are usually\n\n[referred to as fallacies. Their central aspect is not that their conclusion is false but that there is some flaw](https://en.wikipedia.org/wiki/Fallacy)\n\nwith the reasoning leading to this conclusion. [84] So the argument \"it is sunny today; therefore spiders\n\n[have eight legs\" is fallacious even though the conclusion is true. Some theorists, like John Stuart Mill,](https://en.wikipedia.org/wiki/John_Stuart_Mill)\n\ngive a more restrictive definition of fallacies by additionally requiring that they appear to be correct. [85]\n\nThis way, genuine fallacies can be distinguished from mere mistakes of reasoning due to carelessness.\n\nThis explains why people tend to commit fallacies: because they have an alluring element that seduces\n\npeople into committing and accepting them. [86] However, this reference to appearances is controversial\n\n[because it belongs to the field of psychology, not logic, and because appearances may be different for](https://en.wikipedia.org/wiki/Psychology)\n\ndifferent people. [87]\n\n[Fallacies are usually divided into formal and](https://en.wikipedia.org/wiki/Formal_fallacy)\n\ninformal fallacies. [38] For formal fallacies, the\n\nsource of the error is found in the *form* of the\n\n[argument. For example, denying the antecedent](https://en.wikipedia.org/wiki/Denying_the_antecedent)\n\nis one type of formal fallacy, as in \"if Othello is a\n\nbachelor, then he is male; Othello is not a\n\nbachelor; therefore Othello is not male\". [88] But\n\nmost fallacies fall into the category of informal\n\nfallacies, of which a great variety is discussed in\n\nthe academic literature. The source of their error\n\nis usually found in the *content* or the *context* of\n\nthe argument. [89] Informal fallacies are\n\nsometimes categorized as fallacies of ambiguity,\n\nfallacies of presumption, or fallacies of\n\nrelevance. For fallacies of ambiguity, the\n\nambiguity and vagueness of natural language are\n\nresponsible for their flaw, as in \"feathers are light; what is light cannot be dark; therefore feathers cannot\n\nbe dark\". [90] Fallacies of presumption have a wrong or unjustified premise but may be valid otherwise. [91]\n\nIn the case of fallacies of relevance, the premises do not support the conclusion because they are not\n\nrelevant to it. [92]\n\nThe main focus of most logicians is to study the criteria according to which an argument is correct or\n\nincorrect. A fallacy is committed if these criteria are violated. In the case of formal logic, they are known\n\nas *rules of inference* . [93] They are definitory rules, which determine whether an inference is correct or\n\nwhich inferences are allowed. Definitory rules contrast with strategic rules. Strategic rules specify which\n\ninferential moves are necessary to reach a given conclusion based on a set of premises. This distinction\n\n[does not just apply to logic but also to games. In chess, for example, the definitory rules dictate that](https://en.wikipedia.org/wiki/Chess)\n\n[bishops may only move diagonally. The strategic rules, on the other hand, describe how the allowed](https://en.wikipedia.org/wiki/Bishop_(chess))\n\n#### **Fallacies**\n\n#### **Definitory and strategic rules**", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia1.pdf" - }, - { - "text": "fallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". [39] Some\n\ntheorists state that formal logic studies the general form of arguments while informal logic studies\n\nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of\n\n#### **Informal logic**", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Logic studies valid forms of\n\ninference like *[modus ponens](https://en.wikipedia.org/wiki/Modus_ponens)* .\n\n## **Logic**\n\n**Logic** [ is the study of correct reasoning. It includes both formal and](https://en.wikipedia.org/wiki/Logical_reasoning)\n\n[informal logic. Formal logic is the study of deductively valid](https://en.wikipedia.org/wiki/Validity_(logic))\n\n[inferences or logical truths. It examines how conclusions follow](https://en.wikipedia.org/wiki/Logical_truth)\n\n[from premises based on the structure of arguments alone,](https://en.wikipedia.org/wiki/Premise)\n\nindependent of their topic and content. Informal logic is associated\n\n[with informal fallacies, critical thinking, and argumentation](https://en.wikipedia.org/wiki/Argumentation_theory)\n\n[theory. Informal logic examines arguments expressed in natural](https://en.wikipedia.org/wiki/Natural_language)\n\n[language whereas formal logic uses formal language. When used](https://en.wikipedia.org/wiki/Formal_language)\n\n[as a countable noun, the term \"a logic\" refers to a specific logical](https://en.wikipedia.org/wiki/Countable_noun)\n\n[formal system that articulates a proof system. Logic plays a](https://en.wikipedia.org/wiki/Proof_system)\n\n[central role in many fields, such as philosophy, mathematics,](https://en.wikipedia.org/wiki/Mathematics)\n\n[computer science, and linguistics.](https://en.wikipedia.org/wiki/Linguistics)\n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the\n\nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the\n\nconclusion \"I don't have to work\". [1] [ Premises and conclusions express propositions or claims that can be](https://en.wikipedia.org/wiki/Proposition)\n\ntrue or false. An important feature of propositions is their internal structure. For example, complex\n\n[propositions are made up of simpler propositions linked by logical vocabulary like ](https://en.wikipedia.org/wiki/Logical_connective) [ (and) or ](https://en.wikipedia.org/wiki/Logical_conjunction)\n\n[(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a](https://en.wikipedia.org/wiki/Material_conditional)\n\nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically\n\ntrue propositions. They are true only because of their logical structure independent of the specific\n\nmeanings of the individual parts.\n\nArguments can be either correct or incorrect. An argument is correct if its premises support its\n\n[conclusion. Deductive arguments have the strongest form of support: if their premises are true then their](https://en.wikipedia.org/wiki/Deductive_reasoning)\n\n[conclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new](https://en.wikipedia.org/wiki/Ampliative)\n\ninformation not found in the premises. Many arguments in everyday discourse and the sciences are\n\n[ampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are](https://en.wikipedia.org/wiki/Abductive_reasoning)\n\nstatistical generalization—such as inferring that all ravens are black, based on many individual\n\nobservations of black ravens. [2] [ Abductive arguments are inferences to the best explanation—for](https://en.wikipedia.org/wiki/Inference)\n\nexample, when a doctor concludes that a patient has a certain disease, as the best explanation for the\n\nsymptoms that they are observed to suffer. [3] Arguments that fall short of the standards of correct\n\n[reasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the](https://en.wikipedia.org/wiki/Fallacies)\n\ncorrectness of arguments.\n\n[Logic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya,](https://en.wikipedia.org/wiki/Nyaya)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[propositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions](https://en.wikipedia.org/wiki/Quantifier_(logic))\n\n[behind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant](https://en.wikipedia.org/wiki/Epistemology)\n\nlogics, on the other hand, reject certain classical intuitions and provide alternative explanations of the\n\nbasic laws of logic.\n\nThe word \"logic\" originates from the Greek word *logos* , which has a variety of translations, such as\n\n[reason, discourse, or language.](https://en.wikipedia.org/wiki/Language) [4] [ Logic is traditionally defined as the study of the laws of thought or](https://en.wikipedia.org/wiki/Laws_of_thought)\n\n[correct reasoning,](https://en.wikipedia.org/wiki/Logical_reasoning) [5] [ and is usually understood in terms of inferences or arguments. Reasoning is the](https://en.wikipedia.org/wiki/Argument)\n\nactivity of drawing inferences. Arguments are the outward expression of inferences. [6] An argument is a\n\nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e.\n\nwhether their premises support the conclusion. [7] These general characterizations apply to logic in the\n\n[widest sense, i.e., to both formal and informal logic since they are both concerned with assessing the](https://en.wikipedia.org/wiki/Informal_logic)\n\ncorrectness of arguments. [8] Formal logic is the traditionally dominant field, and some logicians restrict\n\nlogic to formal logic. [9]\n\n[Formal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal](https://en.wikipedia.org/wiki/Formal_system)\n\napproach to study reasoning: it replaces concrete expressions with abstract symbols to examine the\n\n[logical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is](https://en.wikipedia.org/wiki/Logical_form)\n\nonly concerned with the abstract structure of arguments and not with their concrete content. [10]\n\n[Formal logic is interested in deductively valid arguments, for which the truth of their premises ensures](https://en.wikipedia.org/wiki/Validity_(logic))\n\nthe truth of their conclusion. This means that it is impossible for the premises to be true and the\n\nconclusion to be false. [11] For valid arguments, the logical structure of the premises and the conclusion\n\n[follows a pattern called a rule of inference.](https://en.wikipedia.org/wiki/Rule_of_inference) [12] [ For example, modus ponens is a rule of inference](https://en.wikipedia.org/wiki/Modus_ponens)\n\naccording to which all arguments of the form \"(1) *p* , (2) if *p* then *q* , (3) therefore *q* \" are valid, independent\n\nof what the terms *p* and *q* stand for. [13] In this sense, formal logic can be defined as the science of valid\n\n[inferences. An alternative definition sees logic as the study of logical truths.](https://en.wikipedia.org/wiki/Logical_truth) [14] A proposition is logically\n\n[true if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible](https://en.wikipedia.org/wiki/Possible_world)\n\n[worlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is](https://en.wikipedia.org/wiki/Interpretation_(logic))\n\nnot\". [15] These two definitions of formal logic are not identical, but they are closely related. For example,\n\nif the inference from *p* to *q* is deductively valid then the claim \"if *p* then *q* \" is a logical truth. [16]\n\n[Formal logic uses formal languages to express and analyze arguments.](https://en.wikipedia.org/wiki/Formal_language) [17] They normally have a very", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Formal logic needs to translate natural language\n\narguments into a formal language, like first-order logic, to\n\nassess whether they are valid. In this example, the letter\n\n\"c\" represents Carmen while the letters \"M\" and \"T\" stand\n\nfor \"Mexican\" and \"teacher\". The symbol \" ∧ \" has the\n\nmeaning of \"and\".\n\nnew formal systems have been proposed.\n\nThere are disagreements about what makes a\n\nformal system a logic. [22] For example, it has\n\n[been suggested that only logically complete](https://en.wikipedia.org/wiki/Completeness_(logic))\n\n[systems, like first-order logic, qualify as](https://en.wikipedia.org/wiki/First-order_logic)\n\nlogics. For such reasons, some theorists deny\n\n[that higher-order logics are logics in the strict](https://en.wikipedia.org/wiki/Higher-order_logic)\n\nsense. [23]\n\nWhen understood in a wide sense, logic\n\nencompasses both formal and informal logic. [24] Informal logic uses non-formal criteria and standards to\n\nanalyze and assess the correctness of arguments. Its main focus is on everyday discourse. [25] Its\n\ndevelopment was prompted by difficulties in applying the insights of formal logic to natural language\n\narguments. [26] In this regard, it considers problems that formal logic on its own is unable to address. [27]\n\nBoth provide criteria for assessing the correctness of arguments and distinguishing them from\n\nfallacies. [28]\n\nMany characterizations of informal logic have been suggested but there is no general agreement on its\n\nprecise definition. [29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the\n\nlanguage used to express arguments. On this view, informal logic studies arguments that are in informal\n\nor natural language. [30] Formal logic can only examine them indirectly by translating them first into a\n\nformal language while informal logic investigates them in their original form. [31] On this view, the\n\nargument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is\n\nexamined by informal logic. But the formal translation \"(1) ; (2)\n\n; (3) \" is studied by formal logic. [32] The study of natural language\n\narguments comes with various difficulties. For example, natural language expressions are often\n\nambiguous, vague, and context-dependent. [33] Another approach defines informal logic in a wide sense as\n\nthe normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes\n\n[questions about the role of rationality, critical thinking, and the psychology of argumentation.](https://en.wikipedia.org/wiki/Critical_thinking) [34]\n\nAnother characterization identifies informal logic with the study of non-deductive arguments. In this way,\n\nit contrasts with deductive reasoning examined by formal logic. [35] Non-deductive arguments make their\n\n[conclusion probable but do not ensure that it is true. An example is the inductive argument from the](https://en.wikipedia.org/wiki/Inductive_reasoning)\n\nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are\n\nblack\". [36]\n\n[A further approach is to define informal logic as the study of informal fallacies.](https://en.wikipedia.org/wiki/Informal_fallacies) [37] Informal fallacies are\n\n[incorrect arguments in which errors are present in the content and the context of the argument.](https://en.wikipedia.org/wiki/Context_(language_use)) [38] [ A false](https://en.wikipedia.org/wiki/False_dilemma)\n\n[dilemma, for example, involves an error of content by excluding viable options. This is the case in the](https://en.wikipedia.org/wiki/False_dilemma)\n\nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". [39] Some", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[with reality. In formal logic, a sound argument is an argument that is both correct and has only true](https://en.wikipedia.org/wiki/Soundness_(logic))\n\npremises. [61] Sometimes a distinction is made between simple and complex arguments. A complex\n\n##### **Logical truth**\n\n##### **Truth tables**\n\n#### **Arguments and inferences**", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Argument terminology used in logic](https://en.wikipedia.org/wiki/Argument)\n\nargument is made up of a chain of simple arguments. This means that the conclusion of one argument acts\n\nas a premise of later arguments. For a complex argument to be successful, each link of the chain has to be\n\nsuccessful. [43]\n\nArguments and inferences are either\n\ncorrect or incorrect. If they are correct\n\nthen their premises support their\n\nconclusion. In the incorrect case, this\n\nsupport is missing. It can take\n\ndifferent forms corresponding to the\n\n[different types of reasoning.](https://en.wikipedia.org/wiki/Method_of_reasoning) [62] The\n\nstrongest form of support corresponds\n\n[to deductive reasoning. But even](https://en.wikipedia.org/wiki/Deductive_reasoning)\n\narguments that are not deductively\n\nvalid may still be good arguments\n\nbecause their premises offer non-\n\ndeductive support to their conclusions.\n\nFor such cases, the term *ampliative* or\n\n*inductive* *reasoning* is used. [63]\n\nDeductive arguments are associated\n\nwith formal logic in contrast to the\n\nrelation between ampliative arguments and informal logic. [64]\n\nA deductively valid argument is one whose premises guarantee the truth of its conclusion. [11] For\n\ninstance, the argument \"(1) all frogs are amphibians; (2) no cats are amphibians; (3) therefore no cats are\n\nfrogs\" is deductively valid. For deductive validity, it does not matter whether the premises or the\n\nconclusion are actually true. So the argument \"(1) all frogs are mammals; (2) no cats are mammals; (3)\n\ntherefore no cats are frogs\" is also valid because the conclusion follows necessarily from the premises. [65]\n\n[According to an influential view by Alfred Tarski, deductive arguments have three essential features: (1)](https://en.wikipedia.org/wiki/Alfred_Tarski)\n\nthey are formal, i.e. they depend only on the form of the premises and the conclusion; (2) they are a\n\npriori, i.e. no sense experience is needed to determine whether they obtain; (3) they are modal, i.e. that\n\n[they hold by logical necessity for the given propositions, independent of any other circumstances.](https://en.wikipedia.org/wiki/Logical_necessity) [66]\n\nBecause of the first feature, the focus on formality, deductive inference is usually identified with rules of\n\ninference. [67] Rules of inference specify the form of the premises and the conclusion: how they have to be\n\nstructured for the inference to be valid. Arguments that do not follow any rule of inference are\n\ndeductively invalid. [68] The modus ponens is a prominent rule of inference. It has the form \" *p* ; if *p* , then\n\n*q* ; therefore *q* \". [69] Knowing that it has just rained ( ) and that after rain the streets are wet ( ), one\n\ncan use modus ponens to deduce that the streets are wet ( ). [70]\n\nThe third feature can be expressed by stating that deductively valid inferences are truth-preserving: it is\n\nimpossible for the premises to be true and the conclusion to be false. [71] Because of this feature, it is often\n\nasserted that deductive inferences are uninformative since the conclusion cannot arrive at new\n\ninformation not already present in the premises. [72] But this point is not always accepted since it would\n\nmean, for example, that most of mathematics is uninformative. A different characterization distinguishes\n\n##### **Deductive**", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Formal logic uses formal languages to express and analyze arguments.](https://en.wikipedia.org/wiki/Formal_language) [17] They normally have a very\n\n[limited vocabulary and exact syntactic rules. These rules specify how their symbols can be combined to](https://en.wikipedia.org/wiki/Syntax)\n\n[construct sentences, so-called well-formed formulas.](https://en.wikipedia.org/wiki/Well-formed_formula) [18] This simplicity and exactness of formal logic\n\nmake it capable of formulating precise rules of inference. They determine whether a given argument is\n\nvalid. [19] Because of the reliance on formal language, natural language arguments cannot be studied\n\n[directly. Instead, they need to be translated into formal language before their validity can be assessed.](https://en.wikipedia.org/wiki/Logic_translation#Natural_language_formalization) [20]\n\nThe term \"logic\" can also be used in a slightly different sense as a countable noun. In this sense, *a logic* is\n\na logical formal system. Distinct logics differ from each other concerning the rules of inference they\n\naccept as valid and the formal languages used to express them. [21] Starting in the late 19th century, many\n\n### **Definition**\n\n#### **Formal logic**", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "between surface and depth information. The surface information of a sentence is the information it\n\npresents explicitly. Depth information is the totality of the information contained in the sentence, both\n\nexplicitly and implicitly. According to this view, deductive inferences are uninformative on the depth\n\nlevel. But they can be highly informative on the surface level by making implicit information explicit.\n\nThis happens, for example, in mathematical proofs. [73]\n\nAmpliative arguments are arguments whose conclusions contain additional information not found in their\n\npremises. In this regard, they are more interesting since they contain information on the depth level and\n\nthe thinker may learn something genuinely new. But this feature comes with a certain cost: the premises\n\nsupport the conclusion in the sense that they make its truth more likely but they do not ensure its truth. [74]\n\nThis means that the conclusion of an ampliative argument may be false even though all its premises are\n\ntrue. This characteristic is closely related to *[non-monotonicity](https://en.wikipedia.org/wiki/Non-monotonic_logic)* and *[defeasibility](https://en.wikipedia.org/wiki/Defeasible_reasoning)* : it may be necessary to\n\nretract an earlier conclusion upon receiving new information or in light of new inferences drawn. [75]\n\nAmpliative reasoning plays a central role in many arguments found in everyday discourse and the\n\nsciences. Ampliative arguments are not automatically incorrect. Instead, they just follow different\n\nstandards of correctness. The support they provide for their conclusion usually comes in degrees. This\n\nmeans that strong ampliative arguments make their conclusion very likely while weak ones are less\n\ncertain. As a consequence, the line between correct and incorrect arguments is blurry in some cases, such\n\nas when the premises offer weak but non-negligible support. This contrasts with deductive arguments,\n\nwhich are either valid or invalid with nothing in-between. [76]\n\nThe terminology used to categorize ampliative arguments is inconsistent. Some authors, like James\n\n[Hawthorne, use the term \"induction\" to cover all forms of non-deductive arguments.](https://en.wikipedia.org/wiki/Inductive_reasoning) [77] But in a more\n\nnarrow sense, *induction* is only one type of ampliative argument alongside *[abductive arguments](https://en.wikipedia.org/wiki/Abductive_reasoning)* . [78]\n\n[Some philosophers, like Leo Groarke, also allow ](https://en.wikipedia.org/wiki/Leo_Groarke) *conductive arguments* [b] as another type. [79] In this\n\nnarrow sense, induction is often defined as a form of statistical generalization. [80] In this case, the\n\npremises of an inductive argument are many individual observations that all show a certain pattern. The\n\nconclusion then is a general law that this pattern always obtains. [81] In this sense, one may infer that \"all\n\nelephants are gray\" based on one's past observations of the color of elephants. [78] A closely related form\n\nof inductive inference has as its conclusion not a general law but one more specific instance, as when it is\n\ninferred that an elephant one has not seen yet is also gray. [81] Some theorists, like Igor Douven, stipulate\n\nthat inductive inferences rest only on statistical considerations. This way, they can be distinguished from\n\nabductive inference. [78]\n\nAbductive inference may or may not take statistical observations into consideration. In either case, the\n\n[premises offer support for the conclusion because the conclusion is the best explanation of why the](https://en.wikipedia.org/wiki/Explanation)\n\npremises are true. [82] In this sense, abduction is also called the *inference to the best explanation* . [83] For", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia1.pdf" - }, - { - "text": "logical constants for correct inferences while informal logic also takes the meaning of substantive\n\n[concepts into account. Further approaches focus on the discussion of logical topics with or without formal](https://en.wikipedia.org/wiki/Concept)\n\n[devices and on the role of epistemology for the assessment of arguments.](https://en.wikipedia.org/wiki/Epistemology) [40]\n\n*Premises* and *conclusions* are the basic parts of inferences or arguments and therefore play a central role\n\nin logic. In the case of a valid inference or a correct argument, the conclusion follows from the premises,\n\nor in other words, the premises support the conclusion. [41] For instance, the premises \"Mars is red\" and\n\n\"Mars is a planet\" support the conclusion \"Mars is a red planet\". For most types of logic, it is accepted\n\n[that premises and conclusions have to be truth-bearers.](https://en.wikipedia.org/wiki/Truth-bearer) [41][a] [ This means that they have a truth value: they](https://en.wikipedia.org/wiki/Truth_value)\n\nare either true or false. Contemporary philosophy generally sees them either as *[propositions](https://en.wikipedia.org/wiki/Proposition)* or as\n\n*[sentences](https://en.wikipedia.org/wiki/Sentence_(linguistics))* . [43] [ Propositions are the denotations of sentences and are usually seen as abstract objects.](https://en.wikipedia.org/wiki/Abstract_object) [44]\n\nFor example, the English sentence \"the tree is green\" is different from the German sentence \"der Baum ist\n\ngrün\" but both express the same proposition. [45]\n\nPropositional theories of premises and conclusions are often criticized because they rely on abstract\n\n[objects. For instance, philosophical naturalists usually reject the existence of abstract objects. Other](https://en.wikipedia.org/wiki/Naturalism_(philosophy))\n\narguments concern the challenges involved in specifying the identity criteria of propositions. [43] These\n\nobjections are avoided by seeing premises and conclusions not as propositions but as sentences, i.e. as\n\nconcrete linguistic objects like the symbols displayed on a page of a book. But this approach comes with\n\nnew problems of its own: sentences are often context-dependent and ambiguous, meaning an argument's\n\nvalidity would not only depend on its parts but also on its context and on how it is interpreted. [46] Another\n\napproach is to understand premises and conclusions in psychological terms as thoughts or judgments.\n\n[This position is known as psychologism. It was discussed at length around the turn of the 20th century](https://en.wikipedia.org/wiki/Psychologism)\n\nbut it is not widely accepted today. [47]\n\nPremises and conclusions have an internal structure. As propositions or sentences, they can be either\n\nsimple or complex. [48] A complex proposition has other propositions as its constituents, which are linked\n\n[to each other through propositional connectives like \"and\" or \"if...then\". Simple propositions, on the other](https://en.wikipedia.org/wiki/Logical_connective)\n\nhand, do not have propositional parts. But they can also be conceived as having an internal structure: they\n\n[are made up of subpropositional parts, like singular terms and predicates.](https://en.wikipedia.org/wiki/Predicate_(grammar)) [49][48] For example, the simple\n\nproposition \"Mars is red\" can be formed by applying the predicate \"red\" to the singular term \"Mars\". In\n\ncontrast, the complex proposition \"Mars is red and Venus is white\" is made up of two simple propositions\n\nconnected by the propositional connective \"and\". [49]\n\nWhether a proposition is true depends, at least in part, on its constituents. For complex propositions\n\n[formed using truth-functional propositional connectives, their truth only depends on the truth values of](https://en.wikipedia.org/wiki/Truth_function)", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia1.pdf", - "query": "In early Chinese philosophy, what were the major influences regarding the philosophy of logic ?", - "target_page": 18, - "target_passage": "In Chinese philosophy, the School of Names and Mohism were particularly influential", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "correctness of arguments.\n\n[Logic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya,](https://en.wikipedia.org/wiki/Nyaya)\n\n[and Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the](https://en.wikipedia.org/wiki/Syllogism)\n\nmain system of logic in the Western world until it was replaced by modern formal logic, which has its\n\n[roots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly](https://en.wikipedia.org/wiki/Gottlob_Frege)\n\n[used system is classical logic. It consists of propositional logic and first-order logic. Propositional logic](https://en.wikipedia.org/wiki/First-order_logic)\n\nonly considers logical relations between full propositions. First-order logic also takes the internal parts of", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia1.pdf" - }, - { - "text": "incoming information. [154] Correct reasoning and the arguments it is based on follow the laws of\n\n[probability, for example, the principle of conditionalization. Bad or irrational reasoning, on the other](https://en.wikipedia.org/wiki/Bayesian_epistemology#Principle_of_conditionalization)\n\nhand, violates these laws. [155]\n\nLogic is studied in various fields. In many cases, this is done by applying its formal method to specific\n\ntopics outside its scope, like to ethics or computer science. [156] In other cases, logic itself is made the\n\nsubject of research in another discipline. This can happen in diverse ways. For instance, it can involve\n\ninvestigating the philosophical assumptions linked to the basic concepts used by logicians. Other ways\n\ninclude interpreting and analyzing logic through mathematical structures as well as studying and\n\ncomparing abstract properties of formal logical systems. [157]\n\n*Philosophy of logic* is the philosophical discipline studying the scope and nature of logic. [59] It examines\n\nmany presuppositions implicit in logic, like how to define its basic concepts or the metaphysical\n\nassumptions associated with them. [158] It is also concerned with how to classify logical systems and\n\n[considers the ontological commitments they incur.](https://en.wikipedia.org/wiki/Ontological) [159] *Philosophical logic* is one of the areas within the\n\nphilosophy of logic. It studies the application of logical methods to philosophical problems in fields like\n\nmetaphysics, ethics, and epistemology. [160] This application usually happens in the form of extended or\n\ndeviant logical systems. [161]\n\nMetalogic is the field of inquiry studying the properties of formal logical systems. For example, when a\n\nnew formal system is developed, metalogicians may study it to determine which formulas can be proven\n\n[in it. They may also study whether an algorithm could be developed to find a proof for each formula and](https://en.wikipedia.org/wiki/Algorithm)\n\nwhether every provable formula in it is a tautology. Finally, they may compare it to other logical systems\n\nto understand its distinctive features. A key issue in metalogic concerns the relation between syntax and\n\nsemantics. The syntactic rules of a formal system determine how to deduce conclusions from premises,\n\ni.e. how to formulate proofs. The semantics of a formal system governs which sentences are true and\n\nwhich ones are false. This determines the validity of arguments since, for valid arguments, it is\n\nimpossible for the premises to be true and the conclusion to be false. The relation between syntax and\n\nsemantics concerns issues like whether every valid argument is provable and whether every provable\n\n[argument is valid. Metalogicians also study whether logical systems are complete, sound, and consistent.](https://en.wikipedia.org/wiki/Consistency)\n\n[They are interested in whether the systems are decidable and what expressive power they have.](https://en.wikipedia.org/wiki/Expressive_power_(computer_science))\n\nMetalogicians usually rely heavily on abstract mathematical reasoning when examining and formulating\n\nmetalogical proofs. This way, they aim to arrive at precise and general conclusions on these topics. [162]\n\nThe term \"mathematical logic\" is sometimes used as a synonym of \"formal logic\". But in a more\n\n[restricted sense, it refers to the study of logic within mathematics. Major subareas include model theory,](https://en.wikipedia.org/wiki/Model_theory)\n\n[proof theory, set theory, and computability theory.](https://en.wikipedia.org/wiki/Computability_theory) [164] Research in mathematical logic commonly\n\naddresses the mathematical properties of formal systems of logic. However, it can also include attempts\n\n### **Areas of research**\n\n#### **Philosophy of logic and philosophical logic**\n\n#### **Metalogic**\n\n#### **Mathematical logic**", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[In Chinese philosophy, the School of Names and Mohism were particularly influential. The School of](https://en.wikipedia.org/wiki/Mohism)\n\n[Names focused on the use of language and on paradoxes. For example, Gongsun Long proposed the](https://en.wikipedia.org/wiki/Gongsun_Long)\n\n[white horse paradox, which defends the thesis that a white horse is not a horse. The school of Mohism](https://en.wikipedia.org/wiki/White_horse_paradox)\n\nalso acknowledged the importance of language for logic and tried to relate the ideas in these fields to the\n\nrealm of ethics. [197]\n\n[In India, the study of logic was primarily pursued by the schools of Nyaya, Buddhism, and Jainism. It](https://en.wikipedia.org/wiki/Jainism)\n\nwas not treated as a separate academic discipline and discussions of its topics usually happened in the\n\ncontext of epistemology and theories of dialogue or argumentation. [198] In Nyaya, inference is understood\n\n[as a source of knowledge (pramā](https://en.wikipedia.org/wiki/Pram%C4%81%E1%B9%87a) ṇ a). It follows the perception of an object and tries to arrive at\n\nconclusions, for example, about the cause of this object. [199] A similar emphasis on the relation to\n\nepistemology is also found in Buddhist and Jainist schools of logic, where inference is used to expand the\n\nknowledge gained through other sources. [200] Some of the later theories of Nyaya, belonging to the\n\n[Navya-Nyāya school, resemble modern forms of logic, such as Gottlob Frege's distinction between sense](https://en.wikipedia.org/wiki/Sense_and_reference)\n\n[and reference and his definition of number.](https://en.wikipedia.org/wiki/Sense_and_reference) [201]\n\nThe syllogistic logic developed by Aristotle predominated in the West until the mid-19th century, when\n\ninterest in the foundations of mathematics stimulated the development of modern symbolic logic. [202]\n\nMany see Gottlob Frege's *[Begriffsschrift](https://en.wikipedia.org/wiki/Begriffsschrift)* [ as the birthplace of modern logic. Gottfried Wilhelm Leibniz's](https://en.wikipedia.org/wiki/Gottfried_Wilhelm_Leibniz)\n\n[idea of a universal formal language is often considered a forerunner. Other pioneers were George Boole,](https://en.wikipedia.org/wiki/George_Boole)\n\n[who invented Boolean algebra as a mathematical system of logic, and Charles Peirce, who developed the](https://en.wikipedia.org/wiki/Charles_Peirce)\n\n[logic of relatives. Alfred North Whitehead and Bertrand Russell, in turn, condensed many of these](https://en.wikipedia.org/wiki/Logic_of_relatives)\n\ninsights in their work *[Principia Mathematica](https://en.wikipedia.org/wiki/Principia_Mathematica)* [. Modern logic introduced novel concepts, such as functions,](https://en.wikipedia.org/wiki/Function_(mathematics))\n\nquantifiers, and relational predicates. A hallmark of modern symbolic logic is its use of formal language\n\nto precisely codify its insights. In this regard, it departs from earlier logicians, who relied mainly on\n\nnatural language. [203] Of particular influence was the development of first-order logic, which is usually\n\ntreated as the standard system of modern logic. [204] Its analytical generality allowed the formalization of\n\n[mathematics and drove the investigation of set theory. It also made Alfred Tarski's approach to model](https://en.wikipedia.org/wiki/Model_theory)\n\n[theory possible and provided the foundation of modern mathematical logic.](https://en.wikipedia.org/wiki/Model_theory) [205]\n\n* **[Philosophy portal](https://en.wikipedia.org/wiki/Portal:Philosophy)** *\n\n### **See also**", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[propositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions](https://en.wikipedia.org/wiki/Quantifier_(logic))\n\n[behind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant](https://en.wikipedia.org/wiki/Epistemology)\n\nlogics, on the other hand, reject certain classical intuitions and provide alternative explanations of the\n\nbasic laws of logic.\n\nThe word \"logic\" originates from the Greek word *logos* , which has a variety of translations, such as\n\n[reason, discourse, or language.](https://en.wikipedia.org/wiki/Language) [4] [ Logic is traditionally defined as the study of the laws of thought or](https://en.wikipedia.org/wiki/Laws_of_thought)\n\n[correct reasoning,](https://en.wikipedia.org/wiki/Logical_reasoning) [5] [ and is usually understood in terms of inferences or arguments. Reasoning is the](https://en.wikipedia.org/wiki/Argument)\n\nactivity of drawing inferences. Arguments are the outward expression of inferences. [6] An argument is a\n\nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e.\n\nwhether their premises support the conclusion. [7] These general characterizations apply to logic in the\n\n[widest sense, i.e., to both formal and informal logic since they are both concerned with assessing the](https://en.wikipedia.org/wiki/Informal_logic)\n\ncorrectness of arguments. [8] Formal logic is the traditionally dominant field, and some logicians restrict\n\nlogic to formal logic. [9]\n\n[Formal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal](https://en.wikipedia.org/wiki/Formal_system)\n\napproach to study reasoning: it replaces concrete expressions with abstract symbols to examine the\n\n[logical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is](https://en.wikipedia.org/wiki/Logical_form)\n\nonly concerned with the abstract structure of arguments and not with their concrete content. [10]\n\n[Formal logic is interested in deductively valid arguments, for which the truth of their premises ensures](https://en.wikipedia.org/wiki/Validity_(logic))\n\nthe truth of their conclusion. This means that it is impossible for the premises to be true and the\n\nconclusion to be false. [11] For valid arguments, the logical structure of the premises and the conclusion\n\n[follows a pattern called a rule of inference.](https://en.wikipedia.org/wiki/Rule_of_inference) [12] [ For example, modus ponens is a rule of inference](https://en.wikipedia.org/wiki/Modus_ponens)\n\naccording to which all arguments of the form \"(1) *p* , (2) if *p* then *q* , (3) therefore *q* \" are valid, independent\n\nof what the terms *p* and *q* stand for. [13] In this sense, formal logic can be defined as the science of valid\n\n[inferences. An alternative definition sees logic as the study of logical truths.](https://en.wikipedia.org/wiki/Logical_truth) [14] A proposition is logically\n\n[true if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible](https://en.wikipedia.org/wiki/Possible_world)\n\n[worlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is](https://en.wikipedia.org/wiki/Interpretation_(logic))\n\nnot\". [15] These two definitions of formal logic are not identical, but they are closely related. For example,\n\nif the inference from *p* to *q* is deductively valid then the claim \"if *p* then *q* \" is a logical truth. [16]\n\n[Formal logic uses formal languages to express and analyze arguments.](https://en.wikipedia.org/wiki/Formal_language) [17] They normally have a very", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Glossary of logic](https://en.wikipedia.org/wiki/Glossary_of_logic)\n\n[Outline of logic - Overview of and topical guide to logic](https://en.wikipedia.org/wiki/Outline_of_logic)\n\n[Critical thinking - Analysis of facts to form a judgment](https://en.wikipedia.org/wiki/Critical_thinking)\n\n[List of logic journals](https://en.wikipedia.org/wiki/List_of_logic_journals)\n\n[List of logic symbols - List of symbols used to express logical relations](https://en.wikipedia.org/wiki/List_of_logic_symbols)\n\n[List of logicians](https://en.wikipedia.org/wiki/List_of_logicians)\n\n[Logic puzzle - Puzzle deriving from the mathematics field of deduction](https://en.wikipedia.org/wiki/Logic_puzzle)\n\n[Logical reasoning - Process of drawing correct inferences](https://en.wikipedia.org/wiki/Logical_reasoning)\n\n[Logos - Concept in philosophy, religion, rhetoric, and psychology](https://en.wikipedia.org/wiki/Logos)\n\n[Vector logic](https://en.wikipedia.org/wiki/Vector_logic)\n\n[a. However, there are some forms of logic, like imperative logic, where this may not be the](https://en.wikipedia.org/wiki/Imperative_logic)\n\ncase. [42]\n\nb. Conductive arguments present reasons in favor of a conclusion without claiming that the\n\nreasons are strong enough to decisively support the conclusion.\n\n1. Velleman 2006, pp. 8, 103.\n\n2. Vickers 2022.\n\n3. Nunes 2011, pp. 2066- 2069.\n\n4. Pépin 2004, Logos; Online Etymology Staff.\n\n5. Hintikka 2019, lead section, §Nature and varieties of logic.\n\n6. Hintikka 2019, §Nature and varieties of logic; Haack 1978, pp. 1- 10, Philosophy of logics;\n\nSchlesinger, Keren-Portnoy & Parush 2001, p. 220.\n\n7. Hintikka & Sandu 2006, p. 13; Audi 1999b, Philosophy of logic; McKeon.\n\n8. Blair & Johnson 2000, pp. 93- 95; Craig 1996, Formal and informal logic.\n\n[9. Craig 1996, Formal and informal logic; Barnes 2007, p. 274; Planty-Bonjour 2012, p. 62 (htt](https://books.google.com/books?id=0EpFBgAAQBAJ&pg=PA62)\n\n[ps://books.google.com/books?id=0EpFBgAAQBAJ&pg=PA62); Rini 2010, p. 26 (https://boo](https://books.google.com/books?id=vard024vjFgC&pg=PA26)\n\n[ks.google.com/books?id=vard024vjFgC&pg=PA26).](https://books.google.com/books?id=vard024vjFgC&pg=PA26)\n\n10. MacFarlane 2017; Corkum 2015, pp. 753- 767; Blair & Johnson 2000, pp. 93- 95; Magnus\n\n2005, pp. 12- 4, 1.6 Formal languages.\n\n11. McKeon; Craig 1996, Formal and informal logic.\n\n12. Hintikka & Sandu 2006, p. 13.\n\n13. Magnus 2005, Proofs, p. 102.\n\n14. Hintikka & Sandu 2006, pp. 13- 16; Makridis 2022, pp. 1- 2; Runco & Pritzker 1999, p. 155.\n\n15. Gómez-Torrente 2019; Magnus 2005, 1.5 Other logical notions, p. 10.\n\n16. Hintikka & Sandu 2006, p. 16.\n\n17. Honderich 2005, logic, informal; Craig 1996, Formal and informal logic; Johnson 1999,\n\npp. 265- 268.\n\n18. Craig 1996, Formal languages and systems; Simpson 2008, p. 14.\n\n19. Craig 1996, Formal languages and systems.\n\n### **References**\n\n#### **Notes**\n\n#### **Citations**", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Formal logic needs to translate natural language\n\narguments into a formal language, like first-order logic, to\n\nassess whether they are valid. In this example, the letter\n\n\"c\" represents Carmen while the letters \"M\" and \"T\" stand\n\nfor \"Mexican\" and \"teacher\". The symbol \" ∧ \" has the\n\nmeaning of \"and\".\n\nnew formal systems have been proposed.\n\nThere are disagreements about what makes a\n\nformal system a logic. [22] For example, it has\n\n[been suggested that only logically complete](https://en.wikipedia.org/wiki/Completeness_(logic))\n\n[systems, like first-order logic, qualify as](https://en.wikipedia.org/wiki/First-order_logic)\n\nlogics. For such reasons, some theorists deny\n\n[that higher-order logics are logics in the strict](https://en.wikipedia.org/wiki/Higher-order_logic)\n\nsense. [23]\n\nWhen understood in a wide sense, logic\n\nencompasses both formal and informal logic. [24] Informal logic uses non-formal criteria and standards to\n\nanalyze and assess the correctness of arguments. Its main focus is on everyday discourse. [25] Its\n\ndevelopment was prompted by difficulties in applying the insights of formal logic to natural language\n\narguments. [26] In this regard, it considers problems that formal logic on its own is unable to address. [27]\n\nBoth provide criteria for assessing the correctness of arguments and distinguishing them from\n\nfallacies. [28]\n\nMany characterizations of informal logic have been suggested but there is no general agreement on its\n\nprecise definition. [29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the\n\nlanguage used to express arguments. On this view, informal logic studies arguments that are in informal\n\nor natural language. [30] Formal logic can only examine them indirectly by translating them first into a\n\nformal language while informal logic investigates them in their original form. [31] On this view, the\n\nargument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is\n\nexamined by informal logic. But the formal translation \"(1) ; (2)\n\n; (3) \" is studied by formal logic. [32] The study of natural language\n\narguments comes with various difficulties. For example, natural language expressions are often\n\nambiguous, vague, and context-dependent. [33] Another approach defines informal logic in a wide sense as\n\nthe normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes\n\n[questions about the role of rationality, critical thinking, and the psychology of argumentation.](https://en.wikipedia.org/wiki/Critical_thinking) [34]\n\nAnother characterization identifies informal logic with the study of non-deductive arguments. In this way,\n\nit contrasts with deductive reasoning examined by formal logic. [35] Non-deductive arguments make their\n\n[conclusion probable but do not ensure that it is true. An example is the inductive argument from the](https://en.wikipedia.org/wiki/Inductive_reasoning)\n\nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are\n\nblack\". [36]\n\n[A further approach is to define informal logic as the study of informal fallacies.](https://en.wikipedia.org/wiki/Informal_fallacies) [37] Informal fallacies are\n\n[incorrect arguments in which errors are present in the content and the context of the argument.](https://en.wikipedia.org/wiki/Context_(language_use)) [38] [ A false](https://en.wikipedia.org/wiki/False_dilemma)\n\n[dilemma, for example, involves an error of content by excluding viable options. This is the case in the](https://en.wikipedia.org/wiki/False_dilemma)\n\nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". [39] Some", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Gottlob Frege's ](https://en.wikipedia.org/wiki/Gottlob_Frege) *[Begriffschrift](https://en.wikipedia.org/wiki/Begriffschrift)*\n\nintroduced the notion of quantifier in\n\na graphical notation, which here\n\nrepresents the judgment that\n\nis true.\n\nmathematics, it does not include logical vocabulary relevant to many other topics of philosophical\n\nimportance. Examples of concepts it overlooks are the contrast between necessity and possibility and the\n\nproblem of ethical obligation and permission. Similarly, it does not address the relations between past,\n\npresent, and future. [119] Such issues are addressed by extended logics. They build on the basic intuitions\n\nof classical logic and expand it by introducing new logical vocabulary. This way, the exact logical\n\n[approach is applied to fields like ethics or epistemology that lie beyond the scope of mathematics.](https://en.wikipedia.org/wiki/Ethics) [120]\n\n[Propositional logic comprises formal systems in which formulae are built from atomic propositions using](https://en.wikipedia.org/wiki/Atomic_propositions)\n\n[logical connectives. For instance, propositional logic represents the conjunction of two atomic](https://en.wikipedia.org/wiki/Conjunction_(logic))\n\npropositions and as the complex formula . Unlike predicate logic where terms and predicates\n\nare the smallest units, propositional logic takes full propositions with truth values as its most basic\n\ncomponent. [121] Thus, propositional logics can only represent logical relationships that arise from the\n\nway complex propositions are built from simpler ones. But it cannot represent inferences that result from\n\nthe inner structure of a proposition. [122]\n\nFirst-order logic includes the same propositional connectives as\n\npropositional logic but differs from it because it articulates the\n\ninternal structure of propositions. This happens through devices\n\nsuch as singular terms, which refer to particular objects,\n\n[predicates, which refer to properties and relations, and quantifiers,](https://en.wikipedia.org/wiki/Predicate_(mathematical_logic))\n\nwhich treat notions like \"some\" and \"all\". [123] For example, to\n\nexpress the proposition \"this raven is black\", one may use the\n\npredicate for the property \"black\" and the singular term\n\nreferring to the raven to form the expression . To express that\n\nsome objects are black, the existential quantifier is combined\n\nwith the variable to form the proposition . First-order logic contains various rules of inference\n\nthat determine how expressions articulated this way can form valid arguments, for example, that one may\n\ninfer from . [124]\n\nExtended logics are logical systems that accept the basic principles of classical logic. They introduce\n\n[additional symbols and principles to apply it to fields like metaphysics, ethics, and epistemology.](https://en.wikipedia.org/wiki/Epistemology) [125]\n\n[Modal logic is an extension of classical logic. In its original form, sometimes called \"alethic modal](https://en.wikipedia.org/wiki/Modal_logic)\n\nlogic\", it introduces two new symbols: expresses that something is possible while expresses that\n\nsomething is necessary. [126] For example, if the formula stands for the sentence \"Socrates is a\n\nbanker\" then the formula articulates the sentence \"It is possible that Socrates is a banker\". [127] To\n\ninclude these symbols in the logical formalism, modal logic introduces new rules of inference that govern\n\n##### **Propositional logic**\n\n##### **First-order logic**\n\n#### **Extended**\n\n##### **Modal logic**", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia1.pdf" - }, - { - "text": "inductive logic [186] [ as well as the discussion of new logical concepts such as terms, predicables,](https://en.wikipedia.org/wiki/Predicable)\n\nsyllogisms, and propositions. Aristotelian logic was highly regarded in classical and medieval times, both\n\nin Europe and the Middle East. It remained in wide use in the West until the early 19th century. [187] It has\n\nnow been superseded by later work, though many of its key insights are still present in modern systems of\n\nlogic. [188]\n\n#### **Epistemology of logic**\n\n### **History**", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia1.pdf" - }, - { - "text": "what role they play in inferences. One rule of inference states that, if something is necessary, then it is\n\nalso possible. This means that follows from . Another principle states that if a proposition is\n\nnecessary then its negation is impossible and vice versa. This means that is equivalent to . [128]\n\nOther forms of modal logic introduce similar symbols but associate different meanings with them to\n\n[apply modal logic to other fields. For example, deontic logic concerns the field of ethics and introduces](https://en.wikipedia.org/wiki/Deontic_logic)\n\n[symbols to express the ideas of obligation and permission, i.e. to describe whether an agent has to](https://en.wikipedia.org/wiki/Permission_(philosophy))\n\nperform a certain action or is allowed to perform it. [129] [ The modal operators in temporal modal logic](https://en.wikipedia.org/wiki/Temporal_logic)\n\narticulate temporal relations. They can be used to express, for example, that something happened at one\n\ntime or that something is happening all the time. [129] [ In epistemology, epistemic modal logic is used to](https://en.wikipedia.org/wiki/Epistemic_modal_logic)\n\n[represent the ideas of knowing something in contrast to merely believing it to be the case.](https://en.wikipedia.org/wiki/Belief) [130]\n\n[Higher-order logics extend classical logic not by using modal operators but by introducing new forms of](https://en.wikipedia.org/wiki/Higher-order_logic)\n\nquantification. [131] Quantifiers correspond to terms like \"all\" or \"some\". In classical first-order logic,\n\nquantifiers are only applied to individuals. The formula \" \" ( *some* apples are\n\n[sweet) is an example of the existential quantifier \" \" applied to the individual variable \" \". In higher-](https://en.wikipedia.org/wiki/Existential_quantification)\n\norder logics, quantification is also allowed over predicates. This increases its expressive power. For\n\nexample, to express the idea that Mary and John share some qualities, one could use the formula\n\n\" \". In this case, the existential quantifier is applied to the predicate variable\n\n\" \". [132] The added expressive power is especially useful for mathematics since it allows for more\n\nsuccinct formulations of mathematical theories. [43] But it has drawbacks in regard to its meta-logical\n\nproperties and ontological implications, which is why first-order logic is still more commonly used. [133]\n\n[Deviant logics are logical systems that reject some of the basic intuitions of classical logic. Because of](https://en.wikipedia.org/wiki/Deviant_logic)\n\nthis, they are usually seen not as its supplements but as its rivals. Deviant logical systems differ from each\n\nother either because they reject different classical intuitions or because they propose different alternatives\n\nto the same issue. [134]\n\n[Intuitionistic logic is a restricted version of classical logic.](https://en.wikipedia.org/wiki/Intuitionistic_logic) [135] It uses the same symbols but excludes\n\nsome rules of inference. For example, according to the law of double negation elimination, if a sentence\n\nis not not true, then it is true. This means that follows from . This is a valid rule of inference in\n\nclassical logic but it is invalid in intuitionistic logic. Another classical principle not part of intuitionistic\n\n[logic is the law of excluded middle. It states that for every sentence, either it or its negation is true. This](https://en.wikipedia.org/wiki/Law_of_excluded_middle)\n\nmeans that every proposition of the form is true. [135] These deviations from classical logic are\n\nbased on the idea that truth is established by verification using a proof. Intuitionistic logic is especially\n\n[prominent in the field of constructive mathematics, which emphasizes the need to find or construct a](https://en.wikipedia.org/wiki/Constructivism_(philosophy_of_mathematics))", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia1.pdf" - }, - { - "text": "fallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". [39] Some\n\ntheorists state that formal logic studies the general form of arguments while informal logic studies\n\nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of\n\n#### **Informal logic**", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia1.pdf", - "query": "What is considered a deductively valid argument regarding logic ?", - "target_page": 6, - "target_passage": "A deductively valid argument is one whose premises guarantee the truth of its conclusion", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "[Argument terminology used in logic](https://en.wikipedia.org/wiki/Argument)\n\nargument is made up of a chain of simple arguments. This means that the conclusion of one argument acts\n\nas a premise of later arguments. For a complex argument to be successful, each link of the chain has to be\n\nsuccessful. [43]\n\nArguments and inferences are either\n\ncorrect or incorrect. If they are correct\n\nthen their premises support their\n\nconclusion. In the incorrect case, this\n\nsupport is missing. It can take\n\ndifferent forms corresponding to the\n\n[different types of reasoning.](https://en.wikipedia.org/wiki/Method_of_reasoning) [62] The\n\nstrongest form of support corresponds\n\n[to deductive reasoning. But even](https://en.wikipedia.org/wiki/Deductive_reasoning)\n\narguments that are not deductively\n\nvalid may still be good arguments\n\nbecause their premises offer non-\n\ndeductive support to their conclusions.\n\nFor such cases, the term *ampliative* or\n\n*inductive* *reasoning* is used. [63]\n\nDeductive arguments are associated\n\nwith formal logic in contrast to the\n\nrelation between ampliative arguments and informal logic. [64]\n\nA deductively valid argument is one whose premises guarantee the truth of its conclusion. [11] For\n\ninstance, the argument \"(1) all frogs are amphibians; (2) no cats are amphibians; (3) therefore no cats are\n\nfrogs\" is deductively valid. For deductive validity, it does not matter whether the premises or the\n\nconclusion are actually true. So the argument \"(1) all frogs are mammals; (2) no cats are mammals; (3)\n\ntherefore no cats are frogs\" is also valid because the conclusion follows necessarily from the premises. [65]\n\n[According to an influential view by Alfred Tarski, deductive arguments have three essential features: (1)](https://en.wikipedia.org/wiki/Alfred_Tarski)\n\nthey are formal, i.e. they depend only on the form of the premises and the conclusion; (2) they are a\n\npriori, i.e. no sense experience is needed to determine whether they obtain; (3) they are modal, i.e. that\n\n[they hold by logical necessity for the given propositions, independent of any other circumstances.](https://en.wikipedia.org/wiki/Logical_necessity) [66]\n\nBecause of the first feature, the focus on formality, deductive inference is usually identified with rules of\n\ninference. [67] Rules of inference specify the form of the premises and the conclusion: how they have to be\n\nstructured for the inference to be valid. Arguments that do not follow any rule of inference are\n\ndeductively invalid. [68] The modus ponens is a prominent rule of inference. It has the form \" *p* ; if *p* , then\n\n*q* ; therefore *q* \". [69] Knowing that it has just rained ( ) and that after rain the streets are wet ( ), one\n\ncan use modus ponens to deduce that the streets are wet ( ). [70]\n\nThe third feature can be expressed by stating that deductively valid inferences are truth-preserving: it is\n\nimpossible for the premises to be true and the conclusion to be false. [71] Because of this feature, it is often\n\nasserted that deductive inferences are uninformative since the conclusion cannot arrive at new\n\ninformation not already present in the premises. [72] But this point is not always accepted since it would\n\nmean, for example, that most of mathematics is uninformative. A different characterization distinguishes\n\n##### **Deductive**", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia1.pdf" - }, - { - "text": "fallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". [39] Some\n\ntheorists state that formal logic studies the general form of arguments while informal logic studies\n\nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of\n\n#### **Informal logic**", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[propositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions](https://en.wikipedia.org/wiki/Quantifier_(logic))\n\n[behind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant](https://en.wikipedia.org/wiki/Epistemology)\n\nlogics, on the other hand, reject certain classical intuitions and provide alternative explanations of the\n\nbasic laws of logic.\n\nThe word \"logic\" originates from the Greek word *logos* , which has a variety of translations, such as\n\n[reason, discourse, or language.](https://en.wikipedia.org/wiki/Language) [4] [ Logic is traditionally defined as the study of the laws of thought or](https://en.wikipedia.org/wiki/Laws_of_thought)\n\n[correct reasoning,](https://en.wikipedia.org/wiki/Logical_reasoning) [5] [ and is usually understood in terms of inferences or arguments. Reasoning is the](https://en.wikipedia.org/wiki/Argument)\n\nactivity of drawing inferences. Arguments are the outward expression of inferences. [6] An argument is a\n\nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e.\n\nwhether their premises support the conclusion. [7] These general characterizations apply to logic in the\n\n[widest sense, i.e., to both formal and informal logic since they are both concerned with assessing the](https://en.wikipedia.org/wiki/Informal_logic)\n\ncorrectness of arguments. [8] Formal logic is the traditionally dominant field, and some logicians restrict\n\nlogic to formal logic. [9]\n\n[Formal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal](https://en.wikipedia.org/wiki/Formal_system)\n\napproach to study reasoning: it replaces concrete expressions with abstract symbols to examine the\n\n[logical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is](https://en.wikipedia.org/wiki/Logical_form)\n\nonly concerned with the abstract structure of arguments and not with their concrete content. [10]\n\n[Formal logic is interested in deductively valid arguments, for which the truth of their premises ensures](https://en.wikipedia.org/wiki/Validity_(logic))\n\nthe truth of their conclusion. This means that it is impossible for the premises to be true and the\n\nconclusion to be false. [11] For valid arguments, the logical structure of the premises and the conclusion\n\n[follows a pattern called a rule of inference.](https://en.wikipedia.org/wiki/Rule_of_inference) [12] [ For example, modus ponens is a rule of inference](https://en.wikipedia.org/wiki/Modus_ponens)\n\naccording to which all arguments of the form \"(1) *p* , (2) if *p* then *q* , (3) therefore *q* \" are valid, independent\n\nof what the terms *p* and *q* stand for. [13] In this sense, formal logic can be defined as the science of valid\n\n[inferences. An alternative definition sees logic as the study of logical truths.](https://en.wikipedia.org/wiki/Logical_truth) [14] A proposition is logically\n\n[true if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible](https://en.wikipedia.org/wiki/Possible_world)\n\n[worlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is](https://en.wikipedia.org/wiki/Interpretation_(logic))\n\nnot\". [15] These two definitions of formal logic are not identical, but they are closely related. For example,\n\nif the inference from *p* to *q* is deductively valid then the claim \"if *p* then *q* \" is a logical truth. [16]\n\n[Formal logic uses formal languages to express and analyze arguments.](https://en.wikipedia.org/wiki/Formal_language) [17] They normally have a very", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[with reality. In formal logic, a sound argument is an argument that is both correct and has only true](https://en.wikipedia.org/wiki/Soundness_(logic))\n\npremises. [61] Sometimes a distinction is made between simple and complex arguments. A complex\n\n##### **Logical truth**\n\n##### **Truth tables**\n\n#### **Arguments and inferences**", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Logic studies valid forms of\n\ninference like *[modus ponens](https://en.wikipedia.org/wiki/Modus_ponens)* .\n\n## **Logic**\n\n**Logic** [ is the study of correct reasoning. It includes both formal and](https://en.wikipedia.org/wiki/Logical_reasoning)\n\n[informal logic. Formal logic is the study of deductively valid](https://en.wikipedia.org/wiki/Validity_(logic))\n\n[inferences or logical truths. It examines how conclusions follow](https://en.wikipedia.org/wiki/Logical_truth)\n\n[from premises based on the structure of arguments alone,](https://en.wikipedia.org/wiki/Premise)\n\nindependent of their topic and content. Informal logic is associated\n\n[with informal fallacies, critical thinking, and argumentation](https://en.wikipedia.org/wiki/Argumentation_theory)\n\n[theory. Informal logic examines arguments expressed in natural](https://en.wikipedia.org/wiki/Natural_language)\n\n[language whereas formal logic uses formal language. When used](https://en.wikipedia.org/wiki/Formal_language)\n\n[as a countable noun, the term \"a logic\" refers to a specific logical](https://en.wikipedia.org/wiki/Countable_noun)\n\n[formal system that articulates a proof system. Logic plays a](https://en.wikipedia.org/wiki/Proof_system)\n\n[central role in many fields, such as philosophy, mathematics,](https://en.wikipedia.org/wiki/Mathematics)\n\n[computer science, and linguistics.](https://en.wikipedia.org/wiki/Linguistics)\n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the\n\nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the\n\nconclusion \"I don't have to work\". [1] [ Premises and conclusions express propositions or claims that can be](https://en.wikipedia.org/wiki/Proposition)\n\ntrue or false. An important feature of propositions is their internal structure. For example, complex\n\n[propositions are made up of simpler propositions linked by logical vocabulary like ](https://en.wikipedia.org/wiki/Logical_connective) [ (and) or ](https://en.wikipedia.org/wiki/Logical_conjunction)\n\n[(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a](https://en.wikipedia.org/wiki/Material_conditional)\n\nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically\n\ntrue propositions. They are true only because of their logical structure independent of the specific\n\nmeanings of the individual parts.\n\nArguments can be either correct or incorrect. An argument is correct if its premises support its\n\n[conclusion. Deductive arguments have the strongest form of support: if their premises are true then their](https://en.wikipedia.org/wiki/Deductive_reasoning)\n\n[conclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new](https://en.wikipedia.org/wiki/Ampliative)\n\ninformation not found in the premises. Many arguments in everyday discourse and the sciences are\n\n[ampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are](https://en.wikipedia.org/wiki/Abductive_reasoning)\n\nstatistical generalization—such as inferring that all ravens are black, based on many individual\n\nobservations of black ravens. [2] [ Abductive arguments are inferences to the best explanation—for](https://en.wikipedia.org/wiki/Inference)\n\nexample, when a doctor concludes that a patient has a certain disease, as the best explanation for the\n\nsymptoms that they are observed to suffer. [3] Arguments that fall short of the standards of correct\n\n[reasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the](https://en.wikipedia.org/wiki/Fallacies)\n\ncorrectness of arguments.\n\n[Logic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya,](https://en.wikipedia.org/wiki/Nyaya)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Formal logic needs to translate natural language\n\narguments into a formal language, like first-order logic, to\n\nassess whether they are valid. In this example, the letter\n\n\"c\" represents Carmen while the letters \"M\" and \"T\" stand\n\nfor \"Mexican\" and \"teacher\". The symbol \" ∧ \" has the\n\nmeaning of \"and\".\n\nnew formal systems have been proposed.\n\nThere are disagreements about what makes a\n\nformal system a logic. [22] For example, it has\n\n[been suggested that only logically complete](https://en.wikipedia.org/wiki/Completeness_(logic))\n\n[systems, like first-order logic, qualify as](https://en.wikipedia.org/wiki/First-order_logic)\n\nlogics. For such reasons, some theorists deny\n\n[that higher-order logics are logics in the strict](https://en.wikipedia.org/wiki/Higher-order_logic)\n\nsense. [23]\n\nWhen understood in a wide sense, logic\n\nencompasses both formal and informal logic. [24] Informal logic uses non-formal criteria and standards to\n\nanalyze and assess the correctness of arguments. Its main focus is on everyday discourse. [25] Its\n\ndevelopment was prompted by difficulties in applying the insights of formal logic to natural language\n\narguments. [26] In this regard, it considers problems that formal logic on its own is unable to address. [27]\n\nBoth provide criteria for assessing the correctness of arguments and distinguishing them from\n\nfallacies. [28]\n\nMany characterizations of informal logic have been suggested but there is no general agreement on its\n\nprecise definition. [29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the\n\nlanguage used to express arguments. On this view, informal logic studies arguments that are in informal\n\nor natural language. [30] Formal logic can only examine them indirectly by translating them first into a\n\nformal language while informal logic investigates them in their original form. [31] On this view, the\n\nargument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is\n\nexamined by informal logic. But the formal translation \"(1) ; (2)\n\n; (3) \" is studied by formal logic. [32] The study of natural language\n\narguments comes with various difficulties. For example, natural language expressions are often\n\nambiguous, vague, and context-dependent. [33] Another approach defines informal logic in a wide sense as\n\nthe normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes\n\n[questions about the role of rationality, critical thinking, and the psychology of argumentation.](https://en.wikipedia.org/wiki/Critical_thinking) [34]\n\nAnother characterization identifies informal logic with the study of non-deductive arguments. In this way,\n\nit contrasts with deductive reasoning examined by formal logic. [35] Non-deductive arguments make their\n\n[conclusion probable but do not ensure that it is true. An example is the inductive argument from the](https://en.wikipedia.org/wiki/Inductive_reasoning)\n\nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are\n\nblack\". [36]\n\n[A further approach is to define informal logic as the study of informal fallacies.](https://en.wikipedia.org/wiki/Informal_fallacies) [37] Informal fallacies are\n\n[incorrect arguments in which errors are present in the content and the context of the argument.](https://en.wikipedia.org/wiki/Context_(language_use)) [38] [ A false](https://en.wikipedia.org/wiki/False_dilemma)\n\n[dilemma, for example, involves an error of content by excluding viable options. This is the case in the](https://en.wikipedia.org/wiki/False_dilemma)\n\nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". [39] Some", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "correctness of arguments.\n\n[Logic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya,](https://en.wikipedia.org/wiki/Nyaya)\n\n[and Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the](https://en.wikipedia.org/wiki/Syllogism)\n\nmain system of logic in the Western world until it was replaced by modern formal logic, which has its\n\n[roots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly](https://en.wikipedia.org/wiki/Gottlob_Frege)\n\n[used system is classical logic. It consists of propositional logic and first-order logic. Propositional logic](https://en.wikipedia.org/wiki/First-order_logic)\n\nonly considers logical relations between full propositions. First-order logic also takes the internal parts of", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Glossary of logic](https://en.wikipedia.org/wiki/Glossary_of_logic)\n\n[Outline of logic - Overview of and topical guide to logic](https://en.wikipedia.org/wiki/Outline_of_logic)\n\n[Critical thinking - Analysis of facts to form a judgment](https://en.wikipedia.org/wiki/Critical_thinking)\n\n[List of logic journals](https://en.wikipedia.org/wiki/List_of_logic_journals)\n\n[List of logic symbols - List of symbols used to express logical relations](https://en.wikipedia.org/wiki/List_of_logic_symbols)\n\n[List of logicians](https://en.wikipedia.org/wiki/List_of_logicians)\n\n[Logic puzzle - Puzzle deriving from the mathematics field of deduction](https://en.wikipedia.org/wiki/Logic_puzzle)\n\n[Logical reasoning - Process of drawing correct inferences](https://en.wikipedia.org/wiki/Logical_reasoning)\n\n[Logos - Concept in philosophy, religion, rhetoric, and psychology](https://en.wikipedia.org/wiki/Logos)\n\n[Vector logic](https://en.wikipedia.org/wiki/Vector_logic)\n\n[a. However, there are some forms of logic, like imperative logic, where this may not be the](https://en.wikipedia.org/wiki/Imperative_logic)\n\ncase. [42]\n\nb. Conductive arguments present reasons in favor of a conclusion without claiming that the\n\nreasons are strong enough to decisively support the conclusion.\n\n1. Velleman 2006, pp. 8, 103.\n\n2. Vickers 2022.\n\n3. Nunes 2011, pp. 2066- 2069.\n\n4. Pépin 2004, Logos; Online Etymology Staff.\n\n5. Hintikka 2019, lead section, §Nature and varieties of logic.\n\n6. Hintikka 2019, §Nature and varieties of logic; Haack 1978, pp. 1- 10, Philosophy of logics;\n\nSchlesinger, Keren-Portnoy & Parush 2001, p. 220.\n\n7. Hintikka & Sandu 2006, p. 13; Audi 1999b, Philosophy of logic; McKeon.\n\n8. Blair & Johnson 2000, pp. 93- 95; Craig 1996, Formal and informal logic.\n\n[9. Craig 1996, Formal and informal logic; Barnes 2007, p. 274; Planty-Bonjour 2012, p. 62 (htt](https://books.google.com/books?id=0EpFBgAAQBAJ&pg=PA62)\n\n[ps://books.google.com/books?id=0EpFBgAAQBAJ&pg=PA62); Rini 2010, p. 26 (https://boo](https://books.google.com/books?id=vard024vjFgC&pg=PA26)\n\n[ks.google.com/books?id=vard024vjFgC&pg=PA26).](https://books.google.com/books?id=vard024vjFgC&pg=PA26)\n\n10. MacFarlane 2017; Corkum 2015, pp. 753- 767; Blair & Johnson 2000, pp. 93- 95; Magnus\n\n2005, pp. 12- 4, 1.6 Formal languages.\n\n11. McKeon; Craig 1996, Formal and informal logic.\n\n12. Hintikka & Sandu 2006, p. 13.\n\n13. Magnus 2005, Proofs, p. 102.\n\n14. Hintikka & Sandu 2006, pp. 13- 16; Makridis 2022, pp. 1- 2; Runco & Pritzker 1999, p. 155.\n\n15. Gómez-Torrente 2019; Magnus 2005, 1.5 Other logical notions, p. 10.\n\n16. Hintikka & Sandu 2006, p. 16.\n\n17. Honderich 2005, logic, informal; Craig 1996, Formal and informal logic; Johnson 1999,\n\npp. 265- 268.\n\n18. Craig 1996, Formal languages and systems; Simpson 2008, p. 14.\n\n19. Craig 1996, Formal languages and systems.\n\n### **References**\n\n#### **Notes**\n\n#### **Citations**", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" - }, - { - "text": "[Gottlob Frege's ](https://en.wikipedia.org/wiki/Gottlob_Frege) *[Begriffschrift](https://en.wikipedia.org/wiki/Begriffschrift)*\n\nintroduced the notion of quantifier in\n\na graphical notation, which here\n\nrepresents the judgment that\n\nis true.\n\nmathematics, it does not include logical vocabulary relevant to many other topics of philosophical\n\nimportance. Examples of concepts it overlooks are the contrast between necessity and possibility and the\n\nproblem of ethical obligation and permission. Similarly, it does not address the relations between past,\n\npresent, and future. [119] Such issues are addressed by extended logics. They build on the basic intuitions\n\nof classical logic and expand it by introducing new logical vocabulary. This way, the exact logical\n\n[approach is applied to fields like ethics or epistemology that lie beyond the scope of mathematics.](https://en.wikipedia.org/wiki/Ethics) [120]\n\n[Propositional logic comprises formal systems in which formulae are built from atomic propositions using](https://en.wikipedia.org/wiki/Atomic_propositions)\n\n[logical connectives. For instance, propositional logic represents the conjunction of two atomic](https://en.wikipedia.org/wiki/Conjunction_(logic))\n\npropositions and as the complex formula . Unlike predicate logic where terms and predicates\n\nare the smallest units, propositional logic takes full propositions with truth values as its most basic\n\ncomponent. [121] Thus, propositional logics can only represent logical relationships that arise from the\n\nway complex propositions are built from simpler ones. But it cannot represent inferences that result from\n\nthe inner structure of a proposition. [122]\n\nFirst-order logic includes the same propositional connectives as\n\npropositional logic but differs from it because it articulates the\n\ninternal structure of propositions. This happens through devices\n\nsuch as singular terms, which refer to particular objects,\n\n[predicates, which refer to properties and relations, and quantifiers,](https://en.wikipedia.org/wiki/Predicate_(mathematical_logic))\n\nwhich treat notions like \"some\" and \"all\". [123] For example, to\n\nexpress the proposition \"this raven is black\", one may use the\n\npredicate for the property \"black\" and the singular term\n\nreferring to the raven to form the expression . To express that\n\nsome objects are black, the existential quantifier is combined\n\nwith the variable to form the proposition . First-order logic contains various rules of inference\n\nthat determine how expressions articulated this way can form valid arguments, for example, that one may\n\ninfer from . [124]\n\nExtended logics are logical systems that accept the basic principles of classical logic. They introduce\n\n[additional symbols and principles to apply it to fields like metaphysics, ethics, and epistemology.](https://en.wikipedia.org/wiki/Epistemology) [125]\n\n[Modal logic is an extension of classical logic. In its original form, sometimes called \"alethic modal](https://en.wikipedia.org/wiki/Modal_logic)\n\nlogic\", it introduces two new symbols: expresses that something is possible while expresses that\n\nsomething is necessary. [126] For example, if the formula stands for the sentence \"Socrates is a\n\nbanker\" then the formula articulates the sentence \"It is possible that Socrates is a banker\". [127] To\n\ninclude these symbols in the logical formalism, modal logic introduces new rules of inference that govern\n\n##### **Propositional logic**\n\n##### **First-order logic**\n\n#### **Extended**\n\n##### **Modal logic**", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia1.pdf" - }, - { - "text": "incoming information. [154] Correct reasoning and the arguments it is based on follow the laws of\n\n[probability, for example, the principle of conditionalization. Bad or irrational reasoning, on the other](https://en.wikipedia.org/wiki/Bayesian_epistemology#Principle_of_conditionalization)\n\nhand, violates these laws. [155]\n\nLogic is studied in various fields. In many cases, this is done by applying its formal method to specific\n\ntopics outside its scope, like to ethics or computer science. [156] In other cases, logic itself is made the\n\nsubject of research in another discipline. This can happen in diverse ways. For instance, it can involve\n\ninvestigating the philosophical assumptions linked to the basic concepts used by logicians. Other ways\n\ninclude interpreting and analyzing logic through mathematical structures as well as studying and\n\ncomparing abstract properties of formal logical systems. [157]\n\n*Philosophy of logic* is the philosophical discipline studying the scope and nature of logic. [59] It examines\n\nmany presuppositions implicit in logic, like how to define its basic concepts or the metaphysical\n\nassumptions associated with them. [158] It is also concerned with how to classify logical systems and\n\n[considers the ontological commitments they incur.](https://en.wikipedia.org/wiki/Ontological) [159] *Philosophical logic* is one of the areas within the\n\nphilosophy of logic. It studies the application of logical methods to philosophical problems in fields like\n\nmetaphysics, ethics, and epistemology. [160] This application usually happens in the form of extended or\n\ndeviant logical systems. [161]\n\nMetalogic is the field of inquiry studying the properties of formal logical systems. For example, when a\n\nnew formal system is developed, metalogicians may study it to determine which formulas can be proven\n\n[in it. They may also study whether an algorithm could be developed to find a proof for each formula and](https://en.wikipedia.org/wiki/Algorithm)\n\nwhether every provable formula in it is a tautology. Finally, they may compare it to other logical systems\n\nto understand its distinctive features. A key issue in metalogic concerns the relation between syntax and\n\nsemantics. The syntactic rules of a formal system determine how to deduce conclusions from premises,\n\ni.e. how to formulate proofs. The semantics of a formal system governs which sentences are true and\n\nwhich ones are false. This determines the validity of arguments since, for valid arguments, it is\n\nimpossible for the premises to be true and the conclusion to be false. The relation between syntax and\n\nsemantics concerns issues like whether every valid argument is provable and whether every provable\n\n[argument is valid. Metalogicians also study whether logical systems are complete, sound, and consistent.](https://en.wikipedia.org/wiki/Consistency)\n\n[They are interested in whether the systems are decidable and what expressive power they have.](https://en.wikipedia.org/wiki/Expressive_power_(computer_science))\n\nMetalogicians usually rely heavily on abstract mathematical reasoning when examining and formulating\n\nmetalogical proofs. This way, they aim to arrive at precise and general conclusions on these topics. [162]\n\nThe term \"mathematical logic\" is sometimes used as a synonym of \"formal logic\". But in a more\n\n[restricted sense, it refers to the study of logic within mathematics. Major subareas include model theory,](https://en.wikipedia.org/wiki/Model_theory)\n\n[proof theory, set theory, and computability theory.](https://en.wikipedia.org/wiki/Computability_theory) [164] Research in mathematical logic commonly\n\naddresses the mathematical properties of formal systems of logic. However, it can also include attempts\n\n### **Areas of research**\n\n#### **Philosophy of logic and philosophical logic**\n\n#### **Metalogic**\n\n#### **Mathematical logic**", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed8.pdf", - "query": "What was the mean correctness score for LLM-generated handoff notes ?", - "target_page": 7, - "target_passage": "Correctness 4.52", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "##### **Original Investigation | Emergency Medicine**\n\n## DevelopingandEvaluatingLargeLanguageModel- GeneratedEmergencyMedicine HandoffNotes\n\nVince Hartman, MS; Xinyuan Zhang, PhD; Ritika Poddar, MS; Matthew McCarty, MD; Alexander Fortenko, MD, MPH; Evan Sholle, MS; Rahul Sharma, MD, MBA;\n\nThomas Campion Jr, PhD; Peter A. D. Steel, MA, MBBS\n\n### **Abstract**\n\n**IMPORTANCE** An emergency medicine (EM) handoff note generated by a large language model\n\n(LLM) has the potential to reduce physician documentation burden without compromising the safety\n\nof EM-to-inpatient (IP) handoffs.\n\n**OBJECTIVE** To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and\n\nsafety compared with physician-written notes.\n\n**DESIGN, SETTING, AND PARTICIPANTS** This cohort study used EM patient medical records with\n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical\n\nCenter. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated\n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented\n\nunderstudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers\n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE])\n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written\n\nnotes were compared. Data were analyzed from October 2023 to March 2024.\n\n**EXPOSURE** LLM-generated EM handoff notes.\n\n**MAIN OUTCOMES AND MEASURES** LLM-generated handoff notes were evaluated for (1) lexical\n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with\n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness,\n\nusefulness, and implications for patient safety using a novel framework.\n\n**RESULTS** In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9\n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher\n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456),\n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by\n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD)\n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean\n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written).\n\nNone of the LLM-generated summaries were classified as a critical patient safety risk.\n\n**CONCLUSIONS AND RELEVANCE** In this cohort study of 1600 EM patient medical records,\n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written\n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness\n\n*(continued)*\n\n#### **Key Points**\n\n**Question** Can a large language model\n\n(LLM) generate emergency medicine\n\n(EM)-to-inpatient (IP) handoff notes\n\nthat are useful and safe for EM care?\n\n**Findings** In this cohort study of 1600\n\nEM patient medical records using a\n\nnovel evaluation framework, the\n\nLLM-generated EM-to-IP handoff notes\n\nhad a mean usefulness of 4.04 out of 5\n\n(compared with 4.36 for\n\nphysician-written) and a mean patient\n\nsafety of 4.06 out of 5 (compared with\n\n4.50 for physician-written) with no\n\ncritical patient safety risks.\n\n**Meaning** These findings suggest the\n\nvalue of a manual, patient safety-\n\nfocused clinical evaluation of LLM\n\nmodels and the potential of\n\nLLM-generated handoff notes to create\n\na new standard of care in EM.", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed8.pdf" - }, - { - "text": "evaluation frameworks may not address the anticipated effect LLM performance limitations could\n\nhave on patient safety. 38-41\n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate\n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care\n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP\n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in\n\n[Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) ). We fine-tune pretrained LLMs on well curated datasets of structured and\n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the\n\ncorrectness of model generations and customized the summaries in a structured format designed\n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel\n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’\n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies.\n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting\n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient\n\nsafety-focused clinical evaluation framework and automated benchmark-driven methods. We used\n\nthe physician-written EM-to-IP handoff notes as the active control and used the scores from both\n\nevaluation frameworks for the margin of inferiority of the intervention.\n\n### **Methods**\n\n#### **Data Collection**\n\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was\n\nconducted at an urban academic 840-bed quaternary-care hospital in New York City, with\n\napproximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600\n\nindividual EM patient encounters leading to acute hospital admission were randomly selected from\n\nvisits occurring between April and September of 2023. We limited our analysis to EM patient\n\nencounters occurring after April 2023, as the study site had updated the EM-handoff at that time.\n\nEncounters before this date used an earlier version of the EM-handoff note that would have provided\n\nsuboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then\n\ngenerated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants),\n\nWeill Cornell Medicine IRB approved a waiver of informed consent because the study used\n\nretrospective data and posed minimal risk to patients. We used Strengthening the Reporting of\n\nObservational Studies in Epidemiology ( [STROBE](http://www.equator-network.org/reporting-guidelines/strobe/) ) reporting guidelines.\n\n#### **EM-to-IP Handoff Note Template**\n\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff\n\nnote structure used at the study site. The generated EM handoff note consists of components\n\ngenerated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult\n\norders, and radiology impressions) and components generated by the trained abstractive\n\nsummarization model (history of present illness [HPI], differential diagnoses, immediate care plans,\n\nin-ED events, and disposition). Each summary also included a header with the timestamp of ED triage\n\nand discharge, patient’s birth date, patient’s unique identifier, patient’s encounter number, and the\n\ntotal time of patient’s stay in the ED.\n\n#### **Data Curation for Automated ED Note Generation**\n\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule-", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "curation (4.24 [0.58] vs 4.76 [0.48]), readability (4.00 [0.64] vs 4.64 [0.49]), correctness (4.52\n\n[0.64] vs 4.90 [0.39]), and patient safety (4.06 [0.86] vs 4.50 [0.56]).\n\nIn extrapolating the estimated worst-case scenario impact of these performance gaps on\n\npatient safety, the 3 expert clinicians determined none of the identified model performance issues\n\nwere anticipated to create a level 1 (life-threatening) safety event (see examples of worst case\n\nscenarios in eTable 2 in [ Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) ). While the incompleteness and faulty logic identified in the\n\nautomated summaries received mean (SD) safety scores of 4.20 (0.93) and 4.60 (0.75), respectively;\n\n13 (8.7%) and 11 (7.3%) of these events, respectively, were determined to have the potential to create\n\na level 2 patient safety event following EM-to-IP handoff, substantially higher compared with the\n\nphysician-written summaries (0%). All of the 5 hallucinations had patient safety scores between 4\n\nand 5 and a mean (SD) score of 4.96 (0.14), which is defined as the hallucinations posing mild to no\n\npatient safety risk. LLM-generated notes demonstrated a higher rate of incorrectness (9.6%)\n\ncompared with the physician-written notes (2.0%), although very few hallucinations.\n\nICC were 0.79 for completeness, 0.70 for curation, 0.59 for readability, 0.76 for correctness,\n\nand 0.74 for usefulness. These numbers suggest good reliability of agreement for completeness,\n\ncuration, correctness, and usefulness and suggest fair reliability for readability among the 3 raters.\n\n### **Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned,\n\npretrained LLM and rule-based approaches within an end user- developed note template. It is\n\nimportant to note that (largely due to time constraints within the EM care delivery model) the\n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s\n\nunique electronic handoff process enabled a comparison between physician-written and\n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested\n\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)- Generated and Physician-Written\n\nCriteria\n\nLLM-generated Physician-written\n\nMean score (SD)\n\nLikert rating 1-5, No. (%) a\n\nMean score (SD)\n\nLikert rating 1-5, No. (%) a\n\n1 2 3 4 5 1 2 3 4 5\n\nCompleteness 4.00 (0.88) 0 12 (8) 31 (20.7) 69 (46) 38 (25.3) 4.16 (0.84) 0 3 (2) 31 (20.7) 48 (32) 68 (45.3)\n\nCuration 4.24 (0.58) 0 1 (0.7) 13 (8.7) 85 (56.7) 51 (34) 4.76 (0.48) 0 0 6 (4) 39 (26) 105 (70)\n\nReadability 4.00 (0.64) 0 8 (5.3) 17 (11.3) 87 (58) 38 (25.3) 4.64 (0.49) 0 0 5 (3.3) 38 (25.3) 107 (71.3)\n\nCorrectness 4.52 (0.64) 0 0 13 (8.7) 39 (26) 98 (65.3) 4.90 (0.39) 0 0 2 (1.3) 12 (8) 136 (90.7)\n\nUsefulness 4.04 (0.86) 0 12 (8) 30 (20) 59 (39.3) 49 (32.7) 4.36 (0.71) 0 5 (3.3) 13 (8.7) 53 (35.3) 79 (52.7)\n\na Likert scores and score distributions over 50 notes for 3 annotators. There are no 1 ratings for either physician or LLM summaries in the 150 evaluation results.\n\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)- Generated and Physician-Written\n\nCriteria\n\nLLM-generated Physician-written\n\nMean (SD)\n\nLikert score 1-5, No. (%) a\n\nMean (SD)\n\nLikert score 1-5, No. (%) a\n\n1 2 3 4 5 1 2 3 4 5\n\nCompleteness 4.20 (0.93) 0 13 (8.7) 19 (12.7) 58 (38.7) 60 (40) 4.50 (0.65) 0 0 17 (11.3) 43 (28.7) 90 (60)\n\nCuration 4.82 (0.32) 0 1 (0.7) 3 (2) 21 (14) 125 (83.3) 4.90 (0.31) 0 0 3 (2) 8 (5.3) 139 (92.7)\n\nReadability 4.74 (0.37) 0 1 (0.7) 6 (4) 23 (15.3) 120 (80) 4.94 (0.14) 0 0 0 10 (6.7) 140 (93.3)\n\nCorrectness: hallucination 4.96 (0.14) 0 0 0 5 (3.3) 145 (96.7) 5.00 0 0 0 0 150 (100)", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" - }, - { - "text": "subsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written\n\nnote and (2) the LLM-generated note.\n\nOn a Likert scale of 1 to 5, where 1 is unacceptable and 5 is excellent, the 3 physicians rated the\n\ncompleteness, curation, readability, and correctness of the summary as shown in eTable 1 in\n\n[Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) . Physicians rated the usefulness of the summary, defined as the capability of the\n\nsummary being incorporated into a workflow where a physician would make edits before final\n\ncompletion, mitigating potential future self-referential learning loops and the downstream adverse consequences. 51 Likewise, the raters assessed potential patient safety implications of unmitigated\n\nmodel errors using a scale from 1 to 5, where 1 denotes life-threatening risks and 5 denotes no\n\nidentified patient safety risk for completeness, curation, readability, and the 4 subcategories within\n\ncorrectness (hallucination, faulty logic, knowledge gap, and bias), as well as the overall patient safety risk. 45 Evaluators arrived at prestudy consensus that a usefulness Likert score of at least a 3 out of 5\n\nindicated that the LLM-generated summary likely demonstrated baseline acceptability for such a\n\nworkflow. To extrapolate a theoretical worst case scenario, the physicians rated the safety of the\n\nLLM-generated summary as defined as the capability of the summary to fully replace a physician-\n\nwritten note (unmitigated).\n\nTo improve consistency and agreement, the 3 reviewers met to familiarize themselves with the\n\nframework and evaluated 10 separate cases from the test dataset that were not included in the\n\nclinical evaluation results. Additionally, after independently scoring the summaries, they met to\n\nensure consensus interpretation of the multidimensional scoring framework. Interrater reliability was\n\ncalculated using intraclass correlation coefficient (ICC), using a 2-way random effects model for\n\nconsistency with the Pingouin statistical package version 0.5.4 in Python (Python Software\n\nFoundation). The ICC measures the similarity of the 3 raters to confirm the consistency and validity\n\nof the evaluation protocol; the scores are from 0 to 1, where 1 indicates unanimous agreement and 0 represents no agreement. 52 Data were analyzed from October 2023 to March 2024.\n\n### **Results**\n\n#### **Automated Tasks**\n\nOf 1600 patients, the mean (SD) age was 59.8 (18.9) years and 832 (52%) were female. In **Table 2** ,\n\nROUGE and BERTScore compare the summaries with the testing set from our annotations, and\n\nSCALE score compares the summaries with the source notes. From automatic evaluation results, we\n\nobserved that LLM-generated summaries had better scores than the physician summaries, such that\n\nROUGE-2 was 0.322 vs 0.088, BERT-precision was 0.859 vs 0.796, and SCALE was 0.691 vs 0.456,\n\nsuggesting the LLM-generated summaries were more similar and more detailed than the physician\n\nsummaries.\n\n#### **Clinical Evaluation Tasks**\n\nThe clinical evaluation results for LLM-generated summaries and physician-written summaries are\n\nshown in **Table 3** and **Table 4** . The mean clinical quality scores of the automated summaries are in a\n\ncomparable range (4-5) to those of the physician summaries. However, the automated summaries\n\nwere observed to be of lower quality compared with the physician-written summaries with regards\n\nto mean (SD) usefulness (4.04 [0.85] vs 4.36 [0.71]), completeness (4.00 [0.88] vs 4.16 [0.84]),\n\nTable 2. Automated Evaluation Scores, Large Language Model (LLM)- Generated and Physician-Written\n\nSummary type R-1 a R-2 a R-L a BERT-p BERT-r SCALE\n\nLLM-generated 0.494 0.322 0.391 0.859 0.876 0.691", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed8.pdf" - }, - { - "text": "superior performance. However, while the manual clinical evaluation demonstrated the majority of\n\nthe LLM-generated notes were of promising comparative quality (scores of 4-5), they were, on\n\naverage, inferior to the clinician-written notes.\n\nOur novel clinical evaluation’s findings suggest the majority of identified quality limitations and\n\nincorrectness would have minimal impact on patient safety, even when extrapolated to the worst-\n\ncase scenario of the LLM-generated summary content not being reviewed and edited by a clinician\n\nbefore completion. This was designed to address contemporary LLM concerns of user trust, reliance and expertise. 49 As such, none of the incorrect output text elements reached life-threatening risk.\n\nHowever, incompleteness and faulty logic identified in the automated summaries were not always\n\nnegligible, with just under 1 in 10 of these performance gaps determined to have the potential to\n\ncreate significant patient safety risk compared with the physician-written summaries. These critical\n\nimplementation safety findings will inform (1) directionality of further model refinement; (2) further\n\nclinical evaluation of postrefinement model output; and (3) irrespective of downstream model\n\nperformance, an EHR-implementation plan constrained to a user-interface design that will allow EM\n\nclinicians to review and edit the LLM-generated handoff note as a draft before finalizing (see\n\neAppendix 1 in [ Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) ). This physician-in-the-loop process has also been identified as critical\n\nin other recent work implementing LLMs into clinical workflows. 29,53\n\nWhile the automated methods of SCALE and MPNet-based sentence transformers\n\ndemonstrated a cursory view of the faithfulness performance of the models, the clinical evaluation\n\nprovided the nuanced context of the true factuality of our system on a word by word level. When\n\ncomparing with the source notes, the automatic evaluations rewarded the summaries with more\n\ndetails, more semantic similarities, and more entailment logics, while physician-written notes tended\n\nto be more concise with more shortcuts and clinical jargon, which are penalized by automatic\n\nevaluation metrics. In addition, LLM-generated summaries are completely based on the source\n\nnotes, while physician-written summaries are often composed with additional knowledge that\n\ncannot be found from the source notes.\n\nThe divergence of the automated and clinical evaluation results of an LLM intended for\n\nintegration into a critical clinical workflow is an important finding. First, this observed finding\n\nvalidates the importance of clinical evaluations in addition to conventional automated evaluations to determine accuracy. 54 While other LLM clinical evaluation frameworks have been described to\n\nmeasure conventional model output quality categories (such as incorrectness domains and other performance gaps), 30,35 to our knowledge, our novel framework is the first to incorporate\n\nanticipated patient safety implications for each individual category deficiency.\n\n#### **Limitations**\n\nThere were several limitations to the study that were primarily driven from constraints of\n\ninfrastructure, as well as regulations, legal governance, and labor requirements. At the study location,\n\nthe data were required to remain on premise at all times and the infrastructure that was provided\n\nhad a GPU limitation of 24 GB. Given these infrastructure restrictions, the best open-source model\n\navailable during the study was LLM 2. Furthermore, we were not able to demonstrate the comparable difference between our fine-tuned LLM 2 model and third party LLMs 32,55 because of the study", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed8.pdf" - }, - { - "text": "total time of patient’s stay in the ED.\n\n#### **Data Curation for Automated ED Note Generation**\n\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule-\n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail\n\nin eAppendix 1 in [ Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) . The rule-based framework was designed by the 3 board certified EM\n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in **Table 1** :\n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The\n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for\n\n##### **JAMA Network Open | Emergency Medicine**\n\nDecember 3, 2024 3/12", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" - }, - { - "text": "LLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3\n\nboard certified emergency medicine physician leaders with experience in formal quality and patient\n\nsafety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and\n\nannotation. As the task of EM-handoff note generation is not dependent on racial characteristics of\n\nthe patients, we removed all mentions of race during the annotation stage as a means to avoid race\n\nbias; therefore, the model was trained to generate text without race-based assumptions. Although\n\nresource intensive, a small and carefully curated dataset of at least 1000 examples has been shown to be sufficient to produce remarkable results for the language model chosen. 42 Given the size of\n\nour dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data\n\nplaced in the training set and eschewed a validation set to lower the variance of the models. We used\n\nk-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter\n\noptimization of the LLMs.\n\n#### **Models**\n\nFor this study, we chose the LLMs Robustly Optimized BERT Approach (RoBERTa; hereafter referred to as LLM 1) 43 for saliency content selection and Large Language Model Meta AI 2 (Llama-2; hereafter referred to as LLM 2) 7B 44 for abstractive summarization. Further information about the models and\n\ntechnology specifications is provided in detail in eAppendix 1 in [ Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) .\n\n**Data Processing** As LLM 2 only has a context size of 4096 tokens, 44 we used 2 steps to process the EM notes to both\n\nshorten the input size while maintaining content salience. First, we adopted a number of heuristic\n\nstrategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2)\n\ntime of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1- based saliency\n\nmodel to infer EM note sentences based on likelihood of content contribution to the EM-to-IP\n\nhandoff notes.\n\n#### **Model Training and Inference**\n\nOur summarization model is a fine-tuned decoder-only causal language model based on LLM 2. We\n\nused different prompts for the separate types of summarization: HPI and EM handoff. Additional\n\ninformation about the model training and inference process is provided in eAppendix 1 in\n\n[Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) .\n\nUsing a combination of generative AI powered by our fine-tuned LLM 2 model and a set of\n\nheuristic rules, our summarization system produced ED handoff notes with various sections for\n\ndownstream clinical tasks. The inference process is shown in the **Figure** .\n\nTable 1. Types of Data Included From the Emergency Department (ED) Patient Electronic Health Record a\n\nType of data Description\n\nDescriptive Date of birth, medical record number, encounter number, and total time of stay in ED\n\nEncounter ED arrival date and time, IP admit date and time\n\nLaboratory tests (only if abnormal) Examples: β-human chorionic gonadotropin hormone, all serum drug levels (alcohol level, salicylate level, Tylenol level), magnesium, lipase, and erythrocyte sedimentation rate\n\nNotes (in order of hierarchy) EM clinician notes, consultation notes, EM progress notes, and EM procedure notes\n\nVitals Height, weight, temperature, heart rate, blood pressure, and peripheral capillary oxygen saturation\n\nOrders Medications, consults, and radiology results\n\nAbbreviations: EM, emergency medicine; IP, inpatient.\n\na Automated EM handoff notes are generated from", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" - }, - { - "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of responses [31, 45, 57, 58].\n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes do. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying models to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, but route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference costs by using fewer and/or less complex underlying models.\n\n**Applications of LLM routers.** A key use case for LLM routers is to help LLM-based application reduce cost. Several commercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a few lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The service selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant cost savings: up to 98% in the case of Martian [5], and 10 *×* in the case of NotDiamond [7].\n\n## **3 LLM Control Plane Integrity**\n\nIn this section, we define *LLM control plane integrity* . Informally, it means that decisions made about underlying LLM queries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus on one class of control plane: predictive LLM routing as used to manage cost.\n\n**Formalizing control planes.** An LLM control plane *R* *ω* is a potentially randomized algorithm. It is parameterized by a string *ω* , called the parameters. It utilizes some number *n* of LLMs denoted by *M* . We will mostly focus on the case of *n* = 2 , and, for reasons that will be clear in a moment, use *M* s (“strong”) and *M* w (“weak”) to denote the two underlying LLMs. Then inference on an input *x* *∈X* for some set *X* of allowed queries is performed by computing a response via *y* *←* $ *R* *M* *ω* ( *x* ) . Here we use ** $ to denote running *R* with fresh random coins; we use ** when *R* is deterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control planes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a function of a sequence of queries and responses.\n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying LLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive control plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, predictive binary routers use relatively simple classifiers to determine which of *M* s or *M* w should be used to respond to a query.\n\n**Inference flow.** Given a set of LLMs *M* , a control plane *R* *ω* , and an input *x* , an LLM inference flow is the sequence of LLM invocations *M* *i* *j* ( *z* *j* ) for 1 *≤* *j* *≤* *m* and *i* *j* *∈{* w *,* s *}* made when executing *R* *M* *ω* ( *x* ) . Here *m* is the total number of LLM invocations, and *z* 1 *, . . . , z* *m* are the queries made to the underlying LLMs. Should *R* be randomized, the sequence and its length are random variables. An inference flow can be written as a transcript\n\n*T* = ( *i* 1 *, z* 1 ) *,* ( *i* 2 *, z* 2 ) *, . . . ,* ( *i* *m* *, z* *m* )", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "through building larger-parameter models trained on trillions of datasets, and then instruction fine- tuning the LLM on smaller, well-curated datasets. 32,33 LLMs can also be designed with explainability by citing inferred content back to the reference source notes. 34 For short-context length notes, using\n\nfew-shot prompt engineering approaches with large language models like GPT-4 can produce\n\nsummaries that outperform standard physician documentation in completeness and error frequency. 35 However, factual inconsistencies in the summaries produced by LLMs increase as the context length increases, 36 and for medium- to long-context tasks, fine-tuning an open-source model has been shown to perform better than a prompt-learning approach. 37 In prior work,\n\nmembers of this study team demonstrated 62% of LLM-generated hospital course summaries met standard-of-care for a formal inpatient discharge summary. 24 However, recently published clinical\n\n##### **JAMA Network Open | Emergency Medicine**\n\nDecember 3, 2024 2/12", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - }, - { - "text": "*Abstract (continued)*\n\nand safety via a novel evaluation framework. This study suggests the importance of a physician-in-\n\nloop implementation design for this model and demonstrates an effective strategy to measure\n\npreimplementation patient safety of LLM models.\n\n*JAMA Network Open.* 2024;7(12):e2448723. doi: [10.1001/jamanetworkopen.2024.48723](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723)\n\n### **Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of clinical responsibility, have been identified as a critical source of medical errors. 1,2 The Joint\n\nCommission, the Accreditation Council for Graduate Medical Education, and the Association of\n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized handoff processes to address the substantial patient risk of this ubiquitous event. 3,4 Implementing handoff tools has previously demonstrated significant reductions in medical errors. 5,6 High-quality\n\nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by medical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints. 7-10 The\n\nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly\n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff systems. 11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with\n\nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high\n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most desired assistive tool in improving ED transitions of care. 15-18 Limited work to date has demonstrated EM electronic handoff tools as feasible, efficient, and effective. 19-21 In April 2023, EM and internal\n\nmedicine leadership of the study site collaboratively developed and launched a mandatory,\n\nEHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real-\n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal\n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured\n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of\n\nthe handoff notes.\n\nIn recent years there has been an accelerated interest in using LLMs to automate clinical tasks in an effort to unburden physicians and reduce burnout. 22 Computer-generated text within clinical\n\nnotes using natural language processing (NLP) have been overall shown to improve note completion rates, physician satisfaction, and patient outcomes. 23 Since 2018, NLP has made rapid advancements\n\nin health care with the discovery of the transformer model architecture, the building block of large language models (LLMs). LLMs can automate workflows such as discharge summaries, 24 radiology reports, 25 patient messaging, 26 after-visit summaries, 27 and ambient dictation 28 with various levels of perceived quality in each workflow. 29 LLMs are particularly effective at summarizing large unstructured clinical datasets, such as ED patient medical records. 30 A common concern of LLMs is\n\ntheir ability to hallucinate data, or LLMs generating output text that is not factually consistent with the original source content. 31 Much work has been done in health care to reduce hallucinations", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" - } - ] - }, - { - "references": { - "source_file": "legal1_opengouvernementlicense.pdf", - "query": "What are the improvements made to possible to the HadGEM3 and CMIP5 climate change models by UKCP18 ?", - "target_page": 1, - "target_passage": "mprovements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena ", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "**4** Rather than using the original CMIP5 ensemble as in previous studies, the aim is to allow for\n\nan improved representation of atmospheric and land surface processes including extremes by\n\nusing higher spatial resolution [ 11 ].\n\nHadGEM3 (Hadley Centre Global Environment Model version 3) is a configuration of the UK\n\nMet Office Unified Model (MetUM) which has been developed for use for both climate research\n\nand weather prediction applications. It is the result of converging the development of the Met\n\nOffice’s weather and climate global atmospheric model components so that, where possible,\n\natmospheric processes are modelled or parametrized seamlessly across spatial resolutions and\n\ntimescales.\n\nThe high-resolution simulations were performed using the HadGEM3A Global Atmosphere\n\n(GA) 3.0 model [ 12 - 14 ] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with\n\ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of\n\nthe HadGEM3-GC2 coupled climate model [ 15 , 16 ], which is part of the HadGEM3 family of\n\nclimate models [ 12 ]. This represents the third generation of HadGEM configurations, leading\n\non from the HadGEM2 family of climate model configurations [ 13 ] which was used for CMIP5.\n\nKey improvements over the previous model, HadGEM2, include increased vertical levels in the\n\natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [ 17 ].\n\nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met\n\nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution\n\nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher\n\nresolution [ 18 , 19 ].\n\nWe ran the model using only its atmosphere and land components, with time-varying sea-\n\nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This\n\napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications\n\nof the higher resolution for projections of climate extremes and impacts—an atmosphere-\n\nonly simulation requires considerably less computing time than a coupled ocean- atmosphere\n\ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in\n\nregional climate changes by using SSTs and SICs from different climate models. To explore these\n\nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric\n\nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5\n\nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial\n\ninfluence on regional patterns of climate change over land, so using a range of SST and SIC\n\npatterns in a single atmosphere model goes some way towards representing the range of regional\n\nclimate changes that would arise in a set of different coupled ocean- atmosphere GCMs. This\n\napproach will not capture the full range of uncertainty affecting regional climate changes over\n\nland, because it still relies on one atmosphere model and one land surface scheme, so responses\n\nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions\n\nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that\n\nour experimental design avoids the reliance on one single realization of climate and hence allows\n\nsome of the uncertainties in regional climate-change impacts to be illustrated and explored.\n\nThe SSTs and SICs were taken from a subset of the CMIP5 transient projections performed with\n\nthe RCP8.5 scenario from 1979 to 2100—the CMIP5 members were selected as representative of a\n\nrange of outcomes for future climate change, including high and low climate sensitivity, different\n\nbiases in baseline precipitation climatology, and different global patterns of precipitation change.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "**23**\n\nIPSL-CM5A-LR GFDL-ESM2M\n\nIPSL-CM5A-MR\n\n0\n\n%\n\n5 - 5 - 10 - 15 - 20 10 15 20\n\nensemble mean\n\nMIROC-ESM-CHEM ACCESS1-0\n\nHadGEM2-ES\n\n**Figure20.** Differencebetween2 ° Cand1.5 ° Cglobalwarminginpercentagechangesinmean(top)run-offinJULESsimulations\n\ndrivenbytheensembleofHadGEM3simulations.Notethattheuseofpercentagechangesemphasizeschangesinregionswhere\n\nthe baseline streamflow is small.\n\nThe largest regional differences between 2°C and 1.5°C global warming tend to be in the\n\nregions where the local impact is largest relative to the baseline. For TXx this is generally the mid-\n\nlatitudes, whereas for TX90p it is generally the tropics. So, broadly, the impacts at 1.5°C global\n\nwarming could be estimated by scaling-back the impacts at 2°C.\n\nThese results show some similarities with those from the CMIP5 models [ 9 , 38 ], but also some\n\nnotable differences. The CMIP5 models were at lower spatial resolution than the models used\n\nhere. Although the general patterns of change in TXx are broadly similar in our study and\n\nCMIP5, with greater warming in many continental interiors, is notable that our results show more\n\nmarked geographical variation than those from CMIP5 projections ([ 9 ], among others), with the\n\ncontinental interior warming being more intense in our projections. In particular, our results with\n\nHadGEM3 show more intense increases in maximum temperature in North America and Europe.\n\nOur projections of changes in consecutive dry days (CDD) broadly consistent with those found\n\nin a subset of the CMIP5 ensemble [ 9 ], although there are some differences. Our ensemble mean\n\nsuggests shorter dry spells in the central Amazon, whereas ISIMIP-indicated longer dry spells.\n\nAlso, as with the temperature indices, our results show greater geographical differentiation in the\n\nintensity of changes.\n\nThe decrease in Rx5day in some regions in our simulations contrasts with the subset of\n\nCMIP5 models used for the ISIMIP Fast-Track projections [ 9 ] which suggested an increase in\n\nRx5day almost everywhere where at least 66% of the model ensemble agreed on the sign of the\n\nchange, including all of northern South America. The reasons for these differences require further\n\ninvestigation, but some insight into possible reasons may be gained by examining the similarities\n\nand differences between our own individual ensemble members.\n\nFor all the CLIMPAct variables, the variations in global means between the ensemble members\n\nwere consistent at 1.5°C and 2°C. That is, the members with the largest changes at 2°C also showed\n\nthe largest changes at 1.5°C, and the same was true for the smallest changes, and the relative\n\nproportions of changes in other ensemble members. This suggests that variations between the\n\nensemble members at any particular GWL were not merely a consequence of internal variability", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed11.pdf" - }, - { - "text": "1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of\n\nclimate change on their operations and present proposals for adaptation. **https://www.gov.uk/government/collections/climate-change-**\n\n**adaptationreporting-second-round-reports**\n\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the\n\nCommittee on Climate Change (ASC): **https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate\n\nchange on their operations and present proposals for adaptation: **https://www.gov.uk/government/collections/climate-change-adaptation-**\n\n**reporting-second-round-reports**\n\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate\n\nchange to be assessed consistently over larger study areas.\n\n5 **http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n\n6 Coupled model intercomparison project phase 5, see **http://cmip-pcmdi.llnl.gov/cmip5/**\n\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25,\n\n5791- 5806 (2012) **http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**\n\n## **UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n#### What is UKCP18\n\n#### and why do we need it?\n\nFollowing the historic Paris Agreement on Climate\n\nChange in December 2015, the Department of\n\nEnvironment, Food and Rural Affairs announced a\n\nmajor upgrade to the UK Climate Projections.\n\nThe UKCP18 project will build upon the current set\n\nof projections (UKCP09) to provide the most up-to-\n\ndate assessment of how the climate of the UK may\n\nchange over the 21st century. This information\n\nwill be essential to future Climate Change Risk\n\nAssessments 1 and to equip the UK with information\n\nto help adapt to the challenges and opportunities of\n\nclimate change in line with the National Adaptation\n\nProgramme 2 .\n\nOrganisations and individual users will use UKCP18\n\nto inform risk assessments and adaptation plans\n\nto ensure they are resilient to extreme weather\n\nand climate change. Some organisations will use\n\nUKCP18 in responding to the Adaptation Reporting\n\nPower 3 for example.\n\n#### What improvements\n\n#### does UKCP18 deliver?\n\nUKCP18 will benefit from a range of developments\n\nsince the release of UKCP09, including:\n\n- Greater understanding of user needs as a result\n\nof the adaptation community’s use of UKCP09\n\nprojections and the subsequent feedback - user\n\nworkshops indicated that users supported the\n\ncontinued use of probabilistic projections and the\n\nimportance of spatially coherent information 4 .\n\n- Advances in climate models in recent years, such\n\nas the Met Office Hadley Centre HadGEM3 5 model\n\nand the CMIP5 6 set of models. Improvements\n\ninclude better representation of the past\n\nclimate, the inclusion of more cloud and aerosol\n\nprocesses and the ability to model important\n\nclimate phenomena such as the El-Niño Southern\n\nOscillation (ENSO).\n\n- Groundbreaking Met Office research on\n\nmodelling of extreme events in high resolution\n\nregional climate models 7 .\n\n- The increased quantity and range of observations\n\navailable since 2009.\n\n- Use of the new Met Office supercomputer,\n\nenabling a credible range of climate projections to\n\nbe generated in greater spatial detail.", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "11 SRESA1B: IPCC future scenario based on rapid economic growth and a balance of energy sources\n\n12 30-year means can be created using the UKCP18 PDF data\n\n13 http://www.euro-cordex.net/\n\n## **60KM GLOBAL PROJECTIONS**\n\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the\n\ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of\n\nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated\n\nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These\n\nprojections will be selected to represent a wide range of possible future climate states\n\nto reflect key uncertainties, informing a risk-based approach to planning. They will be\n\ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for\n\ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of\n\nCMIP5 models to provide additional information on uncertainties in the projections relative\n\nto other climate models.\n\n## **25KM PROBABILISTIC PROJECTIONS**\n\n**Captures natural variability and climate change . Updated models and**\n\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for\n\nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be\n\nupdated using an up-to-date collection of Met Office climate simulations and the latest\n\nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest\n\nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for\n\nthe UK at monthly intervals for several emission scenarios, including one used in UKCP09 11 .\n\nThe new probabilistic projections will indicate the range of uncertainty in our knowledge\n\nof the climate system and natural variability through the 21st century, using probability\n\ndensity functions to provide information on how climate varies from month to month. This\n\ncontrasts with UKCP09 for which only 30-year means were provided 12 .\n\n##### **DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n\n**Downscaled versions of the global model for the UK. For the most spatially**\n\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance\n\nto adaptation at two different resolutions. The 12 km model provides a downscaled\n\nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global\n\nmodel and at a higher resolution. This may be especially useful for those interested in\n\nwater availability and some aspects of agriculture. A key reason for providing this data is\n\nthat users will be able to compare it directly with EURO-CORDEX 13 .\n\nThe global projections will also be downscaled to 2.2 km using a process of nesting\n\nmodels at finer resolution that maintains the integrity of the representation of evolving\n\natmospheric processes. Key benefits of simulations at this resolution will be the\n\ninformation provided on high impact events such as localised heavy rainfall in summer and\n\npotential improvements in the diurnal cycle.\n\nThe output will be available at a time resolution of 3-hourly, possibly higher for some\n\noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time\n\nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be\n\nconfirmed.\n\n### **PROJECTIONS OVER LAND**\n\nThe land projections comprise three components:", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "biases in baseline precipitation climatology, and different global patterns of precipitation change.\n\nSpecific levels of global warming such as 1.5°C or 2°C were defined on the basis of the global\n\nmean temperature in the original CMIP5 projections. The time of reaching a specific level of global\n\nwarming, therefore, varied between ensemble members. The CMIP5 SSTs were not bias-corrected,\n\nwhich means that the results here may be sensitive to systematic errors arising from biases in the\n\npresent-day SST patterns.\n\nAtmospheric greenhouse gas concentrations were prescribed from the standard RCP8.5\n\nconcentration scenario. Aerosol concentrations were calculated within the model, with aerosol\n\nemissions prescribed again from the standard RCP8.5 scenario. This means that the greenhouse\n\ngas and aerosol concentrations, and hence radiative forcing, were the same in all ensemble", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "8 The latest update can be found at **[http://www.metoffice.gov.uk/climate/uk/about/state-of-climate](http://www.metoffice.gov.uk/climate/uk/about/state-of-climate )**\n\n9 **http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n\n10 **[https://www.ipcc.ch/report/ar5/ ](https://www.ipcc.ch/report/ar5/ )**\n\n#### What can users expect from UKCP18?\n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land.\n\nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at\n\na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty.\n\n### **OBSERVATIONS**\n\n###### **Annual report: State of the UK Climate. Downloadable data.**\n\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package,\n\nbringing the observed data right up to date. This annual update 8 covers trends, the multi-\n\ndecade climate record and significant weather events such as the early July 2015 hot spell\n\nand the exceptionally mild and wet December of the same year.\n\nQuality controlled UK observational datasets from the Met Office observing network, provided\n\nat spatial resolutions to match the land projections and for pre-defined administrative regions\n\nand river basins, will be available under an Open Government Licence 9 . For variables such as\n\ntemperature and precipitation these data sets will span the late 19th Century to the present\n\nday and will be provided for daily, monthly, seasonal, annual and long term averages.\n\n### **MARINE PROJECTIONS**\n\n###### **Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers,\n\nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include\n\nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely”\n\nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making\n\nsea level rise projections to 2300. The projections will use the latest information from the\n\nCMIP5 models and application of the methods used in the Intergovernmental Panel on\n\nClimate Change’s (IPCC) Fifth Assessment Report 10 .\n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change\n\nin high water levels over the 21st Century. These estimates will be based on a combination of\n\nprojected mean sea level change and projections of change in the extremes due to changes in\n\natmospheric storminess. These “storminess” projections will use the same surge model used\n\nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to\n\ndrive the surge. New understanding of the modification of large-scale sea level change signals\n\nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into\n\nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies\n\nderived from applying plausible future sea level change to historical extreme events.", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "**7** In the present study, processing errors in the input data for one ensemble member, the\n\nHadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the\n\nHCVI are, therefore, not presented here.\n\n### (d) Freshwater resources: run-off\n\nImpacts on freshwater were assessed with a version of the JULES land surface model [ 24 , 25 ], a\n\ncoupled ecosystem- hydrology- surface exchange model which simulates land-atmosphere fluxes\n\nof water, energy and carbon in an internally consistent way, typically applied at global scales.\n\nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System\n\nModels [ 26 , 27 ] and have been used to assess impacts of climate change on global terrestrial\n\necosystems and hydrology [ 28 - 30 ] within such models. JULES can also be used outside of the\n\nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of\n\na wider range of climate projections [ 6 , 8 ]. Here we use a new, higher-resolution configuration of\n\nJULES on a global grid of 0.5° resolution [ 31 ].\n\nIt has been noted that hydrological impacts models driven by climate-change projections\n\nfrom climate models tend to give more severe drying than simulated in the climate models\n\nthemselves [ 32 - 34 ]. This is largely attributed to the inclusion of plant stomatal closure in\n\nresponse to elevated CO 2 in the climate model land surface schemes, which generally reduces\n\nevapotranspiration relative to climate projections without this process and hence further increases\n\nrun-off/streamflow or ameliorates decreases [ 34 ]. This process is often omitted from standard\n\nhydrological models. Plant physiological responses to CO 2 are included in the JULES model, so\n\nour projections of changes in run-off here do account for this process.\n\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to\n\nthe effects of climate change and CO 2 rise on precipitation, evaporation and transpiration. We\n\nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to\n\npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for\n\nthe lowest 10% of time).\n\n### (e) Correctingbiasesinclimatemodeloutputandimplicationsfordefininglevelsofglobal\n\nwarming\n\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed\n\nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there\n\nwere some differences in how these data were applied, with different approaches to the treatment\n\nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered\n\nimportant to assess changes in the raw climate model output, because this directly represents\n\nthe behaviour of the model itself. The main focus was on the changes relative to the present-\n\nday baseline climate, defined as 1981- 2010, with absolute values in either the baseline or the\n\nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off\n\nanalyses, however, it was considered important to correct for systematic biases in the climate\n\nmodel output, because these can lead to unrealistic representations of the key quantities in the\n\npresent-day simulation [ 35 ]. A bias-correction methodology was, therefore, applied for these two\n\nparts of the analysis, whereby the model output was adjusted to make it consistent with an\n\nobserved climatology [ 36 ]. We used a multi-segment statistical bias-correction methodology for\n\nprecipitation [ 37 ], and a modification of this for other variables [ 37 ].\n\nThis difference in approach led to inconsistencies in the definitions of the dates of GWLs\n\nin the two parts of the study. In the extremes analysis using raw model output, the dates of\n\npassing GWLs were defined on the basis of the global mean temperatures in the driving CMIP5", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "2\n\nVol:.(1234567890)\n\n##### www.nature.com/scientificreports/\n\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- ing the impacts comparison of global warming by 1.5 °C versus 2.0 °C 44 . It is necessary to do more quantitative impacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research gaps and support the requirement of the scientific community and governments. In this paper, the future climate situations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and 2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. Then the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were analyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from 1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we examine the effects of the resulting maize production shocks in different countries; the market price of maize is simulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of maize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward for maize cultivation.\n\n**Materials and methods Data processing.** In this study, historical daily weather data (1986- 2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series ­data 45 . For future (2020- 2099), the original climate scenario data (Table 1 ) were extracted from output archives of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) under four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data was interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations to remove systematic ­errors 46 . The data of maize-planting regions are from the gridded global dataset in 2000 by combining two data ­products 47 , 48 .\n\n**Simulation of climate scenarios with global warming by 1.5 °C and 2.0 °C.** In this study, climate data of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models driven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a total of 20 sets of data under four RCP scenarios of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL- CM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sun- shine hours (Fig. 1 ).\n\n**Table 1.** Basic information of 5 ESMs in CMIP5. Horizontal resolution means the number of longitudinal grids × the number of latitudinal grids.\n\n| Model | Research institute | Country | Horizontal resolution |\n|:---|:---|:---|:---|\n| GFDL-ESM2M | Geophysical Fluid Dynamics Laboratory | The United States | 144 × 90 |\n| HadGEM2-ES | Hadley Center for Climate Prediction and Research | The United Kingdom | 192 × 145 |\n| IPSL-CM5A-LR | L’ Institute Pierre-Simon Laplace | France | 96 × 96 |\n| NorESM1-M | Norway Climate Center | Norway | 144 × 96 |\n| MIROC-ESM | Center for Climate System Research, National Institute for Environmental Studies, and Frontier Research Center for Global Change | Japan | 128 × 64 |", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - }, - { - "text": "#### Summary of expected outputs\n\nTable 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.\n\n* Data also available for whole UK, administrative regions, devolved administrations and river basin regions.\n\n†Additional information on variability and observations available at Class A tide gauges (see **[http://www.ntslf.org/](http://www.ntslf.org/data/uk-network-real-time)**\n\n**[data/uk-network-real-time](http://www.ntslf.org/data/uk-network-real-time)** ).\n\n‡An ensemble of regional climate model results over Europe (see **[ http://www.euro-cordex.net](http://www.euro-cordex.net)** ).\n\n+Now included due to user request and Peer Review Panel advice.\n\n++This is not an exhaustive list and further user-requested variables will be made available subject to evaluation of\n\nmodels.\n\n| | Observations (UK State of the Climate) | Marine and coastal projections | Global projections | Probabilistic projections | High resolution projections | High resolution projections |\n|:---|:---|:---|:---|:---|:---|:---|\n| Characteristics | Observed trends; long-term climatologies; weather events for the preceding year | Updated sea level rise and surge projections based on operational storm surge model (CS3) using CMIP5, EURO-CORDEX‡ | Ensemble of ~20 spatially coherent time series of the Met Office Hadley Centre model and a similar number of CMIP5 models | Updated probability density functions presented as 30- year and monthly time series based on Met Office models (HadCM3, ESPPE) and CMIP5 | Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events | Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events |\n| Scale | UK | UK | Global | UK | UK | UK |\n| Spatial resolution* | To match land projections | UK Coastline † | 60km | 25km | 12km + | 2.2km |\n| Highest temporal resolution | Daily / monthly | Annual | Daily | Monthly | Daily | Sub-daily |\n| Period of data | bulk of 20th century to present day | 1950-2100 | 1900-2100 | 1961-2100 | 1981-2080 | 1981-2000 2021-2040 2061-2080 |\n| Emissions scenarios | N/A | RCP2.6, RCP4.5, RCP8.5 H ++ | RCP8.5; additional lower scenario (for Met Office Hadley Centre model only) | SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5 | RCP8.5 | RCP8.5 |\n| Variables available ++ | Temperature, precipitation (including snow), sunshine, wind | Sea level rise, storm surge | Temperature, precipitation, humidity, wind speed, wind direction, solar radiation | Temperature, precipitation, humidity, wind speed, solar radiation | Temperature, precipitation, humidity, wind speed, wind direction, solar radiation | Temperature, precipitation, humidity, wind speed, wind direction, solar radiation |\n\n####### **Land**\n\n#### How can I get the information and when?\n\nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available\n\nthrough a dedicated website.\n\nA dedicated user interface will provide users with a means to download the data and produce customised\n\nvisualisations. The exact nature of these outputs is still the subject of consultation with users.\n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the\n\nlatest information visit:\n\n####### **[http://ukclimateprojections.metoffice.gov.uk/24125](http://ukclimateprojections.metoffice.gov.uk/24125)**\n\n*UKCP Project Team*\n\n*July 2017*", - "page_start": 3, - "page_end": 3, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "**13** ensemble mean\n\nIPSL-CM5A-LR GFDL-ESM2M\n\n- 3 - 2 - 1 0 1 2 3\n\nchange in length of average flood event (days)\n\nIPSL-CM5A-MR MIROC-ESM-CHEM ACCESS1-0\n\n**Figure6.** Simulatedchangesintheaveragelengthoffloodevents(numberofdaysinwhichthecumulativedailyrainfallexcess\n\nis positive, compared with the 95th percentile in 1981- 2010, at 2 ° C global warming, for individual HadGEM3 simulations driven\n\nbySSTsandSICsfromdifferentmembersoftheCMIP5ensemble,andtheensemblemean.Thelabelsaboveeachpanelidentify\n\nthe driving CMIP5 model (or ensemble mean).\n\nACCESS1-0\n\n- 0.2 0 0.2 0.4 0.6 0.8 1.0 1.2 1.4\n\nIPSL-CM5A-LR\n\nensemble mean\n\nvulnerability to food insecurity\n\nIPSL-CM5A-MR MIROC-ESM-CHEM\n\nGFDL-ESM2M\n\n**Figure 7.** Hunger and Climate Vulnerability Index calculated for simulated climate states at 2 ° C global warming for five\n\nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble\n\nmean.", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "legal1_opengouvernementlicense.pdf", - "query": "Which causes of the rise of sea level will be considered by UKCP18 ?", - "target_page": 2, - "target_passage": "Sea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "8 The latest update can be found at **[http://www.metoffice.gov.uk/climate/uk/about/state-of-climate](http://www.metoffice.gov.uk/climate/uk/about/state-of-climate )**\n\n9 **http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n\n10 **[https://www.ipcc.ch/report/ar5/ ](https://www.ipcc.ch/report/ar5/ )**\n\n#### What can users expect from UKCP18?\n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land.\n\nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at\n\na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty.\n\n### **OBSERVATIONS**\n\n###### **Annual report: State of the UK Climate. Downloadable data.**\n\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package,\n\nbringing the observed data right up to date. This annual update 8 covers trends, the multi-\n\ndecade climate record and significant weather events such as the early July 2015 hot spell\n\nand the exceptionally mild and wet December of the same year.\n\nQuality controlled UK observational datasets from the Met Office observing network, provided\n\nat spatial resolutions to match the land projections and for pre-defined administrative regions\n\nand river basins, will be available under an Open Government Licence 9 . For variables such as\n\ntemperature and precipitation these data sets will span the late 19th Century to the present\n\nday and will be provided for daily, monthly, seasonal, annual and long term averages.\n\n### **MARINE PROJECTIONS**\n\n###### **Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers,\n\nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include\n\nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely”\n\nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making\n\nsea level rise projections to 2300. The projections will use the latest information from the\n\nCMIP5 models and application of the methods used in the Intergovernmental Panel on\n\nClimate Change’s (IPCC) Fifth Assessment Report 10 .\n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change\n\nin high water levels over the 21st Century. These estimates will be based on a combination of\n\nprojected mean sea level change and projections of change in the extremes due to changes in\n\natmospheric storminess. These “storminess” projections will use the same surge model used\n\nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to\n\ndrive the surge. New understanding of the modification of large-scale sea level change signals\n\nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into\n\nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies\n\nderived from applying plausible future sea level change to historical extreme events.", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of\n\nclimate change on their operations and present proposals for adaptation. **https://www.gov.uk/government/collections/climate-change-**\n\n**adaptationreporting-second-round-reports**\n\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the\n\nCommittee on Climate Change (ASC): **https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate\n\nchange on their operations and present proposals for adaptation: **https://www.gov.uk/government/collections/climate-change-adaptation-**\n\n**reporting-second-round-reports**\n\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate\n\nchange to be assessed consistently over larger study areas.\n\n5 **http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n\n6 Coupled model intercomparison project phase 5, see **http://cmip-pcmdi.llnl.gov/cmip5/**\n\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25,\n\n5791- 5806 (2012) **http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**\n\n## **UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n#### What is UKCP18\n\n#### and why do we need it?\n\nFollowing the historic Paris Agreement on Climate\n\nChange in December 2015, the Department of\n\nEnvironment, Food and Rural Affairs announced a\n\nmajor upgrade to the UK Climate Projections.\n\nThe UKCP18 project will build upon the current set\n\nof projections (UKCP09) to provide the most up-to-\n\ndate assessment of how the climate of the UK may\n\nchange over the 21st century. This information\n\nwill be essential to future Climate Change Risk\n\nAssessments 1 and to equip the UK with information\n\nto help adapt to the challenges and opportunities of\n\nclimate change in line with the National Adaptation\n\nProgramme 2 .\n\nOrganisations and individual users will use UKCP18\n\nto inform risk assessments and adaptation plans\n\nto ensure they are resilient to extreme weather\n\nand climate change. Some organisations will use\n\nUKCP18 in responding to the Adaptation Reporting\n\nPower 3 for example.\n\n#### What improvements\n\n#### does UKCP18 deliver?\n\nUKCP18 will benefit from a range of developments\n\nsince the release of UKCP09, including:\n\n- Greater understanding of user needs as a result\n\nof the adaptation community’s use of UKCP09\n\nprojections and the subsequent feedback - user\n\nworkshops indicated that users supported the\n\ncontinued use of probabilistic projections and the\n\nimportance of spatially coherent information 4 .\n\n- Advances in climate models in recent years, such\n\nas the Met Office Hadley Centre HadGEM3 5 model\n\nand the CMIP5 6 set of models. Improvements\n\ninclude better representation of the past\n\nclimate, the inclusion of more cloud and aerosol\n\nprocesses and the ability to model important\n\nclimate phenomena such as the El-Niño Southern\n\nOscillation (ENSO).\n\n- Groundbreaking Met Office research on\n\nmodelling of extreme events in high resolution\n\nregional climate models 7 .\n\n- The increased quantity and range of observations\n\navailable since 2009.\n\n- Use of the new Met Office supercomputer,\n\nenabling a credible range of climate projections to\n\nbe generated in greater spatial detail.", - "page_start": 0, - "page_end": 0, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "Vol.:(0123456789)\n\nFirstly, the period of 1986- 2005 is defined as the baseline, of which the simulated average value is recog- nized as 0.61 °C above pre-industrial (the period of 1850- 1900) levels; the baseline is selected according to the accessibility and operability of data, which is used for the determination of the periods with global warming by 1.5 °C and 2.0 °C and the comparison of maize yield between different periods. Secondly, the simulated values of global mean temperature in the future years are subtracted from the simulated average value of 1986- 2005; then the values should be plus with 0.61 °C, which are the global warming results above pre-industrial levels; then 20 years moving average of the above results are calculated. Thirdly, the climate data of global warming by 1.5 °C is defined according to the principles provided in the fifth IPCC Assessment Report, for which it should be within 1.5- 2.0 °C above pre-industrial levels at the end of the twenty-first century; the climate data of global warming by 2.0 °C is defined according to the principles provided in the fifth IPCC Assessment Report, for which it should be within 2.0- 2.5 °C above pre-industrial levels at the end of the twenty-first century and the period of global warming by 2.0 °C should not be earlier than 2050. Finally, the climate models, scenarios and periods of global warming by 1.5 °C and 2.0 °C are separately confirmed; the data of global warming by 1.5 °C, simulated by IPSL-CM5A-LR under RCP2.6 scenario during 2020- 2039 and simulated by GFDL-ESM2M under RCP4.5 scenario during 2041- 2060; the data of global warming by 2.0 °C, simulated by NorESM1-M under RCP4.5 scenario during 2060- 2079 and simulated by GFDL-ESM2M under RCP6.0 scenario during 2065- 2084.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "**19**\n\n( *b* )\n\n( *a* )\n\n( *c* )\n\nPmean (%)\n\n6.0\n\n5.0\n\n4.0\n\n3.0\n\n2.0\n\n1.0\n\n0\n\n10.0\n\n8.0\n\n6.0\n\n4.0\n\n2.0\n\n0\n\n12.0\n\n8.0\n\n4.0\n\n0.0\n\n- 4.0\n\nRmean (%)\n\nRlow (%)\n\nIPSL-CM5A-LR IPSL-CM5A-MR GFDL-ESM2M MIROC-ESM-CHEM ACCESS1-0 HadGEM2-ES\n\n1.5°C 2°C\n\n**Figure13.** Globalmeanpercentagechangesrelativeto1981- 2010in( *a* )precipitationoverland,( *b* )meanrun-offflows,( *c* )low\n\nrun-off lows (10th percentile), at 2 ° C and 1.5 ° C global warming.\n\nthis comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be\n\ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at\n\neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the\n\npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries.\n\nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food\n\ninsecurity generally increases with global warming, and for approximately three-quarters of\n\ncountries assessed, this increase is larger at 2°C than 1.5°C.\n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global\n\nwarming compared to 1.5°C ( figure 20 ). This is often the case for both increases and decreases\n\nin flows—increasing the level of global warming magnifies the pattern of river flow changes,\n\nalthough not in all cases.\n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins,\n\nbut this was not always the case, with many basins showing similar or smaller ranges at\n\n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed11.pdf" - }, - { - "text": "**25** A detailed investigation of these factors is beyond the scope of this paper; nevertheless, this\n\nresult illustrates the important point that the nature and patterns of the climate forcing at a\n\nparticular level of global warming can play an important role in determining the patterns of\n\nregional impacts.\n\n## 5. Conclusion\n\nThe higher-resolution HadGEM3 simulations project consistent increases in temperature-related\n\nextremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the\n\nglobal annual mean. There is a higher degree of spatial variation in our projections compared\n\nwith CMIP5-based studies.\n\nIn the model projections examined here, changes relating to the water cycle are complex, both\n\nin their geographical pattern and in the variation between different models. The length of flooding\n\nevents generally increases across world in all models, but maximum rainfall can either increase or\n\ndecrease depending on locations. Global patterns of increase and decrease show some consistency\n\nbetween the different GWLs, but also some local differences. Worldwide, most impacts broadly\n\ntend to increase with global warming in most areas. For global mean changes, even when the sign\n\nof change is uncertain, individual realizations generally show reduced impact at 1.5°C compared\n\nwith 2°C. However, this does not always hold even at the scale of major global river basins.\n\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in\n\napproximately three-quarters of countries assessed. The vulnerability increase can arise from\n\nincreases in either flooding or drought. Reduced drought leads to decreased vulnerability in a\n\nlimited number of cases.\n\nMost simulations here project a general increase in mean streamflow in most of the basins\n\nexamined, but with a number of notable exceptions in the tropics. While flows in the Ganges are\n\nconsistently projected to increase by 30- 110% at 2°C, Amazon flows could either increase by 3%\n\nor decrease by 25%. Ensemble-mean changes in river flow often do not give a full impression of\n\nthe magnitude of changes that may be possible, so adaptation planning in particular should not\n\nrely on ensemble-mean projections and instead consider a range of outcomes. The seasonal low\n\nstreamflows also increase in many basins, but not as many as for the mean flows—many basins\n\nsee decreased low flows in some or all projections.\n\nBroadly, changes in weather extremes at 1.5°C global warming could be estimated by scaling-\n\nback the impacts at 2°C, if this is done with individual ensemble members rather than the\n\nensemble mean. However, this was not always the case for impacts that depend on more complex\n\nprocess or interactions between more than one climate variable, such as run-off and an indicator\n\nof vulnerability to food insecurity.\n\nData accessibility. This article has no additional data.\n\nCompeting interests. We declare we have no competing interests.\n\nFunding. This research received funding from the European Union Seventh Framework Programme FP7/2007-\n\n2013 under grant agreement no. 603864 (HELIX: ‘High-End cLimate Impacts and eXtremes’; www.\n\nhelixclimate.eu ). The work of R.A.B., C.B., J.C., L.G., K.L. and K.R. was additionally supported by the Joint\n\nUK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101).\n\nAcknowledgements. The authors thank Ed Pope, Jason Lowe and Dann Mitchell for advice and discussion,\n\nAlissa Haward and Maria Pearce for project management and administration of HELIX, and two anonymous\n\nreviewers whose comments substantially improved the paper.\n\n## References\n\n1. IPCC. 2014 Summary for policymakers. In *Climate change 2014: impacts, adaptation, and*\n\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n\n*Assessment Report of the Intergovernmental Panel on Climate Change* (eds CB Field *et al* .), pp.\n\n1- 32. Cambridge, UK: Cambridge University Press.", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed11.pdf" - }, - { - "text": "NAV’iiEPS Oo-801-80 AIRPLANE PERFORMANCE\n\nEFFECT OF ALTlTUOE ON MINIMUM POWER REO’D\n\nb\n\nAT ALTITUDE\n\nSEA.LEVEL /\n\n/\n\nMINIMUM /\n\n/ / CONSTANT WEIGHT 8 CONFIGURATION\n\nlm-\n\nVELOCITY, KNOTS\n\nEFFECT OF ALTITUDE ON MINIMUM\n\nt\n\nTHRUST REO’D\n\nSEA LEVEL AT ALTITUDE\n\nT;;;g MINIMUM THRUST REO’D LBS /’\n\nA’\n\n,’ CONSTANT\n\n-- WEIGHT 8\n\nI\n\nCONFIGURATION\n\nVELOCITY, KNOTS\n\n### Figure 2.27. Endurance Performance\n\n171", - "page_start": 188, - "page_end": 188, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**energy** 41 . It will also review in 2021 the data on biofuels with high indirect land-use change risk and establish a trajectory for their gradual phase out by 2030.\n\nThe overall objective is to ensure that EU regulatory framework on bioenergy is in line with the increased ambition set out in the European Green Deal.\n\n#### *2.2.6.* *Restoring the good environmental status of marine ecosystems*\n\n**Restored and properly protected marine ecosystems** bring substantial health, social and economic benefits to coastal communities and the EU as a whole. The need for stronger action is all the more acute as marine and coastal ecosystem biodiversity loss is severely exacerbated by global warming 42 .\n\nAchieving good environmental status of marine ecosystems, including through strictly protected areas, must involve the restoration of carbon-rich ecosystems as well as important fish spawning and nursery areas. Some of today’s sea uses endanger food security, fishers’ livelihoods, and the fishery and seafood sectors. **Marine resources must be harvested sustainably and there must be zero-tolerance for illegal practices** . In this regard, the full implementation of the EU’s Common Fisheries Policy, the Marine Strategy Framework Directive and the Birds and Habitats Directives is essential.\n\nThe application of an ecosystem-based management approach under EU legislation 43 will reduce the adverse impacts of fishing, extraction and other human activities, especially on sensitive species and seabed habitats. To support this, **national maritime spatial plans** , which Member States have to deliver in 2021, should aim at covering all maritime sectors and activities, as well as area-based conservation-management measures. 44 The Commission will also propose a **new action plan to conserve fisheries resources and protect marine ecosystems** by 2021. Where necessary, measures will be introduced to limit the use of fishing gear most harmful to biodiversity, including on the seabed. It will also look at how to reconcile the use of bottom-contacting fishing gear with biodiversity goals, given it is now the most damaging activity to the seabed. This must be done in a fair and just way for all. The European Maritime and Fisheries Fund should also support the transition to more selective and less damaging fishing techniques.\n\nHealthy fish stocks are key to the long-term prosperity of fishermen and the health of our oceans and biodiversity. This makes it all the more important to maintain or reduce fishing mortality at or under **Maximum Sustainable Yield levels** . This will help achieve a healthy population age and size distribution for fish stocks.\n\nThe **by-catch of species threatened with extinction** must also be eliminated or reduced to a level that allows full recovery. This should also be the case for those in bad conservation status or not in good environmental status. Furthermore, the by-catch of other species 45 must be eliminated or, where this is not possible, minimised so as not to\n\n41 Article 29 of the EU Renewable Energy Directive 2018/2001. 42 See for example Intergovernmental Panel on Climate Change (2019), [Special Report on the Ocean and ](https://www.ipcc.ch/srocc/) [the Cryosphere in a Changing Climate](https://www.ipcc.ch/srocc/) . The Common Fisheries Policy, the [Marine Strategy Framework Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32008L0056) (2008/56/EC) and the [Maritime Spatial Planning Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32014L0089) (2014/89/EU). The Commission will report on the implementation of the Maritime Spatial Planning Directive by March 2022 at the latest, including the application of ecosystem-based management. Protected by international and EU law.", - "page_start": 11, - "page_end": 11, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "lead to some degree of inconsistency between the analysis of the ClimPACT extremes and the\n\nHCVI and JULES impacts projections.\n\n## 3. Results\n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the\n\nlevel of agreement between models for a particular projected change, and hence an indication\n\nof potential robustness of the projected changes for informing adaptation. We then make a\n\ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would\n\nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in\n\nregional climate outcomes, we address this in a number of ways. For individual realizations, we\n\ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C,\n\neven if the sign of the change is uncertain. We also compare the range of outcomes at different\n\nGWLs, to see if the regional-scale uncertainty itself increases with global warming.\n\n### (a) Climate-change impacts at 2 ° C global warming\n\nFor 2°C global warming, the ensemble-mean increase in annual daily maximum temperature was\n\nabove 2°C for most of the land surface, with the exception of the Indian subcontinent, most of\n\nAustralia and Antarctica ( figure 2 ). The increase was higher still in many regions; most of North\n\nAmerica, much of China and north Asia, northwestern South America and all of Europe. In the\n\nnorthern and eastern USA and much of northern and western Europe, the annual daily maximum\n\ntemperature increased by over 4°C for 2°C global warming. The global mean TXx increased by\n\nmore than 2°C in all ensemble members ( table 5 ), so the maximum temperature warming more\n\nthan the global annual mean is a consistent result across all projections here, as found in previous\n\nstudies with other models [ 9 ] ( table 5 ).\n\nThe different ensemble members give somewhat different results at regional scales, although\n\nthere is a strong consensus on the temperature extremes examined here becoming warmer. In\n\nthe simulations driven by SSTs and SICs from the two IPSL CMIP5 models, most of the global", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - }, - { - "text": "biases in baseline precipitation climatology, and different global patterns of precipitation change.\n\nSpecific levels of global warming such as 1.5°C or 2°C were defined on the basis of the global\n\nmean temperature in the original CMIP5 projections. The time of reaching a specific level of global\n\nwarming, therefore, varied between ensemble members. The CMIP5 SSTs were not bias-corrected,\n\nwhich means that the results here may be sensitive to systematic errors arising from biases in the\n\npresent-day SST patterns.\n\nAtmospheric greenhouse gas concentrations were prescribed from the standard RCP8.5\n\nconcentration scenario. Aerosol concentrations were calculated within the model, with aerosol\n\nemissions prescribed again from the standard RCP8.5 scenario. This means that the greenhouse\n\ngas and aerosol concentrations, and hence radiative forcing, were the same in all ensemble", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" - }, - { - "text": "The assumptions used are based on consultation with policy and operational experts at the Ministry of Justice and the National Offender Management Service. They also take into account observed data trends:\n\n- These projections represent a change from last year where the 2013 Scenario 2 (central) saw the population gradually falling over the six year lifetime of the projection. The Central Scenario in the projections this year shows the population rising over the next six years. This change arises from the fact that the latest projections capture a recent upward trend in prosecutions of more serious offences.\n\n- Despite the fact that overall crime is falling there has been an increase in recorded crime for certain offence types:\n\no Prosecutions for sexual offences are the highest in the decade and increased by 19% in the 12 months ending June 2014, in line with a 21% increase in recorded crime. Offenders sentenced for sexual offences had an Average Custodial Sentence Length (ASCL) of 59.7 months, a rise of 2.4 months, compared with year ending June 2013.\n\no Violence against the person proceedings for indictable offences have increased by 7% in the 12 months ending June 2014. This is in line with an 11% increase in recorded crime.\n\nFurther statistics and commentary on the changes seen in Court proceedings and sentencing over the last year is presented in the Criminal Justice System Statistics Quarterly publication. This is available online on GOV.UK at: [www.gov.uk/government/collections/criminal-justice-statistics-quarterly ](https://www.gov.uk/government/collections/criminal-justice-statistics-quarterly)\n\n3", - "page_start": 4, - "page_end": 4, - "source_file": "legal4_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal1_opengouvernementlicense.pdf", - "query": "What perdiod is covered by the 12 km resolution projection data of the UKCP18 ?", - "target_page": 4, - "target_passage": "1981-2080", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "11 SRESA1B: IPCC future scenario based on rapid economic growth and a balance of energy sources\n\n12 30-year means can be created using the UKCP18 PDF data\n\n13 http://www.euro-cordex.net/\n\n## **60KM GLOBAL PROJECTIONS**\n\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the\n\ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of\n\nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated\n\nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These\n\nprojections will be selected to represent a wide range of possible future climate states\n\nto reflect key uncertainties, informing a risk-based approach to planning. They will be\n\ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for\n\ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of\n\nCMIP5 models to provide additional information on uncertainties in the projections relative\n\nto other climate models.\n\n## **25KM PROBABILISTIC PROJECTIONS**\n\n**Captures natural variability and climate change . Updated models and**\n\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for\n\nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be\n\nupdated using an up-to-date collection of Met Office climate simulations and the latest\n\nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest\n\nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for\n\nthe UK at monthly intervals for several emission scenarios, including one used in UKCP09 11 .\n\nThe new probabilistic projections will indicate the range of uncertainty in our knowledge\n\nof the climate system and natural variability through the 21st century, using probability\n\ndensity functions to provide information on how climate varies from month to month. This\n\ncontrasts with UKCP09 for which only 30-year means were provided 12 .\n\n##### **DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n\n**Downscaled versions of the global model for the UK. For the most spatially**\n\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance\n\nto adaptation at two different resolutions. The 12 km model provides a downscaled\n\nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global\n\nmodel and at a higher resolution. This may be especially useful for those interested in\n\nwater availability and some aspects of agriculture. A key reason for providing this data is\n\nthat users will be able to compare it directly with EURO-CORDEX 13 .\n\nThe global projections will also be downscaled to 2.2 km using a process of nesting\n\nmodels at finer resolution that maintains the integrity of the representation of evolving\n\natmospheric processes. Key benefits of simulations at this resolution will be the\n\ninformation provided on high impact events such as localised heavy rainfall in summer and\n\npotential improvements in the diurnal cycle.\n\nThe output will be available at a time resolution of 3-hourly, possibly higher for some\n\noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time\n\nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be\n\nconfirmed.\n\n### **PROJECTIONS OVER LAND**\n\nThe land projections comprise three components:", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "## Chapter 8. User clients\n\n**Windows client viewers**\n\nThe Content Manager OnDemand Windows client contains native capabilities for viewing\n\ntypical archive data types:\n\n� Line Data and SCS\n\n� AFP\n\n� Images\n\nThe Windows client reflects the richest set of capabilities in terms of viewing these data types.\n\nBecause it directly communicates with the Content Manager OnDemand server, we reference\n\nthe Windows client for all of its features that relate to document display.\n\nThe Line Data viewer of the Windows client is the most sophisticated viewer that is available\n\nfor Content Manager OnDemand from the selection of readily available viewers.\n\nThe viewing of these primary data types happens within the same application. The Windows\n\nclient provides other features, such as thumbnails, and configurable and saveable views.\n\nThe Content Manager OnDemand Windows client also contains other capabilities for viewing\n\narchive data types, such as Portable Document Format ( *PDF* ) and *User-Defined* .\n\nStarting with Content Manager OnDemand version 9.5, for both DocType=PDF and\n\nuser-defined PDF, the Windows Client will attempt to view a PDF document with Adobe\n\nAcrobat, if it is installed. If Adobe Acrobat is not installed, for DocType=PDF, Adobe Acrobat\n\nReader will be used instead when the PDF document is viewed.\n\nBefore Content Manager OnDemand version 9.5, PDF documents can be viewed by the\n\nWindows client in two ways:\n\n� If they are configured in the application as data type “PDF”, the rich feature set of the AFP\n\nand Line Data viewer applies, but Adobe Acrobat Professional is required.\n\n� If the data type is configured as “User Defined” and “. pdf ” as the extension, the\n\ndocuments are started externally. Therefore, you can view the documents with the\n\nno-charge Adobe Acrobat viewer or any other installed PDF viewer.\n\nAny data type can be specified as “User Defined”, for example, Word documents ( .docx ).\n\nUser-defined data is viewed by invoking its associated application.\n\n**Web-based viewing options**\n\nThe web-based viewing options for Content Manager OnDemand are provided primarily by\n\nODWEK. ODWEK includes different viewers that are dedicated to Content Manager\n\nOnDemand documents that can use Content Manager OnDemand functions, such as the\n\nsegment-wise retrieval of large objects or annotations. These viewers are used in web\n\napplications, such as Content Navigator or any other custom-developed web client:\n\n� Line Data applet\n\n� Browser plug-in for image viewing\n\n� AFP browser plug-in\n\n� AFP Transforms\n\n� Generic Transforms\n\nDetailed information about ODWEK’s viewers and transforms is in *IBM Content Manager*\n\n*OnDemand Web Enablement Kit Java APIs: The Basics and Beyond* , SG24-7646. Only a\n\nbrief overview is provided in this chapter.", - "page_start": 210, - "page_end": 210, - "source_file": "sg246915.pdf" - }, - { - "text": "#### Summary of expected outputs\n\nTable 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.\n\n* Data also available for whole UK, administrative regions, devolved administrations and river basin regions.\n\n†Additional information on variability and observations available at Class A tide gauges (see **[http://www.ntslf.org/](http://www.ntslf.org/data/uk-network-real-time)**\n\n**[data/uk-network-real-time](http://www.ntslf.org/data/uk-network-real-time)** ).\n\n‡An ensemble of regional climate model results over Europe (see **[ http://www.euro-cordex.net](http://www.euro-cordex.net)** ).\n\n+Now included due to user request and Peer Review Panel advice.\n\n++This is not an exhaustive list and further user-requested variables will be made available subject to evaluation of\n\nmodels.\n\n| | Observations (UK State of the Climate) | Marine and coastal projections | Global projections | Probabilistic projections | High resolution projections | High resolution projections |\n|:---|:---|:---|:---|:---|:---|:---|\n| Characteristics | Observed trends; long-term climatologies; weather events for the preceding year | Updated sea level rise and surge projections based on operational storm surge model (CS3) using CMIP5, EURO-CORDEX‡ | Ensemble of ~20 spatially coherent time series of the Met Office Hadley Centre model and a similar number of CMIP5 models | Updated probability density functions presented as 30- year and monthly time series based on Met Office models (HadCM3, ESPPE) and CMIP5 | Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events | Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events |\n| Scale | UK | UK | Global | UK | UK | UK |\n| Spatial resolution* | To match land projections | UK Coastline † | 60km | 25km | 12km + | 2.2km |\n| Highest temporal resolution | Daily / monthly | Annual | Daily | Monthly | Daily | Sub-daily |\n| Period of data | bulk of 20th century to present day | 1950-2100 | 1900-2100 | 1961-2100 | 1981-2080 | 1981-2000 2021-2040 2061-2080 |\n| Emissions scenarios | N/A | RCP2.6, RCP4.5, RCP8.5 H ++ | RCP8.5; additional lower scenario (for Met Office Hadley Centre model only) | SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5 | RCP8.5 | RCP8.5 |\n| Variables available ++ | Temperature, precipitation (including snow), sunshine, wind | Sea level rise, storm surge | Temperature, precipitation, humidity, wind speed, wind direction, solar radiation | Temperature, precipitation, humidity, wind speed, solar radiation | Temperature, precipitation, humidity, wind speed, wind direction, solar radiation | Temperature, precipitation, humidity, wind speed, wind direction, solar radiation |\n\n####### **Land**\n\n#### How can I get the information and when?\n\nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available\n\nthrough a dedicated website.\n\nA dedicated user interface will provide users with a means to download the data and produce customised\n\nvisualisations. The exact nature of these outputs is still the subject of consultation with users.\n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the\n\nlatest information visit:\n\n####### **[http://ukclimateprojections.metoffice.gov.uk/24125](http://ukclimateprojections.metoffice.gov.uk/24125)**\n\n*UKCP Project Team*\n\n*July 2017*", - "page_start": 3, - "page_end": 3, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "8 The latest update can be found at **[http://www.metoffice.gov.uk/climate/uk/about/state-of-climate](http://www.metoffice.gov.uk/climate/uk/about/state-of-climate )**\n\n9 **http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/**\n\n10 **[https://www.ipcc.ch/report/ar5/ ](https://www.ipcc.ch/report/ar5/ )**\n\n#### What can users expect from UKCP18?\n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land.\n\nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at\n\na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty.\n\n### **OBSERVATIONS**\n\n###### **Annual report: State of the UK Climate. Downloadable data.**\n\nThe “State of the UK Climate” report for 2017 will be included as part of the UKCP18 package,\n\nbringing the observed data right up to date. This annual update 8 covers trends, the multi-\n\ndecade climate record and significant weather events such as the early July 2015 hot spell\n\nand the exceptionally mild and wet December of the same year.\n\nQuality controlled UK observational datasets from the Met Office observing network, provided\n\nat spatial resolutions to match the land projections and for pre-defined administrative regions\n\nand river basins, will be available under an Open Government Licence 9 . For variables such as\n\ntemperature and precipitation these data sets will span the late 19th Century to the present\n\nday and will be provided for daily, monthly, seasonal, annual and long term averages.\n\n### **MARINE PROJECTIONS**\n\n###### **Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers,\n\nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include\n\nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely”\n\nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making\n\nsea level rise projections to 2300. The projections will use the latest information from the\n\nCMIP5 models and application of the methods used in the Intergovernmental Panel on\n\nClimate Change’s (IPCC) Fifth Assessment Report 10 .\n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change\n\nin high water levels over the 21st Century. These estimates will be based on a combination of\n\nprojected mean sea level change and projections of change in the extremes due to changes in\n\natmospheric storminess. These “storminess” projections will use the same surge model used\n\nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to\n\ndrive the surge. New understanding of the modification of large-scale sea level change signals\n\nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into\n\nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies\n\nderived from applying plausible future sea level change to historical extreme events.", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "The OS/390 indexer is enhanced to allow the storage of documents (or large object\n\nsegments) that exceed 2 GB. A report might contain multiple documents (or large object\n\nsegments), each of which exceeds 2 GB. This enhancement does not affect the limitations\n\nthat are imposed by other indexers. The limitations on the document size are based on the\n\navailable hardware and any other limitations that are placed on the operating environment.\n\nFor more information about the use of the OS/390 indexer, see *IBM Content Manager*\n\n*OnDemand - Indexing Reference* , SC19-3354.\n\n### **7.6 OS/400 indexer on Content Manager OnDemand on IBM i**\n\nThe OS/400 indexer is a powerful tool to index the print data streams of IBM i application\n\nprograms. Supported data streams include SCS, AFP, and the less common SCS-Extended\n\nand Line Data.\n\nThe OS/400 indexer provides three major functions:\n\n� Print data stream processing: The OS/400 indexer processes the output print data\n\nstreams of application programs, for example, SCS, AFP, and Line Data reports. The\n\noutput can be viewed, printed, and archived by Content Manager OnDemand.\n\n� Sophisticated indexing functions: The OS/400 indexer can logically divide reports into\n\nindividual items, such as statements, policies, and bills. You can define up to 32 index\n\nfields for each item in a report if you are running a Content Manager OnDemand server\n\nversion that is earlier than version 9.0.0.1. Beginning at version 9.0.0.1 of the server,\n\n128 index fields can be defined.\n\n� AFP resource collection: For AFP spooled files, the OS/400 indexer determines the\n\nresources that are necessary to view, print, and archive the print data stream and collect\n\nthe resources (except fonts, which are not stored but are mapped by the client during\n\ndisplay). Resources allow users to view the report as it displayed in the original printed\n\nversion, regardless of when or where the report was created.\n\nThe OS/400 indexer supports many advanced features:\n\n� Multi-key indexes\n\n� Spool File Archive compatibility\n\n� Start Indexing on Page\n\n� Translate Print Control\n\n� AFP support with or without TLEs\n\n� Large object support\n\nThe OS/400 indexer processes three input sources:\n\n� Indexing parameters that specify how the data needs to be indexed. The indexing\n\nparameters are created when you define a Content Manager OnDemand application.\n\n� AFP resources that are required to view and print the data if the application created an\n\nAFP print data stream.\n\n� The print data stream, which can be in a spooled file (all data types) or in a physical file\n\n(Line Data or SCS data that was converted to Line Data with First Character Forms\n\nControl (FCFC) characters in column one of the data).", - "page_start": 203, - "page_end": 203, - "source_file": "sg246915.pdf" - }, - { - "text": "**104** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\n| enabled | True |\n\n| id | 385ab82655074660b07bb0757e116e39 |\n\n| is_domain | False |\n\n| name | ocp-project |\n\n| parent_id | default |\n\n| tags | [] |\n\n+-------------+----------------------------------+\n\n3. Create a user and assign admin role for the ocp-project:\n\ngroupadd -g 3030 ocpadmin\n\nuseradd -g ocpadmin -u 3030 -d /home/ocpadmin -c \"OpenShift Container Platform\n\nAdmin\" ocpadmin\n\necho \"ocpadmin:\" | chpasswd\n\nusermod -a -G powervc-filter ocpadmin\n\nopenstack role add --project ocp-project --user ocpadmin admin\n\n#### **6.2.3 Creating the virtual machine to host deployment tools**\n\nComplete the following steps to create a virtual machine (LPAR) by using PowerVC CLI:\n\n1. Set PowerVC access variables using the new user and project:\n\nsource /opt/ibm/powervc/powervcrc\n\nexport OS_PROJECT_NAME=ocp-project\n\nexport OS_USERNAME=ocpadmin\n\nexport OS_PASSWORD=\n\nopenstack project list\n\n+----------------------------------+-------------+\n\n| ID | Name |\n\n+----------------------------------+-------------+\n\n| 385ab82655074660b07bb0757e116e39 | ocp-project |\n\n+----------------------------------+-------------+\n\n2. List the flavors:\n\nopenstack flavor list\n\n+--------------------------------------+---------+--------+------+-----------+-------+-----------+\n\n| ID | Name | RAM | Disk | Ephemeral | VCPUs | Is Public |\n\n+--------------------------------------+---------+--------+------+-----------+-------+-----------+\n\n| 16f4c456-debe-4b7f-a59e-d024667fb74b | medium | 16384 | 0 | 0 | 4 | True |\n\n| 3f2f851b-1ae9-4604-bde9-f81984a924fa | xxlarge | 131072 | 0 | 0 | 32 | True |\n\n| 43032930-4dfb-417e-9501-80b5408076fc | large | 32768 | 0 | 0 | 8 | True |\n\n| 962979ba-2ee7-464f-a0ea-856248765758 | tiny | 4096 | 0 | 0 | 1 | True |\n\n| d7409716-49e2-426d-acb1-9de141b8d8ea | small | 8192 | 0 | 0 | 2 | True |\n\n| e93908f5-b6f9-4bb9-bbff-9136c7a80211 | xlarge | 65536 | 0 | 0 | 16 | True |\n\n+--------------------------------------+---------+--------+------+-----------+-------+-----------+\n\n3. List the images:\n\nopenstack image list\n\n+--------------------------------------+---------------------+--------+\n\n| ID | Name | Status |\n\n+--------------------------------------+---------------------+--------+\n\n| 09ba0030-b6c3-4631-b9f9-19eb3333289c | xiv_p8_image_rhel76 | active |\n\n| 77ad197b-0a4e-4792-a3c4-ea634ffa0fd3 | xiv_p9_image_rhel76 | active |\n\n+--------------------------------------+---------------------+--------+", - "page_start": 119, - "page_end": 119, - "source_file": "sg248459.pdf" - }, - { - "text": "#### **13.4.4 Image data**\n\nTo optimize performance with storing and retrieving image formats, such as Tagged Image\n\nFile Format (TIFF), Graphics Interchange Format (GIF), and Joint Photographic Experts\n\nGroup (JPEG), do not compress the data because the file sizes might increase. To turn off\n\ncompression, select the **Disable** option from the Load Information tab within the application.\n\nSee Figure 13-6.\n\n*Figure 13-6 Disabling compression*\n\nTwo methods are available to turn off data compression:\n\n� Disable: Content Manager OnDemand does not compress the input data. Choose this\n\noption when the input data, such as PDF and compressed TIFFs, is already compressed.\n\nDocuments are extracted by the appropriate viewer on the client (for example, Adobe\n\nAcrobat Reader).\n\n� None: Content Manager OnDemand does not compress the input data when it loads the\n\ninput data into the system. When the user selects a document for viewing, Content\n\nManager OnDemand compresses the document before it transmits it over the network and\n\nextracts the document at the client.", - "page_start": 335, - "page_end": 335, - "source_file": "sg246915.pdf" - }, - { - "text": "To work with data conversion, understand the data conversions that are required, and when\n\nand how to convert the data. Perform detailed planning before you build your solution so that\n\nyou achieve a design that remains efficient for many years.\n\nIn this section, we describe why you might need data conversion, when to convert the data\n\nstream, and how to convert the data.\n\n#### **9.1.1 Why convert data streams**\n\nYou might want to convert data streams for many reasons:\n\n� Certain data streams, such as Hewlett-Packard (HP) Printer Command Language (PCL)\n\nor Xerox metacode, are printer-specific and cannot be displayed. Before you archive or\n\ndisplay the documents, these data streams must be transformed into a compatible format.\n\n� The archived data stream might need to comply with a company’s internal rules or\n\nregulations. Therefore, the produced data streams must be transformed into the defined\n\nand required final format before they are archived.\n\n� The documents might need to be accessible by a user that is outside of the company. The\n\ndocument must be displayed through standard tools that are available on any or at least\n\nmost of the clients, such as an Internet browser or Adobe Acrobat Reader.\n\n� The documents might need to be manipulated so that only part of the document is\n\ndisplayed in a personalized way.\n\n#### **9.1.2 When to convert data streams**\n\nThe decision of *when* to convert data streams relies mainly on the use of the system.\n\nTypically, converting data at load time requires more time to process the print stream file, and\n\nconverting data at retrieval time causes the user retrieval to be a little slower. The decision\n\nmight depend on how many documents are retrieved, compared to how many documents are\n\nloaded daily. It might also depend on legal requirements about the format of stored data.\n\n**AFP to PDF**\n\nIf a requirement exists to present AFP documents in the Portable Document Format (PDF)\n\nformat over the web, from a storage perspective, it is more efficient to store the documents in\n\ntheir native format and then convert them to PDF at retrieval time. AFP documents are stored\n\nmore efficiently than PDF documents.\n\nThe PDF print stream, when it is divided into separate customer statements, is larger than\n\nAFP because each statement contains its own set of structures that are required by the PDF\n\narchitecture to define a document.\n\nElapsed time and processor time are also essential factors in the decision-making process.\n\nThe amount of time (elapsed and CPU) that is needed to convert the document depends on\n\nhow large the document is and how many resources or fonts are associated with the\n\ndocument.", - "page_start": 231, - "page_end": 231, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 8. User clients\n\nThe generic applet viewer (“applet viewer”) is a Java applet, which can handle various types\n\nof documents, such as PDF and Microsoft Office documents (which it renders), images, line\n\ndata, and AFP documents. The generic applet viewer might be an option if you work with\n\nimages that are stored in Content Manager OnDemand.\n\nIf you want to avoid the use of Java applets and your content is viewable by browsers (for\n\nexample, certain image types or textual data), try the browser pass-through viewer, which lets\n\nthe browser handle the data natively. If you work with AFP and must use the AFP browser\n\nplug-in, register the Content Navigator plug-in, AFPViewerPlugin.jar , and configure the\n\nviewer map that is assigned to your Content Navigator desktop to use the AFP viewer for the\n\napplication/afp MIME type. The AFPViewerPlugin.jar file ships with Content Navigator. You\n\nmust choose the web browser pass-through viewer.\n\nThe Ajax viewer is a Web 2.0 JavaScript application that provides basic document functions,\n\nsuch as page-wise browsing, rotation, or zoom. It is not a Java applet.\n\nThe generic applet viewer, the built-in PDF and HTML conversion, and the Ajax viewer can all\n\nwork with various data types:\n\n� Images (such as TIFF, JPEG, and DICOM)\n\n� Office documents\n\n� PDF\n\n� Most line data documents\n\n� Certain AFP data\n\nHowever, they all use a rendering engine to display Office, PDF, and AFP data into an image.\n\nThis rendering might work well with certain Office and PDF files, but it fails on most non-basic\n\nAFP data streams.\n\nFor more information, see 8.1.1, “Viewer options” on page 186.\n\n**Extending Content Navigator**\n\nContent Navigator is not designed as a client that is dedicated solely to Content Manager\n\nOnDemand, so a more complex configuration is necessary than with simpler client options.\n\nContent Navigator provides many configuration and customization options through its API\n\nand plug-in methodology. For more information about the customization options of Content\n\nNavigator, see *Customizing and Extending IBM Content Navigator* , SG24-8055.\n\n#### **8.2.2 Content Manager OnDemand Windows client**\n\nThe Content Manager OnDemand Windows client is a full function, feature-rich client that\n\nmeets the needs of line-of-business application areas and customer service representatives.\n\nThe Windows client displays content in its native format and is considered a corporate\n\ninternal access client. Many technical aspects of the Windows client are described in 8.1.1,\n\n“Viewer options” on page 186 and 8.1.2, “Client infrastructure options” on page 190.\n\n**Note:** Content Navigator is a Web 2.0 client and relies on HTML 5 and JavaScript for its\n\ncore client functionality and especially for the Ajax viewers. Not all browsers are suitable for\n\nrunning Content Navigator fast and efficiently, especially for Microsoft Internet Explorer\n\nbrowsers before version 9. Test Content Navigator with your user browser thoroughly\n\nbefore you consider a deployment.", - "page_start": 220, - "page_end": 220, - "source_file": "sg246915.pdf" - }, - { - "text": "**12** IBM Content Manager OnDemand Guide\n\n- The *XML Indexer* allows the rapid increase in XML archiving mandates that are based\n\non ISO 20022 standards with XML (including SEPA in Europe). The XML Indexer is\n\noptimized for high-volume batch archiving of XML, batch PDF, AFP, Line Data, and\n\ncheck images.\n\n- The *Full Text Indexer* provides the capability to index the full text of a document (or\n\nreport). You can search through an indexed document.\n\n� *Data loading programs* can be set up to automatically store report data into application\n\ngroups and update the database. The data loading programs can run on any Content\n\nManager OnDemand server.\n\n� *Report Distribution Facility* provides an easy way to automatically group reports and\n\nportions of reports and distribute the reports to multiple users. Distributions can be\n\nprinted, created as an output file, or emailed as an attachment.\n\n� Both the archived reports and their resources are stored in the Content Manager\n\nOnDemand Archive. The Content Manager OnDemand system manages the stored data\n\nthroughout its lifetime. It provides authorized users rapid access to the data and allows the\n\ndata to be converted into different formats for display or print.\n\n� A *server print* facility allows users to reprint a large volume of documents at high speed.\n\nPrint servers, such as Infoprint (on AIX), can be started to manage the server print\n\ndevices. These print servers are not part of Content Manager OnDemand and must be\n\npurchased separately.\n\n� Content Manager OnDemand *management programs* maintain the Content Manager\n\nOnDemand database and documents in cache storage.\n\n� A *system logging* facility provides administrators with tools to monitor server activity and\n\nrespond to specific events as they occur. The interface to the system logging facility is\n\nthrough the system log folder and the system log user exit.", - "page_start": 35, - "page_end": 35, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv4.pdf", - "query": "How many articles compose the Syntec French collective bargaining agreement ?", - "target_page": 2, - "target_passage": "The Syntec French collective bargaining agree- ment comprises around 90 articles", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "tions. We also manually checked that the questions\n\ncould only be answered using the annotated article.\n\n#### **3.1.2 HAL (Clustering)**\n\n*Hyper Articles en Ligne* (HAL) is a French open\n\narchive of scholarly documents from all academic\n\nfields. Scrapping this resource, we fetched 85,000 publications in French 5 . We extracted IDs, titles\n\nand the author’s choice among domain labels. The\n\nlast 2 are provided by authors when submitting\n\ntheir papers to HAL. Since domain annotations are\n\nprovided, the dataset can be used for many tasks,\n\nsuch as topic modeling or text classification. To en-\n\nsure the dataset quality is suitable for a benchmark,\n\nfurther data cleaning has been performed:\n\n- Duplicates are eliminated, retaining unique\n\npublications for each field.\n\n- Irrelevant titles (due to API indexing mistakes)\n\nor titles in languages other than French have\n\nbeen manually removed.\n\n3 [https://www.syntec.fr/convention-collective/](https://www.syntec.fr/convention-collective/)\n\n4 [https://huggingface.co./datasets/lyon-nlp/](https://huggingface.co./datasets/lyon-nlp/mteb-fr-retrieval-syntec-s2p)\n\n[mteb-fr-retrieval-syntec-s2p](https://huggingface.co./datasets/lyon-nlp/mteb-fr-retrieval-syntec-s2p)\n\n5 [https://huggingface.co./datasets/lyon-nlp/](https://huggingface.co./datasets/lyon-nlp/clustering-hal-s2s)\n\n[clustering-hal-s2s](https://huggingface.co./datasets/lyon-nlp/clustering-hal-s2s)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv4.pdf" - }, - { - "text": "**Dataset Syntec HAL SummEvalFr**\n\nSamples 100 queries\n\n90 documents\n\n26233 samples\n\n10 classes\n\n100 texts\n\n1100 human summaries\n\n1600 machine summaries\n\nCreation process Scraping of Syntec col-\n\nlective bargaining agree-\n\nment with articles as doc-\n\numents. Writing queries\n\ncorresponding to articles.\n\nScraping of HAL arti-\n\ncles with *id* , *title* and *do-*\n\n*main* . Further cleaning\n\nwith deduplication, lan-\n\nguage filtering and class\n\nsubsampling.\n\nTranslation from English\n\nto French with Deepl of\n\nthe SummEval dataset.\n\nAnnotation process 4 annotators divided into\n\n2 groups. Each group was\n\ngiven half of the articles\n\nand asked to choose an ar-\n\nticle and ask a question\n\nabout it. Each annotator\n\nwrote 25 questions.\n\nAnnotations provided by\n\nauthors when submitting\n\ntheir paper. They choose\n\nthe *domain* between exist-\n\ning academic fields.\n\nDetailed annotation pro-\n\ncess provided in Fabbri\n\net al. ( 2021 ).\n\nQuality checks Human verification of an-\n\nnotations.\n\nBaseline models for clas-\n\nsification and topic model-\n\ning.\n\nCorrelation between\n\nBLEU and ROUGE\n\nscores of the French\n\nand the original English\n\ndatasets. LLM as-a-judge\n\ntranslation rating and\n\nhuman verification.\n\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the\n\nquality checks. All datasets are test splits.\n\n- Samples belonging to *domain* classes with\n\nless than 500 samples were removed, which\n\nleads us to keep only 10 classes.\n\n- Subsampling was performed on 2 classes con-\n\ntaining more than 10k samples each to lower\n\nthe number of samples and mitigate the unbal-\n\nance of the dataset.\n\nMore details about this process are provided in the\n\nappendix A.2 along with some extracts in Figure\n\n6 . We make the dataset publicly available in both\n\ntheir raw and clean versions. We use this dataset in\n\na clustering setup to cluster publications by their\n\ntitle and use the domain as ground truth. To ensure\n\nthe quality of this dataset, we run 3 baseline mod-\n\nels for classification: *TF-IDF + SVM* , a fine-tuned\n\n*Camembert* ( Martin et al. , 2019 ) and *GPT-4* lever-\n\naging In-Context Learning (ICL). Furthermore, we\n\nrun one baseline model for topic modeling: Latent\n\nDirichlet Allocation (LDA) ( Blei et al. , 2003 ) and\n\nreport scores in the appendix A.2 .\n\n#### **3.1.3 SummEvalFr (Summarization)**\n\nThe original SummEval dataset ( Fabbri et al. , 2021 )\n\nconsists of 100 news articles from the CNN/Dai-\n\nlyMail dataset. Each article has 11 human-written\n\nsummaries and 16 machine-generated summaries\n\nannotated by 8 people with a score for coherence,\n\nconsistency, fluency, and relevance. We trans- lated it from English to French using DeepL API 6 .\n\nSince MTEB evaluation is based on the embedding\n\nsimilarity between machine-generated and human-\n\ngenerated summaries, we propose to compute the\n\nROUGE ( Lin , 2004 ) and BLEU ( Papineni et al. ,\n\n2002 ) metrics between machine and human sum-\n\nmaries for both French and English version. In Ta-\n\nble 2 , we report the average of the scores as well as\n\ntheir correlations between the two languages. The\n\ncorrelation is high (above 0.7), showing that the\n\nword and n-gram overlap between human and ma-\n\nchine summaries is highly preserved in the French\n\nversion. One may argue that computing the met-\n\nric on fully translated texts (human and machine\n\nsummaries are both translated from English) may\n\nintroduce biases and not assess the quality of the\n\ntranslations. For this purpose, we ensure the French\n\nhuman summaries are correctly translated from En-\n\nglish. We use an LLM as-a-judge ( Zheng et al. ,\n\n6 [https://www.deepl.com](https://www.deepl.com)\n\n3", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "**Document**\n\n| id | article-14 |\n|:---|:---|\n| url | https://www.syntec.fr/convention- collective/resiliation-du-contrat- de-travail/#article-14 |\n| title | Article 14 : Préavis pendant la péri- ode d’essai |\n| section | Résiliation du contrat de travail |\n| content | Modification Avenant n° 7 du 5/07/1991 Au cours de cette péri- ode, les deux parties peuvent se sé- parer avec un préavis d’une journée de travail pendant le premier mois. Après le premier mois, le temps de préavis réciproque sera d’une semaine par mois complet passé dans l’entreprise. Après le pre- mier mois, le temps de préavis ré- ciproque sera d’une semaine par mois passé dans l’entreprise. Le préavis donne droit au salarié de s’absenter pour la recherche d’un emploi dans les conditions fixées à l’article 16. Le salarié sera payé au prorata du temps passé pendant la période d’essai. |\n\n**Query**\n\n| article | article-14 |\n|:---|:---|\n| question | Quel est le préavis en période d’essai ? |\n\nFigure 5: Extracts of Syntec dataset.\n\n| hal_id | Domain | Title |\n|:---|:---|:---|\n| hal-02899209 | shs | La transformation digitale du manage- ment des ressources humaines et de ses enjeux pour les entreprises |\n| tel-03993881 | math | Sur l’approximation numérique de quelques problèmes en mécanique des fluides |\n\nFigure 6: Extracts of HAL dataset.\n\nFigure 7: Distribution of the word count per title in HAL\n\ndataset, *mteb_eval* subset.\n\n\"\"\"\n\nYou will be given a couple of texts in\n\nEnglish and their translation in French.\n\nYour task is to provide a 'rating' score on\n\nhow well the system translated the\n\nEnglish text into French.\n\nGive your answer as a float on a scale of 0\n\nto 10, where 0 means that the\n\nsystem_translation is bad and does not\n\nrepresent what is being said in the\n\noriginal English text, and 10 means that\n\nthe translation is good and represents\n\nthe original English text.\n\nNo need to mind the quality of the text as\n\noriginal English text may be of bad\n\nquality.\n\nProvide your feedback as follows:\n\nFeedback:::\n\nTotal rating: (your rating, as a float\n\nbetween 0 and 10)\n\nNow here are the English and French texts.\n\nOriginal text in English: {english_text}\n\nTranslation in French: {french_translation}\n\nFeedback:::\n\nTotal rating:\n\n\"\"\"\n\nFigure 8: Prompt used for LLM as-judge evaluation of\n\nSummEval dataset translation.", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv4.pdf" - }, - { - "text": "Contents\n\nConsolidated Five-Year Summary 70\n\nBusiness and Other Risks 71\n\nConsolidated Balance Sheets 72\n\nConsolidated Statements of Income 74\n\nConsolidated Statements of Shareholders’ Equity 75\n\nConsolidated Statements of Cash Flows 76\n\nNotes to Consolidated Financial Statements 77\n\nReport of Independent Auditors 104\n\nNon-consolidated Five-Year Summary 105\n\nFINANCIAL SECTION", - "page_start": 70, - "page_end": 70, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "subsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written\n\nnote and (2) the LLM-generated note.\n\nOn a Likert scale of 1 to 5, where 1 is unacceptable and 5 is excellent, the 3 physicians rated the\n\ncompleteness, curation, readability, and correctness of the summary as shown in eTable 1 in\n\n[Supplement 1](https://jama.jamanetwork.com/article.aspx?doi=10.1001/jamanetworkopen.2024.48723&utm_campaign=articlePDF%26utm_medium=articlePDFlink%26utm_source=articlePDF%26utm_content=jamanetworkopen.2024.48723) . Physicians rated the usefulness of the summary, defined as the capability of the\n\nsummary being incorporated into a workflow where a physician would make edits before final\n\ncompletion, mitigating potential future self-referential learning loops and the downstream adverse consequences. 51 Likewise, the raters assessed potential patient safety implications of unmitigated\n\nmodel errors using a scale from 1 to 5, where 1 denotes life-threatening risks and 5 denotes no\n\nidentified patient safety risk for completeness, curation, readability, and the 4 subcategories within\n\ncorrectness (hallucination, faulty logic, knowledge gap, and bias), as well as the overall patient safety risk. 45 Evaluators arrived at prestudy consensus that a usefulness Likert score of at least a 3 out of 5\n\nindicated that the LLM-generated summary likely demonstrated baseline acceptability for such a\n\nworkflow. To extrapolate a theoretical worst case scenario, the physicians rated the safety of the\n\nLLM-generated summary as defined as the capability of the summary to fully replace a physician-\n\nwritten note (unmitigated).\n\nTo improve consistency and agreement, the 3 reviewers met to familiarize themselves with the\n\nframework and evaluated 10 separate cases from the test dataset that were not included in the\n\nclinical evaluation results. Additionally, after independently scoring the summaries, they met to\n\nensure consensus interpretation of the multidimensional scoring framework. Interrater reliability was\n\ncalculated using intraclass correlation coefficient (ICC), using a 2-way random effects model for\n\nconsistency with the Pingouin statistical package version 0.5.4 in Python (Python Software\n\nFoundation). The ICC measures the similarity of the 3 raters to confirm the consistency and validity\n\nof the evaluation protocol; the scores are from 0 to 1, where 1 indicates unanimous agreement and 0 represents no agreement. 52 Data were analyzed from October 2023 to March 2024.\n\n### **Results**\n\n#### **Automated Tasks**\n\nOf 1600 patients, the mean (SD) age was 59.8 (18.9) years and 832 (52%) were female. In **Table 2** ,\n\nROUGE and BERTScore compare the summaries with the testing set from our annotations, and\n\nSCALE score compares the summaries with the source notes. From automatic evaluation results, we\n\nobserved that LLM-generated summaries had better scores than the physician summaries, such that\n\nROUGE-2 was 0.322 vs 0.088, BERT-precision was 0.859 vs 0.796, and SCALE was 0.691 vs 0.456,\n\nsuggesting the LLM-generated summaries were more similar and more detailed than the physician\n\nsummaries.\n\n#### **Clinical Evaluation Tasks**\n\nThe clinical evaluation results for LLM-generated summaries and physician-written summaries are\n\nshown in **Table 3** and **Table 4** . The mean clinical quality scores of the automated summaries are in a\n\ncomparable range (4-5) to those of the physician summaries. However, the automated summaries\n\nwere observed to be of lower quality compared with the physician-written summaries with regards\n\nto mean (SD) usefulness (4.04 [0.85] vs 4.36 [0.71]), completeness (4.00 [0.88] vs 4.16 [0.84]),\n\nTable 2. Automated Evaluation Scores, Large Language Model (LLM)- Generated and Physician-Written\n\nSummary type R-1 a R-2 a R-L a BERT-p BERT-r SCALE\n\nLLM-generated 0.494 0.322 0.391 0.859 0.876 0.691", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed8.pdf" - }, - { - "text": "**Q4: Are there any correlations between**\n\n**datasets with respect to model ranking?**\n\nThe datasets correlation w.r.t model ranking are\n\npresented in appendix Figure 12 . Except for\n\ntwo datasets ( *MasakhaNEWSClusteringP2P* , *Sum-*\n\n*mEvalFr* ), the correlations, on average, are high.\n\nThere is still enough diversity to make each dataset\n\ninteresting for the French MTEB benchmark. Two\n\ngroups ( *SyntecReranking* / *SyntecRetrieval* , *Mas-*\n\n*siveScenarioClassification* / *MTOPDomainClassi-*\n\n*fication* / *MassiveIntentClassification* ) exhibit no-\n\ntably high correlations ( *∼* 0.97). It is interesting to point out some sub-diagonal correlation blocks.\n\nThe datasets being arranged by task indicate that\n\nmodels behave slightly more similarly within the\n\nsame task than between two different tasks. This\n\nunderscores the importance of having multiple\n\ntasks in the benchmark to select general-purpose\n\nmodels. For readers interested in specific tasks,\n\nit is more relevant to examine task-specific rank-\n\nings rather than the overall one. The complemen-\n\ntary results of model correlations w.r.t to strengths\n\nand weaknesses on datasets are displayed in ap-\n\npendix Figure 11 . Strong correlations in behavior\n\nemerge among the variants of the same models\n\n(e.g. DistilBERT, sentence-croissant, sentence-t5,\n\ne5, etc.). Correlations are also generally observed\n\namong numerous models trained using the sentence\n\ntransformers framework ( Reimers and Gurevych ,\n\n2019 ), as well as proprietary models, e.g. from\n\nCohere and OpenAI. Conversely, these models fine-\n\ntuned for sentence similarity, show minimal cor-\n\nrelation with pre-trained models for which token-\n\nembedding pooling techniques are employed.\n\n## **5 Conclusion and perspectives**\n\nIn this work, we introduce a large-scale embed-\n\nding benchmark for French to enable the research\n\ncommunity and industry to select the most relevant\n\nembedding methods based on their specific needs.\n\nWe undertake significant efforts in collecting 15\n\ndatasets and create 3 new quality-checked ones to\n\nenhance this collection. The whole French bench-\n\nmark runs on 26 tasks. We select a diverse range of\n\n51 models, including prominent French and multi-\n\nlingual models deemed most efficient to conduct a\n\nbroad comparison. Our implementation is open to\n\nthe community and features a public leaderboard,\n\nallowing the results to evolve with new models or\n\ndatasets. After an in-depth analysis of the results,\n\nOpenAI models perform significantly better than\n\nthe other models. However, other models should be\n\nconsidered for their performance on specific tasks,\n\nbeing open source or having a small embedding\n\ndimension.\n\nThis work opens several doors for future im-\n\nprovements. By examining dataset diversity in\n\nterms of topics and model ranking, we observe\n\nthat the benchmark would benefit from additional\n\ndatasets that introduce higher diversity. Beyond\n\nclassification, many tasks focus on semantic simi-\n\nlarity, explaining the strong performance of models\n\ntrained for similarity. Exploring novel tasks in the\n\ngenerative spectrum or evaluating token embed-\n\ndings (contextualized or not) on tasks like Named\n\nEntity Recognition could be an interesting path\n\nfor future exploration. There are also opportuni-\n\nties for improvements on the model side. With\n\nnumerous existing models that could be added to\n\nthe leaderboard and many new proposals awaiting.\n\nFor instance, we can already see the promising ca-\n\npabilities of early variants of recent models ( Faysse\n\net al. , 2024 ) and expect that future proposals will\n\ncome to compete strongly with closed-source mod-\n\nels. Ultimately, we hope to see the emergence of\n\nother language-specific MTEB variants (e.g. for\n\nhigh-resource languages like Spanish and German),\n\nenabling a more comprehensive evaluation of mul-\n\ntilingual model performance.\n\n## **6 Limitations**\n\n**Native French resources unavailability** The", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv4.pdf" - }, - { - "text": "## **6 OSH legislation and OSH infrastructure in the EU**\n\n### **6.1 Foundation, legislation, compliance and supervision**\n\nThe **ethical and economic importance of safe and healthy working conditions** led to an integration\n\nof this target in international conventions and agreements; it is also embedded in the treaties of the EU.\n\n**UN** has included **‘Safe and secure work environment’** as an indicator for **Goal 8** of their 17 global\n\n**‘Sustainable Development Goals** ’ for 2030. Goal 8 aims to *‘Promote sustained, inclusive and*\n\n*sustainable economic growth, full and productive employment and decent work for all’* . 334 It requests in\n\nits target 8.8 to *‘Protect labour rights and promote safe and secure working environments for all workers,*\n\n*including migrant workers, in particular women migrants, and those in precarious employment.’*\n\nThe **Preamble to the Constitution** 335 **of the ILO** includes as an objective *‘* … *the protection of the*\n\n*worker against sickness, disease and injury arising out of his employment ...’* [. In 2022, the objective of ](https://www.ilo.org/wcmsp5/groups/public/---ed_norm/---declaration/documents/normativeinstrument/wcms_716594.pdf)\n\na safe and healthy working environment became part of the ‘Declaration on Fundamental Principles and\n\nRights at Work’, adding OSH to the existing four basic principles, that is, 1) freedom of association and\n\nright to collective bargaining, 2) the elimination of all forms of forced or compulsory labour, 3) the\n\neffective abolition of child labour, and 4) the elimination of discrimination. Between the year of the\n\nfoundation in 1919 and today, the ILO agreed on more than 40 conventions and recommendations\n\naddressing OSH, be it either general provisions or provisions for specific groups and sectors or specific\n\nrisks. 336\n\nThe **EU and its predecessors** have enshrined health and safety of workers in their **founding treaties** .\n\nAlready in 1951, it was stated in Article 3 of the European Coal and Steel Community (ECSC) Treaty\n\nthat *‘The institutions of the Community shall, within the limits of their respective powers, in the common*\n\n*interest … promote improved working conditions and an improved standard of living for the workers in*\n\n*each of the industries for which it is responsible …’* . 337 During the development of the European\n\ninstitutions and the EU from those years until today, references to working conditions and safety and\n\nhealth were always part of the treaties, and also in the latest Treaty of Lisbon from 2009. 338\n\nIn **Article 151 of the Lisbon Treaty,** it is stated that *‘The Union and the Member States, shall have as*\n\n*their objectives the promotion of employment, improved living and working conditions …’* . The areas of\n\nsuch promotion are set out in **Article 153** , where two bullet points refer to OSH: (a) *improvement in*\n\n*particular of the working environment to protect workers’ health and safety; (b) working conditions.* In\n\n2017, the European Commission launched an initiative to agree on the **‘European Pilar of Social**\n\n**Rights’** (EPSR), comprising 20 key principles guiding the EU in the field of social policy. 339 These pillars\n\nwere agreed by the Member States; **Principle 10 refers to a** ‘ **Healthy, safe and well-adapted work**\n\n**environment** and data protection.’\n\nThese European and international agreements and treaties regard **safety and health** as essential for\n\nhuman development, a **basic human right** . The main reasoning is to eliminate or reduce as much as\n\npossible suffering, sickness, disability and death of workers. Often the reasoning refers to intertwined\n\nobjectives, that is, to economic growth (UN), or to reduce the economic burden of incomplete health and\n\nsafety at work, be it the burden for enterprises or the society as a whole, that is, by *‘Promotion of*", - "page_start": 117, - "page_end": 117, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "2023 ) where given the original human summary\n\nin English and its translation in French, the model\n\nrates the quality of the translation from 0 to 10 ,\n\nwith 0 being of very bad quality and 10 being ex-\n\ncellent. The prompt is available in Figure 8 . Ad-\n\nditionally, we manually check random translations\n\nwith ratings between 9 and 10 to ensure the rating\n\nis relevant. We do the same for all translations with a score less than 9 and correct them 7 (see the rating\n\ndistribution in Table 6 ).\n\n**Dataset BLEU ROUGE-1 ROUGE-2 ROUGE-L**\n\nSummEval 0.205 0.292 0.099 0.193\n\nSummEvalFr 0.276 0.302 0.117 0.194\n\nCorrelation En-Fr 0.70 0.85 0.80 0.84\n\nTable 2: Average ROUGE and BLUE scores computed\n\nbetween machine summaries and human summaries\n\nfor the original English SummEval and its translation\n\nto French. The correlations of the individual scores\n\nbetween English and French are also reported.\n\n#### **3.1.4 Data for the Reranking task**\n\nThe reranking task, as evaluated in MTEB, requires\n\ndatasets composed of a set of queries, each as-\n\nsociated with relevant and irrelevant documents.\n\nDespite our efforts, we found no French dataset\n\nthat natively exhibits such a structure. Thus, to\n\nevaluate this task, we built data for the reranking\n\ntask based on the *Syntec* and *Alloprof* ( Lefebvre-\n\nBrossard et al. , 2023 ) datasets. These already fea-\n\nture queries and labeled relevant documents. Irrele-\n\nvant ones were added using the following process:\n\n- To avoid bias, we use the BM25 algorithm\n\n( Robertson and Jones , 1976 ) (which is a deter-\n\nministic method) to rank documents in terms\n\nof relevance regarding each query.\n\n- The top 10 documents that are not labeled as\n\nrelevant constitute the negative samples.\n\nWe recognize that this process leads to a high cor-\n\nrelation between the retrieval and reranking tasks.\n\nWe still think it is essential to make the latter avail- able, with an open door to future improvement 8 .\n\n7 SummEvalFr available at: [ https://huggingface.co./](https://huggingface.co./datasets/lyon-nlp/summarization-summeval-fr-p2p)\n\n[datasets/lyon-nlp/summarization-summeval-fr-p2p](https://huggingface.co./datasets/lyon-nlp/summarization-summeval-fr-p2p)\n\n8 SyntecReranking available at: [https:](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-syntec-s2p)\n\n[//huggingface.co/datasets/lyon-nlp/](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-syntec-s2p)\n\n[mteb-fr-reranking-syntec-s2p](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-syntec-s2p) and AlloprofRerank- ing available at: [https://huggingface.co./datasets/](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-alloprof-s2p)\n\n[lyon-nlp/mteb-fr-reranking-alloprof-s2p](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-alloprof-s2p)\n\n#### **3.1.5 Similarity analysis**\n\nWe investigate the proximity between the datasets’\n\ntopics to give insights about the benchmark con-\n\ntents. The methodology introduced by Muen-\n\nnighoff et al. ( 2022 ), i.e. computing an average\n\nembedding of samples from each dataset, is used to\n\nbuild a dataset-similarity matrix (displayed in ap-\n\npendix Figure 3 ). The distances between averaged\n\nembedding vectors of each dataset (which range\n\nfrom 0 *.* 89 to 1 in Figure 3 ) remain hard to interpret\n\ninto a dataset semantic proximity. Thus, we com-\n\nplement this by observing the dataset’s clouds of\n\nembedding in a 2D plane using PCA in Figure 4 .\n\nFigures 4 and 3 seem to correlate, showing high\n\nsimilarity between two datasets when the same\n\nunderlying data is used in different tasks. Dataset\n\ntopics are pretty close, with some exceptions, such\n\nas the Syntec dataset. As more datasets are added\n\nto the benchmark, this analysis will help select new\n\ndata that do not produce redundant results. It may\n\nalso help to understand the link between the results\n\nand the datasets’ topics.\n\n### **3.2 Models**\n\nFor comparison on our benchmark, we selected", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" - }, - { - "text": "**I.10.3. Provision of list of pre-existing rights and documentary evidence**\n\nThe contractor must provide the contracting authority with a list of *pre-existing rights* as\n\nset out in Article II.13.4 together with the invoice for payment of the balance at the latest.\n\n## **I.11. Termination by either party 2**\n\nEither party may terminate the FWC and/or the FWC and specific contracts by sending\n\n*formal notification* to the other party with three months written notice.\n\nIf the FWC or a specific contract is terminated:\n\na) neither party is entitled to compensation;\n\nb) the contractor is entitled to payment only for the services provided before termination takes effect.\n\nThe second, third and fourth paragraphs of Article II.18.4 apply.\n\n## **I.12. Applicable law and settlement of disputes**\n\n**I.12.1** The FWC is governed by Union law, complemented, where necessary, by the law of\n\nFinland.\n\n**I.12.2** The courts of Finland have exclusive jurisdiction over any dispute regarding the\n\ninterpretation, application or validity of the FWC.\n\n## **I.13. Interinstitutional FWC**\n\nNot applicable\n\n## **I.14. Service provided on the premises of the contracting authority**\n\nNot applicable.\n\n## **I.15. Other special conditions**\n\nElectronic documents exchange\n\nIt is intended that the documents exchange (e.g. invoices, deliverables) between the\n\nAgency and the Contractor will have to be carried out via electronic means.\n\nAt the request of the Agency, the use of such electronic applications will become\n\nmandatory, upon mutual agreement, during the performance of the contract, at no additional cost for the Agency.\n\n2 This article may be deleted on the basis of a risk assessment taking into account the specific market and the need for business continuity", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n####### **NOTE 27 - CAPITAL AND OTHER EXPENDITURE COMMITMENTS continued**\n\nThe following tables summarize the Group’s contractual commitments not provided for in the consolidated\n\nfinancial statements:\n\n####### **As at 31 December 2014 Total**\n\n####### **Less than 1**\n\n####### **year 1 - 5 years**\n\n####### **More than 5**\n\n####### **years**\n\nDrilling rig commitments (1)\n\n1,460 1,460 - -\n\nOperating lease commitments (3) 2,363 430 1,933 -\n\nEmployment commitments (4) 742 370 372 -\n\nTotal expenditure commitments 4,565 2,260 2,305 -\n\n####### **As at 31 December 2013 Total**\n\n####### **Less than 1**\n\n####### **year 1 - 5 years**\n\n####### **More than 5**\n\n####### **years**\n\nDrilling rig commitments (1)\n\n5,159 5,159 - -\n\nDrilling commitments (2) 2,000 - 2,000 -\n\nOperating lease commitments (3) 1,860 200 1,354 306\n\nEmployment commitments (4) 104 104 - -\n\nTotal expenditure commitments 9,123 5,463 3,354 306\n\n(1) As at 31 December 2014 the Company had one (2013: four) outstanding drilling rig contracts to\n\nexplore and develop the Company’s properties. The contracts generally have terms of 6 months.\n\nAmounts represent minimum expenditure commitments should the Company elect to terminate\n\nthese contracts prior to term. (2) On 31 December 2012, the Company entered into an agreement to acquire certain oil and natural\n\ngas properties located in the Wattenberg Field and to drill 45 net wells by 31 December 2015 on\n\nthe acquired properties (the “Drilling Commitment”). As each qualifying well is drilled,\n\napproximately $67 thousand is paid from the escrow account to the Company. However, for each\n\nrequired net commitment well not completed by the Company during that prorated commitment\n\nyear, the Company is to pay the seller of the properties approximately $67 thousand from the\n\nescrow account. Certain clawback provisions allow the Company to recoup amounts paid to the\n\nsellers if the total 45 wells are drilled by 31 December 2015. The Company sold the properties in\n\nJuly 2014 and should the buyer drill any qualifying wells, the obligation would be satisfied. As at\n\n31 December 2014, the Company and the buyer had not drilled any wells and the Company does\n\nnot expect any wells to be drilled under this provision in 2015. As such, the remaining\n\ncommitment of $2.0 million was accrued in our consolidated statement of financial position and\n\nrecognised against the gain on sale of assets in the consolidated statement of profit or loss and\n\ncomprehensive income. (3) Represents c ommitments for minimum lease payments in relation to non-cancellable operating\n\nleases for office space not provided for in the consolidated financial statements. (4) Represents commitments for the payment of salaries and other remuneration under long-term\n\nemployment and consultant contracts not provided for in the consolidated financial statements.\n\nDetails relating to the employment contracts are set out in the Company’s Remuneration Report.\n\n- 92 -", - "page_start": 93, - "page_end": 93, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv4.pdf", - "query": "In the context of research publication, what is HAL ?", - "target_page": 3, - "target_passage": "Hyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "institutional requirements. The participants provided their written\n\ninformed consent to participate in this study.\n\n### Author contributions\n\nSD: Conceptualization, Data curation, Formal Analysis,\n\nInvestigation, Methodology, Project administration, Resources,\n\nVisualization, Writing - original draft, Writing - review &\n\nediting. EA: Conceptualization, Formal Analysis, Methodology,\n\nSupervision, Writing - review & editing. BN: Conceptualization,\n\nFormal Analysis, Funding acquisition, Methodology, Project\n\nadministration, Resources, Supervision, Writing - review & editing.\n\n### Funding\n\nThe author(s) declare that fi nancial support was received for\n\nthe research, authorship, and/or publication of this article.\n\nThe development of the CoreDISTparticipation and the RCT is\n\nfunded by the Northern Norway Health Authority (Helse Nord\n\nRHF). This interview study was funded by Nord University\n\n(PhD salary).\n\n### Acknowledgments\n\nThe authors would like to thank the participants in this study\n\nand the user representatives from Nordland MS Association for\n\ntheir valuable contributions. The authors also acknowledge\n\nphilosopher of the mind and cognitive sciences Hanne De\n\nJaegher for the valuable comments on the interpretations and\n\ndiscussions of the results.\n\n### Con fl ict of interest\n\nThe authors declare that the research was conducted in the\n\nabsence of any commercial or fi nancial relationships that could\n\nbe construed as a potential con fl ict of interest.\n\n### Publisher ’ s note\n\nAll claims expressed in this article are solely those of the authors\n\nand do not necessarily represent those of their af fi liated organizations,\n\nor those of the publisher, the editors and the reviewers. Any product\n\nthat may be evaluated in this article, or claim that may be made by its\n\nmanufacturer, is not guaranteed or endorsed by the publisher.\n\n### References\n\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising\n\nprevalence of multiple sclerosis worldwide: insights from the Atlas of MS, third\n\nedition. Mult Scler . (2020) 26(14):1816 - [21. doi: 10.1177/1352458520970841](https://doi.org/10.1177/1352458520970841)\n\n2. Casey B, Coote S, Galvin R, Donnelly A. Objective physical activity levels in\n\npeople with multiple sclerosis: meta-analysis. Scand J Med Sci Sports . (2018) 28\n\n(9):1960 - [9. doi: 10.1111/sms.13214](https://doi.org/10.1111/sms.13214)\n\n3. Kinnett-Hopkins D, Adamson B, Rougeau K, Motl RW. People with MS are less\n\nphysically active than healthy controls but as active as those with other chronic\n\ndiseases: an updated meta-analysis. Mult Scler Relat Disord . (2017) 13:38 - 43.\n\n[doi: 10.1016/j.msard.2017.01.016](https://doi.org/10.1016/j.msard.2017.01.016)\n\n4. Hoang PD, Lord S, Gandevia S, Menant J. Exercise and sports science Australia\n\n(ESSA) position statement on exercise for people with mild to moderate multiple\n\nsclerosis. J Sci Med Sport . (2022) 25(2):146 - [54. doi: 10.1016/j.jsams.2021.08.015](https://doi.org/10.1016/j.jsams.2021.08.015)\n\n5. Dalgas U, Langeskov-Christensen M, Stenager E, Riemenschneider M, Hvid LG.\n\nExercise as medicine in multiple sclerosis — time for a paradigm shift: preventive,\n\nsymptomatic, and disease-modifying aspects and perspectives. Curr Neurol Neurosci\n\nRep . (2019) 19(11):1 - [12. doi: 10.1007/s11910-019-1002-3](https://doi.org/10.1007/s11910-019-1002-3)\n\n6. Riemenschneider M, Hvid LG, Ringgaard S, Nygaard MKE, Eskildsen SF,\n\nGaemelke T, et al. Investigating the potential disease-modifying and neuroprotective\n\nef fi cacy of exercise therapy early in the disease course of multiple sclerosis: the early\n\nmultiple sclerosis exercise study (EMSES). Mult Scler . (2022) 28(10):1620 - [9. doi: 10.](https://doi.org/10.1177/13524585221079200)\n\n[1177/13524585221079200](https://doi.org/10.1177/13524585221079200)\n\n7. Kalb R, Brown TR, Coote S, Costello K, Dalgas U, Garmon E, et al. Exercise and\n\nlifestyle physical activity recommendations for people with multiple sclerosis", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "It is also an example predicated on copyright’s limitations and exceptions — in this case, on\n\nU.S. fair use. While the Authors Guild filed a copyright infringement suit against HathiTrust,\n\nfederal courts in 2012 and 2014 ruled that HathiTrust’s use of books was fair use. 32\n\nA nonprofit founded in 2008, HathiTrust grew out of a partnership among major US university\n\nlibraries and today is “an international community of research libraries committed to the\n\nlong-term curation and availability of the cultural record.” It started in what it calls the “early 33\n\ndays of mass digitization” — that is, at a time when it started to become economical to take\n\nexisting physical artifacts in libraries and turn them into digital files at a large scale.\n\nThe founding members of HathiTrust were among the initial partners for Google’s Book\n\nSearch product, which allows people to search across and view small snippets of text from\n\nin-copyright books and read full copies of public domain books scanned from libraries’ 34\n\ncollections. The libraries provided Google with books from their collections, Google would\n\nthen scan the books for use in Book Search, and return to the libraries a digital copy for their\n\nown uses. These uses included setting up HathiTrust not only to ensure long-term\n\npreservation of the digital books and their metadata, but also to facilitate other uses,\n\nincluding full text search of books and accessibility for people with print disabilities. In\n\nseparate court cases, both Google and HathiTrust’s uses of the books were deemed\n\nconsistent with copyright law.\n\nThe uses most relevant to this paper are those enabled by what HathiTrust refers to today as\n\nthe Research Center. The Center grew in part out of a research discipline called “digital\n\nhumanities,” which, among other things, seeks to use computational resources or other\n\ndigital technologies to analyze information and contribute to the study of literature, media,\n\nhistory, and other areas. For instance, imagine you want to understand how a given term\n\n(e.g., “war on drugs”) became used; one might seek to analyze when the term was first used\n\nand how often it was used over time by analyzing a vast quantity of sources, searching out\n\nthe term’s use. The insight here is that there is much to be learned not just from reading or\n\notherwise consuming specific material, but also from “non-consumptive research,” or\n\n\"research in which computational analysis is performed on one or more volumes (textual or\n\nimage objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use.\n\nToday, the Center “[s]upports large-scale computational analysis of the works in the\n\nHathiTrust Digital Library to facilitate non-profit and educational research.” It includes over 18\n\nmillion books in over 400 languages from the HathiTrust Digital Library collection. Roughly\n\n58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has\n\nlimitations in terms of its representation across subject matter, language, geography, and\n\nother dimensions. In terms of subject matter, the corpus is skewed towards humanities\n\n(64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English,\n\n*Authors Guild v. HathiTrust,* 902 F.Supp.2d 445 (SDNY October 10, 2012) and *Authors Guild v.* 32\n\n*HathiTrust* , 755 F.3d 87 (2d Cir. 2014).\n\nSee [https://www.hathitrust.org/member-libraries/member-list/ ](https://www.hathitrust.org/member-libraries/member-list/) — the membership is principally US 33\n\ninstitutions, and most of the non-US members are from English speaking countries or institutions that\n\nuse English as the primary language of operations.\n\nThis functionality is limited to scanned books provided by library partners in the US. 34", - "page_start": 14, - "page_end": 14, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "the language model \"knows\". However, probing\n\nstudies have limitations ( subsection 3.4 ), and to this\n\npoint, far fewer papers have focused on discovering\n\nwhat knowledge actually gets used. Several promis-\n\ning directions are the \"amnesic probing\" ( Elazar\n\net al. , 2020 ), identifying features important for pre-\n\ndiction for a given task ( Arkhangelskaia and Dutta ,\n\n2019 ), and pruning the model to remove the non-\n\nimportant components ( Voita et al. , 2019b ; Michel\n\net al. , 2019 ; Prasanna et al. , 2020 ).\n\n## **8 Conclusion**\n\nIn a little over a year, BERT has become a ubiq-\n\nuitous baseline in NLP experiments and inspired\n\nnumerous studies analyzing the model and propos-\n\ning various improvements. The stream of papers\n\nseems to be accelerating rather than slowing down,\n\nand we hope that this survey helps the community\n\nto focus on the biggest unresolved questions.\n\n## **9 Acknowledgements**\n\nWe thank the anonymous reviewers for their valu-\n\nable feedback. This work is funded in part by\n\nthe NSF award number IIS-1844740 to Anna\n\nRumshisky.", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "provide many variants of BERT, including the orig-\n\ninal \"base\" and \"large\" versions. They vary in the\n\nnumber of heads, layers, and hidden state size.\n\n1 [https://github.com/](https://github.com/google-research/bert)\n\n[google-research/bert](https://github.com/google-research/bert)\n\narXiv:2002.12327v3 [cs.CL] 9 Nov 2020", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "## **A Primer in BERTology: What We Know About How BERT Works**\n\n### **Anna Rogers**\n\nCenter for Social Data Science\n\nUniversity of Copenhagen\n\narogers@sodas.ku.dk\n\n### **Olga Kovaleva**\n\nDept. of Computer Science\n\nUniversity of Massachusetts Lowell\n\nokovalev@cs.uml.edu\n\n### **Anna Rumshisky**\n\nDept. of Computer Science\n\nUniversity of Massachusetts Lowell\n\narum@cs.uml.edu\n\n### **Abstract**\n\nTransformer-based models have pushed state\n\nof the art in many areas of NLP, but our un-\n\nderstanding of what is behind their success\n\nis still limited. This paper is the first sur-\n\nvey of over 150 studies of the popular BERT\n\nmodel. We review the current state of knowl-\n\nedge about how BERT works, what kind\n\nof information it learns and how it is repre-\n\nsented, common modifications to its training\n\nobjectives and architecture, the overparame-\n\nterization issue and approaches to compres-\n\nsion. We then outline directions for future\n\nresearch.\n\n## **1 Introduction**\n\nSince their introduction in 2017, Transformers\n\n( Vaswani et al. , 2017 ) have taken NLP by storm,\n\noffering enhanced parallelization and better model-\n\ning of long-range dependencies. The best known\n\nTransformer-based model is BERT ( Devlin et al. ,\n\n2019 ); it obtained state-of-the-art results in numer-\n\nous benchmarks and is still a must-have baseline.\n\nWhile it is clear that BERT works remarkably\n\nwell, it is less clear *why* , which limits further\n\nhypothesis-driven improvement of the architecture.\n\nUnlike CNNs, the Transformers have little cogni-\n\ntive motivation, and the size of these models limits\n\nour ability to experiment with pre-training and per-\n\nform ablation studies. This explains a large number\n\nof studies over the past year that attempted to un-\n\nderstand the reasons behind BERT’s performance.\n\nIn this paper, we provide an overview of what\n\nhas been learned to date, highlighting the questions\n\nwhich are still unresolved. We first consider the\n\nlinguistic aspects of it, i.e., the current evidence\n\nregarding the types of linguistic and world knowl-\n\nedge learned by BERT, as well as where and how\n\nthis knowledge may be stored in the model. We\n\nthen turn to the technical aspects of the model and\n\nprovide an overview of the current proposals to\n\nimprove BERT’s architecture, pre-training and fine-\n\ntuning. We conclude by discussing the issue of\n\noverparameterization, the approaches to compress-\n\ning BERT, and the nascent area of pruning as a\n\nmodel analysis technique.\n\n## **2 Overview of BERT architecture**\n\nFundamentally, BERT is a stack of Transformer\n\nencoder layers ( Vaswani et al. , 2017 ) which consist\n\nof multiple self-attention \"heads\". For every input\n\ntoken in a sequence, each head computes key, value\n\nand query vectors, used to create a weighted repre-\n\nsentation. The outputs of all heads in the same layer\n\nare combined and run through a fully-connected\n\nlayer. Each layer is wrapped with a skip connection\n\nand followed by layer normalization.\n\nThe conventional workflow for BERT consists\n\nof two stages: pre-training and fine-tuning. Pre-\n\ntraining uses two self-supervised tasks: masked\n\nlanguage modeling (MLM, prediction of randomly\n\nmasked input tokens) and next sentence prediction\n\n(NSP, predicting if two input sentences are adjacent\n\nto each other). In fine-tuning for downstream ap-\n\nplications, one or more fully-connected layers are\n\ntypically added on top of the final encoder layer.\n\nThe input representations are computed as fol-\n\nlows: each word in the input is first tokenized into\n\nwordpieces ( Wu et al. , 2016 ), and then three em-\n\nbedding layers (token, position, and segment) are\n\ncombined to obtain a fixed-length vector. Special\n\ntoken [CLS] is used for classification predictions,\n\nand [SEP] separates input segments.\n\nGoogle 1 and HuggingFace ( Wolf et al. , 2020 )\n\nprovide many variants of BERT, including the orig-\n\ninal \"base\" and \"large\" versions. They vary in the\n\nnumber of heads, layers, and hidden state size.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "##### * **Acknowledgements** *\n\nAuthored by Alek Tarkowski and Paul Keller ( [Open Future](https://openfuture.eu/) ), Derek Slater and Betsy Masiello\n\n( [Proteus Strategies](https://www.proteusstrategies.com/) ) in collaboration with [Creative Commons](https://creativecommons.org/) .\n\nWe are grateful to participants in the workshops, including Luis Villa, Tidelift and openml.fyi;\n\nJonathan Band; Peter Brantley, UC Davis; Aaron Gokaslan, Cornell; Lila Bailey, Internet\n\nArchive; Jennifer Vinopal, HathiTrust Digital Library; Jennie Rose Halperin, Library Futures/\n\nNYU Engelberg Center, Nicholas P. Garcia, Public Knowledge; Sayeed Choudhury; Erik\n\nStallman, UC Berkeley School of Law. The paper represents the views of the authors,\n\nhowever, and should not be attributed to the workshop as a whole. All mistakes or errors are\n\nthe authors’.\n\nThis report is published under the terms of the [Creative Commons Attribution ](https://creativecommons.org/licenses/by/4.0/) License .", - "page_start": 21, - "page_end": 21, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "### MARKETING\n\n**Better information,**\n\n**Better decision**\n\nO U R W O R K\n\nASAKO HOSHINO\n\nVice President\n\n**Market Intelligence**\n\n“Why does a company conduct market research on\n\nconsumers? It is not just about asking the customer\n\nif they prefer A or B, which is often what managers\n\nwant to know. Accumulating knowledge on consumer\n\nbehavior and emerging trends is how you come up\n\nwith ideas that are truly focused on the customer.\n\nOur aim is to gain the deepest understanding of the\n\ncustomer possible, and use that insight to identify\n\nfuture trends.\n\nThe Market Intelligence department is relatively\n\nnew, formed by combining the research functions\n\nonce carried out separately by various divisions.\n\nThe merger and our independent status have brought\n\nseveral practical benefits. We now have uniform\n\nprocedures for conducting research, better research\n\nmethodologies, and greater objectivity in the\n\ninterpretation of the data. Today, we’re a team of\n\nexperts in this field, not simply coordinators between\n\nresearch organizations and the decision makers.\n\nWe are often benchmarked by other industries.\n\nWhen the department was first established, Mr. Ghosn\n\nmade one thing very clear: Do not attack the methodology!\n\nDifferent business areas may complain when we release\n\ninformation that is negative or differs from their objectives.\n\nHowever, they cannot attack how we came to our\n\nconclusions, because our methodology is considered the\n\nbest within the organization. We are transparent in our\n\nselection of methodologies and how we approach\n\nconclusions. Among the various areas, we aim to be the\n\ndepartment that most effectively utilizes the PDCA—plan,\n\ndo, check and action—cycle. We are always working to get\n\nbetter and more accurate information to upgrade our\n\nmethodology. Every year we hold a PDCA session to review\n\nour methodology with other departments. Anyone can\n\nassess Market Intelligence at this time. This is also a great\n\nopportunity to share methodologies and approaches with\n\nvarious functions.\n\nWe also conduct trend review meetings with all\n\ndecision-makers, including non-marketing officers, to\n\nunderstand social, consumer and value trends so that we\n\ncan identify sources of innovation for all areas. This makes\n\nus unique. Our analysts enrich the analysis, interpretation\n\nand forecast because they are aware of global social and\n\nconsumer trends. The trend review meetings also remind\n\npeople in all departments—even those not directly involved\n\nwith sales and marketing—that customers are truly the\n\ncenter of our business.\n\nWe work with different research experts and\n\ncompanies as our partners. They offer a variety of high-\n\ntech techniques such as glasses with cameras that track\n\neye movement, instruments that measure brainwaves or\n\npupil dilation to detect preferences, and non-categorical\n\nmeasures that help us find personal evaluations of\n\nperceived quality or design. Our job is to evaluate these\n\nresearch companies and their output, and to develop the\n\nbest methodology for our issues. We are always refining\n\nthe tools we have and looking for new ones that will boost\n\nour accuracy. Our strong ties with outside experts are a\n\nsource of competitive advantage for Nissan.\n\nAgain, it all goes back to being customer-oriented.\n\nConfirming that customer-oriented stance will create value\n\nfor Nissan. Market Intelligence must be a dedicated\n\nevangelist for this change.”", - "page_start": 41, - "page_end": 41, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "would be watermarked and thus detectable [7, 66, 123]? Are there policy approaches that could effectively regulate their use? In summary, we advocate for research that centers the people who stand to be adversely affected by the resulting technology, with a broad view on the possible ways that technology can affect people. This, in turn, means making time in the research process for considering environmental impacts, for doing careful data curation and documentation, for engaging with stakeholders early in the design process, for exploring multiple possible paths towards long- term goals, for keeping alert to dual-use scenarios, and finally for allocating research effort to harm mitigation in such cases.\n\n## **8 CONCLUSION**\n\nThe past few years, ever since processing capacity caught up with neural models, have been heady times in the world of NLP. Neural approaches in general, and large, Transformer LMs in particular, have rapidly overtaken the leaderboards on a wide variety of bench- marks and once again the adage “there’s no data like more data” seems to be true. It may seem like progress in the field, in fact, de- pends on the creation of ever larger language models (and research into how to deploy them to various ends). In this paper, we have invited readers to take a step back and ask: Are ever larger LMs inevitable or necessary? What costs are associated with this research direction and what should we consider before pursuing it? Do the field of NLP or the public that it serves in fact need larger LMs? If so, how can we pursue this research direction while mitigating its associated risks? If not, what do we need instead? We have identified a wide variety of costs and risks associated with the rush for ever larger LMs, including: environmental costs (borne typically by those not benefiting from the resulting technol- ogy); financial costs, which in turn erect barriers to entry, limiting who can contribute to this research area and which languages can benefit from the most advanced techniques; opportunity cost, as re- searchers pour effort away from directions requiring less resources; and the risk of substantial harms, including stereotyping, denigra- tion, increases in extremist ideology, and wrongful arrest, should humans encounter seemingly coherent LM output and take it for the words of some person or organization who has accountability for what is said. Thus, we call on NLP researchers to carefully weigh these risks while pursuing this research direction, consider whether the bene- fits outweigh the risks, and investigate dual use scenarios utilizing the many techniques (e.g. those from value sensitive design) that have been put forth. We hope these considerations encourage NLP researchers to direct resources and effort into techniques for ap- proaching NLP tasks that are effective without being endlessly data hungry. But beyond that, we call on the field to recognize that appli- cations that aim to believably mimic humans bring risk of extreme harms. Work on synthetic human behavior is a bright line in ethical AI development, where downstream effects need to be understood and modeled in order to block foreseeable harm to society and different social groups. Thus what is also needed is scholarship on the benefits, harms, and risks of mimicking humans and thoughtful design of target tasks grounded in use cases sufficiently concrete to allow collaborative design with affected communities.", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "[Haack, Susan (1978). \"1. 'Philosophy of logics' \". ](https://en.wikipedia.org/wiki/Susan_Haack) *[Philosophy of Logics](https://philpapers.org/rec/HAAPOL-2)* (https://philpapers.or\n\n[g/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1- 10. ISBN 978-](https://en.wikipedia.org/wiki/Special:BookSources/978-0-521-29329-7)\n\n[0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o](https://web.archive.org/web/20211207200551/https://philpapers.org/rec/HAAPOL-2)\n\n[rg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021.](https://web.archive.org/web/20211207200551/https://philpapers.org/rec/HAAPOL-2)\n\n[Haack, Susan (1996). ](https://en.wikipedia.org/wiki/Susan_Haack) *Deviant Logic, Fuzzy Logic: Beyond the Formalism* . University of\n\n[Chicago Press. ISBN 978-0-226-31133-3.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-226-31133-3)\n\nHaaparanta, Leila (2009). \"1. Introduction\". *The Development of Modern Logic* . Oxford\n\n[University Press. pp. 4- 6. ISBN 978-0-19-513731-6.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-19-513731-6)\n\n[Hansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/). ](https://plato.stanford.edu/entries/fallacies/) *The Stanford*\n\n*Encyclopedia of Philosophy* [. Metaphysics Research Lab, Stanford University. Archived (http](https://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/)\n\n[s://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from](https://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/)\n\nthe original on 29 March 2021. Retrieved 18 March 2021.\n\nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\". *[The Routledge](https://philpapers.org/rec/BOVSIO)*\n\n*[Companion to Epistemology](https://philpapers.org/rec/BOVSIO)* (https://philpapers.org/rec/BOVSIO). London: Routledge.\n\n[pp. 609- 620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609](https://web.archive.org/web/20210516095047/https://philpapers.org/rec/BOVSIO)\n\n[5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved](https://web.archive.org/web/20210516095047/https://philpapers.org/rec/BOVSIO)\n\n4 January 2022.\n\n[Hasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\"](https://plato.stanford.edu/entries/arabic-islamic-influence/)\n\n[(https://plato.stanford.edu/entries/arabic-islamic-influence/). ](https://plato.stanford.edu/entries/arabic-islamic-influence/) *The Stanford Encyclopedia of*\n\n*Philosophy* . Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023.\n\n[Hawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv](https://plato.stanford.edu/entries/logic-inductive/)\n\n[e/). ](https://plato.stanford.edu/entries/logic-inductive/) *The Stanford Encyclopedia of Philosophy* . Metaphysics Research Lab, Stanford\n\n[University. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed](https://web.archive.org/web/20220121081805/https://plato.stanford.edu/entries/logic-inductive/)\n\n[u/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022.](https://web.archive.org/web/20220121081805/https://plato.stanford.edu/entries/logic-inductive/)\n\n[Hintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph](https://www.britannica.com/topic/philosophy-of-logic)\n\n[y-of-logic). ](https://www.britannica.com/topic/philosophy-of-logic) *Encyclopædia Britannica* [. Archived (https://web.archive.org/web/2015042810173](https://web.archive.org/web/20150428101732/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic)", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia1.pdf" - }, - { - "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs\n\nto be both responsibly managed, and useful for developers of AI models.\n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible,\n\nand thus obviates the need for each individual actor to acquire, digitize, and format their own\n\ncorpus of books for AI training. This resource could be collectively and intentionally\n\nmanaged, though we do not mean to select a particular form of governance in this paper. 4\n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a\n\nbooks data commons as defined above and key questions relevant to developers,\n\nrepositories, and other stakeholders, building on our workshop discussions. We first explain\n\nwhy books matter for AI training and how broader access could be beneficial. We then\n\nsummarize two tracks that might be considered for developing such a resource, highlighting\n\nexisting projects that help foreground both the potential and challenges. Finally, we present\n\nseveral key design choices, and next steps that could advance further development of this\n\napproach. 5\n\nIn this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this 4\n\nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work\n\nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not\n\nmeant to preclude this or other arrangements.\n\nThere are, of course, a range of other types of texts that are not on the web and/or not digital at all - 5\n\ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy\n\nof further analysis.", - "page_start": 2, - "page_end": 2, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv4.pdf", - "query": "What is the effect of embedding dimension on embedding representation quality ?", - "target_page": 6, - "target_passage": "we observe a performance correla- tion with the embedding dimension and the model’s number of parameters, which are often correlated themselves", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**MTEB-French: Resources for French Sentence Embedding Evaluation and Analysis**\n\n**Mathieu Ciancone** Wikit, France\n\nmathieu@wikit.ai\n\n**Imene Kerboua** Esker, France\n\nimene.kerboua@esker.com\n\n**Marion Schaeffer** Wikit, France\n\nmarion@wikit.ai\n\n**Wissam Siblini**\n\nwissam.siblini92@gmail.com\n\n**Abstract**\n\nRecently, numerous embedding models have\n\nbeen made available and widely used for var-\n\nious NLP tasks. The Massive Text Embed-\n\nding Benchmark (MTEB) has primarily sim-\n\nplified the process of choosing a model that\n\nperforms well for several tasks in English, but\n\nextensions to other languages remain challeng-\n\ning. This is why we expand MTEB to propose\n\nthe first massive benchmark of sentence em-\n\nbeddings for French. We gather 15 existing\n\ndatasets in an easy-to-use interface and create\n\nthree new French datasets for a global evalua-\n\ntion of 8 task categories. We compare 51 care-\n\nfully selected embedding models on a large\n\nscale, conduct comprehensive statistical tests,\n\nand analyze the correlation between model per-\n\nformance and many of their characteristics. We\n\nfind out that even if no model is the best on all\n\ntasks, large multilingual models pre-trained on\n\nsentence similarity perform exceptionally well.\n\nOur work comes with open-source code, new datasets and a public leaderboard 1 .\n\n## **1 Introduction**\n\nEmbeddings are dense vector representations that\n\ncapture the semantics of an input. The first emblem-\n\natic example is Word2Vec, introduced by Mikolov\n\net al. ( 2013 ). It consists of neural architectures\n\ntrained to learn high-quality word representations\n\nfrom contextual relationships in vast amounts of\n\ntext. Other models were proposed since then, lever-\n\naging the transformer architecture ( Vaswani et al. ,\n\n2017 ) to produce both generic and contextualized\n\nword embeddings using self-attention. Many mod-\n\nels now exist with various architectures, mono-\n\nlingual or multilingual, pre-trained or fine-tuned\n\n( Naseem et al. , 2021 ; Ding et al. , 2023 ).\n\nIn this work, our primary objective is to in-\n\ntroduce a large-scale embedding benchmark for\n\n1 French table on: [ https://huggingface.co./spaces/](https://huggingface.co./spaces/mteb/leaderboard)\n\n[mteb/leaderboard](https://huggingface.co./spaces/mteb/leaderboard)\n\nFrench to enable the research community and indus-\n\ntry to select the most relevant embedding methods\n\nbased on one’s specific needs, such as being open-\n\nsource, versatile or targeted toward a particular task,\n\nhaving a small embedding dimension, the ability to\n\nprocess long texts or their performance. To achieve\n\nthis goal, we undertake significant efforts in col-\n\nlecting datasets to conduct a broad comparison of\n\nmodels. We ensure that the datasets cover various\n\ntasks within a common, easy-to-use framework,\n\nand we create three new quality-checked datasets\n\nto enhance this collection. We select a diverse\n\nrange of models, including prominent French and\n\nmultilingual models deemed most efficient. The re-\n\nsults of our study already enable the community to\n\nmake informed model selections, whether for gen-\n\neral purposes or specific tasks. Additionally, our\n\nimplementation is open to the community and fea-\n\ntures a public leaderboard, allowing the results to\n\nevolve with new models or datasets. With this first\n\nlarge-scale comparison, we perform an in-depth\n\nanalysis of the results, confirming well-known find-\n\nings such as the correlation between performance\n\nand model/embedding dimensions and uncovering\n\ninteresting nuances.\n\n## **2 Related Work**\n\n**Sentence Embeddings** Sentence embeddings are\n\nrequired for many language tasks, such as Semantic\n\nTextual Similarity (STS) and knowledge retrieval.\n\nMany models have been proposed in the litera-\n\nture, leveraging pooling strategies ( Devlin et al. ,\n\n2019 ; Muennighoff , 2022 ) or similarity fine-tuning\n\n( Reimers and Gurevych , 2019 ) using a contrastive\n\nframework ( Gao et al. , 2021 ; Neelakantan et al. ,", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv4.pdf" - }, - { - "text": "with respect to model ranking?\n\nTo go further than the correlation analysis among\n\ndatasets regarding their topics (see section 3.1.5 ),\n\nsubsequent analysis will be conducted regarding\n\nhow they rank models. Additionally, complemen-\n\ntary insights will be derived from examining cor-\n\nrelations of models relative to their strengths and\n\nweaknesses across different datasets.\n\n## **4 Results and discussion**\n\nIn this section, we present the results through the\n\nprism of our research questions.\n\n**Q1: Is there a model that outstands on all**\n\n**tasks?**\n\nModels performances for each task are presented\n\nin appendix Tables 9 , 10 , 11 , 12 and 13 . Figure\n\n1 shows the critical difference diagram of average\n\nscore ranks.\n\nAs in MTEB ( Muennighoff et al. , 2022 ), no\n\nmodel claims state-of-the-art in all tasks even if\n\nthe *text-embedding-3-large* model is in first place\n\non average on all tasks (see Table 9 ). It ranks\n\nfirst for the classification and reranking tasks. For\n\nthe clustering task, *text-embedding-ada-002* is the\n\nbest model. The models *voyage-code-2* , *text-*\n\n*embedding-3-small* and *mistral-embed* share the\n\ntop positions in the retrieval task ranking. For the\n\npair classification task, *laser2* is ahead of its com-\n\npetitors. Finally, *sentence-camembert-large* leads\n\non the STS task and *multilingual-e5-small* has the\n\nbest results for summarization.\n\nFigure 1 shows a global model comparison\n\nacross all datasets. The models are arranged hori-\n\nzontally according to their performance, with the\n\nbest models on the left. The black bars repre-\n\nsent the statistical equivalence between the mod-\n\nels’ performances. The statistically equivalent\n\ntop performers for this benchmark are OpenAI’s\n\nmodels *text-embedding-3-large* , *text-embedding-3-*\n\n*small* and *text-embedding-ada-002* . Interestingly,\n\nmany models do not show a significant perfor-\n\nmance gap between their base and large flavours.\n\nSome French models stand out among the multi-\n\nlingual models, such as *Solon-embeddings-large-*\n\n*0.1* , *sentence_croissant_alpha_v0.3* and *sentence-*\n\n*camembert-large* .\n\n**Q2: Are there any links between model**\n\n**characteristics and performance?**\n\nThe Spearman correlations between the average\n\nrank of the models and their characteristics are the\n\nfollowing:\n\n- *Tuned for sentence similarity* : 0.727\n\n- *Finetuned vs pretrained* : 0.544\n\n- *Model number of parameters* : 0.49\n\n- *Embedding dimension* : 0.452\n\n- *Closed source* : 0.449\n\n- *Max sequence length* : 0.336\n\n- *Multilingual* : 0.103\n\n- *English* : 0.025\n\n- *English but tuned on other languages* : -0.025\n\n- *French* : -0.134\n\n- *Bilingual* : -0.135\n\nAdditionally, all cross-correlations between charac-\n\nteristics are reported in appendix Figure 10 .\n\nAs expected, the score most strongly correlates\n\nwith whether the evaluated models were trained on\n\na sentence similarity task. Of course, this criterion\n\nis connected to the more general *Finetuned* one.\n\nThe only top-performing models solely pre-trained\n\nare from the *E5* family, where the pre-training is,\n\nin fact, contrastive and optimized for similarity.\n\nConversely, models pre-trained on token-level tasks\n\nand generating embeddings via pooling appear less\n\nwell-suited for the benchmark tasks.\n\nFurthermore, we observe a performance correla-\n\ntion with the embedding dimension and the model’s\n\nnumber of parameters, which are often correlated\n\nthemselves. This appears very clearly on the rela-\n\ntive ranking of *E5* and *T5* models (see Figure 1 ).\n\nHowever, some small models perform very well\n\non the benchmark, such as the standard version\n\nof the multilingual universal sentence encoder or\n\n*Solon-embeddings-base-1.0* . Notably, the maxi-\n\nmum sequence length, while an important criterion\n\nfor generative tasks with LLMs, is less correlated\n\nwith performance than the other dimensions. This\n\ncan be explained by many datasets containing rel-", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv4.pdf" - }, - { - "text": "Model ranking Finetuned vs pretrained Model number of parameters Max sequence length Embedding dimension Tuned for sentence similarity Bilingual English English + tuning on other languages French Multilingual Closed source\n\nModel ranking\n\nFinetuned vs pretrained\n\nModel number of parameters\n\nMax sequence length\n\nEmbedding dimension\n\nTuned for sentence similarity\n\nBilingual\n\nEnglish\n\nEnglish + tuning on other languages\n\nFrench\n\nMultilingual\n\nClosed source 0.6\n\n0.4\n\n0.2\n\n0.0\n\n0.2\n\n0.4\n\n0.6\n\n0.8\n\n1.0\n\nFigure 10: Heatmap representing cross-correlations between models’ characteristics and models’ performances.", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv4.pdf" - }, - { - "text": "**Feature Prediction versus Pixel Reconstruction.**\n\nApproaches that predict in pixel space must dedicate\n\nsignificant model capacity and compute to capture all\n\nthe low-level detail in the visual input. By contrast, ap-\n\nproaches that predict in latent space have the flexibility\n\nto eliminate irrelevant or unpredictable pixel-level details\n\nfrom the target representation ( Vondrick et al. , 2016 ).\n\nPredicting in representation space has been shown to\n\nlead to versatile representations that perform well across\n\nmany downstream tasks through linear probing or low-\n\nshot adaptation ( Assran et al. , 2023 ; Oquab et al. , 2023 ;\n\nAssran et al. , 2022 ), while demonstrating an efficiency\n\ngain during pretraining compared to pixel level recon-\n\nstruction ( Assran et al. , 2023 ; Baevski et al. , 2022b , a ).\n\nThe works of Baevski et al. ( 2022a , b ) additionally show\n\nthat predicting in representation space results in compet-\n\nitive end-to-end fine-tuning performance in the image,\n\naudio and text domains. In this work, we extend these\n\nfindings to the video modality.\n\n## **3 Methodology: Video-JEPA**\n\nx\n\nx-encoder\n\npredictor z\n\ny\n\ny-encoder\n\nD( ˆ s y , s y ) ˆ s y s y\n\n**Figure 2** Joint-Embedding Predictive Architectures are\n\ntrained to predict the representation of an input *y* from\n\nthe representation of another input *x* . The additional vari-\n\nable *z* provides the predictor with information about the\n\ntransformation that computes *y* from *x* .\n\nOur goal is to explore the effectiveness of feature pre-\n\ndiction as a stand-alone objective for learning visual\n\nrepresentations from video. To that end, we use a\n\njoint-embedding predictive architecture (JEPA) ( LeCun ,\n\n2022 ); see Figure 2 . The main idea behind a JEPA is\n\nto learn by predicting the representation of an input *y*\n\nfrom the representation of another input *x* . The basic\n\narchitecture is made up of an encoder, *E* *θ* ( *·* ) , which com- putes the representation of the inputs, and a predictor,\n\n*P* *ϕ* ( *·* ) , which predicts the representation of *y* from the representation of *x* , conditioned on a variable *z* indicat-\n\ning the transformation (or corruption) between *x* and\n\n*y* . Conditioning on *z* enables the generation of distinct\n\npredictions for various transformations of *x* .\n\n### **3.1 Training Objective**\n\nWe train our visual encoder *E* *θ* ( *·* ) to satisfy the con- straint that representations computed from one part of\n\nthe video, *y* , should be predictable from representations\n\ncomputed from another part of the video, *x* . The pre-\n\ndictor network *P* *ϕ* ( *·* ) , which maps the representation of *x* to the representation of *y* , is trained simultaneously\n\nwith the encoder, and is provided specification of the\n\nspatio-temporal positions of *y* through the conditioning\n\nvariable *z* *←* ∆ *y* .\n\nNaively implementing the objective using the regression\n\nminimize *θ,ϕ* *∥* *P* *ϕ* ( *E* *θ* ( *x* ) *,* ∆ *y* ) *−* *E* *θ* ( *y* ) *∥* 1 *,*\n\nwould admit a trivial solution, where the encoder out-\n\nputs a constant representation, regardless of its input.\n\nIn practice, we use the following modified objective to\n\nprevent representation collapse,\n\nminimize *θ,ϕ* *∥* *P* *ϕ* ( *E* *θ* ( *x* ) *,* ∆ *y* ) *−* sg ( *E* *θ* ( *y* )) *∥* 1 *,* (1)\n\nwhere sg ( *·* ) denotes a stop-gradient operation, which does not backpropagate through its argument, and *E* *θ* ( *·* ) is an exponential moving average of the network *E* *θ* ( *·* ) . The use of an exponential-moving average feature ex-\n\ntractor along with a stop-gradient and a predictor has\n\nbeen used as a collapse prevention strategy for image pre-\n\ntraining ( Grill et al. , 2020 ), and studied empirically ( Xie\n\net al. , 2021 ) and theoretically ( Tian et al. , 2021 ). In\n\nfact, the objective in equation ( 1 ) is similar to the loss\n\nof Assran et al. ( 2023 ) used for image pretraining, but", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv3.pdf" - }, - { - "text": "Diagonal Heterogeneous Vertical Vertical + diagonal Block\n\n[CLS] [CLS] [SEP] [SEP] [SEP] [SEP] [SEP] [SEP] [CLS] [CLS] [SEP] [SEP] [SEP] [SEP] [CLS]\n\nFigure 3: Attention patterns in BERT ( Kovaleva et al. , 2019 )\n\nies) insufficient ( Warstadt et al. , 2019 ). A given\n\nmethod might also favor one model over another,\n\ne.g., RoBERTa trails BERT with one tree extraction\n\nmethod, but leads with another ( Htut et al. , 2019 ).\n\nThe choice of linguistic formalism also matters\n\n( Kuznetsov and Gurevych , 2020 ).\n\nIn view of all that, the alternative is to focus on\n\nidentifying what BERT actually relies on at infer-\n\nence time. This direction is currently pursued both\n\nat the level of architecture blocks (to be discussed\n\nin detail in subsection 6.3 ), and at the level of in-\n\nformation encoded in model weights. Amnesic\n\nprobing ( Elazar et al. , 2020 ) aims to specifically\n\nremove certain information from the model and see\n\nhow it changes performance, finding, for example,\n\nthat language modeling does rely on part-of-speech\n\ninformation.\n\nAnother direction is information-theoretic prob-\n\ning. Pimentel et al. ( 2020 ) operationalize prob-\n\ning as estimating mutual information between the\n\nlearned representation and a given linguistic prop-\n\nerty, which highlights that the focus should be not\n\non the amount of information contained in a rep-\n\nresentation, but rather on how easily it can be ex-\n\ntracted from it. Voita and Titov ( 2020 ) quantify\n\nthe amount of effort needed to extract information\n\nfrom a given representation as minimum descrip-\n\ntion length needed to communicate both the probe\n\nsize and the amount of data required for it to do\n\nwell on a task.\n\n## **4 Localizing linguistic knowledge**\n\n### **4.1 BERT embeddings**\n\nIn studies of BERT, the term \"embedding\" refers\n\nto the output of a Transformer layer (typically, the\n\nfinal one). Both conventional static embeddings\n\n( Mikolov et al. , 2013 ) and BERT-style embeddings\n\ncan be viewed in terms of mutual information max-\n\nimization ( Kong et al. , 2019 ), but the latter are\n\n**contextualized** . Every token is represented by a\n\nvector dependent on the particular context of occur-\n\nrence, and contains at least some information about\n\nthat context ( Miaschi and Dell’Orletta , 2020 ).\n\nSeveral studies reported that **distilled contex-**\n\n#### **tualized embeddings better encode lexical se-**\n\n**mantic information** (i.e. they are better at tra-\n\nditional word-level tasks such as word similarity).\n\nThe methods to distill a contextualized represen-\n\ntation into static include aggregating the informa-\n\ntion across multiple contexts ( Akbik et al. , 2019 ;\n\nBommasani et al. , 2020 ), encoding \"semantically\n\nbleached\" sentences that rely almost exclusively on\n\nthe meaning of a given word (e.g. \"This is <>\")\n\n( May et al. , 2019 ), and even using contextualized\n\nembeddings to train static embeddings ( Wang et al. ,\n\n2020d ).\n\nBut this is not to say that there is no room for\n\nimprovement. Ethayarajh ( 2019 ) measure how\n\nsimilar the embeddings for identical words are in\n\nevery layer, reporting that later BERT layers pro- duce more context-specific representations 3 . They\n\nalso find that BERT embeddings occupy a narrow\n\ncone in the vector space, and this effect increases\n\nfrom the earlier to later layers. That is, **two ran-**\n\n#### **dom words will on average have a much higher**\n\n#### **cosine similarity than expected if embeddings**\n\n**were directionally uniform (isotropic)** . Since\n\nisotropy was shown to be beneficial for static word\n\nembeddings ( Mu and Viswanath , 2018 ), this might\n\nbe a fruitful direction to explore for BERT.\n\nSince BERT embeddings are contextualized, an\n\ninteresting question is to what extent they cap-\n\nture phenomena like polysemy and homonymy.\n\nThere is indeed evidence that **BERT’s contextu-**\n\n#### **alized embeddings form distinct clusters corre-**\n\n**sponding to word senses** ( Wiedemann et al. , 2019 ;", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "tation and, in practical applications, the under-\n\nlying storage and compute costs. We selected\n\nmodels with embedding dimensions ranging\n\nfrom 384 to 4096.\n\n- * **Sequence length:** * Being the number of to-\n\nkens that a model can consider as input, the\n\nsequence length is important as it impacts the\n\nunit that can be encoded (sentence, paragraph,\n\ndocument). However, encoding overly long\n\nsequences requires efficiently storing the rele-\n\nvant information into a single vector. Among\n\nthe selected methods, this criterion varies\n\nfrom 128 tokens to 32768.\n\n- * **Model parameters:** * Often correlated with the\n\ntwo first characteristics, parameter count is im-\n\nportant for practical applications as it affects\n\nusability on resource-efficient machines. The\n\nselected models have a number of parameters\n\nranging from 20 million ( *∼* 100Mb in float32) to 7 billion ( *∼* 28Gb).\n\n- * **Language:** * This is a major feature of lan-\n\nguage models. Some are monolingual, and\n\nothers are multilingual. Language is usually\n\nacquired during pre-training, but sometimes,\n\nmodels familiarize themselves with new lan-\n\nguages at tuning. For the benchmark, we\n\nselected French models, as well as bilingual\n\nor multilingual models. We also included a\n\nfew ones that claimed to be English (e.g. *all-* *MiniLM-L12-v2* 9 ).\n\n- * **Model types:** * There are several strategies to\n\ngenerate text embeddings such as aggregat-\n\ning (e.g. with average pooling) token-level\n\nembeddings from raw pre-trained models, or\n\nadding an extra contrastive learning step on a\n\nsentence similarity task with, optionally, ad-\n\nditional transformation layers. We included\n\nmodels of all types in our benchmark, summa-\n\nrizing the model type information under two\n\nrelevant criteria: finetuned vs pretrained, and\n\ntrained for sentence similarity or not.\n\nThe selected models are visible in Figure 1 , and\n\nall of their characteristics are summarized in ap-\n\npendix Table 7 . Overall, the selection includes the\n\nbest models from the sentence transformers frame-\n\nwork ( Reimers and Gurevych , 2019 ), the most pop-\n\nular French NLP models ( Le et al. , 2020 ; Martin\n\n9 [https://huggingface.co./sentence-transformers/](https://huggingface.co./sentence-transformers/all-MiniLM-L12-v2)\n\n[all-MiniLM-L12-v2](https://huggingface.co./sentence-transformers/all-MiniLM-L12-v2)\n\net al. , 2019 ), their variants optimized for semantic\n\nsimilarity ( Reimers and Gurevych , 2019 ), numer-\n\nous multilingual models performing at the top on\n\nMTEB (e.g *E5* and *T5* ), *Bloom* variants ( Zhang\n\net al. , 2023 ), models based on very recent power-\n\nful LLMs ( Wang et al. , 2023 ; Faysse et al. , 2024 )\n\nand finally the proprietary models of OpenAI, Co-\n\nhere and Voyage. Certain models were selected in\n\nmultiple sizes to isolate the dimensionality effect\n\neffectively. We provide information on the mod- els’ licenses as reported in the Hugging Face hub 10 .\n\nHowever, we encourage readers to conduct further\n\nresearch before utilizing a model.\n\n### **3.3 Evaluation**\n\nFor the sake of homogeneity, models are evalu-\n\nated using the same metrics per task as in MTEB\n\n( Muennighoff et al. , 2022 ): Classification (Accu-\n\nracy), Bitext mining (F1 score), Pair classification\n\n(AP), Clustering (V measure), Reranking (MAP),\n\nRetrieval (NDCG@10), Summarization and STS\n\n(Spearman correlation based on cosine similarity).\n\nBitextMining tasks are excluded from the aver-\n\nage performance scores and therefore the figures,\n\nas this task evaluates 2 languages instead of one,\n\nand this benchmark focuses only on one language\n\n(French). We present the results for both *DiaBlaBi-*\n\n*textMining* and *FloresBitextMining* in Table 12 .\n\nUsing the overall benchmark results, our goal\n\nwill be to answer the following research questions:\n\n**Q1:** Is a model outstanding on all tasks?\n\nAs we are trying to find out whether one embed-\n\nding model is statistically better than the others for", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv4.pdf" - }, - { - "text": "free energy having some claims to being a better approximation than the information\n\ncriteria classically used with MCMC methods (although see other approximations, like the\n\nPareto-Smoothed Importance Sampling [ 59 ] or Thermodynamic Integration methods [ 60 ];\n\nsee [ 35 ] for a further review). Note that independently of which of these approaches one\n\nmight take, the process involves inverting a generative model of the mental processes\n\nunderlying the behaviour of a given subject, a generative model which itself is an inversion\n\nof the subject’s generative model of the environment. We can call the generative model that\n\nthe agent has of its environment the *subjective* generative model, and the model we have of\n\nthe agent the *objective* generative model, in what has been called a meta-Bayesian approach\n\nor “observing the observer” [ 1 , 61 ].\n\nHere, we demonstrated model fitting by fitting the POMDP model to the synthetic\n\nbehaviour that it generated; this is called a parameter recovery study since we can then\n\ncompare the estimated parameters to the generative values used for creating the simulated\n\ndata [ 62 , 63 ]. Here, we used the simulation method shown in the previous section to\n\nproduce a synthetic dataset with known parameter values for each agent (in practice, these\n\nare often participants in an experiment), here with a focus on estimating the *α* parameter.\n\nWe then used MCMC methods to estimate the parameters for each agent and compared\n\nthe estimated values with the correct values. Here, we simulated two groups of five\n\nsynthetic subjects agents with different *α* values (the parameters for the first group were\n\nsampled from a Gaussian distribution with mean = 8 and SD = 2, and the second group\n\nwith with mean = 24 and SD = 2). Each agent interacted with the T-maze environment for\n\n300 time steps. We produced the following data frame, containing the data of each of the\n\nagents: their observations, actions and an identifier, a format suitable for cognitive and\n\nbehavioural modelling.\n\n3000×5 DataFrame\n\nRow Location Reward Cue Action_Location Action_Reward SubjectID\n\nInt64 Int64 Int64 Int64 Int64 Int64\n\n1 1 1 1 4 1 1\n\n2 4 1 2 3 1 1\n\n3 3 3 2 2 1 1\n\n. . . . . . .\n\n. . . . . . .\n\n3000 2 2 2 2 1 10\n\nWe used ActionModels to fit the AIF model created above to each of the agents in the dataset.\n\nWe began by initialising an ActionModels agent: � � **using** ActionModels\n\n# Initialize ActionModels Agent with the action model and created active inference agent\n\nagent = init_agent(\n\naction_model = action_pomdp!, # Action model function\n\nsubstruct = aif, # Active inference agent as a substruct\n\n) � � We then set the prior for the parameter we wanted to estimate: the *α* action precision. As\n\nan example, we chose a wide, weakly informative prior: a Gaussian distribution with mean\n\n5 and standard deviation 5, truncated at 0 and 20:", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "data that do not produce redundant results. It may\n\nalso help to understand the link between the results\n\nand the datasets’ topics.\n\n### **3.2 Models**\n\nFor comparison on our benchmark, we selected\n\nvarious models to fulfil three objectives.\n\n- **Quantity:** The aim was to compare a substan-\n\ntial number of models (51 in total) to provide\n\ncomprehensive results, facilitating the com-\n\nmunity in selecting effective French models.\n\n- **Relevance:** It was imperative to include\n\ntop performers from the MTEB benchmark\n\n( Muennighoff et al. , 2022 ). We mainly se-\n\nlected multilingual models and some English\n\nmodels to asses their language-transferring\n\nabilities. Additionally, we integrated natively\n\nFrench transformer-based models such as\n\n*CamemBERT* ( Martin et al. , 2019 ), *FlauBERT*\n\n( Le et al. , 2020 ) and even the very recent\n\n*CroissantLLM* ( Faysse et al. , 2024 ).\n\n- **Variety:** Diverse model types were included\n\nto offer an insightful analysis across vari-\n\nous model characteristics (dimension, training\n\nstrategy, etc.).\n\nIn line with the third objective, we explicit below\n\nthe studied characteristics of embedding models\n\nthat will be discussed with the results.\n\n- * **Embedding dimension:** * This critical element\n\ninfluences the expressiveness of the represen-\n\n4", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" - }, - { - "text": "2 of 33\n\nminimisation [ 9 ]. Choosing actions that minimise the expected free energy ( *EFE* ) of their\n\nconsequences provides a natural balance between exploratory and exploitative behaviour;\n\ngeneralises descriptive approaches to behavioural modelling, like reinforcement learning\n\nand expected utility maximisation; and provides a singular approach to adaptive behaviour\n\nthat can be used across different environments. AIF was argued to be applicable to any self-\n\norganising system that actively maintains a stable boundary that defines its integrity [ 10 ],\n\na broad category that includes cells and plants [ 11 ], as well as humans [ 2 ] and even\n\ncollectives [ 12 ]. Owing to its generality, AIF has seen a rise in popularity across multiple\n\nfields. It is used for theoretical simulations of the mechanisms underlying various types of\n\nbehaviour [ 2 ], computational phenotyping in computational psychiatry [ 13 , 14 ], and agent-\n\nbased simulations of population dynamics [ 15 ], as well as in engineering and robotics [ 16 ].\n\nIn AIF, perception and concurrent action are based on performing a variational Bayesian\n\ninversion of a generative model of the environment (i.e., a model of how the environment\n\nchanges and brings about sensory observations). This belief updating includes inferring\n\n(hidden) states of the environment, learning parameters of the generative model and\n\nlearning the structure of the generative model. Since the requisite inference schemes come\n\npre-specified, the main task in AIF modelling becomes specifying an appropriate generative\n\nmodel. This includes specifying priors over environmental states, as well as what might\n\nbe called *prior preferences* , *preference priors* or *goal priors* : immutable prior expectations that\n\nmake up an agents’ preferences by furnishing a set of predictions over future states or\n\nobservations; in fulfilling these predictions, free energy is minimised. The space of possible\n\ngenerative models is vast, and they often have to be handcrafted for a given environment.\n\nHowever, there are some families of generative models that can be considered “universal”\n\nin the sense that they can be used for most environments. Currently, the most popular of\n\nthese is the discrete state-space Partially Observable Markov Decision Process (POMDP)-\n\nbased generative models. Since they are ubiquitous in the literature, we focus here on\n\nmaking these types of generative models available to researchers. There are, however, other\n\ntypes of universal generative models, like generalised filtering models [ 17 ] or Hierarchical\n\nGaussian Filtering-based models [ 18 , 19 ], that will be implemented in the future.\n\nTools for simulating POMDP-AIF models were originally developed as part of the\n\nDEM [ 20 ] library for M ATLAB [ 21 ] (part of the larger SPM library [ 22 ]). Since then, a\n\nmodal and flexible software package pymdp [ 23 ] was created for Python [ 24 ], as well as a\n\nperformance-oriented package cpp-AIF [ 25 ] for C++ [ 26 ] that can be used across platforms.\n\nFinally, the factor graph library RxInfer [ 27 ] for Julia [ 28 ] has also been used to implement\n\nsome AIF models on an efficient factor graph back-end [ 29 - 31 ]. The important tools\n\nthat these packages provide make AIF available for researchers to perform simulation\n\nstudies and for use in engineering contexts. They do not, however, usually allow for\n\nfitting models to empirically observed data, which is a fundamental method used in\n\ncognitive modelling [ 32 ], often in the context of computational psychiatry [ 13 ], to infer the\n\nmechanisms underlying variations in behaviour or to investigate the differences between\n\n(for example, clinical) populations. Smith and colleagues [ 33 ] provided a guide for manually\n\ndoing variational Bayesian parameter estimation based on empirical data, but only in\n\nM ATLAB and restricted to a particular class of variational parameter estimation methods", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "correlated (see Figure 12 ). We preferred to propose\n\ndatasets even if they could introduce biases rather\n\nthan not address the task in the benchmark. Note\n\nthat each task type can be considered individually.\n\nWe hope additional resources will be developed\n\nin the French-speaking community to enrich our\n\ncomparison.\n\n**Benchmark validity over time** As with all\n\nbenchmarks, their reliability over time can be dis-\n\ncussed as the field evolves fast. The models se-\n\nlected for the analysis conducted in this paper are\n\nthose available at this time, new outperforming\n\nmodels will be created and shall be evaluated. Our\n\nwork extends MTEB and thus simplifies the ad-\n\ndition of new datasets for evaluation and allows\n\nrunning new models. With this effort, we hope\n\nthis will simplify the evaluation of new models pro-\n\nposed by the community to keep our work up to\n\ndate.\n\n**Data contamination issues** Bias may exist for\n\nmodels that use the training sets of the provided\n\nevaluation datasets for their training. It consider-\n\nably improves their performance on the benchmark,\n\nfavouring them over other models. This is particu-\n\nlarly worrying for models that do not communicate\n\nabout the datasets used during training, such as pro-\n\nprietary models. Generally speaking, it would be\n\ninteresting to calculate the similarity between the\n\ndatasets used to train the models and those used to\n\ntest them to check that they are far enough apart to\n\ndraw general conclusions.\n\n**Focus on sentence embeddings** Finally, like the\n\noriginal version of MTEB, the comparison focuses\n\nmainly on sentence embeddings. Other tasks could\n\nbe added to cover word embeddings and, therefore,\n\nmore NLP tasks.\n\n**Acknowledgements**\n\nWe would like to thank Wikit 11 and Esker 12 for\n\nproviding compute and funding this research.\n\n**References**\n\nDavid Ifeoluwa Adelani, Marek Masiak, Israel Abebe Azime, Jesujoba Oluwadara Alabi, Atnafu Lam- bebo Tonja, Christine Mwase, Odunayo Ogun- depo, Bonaventure F. P. Dossou, Akintunde Oladipo, Doreen Nixdorf, Chris C. Emezue,\n\n11 [https://www.wikit.ai/](https://www.wikit.ai/)\n\n12 [https://www.esker.com/](https://www.esker.com/)\n\nSana Al-Azzawi, Blessing K. Sibanda, Davis David, Lolwethu Ndolela, Jonathan Mukiibi, Tunde Oluwaseyi Ajayi, Tatiana Moteu Ngoli, Brian Odhiambo, Abraham Toluwase Owodunni, Nnae- meka Obiefuna, Shamsuddeen Hassan Muham- mad, Saheed Salahudeen Abdullahi, Mesay Gemeda Yigezu, Tajuddeen Rabiu Gwadabe, Idris Abdulmu- min, Mahlet Taye Bame, Oluwabusayo Olufunke Awoyomi, Iyanuoluwa Shode, Tolulope Anu Ade- lani, Habiba Abdulganiy Kailani, Abdul-Hakeem Omotayo, Adetola Adeeko, Afolabi Abeeb, An- uoluwapo Aremu, Olanrewaju Samuel, Clemen- cia Siro, Wangari Kimotho, Onyekachi Raphael Ogbu, Chinedu E. Mbonu, Chiamaka Ijeoma Chuk- wuneke, Samuel Fanijo, Jessica Ojo, Oyinkansola F. Awosan, Tadesse Kebede Guge, Sakayo Toadoum Sari, Pamela Nyatsine, Freedmore Sidume, Oreen Yousuf, Mardiyyah Oduwole, Ussen Kimanuka, Kanda Patrick Tshinu, Thina Diko, Siyanda Nx- akama, Abdulmejid Tuni Johar, Sinodos Gebre, Muhidin A. Mohamed, Shafie Abdi Mohamed, Fuad Mire Hassan, Moges Ahmed Mehamed, Evrard Ngabire, and Pontus Stenetorp. 2023. [ Masakhanews:](https://api.semanticscholar.org/CorpusID:258236351) [News topic classification for african languages](https://api.semanticscholar.org/CorpusID:258236351) . In *International Joint Conference on Natural Language* *Processing* .\n\nEneko Agirre, Carmen Banea, Daniel Cer, Mona Diab, Aitor Gonzalez-Agirre, Rada Mihalcea, German Rigau, and Janyce Wiebe. 2016. [SemEval-2016](https://doi.org/10.18653/v1/S16-1081) [task 1: Semantic textual similarity, monolingual](https://doi.org/10.18653/v1/S16-1081) [and cross-lingual evaluation](https://doi.org/10.18653/v1/S16-1081) . In *Proceedings of the* *10th International Workshop on Semantic Evaluation* *(SemEval-2016)* , pages 497- 511, San Diego, Califor- nia. Association for Computational Linguistics.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv4.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Draft FWC for services 0142.pdf", - "query": "What is the maximum amount covered by the FWC of the europeean chemical agency ?", - "target_page": 6, - "target_passage": "The maximum amount covering all purchases under this FWC, including all renewals and reimbursement of expenses is EUR 1 000 000 (one million)", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "6\n\nI.4.2. Period of provision of the services\n\nThe period for the provision of the services starts to run from the date on which the specific\n\ncontract is signed by the last party.\n\nI.4.3. Implementation of FWC in cascade\n\nThe FWC is implemented as follows: the contracting authority orders services by sending\n\na request for offer for a specific contract to the contractor who is ranked first in the cascade.\n\nWithin 5 working days (unless otherwise stated in the request for offer), the contractor\n\nmust either:\n\n(a) send the specific tender back to the contracting authority; or (b) send an explanation of why it cannot accept the order.\n\nIf the contractor does not accept the order or fails to observe the deadline or to submit an\n\nacceptable offer for the Agency, or if it is in a situation of conflicting interests that may\n\nnegatively affect the *performance of the specific contract* (see Article II.7), the contracting\n\nauthority may place the order with the next contractor on the cascade.\n\nIf the contractor repeatedly refuses to accept requests for offer or repeatedly fails to send\n\nthem back on time, the contractor may be considered in breach of its obligations under\n\nthis FWC as set out in Article II.18.1 (c).\n\nWithin a maximum of 5 working days of a specific contract or order form being sent by the\n\nAgency to the contractor, the Agency shall receive it back, duly signed and dated. The\n\nperiod allowed for the execution of the tasks shall start to run on the date of signature of\n\nthe specific contract or order form by both parties.\n\n## **I.5. Prices**\n\n**I.5.1. Maximum amount of the FWC and maximum prices**\n\nThe maximum amount covering all purchases under this FWC, including all renewals and\n\nreimbursement of expenses is **EUR 1 000 000** (one million). However, this does not bind\n\nthe contracting authority to purchase for the maximum amount.\n\nThe maximum unit prices of the services are:\n\nSenior experts: [ ] EUR per man-day\n\nExperts: [ ] EUR per man-day\n\n**I.5.2. Price revision index**\n\nPrice revision is determined by the formula set out in Article II.20 and using the trend in\n\nthe harmonised indices of consumer prices (HICP) ‘Euro area (19 countries)’ published at\n\n[http://ec.europa.eu/eurostat/web/hicp/data/database](http://ec.europa.eu/eurostat/web/hicp/data/database) under HICP (2015 = 100) - monthly\n\ndata (index) (prc_hicp_midx).]\n\n**I.5.3. Reimbursement of expenses**\n\nIn addition to the maximum price specified in each specific contract, if applicable, the\n\ncontracting authority shall reimburse the following in accordance with Article II.22:", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "2\n\nAnnex IV - Daily subsistence allowances and accommodation flat rates for Finland\n\nAnnex V - (a) Declaration on list of pre-exisiting rights\n\n(b) Statement of the contractor concerning rights to delivered results and\n\n(c) Statement of creator (or right holder)\n\nwhich form an integral part of this framework contract (‘the FWC’).\n\nThis FWC sets out:\n\n1. the procedure by which the contracting authority may order services from the contractor; 2. the provisions that apply to any specific contract which the contracting authority and the contractor may conclude under this FWC; and 3. the obligations of the parties during and after the duration of this FWC.\n\nAll documents issued by the contractor (end-user agreements, general terms and\n\nconditions, etc.) except its tender are held inapplicable, unless explicitly mentioned in the\n\nspecial conditions of this FWC. In all circumstances, in the event of contradiction between\n\nthis FWC and documents issued by the contractor, this FWC prevails, regardless of any\n\nprovision to the contrary in the contractor’s documents.", - "page_start": 1, - "page_end": 1, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "5\n\n## **I. Special Conditions**\n\n## **I.1. Order of priority of provisions**\n\nIf there is any conflict between different provisions in this FWC, the following rules must\n\nbe applied:\n\n(a) The provisions set out in the special conditions take precedence over those in the other parts of the FWC.\n\n(b) The provisions set out in the general conditions take precedence over those in the *order form* and specific contract (Annex III)\n\n(c) The provisions set out in the *order form* and specific contract (Annex III) take precedence over those in the other annexes.\n\n(d) The provisions set out in the tender specifications (Annex I) take precedence over those in the tender (Annex II).\n\n(e) The provisions set out in the FWC take precedence over those in the specific contracts.\n\n(f) The provisions set out in the specific contracts take precedence over those in the requests for services.\n\nAny reference to specific contracts applies also to order forms.\n\n## **I.2. Subject matter**\n\nThe subject matter of the FWC is scientific support to ECHA for work on restrictions,\n\ndose-response functions, Annex XIV, POPs and dossier evaluation.\n\n## **I.3. Entry into force and duration of the FWC**\n\n**I.3.1** The FWC enters into force on the date on which the last party signs it.\n\n**I.3.2** The *implementation of the FWC* cannot start before its entry into force.\n\n**I.3.3** The FWC is concluded for a period of 24 months with effect from the date of its\n\nentry into force.\n\n**I.3.4** The parties must sign any specific contract before the FWC expires.\n\nThe FWC continues to apply to such specific contracts after its expiry. The services\n\nrelating to such specific contracts must be performed no later than six months after\n\nthe expiry of the FWC.\n\n**I.3.5** Renewal of the FWC\n\nThe FWC is renewed automatically 2 times for 12 months each, unless one of the parties\n\nreceives *formal notification* to the contrary at least three months before the end of the ongoing duration. Renewal does not change or postpone any existing obligations.\n\n## **I.4. Appointment of the contractor and implementation of the FWC**\n\nI.4.1. Appointment of the contractor\n\nThe contracting authority appoints the contractor for a multiple FWC in cascade in\n\n[ *complete* ] position.", - "page_start": 4, - "page_end": 4, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "overview of four foresight scenarios.\n\n287 EU-OSHA, Emerging risks: [Workers’ safety and health in green jobs](https://osha.europa.eu/en/emerging-risks/green-jobs)\n\n288 United States Environmental Protection Agency: [Green Engineering](https://www.epa.gov/green-engineering)\n\n289 United Nations Environmental Programme (UNEP): [Global Chemicals Outlook](https://www.unep.org/explore-topics/chemicals-waste/what-we-do/policy-and-governance/global-chemicals-outlook)\n\n290 CEFIC, Facts and figures: Chemical Industry Contributes $5.7 Trillion to Global GDP and Supports 120 Million\n\nJobs, New Report Shows, [here](https://cefic.org/media-corner/newsroom/chemical-industry-contributes-5-7-trillion-to-global-gdp-and-supports-120-million-jobs-new-report-shows/)\n\n291 UNEP, 2019: [Global Chemicals Outlook II - From Legacies to Innovative Solutions: Implementing the 2030 ](https://wedocs.unep.org/bitstream/handle/20.500.11822/27651/GCOII_synth.pdf?sequence=1&isAllowed=y)\n\n[Agenda for Sustainable Development](https://wedocs.unep.org/bitstream/handle/20.500.11822/27651/GCOII_synth.pdf?sequence=1&isAllowed=y) (p. 27).\n\n292 Naidu et al., 2021: Chemical pollution: A growing peril and potential catastrophic risk to humanity\n\n293 Eurostat: Production and consumption of chemicals by hazard class, [here](https://ec.europa.eu/eurostat/databrowser/view/env_chmhaz/default/table?lang=en)\n\n294 Statistics Sweden SCB: [Environmental accounts - Chemical indicators 2019](https://www.scb.se/en/finding-statistics/statistics-by-subject-area/environment/environmental-accounts-and-sustainable-development/system-of-environmental-and-economic-accounts/pong/statistical-news/environmental-accounts--chemical-indicators-2019/)\n\n295 EU-OSHA: [ESENER Data visualisation 2019 ](https://visualisation.osha.europa.eu/esener/en/survey/detailpage-european-bar-chart/2019/osh-management/en_1/E3Q200_9/activity-sector/14/11) Risk factors present in the establishment - Chemical or\n\nbiological substances.\n\n296 OSHWiki: [Climate change - Impact on Occupational Safety and Health](https://oshwiki.osha.europa.eu/en/themes/climate-change-impact-occupational-safety-and-health-osh) .\n\n297 Pace advanced from intergenerational conception (children live and work like their parents) to a generational\n\nconception (children work in a different occupation, compared to their parents but have one main job all their life),\n\nto intragenerational conceptions (several changes during lifetime), according to: Rosa, 2013: Social acceleration -\n\nA new theory of modernity.\n\n298 [ Eurostat: Employment and activity by sex, age and citizenship (%) - annual data, here ](https://ec.europa.eu/eurostat/databrowser/view/LFSA_ARGAN__custom_5287626/default/table?lang=en)\n\n299 Eurostat: Employment by sex, age and professional status, [here](https://ec.europa.eu/eurostat/databrowser/view/LFSQ_EGAPS__custom_5041500/default/table?lang=en) , Filter for age class: 15-64 years.\n\n*300* *Eurostat: Full-time and part-time employment by sex, age and educational attainment level (1 000),* *[here](https://ec.europa.eu/eurostat/databrowser/view/LFSQ_EPGAED__custom_3201969/default/table?lang=en)*\n\n301 [European Union | Work | 2019 | Gender Equality Index | European Institute for Gender Equality (europa.eu)](https://eige.europa.eu/gender-equality-index/2019/domain/work)\n\n302 European Institute for Gender Equality (EIGE), 2020: [Beijing + 25: the fifth review of the implementation of the ](https://eige.europa.eu/sites/default/files/documents/20190417_mh0119036enn_pdf.pdf)\n\n[Beijing Platform for Action in the EU Member States](https://eige.europa.eu/sites/default/files/documents/20190417_mh0119036enn_pdf.pdf)\n\n303 Eurostat: Employment by sex, age and professional status, [here](https://ec.europa.eu/eurostat/databrowser/view/LFSQ_EGAPS__custom_5041557/default/table?lang=en)\n\n304 Ibid.\n\n305 Eurostat: Skill levels, [here](https://ec.europa.eu/eurostat/databrowser/view/LFSQ_EGAPS__custom_1265195/default/table?lang=en)", - "page_start": 151, - "page_end": 151, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "429 [https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A31994R2062](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A31994R2062)\n\n430 Communication from the Commission - Adapting to change in work and society: a new Community strategy on\n\nhealth and safety at work 2002-2006 /COM/2002/0118 final\n\n431 European Commission Brussels, 31.5.2013 SWD (2013) 202 final COMMISSION STAFF WORKING\n\nDOCUMENT Evaluation of the European Strategy 2007-2012 on health and safety at work\n\n432 Communication from the Commission to the European Parliament, the Council, the European Economic and\n\nSocial Committee and the Committee of the Regions: Improving quality and productivity at work: Community\n\nstrategy 2007-2012 on health and safety at work {SEC(2007) 214} {SEC(2007) 215} {SEC(2007) 216}\n\n433 Communication from the Commission to the European Parliament, the Council, the European Economic and\n\nSocial Committee and the Committee of the Regions on an EU Strategic Framework on Health and Safety at\n\nWork 2014-2020, Brussels, 6.6.2014 COM (2014) 332 final\n\n434 Communication from the Commission to the European Parliament, the Council, the European Economic and\n\nSocial Committee and the Committee of the Regions: EU strategic framework on health and safety at work 2021-\n\n2027: Occupational safety and health in a changing world of work, {SWD(2021) 148 final} - {SWD(2021) 149 final,\n\nBrussels, 28.6.2021\n\n435 European Agency for Safety and Health at Work, 2019: National Strategies in the field of Occupational Safety\n\nand Health in the EU, 2019, [https://osha.europa.eu/en/safety-and-health-legislation/osh-strategies](https://osha.europa.eu/en/safety-and-health-legislation/osh-strategies)\n\n436 See as overview: [https://osha.europa.eu/en/emerging-risks](https://osha.europa.eu/en/emerging-risks) , examples e.g. EU-OSHA, 2014: Current and\n\nemerging issues in the healthcare sector, including home and community care, European Risk Observatory\n\nreport, [European Risk Observatory Report; ](https://osha.europa.eu/en/publications/reports/current-and-emerging-occupational-safety-andhealth-osh-issues-in-the-healthcare-sector-including-home-and-community-care/view)\n\n[EU-OSHA, 2014: Green jobs, new risks? ](https://osha.europa.eu/en/publications/reports/green-jobs-new-risks-new-andemerging-risks-to-occupational-safety-and-health-in-the-electricity-sector/view) New and emerging risks to occupational safety and health in the\n\nelectricity sectors, Workshop for European Sectoral Social Dialogue Committee Electricity'; EU OSHA 2019: A\n\nReview on the Future of Work: [Performance Enhancing Drugs ](https://osha.europa.eu/en/publications/future-work-performance-enhancing-drugs)\n\n437 Eurostat: [Accident at work statistics](https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Accidents_at_work_statistics)\n\n438 OSH related LFS Ad hoc modules were: 1999 - Accidents at work and occupational diseases; 2007 - Work\n\nrelated accidents, health problems and hazardous exposure; 2013 Accidents at work and other work-related\n\nhealth problems; 2020 - Accidents at work- and work-related health problems.\n\n439 Eurofound Website: [https://www.eurofound.europa.eu/about-eurofound](https://www.eurofound.europa.eu/about-eurofound)\n\n440 Eurofound, [European Working Conditions Survey](https://www.eurofound.europa.eu/surveys/european-working-conditions-surveys-ewcs)\n\n441 Eurofound, First European Survey on the Work Environment 1991-1992\n\n[https://www.eurofound.europa.eu/sites/default/files/ef_publication/field_ef_document/ef9211en.pdf](https://www.eurofound.europa.eu/sites/default/files/ef_publication/field_ef_document/ef9211en.pdf)\n\n442 European Agency for Safety and Health at Work, ESENER, [https://visualisation.osha.europa.eu/esener#!/en ](https://visualisation.osha.europa.eu/esener#!/en)\n\n443 Europeans and Health and Safety at Work, June 1992, [https://europa.eu/eurobarometer/surveys/detail/113](https://europa.eu/eurobarometer/surveys/detail/113) ;", - "page_start": 157, - "page_end": 157, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Fasani & Mazza, 2020: [A Vulnerable Workforce: Migrant Workers in the COVID-19 Pandemic](https://op.europa.eu/en/publication-detail/-/publication/43d3d0e2-a679-11ea-bb7a-01aa75ed71a1) (p. 1).\n\n99 [Browse Gender Statistics | Gender Statistics Database | European Institute for Gender Equality (europa.eu)](https://eige.europa.eu/gender-statistics/dgs)\n\n100 In the technical area of OSH, female workforce was often not taken as standard, concerning equipment,\n\nmachinery or PPE: the standards were aligned and designed for standard men.\n\n101 EU-OSHA, 2007: [Report - OSH in figures: Young workers - Facts and figures](https://osha.europa.eu/en/publications/report-osh-figures-young-workers-facts-and-figures)\n\n102 EU-OSHA: [Women and safety and health at work](https://osha.europa.eu/en/themes/women-and-health-work)\n\n103 EU-OSHA: [Women at Work: An Introduction](https://oshwiki.eu/wiki/Women_at_Work:_An_Introduction)\n\n104 Eurostat: Accidents at work by sex and severity (NACE Rev. 2 activity Total), [here](https://ec.europa.eu/eurostat/databrowser/view/HSW_MI08/default/table?lang=en&category=hlth.hsw.hsw_acc_work.hsw_mi)\n\nEurostat: Persons reporting a work-related health problem by sex, age and country of birth, [here](https://ec.europa.eu/eurostat/databrowser/view/HSW_PB11/default/table?lang=en&category=hlth.hsw.hsw_apex.hsw_pb)\n\n105 Eurostat: Time spent, participation time and participation rate in the main activity by sex and educational\n\nattainment level, [here](https://ec.europa.eu/eurostat/databrowser/view/TUS_00EDUC__custom_4405200/default/table?lang=en)\n\n106 EU-OSHA, 2016: [The ageing workforce: Implications for occupational safety and health - a research review - ](https://osha.europa.eu/en/publications/ageing-workforce-implications-occupational-safety-and-health-research-review-executive)\n\n[Executive Summary](https://osha.europa.eu/en/publications/ageing-workforce-implications-occupational-safety-and-health-research-review-executive) (pp. 4-5).\n\n107 EU-OSHA, Themes Ageing & OSH: [OSH management in the context of an ageing workforce](https://osha.europa.eu/en/themes/osh-management-context-ageing-workforce)\n\n108 Andersen et al., 2020: [Barriers and opportunities for prolonging working life across different occupational ](https://doi.org/10.1093%2Feurpub%2Fckz146)\n\n[groups: the SeniorWorkingLife study](https://doi.org/10.1093%2Feurpub%2Fckz146)\n\n109 Eurostat: Accidents at work by sex, age and severity (NACE Rev. 2 activity A, C-N), [here](https://ec.europa.eu/eurostat/databrowser/view/HSW_MI01__custom_1705207/default/table?lang=en)\n\n110 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and age, [here](https://ec.europa.eu/eurostat/databrowser/view/HSW_N2_03__custom_3234494/default/table?lang=en)\n\n111 European Parliament, 2011: [Occupational health and safety risks for the most vulnerable workers, Study](https://www.europarl.europa.eu/RegData/etudes/etudes/join/2011/464436/IPOL-EMPL_ET(2011)464436_EN.pdf) (p.\n\n29).\n\n112 EU-OSHA, 2018: [Management of psychosocial risks in European workplaces : evidence from the second ](https://data.europa.eu/doi/10.2802/5030)\n\n[European survey of enterprises on new and emerging risks (ESENER-2)](https://data.europa.eu/doi/10.2802/5030)\n\n113 EU-OSHA, 2018: [Foresight on new and emerging occupational safety and health risks associated with ](https://data.europa.eu/doi/10.2802/515834)\n\n[digitalisation by 2025](https://data.europa.eu/doi/10.2802/515834)\n\n114 Wellbeing is often measured as composite indicator covering several aspects of work, for example, in the\n\nWHO-5 Well-Being index.\n\n115 Incidence rate = number of work accidents per 100,000 workers. The number of EU Member States changed\n\nsignificantly in 1995 from (EU-12 to EU-15) and 2004 (from EU-15 to EU-25). That is the reason why we use here\n\nthe incidence rate from ESAW as indicator and not the total number.", - "page_start": 144, - "page_end": 144, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**The European Agency for Safety and Health**\n\n**at Work (EU-OSHA)** contributes to making\n\nEurope a safer, healthier and more productive\n\nplace to work. The Agency researches, develops\n\nand distributes reliable, balanced and impartial\n\nsafety and health information and organises pan-\n\nEuropean awareness-raising campaigns. Set up by\n\nthe European Union in 1994 and based in Bilbao,\n\nSpain, the Agency brings together representatives\n\nfrom the European Commission, Member State\n\ngovernments and employers’ and workers’\n\norganisations, as well as leading experts in each\n\nof the EU Member States and beyond.\n\n**European Agency for Safety and Health at Work**\n\n**(EU-OSHA)**\n\nSantiago de Compostela 12, 5th floor\n\n48003 Bilbao\n\nSpain\n\nTel: (+34) 944 358 400\n\nEmail: information@osha.europa.eu\n\n**https://osha.europa.eu**", - "page_start": 163, - "page_end": 163, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "69 See [Common framework and guidance documents for biodiversity proofing of the EU budget](https://ec.europa.eu/environment/nature/biodiversity/comm2006/proofing.htm) . 70 The cost estimate is based on the 2018 [Impact Assessment of the LIFE Regulation](https://ec.europa.eu/commission/sites/beta-political/files/budget-may2018-life-swd_en.pdf) (SWD(2018) 292), a [Study on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020](https://ieep.eu/uploads/articles/attachments/e597a01d-e34e-4a2e-84ec-68be1222c5fd/Financing_Target_2_Final_Report_without_Annexes_-_FINAL_APPROVED.pdf?v=63664509816) and data submitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will update the estimate, notably based on Member States’ Prioritised Action Frameworks under the Habitats Directive. Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European Maritime and Fisheries Fund, LIFE and external action funds. See [EU taxonomy for sustainable activities](https://ec.europa.eu/info/publications/sustainable-finance-teg-taxonomy_en) . World Wildlife Fund (2019), [The Nature of Risk - A Framework for Understanding Nature-Related ](https://c402277.ssl.cf1.rackcdn.com/publications/1255/files/original/WWF_Nature_of_Risk.FINAL2.pdf?1568216828) [Risk to Business](https://c402277.ssl.cf1.rackcdn.com/publications/1255/files/original/WWF_Nature_of_Risk.FINAL2.pdf?1568216828) .", - "page_start": 17, - "page_end": 17, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "9\n\n## **I.9. Data controller**\n\n**I.9.1 Processing of personal data by the contracting authority**\n\nFor the purpose of Article II.9.1,\n\n(a) the data controller is ECHA;\n\n(b) the data protection notice is available at\n\n[https://www.echa.europa.eu/documents/10162/13612/annex2_privacy_statement_procu](https://www.echa.europa.eu/documents/10162/13612/annex2_privacy_statement_procurement_procedures_en.pdf/ed81cf95-4056-4bdf-adb5-c0f1bd0d57a5)\n\n[rement_procedures_en.pdf/ed81cf95-4056-4bdf-adb5-c0f1bd0d57a5](https://www.echa.europa.eu/documents/10162/13612/annex2_privacy_statement_procurement_procedures_en.pdf/ed81cf95-4056-4bdf-adb5-c0f1bd0d57a5)\n\n**I.9.2 Processing of personal data by the contractor**\n\nThis clause is not applicable to this FWC.\n\n## **I.10. Exploitation of the results of the FWC**\n\n**I.10.1. Detailed list of modes of exploitation of the results**\n\nIn accordance with Article II.13.1 whereby the contracting authority acquires ownership of\n\nthe *results* as defined in this FWC, including the tender specifications, these *results* may\n\nbe used for any of the following modes of exploitation:\n\n(a) use for its own purposes:\n\n- making available to the staff of the contracting authority;\n\n- making available to the persons and entities working for the contracting authority or cooperating with it, including contractors, subcontractors whether legal or natural\n\npersons, Union institutions, agencies and bodies, Member States’ institutions;\n\n- installing, uploading, processing;\n\n- arranging, compiling, combining, retrieving;\n\n- copying, reproducing in whole or in part and in unlimited number of copies.\n\n(b) distribution to the public in hard copies, in electronic or digital format, on the\n\ninternet including social networks as a downloadable or non-downloadable file;\n\n(c) communication through press information services;\n\n(d) inclusion in widely accessible databases or indexes, such as via ‘open access’\n\nor ‘open data’ portals, or similar repositories, whether freely accessible or accessible only\n\nupon subscription;\n\n(e) modifications by the contracting authority or by a third party in the name of\n\nthe contracting authority, including:\n\n- shortening;\n\n- summarising;", - "page_start": 8, - "page_end": 8, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "158 Ibid.\n\n159 Agilis, 2015: [Final statistical report on the quality assessment and statistical analysis of the 2013 Labour Force ](http://ec.europa.eu/eurostat/documents/1978984/6037334/Evaluation_report_LFS_AHM_2013.7z)\n\n[Survey ad hoc module](http://ec.europa.eu/eurostat/documents/1978984/6037334/Evaluation_report_LFS_AHM_2013.7z) (p. 45)\n\n160 Eurostat, 2013: [European Statistics on Accidents at Work (ESAW) - Summary methodology - 2013 edition](https://ec.europa.eu/eurostat/web/products-manuals-and-guidelines/-/KS-RA-12-102)\n\n(p. 6).\n\n161 Fatal work accidents are seen as a more reliable data source than non-fatal accidents.\n\n162 Eurostat: [Fatal accidents at work by NACE Rev. 2 activity](https://ec.europa.eu/eurostat/databrowser/view/HSW_N2_02__custom_3197679/default/table?lang=en) , Filter: Incidence rate.\n\n163 The OSH Barometer shows the ESAW data from Eurostat’s Fatal accidents in a column diagram showing the\n\nincidence rate per 100,000 workers for two periods, [here](https://ec.europa.eu/eurostat/databrowser/view/hsw_n2_02/default/table?lang=en)\n\n164 Communication from the Commission to the European Parliament, the Council, the European Economic And\n\nSocial Committee and the Committee of Regions on the practical implementation of the provisions of the Health\n\nand Safety at Work Directives 89/391 (Framework), 89/654 (Workplaces), 89/655 (Work Equipment), 89/656\n\n(Personal Protective Equipment), 90/269 (Manual Handling of Loads) and 90/270 (Display Screen Equipment),\n\n[here](https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A52004DC0062) (p. 15).\n\n165 European Commission, 2009: [Causes and circumstances of accidents at work in the EU](https://data.europa.eu/doi/10.2767/39711) (p. 101 and Table\n\nA1.6. p. 130).\n\n*166* *ESAW Data for 2019: Eurostat,* *[Accidents at work by sex, age and severity](https://ec.europa.eu/eurostat/databrowser/view/hsw_mi07/default/table?lang=en)* *(NACE Rev. 2 activity A, C-N).*\n\n167 In publications about this topic, we find similar coefficients. Eurogip calculates for France (2016) 514 fatal\n\naccidents and 34,202 cases with permanent disability, this is a coefficient of 66 (Eurogip, 2018: [Statistical review ](https://eurogip.fr/images/pdf/Eurogip-135EN_Stat_Occ-Review-France2016.pdf)\n\n[of occupational injuries - France 2016 data](https://eurogip.fr/images/pdf/Eurogip-135EN_Stat_Occ-Review-France2016.pdf) ). Calculating a similar coefficient for Germany in 2018 leads to a\n\ncoefficient of 27 based on the relation of 497 fatal accidents to 13,550 recognised permanent handicaps that are\n\ncompensated by an occupational pension (DGUV, 2021: [Geschäfts- und Rechnungsergebnisse der gewerblichen ](https://publikationen.dguv.de/widgets/pdf/download/article/4339)\n\n[Berufsgenossenschaften und Unfallversicherungsträger der öffentlichen Hand 2020](https://publikationen.dguv.de/widgets/pdf/download/article/4339) , *Anhang* 1, p. 164).\n\nJørgensen calculates based on Eurostat data from 2009 and 2010 a coefficient of fatal accidents to disabled\n\npeople of 18, and when she calculates the coefficient between fatal and ‘most serious non-fatal injuries’ of more\n\nthan three months, the coefficient is 41. Jørgensen, 2015: [Serious work accidents and their causes - An analysis ](https://orbit.dtu.dk/en/publications/serious-work-accidents-and-their-causes-an-analysis-of-data-from-)\n\n[of data from Eurostat](https://orbit.dtu.dk/en/publications/serious-work-accidents-and-their-causes-an-analysis-of-data-from-)\n\n168 EU-OSHA, 2019: [The value of occupational safety and health and the societal costs of work-related injuries ](https://osha.europa.eu/en/publications/value-occupational-safety-and-health-and-societal-costs-work-related-injuries-and)\n\n[and diseases](https://osha.europa.eu/en/publications/value-occupational-safety-and-health-and-societal-costs-work-related-injuries-and) (Table A4b, pp. 112-113).", - "page_start": 146, - "page_end": 146, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Draft FWC for services 0142.pdf", - "query": "How can I get compensation if the european chemical agency terminates a contract we have ?", - "target_page": 11, - "target_passage": "If the FWC or a specific contract is terminated: a) neither party is entitled to compensation", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "6\n\nI.4.2. Period of provision of the services\n\nThe period for the provision of the services starts to run from the date on which the specific\n\ncontract is signed by the last party.\n\nI.4.3. Implementation of FWC in cascade\n\nThe FWC is implemented as follows: the contracting authority orders services by sending\n\na request for offer for a specific contract to the contractor who is ranked first in the cascade.\n\nWithin 5 working days (unless otherwise stated in the request for offer), the contractor\n\nmust either:\n\n(a) send the specific tender back to the contracting authority; or (b) send an explanation of why it cannot accept the order.\n\nIf the contractor does not accept the order or fails to observe the deadline or to submit an\n\nacceptable offer for the Agency, or if it is in a situation of conflicting interests that may\n\nnegatively affect the *performance of the specific contract* (see Article II.7), the contracting\n\nauthority may place the order with the next contractor on the cascade.\n\nIf the contractor repeatedly refuses to accept requests for offer or repeatedly fails to send\n\nthem back on time, the contractor may be considered in breach of its obligations under\n\nthis FWC as set out in Article II.18.1 (c).\n\nWithin a maximum of 5 working days of a specific contract or order form being sent by the\n\nAgency to the contractor, the Agency shall receive it back, duly signed and dated. The\n\nperiod allowed for the execution of the tasks shall start to run on the date of signature of\n\nthe specific contract or order form by both parties.\n\n## **I.5. Prices**\n\n**I.5.1. Maximum amount of the FWC and maximum prices**\n\nThe maximum amount covering all purchases under this FWC, including all renewals and\n\nreimbursement of expenses is **EUR 1 000 000** (one million). However, this does not bind\n\nthe contracting authority to purchase for the maximum amount.\n\nThe maximum unit prices of the services are:\n\nSenior experts: [ ] EUR per man-day\n\nExperts: [ ] EUR per man-day\n\n**I.5.2. Price revision index**\n\nPrice revision is determined by the formula set out in Article II.20 and using the trend in\n\nthe harmonised indices of consumer prices (HICP) ‘Euro area (19 countries)’ published at\n\n[http://ec.europa.eu/eurostat/web/hicp/data/database](http://ec.europa.eu/eurostat/web/hicp/data/database) under HICP (2015 = 100) - monthly\n\ndata (index) (prc_hicp_midx).]\n\n**I.5.3. Reimbursement of expenses**\n\nIn addition to the maximum price specified in each specific contract, if applicable, the\n\ncontracting authority shall reimburse the following in accordance with Article II.22:", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**I.10.3. Provision of list of pre-existing rights and documentary evidence**\n\nThe contractor must provide the contracting authority with a list of *pre-existing rights* as\n\nset out in Article II.13.4 together with the invoice for payment of the balance at the latest.\n\n## **I.11. Termination by either party 2**\n\nEither party may terminate the FWC and/or the FWC and specific contracts by sending\n\n*formal notification* to the other party with three months written notice.\n\nIf the FWC or a specific contract is terminated:\n\na) neither party is entitled to compensation;\n\nb) the contractor is entitled to payment only for the services provided before termination takes effect.\n\nThe second, third and fourth paragraphs of Article II.18.4 apply.\n\n## **I.12. Applicable law and settlement of disputes**\n\n**I.12.1** The FWC is governed by Union law, complemented, where necessary, by the law of\n\nFinland.\n\n**I.12.2** The courts of Finland have exclusive jurisdiction over any dispute regarding the\n\ninterpretation, application or validity of the FWC.\n\n## **I.13. Interinstitutional FWC**\n\nNot applicable\n\n## **I.14. Service provided on the premises of the contracting authority**\n\nNot applicable.\n\n## **I.15. Other special conditions**\n\nElectronic documents exchange\n\nIt is intended that the documents exchange (e.g. invoices, deliverables) between the\n\nAgency and the Contractor will have to be carried out via electronic means.\n\nAt the request of the Agency, the use of such electronic applications will become\n\nmandatory, upon mutual agreement, during the performance of the contract, at no additional cost for the Agency.\n\n2 This article may be deleted on the basis of a risk assessment taking into account the specific market and the need for business continuity", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "quality or continuity of the services. The parties may agree to draw up a transition plan\n\ndetailing the contractor’s assistance unless such plan is already detailed in other\n\ncontractual documents or in the tender specifications. The contractor must provide such\n\nassistance at no additional cost, except if it can demonstrate that it requires substantial\n\nadditional resources or means, in which case it must provide an estimate of the costs\n\ninvolved and the parties will negotiate an arrangement in good faith.\n\n**II.18.4. Effects of termination**\n\nThe contractor is liable for damage incurred by the contracting authority as a result of the\n\ntermination of the FWC or a specific contract, including the additional cost of appointing\n\nand contracting another contractor to provide or complete the services, except if the\n\ndamage is a result of a termination in accordance with Article II.18.1(j), (k) or (l) or Article\n\nII.18.2. The contracting authority may claim compensation for such damage.\n\nThe contractor is not entitled to compensation for any loss resulting from the termination\n\nof the FWC or a specific contract, including loss of anticipated profits, unless the loss was\n\ncaused by the situation specified in Article II.18.2.\n\nThe contractor must take all appropriate measures to minimise costs, prevent damage and\n\ncancel or reduce its commitments.\n\nWithin 60 days of the date of termination, the contractor must submit any report,\n\ndeliverable or *result* and any invoice required for services that were provided before the\n\ndate of termination.\n\nIn the case of joint tenders, the contracting authority may terminate the FWC or a specific\n\ncontract with each member of the group separately on the basis of points (d), (e) or (g)\n\nof Article II.18.1, under the conditions set out in Article II.11.2\n\n## **II.19. Invoices, value added tax and e-invoicing**\n\n**II.19.1. Invoices and value added tax**\n\nInvoices must contain the contractor’s (or leader’s in the case of a joint tender)\n\nidentification data, the amount, the currency and the date, as well as the FWC reference\n\nand reference to the specific contract.\n\nInvoices must indicate the place of taxation of the contractor (or leader in the case of a\n\njoint tender) for value added tax (VAT) purposes and must specify separately amounts not\n\nincluding VAT and amounts including VAT.\n\nThe contracting authority is exempt from all taxes and duties, including VAT, in accordance\n\nwith Articles 3 and 4 of the Protocol 7 of the Treaty on the Functioning of the European\n\nUnion on the privileges and immunities of the European Union.\n\nThe contractor (or leader in the case of a joint tender) must complete the necessary\n\nformalities with the relevant authorities to ensure that the supplies and services required\n\nfor *implementation of the FWC* are exempt from taxes and duties, including VAT.\n\n**II.19.2. E-invoicing**\n\nIf provided for in the special conditions, the contractor (or leader in the case of a joint\n\ntender) submits invoices in electronic format if the conditions regarding electronic\n\nsignature specified by Directive 2006/112/EC on VAT are fulfilled, i.e. using a qualified", - "page_start": 31, - "page_end": 31, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "(g) if the contractor does not comply with applicable obligations under environmental, social and labour law established by Union law, national law, collective agreements\n\nor by the international environmental, social and labour law provisions listed in\n\nAnnex X to Directive 2014/24/EU;\n\n(h) if the contractor is in a situation that could constitute a *conflict of interest* or a *professional conflicting interest* as referred to in Article II.7;\n\n(i) if a change to the contractor’s legal, financial, technical, organisational or ownership situation is likely to substantially affect the *implementation of the FWC* or\n\nsubstantially modify the conditions under which the FWC was initially awarded;\n\n(j) in the event of *force majeure* , where either resuming implementation is impossible or the necessary ensuing amendments to the FWC or a specific contract would mean\n\nthat the tender specifications are no longer fulfilled or result in unequal treatment\n\nof tenderers or contractors;\n\n(k) if the needs of the contracting authority change and it no longer requires new services under the FWC; in such cases ongoing specific contracts remain unaffected;\n\n(l) if the termination of the FWC with one or more of the contractors means that the multiple FWC with reopening of competition no longer has the minimum required\n\nlevel of competition;\n\n(m) if the contractor is in breach of the data protection obligations resulting from Article II.9.2;\n\n(n) if the contractor does not comply with the applicable data protection obligations resulting from Regulation (EU) 2016/679.\n\n**II.18.2. Grounds for termination by the contractor**\n\nThe contractor may terminate the FWC or any on-going specific contract if the contracting\n\nauthority fails to comply with its obligations, in particular the obligation to provide the\n\ninformation needed for the contractor to implement the FWC or to perform a specific\n\ncontract as provided for in the tender specifications.\n\n**II.18.3. Procedure for termination**\n\nA party must *formally notify* the other party of its intention to terminate the FWC or a\n\nspecific contract and the grounds for termination.\n\nThe other party has 30 days following the date of receipt to submit observations, including\n\nthe measures it has taken or will take to continue fulfilling its contractual obligations.\n\nFailing that, the decision to terminate becomes enforceable the day after the time limit for\n\nsubmitting observations has elapsed.\n\nIf the other party submits observations, the party intending to terminate must *formally*\n\n*notify* it either of the withdrawal of its intention to terminate or of its final decision to\n\nterminate.\n\nIn the cases referred to in points (a) to (d), (g) to (i), (k) and (l) of Article II.18.1 and in\n\nArticle II.18.2, the date on which the termination takes effect must be specified in the\n\n*formal notification* .\n\nIn the cases referred to in points (e), (f) and (j) of Article II.18.1, the termination takes\n\neffect on the day following the date on which the contractor receives *notification* of\n\ntermination.\n\nIn addition, at the request of the contracting authority and regardless of the grounds for\n\ntermination, the contractor must provide all necessary assistance, including information,\n\ndocuments and files, to allow the contracting authority to complete, continue or transfer\n\nthe services to a new contractor or internally, without interruption or adverse effect on the", - "page_start": 30, - "page_end": 30, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "*a specific contract* or any part of it:\n\n(a) if the procedure for awarding the FWC or a specific contract or the *implementation of*\n\n*the FWC* proves to have been subject to *irregularities, fraud or breach of obligations* ;\n\n(b) in order to verify whether the presumed *irregularities,* *fraud* or *breach of obligations*\n\nhave actually occurred.\n\nThe contracting authority must *formally notify* the contractor of the suspension and the\n\nreasons for it. Suspension takes effect on the date of *formal notification* , or at a later date\n\nif the *formal notification* so provides.\n\nThe contracting authority must *notify* the contractor as soon as the verification is\n\ncompleted whether:\n\n(a) it is lifting the suspension; or (b) it intends to terminate the FWC or a specific contract under Article II.18.1(f) or (j).\n\nThe contractor is not entitled to compensation for suspension of any part of the FWC or a\n\nspecific contract.\n\nThe contracting authority may in addition suspend the time allowed for payments in\n\naccordance with Article II.21.7.\n\n## **II.18. Termination of the FWC**\n\n**II.18.1. Grounds for termination by the contracting authority**\n\nThe contracting authority may terminate the FWC or any on-going specific contract in the\n\nfollowing circumstances:\n\n(a) if provision of the services under an on-going specific contract has not actually\n\nstarted within 15 days of the scheduled date and the contracting authority considers\n\nthat the new date proposed, if any, is unacceptable, taking into account\n\nArticle II.11.2;\n\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence\n\nrequired for *implementation of the FWC* ;\n\n(c) if the contractor does not implement the FWC or perform the specific contract in accordance with the tender specifications or *request for service* or is in breach of\n\nanother substantial contractual obligation or repeatedly refuses to sign specific\n\ncontracts. Termination of three or more specific contracts in these circumstances\n\nalso constitutes grounds for termination of the FWC;\n\n(d) if the contractor or any person that assumes unlimited liability for the debts of the\n\ncontractor is in one of the situations provided for in points (a) and (b) of Article\n\n136(1) of the Financial Regulation 6 ;\n\n(e) if the contractor or any *related person* is in one of the situations provided for in points (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation;\n\n(f) if the procedure for awarding the FWC or the *implementation of the FWC* prove to have been subject to *irregularities* , *fraud* or *breach of obligations* ;\n\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the financial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU)\n\nNo 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No\n\n223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No\n\n966/2012, OJ L 193 of 30.7.2018, p.1 [https://eur-lex.europa.eu/legal-](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG) [content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG)", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "## **II.16. Reduction in price**\n\n**II.16.1. Quality standards**\n\nIf the contractor fails to provide the service in accordance with the FWC or a specific\n\ncontract (‘unperformed obligations’) or if it fails to provide the service in accordance with\n\nthe expected quality levels specified in the tender specifications (‘low quality delivery’), the\n\ncontracting authority may reduce or recover payments proportionally to the seriousness of\n\nthe unperformed obligations or low quality delivery. This includes in particular cases where\n\nthe contracting authority cannot approve a *result* , report or deliverable as defined in Article\n\nI.6 after the contractor has submitted the required additional information, correction or\n\nnew version.\n\nA reduction in price may be imposed together with liquidated damages under the conditions\n\nof Article II.15.\n\n**II.16.2. Procedure**\n\nThe contracting authority must *formally notify* the contractor of its intention to reduce\n\npayment and the corresponding calculated amount.\n\nThe contractor has 30 days following the date of receipt to submit observations. Failing\n\nthat, the decision becomes enforceable the day after the time limit for submitting\n\nobservations has elapsed.\n\nIf the contractor submits observations, the contracting authority, taking into account the\n\nrelevant observations, must *notify* the contractor:\n\n(a) of the withdrawal of its intention to reduce payment; or\n\n(b) of its final decision to reduce payment and the corresponding amount,.\n\n**II.16.3. Claims and liability**\n\nAny reduction in price does not affect the contractor’s actual or potential liability or the\n\ncontracting authority’s rights under Article II.18.\n\n## **II.17. Suspension of the implementation of the FWC**\n\n**II.17.1. Suspension by the contractor**\n\nIf the contractor is affected by *force majeure* , it may suspend the provision of the services\n\nunder a specific contract.\n\nThe contractor must immediately *notify* the contracting authority of the suspension. The\n\n*notification* must include a description of the *force majeure* and state when the contractor\n\nexpects to resume the provision of services.\n\nThe contractor must *notify* the contracting authority as soon as it is able to resume\n\n*performance of the specific contract* , unless the contracting authority has already\n\nterminated the FWC or the specific contract.\n\n**II.17.2. Suspension by the contracting authority**\n\nThe contracting authority may suspend the *implementation of the FWC* or *performance of*", - "page_start": 28, - "page_end": 28, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "entities working for it or cooperating with it, including contractors and subcontractors,\n\nwhether legal or natural persons, but only for the purpose of their mission for the\n\ncontracting authority;\n\n(b) if the *result* is a \"document\" such as a report or a study, and it is meant to be published,\n\nthe existence of *pre-existing materials* in the *result* may not prevent the publication of the\n\ndocument, its translation or its \"reuse\", it being understood however that the \"reuse\" may\n\nonly be made of the *result* as a whole and not of the *pre-existing materials* taken separately\n\nfrom the *result* ; for the sake of this provision, \"reuse\" and \"document\" have the meaning\n\ngiven by the Commission Decision of 12 December 2011 on the reuse of Commission\n\ndocuments (2011/833/EU).\n\nAll *pre-existing rights* are licensed to the contracting authority from the moment the *results*\n\nare delivered and approved by the contracting authority.\n\nThe licensing of *pre-existing rights* to the contracting authority under this FWC covers all\n\nterritories worldwide and is valid for the duration of intellectual property rights protection.\n\nThe payment of the price as set out in the specific contracts is deemed to also include any\n\nfees payable to the contractor in relation to the licensing of *pre-existing rights* to the\n\ncontracting authority, including for all forms of exploitation and of use of the *results* .\n\nWhere *implementation of the FWC* requires that the contractor uses *pre-existing materials*\n\nbelonging to the contracting authority, the contracting authority may request that the\n\ncontractor signs an adequate licence agreement. Such use by the contractor will not entail\n\nany transfer of rights to the contractor and is limited to the needs of this FWC.\n\n**II.13.3. Exclusive rights**\n\nThe Contracting Authority acquires the following exclusive rights:\n\n(a) reproduction: the right to authorise or prohibit direct or indirect, temporary or permanent reproduction of the *results* by any means (mechanical, digital or other) and\n\nin any form, in whole or in part;\n\n(b) communication to the public: the exclusive right to authorise or prohibit any display,\n\nperformance or communication to the public, by wire or wireless means, including the\n\nmaking available to the public of the *results* in such a way that members of the public\n\nmay access them from a place and at a time individually chosen by them; this also\n\nincludes the communication on Internet and broadcasting by cable or by satellite;\n\n(c) distribution: the exclusive right to authorise or prohibit any form of distribution of *results* or copies of the *results* to the public, by sale or otherwise;\n\n(d) rental: the exclusive right to authorise or prohibit rental or lending of the *results* or of\n\ncopies of the *results* ;\n\n(e) adaptation: the exclusive right to authorise or prohibit any modification of the *results* ; (f) translation: the exclusive right to authorise or prohibit any translation, adaptation, arrangement, creation of derivative works based on the *results* , and any other\n\nalteration of the *results* , subject to the respect of moral rights of authors, where\n\napplicable;\n\n(g) where the *results* are or include a database: the exclusive right to authorise or prohibit\n\nthe extraction of all or a substantial part of the contents of the database to another\n\nmedium by any means or in any form; and the exclusive right to authorise or prohibit\n\nthe re-utilization of all or a substantial part of the contents of the database by the\n\ndistribution of copies, by renting, by on-line or other forms of transmission;\n\n(h) where the *results* are or include a patentable subject-matter: the right to register them as a patent and to further exploit such patent to the fullest extent;", - "page_start": 23, - "page_end": 23, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**II.4.4** The contractor must obtain any permit or licence required in the State where the\n\nservices are to be provided.\n\n**II.4.5** All periods specified in the FWC are calculated in calendar days, unless otherwise\n\nspecified.\n\n**II.4.6** The contractor must not present itself as a representative of the contracting\n\nauthority and must inform third parties that it is not part of the European public\n\nservice.\n\n**II.4.7** The contractor is responsible for the *personnel* who carry out the services and\n\nexercises its authority over its *personnel* without interference by the contracting\n\nauthority. The contractor must inform its *personnel* that:\n\n(a) they may not accept any direct instructions from the contracting authority; and (b) their participation in providing the services does not result in any employment or contractual relationship with the contracting authority.\n\n**II.4.8** The contractor must ensure that the *personnel* implementing the FWC and any\n\nfuture replacement personnel possess the professional qualifications and experience\n\nrequired to provide the services, as the case may be on the basis of the selection\n\ncriteria set out in the tender specifications.\n\n**II.4.9** At the contracting authority’s reasoned request, the contractor must replace any\n\nmember of *personnel* who:\n\n(a) does not have the expertise required to provide the services; or (b) has caused disruption at the premises of the contracting authority.\n\nThe contractor bears the cost of replacing its *personnel* and is responsible for any\n\ndelay in providing the services resulting from the replacement of *personnel* .\n\n**II.4.10** The contractor must record and report to the contracting authority any problem\n\nthat affects its ability to provide the services. The report must describe the problem,\n\nstate when it started and what action the contractor is taking to resolve it.\n\n## **II.5. Communication between the parties**\n\n**II.5.1. Form and means of communication**\n\nAny communication of information, notices or documents under the FWC must:\n\n(a) be made in writing in paper or electronic format in the language of the contract; (b) bear the FWC number and, if applicable, the specific contract number; (c) be made using the relevant communication details set out in Article I.8; and (d) be sent by mail, email or, for the documents specified in the special conditions, via *e-PRIOR* .\n\nIf a party requests written confirmation of an e-mail within a reasonable time, the other\n\nparty must provide an original signed paper version of the communication as soon as\n\npossible.\n\nof such data, and repealing Regulation (EC) No 45/2001 and Decision No 1247/2002/EC, OJ L 295/39, 21.11.2018, [https://eur-lex.europa.eu/legalcontent/EN/TXT/PDF/?uri=CELEX:32018R1725&from=EN](https://eur-lex.europa.eu/legalcontent/EN/TXT/PDF/?uri=CELEX:32018R1725&from=EN)", - "page_start": 15, - "page_end": 15, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "**II.14.3** The parties must take all necessary measures to limit any damage due to *force*\n\n*majeure* .\n\n## **II.15. Liquidated damages**\n\n**II.15.1. Delay in delivery**\n\nIf the contractor fails to perform its contractual obligations within the applicable time limits\n\nset out in this FWC, the contracting authority may claim liquidated damages for each day\n\nof delay using the following formula:\n\n0.3 x ( *V/d* )\n\nwhere:\n\n*V* is the price of the relevant purchase or deliverable or *result* ;\n\n*d* is the duration specified in the relevant specific contract for delivery of the relevant\n\npurchase or deliverable or *result* or, failing that, the period between the date specified in\n\nArticle I.4.2 and the date of delivery or performance specified in the relevant specific\n\ncontract, expressed in days.\n\nLiquidated damages may be imposed together with a reduction in price under the\n\nconditions laid down in Article II.16.\n\n**II.15.2. Procedure**\n\nThe contracting authority must *formally notify* the contractor of its intention to apply\n\nliquidated damages and the corresponding calculated amount.\n\nThe contractor has 30 days following the date of receipt to submit observations. Failing\n\nthat, the decision becomes enforceable the day after the time limit for submitting\n\nobservations has elapsed.\n\nIf the contractor submits observations, the contracting authority, taking into account the\n\nrelevant observations, must *notify* the contractor:\n\n(a) of the withdrawal of its intention to apply liquidated damages; or\n\n(b) of its final decision to apply liquidated damages and the corresponding amount.\n\n**II.15.3. Nature of liquidated damages**\n\nThe parties expressly acknowledge and agree that any amount payable under this Article\n\nis not a penalty and represents a reasonable estimate of fair compensation for the damage\n\nincurred due to failure to provide the services within the applicable time limits set out in\n\nthis FWC.\n\n**II.15.4. Claims and liability**\n\nAny claim for liquidated damages does not affect the contractor’s actual or potential liability\n\nor the contracting authority’s rights under Article II.18.", - "page_start": 27, - "page_end": 27, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "8\n\n3. The contracting authority may suspend the time limit for payment specified in point 2\n\nin accordance with Article II.21.7. Once the suspension is lifted, the contracting authority\n\nshall give its approval and pay within the remainder of the time-limit indicated in point 2\n\nunless it rejects partially or fully the submitted documents.\n\n**I.6.4. Performance guarantee**\n\nPerformance guarantee is not applicable to this FWC.\n\n**I.6.5. Retention money guarantee**\n\nRetention money guarantee is not applicable to this FWC.\n\n## **I.7. Bank account**\n\nPayments must be made to the contractor’s (or leader’s in the case of a joint tender) bank\n\naccount denominated in euro, identified as follows:\n\nName of bank:\n\nFull address of branch:\n\nExact denomination of account holder:\n\nFull account number including bank codes:\n\n[IBAN 1 code:]\n\n## **I.8. Communication details**\n\nFor the purpose of this FWC, communications must be sent to the following addresses:\n\nContracting authority:\n\nEuropean Chemicals Agency\n\nDirectorate and Unit D3, Risk Management I\n\nTelakkakatu 6\n\n00150 Helsinki\n\nFinland\n\nE-mail: [insert functional mailbox]\n\nContractor (or leader in the case of a joint tender):\n\n[ *Full name* ]\n\n[ *Function* ]\n\n[ *Company name* ]\n\n[ *Full official address* ]\n\nE-mail: [ *complete* ]\n\nBy derogation from this Article, different contact details for the contracting authority or the\n\ncontractor may be provided in specific contracts.\n\n1 BIC or SWIFT code for countries with no IBAN code", - "page_start": 7, - "page_end": 7, - "source_file": "EN-Draft FWC for services 0142.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Draft FWC for services 0142.pdf", - "query": "According to the european chemical agency contracts, what is considers a grave professional misconduct ?", - "target_page": 14, - "target_passage": "'Grave professional misconduct': a violation of applicable laws or regulations or ethical standards of the profession to which a contractor or a related person belongs, including any conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of the contractor or a related person which has an impact on its professional credibility where such conduct denotes wrongful intent or gross negligence.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**The European Agency for Safety and Health**\n\n**at Work (EU-OSHA)** contributes to making\n\nEurope a safer, healthier and more productive\n\nplace to work. The Agency researches, develops\n\nand distributes reliable, balanced and impartial\n\nsafety and health information and organises pan-\n\nEuropean awareness-raising campaigns. Set up by\n\nthe European Union in 1994 and based in Bilbao,\n\nSpain, the Agency brings together representatives\n\nfrom the European Commission, Member State\n\ngovernments and employers’ and workers’\n\norganisations, as well as leading experts in each\n\nof the EU Member States and beyond.\n\n**European Agency for Safety and Health at Work**\n\n**(EU-OSHA)**\n\nSantiago de Compostela 12, 5th floor\n\n48003 Bilbao\n\nSpain\n\nTel: (+34) 944 358 400\n\nEmail: information@osha.europa.eu\n\n**https://osha.europa.eu**", - "page_start": 163, - "page_end": 163, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Union budget, ii) the non-disclosure of information in violation of a specific obligation, with\n\nthe same effect or iii) the misapplication of such funds or assets for purposes other than\n\nthose for which they were originally granted, which damages the Union's financial interests;\n\n**'Grave professional misconduct':** a violation of applicable laws or regulations or ethical\n\nstandards of the profession to which a contractor or a related person belongs, including\n\nany conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of\n\nthe contractor or a related person which has an impact on its professional credibility where\n\nsuch conduct denotes wrongful intent or gross negligence.\n\n**‘Implementation of the FWC’** : the purchase of services envisaged in the FWC through\n\nthe signature and *performance of specific contracts* ;\n\n**‘Interface control document’** : the guideline document which lays down the technical\n\nspecifications, message standards, security standards, checks of syntax and semantics,\n\netc. to facilitate machine-to-machine connection. This document is updated on a regular\n\nbasis;\n\n**‘Irregularity’** : any infringement of a provision of Union law resulting from an act or\n\nomission by an economic operator, which has, or would have, the effect of prejudicing the\n\nUnion’s budget.\n\n**‘Notification’** (or ‘notify’): form of communication between the parties made in writing\n\nincluding by electronic means;\n\n**‘Order form’** : a simplified form of specific contract by which the contracting authority\n\norders services under this FWC;\n\n**‘Performance of a specific contract’** : the execution of tasks and delivery of the\n\npurchased services by the contractor to the contracting authority;\n\n**‘Personnel’** : persons employed directly or indirectly or contracted by the contractor to\n\nimplement the FWC;\n\n**‘Pre-existing material’** : any material, document, technology or know-how which exists\n\nprior to the contractor using it for the production of a *result* in the *implementation of the*\n\n*FWC* ;\n\n**‘Pre-existing right’** : any industrial and intellectual property right on *pre-existing*\n\n*material* ; it may consist in a right of ownership, a licence right and/or right of use belonging\n\nto the contractor, the *creator* , the contracting authority as well as to any other third\n\nparties;\n\n**‘Professional conflicting interest’** : a situation in which the contractor’s previous or\n\nongoing professional activities affect its capacity to implement the FWC or to perform a\n\nspecific contract to an appropriate quality standard.\n\n**‘Related person’** : any natural or legal person who is a member of the administrative, management or supervisory body of the contractor, or who has powers of representation, decision or control with regard to the contractor;\n\n**‘Request for services’** : a document from the contracting authority requesting that the\n\ncontractors in a multiple FWC with re-opening of competition provide a specific tender for\n\nservices whose terms are not entirely defined under the FWC;", - "page_start": 13, - "page_end": 13, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "357 The authors explain the difference between ‘substantive and rule compliance as follows: *‘... “substantive*\n\n*compliance”, which requires compliance with the collective goals underpinning the regulatory scheme (better OSH*\n\n*practice); and “rule compliance”, which envisages compliance with the content of legal standards only* ’ (p. 11).\n\n*358* EU-OSHA, 2021: [Improving compliance with occupational safety and health regulations: an overarching review](https://osha.europa.eu/en/publications/improving-occupational-safety-and-health-changing-world-work-what-works-and-how)\n\n(p. 43).\n\n359 Fundamental Rights Agency (FRA), [here](https://fra.europa.eu/en) , section on [Trafficking and labour exploitation](https://fra.europa.eu/en/themes/trafficking-and-labour-exploitation)\n\n360 Special Eurobarometer 498: [Undeclared Work in the European Union](https://europa.eu/eurobarometer/surveys/detail/2250)\n\n361 European Commission, Directorate-General for Employment, Social Affairs and Inclusion et al., 2018: An\n\nevaluation of the scale of undeclared work in the European Union and its structural determinants : estimates using\n\nthe labour input method, [here](https://data.europa.eu/doi/10.2767/98169)\n\n362 ELA: [European Platform tackling undeclared work](https://www.ela.europa.eu/en/undeclared-work)\n\n363 The OSH Barometer contains a special section on enforcement capacities, [here](https://visualisation.osha.europa.eu/osh-barometer/osh-infrastructure/enforcement-capacity/establishments-inspected/AT/)\n\n364 SLIC, 2015: [Common Principles for Labour Inspection in Relation to Health and Safety In the Workplace](https://ec.europa.eu/social/BlobServlet?docId=15615&langId=en)\n\n365 Cardiff University et al., 2011: Contract to assess the potential impact of emerging trends and risks on labour\n\ninspection methodologies in the domain of occupational health and safety,\n\nEuropean Federation of Public Service Unions (EPSU), 2012: [A mapping report on Labour Inspection Services in ](https://www.epsu.org/sites/default/files/article/files/EPSU_Final_report_on_Labour_Inspection_Services.pdf)\n\n[15 European countries](https://www.epsu.org/sites/default/files/article/files/EPSU_Final_report_on_Labour_Inspection_Services.pdf) (p. 13ff).\n\n366 The Nordic countries (Denmark, Finland, Iceland, Norway and Sweden) are particularly active in this area.\n\nThey have summarised the current challenges for labour inspections and supervision in general, giving extensive\n\nand detailed recommendations; Nordic Future of Work Group, 2020: Work today and in the future : Perspectives\n\non Occupational Safety and Health challenges and opportunities for the Nordic labour inspectorates, [here ](https://julkaisut.valtioneuvosto.fi/handle/10024/162419)\n\nBAuA, 2020: Scientific workshop on the future of smart and effective labour inspection, 3 November 2020, [here](https://www.baua.de/DE/Angebote/Veranstaltungen/Dokumentationen/Digitalisierung/pdf/Dokumentation.pdf?__blob=publicationFile&v=1)", - "page_start": 153, - "page_end": 153, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "6\n\nI.4.2. Period of provision of the services\n\nThe period for the provision of the services starts to run from the date on which the specific\n\ncontract is signed by the last party.\n\nI.4.3. Implementation of FWC in cascade\n\nThe FWC is implemented as follows: the contracting authority orders services by sending\n\na request for offer for a specific contract to the contractor who is ranked first in the cascade.\n\nWithin 5 working days (unless otherwise stated in the request for offer), the contractor\n\nmust either:\n\n(a) send the specific tender back to the contracting authority; or (b) send an explanation of why it cannot accept the order.\n\nIf the contractor does not accept the order or fails to observe the deadline or to submit an\n\nacceptable offer for the Agency, or if it is in a situation of conflicting interests that may\n\nnegatively affect the *performance of the specific contract* (see Article II.7), the contracting\n\nauthority may place the order with the next contractor on the cascade.\n\nIf the contractor repeatedly refuses to accept requests for offer or repeatedly fails to send\n\nthem back on time, the contractor may be considered in breach of its obligations under\n\nthis FWC as set out in Article II.18.1 (c).\n\nWithin a maximum of 5 working days of a specific contract or order form being sent by the\n\nAgency to the contractor, the Agency shall receive it back, duly signed and dated. The\n\nperiod allowed for the execution of the tasks shall start to run on the date of signature of\n\nthe specific contract or order form by both parties.\n\n## **I.5. Prices**\n\n**I.5.1. Maximum amount of the FWC and maximum prices**\n\nThe maximum amount covering all purchases under this FWC, including all renewals and\n\nreimbursement of expenses is **EUR 1 000 000** (one million). However, this does not bind\n\nthe contracting authority to purchase for the maximum amount.\n\nThe maximum unit prices of the services are:\n\nSenior experts: [ ] EUR per man-day\n\nExperts: [ ] EUR per man-day\n\n**I.5.2. Price revision index**\n\nPrice revision is determined by the formula set out in Article II.20 and using the trend in\n\nthe harmonised indices of consumer prices (HICP) ‘Euro area (19 countries)’ published at\n\n[http://ec.europa.eu/eurostat/web/hicp/data/database](http://ec.europa.eu/eurostat/web/hicp/data/database) under HICP (2015 = 100) - monthly\n\ndata (index) (prc_hicp_midx).]\n\n**I.5.3. Reimbursement of expenses**\n\nIn addition to the maximum price specified in each specific contract, if applicable, the\n\ncontracting authority shall reimburse the following in accordance with Article II.22:", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "OLAF’s own staff or by any outside body authorised to do so on its behalf.\n\nSuch checks and audits may be initiated at any moment during the provision of\n\nthe services and up to five years starting from the payment of the balance of the\n\nlast specific contract issued under this FWC\n\nThe audit procedure is initiated on the date of receipt of the relevant letter sent\n\nby the contracting authority. Audits are carried out on a confidential basis.\n\n**II.24.2** The contractor must keep all original documents stored on any appropriate\n\nmedium, including digitised originals if authorised under national law, for a period\n\nof five years starting from the payment of the balance of the last specific contract\n\nissued under this FWC.\n\n**II.24.3** The contractor must grant the contracting authority’s staff and outside personnel\n\nauthorised by the contracting authority the appropriate right of access to sites and\n\npremises where the FWC is implemented and to all the information, including\n\ninformation in electronic format, needed to conduct such checks and audits. The\n\ncontractor must ensure that the information is readily available at the moment of\n\nthe check or audit and, if so requested, that information is handed over in an\n\nappropriate format.\n\n**II.24.4** On the basis of the findings made during the audit, a provisional report is drawn\n\nup. The contracting authority or its authorised representative must send it to the\n\ncontractor, who has 30 days following the date of receipt to submit observations.\n\nThe contractor must receive the final report within 60 days following the expiry of\n\nthe deadline to submit observations.\n\nOn the basis of the final audit findings, the contracting authority may recover all\n\nor part of the payments made in accordance with Article II.23 and may take any\n\nother measures which it considers necessary.\n\n**II.24.5** In accordance with Council Regulation (Euratom, EC) No 2185/96 of\n\n11 November 1996 concerning on-the-spot checks and inspection carried out by\n\nthe Commission in order to protect the European Communities’ financial interests\n\nagainst *fraud* and other *irregularities* and Regulation (EU, Euratom) No 883/2013\n\nof the European Parliament and of the Council of 11 September 2013 concerning\n\ninvestigations conducted by the European Anti-Fraud Office, the European Anti-\n\nFraud Office may carry out investigations, including on the spot checks and\n\ninspections, to establish whether there has been *fraud* , corruption or any other\n\nillegal activity under the contract affecting the financial interests of the Union.\n\nFindings arising from an investigation may lead to criminal prosecution under\n\nnational law.\n\nThe investigations may be carried out at any moment during the provision of the\n\nservices and up to five years starting from the payment of the balance of the last\n\nspecific contract issued under this FWC.\n\n**II.24.6** The Court of Auditors, the European Public Prosecutor’s Office established by\n\nCouncil Regulation (EU) 2017/19397 7 (‘the EPPO’) and, for the processing of\n\npersonal data, the European Data Protection Supervisor have the same rights as\n\nthe contracting authority, particularly right of access, for the purpose of checks,\n\n7 Council Regulation (EU) 2017/1939 of 12 October 2017 implementing enhanced cooperation on the establishment of the European Public Prosecutor’s Office", - "page_start": 37, - "page_end": 37, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "238 Da Costa & Viera, 2010: Risk factors for work-related musculoskeletal disorders: a systematic review of recent\n\nlongitudinal studies, [here](https://doi.org/10.1002/ajim.20750)\n\n239 EU-OSHA, 2020: [Work-related musculoskeletal disorders: why are they still so prevalent? Evidence from a ](https://osha.europa.eu/en/publications/work-related-musculoskeletal-disorders-why-are-they-still-so-prevalent-evidence-literature-review)\n\n[literature review](https://osha.europa.eu/en/publications/work-related-musculoskeletal-disorders-why-are-they-still-so-prevalent-evidence-literature-review) (p. 15).\n\n240 EU-OSHA, 2019: [Summary - Work-related musculoskeletal disorders: prevalence, costs and demographics in ](https://osha.europa.eu/en/publications/summary-msds-facts-and-figures-overview-prevalence-costs-and-demographics-msds-europe)\n\n[the EU](https://osha.europa.eu/en/publications/summary-msds-facts-and-figures-overview-prevalence-costs-and-demographics-msds-europe) (p. 8).\n\n241 EU-OSHA, 2019: [Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU](https://osha.europa.eu/en/publications/msds-facts-and-figures-overview-prevalence-costs-and-demographics-msds-europe)\n\n242 Ibid., p. 174ff.\n\n243 Eurofound, 2007: [Fourth European Working Conditions Survey (2005)](https://www.eurofound.europa.eu/surveys/european-working-conditions-surveys/fourth-european-working-conditions-survey-2005.) (p. 77).\n\n244 United Nations Economic Commission for Europe (UNECE), 2015: Handbook on measuring quality of\n\nemployment: A statistical framework, [here](https://unece.org/statistics/publications/handbook-measuring-quality-employment)\n\n245 Quinlan & Bohle, 2013: Re-invigorating industrial relations as a field of study: Changes at work, substantive\n\nworking conditions and the case of OHS, [here](https://www.nzjournal.org/NZJER38%283%29.pdf) (p. 8).\n\n246 The percentages of responses to this question in the European Working Conditions Survey (EWCS, 2015) are\n\ndisplayed. Each bar shows the percentages of the four possible responses for each EU Member State, the\n\naverage for the EU Member States, and the responses for Switzerland and Norway. Responses are displayed for\n\nthe question below: How satisfied are you with working conditions in your main paid job? Answer options were:\n\nNot at all satisfied; Not very satisfied; Satisfied; Very satisfied. See [here](https://www.eurofound.europa.eu/data/european-working-conditions-survey)\n\n247 Flash Eurobarometer 398, 2014, p 2, [https://www.cesi.org/wp-content/uploads/2014/04/fl_398_sum_en.pdf](https://www.cesi.org/wp-content/uploads/2014/04/fl_398_sum_en.pdf) .\n\nThe displayed Flash Eurobarometer data refer to the ‘working population’, with two subgroups A (employees and\n\nmanual workers), and B (self-employed). In the Flash Eurobarometer sample these two groups are separated\n\nfrom three further groups forming the ‘Not working’ population These groups are: subgroups: students, retired,\n\nlooking for a job.\n\n248 Ibid., p. 58.\n\n249 Eurofound, 2007: [Fourth European Working Conditions Survey (2005)](https://www.eurofound.europa.eu/surveys/european-working-conditions-surveys/fourth-european-working-conditions-survey-2005.) (pp. 77-81).", - "page_start": 149, - "page_end": 149, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "2\n\nNeither the European Agency for Safety and Health at Work nor any person acting on behalf of the agency is responsible for the\n\nuse that might be made of the following information.\n\nLuxembourg: Publications Office of the European Union, 2023\n\nPrint ISBN 978-92-9479-934-0 doi: 10.2802/26873\n\nPDF ISBN 978-92-9479-935-7 doi: 10.2802/56459\n\n© European Agency for Safety and Health at Work, 2023\n\nReproduction is authorised provided the source is acknowledged.\n\nFor any use or reproduction of photos or other material that is not under the copyright of the European Agency for Safety and\n\nHealth at Work, permission must be sought directly from the copyright holders.\n\nThe photographs used in this publication illustrate a range of work activities. They do not necessarily show good practices or\n\ncompliance with legislative requirements.\n\nFor one-click access to websites and references please consult the online version of this publication\n\n[https://osha.europa.eu/en/publications/occupational-safety-and-health-europe-state-and-trends-2023](https://osha.europa.eu/en/publications/occupational-safety-and-health-europe-state-and-trends-2023)", - "page_start": 1, - "page_end": 1, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**II.6.3** The contractor is liable for any loss or damage caused to the contracting authority\n\nduring or as a consequence of *implementation of the FWC* , including in the event of\n\nsubcontracting, but only up to an amount not exceeding three times the total\n\namount of the relevant specific contract. However, if the damage or loss is caused\n\nby the gross negligence or wilful misconduct of the contractor or of its *personnel* or\n\nsubcontractors, as well as in the case of an action brought against the contracting\n\nauthority by a third party for breach of its intellectual property rights, the contractor\n\nis liable for the whole amount of the damage or loss.\n\n**II.6.4** If a third party brings any action against the contracting authority in connection\n\nwith the *implementation of the FWC* , including any action for alleged breach of\n\nintellectual property rights, the contractor must assist the contracting authority in\n\nthe legal proceedings, including by intervening in support of the contracting\n\nauthority upon request.\n\nIf the contracting authority’s liability towards the third party is established and that\n\nsuch liability is caused by the contractor during or as a consequence of the\n\n*implementation of the FWC* , Article II.6.3 applies.\n\n**II.6.5** If the contractor is composed of two or more economic operators (i.e. who\n\nsubmitted a joint tender), they are all jointly and severally liable to the contracting\n\nauthority for the *implementation of the FWC* .\n\n**II.6.6** The contracting authority is not liable for any loss or damage caused to the\n\ncontractor during or as a consequence of *implementation of the FWC* , unless the\n\nloss or damage was caused by wilful misconduct or gross negligence of the\n\ncontracting authority.\n\n## **II.7. Conflict of interest and professional conflicting interests**\n\n**II.7.1** The contractor must take all the necessary measures to prevent any situation of\n\n*conflict of interest* or *professional conflicting interest* .\n\n**II.7.2** The contractor must *notify* the contracting authority in writing as soon as possible\n\nof any situation that could constitute a *conflict of interest* or a *professional*\n\n*conflicting interest* during the *implementation of the FWC* . The contractor must\n\nimmediately take action to rectify the situation.\n\nThe contracting authority may do any of the following:\n\n(a) verify that the contractor’s action is appropriate; (b) require the contractor to take further action within a specified deadline; (c) decide not to award a specific contract to the contractor.\n\n**II.7.3** The contractor must pass on all the relevant obligations in writing to:\n\n(a) its *personnel* ; (b) any natural person with the power to represent it or take decisions on its\n\nbehalf;\n\n(c) third parties involved in the *implementation of the FWC* , including subcontractors.\n\nThe contractor must also ensure that the persons referred to above are not placed\n\nin a situation which could give rise to conflicts of interest.", - "page_start": 18, - "page_end": 18, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "quality or continuity of the services. The parties may agree to draw up a transition plan\n\ndetailing the contractor’s assistance unless such plan is already detailed in other\n\ncontractual documents or in the tender specifications. The contractor must provide such\n\nassistance at no additional cost, except if it can demonstrate that it requires substantial\n\nadditional resources or means, in which case it must provide an estimate of the costs\n\ninvolved and the parties will negotiate an arrangement in good faith.\n\n**II.18.4. Effects of termination**\n\nThe contractor is liable for damage incurred by the contracting authority as a result of the\n\ntermination of the FWC or a specific contract, including the additional cost of appointing\n\nand contracting another contractor to provide or complete the services, except if the\n\ndamage is a result of a termination in accordance with Article II.18.1(j), (k) or (l) or Article\n\nII.18.2. The contracting authority may claim compensation for such damage.\n\nThe contractor is not entitled to compensation for any loss resulting from the termination\n\nof the FWC or a specific contract, including loss of anticipated profits, unless the loss was\n\ncaused by the situation specified in Article II.18.2.\n\nThe contractor must take all appropriate measures to minimise costs, prevent damage and\n\ncancel or reduce its commitments.\n\nWithin 60 days of the date of termination, the contractor must submit any report,\n\ndeliverable or *result* and any invoice required for services that were provided before the\n\ndate of termination.\n\nIn the case of joint tenders, the contracting authority may terminate the FWC or a specific\n\ncontract with each member of the group separately on the basis of points (d), (e) or (g)\n\nof Article II.18.1, under the conditions set out in Article II.11.2\n\n## **II.19. Invoices, value added tax and e-invoicing**\n\n**II.19.1. Invoices and value added tax**\n\nInvoices must contain the contractor’s (or leader’s in the case of a joint tender)\n\nidentification data, the amount, the currency and the date, as well as the FWC reference\n\nand reference to the specific contract.\n\nInvoices must indicate the place of taxation of the contractor (or leader in the case of a\n\njoint tender) for value added tax (VAT) purposes and must specify separately amounts not\n\nincluding VAT and amounts including VAT.\n\nThe contracting authority is exempt from all taxes and duties, including VAT, in accordance\n\nwith Articles 3 and 4 of the Protocol 7 of the Treaty on the Functioning of the European\n\nUnion on the privileges and immunities of the European Union.\n\nThe contractor (or leader in the case of a joint tender) must complete the necessary\n\nformalities with the relevant authorities to ensure that the supplies and services required\n\nfor *implementation of the FWC* are exempt from taxes and duties, including VAT.\n\n**II.19.2. E-invoicing**\n\nIf provided for in the special conditions, the contractor (or leader in the case of a joint\n\ntender) submits invoices in electronic format if the conditions regarding electronic\n\nsignature specified by Directive 2006/112/EC on VAT are fulfilled, i.e. using a qualified", - "page_start": 31, - "page_end": 31, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "*a specific contract* or any part of it:\n\n(a) if the procedure for awarding the FWC or a specific contract or the *implementation of*\n\n*the FWC* proves to have been subject to *irregularities, fraud or breach of obligations* ;\n\n(b) in order to verify whether the presumed *irregularities,* *fraud* or *breach of obligations*\n\nhave actually occurred.\n\nThe contracting authority must *formally notify* the contractor of the suspension and the\n\nreasons for it. Suspension takes effect on the date of *formal notification* , or at a later date\n\nif the *formal notification* so provides.\n\nThe contracting authority must *notify* the contractor as soon as the verification is\n\ncompleted whether:\n\n(a) it is lifting the suspension; or (b) it intends to terminate the FWC or a specific contract under Article II.18.1(f) or (j).\n\nThe contractor is not entitled to compensation for suspension of any part of the FWC or a\n\nspecific contract.\n\nThe contracting authority may in addition suspend the time allowed for payments in\n\naccordance with Article II.21.7.\n\n## **II.18. Termination of the FWC**\n\n**II.18.1. Grounds for termination by the contracting authority**\n\nThe contracting authority may terminate the FWC or any on-going specific contract in the\n\nfollowing circumstances:\n\n(a) if provision of the services under an on-going specific contract has not actually\n\nstarted within 15 days of the scheduled date and the contracting authority considers\n\nthat the new date proposed, if any, is unacceptable, taking into account\n\nArticle II.11.2;\n\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence\n\nrequired for *implementation of the FWC* ;\n\n(c) if the contractor does not implement the FWC or perform the specific contract in accordance with the tender specifications or *request for service* or is in breach of\n\nanother substantial contractual obligation or repeatedly refuses to sign specific\n\ncontracts. Termination of three or more specific contracts in these circumstances\n\nalso constitutes grounds for termination of the FWC;\n\n(d) if the contractor or any person that assumes unlimited liability for the debts of the\n\ncontractor is in one of the situations provided for in points (a) and (b) of Article\n\n136(1) of the Financial Regulation 6 ;\n\n(e) if the contractor or any *related person* is in one of the situations provided for in points (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation;\n\n(f) if the procedure for awarding the FWC or the *implementation of the FWC* prove to have been subject to *irregularities* , *fraud* or *breach of obligations* ;\n\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the financial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU)\n\nNo 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No\n\n223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No\n\n966/2012, OJ L 193 of 30.7.2018, p.1 [https://eur-lex.europa.eu/legal-](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG) [content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG)", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Draft FWC for services 0142.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_GLW_2002.pdf", - "query": "What or Corning's corporate values ?", - "target_page": 12, - "target_passage": "Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "One Riverfront Plaza\n\nCorning, NY 14831-0001\n\n607 974 9000\n\nwww.corning.com\n\n02BR24601EN\n\nA N N U A L M E E T I N G\n\nThe annual meeting of shareholders will be held on\n\nThursday, April 24, 2003, in Corning, NY. A formal notice\n\nof the meeting together with a proxy statement will be mailed\n\nto shareholders on or about March 12, 2003. The proxy state-\n\nment can also be accessed electronically through the Investor\n\nRelations category of the Corning home page on the Internet\n\nat www.corning.com. A summary report of the proceedings\n\nat the annual meeting will be available without charge upon\n\nwritten request to Ms. Denise A. Hauselt, Secretary and\n\nAssistant General Counsel, Corning Incorporated, HQ-E2-10,\n\nCorning, NY 14831.\n\nA D D I T I O N A L I N F O R M AT I O N\n\nA copy of Corning’s 2002 Annual Report on Form 10-K filed\n\nwith the Securities and Exchange Commission is available\n\nupon written request to Ms. Denise A. Hauselt, Secretary and\n\nAssistant General Counsel, Corning Incorporated, HQ-E2-10,\n\nCorning, NY 14831. The Annual Report on Form 10-K can\n\nalso be accessed electronically through the Investor Relations\n\ncategory of the home page on the Internet at:\n\nwww.corning.com\n\nI N V E S T O R I N F O R M AT I O N\n\nInvestment analysts who need additional information may\n\ncontact Mr. Kenneth C. Sofio, Manager of Investor Relations,\n\nCorning Incorporated, HQ-E2-25, Corning, NY 14831;\n\nTelephone 607.974.9000\n\nC O M M O N S T O C K\n\nCorning Incorporated common stock is listed on the\n\nNew York Stock Exchange and the SWX Swiss Exchange.\n\nIn addition, it is traded on the Boston, Midwest, Pacific\n\nand Philadelphia stock exchanges. Common stock options\n\nare traded on the Chicago Board Options Exchange. The\n\nabbreviated ticker symbol for Corning Incorporated is “GLW.”\n\nT RANSFER A GENT AND R EGISTRAR\n\nComputershare Investor Services LLC\n\nP.O. Box A-3504\n\nChicago, IL 60690-3504\n\nTelephone: 800.255.0461\n\nWebsite: www.computershare.com\n\nC HANGE OF A DDRESS\n\nReport change of address to Computershare\n\nInvestor Services at the above address.\n\nI N D E P E N D E N T A C C O U N TA N T S\n\nPricewaterhouseCoopers LLP\n\n1301 Avenue of the Americas\n\nNew York, NY 10019\n\n“ Sa fe Ha rbor” St a t e m e nt unde r t he Pri vate\n\nSe c uri t i e s Li t i ga t i on R e form Ac t of 1995\n\nThe statements in this annual report that are not historical\n\nfacts or information are forward-looking statements. These\n\nforward-looking statements involve risks and uncertainties\n\nthat may cause the outcome to be materially different. Such\n\nrisks and uncertainties include, but are not limited to:\n\n— global economic and political conditions,\n\n— currency fluctuations,\n\n— product demand and industry capacity,\n\n— competitive products and pricing,\n\n— sufficiency of manufacturing capacity and efficiencies,\n\n— cost reductions,\n\n— availability and costs of critical materials,\n\n— new product development and commercialization,\n\n— attracting and retaining key personnel,\n\n— order activity and demand from major customers,\n\n— fluctuations in capital spending by customers\n\nin the telecommunications industry and other\n\nbusiness segments,\n\n— financial condition of customers,\n\n— changes in the mix of sales between premium\n\nand non-premium products,\n\n— facility expansions and new plant start-up costs,\n\n— adverse litigation or regulatory developments, including\n\nfuture or pending tax legislation,\n\n— adequacy and availability of insurance,\n\n— capital resource and cash flow activities,\n\n— capital spending,\n\n— equity company activities,\n\n— interest costs,\n\n— acquisition and divestiture activity,\n\n— the rate of technology change,\n\n— the ability to enforce patents,\n\n— product performance issues,\n\n— stock price fluctuations, and\n\n— other risks detailed in Corning’s SEC filings.\n\nNeither this report nor any statement contained herein is\n\nfurnished in connection with any offering of securities or for\n\nthe purpose of promoting or influencing the sale of securities.", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "#### B A L A N C E Corning Annual Report 20 02", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "Neither this report nor any statement contained herein is\n\nfurnished in connection with any offering of securities or for\n\nthe purpose of promoting or influencing the sale of securities.\n\nCorning is an equal opportunity employer.\n\nPrinted in USA\n\n© Corning Incorporated 2003\n\nI N V E S T O R I N F O R M A T I O N :\n\n**Corning Incorporated**", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "## Corporate Governance **CORPORATE GOVERNANCE**", - "page_start": 47, - "page_end": 47, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "been a strong tenet at Rogers, and as an\n\nentrepreneur founded and family controlled\n\ncompany, our Board takes pride in what is a\n\nproactive and disciplined approach to\n\nensuring that our governance practices\n\ncontinue to justify the confidence of the\n\npublic capital markets. Giving back to the\n\ncommunities we serve is also an important\n\npart of our culture at Rogers and the Board is\n\nvery proud of the significant initiatives and\n\ninvestments which the company undertook\n\nover the past year on the corporate social\n\nresponsibility front.\n\nI would like to thank Rogers’ 28,000\n\nemployees for their ongoing dedication to\n\nour customers and striving to make Rogers\n\nbetter every day, my fellow Board members\n\nfor their counsel and drive towards delivering\n\ncontinued value to our shareholders, and\n\nyou our shareholders for your continued\n\ninvestment in this great company.\n\n02 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT\n\n####### **ALAN HORN**", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "61\n\n####### **Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is\n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement\n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that\n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day.\n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining\n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to\n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors.\n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s\n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and\n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years.\n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the\n\nNew York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that\n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules.\n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man-\n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance.\n\nSincerely,\n\nThe HON INDUSTRIES Board of Directors\n\nA MESSA GE FR OM T H E B OA R D OF DI R ECT OR S\n\nStan A. Askren\n\nGary M. Christensen\n\nCheryl A. Francis\n\nRobert L. Katz\n\nDennis J. Martin\n\nJack D. Michaels\n\nJoseph Scalzo\n\nAbbie J. Smith\n\nRichard H. Stanley\n\nBrian E. Stern\n\nRonald V. Waters, III", - "page_start": 60, - "page_end": 60, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "We will long remember 2002 as one of the most challenging years — if not the most challenging — in Corning Incorporated’s\n\nlong history. I quickly became even more steeped in these challenges in April when, at the request of our Board of Directors,\n\nI returned to the company as Chairman and Chief Executive Officer.\n\nSince that time, I am increasingly convinced that, despite our downturn, the long-term future of Corning remains bright and\n\nfilled with opportunity.\n\nBut in the meantime, we have been living in a very difficult reality - one marked by ongoing quarterly losses and drops in\n\nrevenue. You, our shareholders—along with our employees and our friends in the communities we serve—felt the pain. We all\n\nwatched our businesses retrench, battered by a weakened global economy and Wall Street turmoil. And we could only wonder\n\nwhat bad news would be next as our stock value continued its seemingly relentless decline.\n\nWith the severe drop-off in revenues from our telecommunications customers, we knew we could no longer afford to keep\n\nup the costly infrastructure of facilities and staff we had in place. Put simply, we couldn’t spend more than we were making.\n\nWe also knew our strengths — and they were many! We knew we were not — nor had we ever been — merely a\n\ntelecommunications company. Rather, we are a technology company, with the materials and process expertise to create\n\nlife-changing products. That’s what we’ve been for all of our 152 years; that’s what we’ll continue to be.\n\nAnd we knew something else … that our Values, the historic strength of our company, were alive and well. Quality, Integrity,\n\nPerformance, Leadership,Innovation,Independence and The Individual continue to guide our every move, and continue to set us\n\napart from other companies—especially those caught in the accounting scandals that marred the business world this past year.\n\nT O O U R S H A R E H O L D E R S :\n\nC H A I R M A N A N D C H I E F E X E C U T I V E O F F I C E R\n\n1\n\nJ A M E S R . H O U G H T O N", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "W E N D E L L P . W E E K S J A M E S B . F L A W S\n\nV I C E C H A I R M A N\n\nA N D C H I E F F I N A N C I A L O F F I C E R\n\nP R E S I D E N T\n\nA N D C H I E F O P E R A T I N G O F F I C E R\n\n8\n\nWe take great pride in saying that Corning continues to be\n\na financially sound company, thanks to the aggressive\n\nstrategies we executed throughout 2002. Although it has\n\nbeen a very painful process, we have dramatically slowed\n\nthe rate at which we are spending cash. We ended the year\n\nwith a balance of cash and short-term investments of\n\n$2.1 billion. And we have access to $2 billion in credit\n\nthat we haven’t touched — and don’t plan to. We also\n\ncontinue to pay down debt each quarter. This, combined\n\nwith our plan to return to profitability in 2003, gives us\n\na high degree of confidence in our ability to meet any\n\nfuture financial obligations. So, we feel very good about our\n\nliquidity position right now.\n\nThe ongoing economic weakness and uncertainty in world\n\nevents continue to make the overall business environment\n\na volatile one. Still, we have greatly improved our ability\n\nto forecast revenues and expenses quarter-to-quarter, and\n\nwe are encouraged by the near-term growth potential of\n\nour non-telecommunications businesses — especially our\n\nliquid-crystal display, environmental and semiconductor\n\nbusinesses. If these markets continue to grow as we expect,\n\nwe are confident that we will be able to meet our goals.\n\nWe know that our shareholders are most eager to see a\n\ngreater return on their investment with Corning, and of\n\ncourse our return to profitability will be key to building back\n\nWall Street’s confidence. We are 100 percent committed\n\nto reaching that goal of profitability in 2003— and doing\n\nso within the rigorous compliance rules by which we\n\nhave always been guided. Integrity characterizes all our\n\nrelationships, both inside and outside of Corning, and we\n\nwill never compromise that foundation of our reputation.\n\nIn our business operations during 2002 we invested\n\na great deal of energy aligning our cost structure and\n\nbusiness plans with our priority of restoring profitability.\n\nAfter massive restructuring — following restructuring\n\nefforts we launched in 2001—we feel we now have our\n\ncost structure and growth strategies in place to accomplish\n\nthis goal.\n\nWe have re-balanced the company to take advantage of\n\nour broad and diverse set of businesses. And in charting\n\nour strategies, we have focused on ensuring that both our\n\nsegments have solid business plans in place, enabling\n\nthem to grow. Our people are rigorously committed to\n\nexecuting against these plans.\n\nAs you saw earlier in this report, our Corning\n\nTechnologies businesses are in markets with solid growth\n\npotential. We have leading market positions in attractive\n\nbusinesses �� we are ready to capitalize on that position of\n\nstrength. Meanwhile, we are making these businesses\n\neven more cost-effective through significant manufactur-\n\ning efficiency gains.\n\nIn telecommunications, we are not planning on a market\n\nrecovery in 2003. We have aligned our cost structure to\n\nmeet current demand levels after two very tough years\n\nof ongoing restructuring.\n\nWithin the context of our financial realities, however, we\n\nhave not lost our sense of self. We will meet our\n\ngoals…but the path we are taking to get there has been,\n\nand will continue to be, consistent with our Values.\n\nIntegrity … quality … treating individuals with dignity\n\nand respect … these are the guiding principles of the\n\ndecisions we make. We know that in adhering to our\n\nValues, solid business performance will follow.", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "Annual Report 2004 40\n\ndetails of which are described in Note 18 to the financial statements.\n\nShares granted to the Specified Executives during the year are as follows, and were valued at $6.95 each, being their market value (as\n\ndefined in the Income Tax Assessment Act).\n\n**Granted to: Shares:**\n\nGouadain, Jacques Elie 6,216\n\nMoore, Paul Derek 5,827\n\nWasow, Peter Christopher 7,770\n\nWilkinson, Richard John 5,827\n\nWood, Bruce James 5,439\n\nYoung, Jonathon Terence 8,547\n\n(b) Includes the notional value of shares and options granted by the Company during previous financial years (and which had not vested as at\n\n1 January 2004) which have been amortized over the relevant vesting period. All options have been valued by independent valuers using\n\nthe modified Black-Scholes or Binomial option pricing model.\n\n(c) No options were granted by the Company during the year to the Directors or to the Specified Executives.\n\n(d) No options or shares have been granted by the Company since the end of the financial year.\n\n(6) This amount reflects the value during the current reporting period of the 1,000,000 Restricted Shares granted to Mr J C Ellice-Flint in 2000,\n\nfurther details of which are described in note 18(h) to the financial statements.", - "page_start": 41, - "page_end": 41, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**MANAGEMENT’S DISCUSSION AND ANALYSIS** Annually, Internal Audit facilitates and monitors Management’s\n\ncompletion of the financial fraud risk assessment to identify areas of\n\npotential fraud in our financial statements and to make sure we have\n\ndocumented and verified controls to mitigate that risk.\n\nOur Enterprise Risk Management methodology and policies rely on the\n\nexpertise of our management and employees to identify risks and\n\nopportunities, and implement risk mitigation strategies as required.\n\n####### **Corporate Social Responsibility**\n\nBeing a responsible corporate citizen and sustainable business are part of good governance. We believe corporate social responsibility is increasingly\n\nimportant to our growth, competitive advantage and engagement with key stakeholders, and we strive to be a sustainable business and contribute\n\nto a better world.\n\nWe focus on five general areas:\n\nProduct stewardship - looking at health, safety, the environment and other issues across the product life cycle - from design, manufacturing and transport\n\nto packaging, usage and end-of-life\n\n- focusing on ensuring our products and services meet the expectations of our customer and communities, and our own criteria for\n\nquality, social responsibility and environmental respect\n\nEmployee engagement - working hard to create a culture of employee engagement and encourage and respect diversity\n\n- establishing Rogers as a place where employees feel proud, look forward to making a contribution and have chance to do their best\n\nwork every day\n\n- providing leading workplace initiatives, from far-reaching benefits to customized training, development and personal assistance\n\nprograms\n\nCommunity investment - promoting the principles of corporate citizenship and benchmarks for community investment established by Imagine Canada by\n\ncommitting at least 1% of our net earnings before tax annually to charities and other non-profit organizations\n\n- investing in many worthy causes to help create vibrant, healthy, talent-rich communities. Our flagship program, Rogers Youth Fund,\n\nsupports educational opportunities for at-risk Canadian youth\n\nEnvironmental responsibility - proactively managing the environmental aspects of our business\n\n- measuring our carbon footprint every year and implementing a wide range of initiatives to increase our energy efficiency, reduce\n\npaper use and divert materials from our operations from landfills\n\n- focusing on building environmental awareness and engagement among our employees, customers and communities\n\nEthical supply chain - reinforcing the importance of an ethical supply chain because it is critical to our reputation and success. Rogers is a large purchaser,\n\nwith over 37,000 suppliers across Canada and internationally\n\n- paying special attention to sound sourcing, production and delivery of supplier products and services by setting strong expectations\n\nof corporate social responsibility throughout our supply chain, including compliance with the Rogers Supplier Code of Conduct\n\nSee our annual Corporate Social Responsibility report (available on our website rogers.com/csr) for more about our social, environmental and\n\ncommunity contributions and performance.\n\nYOUTH\n\nEDUCATION\n\nEMPLOYEE\n\nEXPERIENCE\n\nARTS &\n\nCULTURE\n\nETHICAL\n\nSUPPLY CHAIN\n\nECONOMIC\n\nCONTRIBUTIONS\n\nENVIRONMENTAL\n\nRESPONSIBILITY\n\nCOMMUNITY\n\nINVESTMENT\n\nLOCAL SHELTERS\n\n& FOOD BANKS\n\nGOOD\n\nGOVERNANCE\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 73", - "page_start": 76, - "page_end": 76, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_GLW_2002.pdf", - "query": "As a Corning's investor, how can I get a summary of the annual meeting of shareholders ?", - "target_page": 11, - "target_passage": "A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "One Riverfront Plaza\n\nCorning, NY 14831-0001\n\n607 974 9000\n\nwww.corning.com\n\n02BR24601EN\n\nA N N U A L M E E T I N G\n\nThe annual meeting of shareholders will be held on\n\nThursday, April 24, 2003, in Corning, NY. A formal notice\n\nof the meeting together with a proxy statement will be mailed\n\nto shareholders on or about March 12, 2003. The proxy state-\n\nment can also be accessed electronically through the Investor\n\nRelations category of the Corning home page on the Internet\n\nat www.corning.com. A summary report of the proceedings\n\nat the annual meeting will be available without charge upon\n\nwritten request to Ms. Denise A. Hauselt, Secretary and\n\nAssistant General Counsel, Corning Incorporated, HQ-E2-10,\n\nCorning, NY 14831.\n\nA D D I T I O N A L I N F O R M AT I O N\n\nA copy of Corning’s 2002 Annual Report on Form 10-K filed\n\nwith the Securities and Exchange Commission is available\n\nupon written request to Ms. Denise A. Hauselt, Secretary and\n\nAssistant General Counsel, Corning Incorporated, HQ-E2-10,\n\nCorning, NY 14831. The Annual Report on Form 10-K can\n\nalso be accessed electronically through the Investor Relations\n\ncategory of the home page on the Internet at:\n\nwww.corning.com\n\nI N V E S T O R I N F O R M AT I O N\n\nInvestment analysts who need additional information may\n\ncontact Mr. Kenneth C. Sofio, Manager of Investor Relations,\n\nCorning Incorporated, HQ-E2-25, Corning, NY 14831;\n\nTelephone 607.974.9000\n\nC O M M O N S T O C K\n\nCorning Incorporated common stock is listed on the\n\nNew York Stock Exchange and the SWX Swiss Exchange.\n\nIn addition, it is traded on the Boston, Midwest, Pacific\n\nand Philadelphia stock exchanges. Common stock options\n\nare traded on the Chicago Board Options Exchange. The\n\nabbreviated ticker symbol for Corning Incorporated is “GLW.”\n\nT RANSFER A GENT AND R EGISTRAR\n\nComputershare Investor Services LLC\n\nP.O. Box A-3504\n\nChicago, IL 60690-3504\n\nTelephone: 800.255.0461\n\nWebsite: www.computershare.com\n\nC HANGE OF A DDRESS\n\nReport change of address to Computershare\n\nInvestor Services at the above address.\n\nI N D E P E N D E N T A C C O U N TA N T S\n\nPricewaterhouseCoopers LLP\n\n1301 Avenue of the Americas\n\nNew York, NY 10019\n\n“ Sa fe Ha rbor” St a t e m e nt unde r t he Pri vate\n\nSe c uri t i e s Li t i ga t i on R e form Ac t of 1995\n\nThe statements in this annual report that are not historical\n\nfacts or information are forward-looking statements. These\n\nforward-looking statements involve risks and uncertainties\n\nthat may cause the outcome to be materially different. Such\n\nrisks and uncertainties include, but are not limited to:\n\n— global economic and political conditions,\n\n— currency fluctuations,\n\n— product demand and industry capacity,\n\n— competitive products and pricing,\n\n— sufficiency of manufacturing capacity and efficiencies,\n\n— cost reductions,\n\n— availability and costs of critical materials,\n\n— new product development and commercialization,\n\n— attracting and retaining key personnel,\n\n— order activity and demand from major customers,\n\n— fluctuations in capital spending by customers\n\nin the telecommunications industry and other\n\nbusiness segments,\n\n— financial condition of customers,\n\n— changes in the mix of sales between premium\n\nand non-premium products,\n\n— facility expansions and new plant start-up costs,\n\n— adverse litigation or regulatory developments, including\n\nfuture or pending tax legislation,\n\n— adequacy and availability of insurance,\n\n— capital resource and cash flow activities,\n\n— capital spending,\n\n— equity company activities,\n\n— interest costs,\n\n— acquisition and divestiture activity,\n\n— the rate of technology change,\n\n— the ability to enforce patents,\n\n— product performance issues,\n\n— stock price fluctuations, and\n\n— other risks detailed in Corning’s SEC filings.\n\nNeither this report nor any statement contained herein is\n\nfurnished in connection with any offering of securities or for\n\nthe purpose of promoting or influencing the sale of securities.", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "Neither this report nor any statement contained herein is\n\nfurnished in connection with any offering of securities or for\n\nthe purpose of promoting or influencing the sale of securities.\n\nCorning is an equal opportunity employer.\n\nPrinted in USA\n\n© Corning Incorporated 2003\n\nI N V E S T O R I N F O R M A T I O N :\n\n**Corning Incorporated**", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "following significant announcements by the\n\nCompany, including the release of the quarterly\n\nreport, half-yearly results, the preliminary annual\n\nresults and the lodgement of the Company’s\n\nAnnual Report (subject to the prohibition of\n\ndealing in the Company’s securities if they\n\npossess unpublished price sensitive information).\n\nDirectors and senior management must also\n\nreceive approval from the Chairman before\n\nbuying or selling Company securities.\n\nThe Company’s Share Trading Policy is available\n\nin the ‘Corporate Governance’ section of the\n\nCompany’s website.\n\nCommunication with Shareholders and Continuous Disclosure\n\nThe Company is committed to providing relevant\n\nand timely information to its shareholders in\n\naccordance with its continuous disclosure\n\nobligations under the ASX Listing Rules and the\n\n*Corporations Act 2001* (Cth).\n\nInformation is communicated to shareholders\n\nthrough the distribution of the Company’s\n\nAnnual Report and other communications. All\n\nreleases are posted on the Company’s website\n\nand released to the ASX in a timely manner.\n\nThe Company has practices in place throughout\n\nthe year governing who may authorise and make\n\ndisclosures and the method by which the market\n\nis to be informed of any price sensitive\n\ninformation.\n\nThe Company Secretary is responsible for\n\ncommunications with the ASX and ensuring that\n\nthe Company meets its continuous disclosure\n\nobligations.\n\nThe Company’s Continuous Disclosure is avail-\n\nable in the ‘Corporate Governance’ section of\n\nthe Company’s website.\n\nAnnual General Meeting\n\nAll shareholders are encouraged to attend and\n\nparticipate in the Company’s Annual General\n\nMeeting. Shareholders may attend in person or\n\nsend a proxy as their representative.\n\nThe Company’s external auditor is routinely\n\ninvited to and attends the Annual General\n\nMeeting in order to respond to questions raised\n\nby shareholders relating to the content and\n\nconduct of the audit and accounting policies\n\nadopted by the Company in relation to the\n\npreparation of the financial statements.\n\nCorporate Governance Disclosure\n\nThe Company’s governance policies and proce-\n\ndures comply in all substantial respects with the\n\nAustralian Securities Exchange Corporate\n\nGovernance Principles and Recommendations\n\nwith 2010 Amendments. The following table\n\ncompares the ASX Recommendations and the\n\nCompany’s corporate governance policies and\n\npractices.\n\ncontinued", - "page_start": 38, - "page_end": 38, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "The Audit and Risk Management Committee’s charter and information on the selection and appointment of the Company’s\n\nexternal auditor is available in the corporate governance section on the Company’s website. Information regarding qualifications\n\nand meeting attendance can be found in the Directors’ Report of this Annual Report.\n\n**Principle 5: Make Timely and Balanced Disclosure**\n\nThe Company has adopted a Market Disclosure Policy to ensure compliance with its continuous disclosure obligations whereby\n\nrelevant information that could cause a reasonable person to expect a material effect on, or lead to a substantial movement in,\n\nthe value of Sundance’s share price, is immediately made available to shareholders and the public as a release to the ASX. D\n\nConnor, as Company Secretary, has been nominated as the person primarily responsible for communications with the ASX. All\n\nmaterial information concerning the Company, including its financial situation, performance, ownership and governance is\n\nposted on the Company’s web site to ensure all investors have equal and timely access. The Market Disclosure Policy is available\n\nin the corporate governance section on Sundance’s website.\n\n**Principle 6: Respect the Rights of Shareholders**\n\nThe Board fully recognises its responsibility to ensure that its shareholders are informed of all major developments affecting the\n\nCompany. All shareholders, who have elected to do so, receive a copy of the Company’s Annual Report and the Annual, Half\n\nYearly and Quarterly Reports are prepared and posted on the Company’s website in accordance with the ASX Listing Rules.\n\nRegular updates on operations are made via ASX releases. All information disclosed to the ASX is posted on Sundance’s website\n\nas soon as possible after it is disclosed to the ASX. When analysts are briefed on aspects of the Company’s operation, the material\n\nused in the presentation is immediately released to the ASX and posted on the Company’s website. Sundance encourages its\n\nshareholders to attend its annual meetings and to discuss and question its Board and management. The Company’s external\n\nauditor is requested to attend the annual general meeting and be available to answer shareholder questions about the conduct\n\nof the audit and the preparation and content of the audit report. The Shareholder Communications Policy is published on the\n\nCompany’s website under the corporate governance section.\n\n**Principle 7: Recognise and Manage Risk**\n\n**7.1 Risk Assessment and Management**\n\nSundance has established a Risk Management Policy whereby the primary purpose of the policy is to ensure that:\n\n- Appropriate systems are in place to identify, to the extent that is reasonably practical, all material risks that the\n\nCompany faces in conducting its business;\n\n- The financial impact of those risks is understood and appropriate controls are in place to limit exposures to them;\n\n- Appropriate responsibilities are delegated to control the risks; and\n\n- Any material changes to the Company’s risk profile are disclosed in accordance with the Company’s continuous Market\n\nDisclosure Policy.\n\nThe Audit and Risk Management Committee is responsible for approving and monitoring the overall financial and operational\n\nbusiness risk profile of the Company, and reporting its findings to the full Board. In addition, by the nature of the upstream oil\n\nand gas business this topic is intrinsically covered during each Board meeting. The Board requires the executives to design and\n\nimplement the risk management and internal control system to manage the Company, and to report to the Board.\n\nThe Board has received assurance from the Managing Director and Chief Financial Officer that the declaration provided in\n\naccordance with section 295A of the *Corporations Act 2001* is founded on a sound system of risk management and internal\n\ncontrol which is operating effectively.", - "page_start": 53, - "page_end": 53, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "#### B A L A N C E Corning Annual Report 20 02", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "####### **REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n####### **NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n####### **(All tables in millions, except per share data) Ì (Continued)**\n\n## **7. STOCKHOLDERS' EQUITY**\n\nDuring 2000 through 2004, the Board of Directors authorized the repurchase of up to $1,025.0 million of\n\nthe Company's Common Stock. As of December 31, 2004, the Company had paid $750.4 million to\n\nrepurchase 35.2 million shares of its common stock, of which 9.6 million shares were acquired during the year\n\nended December 31, 2004 for $266.1 million.\n\nIn July 2003, the Company announced that its board of directors initiated a quarterly cash dividend of\n\n$.06 per share, which was increased to $.12 per share in the third quarter of 2004. Dividends declared were\n\n$54.6 million and $19.0 million during 2004 and 2003, respectively. As of December 31, 2004, the Company\n\nrecorded a dividend payable of approximately $18.1 million to shareholders of record at the close of business\n\non January 3, 2005.\n\n## **8. EMPLOYEE BENEFIT PLANS**\n\nIn July 1998, the Company adopted the 1998 Stock Incentive Plan (\"\"Stock Incentive Plan'') to provide\n\nfor grants of options to purchase shares of common stock, restricted stock and other equity-based compensa-\n\ntion (\"\"Equity-Based Compensation Units'') to employees and non-employee directors of the Company who\n\nare eligible to participate in the Stock Incentive Plan. The Company accounts for stock-based compensation in\n\naccordance with Accounting Principles Board Opinion No. 25, \"\"Accounting for Stock Issued to Employees''\n\n(\"\"APB 25''), and related interpretations. Stock options are granted at prices equal to the fair market value of\n\nthe Company's common stock on the date of grant; therefore, no compensation expense is recognized.\n\nCompensation expense resulting from grants of restricted stock or stock units is recognized during the vesting\n\nperiod.\n\nOptions granted under the Stock Incentive Plan are non-qualiÑed and are granted at a price equal to the\n\nfair market value of the Company's common stock at the date of grant. Generally, options granted have a term\n\nof ten years from the date of grant, and vest in increments of 25% per year over a four year period beginning on\n\nthe Ñrst anniversary date of the grant. Options granted to non-employee directors have a term of ten years and\n\nvest immediately at the date of grant. In May 2002, the Company's stockholders approved and adopted an\n\namendment and restatement of the Stock Incentive Plan, which modiÑed a number of its provisions, including\n\nan increase in the number of shares of common stock reserved for issuance under the Stock Incentive Plan\n\nfrom 20.0 million to 27.0 million. As of December 31, 2004, there were 6.0 million stock options reserved for\n\nfuture grants under the Stock Incentive Plan.\n\nDuring the three months ended March 31, 2004, the Company awarded 20,000 deferred stock units to its\n\nnon-employee directors under its Stock Incentive Plan. An additional 5,000 deferred stock units were granted\n\nto a new director during the three months ended December 31, 2004. These stock units vest immediately but\n\nthe directors receive the underlying shares only after their board service ends. The stock units do not carry any\n\nvoting or dividend rights, except the right to receive additional stock units in lieu of dividends.\n\nAlso during the three months ended March 31, 2004, the Company awarded 79,500 shares of restricted\n\nstock to its executive oÇcers. 7,500 of these restricted shares vest eÅective January 1, 2005. The remaining\n\n72,000 shares vest in four equal annual installments beginning one year from the date of grant except that\n\nvesting may be accelerated based upon the achievement of certain performance targets. During the vesting\n\nperiod, the participants have voting rights and receive dividends, but the shares may not be sold, assigned,", - "page_start": 85, - "page_end": 85, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Annual Report 2004 30\n\nof, non-executive, independent\n\nDirectors, except for the\n\nEnvironmental and Safety\n\nCommittee, which includes\n\nthe CEO as a member.\n\nThe Board Guidelines prescribe\n\nthat the Board is to meet at\n\nleast eight times a year,\n\nincluding a strategy meeting of\n\ntwo days duration. The number\n\nof meetings of the Board and of\n\neach of its Committees and the\n\nnames of attendees at those\n\nmeetings are set out on page 47\n\nof this Annual Report. Board\n\nMeetings are structured in two\n\nseparate sessions, without\n\nmanagement present for one of\n\nthose sessions. The agenda for\n\nmeetings is prepared by the\n\nCompany Secretary in\n\nconjunction with the Chairman\n\nand CEO, with periodic input\n\nfrom the Board. Comprehensive\n\nBoard papers are distributed to\n\nDirectors in advance of\n\nscheduled meetings. Board\n\nmeetings take place both at the\n\nCompany’s head office and at key\n\noperating sites, to assist the\n\nBoard in its understanding of\n\noperational issues.\n\nExecutive management attend\n\nBoard and Committee meetings,\n\nat which they report to Directors\n\nwithin their respective areas of\n\nresponsibility. This assists the\n\nBoard in maintaining its\n\nunderstanding of the Company’s\n\nbusiness and assessing the\n\nexecutive management team.\n\nWhere appropriate, advisors to\n\nthe Company attend meetings of\n\nthe Board and of its Committees.\n\n**2.3 Composition of the Board**\n\nThe composition of the Board is\n\ndetermined in accordance with\n\nthe Company’s Constitution and\n\nthe Board Guidelines which,\n\namong other things, require that:\n\n- the Board is to comprise\n\na minimum of five and a\n\nmaximum of ten Directors\n\n(exclusive of the CEO);\n\n- the Board should comprise a\n\nsubstantial majority of\n\nindependent, non-executive\n\nDirectors;\n\n- there should be a separation\n\nof the roles of Chairman and\n\nChief Executive Officer of the\n\nCompany; and\n\n- the Chairman of the Board\n\nshould be an independent,\n\nnon-executive Director.\n\nUnder the Company’s\n\nConstitution approximately one-\n\nthird of Directors retire by\n\nrotation each year and Directors\n\nappointed during the year are\n\nrequired to submit themselves\n\nfor election by shareholders at\n\nthe Company’s next Annual\n\nGeneral Meeting. The Board\n\nGuidelines encourage Directors to\n\nretire at the first Annual General\n\nMeeting after reaching the age\n\nof 72 years and not seek re-\n\nappointment.\n\nCurrently, the Board comprises\n\neight non-executive Directors\n\nand one executive Director. The\n\nBoard has adopted the definition\n\nset out in the ASX Best Practice\n\nRecommendations and as defined\n\nin the 2002 guidelines of the\n\nInvestment and Financial\n\nServices Association Limited and\n\nconsiders all current non-\n\nexecutive Directors, including the\n\nChairman, to be independent\n\ndirectors.\n\nGenerally, the Board considers a\n\nDirector to be independent if he\n\nor she is not a member of\n\nmanagement and is free of any\n\nbusiness or other relationship\n\nthat could materially interfere\n\nwith, or could reasonably be\n\nperceived to materially interfere\n\nwith, the Director’s ability to\n\nact in the best interests of the\n\nCompany. The Board will assess\n\nthe materiality of any given\n\nrelationship that may affect\n\nindependence on a case by case\n\nbasis and has adopted\n\nmateriality guidelines to assist in\n\nthat assessment. Under these\n\nguidelines, the following\n\ninterests are regarded as material\n\nin the absence of any mitigating\n\nfactors:\n\n- a holding of 5% or more of\n\nthe Company’s voting shares or\n\na direct association with an\n\nentity that holds more than\n\n5% of the Company’s voting\n\nshares;\n\n- an affiliation with an entity\n\nwhich accounts for 5% or more\n\nor the revenue or expense of\n\nthe Company.\n\nThe Board has determined that\n\nthere should not be any arbitrary\n\nlength of tenure that should be\n\nconsidered to materially interfere\n\nwith a Director’s ability to act in\n\nthe best interests of the\n\nCompany, as it believes this\n\nassessment must be made on a\n\ncase by case basis with reference\n\nto the length of service of all\n\nmembers of the Board.", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "### NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS\n\n### FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n\n## **22. SUBSEQUENT EVENTS**\n\nOn 25 August 2000 the Company announced that it had reached two agreements for the\n\nplacement of a total of 16,666,666 ordinary fully paid shares in the Company at an issue price of\n\n30 cents each (Shares).\n\nThe first agreement was with Mr Mark Bradley, who agreed to take a placement of 3,225,000 Shares\n\nby 29 September 2000, followed by, if approved of by shareholders at the Company’s annual general\n\nmeeting, a further 3,441,666 within 7 days of that meeting.\n\nOn Mr Bradley being appointed a Director of the Company, in order to comply with the\n\nrequirements of the Corporations Law and the ASX Listing Rules, the Company and Mr Bradley\n\nagreed to defer the first issue of Shares, making both issues conditional on shareholder approval.\n\nThe second agreement was with Clough Engineering Limited, pursuant to which it agreed to take a\n\nplacement of 3,225,000 Shares by 29 September 2000, followed by, if approved of by shareholders\n\nat the Company’s annual general meeting, 6,775,000 shares, within 7 days of that meeting.\n\nOn 15 June 2000 the Company announced that with effect from 1 July 2000 it acquired a 50%\n\ninterest in OIS MOC Joint Venture Pty Ltd, to be paid for by the issue of 800,000 Shares in the\n\nCompany. OIS MOC Joint Venture Pty Ltd owns the goodwill of a successful labour hire company.\n\nThat company is to be renamed Mermaid Labour and Management Limited (MLML).\n\nMLML offers a full labour hire service inclusive of industrial relations consultancy, negotiating\n\nagreements and awards and were appropriate, provides ongoing management of the labour force.\n\nThe financial effect of the above events have not been reflected in these financial statements.\n\n## **23. EARNINGS PER SHARE**\n\n## **2000 1999**\n\n##### **Cents per Cents per**\n\n##### **Share Share**\n\nBasic earnings per share (0.62) 8.09\n\nDiluted earnings per share (0.21) 8.05\n\n## **2000 1999**\n\n##### **No. No.**\n\nWeighted average number of ordinary\n\nshares on issue used in the calculation\n\nof basic earnings per share 43,000,000 30,356,164\n\n53", - "page_start": 56, - "page_end": 56, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "50\n\nIn May 1997, the Company registered 400,000 shares of its common\n\nstock under its 1997 Equity Plan for Non-Employee Directors. This\n\nplan permits the Company to issue to its non-employee directors\n\noptions to purchase shares of Company common stock, restricted\n\nstock of the Company, and awards of Company stock. The plan also\n\npermits non-employee directors to elect to receive all or a portion of\n\ntheir annual retainers and other compensation in the form of shares of\n\nCompany common stock. During 2003, 2002, and 2001, 10,922;\n\n11,958; and 8,662 shares of Company common stock were issued\n\nunder the plan, respectively.\n\nCash dividends declared and paid per share for each year are:\n\n*(In dollars)* **2003** 2002 2001\n\nCommon shares **$ .52** $ .50 $ .48\n\nDuring 2002, shareholders approved the 2002 Members’ Stock\n\nPurchase Plan. Under the new plan, 800,000 shares of common stock\n\nwere registered for issuance to participating members. Beginning on\n\nJune 30, 2002, rights to purchase stock are granted on a quarterly\n\nbasis to all members who have one year of employment eligibility and\n\nwork a minimum of 20 hours a week. The price of the stock purchased\n\nunder the plan is 85% of the closing price on the applicable purchase\n\ndate. No member may purchase stock under the plan in an amount\n\nwhich exceeds the lesser of 20% of his/her gross earnings or a maxi-\n\nmum fair value of $25,000 in any calendar year. During 2003, 79,237\n\nshares of common stock were issued under the plan at an average\n\nprice of $29.25. During 2002, 47,419 shares of common stock were\n\nissued under the plan at an average price of $22.58. An additional\n\n673,344 shares were available for issuance under the plan at\n\nJanuary 3, 2004. This plan replaced the 1994 Members’ Stock Purchase\n\nPlan. Under this plan, during 2002 and 2001, 43,388 shares at an aver-\n\nage price of $23.63 and 85,385 shares at an average price of $20.51\n\nwere issued, respectively.\n\nThe Company has a shareholders’ rights plan which will\n\nexpire August 20, 2008. The plan becomes operative if certain events\n\noccur involving the acquisition of 20% or more of the Company’s common\n\nstock by any person or group in a transaction not approved by the\n\nCompany’s Board of Directors. Upon the occurrence of such an event,\n\neach right entitles its holder to purchase an amount of common stock of\n\nthe Company with a market value of $400 for $200, unless the Board\n\nauthorizes the rights be redeemed. The rights may be redeemed for $0.01\n\nper right at any time before the rights become exercisable. In certain\n\ninstances, the right to purchase applies to the capital stock of the acquirer\n\ninstead of the common stock of the Company. The Company has reserved\n\npreferred shares necessary for issuance should the rights be exercised.\n\nThe Company has entered into change in control employ-\n\nment agreements with corporate officers and certain other key\n\nemployees. According to the agreements, a change in control occurs\n\nwhen a third person or entity becomes the beneficial owner of 20% or\n\nmore of the Company’s common stock or when more than one-third of\n\nthe Company’s Board of Directors is composed of persons not recom-\n\nmended by at least three-fourths of the incumbent Board of Directors.\n\nUpon a change in control, a key employee is deemed to have a two-year\n\nemployment with the Company, and all his or her benefits are vested\n\nunder Company plans. If, at any time within two years of the change in\n\ncontrol, his or her position, salary, bonus, place of work, or Company-\n\nprovided benefits are modified, or employment is terminated by the\n\nCompany for any reason other than cause or by the key employee for good\n\nreason, as such terms are defined in the agreement, then the key employee\n\nis entitled to receive a severance payment equal to two times annual salary\n\nand the average of the prior two years’ bonuses.\n\n####### **Stock-Based Compensation**\n\nUnder the Company’s 1995 Stock-Based Compensation Plan, as amended", - "page_start": 49, - "page_end": 49, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Annual Report 2004 65\n\n**18. Contributed Equity (continued)**\n\n**(d) Santos Executive Share Option Plan**\n\nThe Santos Executive Share Option Plan was approved by shareholders at the Annual General Meeting on 15 May 1997 and its continuation, with\n\namendment, approved at the Annual General Meeting on 5 May 2000.\n\nThe Plan provides for the grant of options to subscribe for or purchase ordinary shares in the capital of the Company to eligible executives\n\nselected by the Board. Participation will be limited to those executives who, in the opinion of the Board, are able to significantly influence the\n\ngeneration of shareholder wealth. Directors envisage the Plan applying to up to 50 executives.\n\nEach option is a right to acquire one share, subject to adjustment in accordance with the Rules of the Plan. The options entitle the holder to\n\nparticipate in any bonus issue conducted by the Company, upon exercise of the options. The exercise price of each option will be adjusted in the\n\nevent of a rights issue.\n\nThere are no voting or dividend rights attached to the options. There are no voting rights attached to the unissued ordinary shares. Voting rights\n\nwill be attached to the unissued ordinary shares when the options have been exercised.\n\nThe exercise price of the options and other conditions, including any performance hurdles, will be determined by the Board. No consideration is\n\nprovided by Executives for the options. The Plan provides for options with a life of up to ten years.\n\nThe ability to exercise the options is generally conditional on the Company achieving a prescribed performance hurdle or exercise condition. To\n\nreach the performance hurdle, the Company’s Total Shareholder Return (broadly, growth in share price plus dividends reinvested) (“TSR Growth”)\n\nover a minimum three-year period must equal or exceed 10% per annum calculated on a compound basis. If Total Shareholder Return does not\n\nreach the performance hurdle at the end of those respective periods, the options may nevertheless be exercisable if the hurdle is subsequently\n\nreached within the remaining life of the options. In assessing the performance against the hurdle, the Board may apply on a consistent basis an\n\naveraging method over a period of three months to allow for short-term volatility.\n\nThe fair value of shares issued as a result of exercising the options during the reporting period at their issue date is the market price of shares of\n\nthe Company on the Australian Stock Exchange as at close of trading.\n\nDuring the financial year, the Company granted 330,148 options over unissued shares as set out below. The ability to exercise 200,000 of these\n\noptions is generally conditional on the Company achieving the performance hurdle described above and the balance are subject to the forfeiture\n\nprovision described in the Senior Executive Long Term Incentive section of the Santos Executive Share Purchase Plan described above.\n\nThe amounts recognised in the financial statements of the Santos Group and the Company in relation to executive share options exercised during\n\nthe financial year were:\n\n**Consolidated Santos Ltd**\n\n**2004** 2003 **2004** 2003\n\n**$million** $million **$million** $million\n\nIssued ordinary share capital **4.1** 5.7 **4.1** 5.7", - "page_start": 66, - "page_end": 66, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_GLW_2002.pdf", - "query": "How many employees did Corning company count at the end of 2002 ?", - "target_page": 5, - "target_passage": "We are continuing to invest in our people — all 23,200 of them", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "One Riverfront Plaza\n\nCorning, NY 14831-0001\n\n607 974 9000\n\nwww.corning.com\n\n02BR24601EN\n\nA N N U A L M E E T I N G\n\nThe annual meeting of shareholders will be held on\n\nThursday, April 24, 2003, in Corning, NY. A formal notice\n\nof the meeting together with a proxy statement will be mailed\n\nto shareholders on or about March 12, 2003. The proxy state-\n\nment can also be accessed electronically through the Investor\n\nRelations category of the Corning home page on the Internet\n\nat www.corning.com. A summary report of the proceedings\n\nat the annual meeting will be available without charge upon\n\nwritten request to Ms. Denise A. Hauselt, Secretary and\n\nAssistant General Counsel, Corning Incorporated, HQ-E2-10,\n\nCorning, NY 14831.\n\nA D D I T I O N A L I N F O R M AT I O N\n\nA copy of Corning’s 2002 Annual Report on Form 10-K filed\n\nwith the Securities and Exchange Commission is available\n\nupon written request to Ms. Denise A. Hauselt, Secretary and\n\nAssistant General Counsel, Corning Incorporated, HQ-E2-10,\n\nCorning, NY 14831. The Annual Report on Form 10-K can\n\nalso be accessed electronically through the Investor Relations\n\ncategory of the home page on the Internet at:\n\nwww.corning.com\n\nI N V E S T O R I N F O R M AT I O N\n\nInvestment analysts who need additional information may\n\ncontact Mr. Kenneth C. Sofio, Manager of Investor Relations,\n\nCorning Incorporated, HQ-E2-25, Corning, NY 14831;\n\nTelephone 607.974.9000\n\nC O M M O N S T O C K\n\nCorning Incorporated common stock is listed on the\n\nNew York Stock Exchange and the SWX Swiss Exchange.\n\nIn addition, it is traded on the Boston, Midwest, Pacific\n\nand Philadelphia stock exchanges. Common stock options\n\nare traded on the Chicago Board Options Exchange. The\n\nabbreviated ticker symbol for Corning Incorporated is “GLW.”\n\nT RANSFER A GENT AND R EGISTRAR\n\nComputershare Investor Services LLC\n\nP.O. Box A-3504\n\nChicago, IL 60690-3504\n\nTelephone: 800.255.0461\n\nWebsite: www.computershare.com\n\nC HANGE OF A DDRESS\n\nReport change of address to Computershare\n\nInvestor Services at the above address.\n\nI N D E P E N D E N T A C C O U N TA N T S\n\nPricewaterhouseCoopers LLP\n\n1301 Avenue of the Americas\n\nNew York, NY 10019\n\n“ Sa fe Ha rbor” St a t e m e nt unde r t he Pri vate\n\nSe c uri t i e s Li t i ga t i on R e form Ac t of 1995\n\nThe statements in this annual report that are not historical\n\nfacts or information are forward-looking statements. These\n\nforward-looking statements involve risks and uncertainties\n\nthat may cause the outcome to be materially different. Such\n\nrisks and uncertainties include, but are not limited to:\n\n— global economic and political conditions,\n\n— currency fluctuations,\n\n— product demand and industry capacity,\n\n— competitive products and pricing,\n\n— sufficiency of manufacturing capacity and efficiencies,\n\n— cost reductions,\n\n— availability and costs of critical materials,\n\n— new product development and commercialization,\n\n— attracting and retaining key personnel,\n\n— order activity and demand from major customers,\n\n— fluctuations in capital spending by customers\n\nin the telecommunications industry and other\n\nbusiness segments,\n\n— financial condition of customers,\n\n— changes in the mix of sales between premium\n\nand non-premium products,\n\n— facility expansions and new plant start-up costs,\n\n— adverse litigation or regulatory developments, including\n\nfuture or pending tax legislation,\n\n— adequacy and availability of insurance,\n\n— capital resource and cash flow activities,\n\n— capital spending,\n\n— equity company activities,\n\n— interest costs,\n\n— acquisition and divestiture activity,\n\n— the rate of technology change,\n\n— the ability to enforce patents,\n\n— product performance issues,\n\n— stock price fluctuations, and\n\n— other risks detailed in Corning’s SEC filings.\n\nNeither this report nor any statement contained herein is\n\nfurnished in connection with any offering of securities or for\n\nthe purpose of promoting or influencing the sale of securities.", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "Neither this report nor any statement contained herein is\n\nfurnished in connection with any offering of securities or for\n\nthe purpose of promoting or influencing the sale of securities.\n\nCorning is an equal opportunity employer.\n\nPrinted in USA\n\n© Corning Incorporated 2003\n\nI N V E S T O R I N F O R M A T I O N :\n\n**Corning Incorporated**", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "#### B A L A N C E Corning Annual Report 20 02", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "##### **Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the Virginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with Verizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated an analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, Rappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus the Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company was required to do a working capital true up following the closing, from which the Company recorded a charge for $23 thousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to reflect the consolidated effective tax rate based on the final operating results for the year.\n\nThe wireless industry in the late 1990’s became increasingly competitive and the Company was not immune to these industry issues. The Clear Pay SM program, introduced by Sprint as a no-deposit offering in 2001, attracted high credit risk customers in the Company’s markets. As the results began to materialize, the Company implemented deposits on this program (mid-April 2002), and experienced high levels of customer turnover (churn) and uncollectable accounts. The write-offs of uncollectable accounts peaked in the third quarter of 2002. During the fourth quarter of 2002 there was some evidence that the strengthened credit policy was having a favorable impact. Nonetheless, the 2002 net loss in the PCS operation was $5.4 million, as compared to $5.5 million in 2001. Despite the disappointing financial results for 2002, the PCS customer base grew by over 40%. While the PCS operation was adding customers, the cellular operation continued to lose its local customer base.\n\nThe growing belief that national branding was critical to our wireless operations, the expectation that roaming revenues from our analog cellular operation would not continue to grow, and the increase in the number of wireless competitors in our markets, prompted the Company to exit the cellular business in order to focus on our PCS operations. The Company entered into an agreement on November 21, 2002, to sell its 66% ownership interest in the Virginia 10 RSA cellular operation which was classified as a discontinued operation. The closing occurred February 28, 2003. The Company received $37.0 million in proceeds, including $5.0 million in escrow for two years and $1.7 million for working capital.\n\nIn many respects, 2003 was a successful year. Churn and levels of uncollectable accounts in the PCS operation returned to more acceptable levels. PCS revenues reached $67.0 million, and total revenues reached $105.9 million. The PCS operation recognized a small profit for the year, including favorable adjustments associated with settlement of disputed items with Sprint. Excluding the favorable adjustments, the PCS operation recognized a profit in the fourth quarter. With improved operating cash flow and reduced capital spending in 2003, the Company prepaid $4.6 million in debt, selecting those notes with nominal prepayment penalties. Additionally, after receiving the cash and paying taxes on the gain of the sale of the Virginia 10 partnership interest, the Company invested the remaining proceeds in liquid financial instruments, available for future deployment. Additionally, the Company has been successful at decreasing its dependency on wireline revenues. Wireline revenues, at $29.0 million in 2003 compared to $18.6 million in 1998, were 27.4% of total revenues in 2003 compared to 76.6% in 1998.", - "page_start": 41, - "page_end": 41, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "32\n\nThe following discussion of the Company’s historical results of opera-\n\ntions and of its liquidity and capital resources should be read in\n\nconjunction with the Consolidated Financial Statements of the\n\nCompany and related notes.\n\n####### **Overview**\n\nThe Company has two reportable core operating segments: office furni-\n\nture and hearth products. The Company is the second largest office\n\nfurniture manufacturer in the United States and the nation’s leading\n\nmanufacturer and marketer of gas- and wood-burning fireplaces.\n\nFrom 2000 to 2003, the office furniture industry experi-\n\nenced an unprecedented three-year decline due to the challenging\n\neconomic environment. In 2003, this decline negatively impacted the\n\nCompany’s office furniture segment. In contrast, the housing market\n\nwas at record high levels during 2003, which positively impacted the\n\nCompany’s hearth segment. The Company outperformed its peers in\n\nboth segments in which it competes. The Company gained market\n\nshare by providing strong brands, innovative products and services,\n\nand greater value to its end-users. Fiscal 2003 also included an extra\n\nweek of activity due to the Company’s 52/53-week fiscal year.\n\nNet sales were $1.8 billion in 2003, as compared to $1.7 bil-\n\nlion in 2002. The increase in net sales reflects the 9% increase in the\n\nhearth segment and the additional week of business activity. In 2003\n\nand 2002, the Company recorded restructuring charges and accelerated\n\ndepreciation related to the closure and consolidation of office furniture\n\nfacilities totaling $15.2 million and $3.0 million, respectively. Gross\n\nmargins increased to 36.4% in 2003 from 35.4% in 2002 due to benefits\n\nfrom restructuring initiatives and its rapid continuous improvement\n\nprogram, new products, and increased price realization. The Company\n\nalso invested aggressively in brand building and selling initiatives in\n\n2003. Net income was $98.1 million or $1.68 per diluted share in 2003,\n\nas compared to $91.4 million or $1.55 per diluted share in 2002.\n\nThe Company generated $141.3 million in cash flow from\n\noperating activities and increased its cash position, including short-\n\nterm investments, by $48.6 million to $204.2 million. The Company\n\npaid dividends of $30.3 million and repurchased $21.5 million of its\n\ncommon stock, while investing $35.7 million in net capital expendi-\n\ntures and repaying $20.2 million of debt.\n\n####### **Critical Accounting Policies and Estimates**\n\n* **GEN ERAL** *\n\nManagement’s Discussion and Analysis of Financial Condition and\n\nResults of Operations is based upon the Consolidated Financial\n\nStatements, which have been prepared in accordance with GAAP. The\n\npreparation of these financial statements requires management to\n\nmake estimates and assumptions that affect the reported amounts of\n\nassets, liabilities, revenue and expenses, and related disclosure of con-\n\ntingent assets and liabilities. Management bases its estimates on\n\nhistorical experience and on various other assumptions that are\n\nbelieved to be reasonable under the circumstances, the results of which\n\nform the basis for making judgments about the carrying values of assets\n\nand liabilities that are not readily apparent from other sources. Senior\n\nmanagement has discussed the development, selection and disclosure\n\nof these estimates with the Audit Committee of our Board of Directors.\n\nActual results may differ from these estimates under different assump-\n\ntions or conditions.\n\nAn accounting policy is deemed to be critical if it requires an\n\naccounting estimate to be made based on assumptions about matters\n\nthat are uncertain at the time the estimate is made, and if different\n\nestimates that reasonably could have been used, or changes in the\n\naccounting estimates that are reasonably likely to occur periodically,\n\ncould materially impact the financial statements. Management believes\n\nthe following critical accounting policies reflect its more significant", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "33 ■ 2003 ANNUAL REPORT\n\n#### **SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n##### **Note 10. Stock Incentive Plan (Continued)**\n\n**2003** 2002 2001\n\nDividend rate **1.68% to 2.35%** 1.52% 1.78%\n\nRisk-free interest rate **3.00% to 3.18%** 4.24% 4.31%\n\nExpected lives of options **5 to 10 years** 5 years 5 years\n\nPrice volatility **38.83% to 51.02%** 30.03% 38.29%\n\nA summary of the status of the Plan at December 31, 2003, 2002 and 2001 and changes during the years ended on those dates is as follows:\n\nShares\n\nWeighted Average Grant Price Per Share Fair Value Per Share Outstanding January 1, 2001 117,122 $12.50\n\nGranted 39,938 15.79 $ 5.51 Cancelled (6,580) 14.86 Exercised (12,426) 10.72\n\nOutstanding December 31, 2001 138,054 13.51\n\nGranted 47,646 17.59 4.08 Cancelled (19,758) 13.95 Exercised (16,238) 11.27\n\nOutstanding December 31, 2002 149,704 14.99\n\nGranted 75,396 18.89 4.24 to 11.37 Cancelled (11,892) 16.62 Exercised (40,988) 11.89\n\n##### **Outstanding December 31, 2003 172,220**\n\nThere were 85,670, 91,658 and 83,114 shares exercisable at December 31, 2003, 2002 and 2001, at weighted average exercise prices per share of, $15.94, $13.70, and $11.71, respectively. During 2002, the Company issued 4,654 shares of Company stock to employees valued at $100 thousand in recognition of the Company’s 100 th year anniversary. The following table summarizes information about stock options outstanding at December 31, 2003:\n\nExercise Prices Shares Outstanding Option Life Remaining Shares Exercisable\n\n1999 $ 9.97 9,700 1 year 9,700\n\n2000 17.19 25,900 2 years 25,900\n\n2001 15.79 31,626 3 years 31,626\n\n2002 17.59 36,888 4 years 18,444\n\n2003 **17.98-22.01 68,106 5 to 10 years** -\n\n##### **Note 11. Major Customers**\n\nThe Company has one major customer and relationship that is a significant source of revenue. In 2003, as during the past number of years, the Company's relationship with Sprint continued to increase, due to growth in the PCS business segment. Approximately 61.2% of total revenues in 2003 were generated by or through Sprint and its customers using the Company's portion of Sprint’s nationwide PCS network. This was compared to 57.6% in 2002, and 47.1% of total revenue in 2001. No other customer relationship on a stand-alone basis generates more than 2.5% of the Company’s total revenue for 2003, 2002 and 2001.\n\n$\n\n$\n\n$", - "page_start": 34, - "page_end": 34, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements 63\n\n**NOTE 11 — STOCKHOLDERS’ EQUITY**\n\nShare repurchases are only conducted under repurchase programs approved by the\n\nBoard of Directors and publicly announced. Share repurchase activity was as follows:\n\nYear Ended December 31 (In thousands)\n\nAugust 2001 authorization (0, 1.4 million\n\nand 6.4 million shares purchased). . . . . . . . . . . . . **$ —** $ 36,034 $ 207,590\n\nFebruary 2003 authorization\n\n(10 million shares purchased) . . . . . . . . . . . . . . . . **—** 335,911 —\n\nNovember 2003 authorization (8 million\n\nand 2 million shares purchased) . . . . . . . . . . . . . . **348,895** 70,919 —\n\n**$ 348,895** $ 442,864 $ 207,590\n\nAverage price of shares repurchased . . . . . . . . . . . . . **$ 43.59** $ 33.17 $ 32.28\n\nAt December 31, 2004, we had 10 million shares available for repurchase under a\n\nJuly 2004 authorization.\n\nIn May 2002, the Board of Directors approved a restricted stock plan. The plan\n\nallowed for the issuance of up to 1 million shares of Company common stock to\n\ncertain key employees. The restrictions on selling these shares lapse 50% on the\n\nthird anniversary date from the grant date and 50% on the fourth anniversary date\n\nafter the grant date. Through December 31, 2004, 903,000 shares were issued, with\n\nan aggregate value of $32 million. This amount was recorded as deferred\n\ncompensation in the accompanying consolidated balance sheet and is being\n\namortized to operating expenses on a straight-line basis through the period in which\n\nthe restrictions fully lapse. Amortization of deferred compensation was $7 million,\n\n$8 million and $5 million for the years ended December 31, 2004, 2003 and 2002,\n\nrespectively, and 855,000 shares were outstanding under the plan at December 31,\n\n2004. In November 2002, the Board of Directors determined that no more awards\n\nwould be granted under the plan.\n\n**NOTE 12 — EMPLOYEE BENEFIT PLANS**\n\nEmployees of the Company who are members of various unions are covered by\n\nunion-sponsored, collectively bargained, multi-employer health and welfare and\n\ndefined benefit pension plans. The Company recorded an expense of $86 million in\n\n2004, $77 million in 2003 and $66 million in 2002 under such plans. The plans'\n\nsponsors have not provided sufficient information to permit the Company to\n\ndetermine its share of unfunded vested benefits, if any.\n\nThe Company is self-insured for most health care benefits for its non-union\n\nemployees. The liability for claims filed and estimates of claims incurred but not\n\nreported is included in the “Other accrued liabilities” caption in the accompanying\n\nconsolidated balance sheets.\n\nThe Company has a retirement savings plan under Section 401(k) of the Internal\n\nRevenue Code for eligible employees not covered by a collective bargaining agree-\n\nment that does not specifically provide for participation in the plan. The plans\n\nallow employees to defer, within prescribed limits, up to 30% of their income on a\n\npre-tax basis through contributions to the plans. The Company matches, within\n\nprescribed limits, a portion of eligible employees' contributions. In the case of\n\ncertain union employees, the Company contributes to the plan are based on hours\n\nworked. The Company recorded charges for 401(k) contributions of $12 million in\n\n2004, $10 million in 2003 and $12 million in 2002.\n\nThe Company maintains a nonqualified deferred retirement plan for certain key\n\nemployees. The plan allows participants to defer, on a pre-tax basis, a portion of their\n\nsalary and bonus and accumulate tax deferred earnings, plus investment earnings on\n\nthe deferred balances, as a retirement fund. Participants receive a Company match of\n\nup to 4% of salary, net of any Company match received under the Company’s 401(k)\n\nplan. All employee deferrals vest immediately. The Company matching contributions\n\nvest ratably over a three-year period. The Company recorded charges for matching", - "page_start": 72, - "page_end": 72, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "9\n\n**T** he worst of 2001 brought out the best in The\n\nHartford’s people.\n\nAs the world watched the horrors of Sept. 11,\n\nsome 330 of our New York employees fled their offices\n\nin 7 World Trade Center. Though many were caught in\n\nthe debris and dust from the nearby Twin Towers, all\n\nescaped safely.\n\nBy the time the 47-story 7 World Trade Center\n\nbuilding collapsed at about 5:20 p.m., The Hartford had\n\nalready arranged for temporary space in several of the\n\ncompany’s other offices. Employees and suppliers\n\nimmediately began working around the clock to get\n\nthe business up and running again. Despite the\n\ndestruction, back-up systems kept distributors’ and\n\ncustomers’ data secure.\n\nA hundred miles from Ground Zero, home office\n\nemployees in Hartford, Conn., began shuttling equip-\n\nment and supplies to our temporary offices. Some\n\nbooked Long Island Sound ferries from Connecticut to\n\nLong Island within 48 hours of the attack. Others spent\n\nthe weekend driving supplies to the new locations so\n\nemployees could concentrate on customers instead of\n\non finding pens and paper. Employees and suppliers\n\nwere determined to get the company, its distributors\n\nand its customers through the crisis.\n\nBy Monday, Sept. 17, all of The Hartford’s business\n\nunits in New York were serving customers again.\n\nEmployees had new furniture, phones, servers and PCs.\n\nDistributors’ and customers’ access to company e-mail\n\nwas never interrupted. Calls to old phone numbers were\n\nrerouted to cell phones or new office phones. Print and\n\nradio ads—along with The Hartford’s Web site—\n\ngave customers instructions for filing claims quickly.\n\nCustomer relationships were stronger than ever. The\n\nHartford Experience—customer solutions, ease of doing\n\nbusiness and extraordinary service—was never better\n\ndemonstrated.\n\n### *people*", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "markets its turkey products through its own sales force and independent brokers.\n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003\n\nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest\n\ncompanies providing nutritional products to the U.S. healthcare industry.\n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages\n\nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers.\n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a\n\npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the\n\nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the\n\nPhilippines (Purefoods-Hormel, 40% holding).\n\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the\n\nCompany have been acquired in the ordinary course of business.\n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the\n\nbeginning of the fiscal year.\n\n##### **(b)** * **Industry Segment** *\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other.\n\nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by\n\nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual\n\nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference.\n\n##### **(c)** * **Description of Business** *\n\n##### **Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and\n\ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows:\n\nPerishable meat 50.3% 53.0% 54.7%\n\nNonperishable meat 18.9 19.8 21.0\n\nPoultry 22.1 22.6 20.3\n\nOther 8.7 4.6 4.0\n\n100.0% 100.0% 100.0%\n\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution\n\nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general-\n\npurpose financial statements.\n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon\n\nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen\n\nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and\n\nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin\n\nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003),\n\nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001).\n\nNo new product in fiscal 2003 required a material investment of Company assets.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "During 2002, the Company recorded a pretax charge of\n\napproximately $5.4 million due to the shutdown of an office furniture\n\nfacility in Jackson, Tennessee. A total of 125 members were terminated\n\nand received severance due to this shutdown. During the second quar-\n\nter of 2003, a restructuring credit of approximately $0.6 million was\n\ntaken back into income relating to this charge. This was due to the fact\n\nthat the Company was able to exit a lease with the lessor at more favor-\n\nable terms than previously estimated.\n\nDuring the second quarter of 2001, the Company recorded a\n\npretax charge of $24.0 million or $0.26 per diluted share for a restruc-\n\nturing plan that involved consolidating physical facilities, discontinuing\n\nlow-volume product lines, and reductions of workforce. Included in the\n\ncharge was the closedown of three of its office furniture facilities located\n\nin Williamsport, Pennsylvania; Tupelo, Mississippi; and Santa Ana,\n\nCalifornia. Approximately 500 members were terminated and received\n\nseverance due to the closedown of these facilities. During the second\n\nquarter of 2002, a restructuring credit of approximately $2.4 million\n\nwas taken back into income relating to this charge. This was mainly due\n\nto the fact that the Company was able to exit a lease with a lessor at\n\nmore favorable terms than originally estimated and the Company’s\n\nability to minimize the number of members terminated as compared to\n\nthe original plan.\n\nThe following table details the change in restructuring\n\nreserve for the last three years:", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", - "query": "What is the shortcut to mute myself in MS teams ?", - "target_page": 3, - "target_passage": "Use [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to\n\nreactivate the watch.\n\n**Button down:**\n\nShort press to enter multi-sport mode.\n\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any\n\nbuttons.\n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below.\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the\n\nshortcut.\n\n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth\n\nconnection status, time, power, brightness adjustment and other functions.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "### Make your meaning more visual by\n\n### formatting text\n\nTo format text, select it, and then select a button in the **Font** or **Paragraph** area on the Home\n\ntab.\n\n**Try it:** Select text in the lines below and choose formatting options so that the text is an\n\nexample of the formatting it’s describing:\n\nBold (keyboard shortcut: Ctrl+B)\n\nItalic (keyboard shortcut: Ctrl+I)\n\nHighlight\n\nFont color\n\nBullets\n\nNumbering\n\n**Pro tip:** If you selected whole words for this exercise, did you notice that Word popped up a\n\nlittle toolbar, with the font formatting options?\n\nBetween that and keyboard shortcuts like Ctrl+B\n\nand Ctrl+I, you save time by not having to go up to\n\nthe Home tab all the time.", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "## **Meeting essentials**\n\n####### **Create meetings**\n\nSelect **+ New meeting** or double-click on a time in your\n\ncalendar to [create a new meeting](https://teams.microsoft.com/_#/calendar) .\n\n3. Send your invite.\n\n2. Add people, a location and any notes.\n\n####### **Join meetings**\n\nFrom the calendar tab, select the meeting you intend to join,\n\nthen select join. .\n\n3. Then select join now. .\n\nA new screen will show up. Here you can choose how you\n\nwant to appear in the meeting, and your audio preferences.\n\n####### **Present in meetings**\n\nScreen share from the Share button at the top of your\n\nmeeting window.\n\nWhen you are finished, use the share button at the top of your\n\nmeeting window to stop sharing.\n\nChoose what screen or window you want to share. Don't forget\n\nto include audio if you're sharing something with sound.\n\n#### **Meeting controls**\n\nWhen you join meetings, a different window will pop-up. These are the controls you need to know:\n\nUse [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings. **Tip**\n\n1.\n\n1.\n\n2.\n\n1.\n\n2.\n\n3.\n\n####### **Participants**\n\nClick to see who has been invited to the meeting, or to add new people.\n\n####### **Chat**\n\nUse chat to share files, ideas, and notes.\n\n####### **Reactions**\n\nStay involved without breaking the flow—you can share an emoji reaction to let the presenter know how you feel. Reactions also allow you to raise your hand, which will signal that you'd like an opportunity to speak.\n\n####### **Video**\n\nTurn your camera on or off. You can also select the … button near the camera to access audio and video settings.\n\n####### **Share content**\n\nUse this to share your screen with others.\n\n####### **Microphone**\n\nMute and unmute your microphone when you want to speak.\n\n**1**\n\n**2**\n\n**3**\n\n**4**\n\n**5**\n\n**6**\n\n## **1 2 3 4 5 6**", - "page_start": 2, - "page_end": 2, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "### Share and collaborate\n\nWith this document saved in OneDrive, you can share it with others. They don’t even need Word\n\nto open it.\n\n**Try it:** Select **Share** , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\n\nYou can send the link by typing someone’s email address or by copying the link and pasting it\n\ninto a message or chat. If you want them to read the document but not edit it, set their\n\npermission to view-only.\n\nIf they don’t have Word, the document will open in their web browser, in Word Online.\n\n### Add visuals with pictures from the web\n\nWord works with Bing to give you access to thousands of pictures you can use in your\n\ndocuments.\n\n**Try it:** Hit enter after this line to make a blank line:\n\n**1.** With your cursor in the blank space above, go to the Insert tab, select **Online Pictures** ,\n\nand then search for something, like *puppy clip art* .\n\n**2.** Select the picture you want, and select **Insert** .", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Page 15 10/02/2013\n\n**Fill-in User Information**\n\nThere are two options to fill in the information of a new user\n\n(a) by entering the data on the same row of the new user (figure 20a) or;\n\n(b) by entering the data in the **General Properties** , **Sector** and **Role** boxes (figure 20b, 20c and 20d).\n\n* **Figure 20. New user created screen** *\n\nFill in the following fields:\n\n- First Name\n\n- Last Name\n\n- Name (optional)\n\n- Email address\n\n- Password (must have 1 capital letter, 1 numeric and 8 characters long)\n\n- User Role\n\n- Sectors\n\n- Change password (tick the box prompts the user to change his/her password)\n\nThe functionality to change password is not fully implemented in this release. Please do **not** tick the “Change\n\npassword” box under General Properties! (See figure 20 b).\n\n- Enable user (Proceed to section 3.3.2 Disable/Enable User)\n\n#### **3.3.2 Disable/Enable User**\n\nThis function allows the NFP and PM to activate and/or de-activate users of their country.\n\n- Log in as NFP or PM\n\n- Hover the cursor on the “Users Management” tab and click on the “Users Administration” button. (see figure 21);\n\nthis opens the Disable/Enable User screen (figure 22).\n\n* **Figure 21. Users Administration** *\n\n* **3.3.2.1 Enable User** *\n\nOn the Disable/Enable screen, search for the user whose account should be activated and\n\nun-tick the ‘Disabled’ box. (figure 22a).\n\n* **3.3.2.2 Disable User** *\n\nOn the Disable/Enable screen, search for the user whose account should be de-activated and tick the ‘Disabled’ box\n\n(figure 22a).", - "page_start": 14, - "page_end": 14, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "###### **Charge for managed self-isolation package**\n\n**9.** The Secretary of State or a person designated by the Secretary of State may impose a charge\n\nin relation to the accommodation, transport and testing package mentioned in the definition of a\n\n“managed self-isolation package” and the Secretary of State may recover any sum owed by P\n\npursuant to such a charge as a debt.\n\n###### **Duty to self-isolate and period of self-isolation**\n\n**10.** Unless P leaves the common travel area where P is permitted to do so under these\n\nRegulations, P must self-isolate in the place in the accommodation designated in the managed self-\n\nisolation package until whichever is the later of—\n\n(a) the end of the period of 10 days beginning with the day after P’s arrival in England;\n\n(b) the end of the period for which P is required to self-isolate under Schedule 8 (mandatory\n\ntesting after arrival in England).\n\n###### **Exceptions from duty to self-isolate**\n\n**11.** Paragraph 10 does not require P to remain in self-isolation—\n\n(a) from any person with whom they were travelling when they arrived in England and who\n\nis also self-isolating in the place where P is self-isolating;\n\n(b) from any person who is staying in the place where P is self-isolating whose assistance P\n\nreasonably requires by reason of—\n\n(i) P being a child, or\n\n(ii) any disability of P’s.\n\n**12.** Paragraph 10 does not require P to remain in self-isolation from a person (“V”) when V is at\n\nthe place where P is self-isolating in exceptional circumstances such as—\n\n(a) to provide emergency assistance;\n\n(b) to provide care or assistance, including relevant personal care within the meaning of\n\nparagraph 1(1B) or 7(3B) of Schedule 4 to the Safeguarding Vulnerable Groups Act\n\n2006( **a** );\n\n(c) to provide medical assistance to P or to any other person who is staying in the place\n\nwhere P is self-isolating where this is required urgently or on the advice of a registered\n\nmedical practitioner;\n\n(d) to provide veterinary services where this is required urgently or on the advice of a\n\nveterinary surgeon;\n\n(e) to provide critical public services including social services or services provided to victims\n\n(such as victims of crime).\n\n###### **Permitted reasons to leave or be outside place of self-isolation**\n\n**13.** —(1) During the period of their self-isolation P may not leave or be outside of the place\n\nwhere P is self-isolating except—\n\n(a) to travel directly to a port to leave the common travel area;\n\n(b) to fulfil a legal obligation, including attending court or satisfying bail conditions or to\n\nparticipate in legal proceedings;\n\n(c) to take exercise;\n\n( **a** ) 2006 c. 47 paragraph 1(1B) was inserted by section 64 the Protection of Freedoms Act 2012 (c. 9) and paragraph 7(3B) was\n\ninserted by section 66 of that Act.", - "page_start": 76, - "page_end": 76, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "### **Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help you get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team.\n\n**Hit the ground running now!** Build confidence by trying things on your own. Go to the meet now button\n\n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!\n\n**Download** the app for [desktop ](https://www.microsoft.com/microsoft-teams/download-app) and [mobile](https://www.microsoft.com/microsoft-teams/download-app) to access Teams with the best performance anywhere you go.\n\nOnce you [sign in](https://teams.microsoft.com/l/home/_#/) , **connect** with your team in chat, channels, calls, and meetings. **Try out** the different features as you learn about them in this guide. You’ll get the basics in no time!\n\n#### **Set up Explore Practice**", - "page_start": 0, - "page_end": 0, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "###### **S ELECTING R OWS**\n\nIf you want to make changes to an * **entire row** * , such as bolding all of the headings in a row or changing the font of all the cell entries, you must first select the row. This is done by clicking on the\n\nrow header to the left of the row. Remember that any changes you make will apply to every cell in the row all the way across to column XFD, so be careful!\n\n**Try This Yourself:**\n\n* **Same** * * **File** *\n\n*Continue using the previous file* *with this exercise, or open the file* *E705 Ranges_1.xlsx...*\n\n Press + to make cell * **A1** * the active cell  Move the mouse pointer to the row heading for row * **5** *\n\n*Notice that the mouse pointer* *changes to a black arrow that* *points towards the row…*  Click once on row heading * **5** * to select the entire row  Click in cell * **B7** * and press +\n\n*This is the key combination for* *selecting an entire row…*  Click on the row header for row * **7** * to select this row  Hold down and click on the\n\nrow header for row * **10** *\n\n*All rows from 7 to 10 will be* *selected…*  Click in the row header for row * **5** * , then hold down the left mouse button and drag down the row headers to row * **10** *\n\n*This is another technique for* *selecting rows, but it does require* *a steady hand!*\n\n**For Your Reference…**\n\nTo * **select** * an entire * **row** * :\n\n1. Click on the row header of the row that you want to select\n\nOR\n\n1. Click in any cell in the row and press\n\n+\n\n**Handy to Know…**\n\n- When * **every cell** * in a row or column is selected, the corresponding row or column header is filled in dark blue. When only * **some** * of the cells are selected, the row or column header is filled in orange. These indicators help you locate the active cell(s) on the worksheet.\n\n-\n\n## **2**\n\n## **3**\n\n## **4**\n\n## **6**\n\n## **7**", - "page_start": 17, - "page_end": 17, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Chapter 5. Graphical user interface\n\nFor example, in the Dashboard pane, you can open help information that is related to the\n\ndashboard-provided information, as shown in Figure 5-19.\n\n*Figure 5-19 Example of Dashboard help content*\n\nSelecting the Help Contents option redirects you to the Storwize V7000 IBM Knowledge\n\nCenter. However, it requires internet access from the workstation where the management\n\nGUI is started.\n\n### **5.3 System View window**\n\nStarting with IBM Spectrum Virtualize release V7.4, the welcome window of the GUI changed\n\nfrom the well-known former Overview/system 3D pane to the new System pane. In V8.2, the\n\nsystem pane was changed again to the new System view pane, and the 3D view was\n\nremoved, as shown in Figure 5-20.\n\n*Figure 5-20 Opening the Overview pane*\n\nNext, we describe the structure of the pane and how to navigate to various system\n\ncomponents to manage them more efficiently and quickly.\n\n#### **5.3.1 Content-based organization**\n\nThe following sections describe several view options within the GUI in which you can filter (to\n\nminimize the amount of data that is shown on the window), sort, and reorganize the content of\n\nthe window.", - "page_start": 164, - "page_end": 164, - "source_file": "sg247938.pdf" - }, - { - "text": "3. The window displays an **Apply Changes** prompt to apply any changes you made before\n\ncontinuing,\n\n4. Lower in the configuration window, you can also configure internet Storage Name Service\n\n(iSNS) addresses and CHAP if you need these in your environment.\n\n5. Click the **Ethernet Ports** tab to set the iSCSI IP address for each node (see Figure 8-12).\n\n*Figure 8-12 Enter an iSCSI IP address*\n\n6. Select the port that is wanted to set the iSCSI IP information. Click **Actions** , and then,\n\n**Modify IP Settings** (see Figure 8-13 on page 335).\n\n**Note:** The authentication of hosts is optional. By default, it is disabled. The user can\n\nchoose to enable CHAP or *CHAP authentication* , which involves sharing a CHAP\n\nsecret between the cluster and the host. If the correct key is not provided by the host,\n\nthe Storwize V7000 does not allow it to perform I/O to volumes. Also, you can assign a\n\nCHAP secret to the cluster.", - "page_start": 355, - "page_end": 355, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", - "query": "How can I make a channel visible to an invited member ?", - "target_page": 4, - "target_passage": "Channels can be: • Shared (visible to invited team members and external members of your organization who are not on the team)", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Chapter 8. Hosts\n\n**Creating Fibre Channel hosts**\n\nTo create Fibre Channel hosts, complete the following steps:\n\n1. Select **Fibre Channel** . The Fibre Channel configuration window opens (see Figure 8-4).\n\n*Figure 8-4 Fibre Channel host configuration*", - "page_start": 350, - "page_end": 350, - "source_file": "sg247938.pdf" - }, - { - "text": "To create a host, complete the following steps:\n\n1. Open the host configuration window by clicking **Hosts** (see Figure 8-3).\n\n*Figure 8-3 Open the host window*\n\n2. To create a host, click **Add Host** . If you want to create a Fibre Channel host, continue with\n\n“Creating Fibre Channel hosts” on page 329. To create an iSCSI host, go to “Creating\n\niSCSI hosts” on page 331.", - "page_start": 349, - "page_end": 349, - "source_file": "sg247938.pdf" - }, - { - "text": "## **Meeting essentials**\n\n####### **Create meetings**\n\nSelect **+ New meeting** or double-click on a time in your\n\ncalendar to [create a new meeting](https://teams.microsoft.com/_#/calendar) .\n\n3. Send your invite.\n\n2. Add people, a location and any notes.\n\n####### **Join meetings**\n\nFrom the calendar tab, select the meeting you intend to join,\n\nthen select join. .\n\n3. Then select join now. .\n\nA new screen will show up. Here you can choose how you\n\nwant to appear in the meeting, and your audio preferences.\n\n####### **Present in meetings**\n\nScreen share from the Share button at the top of your\n\nmeeting window.\n\nWhen you are finished, use the share button at the top of your\n\nmeeting window to stop sharing.\n\nChoose what screen or window you want to share. Don't forget\n\nto include audio if you're sharing something with sound.\n\n#### **Meeting controls**\n\nWhen you join meetings, a different window will pop-up. These are the controls you need to know:\n\nUse [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings. **Tip**\n\n1.\n\n1.\n\n2.\n\n1.\n\n2.\n\n3.\n\n####### **Participants**\n\nClick to see who has been invited to the meeting, or to add new people.\n\n####### **Chat**\n\nUse chat to share files, ideas, and notes.\n\n####### **Reactions**\n\nStay involved without breaking the flow—you can share an emoji reaction to let the presenter know how you feel. Reactions also allow you to raise your hand, which will signal that you'd like an opportunity to speak.\n\n####### **Video**\n\nTurn your camera on or off. You can also select the … button near the camera to access audio and video settings.\n\n####### **Share content**\n\nUse this to share your screen with others.\n\n####### **Microphone**\n\nMute and unmute your microphone when you want to speak.\n\n**1**\n\n**2**\n\n**3**\n\n**4**\n\n**5**\n\n**6**\n\n## **1 2 3 4 5 6**", - "page_start": 2, - "page_end": 2, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "## **Chat Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left panel along with all its associated channels. You can choose to \"show\" the most relevant chanels and \"hide\" the rest.\n\nBy default, your chats will be arranged along the left-hand side of the chat panel, with the most recent messages at the top. You can right-click on any chat and select \"Pin,\" which will keep it at the top of your list for quick access.\n\nTo **create a new chat** , press [CTRL] + [N] (or look for the pen symbol at the top of the chat list) and add the names of anyone you want to include. Type your message and select Send or hit [Enter].\n\n1:1 Chat\n\nGroup Chat\n\nMeeting Chat\n\nTo **share a file** select “Attach” under the box where you type messages, select the file location and then the file you want. Depending on the location of the file, you’ll get options for uploading a copy, sharing a link, or other ways to share.\n\nWhen you create group chats you can edit the name of the group by selecting the pen symbol next to the group icon in the chat. This will help you give it context and make it easier to find.\n\nAN\n\nCreate a team for your organization with channels for your leadership team, each department, and one just for fun!\n\nDaichi, Eva, +2 11:00 AM\n\nYes, that should work for us\n\nMarketing Sync 10:45 AM\n\nSharing notes after the meeting\n\n##### **Tip**\n\n##### **Tip**\n\n####### **Teams**\n\nA **team** is a broad group of people that work together to get something done. You can choose who is part of the team, and people can only access shared content by invitation. All teams are created with an associated General channel that includes all team members by default.\n\n####### **Channels**\n\nShared Channel\n\nMarketing\n\nGeneral\n\nA **channel** is a central hub for a specific topic, within the larger team, where people can hold focused conversations and organize a library of files.\n\nChannels can be:\n\n- Standard (visible to everyone on the team)\n\n- Private (only visible to select team members)\n\n- Shared (visible to invited team members and external members of your organization who are not on the team)", - "page_start": 3, - "page_end": 3, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "####### **REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n####### **CONSOLIDATED STATEMENTS OF STOCKHOLDERS' EQUITY**\n\n####### **AND COMPREHENSIVE INCOME**\n\n####### **(in millions)**\n\n**Accumulated Common Stock Additional Other**\n\n**Shares, Par Paid-In Deferred Retained Treasury Comprehensive Comprehensive**\n\n**Net Value Capital Compensation Earnings Stock Income (Loss) Income**\n\nBALANCE AT\n\nDECEMBER 31, 2001ÏÏÏÏÏ 169.6 $1.8 $1,264.7 $ Ì $ 641.1 $(150.1) $(1.6)\n\nNet income ÏÏÏÏÏÏÏÏÏÏÏÏÏÏ Ì Ì Ì Ì 239.6 Ì Ì $239.6\n\nIssuances of common stock 2.0 Ì 34.0 Ì Ì Ì Ì Ì\n\nPurchases of common stock\n\nfor treasuryÏÏÏÏÏÏÏÏÏÏÏÏÏ (8.0) Ì Ì Ì Ì (150.0) Ì Ì\n\nChange in value of\n\nderivative instruments, net\n\nof tax ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ Ì Ì Ì Ì Ì Ì 1.6 1.6\n\nTotal comprehensive income Ì Ì Ì Ì Ì Ì Ì $241.2\n\nBALANCE AT\n\nDECEMBER 31, 2002ÏÏÏÏÏ 163.6 1.8 1,298.7 Ì 880.7 (300.1) Ì\n\nNet income ÏÏÏÏÏÏÏÏÏÏÏÏÏÏ Ì Ì Ì Ì 177.6 Ì Ì $177.6\n\nCash dividendsÏÏÏÏÏÏÏÏÏÏÏÏ Ì Ì Ì Ì (19.0) Ì Ì Ì\n\nIssuances of common stock 2.6 Ì 49.1 Ì Ì Ì Ì\n\nPurchases of common stock\n\nfor treasuryÏÏÏÏÏÏÏÏÏÏÏÏÏ (8.4) Ì Ì Ì Ì (184.2) Ì\n\nChange in value of\n\ninvestments, net of tax ÏÏÏ Ì Ì Ì Ì Ì Ì (.1) (.1)\n\nTotal comprehensive income Ì Ì Ì Ì Ì Ì Ì $177.5\n\nBALANCE AT\n\nDECEMBER 31, 2003ÏÏÏÏÏ 157.8 1.8 1,347.8 Ì 1,039.3 (484.3) (.1)\n\nNet income ÏÏÏÏÏÏÏÏÏÏÏÏÏÏ Ì Ì Ì Ì 237.9 Ì Ì $237.9\n\nCash dividendsÏÏÏÏÏÏÏÏÏÏÏÏ Ì Ì Ì Ì (54.6) Ì Ì Ì\n\nIssuances of common stock 2.3 .1 48.8 Ì Ì Ì Ì Ì\n\nIssuances of restricted stock\n\nand deferred stock units ÏÏ .1 Ì 2.8 (2.8) Ì Ì Ì Ì\n\nAmortization of deferred\n\ncompensation ÏÏÏÏÏÏÏÏÏÏÏ Ì Ì Ì 1.8 Ì Ì Ì Ì\n\nPurchases of common stock\n\nfor treasuryÏÏÏÏÏÏÏÏÏÏÏÏÏ (9.6) Ì Ì Ì Ì (266.1) Ì Ì\n\nChange in value of\n\ninvestments, net of tax ÏÏÏ Ì Ì Ì Ì Ì Ì .1 .1\n\nTotal comprehensive income Ì Ì Ì Ì Ì Ì Ì $238.0\n\nBALANCE AT\n\nDECEMBER 31, 2004ÏÏÏÏÏ 150.6 $1.9 $1,399.4 $(1.0) $1,222.6 $(750.4) $ Ì\n\nThe accompanying notes are an integral part of these statements.\n\n55", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Chapter 8. Hosts\n\n*Figure 8-25 IBM Spectrum Virtualize Hosts menu*\n\nIn the **Hosts** → **Hosts** view, three hosts were created and volumes are mapped to them in\n\nour example. If needed, we can now modify these hosts by selecting a host and click **Actions** ,\n\nor right-click the host to see the available tasks (see Figure 8-26 on page 346).", - "page_start": 366, - "page_end": 366, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 8. Hosts\n\n*Figure 8-6 Host type selection*\n\n6. Click **Add** to create the host object.\n\n7. Click **Close** to return to the host window. Repeat these steps for all of your Fibre Channel\n\nhosts. Figure 8-7 shows the **All Hosts** window after creating a second host.\n\n*Figure 8-7 Hosts view after creating a host*\n\nAfter you complete the adding of Fibre Channel hosts, see Chapter 7, “Volumes” on page 241\n\nto create volumes and map them to the created hosts.\n\n**Creating iSCSI hosts**\n\nWhen creating an iSCSI attached host, consider the following points:\n\n� iSCSI IP addresses can fail over to the partner node in the I/O Group if a node fails. This\n\ndesign reduces the need for multipathing support in the iSCSI host.\n\n� The IQN of the host is added to a Storwize V7000 host object in the same way that you\n\nadd FC WWPNs.\n\n� Host objects can have WWPNs and IQNs.", - "page_start": 352, - "page_end": 352, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 8. Hosts\n\nIn the window that is shown in Figure 8-47 on page 358, you can modify the following\n\nproperties:\n\n- Host Name: Change the host name.\n\n- Host Type: Change this setting if you are going to attach HP/UX, OpenVMS, or TPGS\n\nhosts.\n\n- I/O Group: Host can access volumes that are mapped from selected I/O Groups.\n\n- iSCSI CHAP Secret: Enter or change the iSCSI CHAP secret if this host is using iSCSI.\n\n4. When finished making changes, click **Save** to apply them. The editing window closes.\n\nThe Mapped Volumes tab shows a summary of which volumes are currently mapped with\n\nwhich SCSI ID and UID to this host (see Figure 8-48). The Show Details slider does not\n\nshow any more information for this list.\n\n*Figure 8-48 Mapped volumes tab*", - "page_start": 380, - "page_end": 380, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 8. Hosts\n\n**Adding a Fibre Channel port**\n\nTo add a Fibre Channel port, complete the following steps:\n\n1. Click **Fibre Channel Port** (see Figure 8-52 on page 362). The Add Fibre Channel Ports\n\nwindow opens (see Figure 8-53).\n\n*Figure 8-53 Add Fibre Channel Ports window*\n\n2. Click the drop-down menu to display a list of all discovered Fibre Channel WWPNs. If the\n\nWWPN of your host is not available in the menu, enter it manually or check the SAN\n\nzoning to ensure that connectivity is configured. Then, rescan storage from the host.", - "page_start": 384, - "page_end": 384, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 9. Storage migration\n\n10.If the host that needs access to the migrated data is not configured, select **Add Host** to\n\nbegin the Add Host wizard. Enter the host connection type, name, and connection details.\n\nOptionally, click **Advanced** to modify the host type and I/O group assignment. Figure 9-9\n\nshows the Add Host wizard with the details completed.\n\nFor more information about the Add Host wizard, see Chapter 8, “Hosts” on page 317.\n\n*Figure 9-9 If not already defined, you can create a host during the migration process*\n\n11.Click **Add** . The host is created and is now listed in the Configure Hosts window, as shown\n\nin Figure 9-8 on page 394. Click **Next** to proceed.\n\n12.The next window lists the new volumes and enables you to map them to hosts. The\n\nvolumes are listed with names that were automatically assigned by the system. The\n\nnames can be changed to reflect something more meaningful to the user by selecting the\n\nvolume and clicking **Rename** in the **Actions** menu.", - "page_start": 416, - "page_end": 416, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", - "query": "How can I notify a collegue mentionned in a chat message in Teams ?", - "target_page": 5, - "target_passage": "Tag a teammate in a message by typing the @ symbol followed by their name. They will receive a special notification calling for their attention.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "## **Chat Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left panel along with all its associated channels. You can choose to \"show\" the most relevant chanels and \"hide\" the rest.\n\nBy default, your chats will be arranged along the left-hand side of the chat panel, with the most recent messages at the top. You can right-click on any chat and select \"Pin,\" which will keep it at the top of your list for quick access.\n\nTo **create a new chat** , press [CTRL] + [N] (or look for the pen symbol at the top of the chat list) and add the names of anyone you want to include. Type your message and select Send or hit [Enter].\n\n1:1 Chat\n\nGroup Chat\n\nMeeting Chat\n\nTo **share a file** select “Attach” under the box where you type messages, select the file location and then the file you want. Depending on the location of the file, you’ll get options for uploading a copy, sharing a link, or other ways to share.\n\nWhen you create group chats you can edit the name of the group by selecting the pen symbol next to the group icon in the chat. This will help you give it context and make it easier to find.\n\nAN\n\nCreate a team for your organization with channels for your leadership team, each department, and one just for fun!\n\nDaichi, Eva, +2 11:00 AM\n\nYes, that should work for us\n\nMarketing Sync 10:45 AM\n\nSharing notes after the meeting\n\n##### **Tip**\n\n##### **Tip**\n\n####### **Teams**\n\nA **team** is a broad group of people that work together to get something done. You can choose who is part of the team, and people can only access shared content by invitation. All teams are created with an associated General channel that includes all team members by default.\n\n####### **Channels**\n\nShared Channel\n\nMarketing\n\nGeneral\n\nA **channel** is a central hub for a specific topic, within the larger team, where people can hold focused conversations and organize a library of files.\n\nChannels can be:\n\n- Standard (visible to everyone on the team)\n\n- Private (only visible to select team members)\n\n- Shared (visible to invited team members and external members of your organization who are not on the team)", - "page_start": 3, - "page_end": 3, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "#### **Compose**\n\n**Format** your messages, add bullet points, charts or hyperlinks.\n\n**Mark as important** to call attention to specific messages.\n\n**Attach files** to share with your teammates.\n\n**Include gifs** , emojis, stickers to bring lightness to your conversations.\n\n#### **Respond**\n\n**Tag a teammate** in a message by typing the **@ symbol** followed by their name. They will receive a special notification calling for their attention.\n\n###### **@**\n\nReact to individual messages or **quote** them in a response.\n\n**Tip** Going into format mode will prevent your message from sending when you hit [Enter], so it's a great way to draft and preview messages before sending them.\n\n## **Connect through messages**\n\nWhether you're in a meeting, channel, or a chat, your messaging box will look the same.\n\n**Tip** If you want to revisit an important message later, hover on that message, select the three d , then choose “Save.” Saved messages will be found under your profile picture dropdown menu.\n\nHi @Daichi. Can you coordinate a time to meet with\n\nChristie to talk coverage on Brandhaus while Alex is out **next week?**", - "page_start": 4, - "page_end": 4, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "####### **Activity**\n\nFind notifications for all recent actions to stay on top of things. You can manage your notifications according to your preferences.\n\n####### **Chat**\n\nMessage someone or a group of people. This tab brings up the list of all your chats.\n\n####### **Teams**\n\nCreate teams and channels to gather people together in focused spaces with conversations and files. This tab brings up a list of all the teams you are a part of.\n\n####### **Calendar**\n\nBring up your calendar to view, create, and respond to meetings.\n\n####### **Calls**\n\nStart video and audio calls by dialing a phone number or placing a call over the internet. View your call history and voicemail.\n\n####### **Files**\n\nFiles shared in chats, meetings, or channels are consolidated under this tab. Files will appear in a list view and can be sorted by type, name, date, or location.\n\n####### **Apps**\n\nSearch for, choose, and integrate apps to optimize how you work in Teams. Apps can appear in chat, channels, or meetings.\n\n####### **Help**\n\nLearn more about Teams with articles and training content. Stay up to date with the latest features, and report problems when things aren’t working out.\n\n####### **Search**\n\nSearch for people, files, meetings, or conversations in Teams, then filter results to find just what you need.\n\n####### **Profile**\n\nSelecting your profile picture shows you a menu where you can customize your profile, find saved messages, or set your status and a message people can see when they try to reach you.\n\nYour Teams calendar automatically syncs with Outlook, and you can manage meetings through either app. **Tip**\n\n## **Getting around**\n\nNavigate Teams using the menu along the left side and the top bar of your Teams desktop app.\n\n## **1**\n\n## **2**\n\n## **3**\n\n## **4**\n\n## **5**\n\n## **6**\n\n## **7**\n\n## **8**\n\n**1**\n\n**2**\n\n**3**\n\n**4**\n\n**5**\n\n**6**\n\n**7**\n\n**8**\n\n**9**\n\n**10**\n\n## **9 10**", - "page_start": 1, - "page_end": 1, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "*Figure 13-63 Add SNMP Server*\n\n#### **13.7.4 Syslog notifications**\n\nThe syslog protocol is a standard protocol for forwarding log messages from a sender to a\n\nreceiver on an IP network. The IP network can be IPv4 or IPv6. The system can send syslog\n\nmessages that notify personnel about an event.\n\nYou can configure a syslog server to receive log messages from various systems and store\n\nthem in a central repository by entering the following information (see Figure 13-64 on\n\npage 725):\n\n� IP Address\n\nThe IP address for the syslog server.\n\n� Facility\n\nThe facility determines the format for the syslog messages. The facility can be used to\n\ndetermine the source of the message.\n\n� Message Format\n\nThe message format depends on the facility. The system can transmit syslog messages in\n\nthe following formats:\n\n- The concise message format provides standard detail about the event.", - "page_start": 745, - "page_end": 745, - "source_file": "sg247938.pdf" - }, - { - "text": "## *Figure 8 - Error message dialog.*", - "page_start": 41, - "page_end": 41, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "From this window (see Figure 5-54 on page 163), you can view and configure an SNMP\n\nserver to receive various informational, error, or warning notifications by setting the following\n\ninformation:\n\n� IP Address\n\nThe address for the SNMP server.\n\n� Server Port\n\nThe remote port number for the SNMP server. The remote port number must be a value of\n\n1 - 65535.\n\n� Community\n\nThe SNMP community is the name of the group to which devices and management\n\nstations that run SNMP belong.\n\n� Event Notifications\n\nConsider the following points about event notifications:\n\n- Select **Error** if you want the user to receive messages about problems, such as\n\nhardware failures, that must be resolved immediately.\n\n- Select **Warning** if you want the user to receive messages about problems and\n\nunexpected conditions. Investigate the cause immediately to determine any corrective\n\naction.\n\n- Select **Info** if you want the user to receive messages about expected events. No action\n\nis required for these events.\n\nTo remove an SNMP server, click the Minus sign ( **-** ). To add another SNMP server, click\n\nthe Plus sign ( **+** ).\n\n**Syslog notifications**\n\nThe syslog protocol is a standard protocol for forwarding log messages from a sender to a\n\nreceiver on an IP network. The IP network can be IPv4 or IPv6. The system can send syslog\n\nmessages that notify personnel about an event. You can use the Syslog pane to view the\n\nSyslog messages that are sent by the IBM Storwize V7000. To view the Syslog configuration,\n\nuse the System pane and point to **Settings** and click **Notification** → **Syslog** (see\n\nFigure 5-55).\n\n*Figure 5-55 Setting Syslog messages*\n\n**Important:** Browse to **Recommended Actions** to run the fix procedures on these\n\nnotifications.\n\n**Important:** Browse to **Recommended Actions** to run the fix procedures on these\n\nnotifications.", - "page_start": 185, - "page_end": 185, - "source_file": "sg247938.pdf" - }, - { - "text": "The content of the welcome message is helpful when you need to notify users about some\n\nimportant information about the system, such as security warnings or a location description.\n\nTo define and enable the welcome message by using the GUI, edit the text area with the\n\nmessage content and click **Save** (see Figure 5-80).\n\n*Figure 5-80 Enabling login message*\n\nThe resulting log-in screen is shown in Figure 5-81.\n\n*Figure 5-81 Welcome message in GUI*\n\nThe banner message also appears in the CLI login prompt window, as shown in Figure 5-82.\n\n*Figure 5-82 Banner message in CLI*", - "page_start": 203, - "page_end": 203, - "source_file": "sg247938.pdf" - }, - { - "text": "12.Enter the details for the email servers to be used for Call Home. Call Home sends email\n\nreports to IBM with inventory details and event notifications. This setting allows IBM to\n\nautomatically open problem reports and to contact you to verify whether replacement\n\nparts are required.\n\nFigure 4-18 shows an example. You can click **Ping** to verify that the email server is\n\nreachable over the network. Click **Apply and Next** .\n\n*Figure 4-18 Setting email servers details*\n\nStorwize V7000 can use SNMP traps, syslog messages, and Call Home to notify you and\n\nIBM Support when significant events are detected. Any combination of these notification\n\nmethods can be used simultaneously. However, only Call Home is configured during the\n\nsystem setup wizard. For more information about how to configure other notification\n\nmethods, see Chapter 4, “Initial configuration” on page 87.\n\nIf you do not want to configure Call Home now, it can be done later by navigating to\n\n**Settings** → **Notifications** .\n\n**Note:** When Call Home is configured, the system automatically creates a support\n\ncontact with one of the following email addresses, depending on country or region of\n\ninstallation:\n\n� US, Canada, Latin America, and Caribbean Islands: callhome1@de.ibm.com\n\n� All other countries or regions: callhome0@de.ibm.com", - "page_start": 125, - "page_end": 125, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 5. Graphical user interface\n\nFrom this window, you can view and configure a syslog server to receive log messages from\n\nvarious systems and store them in a central repository by entering the following information:\n\n� IP Address\n\nThe IP address for the syslog server.\n\n� Facility\n\nThe facility determines the format for the syslog messages. The facility can be used to\n\ndetermine the source of the message.\n\n� Message Format\n\nThe message format depends on the facility. The system can transmit syslog messages in\n\nthe following formats:\n\n- The concise message format provides standard detail about the event.\n\n- The expanded format provides more details about the event.\n\n� Event Notifications\n\nConsider the following points about event notifications:\n\n- Select **Error** if you want the user to receive messages about problems, such as\n\nhardware failures, that must be resolved immediately.\n\n- Select **Warning** if you want the user to receive messages about problems and\n\nunexpected conditions. Investigate the cause immediately to determine whether any\n\ncorrective action is necessary.\n\n- Select **Info** if you want the user to receive messages about expected events. No action\n\nis required for these events.\n\nTo remove a syslog server, click the Minus sign ( **-** ). To add another syslog server, click the\n\nPlus sign ( **+** ).\n\nThe syslog messages can be sent in concise message format or expanded message format.\n\nExample 5-1 shows a compact format syslog message.\n\n*Example 5-1 Compact syslog message example*\n\nIBM2145 #NotificationType=Error #ErrorID=077001 #ErrorCode=1070 #Description=Node\n\nCPU fan failed #ClusterName=V7kCluster1 #Timestamp=Wed Oct 02 08:00:00 2018 BST\n\n#ObjectType=Node #ObjectName=Node1 #CopyID=0 #ErrorSequenceNumber=100\n\nExample 5-2 shows an expanded format syslog message.\n\n*Example 5-2 Full format syslog message example*\n\nIBM2145 #NotificationType=Error #ErrorID=077001 #ErrorCode=1070 #Description=Node\n\nCPU fan failed #ClusterName=V7kCluster1 #Timestamp=Wed Oct 02 08:00:00 2018 BST\n\n#ObjectType=Node #ObjectName=Node1 #CopyID=0 #ErrorSequenceNumber=100 #ObjectID=2\n\n#NodeID=2 #MachineType=2076524#SerialNumber=1234567 #SoftwareVersion=8.2.1.0\n\n**Important:** Browse to **Recommended Actions** to run the fix procedures on these\n\nnotifications.\n\n**Important:** Browse to **Recommended Actions** to run the fix procedures on these\n\nnotifications.", - "page_start": 186, - "page_end": 186, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 2. System overview **41**\n\n#### **2.7.3 Simple Network Management Protocol traps**\n\nSNMP is a standard protocol for managing networks and exchanging messages. The IBM\n\nSpectrum Virtualize can send SNMP messages that notify personnel about an event. You can\n\nuse an SNMP manager to view the SNMP messages that IBM Spectrum Virtualize sends.\n\nYou can use the management GUI or the IBM Storwize V7000 CLI to configure and modify\n\nyour SNMP settings.\n\nYou can use the Management Information Base (MIB) file for SNMP to configure a network\n\nmanagement program to receive SNMP messages that are sent by the IBM Spectrum\n\nVirtualize.\n\n#### **2.7.4 Syslog messages**\n\nThe syslog protocol is a standard protocol for forwarding log messages from a sender to a\n\nreceiver on an IP network. The IP network can be IPv4 or IPv6.\n\nIBM Storwize V7000 can send syslog messages that notify personnel about an event. The\n\nevent messages can be sent in expanded or concise format. You can use a syslog manager\n\nto view the syslog messages that IBM Storwize V7000 sends.\n\nIBM Spectrum Virtualize uses the User Datagram Protocol (UDP) to transmit the syslog\n\nmessage. You can use the management GUI or the IBM Storwize V7000 CLI to configure and\n\nmodify your syslog settings.\n\n#### **2.7.5 Call Home email**\n\nThe Call Home feature transmits operational and error-related data to you and IBM through\n\nan SMTP server connection in the form of an event notification email. When configured, this\n\nfunction alerts IBM service personnel about hardware failures and potentially serious\n\nconfiguration or environmental issues. You can use the Call Home function if you have a\n\nmaintenance contract with IBM or if the IBM Storwize V7000 is within the warranty period.\n\nTo send email, at least one SMTP server must be configured. The system support as many\n\nas five more SMTP servers for backup purposes. The SMTP server must accept the relaying\n\nof email from the IBM Storwize V7000 clustered system IP address.\n\nUse the management GUI or the IBM Storwize V7000 CLI to configure the email settings,\n\nincluding contact information and email recipients. Set the reply address to a valid email\n\naddress.\n\nSend a test email to check that all connections and infrastructure are set up correctly. The\n\nCall Home function can be disabled at any time by using the management GUI or the IBM\n\nStorwize V7000 CLI.", - "page_start": 62, - "page_end": 62, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "Botswana-constitution.pdf", - "query": "What are the 3 prerequisites to be elligible as president of Botswana ?", - "target_page": 18, - "target_passage": "A person shall be qualified for election as President if, and shall not be qualified unless, he or she- (a) is a citizen of Botswana by birth or descent; (b) has attained the age of 30 years; and (c) is qualified to be elected as a Member of the National Assembly", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this section. (3) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) for the imposition of restrictions that are reasonably required in the interests of defence, public safety, public order, public morality or public health or the imposition of restrictions on the acquisition or use by any person of land or other property in Botswana and except so far as that provision or, as the case may be, the thing done under the authority thereof, is shown not to be reasonably justifiable in a democratic society; ( *b* ) for the imposition of restrictions on the freedom of movement of any person who is not a citizen of Botswana; ( *c* ) for the imposition of restrictions on the entry into or residence within defined areas of Botswana of persons who are not Bushmen to the extent that such restrictions are reasonably required for the protection or well-being of Bushmen; ( *d* ) for the imposition of restrictions upon the movement or residence within Botswana of public officers; or ( *e* ) ....... (4) If any person whose freedom of movement has been restricted by order under such a provision as is referred to in subsection (3)( *a* ) of this section (other than a restriction which is applicable to persons generally or to general classes of persons) so requests at any time during the period of that restriction not earlier than six months after the order was made or six months after he or she last made such request, as the case may be, his or her case shall be reviewed by an independent and impartial tribunal presided over by a person, qualified to be enrolled as an advocate in Botswana, appointed by the Chief Justice. (5) On any review by a tribunal in pursuance of this section of the case of a person whose freedom of movement has been restricted, the tribunal may make recommendations, concerning the necessity or expediency of continuing the restriction to the authority by which it was ordered but, unless it is otherwise provided by law, that authority shall not be obliged to act in accordance with any such recommendations. **15. Protection from discrimination on the grounds of race, etc.** (1) Subject to the provisions of subsections (4), (5) and (7) of this section, no law shall make any provision that is discriminatory either of itself or in its effect. (2) Subject to the provisions of subsections (6), (7) and (8) of this section, no person shall be treated in a discriminatory manner by any person acting by virtue of any written law or in the performance of the functions of any public office or any public authority. (3) In this section, the expression \"discriminatory\" means affording different treatment to different persons, attributable wholly or mainly to their respective descriptions by race, tribe, place of origin, political opinions, colour, creed or sex whereby persons of one such description are subjected to disabilities or restrictions to which persons of another such description are not made subject or are accorded privileges or advantages which are not accorded to persons of another such description. (4) Subsection (1) of this section shall not apply to any law so far as that law makes provision- ( *a* ) for the appropriation of public revenues or other public funds; ( *b* ) with respect to persons who are not citizens of Botswana; ( *c* ) with respect to adoption, marriage, divorce, burial, devolution of property on death or other matters of personal law;", - "page_start": 12, - "page_end": 12, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "( *d* ) if he or she is elected as Speaker; ( *e* ) if he or she is removed from office by a resolution of the Assembly supported by the votes of not less than two-thirds of all the Members of the Assembly; or ( *f* ) when the Assembly first sits after any dissolution of Parliament. **61. Qualifications for election to National Assembly** Subject to the provisions of section 62 of this Constitution, a person shall be qualified to be elected as a Member of the National Assembly if, and shall not be qualified to be so elected unless- ( *a* ) he or she is a citizen of Botswana; ( *b* ) he or she has attained the age of 18 years; ( *c* ) he or she is qualified for registration as a voter for the purposes of the election of the Elected Members of the National Assembly and is so registered; and ( *d* ) he or she is able to speak, and, unless incapacitated by blindness or other physical cause, to read English well enough to take an active part in the proceedings of the Assembly. **62. Disqualifications for membership of National Assembly** (1) No person shall be qualified to be elected as a Member of the National Assembly who- ( *a* ) is, by virtue of his or her own act, under any acknowledgement of allegiance, obedience or adherence to a foreign power or state; ( *b* ) has been declared insolvent or adjudged or otherwise declared bankrupt under any law for the time being in force in Botswana and has not been discharged, or has made a composition with his or her creditors and has not paid his or her debts in full; ( *c* ) is certified to be insane or otherwise adjudged or declared to be of unsound mind under any law for the time being in force in Botswana; ( *d* ) is a Member of the *Ntlo ya Dikgosi* ; ( *e* ) subject to such exceptions as may be prescribed by Parliament, holds any public office, or is acting in any public office by virtue of a contract of service expressed to continue for a period exceeding six months; ( *f* ) is under sentence of death imposed on him or her by a court in any part of the Commonwealth, or is under a sentence of imprisonment (by whatever name called) exceeding six months imposed on him or her by such a court or substituted by competent authority for some other sentence imposed on him or her by such a court; ( *g* ) holds, or is acting in, any office the functions of which involve any responsibility for, or in connection with, the conduct of any elections to the Assembly or the compilation or revision of any electoral register for the purposes of such elections. (2) Parliament may provide that a person shall not be qualified for election to the National Assembly for such period (not exceeding five years) as may be prescribed if he or she is convicted of any such offence connected with elections to the Assembly as may be prescribed. (3) For the purposes of this section two or more terms of imprisonment that are required to be served consecutively shall be regarded as a single term of imprisonment for the aggregate period of those terms, and no account shall be taken of a sentence of imprisonment imposed as an alternative to or in default of the payment of a fine. **63. Constituencies** Botswana shall be divided into as many constituencies as there are Elected Members of the National Assembly and each of those constituencies shall return one Member to the National Assembly.", - "page_start": 27, - "page_end": 27, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "for his or her education or welfare during any period ending not later than the date when he or she attains the age of 18 years; ( *g* ) for the purpose of preventing the spread of an infectious or contagious disease; ( *h* ) in the case of a person who is, or is reasonably suspected to be, of unsound mind, addicted to drugs or alcohol, or a vagrant, for the purpose of his or her care or treatment or the protection of the community; ( *i* ) for the purpose of preventing the unlawful entry of that person into Botswana, or for the purpose of effecting the expulsion, extradition or other lawful removal of that person from Botswana, or for the purpose of restricting that person while he or she is being conveyed through Botswana in the course of his or her extradition or removal as a convicted prisoner from one country to another; ( *j* ) to such extent as may be necessary in the execution of a lawful order requiring that person to remain within a specified area within Botswana or prohibiting him or her from being within such an area, or to such extent as may be reasonably justifiable for the taking of proceedings against that person relating to the making of any such order, or to such extent as may be reasonably justifiable for restraining that person during any visit that he or she is permitted to make to any part of Botswana in which, in consequence of any such order, his or her presence would otherwise be unlawful; or ( *k* ) for the purpose of ensuring the safety of aircraft in flight. (2) Any person who is arrested or detained shall be informed as soon as reasonably practicable, in a language that he or she understands, of the reasons for his or her arrest or detention. (3) Any person who is arrested or detained- ( *a* ) for the purpose of bringing him or her before a court in execution of the order of a court; or ( *b* ) upon reasonable suspicion of his or her having committed, or being about to commit, a criminal offence under the law in force in Botswana, and who is not released, shall be brought as soon as is reasonably practicable before a court; and if any person arrested or detained as mentioned in paragraph ( *b* ) of this subsection is not tried within a reasonable time, then, without prejudice to any further proceedings that may be brought against him or her, he or she shall be released either unconditionally or upon reasonable conditions, including in particular such conditions as are reasonably necessary to ensure that he or she appears at a later date for trial or for proceedings preliminary to trial. (4) Any person who is unlawfully arrested or detained by any other person shall be entitled to compensation therefor from that other person. **6. Protection from slavery and forced labour** (1) No person shall be held in slavery or servitude. (2) No person shall be required to perform forced labour. (3) For the purposes of this section, the expression \"forced labour\" does not include- ( *a* ) any labour required in consequence of the sentence or order of a court; ( *b* ) labour required of any person while he or she is lawfully detained that, though not required in consequence of the sentence or order of a court, is reasonably necessary in the interests of hygiene or for the maintenance of the place at which he or she is detained; ( *c* ) any labour required of a member of a disciplined force in pursuance of his or her duties as such or, in the case of a person who has conscientious objections to service as a member of a naval, military or air force, any labour that that person is required by law to perform in place of such service;", - "page_start": 5, - "page_end": 5, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**32. Election of President after dissolution of Parliament** (1) Whenever Parliament is dissolved an election shall be held to the office of President in such manner as is prescribed by this section and, subject thereto, by or under an Act of Parliament. (2) Nominations in the election of a President shall be delivered to the returning officer on such day and at such time as may be prescribed by or under any law for the time being in force in Botswana; the nomination of a candidate in an election of a President shall not be valid unless it is supported, in such manner as may be prescribed by or under an Act of Parliament, by not less than 1000 persons registered as voters for the purpose of elections to the Assembly. (3) The following provisions shall then apply- ( *a* ) a person nominated as a Parliamentary candidate may, at the time of his or her nomination and subject to the provisions of paragraph ( *b* ), declare in such manner as may be prescribed by or under an Act of Parliament which of the candidates in the election of President he or she supports, but the nomination of a Parliamentary candidate shall be valid notwithstanding that the nomination paper does not contain such a declaration; ( *b* ) such a declaration shall not be made in relation to any Presidential candidate unless that candidate has signified, in such manner as may be prescribed by or under an Act of Parliament, his or her consent to the making of a declaration in his or her favour by that Parliamentary candidate; ( *c* ) where the Parliamentary election is contested in any constituency a poll shall be taken in that constituency at which the votes shall be given by ballot, and for the purposes of that poll any Parliamentary candidate who declared support in accordance with paragraph ( *a* ) for a particular Presidential candidate shall use the same voting colour and symbol, if any, as may have been allocated under any law for the time being in force in Botswana to that Presidential candidate for the purposes of the Presidential election; ( *d* ) the returning officer shall declare to be elected as President any candidate for whom support has been declared in accordance with paragraph ( *a* ) above by not less than such number of persons elected as Members of the National Assembly in the Parliamentary election as corresponds to more than half the total number of seats for Elected Members in the Assembly, and if there is no such person the returning officer shall declare that no candidate has been elected. (4) Parliament may make provision whereby the time for nominating Presidential candidates may be extended in the event of there being no qualified candidate nominated at the expiration of the time for the delivery of such nominations. (5) Where, at the expiration of the time for the delivery of nominations in the election of a President, more than one qualified candidate is validly nominated and any of those candidates dies before the commencement of the poll in the Parliamentary election, the poll in the Parliamentary election shall be countermanded, fresh nominations of Parliamentary candidates shall take place in every constituency and a fresh election of a President shall be held in accordance with the foregoing provisions of this section. (6) Where- ( *a* ) any candidate in an election of a President dies during the period commencing with the taking of the poll in the Parliamentary election and ending when the result of the election has been ascertained and that candidate would, but for his or her death, have been entitled to have been declared elected as President under subsection (3) of this section; or", - "page_start": 16, - "page_end": 16, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "person or authority. (3) Nothing in this section shall prevent Parliament from conferring functions on persons or authorities other than the President. **48. Command of armed forces** (1) The supreme command of the armed forces of the Republic shall vest in the President and he or she shall hold the office of Commander in Chief. (2) The powers conferred on the President by subsection (1) of this section shall include- ( *a* ) the power to determine the operational use of the armed forces; ( *b* ) the power to appoint members of the armed forces, to make appointments on promotion to any office in the armed forces and to dismiss any member of the armed forces. (3) The President may, by directions in writing and subject to such conditions as he or she may think fit, delegate to any member of the armed forces any of the powers mentioned in subsection (2) of this section. (4) Parliament may regulate the exercise of the powers conferred by or under this section. **49. Functions of Vice-President** The Vice-President shall be the principal assistant of the President in the discharge of his or her executive functions and shall be responsible, under the directions of the President, for such business of the government of Botswana (including the administration of any department of Government) as the President may assign to him or her. **50. Functions of Cabinet Ministers and Assistant Ministers** (1) The Cabinet shall be responsible for advising the President with respect to the policy of the Government and with respect to such other matters as may be referred to it by the President and shall, subject to the provisions of this Constitution, be responsible to the National Assembly for all things done by or under the authority of the President, Vice-President or any Minister in the execution of his or her office. (2) The President shall, so far as practicable and subject to the provisions of this Constitution, consult the Cabinet on matters of policy and the exercise of his or her functions. (3) The obligation of the President to consult his or her Cabinet and for the Cabinet to accept responsibility under this section shall not apply to the exercise by the President of his or her powers in relation to the appointment or removal of the Vice- President, Ministers and Assistant Ministers, the dissolution of Parliament, the Prerogative of Mercy, the assignment of responsibility to the Vice-President or any Minister and the specification of the functions of an Assistant Minister. (4) A Minister shall be responsible, under the direction of the President, for such business of the government of Botswana (including the administration of any department of Government) as the President may assign to him or her. (5) An Assistant Minister shall- ( *a* ) assist the President or the Vice-President in the discharge of such of the functions of the office of President or Vice-President as the President may specify; or ( *b* ) assist such Minister in the discharge of the functions assigned to him or her under subsection (4) of this section as the President may specify. **51. Attorney-General** (1) There shall be an Attorney-General appointed by the President whose office shall be a public office. (2) A person shall not be qualified to be appointed to the Office of Attorney-", - "page_start": 23, - "page_end": 23, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "discharging the functions of his or her office and the infirmity is of such a nature that the President is unable to authorize another person under this section to perform the functions of his or her office; or ( *b* ) the Vice-President is by reason of physical or mental infirmity unable to discharge the functions of his or her office, shall, in respect of any period for which it is in force, be conclusive and shall not be questioned in any court: Provided that any such certificate as is referred to in paragraph ( *a* ) of this subsection shall cease to have effect if the President notifies any person under subsection (4) of this section that he or she is about to resume the functions of the office of President. **37. Oath of President** A person assuming the office of President shall, before entering upon the duties of that office, take and subscribe such oaths as may be prescribed by Parliament. **38. Returning officer at elections of President** (1) The Chief Justice shall be the returning officer for the purposes of elections to the office of President. (2) Any question which may arise as to whether- ( *a* ) any provision of this Constitution or any law relating to the election of a President under section 32 or 35 of this Constitution has been complied with; or ( *b* ) any person has been validly elected as President under those sections, shall be referred to and determined by the returning officer whose decision shall not be questioned in any court. **39. Vice President** (1) There shall be a Vice-President who shall be appointed by the President from among the Elected Members of the National Assembly who are citizens of Botswana by birth or descent, which appointment shall be endorsed by the said Elected Members. (2) The Vice-President shall continue in office until a person elected at the next election of President under section 32 or 35 of this Constitution assumes office: Provided that the office of Vice-President shall become vacant- (i) if the appointment of the holder of the office is revoked by the President; or (ii) if the holder of the office ceases to be a Member of the National Assembly for any other reason than a dissolution of Parliament. (3) The Vice-President shall not enter upon the duties of his or her office unless he or she has taken and subscribed the oath of allegiance and such oath for the due execution of his or her office as may be prescribed by Parliament. (4) If the Vice-President is absent from Botswana or is incapable by reason of illness or any other cause of discharging the functions of his or her office, the President may appoint a person, from among the Members of the Assembly, to perform the functions of the office of Vice-President and any person so appointed may discharge those functions accordingly: Provided that a person appointed under this subsection shall cease to perform the functions of the office of Vice-President- (i) if his or her appointment is revoked by the President; (ii) if he or she ceases to be a Member of the Assembly otherwise than by reason of a dissolution of Parliament; (iii) upon the assumption by any person of the office of President; or (iv) upon the President giving him or her notice that the Vice-President is about to resume his or her functions. (5) Where the Vice-President is performing the functions of the office of President in accordance with section 35 or 36 of this Constitution he or she may appoint a person,", - "page_start": 20, - "page_end": 20, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "provisions of sections 3 to 16 (inclusive) of this Constitution. (3) If in any proceedings in any subordinate court any question arises as to the contravention of any of the provisions of sections 3 to 16 (inclusive) of this Constitution, the person presiding in that court may, and shall if any party to the proceedings so requests, refer the question to the High Court unless, in his or her opinion, the raising of the question is merely frivolous or vexatious. (4) Parliament may confer upon the High Court such powers in addition to those conferred by this section as may appear to be necessary or desirable for the purpose of enabling that court more effectively to exercise the jurisdiction conferred upon it by this section. (5) Rules of court making provision with respect to the practice and procedure of the High Court for the purposes of this section may be made by the person or authority for the time being having power to make rules of court with respect to the practice and procedure of that court generally. **19. Interpretation and savings** (1) In this Chapter, unless the context otherwise requires- **\"court\"** means any court of law having jurisdiction in Botswana other than a court established by a disciplinary law, and in sections 4 and 6 of this Constitution a court established by a disciplinary law; **\"disciplinary law\"** means a law regulating the discipline of any disciplined force; **\"disciplined force\"** means- ( *a* ) a naval, military or air force; ( *b* ) a police force; or ( *c* ) a prison service; **\"legal representative\"** means a person entitled to practise in Botswana as an advocate or attorney; **\"member\"** , in relation to a disciplined force, includes any person who, under the law regulating the discipline of that force, is subject to that discipline. (2) In relation to any person who is a member of a disciplined force raised under an Act of Parliament, nothing contained in or done under the authority of the disciplinary law of that force shall be held to be inconsistent with or in contravention of any of the provisions of this Chapter other than sections 4, 6 and 7. (3) In relation to any person who is a member of a disciplined force raised otherwise than as aforesaid and lawfully present in Botswana, nothing contained in or done under the authority of the disciplinary law of that force shall be held to be inconsistent with or in contravention of any of the provisions of this Chapter. **CHAPTER III** * **Citizenship** * **(ss 20-29: repealed) 20 to 29 inclusive. [** * **Repealed.** * **] CHAPTER IV** * **The Executive** * **(ss 30-56) PART I** * **The President and the Vice-President** * **(ss 30-41) 30. Office of President** There shall be a President of the Republic of Botswana who shall be the Head of State. **31. First President** (1) The first President shall be the person who immediately before 30th September, 1966 holds the office of Prime Minister under the Constitution. (2) The first President shall be deemed to have assumed office at the coming into operation of this Constitution.", - "page_start": 15, - "page_end": 15, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**CONSTITUTION OF BOTSWANA** ARRANGEMENT OF SECTIONS CHAPTER I The Republic 1. Declaration of Republic 2. Public Seal\n\nCHAPTER II Protection of Fundamental Rights and Freedoms of the Individual 3. Fundamental rights and freedoms of the individual 4. Protection of right to life 5. Protection of right to personal liberty 6. Protection from slavery and forced labour 7. Protection from inhuman treatment 8. Protection from deprivation of property 9. Protection for privacy of home and other property 10. Provisions to secure protection of law 11. Protection of freedom of conscience 12. Protection of freedom of expression 13. Protection of freedom of assembly and association 14. Protection of freedom of movement 15. Protection from discrimination on the grounds of race, etc. 16. Derogation from fundamental rights and freedoms 17. Declarations relating to emergencies 18. Enforcement of protective provisions 19. Interpretation and savings\n\nCHAPTER III Citizenship 20 to 29. ...... CHAPTER IV The Executive PART I *The President and the Vice-President* 30. Office of President 31. First President 32. Election of President after dissolution of Parliament 33. Qualification for election as President 34. Tenure of office of President 35. Vacancy in office of President 36. Discharge of functions of President during absence, illness, etc. 37. Oath of President 38. Returning officer at elections of President 39. Vice-President 40. Salary and allowances of President 41. Protection of President in respect of legal proceedings\n\nPART II *The Cabinet* 42. Ministers and Assistant Ministers 43. Tenure of office of Ministers and Assistant Ministers 44. Cabinet 45. Oaths to be taken by Ministers and Assistant Ministers 46. Secretary to the Cabinet", - "page_start": 0, - "page_end": 0, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "citizenship in force at that time, shall be regarded as a citizen by descent. **34. Tenure of office of President** (1) The President shall, subject to the provisions of this section, hold office for an aggregate period not exceeding 10 years beginning from the date of his or her first assumption of office of President after the commencement of this Act. (2) The President shall cease to hold the office of President if at any time during his or her tenure of office any circumstances arise that would, if he or she were not a member of the National Assembly, cause him or her to be disqualified for election thereto. (3) The President shall cease to hold office of President at the expiry of the period prescribed under subsection (1) of this section, or when the person elected at the next election of President following a dissolution of Parliament assumes office. **35. Vacancy in office of President** (1) Whenever the President dies, resigns or ceases to hold office, the Vice- President shall assume office as President with effect from the date of the death, resignation or ceasing to be President. (2) If the office of President- ( *a* ) becomes vacant in circumstances in which there is no Vice-President; or ( *b* ) is vacant whilst the Vice-President is absent from Botswana or is, by reason of physical or mental infirmity unable to perform the functions of his or her office, the functions of the office of President shall, until such time as a new President assumes office in accordance with this section or section 32 of this Constitution, be performed by such Minister as the Cabinet shall appoint. For the purposes of this subsection, a certificate of the Chief Justice that the Vice-President is by reason of physical or mental infirmity unable to discharge the functions of his or her office, shall, in respect of any period for which it is in force, be conclusive and shall not be questioned in any court. (3) Any person performing the functions of the office of President by virtue of subsection (1) or (2) of this section shall not exercise the power of the President to revoke the appointment of Vice-President or to dissolve Parliament. (4) If the office of President becomes vacant, the National Assembly shall, unless Parliament is dissolved, and notwithstanding that it may be prorogued, meet on the seventh day after the office of President becomes vacant, or on such earlier day as may be appointed by the Speaker, and shall elect a person to the office in such manner as is prescribed by the next following subsection and, subject thereto, by or under an Act of Parliament. (5) In an election of a President under this section- ( *a* ) the Speaker shall preside at the meeting and conduct the election; ( *b* ) a person may be a candidate if and shall not be a candidate unless he or she has been nominated as a candidate with his or her consent prior to the sitting of the National Assembly at which the election takes place, by not less than 10 Members of the National Assembly entitled to vote in that election; ( *c* ) at the election every Member of the Assembly except the Speaker shall be entitled to vote; ( *d* ) the votes of the Members of the Assembly who are entitled to vote shall be given by ballot in such manner as not to disclose how any particular Member voted, and any person who receives the votes of more than one half of the total number of persons entitled to vote shall be declared elected as President; ( *e* ) a person elected as President under this section shall assume the office of President on the day upon which he or she is declared to be elected; ( *f* ) not more than three ballots shall be taken unless in the opinion of the Speaker the holding of further ballots is likely to result in the election of a President, in", - "page_start": 18, - "page_end": 18, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "has more than one residence in Botswana in the constituency in which he or she has his or her principal residence; or ( *b* ) in the case of a person who does not have a residence in Botswana but is able to register in person, in the constituency in which he or she last resided, or in which he or she was born; or ( *c* ) in the case of a person who is not resident in Botswana and is unable to register in person, at such place as may be prescribed by Parliament and registration at such place shall be treated as registration in the constituency in which he or she last resided, or in which he or she was born in Botswana. (4) A person shall be entitled to be registered as a voter in one constituency only. (5) Every person who is registered in any constituency as a voter for the purposes of elections of the Elected Members of the National Assembly shall, unless he or she is disqualified by Parliament from voting in such elections on the grounds of his or her having been convicted of an offence in connection with the elections or on the grounds of his or her having been reported guilty of such an offence by the court trying an election petition or on the grounds of his or her being in lawful custody at the date of the election, be entitled so to vote in that constituency in accordance with the provisions made by or under a law in that behalf; and no other person may so vote. **68. Tenure of office of Members** (1) The seat of an Elected Member or a Specially Elected Member of the National Assembly shall become vacant- ( *a* ) upon the dissolution of Parliament; ( *b* ) if he or she is absent from the sittings of the Assembly for such period and in such circumstances as may be prescribed in the rules of procedure of the Assembly; ( *c* ) subject to the provisions of subsections (2) to (3) of this section, if any circumstances arise that, if he or she were not a Member of the Assembly, would cause him or her to be disqualified for election thereto. (2) If circumstances such as are referred to in paragraph ( *c* ) of the preceding subsection arise in relation to a Member of the Assembly by virtue of the fact that he or she is declared insolvent, adjudged to be of unsound mind, sentenced to death or imprisonment, or convicted of an election offence and it is open to the Member to appeal against the decision (either with the leave of the court or other authority or without such leave), he or she shall forthwith cease to perform his or her functions as a Member of the Assembly but, subject to the next following subsection, he or she shall not vacate his or her seat until the expiration of a period of 30 days thereafter: Provided that the Speaker may, at the request of the Member, from time to time extend that period for further periods of 30 days to enable the Member to pursue an appeal against the decision, so, however, that extensions of time exceeding in the aggregate 150 days shall not be given without the approval of the Assembly signified by resolution. (3) If, on the determination of any appeal, such circumstances continue to exist and no further appeal is open to the Member of the Assembly, or if, by reason of the expiration of any period for entering an appeal or notice thereof or the refusal of leave to appeal or for any other reason, it ceases to be open to the Member to appeal, he or she shall forthwith vacate his or her seat. (4) If at any time before the Member of the Assembly vacates his or her seat such circumstances as aforesaid cease to exist, his or her seat shall not become vacant by reason of those circumstances, and he or she may resume the performance of his or her functions as a Member of the Assembly. **69. Determination of questions as to membership of National Assembly**", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "Botswana-constitution.pdf", - "query": "What is the condition to be allowing to access the position of Director of public prosecution in Botswana ?", - "target_page": 25, - "target_passage": "A person shall not be qualified to be appointed to the Office of Director of Public Prosecutions unless he or she is qualified to be appointed to the Office of a Judge of the High Court", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "for his or her education or welfare during any period ending not later than the date when he or she attains the age of 18 years; ( *g* ) for the purpose of preventing the spread of an infectious or contagious disease; ( *h* ) in the case of a person who is, or is reasonably suspected to be, of unsound mind, addicted to drugs or alcohol, or a vagrant, for the purpose of his or her care or treatment or the protection of the community; ( *i* ) for the purpose of preventing the unlawful entry of that person into Botswana, or for the purpose of effecting the expulsion, extradition or other lawful removal of that person from Botswana, or for the purpose of restricting that person while he or she is being conveyed through Botswana in the course of his or her extradition or removal as a convicted prisoner from one country to another; ( *j* ) to such extent as may be necessary in the execution of a lawful order requiring that person to remain within a specified area within Botswana or prohibiting him or her from being within such an area, or to such extent as may be reasonably justifiable for the taking of proceedings against that person relating to the making of any such order, or to such extent as may be reasonably justifiable for restraining that person during any visit that he or she is permitted to make to any part of Botswana in which, in consequence of any such order, his or her presence would otherwise be unlawful; or ( *k* ) for the purpose of ensuring the safety of aircraft in flight. (2) Any person who is arrested or detained shall be informed as soon as reasonably practicable, in a language that he or she understands, of the reasons for his or her arrest or detention. (3) Any person who is arrested or detained- ( *a* ) for the purpose of bringing him or her before a court in execution of the order of a court; or ( *b* ) upon reasonable suspicion of his or her having committed, or being about to commit, a criminal offence under the law in force in Botswana, and who is not released, shall be brought as soon as is reasonably practicable before a court; and if any person arrested or detained as mentioned in paragraph ( *b* ) of this subsection is not tried within a reasonable time, then, without prejudice to any further proceedings that may be brought against him or her, he or she shall be released either unconditionally or upon reasonable conditions, including in particular such conditions as are reasonably necessary to ensure that he or she appears at a later date for trial or for proceedings preliminary to trial. (4) Any person who is unlawfully arrested or detained by any other person shall be entitled to compensation therefor from that other person. **6. Protection from slavery and forced labour** (1) No person shall be held in slavery or servitude. (2) No person shall be required to perform forced labour. (3) For the purposes of this section, the expression \"forced labour\" does not include- ( *a* ) any labour required in consequence of the sentence or order of a court; ( *b* ) labour required of any person while he or she is lawfully detained that, though not required in consequence of the sentence or order of a court, is reasonably necessary in the interests of hygiene or for the maintenance of the place at which he or she is detained; ( *c* ) any labour required of a member of a disciplined force in pursuance of his or her duties as such or, in the case of a person who has conscientious objections to service as a member of a naval, military or air force, any labour that that person is required by law to perform in place of such service;", - "page_start": 5, - "page_end": 5, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**122. Remuneration of certain officers** (1) There shall be paid to the holders of the offices to which this section applies such salaries and such allowances as may be prescribed by Parliament. (2) The salaries and any allowances payable to the holders of the offices to which this section applies shall be a charge on the Consolidated Fund. (3) The salary payable to the holder of any office to which this section applies and his or her terms of office, other than allowances, shall not be altered to his or her disadvantage after his or her appointment. (4) Where a person's salary or terms of office depend upon his or her option, the salary or terms for which he or she opts shall, for the purposes of subsection (3) of this section, be deemed to be more advantageous to him or her than any others for which he or she might have opted. (5) This section applies to the offices of judge of the Court of Appeal, judge of the High Court, member of the Public Service Commission, member of the Judicial Service Commission, member of the Delimitation Commission, Auditor-General, Director of Public Prosecutions and Attorney-General. **123. Public debt** (1) There shall be charged on the Consolidated Fund all debt charges for which Botswana is liable. (2) For the purposes of this section debt charges include interest, sinking fund charges, the repayment or amortization of debt, and all expenditure in connection with the raising of loans on the security of the revenues or the Consolidated Fund of the former Protectorate of Bechuanaland or Botswana, and the service and redemption of debt thereby created. **124. Auditor-General** (1) There shall be an Auditor-General, whose office shall be a public office. (2) The public accounts of Botswana and of all officers, courts and authorities of the Government of Botswana shall be audited and reported on by the Auditor-General and for that purpose the Auditor-General or any person authorized by him or her in that behalf shall have access to all books, records, reports and other documents relating to those accounts: Provided that, if it is so provided by Parliament in the case of any body corporate directly established by law, the accounts of that body corporate shall be audited and reported on by such person as may be specified by or under that law. (3) The Auditor-General shall submit his or her reports to the Minister responsible for finance, who shall cause them to be laid before the National Assembly. (4) The Auditor-General shall perform such other duties and exercise such other powers in relation to the accounts of the Government or the accounts of other public authorities or other bodies as may be prescribed by or under any Act of Parliament. (5) In the exercise of his or her functions the Auditor-General shall not be subject to the direction or control of any other person or authority. **CHAPTER IX** * **Miscellaneous** * **(ss 125-127) 125. Resignations** (1) Any person who is appointed or elected to any office established by this Constitution may resign from that office by writing under his or her hand addressed to the person or authority by whom he or she was appointed or elected: Provided that in the case of a person who holds office as President his or her resignation from that office shall be addressed to the Chief Justice, in the case of a person who holds office as Speaker or Deputy Speaker of the National Assembly his or her resignation from that office shall be addressed to the Assembly, in the case of an", - "page_start": 52, - "page_end": 52, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this section. (3) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) for the imposition of restrictions that are reasonably required in the interests of defence, public safety, public order, public morality or public health or the imposition of restrictions on the acquisition or use by any person of land or other property in Botswana and except so far as that provision or, as the case may be, the thing done under the authority thereof, is shown not to be reasonably justifiable in a democratic society; ( *b* ) for the imposition of restrictions on the freedom of movement of any person who is not a citizen of Botswana; ( *c* ) for the imposition of restrictions on the entry into or residence within defined areas of Botswana of persons who are not Bushmen to the extent that such restrictions are reasonably required for the protection or well-being of Bushmen; ( *d* ) for the imposition of restrictions upon the movement or residence within Botswana of public officers; or ( *e* ) ....... (4) If any person whose freedom of movement has been restricted by order under such a provision as is referred to in subsection (3)( *a* ) of this section (other than a restriction which is applicable to persons generally or to general classes of persons) so requests at any time during the period of that restriction not earlier than six months after the order was made or six months after he or she last made such request, as the case may be, his or her case shall be reviewed by an independent and impartial tribunal presided over by a person, qualified to be enrolled as an advocate in Botswana, appointed by the Chief Justice. (5) On any review by a tribunal in pursuance of this section of the case of a person whose freedom of movement has been restricted, the tribunal may make recommendations, concerning the necessity or expediency of continuing the restriction to the authority by which it was ordered but, unless it is otherwise provided by law, that authority shall not be obliged to act in accordance with any such recommendations. **15. Protection from discrimination on the grounds of race, etc.** (1) Subject to the provisions of subsections (4), (5) and (7) of this section, no law shall make any provision that is discriminatory either of itself or in its effect. (2) Subject to the provisions of subsections (6), (7) and (8) of this section, no person shall be treated in a discriminatory manner by any person acting by virtue of any written law or in the performance of the functions of any public office or any public authority. (3) In this section, the expression \"discriminatory\" means affording different treatment to different persons, attributable wholly or mainly to their respective descriptions by race, tribe, place of origin, political opinions, colour, creed or sex whereby persons of one such description are subjected to disabilities or restrictions to which persons of another such description are not made subject or are accorded privileges or advantages which are not accorded to persons of another such description. (4) Subsection (1) of this section shall not apply to any law so far as that law makes provision- ( *a* ) for the appropriation of public revenues or other public funds; ( *b* ) with respect to persons who are not citizens of Botswana; ( *c* ) with respect to adoption, marriage, divorce, burial, devolution of property on death or other matters of personal law;", - "page_start": 12, - "page_end": 12, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "holding or acting in such offices shall, subject to the provisions of sections 113 and 114 of this Constitution, vest in the President. (2) The offices to which this section applies are- ( *a* ) Ambassador, High Commissioner or other principal representative of Botswana in any other country or accredited to any international organisation; ( *b* ) Secretary to the Cabinet; ( *c* ) Attorney-General; ( *c* A) Director of Public Prosecutions; ( *d* ) Permanent Secretary; ( *e* ) Commissioner of Police; and ( *f* ) any other superscale office (other than an office to which this Constitution makes specific provision for appointment or an office to which appointment is made under the provisions of section 104 of this Constitution) which may be prescribed by Act of Parliament. **113. Tenure of office of Director of Public Prosecutions** (1) Subject to the provisions of this section, a person appointed as Director of Public Prosecutions shall hold office for a 5 year renewable term or until he or she attains the age of 60 years, whichever is the earlier. (2) A person holding the office of Director of Public Prosecutions may be removed from office only for inability to perform the functions of his or her office (whether arising from infirmity of body or mind or any other cause) or for misbehaviour or for incompetence and shall not be so removed except in accordance with the provisions of this section. (3) If the President considers that the question of removing a person holding the office of Director of Public Prosecutions from office ought to be investigated then- ( *a* ) he or she shall appoint a tribunal which shall consist of a Chairman and not less than two other members, who hold or have held high judicial office; and ( *b* ) the tribunal shall enquire into the matter and report on the facts thereof to the President and advise the President whether the person holding the office of Director of Public Prosecutions ought to be removed from office under this section for inability as aforesaid or for misbehaviour or for incompetence. (4) Where a tribunal appointed under subsection (3) of this section advises the President that a person holding the office of Director of Public Prosecutions ought to be removed from office for inability as aforesaid or for misbehaviour or for incompetence, the President shall remove such person from office. (5) If the question of removing a person holding the office of Director of Public Prosecutions from office has been referred to a tribunal under this section, the President may suspend that person from performing the functions of his or her office, and any such suspension may at any time be revoked by the President and shall in any case cease to have effect if the tribunal advises the President that the person ought not to be removed from office. **114. Tenure of office of Auditor-General** (1) Subject to the provisions of this section, a person holding the office of Auditor- General shall vacate his or her office when he or she attains the age of 60 years or such other age as may be prescribed by Parliament. (2) A person holding the office of Auditor-General may be removed from office only for inability to perform the functions of his or her office (whether arising from infirmity of body or mind or any other cause) or for misbehaviour and shall not be so removed except in accordance with the provisions of this section. (3) If the National Assembly resolves that the question of removing a person holding the office of Auditor-General from office under this section ought to be", - "page_start": 48, - "page_end": 48, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "General unless he or she is qualified to be appointed to the Office of a Judge of the High Court. (3) The Attorney-General shall be the principal legal adviser to the Government. (4) A person holding the Office of Attorney-General shall vacate his or her office when he or she attains the age of 60 years or such other age as may be prescribed by Parliament. **51A. Director of Public Prosecutions** (1) There shall be a Director of Public Prosecutions appointed by the President whose office shall be a public office and who shall be subject to the administrative supervision of the Attorney-General. (2) A person shall not be qualified to be appointed to the Office of Director of Public Prosecutions unless he or she is qualified to be appointed to the Office of a Judge of the High Court. (3) The Director of Public Prosecutions shall have power in any case in which he or she considers it desirable to do so- ( *a* ) to institute and undertake criminal proceedings against any person before any court (other than a court martial) in respect of any offence alleged to have been committed by that person; ( *b* ) to take over and continue any such criminal proceedings that have been instituted or undertaken by any other person or authority; and ( *c* ) to discontinue, at any stage before judgment is delivered, any such criminal proceedings instituted or undertaken by himself or herself or any other person or authority. (4) The powers of the Director of Public Prosecutions under subsection (3) may be exercised by him or her in person or by officers subordinate to him or her acting in accordance with his or her general or special authority. (5) For the purposes of this section any appeal from any judgment in any criminal proceedings before any court, or any case stated or question of law reserved for the purpose of any such proceedings, to any other court shall be deemed to be part of those proceedings: Provided that the power conferred on the Director of Public Prosecutions by subsection (3)( *c* ) of this section shall not be exercised in relation to any appeal by a person convicted in any criminal proceedings or to any case stated or question of law reserved at the instance of such person. (6) In the exercise of the functions vested in him or her by subsection (3) of this section the Director of Public Prosecutions shall not be subject to the direction or control of any other person or authority: Provided that- ( *a* ) where any other person or authority has instituted criminal proceedings, nothing in this subsection shall prevent the withdrawal of those proceedings by or at the instance of that person or authority, and with the leave of the court; and ( *b* ) before exercising his or her powers in relation to cases considered by the Attorney-General to be of national importance, the Director of Public Prosecutions shall consult the Attorney-General. **52. Permanent Secretaries** Where any Minister has been charged with responsibility for any department of Government, he or she shall exercise general direction and control over that department and, subject to such direction and control, the department shall be under the supervision of a Permanent Secretary whose office shall be a public office. **53. Prerogative of Mercy** The President may-", - "page_start": 24, - "page_end": 24, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "has more than one residence in Botswana in the constituency in which he or she has his or her principal residence; or ( *b* ) in the case of a person who does not have a residence in Botswana but is able to register in person, in the constituency in which he or she last resided, or in which he or she was born; or ( *c* ) in the case of a person who is not resident in Botswana and is unable to register in person, at such place as may be prescribed by Parliament and registration at such place shall be treated as registration in the constituency in which he or she last resided, or in which he or she was born in Botswana. (4) A person shall be entitled to be registered as a voter in one constituency only. (5) Every person who is registered in any constituency as a voter for the purposes of elections of the Elected Members of the National Assembly shall, unless he or she is disqualified by Parliament from voting in such elections on the grounds of his or her having been convicted of an offence in connection with the elections or on the grounds of his or her having been reported guilty of such an offence by the court trying an election petition or on the grounds of his or her being in lawful custody at the date of the election, be entitled so to vote in that constituency in accordance with the provisions made by or under a law in that behalf; and no other person may so vote. **68. Tenure of office of Members** (1) The seat of an Elected Member or a Specially Elected Member of the National Assembly shall become vacant- ( *a* ) upon the dissolution of Parliament; ( *b* ) if he or she is absent from the sittings of the Assembly for such period and in such circumstances as may be prescribed in the rules of procedure of the Assembly; ( *c* ) subject to the provisions of subsections (2) to (3) of this section, if any circumstances arise that, if he or she were not a Member of the Assembly, would cause him or her to be disqualified for election thereto. (2) If circumstances such as are referred to in paragraph ( *c* ) of the preceding subsection arise in relation to a Member of the Assembly by virtue of the fact that he or she is declared insolvent, adjudged to be of unsound mind, sentenced to death or imprisonment, or convicted of an election offence and it is open to the Member to appeal against the decision (either with the leave of the court or other authority or without such leave), he or she shall forthwith cease to perform his or her functions as a Member of the Assembly but, subject to the next following subsection, he or she shall not vacate his or her seat until the expiration of a period of 30 days thereafter: Provided that the Speaker may, at the request of the Member, from time to time extend that period for further periods of 30 days to enable the Member to pursue an appeal against the decision, so, however, that extensions of time exceeding in the aggregate 150 days shall not be given without the approval of the Assembly signified by resolution. (3) If, on the determination of any appeal, such circumstances continue to exist and no further appeal is open to the Member of the Assembly, or if, by reason of the expiration of any period for entering an appeal or notice thereof or the refusal of leave to appeal or for any other reason, it ceases to be open to the Member to appeal, he or she shall forthwith vacate his or her seat. (4) If at any time before the Member of the Assembly vacates his or her seat such circumstances as aforesaid cease to exist, his or her seat shall not become vacant by reason of those circumstances, and he or she may resume the performance of his or her functions as a Member of the Assembly. **69. Determination of questions as to membership of National Assembly**", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "( *d* ) if he or she is elected as Speaker; ( *e* ) if he or she is removed from office by a resolution of the Assembly supported by the votes of not less than two-thirds of all the Members of the Assembly; or ( *f* ) when the Assembly first sits after any dissolution of Parliament. **61. Qualifications for election to National Assembly** Subject to the provisions of section 62 of this Constitution, a person shall be qualified to be elected as a Member of the National Assembly if, and shall not be qualified to be so elected unless- ( *a* ) he or she is a citizen of Botswana; ( *b* ) he or she has attained the age of 18 years; ( *c* ) he or she is qualified for registration as a voter for the purposes of the election of the Elected Members of the National Assembly and is so registered; and ( *d* ) he or she is able to speak, and, unless incapacitated by blindness or other physical cause, to read English well enough to take an active part in the proceedings of the Assembly. **62. Disqualifications for membership of National Assembly** (1) No person shall be qualified to be elected as a Member of the National Assembly who- ( *a* ) is, by virtue of his or her own act, under any acknowledgement of allegiance, obedience or adherence to a foreign power or state; ( *b* ) has been declared insolvent or adjudged or otherwise declared bankrupt under any law for the time being in force in Botswana and has not been discharged, or has made a composition with his or her creditors and has not paid his or her debts in full; ( *c* ) is certified to be insane or otherwise adjudged or declared to be of unsound mind under any law for the time being in force in Botswana; ( *d* ) is a Member of the *Ntlo ya Dikgosi* ; ( *e* ) subject to such exceptions as may be prescribed by Parliament, holds any public office, or is acting in any public office by virtue of a contract of service expressed to continue for a period exceeding six months; ( *f* ) is under sentence of death imposed on him or her by a court in any part of the Commonwealth, or is under a sentence of imprisonment (by whatever name called) exceeding six months imposed on him or her by such a court or substituted by competent authority for some other sentence imposed on him or her by such a court; ( *g* ) holds, or is acting in, any office the functions of which involve any responsibility for, or in connection with, the conduct of any elections to the Assembly or the compilation or revision of any electoral register for the purposes of such elections. (2) Parliament may provide that a person shall not be qualified for election to the National Assembly for such period (not exceeding five years) as may be prescribed if he or she is convicted of any such offence connected with elections to the Assembly as may be prescribed. (3) For the purposes of this section two or more terms of imprisonment that are required to be served consecutively shall be regarded as a single term of imprisonment for the aggregate period of those terms, and no account shall be taken of a sentence of imprisonment imposed as an alternative to or in default of the payment of a fine. **63. Constituencies** Botswana shall be divided into as many constituencies as there are Elected Members of the National Assembly and each of those constituencies shall return one Member to the National Assembly.", - "page_start": 27, - "page_end": 27, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "(2) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) that is reasonably required in the interests of defence, public safety, public order, public morality, public health, town and country planning, the development and utilization of mineral resources, for the purpose of any census or in order to secure the development or utilization of any property for a purpose beneficial to the community; ( *b* ) that is reasonably required for the purpose of protecting the rights or freedoms of other persons; ( *c* ) that authorizes an officer or agent of the Government of Botswana, a local government authority or a body corporate established by law for a public purpose to enter on the premises of any person in order to inspect those premises or anything thereon for the purpose of any tax, rate or duty or in order to carry out work connected with any property that is lawfully on those premises and that belongs to that Government, authority or body corporate, as the case may be; or ( *d* ) that authorizes, for the purpose of enforcing the judgment or order of a court in any civil proceedings, the search of any person or property by order of a court or entry upon any premises by such order, and except so far as that provision or, as the case may be, anything done under the authority thereof is shown not to be reasonably justifiable in a democratic society. **10. Provisions to secure protection of law** (1) If any person is charged with a criminal offence, then, unless the charge is withdrawn, the case shall be afforded a fair hearing within a reasonable time by an independent and impartial court established or recognized by law. (2) Every person who is charged with a criminal offence- ( *a* ) shall be presumed to be innocent until he or she is proved or has pleaded guilty; ( *b* ) shall be informed as soon as reasonably practicable, in a language that he or she understands and in detail, of the nature of the offence charged; ( *c* ) shall be given adequate time and facilities for the preparation of his or her defence; ( *d* ) shall be permitted to defend himself or herself before the court in person or, at his or her own expense, by a legal representative of his or her own choice; ( *e* ) shall be afforded facilities to examine in person or by his or her legal representative the witnesses called by the prosecution before the court, and to obtain the attendance and carry out the examination of witnesses to testify on his or her behalf before the court on the same conditions as those applying to witnesses called by the prosecution; and ( *f* ) shall be permitted to have without payment the assistance of an interpreter if he or she cannot understand the language used at the trial of the charge, and except with his or her own consent the trial shall not take place in his or her absence unless he or she so conducts himself or herself as to render the continuance of the proceedings in his or her presence impracticable and the court has ordered him or her to be removed and the trial to proceed in his or her absence. (3) When a person is tried for any criminal offence, the accused person or any person authorized by him or her in that behalf shall, if he or she so requires and subject to payment of such reasonable fee as may be prescribed by law, be given within a reasonable time after judgment a copy for the use of the accused person of any record of the proceedings made by or on behalf of the court.", - "page_start": 8, - "page_end": 8, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "own procedure. (14) Except as may be otherwise provided in its rules or procedure, the Commission may act notwithstanding any vacancy in its membership or the absence of any member and its proceedings shall not be invalidated by the presence or participation of any person not entitled to be present at or to participate in those proceedings. (15) Any decision of the Commission shall require the concurrence of a majority of all the members thereof. (16) A member of the Commission shall not, during the tenure of his or her office or during the three years immediately following such tenure, be eligible for appointment to any public office other than that of Ambassador, High Commissioner or other principal representative of Botswana in any other country or accredited to any international organization. **110. Appointment, etc., of public officers** (1) Subject to the provisions of this section and of sections 111, 113 and 114 of this Constitution, power to appoint persons to hold or to act in any office in the public service, to exercise disciplinary control over persons holding or acting in such offices and to remove from such offices shall vest in such person or persons as may be prescribed by Act of Parliament. (2) The provisions of this section shall not apply in relation to the following offices, that is to say- ( *a* ) the office of judge of the Court of Appeal or of the High Court; ( *b* ) any office to which section 104 or 112 of the Constitution applies. (3) Before any person or persons as may have been prescribed under the provisions of subsection (1) exercise power to appoint to or to act in any public office any person who holds or is acting in any office the power to make appointments to which is vested by this Constitution in the President acting in accordance with the advice of the Judicial Service Commission such person shall consult with the Judicial Service Commission. **111. Appeals to President** (1) Any person other than a member of the Botswana Police Force or the Prison Service who has been removed from office or subjected to any other punishment by the exercise of any powers conferred on any person under the provisions of section 110 of this Constitution may appeal to the Public Service Commission who may dismiss such appeal or allow it wholly or in part. (2) Subject to the provisions of subsection (3) every decision of the Public Service Commission under the provisions of this section shall be final. (3) Notwithstanding anything contained in subsection (2) if the Public Service Commission dismisses an appeal or allows it in part only the person who appealed may appeal to the President. (4) If any person appeals to the President in accordance with the provisions of subsection (3) of this section the President shall either dismiss the appeal or shall order that it be heard by a tribunal appointed by the President, the Chairman of which shall be a person who holds or has held high judicial office or is qualified to be appointed as a judge of the High Court. (5) If the President appoints a tribunal to hear an appeal in accordance with subsection (4) of this section the tribunal shall hear the appeal and shall advise the President whether or not the appeal should be allowed either wholly or in part, and the President shall act in accordance with that advice. **112. Powers of President in relation to certain public offices** (1) The power to appoint a person to hold or act in offices to which this section applies and to remove from office and to exercise disciplinary control over persons", - "page_start": 47, - "page_end": 47, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "( *d* ) the Industrial Court. (2) In this Constitution, unless the context otherwise requires, references to offices in the public service shall be construed as including references to the offices of judges of the Court of Appeal and judges of the High Court and the offices of members of all subordinate courts (being offices the emoluments attaching to which, or any part of the emoluments attaching to which, are paid directly out of moneys provided by Parliament). (3) For the purposes of this Constitution a person shall not be considered to be a public officer by reason only that he or she is in receipt of any remuneration or allowance as the President, Vice-President, a Minister or Assistant Minister, Speaker, Deputy Speaker or Member of the Assembly, a Member of the *Ntlo ya Dikgosi* or a member of any Commission established by this Constitution. (4) For the purposes of this Constitution, a person shall not be considered as holding a public office by reason only of the fact that he or she is in receipt of a pension or other like allowance in respect of service under the Government of Botswana or the former Protectorate of Bechuanaland. (5) In this Constitution, unless the context otherwise requires, a reference to the holder of an office by the term designating his or her office shall be construed as including a reference to any person for the time being lawfully acting in or performing the functions of that office: Provided that nothing in this subsection shall apply to references to the President or Vice-President in section 35, 36 or 39 of this Constitution. (6) In this Constitution, unless it is otherwise provided or required by the context, a reference to the power to make appointments to any office shall be construed as including a reference to the power to make appointments on promotion and transfer and to confirm appointments and to the power to appoint a person to act in or perform the functions of that office at any time when the office is vacant or the holder thereof is unable (whether by reason of absence or infirmity of mind or body or any other cause) to perform the functions of that office. (7) References in this Constitution to the power to remove a public officer from his or her office shall be construed as including references to any power conferred by any law to require or permit that officer to retire from the public service: Provided that nothing in this subsection shall be construed as conferring on any person or authority power to require a judge of the Court of Appeal or the High Court, the Auditor-General or the Director of Public Prosecutions to retire from the public service. (8) Any provision in this Constitution that vests in any person or authority power to remove any public officer from his or her office shall be without prejudice to the power of any person or authority to abolish any office or to any law providing for the compulsory retirement of public officers generally or in any class of public officer on attaining an age specified therein. (9) Where power is vested by this Constitution in any person or authority to appoint any person to act in or perform the functions of any office if the holder thereof is himself unable to perform those functions, no such appointment shall be called in question on the ground that the holder of the office was not unable to perform those functions. (10) No provision of this Constitution that any person or authority shall not be subject to the direction or control of any other person or authority in the exercise of any functions under this Constitution shall be construed as precluding a court of law from exercising jurisdiction in relation to any question whether that person or authority has performed those functions in accordance with this Constitution or any other law. (11) Where any power is conferred by this Constitution to make any Act, order,", - "page_start": 54, - "page_end": 54, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "Botswana-constitution.pdf", - "query": "What are considered \"disciplined force\" according to Botswana constitution ?", - "target_page": 16, - "target_passage": "\"disciplined force\" means- (a) a naval, military or air force; (b) a police force; or (c) a prison service", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "provisions of sections 3 to 16 (inclusive) of this Constitution. (3) If in any proceedings in any subordinate court any question arises as to the contravention of any of the provisions of sections 3 to 16 (inclusive) of this Constitution, the person presiding in that court may, and shall if any party to the proceedings so requests, refer the question to the High Court unless, in his or her opinion, the raising of the question is merely frivolous or vexatious. (4) Parliament may confer upon the High Court such powers in addition to those conferred by this section as may appear to be necessary or desirable for the purpose of enabling that court more effectively to exercise the jurisdiction conferred upon it by this section. (5) Rules of court making provision with respect to the practice and procedure of the High Court for the purposes of this section may be made by the person or authority for the time being having power to make rules of court with respect to the practice and procedure of that court generally. **19. Interpretation and savings** (1) In this Chapter, unless the context otherwise requires- **\"court\"** means any court of law having jurisdiction in Botswana other than a court established by a disciplinary law, and in sections 4 and 6 of this Constitution a court established by a disciplinary law; **\"disciplinary law\"** means a law regulating the discipline of any disciplined force; **\"disciplined force\"** means- ( *a* ) a naval, military or air force; ( *b* ) a police force; or ( *c* ) a prison service; **\"legal representative\"** means a person entitled to practise in Botswana as an advocate or attorney; **\"member\"** , in relation to a disciplined force, includes any person who, under the law regulating the discipline of that force, is subject to that discipline. (2) In relation to any person who is a member of a disciplined force raised under an Act of Parliament, nothing contained in or done under the authority of the disciplinary law of that force shall be held to be inconsistent with or in contravention of any of the provisions of this Chapter other than sections 4, 6 and 7. (3) In relation to any person who is a member of a disciplined force raised otherwise than as aforesaid and lawfully present in Botswana, nothing contained in or done under the authority of the disciplinary law of that force shall be held to be inconsistent with or in contravention of any of the provisions of this Chapter. **CHAPTER III** * **Citizenship** * **(ss 20-29: repealed) 20 to 29 inclusive. [** * **Repealed.** * **] CHAPTER IV** * **The Executive** * **(ss 30-56) PART I** * **The President and the Vice-President** * **(ss 30-41) 30. Office of President** There shall be a President of the Republic of Botswana who shall be the Head of State. **31. First President** (1) The first President shall be the person who immediately before 30th September, 1966 holds the office of Prime Minister under the Constitution. (2) The first President shall be deemed to have assumed office at the coming into operation of this Constitution.", - "page_start": 15, - "page_end": 15, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this section. (3) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) for the imposition of restrictions that are reasonably required in the interests of defence, public safety, public order, public morality or public health or the imposition of restrictions on the acquisition or use by any person of land or other property in Botswana and except so far as that provision or, as the case may be, the thing done under the authority thereof, is shown not to be reasonably justifiable in a democratic society; ( *b* ) for the imposition of restrictions on the freedom of movement of any person who is not a citizen of Botswana; ( *c* ) for the imposition of restrictions on the entry into or residence within defined areas of Botswana of persons who are not Bushmen to the extent that such restrictions are reasonably required for the protection or well-being of Bushmen; ( *d* ) for the imposition of restrictions upon the movement or residence within Botswana of public officers; or ( *e* ) ....... (4) If any person whose freedom of movement has been restricted by order under such a provision as is referred to in subsection (3)( *a* ) of this section (other than a restriction which is applicable to persons generally or to general classes of persons) so requests at any time during the period of that restriction not earlier than six months after the order was made or six months after he or she last made such request, as the case may be, his or her case shall be reviewed by an independent and impartial tribunal presided over by a person, qualified to be enrolled as an advocate in Botswana, appointed by the Chief Justice. (5) On any review by a tribunal in pursuance of this section of the case of a person whose freedom of movement has been restricted, the tribunal may make recommendations, concerning the necessity or expediency of continuing the restriction to the authority by which it was ordered but, unless it is otherwise provided by law, that authority shall not be obliged to act in accordance with any such recommendations. **15. Protection from discrimination on the grounds of race, etc.** (1) Subject to the provisions of subsections (4), (5) and (7) of this section, no law shall make any provision that is discriminatory either of itself or in its effect. (2) Subject to the provisions of subsections (6), (7) and (8) of this section, no person shall be treated in a discriminatory manner by any person acting by virtue of any written law or in the performance of the functions of any public office or any public authority. (3) In this section, the expression \"discriminatory\" means affording different treatment to different persons, attributable wholly or mainly to their respective descriptions by race, tribe, place of origin, political opinions, colour, creed or sex whereby persons of one such description are subjected to disabilities or restrictions to which persons of another such description are not made subject or are accorded privileges or advantages which are not accorded to persons of another such description. (4) Subsection (1) of this section shall not apply to any law so far as that law makes provision- ( *a* ) for the appropriation of public revenues or other public funds; ( *b* ) with respect to persons who are not citizens of Botswana; ( *c* ) with respect to adoption, marriage, divorce, burial, devolution of property on death or other matters of personal law;", - "page_start": 12, - "page_end": 12, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "( *d* ) if he or she is elected as Speaker; ( *e* ) if he or she is removed from office by a resolution of the Assembly supported by the votes of not less than two-thirds of all the Members of the Assembly; or ( *f* ) when the Assembly first sits after any dissolution of Parliament. **61. Qualifications for election to National Assembly** Subject to the provisions of section 62 of this Constitution, a person shall be qualified to be elected as a Member of the National Assembly if, and shall not be qualified to be so elected unless- ( *a* ) he or she is a citizen of Botswana; ( *b* ) he or she has attained the age of 18 years; ( *c* ) he or she is qualified for registration as a voter for the purposes of the election of the Elected Members of the National Assembly and is so registered; and ( *d* ) he or she is able to speak, and, unless incapacitated by blindness or other physical cause, to read English well enough to take an active part in the proceedings of the Assembly. **62. Disqualifications for membership of National Assembly** (1) No person shall be qualified to be elected as a Member of the National Assembly who- ( *a* ) is, by virtue of his or her own act, under any acknowledgement of allegiance, obedience or adherence to a foreign power or state; ( *b* ) has been declared insolvent or adjudged or otherwise declared bankrupt under any law for the time being in force in Botswana and has not been discharged, or has made a composition with his or her creditors and has not paid his or her debts in full; ( *c* ) is certified to be insane or otherwise adjudged or declared to be of unsound mind under any law for the time being in force in Botswana; ( *d* ) is a Member of the *Ntlo ya Dikgosi* ; ( *e* ) subject to such exceptions as may be prescribed by Parliament, holds any public office, or is acting in any public office by virtue of a contract of service expressed to continue for a period exceeding six months; ( *f* ) is under sentence of death imposed on him or her by a court in any part of the Commonwealth, or is under a sentence of imprisonment (by whatever name called) exceeding six months imposed on him or her by such a court or substituted by competent authority for some other sentence imposed on him or her by such a court; ( *g* ) holds, or is acting in, any office the functions of which involve any responsibility for, or in connection with, the conduct of any elections to the Assembly or the compilation or revision of any electoral register for the purposes of such elections. (2) Parliament may provide that a person shall not be qualified for election to the National Assembly for such period (not exceeding five years) as may be prescribed if he or she is convicted of any such offence connected with elections to the Assembly as may be prescribed. (3) For the purposes of this section two or more terms of imprisonment that are required to be served consecutively shall be regarded as a single term of imprisonment for the aggregate period of those terms, and no account shall be taken of a sentence of imprisonment imposed as an alternative to or in default of the payment of a fine. **63. Constituencies** Botswana shall be divided into as many constituencies as there are Elected Members of the National Assembly and each of those constituencies shall return one Member to the National Assembly.", - "page_start": 27, - "page_end": 27, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "for his or her education or welfare during any period ending not later than the date when he or she attains the age of 18 years; ( *g* ) for the purpose of preventing the spread of an infectious or contagious disease; ( *h* ) in the case of a person who is, or is reasonably suspected to be, of unsound mind, addicted to drugs or alcohol, or a vagrant, for the purpose of his or her care or treatment or the protection of the community; ( *i* ) for the purpose of preventing the unlawful entry of that person into Botswana, or for the purpose of effecting the expulsion, extradition or other lawful removal of that person from Botswana, or for the purpose of restricting that person while he or she is being conveyed through Botswana in the course of his or her extradition or removal as a convicted prisoner from one country to another; ( *j* ) to such extent as may be necessary in the execution of a lawful order requiring that person to remain within a specified area within Botswana or prohibiting him or her from being within such an area, or to such extent as may be reasonably justifiable for the taking of proceedings against that person relating to the making of any such order, or to such extent as may be reasonably justifiable for restraining that person during any visit that he or she is permitted to make to any part of Botswana in which, in consequence of any such order, his or her presence would otherwise be unlawful; or ( *k* ) for the purpose of ensuring the safety of aircraft in flight. (2) Any person who is arrested or detained shall be informed as soon as reasonably practicable, in a language that he or she understands, of the reasons for his or her arrest or detention. (3) Any person who is arrested or detained- ( *a* ) for the purpose of bringing him or her before a court in execution of the order of a court; or ( *b* ) upon reasonable suspicion of his or her having committed, or being about to commit, a criminal offence under the law in force in Botswana, and who is not released, shall be brought as soon as is reasonably practicable before a court; and if any person arrested or detained as mentioned in paragraph ( *b* ) of this subsection is not tried within a reasonable time, then, without prejudice to any further proceedings that may be brought against him or her, he or she shall be released either unconditionally or upon reasonable conditions, including in particular such conditions as are reasonably necessary to ensure that he or she appears at a later date for trial or for proceedings preliminary to trial. (4) Any person who is unlawfully arrested or detained by any other person shall be entitled to compensation therefor from that other person. **6. Protection from slavery and forced labour** (1) No person shall be held in slavery or servitude. (2) No person shall be required to perform forced labour. (3) For the purposes of this section, the expression \"forced labour\" does not include- ( *a* ) any labour required in consequence of the sentence or order of a court; ( *b* ) labour required of any person while he or she is lawfully detained that, though not required in consequence of the sentence or order of a court, is reasonably necessary in the interests of hygiene or for the maintenance of the place at which he or she is detained; ( *c* ) any labour required of a member of a disciplined force in pursuance of his or her duties as such or, in the case of a person who has conscientious objections to service as a member of a naval, military or air force, any labour that that person is required by law to perform in place of such service;", - "page_start": 5, - "page_end": 5, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**122. Remuneration of certain officers** (1) There shall be paid to the holders of the offices to which this section applies such salaries and such allowances as may be prescribed by Parliament. (2) The salaries and any allowances payable to the holders of the offices to which this section applies shall be a charge on the Consolidated Fund. (3) The salary payable to the holder of any office to which this section applies and his or her terms of office, other than allowances, shall not be altered to his or her disadvantage after his or her appointment. (4) Where a person's salary or terms of office depend upon his or her option, the salary or terms for which he or she opts shall, for the purposes of subsection (3) of this section, be deemed to be more advantageous to him or her than any others for which he or she might have opted. (5) This section applies to the offices of judge of the Court of Appeal, judge of the High Court, member of the Public Service Commission, member of the Judicial Service Commission, member of the Delimitation Commission, Auditor-General, Director of Public Prosecutions and Attorney-General. **123. Public debt** (1) There shall be charged on the Consolidated Fund all debt charges for which Botswana is liable. (2) For the purposes of this section debt charges include interest, sinking fund charges, the repayment or amortization of debt, and all expenditure in connection with the raising of loans on the security of the revenues or the Consolidated Fund of the former Protectorate of Bechuanaland or Botswana, and the service and redemption of debt thereby created. **124. Auditor-General** (1) There shall be an Auditor-General, whose office shall be a public office. (2) The public accounts of Botswana and of all officers, courts and authorities of the Government of Botswana shall be audited and reported on by the Auditor-General and for that purpose the Auditor-General or any person authorized by him or her in that behalf shall have access to all books, records, reports and other documents relating to those accounts: Provided that, if it is so provided by Parliament in the case of any body corporate directly established by law, the accounts of that body corporate shall be audited and reported on by such person as may be specified by or under that law. (3) The Auditor-General shall submit his or her reports to the Minister responsible for finance, who shall cause them to be laid before the National Assembly. (4) The Auditor-General shall perform such other duties and exercise such other powers in relation to the accounts of the Government or the accounts of other public authorities or other bodies as may be prescribed by or under any Act of Parliament. (5) In the exercise of his or her functions the Auditor-General shall not be subject to the direction or control of any other person or authority. **CHAPTER IX** * **Miscellaneous** * **(ss 125-127) 125. Resignations** (1) Any person who is appointed or elected to any office established by this Constitution may resign from that office by writing under his or her hand addressed to the person or authority by whom he or she was appointed or elected: Provided that in the case of a person who holds office as President his or her resignation from that office shall be addressed to the Chief Justice, in the case of a person who holds office as Speaker or Deputy Speaker of the National Assembly his or her resignation from that office shall be addressed to the Assembly, in the case of an", - "page_start": 52, - "page_end": 52, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "for local government; and ( *c* ) select a Member to the *Ntlo ya Dikgosi* for that region by election or in such other manner as the Regional Electoral College may agree. (5) Notwithstanding the provisions of section 77(1)( *a* ) and subsections (2) and (4)( *c* ) of this section, the areas of Ghanzi and Kgalagadi shall each have the option of either selecting one Member under subsection (2) of this section or of each selecting two regional Members under subsection (4)( *c* ) of this section, but may not select Members under both subsections. **79. Qualifications for membership of** * **Ntlo ya Dikgosi** * (1) A person shall be qualified to be appointed under section 77(1)( *b* ) as a Member of the *Ntlo ya Dikgosi* if he or she — ( *a* ) is a citizen of Botswana; and ( *b* ) has attained the age of 21 years. (2) No person shall be qualified to be appointed, selected or designated as a Member of the *Ntlo ya Dikgosi* if he or she — ( *a* ) is, by virtue of his or her own act, under any acknowledgement of allegiance, obedience or adherence to a foreign power or state; ( *b* ) has been declared insolvent or adjudged or otherwise declared bankrupt under any law in force in any part of the Commonwealth or any country with a comparable legal system and has not been discharged, or has made a composition with his or her creditors and has not paid his or her debts in full; ( *c* ) is certified insane or otherwise adjudged or declared to be of unsound mind under any law for the time being in force in Botswana; ( *d* ) subject to such exceptions as may be prescribed by Parliament, holds any public office, or is acting in any public office by virtue of a contract of service expressed to continue for a period exceeding six months; ( *e* ) is under sentence of death imposed on him or her by a court in any part of the Commonwealth or any country with a comparable legal system, or is under a sentence of imprisonment (by whatever name called) exceeding six months imposed on him or her by such a court or substituted by a competent authority for some other sentence imposed on him or her by such a court; ( *f* ) holds, or is acting in,anyoffice the functions ofwhichinvolveany responsibility for, or in connection with, the conduct of any elections to the National Assembly or the compilation or revision of any electoral register for the purposes of such elections; or ( *g* ) is disqualified for election to the National Assembly by virtue of provision made in pursuance of section 62 (2) of this Constitution. (3) For the purposes of this section, two or more terms of imprisonment that are required to be served consecutively shall be regarded as a single term of imprisonment for the aggregate period of those terms, and no account shall be taken of a sentence of imprisonment imposed as an alternative to or in default of the payment of a fine. (4) A Member of the *Ntlo ya Dikgosi* shall not, while he or she is such a Member, participate in party politics, but active participation in politics prior to being a Member of the *Ntlo ya Dikgosi* shall not bar any person from being such a Member. **80. Oath of allegiance** Every Member of the *Ntlo ya Dikgosi* shall, before taking his or her seat therein, take and subscribe before the *Ntlo ya Dikgosi* the oath of allegiance. **81. Secretary to** * **Ntlo ya Dikgosi** * There shall be a Secretary to the *Ntlo ya Dikgosi* whose office shall be an office in the public service. **82. Tenure of office of Members of** * **Ntlo ya Dikgosi** * (1) A Member of the *Ntlo ya*", - "page_start": 35, - "page_end": 35, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "court to try a member of a disciplined force for a criminal offence notwithstanding any trial and conviction or acquittal of that member under the disciplinary law of that force, so, however, that any court so trying such a member and convicting him or her shall in sentencing him or her to any punishment take into account any punishment awarded him or her under that disciplinary law; ( *e* ) subsection (8) of this section to the extent that the law in question authorizes a court to convict a person of a criminal offence under any customary law to which, by virtue of that law, such person is subject. (13) In the case of any person who is held in lawful detention, the provisions of subsection (1), subsection (2)( *d* ) and ( *e* ) and subsection (3) of this section shall not apply in relation to his or her trial for a criminal offence under the law regulating the discipline of persons held in such detention. (14) In this section \"criminal offence\" means a criminal offence under the law in force in Botswana. **11. Protection of freedom of conscience** (1) Except with his or her own consent, no person shall be hindered in the enjoyment of his or her freedom of conscience, and for the purposes of this section the said freedom includes freedom of thought and of religion, freedom to change his or her religion or belief, and freedom, either alone or in community with others, and both in public and in private, to manifest and propagate his or her religion or belief in worship, teaching, practice and observance. (2) Every religious community shall be entitled, at its own expense, to establish and maintain places of education and to manage any place of education which it wholly maintains; and no such community shall be prevented from providing religious instruction for persons of that community in the course of any education provided at any place of education which it wholly maintains or in the course of any education which it otherwise provides. (3) Except with his or her own consent (or, if he or she is a minor, the consent of his or her guardian) no person attending any place of education shall be required to receive religious instruction or to take part in or attend any religious ceremony or observance if that instruction, ceremony or observance relates to a religion other than his or her own. (4) No person shall be compelled to take any oath which is contrary to his or her religion or belief or to take any oath in a manner which is contrary to his or her religion or belief. (5) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision which is reasonably required- ( *a* ) in the interests of defence, public safety, public order, public morality or public health; or ( *b* ) for the purpose of protecting the rights and freedoms of other persons, including the right to observe and practise any religion without the unsolicited intervention of members of any other religion, and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be reasonably justifiable in a democratic society. **12. Protection of freedom of expression** (1) Except with his or her own consent, no person shall be hindered in the enjoyment of his or her freedom of expression, that is to say, freedom to hold opinions without interference, freedom to receive ideas and information without interference, freedom to communicate ideas and information without interference (whether the", - "page_start": 10, - "page_end": 10, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "* **The Republic** * **(ss 1-2) 1. Declaration of Republic** Botswana is a sovereign Republic. **2. Public Seal** The Public Seal of the Republic shall be such device as may be prescribed by or under an Act of Parliament. **CHAPTER II** * **Protection of Fundamental Rights and Freedoms of the Individual** * **(ss 3-19) 3. Fundamental rights and freedoms of the individual** Whereas every person in Botswana is entitled to the fundamental rights and freedoms of the individual, that is to say, the right, whatever his or her race, place of origin, political opinions, colour, creed or sex, but subject to respect for the rights and freedoms of others and for the public interest to each and all of the following, namely- ( *a* ) life, liberty, security of the person and the protection of the law; ( *b* ) freedom of conscience, of expression and of assembly and association; and ( *c* ) protection for the privacy of his or her home and other property and from deprivation of property without compensation, the provisions of this Chapter shall have effect for the purpose of affording protection to those rights and freedoms subject to such limitations of that protection as are contained in those provisions, being limitations designed to ensure that the enjoyment of the said rights and freedoms by any individual does not prejudice the rights and freedoms of others or the public interest. **4. Protection of right to life** (1) No person shall be deprived of his or her life intentionally save in execution of the sentence of a court in respect of an offence under the law in force in Botswana of which he or she has been convicted. (2) A person shall not be regarded as having been deprived of his or her life in contravention of subsection (1) of this section if he or she dies as the result of the use, to such extent and in such circumstances as are permitted by law, of such force as is reasonably justifiable- ( *a* ) for the defence of any person from violence or for the defence of property; ( *b* ) in order to effect a lawful arrest or to prevent the escape of a person lawfully detained; ( *c* ) for the purpose of suppressing a riot, insurrection or mutiny; or ( *d* ) in order to prevent the commission by that person of a criminal offence, or if he or she dies as the result of a lawful act of war. **5. Protection of right to personal liberty** (1) No person shall be deprived of his or her personal liberty save as may be authorized by law in any of the following cases, that is to say- ( *a* ) in execution of the sentence or order of a court, whether established for Botswana or some other country, in respect of a criminal offence of which he or she has been convicted; ( *b* ) in execution of the order of a court of record punishing him or her for contempt of that or another court; ( *c* ) in execution of the order of a court made to secure the fulfilment of any obligation imposed on him or her by law; ( *d* ) for the purpose of bringing him or her before a court in execution of the order of a court; ( *e* ) upon reasonable suspicion of his or her having committed, or being about to commit, a criminal offence under the law in force in Botswana; ( *f* ) under the order of a court or with the consent of his or her parent or guardian,", - "page_start": 4, - "page_end": 4, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**CONSTITUTION OF BOTSWANA** ARRANGEMENT OF SECTIONS CHAPTER I The Republic 1. Declaration of Republic 2. Public Seal\n\nCHAPTER II Protection of Fundamental Rights and Freedoms of the Individual 3. Fundamental rights and freedoms of the individual 4. Protection of right to life 5. Protection of right to personal liberty 6. Protection from slavery and forced labour 7. Protection from inhuman treatment 8. Protection from deprivation of property 9. Protection for privacy of home and other property 10. Provisions to secure protection of law 11. Protection of freedom of conscience 12. Protection of freedom of expression 13. Protection of freedom of assembly and association 14. Protection of freedom of movement 15. Protection from discrimination on the grounds of race, etc. 16. Derogation from fundamental rights and freedoms 17. Declarations relating to emergencies 18. Enforcement of protective provisions 19. Interpretation and savings\n\nCHAPTER III Citizenship 20 to 29. ...... CHAPTER IV The Executive PART I *The President and the Vice-President* 30. Office of President 31. First President 32. Election of President after dissolution of Parliament 33. Qualification for election as President 34. Tenure of office of President 35. Vacancy in office of President 36. Discharge of functions of President during absence, illness, etc. 37. Oath of President 38. Returning officer at elections of President 39. Vice-President 40. Salary and allowances of President 41. Protection of President in respect of legal proceedings\n\nPART II *The Cabinet* 42. Ministers and Assistant Ministers 43. Tenure of office of Ministers and Assistant Ministers 44. Cabinet 45. Oaths to be taken by Ministers and Assistant Ministers 46. Secretary to the Cabinet", - "page_start": 0, - "page_end": 0, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "National Assembly. (6) A person attending the proceedings of the *Ntlo ya Dikgosi* by virtue of the provisions of subsection (3) or (4) of this section shall be entitled to take part in the proceedings of the *Ntlo ya Dikgosi* relating to the matter in respect of which he or she attends as if he or she were a Member of the *Ntlo ya Dikgosi* : Provided that he or she shall not be entitled to vote in the *Ntlo ya Dikgosi* . **PART IV** * **Powers of Parliament** * **(ss 86-89) 86. Legislative powers** Subject to the provisions of this Constitution, Parliament shall have power to make laws for the peace, order and good government of Botswana. **87. Mode of exercising legislative powers** (1) Subject to the provisions of section 89(4) of this Constitution the power of Parliament to make laws shall be exercised by Bills passed by the National Assembly, after reference in the cases specified in section 88(2) of this Constitution to the *Ntlo ya* *Dikgosi* , and assented to by the President. (2) When a Bill is presented to the President for assent he or she shall either assent or withhold his or her assent. (3) Where the President withholds his or her assent to a Bill, the Bill shall be returned to the National Assembly. (4) If where the President withholds his or her assent to a Bill the Assembly resolves within six months of the Bill being returned to it that the Bill should again be presented for assent, the President shall assent to the Bill within 21 days of its being again presented to him or her, unless he or she sooner dissolves Parliament. (5) When a Bill that has been duly passed and presented for assent is assented to in accordance with the provisions of this Constitution it shall become law and the President shall thereupon cause it to be published in the *Gazette* as a law. (6) No law made by Parliament shall come into operation until it has been published in the *Gazette* , but Parliament may postpone the coming into operation of any such law and may make laws with retrospective effect. (7) All laws made by Parliament shall be styled \"Acts\" and the words of enactment shall be \"enacted by the Parliament of Botswana\". **88. Introduction of Bills** (1) Except upon the recommendation of the President, which recommendation may be signified by the Vice-President or a Minister, the National Assembly shall not- ( *a* ) proceed upon any Bill (including any amendment to a Bill) that, in the opinion of the person presiding, makes provision for any of the following purposes- (i) for the imposition of taxation or the alteration of taxation otherwise than by reduction; (ii) for the imposition of any charge upon the revenues or other funds of Botswana or the alteration of any such charge otherwise than by reduction; (iii) for the payment, issue or withdrawal from any public fund of Botswana of any moneys not charged thereon or any increase in the amount of such payment, issue or withdrawal; or (iv) for the composition or remission of any debt to the Government of Botswana; ( *b* ) proceed upon any motion (including any amendment to a motion) the effect of which, in the opinion of the person presiding, would be to make provision for any of those purposes. (2) The National Assembly shall not proceed upon any Bill (including any amendment to a Bill) that, in the opinion of the person presiding, would, if enacted, alter", - "page_start": 37, - "page_end": 37, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "serverless-core.pdf", - "query": "How much does AWS lambda charge when the function is not running ?", - "target_page": 52, - "target_passage": "there is no charge when your code is not running", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Related resources:\n\n- [ Datadog Lambda Extension](https://docs.datadoghq.com/serverless/libraries_integrations/extension/) - an extension that supports submitting custom metrics, traces, and\n\nlogs asynchronously while your Lambda function executes.\n\n- [ Lambda Extensions - official documentation](https://docs.aws.amazon.com/lambda/latest/dg/lambda-extensions.html)\n\n##### **Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost,\n\ntypically with no changes to your function code. The largest contributor to startup latency (often\n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which\n\nincludes loading the function's code, starting the runtime, and initializing the function code.\n\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda\n\ntakes a [Firecracker microVM](http://aws.amazon.com/blogs/opensource/firecracker-open-source-secure-fast-microvm-serverless/) snapshot of the memory and disk state of the initialized [execution ](https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtime-environment.html)\n\n[environment](https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtime-environment.html) , encrypts the snapshot, and caches it for low-latency access.\n\nNote: You can use SnapStart only on published function versions and aliases that point to versions.\n\nYou can't use SnapStart on a function's unpublished version ($LATEST).\n\nRelated resources:\n\n- [ Accelerate Your Lambda Functions with Lambda SnapStart](https://aws.amazon.com/blogs/aws/new-accelerate-your-lambda-functions-with-lambda-snapstart/) - an AWS Compute blog article by\n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly\n\nsix seconds init time to 142 milliseconds of restore time with SnapStart\n\nAdvanced Topics", - "page_start": 62, - "page_end": 62, - "source_file": "serverless-core.pdf" - }, - { - "text": "*“No Server Is Easier To Manage Than No Server”* - Werner Vogels, VP and CTO\n\nThe Lambda service runs instances of your function only when needed and scales automatically\n\nfrom zero requests per day to thousands per second. You pay only for the compute time that’s\n\nactually used — there is no charge when your code is not running.\n\n#### **Fundamentals**\n\nServerless solutions are based on *event-driven architecture,* or EDA, where services send and receive\n\n*events* , which represent an update or change in state. The primary activity of Lambda functions is\n\nto process events.\n\nWithin the Lambda service, your function code is stored in a code package, deployed as a .zip or a\n\ncontainer image. All interaction with the code occurs through the Lambda API. There is no direct\n\ninvocation of functions from outside of the Lambda service.\n\nWhat you will learn on your journey to building applications with Lambda:\n\n- How the event-driven programming model invokes Lambda functions\n\n- How to create, invoke, test, update, package, and secure functions\n\n- How the execution and runtime environment runs your functions\n\n- How to view logs and monitor your functions\n\n- Where to find hands-on opportunities to learn how to invoke functions\n\nFundamentals", - "page_start": 51, - "page_end": 51, - "source_file": "serverless-core.pdf" - }, - { - "text": "initialization duration, and other details. If your function throws an error, the runtime returns that\n\nerror to the invoker.\n\nTo help simplify troubleshooting, the [AWS Serverless Application Model CLI](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/serverless-sam-reference.html#serverless-sam-cli) (AWS SAM CLI) has\n\na command called [sam logs](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/sam-cli-command-reference-sam-logs.html) which will show you CloudWatch Logs generated by your Lambda\n\nfunction.\n\nFor example, the following terminal command would show the live tail of logs generated by the\n\n*YourLambdaFunctionName* Lambda function:\n\nsam logs -n YourLambdaFunctionName --tail\n\nLogging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for\n\ndebugging.\n\n##### **Securing functions**\n\n[AWS Identity and Access Management](https://aws.amazon.com/iam/) (IAM) is the service used to manage access to AWS services.\n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function\n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions\n\nin Lambda functions:\n\n- *resource policy* : Defines which events are authorized to invoke the function.\n\n- *execution role policy* : Limits what the Lambda function is authorized to do.\n\nUsing IAM roles to describe a Lambda function’s permissions, decouples security configuration\n\nfrom the code. This helps reduce the complexity of a lambda function, making it easier to maintain.\n\nA Lambda function’s resource and execution policy should be granted the minimum required\n\npermissions for the function to perform it’s task effectively. This is sometimes referred to as the\n\nrule of least privilege. As you develop a Lambda function, you expand the scope of this policy to\n\nallow access to other resources as required.\n\nFundamentals", - "page_start": 59, - "page_end": 59, - "source_file": "serverless-core.pdf" - }, - { - "text": "##### **Deploy with containers**\n\nIf you need a custom runtime that is not provided by AWS, you can create and deploy a custom\n\ncontainer image. AWS provides base images preloaded with a language runtime and other\n\ncomponents that are required to run the image on Lambda. AWS provides a Dockerfile for each of\n\nthe base images to help with building your container image.\n\nCustom containers are one way you might experiment with lift and shift of existing code to\n\nLambda runtimes. If you do this, consider the architectural differences between always running\n\ncontainers, versus on demand nature of Lambda functions.\n\nRelated resource:\n\n- [ Deploy container images](https://docs.aws.amazon.com/lambda/latest/dg/nodejs-image.html)\n\n##### **Add code with Layers**\n\nA Lambda *layer* is a .zip file archive that can contain additional code or other content. A layer can\n\ncontain libraries, a [custom runtime](https://docs.aws.amazon.com/lambda/latest/dg/runtimes-custom.html) , data, or configuration files. Layers are also necessary if your\n\nfunction .zip archive exceeds the size limit.\n\nLayers provide a convenient way to package libraries and other dependencies that you can use with\n\nyour Lambda functions. Using layers reduces the size of uploaded deployment archives and makes\n\nit faster to deploy your code. Layers also promote code sharing and separation of responsibilities so\n\nthat you can iterate faster on writing business logic.\n\nRelated resource:\n\n- [ Creating and sharing Lambda layers](https://docs.aws.amazon.com/lambda/latest/dg/configuration-layers.html)\n\n##### **Extensions**\n\nYou can use Lambda extensions to augment your Lambda functions. For example, use Lambda\n\nExtensions to integrate with your preferred monitoring, observability, security, and governance\n\ntools.\n\nLambda supports internal or external extensions. An internal extension runs as part of the runtime\n\nprocess. An external extension runs as an independent process in the execution environment and\n\ncontinues to run after the function invocation is fully processed.\n\nAdvanced Topics", - "page_start": 61, - "page_end": 61, - "source_file": "serverless-core.pdf" - }, - { - "text": "After the handler finishes processing the first event, the runtime sends it another, and another.\n\nEach instance of your function could process thousands of requests.\n\nUnlike traditional servers, Lambda functions do not run constantly. When a function is triggered by\n\nan event, this is called an *invocation* . Lambda functions are limited to 15 minutes in duration, but\n\non average, across all AWS customers, most invocations last for less than a second.\n\nThere are many types of invocation events. Some examples:\n\n- HTTP request from API Gateway\n\n- Schedule managed by an EventBridge rule\n\n- Message from an IOT device\n\n- Notification that a file was uploaded to an S3 bucket\n\nEven the smallest Lambda-based application uses at least one event that invokes your function.\n\n##### **How Lambda invokes your function (runtime environment)**\n\nLambda invokes your function in an *execution environment* , which contains a secure and isolated\n\n*runtime environment* .\n\n- A *runtime* provides a language-specific environment which relays invocation events, context\n\ninformation, and responses between the Lambda and your functions.\n\n- An *execution environment* manages the processes and resources that are required to run the\n\nfunction.\n\nFundamentals", - "page_start": 55, - "page_end": 55, - "source_file": "serverless-core.pdf" - }, - { - "text": "#### **Advanced Topics**\n\nYou can do a lot by just creating a function and connecting it to an event source like API Gateway\n\nor S3 triggers.\n\nAs you progress on your journey, you should explore the following more advanced topics.\n\n- Connect services with event source mapping\n\n- Deploy code in containers\n\n- Add additional code with layers\n\n- Augment functions with extensions\n\n- Launch functions faster with SnapStart\n\n- Connect to functions with Function URLs\n\n##### **Event source mapping**\n\nSome services can trigger Lambda functions directly, for example, when an image is added to an\n\nS3 bucket, a Lambda can be triggered to resize it. Some services cannot invoke Lambda directly;\n\nbut you can instead use an *event source mapping* which is a polling mechanism that reads from an\n\nevent source and invokes a Lambda function.\n\nYou can use event source mappings to process items from a stream or queue in the following\n\nservices:\n\n- [ Amazon DynamoDB](https://docs.aws.amazon.com/lambda/latest/dg/with-ddb.html)\n\n- [ Amazon Kinesis](https://docs.aws.amazon.com/lambda/latest/dg/with-kinesis.html)\n\n- [ Amazon MQ](https://docs.aws.amazon.com/lambda/latest/dg/with-mq.html)\n\n- [ Amazon Managed Streaming for Apache Kafka (Amazon MSK)](https://docs.aws.amazon.com/lambda/latest/dg/with-msk.html)\n\n- [ Self-managed Apache Kafka](https://docs.aws.amazon.com/lambda/latest/dg/with-kafka.html)\n\n- [ Amazon Simple Queue Service](https://docs.aws.amazon.com/lambda/latest/dg/with-sqs.html)\n\nRelated resource:\n\n- [ Event source mapping](https://docs.aws.amazon.com/lambda/latest/dg/invocation-eventsourcemapping.html) official documentation, including the default behavior that batches\n\nrecords together into a single payload that Lambda sends to your function.\n\nAdvanced Topics", - "page_start": 60, - "page_end": 60, - "source_file": "serverless-core.pdf" - }, - { - "text": "##### **Connect to functions with Function URLs**\n\nA function URL is a dedicated HTTP(S) endpoint for your Lambda function. You can create and\n\nconfigure a function URL through the Lambda console or the Lambda API. When you create a\n\nfunction URL, Lambda automatically generates a unique URL endpoint for you. Once you create a\n\nfunction URL, its URL endpoint never changes. Function URL endpoints have the following format:\n\nhttps://.lambda-url..on.aws\n\nAfter you configure a function URL for your function, you can invoke your function through its\n\nHTTP(S) endpoint with a web browser, curl, Postman, or any HTTP client.\n\nRelated resources:\n\n- [ Function URLs](https://docs.aws.amazon.com/lambda/latest/dg/lambda-urls.html) - official documentation\n\n#### **Additional resources**\n\nOfficial AWS documentation:\n\n- [ AWS Lambda Developer Guide](https://docs.aws.amazon.com/lambda/latest/dg/welcome.html) - extensive and complete documentation for Lambda\n\n#### **Next steps**\n\n**Learn serverless techniques in an online workshop**\n\nLearn by doing in the **[Serverless Patterns Workshop](https://catalog.workshops.aws/serverless-patterns)** . The first module introduces a\n\nserverless microservice to retrieve data from DynamoDB with Lambda and API Gateway.\n\nAdditional modules provide practical examples of unit and integration testing, using\n\ninfrastructure as code to deploy resources, and how to build common architectural patterns\n\nused in serverless solutions.\n\nAdditional resources", - "page_start": 63, - "page_end": 63, - "source_file": "serverless-core.pdf" - }, - { - "text": "**Related resource(s):**\n\n- [ Permissions boundaries for IAM entities](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html) - official documentation.\n\n#### **Additional resources**\n\nOfficial AWS documentation:\n\n- [ AWS Identity and Access Management Documentation](https://docs.aws.amazon.com/iam/)\n\n- [ Example IAM identity-based policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_examples.html) - an extensive list of example policies, including [AWS ](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_examples_lambda-access-dynamodb.html)\n\n[Lambda: Allows a lambda function to access an Amazon DynamoDB table](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_examples_lambda-access-dynamodb.html) which is useful in\n\nmicroservices\n\n- [ Grant least privilege](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html) section of the *Policies and permissions* chapter suggests a method to refine\n\npermissions for increased security\n\nResources from the serverless community:\n\n- [ Simplifying serverless permissions with AWSAWS SAM Connectors](https://aws.amazon.com/blogs/compute/simplifying-serverless-permissions-with-aws-sam-connectors/) - AWS Compute blog post\n\nby Kurt Tometich, Senior Solutions Architect, AWS, from Oct 2022 that introduces a AWS SAM\n\nabstraction that creates minimally scoped IAM policies\n\n- [ Building AWS Lambda governance and guardrails](https://aws.amazon.com/blogs/compute/building-aws-lambda-governance-and-guardrails/) - AWS Compute blog post by Julian Wood,\n\nSenior Solutions Architect, AWS, from Aug 2022 that highlights how Lambda, as a serverless\n\nservice, simplifies cloud security and compliance so you can concentrate on your business logic.\n\n#### **Next Steps**\n\n- Work through the Getting Started Resource Center 30-45 min tutorial on [Setting Up Your AWS ](https://aws.amazon.com/getting-started/guides/setup-environment/)\n\n[Environment](https://aws.amazon.com/getting-started/guides/setup-environment/) to properly set up your AWS account, secure the root user, create an IAM user, and\n\nsetup AWS CLI and (optionally) Cloud9 environment.\n\n### **Get started with Lambda**\n\nAll projects need a compute capability to handle processing tasks. Here are some examples:\n\n- Handling web application and API requests\n\n- Transforming batches of data\n\n- Processing messages from a queue\n\nAdditional resources", - "page_start": 49, - "page_end": 49, - "source_file": "serverless-core.pdf" - }, - { - "text": "This guide will highlight what you need to know right away and link to service documentation for\n\nmore service-specific details.\n\nFor example, you will learn that the Lambda service creates an *execution environment* to run\n\ncompute functions. For more information on how Lambda manages function scaling or reduces\n\nstart-up time, we will link you to relevant sections of the Lambda developer guide.\n\nThe topics in this guide will cover the prerequisites for understanding serverless development on\n\nAWS, such as account creation and an overview of AWS cloud infrastructure. Then, you will learn\n\nhow to shift from a traditional development model to a serverless, event-driven architecture with\n\nwhich to develop applications on the cloud.\n\nAlong the way, this guide will introduce core services, workshops, and tutorials, you can choose to\n\nreinforce your learning with hands-on activities.\n\n- AWS Identity and Access Management — for securely accessing resources on AWS.\n\n2", - "page_start": 5, - "page_end": 5, - "source_file": "serverless-core.pdf" - }, - { - "text": "Many traditional systems are designed to run periodically and process batches of transactions that\n\nhave built up over time. For example, a banking application may run every hour to process ATM\n\ntransactions into central ledgers. In Lambda-based applications, the custom processing should be\n\ntriggered by every event, allowing the service to scale up concurrency as needed, to provide near-\n\nreal time processing of transactions.\n\nWhile you can run cron tasks in serverless applications by using Amazon EventBridge Scheduler,\n\nconsider the size of each batch of data that your event sends to Lambda. In this scenario, there\n\nis potential for the volume of transactions to grow beyond what can be processed within the 15-\n\nminute Lambda timeout. If the limitations of external systems force you to use a scheduler, you\n\nshould generally schedule for the shortest reasonable recurring time period.\n\nFor example, it’s not best practice to use a batch process that triggers a Lambda function to fetch\n\na list of new Amazon S3 objects. This is because the service might receive more new objects in\n\nbetween batches than can be processed within a 15-minute Lambda function.\n\nServerless development on AWS", - "page_start": 24, - "page_end": 24, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "serverless-core.pdf", - "query": "What is the role of resource policies of lambda functions ?", - "target_page": 60, - "target_passage": "resource policy: Defines which events are authorized to invoke the function.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "*“No Server Is Easier To Manage Than No Server”* - Werner Vogels, VP and CTO\n\nThe Lambda service runs instances of your function only when needed and scales automatically\n\nfrom zero requests per day to thousands per second. You pay only for the compute time that’s\n\nactually used — there is no charge when your code is not running.\n\n#### **Fundamentals**\n\nServerless solutions are based on *event-driven architecture,* or EDA, where services send and receive\n\n*events* , which represent an update or change in state. The primary activity of Lambda functions is\n\nto process events.\n\nWithin the Lambda service, your function code is stored in a code package, deployed as a .zip or a\n\ncontainer image. All interaction with the code occurs through the Lambda API. There is no direct\n\ninvocation of functions from outside of the Lambda service.\n\nWhat you will learn on your journey to building applications with Lambda:\n\n- How the event-driven programming model invokes Lambda functions\n\n- How to create, invoke, test, update, package, and secure functions\n\n- How the execution and runtime environment runs your functions\n\n- How to view logs and monitor your functions\n\n- Where to find hands-on opportunities to learn how to invoke functions\n\nFundamentals", - "page_start": 51, - "page_end": 51, - "source_file": "serverless-core.pdf" - }, - { - "text": "initialization duration, and other details. If your function throws an error, the runtime returns that\n\nerror to the invoker.\n\nTo help simplify troubleshooting, the [AWS Serverless Application Model CLI](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/serverless-sam-reference.html#serverless-sam-cli) (AWS SAM CLI) has\n\na command called [sam logs](https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/sam-cli-command-reference-sam-logs.html) which will show you CloudWatch Logs generated by your Lambda\n\nfunction.\n\nFor example, the following terminal command would show the live tail of logs generated by the\n\n*YourLambdaFunctionName* Lambda function:\n\nsam logs -n YourLambdaFunctionName --tail\n\nLogging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for\n\ndebugging.\n\n##### **Securing functions**\n\n[AWS Identity and Access Management](https://aws.amazon.com/iam/) (IAM) is the service used to manage access to AWS services.\n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function\n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions\n\nin Lambda functions:\n\n- *resource policy* : Defines which events are authorized to invoke the function.\n\n- *execution role policy* : Limits what the Lambda function is authorized to do.\n\nUsing IAM roles to describe a Lambda function’s permissions, decouples security configuration\n\nfrom the code. This helps reduce the complexity of a lambda function, making it easier to maintain.\n\nA Lambda function’s resource and execution policy should be granted the minimum required\n\npermissions for the function to perform it’s task effectively. This is sometimes referred to as the\n\nrule of least privilege. As you develop a Lambda function, you expand the scope of this policy to\n\nallow access to other resources as required.\n\nFundamentals", - "page_start": 59, - "page_end": 59, - "source_file": "serverless-core.pdf" - }, - { - "text": "After the handler finishes processing the first event, the runtime sends it another, and another.\n\nEach instance of your function could process thousands of requests.\n\nUnlike traditional servers, Lambda functions do not run constantly. When a function is triggered by\n\nan event, this is called an *invocation* . Lambda functions are limited to 15 minutes in duration, but\n\non average, across all AWS customers, most invocations last for less than a second.\n\nThere are many types of invocation events. Some examples:\n\n- HTTP request from API Gateway\n\n- Schedule managed by an EventBridge rule\n\n- Message from an IOT device\n\n- Notification that a file was uploaded to an S3 bucket\n\nEven the smallest Lambda-based application uses at least one event that invokes your function.\n\n##### **How Lambda invokes your function (runtime environment)**\n\nLambda invokes your function in an *execution environment* , which contains a secure and isolated\n\n*runtime environment* .\n\n- A *runtime* provides a language-specific environment which relays invocation events, context\n\ninformation, and responses between the Lambda and your functions.\n\n- An *execution environment* manages the processes and resources that are required to run the\n\nfunction.\n\nFundamentals", - "page_start": 55, - "page_end": 55, - "source_file": "serverless-core.pdf" - }, - { - "text": "- Policies that grant least privilege to your functions\n\n**Workshop - Intro to Serverless** - Before diving too deep, you can choose to try out serverless in\n\na workshop or tutorial. Connect to a data source and create a REST API with your first Lambda\n\nfunction.”\n\n- Services used: AWS Management Console, Lambda, DynamoDB, API Gateway\n\n##### **Programming Model**\n\nThe Lambda service provides the same event-based programming model for all languages. The\n\nLambda runtime passes an *invocation event* and *context* to your Lambda function *handler* which\n\ndoes some work and produces a resulting event:\n\nThe *invocation event* contains data, as a JSON packet, which varies from service to service. For\n\nexample, API gateway events include path, HTTP method, query string parameters, headers,\n\ncookies, and more. DynamoDB events could contain updated or delete record data. S3 events\n\ninclude the bucket name and object key, among other things.\n\n*The context* contains information about the environment the function is running inside. Additional\n\ncontextual information can be set in familiar environment variables (ENV).\n\nThe function *handler* is a method in your function code that processes the inbound event. The\n\nhandler, which is a standard function in your language of choice, does some work and emits a *result*\n\n*event* .\n\nFundamentals", - "page_start": 54, - "page_end": 54, - "source_file": "serverless-core.pdf" - }, - { - "text": "##### **Connect to functions with Function URLs**\n\nA function URL is a dedicated HTTP(S) endpoint for your Lambda function. You can create and\n\nconfigure a function URL through the Lambda console or the Lambda API. When you create a\n\nfunction URL, Lambda automatically generates a unique URL endpoint for you. Once you create a\n\nfunction URL, its URL endpoint never changes. Function URL endpoints have the following format:\n\nhttps://.lambda-url..on.aws\n\nAfter you configure a function URL for your function, you can invoke your function through its\n\nHTTP(S) endpoint with a web browser, curl, Postman, or any HTTP client.\n\nRelated resources:\n\n- [ Function URLs](https://docs.aws.amazon.com/lambda/latest/dg/lambda-urls.html) - official documentation\n\n#### **Additional resources**\n\nOfficial AWS documentation:\n\n- [ AWS Lambda Developer Guide](https://docs.aws.amazon.com/lambda/latest/dg/welcome.html) - extensive and complete documentation for Lambda\n\n#### **Next steps**\n\n**Learn serverless techniques in an online workshop**\n\nLearn by doing in the **[Serverless Patterns Workshop](https://catalog.workshops.aws/serverless-patterns)** . The first module introduces a\n\nserverless microservice to retrieve data from DynamoDB with Lambda and API Gateway.\n\nAdditional modules provide practical examples of unit and integration testing, using\n\ninfrastructure as code to deploy resources, and how to build common architectural patterns\n\nused in serverless solutions.\n\nAdditional resources", - "page_start": 63, - "page_end": 63, - "source_file": "serverless-core.pdf" - }, - { - "text": "Related resources:\n\n- [ Datadog Lambda Extension](https://docs.datadoghq.com/serverless/libraries_integrations/extension/) - an extension that supports submitting custom metrics, traces, and\n\nlogs asynchronously while your Lambda function executes.\n\n- [ Lambda Extensions - official documentation](https://docs.aws.amazon.com/lambda/latest/dg/lambda-extensions.html)\n\n##### **Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost,\n\ntypically with no changes to your function code. The largest contributor to startup latency (often\n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which\n\nincludes loading the function's code, starting the runtime, and initializing the function code.\n\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda\n\ntakes a [Firecracker microVM](http://aws.amazon.com/blogs/opensource/firecracker-open-source-secure-fast-microvm-serverless/) snapshot of the memory and disk state of the initialized [execution ](https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtime-environment.html)\n\n[environment](https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtime-environment.html) , encrypts the snapshot, and caches it for low-latency access.\n\nNote: You can use SnapStart only on published function versions and aliases that point to versions.\n\nYou can't use SnapStart on a function's unpublished version ($LATEST).\n\nRelated resources:\n\n- [ Accelerate Your Lambda Functions with Lambda SnapStart](https://aws.amazon.com/blogs/aws/new-accelerate-your-lambda-functions-with-lambda-snapstart/) - an AWS Compute blog article by\n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly\n\nsix seconds init time to 142 milliseconds of restore time with SnapStart\n\nAdvanced Topics", - "page_start": 62, - "page_end": 62, - "source_file": "serverless-core.pdf" - }, - { - "text": "- Resizing images\n\n- Generating dynamic PDFs from customer data\n\nIn traditional applications, you write code to do these tasks. You organize that code into **functions** .\n\nYou put the function code inside an application framework. Whichever framework you picked will\n\nrun inside a language dependent runtime environment. Finally, that runtime environment will be\n\nhosted on a virtual or physical server.\n\nSetting up, configuring and maintaining the frameworks, runtime environments, and virtual or\n\nphysical infrastructure slows down your delivery of features, bug fixes, and improvements.\n\n#### **What is Lambda?**\n\nIn Lambda, you write function code. Lambda runs the functions. That’s it. There are no servers.\n\nWhat is Lambda?", - "page_start": 50, - "page_end": 50, - "source_file": "serverless-core.pdf" - }, - { - "text": "##### **Deploy with containers**\n\nIf you need a custom runtime that is not provided by AWS, you can create and deploy a custom\n\ncontainer image. AWS provides base images preloaded with a language runtime and other\n\ncomponents that are required to run the image on Lambda. AWS provides a Dockerfile for each of\n\nthe base images to help with building your container image.\n\nCustom containers are one way you might experiment with lift and shift of existing code to\n\nLambda runtimes. If you do this, consider the architectural differences between always running\n\ncontainers, versus on demand nature of Lambda functions.\n\nRelated resource:\n\n- [ Deploy container images](https://docs.aws.amazon.com/lambda/latest/dg/nodejs-image.html)\n\n##### **Add code with Layers**\n\nA Lambda *layer* is a .zip file archive that can contain additional code or other content. A layer can\n\ncontain libraries, a [custom runtime](https://docs.aws.amazon.com/lambda/latest/dg/runtimes-custom.html) , data, or configuration files. Layers are also necessary if your\n\nfunction .zip archive exceeds the size limit.\n\nLayers provide a convenient way to package libraries and other dependencies that you can use with\n\nyour Lambda functions. Using layers reduces the size of uploaded deployment archives and makes\n\nit faster to deploy your code. Layers also promote code sharing and separation of responsibilities so\n\nthat you can iterate faster on writing business logic.\n\nRelated resource:\n\n- [ Creating and sharing Lambda layers](https://docs.aws.amazon.com/lambda/latest/dg/configuration-layers.html)\n\n##### **Extensions**\n\nYou can use Lambda extensions to augment your Lambda functions. For example, use Lambda\n\nExtensions to integrate with your preferred monitoring, observability, security, and governance\n\ntools.\n\nLambda supports internal or external extensions. An internal extension runs as part of the runtime\n\nprocess. An external extension runs as an independent process in the execution environment and\n\ncontinues to run after the function invocation is fully processed.\n\nAdvanced Topics", - "page_start": 61, - "page_end": 61, - "source_file": "serverless-core.pdf" - }, - { - "text": "could be listening. The handler function might create and send another event to an SNS queue so\n\nthat alerts for high temperature are sent to users through SMS messages.\n\nThe function finally wraps up the JSON weather data into a new event and sends it back to API\n\ngateway. Afterward, the function continues to handle hundreds of additional requests. Request\n\nfrom users slow down after 2AM, so after some time the Lambda service will tear down the\n\nfunction execution environment to conserve resources. As a Customer, you will only be charged for\n\nfunction usage.\n\nTypical microservice example", - "page_start": 38, - "page_end": 38, - "source_file": "serverless-core.pdf" - }, - { - "text": "You can use runtimes that Lambda provides for JavaScript (Node.js), TypeScript, Python, Java,\n\nPython, Go, C#, and PowerShell, or you can build your own custom runtime environment inside of a\n\ncontainer.\n\nIf you package your code as a .zip file archive, you must configure your function to use a runtime\n\nthat matches your programming language. For a container image, you include the runtime when\n\nyou build the image.\n\n##### **How to process events with a Lambda handler**\n\nConceptually, there are only three steps to processing events with Lambda:\n\n1. Configure the entry point to your function, known as the *handler* , and deploy the function.\n\n2. Lambda service initializes the function, then it invokes the *handler* with an invocation event and\n\ncontext.\n\n3. Your handler function processes the event and returns a response event.\n\nSubsequent events will invoke the handler again, without the initialization delay. During this cycle,\n\nthe function stays in memory, so clients and variables declared outside of the handler method can\n\nbe reused.\n\nAfter a period of time, Lambda will eventually tear down the runtime. This can happen for a variety\n\nof reasons; some examples: scaling down to conserve resources, updating the function, updating\n\nthe runtime.\n\nThe function **handler** is the essential component of your function code. As noted previously, the\n\nhandler is the entry point, but it may not be the only function in your code. In fact, a best practice\n\nis keeping the handler sparse and doing the actual processing in other functions in your code.\n\nHere are some example **handlers** :\n\nPython\n\n# Example handler method in Python\n\ndef lambda_handler(event, context):\n\nmessage = 'Hello {} {}!'.format(event['first_name'], event['last_name'])\n\nreturn {\n\n'message' : message\n\n}\n\nFundamentals", - "page_start": 56, - "page_end": 56, - "source_file": "serverless-core.pdf" - } - ] - }, - { - "references": { - "source_file": "serverless-core.pdf", - "query": "Why can't I use SnapStart on my function tagged with $LATEST ?", - "target_page": 63, - "target_passage": " You can use SnapStart only on published function versions and aliases that point to versions. You can't use SnapStart on a function's unpublished version ($LATEST)", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Related resources:\n\n- [ Datadog Lambda Extension](https://docs.datadoghq.com/serverless/libraries_integrations/extension/) - an extension that supports submitting custom metrics, traces, and\n\nlogs asynchronously while your Lambda function executes.\n\n- [ Lambda Extensions - official documentation](https://docs.aws.amazon.com/lambda/latest/dg/lambda-extensions.html)\n\n##### **Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost,\n\ntypically with no changes to your function code. The largest contributor to startup latency (often\n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which\n\nincludes loading the function's code, starting the runtime, and initializing the function code.\n\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda\n\ntakes a [Firecracker microVM](http://aws.amazon.com/blogs/opensource/firecracker-open-source-secure-fast-microvm-serverless/) snapshot of the memory and disk state of the initialized [execution ](https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtime-environment.html)\n\n[environment](https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtime-environment.html) , encrypts the snapshot, and caches it for low-latency access.\n\nNote: You can use SnapStart only on published function versions and aliases that point to versions.\n\nYou can't use SnapStart on a function's unpublished version ($LATEST).\n\nRelated resources:\n\n- [ Accelerate Your Lambda Functions with Lambda SnapStart](https://aws.amazon.com/blogs/aws/new-accelerate-your-lambda-functions-with-lambda-snapstart/) - an AWS Compute blog article by\n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly\n\nsix seconds init time to 142 milliseconds of restore time with SnapStart\n\nAdvanced Topics", - "page_start": 62, - "page_end": 62, - "source_file": "serverless-core.pdf" - }, - { - "text": "5. Click in the **Filter** box and enter snap to see a list of snap files, as shown in Figure 13-72.\n\nLocate the exact name of the snap that was generated by using the **svc_snap** command\n\nthat was issued earlier. Select that file, and click **Download** .\n\n*Figure 13-72 Filtering on snap to download*\n\n6. Save the file to a folder of your choice on your workstation.\n\n#### **13.9.3 Uploading files to the Support Center**\n\nIf you chose to not have the Storwize V7000 upload the support package automatically, it can\n\nstill be uploaded for analysis from the Enhanced Customer Data Repository (ECuRep). Any\n\nuploads should be associated with a specific problem management report (PMR). The PMR\n\nis also known as a *service request* and is a mandatory requirement when uploading.", - "page_start": 753, - "page_end": 753, - "source_file": "sg247938.pdf" - }, - { - "text": "**34** IBM Content Manager OnDemand Guide\n\n**Starting the servers**\n\nServers are started by running **STRTCPSVR *ONDMD** . The **INSTANCE** parameter of the **STRTCPSVR**\n\n***ONDMD** command supports the special values of *DFT , *ALL , and *AUTOSTART , and the\n\nspecification of the name of an instance. (An instance is set to autostart if the ars.cfg file for\n\nthat instance contains ARS_AUTOSTART_INSTANCE=1 .) The default value for the **INSTANCE**\n\nparameter is *DFT . You can also create a data area that is named **STRTCPSVR** to further control\n\nthe behavior of the **STRTCPSVR** command. For more information about the data area, see the\n\n*IBM Content Manager OnDemand for i - Common Server Administration Guide* , SC19-2792.\n\nWithout the STRTCPSVR data area, the values of *DFT and *AUTOSTART work identically. All\n\ninstances that are set to autostart are started. Use the special value *ALL to start all of the\n\ninstances that are configured on the system. You can also specify the name of a single\n\ninstance to start, for example:\n\nSTRTCPSVR SERVER(*ONDMD) INSTANCE(ONDTEST)\n\nWith the data area, the value of *DFT starts only the instance that is named in the data area.\n\nThe data area must be named STRTCPSVR and in library QUSRRDARS . The data area must be of\n\nthe type character with a length of 10. To create the data area, run the following command (all\n\nas one command):\n\nCRTDTAARA DTAARA(QUSRRDARS/STRTCPSVR) TYPE(*CHAR) LEN(10) VALUE(QUSROND)\n\nTEXT('Autostart instance name for STRTCPSVR *ONDMD *DFT')\n\nQUSROND is the name of the instance to start.\n\nThe special values *ALL and *AUTOSTART work the same with the data area as without the data\n\narea.\n\nTo determine the instances that are started when **STRTCPSVR SERVER(*ONDMD)**\n\n**INSTANCE(*AUTOSTART)** is run, you can look for the ARS_AUTOSTART_INSTANCE=1 in the ARS.CFG\n\nfile. However, an easier way is available so that you do not need to check the ARS.CFG file for\n\nevery instance.\n\nRun **grep** in Qshell to search the contents of all of the ARS.CFG files for the string\n\nARS_AUTOSTART_INSTANCE=1 , for example:\n\n$\n\ngrep -n 'ARS_AUTOSTART_INSTANCE=1' /qibm/userdata/ondemand/*/ars.cfg\n\n/qibm/userdata/ondemand/ONDDEMO/ars.cfg:53:ARS_AUTOSTART_INSTANCE=1\n\n/qibm/userdata/ondemand/ONDDEU/ars.cfg:53:ARS_AUTOSTART_INSTANCE=1\n\n/qibm/userdata/ondemand/ONDENU/ars.cfg:53:ARS_AUTOSTART_INSTANCE=1\n\n/qibm/userdata/ondemand/QUSROND/ars.cfg:53:ARS_AUTOSTART_INSTANCE=1\n\n$\n\nFrom the last four detail lines, which are the output of the **grep** command, you can determine\n\nthat instances ONDDEMO , ONDDEU , ONDENU , and QUSROND are started when the **STRTCPSVR**\n\n**SERVER(*ONDMD) INSTANCE(*AUTOSTART)** command is run.\n\nTable 2-1 on page 35 summarizes the behavior of the **STRTCPSVR** command with and without\n\nthe STRTCPSVR data area.", - "page_start": 57, - "page_end": 57, - "source_file": "sg246915.pdf" - }, - { - "text": "**MY BLACK GARBAGE COLLECTION’S DAY MY YELLOW GARBAGE COLLECTION’S DAY**\n\n**Collection on public holidays will take place, except May 1st and December 25th. The collection for Wednesday May 1st will be brought forward to Tuesday April 30th and the collection for Wednesday December 25th will be brought forward to Tuesday December 24th. The collection for Wednesday January 1st 2025 will be brought forward to Tuesday December 31st.**\n\n####### **JANUARY**\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nW T\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nW T\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM T\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nW T\n\nM T\n\nF S S\n\nW T\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nF\n\nW T\n\nM T\n\nF S S M\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nS\n\nW T\n\nT\n\nF\n\nW T\n\nM T\n\nS S M\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nS S\n\nW T\n\nT\n\nF\n\nW T\n\nM T\n\nS M\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nS S\n\nW T\n\nT\n\nF\n\nW T\n\nM T\n\nM T\n\nF S S\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nW T\n\nT\n\nF S S\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S\n\nF S\n\nS\n\nW T\n\nT\n\nM\n\nW T\n\nT\n\n####### **JULY AUGUST SEPTEMBER OCTOBER NOVEMBER DECEMBER**\n\n####### **FEBRUARY MARCH APRIL MAY JUNE**\n\nF S S\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nF S S\n\nW T\n\nT\n\nM\n\nW T\n\nT\n\nS\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nW T\n\nT\n\nM\n\nF S S\n\nF S S\n\nW T\n\nT\n\nM\n\nM\n\nW T\n\nT\n\n2024 **OUT BLACK CONTAINER**\n\n**=**\n\n**CONTAINER COUNTED**\n\n**FULL CONTAINER OR**\n\n**HALF FILLED CONTAINER**\n\n**IT’S THE SAME PRICE!**\n\n**I PUT MY RUBBISH**\n\n**CONTAINER OUT**\n\n**ONLY WHEN FULL**", - "page_start": 1, - "page_end": 1, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "Chapter 13. RAS, monitoring, and troubleshooting\n\n2. We collect the type 3 (option 3) and have it automatically uploaded to the PMR number\n\nthat is provided by IBM Support, as shown in Example 13-6.\n\n*Example 13-6 The svc_snap command*\n\nssh superuser@9.173.156.250\n\nPassword:\n\nIBM_Storwize:ITSO-V7k:superuser> **svc_snap upload pmr=12345,000,866 gui3**\n\n3. If you do not want to automatically upload the snap to IBM, do not specify the **upload**\n\n**pmr=ppppp,bbb,ccc** part of the commands. When the snap creation completes, it creates a\n\nfile named that uses the following format:\n\n/dumps/snap..YYMMDD.hhmmss.tgz\n\nIt takes a few minutes for the snap file to complete (longer if statesaves are included).\n\n4. The generated file can then be retrieved from the GUI clicking **Settings** → **Support** → **Manual Upload Instructions** twisty → **Download Support Package** and then, clicking\n\n**Download Existing Package** , as shown in Figure 13-71.\n\n*Figure 13-71 Downloaded Existing Package*", - "page_start": 752, - "page_end": 752, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 13. RAS, monitoring, and troubleshooting\n\n5. Select all of the files to include in the compressed file; then, click **Download** . Depending\n\non your browser preferences, you might be prompted where to save the file or it\n\ndownloads to your defined download directory.\n\n### **13.4 Software update**\n\nThis section describes the operations to update your Storwize V7000 software to V8.1.\n\nThe format for the software update package name ends in four positive integers that are\n\nseparated by dots. For example, a software update package might have the following name:\n\nIBM_2145_INSTALL_8.2.1.0\n\n#### **13.4.1 Precautions before the update**\n\nThis section describes the precautions that you should take before you attempt an update.\n\nDuring the update, each node in your Storwize V7000 clustered system is automatically shut\n\ndown and restarted by the update process. Because each node in an I/O Group provides an\n\nalternative path to volumes, use the Subsystem Device Driver (SDD) to make sure that all I/O\n\npaths between all hosts and storage area networks (SANs) work.\n\nIf you do not perform this check, certain hosts might lose connectivity to their volumes and\n\nexperience I/O errors when the Storwize V7000 node that provides that access is shut down\n\nduring the update process. You can check the I/O paths by using **datapath query** SDD\n\ncommands.\n\n#### **13.4.2 IBM Storwize V7000 update test utility**\n\nThe software update test utility is a Storwize V7000 software utility that checks for known\n\nissues that can cause problems during a Storwize V7000 software update. For more\n\ninformation about the utility, see [this website](http://www.ibm.com/support/docview.wss?rs=591&uid=ssg1S4000585) .\n\nDownload the software update utility from this page where you can also download the\n\nfirmware. This procedure ensures that you receive the current version of this utility. You can\n\nuse the **svcupgradetest** utility to check for known issues that might cause problems during a\n\nsoftware update.\n\nThe software update test utility can be downloaded in advance of the update process.\n\nAlternately, it can be downloaded and run directly during the software update, as guided by\n\nthe update wizard.\n\nYou can run the utility multiple times on the same IBM Storwize V7000 system to perform a\n\nreadiness check-in preparation for a software update. Run this utility for a final time\n\nimmediately before you apply the software update to ensure that there were no new releases\n\nof the utility since it was originally downloaded.\n\n**Important:** Before you attempt any IBM Storwize V7000 code update, read and\n\nunderstand the Storwize V7000 concurrent compatibility and code cross-reference matrix.\n\nFor more information, see [this website](http://www.ibm.com/support/docview.wss?uid=ssg1S1003705) and click **Latest Storwize V7000 code** .", - "page_start": 708, - "page_end": 708, - "source_file": "sg247938.pdf" - }, - { - "text": "| Type of content Tags |\n|:---|\n| Picture with Alt Text in Cell
Alt= alt text |\n| Hyperlink on Cell

Link - OBJR text content |\n| Hyperlink on Object tag for object Link - OBJR |\n\nThe following types of content are marked as in the PDF Content Tree and\n\nhave no PDF/UA tags:\n\nSlicer scrollbar\n\nGrid lines\n\nCell borders\n\nCell shading\n\nDecorative graphical objects\n\nText in SmartArt objects\n\nThe information in this article is applicable to the following versions of Excel.\n\nExcel for Windows Version 2408 and later.\n\nExcel for Mac Version 16.89 and later.\n\nExcel for iOS Version 2.89 and later.\n\nExcel for Android Build 16.0.18025.XXXXX or later.\n\n**Artifacts**\n\n**Availability**", - "page_start": 47, - "page_end": 47, - "source_file": "office-pdf.pdf" - }, - { - "text": "Chapter 13. RAS, monitoring, and troubleshooting\n\n3. The Upload Support Package window provides four options for data collection. If you were\n\ncontacted by IBM Support because your system called home or you manually opened a\n\ncall with IBM Support, you receive a *PMR number* . Enter that PMR number into the **PMR**\n\nfield and select the snap type (often referred to as an *option 1, 2, 3, 4 snap* ) as requested\n\nby IBM Support (see Figure 13-69). In our example, we entered our PMR number,\n\nselected snap type 3 (option 3) because this automatically collects the statesave that were\n\ncreated at the time the node restarted, and clicked **Upload** .\n\n*Figure 13-69 Upload Support Package window*\n\n**Tip:** To open a service request online, see the IBM Support Service requests and\n\nPMRs [web page](https://www.ibm.com/support/servicerequest) .", - "page_start": 750, - "page_end": 750, - "source_file": "sg247938.pdf" - }, - { - "text": "| Number Improvement Word Excel PowerPoint |\n|:---|\n| 34 Actual Text property removed from tag for text in different language in PowerPoint Yes |\n| 35 Actual Text property removed from tag for text in different language in Word Yes |\n| 36

tag for Title Placeholder on Title or Section Header layout in PowerPoint Yes |\n| 37

tag for Title Placeholder on other slides in PowerPoint Yes |\n| 38

and

tag logic in PowerPoint works for custom templates Yes |\n| 39 Hyperlinks aren’t nested in
tags Yes Yes |\n| 40 Hyperlinks are preserved even for Decorative Objects and Objects on the Slide Master or Slide Layout Yes |\n| 41 For a Hyperlink on a Graphical Object, tag is a sibling of the tag for the Object Yes Yes |\n| 42 For a Hyperlink on text in a Shape with Alt Text, Equation, or Decorative, tag is a sibling of the tag for the Object Yes Yes |\n| 43 For a Hyperlink on text in a Table Cell with Alt Text, Equation, or Decorative, tag is a sibling of the tag for the Object Yes |\n| 44 Document Title in PDF set as Document Title in Word Yes |\n| 45 Comment Anchor has tag in Word Yes |\n| 46 Quote Style has tag in Word Yes |\n| 47 Caption has tag in Word Yes |\n| 48 Paragraph spanning multiple pages has single

tag in Word Yes |\n| 49 Footnote and Endnote have tag in Word Yes |\n| 50 Footnote and Endnote have tag in Word Yes |\n| 51 Paragraph Quote and Intense Quote Styles have

tag in Word Yes |\n| 52 Title Style has tag in Word Yes |", - "page_start": 39, - "page_end": 39, - "source_file": "office-pdf.pdf" - }, - { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the\n\nmobile phone, the watch will receive one or more SMS reminders at the same time.\n\n1.5.3. Other application message notifications:\n\nTurn on the corresponding application message notification in the app, such as WeChat, QQ,\n\nOutlook, Facebook and other applications. When the mobile phone receives one/multiple\n\napplication message notifications, the watch will receive one/multiple corresponding message\n\nreminders at the same time.\n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile\n\nphone, then you can synchronize you contacts of your mobile phone to the smartwatch.\n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the\n\nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will\n\nbe wiped out at 00:00 every day in the morning.\n\n**1.8 Sports modes** (walking, running, cycling, rope skipping, badminton,\n\nbasketball, football)\n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the\n\nexercise; click the “Start” button again to pause the recording of the exercise; click the “End”\n\nbutton to end the recording, and save to the data.\n\n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the\n\nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be\n\nsaved.\n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the\n\nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly\n\nfor the measurement.\n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the\n\nECG interface in the app, you can have single measurement at a time. The data of ECG will be\n\nsaved in the mobile phone. This function should be used with the app.\n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other\n\n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to\n\noperate the function).\n\n**2.1 Remote control music**", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_SHEN_2003.pdf", - "query": "At Shentel company, what determines an employees pension ?", - "target_page": 22, - "target_passage": "Pension benefits are based primarily on the employee's compensation and years of service", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "#### **SHENTEL SERVICE AREAS**", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\n\nNOTE 22: PENSIONS\n\nWe have contributory and non-contributory defined benefit pension\n\nplans that are made available to most of our employees. The plans\n\nprovide pensions based on years of service, years of contributions and\n\nearnings. We do not provide any non-pension post-retirement benefits.\n\nWe also provide unfunded supplemental pension benefits to certain\n\nexecutives.\n\nThe assets of the defined benefit pension plans are held in segregated\n\naccounts isolated from our assets. We administer the defined benefit\n\npension plans pursuant to applicable regulations, the Statement of\n\nInvestment Policies and Procedures and to the mandate of the Pension\n\nCommittee of the Board of Directors. The Pension Committee of the\n\nBoard of Directors oversees our administration of the defined benefits\n\npension plans, which includes the following principal areas:\n\n- overseeing the funding, administration, communication and\n\ninvestment management of the plans\n\n- selecting and monitoring the performance of all third parties\n\nperforming duties in respect of the plans, including audit, actuarial\n\nand investment management services\n\n- proposing, considering and approving amendments to the defined\n\nbenefit pension plans\n\n- proposing, considering and approving amendments of the Statement\n\nof Investment Policies and Procedures\n\n- reviewing management and actuarial reports prepared in respect of\n\nthe administration of the defined benefit pension plans\n\n- reviewing and approving the audited financial statements of the\n\ndefined benefit pension plan funds.\n\nThe assets of the defined benefit pension plans are invested and\n\nmanaged following all applicable regulations and the Statement of\n\nInvestment Policies and Procedures, and reflect the characteristics and\n\nasset mix of each defined benefit pension plan. Investment and market\n\nreturn risk is managed by:\n\n- contracting professional investment managers to execute the\n\ninvestment strategy following the Statement of Investment Policies\n\nand Procedures and regulatory requirements\n\n- specifying the kinds of investments that can be held in the plans and\n\nmonitoring compliance\n\n- using asset allocation and diversification strategies, and\n\n- purchasing annuities from time to time.\n\nThe funded pension plans are registered with the Office of the\n\nSuperintendent of Financial Institutions and are subject to the Federal\n\nPension Benefits Standards Act. The plans are also registered with the\n\nCanada Revenue Agency and are subject to the Canada Income Tax\n\nAct. The benefits provided under the plans and the contributions to the\n\nplans are funded and administered in accordance with all applicable\n\nlegislation and regulations.\n\nSignificant estimates are involved in determining pension related\n\nbalances. Actuarial estimates are based on projections of employees’\n\ncompensation levels at the time of retirement. Maximum retirement\n\nbenefits are primarily based on career average earnings, subject to\n\ncertain adjustments. The most recent actuarial valuations were\n\ncompleted as at January 1, 2013.\n\nThe table below sets out the estimated present value of accrued plan\n\nbenefits and the estimated market value of the net assets available to\n\nprovide these benefits for our funded plans at December 31, 2013 and\n\n2012.\n\n**2013** 2012\n\nPlan assets, at fair value **$ 1,037** $ 833\n\nAccrued benefit obligations **1,209** 1,167\n\nDeficiency of plan assets over accrued benefit obligations **(172)** (334)\n\nEffect of asset ceiling limit **(9)** -\n\nNet deferred pension liability **$ (181)** $ (334)\n\nConsists of:\n\nDeferred pension asset **$ 8** $ 9\n\nDeferred pension liability **(189)** (343)\n\nNet deferred pension liability **$ (181)** $ (334)\n\nThe table below shows our pension fund assets for the years ended\n\n2013 and 2012.\n\n**2013** 2012\n\nPlan assets, January 1 **$ 833** $ 684\n\nInterest income **40** 40\n\nRemeasurements, return on plan assets recognized in other", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "### **We must serve well to prosper - We must prosper to serve well**\n\nShenTel Service Company - Shenandoah Long Distance Company - Shenandoah Mobile Company\n\nShenandoah Network Company - Shenandoah Telephone Company - Shenandoah Valley Leasing Company\n\nShenandoah Cable Television Company - ShenTel Communications Company\n\nShenandoah Personal Communications Company\n\nPO Box 459 Edinburg, VA 22824-0459 Phone 540-984-4141 - Fax 540-984-8192 www.shentel.com\n\nThe front cover of the annual report is adapted from the Company’s 2004 Telephone Directory.", - "page_start": 59, - "page_end": 59, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Performance Grants\n\nIn fiscal 2009 and 2008, the Executive Organization and Compensation Committee made annual awards of three-year performance\n\ngrants to key officers. A target payout was established at the beginning of each three-year performance period. The actual payout\n\nat the end of the period is calculated based upon the Company’s achievement of sales growth, return on sales, and total shareholder\n\nreturn targets. All performance periods had expired by June 30, 2011. During fiscal 2011 and 2010, the Company recorded $1,020\n\nand $(231), respectively, of compensation expense (income) for achievement relative to the total shareholder return-based goals of\n\nthe Company’s performance grants. The liability at June 30, 2011 was $1,558; this was paid in fiscal 2012.\n\nNOTE 10: BENEFIT PLANS\n\nRetirement Savings Plan\n\nSubstantially all U.S. associates participate in the Applied Industrial Technologies, Inc. Retirement Savings Plan. Participants may elect\n\nto contribute up to 50% of their compensation, subject to Internal Revenue Code maximums. The Company makes a discretionary\n\nprofit-sharing contribution to the Retirement Savings Plan generally based upon a percentage of the Company’s U.S. income before\n\nincome taxes and before the amount of the contribution (5% for fiscal 2012, 2011 and 2010). The Company partially matches\n\n401(k) contributions by participants; this match was suspended from January 1, 2009 to June 30, 2010. The Company’s expense for\n\nprofit sharing and matching of associates’ 401(k) contributions was $10,866, $11,251 and $4,891 during fiscal 2012, 2011 and\n\n2010, respectively.\n\nDeferred Compensation Plans\n\nThe Company has deferred compensation plans that enable certain associates of the Company to defer receipt of a portion of their\n\ncompensation and non-employee directors to defer receipt of director fees. The Company funds these deferred compensation\n\nliabilities by making contributions to rabbi trusts. Assets held in these rabbi trusts consist of investments in money market and\n\nmutual funds and Company common stock.\n\nPostemployment Benefit Plans\n\nThe Company provides the following postemployment benefits which, except for the Qualified Defined Benefit Retirement Plan,\n\nare unfunded:\n\nSupplemental Executive Retirement Benefits Plan\n\nThe Company has a non-qualified pension plan to provide supplemental retirement benefits to certain officers. Benefits are\n\npayable beginning at retirement and determinable at retirement based upon a percentage of the participant’s historical\n\ncompensation. On December 19, 2011, the Executive Organization and Compensation Committee of the Board of Directors\n\nfroze participant benefits (credited service and final average earnings) and entry into the Supplemental Executive Retirement\n\nBenefits Plan (SERP) effective December 31, 2011. This action constituted a plan curtailment. The plan liability was remeasured\n\nin conjunction with the curtailment using a 3.5% discount rate and participant final average earnings through the curtailment\n\ndate. The remeasurement in conjunction with the curtailment resulted in an actuarial loss (recorded in other comprehensive\n\nincome (loss)) of $302 ($492 loss, net of income tax of $190).\n\nThe curtailment is reflected in the Company's consolidated balance sheets as: 1) a reduction to the overall SERP liability\n\n(included in postemployment benefits) of $8,860, 2) a reduction to deferred tax assets of $3,411 and 3) an increase in\n\naccumulated other comprehensive income (loss) of $5,449. Prior service costs previously recorded through accumulated other\n\ncomprehensive income (loss) were reclassified into the statements of consolidated income ($3,117 gross expense, net of income\n\ntax of $1,200). The gross expense is recorded in selling, distribution and administrative expense in fiscal 2012.\n\nKey Executive Restoration Plan", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "##### **General**\n\nShenandoah Telecommunications Company is a diversified telecommunications company providing both regulated and unregulated telecommunications services through its nine wholly owned subsidiaries. These subsidiaries provide local exchange telephone services, wireless personal communications services (PCS), as well as cable television, paging, Internet access, long distance, fiber optics facilities, and leased tower facilities. The Company is the exclusive provider of wireless mobility communications network products and services under the Sprint brand from Harrisonburg, Virginia to Harrisburg, York and Altoona, Pennsylvania. The Company refers to the Hagerstown, Maryland; Martinsburg, West Virginia; and Harrisonburg and Winchester, Virginia markets as its Quad State markets. The Company refers to the Altoona, Harrisburg, and York, Pennsylvania markets as its Central Penn markets. Competitive local exchange carrier (CLEC) services were established on a limited basis during 2002. In addition, the Company sells and leases equipment, mainly related to services it provides, and also participates in emerging services and technologies by direct investment in non-affiliated companies.\n\nThe Company reports revenues as wireless, wireline and other revenues. These revenue classifications are defined as follows: Wireless revenues are made up of the Personal Communications Company (a PCS Affiliate of Sprint), and the Mobile Company. Wireline revenues include the following subsidiary revenues in the financial results: Telephone Company, Network Company, Cable Television Company, and the Long Distance Company. Other revenues are comprised of the revenues of ShenTel Service Company, the Leasing Company, ShenTel Communications Company and the Holding Company. For additional information on the Company's business segments, see Note 14 to audited consolidated financial statements appearing elsewhere in this report.\n\nThe Company participates in the telecommunications industry, which requires substantial investment in fixed assets or plant. This significant capital requirement may preclude profitability during the initial years of operation. The strategy of the Company is to grow and diversify the business by adding services and geographic areas that can leverage the existing plant, but to do so within the opportunities and constraints presented by the industry. For many years the Company focused on reducing reliance on the regulated telephone operation, which up until 1981 was the primary business within the Company. This initial diversification was concentrated in other wireline businesses, such as the cable television and regional fiber facility businesses, but in 1990 the Company made its first significant investment in the wireless sector through its former investment in the Virginia 10 RSA Limited partnership. By 1998, revenues of the regulated telephone operation had decreased to 59.2% of total revenues. In that same year more than 76.6% of the Company’s total revenue was generated by wireline operations, and initiatives were already underway to make wireless a more significant contributor to total revenues.", - "page_start": 40, - "page_end": 40, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "35 ■ 2003 ANNUAL REPORT\n\n#### **SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n##### **Note 14. Segment Reporting**\n\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on the products and services each provides. Each segment is managed and evaluated separately because of differing technologies and marketing strategies.\n\nThe reporting segments and the nature of their activities are as follows:\n\nShenandoah Telecommunications Company (Holding) Holding company, which invests in both affiliated and non-affiliated companies.\n\nShenandoah Telephone Company (Telephone) Provides both regulated and unregulated telephone services and leases fiber optic facilities primarily throughout the Northern Shenandoah Valley.\n\nShenandoah Cable Television Company (CATV) Provides cable television service in Shenandoah County.\n\nShenTel Service Company (ShenTel) Provides Internet access to a multi-state region surrounding the Northern Shenandoah Valley, hosts Travel 511 for Virginia, and sells and services telecommunication equipment.\n\nShenandoah Valley Leasing Company (Leasing) Finances purchases of telecommunications equipment to customers of other segments.\n\nShenandoah Mobile Company (Mobile) Provides tower rental space in the Company’s PCS markets and paging services throughout the Northern Shenandoah Valley.\n\nShenandoah Long Distance Company (Long Distance) Provides long distance services.\n\nShenandoah Network Company (Network) Leases interstate fiber optic facilities.\n\nShenTel Communications Company (Shen Comm) Provides DSL services as a CLEC operation.\n\nShenandoah Personal Communications Company (PCS) As a PCS Affiliate of Sprint, provides digital wireless service to a portion of a four-state area covering the region from Harrisburg, York and Altoona, Pennsylvania, to Harrisonburg, Virginia.\n\nThe accounting policies of the segments are the same as those described in the summary of significant accounting policies. Each segment accounts for inter-segment sales and transfers as if the sales or transfers were to outside parties.\n\nIncome (loss) recognized from equity method nonaffiliated investees by segment is as follows:\n\nYear Holding Telephone Consolidated Totals\n\n*(in thousands)*\n\n**2003 $ (441) $ 65 $ (376)** 2002 $ (822) $ 45 $ (777) 2001 $ (1,218) $104 $ (1,114)", - "page_start": 36, - "page_end": 36, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n\nNotes to Consolidated Financial Statements\n\nDecember 31, 2002, 2001 and 2000\n\nF-23\n\nNet periodic pension cost for the years ended December 31, 2002, 2001, and 2000, included:\n\nYear Ended December 31,\n\n2002 2001 2000\n\nService cost - benefits earned during the period $ 994,630 $ 847,620 $ 845,372\n\nInterest cost on projected benefit obligation 983,977 970,710 816,583\n\nExpected return on plan assets (880,562) (1,153,733) (1,058,787)\n\nAmortization of unrecognized net loss 116,722 - -\n\nAmortization of prior-service cost 17,960 17,961 17,961\n\nOther (59,405) (58,954) 58,779\n\nNet periodic pension cost $1,173,322 $ 623,604 $ 679,908\n\nThe following table sets forth the rates used in the actuarial calculations of the present value of benefit obligations\n\nand the rate of return on plan assets:\n\n2002 2001 2000\n\nWeighted average discount rate 6.9% 6.9% 7.5%\n\nRate of increase in future compensation levels 4% 4% 4%\n\nExpected long-term rate of return on assets 6.5% 8.5% 8.5%\n\nAs of December 31, 2002 and 2001, the fair value of the plan’s assets included Company common stock valued at\n\napproximately $468,000 and $297,000, respectively.\n\nThe Company also provides a profit sharing plan, which covers substantially all full-time employees. The profit\n\nsharing plan is a defined contribution plan and allows employees to contribute up to 5% of their base annual salary.\n\nEmployees are fully vested to the extent of their contributions and become fully vested in the Company’s\n\ncontributions over a seven-year vesting period. Costs related to the Company’s defined contribution plan totaled\n\napproximately $2,681,000, $1,858,000 and $1,874,000 in 2002, 2001 and 2000, respectively, and are included in\n\nsalaries and employee benefits in the accompanying consolidated statements of earnings. As of December 31, 2002\n\nand 2001, the fair value of the plan’s assets included Company common stock valued at approximately $14,323,000\n\nand $10,881,000, respectively.\n\n13. DIVIDENDS FROM SUBSIDIARIES:\n\nAt December 31, 2002, approximately $20,728,000 was available for the declaration of dividends by the Company’s\n\nsubsidiary banks without the prior approval of regulatory agencies.\n\n14. REGULATORY MATTERS:\n\nThe Company is subject to various regulatory capital requirements administered by the federal banking agencies.\n\nFailure to meet minimum capital requirements can initiate certain mandatory, and possibly additional discretionary,\n\nactions by regulators that, if undertaken, could have a direct material effect on the Company’s financial statements.\n\nUnder capital adequacy guidelines and the regulatory framework for prompt corrective action, each of Bankshares’\n\nsubsidiaries must meet specific capital guidelines that involve quantitative measures of the subsidiaries’ assets,\n\nliabilities, and certain off-balance-sheet items as calculated under regulatory accounting practices. The subsidiaries’\n\ncapital amounts and classification are also subject to qualitative judgments by the regulators about components, risk\n\nweightings, and other factors.", - "page_start": 86, - "page_end": 86, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "**Figure 18: Employment types in EU27, development 2005 to 2022 <sup>65</sup>**\n\n**- Eurostat**\n\nThe minor deviation of the sum of the different types of employment to the 100% ‘Employed persons’ is due to ‘No\n\nresponse’ answers. The data of part-time employees and of employees with a temporary contract are for the full\n\nyear 2019, not for Q4.\n\nThe group ‘employees’ is characterised by **two major contractual distinctions** that are important for\n\nOSH: 1) **full- or part-time** work, and 2) the **time limit of the contract** (indefinite or temporary).\n\nMoreover, in many Member States there are major differences between employment contracts of private\n\nemployers in comparison to public employers.\n\n**Definitions Eurostat <sup>66</sup>**\n\n**Employers = self-employed with employee:** employing one or more employees: persons who work\n\nin their own business, professional practice or farm for the purpose of earning a profit and who employ\n\nat least one other person.\n\n**Self-employed:** not employing any employees (self-employed without employees): persons who work\n\nin their business, professional practices or farm for the purpose of earning a profit and who employ no\n\nother persons.\n\n**Employees:** persons who work for a public or private employer and who receive compensation in the\n\nform of wages, salaries, fees, gratuities, payment by result or in kind.\n\nContributing family workers: persons who help another member of the family to run a farm or\n\nbusiness, provided they are not classed as employees.", - "page_start": 46, - "page_end": 46, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Plan Assets\n\nThe fair value of each major class of plan assets for the Company’s Qualified Benefit Retirement Plan are valued using quoted market\n\nprices in active markets for identical instruments, or Level 1 in the fair value hierarchy. Following are the fair values and target\n\nallocation as of June 30:\n\nTarget Allocation Fair Value\n\n**2012** 2011\n\nAsset Class:\n\nEquity securities 40 - 70% **$ 3,735**\n\n$ 3,876\n\nDebt securities 20 - 50% **2,382**\n\n1,756\n\nOther 0 - 20% **322**\n\n424\n\nTotal 100% **$ 6,439**\n\n$ 6,056\n\nEquity securities do not include any Company common stock.\n\nThe Company has established an investment policy and regularly monitors the performance of the assets of the trust maintained in\n\nconjunction with the Qualified Defined Benefit Retirement Plan. The strategy implemented by the trustee of the Qualified Defined\n\nBenefit Retirement Plan is to achieve long-term objectives and invest the pension assets in accordance with ERISA and fiduciary\n\nstandards. The long-term primary objectives are to provide for a reasonable amount of long-term capital, without undue exposure\n\nto risk; to protect the Qualified Defined Benefit Retirement Plan assets from erosion of purchasing power; and to provide investment\n\nresults that meet or exceed the actuarially assumed long-term rate of return. The expected long-term rate of return on assets\n\nassumption was developed by considering the historical returns and the future expectations for returns of each asset class as well as\n\nthe target asset allocation of the pension portfolio.\n\nCash Flows\n\nEmployer Contributions\n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in\n\n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets.\n\nEstimated Future Benefit Payments\n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next\n\nfive years and in the aggregate for the subsequent five years:\n\nDuring Fiscal Years Pension Benefits Retiree Health Care\n\nBenefits\n\n2013 $ 6,200\n\n$ 240\n\n2014 5,900\n\n240\n\n2015 5,700\n\n240\n\n2016 4,500\n\n240\n\n2017 1,700\n\n260\n\n2018 through 2022 15,200\n\n1,420\n\n34\n\n#### NOTES TO CONSOLIDATED FINANCIAL STATEMENTS (Continued)\n\n(In thousands, except per share amounts)", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "marketable securities classified as other securities are carried at cost.\n\nCost of securities sold is determined by the moving average method.\n\n(g) Property, plant and equipment and depreciation\n\nDepreciation of property, plant and equipment of the Company and its\n\nconsolidated subsidiaries is calculated principally by the straight-line\n\nmethod based on the estimated useful lives and the residual value\n\ndetermined by the Company. Significant renewals and additions are\n\ncapitalized at cost. Maintenance and repairs are charged to income.\n\n(h) Leases\n\nNoncancellable lease transactions that transfer substantially all risks\n\nand rewards associated with the ownership of assets are accounted\n\nfor as finance leases. All other lease transactions are accounted for\n\nas operating leases and relating payments are charged to income as\n\nincurred. See Note 2(c).\n\n(i) Retirement benefits\n\nAccrued retirement benefits for employees have been provided\n\nmainly at an amount calculated based on the retirement benefit\n\nobligation and the fair value of the pension plan assets as of balance\n\nsheet date, as adjusted for unrecognized net retirement benefit\n\nobligation at transition, unrecognized actuarial gain or loss, and\n\nunrecognized prior service cost. The retirement benefit obligation is\n\nattributed to each period by the straight-line method over the\n\nestimated years of service of the eligible employees. The net\n\nretirement benefit obligation at transition is being amortized\n\nprincipally over a period of 15 years by the straight-line method.\n\nActuarial gain or loss is amortized in the year following the year in\n\nwhich the gain or loss is recognized primarily by the straight-line\n\nmethod over periods (principally 8 years through 18 years) which are\n\nshorter than the average remaining years of service of the\n\nemployees. Certain foreign consolidated subsidiaries have adopted\n\nthe corridor approach for the amortization of actuarial gain and loss.\n\nPrior service cost is being amortized as incurred by the straight-line\n\nmethod over periods (principally 9 years through 15 years) which are\n\nshorter than the average remaining years of service of the\n\nemployees.\n\nSee Note 9 for the method of accounting for the separation of the\n\nsubstitutional portion of the benefit obligation from the corporate\n\nportion of the benefit obligation under Welfare Pension Fund Plan.\n\nSee Note 2(b) for adoption of a new accounting standard by a\n\nconsolidated subsidiary in the United Kingdom.\n\n(j) Income taxes\n\nDeferred tax assets and liabilities have been recognized in the\n\nconsolidated financial statements with respect to the differences\n\nbetween financial reporting and the tax bases of the assets and\n\nliabilities, and were measured using the enacted tax rates and laws\n\nwhich will be in effect when the differences are expected to reverse.\n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES\n\n### NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\n\nNissan Motor Co., Ltd. and Consolidated Subsidiaries\n\n*Fiscal year 2004 (Year ended March 31, 2005)*\n\nFINANCIAL SECTION", - "page_start": 78, - "page_end": 78, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_SHEN_2003.pdf", - "query": "At the end of 2003, how many available-for-sales investments did Shenandoah company count in its portfolio ?", - "target_page": 53, - "target_passage": "The Company’s available-for-sale portfolio at December 31, 2003 is made up of two investments", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "### **We must serve well to prosper - We must prosper to serve well**\n\nShenTel Service Company - Shenandoah Long Distance Company - Shenandoah Mobile Company\n\nShenandoah Network Company - Shenandoah Telephone Company - Shenandoah Valley Leasing Company\n\nShenandoah Cable Television Company - ShenTel Communications Company\n\nShenandoah Personal Communications Company\n\nPO Box 459 Edinburg, VA 22824-0459 Phone 540-984-4141 - Fax 540-984-8192 www.shentel.com\n\nThe front cover of the annual report is adapted from the Company’s 2004 Telephone Directory.", - "page_start": 59, - "page_end": 59, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "35 ■ 2003 ANNUAL REPORT\n\n#### **SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n##### **Note 14. Segment Reporting**\n\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on the products and services each provides. Each segment is managed and evaluated separately because of differing technologies and marketing strategies.\n\nThe reporting segments and the nature of their activities are as follows:\n\nShenandoah Telecommunications Company (Holding) Holding company, which invests in both affiliated and non-affiliated companies.\n\nShenandoah Telephone Company (Telephone) Provides both regulated and unregulated telephone services and leases fiber optic facilities primarily throughout the Northern Shenandoah Valley.\n\nShenandoah Cable Television Company (CATV) Provides cable television service in Shenandoah County.\n\nShenTel Service Company (ShenTel) Provides Internet access to a multi-state region surrounding the Northern Shenandoah Valley, hosts Travel 511 for Virginia, and sells and services telecommunication equipment.\n\nShenandoah Valley Leasing Company (Leasing) Finances purchases of telecommunications equipment to customers of other segments.\n\nShenandoah Mobile Company (Mobile) Provides tower rental space in the Company’s PCS markets and paging services throughout the Northern Shenandoah Valley.\n\nShenandoah Long Distance Company (Long Distance) Provides long distance services.\n\nShenandoah Network Company (Network) Leases interstate fiber optic facilities.\n\nShenTel Communications Company (Shen Comm) Provides DSL services as a CLEC operation.\n\nShenandoah Personal Communications Company (PCS) As a PCS Affiliate of Sprint, provides digital wireless service to a portion of a four-state area covering the region from Harrisburg, York and Altoona, Pennsylvania, to Harrisonburg, Virginia.\n\nThe accounting policies of the segments are the same as those described in the summary of significant accounting policies. Each segment accounts for inter-segment sales and transfers as if the sales or transfers were to outside parties.\n\nIncome (loss) recognized from equity method nonaffiliated investees by segment is as follows:\n\nYear Holding Telephone Consolidated Totals\n\n*(in thousands)*\n\n**2003 $ (441) $ 65 $ (376)** 2002 $ (822) $ 45 $ (777) 2001 $ (1,218) $104 $ (1,114)", - "page_start": 36, - "page_end": 36, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "The Company’s PCS business has operated in a net travel receivable position for several years. The Company received $6.0 million in net travel in 2003, compared to $5.8 million in 2002, and $4.0 million in 2001. This relationship could change due to service plan changes, subscriber travel habit changes and other changes beyond the control of the Company.\n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 42\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 43, - "page_end": 43, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "## **SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n\n## **2003 Financial Statements**\n\n11 ■ 2003 ANNUAL REPORT\n\n### **INDEPENDENT AUDITOR’S REPORT**\n\nThe Board of Directors and Shareholders Shenandoah Telecommunications Company:\n\nWe have audited the accompanying consolidated balance sheets of Shenandoah Telecommunications Company and subsidiaries (the Company), as of December 31, 2003, 2002, and 2001, and the related consolidated statements of income, shareholders’ equity and comprehensive income, and cash flows for the years then ended. These consolidated financial statements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these consolidated financial statements based on our audits.\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion.\n\nIn our opinion, the consolidated financial statements referred to above present fairly, in all material respects, the financial position of Shenandoah Telecommunication s Company and subsidiaries as of December 31, 2003, 2002 and 2001, and the results of their operations and their cash flows for the years then ended, in conformity with accounting principles generally accepted in the United States of America.\n\nAs discussed in note 1 to the consolidated financial statements, the Company changed its method of accounting for goodwill in 2002. As further discussed in note 1 to the consolidated financial statements, the Company changed its method of accounting for asset retirement obligations in 2003.\n\nRichmond, Virginia February 6, 2004", - "page_start": 12, - "page_end": 12, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**FORMS 10-K, 10-Q, and 8-K The Company files periodic reports with the Securities and Exchange Commission. The Company's Annual Report on Form 10-K, Quarterly Reports on Form 10-Q, and Current Reports on Form 8-K, along with any amendments to these reports, are available to shareholders through the Company’s website, www.shentel.com. This website also has recent news releases and other information potentially of interest to shareholders. A copy of the Company’s Annual Report on Form 10-K, without exhibits, may be obtained, without charge, by writing to Shenandoah Telecommunications Company, 124 South Main Street, P.O. Box 459, Edinburg, Virginia 22824, Attention: Secretary.**\n\n**MARKET AND DIVIDEND INFORMATION** The Company's stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the high and low sales prices per share of common stock as reported by the NASDAQ National Market for the last two years is set forth below:\n\n#### **OUR BUSINESS**\n\nAll share and per share figures are restated to reflect the 2 for 1 stock split effected February 23, 2004. The Company historically has paid an annual cash dividend on or about December 1 <sup>st</sup> of each year. The cash dividend per share was $0.39 in 2003 and $0.37 in 2002. The Company’s ability to pay dividends is restricted by its long-term loan agreements. The loan agreements are not expected to limit dividends in amounts that the Company historically has paid. As of February 15, 2004, there were approximately 3,930 holders of record of the Company’s common stock.\n\n**CORPORATE HEADQUARTERS INDEPENDENT AUDITOR** Shenandoah Telecommunications Company KPMG LLP 124 South Main Street 1021 East Cary Street Edinburg, VA 22824 Richmond, VA 23219\n\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS** CALL (540) 984-5200 Transfer Agent - Common Stock Shenandoah Telecommunications Company P.O. Box 459 Edinburg, VA 22824\n\n*This Annual Report to Shareholders contains forward-looking statements. These statements are subject to certain risks*\n\n*and uncertainties that could cause actual results to differ materially from those anticipated in the forward-looking*\n\n*statements. Factors that might cause such a difference include, but are not limited to: changes in the interest rate*\n\n*environment; management's business strategy; national, regional, and local market conditions; and legislative and*\n\n*regulatory conditions. Readers should not place undue reliance on forward-looking statements which reflect*\n\n*management's view only as of the date hereof. The Company undertakes no obligation to publicly revise these*\n\n*forward-looking statements to reflect subsequent events or circumstances, except as required by law.*\n\n#### **SHAREHOLDER INFORMATION**\n\nShenandoah Telecommunications Company 124 South Main Street Edinburg, VA 22824 124 South Main Street 1021 East Cary Street\n\nHigh price\n\nLow price\n\nThe Company’s stock is traded on the NASDAQ National Market under the symbol “SHEN.” Information on the high and low closing prices per share of common stock as reported by the NASDAQ National Market for the last two years is set forth below:\n\n#### **CORPORATE HEADQUARTERS**\n\n*All share and per share figures are restated to reflect the 2 for 1 stock split effected February 23, 2004.*", - "page_start": 58, - "page_end": 58, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "#### **SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\nincome until realized. Realized gains and losses are determined on a specific identification basis. A decline in the market value of any available-for-sale security below cost that is deemed to be other than temporary results in a reduction in the carrying amount to fair value. The impairment is charged to earnings and a new cost basis for the security is established.\n\n*Investments Carried at Cost:* Investments in common stock in which the Company does not have a significant ownership (less than 20%) and for which there is no ready market, are carried at cost. Information regarding investments carried at cost is reviewed continuously for evidence of impairment in value. Impairments are charged to earnings and a new cost basis for the investment is established.\n\n*Equity Method Investments* : Investments in partnerships and unconsolidated corporations where the Company's ownership is 20% or more, or where the Company otherwise has the ability to exercise significant influence, are reported under the equity method. Under this method, the Company's equity in earnings or losses of investees is reflected in earnings. Distributions received reduce the carrying value of these investments. The Company recognizes a loss when there is a decline in value of the investment which is other than a temporary decline.\n\n19 ■ 2003 ANNUAL REPORT", - "page_start": 20, - "page_end": 20, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "##### **Note 1. Summary of Significant Accounting Policies**\n\n* **Description of business:** * Shenandoah Telecommunications Company and subsidiaries (the Company) provides telephone service, wireless personal communications service (PCS) under the Sprint brand name, cable television, unregulated communications equipment sales and services, Internet access, and paging services. In addition, the Company leases towers and operates and maintains an interstate fiber optic network. The Company's operations are located in the four state region surrounding the Northern Shenandoah Valley of Virginia. Pursuant to a management agreement with Sprint Communications Company and its related parties (collectively, “Sprint”), the Company is the exclusive PCS Affiliate of Sprint providing wireless mobility communications network products and services in the geographic area extending from Altoona, Harrisburg and York, Pennsylvania, south through Western Maryland, and the panhandle of West Virginia, to Harrisonburg, Virginia. The Company is licensed to use the Sprint brand name in this territory, and operates its network under the Sprint radio spectrum license (Note 7). A summary of the Company's significant accounting policies follows:\n\n* **Stock split:** * All share and per share information reflect the two for one stock split announced in October 2003, to shareholders of record as of the close of business on January 30, 2004. The additional shares were distributed on February 20, 2004. The effective date of the split is February 23, 2004. All previously reported share and per share data included herein are retroactively adjusted to reflect the split.\n\n* **Principles of consolidation:** * The consolidated financial statements include the accounts of all wholly owned subsidiaries and other entities where effective control is exercised. All significant intercompany balances and transactions have been eliminated in consolidation.\n\n* **Use of estimates:** * Management of the Company has made a number of estimates and assumptions related to the reporting of assets and liabilities, the disclosure of contingent assets and liabilities at the date of the consolidated financial statements and the reported amounts of revenues and expenses during the reporting periods. Management reviews its estimates, including those related to recoverability and useful lives of assets as well as liabilities for income taxes and pension benefits. Changes in facts and circumstances may result in revised estimates and actual results could differ from those reported estimates.\n\n* **Cash and cash equivalents:** * The Company considers all temporary cash investments purchased with a maturity of three months or less to be cash equivalents. The Company places its temporary cash investments with high credit quality financial institutions. At times, these investments may be in excess of FDIC insurance limits. Cash and cash equivalents were $28.7million, $2.2 million, and $2.0 million at December 31, 2003, 2002 and 2001, respectively.", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "##### **DISCONTINUED OPERATIONS**\n\nIncome from discontinued operations was $22.4 million after taxes, an increase of $15.0 million or 202%. The income from discontinued operations in 2003 includes the sale of the partnership interest in February 2003 and results from the two months of its operations in 2003.\n\nThe Company adopted FAS 143 “Accounting for Asset Retirement Obligations.” effective January 1, 2003, and as a result recorded a charge to earnings for the cumulative effect of this change in accounting of $76 thousand after taxes.\n\nNet income was $32.1 million, an increase of $27.6 million or 610%. The increase is a result of improved operating results in the PCS operations, the 2002 VeriSign stock loss and the sale of the cellular operations.\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 50, - "page_end": 50, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "#### **NEW TELEPHONE DIRECTORY FOR THE NORTHERN SHENANDOAH VALLEY**\n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 8\n\nT he Shenandoah Telephone Directory has undergone many changes since we published our first directory in 1906, as The Farmers’ Mutual\n\n#### Telephone System of Shenandoah County. In 1906, the entire phone number\n\n#### listings were on 15 pages. The first Company directory to include yellow\n\n#### pages was distributed in 1946. That year local businesses invested in a new\n\n#### way to reach their potential customers.\n\n#### The goal has always been to provide a useful tool for our customers.\n\n#### The pace of change has quickened in the last few years. In 2000, for the\n\n#### first time, Shenandoah Telephone’s directory expanded from telephone\n\n#### listings for only Shenandoah County and Bergton, to include business and\n\n#### residential listings for Rockingham, Frederick, Clarke, and Warren\n\n#### counties. In 2001, Page County listings were added. The name of our\n\n#### directory was changed to ShentelPages in 2002 to reflect the expanded\n\n#### listing area. Although we included additional information in our\n\n#### directory, we continued to only furnish it to our local telephone\n\n#### customers.\n\n#### Early in 2003, we conducted a customer survey to measure potential\n\n#### public acceptance of a regional phone directory for the six-county area. The\n\nfindings of the survey indicated almost 60% would likely use an expanded six-county directory, with a\n\nfourth of all respondents saying they would use a regional directory more often than the directory they\n\ncurrently had in their home or business. Based on these positive results, Shentel launched an expanded\n\n#### directory to meet the demand.\n\nAn extensive public-awareness campaign was launched on television and radio, in a variety of daily and\n\nweekly newspapers and at regional county fairs. The campaign helped build anticipation for the directory\n\nand increase awareness of yellow page advertising opportunities. As a result of the added value of the\n\nexpanded distribution area, ShentelPages’ yellow page advertising revenues increased 21%, to $1.8 million\n\n#### for the 2004 book.\n\n#### In December 2003, Shentel mailed out 120,000 ShentelPages\n\n#### directories to every home and business in Shenandoah,\n\n#### Rockingham, Frederick, Page, Clarke and Warren counties.\n\n#### ShentelPages now has a potential audience that exceeds 300,000\n\n#### readers. The 2004 directory continues to be an important local\n\n#### resource. In addition to telephone listings, it contains both\n\n#### general and county-specific information - from ZIP codes to area\n\n#### codes, and from international dialing instructions to the listing of\n\n#### regional interstate exits.\n\n#### Through ShentelPages, businesses have a new way of\n\n#### reaching thousands more potential customers within the six-\n\n#### county area to sell their products and services. ShentelPages is\n\n#### bundled with our electronic version, ShentelPages.com. This\n\n#### service allows area residents to use their computer and the\n\n#### Internet to let their fingers do the walking.\n\nJust like our first book in 1906, the 2004 ShentelPages provides area residents with a quick and easy way\n\n#### to stay in touch.", - "page_start": 9, - "page_end": 9, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY ■ 24\n\n#### **SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n##### **Note 3. Securities and Investments**\n\nThe Company has three classifications of investments; available for sale securities, investments carried at cost, and equity method investments. See Note 1 for specific definitions of each classification of investment. The following tables present the investments of the Company for the three-year period ended December 31, 2003:\n\nAvailable-for-sale securities at December 31 consist of the following:\n\nCost\n\nGross Unrealized Holding Gains\n\nGross Unrealized Holding Losses Fair Value\n\n*(in thousands)* **2003** Deutsche Telekom, AG **$ 85 $ 64 $ - $ 149** Other **73 - 23 50 $ 158 $ 64 $ 23 $ 199**\n\n2002 Deutsche Telekom, AG $ 85 $ 20 $ - $ 105 Other 73 - 27 46 $ 158 $ 20 $ 27 $ 151\n\n2001 VeriSign, Inc. $11,798 $ - $ - $11,798 Deutsche Telekom, AG 85 10 - 95 Other 74 58 - 132 $11,957 $ 68 $ - $12,025\n\nDuring 2001, the Company liquidated its holdings of Loral Space and Communications, LTD and ITC^DeltaCom, Inc. for proceeds of $0.2 million and a realized loss of $1.4 million. Additionally, the Company sold 130,000 shares of Illuminet Holdings, Inc. (Illuminet) for proceeds of $5.3 million and a realized gain of $5.0 million. In September 2001, Illuminet notified the Company that VeriSign, Inc. (VeriSign) made an offer to acquire Illuminet. The Company received VeriSign stock valued at $13.2 million, for the Illuminet investment, and based on the fair value of the new asset received, recorded a realized gain of $12.7 million in 2001 on the transaction through net gain on investments in the other income (expense) section of the income statement. Subsequent to the close of the transaction, the VeriSign stock declined in value and the Company recognized an impairment of $1.5 million, as management viewed the decline to be other than temporary.\n\nIn 2002, the Company liquidated its holdings of VeriSign, Inc, for proceeds of $2.8 million and a realized loss of $9.0 million. The VeriSign stock was valued at $38 per share at December 31, 2001, and declined over the ensuing months to approximately $6 per share in early July 2002. The Company liquidated all of its holdings in the stock early in the third quarter 2002. The Company’s original investment in VeriSign’s predecessor companies was approximately $1.0 million. Total proceeds from all sales of stock in VeriSign and its predecessor companies were $8.1 million, or more than eight times the original investment.\n\nThere were no gross realized gains on available-for-sale securities included in income in 2003 or 2002, while there were $17.7 million for 2001. Gross realized losses included in income in 2003, 2002 and 2001 were $3 thousand, $9.0 million and $3.0 million, respectively.\n\nChanges in the unrealized gains (losses) on available-for-sale securities during the years ended December 31, 2003, 2002 and 2001 reported as a separate component of shareholders' equity are as follows:\n\n.\n\n##### **$**\n\n##### **$**\n\n$\n\n$\n\n$\n\n$", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_SHEN_2003.pdf", - "query": "What was the main reason of the decrease of customer base of the Shenandoah and Virginia 10 RSA partnership ?", - "target_page": 51, - "target_passage": "he decline was the result of competition with digital technologies and increased competition from national carriers in the area", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "### **We must serve well to prosper - We must prosper to serve well**\n\nShenTel Service Company - Shenandoah Long Distance Company - Shenandoah Mobile Company\n\nShenandoah Network Company - Shenandoah Telephone Company - Shenandoah Valley Leasing Company\n\nShenandoah Cable Television Company - ShenTel Communications Company\n\nShenandoah Personal Communications Company\n\nPO Box 459 Edinburg, VA 22824-0459 Phone 540-984-4141 - Fax 540-984-8192 www.shentel.com\n\nThe front cover of the annual report is adapted from the Company’s 2004 Telephone Directory.", - "page_start": 59, - "page_end": 59, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "35 ■ 2003 ANNUAL REPORT\n\n#### **SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n##### **Note 14. Segment Reporting**\n\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on the products and services each provides. Each segment is managed and evaluated separately because of differing technologies and marketing strategies.\n\nThe reporting segments and the nature of their activities are as follows:\n\nShenandoah Telecommunications Company (Holding) Holding company, which invests in both affiliated and non-affiliated companies.\n\nShenandoah Telephone Company (Telephone) Provides both regulated and unregulated telephone services and leases fiber optic facilities primarily throughout the Northern Shenandoah Valley.\n\nShenandoah Cable Television Company (CATV) Provides cable television service in Shenandoah County.\n\nShenTel Service Company (ShenTel) Provides Internet access to a multi-state region surrounding the Northern Shenandoah Valley, hosts Travel 511 for Virginia, and sells and services telecommunication equipment.\n\nShenandoah Valley Leasing Company (Leasing) Finances purchases of telecommunications equipment to customers of other segments.\n\nShenandoah Mobile Company (Mobile) Provides tower rental space in the Company’s PCS markets and paging services throughout the Northern Shenandoah Valley.\n\nShenandoah Long Distance Company (Long Distance) Provides long distance services.\n\nShenandoah Network Company (Network) Leases interstate fiber optic facilities.\n\nShenTel Communications Company (Shen Comm) Provides DSL services as a CLEC operation.\n\nShenandoah Personal Communications Company (PCS) As a PCS Affiliate of Sprint, provides digital wireless service to a portion of a four-state area covering the region from Harrisburg, York and Altoona, Pennsylvania, to Harrisonburg, Virginia.\n\nThe accounting policies of the segments are the same as those described in the summary of significant accounting policies. Each segment accounts for inter-segment sales and transfers as if the sales or transfers were to outside parties.\n\nIncome (loss) recognized from equity method nonaffiliated investees by segment is as follows:\n\nYear Holding Telephone Consolidated Totals\n\n*(in thousands)*\n\n**2003 $ (441) $ 65 $ (376)** 2002 $ (822) $ 45 $ (777) 2001 $ (1,218) $104 $ (1,114)", - "page_start": 36, - "page_end": 36, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "#### **NEW TELEPHONE DIRECTORY FOR THE NORTHERN SHENANDOAH VALLEY**\n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 8\n\nT he Shenandoah Telephone Directory has undergone many changes since we published our first directory in 1906, as The Farmers’ Mutual\n\n#### Telephone System of Shenandoah County. In 1906, the entire phone number\n\n#### listings were on 15 pages. The first Company directory to include yellow\n\n#### pages was distributed in 1946. That year local businesses invested in a new\n\n#### way to reach their potential customers.\n\n#### The goal has always been to provide a useful tool for our customers.\n\n#### The pace of change has quickened in the last few years. In 2000, for the\n\n#### first time, Shenandoah Telephone’s directory expanded from telephone\n\n#### listings for only Shenandoah County and Bergton, to include business and\n\n#### residential listings for Rockingham, Frederick, Clarke, and Warren\n\n#### counties. In 2001, Page County listings were added. The name of our\n\n#### directory was changed to ShentelPages in 2002 to reflect the expanded\n\n#### listing area. Although we included additional information in our\n\n#### directory, we continued to only furnish it to our local telephone\n\n#### customers.\n\n#### Early in 2003, we conducted a customer survey to measure potential\n\n#### public acceptance of a regional phone directory for the six-county area. The\n\nfindings of the survey indicated almost 60% would likely use an expanded six-county directory, with a\n\nfourth of all respondents saying they would use a regional directory more often than the directory they\n\ncurrently had in their home or business. Based on these positive results, Shentel launched an expanded\n\n#### directory to meet the demand.\n\nAn extensive public-awareness campaign was launched on television and radio, in a variety of daily and\n\nweekly newspapers and at regional county fairs. The campaign helped build anticipation for the directory\n\nand increase awareness of yellow page advertising opportunities. As a result of the added value of the\n\nexpanded distribution area, ShentelPages’ yellow page advertising revenues increased 21%, to $1.8 million\n\n#### for the 2004 book.\n\n#### In December 2003, Shentel mailed out 120,000 ShentelPages\n\n#### directories to every home and business in Shenandoah,\n\n#### Rockingham, Frederick, Page, Clarke and Warren counties.\n\n#### ShentelPages now has a potential audience that exceeds 300,000\n\n#### readers. The 2004 directory continues to be an important local\n\n#### resource. In addition to telephone listings, it contains both\n\n#### general and county-specific information - from ZIP codes to area\n\n#### codes, and from international dialing instructions to the listing of\n\n#### regional interstate exits.\n\n#### Through ShentelPages, businesses have a new way of\n\n#### reaching thousands more potential customers within the six-\n\n#### county area to sell their products and services. ShentelPages is\n\n#### bundled with our electronic version, ShentelPages.com. This\n\n#### service allows area residents to use their computer and the\n\n#### Internet to let their fingers do the walking.\n\nJust like our first book in 1906, the 2004 ShentelPages provides area residents with a quick and easy way\n\n#### to stay in touch.", - "page_start": 9, - "page_end": 9, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Cindy Rinker, corporate content editor at Shentel since October 2002, was recently named the 2004 chairman of the Woodstock, Virginia Downtown Enhancement Committee’s Promotion Committee. The Downtown Enhancement group was established to find ways to revitalize downtown Woodstock. As a member for the past four years, Cindy has helped develop, plan and promote an impressive list of events from Light Up Woodstock at Christmastime to a street dance in spring, to Halloween on Court Square in October. The ultimate goal is to create a downtown area that is lively, attractive and reflective of Woodstock’s important historical significance to the Shenandoah Valley and the Commonwealth of Virginia.\n\n##### **“It is important to preserve the beauty and history of this area for the generations to come.”**\n\n#### **PEOPLE OF SHENTEL**\n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 4\n\n##### * **David Ferguson** *\n\nTarinda Showman has worked part-time in the Shentel Communications Center since she was a summer intern in 1998. She initially joined the Conicville, VA Volunteer Fire Department to help raise funds, but when she ran her first emergency call she was hooked. During her six years in the Department, she served a two-year stint as captain and currently holds the office of secretary. In 1999, she joined the Mount Jackson, VA Rescue Squad. Each week she pulls two 12-hour shifts with the rescue squad and spends at least 10 hours at the fire department.\n\n##### **“I do it because one day it might be my family. It’s always somebody’s family.”**\n\n##### * **Brian Bosley** *\n\nDuring his 36 years at Shentel, David Ferguson, Vice President-Customer Services, has been involved in a variety of community, civic and church organizations such as the Woodstock Rotary Club, the American Cancer Society and the March of Dimes. David is a charter member of the Board of Directors of the Shenandoah County Free Clinic and served as chairman of the fund-raising drive. The clinic opened its doors in June 2002, offering medical, dental and pharmaceutical services to county citizens who would not otherwise receive these services. In the first six months, more than 300 patients were served.\n\nFor their work at the clinic, David and his wife, Janet, received the Unsung Hero Award from Governor Mark Warner in 2003, and David earned the 2003 Beyond the Call Award from the United States Telecommunications Association.\n\n##### **“It is so rewarding - you can see it on the faces of the people.”**\n\n##### * **Cindy Rinker** *\n\n##### * **Tarinda Showman** *\n\nBrian Bosley, a Sprint PCS business-to-business sales representative with Shentel for the past three years, has always enjoyed sports. He takes his passion, knowledge and experience in sports, and volunteers his time with young people in his community. Brian has been active in the very successful Bridgewater, Virginia Community Little League program for the past four years. He currently serves as vice president of the Girls Minor League Softball. Brian also finds time to coach his daughters’ T-ball and basketball teams.\n\n##### **“I get a great sense of satisfaction from teaching kids and watching them grow and learn.”**", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "##### **Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the Virginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with Verizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated an analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, Rappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus the Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company was required to do a working capital true up following the closing, from which the Company recorded a charge for $23 thousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to reflect the consolidated effective tax rate based on the final operating results for the year.\n\nThe wireless industry in the late 1990’s became increasingly competitive and the Company was not immune to these industry issues. The Clear Pay <sup>SM</sup> program, introduced by Sprint as a no-deposit offering in 2001, attracted high credit risk customers in the Company’s markets. As the results began to materialize, the Company implemented deposits on this program (mid-April 2002), and experienced high levels of customer turnover (churn) and uncollectable accounts. The write-offs of uncollectable accounts peaked in the third quarter of 2002. During the fourth quarter of 2002 there was some evidence that the strengthened credit policy was having a favorable impact. Nonetheless, the 2002 net loss in the PCS operation was $5.4 million, as compared to $5.5 million in 2001. Despite the disappointing financial results for 2002, the PCS customer base grew by over 40%. While the PCS operation was adding customers, the cellular operation continued to lose its local customer base.\n\nThe growing belief that national branding was critical to our wireless operations, the expectation that roaming revenues from our analog cellular operation would not continue to grow, and the increase in the number of wireless competitors in our markets, prompted the Company to exit the cellular business in order to focus on our PCS operations. The Company entered into an agreement on November 21, 2002, to sell its 66% ownership interest in the Virginia 10 RSA cellular operation which was classified as a discontinued operation. The closing occurred February 28, 2003. The Company received $37.0 million in proceeds, including $5.0 million in escrow for two years and $1.7 million for working capital.\n\nIn many respects, 2003 was a successful year. Churn and levels of uncollectable accounts in the PCS operation returned to more acceptable levels. PCS revenues reached $67.0 million, and total revenues reached $105.9 million. The PCS operation recognized a small profit for the year, including favorable adjustments associated with settlement of disputed items with Sprint. Excluding the favorable adjustments, the PCS operation recognized a profit in the fourth quarter. With improved operating cash flow and reduced capital spending in 2003, the Company prepaid $4.6 million in debt, selecting those notes with nominal prepayment penalties. Additionally, after receiving the cash and paying taxes on the gain of the sale of the Virginia 10 partnership interest, the Company invested the remaining proceeds in liquid financial instruments, available for future deployment. Additionally, the Company has been successful at decreasing its dependency on wireline revenues. Wireline revenues, at $29.0 million in 2003 compared to $18.6 million in 1998, were 27.4% of total revenues in 2003 compared to 76.6% in 1998.", - "page_start": 41, - "page_end": 41, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "The Company’s PCS business has operated in a net travel receivable position for several years. The Company received $6.0 million in net travel in 2003, compared to $5.8 million in 2002, and $4.0 million in 2001. This relationship could change due to service plan changes, subscriber travel habit changes and other changes beyond the control of the Company.\n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 42\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 43, - "page_end": 43, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "2003 was the 10th anniversary of Shentel’s decision to enter the PCS business and the 8th year operating as a Sprint PCS Affiliate. This year was a\n\n#### significant milestone for Shentel’s PCS business, as we posted our first\n\n#### profitable quarter and recorded net income for the year of $0.3 million versus a\n\n#### net loss of $5.4 million in 2002.\n\n#### Our Sprint PCS wireless customer base continues to grow, with year-end\n\n#### customers at 85,139 spread from Harrisonburg, Virginia to Harrisburg,\n\n#### Pennsylvania. Our customers are averaging approximately 700 minutes of\n\n#### usage per month and we have one of the lowest customer churn rates in the\n\n#### industry. To keep up with this growth and improve our service, we continued\n\n#### investing in additional network facilities. We added capacity to 26 existing\n\n#### tower sites and installed 16 new tower locations bringing our total sites to\n\n## 253. Our plan is to add capacity and build additional sites in 2004 in order\n\n#### to meet expected growth.\n\n#### We added a new type of customer in 2003. Through Sprint’s\n\n#### relationship with its wholesale cutomers, more than 11,000 pre-paid\n\n#### customers were added to our network. These pre-paid accounts, usually\n\n#### for customers with no established credit, are a low cost method to increase\n\n#### customers. They can purchase phones and some minutes at various\n\n#### convenience, electronic or department stores in addition to one of our\n\n#### company locations. When needed, they can easily purchase additional\n\n#### minutes.\n\n#### Camera phones and e-mailing pictures were hot in 2003. We now\n\n#### offer phones that can take and send a 15 second video. Late in the year,\n\n#### we launched Spirit PCS ReadyLink <sup>sm</sup> , the Sprint walkie-talkie style\n\n#### service. It is hoped that these new services will be major sales drivers\n\n#### in 2004.\n\n#### In 2003, we focused on improving our distribution channels. We\n\n#### expanded and relocated our stores in Harrisonburg and Winchester,\n\n#### Virginia to handle our growing customer base. At our Edinburg,\n\n#### Virginia store, we expanded both our hours and office space. We\n\n#### continue to increase our direct sales force to expand our base of\n\n#### business customers. To make it convenient for our potential\n\n#### customers, we also grew the number of local third-party sales\n\n#### partners.\n\nA much publicized development in our industry was the introduction of Wireless Local Number Portability\n\n(WLNP) on November 24 <sup>th</sup> , 2003. Starting on that day, customers in the 100 largest population centers in the\n\nUnited States were able to change wireless carriers while keeping their existing phone number. WLNP will be\n\navailable in the entire country on May 24, 2004. To date, this change has had only a minor impact on Shentel’s\n\n#### customer base.\n\n#### We continue to work to make PCS a growth vehicle of revenue and net income for Shenandoah\n\n#### Telecommunications Company.\n\n#### **A SIGNIFICANT MILESTONE FOR PCS**\n\n9 ■ 2003 ANNUAL REPORT", - "page_start": 10, - "page_end": 10, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "#### **PEOPLE OF SHENTEL**\n\nVolunteerism is in Patty Pomeroy’s blood. Her grandfather was a dispatcher for the rescue squad in Middletown, VA for 25 years and her grandmother was in the ladies auxiliary. Her father was a charter member of the Middletown Rescue Squad. In 1997, Patty, a customer service representative at Shentel for four years, continued the family tradition by earning her Emergency Medical Technician certification and going to “work” for the Strasburg Rescue Squad. Patty is the administrator of membership recruitment and retention for the squad and is the liaison coordinator for junior squad members under 18. It is her job to make sure that new members are brought in to the squad and current members stay active.\n\n**“There is a great satisfaction that comes from knowing that what you can do will help people.”** * **Patty Pomeroy** *\n\n##### * **Jeff Beard** *\n\n##### * **John Gardner** *\n\n##### * **George Brinkley** *\n\nJeff Beard has been an installer repairman with Shentel for almost five years. Two years ago, Jeff helped start Project Isaiah 58, a faith-based recovery ministry that reaches out to people who are struggling with addiction. Project Isaiah 58 has weekly group meetings in Winchester, Woodstock and Warrenton, VA. Jeff, who lives in Winchester, participates in the group meetings and also makes time to meet one-on-one with people who need personal attention.\n\n##### **“I feel the need to reach out to people who are suffering.”**\n\nJohn Gardner has been with Shentel for two years as a PCS technician in Central Pennsylvania, but for almost a year of that time he was on Naval Reserve duty in Sasebo, Japan. John joined the Reserves after serving 10 years of active duty. In October 2002, he was activated under Noble Eagle-Enduring Freedom as part of the increase in security at bases around the world. John worked on Motorola radios and repeater systems while stationed in Japan. It was tough for the serviceman to be away from his wife and children, but John believes very strongly in serving his country.\n\n##### **“Being in the Reserves is a way for me to be a civilian and still serve my country.”**\n\nAt Shentel, George Brinkley, the store manager in Front Royal, VA, is known for being one of the biggest fund-raisers for the Shenandoah County American Cancer Society Relay for Life event. In his six years at the Company, George has raised nearly $20,000. In 2003, he raised $4,246 and was recognized as the top individual fund-raiser for the entire event.\n\nIn 2002, George was chairman of the parade committee for the Woodstock, VA 250th anniversary celebration. Under George’s leadership, the 26-member committee worked for a year preparing for the parade, which was the largest in the town’s history.\n\n##### **“I just have a knack for volunteering. I want to make my community better any way I can.”**\n\nF or over 100 years Shenandoah Telecommunications Company has been committed to providing outstanding service to our customers. Our employees take that same dedication after hours to make a difference in their community.\n\nWe take this opportunity to share with you, our shareholders, the stories of just a few of your dedicated employees.\n\n3 ■ 2003 ANNUAL REPORT", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "During the 1990’s significant investments were made in the cellular and PCS (wireless) businesses. The VA 10 RSA cellular operation, in which the Company held a 66% interest and was the general partner, experienced rapid revenue growth and excellent margins in the late 1990’s. The cellular operation covered only six counties, and became increasingly dependent on roaming revenues. Management believed the roaming revenues and associated margins would be unsustainable as other wireless providers increasingly offered nationally-branded services with significantly reduced usage charges. To position it to participate in the newer, more advanced, digital wireless services, in 1995 the Company entered the PCS business through an affiliation with American Personal Communications (APC), initiating service along the Interstate 81 corridor from Harrisonburg, Virginia to Chambersburg, Pennsylvania. This territory was a very close match to the Company’s fiber network, thereby providing economic integration that might not be available to other wireless carriers. In 1999, the Company entered a new affiliation arrangement with Sprint, the successor to APC (which introduced the Company to a nationally-branded wireless service) and expanded the PCS footprint further into Central Pennsylvania. The Company’s combined capital investment in 2000 and 2001 in the PCS operation was $45.1 million.\n\nThis annual report contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934, including statements regarding our expectations, hopes, intentions, or strategies regarding the future. These statements are subject to certain risks and uncertainties that could cause actual results to differ materially from those anticipated in the forward-looking statements. Factors that might cause such a difference include, but are not limited to, changes in the interest rate environment, management’s business strategy, national, regional and local market conditions, and legislative and regulatory conditions. The Company undertakes no obligation to publicly revise these forward-looking statements to reflect subsequent events or circumstances, except as required by law.\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**\n\n39 ■ 2003 ANNUAL REPORT", - "page_start": 40, - "page_end": 40, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "Payments due by periods\n\n(unaudited) (in thousands) Total Less than 1 year 1-3 years 4-5 years After 5 years\n\nLong-term debt principal $ 43,346 $ 4,230 $ 8,898 $ 9,552 $ 20,666 Interest on long - term debt 15,429 3,019 5,099 3,778 3,533\n\nOperating leases 12,592 3,216 4,616 2,229 2,531 Capital calls on investments 1,790 - 1,790 - - Purchase obligations 98 98 - - - Total obligations $ 73,255 $ 10,563 $ 20,403 $ 15,559 $ 26,730\n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 52\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**\n\n(unaudited)\n\n(in thousands)\n\nLess than 1 year After 5 years Total 1-3 years 4-5 years", - "page_start": 53, - "page_end": 53, - "source_file": "NASDAQ_SHEN_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "maiis-user-manual.pdf", - "query": "As a product manager, how can I reject an inventory in NAIIS ?", - "target_page": 38, - "target_passage": "Log in as PM. Click on “View Inventories Progress” under sub menu “Submission Management”. The “View Inventories Progress” screen appears. Select the appropriate inventory by clicking the Inventory name under column “Name” Press the “Reject” button ", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "*NAIIS-User-Manual.Docx* Page 1 10/02/2013\n\nNAIIS Web Application\n\n(Release version 1.1.3)\n\nUser Manual\n\n(As of 10 February 2014)", - "page_start": 0, - "page_end": 0, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "*NAIIS-User-Manual.Docx* Page 8 10/02/2013\n\n#### **3.2.2 Create, Start, Add new and View GHG inventory year**\n\nThese functions allow the NFP and PM to create or edit a GHG inventory within the NAIIS software.\n\n* **3.2.2.1 Create a new GHG inventory or Start a GHG inventory year** *\n\n3.2.2.1.1 Create a new GHG inventory\n\n**Note** : This step can ONLY be undertaken by the NFP or PM !\n\nIn order to create one or several GHG inventories, the following steps can be done by the NFP or PM:\n\n- Log in as NFP or PM\n\n- Hover the cursor on “Submission Management” menu and click on the “View Inventories Progress” button. (see\n\nFigure 5). Left click on the “+” sign will create a new GHG inventory. (see Figure 6)\n\nThe new GHG Inventory name will be automatically generated by the NAIIS system, as follows:\n\n< Name of the Non-Annex I Party >_< Year in 4 digits >_< version number >_ Inventory\n\nFor example: Paraguay _ 2013 _ 1 _ Inventory or Bhutan _ 2014 _ 2 _ Inventory\n\n* **Figure 5. Create new GHG inventory screen** *\n\n* **Figure 6. New GHG inventory created screen** *", - "page_start": 7, - "page_end": 7, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "## **10 Submission management**\n\n**10.1 Workflow**\n\nCreating and preparing an inventory, generating tables for checking by the NFP and approving and/or rejecting\n\nsubmission, follows a number of steps known collectively as a workflow. This chapter describes the workflow relating\n\nto the submission of the GHG inventory/(ies), which users should follow to create, prepare, and send GHG\n\ninventories for internal checking, and approval/rejection of the submission by the NFP, within the NAIIS web\n\napplication (figure 52).\n\n* **Figure 52: Non-Annex I Inventory Software workflow** *\n\n### **10.2 Start of inventory/submission (NFP or PM)**\n\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year\n\nidentified will be made available in the new inventory/submission.\n\nThese are the steps to start a new inventory:\n\n1. Click on “View Inventories Progress” under sub menu “Submission Management” (figure 53).\n\n* **Figure 53. View Inventories Progress sub menu** *\n\n2. The “View Inventories Progress” screen appears (figure 54).\n\n3. Select the appropriate inventory by clicking the box under column “Working Inventory” (figure 54, a).\n\n*** Note: The selected appropriate inventory should be in status “created” (figure 54, b)", - "page_start": 34, - "page_end": 34, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Page 5 10/02/2013\n\n### **2.2 Pending NAIIS features**\n\nList of pending functionalities in NAIIS:\n\n-----------------------------------------\n\n1. Web services integration for help desk\n\n2. Display of information in 5 remaining UN languages.\n\n### **2.3 Contact**\n\nRequests for access to, inquiries on the use of the software, and comments on the design and functionalities of the\n\napplication should be sent to the dedicated e-mail address **naiisapp@unfccc.int** .", - "page_start": 4, - "page_end": 4, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "#### **10.5.2 Rejection of an inventory**\n\n1. Log in as NFP.\n\n2. Click on “View Inventories Progress” under sub menu “Submission Management”.\n\n3. The “View Inventories Progress” screen appears.\n\n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 66).\n\n5. Press the “Send for Rejection” button (figure 66, b).\n\nOnce the “Send for Rejection” button was pressed, the status of the selected inventory changes to\n\n“awaiting_rejection” (figure 67, a).\n\n*** Note: A notification email will be sent to the PM that the inventory has been rejected. Therefore, the PM\n\nwill be able to reject the submission. Proceed to section 10.4.2.\n\n* **Figure 66. Work on Inventories screen - Rejection of an inventory - Status = awaiting_approval** *\n\n* **Figure 67. Work on Inventories screen - Rejection of an inventory - Status = rejected_approval** *", - "page_start": 40, - "page_end": 40, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "### **10.5 Approval or Rejection of an inventory (NFP)**\n\nThis section describes how the NFP approves or rejects an inventory after being sent for approval by the PM\n\n(See section 10.4).\n\n#### **10.5.1 Approval of an inventory**\n\n1. Log in as NFP.\n\n2. Click on “View Inventories Progress” under sub menu “Submission Management”.\n\n3. The “View Inventories Progress” screen appears.\n\n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 64).\n\n5. Press the “Approve” button (figure 64, b).\n\nOnce the “Approve” button was pressed, the status of the selected inventory changes to “approved” (figure\n\n65, b).\n\n*** Note: A notification email will be sent to the PM that the inventory has been approved. Therefore, the PM\n\nmay proceed to selecting the tables for preparing the official submission (See section 10.6).\n\n* **Figure 64. Work on Inventories screen - Approve an inventory - Status = awaiting_approval** *\n\n* **Figure 65. Work on Inventories screen - Approve an inventory - Status = approved** *", - "page_start": 39, - "page_end": 39, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "* **Figure 54. View Inventories Progress screen** *\n\n4. Click on “Work on Inventories” under “Submission” (figure 55).\n\n* **Figure 55. Work on Inventories sub menu** *\n\n5. Click the appropriate Inventory year on “Work on Inventories” under “Submission” (figure 56, a).\n\n6. Press the “Start Inventory” button to start the inventory (figure 56, b). Once pressed, the status changes to\n\n“started” (figure 57).\n\n*** Once the “Start Inventory” button has been pressed by the NFP or PM, a notification email will be sent to all\n\nSE’s with the information that a new inventory was created. SE’s and PM’s can start entering their data into the\n\nNAIIS software. More details on how to do the data entry please see section 4.1 above.\n\n* **Figure 56. Work on Inventories screen** *\n\n* **Figure 57. Work on Inventories screen - Status = Started** *", - "page_start": 35, - "page_end": 35, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Page 4 10/02/2013\n\n## **1 Introduction**\n\nThe Non-Annex I Inventory software (NAIIS) web application is a web-based tool developed for use by Parties not\n\nincluded in Annex I to the Convention (non-Annex I Parties) to estimate and report their national greenhouse gas\n\ninventories (GHG inventories). As per Article 4, paragraph 1 (a), and Article 12, paragraph 1 (a) of the Convention,\n\nnon-Annex I Parties are required to communicate to the Conference of the Parties a national inventory of\n\nanthropogenic emissions by sources and removals by sinks of all greenhouse gases (GHGs) not controlled by the\n\nMontreal Protocol, to the extent their capacities permit, following the guidelines contained in the annex to\n\ndecision17/CP.8.\n\nIn order to assist non-Annex I Parties in estimating and reporting their GHG inventories as part of their national\n\ncommunications, the secretariat developed an Excel-based software which incorporated all the elements of a national\n\nGHG inventory prescribed by decision 17/CP.8. The software was based on the IPCC inventory software version\n\n1.1, which used the Tier 1 methodologies for estimating GHG emissions and removals for all source categories\n\nincluded in the Revised 1996 IPCC Guidelines, and further complemented by the GPGs. <sup>1</sup>\n\nSince its release in 2005, most non-Annex I Parties have been using that software for the development of their\n\nnational GHG inventories. In December 2011, Parties requested the secretariat to upgrade the software and make it\n\navailable to non-Annex I Parties by June 2013. Pursuant to that request, the secretariat converted the current Excel-\n\nbased version of the software (v.1.3.2) <sup>2</sup> into a web-based application (NAIIS) which provides greater flexibility and\n\nsecurity for maintaining data.\n\n## **2 General information**\n\nThe NAIIS is a web-based application designed to enable non-Annex I Parties estimate their national GHG\n\ninventories according to the UNFCCC guidelines and using the IPCC methodologies, and to report the results in their\n\nnational communications and biennial update reports.\n\n### **2.1 System overview**\n\nThe NAIIS web application has the following functionalities:\n\n1. User management (only for the user roles NFP and PM)\n\n2. Submission management\n\n3. Data entry\n\n4. Key category analysis\n\n5. Reporting tables\n\n6. Data Export/Import\n\n7. Completeness\n\n8. Consistency\n\nThe NAIIS web application allows input of data through three different channels:\n\n1. Manual input into the entry grids\n\n2. Partial or full import of data from Excel\n\n3. Bulk import of data from XML\n\nThe GHG emissions totals, by gas and by sector, are automatically calculated and saved based on the values\n\nentered for activity data (AD), emission factors and other relevant parameters. In addition, the software facilitates the\n\nreporting of other category specific information, for example, the choice of the method for activity data and emission\n\nfactors.\n\n1 Good Practice Guidance and Uncertainty Management in National Greenhouse Gas Inventories, 2000, and Good Practice Guidance for Land\n\nUse, Land‐Use Change and Forestry, 2003.\n\n2 http://unfccc.int/files/national_reports/non‐\n\nannex_i_natcom/training_material/methodological_documents/application/zip/unfccc_nai_is_132.zip", - "page_start": 3, - "page_end": 3, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "### **10.4 Send for approval/rejection of an Inventory (PM)**\n\nThis section describes on how the PM approves or rejects an inventory after being checked by the PM.\n\n#### **10.4.1 Send for approval of an Inventory**\n\n1. Log in as PM.\n\n2. Click on “View Inventories Progress” under sub menu “Submission Management”.\n\n3. The “View Inventories Progress” screen appears.\n\n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 60, a).\n\n5. Press the “Send for Approval” button to send it to NFP for his/her review and approval of the inventory\n\n(figure 60, b).\n\n*** Note: A notification email will be sent to the PM, once the “Send for Approval” has been pressed. And the\n\nstatus changed to “Awaiting_approval” (figure 61).\n\n* **Figure 60. Work on Inventories screen - Send for Approval - Status = check** *\n\n* **Figure 61. Work on Inventories screen - Status = awaiting_approval** *\n\n#### **10.4.2 Rejection of an Inventory**\n\n1. Log in as PM.\n\n2. Click on “View Inventories Progress” under sub menu “Submission Management”.\n\n3. The “View Inventories Progress” screen appears.\n\n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 62, a).\n\n5. Press the “Reject” button (figure 62, b).\n\n*** Note: A notification email will be sent to the PM, once the “Reject” button has been pressed. And the\n\nstatus changed to “Awaiting_rejection_check” (figure 63).", - "page_start": 37, - "page_end": 37, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Page 9 10/02/2013\n\n3.2.2.1.2 Start a GHG inventory\n\nIn order to START a GHG inventory, please follow the steps below:\n\n- Log in as PM.\n\n- Hover the cursor on the “Submission Management” and click on the “View Inventories Progress” button.\n\n- Click/select the appropriate GHG Inventory in Status = “created” (see figure 7a).\n\n- Click on “Work on Inventories” under Submission Management (see figure 7b).\n\n* **Figure 7: Select an Inventory screen** *\n\n- Left click to select the appropriate Inventory (figure 8a)\n\n- Press the “Start Inventory” button (figure 8b)\n\n* **Figure 8: Start an Inventory screen** *\n\nOnce the “Start Inventory” button is pressed, the status of the selected Inventory change to “started”. (see Figure 9)\n\n* **Figure 9: “Started” status of an Inventory** *", - "page_start": 8, - "page_end": 8, - "source_file": "maiis-user-manual.pdf" - } - ] - }, - { - "references": { - "source_file": "maiis-user-manual.pdf", - "query": "What is the global warming potential of Perfluorohexane ?", - "target_page": 48, - "target_passage": "7,400", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "*NAIIS-User-Manual.Docx* Page 48 07/08/2013\n\n## **Annex 3: Global Warming Potentials (GWPs)**\n\n| Greenhouse gas | Chemical formula | 1995 IPCC GWP |\n|:---|:---|:---|\n| Carbon dioxide | CO 2 | 1 |\n| Methane | CH 4 | 21 |\n| Nitrous oxide | N 2 O | 310 |\n| HFC-23 | CHF 3 | 11,700 |\n| HFC-32 | CH 2 F 2 | 650 |\n| HFC-41 | CH 3 F | 150 |\n| HFC-43-10mee | C 5 H 2 F 10 | 1,300 |\n| HFC-125 | C 2 HF 5 | 2,800 |\n| HFC-134 | C 2 H 2 F 4 | 1,000 |\n| HFC-134a | CH 2 FCF 3 | 1,300 |\n| HFC-152a | C 2 H 4 F 2 | 140 |\n| HFC-143 | C 2 H 3 F 3 | 300 |\n| HFC-143a | CF 3 CH 3 | 3,800 |\n| HFC-227ea | C 3 HF 7 | 2,900 |\n| HFC-236fa | C 3 H 2 F 6 | 6,300 |\n| HFC-254ca | C 3 H 3 F 5 | 560 |\n| Perfluoromethane | CF 4 | 6,500 |\n| Perfluroethane | C 2 F 6 | 9,200 |\n| Perfluoropropape | C 3 F 8 | 7,000 |\n| Perfluorobutane | C 2 F 10 | 7,000 |\n| Perfluorocyclobutane | c-c 4 F 8 | 8,700 |\n| Perfluoropentane | C 5 F 12 | 7,500 |\n| Perfluorohexane | C 6 F 14 | 7,400 |\n| Sulphur hexafluoride | SF 6 | 23,900 |\n\n*Source: Climate Change 1995, The Science of Climate Change: Summary for Policymakers and Technical*\n\n*Summary of the Working Group I Report, page 22.*", - "page_start": 47, - "page_end": 47, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "evokes di ff erent public cognitive responses, where global warming“indicates heat-related impacts,\n\nhuman causes, increased UV light penetration, ozone depletion, and the greenhouse e ff ect, whereas\n\nclimate change is more associated with a wide range of influences on climate, including drought and\n\nagriculture [ 9 ]. An N-gram analysis suggested that global warming showed a closer connection with\n\nice, snow, and sea, whereas climate change was always connected with scientific investigations, such as", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "issues and re-constructing them di ff erently. By comparing the persistent words used related to the two\n\ndiscourses in the 10-year period in Table 2 , we think that global warming showed a relative preference\n\ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change”\n\nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”.\n\nStudies have suggested that the public shows a preference for scientific publications with general\n\nkeywords compared with those with complicated scientific jargon [ 47 ], lacking a deep understanding of\n\nthe complicated issue [ 46 ] and the necessity for mitigation of the climate issue [ 47 ]. These conclusions\n\nseem to suit global warming more than climate change according to the current study, which is\n\nprobably because climate change receives more publicity and recognition than global warming in the\n\nscientific community. In the association network shown in Figure 2 , global warming was found to be\n\nmore connected with temperature abnormalities. This finding is in accordance with studies reporting\n\nthat short-term temperature anomalies [ 87 ] can increase the public’s belief about global warming by\n\nincreasing the understanding of this abstract issue [ 88 ], although scientists mostly make judgments\n\nbased on long-term weather statistics [ 89 ]. However, none of the four words, “snow”, “summer”,\n\n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes\n\nlist of the climate change network.\n\nEven when climate change and global warming shared concern about similar topics such as the\n\ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas\n\nclimate change preferred a more in-depth perspective, highlighting the importance of global action\n\nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to\n\ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long\n\nbeen regarded as two key reasons for low climate concern [ 90 ], the two terminologies’ di ff erences\n\nin connotations suggest that introducing these absent sub-topics into global warming discourse or\n\nhighlighting climate change for its inherent connotations may help communicators raise public concern\n\nabout climate.\n\n#### 5.1.2. Political Connotations\n\nStudies noted that frame preference between climate change and global warming reflects\n\nindividuals’ ideological spectrum, where climate change and global warming were favored by\n\nthe liberals and conservatives, respectively [ 10 ]. The cluster analysis of the semantic network in the\n\ncurrent study demonstrated that global warming triggered far more political responses than climate\n\nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored\n\nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes\n\nof the global warming discourse, but neither was included in the list of top nodes of the climate change\n\ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used\n\nby conservatives to question the reality of climate issue [ 11 ] and climate change is more commonly\n\nadopted when discussing action against the climate change issue [ 5 ], global warming had a stronger\n\npolitical connotation in public discussion.\n\n#### 5.1.3. Discourse Structure\n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action”\n\nrepresented the themes of the three largest clusters in the network. However, three popularly recurring\n\nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters\n\nabove, but formed another small tight cluster together, sitting in the most central part of the semantic\n\nnetwork, as shown in Figure 2 b. As each of the three hashtags can almost represent one sub-theme of", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" - }, - { - "text": "Vol.:(0123456789)\n\nFirstly, the period of 1986- 2005 is defined as the baseline, of which the simulated average value is recog- nized as 0.61 °C above pre-industrial (the period of 1850- 1900) levels; the baseline is selected according to the accessibility and operability of data, which is used for the determination of the periods with global warming by 1.5 °C and 2.0 °C and the comparison of maize yield between different periods. Secondly, the simulated values of global mean temperature in the future years are subtracted from the simulated average value of 1986- 2005; then the values should be plus with 0.61 °C, which are the global warming results above pre-industrial levels; then 20 years moving average of the above results are calculated. Thirdly, the climate data of global warming by 1.5 °C is defined according to the principles provided in the fifth IPCC Assessment Report, for which it should be within 1.5- 2.0 °C above pre-industrial levels at the end of the twenty-first century; the climate data of global warming by 2.0 °C is defined according to the principles provided in the fifth IPCC Assessment Report, for which it should be within 2.0- 2.5 °C above pre-industrial levels at the end of the twenty-first century and the period of global warming by 2.0 °C should not be earlier than 2050. Finally, the climate models, scenarios and periods of global warming by 1.5 °C and 2.0 °C are separately confirmed; the data of global warming by 1.5 °C, simulated by IPSL-CM5A-LR under RCP2.6 scenario during 2020- 2039 and simulated by GFDL-ESM2M under RCP4.5 scenario during 2041- 2060; the data of global warming by 2.0 °C, simulated by NorESM1-M under RCP4.5 scenario during 2060- 2079 and simulated by GFDL-ESM2M under RCP6.0 scenario during 2065- 2084.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "complex changes in the state of the climate [ 7 ], which may be caused by natural process, external forces,\n\nor human interventions [ 8 ]. By randomly assigning respondents to climate change or global warming\n\nquestionnaires, scholars confirmed that the di ff erent connotations contained in the two definitions are\n\nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [ 9 ], which\n\nmay inhibit collaboration and joint e ff orts to mitigate the global challenge.\n\nPublic preference between climate change and global warming is even more apparent when\n\nconsidering the ideology spectrum [ 10 ]. Some scholars concluded that conservatives, who are\n\nless concerned with environmental issues, tended to use global warming as a narrative strategy\n\nbecause global warming has a more direct connection with temperature rise, making it easier to find\n\ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change\n\nfacts [ 11 ]. The associations between global warming and human activities may contribute to more\n\ncontroversies as well [ 12 ], connecting global warming more with the “hoax” frame [ 5 ] and evoking\n\ngreater negative sentiment [ 13 ].\n\nAlthough these existing studies have often attempted to identify the di ff erences between these two\n\nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause\n\nand e ff ect, were examined in each study [ 3 , 9 , 13 ]. However, the associate network model introduced by\n\npsychologists suggests that human recognition and memory have a network-shaped architecture [ 14 ],\n\nwhere individual understanding of particular objects is connected with numerous other objects in\n\nthe mind. According to the associate network model, individual understanding of the global climate\n\nconcern is a network composed of numerous inter-connected concepts, in which climate change and\n\nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue,\n\nthe preference between the two understandings may represent two distinct climate discourses by\n\ndi ff erently organizing numerous climate concepts. Examining the di ff erences between two discourses\n\nwith an associative perspective may provide communicators with unique insights into narrowing the\n\ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study\n\nof how concepts associated with each other have evolved with time.\n\nLarge amounts of user-generated data on social media, which have been valued in computer science,\n\ncommunication, and environmental studies [ 5 , 9 , 15 - 18 ], have enabled the acquistion of the social media\n\nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence\n\npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009\n\nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify\n\nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to\n\nobserve the evolution of the two discourses and to measure whether the discrepancy between the two\n\nhas widened or narrowed within the 10-year period.\n\nTo be specific, we formulated three research questions (RQs) to be explored in this study:\n\nRQ1: What is the di ff erence in how the two the discourses are associated with important climate\n\nconcepts in people’s minds?\n\nRQ2: How did the two competing climate discourses evolve from 2009 to 2018?\n\nRQ3: Did the two competing discourses converge or diverge in this decade?\n\n## **2. Background**\n\n### *2.1. Climate Change, Global Warming, and Frames*\n\nExisting studies have noted that the subtle di ff erence between climate change and global warming\n\nevokes di ff erent public cognitive responses, where global warming“indicates heat-related impacts,", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" - }, - { - "text": "lead to some degree of inconsistency between the analysis of the ClimPACT extremes and the\n\nHCVI and JULES impacts projections.\n\n## 3. Results\n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the\n\nlevel of agreement between models for a particular projected change, and hence an indication\n\nof potential robustness of the projected changes for informing adaptation. We then make a\n\ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would\n\nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in\n\nregional climate outcomes, we address this in a number of ways. For individual realizations, we\n\ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C,\n\neven if the sign of the change is uncertain. We also compare the range of outcomes at different\n\nGWLs, to see if the regional-scale uncertainty itself increases with global warming.\n\n### (a) Climate-change impacts at 2 ° C global warming\n\nFor 2°C global warming, the ensemble-mean increase in annual daily maximum temperature was\n\nabove 2°C for most of the land surface, with the exception of the Indian subcontinent, most of\n\nAustralia and Antarctica ( figure 2 ). The increase was higher still in many regions; most of North\n\nAmerica, much of China and north Asia, northwestern South America and all of Europe. In the\n\nnorthern and eastern USA and much of northern and western Europe, the annual daily maximum\n\ntemperature increased by over 4°C for 2°C global warming. The global mean TXx increased by\n\nmore than 2°C in all ensemble members ( table 5 ), so the maximum temperature warming more\n\nthan the global annual mean is a consistent result across all projections here, as found in previous\n\nstudies with other models [ 9 ] ( table 5 ).\n\nThe different ensemble members give somewhat different results at regional scales, although\n\nthere is a strong consensus on the temperature extremes examined here becoming warmer. In\n\nthe simulations driven by SSTs and SICs from the two IPSL CMIP5 models, most of the global", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" - }, - { - "text": "7. Caitlyn Kennedy, R.L. What’s the Di ff erence between Global Warming and Climate Change? 2015. Available\n\nonline: https: // www.climate.gov / news-features / climate-qa / whats-di ff [erence-between-global-warming-and-](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change)\n\n[climate-change](https://www.climate.gov/news-features/climate-qa/whats-difference-between-global-warming-and-climate-change) (accessed on 10 October 2019).\n\n8. Pachauri, R.K.; Allen, M.R.; Barros, V.R.; Broome, J.; Cramer, W.; Christ, R.; Church, J.A.; Clarke, L.; Dahe, Q.;\n\nDasgupta, P.; et al. *Climate Change 2014: Synthesis Report. Contribution of Working Groups I, II and III to the Fifth*\n\n*Assessment Report of the Intergovernmental Panel on Climate Change* ; IPCC: Geneva, Switzerland, 2014.\n\n9. Whitmarsh, L. What’s in a name? Commonalities and di ff erences in public understanding of “climate\n\nchange” and “global warming”. *Public Underst. Sci.* **2009** , *18* , 401- 420. [ [CrossRef](http://dx.doi.org/10.1177/0963662506073088) ]\n\n10. Shehata, A.; Hopmann, D.N. Framing climate change: A study of US and Swedish press coverage of global\n\nwarming. *Journal. Stud.* **2012** , *13* , 175- 192. [ [CrossRef](http://dx.doi.org/10.1080/1461670X.2011.646396) ]\n\n11. Schuldt, J.P.; Roh, S. Of accessibility and applicability: How heat-related cues a ff ect belief in “global warming”\n\nversus “climate change”. *Soc. Cogn.* **2014** , *32* , 217- 238. [ [CrossRef](http://dx.doi.org/10.1521/soco.2014.32.3.217) ]\n\n12. McCright, A.M.; Dunlap, R.E. Challenging global warming as a social problem: An analysis of the conservative\n\nmovement’s counter-claims. *Soc. Probl.* **2000** , *47* , 499- 522. [ [CrossRef](http://dx.doi.org/10.2307/3097132) ]\n\n13. Lineman, M.; Do, Y.; Kim, J.Y.; Joo, G.J. Talking about climate change and global warming. *PLoS ONE* **2015** ,\n\n*10* , e0138996. [ [CrossRef](http://dx.doi.org/10.1371/journal.pone.0138996) ]\n\n14. Anderson, J.R. *The Architecture of Cognition* ; Psychology Press: London, UK, 2013.\n\n15. Pan, B.; Zheng, Y.; Wilkie, D.; Shahabi, C. Crowd sensing of tra ffi c anomalies based on human mobility\n\nand social media. In Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in\n\nGeographic Information Systems, Orlando, FL, USA, 5- 8 November 2013; pp. 344- 353.\n\n16. Rogstadius, J.; Vukovic, M.; Teixeira, C.A.; Kostakos, V.; Karapanos, E.; Laredo, J.A. CrisisTracker:\n\nCrowdsourced social media curation for disaster awareness. *IBM J. Res. Dev.* **2013** , *57* , 4:1- 4:13. [ [CrossRef](http://dx.doi.org/10.1147/JRD.2013.2260692) ]\n\n17. Leetaru, K.; Wang, S.; Cao, G.; Padmanabhan, A.; Shook, E. Mapping the global Twitter heartbeat: The\n\ngeography of Twitter. *First Monday* **2013** , *18* . [ [CrossRef](http://dx.doi.org/10.5210/fm.v18i5.4366) ]\n\n18. Kirilenko, A.P.; Molodtsova, T.; Stepchenkova, S.O. People as sensors: Mass media and local temperature\n\ninfluence climate change discussion on Twitter. *Glob. Environ. Chang.* **2015** , *30* , 92- 100. [ [CrossRef](http://dx.doi.org/10.1016/j.gloenvcha.2014.11.003) ]\n\n19. Gamson, W.A.; Modigliani, A. Media discourse and public opinion on nuclear power: A constructionist\n\napproach. *Am. J. Sociol.* **1989** , *95* , 1- 37. [ [CrossRef](http://dx.doi.org/10.1086/229213) ]\n\n20. Entman, R.M. Framing: Toward clarification of a fractured paradigm. *J. Commun.* **1993** , *43* , 51- 58. [ [CrossRef](http://dx.doi.org/10.1111/j.1460-2466.1993.tb01304.x) ]\n\n21. McCombs, M.; Llamas, J.P.; Lopez-Escobar, E.; Rey, F. Candidate images in Spanish elections: Second-level\n\nagenda-setting e ff ects. *Journal. Mass Commun. Q.* **1997** , *74* , 703- 717. [ [CrossRef](http://dx.doi.org/10.1177/107769909707400404) ]", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed10.pdf" - }, - { - "text": "studies have noticed that the Maya inscription about doomsday, which seemed rather ridiculous for\n\nscientists, might lead to unexpected public associations with climate issues. However, science fiction\n\nmay influence the public’s attitude toward scientific issues. Frankenstein’s monster, a well-known\n\nfictional character who was a human-built creature in the novel written by Mary Shelley, has long been\n\nlinked to transgenic technology by referring genetically-modified food as “Frankenstein Food” [ 98 ].\n\nScientists found that these associations successfully symbolized the the public’s uncertainty about the\n\nrisk of transgenic technology, anxiety toward the human-made living creature, and moral discomfort\n\nabout reducing life to genetic code [ 99 ], even though people all know Frankenstein was only a fictional\n\ncharacter created 100 years ago. In the current study, we concludd that a similar mechanism may exist\n\nin global warming communication. Though “the end of world in 2012” and its adapted popular movie\n\nsounded unconvincing for scientists, the public, especially who have limited scientific literacy, were\n\ndefenceless against fiction [ 100 ]. Some of the public may accept the indications of temperature rise and\n\nextreme weather, and cannot help but strengthen their associations with global warming. However, no\n\nsimilar associations were discovered in the climate change discourse in 2012, which may suggest that\n\nglobal warming is more likely to be associated with disasters, risk, or negative sentiment compared\n\nwith climate change.\n\n### *5.3. Discrepancy between the Two Discourses*\n\nThe status of the two discourses varied significantly in the more recent years in the study period.\n\nData from Google in prior study suggested that the search record for global warming was larger\n\nthan that of climate change in earlier times [ 13 ]. The authors found that in the battle to be the most\n\nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and\n\nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange\n\nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute\n\ndimensions. Comparatively, the popularity of the global warming discourse among social media\n\nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when\n\nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse\n\ntoward climate change from global warming may be attributed to the high exposure of climate change\n\nin the media and scientific reports in recent years [ 13 ]. Previous studies noted that perceived scientific\n\nconsensus can increase acceptance of science [ 101 ]. Though global warming has been commonly used\n\nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to\n\nrefer a range of complex changes of climate [ 102 ]. Pew found science-related accounts draw millions\n\nof followers on Facebook and volume of posts they released climbed in past years [ 103 ]. Climate\n\nscientists are found to be opinion makers on Twitter [ 104 ]. As social media has become an emerging\n\nplatform for science popularization, scientific community might contribute to the prevalence of climate\n\nchange discourse by talking about climate change facts and mitigating measures [ 75 ].\n\nHowever, di ff erences between two discourses were not eliminated. Even though two discourses\n\nshowed more similarities in the rank order of key concepts, the QAP analysis of two matrices of\n\nsemantic network showed that two discourses still embody distinct public perceptions of climate issues\n\nby associating these hashtags in di ff erent manners.\n\nTo be specific, although “ipcc”, “cop”, and “un” were mentioned in both discourses (yellow\n\nin Figures 3 and 4 ) in earlier years, the clusters to which they belonged had significantly di ff erent", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed10.pdf" - }, - { - "text": "reports, the environment, and science [ 13 ]. Some respondents even hold the belief that global warming\n\nresults in climate change [ 9 ].\n\nThe two distinct climate discourses being produced based on the same reality can be explained\n\nby the framing theory in communication study. Framing refers to the phenomenon where the reality\n\nis always partially selected or highlighted when described by the public or media [ 19 ]. By distinctly\n\ndefining problems, suggesting solutions, and indicating casual interpretations [ 20 ], di ff erent frames\n\ntell the audience di ff erent stories and influence how they observe facts [ 21 , 22 ]. Two types of frames,\n\nequivalency frames and emphasis frames, are commonly studied by scholars to examine how framing\n\ne ff ects influence individuals’ attitudes and beliefs [ 23 ]. Equivalency frames describe the same fact or\n\nlogic with di ff erent words and may suggest that the audience perceives facts in psychologicallydi ff erent\n\nways [ 24 ]. For example, a cup can be described as “half full” and “half empty”, where the former\n\nis a positive frame indicating a reference point lower than current status, and the latter is negative,\n\nmeaning that the reference point is above the current situation [ 25 ]. Emphasis frames employ words\n\nselectively associated with parts of reality to shift the audience’s attention to particular attributes [ 26 ].\n\nClimate change and global warming have been noted to highlight di ff erent aspects of an issue by\n\nactivating distinct cognitive accessibility patterns [ 27 ].\n\nDi ff erent frames concerning the global climate concern are popular among the public, politicians,\n\nenvironmentalists, and the media [ 1 , 28 , 29 ]. Big data analyses have indicated that when interpreting\n\nclimate events, individuals’ preference for frameworks was influenced by demographics [ 5 ] and\n\nsocial-political background [ 2 ]. Di ff erent choices of frameworks can evoke di ff erent psychological\n\nprocesses [ 30 ], promote or inhibit engagement intentions [ 31 ], or gain approval on various levels [ 32 ].\n\nStudies have noted that the frameworks of climate change and global warming may result from\n\ndi ff erent political indications. The American Republican-leaning states show more preference for\n\nglobal warming than climate change compared with Democratic-leaning states, and global warming is\n\nmore connected with “hoax” in questioning the reality of the global climate issue [ 5 ]. Conservatives\n\nare more likely to link heat-related phenomena to global warming, whereas liberals associate these\n\nfacts equally with both frames [ 27 ]. An earlier survey conducted by [ 4 ] argued that wording choice\n\nmight not influence the whole population similarly. For the whole sample and politically independent\n\nindividuals, the two terminologies were equally serious, but climate change seemed more serious\n\ncompared with global warming among the Republicans, and the Democrats held the opposite opinion.\n\n### *2.2. Network Model for Cognition*\n\nDi ff erent framework choices may create even more di ff erences than have already been noticed.\n\nPsychologists think that human beings are a collection of learned associations [ 33 ], and associative\n\nresponse rather than simply linear logic form the structural basis of thought [ 34 ]. Associative\n\nlearning [ 35 ] is a long-standing assumption underlying cognitive science [ 14 ], suggesting that human\n\ncognition toward the world forms a network pattern, where the world is organized into several groups\n\nof related items and stored in a network model in the mind. When messages are processed by humans,\n\nthey are first encoded into a temporary memory network and then linked to an existing associative\n\nmemory network for long-term storage [ 36 ]. In the network, a node represents a certain concept,\n\nand edges refers to particular relationships, such as time sequences [ 37 ], similarity [ 38 ], semantic\n\nconnections [ 37 ], or cause and e ff ect [ 33 ] between two nodes.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed10.pdf" - }, - { - "text": "Page 44 10/02/2013\n\n## **Glossary of terms and abbreviations**\n\nAD - Activity Data\n\nAWMS - Animal Waste Management System\n\nBOD - Biochemical Oxygen Demand\n\nC - Carbon\n\nC 2 F 6\n\n- Hexafluoroethane\n\nCF 4\n\n- Tetrafluoromethane\n\nCH 4\n\n- Methane\n\nCO - Carbon Monoxide\n\nCO 2\n\n- Carbon dioxide\n\nCOD - Chemical Oxygen Demand\n\ndm - dry matter\n\nGg - Gigagram\n\nha - hectare\n\nHFC - Hydrofluorocarbon\n\nhl - hectolitre\n\nk - kilo\n\nkg - kilogram\n\nkha - kilo hectare\n\nkt - kilotonne\n\nLTO - Landing/Take Off\n\nLUCF - Land-Use Change and Forestry\n\nLULUCF - Land Use, Land-Use Change and Forestry\n\nm <sup>3</sup>\n\n- cubic meter\n\nMCF - Methane Correction Factor\n\nMg - Megagram\n\nMha - Megahectare\n\nMSW - Municipal Solid Waste\n\nN - Nitrogen\n\nN 2 O - Nitrous Oxide\n\nNFP - National Focal Point\n\nNH 3\n\n- Ammonia\n\nNMVOC - Non-Methane Volatile Organic Compound\n\nNO X\n\n- Nitrogen Dioxide\n\nPFC - Perfluorocarbon\n\nRA - Reference Approach\n\nSE - Sectoral Expert\n\nSF 6\n\n- Sulphur Hexafluoride\n\nSO 2\n\n- Sulphur Dioxide\n\nSWDS - Solid Waste Disposal Site\n\nt - tonne\n\nTg - Teragram\n\nTJ - Terajoules\n\nXML - Extensible Markup Language\n\nyear t - inventory year", - "page_start": 43, - "page_end": 43, - "source_file": "maiis-user-manual.pdf" - } - ] - }, - { - "references": { - "source_file": "maiis-user-manual.pdf", - "query": "How can I request access to NAIIS ?", - "target_page": 5, - "target_passage": "Requests for access to, inquiries on the use of the software, and comments on the design and functionalities of the application should be sent to the dedicated e-mail address naiisapp@unfccc.int.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "*NAIIS-User-Manual.Docx* Page 1 10/02/2013\n\nNAIIS Web Application\n\n(Release version 1.1.3)\n\nUser Manual\n\n(As of 10 February 2014)", - "page_start": 0, - "page_end": 0, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Page 5 10/02/2013\n\n### **2.2 Pending NAIIS features**\n\nList of pending functionalities in NAIIS:\n\n-----------------------------------------\n\n1. Web services integration for help desk\n\n2. Display of information in 5 remaining UN languages.\n\n### **2.3 Contact**\n\nRequests for access to, inquiries on the use of the software, and comments on the design and functionalities of the\n\napplication should be sent to the dedicated e-mail address **naiisapp@unfccc.int** .", - "page_start": 4, - "page_end": 4, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Page 7 10/02/2013\n\nPress the ‘Enter key’ and the non-Annex I Greenhouse Gas Inventories web page appears.\n\nTo access the NAIIS application, click on the image NAIIS Web Application, the right hand side of the screen. (figure\n\n3, number 1) and the log-in page will be displayed. (figure 4)\n\n* **Figure 3. UNFCCC non-Annex I Greenhouse Gas Inventories web page** *\n\n* **Figure 4. Log-in page of the NAIIS Web Application** *\n\nTo **log-in** , enter the username and password and click on the “Sign in” button.", - "page_start": 6, - "page_end": 6, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Page 6 10/02/2013\n\n## **3 Getting started**\n\n### **3.1 User Access, Roles and Privileges**\n\nThe users of the application are the members of the national team(s) of non-Annex I Parties involved in the\n\npreparation of their national GHG inventories, and each user is assigned a role.\n\nThe table below explains the different levels of the access rights and corresponding explanation for each role. It is\n\nimportant to note that the roles are not necessarily identical to a person’s title (e.g. National Focal Point) and that a\n\nperson can take on several roles (which may be necessary for some countries).\n\nThere are three types of access rights (roles) to the NAIIS application:\n\n| Type of access rights for specific roles | Process to gain access rights |\n|:---|:---|\n| National Focal Point (NFP): Will be responsible for identifying the members of the team and is the only one who has the right to approve the submission of any GHG inventory. NFPs will have the option to create, edit, update or delete all of their country’s GHG data entries, and grant access rights to the ‘Project Manager’ and 'Sectoral Experts' for their country if they choose. | Parties that have not already requested and received access rights can obtain them by having their National Focal Point contact: naiisapp@unfccc.int (Note: Some Parties may have more than one individual acting as the NFP; however the system can accommodate only one account per Party). |\n| Project Manager (PM) : Will have the right to enter/edit data in all sectors, as well as to generate an official submission to the UNFCCC, and grant access rights to the 'Sectoral Experts' for their country. | Entities will be provided these rights by their NFP. If a Party decides to grant access to a PM, their NFP will be able to create such user account on the NAIIS application. |\n| Sectoral Experts (SE) : Will have the right to enter/edit data in respective sector(s). | Experts will be provided these rights by their NFP and PM. If a Party decides to grant access to Sectoral Experts, the NFP will be able to create such user accounts and assign them in respective sector(s). |\n\nAccess for the NFP will be provided by the secretariat, upon request; however, the accounts of the other users within\n\nthe country shall only be created by the NFP.\n\n### **3.2 How to access/ log out / create a GHG inventory**\n\n#### **3.2.1 How to access the NAIIS application**\n\nOpen any internet browser (i.e. Internet Explorer, Firefox, etc.) and type in the following URL http://unfccc.int/7627 on\n\nthe browser’s address bar. (figure 1 and figure 2)\n\n* **Figure 1. Using Internet Explorer browser** *\n\n* **Figure 2. Using Firefox browser** *", - "page_start": 5, - "page_end": 5, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Page 4 10/02/2013\n\n## **1 Introduction**\n\nThe Non-Annex I Inventory software (NAIIS) web application is a web-based tool developed for use by Parties not\n\nincluded in Annex I to the Convention (non-Annex I Parties) to estimate and report their national greenhouse gas\n\ninventories (GHG inventories). As per Article 4, paragraph 1 (a), and Article 12, paragraph 1 (a) of the Convention,\n\nnon-Annex I Parties are required to communicate to the Conference of the Parties a national inventory of\n\nanthropogenic emissions by sources and removals by sinks of all greenhouse gases (GHGs) not controlled by the\n\nMontreal Protocol, to the extent their capacities permit, following the guidelines contained in the annex to\n\ndecision17/CP.8.\n\nIn order to assist non-Annex I Parties in estimating and reporting their GHG inventories as part of their national\n\ncommunications, the secretariat developed an Excel-based software which incorporated all the elements of a national\n\nGHG inventory prescribed by decision 17/CP.8. The software was based on the IPCC inventory software version\n\n1.1, which used the Tier 1 methodologies for estimating GHG emissions and removals for all source categories\n\nincluded in the Revised 1996 IPCC Guidelines, and further complemented by the GPGs. <sup>1</sup>\n\nSince its release in 2005, most non-Annex I Parties have been using that software for the development of their\n\nnational GHG inventories. In December 2011, Parties requested the secretariat to upgrade the software and make it\n\navailable to non-Annex I Parties by June 2013. Pursuant to that request, the secretariat converted the current Excel-\n\nbased version of the software (v.1.3.2) <sup>2</sup> into a web-based application (NAIIS) which provides greater flexibility and\n\nsecurity for maintaining data.\n\n## **2 General information**\n\nThe NAIIS is a web-based application designed to enable non-Annex I Parties estimate their national GHG\n\ninventories according to the UNFCCC guidelines and using the IPCC methodologies, and to report the results in their\n\nnational communications and biennial update reports.\n\n### **2.1 System overview**\n\nThe NAIIS web application has the following functionalities:\n\n1. User management (only for the user roles NFP and PM)\n\n2. Submission management\n\n3. Data entry\n\n4. Key category analysis\n\n5. Reporting tables\n\n6. Data Export/Import\n\n7. Completeness\n\n8. Consistency\n\nThe NAIIS web application allows input of data through three different channels:\n\n1. Manual input into the entry grids\n\n2. Partial or full import of data from Excel\n\n3. Bulk import of data from XML\n\nThe GHG emissions totals, by gas and by sector, are automatically calculated and saved based on the values\n\nentered for activity data (AD), emission factors and other relevant parameters. In addition, the software facilitates the\n\nreporting of other category specific information, for example, the choice of the method for activity data and emission\n\nfactors.\n\n1 Good Practice Guidance and Uncertainty Management in National Greenhouse Gas Inventories, 2000, and Good Practice Guidance for Land\n\nUse, Land‐Use Change and Forestry, 2003.\n\n2 http://unfccc.int/files/national_reports/non‐\n\nannex_i_natcom/training_material/methodological_documents/application/zip/unfccc_nai_is_132.zip", - "page_start": 3, - "page_end": 3, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**6** of 57\n\n## **2 Approach**\n\nThe approach used for this User Manual was based on the identification of the main user functions of\n\nthe Portal and the description of each function from the user’s perspective in terms of “ *How to* …”.\n\nEach main function documentation consists of a screen snapshot, the steps required to execute the\n\nfunction and optionally a screenshot with the results.\n\n## **3 Main User Functions of the Portal**\n\nThis section describes all of the main user functions supported by the Portal Version 3.0.\n\nThe table 1-3 below lists the described functions by module.\n\n| | Module Name | Function |\n|:---|:---|:---|\n| 1 | Portal HomePage | - How to browse through the Editorial Content (how to access Resources on Open Data: eLearning modules, Training Companion, Reports about Open Data) - How to view / search for “Latest News” - How to view / search for “Open Data Events” - How to subscribe to the EDP Newsletter - How to view “Tweets” on the EDP - How to switch to another User Language |\n| 1 | Portal HomePage | - How to search for EDP Site Content |\n| 1 | Portal HomePage | - How to search for Datasets by Data Category - How to search for Datasets by Keyword |\n| 2 | Datasets (Data Platform) | Entering the Datasets-View |\n| | | How to filter datasets by using “Faceted Search” |\n| | | How to store personal queries |\n| | | How to filter datasets by geographical area |\n| | | How to download dataset distributions |\n| | | How to view licensing information |\n| | | How to switch to another user language |\n| | | How to browse by data catalogues |\n| 3 | Visualization of Geo-Spatial Data (map.apps) | How to visualize geo-spatial data from a dataset resource |\n| 4 | Graphical Data Visualisation Tool | How to visualize graphical data from a dataset resource |\n| 5 | Help Desk | How to contact The Portal’s Help Desk |\n| 6 | Metadata Quality Assurance (MQA) | Monitoring tool for the metadata quality: ‐ The Global Dashboard View ‐ The Catalogue details view |\n| 7 | SPARQL Manager | How to run SPARQL Queries using: - SPARQL Search |", - "page_start": 5, - "page_end": 5, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "Right now, one of the most active Asian countries in the Open Data arena is India, which also\n\nsigned an [Open Government partnership with the USA](http://www.whitehouse.gov/blog/2010/11/07/a-us-india-partnership-open-government) in November 2010. In January 2011 the\n\nIndian Congress Party announced plans for a new law to fight corruption among public servants and\n\npoliticians. Anti-corruption websites (including ones in local dialects) like\n\n[Indiaagainstcorruption.org](http://www.indiaagainstcorruption.org/) , already existed, including one, [Ipaidabribe.com](http://www.ipaidabribe.com/) , that collected more\n\nthan 3,000 people reports of graft in its first four months.\n\nAs it happens in Asia, even Latin America is currently focused, at least outside Public\n\nAdministration circles, on how to open public data to achieve actual transparency. This appears\n\neven from the way many projects are labeled, that is [ \"Civic Information\"](http://informacioncivica.info/mexico/access-to-information/) instead of Open Data\n\n(which is an idea starting from data *reuse* ) or Open Government.\n\nThe reason is that even where good Freedom of Information laws exist in Latin America, they still\n\nhave too little practical effects. Mexico, for example, already has a digital system to manage\n\nFreedom of Information requests, but there are reports of complaints filed against municipal\n\nofficials that either have no effect at all, or aren't possible in the first place, because relevant\n\ninformation has not been updated in years, or omits key data like (in the case of budget reports)\n\n*\"descriptions of how the money was spent\"* .\n\nEven with these difficulties, the Latin America Open Data/Civic Information landscape is active\n\nand definitely worthwhile following. The list of interesting Civic Information projects in Latin\n\nAmerica include (from Sasaki's [Access to Information: Is Mexico a Model for the Rest of the ](http://informacioncivica.info/mexico/access-to-information/)\n\n[World?](http://informacioncivica.info/mexico/access-to-information/) :\n\n- Mexico\n\n- [Mexican Farm Subsidies](http://www.subsidiosalcampo.org.mx/index.html/) - an online tool to analyze how the federal government\n\nallocates those subsidies\n\n- [Compare Your School](http://www.comparatuescuela.org/) : compares aggregate test results from any school with the\n\nmunicipal, regional, and national averages\n\n- [Rebellion of the Sick](http://www.sonoraciudadana.org.mx/) built for patients with chronic diseases whose expenses are not\n\ncovered by the government subsidized health coverage.\n\n- Argentina: [Public Spending in Bahía](http://gastopublicobahiense.org/acerca-de-gpb/) analyzes how public funds are used.\n\n- Colombia: [Visible Congress](http://www.congresovisible.org/) monitors the actions of the Colombian congress\n\n- Brazil\n\n- [Eleitor 2010](http://eleitor2010.com/) : a website to submit reports of electoral fraud during the Brazil 2010\n\n*9/34*", - "page_start": 8, - "page_end": 8, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "#### **Fundamentals**\n\nWith IAM, developers attach *policies,* JSON documents that define granular permissions, to\n\nresources. IAM provides pre-built AWS managed policies for common access levels. You can also\n\ndefine your own policies with the least-privilege level necessary to complete tasks.\n\nInformation about IAM policies may come at you fast. If it gets to be too much, put it in **PARC** :\n\n- **P** rincipal: entity that is allowed or denied access\n\n- **A** ction: type of access that is allowed or denied\n\n- **R** esource: AWS resources the action will act upon\n\n- **C** ondition: conditions for which the access is valid\n\nAt a high level, these four terms should be enough to get you started connecting serverless\n\nresources.\n\n##### **Account prerequisites**\n\nBut, before you start, you need an AWS account. The following sections provide the best practice\n\nsteps to create an account and an administrative user.\n\n**Sign up for an AWS account**\n\nIf you do not have an AWS account, complete the following steps to create one.\n\n**To sign up for an AWS account**\n\n1. Open [https://portal.aws.amazon.com/billing/signup](https://portal.aws.amazon.com/billing/signup) .\n\n2. Follow the online instructions.\n\nPart of the sign-up procedure involves receiving a phone call and entering a verification code\n\non the phone keypad.\n\nWhen you sign up for an AWS account, an *AWS account root user* is created. The root user\n\nhas access to all AWS services and resources in the account. As a security best practice, assign\n\nadministrative access to a user, and use only the root user to perform [tasks that require root ](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#root-user-tasks)\n\n[user access](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#root-user-tasks) .\n\nFundamentals", - "page_start": 40, - "page_end": 40, - "source_file": "serverless-core.pdf" - }, - { - "text": "If you are creating a new account, you will create a root account using an email address. The **root**\n\naccount has *unrestricted* *access* , similar to root accounts for an operating system. As a best practice,\n\nyou should create an administrative user too.\n\n**Granting administrative access to a user**\n\nAs you might guess, granting administrative access to a user is still rather far reaching. An\n\naccount with administrative level privileges will make getting started easier. For systems\n\nin production, follow the principle of least-privilege — granting only the minimum access\n\nnecessary to accomplish tasks.\n\n- For a step-by-step guide to account types and login management, see [Signing in to the AWS ](https://docs.aws.amazon.com/signin/latest/userguide/console-sign-in-tutorials.html)\n\n[Management Console](https://docs.aws.amazon.com/signin/latest/userguide/console-sign-in-tutorials.html) .\n\n- AWS Identity and Access Management (IAM) is the service to manage entities and resources\n\nauthorized to use services and service resources.\n\n###### **Sign up for an AWS account**\n\nIf you do not have an AWS account, complete the following steps to create one.\n\n**To sign up for an AWS account**\n\n1. Open [https://portal.aws.amazon.com/billing/signup](https://portal.aws.amazon.com/billing/signup) .\n\n2. Follow the online instructions.\n\nPart of the sign-up procedure involves receiving a phone call and entering a verification code\n\non the phone keypad.\n\nWhen you sign up for an AWS account, an *AWS account root user* is created. The root user\n\nhas access to all AWS services and resources in the account. As a security best practice, assign\n\nadministrative access to a user, and use only the root user to perform [tasks that require root ](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#root-user-tasks)\n\n[user access](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html#root-user-tasks) .\n\nAWS sends you a confirmation email after the sign-up process is complete. At any time, you can\n\nview your current account activity and manage your account by going to [https://aws.amazon.com/](https://aws.amazon.com/)\n\nand choosing **My Account** .\n\nAmazon Web Services account", - "page_start": 13, - "page_end": 13, - "source_file": "serverless-core.pdf" - }, - { - "text": "2. Right-click the relationships to be stopped and select **Stop** , as shown in Figure 11-146.\n\n*Figure 11-146 Stopping a Remote Copy relationship*\n\n3. When a remote copy relationship is stopped, access to the auxiliary volume can be\n\nchanged so it can be read and written by a host. A confirmation message is displayed, as\n\nshown in Figure 11-147.\n\n*Figure 11-147 Grant access in read and write to the auxiliary volume*", - "page_start": 615, - "page_end": 615, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "creative_common_ai.pdf", - "query": "What is the problem regarding the use of the Book3 dataset ?", - "target_page": 2, - "target_passage": "The Books3 dataset contains text from over 170,000 books,2 which are a mix of in-copyright and out-of-copyright works. It is believed to have been originally sourced from a website that was not authorized to distribute all of the works", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "###### *What dataset management practices are necessary?*\n\nNo matter how a books data commons gets built, it will be important to consider broader\n\naspects of data governance. For example:\n\n- **Dataset documentation and transparency:** Transparent documentation is important\n\nfor any dataset used for AI training. A datasheet is a standardized form of\n\ndocumentation that includes information about provenance and composition of data,\n\nand includes information on management practices, recommended uses or collection\n\nprocess.\n\n- **Quality assurance:** Above, we note the many features that make books useful for AI\n\ntraining, as compared with web data, for example. That said, the institution managing\n\na books commons dataset may still want to collect and curate the collection to meet\n\nthe particular purposes of its users. For instance, it may want to take steps to\n\nmitigate biases inherent in the dataset, by ensuring books are representative of a\n\nvariety of languages and geographies.\n\n- **Understanding uses:** The institution managing a books commons dataset could\n\nmeasure and study how the dataset is used, to inform future improvements. Such\n\nmonitoring may also enable accountability measures with respect to uses of the\n\ndataset. Introducing community norms for disclosing datasets used in AI training and\n\nother forms of AI research would facilitate such monitoring.\n\n- **Governance mechanisms:** In determining matters like acceptable and ethical use, the\n\nfundamental question is “who decides.” While this might be settled simply by whoever\n\nsets up and operates the dataset and related infrastructure, participatory\n\nmechanisms — such as advisory bodies bringing together a broad range of users and\n\nstakeholders of a collection — could also be incorporated.", - "page_start": 19, - "page_end": 19, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "#### **3.2.1 Entering the Datasets-View**\n\nThe user has the following possibilities to enter the datasets view:\n\n- Browsing directly to [http://europeandataportal.eu/data](http://europeandataportal.eu/data)\n\n- Opening the “Data” item in the main menu, then clicking on “Datasets” in the submenu\n\n- Clicking on “Search” in the “Search Datasets” area, with or without a search keyword entered\n\n#### **3.2.2 How to filter datasets by using “Faceted Search”**\n\nThe user can find suitable datasets by performing a “Faceted Search”. This means the user\n\nsystematically adds properties, which the desired dataset should fulfill, e.g. a dataset should be part\n\nof a specific catalogue or category. The following properties are available:\n\n- Countries,\n\n- Catalogues,\n\n- Categories,\n\n- Tags,\n\n- Formats,\n\n- Licences.\n\nThose facets are presented on the left side of the main dataset page. The available options for each\n\nfacet always reflect the availability of it in the current set of results. The numbers in brackets indicate\n\nhow many datasets in total have that property e.g. there are 117,610 datasets with a distribution in\n\nCSV format.", - "page_start": 26, - "page_end": 26, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "## **A Supplementary materials for datasets**\n\n### **A.1 All datasets**\n\nTable 3 displays the size of each dataset along with\n\nthe average number of tokens per sample and their\n\nreferences. The dataset’s content was tokenized\n\nusing *cl100k_base* encoding. For Retrieval, the\n\ntwo numbers refer to the queries and the docu-\n\nments. For Reranking, the three numbers refer to\n\nthe queries, the pairs of queries with relevant docu-\n\nments and the pairs of queries with irrelevant ones,\n\nrespectively. The pairs of queries and documents\n\nare obtained from the 90 documents extracted. For\n\n*SummEvalFr* , the three numbers refer to the texts,\n\nhuman and machine summaries, respectively.\n\nFigure 3 represents the semantic similarity be-\n\ntween each dataset. The methodology was as fol-\n\nlows: 90 random samples per dataset are embedded\n\nusing the *multilingual-e5-large* model. The embed-\n\ndings of each dataset’s samples are averaged. The\n\nsimilarity between each dataset is then calculated\n\nusing cosine similarity as in ( Muennighoff et al. ,\n\n2022 ).\n\nWe complement this analysis by observing the\n\ndataset’s clouds of embedding in a 2D plane using\n\nPCA in Figure 4 .\n\n### **A.2 Created datasets**\n\n**Syntec** Figure 5 shows an extract from the Syntec\n\ndataset with a document and a query relative to this\n\ndocument.\n\n**HAL** Figure 6 is an extract from the HAL\n\ndataset. Table 4 lists the distribution of classes\n\n( *domain* field) for the HAL dataset on *raw*\n\nsubset and *mteb_eval* subset, which is used\n\nfor MTEB evaluation. Labels descriptions\n\ncan be found at this URL: [ https://api.archives-](https://api.archives-ouvertes.fr/ref/domain/?q=*:*&rows=393)\n\n[ouvertes.fr/ref/domain/?q=*:*&rows=393](https://api.archives-ouvertes.fr/ref/domain/?q=*:*&rows=393) or in Ta-\n\nble 4 . After pre-processing, *mteb_eval* covers titles\n\nfrom 10 domains as classes with less than 500 sam-\n\nples were removed. In the MTEB evaluation subset\n\nof the dataset, titles composed of 2 words or less\n\nhave been removed (371 samples), resulting in an\n\naverage word count of 13 *.* 4 . Figure 7 shows the\n\nword count distribution per title. Furthermore, the\n\ndataset has been cleaned up by manually remov-\n\ning all non-French titles. Additionally, it can be\n\nobserved in Table 4 that in the original *raw* dataset,\n\nthe *shs* and *sdv* classes represent by far the majority\n\nof the dataset samples with respectively 58706 sam-\n\nples (73%) and 11049 samples (13%). In order to\n\nmitigate the class imbalance while preserving the\n\nmajority of those classes, they have been randomly\n\nsubsampled to 6701 and 4803 samples. Further-\n\nmore, baseline models have been trained and tested\n\nto assess the usability of this dataset in other tasks,\n\nsuch as classification and topic modeling. Table 5\n\nshows the results obtained.\n\n**SummEvalFr** Extracts of humans and machine\n\nsummaries translated in French from SummEvalFr\n\nand the original ones in English from SummEval\n\n( Fabbri et al. , 2021 ) are shown in Figure 9 . As ex-\n\nplained in section 3.1.3 , we use a LLM to evaluate\n\nthe quality of translations for human summaries,\n\nwe provide the prompt used with *GPT-4* for this\n\nevaluation in Figure 8 .\n\nTable 6 shows the distribution of ratings given\n\nby the LLM. With the scale being 10, we man-\n\nually verify random samples rated above 9. We\n\nverify all samples with ratings under 9 and those\n\nwith no provided rating (N/A) due to the triggering\n\nof the OpenAI content management policy. The\n\nLLM suggests that 60 samples are not correctly\n\ntranslated. These were verified manually, and after\n\nchecking, less than 10 samples only needed to be\n\ncorrected.\n\n## **B Supplementary materials for correlation analysis**\n\nThis section presents various correlations computed\n\nbased on the model results on the proposed bench-\n\nmark.\n\nFigure 10 represents cross-correlations between\n\nmodels’ performances and their studied character-\n\nistics as a heatmap.\n\nFigure 11 represents the Spearman correlations", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "### **3.2 Datasets (Data Platform)**\n\nThe **datasets section is the main access point for browsing, filtering and searching the datasets** . It\n\noffers a faceted search, a full text search and a geographical search. The dataset view provides access\n\nand information to the distributions of the dataset.\n\nThe home page of this section appears like this:", - "page_start": 25, - "page_end": 25, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "## * **1. Introduction** * 1\n\nWhile the field of artificial intelligence research and technology has a long history, broad\n\npublic attention grew over the last year in light of the wide availability of new generative AI\n\nsystems, including large language models (LLMs) like GPT-4, Claude, and LLaMA-2. These\n\ntools are developed using machine learning and other techniques that analyze large datasets\n\nof written text, and they are capable of generating text in response to a user’s prompts.\n\nWhile many large language models rely on website text for training, books have also played\n\nan important role in developing and improving AI systems. Despite the widespread use of e-\n\nbooks and growth of sales in that market, books remain difficult for researchers and\n\nentrepreneurs to access at scale in digital form for the purposes of training AI.\n\nIn 2023, multiple news publications reported on the availability and use of a dataset of books\n\ncalled “Books3” to train LLMs. The Books3 dataset contains text from over 170,000 books, 2\n\nwhich are a mix of in-copyright and out-of-copyright works. It is believed to have been\n\noriginally sourced from a website that was not authorized to distribute all of the works\n\ncontained in the dataset. In lawsuits brought against OpenAI, Microsoft, Meta, and\n\nBloomberg related to their LLMs, the use of Books3 as training data was specifically cited.\n\n3\n\nThe Books3 controversy highlights a critical question at the heart of generative AI: what role\n\ndo books play in training AI models, and how might digitized books be made widely\n\naccessible for the purposes of training AI? What dataset of books could be constructed and\n\nunder what circumstances?\n\nIn February 2024, Creative Commons, Open Future and Proteus Strategies convened a series\n\nof workshops to investigate the concept of a responsibly designed, broadly accessible\n\ndataset of digitized books to be used in training AI models. Conducted under the Chatham\n\nHouse Rule, we set out to ask if there is a possible future in which a “books data commons\n\nfor AI training” might exist, and what such a commons might look like. The workshops\n\nbrought together practitioners on the front lines of building next-generation AI models, as\n\nwell as legal and policy scholars with expertise in the copyright and licensing challenges\n\nsurrounding digitized books. Our goal was also to bridge the perspective of stewards of\n\nAuthored by Alek Tarkowski and Paul Keller (Open Future), Derek Slater and Betsy Masiello (Proteus 1\n\nStrategies) in collaboration with Creative Commons. We are grateful to participants in the workshops,\n\nincluding Luis Villa, Tidelift and openml.fyi; Jonathan Band; Peter Brantley, UC Davis; Aaron Gokaslan,\n\nCornell; Lila Bailey, Internet Archive; Jennifer Vinopal, HathiTrust Digital Library; Jennie Rose Halperin,\n\nLibrary Futures/NYU Engelberg Center, Nicholas P. Garcia, Public Knowledge; Sayeed Choudhury; Erik\n\nStallman, UC Berkeley School of Law. The paper represents the views of the authors, however, and\n\nshould not be attributed to the workshop as a whole. All mistakes or errors are the authors’.\n\nSee e.g. Knibbs, Kate. “The Battle over Books3 Could Change AI Forever.” *Wired* , 4 Sept. 2023, 2\n\nwww.wired.com/story/battle-over-books3/ .\n\nFor key documents in these cases, see the helpful compendium at “Master List of Lawsuits v. AI, 3\n\nChatGPT, OpenAI, Microsoft, Meta, Midjourney & Other AI Cos.” *Chat GPT Is Eating the World* , 27 Dec.\n\n2023, [chatgptiseatingtheworld.com/2023/12/27/master-list-of-lawsuits-v-ai-chatgpt-openai-microsoft-](http://chatgptiseatingtheworld.com/2023/12/27/master-list-of-lawsuits-v-ai-chatgpt-openai-microsoft-meta-midjourney-other-ai-cos)", - "page_start": 1, - "page_end": 1, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or\n\ndataset built on their basis, we want to understand the implications of relying on public\n\ndomain works and expressly licensed works in building a books commons.\n\nThe benefits are relatively straightforward. Both categories, by definition come with express\n\npermission to use the books in AI training. The cost of acquiring the books for this use may\n\nbe effectively zero or close to it, when considering public domain and “openly” licensed\n\nbooks that allow redistribution and that have already been digitized.\n\nBut this approach comes with some clear limitations. First, as noted above, for many books\n\nin the public domain, their status as such is not always clear. And with respect to\n\npermissively licensed books, it is not always clear whether and how to comply with the\n\nlicense obligations in this context.\n\nSetting aside those challenges, the simple fact is that relying on public domain and existing\n\npermissively licensed books would limit the quantity and diversity of data available for\n\ntraining, impacting performance along different dimensions. Only a small fraction of books\n\never published fall into this category, and the corpus of books in this category is likely to be\n\nskewed heavily towards older public domain books. This skew would, in turn, impact the\n\ncontent available for AI training. For instance, relying on books from before 1929 would not 30\n\nonly incorporate outdated language patterns, but also a range of biases and misconceptions\n\nabout race and gender, among other things. Efforts could be made to get people to\n\npermissively license more material — a book drive for permissive licensing, so to speak; this\n\napproach would still not encompass most books, at least when it comes to past works. 31\n\n## *5b. Limitations & Exceptions*\n\n**Existing Project Example: HathiTrust Research Center (HTRC)**\n\nThe HathiTrust Research Center provides researchers with the ability to perform\n\ncomputational analysis across millions of books. While it is not suited specifically for AI\n\ntraining, it is an existence proof for what such a resource might look like.\n\nFor instance, AI researchers note that the recently released Common Corpus dataset is an “invaluable 30\n\nresource” but “comes with limitations. A lot of public domain data is antiquated—in the US, for example,\n\ncopyright protection usually lasts over seventy years from the death of the author—so this type of\n\ndataset won’t be able to ground an AI model in current affairs or, say, how to spin up a blog post using\n\ncurrent slang” and the “dataset is tiny.” Thus, while it is possible to train an AI model on the data, those\n\nmodels will have more limited utility on some dimensions than current frontier models trained on a\n\nbroader array of data. See Knibbs, Kate, *Here’s Proof You Can Train an AI Model Without Slurping*\n\n*Copyrighted Content | WIRED* . (2024, March 20), at https://www.wired.com/story/proof-you-can-train-ai-\n\nwithout-slurping-copyrighted-content/ .\n\nOur workshop discussion did note that some widely available datasets for AI training have also 31\n\npursued more direct licensing agreements. For instance, the SILO LLM was created by working with\n\nscientific journal publishers to make works available for both download and AI training. While this might\n\nbe viable in the context of particular, narrow classes of works, the barriers to efficient licensing\n\nmentioned above would remain a problem for any broader efforts. See Min, Sewon, et al. “SILO\n\nLanguage Models: Isolating Legal Risk in a Nonparametric Datastore.” *ArXiv (Cornell University)* , 8 Aug.\n\n2023, https://doi.org/10.48550/arxiv.2308.04430 . Accessed 14 Dec. 2023.", - "page_start": 13, - "page_end": 13, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "### **3.4 Graphical Data Visualisation Tool**\n\nThis section describes the features of the graphical visualisation tool for numeric data. The features\n\nare currently available for XLS (Excel) and CSV files, except for the selection of the sheet name which\n\nis applicable only for Excel files.\n\nMost GUI elements from the “Graph” tab (records selection, search box, filters and fields buttons)\n\nare also available on the “Grid” tab and work in the same way.\n\n#### **3.4.1 How to visualize graphical data from a dataset resource**\n\nAs a result of a dataset search, the system displays on the “Dataset” tab all distributions\n\n(resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset\n\ncan be further explored by clicking on “Open Visualization” under the “Options” button - if available.", - "page_start": 42, - "page_end": 42, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "## * **5. Examining approaches to building a books data** * * **commons** *\n\nThere are many possible permutations for building a books data commons. To structure our\n\nexploration, we focused on two particular tracks, discussed below. We chose these tracks\n\nmindful of the above legal issues, and because there are already existence proofs that help\n\nto illuminate tradeoffs, challenges and potential paths forward for each.\n\n## *5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2** 27\n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large,\n\ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own\n\ntraining of LLMs, but also to lower the barriers for others. 28\n\nAlong with data drawn from the web at large, The Pile included books from three datasets.\n\nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second\n\nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books\n\nby otherwise unpublished authors; and a 28,752 books in the public domain and published\n\nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project\n\nGutenberg.\n\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright\n\nnotices to have the dataset taken down from various websites.\n\nDespite the takedown requests, the importance of books to EleutherAI and the broader\n\ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced\n\nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. 29\n\nAmong other things, v2 would “have many more books than the original Pile had, for\n\nexample, and more diverse representation of non-academic non-fiction domains.” At the\n\nsame time, it would only seek to include public domain books and permissively licensed\n\ncontent. As before, this corpus focuses on English language books.\n\nThis is an illustrative example, and there are also other projects of this ilk. For instance, see the 27\n\nCommon Corpus project, which includes an array of public domain books from a number of countries,\n\nat [https://huggingface.co./blog/Pclanglais/common-corpus](https://huggingface.co./blog/Pclanglais/common-corpus) ; see also [https://huggingface.co./datasets/](https://huggingface.co./datasets/storytracer/internet_archive_books_en)\n\n[storytracer/internet_archive_books_en](https://huggingface.co./datasets/storytracer/internet_archive_books_en) (“This dataset contains more than 650,000 English public domain\n\nbooks (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the\n\nOpen Library project.”)\n\nSee Gao et al, supra note 8. 28\n\nGoldman, Sharon. “One of the World’s Largest AI Training Datasets Is About to Get Bigger and 29\n\n“Substantially Better.” *VentureBeat* , 11 Jan. 2024, [venturebeat.com/ai/one-of-the-worlds-largest-ai-](http://venturebeat.com/ai/one-of-the-worlds-largest-ai-training-datasets-is-about-to-get-bigger-and-substantially-better/)\n\n[training-datasets-is-about-to-get-bigger-and-substantially-better/](http://venturebeat.com/ai/one-of-the-worlds-largest-ai-training-datasets-is-about-to-get-bigger-and-substantially-better/) . Accessed 20 Mar. 2024.", - "page_start": 12, - "page_end": 12, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "**Dataset Syntec HAL SummEvalFr**\n\nSamples 100 queries\n\n90 documents\n\n26233 samples\n\n10 classes\n\n100 texts\n\n1100 human summaries\n\n1600 machine summaries\n\nCreation process Scraping of Syntec col-\n\nlective bargaining agree-\n\nment with articles as doc-\n\numents. Writing queries\n\ncorresponding to articles.\n\nScraping of HAL arti-\n\ncles with *id* , *title* and *do-*\n\n*main* . Further cleaning\n\nwith deduplication, lan-\n\nguage filtering and class\n\nsubsampling.\n\nTranslation from English\n\nto French with Deepl of\n\nthe SummEval dataset.\n\nAnnotation process 4 annotators divided into\n\n2 groups. Each group was\n\ngiven half of the articles\n\nand asked to choose an ar-\n\nticle and ask a question\n\nabout it. Each annotator\n\nwrote 25 questions.\n\nAnnotations provided by\n\nauthors when submitting\n\ntheir paper. They choose\n\nthe *domain* between exist-\n\ning academic fields.\n\nDetailed annotation pro-\n\ncess provided in Fabbri\n\net al. ( 2021 ).\n\nQuality checks Human verification of an-\n\nnotations.\n\nBaseline models for clas-\n\nsification and topic model-\n\ning.\n\nCorrelation between\n\nBLEU and ROUGE\n\nscores of the French\n\nand the original English\n\ndatasets. LLM as-a-judge\n\ntranslation rating and\n\nhuman verification.\n\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the\n\nquality checks. All datasets are test splits.\n\n- Samples belonging to *domain* classes with\n\nless than 500 samples were removed, which\n\nleads us to keep only 10 classes.\n\n- Subsampling was performed on 2 classes con-\n\ntaining more than 10k samples each to lower\n\nthe number of samples and mitigate the unbal-\n\nance of the dataset.\n\nMore details about this process are provided in the\n\nappendix A.2 along with some extracts in Figure\n\n6 . We make the dataset publicly available in both\n\ntheir raw and clean versions. We use this dataset in\n\na clustering setup to cluster publications by their\n\ntitle and use the domain as ground truth. To ensure\n\nthe quality of this dataset, we run 3 baseline mod-\n\nels for classification: *TF-IDF + SVM* , a fine-tuned\n\n*Camembert* ( Martin et al. , 2019 ) and *GPT-4* lever-\n\naging In-Context Learning (ICL). Furthermore, we\n\nrun one baseline model for topic modeling: Latent\n\nDirichlet Allocation (LDA) ( Blei et al. , 2003 ) and\n\nreport scores in the appendix A.2 .\n\n#### **3.1.3 SummEvalFr (Summarization)**\n\nThe original SummEval dataset ( Fabbri et al. , 2021 )\n\nconsists of 100 news articles from the CNN/Dai-\n\nlyMail dataset. Each article has 11 human-written\n\nsummaries and 16 machine-generated summaries\n\nannotated by 8 people with a score for coherence,\n\nconsistency, fluency, and relevance. We trans- lated it from English to French using DeepL API <sup>6</sup> .\n\nSince MTEB evaluation is based on the embedding\n\nsimilarity between machine-generated and human-\n\ngenerated summaries, we propose to compute the\n\nROUGE ( Lin , 2004 ) and BLEU ( Papineni et al. ,\n\n2002 ) metrics between machine and human sum-\n\nmaries for both French and English version. In Ta-\n\nble 2 , we report the average of the scores as well as\n\ntheir correlations between the two languages. The\n\ncorrelation is high (above 0.7), showing that the\n\nword and n-gram overlap between human and ma-\n\nchine summaries is highly preserved in the French\n\nversion. One may argue that computing the met-\n\nric on fully translated texts (human and machine\n\nsummaries are both translated from English) may\n\nintroduce biases and not assess the quality of the\n\ntranslations. For this purpose, we ensure the French\n\nhuman summaries are correctly translated from En-\n\nglish. We use an LLM as-a-judge ( Zheng et al. ,\n\n6 [https://www.deepl.com](https://www.deepl.com)\n\n3", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "German is the next-largest language represented at 9%, and is followed by a long-tail of\n\nlanguages by representation.\n\nIn order to enable these uses, HathiTrust has invested in technical solutions to prevent\n\npossible misuse. To some extent, they manage this by limiting who gets access to the\n\nCenter, and limiting access to specific features to researchers at member institutions.\n\nHathiTrust has also put in place various security controls on both the physical storage of the\n\ndigitized books and the network access to those files. The primary uses of the data through\n\nthe Research Center includes access to an extracted features set and access to the\n\ncomplete corpus “data capsule,” which is a virtual machine running on the Center’s servers.\n\nThe data capsule allows users to conduct non-consumptive research with the data, but it\n\nlimits the types of outputs allowed in order to prevent users from obtaining full content of in-\n\ncopyright works. The measures taken include physical security controls on the data centers\n\nhousing the information, as well as restrictions via network access and encryption of backup\n\ntapes. In the finding that HathiTrust use was a fair use and thus rejecting a lawsuit brought\n\nby the Authors Guild, the Court noted the importance of these controls. 35\n\nToday, the Center’s tools are not suitable for AI training, in that they don’t allow the specific\n\ntypes of technical manipulation of underlying text necessary to train an AI. Nevertheless, the\n\nCenter demonstrates that building a books data commons for computational analysis is\n\npossible, and in turn points to the possibility of creating such a resource for AI training. 36\n\n**Implications of Overall Approach**\n\nBy relying on existing limitations and exceptions in copyright law, the number of books one\n\ncould include in the corpus of a books data commons is far greater and more diverse. Of\n\ncourse, a bigger dataset doesn’t necessarily mean a higher quality dataset for all uses of AI\n\nmodels; as HathiTrust shows, even a multimillion book corpus can skew in various\n\ndirections. Still, dataset size generally remains significant to an LLM’s performance - the\n\nmore text one can train on, or rather the more tokens for training the model, the better, at\n\nleast along a number of performance metrics.\n\n37\n\nWhile holding the potential for a broader and more diverse dataset, a key limitation in\n\npursuing this approach is that it is only feasible where relevant copyright limitations and\n\nexceptions exist. Even then, legal uncertainty means that going down this path is likely to\n\ngenerate, at a minimum, expensive and time-consuming litigation and regulatory\n\nThis is explained explicitly in the appeals court’s decision: *Authors Guild v. HathiTrust,* 755 F.3d 87 (2d 35\n\nCir. 2014).\n\nHathiTrust has also made available some data derived from books, such as the Extracted Features 36\n\nset: “HTRC releases research datasets to facilitate text analysis using the HathiTrust Digital Library.\n\nWhile copyright-protected texts are not available for download from HathiTrust, fruitful research can still\n\nbe performed on the basis of non-consumptive analysis of transformative datasets, such as in HTRC's\n\nflagship Extracted Features Dataset, which includes features extracted from full-text volumes. These\n\nfeatures include volume-level metadata, page-level metadata, part-of-speech-tagged tokens, and token\n\ncounts:” https://analytics.hathitrust.org/datasets#top .\n\nSee Testimony of Chris Callison-Burch, July 2023, [https://docs.house.gov/meetings/JU/](https://docs.house.gov/meetings/JU/JU03/20230517/115951/HHRG-118-JU03-Wstate-Callison-BurchC-20230517.pdf) 37\n\n[JU03/20230517/115951/HHRG-118-JU03-Wstate-Callison-BurchC-20230517.pdf](https://docs.house.gov/meetings/JU/JU03/20230517/115951/HHRG-118-JU03-Wstate-Callison-BurchC-20230517.pdf) (“As the amount of\n\ntraining data increases, AI systems’ capabilities for language understanding and their other skills", - "page_start": 15, - "page_end": 15, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "creative_common_ai.pdf", - "query": "In the United States, before which date is book out of copyright for sure ?", - "target_page": 9, - "target_passage": "In the United States, all books published or released before 1929 are in the public domain. While use of these books provides maximal certainty for the AI developer to train on", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## * **4. Copyright, Licensing, & Access to Books for** * * **Training** *\n\nEven if books can be acquired, digitized, and made technically useful for AI training, the\n\ndevelopment of a books data commons would necessarily need to navigate and comply with\n\ncopyright law.\n\n**Out-of-Copyright Books:** A minority of books are old enough to be in the public domain and\n\nout of copyright, and an AI developer could use them in training without securing any\n\ncopyright permission. In the United States, all books published or released before 1929 are in\n\nthe public domain. While use of these books provides maximal certainty for the AI developer\n\nto train on, it is worth noting that the status of whether a book is in the public domain can be\n\ndifficult to determine. For instance, books released between 1929 and 1963 in the U.S. are 14\n\nout of copyright if they were not subject to a copyright renewal; however, data on copyright\n\nrenewals is not easily accessible.\n\nWhat’s more, copyright definitions and term lengths vary among countries. Even if a work is\n\nin the public domain in the US, it may not be in other countries. Countries generally use the 15\n\nlife of the last living author + “x” years to determine the term of copyright protection. For\n\nmost countries, “x” is either 50 years (the minimum required by the Berne Convention) or 70\n\nyears (this is the case for all member states of the European Union and for all works\n\npublished in the U.S. after 1978). This approach makes it difficult to determine copyright\n\nterms with certainty because it requires information about the date of death of each author,\n\nwhich is often not readily available.\n\n**In-Copyright Books:** The vast majority of books are in copyright, and, insofar as the training\n\nprocess requires making a copy of the book, the use in AI training may implicate copyright\n\nlaw. Our workshop covered three possible paths for incorporating such works.\n\n**Direct licensing**\n\nOne could directly license books from rightsholders. There may be some publishers who are\n\nwilling to license their works for this purpose, but it is hard to determine the scale of such\n\naccess, and, in any event, there are significant limits on this approach. Along with the\n\nchallenge (and expense) of reaching agreements with relevant rightsholders, there is also the\n\npractical difficulty of simply identifying and finding the rightsholder that one must negotiate\n\nFor a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler. *Finding the Public Domain:* 14\n\n*Copyright Review Management System Toolkit* . 2016, [quod.lib.umich.edu/c/crmstoolkit/](http://quod.lib.umich.edu/c/crmstoolkit/14616082.0001.001)\n\n[14616082.0001.001](http://quod.lib.umich.edu/c/crmstoolkit/14616082.0001.001) . Accessed 20 Mar. 2024.; Kopel, Matthew. “LibGuides: Copyright at Cornell Libraries:\n\nCopyright Term and the Public Domain.” [guides.library.cornell.edu/copyright/publicdomain](http://guides.library.cornell.edu/copyright/publicdomain) ;\n\nMannapperuma, Menesha, et al. *Is It in the Public Domain? A HANDBOOK for EVALUATING the*\n\n*COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES* . 1923.\n\nSee e.g. Moody, Glyn. “Project Gutenberg Blocks Access in Germany to All Its Public Domain Books 15\n\nbecause of Local Copyright Claim on 18 of Them.” *Techdirt* , 7 Mar. 2018, www.techdirt.com/\n\n2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-local-\n\ncopyright-claim-18-them/ . Accessed 20 Mar. 2024.", - "page_start": 8, - "page_end": 8, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "All rights reserved. No part of this publication may be reproduced or transmitted\n\nin any form or by any means, electronic or mechanical, including photocopying,\n\nrecording, or any information storage or retrieval system, without prior permission in\n\nwriting from the publisher. Subject to any applicable licensing terms and conditions in\n\nthe case of electronically supplied publications, a person may engage in fair dealing\n\nwith a copy of this publication for his or her personal or private use, or his or her\n\nresearch or private study. See Section 12(1)(a) of the Copyright Act 98 of 1978.\n\nThe authors and the publisher have made every effort to obtain permission for and\n\nto acknowledge the use of copyright material. Should any infringement of copyright\n\nhave occurred, please contact the publisher, and every effort will be made to rectify\n\nomissions or errors in the event of a reprint or new edition.\n\nDeveloped for Oxbridge Academy - 2015", - "page_start": 1, - "page_end": 1, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "It is also important to note two other issues that can affect the application of limitations and\n\nexceptions, in particular, their application to e-books.\n\nThe first important limitation is that almost every digital book published today comes with a\n\nset of contractual terms that restrict what users can do with it. In many cases, those terms\n\nwill explicitly restrict text data mining or AI uses of the content, meaning that even where\n\ncopyright law allows for reuse (for example, under fair use), publishers by contract can\n\nimpose restrictions anyway. In the United States, those contract terms are generally thought\n\nto override the applicability of fair use or other limitations and exceptions. Other 23\n\njurisdictions, such as those in the EU, provide that certain limitations and exceptions cannot\n\nbe contractually overridden, though experience to date varies with how those anti-contractual\n\noverride protections work in practice. 24\n\nThe second limitation is the widespread adoption of “anti-circumvention” rules in copyright\n\nlaws and the interplay of these with a choice to rely on copyright limitations and exceptions.\n\nDigital books sold by major publishers are generally encumbered with “digital rights\n\nmanagement” (DRM) that limits how someone can use the digital file. For instance, DRM can\n\nlimit the ability to make a copy of the book, or even screenshot or excerpt from it, among\n\nother things. Anti-circumvention laws restrict someone's ability to evade these technical\n\nrestrictions, even if it is for an ultimately lawful use.\n\nWhat this means for our purposes is that even if one acquires a digital book from, for\n\nexample, Amazon, and it is lawful under copyright law to use that book in AI training, it can\n\nstill generally be unlawful to circumvent the DRM to do so, outside narrow exceptions. 25\n\nThus, the ability to use in-copyright books encumbered by DRM — that is, most all books sold\n\nby major publishers — is generally limited. 26\n\nPractically, using in-copyright books to build a books commons for AI training — while relying\n\non copyright’s limitations and exceptions — requires turning a physical book into digital form,\n\nor otherwise engaging in the laborious process of manually re-creating a book’s text (i.e., re-\n\ntyping the full text of the book) without circumventing the technical restrictions themselves.\n\nSee Hansen, Dave. “Fair Use Week 2023: How to Evade Fair Use in Two Easy Steps.” *Authors Alliance* , 23\n\n23 Feb. 2023, www.authorsalliance.org/2023/02/23/fair-use-week-2023-how-to-evade-fair-use-in-two-\n\neasy-steps/ . Accessed 20 Mar. 2024.\n\nSee Band, Jonathan. “Protecting User Rights against Contract Override.” *Joint PIJIP/TLS Research* 24\n\n*Paper Series* , 1 May 2023, [digitalcommons.wcl.american.edu/research/97/](http://digitalcommons.wcl.american.edu/research/97/) . Accessed 20 Mar. 2024.\n\nIn the U.S. the Copyright Office has recognized the importance of allowing particular exceptions for 25\n\nresearchers engaged in text and data mining. See their rulemaking in 2021 [https://](https://www.federalregister.gov/documents/2021/10/28/2021-23311/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control)\n\n[www.federalregister.gov/documents/2021/10/28/2021-23311/exemption-to-prohibition-on-](https://www.federalregister.gov/documents/2021/10/28/2021-23311/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control)\n\n[circumvention-of-copyright-protection-systems-for-access-control](https://www.federalregister.gov/documents/2021/10/28/2021-23311/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control) . These rules are reviewed triennially\n\nand are currently under review, with submissions suggesting both contraction and expansion; see the", - "page_start": 11, - "page_end": 11, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "It is also an example predicated on copyright’s limitations and exceptions — in this case, on\n\nU.S. fair use. While the Authors Guild filed a copyright infringement suit against HathiTrust,\n\nfederal courts in 2012 and 2014 ruled that HathiTrust’s use of books was fair use. 32\n\nA nonprofit founded in 2008, HathiTrust grew out of a partnership among major US university\n\nlibraries and today is “an international community of research libraries committed to the\n\nlong-term curation and availability of the cultural record.” It started in what it calls the “early 33\n\ndays of mass digitization” — that is, at a time when it started to become economical to take\n\nexisting physical artifacts in libraries and turn them into digital files at a large scale.\n\nThe founding members of HathiTrust were among the initial partners for Google’s Book\n\nSearch product, which allows people to search across and view small snippets of text from\n\nin-copyright books and read full copies of public domain books scanned from libraries’ 34\n\ncollections. The libraries provided Google with books from their collections, Google would\n\nthen scan the books for use in Book Search, and return to the libraries a digital copy for their\n\nown uses. These uses included setting up HathiTrust not only to ensure long-term\n\npreservation of the digital books and their metadata, but also to facilitate other uses,\n\nincluding full text search of books and accessibility for people with print disabilities. In\n\nseparate court cases, both Google and HathiTrust’s uses of the books were deemed\n\nconsistent with copyright law.\n\nThe uses most relevant to this paper are those enabled by what HathiTrust refers to today as\n\nthe Research Center. The Center grew in part out of a research discipline called “digital\n\nhumanities,” which, among other things, seeks to use computational resources or other\n\ndigital technologies to analyze information and contribute to the study of literature, media,\n\nhistory, and other areas. For instance, imagine you want to understand how a given term\n\n(e.g., “war on drugs”) became used; one might seek to analyze when the term was first used\n\nand how often it was used over time by analyzing a vast quantity of sources, searching out\n\nthe term’s use. The insight here is that there is much to be learned not just from reading or\n\notherwise consuming specific material, but also from “non-consumptive research,” or\n\n\"research in which computational analysis is performed on one or more volumes (textual or\n\nimage objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use.\n\nToday, the Center “[s]upports large-scale computational analysis of the works in the\n\nHathiTrust Digital Library to facilitate non-profit and educational research.” It includes over 18\n\nmillion books in over 400 languages from the HathiTrust Digital Library collection. Roughly\n\n58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has\n\nlimitations in terms of its representation across subject matter, language, geography, and\n\nother dimensions. In terms of subject matter, the corpus is skewed towards humanities\n\n(64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English,\n\n*Authors Guild v. HathiTrust,* 902 F.Supp.2d 445 (SDNY October 10, 2012) and *Authors Guild v.* 32\n\n*HathiTrust* , 755 F.3d 87 (2d Cir. 2014).\n\nSee [https://www.hathitrust.org/member-libraries/member-list/ ](https://www.hathitrust.org/member-libraries/member-list/) — the membership is principally US 33\n\ninstitutions, and most of the non-US members are from English speaking countries or institutions that\n\nuse English as the primary language of operations.\n\nThis functionality is limited to scanned books provided by library partners in the US. 34", - "page_start": 14, - "page_end": 14, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most\n\nare not actively managed by their rightsholders. There is no official registry of copyrighted\n\nworks and their owners, and existing datasets can be incomplete or erroneous. 16\n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially\n\nthose that have or have had limited commercial value. Put differently, the barrier to using 17\n\nmost books is not simply to pay publishers; even if one had significant financial resources,\n\nlicensing would not enable access to most works.\n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as\n\nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular\n\nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their\n\nfollow-on use).\n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion\n\ndepends on whether the license’s terms can be complied with in the context of AI training.\n\nFor instance, in the context of CC licensed works, there are requirements for proper\n\nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public\n\nDomain Mark (PDM) are not licenses and do not require attribution). 18\n\nSee e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary 16\n\nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper\n\nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181 .\n\nAccessed 4 Jan. 2020, at [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181) ; Rosen,\n\nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?” *The Atlantic* , 18 Mar.\n\n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century-\n\navailable-as-ebooks/284486/ . See also “Google Book Search Settlement and Access to Out of Print\n\nBooks.” *Google Public Policy Blog* , [publicpolicy.googleblog.com/2009/06/google-book-search-](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html)\n\n[settlement-and.html](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html) . Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class-\n\naction settlement between Google, the Authors Guild, and the Association of American Publishers).\n\nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying\n\nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at [https://](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[google_final_approval_support.pdf](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf) . The Authors Guild and Association of American Publishers also\n\njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding\n\ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly\n\n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether\n\nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out-", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "## Guide to using public domain tools\n\nCreative Commons makes sharing easy\n\n### What Is Creative Commons?\n\nCreative Commons is a global nonprofit organization\n\ndedicated to supporting an open and accessible Internet\n\nthat is enriched with free knowledge and creative resources\n\nfor people around the world to use, share, and cultivate.\n\nOur easy-to-use licenses provide a simple, standardized way\n\nto give the public permission to share and use your creative\n\nwork — on conditions of your choice. CC licenses let you\n\nchange your copyright terms from the default of “all rights\n\nreserved” to “some rights reserved.”\n\nMillions of people use CC licenses on some of the world’s\n\nmost popular platforms for user-generated content. When\n\nyou use a CC license to share your photos, videos, or blog,\n\nyour creation joins a globally accessible pool of resources\n\nthat includes the work of artists, educators, scientists, and\n\ngovernments.\n\nCreative Commons has waived all copyright and\n\nrelated or neighboring rights to this guide using the\n\nCC0 Public Domain Dedication.\n\n#### What is the difference between CC0 and the Public Domain Mark?\n\nCC0 (“CC Zero”) is intended for use only\n\nby authors or holders of copyright and\n\nrelated rights (including database rights), in connection\n\nwith works that are still subject to those rights in one or\n\nmore countries.\n\nWhen CC0 is applied to a work, copyright and related\n\nrights are relinquished worldwide, making the work free\n\nfrom those restrictions to the greatest extent possible.\n\nThe Public Domain Mark (PDM) is used\n\nto label works that are already free of\n\nknown copyright restrictions. Unlike CC0, PDM doesn’t\n\nchange the copyright status of a work.\n\nPDM can be used by anyone, and is intended for use\n\nwith works that are already free of known copyright\n\nrestrictions throughout the world.\n\n##### Public domain works are valuable because anyone\n\n##### can freely build upon, enhance, and reuse them for\n\n##### any purposes without restriction under copyright\n\n##### or database law.\n\nThat’s why it’s important for creators to have a clear and\n\nlegally robust way to place their works in the public domain as\n\ncompletely as possible, and it’s also important for publishers\n\nand archives to have a standardized way to identify works that\n\nare already in the public domain.\n\nCreative Commons supports two distinct public domain tools,\n\nthe CC0 Public Domain Dedication and the Public Domain\n\nMark . Creative Commons copyright licenses help authors\n\nmanage their copyright on terms they choose. Conversely, CC0\n\nenables authors and copyright owners who want to dedicate\n\ntheir works to the worldwide public domain to do so, and PDM\n\nfacilitates the labeling and discovery of works that are already\n\nfree of known copyright restrictions.\n\nWhere public domain tools fit in the copyright spectrum\n\nSome rights\n\nreserved\n\nAll rights\n\nreserved\n\nPDM\n\nNo known\n\ncopyright\n\nCC0\n\nPublic\n\ndomain\n\n### The CC0 Public Domain Dedication\n\n**Use this universal tool if you are a holder of copyright or database**\n\n**rights, and wish to waive all your rights to the work worldwide.**\n\nBy using CC0, you waive all copyright and related rights\n\ntogether with all associated claims and causes of action with\n\nrespect to this work to the extent possible under the law.\n\nApplying CC0 to your work is easy. Simply visit the CC0 chooser\n\n( http://creativecommons.org/choose/zero ) which will lead you\n\nthrough the process. When completed, you will be provided\n\nwith HTML code that you can copy and paste into your website.\n\nYou let others copy, modify, distribute, and perform the work,\n\neven for commercial purposes, all without asking permission.\n\nWorks marked with the Public Domain Mark have been\n\nidentified as being free of known restrictions under copyright\n\nlaw, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "**Reliance on Copyright Limitations and Exceptions**\n\nEven if a book is in copyright, it’s possible that copying books for AI training may be covered\n\nby existing limitations and exceptions to copyright law in particular jurisdictions. For\n\nexample:\n\n- In the United States, many argue using existing works to train generative AI is “fair\n\nuse,” consistent with existing law and legal precedents. This is the subject of a 19\n\nnumber of currently active court cases, and different actors and tools may yield\n\ndifferent results, as fair use is applied case-by-case using a flexible balancing test.\n\n- In the European Union, there are explicit exceptions in the law for “text and data\n\nmining” uses of in-copyright works, both for non-commercial research and for\n\ncommercial purposes. However, for commercial uses and for users outside of\n\nresearch and heritage institutions, they must respect the rights of rightsholders who\n\nchoose to “reserve their rights” (i.e., opt-out of allowing text and data mining) via\n\nmachine readable mechanisms. The exception also requires that users have “lawful 20\n\naccess” to the works.\n\n- Finally, Japan provides a specific text and data mining exception, without any\n\ncomparable opt-out requirement for commercial uses as is embedded in EU law. 21\n\nWhile exceptions that allow AI training exist in several other countries, such as Singapore and\n\nIsrael, most countries do not provide exceptions that appear to permit AI training. Even where\n\npotentially available, as in the United States, legal uncertainty and risk create a hurdle for\n\nanyone building a books commons. 22\n\nSee e.g. Comments from Sprigman, Samuelson, Sag to Copyright Office, October 2023, at [https://](https://www.regulations.gov/comment/COLC-2023-0006-10299) 19\n\n[www.regulations.gov/comment/COLC-2023-0006-10299](https://www.regulations.gov/comment/COLC-2023-0006-10299) as well as many other submissions to the US\n\ncopyright office; see also Advocacy, Katherine Klosek, Director of Information Policy and Federal\n\nRelations, Association of Research Libraries (ARL), and Marjory S. Blumenthal, Senior Policy Fellow,\n\nAmerican Library Association (ALA) Office of Public Policy and. “Training Generative AI Models on\n\nCopyrighted Works Is Fair Use.” *Association of Research Libraries* , 23 Jan. 2024, www.arl.org/blog/\n\ntraining-generative-ai-models-on-copyrighted-works-is-fair-use/ .\n\nSee Articles 3 and 4 of the EU’s Directive on Copyright and Related Rights in the Digital Single Market 20\n\n— https://eur-lex.europa.eu/eli/dir/2019/790/oj .\n\nJapan clarified its laws in 2018 to make clear that this type of use is permitted — see discussion in 21\n\nTestimony of Matthew Sag, July 2023, [https://www.judiciary.senate.gov/imo/media/doc/](https://www.judiciary.senate.gov/imo/media/doc/2023-07-12_pm_-_testimony_-_sag.pdf)\n\n[2023-07-12_pm_-_testimony_-_sag.pdf](https://www.judiciary.senate.gov/imo/media/doc/2023-07-12_pm_-_testimony_-_sag.pdf) , see also Fiil-Flynn, S. *et al.* (2022) *Legal reform to enhance global*\n\n*text and Data Mining Research* , *Science* . Available at: https://www.science.org/doi/10.1126/\n\nscience.add6124 (Accessed: 28 Sept. 2023).\n\nSee supra note 22 *.* See also Jonathan Band, *Copyright Implications of the Relationship between* 22\n\n*Generative Artificial Intelligence and Text and Data Mining | Infojustice* . infojustice.org/archives/45509 . In\n\naddition, for an in-depth look at the cross-border legal challenges involved see: *Wrapping up Our NEH-*\n\n*Funded Project to Help Text and Data Mining Researchers Navigate Cross-Border Legal and Ethical*\n\n*Issues* . 2 Oct. 2023, [buildinglltdm.org/2023/10/02/wrapping-up-our-neh-funded-project-to-help-text-and-](http://buildinglltdm.org/2023/10/02/wrapping-up-our-neh-funded-project-to-help-text-and-data-mining-researchers-navigate-cross-border-legal-and-ethical-issues/)", - "page_start": 10, - "page_end": 10, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or\n\ndataset built on their basis, we want to understand the implications of relying on public\n\ndomain works and expressly licensed works in building a books commons.\n\nThe benefits are relatively straightforward. Both categories, by definition come with express\n\npermission to use the books in AI training. The cost of acquiring the books for this use may\n\nbe effectively zero or close to it, when considering public domain and “openly” licensed\n\nbooks that allow redistribution and that have already been digitized.\n\nBut this approach comes with some clear limitations. First, as noted above, for many books\n\nin the public domain, their status as such is not always clear. And with respect to\n\npermissively licensed books, it is not always clear whether and how to comply with the\n\nlicense obligations in this context.\n\nSetting aside those challenges, the simple fact is that relying on public domain and existing\n\npermissively licensed books would limit the quantity and diversity of data available for\n\ntraining, impacting performance along different dimensions. Only a small fraction of books\n\never published fall into this category, and the corpus of books in this category is likely to be\n\nskewed heavily towards older public domain books. This skew would, in turn, impact the\n\ncontent available for AI training. For instance, relying on books from before 1929 would not 30\n\nonly incorporate outdated language patterns, but also a range of biases and misconceptions\n\nabout race and gender, among other things. Efforts could be made to get people to\n\npermissively license more material — a book drive for permissive licensing, so to speak; this\n\napproach would still not encompass most books, at least when it comes to past works. 31\n\n## *5b. Limitations & Exceptions*\n\n**Existing Project Example: HathiTrust Research Center (HTRC)**\n\nThe HathiTrust Research Center provides researchers with the ability to perform\n\ncomputational analysis across millions of books. While it is not suited specifically for AI\n\ntraining, it is an existence proof for what such a resource might look like.\n\nFor instance, AI researchers note that the recently released Common Corpus dataset is an “invaluable 30\n\nresource” but “comes with limitations. A lot of public domain data is antiquated—in the US, for example,\n\ncopyright protection usually lasts over seventy years from the death of the author—so this type of\n\ndataset won’t be able to ground an AI model in current affairs or, say, how to spin up a blog post using\n\ncurrent slang” and the “dataset is tiny.” Thus, while it is possible to train an AI model on the data, those\n\nmodels will have more limited utility on some dimensions than current frontier models trained on a\n\nbroader array of data. See Knibbs, Kate, *Here’s Proof You Can Train an AI Model Without Slurping*\n\n*Copyrighted Content | WIRED* . (2024, March 20), at https://www.wired.com/story/proof-you-can-train-ai-\n\nwithout-slurping-copyrighted-content/ .\n\nOur workshop discussion did note that some widely available datasets for AI training have also 31\n\npursued more direct licensing agreements. For instance, the SILO LLM was created by working with\n\nscientific journal publishers to make works available for both download and AI training. While this might\n\nbe viable in the context of particular, narrow classes of works, the barriers to efficient licensing\n\nmentioned above would remain a problem for any broader efforts. See Min, Sewon, et al. “SILO\n\nLanguage Models: Isolating Legal Risk in a Nonparametric Datastore.” *ArXiv (Cornell University)* , 8 Aug.\n\n2023, https://doi.org/10.48550/arxiv.2308.04430 . Accessed 14 Dec. 2023.", - "page_start": 13, - "page_end": 13, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "engagement. And, at least in the U.S., it could generate billions of dollars in damages if the\n\nspecific design choices and technical constraints are not adequate to justify a finding of fair\n\nuse.\n\nThis sort of books dataset could be built by expanding use of in-copyright books that have\n\nalready been digitized from existing libraries and other sources. Specifically, workshop\n\nparticipants mentioned that the Internet Archive, HathiTrust, and Google as entities that have\n\ndigitized books and could repurpose their use to build a books commons, although\n\nchallenges with using these datasets were noted. The Internet Archive is in the midst of\n\nlitigation brought by book publishers for its program for lending digital books; while not\n\ndirectly relevant to the issue of AI training using their corpus of books, this sort of litigation\n\ncreates a chilling effect on organizations seeking to make new uses of these digitized books.\n\nMeanwhile, Google encumbered HathiTrust’s digital copies with certain contractual\n\nrestrictions, which would need to be addressed to develop a books dataset for AI training,\n\nand Google itself is unlikely to share its own copies while it provides them a competitive\n\nadvantage.\n\nPerhaps as a matter of public policy, these existing copies could be made more freely\n\navailable. For instance, to ensure robust competition around AI and advance other public\n\ninterests, policymakers could remove legal obstacles to the sharing of digitized book files for\n\nuse in AI training. Alternatively, policymakers could go further and affirmatively compel\n\nsharing access to these digital book files for AI training.\n\nIt's possible that there could be a new mass digitization initiative, turning physical books into\n\nnew digital scans. At least in theory, one could try to replicate the existing corpora of\n\nHathiTrust, for example, without Google’s contractual limitations. At the same time, such an\n\neffort would take many years, and it seems unlikely that many libraries would want to go to\n\nthe trouble to have their collections digitized a second time. Moreover, while new scans may\n\nprovide some incremental benefit over use of existing ones (e.g., by using the most modern\n\ndigitization and OCR tools and thus improving accuracy), there is no inherent social value to\n\nmaking every entity that wants to do or allow AI training invest in their own redundant\n\nscanning.\n\nA new digitization effort could target works that have not been yet digitized. This may be\n\nparticularly useful given that previous book digitization efforts, and the Google Books project\n\nin particular, have focused heavily (though not exclusively) on libraries in English-speaking\n\ncountries. Additional digitization efforts might make more sense for books in those\n\nlanguages that have not yet been digitized at a meaningful scale. Any new digitization effort\n\nmight therefore start with a mapping of the extent to which a books corpus in a given\n\nlanguage has been digitized.", - "page_start": 16, - "page_end": 16, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "## * **1. Introduction** * 1\n\nWhile the field of artificial intelligence research and technology has a long history, broad\n\npublic attention grew over the last year in light of the wide availability of new generative AI\n\nsystems, including large language models (LLMs) like GPT-4, Claude, and LLaMA-2. These\n\ntools are developed using machine learning and other techniques that analyze large datasets\n\nof written text, and they are capable of generating text in response to a user’s prompts.\n\nWhile many large language models rely on website text for training, books have also played\n\nan important role in developing and improving AI systems. Despite the widespread use of e-\n\nbooks and growth of sales in that market, books remain difficult for researchers and\n\nentrepreneurs to access at scale in digital form for the purposes of training AI.\n\nIn 2023, multiple news publications reported on the availability and use of a dataset of books\n\ncalled “Books3” to train LLMs. The Books3 dataset contains text from over 170,000 books, 2\n\nwhich are a mix of in-copyright and out-of-copyright works. It is believed to have been\n\noriginally sourced from a website that was not authorized to distribute all of the works\n\ncontained in the dataset. In lawsuits brought against OpenAI, Microsoft, Meta, and\n\nBloomberg related to their LLMs, the use of Books3 as training data was specifically cited.\n\n3\n\nThe Books3 controversy highlights a critical question at the heart of generative AI: what role\n\ndo books play in training AI models, and how might digitized books be made widely\n\naccessible for the purposes of training AI? What dataset of books could be constructed and\n\nunder what circumstances?\n\nIn February 2024, Creative Commons, Open Future and Proteus Strategies convened a series\n\nof workshops to investigate the concept of a responsibly designed, broadly accessible\n\ndataset of digitized books to be used in training AI models. Conducted under the Chatham\n\nHouse Rule, we set out to ask if there is a possible future in which a “books data commons\n\nfor AI training” might exist, and what such a commons might look like. The workshops\n\nbrought together practitioners on the front lines of building next-generation AI models, as\n\nwell as legal and policy scholars with expertise in the copyright and licensing challenges\n\nsurrounding digitized books. Our goal was also to bridge the perspective of stewards of\n\nAuthored by Alek Tarkowski and Paul Keller (Open Future), Derek Slater and Betsy Masiello (Proteus 1\n\nStrategies) in collaboration with Creative Commons. We are grateful to participants in the workshops,\n\nincluding Luis Villa, Tidelift and openml.fyi; Jonathan Band; Peter Brantley, UC Davis; Aaron Gokaslan,\n\nCornell; Lila Bailey, Internet Archive; Jennifer Vinopal, HathiTrust Digital Library; Jennie Rose Halperin,\n\nLibrary Futures/NYU Engelberg Center, Nicholas P. Garcia, Public Knowledge; Sayeed Choudhury; Erik\n\nStallman, UC Berkeley School of Law. The paper represents the views of the authors, however, and\n\nshould not be attributed to the workshop as a whole. All mistakes or errors are the authors’.\n\nSee e.g. Knibbs, Kate. “The Battle over Books3 Could Change AI Forever.” *Wired* , 4 Sept. 2023, 2\n\nwww.wired.com/story/battle-over-books3/ .\n\nFor key documents in these cases, see the helpful compendium at “Master List of Lawsuits v. AI, 3\n\nChatGPT, OpenAI, Microsoft, Meta, Midjourney & Other AI Cos.” *Chat GPT Is Eating the World* , 27 Dec.\n\n2023, [chatgptiseatingtheworld.com/2023/12/27/master-list-of-lawsuits-v-ai-chatgpt-openai-microsoft-](http://chatgptiseatingtheworld.com/2023/12/27/master-list-of-lawsuits-v-ai-chatgpt-openai-microsoft-meta-midjourney-other-ai-cos)", - "page_start": 1, - "page_end": 1, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "creative_common_ai.pdf", - "query": "What of the main imporvement of the Pile v2 dataset in comparison to its first version ?", - "target_page": 13, - "target_passage": "Among other things, v2 would “have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.” At the same time, it would only seek to include public domain books and permissively licensed content", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "3072 using multi-block masking. We examine perfor-\n\nmance on Kinetics-400 (K400), Something-Something-v2\n\n(SSv2), and ImageNet-1K (IN1K), using a frozen back-\n\nbone with an attentive probe, and report top-1 accuracy\n\nusing a single center view. We also examine end-to-end\n\nfine-tuning performance of the models on Kinetics-400.\n\nResults of this comparison are reported in Table 1 and\n\nindicate that predicting in feature space provides a con-\n\nsistent performance improvement over pixel space pre-\n\ndiction in both frozen evaluation of the video backbone,\n\nas well as end-to-end fine-tuning.\n\n### **4.2 Pretraining Data Distribution**\n\nNext we study the impact of the pretraining data dis-\n\ntribution in Table 2 . Leveraging large scale datasets", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" - }, - { - "text": "#### **3.2.1 Entering the Datasets-View**\n\nThe user has the following possibilities to enter the datasets view:\n\n- Browsing directly to [http://europeandataportal.eu/data](http://europeandataportal.eu/data)\n\n- Opening the “Data” item in the main menu, then clicking on “Datasets” in the submenu\n\n- Clicking on “Search” in the “Search Datasets” area, with or without a search keyword entered\n\n#### **3.2.2 How to filter datasets by using “Faceted Search”**\n\nThe user can find suitable datasets by performing a “Faceted Search”. This means the user\n\nsystematically adds properties, which the desired dataset should fulfill, e.g. a dataset should be part\n\nof a specific catalogue or category. The following properties are available:\n\n- Countries,\n\n- Catalogues,\n\n- Categories,\n\n- Tags,\n\n- Formats,\n\n- Licences.\n\nThose facets are presented on the left side of the main dataset page. The available options for each\n\nfacet always reflect the availability of it in the current set of results. The numbers in brackets indicate\n\nhow many datasets in total have that property e.g. there are 117,610 datasets with a distribution in\n\nCSV format.", - "page_start": 26, - "page_end": 26, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "## **A Supplementary materials for datasets**\n\n### **A.1 All datasets**\n\nTable 3 displays the size of each dataset along with\n\nthe average number of tokens per sample and their\n\nreferences. The dataset’s content was tokenized\n\nusing *cl100k_base* encoding. For Retrieval, the\n\ntwo numbers refer to the queries and the docu-\n\nments. For Reranking, the three numbers refer to\n\nthe queries, the pairs of queries with relevant docu-\n\nments and the pairs of queries with irrelevant ones,\n\nrespectively. The pairs of queries and documents\n\nare obtained from the 90 documents extracted. For\n\n*SummEvalFr* , the three numbers refer to the texts,\n\nhuman and machine summaries, respectively.\n\nFigure 3 represents the semantic similarity be-\n\ntween each dataset. The methodology was as fol-\n\nlows: 90 random samples per dataset are embedded\n\nusing the *multilingual-e5-large* model. The embed-\n\ndings of each dataset’s samples are averaged. The\n\nsimilarity between each dataset is then calculated\n\nusing cosine similarity as in ( Muennighoff et al. ,\n\n2022 ).\n\nWe complement this analysis by observing the\n\ndataset’s clouds of embedding in a 2D plane using\n\nPCA in Figure 4 .\n\n### **A.2 Created datasets**\n\n**Syntec** Figure 5 shows an extract from the Syntec\n\ndataset with a document and a query relative to this\n\ndocument.\n\n**HAL** Figure 6 is an extract from the HAL\n\ndataset. Table 4 lists the distribution of classes\n\n( *domain* field) for the HAL dataset on *raw*\n\nsubset and *mteb_eval* subset, which is used\n\nfor MTEB evaluation. Labels descriptions\n\ncan be found at this URL: [ https://api.archives-](https://api.archives-ouvertes.fr/ref/domain/?q=*:*&rows=393)\n\n[ouvertes.fr/ref/domain/?q=*:*&rows=393](https://api.archives-ouvertes.fr/ref/domain/?q=*:*&rows=393) or in Ta-\n\nble 4 . After pre-processing, *mteb_eval* covers titles\n\nfrom 10 domains as classes with less than 500 sam-\n\nples were removed. In the MTEB evaluation subset\n\nof the dataset, titles composed of 2 words or less\n\nhave been removed (371 samples), resulting in an\n\naverage word count of 13 *.* 4 . Figure 7 shows the\n\nword count distribution per title. Furthermore, the\n\ndataset has been cleaned up by manually remov-\n\ning all non-French titles. Additionally, it can be\n\nobserved in Table 4 that in the original *raw* dataset,\n\nthe *shs* and *sdv* classes represent by far the majority\n\nof the dataset samples with respectively 58706 sam-\n\nples (73%) and 11049 samples (13%). In order to\n\nmitigate the class imbalance while preserving the\n\nmajority of those classes, they have been randomly\n\nsubsampled to 6701 and 4803 samples. Further-\n\nmore, baseline models have been trained and tested\n\nto assess the usability of this dataset in other tasks,\n\nsuch as classification and topic modeling. Table 5\n\nshows the results obtained.\n\n**SummEvalFr** Extracts of humans and machine\n\nsummaries translated in French from SummEvalFr\n\nand the original ones in English from SummEval\n\n( Fabbri et al. , 2021 ) are shown in Figure 9 . As ex-\n\nplained in section 3.1.3 , we use a LLM to evaluate\n\nthe quality of translations for human summaries,\n\nwe provide the prompt used with *GPT-4* for this\n\nevaluation in Figure 8 .\n\nTable 6 shows the distribution of ratings given\n\nby the LLM. With the scale being 10, we man-\n\nually verify random samples rated above 9. We\n\nverify all samples with ratings under 9 and those\n\nwith no provided rating (N/A) due to the triggering\n\nof the OpenAI content management policy. The\n\nLLM suggests that 60 samples are not correctly\n\ntranslated. These were verified manually, and after\n\nchecking, less than 10 samples only needed to be\n\ncorrected.\n\n## **B Supplementary materials for correlation analysis**\n\nThis section presents various correlations computed\n\nbased on the model results on the proposed bench-\n\nmark.\n\nFigure 10 represents cross-correlations between\n\nmodels’ performances and their studied character-\n\nistics as a heatmap.\n\nFigure 11 represents the Spearman correlations", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "**Dataset Syntec HAL SummEvalFr**\n\nSamples 100 queries\n\n90 documents\n\n26233 samples\n\n10 classes\n\n100 texts\n\n1100 human summaries\n\n1600 machine summaries\n\nCreation process Scraping of Syntec col-\n\nlective bargaining agree-\n\nment with articles as doc-\n\numents. Writing queries\n\ncorresponding to articles.\n\nScraping of HAL arti-\n\ncles with *id* , *title* and *do-*\n\n*main* . Further cleaning\n\nwith deduplication, lan-\n\nguage filtering and class\n\nsubsampling.\n\nTranslation from English\n\nto French with Deepl of\n\nthe SummEval dataset.\n\nAnnotation process 4 annotators divided into\n\n2 groups. Each group was\n\ngiven half of the articles\n\nand asked to choose an ar-\n\nticle and ask a question\n\nabout it. Each annotator\n\nwrote 25 questions.\n\nAnnotations provided by\n\nauthors when submitting\n\ntheir paper. They choose\n\nthe *domain* between exist-\n\ning academic fields.\n\nDetailed annotation pro-\n\ncess provided in Fabbri\n\net al. ( 2021 ).\n\nQuality checks Human verification of an-\n\nnotations.\n\nBaseline models for clas-\n\nsification and topic model-\n\ning.\n\nCorrelation between\n\nBLEU and ROUGE\n\nscores of the French\n\nand the original English\n\ndatasets. LLM as-a-judge\n\ntranslation rating and\n\nhuman verification.\n\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the\n\nquality checks. All datasets are test splits.\n\n- Samples belonging to *domain* classes with\n\nless than 500 samples were removed, which\n\nleads us to keep only 10 classes.\n\n- Subsampling was performed on 2 classes con-\n\ntaining more than 10k samples each to lower\n\nthe number of samples and mitigate the unbal-\n\nance of the dataset.\n\nMore details about this process are provided in the\n\nappendix A.2 along with some extracts in Figure\n\n6 . We make the dataset publicly available in both\n\ntheir raw and clean versions. We use this dataset in\n\na clustering setup to cluster publications by their\n\ntitle and use the domain as ground truth. To ensure\n\nthe quality of this dataset, we run 3 baseline mod-\n\nels for classification: *TF-IDF + SVM* , a fine-tuned\n\n*Camembert* ( Martin et al. , 2019 ) and *GPT-4* lever-\n\naging In-Context Learning (ICL). Furthermore, we\n\nrun one baseline model for topic modeling: Latent\n\nDirichlet Allocation (LDA) ( Blei et al. , 2003 ) and\n\nreport scores in the appendix A.2 .\n\n#### **3.1.3 SummEvalFr (Summarization)**\n\nThe original SummEval dataset ( Fabbri et al. , 2021 )\n\nconsists of 100 news articles from the CNN/Dai-\n\nlyMail dataset. Each article has 11 human-written\n\nsummaries and 16 machine-generated summaries\n\nannotated by 8 people with a score for coherence,\n\nconsistency, fluency, and relevance. We trans- lated it from English to French using DeepL API <sup>6</sup> .\n\nSince MTEB evaluation is based on the embedding\n\nsimilarity between machine-generated and human-\n\ngenerated summaries, we propose to compute the\n\nROUGE ( Lin , 2004 ) and BLEU ( Papineni et al. ,\n\n2002 ) metrics between machine and human sum-\n\nmaries for both French and English version. In Ta-\n\nble 2 , we report the average of the scores as well as\n\ntheir correlations between the two languages. The\n\ncorrelation is high (above 0.7), showing that the\n\nword and n-gram overlap between human and ma-\n\nchine summaries is highly preserved in the French\n\nversion. One may argue that computing the met-\n\nric on fully translated texts (human and machine\n\nsummaries are both translated from English) may\n\nintroduce biases and not assess the quality of the\n\ntranslations. For this purpose, we ensure the French\n\nhuman summaries are correctly translated from En-\n\nglish. We use an LLM as-a-judge ( Zheng et al. ,\n\n6 [https://www.deepl.com](https://www.deepl.com)\n\n3", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "### **3.4 Graphical Data Visualisation Tool**\n\nThis section describes the features of the graphical visualisation tool for numeric data. The features\n\nare currently available for XLS (Excel) and CSV files, except for the selection of the sheet name which\n\nis applicable only for Excel files.\n\nMost GUI elements from the “Graph” tab (records selection, search box, filters and fields buttons)\n\nare also available on the “Grid” tab and work in the same way.\n\n#### **3.4.1 How to visualize graphical data from a dataset resource**\n\nAs a result of a dataset search, the system displays on the “Dataset” tab all distributions\n\n(resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset\n\ncan be further explored by clicking on “Open Visualization” under the “Options” button - if available.", - "page_start": 42, - "page_end": 42, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**Table 3** *Average Pooling vs. Adaptive Pooling.* We pool the\n\nfeature map output by the frozen V-JEPA encoder using\n\nan attentive probe, which is then fed into a linear classifier\n\nfor downstream supervised tasks (K400 and SSv2). We\n\nevaluate two pooling strategies: 1) average pooling (Avg.),\n\nand attentive pooling (Att.). Results are reported using\n\na single center view. Using adaptive pooling with a cross-\n\nattention layer leads to improvements of +17 *.* 3 points on\n\nK400 and +16 *.* 1 points on SSv2.\n\n*Frozen Evaluation*\n\n**K400 SSv2**\n\n(16 *×* 1 *×* 1) (16 *×* 1 *×* 1) **Method Arch.** Avg. Att. Avg. Att.\n\nV-JEPA ViT-L/16 56.7 **73.7** 50.1 **66.2**\n\nhas been critical for enabling the surge of advancements\n\nin other modalities, such as text and images ( Kaplan\n\net al. , 2020 ; Cherti et al. , 2023 ). We investigate whether\n\na similar trend holds for video data. To control for the\n\npossible confounding variable of compute budget, we\n\npretrain all models in Table 2 for 90K iterations using\n\na batch-size of 3072. We report downstream results on\n\nK400, SSv2, and IN1K using a frozen backbone with an\n\nattentive probe, and report top-1 accuracy using a single\n\ncenter view.\n\nTable 2 shows that average performance across tasks\n\nmonotonically increases as we increase the size of the\n\npretraining dataset, but the best task-specific perfor-\n\nmance is obtained by independently selecting the pre-\n\ntraining data for each specific downstream task. For\n\ninstance, the L/16 obtains its best SSv2 performance\n\nwhen pretrained on K710+SSv2, its best K400 perfor-\n\nmance when pretrained only on K710, and its best IN1K\n\nperformance when pretrained only on K710+HT. The\n\nbest average performance across all tasks is achieved by\n\npretraining VideoMix2M, which combines all the data\n\nsources. Similarly, the H/16 pretrained on K710+SSv2\n\nachieves a greater K400 score than the H/16 pretrained\n\non VideoMix2M, however, the top performing H/16 on\n\naverage is pretrained on VideoMix2M.\n\n### **4.3 Evaluation: Attentive Probing**\n\nNext we explore the feature pooling strategy for apply-\n\ning the model’s representations in downstream tasks.\n\nSince the prediction objective in equation ( 1 ) is unnor-\n\nmalized, there is no a priori reason for the encoder to\n\nyield a linearly separable subspace ( Chen et al. , 2020 ).\n\nThus, rather than using a linear operation (averaging)\n\nto pool the features output of the frozen backbone, we\n\nexplore a learnable non-linear pooling strategy. Specifi-\n\ncally, when evaluating the frozen pretrained backbone\n\non downstream tasks, we learn a cross-attention layer\n\nwith a learnable query token. The output of the cross-\n\nattention layer is then added back to the query token\n\n(residual connection), and then fed into two-layer MLP\n\n**Table 4** *Ablating Prediction Task.* Models are ViT-L/16\n\nnetworks pretrained on K710 and SSv2 and evaluated with\n\nan attentive probe using a single center view. The region *x* is\n\nsampled by masking spatio-temporal regions in the video; *y* is\n\nthe mask complement. **1) random-tube[r]:** *x* is obtained by\n\nmasking a fraction *r* of tubes (spatial patches extended across\n\nthe entire temporal duration) from the video, **2) causal**\n\n**multi-block[p]:** *x* is restricted to the first *p* frames of the\n\n16-frame video, which are then masked with a random set\n\nof spatio-temporal blocks, **3) multi-block** : *x* is obtained\n\nby masking a random set of spatio-temporal blocks from the\n\nentire video. Best performance obtained by using multiblock\n\nmasking.\n\n*Frozen Evaluation*\n\n**K400 SSv2 IN1K Masking** (16 *×* 1 *×* 1) (16 *×* 1 *×* 1)\n\nrandom-tube[0.9] 51.5 46.4 55.6 causal multi-block[6] 61.3 49.8 66.9 causal multi-block[12] 71.9 63.6 72.2 multi-block **72.9 67.4 72.8**\n\nwith a single GeLU activation, followed by a LayerNorm,\n\nand finally a linear classifier.\n\nIn Table 3 we see that using adaptive pooling with", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv3.pdf" - }, - { - "text": "### **3.2 Datasets (Data Platform)**\n\nThe **datasets section is the main access point for browsing, filtering and searching the datasets** . It\n\noffers a faceted search, a full text search and a geographical search. The dataset view provides access\n\nand information to the distributions of the dataset.\n\nThe home page of this section appears like this:", - "page_start": 25, - "page_end": 25, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**6** of 57\n\n## **2 Approach**\n\nThe approach used for this User Manual was based on the identification of the main user functions of\n\nthe Portal and the description of each function from the user’s perspective in terms of “ *How to* …”.\n\nEach main function documentation consists of a screen snapshot, the steps required to execute the\n\nfunction and optionally a screenshot with the results.\n\n## **3 Main User Functions of the Portal**\n\nThis section describes all of the main user functions supported by the Portal Version 3.0.\n\nThe table 1-3 below lists the described functions by module.\n\n| | Module Name | Function |\n|:---|:---|:---|\n| 1 | Portal HomePage | - How to browse through the Editorial Content (how to access Resources on Open Data: eLearning modules, Training Companion, Reports about Open Data) - How to view / search for “Latest News” - How to view / search for “Open Data Events” - How to subscribe to the EDP Newsletter - How to view “Tweets” on the EDP - How to switch to another User Language |\n| 1 | Portal HomePage | - How to search for EDP Site Content |\n| 1 | Portal HomePage | - How to search for Datasets by Data Category - How to search for Datasets by Keyword |\n| 2 | Datasets (Data Platform) | Entering the Datasets-View |\n| | | How to filter datasets by using “Faceted Search” |\n| | | How to store personal queries |\n| | | How to filter datasets by geographical area |\n| | | How to download dataset distributions |\n| | | How to view licensing information |\n| | | How to switch to another user language |\n| | | How to browse by data catalogues |\n| 3 | Visualization of Geo-Spatial Data (map.apps) | How to visualize geo-spatial data from a dataset resource |\n| 4 | Graphical Data Visualisation Tool | How to visualize graphical data from a dataset resource |\n| 5 | Help Desk | How to contact The Portal’s Help Desk |\n| 6 | Metadata Quality Assurance (MQA) | Monitoring tool for the metadata quality: ‐ The Global Dashboard View ‐ The Catalogue details view |\n| 7 | SPARQL Manager | How to run SPARQL Queries using: - SPARQL Search |", - "page_start": 5, - "page_end": 5, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "NAVWEPS Oo-ROT-80 AIRPLANE PERFORMANCE\n\nF=mo\n\nF=$(mV)\n\nT, = Q (V,-V,)\n\nPa= T,, V,\n\nPw=Q/,(v2-v,)2\n\n2VI 7)p=-\n\nv2 +v,\n\n1.0\n\n.9\n\n.6\n\n.7\n\n.6\n\n7p .5\n\n.4\n\n.3\n\n.2\n\n.I\n\n0 0 .I .2 .3 .4 .5 .6 .? .6 .9 1.0\n\n%f2\n\n### Figure 2.5. Principles of Propulsion\n\n105", - "page_start": 122, - "page_end": 122, - "source_file": "00-80T-80.pdf" - }, - { - "text": "## * **5. Examining approaches to building a books data** * * **commons** *\n\nThere are many possible permutations for building a books data commons. To structure our\n\nexploration, we focused on two particular tracks, discussed below. We chose these tracks\n\nmindful of the above legal issues, and because there are already existence proofs that help\n\nto illuminate tradeoffs, challenges and potential paths forward for each.\n\n## *5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2** 27\n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large,\n\ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own\n\ntraining of LLMs, but also to lower the barriers for others. 28\n\nAlong with data drawn from the web at large, The Pile included books from three datasets.\n\nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second\n\nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books\n\nby otherwise unpublished authors; and a 28,752 books in the public domain and published\n\nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project\n\nGutenberg.\n\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright\n\nnotices to have the dataset taken down from various websites.\n\nDespite the takedown requests, the importance of books to EleutherAI and the broader\n\ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced\n\nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. 29\n\nAmong other things, v2 would “have many more books than the original Pile had, for\n\nexample, and more diverse representation of non-academic non-fiction domains.” At the\n\nsame time, it would only seek to include public domain books and permissively licensed\n\ncontent. As before, this corpus focuses on English language books.\n\nThis is an illustrative example, and there are also other projects of this ilk. For instance, see the 27\n\nCommon Corpus project, which includes an array of public domain books from a number of countries,\n\nat [https://huggingface.co./blog/Pclanglais/common-corpus](https://huggingface.co./blog/Pclanglais/common-corpus) ; see also [https://huggingface.co./datasets/](https://huggingface.co./datasets/storytracer/internet_archive_books_en)\n\n[storytracer/internet_archive_books_en](https://huggingface.co./datasets/storytracer/internet_archive_books_en) (“This dataset contains more than 650,000 English public domain\n\nbooks (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the\n\nOpen Library project.”)\n\nSee Gao et al, supra note 8. 28\n\nGoldman, Sharon. “One of the World’s Largest AI Training Datasets Is About to Get Bigger and 29\n\n“Substantially Better.” *VentureBeat* , 11 Jan. 2024, [venturebeat.com/ai/one-of-the-worlds-largest-ai-](http://venturebeat.com/ai/one-of-the-worlds-largest-ai-training-datasets-is-about-to-get-bigger-and-substantially-better/)\n\n[training-datasets-is-about-to-get-bigger-and-substantially-better/](http://venturebeat.com/ai/one-of-the-worlds-largest-ai-training-datasets-is-about-to-get-bigger-and-substantially-better/) . Accessed 20 Mar. 2024.", - "page_start": 12, - "page_end": 12, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "news1.pdf", - "query": "Where will the 2024 AI + Energy summit take place ?", - "target_page": 1, - "target_passage": "The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "[s.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-2](https://www.reuters.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-21)\n\n[1). Reuters. 21 May 2024. Retrieved 23 May 2024.](https://www.reuters.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-21)\n\n[318. \"Frontier AI Safety Commitments, AI Seoul Summit 2024\" (https://web.archive.org/web/2024](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[0523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024). gov.uk. 21 May](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[2024. Archived from the original (https://www.gov.uk/government/publications/frontier-ai-safe](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[ty-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-202](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[4) on 23 May 2024. Retrieved 23 May 2024.](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n319. Russell & Norvig 2021, p. 9.\n\n320. Copeland, J., ed. (2004). *The Essential Turing: the ideas that gave birth to the computer*\n\n*age* [. Oxford, England: Clarendon Press. ISBN 0-1982-5079-7.](https://en.wikipedia.org/wiki/Special:BookSources/0-1982-5079-7)\n\n[321. \"Google books ngram\" (https://books.google.com/ngrams/graph?content=electronic+brain&](https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[year_start=1930&year_end=2019&corpus=en-2019&smoothing=3). Archived (https://web.ar](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[chive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3) from the original](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\non 5 October 2024. Retrieved 5 October 2024.\n\n322. AI's immediate precursors: McCorduck (2004, pp. 51- 107), Crevier (1993, pp. 27- 32),\n\nRussell & Norvig (2021, pp. 8- 17), Moravec (1988, p. 3)\n\n[323. Turing's original publication of the Turing test in \"Computing machinery and intelligence\":](https://en.wikipedia.org/wiki/Computing_machinery_and_intelligence)\n\nTuring (1950) Historical influence and philosophical implications: Haugeland (1985, pp. 6-\n\n9), Crevier (1993, p. 24), McCorduck (2004, pp. 70- 71), Russell & Norvig (2021, pp. 2, 984)\n\n324. Crevier (1993), pp. 47- 49.\n\n325. Russell & Norvig (2003), p. 17.\n\n326. Russell & Norvig (2003), p. 18.\n\n327. Newquist (1994), pp. 86- 86.\n\n328. Simon (1965, p. 96) quoted in Crevier (1993, p. 109)\n\n329. Minsky (1967, p. 2) quoted in Crevier (1993, p. 109)\n\n330. Russell & Norvig (2021), p. 21.\n\n331. Lighthill (1973).", - "page_start": 47, - "page_end": 47, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Arts and Entertainment](https://about.newsusa.com/taxonomy/term/78) / New Artificial Intelligence Summit Series Begins With Energy\n\n## New Artificial Intelligence Summit Series Begins With\n\n## Energy\n\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain\n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative\n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit\n\nSeries.\n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington,\n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and\n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant\n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote\n\npartnerships between AI and energy stakeholders.\n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy\n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in\n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced\n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research.\n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy,\n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and\n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American\n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts.\n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan.\n\nArticle Link\n\n[https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…](https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with-energy)\n\n[ARTS AND ENTERTAINMENT](https://about.newsusa.com/taxonomy/term/78)\n\n07/31/2024\n\n[Celebrate St. Patrick's Day with](https://about.newsusa.com/celebrate-st-patricks-day-with-no-booze-just-pure-irish-fun-and-entertainment)\n\nNo Booze, Just Pure Irish Fun and\n\nEntertainment\n\nMar 06, 2024\n\nSay Hello to Your Big Break at the\n\nStapleton Library Job Fair in\n\n[Vocation, Trade, or Civil Service](https://about.newsusa.com/say-hello-to-your-big-break-at-the-stapleton-library-job-fair-in-vocation-trade-or-civil-service)\n\nMar 06, 2024\n\nLocal Artists Collaborate for a\n\n[Unique Fusion of Groove and](https://about.newsusa.com/local-artists-collaborate-for-a-unique-fusion-of-groove-and-collage)\n\nCollage\n\nMar 06, 2024\n\n[Explore Downtown San Pedro](https://about.newsusa.com/explore-downtown-san-pedro-with-flair-ride-the-iconic-red-car-trolley-for-free)\n\nwith Flair: Ride the Iconic Red Car\n\nTrolley for Free\n\nMar 06, 2024\n\nRetrain Your Emotional Brain: A\n\n[Natural Alternative to Weight](https://about.newsusa.com/retrain-your-emotional-brain-a-natural-alternative-to-weight-loss-drugs)\n\nLoss Drugs\n\nFeb 22, 2024\n\nSerial Entrepreneur Teaches Us\n\n[How to Go the Distance in](https://about.newsusa.com/serial-entrepreneur-teaches-us-how-to-go-the-distance-in-business-and-in-life)\n\nBusiness and in Life\n\nFeb 21, 2024\n\n[FASHION](https://about.newsusa.com/taxonomy/term/1)\n\n[BUSINESS](https://about.newsusa.com/taxonomy/term/2)\n\n[INFOGRAPHIC](https://about.newsusa.com/taxonomy/term/16)\n\n[ENVIRONMENT](https://about.newsusa.com/taxonomy/term/17)\n\n[HEALTH](https://about.newsusa.com/taxonomy/term/18)", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "[ml) from the original on 26 September 2024. Retrieved 7 August 2024.](https://web.archive.org/web/20240926131402/https://www.nytimes.com/2024/07/25/science/ai-math-alphaproof-deepmind.html)\n\n158. *LLEMMA* [. (https://blog.eleuther.ai/llemma/) eleuther.ai. Retrieved 2024-08-07.](https://blog.eleuther.ai/llemma/)\n\n[159. AI Math. (https://julius.ai/home/ai-math) Archived (https://web.archive.org/web/20241005165](https://web.archive.org/web/20241005165649/https://julius.ai/home/ai-math)\n\n[649/https://julius.ai/home/ai-math) 5 October 2024 at the Wayback Machine Caesars Labs,](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n2024. Retrieved 2024-08-07.", - "page_start": 37, - "page_end": 37, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[ml) from the original on 5 October 2024. Retrieved 5 October 2024.](https://web.archive.org/web/20241005170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/html)\n\n[301. \"AI Safety Institute releases new AI safety evaluations platform\" (https://www.gov.uk/govern](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[ment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform). UK Government.](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[10 May 2024. Archived (https://web.archive.org/web/20241005170207/https://www.gov.uk/g](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[overnment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform) from the](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\noriginal on 5 October 2024. Retrieved 14 May 2024.\n\n302. Regulation of AI to mitigate risks: Berryhill et al. (2019), Barfield & Pagallo (2018), Iphofen &\n\nKritikos (2019), Wirtz, Weyerer & Geyer (2018), Buiten (2019)\n\n303. Law Library of Congress (U.S.). Global Legal Research Directorate (2019).\n\n304. Vincent (2023).\n\n305. Stanford University (2023).\n\n306. UNESCO (2021).\n\n307. Kissinger (2021).\n\n308. Altman, Brockman & Sutskever (2023).\n\n[309. VOA News (25 October 2023). \"UN Announces Advisory Body on Artificial Intelligence\" (http](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[s://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.htm](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[l). Archived (https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-a](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[nnounces-advisory-body-on-artificial-intelligence-/7328732.html) from the original on 18](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\nSeptember 2024. Retrieved 5 October 2024.\n\n[310. \"Council of Europe opens first ever global treaty on AI for signature\" (https://www.coe.int/en/](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature). ](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature) *Council of*\n\n*Europe* [. 5 September 2024. Archived (https://web.archive.org/web/20240917001330/https://](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signat](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[ure) from the original on 17 September 2024. Retrieved 17 September 2024.](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n311. Edwards (2023).\n\n312. Kasperowicz (2023).\n\n313. Fox News (2023).", - "page_start": 46, - "page_end": 46, - "source_file": "wikipedia3.pdf" - }, - { - "text": "314. Milmo, Dan (3 November 2023). \"Hope or Horror? The great AI debate dividing its pioneers\".\n\n*[The Guardian Weekly](https://en.wikipedia.org/wiki/The_Guardian_Weekly)* . pp. 10- 12.\n\n[315. \"The Bletchley Declaration by Countries Attending the AI Safety Summit, 1- 2 November](https://web.archive.org/web/20231101123904/https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023)\n\n[2023\" (https://web.archive.org/web/20231101123904/https://www.gov.uk/government/public](https://web.archive.org/web/20231101123904/https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023)\n\n[ations/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countrie](https://web.archive.org/web/20231101123904/https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023)\n\n[s-attending-the-ai-safety-summit-1-2-november-2023). ](https://web.archive.org/web/20231101123904/https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023) *GOV.UK* . 1 November 2023.\n\n[Archived from the original (https://www.gov.uk/government/publications/ai-safety-summit-20](https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023)\n\n[23-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-s](https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023)\n\n[ummit-1-2-november-2023) on 1 November 2023. Retrieved 2 November 2023.](https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023)\n\n[316. \"Countries agree to safe and responsible development of frontier AI in landmark Bletchley](https://www.gov.uk/government/news/countries-agree-to-safe-and-responsible-development-of-frontier-ai-in-landmark-bletchley-declaration)\n\n[Declaration\" (https://www.gov.uk/government/news/countries-agree-to-safe-and-responsible](https://www.gov.uk/government/news/countries-agree-to-safe-and-responsible-development-of-frontier-ai-in-landmark-bletchley-declaration)\n\n[-development-of-frontier-ai-in-landmark-bletchley-declaration). ](https://www.gov.uk/government/news/countries-agree-to-safe-and-responsible-development-of-frontier-ai-in-landmark-bletchley-declaration) *GOV.UK* (Press release).\n\n[Archived (https://web.archive.org/web/20231101115016/https://www.gov.uk/government/ne](https://web.archive.org/web/20231101115016/https://www.gov.uk/government/news/countries-agree-to-safe-and-responsible-development-of-frontier-ai-in-landmark-bletchley-declaration)\n\n[ws/countries-agree-to-safe-and-responsible-development-of-frontier-ai-in-landmark-bletchle](https://web.archive.org/web/20231101115016/https://www.gov.uk/government/news/countries-agree-to-safe-and-responsible-development-of-frontier-ai-in-landmark-bletchley-declaration)\n\n[y-declaration) from the original on 1 November 2023. Retrieved 1 November 2023.](https://web.archive.org/web/20231101115016/https://www.gov.uk/government/news/countries-agree-to-safe-and-responsible-development-of-frontier-ai-in-landmark-bletchley-declaration)\n\n[317. \"Second global AI summit secures safety commitments from companies\" (https://www.reuter](https://www.reuters.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-21)", - "page_start": 47, - "page_end": 47, - "source_file": "wikipedia3.pdf" - }, - { - "text": "160. Alex McFarland: *[7 Best AI for Math Tools.](https://www.unite.ai/best-ai-for-math-tools/)* (https://www.unite.ai/best-ai-for-math-tools/)\n\n[Archived (https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-mat](https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-math-tools/)\n\n[h-tools/) 11 September 2024 at the Wayback Machine unite.ai. Retrieved 2024-08-07](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n161. Matthew Finio & Amanda Downie: IBM Think 2024 Primer, \"What is Artificial Intelligence (AI)\n\nin Finance?\" 8 Dec. 2023\n\n162. M. Nicolas, J. Firzli: Pensions Age/European Pensions magazine, \"Artificial Intelligence: Ask\n\n[the Industry\" May June 2024 https://videovoice.org/ai-in-finance-innovation-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[intended/ Archived (https://web.archive.org/web/20240911125502/https://videovoice.org/ai-i](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[n-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[act-wont-work-as-intended/) 11 September 2024 at the Wayback Machine.](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n163. Congressional Research Service (2019). *[Artificial Intelligence and National Security](https://fas.org/sgp/crs/natsec/R45178.pdf)* (https://f\n\n[as.org/sgp/crs/natsec/R45178.pdf) (PDF). Washington, DC: Congressional Research](https://fas.org/sgp/crs/natsec/R45178.pdf)\n\n[Service.PD-notice](https://en.wikipedia.org/wiki/Template:PD-notice)\n\n164. Slyusar, Vadym (2019). Artificial intelligence as the basis of future control networks\n\n[(Preprint). doi:10.13140/RG.2.2.30247.50087 (https://doi.org/10.13140%2FRG.2.2.30247.5](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[0087).](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[165. Iraqi, Amjad (3 April 2024). \" 'Lavender': The AI machine directing Israel's bombing spree in](https://www.972mag.com/lavender-ai-israeli-army-gaza/)\n\n[Gaza\" (https://www.972mag.com/lavender-ai-israeli-army-gaza/). ](https://www.972mag.com/lavender-ai-israeli-army-gaza/) *+972 Magazine* . Retrieved\n\n6 April 2024.\n\n[166. Davies, Harry; McKernan, Bethan; Sabbagh, Dan (1 December 2023). \" 'The Gospel': how](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[Israel uses AI to select bombing targets in Gaza\" (https://www.theguardian.com/world/2023/](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets). ](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets) *The Guardian* . Retrieved\n\n4 December 2023.\n\n[167. Marti, J Werner (10 August 2024). \"Drohnen haben den Krieg in der Ukraine revolutioniert,](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)\n\n[doch sie sind empfindlich auf Störsender - deshalb sollen sie jetzt autonom operieren\" (http](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[nce/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surg](https://www.goldmansachs.com/intelligence/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf)\n\n[e/report.pdf) (PDF) on 26 July 2024. Retrieved 5 October 2024.](https://www.goldmansachs.com/intelligence/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf)\n\n[207. Ryan, Carol (12 April 2024). \"Energy-Guzzling AI Is Also the Future of Energy Savings\" (http](https://www.wsj.com/business/energy-oil/ai-data-centers-energy-savings-d602296e)\n\n[s://www.wsj.com/business/energy-oil/ai-data-centers-energy-savings-d602296e). ](https://www.wsj.com/business/energy-oil/ai-data-centers-energy-savings-d602296e) *Wall Street*\n\n*Journal* . Dow Jones.\n\n[208. Hiller, Jennifer (1 July 2024). \"Tech Industry Wants to Lock Up Nuclear Power for AI\" (https://](https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n[www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb7](https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n[5316?mod=djem10point). ](https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point) *Wall Street Journal* [. Dow Jones. Archived (https://web.archive.or](https://web.archive.org/web/20241005165650/https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n[g/web/20241005165650/https://www.wsj.com/business/energy-oil/tech-industry-wants-to-loc](https://web.archive.org/web/20241005165650/https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n[k-up-nuclear-power-for-ai-6cb75316?mod=djem10point) from the original on 5 October](https://web.archive.org/web/20241005165650/https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n2024. Retrieved 5 October 2024.\n\n[209. Kendall, Tyler (28 September 2024). \"Nvidia's Huang Says Nuclear Power an Option to](https://www.bloomberg.com/news/articles/2024-09-27/nvidia-s-huang-says-nuclear-power-an-option-to-feed-data-centers)\n\n[Feed Data Centers\" (https://www.bloomberg.com/news/articles/2024-09-27/nvidia-s-huang-s](https://www.bloomberg.com/news/articles/2024-09-27/nvidia-s-huang-says-nuclear-power-an-option-to-feed-data-centers)\n\n[ays-nuclear-power-an-option-to-feed-data-centers). ](https://www.bloomberg.com/news/articles/2024-09-27/nvidia-s-huang-says-nuclear-power-an-option-to-feed-data-centers) *Bloomberg* .\n\n[210. Halper, Evan (20 September 2024). \"Microsoft deal would reopen Three Mile Island nuclear](https://www.washingtonpost.com/business/2024/09/20/microsoft-three-mile-island-nuclear-constellation)\n\n[plant to power AI\" (https://www.washingtonpost.com/business/2024/09/20/microsoft-three-mi](https://www.washingtonpost.com/business/2024/09/20/microsoft-three-mile-island-nuclear-constellation)\n\n[le-island-nuclear-constellation). ](https://www.washingtonpost.com/business/2024/09/20/microsoft-three-mile-island-nuclear-constellation) *Washington Post* .", - "page_start": 41, - "page_end": 41, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[ogy/archive/2023/05/ai-advancements-multimodal-models/674113/) from the original on 18](https://web.archive.org/web/20240918022529/https://www.theatlantic.com/technology/archive/2023/05/ai-advancements-multimodal-models/674113/)\n\nSeptember 2024, retrieved 5 October 2024", - "page_start": 65, - "page_end": 65, - "source_file": "wikipedia3.pdf" - }, - { - "text": "282. Arguments that AI is not an imminent risk: Brooks (2014), Geist (2015), Madrigal (2015),\n\nLee (2014)\n\n283. Christian (2020), pp. 67, 73.\n\n284. Yudkowsky (2008).\n\n285. Anderson & Anderson (2011).\n\n286. AAAI (2014).\n\n287. Wallach (2010).\n\n288. Russell (2019), p. 173.\n\n[289. Stewart, Ashley; Melton, Monica. \"Hugging Face CEO says he's focused on building a](https://www.businessinsider.com/hugging-face-open-source-ai-approach-2023-12)\n\n['sustainable model' for the $4.5 billion open-source-AI startup\" (https://www.businessinsider.](https://www.businessinsider.com/hugging-face-open-source-ai-approach-2023-12)\n\n[com/hugging-face-open-source-ai-approach-2023-12). ](https://www.businessinsider.com/hugging-face-open-source-ai-approach-2023-12) *Business Insider* [. Archived (https://w](https://web.archive.org/web/20240925013220/https://www.businessinsider.com/hugging-face-open-source-ai-approach-2023-12)\n\n[eb.archive.org/web/20240925013220/https://www.businessinsider.com/hugging-face-open-s](https://web.archive.org/web/20240925013220/https://www.businessinsider.com/hugging-face-open-source-ai-approach-2023-12)\n\n[ource-ai-approach-2023-12) from the original on 25 September 2024. Retrieved 14 April](https://web.archive.org/web/20240925013220/https://www.businessinsider.com/hugging-face-open-source-ai-approach-2023-12)\n\n2024.\n\n[290. Wiggers, Kyle (9 April 2024). \"Google open sources tools to support AI model development\"](https://techcrunch.com/2024/04/09/google-open-sources-tools-to-support-ai-model-development)\n\n[(https://techcrunch.com/2024/04/09/google-open-sources-tools-to-support-ai-model-develop](https://techcrunch.com/2024/04/09/google-open-sources-tools-to-support-ai-model-development)\n\n[ment). ](https://techcrunch.com/2024/04/09/google-open-sources-tools-to-support-ai-model-development) *TechCrunch* [. Archived (https://web.archive.org/web/20240910112401/https://techcrun](https://web.archive.org/web/20240910112401/https://techcrunch.com/2024/04/09/google-open-sources-tools-to-support-ai-model-development/)\n\n[ch.com/2024/04/09/google-open-sources-tools-to-support-ai-model-development/) from the](https://web.archive.org/web/20240910112401/https://techcrunch.com/2024/04/09/google-open-sources-tools-to-support-ai-model-development/)\n\noriginal on 10 September 2024. Retrieved 14 April 2024.\n\n[291. Heaven, Will Douglas (12 May 2023). \"The open-source AI boom is built on Big Tech's](https://www.technologyreview.com/2023/05/12/1072950/open-source-ai-google-openai-eleuther-meta)\n\n[handouts. How long will it last?\" (https://www.technologyreview.com/2023/05/12/1072950/op](https://www.technologyreview.com/2023/05/12/1072950/open-source-ai-google-openai-eleuther-meta)\n\n[en-source-ai-google-openai-eleuther-meta). ](https://www.technologyreview.com/2023/05/12/1072950/open-source-ai-google-openai-eleuther-meta) *MIT Technology Review* . Retrieved 14 April\n\n2024.\n\n[292. Brodsky, Sascha (19 December 2023). \"Mistral AI's New Language Model Aims for Open](https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-open-source-supremacy)\n\n[Source Supremacy\" (https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-o](https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-open-source-supremacy)\n\n[pen-source-supremacy). ](https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-open-source-supremacy) *AI Business* [. Archived (https://web.archive.org/web/202409052126](https://web.archive.org/web/20240905212607/https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-open-source-supremacy)\n\n[07/https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-open-source-supre](https://web.archive.org/web/20240905212607/https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-open-source-supremacy)", - "page_start": 45, - "page_end": 45, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[macy) from the original on 5 September 2024. Retrieved 5 October 2024.](https://web.archive.org/web/20240905212607/https://aibusiness.com/nlp/mistral-ai-s-new-language-model-aims-for-open-source-supremacy)\n\n[293. Edwards, Benj (22 February 2024). \"Stability announces Stable Diffusion 3, a next-gen AI](https://arstechnica.com/information-technology/2024/02/stability-announces-stable-diffusion-3-a-next-gen-ai-image-generator)\n\n[image generator\" (https://arstechnica.com/information-technology/2024/02/stability-announc](https://arstechnica.com/information-technology/2024/02/stability-announces-stable-diffusion-3-a-next-gen-ai-image-generator)\n\n[es-stable-diffusion-3-a-next-gen-ai-image-generator). ](https://arstechnica.com/information-technology/2024/02/stability-announces-stable-diffusion-3-a-next-gen-ai-image-generator) *Ars Technica* [. Archived (https://web.ar](https://web.archive.org/web/20241005170201/https://arstechnica.com/information-technology/2024/02/stability-announces-stable-diffusion-3-a-next-gen-ai-image-generator/)\n\n[chive.org/web/20241005170201/https://arstechnica.com/information-technology/2024/02/sta](https://web.archive.org/web/20241005170201/https://arstechnica.com/information-technology/2024/02/stability-announces-stable-diffusion-3-a-next-gen-ai-image-generator/)\n\n[bility-announces-stable-diffusion-3-a-next-gen-ai-image-generator/) from the original on 5](https://web.archive.org/web/20241005170201/https://arstechnica.com/information-technology/2024/02/stability-announces-stable-diffusion-3-a-next-gen-ai-image-generator/)\n\nOctober 2024. Retrieved 14 April 2024.\n\n[294. Marshall, Matt (29 January 2024). \"How enterprises are using open source LLMs: 16](https://venturebeat.com/ai/how-enterprises-are-using-open-source-llms-16-examples)\n\n[examples\" (https://venturebeat.com/ai/how-enterprises-are-using-open-source-llms-16-exa](https://venturebeat.com/ai/how-enterprises-are-using-open-source-llms-16-examples)\n\n[mples). ](https://venturebeat.com/ai/how-enterprises-are-using-open-source-llms-16-examples) *VentureBeat* [. Archived (https://web.archive.org/web/20240926171131/https://ventur](https://web.archive.org/web/20240926171131/https://venturebeat.com/ai/how-enterprises-are-using-open-source-llms-16-examples/)\n\n[ebeat.com/ai/how-enterprises-are-using-open-source-llms-16-examples/) from the original](https://web.archive.org/web/20240926171131/https://venturebeat.com/ai/how-enterprises-are-using-open-source-llms-16-examples/)\n\non 26 September 2024. Retrieved 5 October 2024.\n\n[295. Piper, Kelsey (2 February 2024). \"Should we make our most powerful AI models open](https://www.vox.com/future-perfect/2024/2/2/24058484/open-source-artificial-intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake)\n\n[source to all?\" (https://www.vox.com/future-perfect/2024/2/2/24058484/open-source-artificial](https://www.vox.com/future-perfect/2024/2/2/24058484/open-source-artificial-intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake)\n\n[-intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake). ](https://www.vox.com/future-perfect/2024/2/2/24058484/open-source-artificial-intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake) *Vox* [. Archived (https://web.archi](https://web.archive.org/web/20241005170204/https://www.vox.com/future-perfect/2024/2/2/24058484/open-source-artificial-intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake)\n\n[ve.org/web/20241005170204/https://www.vox.com/future-perfect/2024/2/2/24058484/open-s](https://web.archive.org/web/20241005170204/https://www.vox.com/future-perfect/2024/2/2/24058484/open-source-artificial-intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake)\n\n[ource-artificial-intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake) from the original](https://web.archive.org/web/20241005170204/https://www.vox.com/future-perfect/2024/2/2/24058484/open-source-artificial-intelligence-ai-risk-meta-llama-2-chatgpt-openai-deepfake)\n\non 5 October 2024. Retrieved 14 April 2024.", - "page_start": 45, - "page_end": 45, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "news1.pdf", - "query": "What is the United States SCSP ?", - "target_page": 1, - "target_passage": "he Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Paper\n\nFSC <sup>®</sup> C007299\n\nu", - "page_start": 119, - "page_end": 119, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "0 0.5 1 0\n\n0.4\n\n0.8 Conductivities (Corrected MFLI)\n\nσ ( ω )\n\nω in eV\n\nNS\n\nSC\n\n2 ∆\n\n0 50 100\n\n100\n\n120\n\nW K (meV)\n\nΓ in meV\n\nCorrected MFLI\n\nSC\n\nNS\n\nFIG. 15: Top - σ ( ω ) in the NS and the SCS in the ‘corrected’\n\nMFLI model with the feedback from SC on the quasiparticle\n\ndamping: i Γ term transforms into Γ √ − ω <sup>2</sup> +∆ <sup>2</sup> <sup>. In the SCS</sup> <sup>σ</sup>\n\nnow begins at Ω= 2∆. The parameters are same as in Fig.\n\n10. Bottom - the behavior of Kubo sum with Γ. Observe\n\nthat W ( ω c ) in the NS is larger than in the SCS.\n\n0.2 0.4 0.6 0.8\n\n−10\n\n0\n\n10\n\nω c in eV\n\nW SC ( ω c\n\n) − W NS ( ω c\n\n)\n\nCorrected MFLI\n\nwithout lattice\n\nwith lattice\n\n∆ W K\n\nFIG. 16: Evolution of the difference of the optical integrals\n\nbetween the SCS and the NS with the upper cut-off ω c for\n\nthe “corrected” MFLI model. Now ∆ W ( ω c ) is negative above\n\nsome frequency. Parameters are same as in the Fig 15.\n\nmodel, where W K is larger in the NS for all Γ (see Fig.\n\n4). In other words, the original MFLI model does not\n\nhave the BCSI theory as its limiting case.\n\nWe modified the MFLI model is a minimal way by\n\nchanging the damping term in a SCS to Γ √ − ω <sup>2</sup> +∆ <sup>2</sup> <sup>to be</sup>\n\nconsistent with BCSI model. We still use Eq. (18) for\n\nthe MFL term simply because this term was introduced\n\nin the NS on phenomenological grounds and there is no\n\nway to guess how it gets modified in the SCS state with-\n\nout first deriving the normal state self-energy microscop-\n\nically (this is what we will do in the next section). The\n\nresults of the calculations for the modified MFLI model\n\nare presented in Figs. 15 and 16. We clearly see that the\n\nbehavior is now different and ∆ W K < 0 for all Γ. This\n\nis the same behavior as we previously found in BCSI\n\nand EB models. So we argue that the ‘unconventional’\n\nbehavior exhibited by the original MFLI model is most\n\nlikely the manifestation of a particular modeling incon-\n\nsistency. Still, Ref. 30 made a valid point that the fact\n\nthat quasiparticles behave more close to free fermions in\n\na SCS than in a NS, and this effect tends to reverse the\n\nsigns of ∆ W K and of the kinetic energy <sup>43</sup> . It just hap-\n\npens that in a modified MFLI model the optical integral\n\nis still larger in the NS.\n\nD. The collective boson model\n\nWe now turn to a more microscopic model- the CB\n\nmodel. The model describes fermions interacting by ex-\n\nchanging soft, overdamped collective bosons in a partic-\n\nular, near-critical, spin or charge channel <sup>31,44,45</sup> . This\n\ninteraction is responsible for the normal state self-energy\n\nand also gives rise to a superconductivity. A peculiar\n\nfeature of the CB model is that the propagator of a col-\n\nlective boson changes below T c because this boson is not\n\nan independent degree of freedom (as in EB model) but\n\nis made out of low-energy fermions which are affected by\n\nsuperconductivity <sup>32</sup> .\n\nThe most relevant point for our discussion is that this\n\nmodel contains the physics which we identified above as\n\na source of a potential sign change of ∆ W K . Namely,\n\nat strong coupling the fermionic self-energy in the NS\n\nis large because there exists strong scattering between\n\nlow-energy fermions mediated by low-energy collective\n\nbosons. In the SCS, the density of low-energy fermions\n\ndrops and a continuum collective excitations becomes\n\ngaped. Both effects reduce fermionic damping and lead\n\nto the increase of W K in a SCS. If this increase exceeds a\n\nconventional loss of W K due to a gap opening, the total\n\n∆ W K may become positive.\n\nThe CB model has been applied numerous times to the\n\ncuprates, most often under the assumption that near-\n\ncritical collective excitations are spin fluctuations with\n\nmomenta near Q = ( π, π ). This version of a CB bo-\n\nson is commonly known as a spin-fermion model. This\n\nmodel yields d x 2 − y 2 superconductivity and explains in a\n\nquantitative way a number of measured electronic fea-", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0764.pdf" - }, - { - "text": "**44** IBM Content Manager OnDemand Guide\n\n*Figure 2-12 ARSLOAD for new instance*\n\n//ARSLOAD PROC\n\n//ARSLOAD EXEC PGM=ARSLOAD,REGION=0M,TIME=NOLIMIT,\n\n// PARM=(’/-h ARC95037 -C Q’)\n\n//STEPLIB DD DISP=SHR,DSN=ARSV950.AE.SARSLOAD\n\n// DD DISP=SHR,DSN=SYS1.DB1K.SDSNEXIT\n\n// DD DISP=SHR,DSN=SYS1.DB1K.SDSNLOAD\n\n// DD DISP=SHR,DSN=SYS1.DB1K.SDSNLOD2\n\n// DD DISP=SHR,DSN=ACIF.V4R3M0.SAPKMOD1\n\n// **\n\n//SYSPRINT DD SYSOUT=*,RECFM=FBA,LRECL=121,BLKSIZE=6050\n\n//SYSOUT DD SYSOUT=*\n\n// ***\n\n//* The following 2 DD statements should be uncommented and\n\n//* customized if the PDF indexer is used.\n\n// ***\n\n//*ADOBERES DD DSN=ADOBE.PDFLIB.RESOURCE.INDEX(ADOBERES),DISP=SHR\n\n//*ADOBEFNT DD DSN=ADOBE.PDF405.PLUSP1C.ADOBEFNT.LST,DISP=SHR", - "page_start": 67, - "page_end": 67, - "source_file": "sg246915.pdf" - }, - { - "text": "**38** IBM Content Manager OnDemand Guide\n\n#### **2.5.2 Creating an instance on z/OS**\n\nIn this section, we explain how to create an instance on the z/OS system. To do so, complete\n\nthe following steps:\n\n1. Copy the control files.\n\n2. Verify the ARS.INI file.\n\n3. Verify the ARS.CFG file.\n\n4. Modify the ARS.CACHE file.\n\n5. Verify the CLI.INI file.\n\n6. Modify the **ARSSOCKD** procedure.\n\n7. Modify the **ARSLOAD** procedure.\n\nYou can mount the Content Manager OnDemand installation directory at any mount point\n\nother than /usr/lpp/ars/V9R5M0 . You can run at different service levels with this flexibility. For\n\nexample, a symmetric multiprocessor (SMP) might be used to install into\n\nSERVICE/usr/lpp/ars/V9R5M0 . SERVICE/usr/lpp/ars/V9R5M0 might be copied into\n\n/usr/lpp/ars/V9R5M0/maint for testing. When testing is complete,\n\n/usr/lpp/ars/V9R5M0/maint might be copied into /usr/lpp/ars/V9R5M0 for production.\n\n**Copying the control files**\n\nTo copy the control files, complete the following steps:\n\n1. Create a directory ( /etc/ars ) for maintaining the updated configuration files.\n\n2. Create a symbolic link from the installed directory /usr/lpp/ars/V9R5M0/config to the\n\n/etc/ars directory, for example, ln -s /etc/ars /usr/lpp/ars/V9R5M0/config .\n\n3. Set the appropriate access mode of 755.\n\n* **ARS.INI** *\n\nThe ARS.INI file contains a section for each instance; each section begins with a header. It is\n\ncreated at installation time and, by default, it is configured with information for the archive\n\ninstance. In this scenario, ARC95037 is the header line definition.\n\nFigure 2-7 shows the content of a sample ARS.INI file.\n\n*Figure 2-7 ARS.INI file sample*\n\n[@SRV@_ARC95037]\n\nHOST=MyHost\n\nPROTOCOL=2\n\nPORT=1937\n\nSRVR_INSTANCE=ARSDB937\n\nSRVR_INSTANCE_OWNER=ARSUS937\n\nSRVR_OD_CFG=/usr/lpp/ars/V9R5M0/config/ars937.cfg\n\nSRVR_SM_CFG=/usr/lpp/ars/V9R5M0/config/ars937.cache\n\nSSL_KEYRING_STASH=/usr/lpp/ars/V9R5M0/config/ars937.stash\n\nSRVR_FLAGS_SECURITY_EXIT=0\n\nSRVR_FLAGS_FOLDER_APPLGRP_EXIT=0\n\nSRVR_FLAGS_DOCUMENT_EXIT=0\n\nSRVR_FLAGS_SQL_QUERY_EXIT=0\n\nSRVR_FLAGS_FORCE_SECURITY=0", - "page_start": 61, - "page_end": 61, - "source_file": "sg246915.pdf" - }, - { - "text": "**Simulation of market price using GTAP.** The yield changes for maize from the DSSAT models under 1.5 °C and 2.0 °C temperature increase are used to carry out simulations using competitive market for changes in production, market price, and self-sufficiency ratio of maize at national and global ­levels <sup>53</sup> <sup>,</sup> <sup>54</sup> . For this study, we use a comparative static analysis approach to simulate the impact of climate changes on the prices and trade of the major food crops under current economic conditions. Utilizing current economic conditions has the advan- tage of minimizing assumptions and model uncertainties related to future economic ­conditions <sup>55</sup> <sup>,</sup> <sup>56</sup> . The original GTAP database doesn’t include maize as a separate sector, rather it is combined with other coarse grains to form an “other coarse grain” sector. For this study, we updated the GTAP database by splitting maize from the original sector in the database, design an appropriate sectoral and regional aggregation scheme to the original database. The detailed method is given as follows: First, we improved the database by splitting maize from the existing sector “other coarse grain”, following similar work using ­GTAP <sup>57</sup> <sup>-</sup> <sup>59</sup> based on the routines from the Splitcom ­method <sup>60</sup> . In this procedure, the old flows of data both at national and trade levels are allocated between the new flows using weights. The national weights include the division of each unsplit user’s use of the original split commodity among the new commodities; the division of unsplit inputs to the original industry between the new industries; the splitting of new industry’s use of each new commodity. Maize use is mainly shared between feed, food, processing and others (seed, waste, etc.). Trade shares allocate the original slice of the split commodity into the new commodity for all elements of basic price value, tax, and margin. Finally, we used the RAS method for balancing the newly created database. The values for the national shares matrix were obtained from FAOSTAT. The trade shares matrix was calculated based on the data from UN Comtrade Database. Second, our sectoral aggregation scheme for GTAP ensures that all the competing and complimenting sectors for maize are present in the most disaggregated form. For example, for maize, other crops compete for inputs of production and both livestock and households are major users of maize. For regional aggregation, we kept the details for all the main producing, consuming, and trading regions, for maize.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "When the HBA on the host scans for devices that are attached to it, the HBA discovers all of\n\nthe volumes that are mapped to its FC ports and their SCSI identifiers (SCSI LUN IDs).\n\nFor example, the first disk that is found is generally SCSI LUN 1. You can control the order in\n\nwhich the HBA discovers volumes by assigning the SCSI LUN ID as required. If you do not\n\nspecify a SCSI LUN ID when mapping a volume to the host, the storage system automatically\n\nassigns the next available SCSI LUN ID, based on any mappings that exist with that host.\n\nExample 7-21 shows how to map volumes volume_B and volume_C to defined host Almaden by\n\nusing **mkvdiskhostmap** command.\n\n*Example 7-21 The mkvdiskhostmap command*\n\nIBM_Storwize:ITSO:superuser>mkvdiskhostmap -host Almaden volume_B\n\nVirtual Disk to Host map, id [0], successfully created\n\nIBM_Storwize:ITSO:superuser>mkvdiskhostmap -host Almaden volume_C\n\nVirtual Disk to Host map, id [1], successfully created\n\nExample 7-22 shows the output of the **lshostvdiskmap** command, which shows that the\n\nvolumes are mapped to the host.\n\n*Example 7-22 The lshostvdiskmap -delim command*\n\nIBM_2145:ITSO_CLUSTER:superuser>lshostvdiskmap -delim :\n\nid:name:SCSI_id:vdisk_id:vdisk_name:vdisk_UID\n\n2:Almaden:0:26:volume_B:6005076801AF813F1000000000000020\n\n2:Almaden:1:27:volume_C:6005076801AF813F1000000000000021\n\nCertain HBA device drivers stop when they find a gap in the sequence of SCSI LUN IDs, as\n\nshown in the following examples:\n\n� Volume 1 is mapped to Host 1 with SCSI LUN ID 1.\n\n� Volume 2 is mapped to Host 1 with SCSI LUN ID 2.\n\n� Volume 3 is mapped to Host 1 with SCSI LUN ID 4.\n\nWhen the device driver scans the HBA, it might stop after discovering volumes 1 and 2\n\nbecause no SCSI LUN is mapped with ID 3.\n\nIf you are using host clusters, use the **mkvolumehostclustermap** command to map a volume to\n\na host cluster instead (see Example 7-23).\n\n*Example 7-23 The mkvolumehostclustermap command*\n\nBM_Storwize:ITSO:superuser>mkvolumehostclustermap -hostcluster vmware_cluster\n\nUNCOMPRESSED_VOL\n\nVolume to Host Cluster map, id [0], successfully created\n\n**Assigning a specific LUN ID to a volume:** The optional **-scsi scsi_lun_id** parameter\n\ncan help assign a specific LUN ID to a volume that is to be associated with a host. The\n\ndefault (if nothing is specified) is to assign the next available ID based on current volume\n\nmapped to the host.\n\n**Important:** Ensure that the SCSI LUN ID allocation is contiguous.", - "page_start": 327, - "page_end": 327, - "source_file": "sg247938.pdf" - }, - { - "text": "**raising, supporting and hindering factors to initiate preventive activities** , <sup>476</sup> the impact of guidance\n\nand instructions for workers, training and education of OSH professionals, including concrete regulations\n\nof their functions and responsibilities in enterprises, their dependencies and relations to the\n\nmanagement and to workers, and the role of legislation and state-based systems for prevention in\n\nenterprises, or the quality of risk reduction measures.\n\n**Research on the societal, economic and legal frame and context**", - "page_start": 134, - "page_end": 134, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**23**\n\nIPSL-CM5A-LR GFDL-ESM2M\n\nIPSL-CM5A-MR\n\n0\n\n%\n\n5 - 5 - 10 - 15 - 20 10 15 20\n\nensemble mean\n\nMIROC-ESM-CHEM ACCESS1-0\n\nHadGEM2-ES\n\n**Figure20.** Differencebetween2 ° Cand1.5 ° Cglobalwarminginpercentagechangesinmean(top)run-offinJULESsimulations\n\ndrivenbytheensembleofHadGEM3simulations.Notethattheuseofpercentagechangesemphasizeschangesinregionswhere\n\nthe baseline streamflow is small.\n\nThe largest regional differences between 2°C and 1.5°C global warming tend to be in the\n\nregions where the local impact is largest relative to the baseline. For TXx this is generally the mid-\n\nlatitudes, whereas for TX90p it is generally the tropics. So, broadly, the impacts at 1.5°C global\n\nwarming could be estimated by scaling-back the impacts at 2°C.\n\nThese results show some similarities with those from the CMIP5 models [ 9 , 38 ], but also some\n\nnotable differences. The CMIP5 models were at lower spatial resolution than the models used\n\nhere. Although the general patterns of change in TXx are broadly similar in our study and\n\nCMIP5, with greater warming in many continental interiors, is notable that our results show more\n\nmarked geographical variation than those from CMIP5 projections ([ 9 ], among others), with the\n\ncontinental interior warming being more intense in our projections. In particular, our results with\n\nHadGEM3 show more intense increases in maximum temperature in North America and Europe.\n\nOur projections of changes in consecutive dry days (CDD) broadly consistent with those found\n\nin a subset of the CMIP5 ensemble [ 9 ], although there are some differences. Our ensemble mean\n\nsuggests shorter dry spells in the central Amazon, whereas ISIMIP-indicated longer dry spells.\n\nAlso, as with the temperature indices, our results show greater geographical differentiation in the\n\nintensity of changes.\n\nThe decrease in Rx5day in some regions in our simulations contrasts with the subset of\n\nCMIP5 models used for the ISIMIP Fast-Track projections [ 9 ] which suggested an increase in\n\nRx5day almost everywhere where at least 66% of the model ensemble agreed on the sign of the\n\nchange, including all of northern South America. The reasons for these differences require further\n\ninvestigation, but some insight into possible reasons may be gained by examining the similarities\n\nand differences between our own individual ensemble members.\n\nFor all the CLIMPAct variables, the variations in global means between the ensemble members\n\nwere consistent at 1.5°C and 2°C. That is, the members with the largest changes at 2°C also showed\n\nthe largest changes at 1.5°C, and the same was true for the smallest changes, and the relative\n\nproportions of changes in other ensemble members. This suggests that variations between the\n\nensemble members at any particular GWL were not merely a consequence of internal variability", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed11.pdf" - }, - { - "text": "MassiveScenarioClassification MassiveIntentClassification MasakhaNEWSClassification MTOPIntentClassification MTOPDomainClassification AmazonReviewsClassification MasakhaNEWSClusteringS2S MasakhaNEWSClusteringP2P MLSUMClusteringS2S MLSUMClusteringP2P HALClusteringS2S AlloProfClusteringS2S AlloProfClusteringP2P PawsX OpusparcusPC SyntecReranking AlloprofReranking SyntecRetrieval BSARDRetrieval AlloprofRetrieval STSBenchmarkMultilingualSTS STS22 SICKFr SummEvalFr\n\nMassiveScenarioClassification\n\nMassiveIntentClassification\n\nMasakhaNEWSClassification\n\nMTOPIntentClassification\n\nMTOPDomainClassification\n\nAmazonReviewsClassification\n\nMasakhaNEWSClusteringS2S\n\nMasakhaNEWSClusteringP2P\n\nMLSUMClusteringS2S\n\nMLSUMClusteringP2P\n\nHALClusteringS2S\n\nAlloProfClusteringS2S\n\nAlloProfClusteringP2P\n\nPawsX\n\nOpusparcusPC\n\nSyntecReranking\n\nAlloprofReranking\n\nSyntecRetrieval\n\nBSARDRetrieval\n\nAlloprofRetrieval\n\nSTSBenchmarkMultilingualSTS\n\nSTS22\n\nSICKFr\n\nSummEvalFr\n\nDataset Correlation Heatmap (Spearman)\n\n0.2\n\n0.3\n\n0.4\n\n0.5\n\n0.6\n\n0.7\n\n0.8\n\n0.9\n\n1.0\n\nFigure 12: Heatmap representing the correlation regarding model performance across tasks.", - "page_start": 18, - "page_end": 18, - "source_file": "arxiv4.pdf" - }, - { - "text": "less environmentally critical processes (see for example, the principles of ‘green engineering’, like\n\nprevention instead of treatment of waste <sup>288</sup> ).\n\n**Chemical technologies have ousted traditional materials and processes.** The United Nations’\n\n(UNEP) ‘Global Chemical Outlook’ <sup>289</sup> documents a strong growth of chemical production between 1970\n\nand 2010. The value of the global chemical production grew from US$171 billion in 1970, to\n\napproximately US$ 5.7 trillion in 2019, roughly 33 times more. <sup>290</sup> The EU had a share of $1.3 trillion or\n\nabout 20% of the global value. In less than two decades between 2000 and 2017, the capacity doubled\n\nand grew from 1,186 million tons to 2,276 million tons. <sup>291,292</sup>\n\nThe reasons for this strong growth are: a) the **replacement of traditional materials** (wood, stone, iron\n\nand other metals, paper, natural fibres) by chemically based products (foremost plastics and multi-\n\nmaterial products); b) **the replacement of traditional technologies by chemical processes** (e.g.\n\ngluing instead of screwing of connections in metal, two-component paints); c) the development of **new**\n\n**products** (e.g. electronic devices, new types of batteries, nano); and d) **new applications** (e.g. specific\n\nfertilisers and pesticides).\n\nApproximately 300 million tons of synthetic chemicals were consumed in the EU in 2019, 223 million\n\ntons, or 74%, were regarded as hazardous to health.\n\n**Table 29: Production and consumption of chemicals by hazard class in the EU in 2019 - Eurostat <sup>293</sup>**\n\nAccording to the detailed register data of the Swedish Chemicals Agency, 10 million tonnes of synthetic\n\nchemicals were used in Sweden in 2019 that were classified as hazardous to health and the environment\n\n(not counting petrol). That equals approximately 1 ton per citizen of such chemicals. <sup>294</sup>\n\nThe ESENER 2019 survey provides information about **sectors that reported a particularly high**\n\n**prevalence of dangerous substances** . The percentage of enterprises reporting handling or exposure\n\nto chemicals are: 50% in ‘Manufacturing’, 49% in ‘Construction, waste management, and water and\n\nelectricity supply’, and 47% in ‘Human health and social work activities’. <sup>295</sup>\n\nThe prevention of risks from the use of chemicals at workplaces is done according to extensive\n\nregulatory frameworks. The most relevant pieces of legislation at the EU level are the OSH Framework\n\nDirective, the Chemical Agents Directive, and the Carcinogens and Mutagens Directive. Legislation in\n\nother policy areas contributes to the reduction of risks from dangerous substances in workplaces, such\n\nas EU legislation on chemical substances and mixtures (CLP, the regulation on classification, labelling\n\nand packaging of chemicals, its predecessor directive was already issued in 1967; REACH the\n\n[regulation on Registration, Evaluation, Authorisation and Restriction of Chemicals from 2007; and also ](https://en.wikipedia.org/wiki/Registration,_Evaluation,_Authorisation_and_Restriction_of_Chemicals)\n\nspecific EU and international legislation on specific aspects such as chemicals in waste, storage and\n\ntransport, in specific products like batteries and cars, in specific sectors like agriculture, in natural\n\nenvironments like in water and soil, and in consumer products like food, detergents and cosmetics).", - "page_start": 106, - "page_end": 106, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "news1.pdf", - "query": "What are some example of uses AI by the US departement of energy ?", - "target_page": 1, - "target_passage": "The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Arts and Entertainment](https://about.newsusa.com/taxonomy/term/78) / New Artificial Intelligence Summit Series Begins With Energy\n\n## New Artificial Intelligence Summit Series Begins With\n\n## Energy\n\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain\n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative\n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit\n\nSeries.\n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington,\n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and\n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant\n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote\n\npartnerships between AI and energy stakeholders.\n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy\n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in\n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced\n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research.\n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy,\n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and\n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American\n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts.\n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan.\n\nArticle Link\n\n[https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…](https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with-energy)\n\n[ARTS AND ENTERTAINMENT](https://about.newsusa.com/taxonomy/term/78)\n\n07/31/2024\n\n[Celebrate St. Patrick's Day with](https://about.newsusa.com/celebrate-st-patricks-day-with-no-booze-just-pure-irish-fun-and-entertainment)\n\nNo Booze, Just Pure Irish Fun and\n\nEntertainment\n\nMar 06, 2024\n\nSay Hello to Your Big Break at the\n\nStapleton Library Job Fair in\n\n[Vocation, Trade, or Civil Service](https://about.newsusa.com/say-hello-to-your-big-break-at-the-stapleton-library-job-fair-in-vocation-trade-or-civil-service)\n\nMar 06, 2024\n\nLocal Artists Collaborate for a\n\n[Unique Fusion of Groove and](https://about.newsusa.com/local-artists-collaborate-for-a-unique-fusion-of-groove-and-collage)\n\nCollage\n\nMar 06, 2024\n\n[Explore Downtown San Pedro](https://about.newsusa.com/explore-downtown-san-pedro-with-flair-ride-the-iconic-red-car-trolley-for-free)\n\nwith Flair: Ride the Iconic Red Car\n\nTrolley for Free\n\nMar 06, 2024\n\nRetrain Your Emotional Brain: A\n\n[Natural Alternative to Weight](https://about.newsusa.com/retrain-your-emotional-brain-a-natural-alternative-to-weight-loss-drugs)\n\nLoss Drugs\n\nFeb 22, 2024\n\nSerial Entrepreneur Teaches Us\n\n[How to Go the Distance in](https://about.newsusa.com/serial-entrepreneur-teaches-us-how-to-go-the-distance-in-business-and-in-life)\n\nBusiness and in Life\n\nFeb 21, 2024\n\n[FASHION](https://about.newsusa.com/taxonomy/term/1)\n\n[BUSINESS](https://about.newsusa.com/taxonomy/term/2)\n\n[INFOGRAPHIC](https://about.newsusa.com/taxonomy/term/16)\n\n[ENVIRONMENT](https://about.newsusa.com/taxonomy/term/17)\n\n[HEALTH](https://about.newsusa.com/taxonomy/term/18)", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "[Vincent van Gogh in watercolour](https://en.wikipedia.org/wiki/Vincent_van_Gogh)\n\ncreated by generative AI software\n\nArtificial intelligent (AI) agents are software entities designed to\n\nperceive their environment, make decisions, and take actions\n\nautonomously to achieve specific goals. These agents can interact\n\nwith users, their environment, or other agents. AI agents are used\n\n[in various applications, including virtual assistants, chatbots,](https://en.wikipedia.org/wiki/Chatbots)\n\n[autonomous vehicles, game-playing systems, and industrial](https://en.wikipedia.org/wiki/Industrial_robotics)\n\n[robotics. AI agents operate within the constraints of their](https://en.wikipedia.org/wiki/Industrial_robotics)\n\nprogramming, available computational resources, and hardware\n\nlimitations. This means they are restricted to performing tasks\n\nwithin their defined scope and have finite memory and processing\n\ncapabilities. In real-world applications, AI agents often face time\n\nconstraints for decision-making and action execution. Many AI\n\nagents incorporate learning algorithms, enabling them to improve\n\ntheir performance over time through experience or training. Using\n\nmachine learning, AI agents can adapt to new situations and\n\noptimise their behaviour for their designated tasks. <sup>[175][176][177]</sup>\n\nThere are also thousands of successful AI applications used to solve specific problems for specific\n\nindustries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in\n\nsome offerings or processes. <sup>[178]</sup> [ A few examples are energy storage, medical diagnosis, military](https://en.wikipedia.org/wiki/Energy_storage)\n\n[logistics, applications that predict the result of judicial decisions, foreign policy, or supply chain](https://en.wikipedia.org/wiki/Foreign_policy)\n\nmanagement.\n\n[AI applications for evacuation and disaster management are growing. AI has been used to investigate if](https://en.wikipedia.org/wiki/Disaster)\n\nand how people evacuated in large scale and small scale evacuations using historical data from GPS,\n\nvideos or social media. Further, AI can provide real time information on the real time evacuation\n\nconditions. <sup>[179][180][181]</sup>\n\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments\n\nor increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict\n\nthe ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct\n\n[predictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests,](https://en.wikipedia.org/wiki/Predictive_analytics)\n\nand save water.\n\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and\n\napplications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the\n\ndevelopment of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting\n\nsolar activity, and distinguishing between signals and instrumental effects in gravitational wave\n\nastronomy. Additionally, it could be used for activities in space, such as space exploration, including the\n\nanalysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance,\n\nand more autonomous operation.\n\n#### **Other industry-specific tasks**", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "160. Alex McFarland: *[7 Best AI for Math Tools.](https://www.unite.ai/best-ai-for-math-tools/)* (https://www.unite.ai/best-ai-for-math-tools/)\n\n[Archived (https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-mat](https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-math-tools/)\n\n[h-tools/) 11 September 2024 at the Wayback Machine unite.ai. Retrieved 2024-08-07](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n161. Matthew Finio & Amanda Downie: IBM Think 2024 Primer, \"What is Artificial Intelligence (AI)\n\nin Finance?\" 8 Dec. 2023\n\n162. M. Nicolas, J. Firzli: Pensions Age/European Pensions magazine, \"Artificial Intelligence: Ask\n\n[the Industry\" May June 2024 https://videovoice.org/ai-in-finance-innovation-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[intended/ Archived (https://web.archive.org/web/20240911125502/https://videovoice.org/ai-i](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[n-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[act-wont-work-as-intended/) 11 September 2024 at the Wayback Machine.](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n163. Congressional Research Service (2019). *[Artificial Intelligence and National Security](https://fas.org/sgp/crs/natsec/R45178.pdf)* (https://f\n\n[as.org/sgp/crs/natsec/R45178.pdf) (PDF). Washington, DC: Congressional Research](https://fas.org/sgp/crs/natsec/R45178.pdf)\n\n[Service.PD-notice](https://en.wikipedia.org/wiki/Template:PD-notice)\n\n164. Slyusar, Vadym (2019). Artificial intelligence as the basis of future control networks\n\n[(Preprint). doi:10.13140/RG.2.2.30247.50087 (https://doi.org/10.13140%2FRG.2.2.30247.5](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[0087).](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[165. Iraqi, Amjad (3 April 2024). \" 'Lavender': The AI machine directing Israel's bombing spree in](https://www.972mag.com/lavender-ai-israeli-army-gaza/)\n\n[Gaza\" (https://www.972mag.com/lavender-ai-israeli-army-gaza/). ](https://www.972mag.com/lavender-ai-israeli-army-gaza/) *+972 Magazine* . Retrieved\n\n6 April 2024.\n\n[166. Davies, Harry; McKernan, Bethan; Sabbagh, Dan (1 December 2023). \" 'The Gospel': how](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[Israel uses AI to select bombing targets in Gaza\" (https://www.theguardian.com/world/2023/](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets). ](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets) *The Guardian* . Retrieved\n\n4 December 2023.\n\n[167. Marti, J Werner (10 August 2024). \"Drohnen haben den Krieg in der Ukraine revolutioniert,](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)\n\n[doch sie sind empfindlich auf Störsender - deshalb sollen sie jetzt autonom operieren\" (http](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Franzen) sued AI companies for using their work to train generative AI.](https://en.wikipedia.org/wiki/Jonathan_Franzen) <sup>[195][196]</sup> Another discussed\n\napproach is to envision a separate *[sui generis](https://en.wikipedia.org/wiki/Sui_generis)* system of protection for creations generated by AI to ensure\n\nfair attribution and compensation for human authors. <sup>[197]</sup>\n\n[The commercial AI scene is dominated by Big Tech companies such as Alphabet Inc., Amazon, Apple](https://en.wikipedia.org/wiki/Apple_Inc.)\n\n[Inc., Meta Platforms, and Microsoft.](https://en.wikipedia.org/wiki/Microsoft) <sup>[198][199][200]</sup> Some of these players already own the vast majority of\n\n[existing cloud infrastructure and computing power from data centers, allowing them to entrench further in](https://en.wikipedia.org/wiki/Data_center)\n\nthe marketplace. <sup>[201][202]</sup>\n\n[In January 2024, the International Energy Agency (IEA) released ](https://en.wikipedia.org/wiki/International_Energy_Agency) *Electricity 2024, Analysis and Forecast*\n\n*to 2026* , forecasting electric power use. <sup>[203]</sup> This is the first IEA report to make projections for data\n\ncenters and power consumption for artificial intelligence and cryptocurrency. The report states that power\n\ndemand for these uses might double by 2026, with additional electric power usage equal to electricity\n\nused by the whole Japanese nation. <sup>[204]</sup>\n\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay\n\nclosings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of\n\ndata centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon)\n\ninto voracious consumers of electric power. Projected electric consumption is so immense that there is\n\nconcern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the\n\nelectrical energy as a Google search. The large firms are in haste to find power sources - from nuclear\n\nenergy to geothermal to fusion. The tech firms argue that - in the long view - AI will be eventually\n\nkinder to the environment, but they need the energy now. AI makes the power grid more efficient and\n\n\"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to\n\ntechnology firms. <sup>[205]</sup>\n\n[A 2024 Goldman Sachs Research Paper, ](https://en.wikipedia.org/wiki/Goldman_Sachs) *AI Data Centers and the Coming US Power Demand Surge* ,\n\nfound \"US power demand (is) likely to experience growth not seen in a generation....\" and forecasts that,\n\nby 2030, US data centers will consume 8% of US power, as opposed to 3% in 2022, presaging growth for\n\nthe electrical power generation industry by a variety of means. <sup>[206]</sup> Data centers' need for more and more\n\nelectrical power is such that they might max out the electrical grid. The Big Tech companies counter that\n\nAI can be used to maximize the utilization of the grid by all. <sup>[207]</sup>\n\nIn 2024, the *Wall Street Journal* reported that big AI companies have begun negotiations with the US\n\nnuclear power providers to provide electricity to the data centers. In March 2024 Amazon purchased a\n\nPennsylvania nuclear-powered data center for $650 Million (US). <sup>[208]</sup> [ Nvidia CEO Jen-Hsun Huang said](https://en.wikipedia.org/wiki/Jen-Hsun_Huang)\n\nnuclear power is a good option for the data centers. <sup>[209]</sup>\n\n[In September 2024, Microsoft announced an agreement with Constellation Energy to re-open the Three](https://en.wikipedia.org/wiki/Three_Mile_Island)\n\n[Mile Island nuclear power plant to provide Microsoft with 100% of all electric power produced by the](https://en.wikipedia.org/wiki/Three_Mile_Island)\n\nplant for 20 years. Reopening the plant, which suffered a partial nuclear meltdown of its Unit 2 reactor in", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[nce/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surg](https://www.goldmansachs.com/intelligence/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf)\n\n[e/report.pdf) (PDF) on 26 July 2024. Retrieved 5 October 2024.](https://www.goldmansachs.com/intelligence/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf)\n\n[207. Ryan, Carol (12 April 2024). \"Energy-Guzzling AI Is Also the Future of Energy Savings\" (http](https://www.wsj.com/business/energy-oil/ai-data-centers-energy-savings-d602296e)\n\n[s://www.wsj.com/business/energy-oil/ai-data-centers-energy-savings-d602296e). ](https://www.wsj.com/business/energy-oil/ai-data-centers-energy-savings-d602296e) *Wall Street*\n\n*Journal* . Dow Jones.\n\n[208. Hiller, Jennifer (1 July 2024). \"Tech Industry Wants to Lock Up Nuclear Power for AI\" (https://](https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n[www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb7](https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n[5316?mod=djem10point). ](https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point) *Wall Street Journal* [. Dow Jones. Archived (https://web.archive.or](https://web.archive.org/web/20241005165650/https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n[g/web/20241005165650/https://www.wsj.com/business/energy-oil/tech-industry-wants-to-loc](https://web.archive.org/web/20241005165650/https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n[k-up-nuclear-power-for-ai-6cb75316?mod=djem10point) from the original on 5 October](https://web.archive.org/web/20241005165650/https://www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb75316?mod=djem10point)\n\n2024. Retrieved 5 October 2024.\n\n[209. Kendall, Tyler (28 September 2024). \"Nvidia's Huang Says Nuclear Power an Option to](https://www.bloomberg.com/news/articles/2024-09-27/nvidia-s-huang-says-nuclear-power-an-option-to-feed-data-centers)\n\n[Feed Data Centers\" (https://www.bloomberg.com/news/articles/2024-09-27/nvidia-s-huang-s](https://www.bloomberg.com/news/articles/2024-09-27/nvidia-s-huang-says-nuclear-power-an-option-to-feed-data-centers)\n\n[ays-nuclear-power-an-option-to-feed-data-centers). ](https://www.bloomberg.com/news/articles/2024-09-27/nvidia-s-huang-says-nuclear-power-an-option-to-feed-data-centers) *Bloomberg* .\n\n[210. Halper, Evan (20 September 2024). \"Microsoft deal would reopen Three Mile Island nuclear](https://www.washingtonpost.com/business/2024/09/20/microsoft-three-mile-island-nuclear-constellation)\n\n[plant to power AI\" (https://www.washingtonpost.com/business/2024/09/20/microsoft-three-mi](https://www.washingtonpost.com/business/2024/09/20/microsoft-three-mile-island-nuclear-constellation)\n\n[le-island-nuclear-constellation). ](https://www.washingtonpost.com/business/2024/09/20/microsoft-three-mile-island-nuclear-constellation) *Washington Post* .", - "page_start": 41, - "page_end": 41, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[The first global AI Safety Summit was held](https://en.wikipedia.org/wiki/AI_Safety_Summit)\n\nin 2023 with a declaration calling for\n\ninternational cooperation.\n\nPromotion of the wellbeing of the people and communities that these technologies affect requires\n\nconsideration of the social and ethical implications at all stages of AI system design, development and\n\nimplementation, and collaboration between job roles such as data scientists, product managers, data\n\nengineers, domain experts, and delivery managers. <sup>[300]</sup>\n\n[The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations](https://en.wikipedia.org/wiki/AI_Safety_Institute_(United_Kingdom))\n\navailable under a MIT open-source licence which is freely available on GitHub and can be improved with\n\nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge,\n\nability to reason, and autonomous capabilities. <sup>[301]</sup>\n\nThe regulation of artificial intelligence is the development\n\nof public sector policies and laws for promoting and\n\nregulating AI; it is therefore related to the broader regulation\n\nof algorithms. <sup>[302]</sup> The regulatory and policy landscape for\n\nAI is an emerging issue in jurisdictions globally. <sup>[303]</sup>\n\n[According to AI Index at Stanford, the annual number of](https://en.wikipedia.org/wiki/Stanford)\n\nAI-related laws passed in the 127 survey countries jumped\n\nfrom one passed in 2016 to 37 passed in 2022\n\nalone. <sup>[304][305]</sup> Between 2016 and 2020, more than 30\n\ncountries adopted dedicated strategies for AI. <sup>[306]</sup> Most EU\n\nmember states had released national AI strategies, as had\n\nCanada, China, India, Japan, Mauritius, the Russian\n\nFederation, Saudi Arabia, United Arab Emirates, U.S., and\n\nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia\n\nand Tunisia. <sup>[306]</sup> [ The Global Partnership on Artificial Intelligence was launched in June 2020, stating a](https://en.wikipedia.org/wiki/Global_Partnership_on_Artificial_Intelligence)\n\nneed for AI to be developed in accordance with human rights and democratic values, to ensure public\n\nconfidence and trust in the technology. <sup>[306]</sup> [ Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher](https://en.wikipedia.org/wiki/Daniel_Huttenlocher)\n\npublished a joint statement in November 2021 calling for a government commission to regulate AI. <sup>[307]</sup>\n\nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they\n\nbelieve may happen in less than 10 years. <sup>[308]</sup> In 2023, the United Nations also launched an advisory\n\nbody to provide recommendations on AI governance; the body comprises technology company\n\nexecutives, governments officials and academics. <sup>[309]</sup> [ In 2024, the Council of Europe created the first](https://en.wikipedia.org/wiki/Council_of_Europe)\n\n[international legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence](https://en.wikipedia.org/wiki/Framework_Convention_on_Artificial_Intelligence_and_Human_Rights,_Democracy_and_the_Rule_of_Law)\n\n[and Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United](https://en.wikipedia.org/wiki/Framework_Convention_on_Artificial_Intelligence_and_Human_Rights,_Democracy_and_the_Rule_of_Law)\n\nStates, the United Kingdom, and other signatories. <sup>[310]</sup>\n\n[In a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only](https://en.wikipedia.org/wiki/Ipsos)\n\n35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\". <sup>[304]</sup>\n\n[A 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to](https://en.wikipedia.org/wiki/Reuters)", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - }, - { - "text": "## **Artificial intelligence**\n\n**Artificial intelligence** ( **AI** [), in its broadest sense, is intelligence exhibited by machines, particularly](https://en.wikipedia.org/wiki/Machine)\n\n[computer systems. It is a field of research in computer science that develops and studies methods and](https://en.wikipedia.org/wiki/Computer_science)\n\n[software that enable machines to perceive their environment and use learning and intelligence to take](https://en.wikipedia.org/wiki/Machine_learning)\n\nactions that maximize their chances of achieving defined goals. <sup>[1]</sup> Such machines may be called AIs.\n\n[High-profile applications of AI include advanced web search engines (e.g., Google Search);](https://en.wikipedia.org/wiki/Google_Search)\n\n[recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google](https://en.wikipedia.org/wiki/Google_Assistant)\n\n[Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g.,](https://en.wikipedia.org/wiki/Computational_creativity)\n\n[ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However,](https://en.wikipedia.org/wiki/Go_(game))\n\nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general\n\napplications, often without being called AI because once something becomes useful enough and common\n\n[enough it's not labeled AI anymore.\"](https://en.wikipedia.org/wiki/AI_effect) <sup>[2][3]</sup>\n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The\n\n[traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural](https://en.wikipedia.org/wiki/Natural_language_processing)\n\n[language processing, perception, and support for robotics.](https://en.wikipedia.org/wiki/Robotics) <sup>[a]</sup> [ General intelligence—the ability to complete](https://en.wikipedia.org/wiki/Artificial_general_intelligence)\n\nany task performed by a human on an at least equal level—is among the field's long-term goals. <sup>[4]</sup> To\n\nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including\n\n[search and mathematical optimization, formal logic, artificial neural networks, and methods based on](https://en.wikipedia.org/wiki/Artificial_neural_network)\n\n[statistics, operations research, and economics.](https://en.wikipedia.org/wiki/Economics) <sup>[b]</sup> [ AI also draws upon psychology, linguistics, philosophy,](https://en.wikipedia.org/wiki/Philosophy_of_artificial_intelligence)\n\n[neuroscience, and other fields.](https://en.wikipedia.org/wiki/Neuroscience) <sup>[5]</sup>\n\nArtificial intelligence was founded as an academic discipline in 1956, <sup>[6]</sup> and the field went through\n\n[multiple cycles of optimism throughout its history,](https://en.wikipedia.org/wiki/History_of_artificial_intelligence) <sup>[7][8]</sup> followed by periods of disappointment and loss of\n\n[funding, known as AI winters.](https://en.wikipedia.org/wiki/AI_winter) <sup>[9][10]</sup> [ Funding and interest vastly increased after 2012 when deep learning](https://en.wikipedia.org/wiki/Deep_learning)\n\noutperformed previous AI techniques. <sup>[11]</sup> [ This growth accelerated further after 2017 with the transformer](https://en.wikipedia.org/wiki/Transformer_architecture)\n\n[architecture,](https://en.wikipedia.org/wiki/Transformer_architecture) <sup>[12]</sup> and by the early 2020s many billions of dollars were being invested in AI and the field\n\n[experienced rapid ongoing progress in what has become known as the AI boom. The emergence of](https://en.wikipedia.org/wiki/AI_boom)\n\nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed\n\n[several unintended consequences and harms in the present and raised concerns about the risks of AI and](https://en.wikipedia.org/wiki/AI_risk)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[s.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-2](https://www.reuters.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-21)\n\n[1). Reuters. 21 May 2024. Retrieved 23 May 2024.](https://www.reuters.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-21)\n\n[318. \"Frontier AI Safety Commitments, AI Seoul Summit 2024\" (https://web.archive.org/web/2024](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[0523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024). gov.uk. 21 May](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[2024. Archived from the original (https://www.gov.uk/government/publications/frontier-ai-safe](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[ty-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-202](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[4) on 23 May 2024. Retrieved 23 May 2024.](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n319. Russell & Norvig 2021, p. 9.\n\n320. Copeland, J., ed. (2004). *The Essential Turing: the ideas that gave birth to the computer*\n\n*age* [. Oxford, England: Clarendon Press. ISBN 0-1982-5079-7.](https://en.wikipedia.org/wiki/Special:BookSources/0-1982-5079-7)\n\n[321. \"Google books ngram\" (https://books.google.com/ngrams/graph?content=electronic+brain&](https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[year_start=1930&year_end=2019&corpus=en-2019&smoothing=3). Archived (https://web.ar](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[chive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3) from the original](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\non 5 October 2024. Retrieved 5 October 2024.\n\n322. AI's immediate precursors: McCorduck (2004, pp. 51- 107), Crevier (1993, pp. 27- 32),\n\nRussell & Norvig (2021, pp. 8- 17), Moravec (1988, p. 3)\n\n[323. Turing's original publication of the Turing test in \"Computing machinery and intelligence\":](https://en.wikipedia.org/wiki/Computing_machinery_and_intelligence)\n\nTuring (1950) Historical influence and philosophical implications: Haugeland (1985, pp. 6-\n\n9), Crevier (1993, p. 24), McCorduck (2004, pp. 70- 71), Russell & Norvig (2021, pp. 2, 984)\n\n324. Crevier (1993), pp. 47- 49.\n\n325. Russell & Norvig (2003), p. 17.\n\n326. Russell & Norvig (2003), p. 18.\n\n327. Newquist (1994), pp. 86- 86.\n\n328. Simon (1965, p. 96) quoted in Crevier (1993, p. 109)\n\n329. Minsky (1967, p. 2) quoted in Crevier (1993, p. 109)\n\n330. Russell & Norvig (2021), p. 21.\n\n331. Lighthill (1973).", - "page_start": 47, - "page_end": 47, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[ml) from the original on 5 October 2024. Retrieved 5 October 2024.](https://web.archive.org/web/20241005170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/html)\n\n[301. \"AI Safety Institute releases new AI safety evaluations platform\" (https://www.gov.uk/govern](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[ment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform). UK Government.](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[10 May 2024. Archived (https://web.archive.org/web/20241005170207/https://www.gov.uk/g](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[overnment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform) from the](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\noriginal on 5 October 2024. Retrieved 14 May 2024.\n\n302. Regulation of AI to mitigate risks: Berryhill et al. (2019), Barfield & Pagallo (2018), Iphofen &\n\nKritikos (2019), Wirtz, Weyerer & Geyer (2018), Buiten (2019)\n\n303. Law Library of Congress (U.S.). Global Legal Research Directorate (2019).\n\n304. Vincent (2023).\n\n305. Stanford University (2023).\n\n306. UNESCO (2021).\n\n307. Kissinger (2021).\n\n308. Altman, Brockman & Sutskever (2023).\n\n[309. VOA News (25 October 2023). \"UN Announces Advisory Body on Artificial Intelligence\" (http](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[s://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.htm](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[l). Archived (https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-a](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[nnounces-advisory-body-on-artificial-intelligence-/7328732.html) from the original on 18](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\nSeptember 2024. Retrieved 5 October 2024.\n\n[310. \"Council of Europe opens first ever global treaty on AI for signature\" (https://www.coe.int/en/](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature). ](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature) *Council of*\n\n*Europe* [. 5 September 2024. Archived (https://web.archive.org/web/20240917001330/https://](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signat](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[ure) from the original on 17 September 2024. Retrieved 17 September 2024.](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n311. Edwards (2023).\n\n312. Kasperowicz (2023).\n\n313. Fox News (2023).", - "page_start": 46, - "page_end": 46, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Some authors have suggested in practice, that the definition of AI is vague and difficult to define, with\n\ncontention as to whether classical algorithms should be categorised as AI, <sup>[367]</sup> with many companies\n\n[during the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not](https://en.wikipedia.org/wiki/Buzzword)\n\nactually use AI in a material way\". <sup>[368]</sup>\n\n[No established unifying theory or paradigm has guided AI research for most of its history.](https://en.wikipedia.org/wiki/Paradigm) <sup>[aa]</sup> The\n\nunprecedented success of statistical machine learning in the 2010s eclipsed all other approaches (so much\n\nso that some sources, especially in the business world, use the term \"artificial intelligence\" to mean\n\n[\"machine learning with neural networks\"). This approach is mostly sub-symbolic, soft and narrow. Critics](https://en.wikipedia.org/wiki/Artificial_general_intelligence)\n\nargue that these questions may have to be revisited by future generations of AI researchers.\n\n[Symbolic AI (or \"GOFAI\")](https://en.wikipedia.org/wiki/GOFAI) <sup>[370]</sup> simulated the high-level conscious reasoning that people use when they\n\nsolve puzzles, express legal reasoning and do mathematics. They were highly successful at \"intelligent\"\n\n[tasks such as algebra or IQ tests. In the 1960s, Newell and Simon proposed the physical symbol systems](https://en.wikipedia.org/wiki/Physical_symbol_systems_hypothesis)\n\n[hypothesis: \"A physical symbol system has the necessary and sufficient means of general intelligent](https://en.wikipedia.org/wiki/Physical_symbol_systems_hypothesis)\n\naction.\" <sup>[371]</sup>\n\nHowever, the symbolic approach failed on many tasks that humans solve easily, such as learning,\n\n[recognizing an object or commonsense reasoning. Moravec's paradox is the discovery that high-level](https://en.wikipedia.org/wiki/Moravec%27s_paradox)\n\n\"intelligent\" tasks were easy for AI, but low level \"instinctive\" tasks were extremely difficult. <sup>[372]</sup>\n\n[Philosopher Hubert Dreyfus had argued since the 1960s that human expertise depends on unconscious](https://en.wikipedia.org/wiki/Dreyfus%27_critique_of_AI)\n\ninstinct rather than conscious symbol manipulation, and on having a \"feel\" for the situation, rather than\n\nexplicit symbolic knowledge. <sup>[373]</sup> Although his arguments had been ridiculed and ignored when they\n\nwere first presented, eventually, AI research came to agree with him. <sup>[ab][16]</sup>\n\n[The issue is not resolved: sub-symbolic reasoning can make many of the same inscrutable mistakes that](https://en.wikipedia.org/wiki/Sub-symbolic)\n\n[human intuition does, such as algorithmic bias. Critics such as Noam Chomsky argue continuing research](https://en.wikipedia.org/wiki/Noam_Chomsky)\n\ninto symbolic AI will still be necessary to attain general intelligence, <sup>[375][376]</sup> in part because sub-\n\n[symbolic AI is a move away from explainable AI: it can be difficult or impossible to understand why a](https://en.wikipedia.org/wiki/Explainable_AI)\n\n[modern statistical AI program made a particular decision. The emerging field of neuro-symbolic artificial](https://en.wikipedia.org/wiki/Neuro-symbolic_AI)\n\n[intelligence attempts to bridge the two approaches.](https://en.wikipedia.org/wiki/Neuro-symbolic_AI)\n\n[\"Neats\" hope that intelligent behavior is described using simple, elegant principles (such as logic,](https://en.wikipedia.org/wiki/Logic)\n\n[optimization, or neural networks). \"Scruffies\" expect that it necessarily requires solving a large number of](https://en.wikipedia.org/wiki/Artificial_neural_network)\n\nunrelated problems. Neats defend their programs with theoretical rigor, scruffies rely mainly on\n\nincremental testing to see if they work. This issue was actively discussed in the 1970s and 1980s, <sup>[377]</sup> but\n\neventually was seen as irrelevant. Modern AI has elements of both.\n\n#### **Evaluating approaches to AI**", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HNI_2003.pdf", - "query": "How can I contact Investor Relations of HON industries through email ?", - "target_page": 63, - "target_passage": "E-mail: investorrelations@honi.com", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "H ON I NDUST R I ES I n c. a n d SUB SI DI A R I ES\n\n63\n\nDESI GN: SEQUEL ST UDI O, NEW YOR K\n\n**S CHED UL E O F Q UARTERLY**\n\n**RES ULTS**\n\nThe Company operates on a fiscal year ending\n\non the Saturday nearest December 31. Quar-\n\nterly results are typically announced within 25\n\ndays after the end of each quarter, and audited\n\nresults are typically announced within 40 days\n\nafter year-end.\n\n**FI S CAL 2004**\n\n**Q UARTER- END D ATES**\n\n1st Quarter: Saturday, April 3\n\n2nd Quarter: Saturday, July 3\n\n3rd Quarter: Saturday, October 2\n\n4th Quarter: Saturday, January 1\n\n**ANNUAL MEETI NG**\n\nThe Company’s annual shareholders’ meeting\n\nwill be held at 10:30 a.m. on May 4, 2004, at\n\nthe Holiday Inn, Highways 61 & 38 North,\n\nMuscatine, Iowa. Shareholders and other\n\ninterested investors are encouraged to attend\n\nthe meeting.\n\n**I NVES TO R REL ATI O NS**\n\nSend inquiries to:\n\nInvestor Relations\n\nHON INDUSTRIES Inc.\n\n414 East Third Street\n\nMuscatine, IA 52761\n\nTelephone: 563.264.7400\n\nFax: 563.264.7655\n\nE-mail: investorrelations@honi.com\n\n**CO RPO RATE HEAD Q UARTERS**\n\nHON INDUSTRIES Inc.\n\n414 East Third Street\n\nP.O. Box 1109\n\nMuscatine, IA 52761-0071\n\nTelephone: 563.264.7400\n\nFax: 563.264.7217\n\nWebsite: www.honi.com\n\n**I ND EPEND ENT PUBLI C**\n\n**ACCO UNTANTS**\n\nPricewaterhouseCoopers LLP\n\nOne North Wacker Drive\n\nChicago, IL 60606\n\n**CO MMO N S TO CK**\n\nHON INDUSTRIES common stock trades\n\non the New York Stock Exchange under the\n\nsymbol: HNI. Stock price quotations can be\n\nfound in major daily newspapers and *The*\n\n*Wall Street Journal* .\n\n**TRANS FER AGENT**\n\nShareholders may report a change of address\n\nor make inquiries by writing or calling:\n\nComputershare Investor Services, LLC\n\n2 North LaSalle Street\n\nChicago, IL 60602\n\nTelephone: 312.588.4991\n\nI NVEST OR I NFOR MA T I ON\n\nStatements in this report that are not strictly historical, including statements as to\n\nplans, objectives, and future financial performance, are “forward-looking” state-\n\nments that are made pursuant to the safe harbor provisions of the Private Securities\n\nLitigation Reform Act of 1995. Forward-looking statements involve known and\n\nunknown risks, which may cause the Company’s actual results in the future to dif-\n\nfer materially from expected results. These risks include, among others:\n\n**-** competition within the office furniture and fireplace industries, including\n\ncompetition from imported products and competitive pricing;\n\n**-** increases in the cost of raw materials, including steel, which is the Company’s\n\nlargest raw material category;\n\n**-** increases in the cost of health care benefits provided by the Company;\n\n**-** reduced demand for the Company’s storage products caused by changes in\n\noffice technology; including the change from paper record storage to electronic\n\nrecord storage;\n\n**-** the effects of economic conditions, on demand for office furniture, customer\n\ninsolvencies and related bad debts and claims against the Company that it\n\nreceived preferential payments;\n\n**-** changes in demand and order patterns from the Company’s customers, par-\n\nticularly its top ten customers, which represented approximately 36% of net sales\n\nin 2003;\n\n**-** issues associated with acquisitions and integration of acquisitions;\n\n**-** the ability of the Company to realize cost savings and productivity improve-\n\nments from its cost containment and business simplification initiatives;\n\n**-** the ability of the Company to realize financial benefits from investments in new\n\nproducts;\n\n**-** the ability of the Company’s distributors and dealers to successfully market\n\nand sell the Company’s products;\n\n**-** the availability and cost of capital to finance planned growth; and\n\n**-** other risks, uncertainties, and factors described from time to time in the\n\nCompany’s filings with the Securities and Exchange Commission.\n\nWe caution the reader that the above list of factors may not be exhaustive. The", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "One Riverfront Plaza\n\nCorning, NY 14831-0001\n\n607 974 9000\n\nwww.corning.com\n\n02BR24601EN\n\nA N N U A L M E E T I N G\n\nThe annual meeting of shareholders will be held on\n\nThursday, April 24, 2003, in Corning, NY. A formal notice\n\nof the meeting together with a proxy statement will be mailed\n\nto shareholders on or about March 12, 2003. The proxy state-\n\nment can also be accessed electronically through the Investor\n\nRelations category of the Corning home page on the Internet\n\nat www.corning.com. A summary report of the proceedings\n\nat the annual meeting will be available without charge upon\n\nwritten request to Ms. Denise A. Hauselt, Secretary and\n\nAssistant General Counsel, Corning Incorporated, HQ-E2-10,\n\nCorning, NY 14831.\n\nA D D I T I O N A L I N F O R M AT I O N\n\nA copy of Corning’s 2002 Annual Report on Form 10-K filed\n\nwith the Securities and Exchange Commission is available\n\nupon written request to Ms. Denise A. Hauselt, Secretary and\n\nAssistant General Counsel, Corning Incorporated, HQ-E2-10,\n\nCorning, NY 14831. The Annual Report on Form 10-K can\n\nalso be accessed electronically through the Investor Relations\n\ncategory of the home page on the Internet at:\n\nwww.corning.com\n\nI N V E S T O R I N F O R M AT I O N\n\nInvestment analysts who need additional information may\n\ncontact Mr. Kenneth C. Sofio, Manager of Investor Relations,\n\nCorning Incorporated, HQ-E2-25, Corning, NY 14831;\n\nTelephone 607.974.9000\n\nC O M M O N S T O C K\n\nCorning Incorporated common stock is listed on the\n\nNew York Stock Exchange and the SWX Swiss Exchange.\n\nIn addition, it is traded on the Boston, Midwest, Pacific\n\nand Philadelphia stock exchanges. Common stock options\n\nare traded on the Chicago Board Options Exchange. The\n\nabbreviated ticker symbol for Corning Incorporated is “GLW.”\n\nT RANSFER A GENT AND R EGISTRAR\n\nComputershare Investor Services LLC\n\nP.O. Box A-3504\n\nChicago, IL 60690-3504\n\nTelephone: 800.255.0461\n\nWebsite: www.computershare.com\n\nC HANGE OF A DDRESS\n\nReport change of address to Computershare\n\nInvestor Services at the above address.\n\nI N D E P E N D E N T A C C O U N TA N T S\n\nPricewaterhouseCoopers LLP\n\n1301 Avenue of the Americas\n\nNew York, NY 10019\n\n“ Sa fe Ha rbor” St a t e m e nt unde r t he Pri vate\n\nSe c uri t i e s Li t i ga t i on R e form Ac t of 1995\n\nThe statements in this annual report that are not historical\n\nfacts or information are forward-looking statements. These\n\nforward-looking statements involve risks and uncertainties\n\nthat may cause the outcome to be materially different. Such\n\nrisks and uncertainties include, but are not limited to:\n\n— global economic and political conditions,\n\n— currency fluctuations,\n\n— product demand and industry capacity,\n\n— competitive products and pricing,\n\n— sufficiency of manufacturing capacity and efficiencies,\n\n— cost reductions,\n\n— availability and costs of critical materials,\n\n— new product development and commercialization,\n\n— attracting and retaining key personnel,\n\n— order activity and demand from major customers,\n\n— fluctuations in capital spending by customers\n\nin the telecommunications industry and other\n\nbusiness segments,\n\n— financial condition of customers,\n\n— changes in the mix of sales between premium\n\nand non-premium products,\n\n— facility expansions and new plant start-up costs,\n\n— adverse litigation or regulatory developments, including\n\nfuture or pending tax legislation,\n\n— adequacy and availability of insurance,\n\n— capital resource and cash flow activities,\n\n— capital spending,\n\n— equity company activities,\n\n— interest costs,\n\n— acquisition and divestiture activity,\n\n— the rate of technology change,\n\n— the ability to enforce patents,\n\n— product performance issues,\n\n— stock price fluctuations, and\n\n— other risks detailed in Corning’s SEC filings.\n\nNeither this report nor any statement contained herein is\n\nfurnished in connection with any offering of securities or for\n\nthe purpose of promoting or influencing the sale of securities.", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" - }, - { - "text": "The Company participates in emerging technologies by investing in entities that invest in start-up companies. This includes indirect participation through capital venture funds of South Atlantic Venture Fund III, South Atlantic Private Equity IV, Dolphin Communications Parallel Fund, Dolphin Communications Fund II and the Burton Partnership. The Company also participates by direct investment in privately held companies. Currently the Company’s only direct investment is in NTC Communications, a provider of voice, video and data connections to off campus housing properties at universities and colleges. For those companies that eventually make public offerings of their securities, it\n\n51 ■ 2003 ANNUAL REPORT\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 52, - "page_end": 52, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "## CORPORATE DATA\n\n**110**\n\n**FOR FURTHER INFORMATION,**\n\n**PLEASE CONTACT**\n\n**Investor Relations**\n\n**Nissan Motor Co., Ltd.**\n\nGlobal Communications, CSR and IR Division\n\n17-1, Ginza 6-chome, Chuo-ku\n\nTokyo 104-8023, Japan\n\nphone: +81(0)3-5565-2334\n\nfax: +81(0)3-3546-2669\n\ne-mail: nissan-ir@mail.nissan.co.jp\n\n**Corporate Information Website**\n\nhttp://www.nissan-global.com/\n\n**Investor Relations Website**\n\nhttp://www.nissan-global.com/EN/IR/", - "page_start": 111, - "page_end": 111, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "CAUTION REGARDING FORWARD-LOOKING INFORMATION AND OTHER RISKS\n\nThis annual report includes forward-looking statements about the financial condition and prospects of Rogers Communications that involve significant risks and uncertainties that are detailed in the\n\n“Risks and Uncertainties That Could Affect our Businesses” and “Caution Regarding Forward-Looking Statements, Risks and Assumptions” sections of the MD&A contained herein, which should be\n\nread in conjunction with all sections of this annual report.\n\n###### **CORPORATE AND SHAREHOLDER INFORMATION**\n\n####### **CORPORATE OFFICES**\n\nRogers Communications Inc.\n\n333 Bloor Street East, 10th Floor\n\nToronto, ON M4W 1G9\n\n416-935-7777\n\n####### **CUSTOMER SERVICE AND**\n\n####### **PRODUCT INFORMATION**\n\n888-764-3771 or rogers.com\n\n####### **SHAREHOLDER SERVICES**\n\nIf you are a registered shareholder and\n\nhave inquiries regarding your account, wish\n\nto change your name or address, or have\n\nquestions about lost stock certificates, share\n\ntransfers, estate settlements or dividends,\n\nplease contact our transfer agent and registrar:\n\nCST Trust Company\n\nP.O. Box 700, Postal Station B\n\nMontreal, QC H3B 3K3, Canada\n\n416-682-3860 or 800-387-0825\n\ninquiries@canstockta.com\n\n####### **Duplicate Mailings**\n\nIf you receive duplicate shareholder mailings\n\nfrom Rogers Communications, please\n\ncontact CST Trust Company as detailed above\n\nto consolidate your accounts.\n\n####### **INVESTOR RELATIONS**\n\nInstitutional investors, securities analysts\n\nand others requiring additional financial\n\ninformation can visit rogers.com/investors\n\nor contact us at:\n\n1-855-300-7922 or\n\n416-935-3551 *(outside North America)* or\n\ninvestor.relations@rci.rogers.com\n\nMedia inquiries: 416-935-7777\n\n####### **CORPORATE PHILANTHROPY**\n\nFor information relating to Rogers various\n\nphilanthropic endeavours, refer to the\n\n“About Rogers” section of rogers.com\n\n####### **SUSTAINABILITY**\n\nRogers is committed to continuing to grow\n\nresponsibly and we focus our social and\n\nenvironmental sustainability efforts where we\n\ncan make the most meaningful impacts on both.\n\nTo learn more, please visit rogers.com/csr\n\n####### **STOCK EXCHANGE LISTINGS**\n\n####### **Toronto Stock Exchange (TSX):**\n\n**RCI.b** - Class B Non-Voting shares\n\n(CUSIP # 775109200)\n\n**RCI.a** - Class A Voting shares\n\n(CUSIP # 775109101)\n\n####### **New York Stock Exchange (NYSE):**\n\n**RCI** - Class B Non-Voting shares\n\n(CUSIP # 775109200)\n\n####### **Equity Index Inclusions:**\n\nDow Jones Canada Titans 60 Index\n\nDow Jones Telecom Titans 30 Index\n\nFTSE Global Telecoms Index\n\nFTSE All-World Index Series\n\nFTSE4Good Global Index\n\nJantzi Social Index\n\nS&P/TSX 60 Index\n\nS&P/TSX Composite Dividend Index\n\nS&P/TSX Composite Index\n\nS&P/TSX Telecom Services Index\n\n####### **DEBT SECURITIES**\n\nFor details of the public debt securities of the\n\nRogers companies, please refer to the “Debt\n\nSecurities” section under rogers.com/investors\n\n####### **INDEPENDENT AUDITORS**\n\nKPMG LLP\n\n####### **ON-LINE INFORMATION**\n\nRogers is committed to open and full financial\n\ndisclosure and best practices in corporate\n\ngovernance. We invite you to visit the Investor\n\nRelations section of rogers.com/investors where\n\nyou will find additional information about our\n\nbusiness, including events and presentations,\n\nnews releases, regulatory filings, governance\n\npractices, corporate social responsibility and our\n\ncontinuous disclosure materials, including quarterly\n\nfinancial releases, annual information forms and\n\nmanagement information circulars. You may also\n\nsubscribe to our news by e-mail or RSS feeds\n\nto automatically receive Rogers news releases\n\nelectronically.\n\n####### **Shares Outstanding at December 31, 2013**\n\nClass A 112,462,000\n\nClass B 402,281,178\n\n## **2014 Expected Dividend Dates**\n\nRecord Date*: Payment Date*:\n\nMarch 14, 2014 April 4, 2014\n\nJune 13, 2014 July 4, 2014\n\nSeptember 12, 2014 October 3, 2014\n\nDecember 11, 2014 January 2, 2015\n\n* Subject to Board approval\n\nDividends", - "page_start": 129, - "page_end": 129, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "61\n\n####### **Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is\n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement\n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that\n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day.\n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining\n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to\n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors.\n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s\n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and\n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years.\n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the\n\nNew York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that\n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules.\n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man-\n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance.\n\nSincerely,\n\nThe HON INDUSTRIES Board of Directors\n\nA MESSA GE FR OM T H E B OA R D OF DI R ECT OR S\n\nStan A. Askren\n\nGary M. Christensen\n\nCheryl A. Francis\n\nRobert L. Katz\n\nDennis J. Martin\n\nJack D. Michaels\n\nJoseph Scalzo\n\nAbbie J. Smith\n\nRichard H. Stanley\n\nBrian E. Stern\n\nRonald V. Waters, III", - "page_start": 60, - "page_end": 60, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "First Paragraph\n\nIntroduce yourself, and explain why you are writing the letter.\n\nIf you are responding to a job advertisement, state which advertisement\n\nyou are responding to, and indicate where you found it.\n\nFor example:\n\n“I would like to apply for the position of Graphic Designer, as advertised\n\nin the Career Times on 1 March 2015.”\n\nIf possible, mention a mutual contact or acquaintance.\n\nFor example:\n\n“Samantha Stevens mentioned that you are looking for an experienced\n\nGraphic Designer with a keen interest in the fashion industry.”\n\nSecond Paragraph\n\nMention your qualifications, skills and experience, and relate them to the\n\nneeds of the company. Give relevant examples of how you have used\n\nyour skills in the past to perform similar tasks and responsibilities to\n\nthose set out in the job description.\n\nThird Paragraph\n\nExplain why you want to work for this organisation in particular. Where\n\nrelevant, explain any gaps in your CV. If you don’t have the required\n\nacademic qualifications, for example, you can explain how your practical\n\nwork experience makes up for it.\n\nFourth paragraph\n\nMention any documents or attachments that you have included with your\n\ncover letter, and state your availability for an interview.\n\nClose\n\nThank the recipient for taking the time to read your letter, and sign off\n\nwith a professional greeting, such as “Yours sincerely” or “Kind regards”,\n\nfollowed by your full name, telephone number and e-mail address.", - "page_start": 46, - "page_end": 46, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "**SHAREHOLDER INQUIRIES**\n\nRequests to transfer Applied Industrial\n\nTechnologies, Inc. shares and all\n\ncorrespondence regarding address change\n\ninformation, duplicate mailings, missing\n\ncertificates, failure to receive dividend\n\nchecks in a timely manner or to participate\n\nin the Company’s direct stock purchase\n\nprogram should be directed to the\n\nCompany’s transfer agent and registrar:\n\n**COMPUTERSHARE TRUST COMPANY, N.A.**\n\n250 Royall Street\n\nCanton, MA 02021\n\n800/988-5291\n\n**INVESTOR RELATIONS INQUIRIES SHOULD**\n\n**BE DIRECTED TO:**\n\n**MARK O. EISELE**\n\nVice President - Chief Financial Officer\n\n& Treasurer\n\nApplied Industrial Technologies\n\n1 Applied Plaza\n\nCleveland, OH 44115-5014\n\nTelephone: 216/426-4000, Fax: 216/426-4845\n\n**ANNUAL REPORT ON FORM 10-K**\n\n**The Applied Industrial Technologies, Inc.**\n\n**Annual Report on Form 10-K for the fiscal**\n\n**year ended June 30, 2012, including the**\n\n**financial statements and schedules thereto,**\n\n**is available at our website at**\n\n**www.Applied.com. It is also available**\n\n**without charge upon written request to the**\n\n**Vice President - Chief Financial Officer &**\n\n**Treasurer at the address shown.**\n\n**ANNUAL MEETING**\n\nThe Annual Meeting of Shareholders will be held\n\nat 10:00 a.m., Tuesday, October 23, 2012, at the\n\nCorporate Headquarters of Applied Industrial\n\nTechnologies, 1 Applied Plaza, East 36th and\n\nEuclid Avenue, Cleveland, Ohio 44115.\n\n**2007 2008 2009 2010 2011 2012**\n\nApplied Industrial Technologies, Inc. $100.00 $83.63 $70.22 $92.62 $133.17 $141.07\n\nStandard & Poor’s 500 100.00 86.88 64.11 73.36 95.88 101.10\n\nPeer Group 100.00 86.96 74.77 100.34 148.47 170.81\n\nAssumes $100 invested at the close of trading 6/30/07 in\n\nApplied Industrial Technologies, Inc. common stock, Standard\n\n& Poor’s 500, and Peer Group.\n\nCumulative total return assumes reinvestment of dividends.\n\nThe returns of the companies in the Peer Group are weighted\n\nbased on the companies’ relative stock market capitalization.\n\nPeer Group companies selected on a line-of-business basis\n\ninclude: DXP Enterprises, Inc.; Fastenal Company; Genuine\n\nParts Company; W. W. Grainger, Inc.; Kaman Corporation;\n\nLawson Products, Inc.; MSC Industrial Direct Co., Inc.; and\n\nWESCO International, Inc.\n\nSource: Value Line Publishing LLC\n\nApplied Industrial Technologies, Inc., Standard & Poor’s 500, and Peer Group\n\n(Performance Results from 7/1/2007 through 6/30/2012)\n\nApplied Industrial Technologies, Inc. common stock is listed on the New York Stock Exchange under the symbol AIT. The Company is identified in most\n\nfinancial listings as “AppliedIndlTch.”\n\n**BB&T CAPITAL MARKETS**\n\nHolden Lewis, 703/471-3894\n\n**CJS SECURITIES**\n\nJonathan Tanwanteng, 914/287-7600\n\n**CLEVELAND RESEARCH COMPANY**\n\nAdam Uhlman, 216/649-7241\n\n**KEYBANC CAPITAL MARKETS**\n\nJeffrey D. Hammond, 216/689-0236\n\n**SIDOTI & CO.**\n\nJoseph Mondillo, 212/894-3339\n\n**GREAT LAKES REVIEW - Division of**\n\n**Wellington Shields & Co.**\n\nElliott Schlang, 216/767-1340\n\n**STEPHENS INC.**\n\nMatt Duncan, 501/377-3723\n\n**WELLS FARGO SECURITIES, LLC**\n\nAllison Poliniak-Cusic, 212/214-5062\n\n**WUNDERLICH SECURITIES**\n\nBrent D. Rakers, 901/251-2236\n\n**RESEARCH ON APPLIED INDUSTRIAL TECHNOLOGIES IS AVAILABLE THROUGH:**\n\n**COMPARISON OF FIVE-YEAR CUMULATIVE TOTAL RETURN**\n\n$0.00\n\n$50.00\n\n$100.00\n\n$150.00\n\n$200.00\n\n2007 2008 2009 2010 2011 2012\n\nApplied Industrial Technologies, Inc.\n\nStandard & Poor's 500\n\nPeer Group", - "page_start": 46, - "page_end": 46, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "HERE ARE A FEW GUIDELINES TO KEEP IN MIND WHEN SENDING E-MAILS TO YOUR COLLEAGUES:\n\n- Always use a relevant and descriptive subject line.\n\nE-mails with blank subject lines may be marked as spam by the\n\nrecipient’s e-mail client, and e-mails with non-descriptive subject\n\nlines such as “Hello” or “Meeting” may be ignored.\n\n- Write your e-mail in clear and simple language.\n\nDon’t try to sound too formal, and don’t use complicated words\n\nwhen simple ones would work just fine. As far as possible, write in\n\nthe active voice.\n\n- Structure your message clearly, and include only the necessary information.\n\nTake care not to confuse the message by including too many topics\n\nin one e-mail. Respect your colleagues’ time, and try to keep your\n\nmessages as short as possible.\n\n- Don’t type your e-mail in ALL CAPS.\n\nThis is regarded as the online equivalent of shouting.\n\n- Always proofread your e-mail before you hit ‘send’.\n\nGrammar and spelling errors come across as unprofessional.\n\n- If you include a link in your e-mail, make sure that you provide some\n\ncontext.\n\nYour recipients are unlikely to click on a link if they don’t have any\n\nidea as to what they are going to see when they open it.\n\n- Only mark an e-mail as ‘urgent’ when it really does require immedi­ ate attention.\n\nWhat’s urgent to you may not always be urgent to your recipients.\n\n- Don’t use the CC’ or Reply All’ functions unnecessarily.\n\nOnly send your e-mails to the people who really need to see them.", - "page_start": 52, - "page_end": 52, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Cardholders choose categories of interest Cardholders choose categories of interest\n\nto them when to them when\n\nthey subscribe. they subscribe.\n\nMerely by using Merely by using\n\nt h i s c a r d f o r t h i s c a r d f o r\n\nactivities like activities like\n\ndaily shopping daily shopping\n\nand dining out, and dining out,\n\ncardholders can contribute to a range of cardholders can contribute to a range of\n\nenvironment preservation organizations environment preservation organizations\n\nthrough The Defense of Green Earth through The Defense of Green Earth\n\nFoundation, in a program under which they Foundation, in a program under which they\n\ndonate 0.5% of sums spent using the card. donate 0.5% of sums spent using the card.\n\nKansai Genki Fund:\n\nA helping hand for the regional economy\n\nKansai Genki Fund Kansai Genki Fund\n\n¥50 billion ¥50 billion\n\n####### **Name**\n\n####### **Size of fund**\n\n####### **Outline**\n\nIn the past, SMBC also worked to provide In the past, SMBC also worked to provide\n\nfunding to the support creation of platforms funding to the support creation of platforms\n\nfor growth in Japan. Now, working through for growth in Japan. Now, working through\n\nthe Bank of Japan’s “Fund-supply measure the Bank of Japan’s “Fund-supply measure\n\nto support strengthening the foundations to support strengthening the foundations\n\nfor economic growth” loan program, it for economic growth” loan program, it\n\nhas established the Environmentally has established the Environmentally\n\nResponsible Company Support Fund and Responsible Company Support Fund and\n\nthe Environmental Facilities Support the Environmental Facilities Support\n\nFund, in support of companies with Fund, in support of companies with\n\nenvironmentally-conscious managements, environmentally-conscious managements,\n\nand which invest in environmental facilities. and which invest in environmental facilities.\n\nGiven the wave of Japanese companies Given the wave of Japanese companies\n\nsetting up operations in China setting up operations in China’s fast-growing s fast-growing\n\nmarket, the bank has also established a China market, the bank has also established a China\n\nBusiness Support Fund to meet the funding Business Support Fund to meet the funding\n\nneeds of companies that plan to make new needs of companies that plan to make new\n\ninvestments in subsidiaries in China. investments in subsidiaries in China.\n\nPromoting environmentally-aware\n\nmanagement and supporting business\n\nventures in China through the fund\n\n**We believe it is important to contribute to maintenance and protection of**\n\n**the natural environment and the sustainable development of regional society**\n\n**through our core business, hand in hand with the customer.**\n\n**For further details, please see our website.**\n\nSupport for companies creating Support for companies creating\n\ngrowth platforms in fields such growth platforms in fields such\n\nas medical and nursing care, as medical and nursing care,\n\nenvironmental and energy tech environmental and energy tech-\n\nnologies, and businesses in Asia nologies, and businesses in Asia\n\nEnvironmentally Responsible Environmentally Responsible\n\nCompany Support Fund Company Support Fund\n\nEnvironmental Facilities Environmental Facilities\n\nSupport Fund Support Fund\n\n¥50 billion ¥50 billion\n\n####### **Name**\n\n####### **Size of fund**\n\n**Outline** <sup>The fund supports companies</sup> The fund supports companies\n\nwith environmentally-aware with environmentally-aware\n\nmanagements or involvement in managements or involvement in\n\nenvironmental businesses environmental businesses\n\nChina Business Support Fund China Business Support Fund\n\n¥50 billion ¥50 billion\n\n####### **Name**\n\n####### **Size of fund**\n\n**Outline** <sup>The fund supports for companies</sup> The fund supports for companies\n\nconsidering moving into China, or considering moving into China, or\n\nexpanding their business there expanding their business there\n\n16", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HNI_2003.pdf", - "query": "What explains the decrease in net sales of HON industries in 2002 ?", - "target_page": 34, - "target_passage": "The decrease in 2002 was due to the decline in the office furniture market due to unstable economic conditions and the deletion of less profitable product lines in the hearth products segment", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "The increase in 2003 is due to the additional week, strong sales volume\n\nin the hearth segment, and improved gross margins in both segments,\n\noffset by increased restructuring charges due to additional plant clo-\n\nsures and consolidations, increased investment in brand building and\n\nselling initiatives, and increased freight costs. The increase in 2002\n\nwas due to a $24 million restructuring charge in 2001 compared to a\n\n$3 million restructuring charge in 2002 and goodwill and indefinite-\n\nlived intangibles amortization of $9 million incurred in 2001 that is\n\nnot included in 2002 due to a change in accounting standards.\n\n* **N ET I N CO ME** *\n\nNet income increased 7% in 2003 and 23% in 2002, respectively. Net\n\nincome in 2003 was favorably impacted by increased interest income due\n\nto increased investments and decreased interest expense due to reduc-\n\ntion in debt. Net income in 2002 was favorably impacted by a decrease in\n\ninterest expense and a decrease in the effective tax rate to 35% in 2002\n\nfrom 36% in 2001 mainly due to tax benefits associated with various\n\nfederal and state tax credits. The Company anticipates that its tax rate\n\nwill increase to 36% in 2004 due to increased state taxes and a reduced\n\nbenefit from federal and state tax credits. Net income per diluted share\n\nincreased by 8% to $1.68 in 2003 and by 23% to $1.55 in 2002, respec-\n\ntively. Due to the appreciation in the Company’s stock price,\n\noutstanding options had a dilutive impact of $0.01 per share in 2003.", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "36\n\n* **O FFI CE FURNI TURE** *\n\nOffice furniture comprised 74% of consolidated net sales for 2003 and\n\n76% of consolidated net sales for 2002 and 2001. Net sales for office\n\nfurniture increased 2% in 2003 and decreased 6% in 2002. The\n\nincrease in 2003 is due to the increased week from the Company’s\n\n52/53-week fiscal year. The office furniture industry has experienced an\n\nunprecedented three-year decline in shipments. The Business and\n\nInstitutional Furniture Manufacturer’s Association (BIFMA) reported\n\n2003 shipments down over 5% and 2002 shipments down 19%. The\n\nCompany’s estimated share of the market based on reported office\n\nfurniture shipments increased to 15.3% in 2003 compared to 14.4%\n\nin 2002 and 12.4% in 2001. This increase was achieved by provid-\n\ning strong brands, innovative products and services, and greater value\n\nto end-users.\n\nOperating profit as a percent of sales was 10.0% in 2003,\n\n10.2% in 2002, and 8.2% in 2001. Included in 2003 were $15.2 million\n\nof net pretax charges related to the closure of two office furniture\n\nfacilities, which impacted operating margins by 1.1 percentage points.\n\nIncluded in 2002 were $3.0 million of restructuring charges, which\n\nimpacted operating margins by 0.2 percentage points, and 2001\n\nincluded $22.5 million of restructuring charges, which impacted oper-\n\nating margins by 1.7 percentage points. The increase in operating\n\nmargins is due to increased gross profit from the benefits of restructur-\n\ning initiatives, rapid continuous improvement programs, and increased\n\nprice realization, offset by additional investments in brand building and\n\nselling initiatives and increased freight expense.\n\n* **HEARTH PRO D UCTS** *\n\nHearth products sales increased 9% in 2003 and decreased 3% in 2002,\n\nrespectively. The growth in 2003 was attributable to strong housing\n\nstarts, growth in market share in both the new construction and retail\n\nchannels, strengthening alliances with key distributors and dealers, as\n\nwell as focused new product introductions. The decrease in 2002 was\n\nmainly due to pruning out less profitable product lines.\n\nOperating profit as a percent of sales in 2003 was 12.1% com-\n\npared to 10.8% and 9.2% in 2002 and 2001, respectively. The improved\n\nprofitability in 2003 was the result of leveraging fixed costs over a\n\nhigher sales volume and increased sales through company-owned dis-\n\ntribution offset by increased freight costs and higher labor costs from\n\nincreased use of overtime and temporary labor to meet record levels of\n\ndemand. The increase in 2002 was mainly due to discontinuance of\n\ngoodwill and indefinite-lived intangible amortization of approximately\n\n$7 million due to the adoption of SFAS 142.\n\n####### **Liquidity and Capital Resources**\n\nDuring 2003, cash flow from operations was $141.3 million, which\n\nalong with funds from stock option exercises under employee stock\n\nplans, provided the funds necessary to meet working capital needs,\n\ninvest in capital improvements, repay long-term debt, repurchase com-\n\nmon stock, and pay increased dividends.\n\nCash, cash equivalents, and short-term investments totaled\n\n$204.2 million at the end of 2003 compared to $155.5 million at the\n\nend of 2002 and $78.8 million at the end of 2001. The Company used\n\napproximately $80 million of cash to acquire Paoli Inc. on January 5,\n\n2004. These remaining funds, coupled with cash from future opera-\n\ntions and additional long-term debt, if needed, are expected to be\n\nadequate to finance operations, planned improvements, and internal\n\ngrowth. The Company is not aware of any known trends or demands,\n\ncommitments, events, or uncertainties that are reasonably likely to\n\nresult in its liquidity increasing or decreasing in any material way.\n\nThe Company places special emphasis on the management\n\nand reduction of its working capital with a particular focus on trade\n\nreceivables and inventory levels. The success achieved in managing", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "or 7.3% above the prior year, driven by improvements in the\n\nindustrial economy as well as a continued focus on profitable sales\n\ngrowth. Incremental net sales from companies acquired since the\n\nprior year period contributed approximately $16.6 million or 0.7%.\n\nCurrency translation decreased fiscal year sales by approximately\n\n$1.8 million or 0.1%. In local currency, net sales from our\n\nCanadian operations were up 12.2% from fiscal 2011, including\n\n2.8% from acquisitions. In local currency, net sales from our\n\nMexican operations were up 25.9%. The number of selling days in\n\nfiscal 2012 was the same as in fiscal 2011.\n\nNet sales of our Service Center Based Distribution segment increased\n\n$133.8 million, or 7.6%, compared to fiscal year 2011 led by\n\nimprovements in the industrial economy as well as a continued focus on\n\nprofitable sales growth, with acquisitions adding $16.6 million or 0.9%.\n\nNet sales of our Fluid Power Businesses segment increased $28.8 million\n\nor 6.5%, also driven by improvements in the industrial economy as well\n\nas a continued focus on profitable sales growth.\n\nThe sales product mix for fiscal 2012 was 70.8% industrial products\n\nand 29.2% fluid power products compared to 70.5% industrial and\n\n29.5% fluid power in the prior year.\n\nAt June 30, 2012, we had a total of 476 operating facilities in the U.S.,\n\nCanada and Mexico versus 474 at June 30, 2011.\n\n5 Applied Industrial Technologies, Inc. and Subsidiaries\n\n#### MANAGEMENT’S DISCUSSION AND ANALYSIS\n\n#### OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Net income was $4.5 million, a decrease of $11.9 million or 72.4%. The decrease is primarily the result of the $21.7 million decline in investment results due to the impact of the VeriSign gain recorded in 2001, and the loss on the sale of the VeriSign stock in 2002.\n\nIncome from discontinued operations was $7.4 million after taxes, an increase of $0.7 million or 11%. Increased revenues from use of our cellular network by customers of other wireless providers were the main cause for the increase in net income.\n\nNet loss from continuing operations was $2.9 million, a decrease of $12.6 million from 2001. The results are primarily made up of the one-time impact of the losses on the sale of the VeriSign stock and the improvement in operating income.\n\nThe Company recognized an income tax benefit of $2.1 million on continuing operations in 2002, which is an effective tax rate of 42.2% due to the impact of net operating loss carry forwards generated in several states with higher tax rates, offset by the need for a valuation allowance.\n\nIncome (loss) from continuing operations before taxes was a $5.0 million loss compared to a profit of $15.5 million in 2001, a decrease of $20.5 million. Gains and losses on external investments contributed $21.7 million to this change from 2002 to 2001.\n\nNon-operating income was a loss of $0.1 million, a decrease of $0.3 million, primarily due to losses recorded for the Company’s portfolio of investments, offset by an increase in patronage equity earned from CoBank, the Company’s primary lender.\n\nNet losses on investments were $10.0 million, compared to a gain of $12.9 million from 2001. Results in 2002 include the sale of the VeriSign, Inc. stock for a loss of $9.0 million compared to a gain recorded on the VeriSign stock of $12.7 million in 2001.\n\nInterest expense was $4.2 million, an increase of $0.1 million or 1.4%. The Company’s average debt outstanding was approximately the same during 2002 as compared to the previous year.\n\nOther income (expense) is comprised of non-operating income and expenses, interest expense and gain or loss on investments. Collectively, the net impact of these items to pre-tax income was an expense of $14.3 million for 2002, compared to income of $9.1 million from 2001. The largest component was the loss on investments that is discussed below.\n\nOperating income grew to $9.3 million, an increase of $2.9 million or 45.4%. Revenue growth, primarily in the PCS operation, was greater than the increase in operating expense, and the overall operating margin was 10.0%, compared to 9.4% in 2001. The elevated bad debt expense in the PCS and telephone operations had a dampening effect on the operating margin improvement.\n\n##### **Investments in Non-Affiliated Companies**\n\nThe Company has investments in several available-for-sale securities, which the Company may choose to liquidate from time to time, based on market conditions, capital needs, other investment opportunities, or a combination of any number of these factors. As a result of the uncertainty of these factors, there is also uncertainty as to what the value of the investments may be when they are sold.\n\nThe fair value of the Company’s available-for-sale securities was $0.2 million at the end of 2003, compared to $0.2 million at the end of 2002. The Company’s available-for-sale portfolio at December 31, 2003 is made up of two investments, both of which are within the telecommunications industry. Due to the volatility of the securities markets, particularly in the telecommunications industry, there is uncertainty about the ultimate value the Company will realize with respect to these investments in the future.", - "page_start": 52, - "page_end": 52, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "3\n\nYEAR ENDED JUNE 30, 2011 vs. 2010\n\nThe following table is included to aid in review of Applied’s\n\nstatements of consolidated income.\n\nYear Ended June 30,\n\nAs a % of Net Sales\n\nChange in\n\n$'s Versus\n\nPrior Period\n\n2011 2010 % Increase\n\nNet Sales\n\n100.0 % 100.0 % 16.9 %\n\nGross Profit 27.7 % 27.2 % 18.9 %\n\nSelling, Distribution & Administrative 20.9 % 21.4 % 14.0 %\n\nOperating Income 6.8 % 5.8 % 37.0 %\n\nNet Income\n\n4.4 % 3.5 % 46.8 %\n\nNet sales in fiscal 2011 were $2.2 billion, which was\n\n$319.6 million or 16.9% above the prior year driven by\n\nimprovements in the industrial economy. Incremental net sales\n\nfrom companies acquired in fiscal 2011 contributed\n\napproximately $40.8 million or 1.8%. Currency translation\n\nincreased fiscal year 2012 sales by approximately $16.3 million or\n\n0.7%. In local currency, net sales from our Canadian operations\n\nwere up 23.1% from fiscal 2010, including 8.4% from\n\nacquisitions. In local currency, net sales from our Mexican\n\noperations were up 17.9%. The number of selling days in fiscal\n\n2011 was the same as in fiscal 2010.\n\nNet sales of our Service Center Based Distribution segment\n\nincreased $234.3 million, or 15.2%, compared to fiscal year 2010\n\nled by improvements in the industrial economy, with acquisitions\n\nadding $40.8 million or 2.7%. Net sales of our Fluid Power\n\nBusinesses segment increased $85.4 million or 23.9%, driven by\n\nimprovements in the industrial economy.\n\nThe sales product mix for fiscal 2011 was 70.5% industrial\n\nproducts and 29.5% fluid power products compared to 71.7%\n\nindustrial and 28.3% fluid power in the prior year.\n\nAt June 30, 2011, we had a total of 474 operating facilities in the\n\nU.S., Canada and Mexico versus 455 at June 30, 2010. The\n\nincrease in operating facilities represented 11 new locations due\n\nto acquisitions, the opening of 2 new locations, the impact of\n\nredefining certain shop operations which added 11 locations, and\n\nthe merger of 5 locations with other locations.\n\nOur gross profit margin increased to 27.7% in fiscal 2011 from\n\n27.2% in fiscal 2010. LIFO benefits had a negative 1.0% impact\n\non gross profit margin in fiscal 2011 versus fiscal 2010. LIFO\n\nbenefits recorded during fiscal year 2011 totaled $5.3 million\n\nwhich provided an overall benefit in our gross profit percent of\n\n0.2%. This compares to a LIFO benefit of $23.5 million in fiscal\n\n2010 which added 1.2% to gross profit. Our focused efforts on\n\nselling products at a higher gross profit margin led to an\n\napproximate 0.9% improvement in gross profit margins. Other\n\npositive impacts on margins were an increase of approximately\n\n0.4% from businesses acquired during the fiscal year and an\n\nincrease of approximately 0.2% due to lower scrap expense.\n\nSD&A increased $56.7 million or 14.0% during fiscal 2011\n\ncompared to fiscal year 2010, and as a percent of sales decreased\n\nto 20.9% from 21.4% in fiscal 2010. Associate compensation\n\nand benefits, including amounts tied to financial performance,\n\nincreased $27.4 million. Acquisitions added $18.4 million of\n\nSD&A compared to fiscal year 2010, including additional\n\namortization expense of $1.4 million. Incremental expenses\n\nassociated with the development of a new ERP platform totaled\n\n$8.6 million. Foreign currency translation had an unfavorable\n\nimpact of $3.1 million in fiscal 2011.\n\nOperating income increased 37.0% to $150.8 million during\n\nfiscal 2011 from $110.1 million during 2010. As a percent of\n\nsales, operating income increased to 6.8% in fiscal 2011 from\n\n5.8% in 2010. The $40.7 million increase in operating income\n\nduring fiscal 2011 primarily reflects higher sales levels, improved\n\ngross profit margins and the impact of leverage on increased\n\nsales as we kept our SD&A to 20.9% of sales in 2011 versus\n\n21.4% in fiscal 2010.\n\nOperating income as a percentage of sales for the Service Center\n\nBased Distribution segment increased to 6.5% in fiscal 2011 from", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "$2.75 per diluted share, in 2003, compared with $2.6 million, or $1.51 per basic and $1.39 per diluted share, in 2002 and $9.8 million, or $4.80 per\n\nbasic and $4.30 per diluted share, in 2001. The Company adopted Statement of Financial Accounting Standards (“SFAS”) No. 142 effective January 1, 2002.\n\nThe required adoption of SFAS No. 142 as discussed in Note 2 to the Company’s Consolidated Financial Statements included herein is considered a change\n\nin accounting principle and the cumulative effect of adopting this standard resulted in a $1.6 million, or $ .96 per basic and $ .88 per diluted share, non-\n\ncash, after-tax charge in 2002.\n\nOperating revenues were $62.8 million in 2003, compared with $59.5 million in 2002 and $57.6 million in 2001. These revenue increases are generally\n\nattributable to higher sales volumes. The 5 percent revenue increase in 2003 over the prior year is primarily attributable to an 8 percent increase in the\n\nrevenues of the Company’s ophthalmic products, an 8 percent increase in the revenues of the Company’s cardiovascular products, a 3 percent increase in\n\nthe Company’s fluid delivery products and a 2 percent increase in the Company’s other medical and non-medical products and services. The 3 percent\n\nrevenue increase in 2002 over the prior year is primarily attributable to an 8 percent increase in the revenues of the Company’s cardiovascular products,\n\na 4 percent increase in the Company’s fluid delivery products and a 4 percent increase in the Company’s other medical and non-medical products and\n\nservices.\n\nThe Company’s cost of goods sold was $40.6 million in 2003, compared with $39.2 million in 2002 and $35.8 million in 2001. The increase in cost of\n\ngoods sold for 2003 over 2002 was primarily related to the increase in revenues discussed above and increased insurance costs partially offset by an\n\nimprovement in manufacturing variances resulting from increased production volumes. The increase in cost of goods sold for 2002 over 2001 was\n\nprimarily related to a shift in product mix, which resulted in lower gross margins, and the increase in revenues discussed above.\n\nGross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company’s gross profit in 2003 was 35\n\npercent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003\n\nA N D A N A L Y S I S O F F I N A N C I A L C O N D I T I O N A N D R E S U L T S O F O P E R A T I O N S", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "32\n\nThe following discussion of the Company’s historical results of opera-\n\ntions and of its liquidity and capital resources should be read in\n\nconjunction with the Consolidated Financial Statements of the\n\nCompany and related notes.\n\n####### **Overview**\n\nThe Company has two reportable core operating segments: office furni-\n\nture and hearth products. The Company is the second largest office\n\nfurniture manufacturer in the United States and the nation’s leading\n\nmanufacturer and marketer of gas- and wood-burning fireplaces.\n\nFrom 2000 to 2003, the office furniture industry experi-\n\nenced an unprecedented three-year decline due to the challenging\n\neconomic environment. In 2003, this decline negatively impacted the\n\nCompany’s office furniture segment. In contrast, the housing market\n\nwas at record high levels during 2003, which positively impacted the\n\nCompany’s hearth segment. The Company outperformed its peers in\n\nboth segments in which it competes. The Company gained market\n\nshare by providing strong brands, innovative products and services,\n\nand greater value to its end-users. Fiscal 2003 also included an extra\n\nweek of activity due to the Company’s 52/53-week fiscal year.\n\nNet sales were $1.8 billion in 2003, as compared to $1.7 bil-\n\nlion in 2002. The increase in net sales reflects the 9% increase in the\n\nhearth segment and the additional week of business activity. In 2003\n\nand 2002, the Company recorded restructuring charges and accelerated\n\ndepreciation related to the closure and consolidation of office furniture\n\nfacilities totaling $15.2 million and $3.0 million, respectively. Gross\n\nmargins increased to 36.4% in 2003 from 35.4% in 2002 due to benefits\n\nfrom restructuring initiatives and its rapid continuous improvement\n\nprogram, new products, and increased price realization. The Company\n\nalso invested aggressively in brand building and selling initiatives in\n\n2003. Net income was $98.1 million or $1.68 per diluted share in 2003,\n\nas compared to $91.4 million or $1.55 per diluted share in 2002.\n\nThe Company generated $141.3 million in cash flow from\n\noperating activities and increased its cash position, including short-\n\nterm investments, by $48.6 million to $204.2 million. The Company\n\npaid dividends of $30.3 million and repurchased $21.5 million of its\n\ncommon stock, while investing $35.7 million in net capital expendi-\n\ntures and repaying $20.2 million of debt.\n\n####### **Critical Accounting Policies and Estimates**\n\n* **GEN ERAL** *\n\nManagement’s Discussion and Analysis of Financial Condition and\n\nResults of Operations is based upon the Consolidated Financial\n\nStatements, which have been prepared in accordance with GAAP. The\n\npreparation of these financial statements requires management to\n\nmake estimates and assumptions that affect the reported amounts of\n\nassets, liabilities, revenue and expenses, and related disclosure of con-\n\ntingent assets and liabilities. Management bases its estimates on\n\nhistorical experience and on various other assumptions that are\n\nbelieved to be reasonable under the circumstances, the results of which\n\nform the basis for making judgments about the carrying values of assets\n\nand liabilities that are not readily apparent from other sources. Senior\n\nmanagement has discussed the development, selection and disclosure\n\nof these estimates with the Audit Committee of our Board of Directors.\n\nActual results may differ from these estimates under different assump-\n\ntions or conditions.\n\nAn accounting policy is deemed to be critical if it requires an\n\naccounting estimate to be made based on assumptions about matters\n\nthat are uncertain at the time the estimate is made, and if different\n\nestimates that reasonably could have been used, or changes in the\n\naccounting estimates that are reasonably likely to occur periodically,\n\ncould materially impact the financial statements. Management believes\n\nthe following critical accounting policies reflect its more significant", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "16\n\nThe Company’s policy requires measurement of the allowance for an impaired collateral dependent loan based\n\non the fair value of the collateral. Other loan impairments are measured based on the present value of expected\n\nfuture cash flows or the loan’s observable market price.\n\n####### **Results of Operations**\n\n*Performance Summary* . Net earnings for 2002 were $34.0 million, an increase of $4.6 million, or 15.7%, over\n\nnet earnings for 2001 of $29.4 million. Net earnings for 2000 were $28.3 million. The increase in net earnings for\n\n2002 over 2001 was primarily attributable to an increase in net interest income resulting primarily from growth in\n\naverage earning assets and an improved net interest margin. The increase in net earnings for 2001 over 2000 was\n\nprimarily attributable to an increase in net interest income resulting primarily from the growth in average earning\n\nassets and an increase in noninterest income resulting primarily from increases in service fees on deposit accounts\n\nand real estate mortgage fees.\n\nOn a basic net earnings per share basis, net earnings were $2.75 for 2002 as compared to $2.38 for 2001 and\n\n$2.28 for 2000. Return on average assets was 1.78% for 2002 as compared to 1.62% for 2001 and 1.67% for 2000.\n\nReturn on average equity was 15.13% for 2002 as compared to 14.35% for 2001 and 15.39% for 2000.\n\nAffecting our 2002 net earnings and basic and diluted earnings per share is the implementation of Statement of\n\nFinancial Accounting Standards No. 141, \"Business Combinations\" (\"SFAS No. 141\") and Statement of Financial\n\nAccounting Standards No. 142, \"Goodwill and Other Intangible Assets\" (\"SFAS No. 142\"). SFAS No. 141 requires\n\nthat all business combinations initiated after June 30, 2001 be accounted for under the purchase method and\n\naddresses the initial recognition and measurement of goodwill and other intangible assets acquired in a business\n\ncombination. SFAS No. 142 addresses the initial recognition and measurement of intangible assets acquired outside\n\nof a business combination and the accounting for goodwill and other intangible assets subsequent to their\n\nacquisition. SFAS No. 142 provides that intangible assets with finite useful lives be amortized and that goodwill\n\nand intangible assets with indefinite lives not be amortized, but rather be tested at least annually for impairment.\n\nSFAS No. 142 was effective January 1, 2002 for calendar year companies; however, acquired goodwill and\n\nintangible assets recorded in the acquisition of City Bancshares, Inc. closed subsequent to June 30, 2001 were\n\nsubject immediately to its provisions.\n\nOn January 1, 2002, goodwill amounting to $23,765,896 was not subject to further amortization as a result of\n\nSFAS No. 142. The Company conducted its initial impairment test in 2002, with no reduction of recorded goodwill\n\nresulting from the test. A reconciliation adjusting comparative net earnings and earnings per share for the years\n\nended December 31, 2001 and 2000, to show the effect of no longer amortizing the Company’s goodwill, follows:\n\n2001 2000\n\nReported net earnings $ 29,354,505 $ 28,316,047\n\nAdd back: goodwill amortization\n\nGoodwill amortization, before income tax 1,641,367 1,641,367\n\nIncome tax benefit (420,000) (420,000)\n\nAdjusted net earnings $ 30,575,872 $ 29,537,414\n\nBasic earnings per share:\n\nReported net earnings $ 2.38 $ 2.28\n\nGoodwill amortization, net of income tax benefit .10 .10\n\nAdjusted net earnings $ 2.48 $ 2.38\n\nEarnings per share, assuming dilution:\n\nReported net earnings $ 2.37 $ 2.27\n\nGoodwill amortization, net of income tax benefit .10 .10\n\nAdjusted net earnings $ 2.47 $ 2.37\n\n*Net Interest Income* . Net interest income is the difference between interest income on earning assets and\n\ninterest expense on liabilities incurred to fund those assets. Our earning assets consist primarily of loans and", - "page_start": 43, - "page_end": 43, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "initiatives, business simplification, new products, and improved price\n\nrealization. Included in 2003 gross profit was $6.7 million of acceler-\n\nated depreciation, which reduced gross profits 0.4 percentage points.\n\nThe Company expects to mitigate any future increases in material costs\n\nthrough various initiatives, including alternative materials and sup-\n\npliers and its rapid continuous improvement program.\n\n* **S EL LI N G AN D AD MI N I S TRATI VE EXPEN S ES** *\n\nSelling and administrative expenses, excluding restructuring charges,\n\nincreased 5.8% in 2003 and decreased 2.2% in 2002. The increase in\n\n2003 was due to additional investment of approximately $14 million in\n\nbrand building and selling initiatives, and increased freight costs of\n\n$7 million due to rate increases, fuel surcharges, and volume. The\n\ndecrease in 2002 was due to no longer amortizing goodwill and certain\n\nother intangible assets of approximately $9 million and lower overall", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "tender offer. The other income in 2001 was primarily related to the Company’s one-time pre-tax gain of $428,000 on the sale of a patent.\n\nIncome tax expense in 2003 totaled $1.9 million, compared with $1.4 million in 2002 and $1.8 million in 2001. The effective tax rates for 2003, 2002 and\n\n2001 were 27.8 percent, 25.7 percent and 29.7 percent, respectively. Benefits from tax incentives for exports and R&D expenditures totaled $350,000 in\n\n2003, $408,000 in 2002 and $404,000 in 2001. The higher effective tax rate in 2003 is primarily a result of benefits from tax incentives for exports and\n\nR&D expenditures being a lesser percentage of taxable income in 2003 than in 2002. The lower effective tax rate in 2002 is primarily a result of benefits\n\nfrom tax incentives for exports and R&D expenditures being a larger percentage of taxable income in 2002 than in 2001 and the utilization of capital loss\n\ncarryforwards in 2002.\n\nThe Company believes that 2004 revenues will be higher than 2003 revenues and that the cost of goods sold, gross profit, operating income and income\n\nfrom continuing operations will each be higher in 2004 than in 2003. The Company further believes that it will have continuing volume growth in most of\n\nits product lines in 2004, complemented by the introduction of new products, and that it will achieve a double-digit annual rate of growth in earnings per\n\nshare from continuing operations for the next several years.\n\n**D I S C O N T I N U E D O P E R AT I O N S**\n\nDuring 1997, the Company sold all of its natural gas operations. The financial statements presented herein reflect the Company’s natural gas operations as\n\ndiscontinued operations for all periods presented. The financial statements also reflect an after-tax gain on disposal of these discontinued operations of\n\n$ .2 million, or $ .10 per basic and $ .09 per diluted share, in both 2003 and 2002, and $5.5 million, or $2.70 per basic and $2.42 per diluted share, in 2001.\n\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to\n\n$250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon\n\nrevenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from\n\nthe purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001\n\ngain also includes a $5,327,000 non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997.\n\nThis reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets.", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_ATRI_2003.pdf", - "query": "What operations were discontinued in 1997 by Atrion Corp ?", - "target_page": 17, - "target_passage": "During 1997, the Company sold all of its natural gas operations. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "###### C O R P O R A T E I N F O R M A T I O N\n\n####### **C o r p o r a t e O f f i c e :**\n\nAtrion Corporation\n\nOne Allentown Parkway\n\nAllen, Texas 75002\n\n(972) 390-9800\n\nwww.atrioncorp.com\n\n####### **R e g i s t r a r a n d T r a n s f e r A g e n t**\n\nAmerican Stock Transfer and Trust Company\n\n59 Maiden Lane\n\nNew York, New York 10007\n\n####### **F o r m 1 0 - K**\n\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange\n\nCommission, may be obtained by any stockholder without charge by written request to:\n\n*Corporate Secretary*\n\n*Atrion Corporation*\n\n*One Allentown Parkway*\n\n*Allen, Texas 75002*\n\n####### **S t o c k I n f o r m a t i o n**\n\nThe Company’s common stock is traded on The Nasdaq Stock Market (Symbol: ATRI). As of March 8, 2004, there were\n\napproximately 1,200 stockholders, including beneficial owners holding shares in nominee or “street” name. The table below\n\nsets forth the high and low closing prices on The Nasdaq Stock Market and the quarterly dividends per share declared by the\n\nCompany for each quarter of 2002 and 2003.\n\n2002 Quarter Ended High Low Dividends\n\nMarch 31 $ 38.14\n\n| $ 26.91 26.82 18.31 17.31 | $ — — — — |\n|:---|:---|\n| Low | Dividends |\n| $ 17.95 22.75 26.80 40.00 | $ — — .12 .12 |\n\nJune 30 32.51\n\nSeptember 30 28.09\n\nDecember 31 23.90\n\n2003 Quarter Ended High\n\nMarch 31 $ 22.85\n\nJune 30 30.80\n\nSeptember 30 45.20\n\nDecember 31 50.00\n\nThe Company paid no cash dividends on its common stock during 2002. In the third quarter of 2003 the Company began paying\n\nquarterly cash dividends and presently plans to pay quarterly cash dividends in the future.\n\n*MPS and LacriCATH are registered trademarks of Atrion Corporation*", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "##### **DISCONTINUED OPERATIONS**\n\nIncome from discontinued operations was $22.4 million after taxes, an increase of $15.0 million or 202%. The income from discontinued operations in 2003 includes the sale of the partnership interest in February 2003 and results from the two months of its operations in 2003.\n\nThe Company adopted FAS 143 “Accounting for Asset Retirement Obligations.” effective January 1, 2003, and as a result recorded a charge to earnings for the cumulative effect of this change in accounting of $76 thousand after taxes.\n\nNet income was $32.1 million, an increase of $27.6 million or 610%. The increase is a result of improved operating results in the PCS operations, the 2002 VeriSign stock loss and the sale of the cellular operations.\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 50, - "page_end": 50, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "###### R E P O R T O F I N D E P E N D E N T C E R T I F I E D P U B L I C A C C O U N T A N T S\n\nTo the Stockholders and the Board of Directors of Atrion Corporation:\n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003\n\nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial\n\nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit.\n\nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors\n\nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002.\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan\n\nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes\n\nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting\n\nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits\n\nprovide a reasonable basis for our opinion.\n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation\n\nand Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then\n\nended in conformity with accounting principles generally accepted in the United States of America.\n\nAs discussed above, the financial statements of Atrion Corporation and Subsidiaries as of December 31, 2001, and for the year then ended were audited by\n\nother auditors who have ceased operations. As described in Note 2, these financial statements have been revised to include the transitional disclosures required\n\nby Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of January 1, 2002. Our\n\naudit procedures with respect to the disclosures in Note 2 with respect to 2001 included agreeing the previously reported net income to the previously issued\n\nfinancial statements and the adjustments to reported net income representing amortization expense (including any related tax effects) recognized in those\n\nperiods related to goodwill to the Company’s underlying records obtained from management. We also tested the mathematical accuracy of the reconciliation\n\nof adjusted net income to reported net income, and the related income-per-share amounts. In our opinion, the disclosures for 2001 in Note 2 are appropriate.\n\nHowever, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements of the Company other than with respect to such\n\ndisclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 financial statements taken as a whole.\n\nGrant Thornton LLP\n\nDallas, Texas\n\nFebruary 13, 2004\n\n*This is a copy of the audit report previously issued by Arthur Andersen LLP in connection with Atrion Corporation and Subsidiaries Annual Report*\n\n*for the year ended December 31, 2001. This audit report has not been reissued by Arthur Andersen LLP in connection with this Annual Report. The*\n\n*consolidated balance sheets as of December 31, 2001 and 2000 and the consolidated statements of income and cash flows for the years ended*", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements 53\n\nand operate MGM Grand Australia. This transaction closed in July 2004 with net\n\nproceeds to the Company of $136 million.\n\nThe results of the Golden Nugget Subsidiaries, Online and MGM Grand Australia\n\nare classified as discontinued operations in the accompanying consolidated\n\nstatements of income for all periods presented. Net revenues of discontinued\n\noperations were $45 million, $231 million and $222 million, respectively, for the\n\nyears ended December 31, 2004, 2003 and 2002. Included in income from\n\ndiscontinued operations is an allocation of interest expense based on the ratio of the\n\nnet assets of the discontinued operations to the total consolidated net assets and\n\ndebt of the Company. Interest allocated to discontinued operations was $2 million,\n\n$9 million and $9 million for the years ended December 31, 2004, 2003 and 2002,\n\nrespectively. Included in discontinued operations for the year ended December 31,\n\n2003 is a loss on disposal of Online of $7 million relating primarily to\n\nunrecoverable costs of computer hardware and software. Included in the tax benefit\n\nfrom discontinued operations for the year ended December 31, 2003 is $2 million\n\nof previously unrecognized tax benefits relating to prior year operating losses of\n\nOnline. Included in discontinued operations for the year ended December 31,\n\n2004 is a gain on the sale of the Golden Nugget Subsidiaries of $8 million and a\n\ngain on sale of the MGM Grand Australia Subsidiaries of $74 million.\n\nThe following table summarizes the assets and liabilities of discontinued operations\n\n(the Golden Nugget Subsidiaries and Online) as of December 31, 2003, included as\n\nassets and liabilities held for sale in the accompanying consolidated balance sheet:\n\nAt December 31, 2003 (In thousands)\n\nCash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . $ 15,230\n\nAccounts receivable, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6,024\n\nInventories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4,321\n\nPrepaid expenses and other . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5,174\n\nTotal current assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30,749\n\nProperty and equipment, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185,516\n\nOther assets, net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9,817\n\nTotal assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226,082\n\nAccounts payable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2,180\n\nOther current liabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20,885\n\nTotal current liabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23,065\n\nLong-term debt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391\n\nTotal liabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23,456\n\nNet assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . $ 202,626", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "###### N O T E S T O C O N S O L I D A T E D F I N A N C I A L S T A T E M E N T S\n\n## 12\n\n1 S U M M A R Y O F S I G N I F I C A N T A C C O U N T I N G P O L I C I E S\n\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its\n\nproducts throughout the United States and internationally. The Company’s customers include hospitals, distributors, and other manufacturers. As of\n\nDecember 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. (“Atrion\n\nMedical Products”), Halkey-Roberts Corporation (“Halkey-Roberts”) and Quest Medical, Inc. (“Quest Medical”).\n\n**P R I N C I P L E S O F C O N S O L I D AT I O N**\n\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the “Company”). All significant intercompany\n\ntransactions and balances have been eliminated in consolidation.\n\n**F A I R VA L U E**\n\nThe carrying amounts of cash and cash equivalents, accounts receivable and accounts payable approximate fair value due to the short-term nature of these\n\nitems. The carrying amount of debt approximates fair value as the interest rate is tied to market rates.\n\n**E S T I M AT E S**\n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United States of America requires management\n\nto make estimates and assumptions that affect the reported amounts of assets and liabilities and disclosures of contingent assets and liabilities at the dates\n\nof the financial statements and the reported amount of revenues and expenses during the reporting periods. Actual results could differ from those estimates.\n\n**F I N A N C I A L P R E S E N T AT I O N**\n\nCertain prior-year amounts have been reclassified to conform with the current-year presentation.\n\n**C A S H A N D C A S H E Q U I VA L E N T S**\n\nCash equivalents are securities with original maturities of 90 days or less.\n\n**T R A D E R E C E I VA B L E S**\n\nTrade accounts receivable are recorded at the original sales price to the customer. The Company maintains an allowance for doubtful accounts to reflect\n\nestimated losses resulting from the inability of customers to make required payments. On an ongoing basis, the collectibility of accounts receivable is\n\nassessed, based upon historical collection trends, current economic factors, and the assessment of the collectibility of specific accounts. The Company\n\nevaluates the collectibility of specific accounts using a combination of factors, including the age of the outstanding balances, evaluation of customers’\n\ncurrent and past financial condition, recent payment history, current economic environment, and discussions with appropriate Company personnel and\n\nwith the customers directly. Accounts are written off when it is determined the receivable will not be collected.\n\n**I N V E N T O R I E S**\n\nInventories are stated at the lower of cost or market. Cost is determined by using the first-in, first-out method. The following table details the major\n\ncomponents of inventory (in thousands):\n\nDECEMBER 31,\n\n2003 2002\n\nRaw materials $ 5,641\n\n| $ 6,082 2,818 1,411 |\n|:---|\n| $ 10,311 |\n\nFinished goods 4,044\n\nWork in process 1,629\n\nTotal inventories $ 11,314\n\n**I N C O M E T A X E S**\n\nThe Company utilizes the asset and liability approach to financial accounting and reporting for income taxes. Deferred income tax assets and liabilities are\n\ncomputed annually for differences between the financial reporting basis and the tax basis of the Company’s other assets and liabilities. These amounts are\n\nbased on enacted tax laws and rates applicable to the periods in which the differences are expected to affect taxable income.", - "page_start": 13, - "page_end": 13, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "reserves, related to net operating loss carryforwards and certain temporary\n\ndifferences. The standard requires recognition of a future tax benefit to the extent\n\nthat realization of such benefit is more likely than not. Otherwise, a valuation\n\nallowance is applied.\n\nThe income tax provision attributable to continuing operations and discontinued\n\noperations is as follows:\n\nYear Ended December 31 (In thousands)\n\nContinuing operations . . . . . . . . . . . . . . . . . . . . . . . . . **$ 205,959** $ 113,387 $ 168,451\n\nDiscontinued operations . . . . . . . . . . . . . . . . . . . . . . . **31,731** 2,651 4,924\n\n**$ 237,690** $ 116,038 $ 173,375", - "page_start": 67, - "page_end": 67, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "The Company adopted SFAS No. 142 effective January 1, 2002. The required adoption of SFAS No. 142 is considered a change in accounting principle and\n\nthe cumulative effect of adopting this standard resulted in a $1.6 million non-cash, after-tax charge in 2002. This charge had no effect on the Company’s\n\ncash position or the balance of its outstanding indebtedness, and it did not have any impact on earnings from continuing operations in 2002. As previously\n\ndiscussed, the Company recorded a non-cash gain from discontinued operations during 2001 related to the reversal of a reserve established when the\n\nCompany disposed of its natural gas operations in 1997. This gain had no effect on the Company’s cash position or the balance of its outstanding\n\nindebtedness, and it did not have any impact on earnings from continuing operations in 2001.\n\nThe Company believes that its existing cash and cash equivalents, cash flows from operations and borrowings available under the Company’s Credit Facility,\n\nsupplemented, if necessary, with equity or debt financing, which the Company believes would be available, will be sufficient to fund the Company’s cash\n\nrequirements for at least the foreseeable future.\n\nCompanies sometimes establish legal entities for a specific business transaction or activity in the form of a Variable Interest Entity (“VIE”). VIEs may be\n\nused to facilitate off-balance sheet financing, acquire financial assets, raise cash from owned assets and similar transactions. The Company has no VIEs, no\n\noff-balance sheet financing arrangements or any derivative financial instruments.\n\n**I M P A C T O F I N F L AT I O N**\n\nThe Company experiences the effects of inflation primarily in the prices it pays for labor, materials and services. Over the last three years, the Company has\n\nexperienced the effects of moderate inflation in these costs. At times, the Company has been able to offset a portion of these increased costs by increasing\n\nthe sales prices of its products. However, competitive pressures have not allowed for full recovery of these cost increases.\n\n**N E W A C C O U N T I N G P R O N O U N C E M E N T S**\n\nIn December 2003, the Financial Accounting Standards Board (“FASB”) issued a revised SFAS No. 132, “Employers’ Disclosures about Pensions and Other\n\nPostretirement Benefits.” The impact to the Company for this item is described in Note 1 of Notes to the Consolidated Financial Statements.\n\n**C R I T I C A L A C C O U N T I N G P O L I C I E S**\n\nIn the ordinary course of business, the Company makes estimates and assumptions relating to the reporting of results of operations and financial condition\n\nin the preparation of its financial statements in conformity with accounting principles generally accepted in the United States of America. The Company\n\nbelieves the following discussion addresses the Company's most critical accounting policies, which are those that are most important to the portrayal of\n\nthe Company's financial condition and results and require management's most difficult, subjective and complex judgments, often as a result of the need to\n\nmake estimates about the effect of matters that are inherently uncertain. Actual results could differ significantly from those estimates under different\n\nassumptions and conditions.\n\nThe Company assesses the impairment of its long-lived identifiable assets, excluding goodwill which is tested for impairment pursuant to SFAS No. 142 as\n\nexplained below, whenever events or changes in circumstances indicate that the carrying value may not be recoverable. This review is based upon projections\n\nof anticipated future cash flows. While the Company believes that its estimates of future cash flows are reasonable, different assumptions regarding such cash\n\nflows or future changes in the Company’s business plan could materially affect its evaluations. No such changes are anticipated at this time.", - "page_start": 28, - "page_end": 28, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "*consolidated balance sheets as of December 31, 2001 and 2000 and the consolidated statements of income and cash flows for the years ended*\n\n*December 31, 2000 and 1999 referred to in this report have not been included in the accompanying financial statements.*\n\nTo the Stockholders and the Board of Directors of Atrion Corporation:\n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and subsidiaries as of December 31, 2001\n\nand 2000 and the related consolidated statements of income and cash flows for each of the three years in the period ended December 31, 2001. These financial\n\nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audits.\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that we plan and perform the audit\n\nto obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence\n\nsupporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made\n\nby management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion.\n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position of Atrion Corporation and subsidiaries\n\nas of December 31, 2001 and 2000 and the results of their operations and their cash flows for each of the three years in the period ended December 31,\n\n2001 in conformity with accounting principles generally accepted in the United States.\n\nArthur Andersen LLP\n\nAtlanta, Georgia\n\nFebruary 25, 2002", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "Entering 2004, the Company is pleased with the milestone of a profitable quarter in the PCS operation, but recognizes that much work remains to ultimately earn a reasonable return on this investment. The recently announced signing of an addendum to the management and services agreements with Sprint is expected to lead to cost savings and greater certainty in fees paid to Sprint. However, the consolidation predicted for the wireless industry in recent years, including the recently announced Cingular/ATT deal and anticipated improvements in the overall economics of wireless services, has not yet materialized. Future Sprint marketing efforts, designed to meet the competition, could potentially have an unfavorable impact on the Company and lead to additional losses. The risks associated with the Sprint PCS affiliation are described in further detail elsewhere in this document. The Company is now reviewing alternatives for other businesses to further diversify our revenue base, from either a services platform or a geographic concentration.\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**\n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 40\n\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the results of operations for the two months of 2003 that the operation remained a part of the Company.", - "page_start": 41, - "page_end": 41, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "### D I R E C TO R S ’ R E P O R T\n\n30\n\nrequirements of the Corporations Law and the ASX Listing Rules, the Company and Mr Bradley\n\nagreed to defer the first issue of Shares, making both issues conditional on shareholder approval.\n\nThe second agreement was with Clough Engineering Limited, pursuant to which it agreed to take\n\na placement of 3,225,000 Shares by 29 September 2000, followed by, if approved of by shareholders\n\nat the Company’s annual general meeting, 6,775,000 shares, within 7 days of that meeting.\n\nOn 15 June 2000 the Company announced that with effect from 1 July 2000 it acquired a 50%\n\ninterest in OIS MOC Joint Venture Pty Ltd, to be paid for by the issue of 800,000 Shares in the\n\nCompany. OIS MOC Joint Venture Pty Ltd owns the goodwill of a successful labour hire\n\ncompany. That company is to be renamed Mermaid Labour and Management Limited (MLML).\n\nMLML offers a full labour hire service inclusive of industrial relations consultancy, negotiating\n\nagreements and awards and were appropriate, provides ongoing management of the labour force.\n\nThe effective date is 1 July 2000. The Company will issue 800,000 ordinary fully paid shares in\n\nMermaid Marine Australia Limited.\n\nThere have not been any other matters or circumstances, other than those referred to in the\n\nChairman’s and Operations Reviews and/or in the financial statements and notes attached\n\nthereto, that have arisen since the end of the Financial Year that have significantly affected, or\n\nmay significantly affect Mermaid’s operations, the results of those operations or its state of affairs\n\nin future financial years.\n\nThe Chairman’s and Operations Reviews give indications, in general\n\nterms, of likely developments in Mermaid’s operations in future financial years and the expected\n\nresults of those operations.\n\nThe development of the Company’s Dampier and Broome\n\nbases is subject to the approval of the Western Australian Environmental Protection Authority.\n\nAs at the date of this report the Company had a total of 7,115,000 unissued shares\n\nunder option as follows: **30 November 2000 Options**\n\nAs at the date of this report there are outstanding 6,500,000 options to acquire 6,500,000\n\nordinary shares in the Company at an issue price of 0.75 cents per ordinary share. Each of these\n\noptions expires on 30 November 2000.\n\nOn 9 August 2000 the Company announced to the ASX that, subject to shareholder approval\n\nF U T U R E D E V E L O P M E N T S\n\nE N V I RO N M E N TA L R E G U L AT I O N\n\nS H A R E O P T I O N S", - "page_start": 33, - "page_end": 33, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_ATRI_2003.pdf", - "query": "How much share of Atrion's revenues did its major customer representin in 2003 ? ", - "target_page": 21, - "target_passage": "The Company had one major customer which represented approximately $9.1 million (14.4 percent", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "$2.75 per diluted share, in 2003, compared with $2.6 million, or $1.51 per basic and $1.39 per diluted share, in 2002 and $9.8 million, or $4.80 per\n\nbasic and $4.30 per diluted share, in 2001. The Company adopted Statement of Financial Accounting Standards (“SFAS”) No. 142 effective January 1, 2002.\n\nThe required adoption of SFAS No. 142 as discussed in Note 2 to the Company’s Consolidated Financial Statements included herein is considered a change\n\nin accounting principle and the cumulative effect of adopting this standard resulted in a $1.6 million, or $ .96 per basic and $ .88 per diluted share, non-\n\ncash, after-tax charge in 2002.\n\nOperating revenues were $62.8 million in 2003, compared with $59.5 million in 2002 and $57.6 million in 2001. These revenue increases are generally\n\nattributable to higher sales volumes. The 5 percent revenue increase in 2003 over the prior year is primarily attributable to an 8 percent increase in the\n\nrevenues of the Company’s ophthalmic products, an 8 percent increase in the revenues of the Company’s cardiovascular products, a 3 percent increase in\n\nthe Company’s fluid delivery products and a 2 percent increase in the Company’s other medical and non-medical products and services. The 3 percent\n\nrevenue increase in 2002 over the prior year is primarily attributable to an 8 percent increase in the revenues of the Company’s cardiovascular products,\n\na 4 percent increase in the Company’s fluid delivery products and a 4 percent increase in the Company’s other medical and non-medical products and\n\nservices.\n\nThe Company’s cost of goods sold was $40.6 million in 2003, compared with $39.2 million in 2002 and $35.8 million in 2001. The increase in cost of\n\ngoods sold for 2003 over 2002 was primarily related to the increase in revenues discussed above and increased insurance costs partially offset by an\n\nimprovement in manufacturing variances resulting from increased production volumes. The increase in cost of goods sold for 2002 over 2001 was\n\nprimarily related to a shift in product mix, which resulted in lower gross margins, and the increase in revenues discussed above.\n\nGross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company’s gross profit in 2003 was 35\n\npercent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003\n\nA N D A N A L Y S I S O F F I N A N C I A L C O N D I T I O N A N D R E S U L T S O F O P E R A T I O N S", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "Other revenues, primarily consisting of Internet and 511Virginia service revenues were $5.8 million in 2003, an increase of $0.7 million or 13.5%. The Company had 17,420 dial-up Internet subscribers at December 31, 2003, compared to 18,050 at the end of the previous year. During 2003, the Company’s DSL high-speed Internet access subscriber count increased to 1,298 from 646. Total Internet service revenue was $4.5 million, an increase of $0.3 million or 10.7%. The 511Virginia contract with the Virginia Department of Transportation contributed $1.3 million to other revenues, an increase of $0.4 million or 41.3%. Telecommunications equipment sales, services and lease revenues were $1.1 million, which reflects a $0.1 million decrease from 2002 results.\n\nWireline revenues from cable television services were $4.4 million, an increase of $0.1 million or 1.7%. The number of subscribers and service plan prices remained relatively constant during 2003.\n\nBilling and collection services and other revenues contributed $0.4 million to wireline revenues, which was the same as 2002 results. Revenues from this service had declined in recent years, with interexchange carriers now issuing a greater proportion of their bills directly to their customers.\n\nFacility lease revenue contributed $5.5 million to wireline revenues, a decrease of $0.2 million or 3.5%. The decrease was primarily the result of the prolonged decline of lease rates associated with competitive pricing pressures and the economic downturn in the telecommunications industry. During 2002 the Company completed a second, diverse fiber route to its existing interconnection point in the Dulles airport area of Northern Virginia. This fiber route provides increased reliability for customers in the event of fiber cuts or breaks, and extends the availability of the Company’s fiber network to additional market locations but to date has not added additional revenue to the Company’s operation.\n\n47 ■ 2003 ANNUAL REPORT\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 48, - "page_end": 48, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "49 ■ 2003 ANNUAL REPORT\n\nTotal revenue was $93.0 million in 2002, an increase of $24.3 million or 35.3%. Total revenues included $57.9 million of wireless revenues, an increase of $21.7 million or 60.2%; wireline revenues of $28.7 million, an increase of $1.3 million or 4.6%; and other revenues of $6.4 million, an increase of $1.2 million or 24.5%.\n\nWithin wireless revenues, the PCS operation contributed $55.5 million, an increase of $21.4 million, or 63.0%. PCS service revenues were $37.4 million, an increase of $18.3 million or 95.7%. The increase in the subscriber base, which totaled 67,842 at December 31, 2002, was an increase of 20,524 or 43% from the prior year end.\n\nPCS travel revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party’s network, was $16.5 million, an increase of $2.9 million or 21.3%. Travel revenue is impacted by the geographic size of the Company’s network service area, the overall number of Sprint wireless customers, and the travel exchange rate. The rate received on travel was $0.10 per minute in 2002. The rates in 2001 were $0.20 per minute from January 1, 2001 through April 30, 2001; $0.15 per minute from May 1, 2001 through September 30, 2001; and $0.12 per minute from October 1, 2001 through December 31, 2001.\n\nPCS equipment sales were $1.6 million, an increase of $0.3 million or 19.6%. The equipment sales are net of $0.3 million of rebates and discounts given at the time of sale, which became more pronounced during the year to meet industry competition for subscriber additions and subscriber retention.\n\nIn accordance with Sprint’s requirements, the Company launched third generation (3G 1X) service in August 2002. The impact of 3G 1X-network enhancements on revenues was not significant in 2002.\n\nTower leases added $2.1 million to wireless revenues, an increase of $0.4 million or 24.5%. The increase was the result of other wireless carriers executing additional leases to use space on the Company’s portfolio of towers. Of the 82 towers and poles owned by the Company as of December 31, 2002, 46 have tower space leased to other carriers.\n\nWireless revenues from the Company’s paging operation were $0.3 million, a decrease of $0.1 million as the local customer base increasingly chose alternative digital wireless services. Paging service subscribers declined by 7.8% in 2002 from 3,190 subscribers to 2,940 subscribers.\n\nWithin wireline revenues, the Telephone operation contributed $22.5 million, an increase of $0.9 million, or 4.0%. Telephone access revenues were $10.9 million, an increase of $1.4 million or 14.8%. The growth in access revenues was driven by a 38.4% increase in access minutes of use on the Company’s network and an increased percentage of minutes in the intrastate jurisdiction, where rates are higher than the interstate jurisdiction. On January 1, 2002 the Federal subscriber line charge (SLC) for residential customers increased from $3.50 to $5.00 per month. The SLC\n\n## **2002 compared to 2001**\n\n##### **CONTINUING OPERATIONS**\n\nThe Company invested $2.0 million in the Virginia 10 RSA limited partnership in the early 1990’s. The partnership’s local customer base peaked in early 2000 with nearly 12,000 subscribers, then steadily declined to 6,700 by December 31, 2002. The decline was the result of competition with digital technologies and increased competition from national carriers in the area. As a result of the decline in the subscriber base, and the need for extensive capital expenditures to transform the analog network into a digital cellular network, the Company elected to sell its 66% interest in the partnership to one of the minority partners. The agreement was signed in November 2002, and closing was February 28, 2003. The Company’s portion of the net income from its operations for 2003, 2002 and 2001 was $1.2 million, $7.4 million and $6.7 million, respectively.\n\n##### **DISCONTINUED OPERATIONS**", - "page_start": 50, - "page_end": 50, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "##### * **Income Taxes** *\n\nThe Company defers direct subscriber activation costs on subscribers whose activation falls within the SAB 101 guidelines. The activation costs are deferred when incurred, and then amortized using the straight-line method over 30 months, which is the estimated average life of a subscriber. Direct subscriber activation costs also include the activation charge from Sprint, and credit check fees. These fees are charged to the Company by Sprint at approximate $12.50 per subscriber.\n\nTotal revenue was $105.9 million in 2003, an increase of $12.9 million or 13.9%. Total revenues included $70.0 million of wireless revenues, an increase of $12.0 million or 20.7%; wireline revenues of $29.0 million, an increase of $0.3 million or 0.9%; and other revenues of $7.0 million, an increase of $0.6 million or 9.7%.\n\nWithin wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS service revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the increase in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 subscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the churn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the after sales support. Competition in the wireless industry continues to have a significant impact on the results of the Company’s PCS operation.\n\nPCS travel revenue, including reseller revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party’s network, was $16.8 million, an increase of $0.3 million or 1.8%. Travel revenue is impacted by the geographic size of the Company’s network service area, the overall number of Sprint wireless customers, their travel patterns and the travel exchange rate. The rate received on travel was $0.058 per minute in 2003, compared to $0.10 per minute in 2002. As a part of the amended management agreement signed on January 30, 2004, Sprint and the Company agreed to maintain the travel rate at $0.058 per minute through December 31, 2006.\n\n## **2003 compared to 2002**\n\n##### **Results of Continuing Operations**\n\nThe Company does not have any unrecorded off-balance sheet transactions or arrangements, however, the Company has commitments under operating leases and is subject to certain capital calls under one of its investments.\n\n##### * **Other** *\n\nsubsidy. The Company does not receive any revenues from the sale of handsets and accessories by national retailers. The Company classifies these handset subsidy charges as a cost of goods expense.\n\nThrough December 31, 2003, the Agreement provided that Sprint retains 8% of collected service revenues from subscribers based in the Company's markets and from non-Sprint wholesale subscribers who roam onto the Company's network. The amount of revenue retained by Sprint is recorded as an offset to the revenues recorded. All revenues derived from the sale of handsets and accessories by the Company and from certain roaming services (outbound roaming and travel revenues from Sprint and its PCS Affiliate subscribers) are retained by the Company.\n\n45 ■ 2003 ANNUAL REPORT\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 46, - "page_end": 46, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "pretax earnings as illustrated below (in thousands):\n\nYEAR ENDED DECEMBER 31,\n\n2003 2002 2001\n\nIncome tax expense at the statutory federal income tax rate $ 2,298\n\n| $ 1,858 80 — (164) (244) (127) | $ 2,062 220 (68) (52) (352) (7) |\n|:---|:---|\n| $ 1,403 | $ 1,803 |\n\nIncrease (decrease) resulting from:\n\nState income taxes 34\n\nDecrease in valuation allowance —\n\nR&D credit (100)\n\nForeign sales benefit (250)\n\nOther, net (103)\n\nTotal income tax expense $ 1,879\n\nS T O C K H O L D E R S ’ E Q U I T Y\n\nThe Board of Directors of the Company has at various times authorized repurchases of Company stock in open-market or negotiated transactions at such\n\ntimes and at such prices as management may from time to time decide. The Company has effected a number of open-market or negotiated transactions to\n\npurchase its stock during the past three years. These repurchases totaled 20,200, 26,000 and 10,300 shares during the years 2003, 2002 and 2001,\n\nrespectively, at per share prices ranging from $14.02 to $42.42. As of December 31, 2003, authorization for the repurchase of 94,000 additional shares\n\nremained. The Company purchased 173,614 shares of its common stock at $23.00 per share in April 2003 pursuant to a tender offer. The Company\n\npurchased 502,229 shares of its common stock at $34.50 per share in December 2001 pursuant to a tender offer. All shares purchased in the tender offers\n\nand in the open-market or negotiated transactions became treasury shares upon repurchase by the Company.\n\nIn September 2003, the Company announced that it had adopted a policy for the payment of regular quarterly cash dividends on the Company’s common\n\nstock. The Company subsequently paid a quarterly cash dividend of $ .12 per common share in both September and December of 2003.\n\nThe Company has a Common Share Purchase Rights Plan, which is intended to protect the interests of stockholders in the event of a hostile attempt to take\n\nover the Company. The rights, which are not presently exercisable and do not have any voting powers, represent the right of the Company’s stockholders\n\nto purchase at a substantial discount, upon the occurrence of certain events, shares of common stock of the Company or of an acquiring company involved\n\nin a business combination with the Company. In January 2000, this plan, which was adopted in February 1990, was extended until February 2005.\n\nI N C O M E P E R S H A R E\n\nThe following is the computation for basic and diluted income per share from continuing operations:\n\nYEAR ENDED DECEMBER 31,\n\n(IN THOUSANDS, EXCEPT PER SHARE AMOUNTS) 2003 2002 2001\n\nIncome from continuing operations $ 4,892\n\n| $ 4,065 | $ 4,262 |\n|:---|:---|\n| 1,711 152 | 2,033 239 |\n| 1,863 | 2,272 |\n| $ 2.37 $ 2.18 | $ 2.10 $ 1.88 |\n\nWeighted average basic shares outstanding 1,711\n\nAdd: Effect of dilutive securities (options) 128\n\nWeighted average diluted shares outstanding 1,839\n\nIncome per share from continuing operations:\n\nBasic $ 2.86\n\nDiluted $ 2.66\n\nFor the years ended December 31, 2003, 2002 and 2001, options to purchase approximately 25,250, 40,625 and 7,800 shares of common stock,\n\nrespectively, were not included in the computation of diluted income per share because their effect would have been antidilutive.\n\n6\n\n7", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "tender offer. The other income in 2001 was primarily related to the Company’s one-time pre-tax gain of $428,000 on the sale of a patent.\n\nIncome tax expense in 2003 totaled $1.9 million, compared with $1.4 million in 2002 and $1.8 million in 2001. The effective tax rates for 2003, 2002 and\n\n2001 were 27.8 percent, 25.7 percent and 29.7 percent, respectively. Benefits from tax incentives for exports and R&D expenditures totaled $350,000 in\n\n2003, $408,000 in 2002 and $404,000 in 2001. The higher effective tax rate in 2003 is primarily a result of benefits from tax incentives for exports and\n\nR&D expenditures being a lesser percentage of taxable income in 2003 than in 2002. The lower effective tax rate in 2002 is primarily a result of benefits\n\nfrom tax incentives for exports and R&D expenditures being a larger percentage of taxable income in 2002 than in 2001 and the utilization of capital loss\n\ncarryforwards in 2002.\n\nThe Company believes that 2004 revenues will be higher than 2003 revenues and that the cost of goods sold, gross profit, operating income and income\n\nfrom continuing operations will each be higher in 2004 than in 2003. The Company further believes that it will have continuing volume growth in most of\n\nits product lines in 2004, complemented by the introduction of new products, and that it will achieve a double-digit annual rate of growth in earnings per\n\nshare from continuing operations for the next several years.\n\n**D I S C O N T I N U E D O P E R AT I O N S**\n\nDuring 1997, the Company sold all of its natural gas operations. The financial statements presented herein reflect the Company’s natural gas operations as\n\ndiscontinued operations for all periods presented. The financial statements also reflect an after-tax gain on disposal of these discontinued operations of\n\n$ .2 million, or $ .10 per basic and $ .09 per diluted share, in both 2003 and 2002, and $5.5 million, or $2.70 per basic and $2.42 per diluted share, in 2001.\n\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to\n\n$250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon\n\nrevenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from\n\nthe purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001\n\ngain also includes a $5,327,000 non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997.\n\nThis reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets.", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "32\n\nThe following discussion of the Company’s historical results of opera-\n\ntions and of its liquidity and capital resources should be read in\n\nconjunction with the Consolidated Financial Statements of the\n\nCompany and related notes.\n\n####### **Overview**\n\nThe Company has two reportable core operating segments: office furni-\n\nture and hearth products. The Company is the second largest office\n\nfurniture manufacturer in the United States and the nation’s leading\n\nmanufacturer and marketer of gas- and wood-burning fireplaces.\n\nFrom 2000 to 2003, the office furniture industry experi-\n\nenced an unprecedented three-year decline due to the challenging\n\neconomic environment. In 2003, this decline negatively impacted the\n\nCompany’s office furniture segment. In contrast, the housing market\n\nwas at record high levels during 2003, which positively impacted the\n\nCompany’s hearth segment. The Company outperformed its peers in\n\nboth segments in which it competes. The Company gained market\n\nshare by providing strong brands, innovative products and services,\n\nand greater value to its end-users. Fiscal 2003 also included an extra\n\nweek of activity due to the Company’s 52/53-week fiscal year.\n\nNet sales were $1.8 billion in 2003, as compared to $1.7 bil-\n\nlion in 2002. The increase in net sales reflects the 9% increase in the\n\nhearth segment and the additional week of business activity. In 2003\n\nand 2002, the Company recorded restructuring charges and accelerated\n\ndepreciation related to the closure and consolidation of office furniture\n\nfacilities totaling $15.2 million and $3.0 million, respectively. Gross\n\nmargins increased to 36.4% in 2003 from 35.4% in 2002 due to benefits\n\nfrom restructuring initiatives and its rapid continuous improvement\n\nprogram, new products, and increased price realization. The Company\n\nalso invested aggressively in brand building and selling initiatives in\n\n2003. Net income was $98.1 million or $1.68 per diluted share in 2003,\n\nas compared to $91.4 million or $1.55 per diluted share in 2002.\n\nThe Company generated $141.3 million in cash flow from\n\noperating activities and increased its cash position, including short-\n\nterm investments, by $48.6 million to $204.2 million. The Company\n\npaid dividends of $30.3 million and repurchased $21.5 million of its\n\ncommon stock, while investing $35.7 million in net capital expendi-\n\ntures and repaying $20.2 million of debt.\n\n####### **Critical Accounting Policies and Estimates**\n\n* **GEN ERAL** *\n\nManagement’s Discussion and Analysis of Financial Condition and\n\nResults of Operations is based upon the Consolidated Financial\n\nStatements, which have been prepared in accordance with GAAP. The\n\npreparation of these financial statements requires management to\n\nmake estimates and assumptions that affect the reported amounts of\n\nassets, liabilities, revenue and expenses, and related disclosure of con-\n\ntingent assets and liabilities. Management bases its estimates on\n\nhistorical experience and on various other assumptions that are\n\nbelieved to be reasonable under the circumstances, the results of which\n\nform the basis for making judgments about the carrying values of assets\n\nand liabilities that are not readily apparent from other sources. Senior\n\nmanagement has discussed the development, selection and disclosure\n\nof these estimates with the Audit Committee of our Board of Directors.\n\nActual results may differ from these estimates under different assump-\n\ntions or conditions.\n\nAn accounting policy is deemed to be critical if it requires an\n\naccounting estimate to be made based on assumptions about matters\n\nthat are uncertain at the time the estimate is made, and if different\n\nestimates that reasonably could have been used, or changes in the\n\naccounting estimates that are reasonably likely to occur periodically,\n\ncould materially impact the financial statements. Management believes\n\nthe following critical accounting policies reflect its more significant", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Over the years, we have learned that there are certain clear prerequisites to growth. Our path to growth is grounded on\n\nthese basic fundamentals: Managing our assets wisely. Making products that meet specific market needs. And maintaining\n\nour keen focus on productivity and profitability. It is our steady and consistent focus on the fundamentals that has\n\nenabled us to build strength and create an environment for growth, through favorable or unfavorable conditions in the\n\nmarket and the economy.\n\n####### **We manage our assets and resources carefully.**\n\nOur financial strategy centers on building the strength and stability that will position our company for\n\nongoing growth. We approach the management of our resources with discipline and diligence, striking the\n\nbalance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a\n\nstrong financial foundation, and investing in the resources, technology and assets that will ensure operating\n\nefficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial\n\nresults for 2003.\n\nFor the fifth consecutive year, Atrion’s earnings per diluted share from continuing operations increased\n\nby more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of\n\nthe economic pressures which have challenged virtually every business in recent years, we view five\n\nconsecutive years of EPS growth—ranging from 16 percent to over 50 percent—as a sign of solid financial\n\nstrength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09\n\nper share, net income totaled $2.75 per diluted share for 2003.\n\nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return\n\non equity (a) , which provides a good indication of how well we are utilizing investors’ dollars, has steadily\n\nincreased in recent years, from five percent in 1999 to 12 percent in 2003. This compares favorably to the\n\naverage return on equity for our industry, reported at 10.7 percent by statistical research sources.\n\nThe company’s ability to generate strong cash flow continued to flourish in 2003. This is a key strength\n\nfor our company, as it enables us to pursue a number of value-creating initiatives.\n\n- We initiated the payment of quarterly dividends on the company’s common stock in\n\nSeptember 2003. Recent changes in tax laws make this an efficient avenue for\n\nproviding a return to our shareholders and, with continuing growth in earnings and\n\ncash flow, we plan to increase the dividend periodically.\n\n- We repurchased 193,814 shares of our common stock in 2003. Over the last five\n\nyears, we have repurchased nearly two million shares of our stock, a strategy we\n\nregard as a wise investment for our company and our stockholders.\n\n- We reduced debt by $6 million, from $10.3 million at the end of 2002 to $4.3 million\n\nat year-end 2003.\n\n1999 2000 2001 2002 2003\n\n$2.70\n\n$3.92\n\n$4.78\n\n$5.48\n\n$6.33\n\n1\n\n2\n\n3\n\n4\n\n5\n\n$7\n\n6\n\nEBITDA Per Diluted Share From\n\nContinuing Operations <sup>(a)</sup>\n\n## 2\n\n###### T O O U R S T O C K H O L D E R S\n\n*(a) This is a non-GAAP financial measure*\n\n*which is defined and reconciled to GAAP*\n\n*on page 7 of this report.*", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "For the Company’s wireless customers that purchase and activate their service through a channel not covered by EITF 00-21, the wireless customers generally pay an activation fee to the Company when they initiate service. The Company defers the activation fee revenue (except when a special promotion reduces or waives the fee) over the average life of its subscribers, which is estimated to be 30 months. The Company recognizes service revenue from its subscribers as they use the service. The Company provides a reduction of recorded revenue for billing adjustments and the portion of revenue (8%) that is retained by Sprint. The Company also reduces recorded revenue for rebates and discounts given to subscribers on wireless handset sales in accordance with (\"EITF\") Issue No. 01-9 “Accounting for Consideration Given by a Vendor to a Subscriber (Including a Reseller of the Vendor's Products).” The Company\n\n##### * **Revenue Recognition** *\n\nBad Debt expense summary, net of recoveries for the three years ended December 31, 2003:\n\nIn thousands **2003** 2002 2001 PCS subscribers **$1,716** $ 3,744 $ 1,241 Interexchange carriers **48** 488 - Other subscribers and entities **71** 170 82 Total bad debt expense **$1,835** $ 4,402 $ 1,323\n\ncarrier accounts, but due to the telecommunication industry down-turn of the last few years, the Company experienced write-offs in this area of the business totaling $0.5 million in 2002, due to bankruptcy filings of several significant telecommunications companies. In 2003, the inter-carrier segment of the business improved and the Company recovered $240 thousand of bad debt from the sale of certain accounts that were previously written-off.\n\n**2003** 2002 2001", - "page_start": 45, - "page_end": 45, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "The increase in aggregate dollars in all periods presented is primarily a result of the expansion of our\n\noperations through internal growth and acquisitions.\n\nThe increase in cost of operations as a percentage of revenue from 2002 to 2003 and the decrease in cost\n\nof operations as a percentage of revenue from 2003 to 2004 is primarily attributable to higher self-insurance\n\nexpense in 2003. Self-insurance expense was $165.3 million, $189.5 million and $138.1 million for the years\n\nended December 31, 2004, 2003 and 2002, respectively. The increase in self-insurance expense in 2003 related\n\nto existing claims and was attributable to the expansion of our operations and various changes in estimates as a\n\nresult of continued negative trends through the 2003 policy year.\n\nExcluding self-insurance expense, cost of operations as a percentage of revenue increased during the year\n\nended December 31, 2004 versus the comparable 2003 period. This increase is primarily attributable to\n\nincreased fuel prices, labor costs and subcontracting costs associated with the long-haul transport of waste by\n\nthird-party vendors. Excluding self-insurance expense, cost of operations as a percentage of revenue decreased\n\nin 2003 versus the comparable 2002 period due to the elimination of closure and post-closure expense as a\n\ncomponent of cost of operations in accordance with SFAS 143 in 2003 and the termination of our operating\n\nlease facility in July 2002. This decrease was partially oÅset by increased fuel prices, an increase in waste taxes\n\nlevied on landÑll volumes in certain states, an increase in revenue generated by lines of business that produce\n\nlower operating margins and an increase in the long-haul transport of waste by third-party vendors.\n\nTo date in 2005, we have experienced a signiÑcant increase in fuel prices. We believe that cost of\n\noperations as a percentage of revenue may continue to remain high depending upon the cost of fuel, health\n\ninsurance, risk insurance and other key components of our cost structure and general economic conditions.\n\n*Depreciation, Amortization and Depletion of Property and Equipment.* Depreciation, amortization and\n\ndepletion expenses for property and equipment were $252.4 million, $233.8 million and $193.5 million, or, as a\n\npercentage of revenue, 9.3%, 9.3% and 8.2%, for the years ended December 31, 2004, 2003 and 2002,\n\nrespectively. The increase in aggregate dollars from 2003 to 2004 is primarily due to the expansion of our\n\noperations through internal growth and acquisitions. The increase in aggregate dollars and as a percentage of\n\nrevenue from 2002 to 2003 is primarily due to an increase in landÑll amortization associated with the adoption\n\nof SFAS 143. The remaining increase from 2002 to 2003 is due to increased depreciation expense resulting\n\nfrom capital expenditures, acquisitions and the purchase of equipment originally placed into service pursuant\n\nto an operating lease.\n\n*Amortization of Intangible Assets.* Intangible assets consist primarily of cost in excess of fair value of\n\nnet assets acquired, but also includes values assigned to long-term contracts, covenants not to compete and\n\ncustomer relationships. Expenses for amortization of intangible assets were $7.0 million, $5.3 million and\n\n$6.1 million, or, as a percentage of revenue, .3%, .2% and .2%, for the years ended December 31, 2004, 2003\n\nand 2002, respectively. The increase in such expenses in aggregate dollars and as a percentage of revenue from\n\n2003 to 2004 is primarily due to amortization expense on amounts that were recorded in other intangible assets\n\nduring the three months ended September 30, 2004 resulting from an extensive internal review of all recent\n\nacquisitions. The increase in amortization of intangible assets in aggregate dollars is also due to the\n\namortization of intangible assets associated with businesses acquired during 2004.", - "page_start": 43, - "page_end": 43, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_ATRI_2003.pdf", - "query": "What was Atrion's gross profit in 2003 (in thousands) ? ", - "target_page": 10, - "target_passage": "Gross Profit 22,239", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "$2.75 per diluted share, in 2003, compared with $2.6 million, or $1.51 per basic and $1.39 per diluted share, in 2002 and $9.8 million, or $4.80 per\n\nbasic and $4.30 per diluted share, in 2001. The Company adopted Statement of Financial Accounting Standards (“SFAS”) No. 142 effective January 1, 2002.\n\nThe required adoption of SFAS No. 142 as discussed in Note 2 to the Company’s Consolidated Financial Statements included herein is considered a change\n\nin accounting principle and the cumulative effect of adopting this standard resulted in a $1.6 million, or $ .96 per basic and $ .88 per diluted share, non-\n\ncash, after-tax charge in 2002.\n\nOperating revenues were $62.8 million in 2003, compared with $59.5 million in 2002 and $57.6 million in 2001. These revenue increases are generally\n\nattributable to higher sales volumes. The 5 percent revenue increase in 2003 over the prior year is primarily attributable to an 8 percent increase in the\n\nrevenues of the Company’s ophthalmic products, an 8 percent increase in the revenues of the Company’s cardiovascular products, a 3 percent increase in\n\nthe Company’s fluid delivery products and a 2 percent increase in the Company’s other medical and non-medical products and services. The 3 percent\n\nrevenue increase in 2002 over the prior year is primarily attributable to an 8 percent increase in the revenues of the Company’s cardiovascular products,\n\na 4 percent increase in the Company’s fluid delivery products and a 4 percent increase in the Company’s other medical and non-medical products and\n\nservices.\n\nThe Company’s cost of goods sold was $40.6 million in 2003, compared with $39.2 million in 2002 and $35.8 million in 2001. The increase in cost of\n\ngoods sold for 2003 over 2002 was primarily related to the increase in revenues discussed above and increased insurance costs partially offset by an\n\nimprovement in manufacturing variances resulting from increased production volumes. The increase in cost of goods sold for 2002 over 2001 was\n\nprimarily related to a shift in product mix, which resulted in lower gross margins, and the increase in revenues discussed above.\n\nGross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company’s gross profit in 2003 was 35\n\npercent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003\n\nA N D A N A L Y S I S O F F I N A N C I A L C O N D I T I O N A N D R E S U L T S O F O P E R A T I O N S", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "###### C O R P O R A T E I N F O R M A T I O N\n\n####### **C o r p o r a t e O f f i c e :**\n\nAtrion Corporation\n\nOne Allentown Parkway\n\nAllen, Texas 75002\n\n(972) 390-9800\n\nwww.atrioncorp.com\n\n####### **R e g i s t r a r a n d T r a n s f e r A g e n t**\n\nAmerican Stock Transfer and Trust Company\n\n59 Maiden Lane\n\nNew York, New York 10007\n\n####### **F o r m 1 0 - K**\n\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange\n\nCommission, may be obtained by any stockholder without charge by written request to:\n\n*Corporate Secretary*\n\n*Atrion Corporation*\n\n*One Allentown Parkway*\n\n*Allen, Texas 75002*\n\n####### **S t o c k I n f o r m a t i o n**\n\nThe Company’s common stock is traded on The Nasdaq Stock Market (Symbol: ATRI). As of March 8, 2004, there were\n\napproximately 1,200 stockholders, including beneficial owners holding shares in nominee or “street” name. The table below\n\nsets forth the high and low closing prices on The Nasdaq Stock Market and the quarterly dividends per share declared by the\n\nCompany for each quarter of 2002 and 2003.\n\n2002 Quarter Ended High Low Dividends\n\nMarch 31 $ 38.14\n\n| $ 26.91 26.82 18.31 17.31 | $ — — — — |\n|:---|:---|\n| Low | Dividends |\n| $ 17.95 22.75 26.80 40.00 | $ — — .12 .12 |\n\nJune 30 32.51\n\nSeptember 30 28.09\n\nDecember 31 23.90\n\n2003 Quarter Ended High\n\nMarch 31 $ 22.85\n\nJune 30 30.80\n\nSeptember 30 45.20\n\nDecember 31 50.00\n\nThe Company paid no cash dividends on its common stock during 2002. In the third quarter of 2003 the Company began paying\n\nquarterly cash dividends and presently plans to pay quarterly cash dividends in the future.\n\n*MPS and LacriCATH are registered trademarks of Atrion Corporation*", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "tender offer. The other income in 2001 was primarily related to the Company’s one-time pre-tax gain of $428,000 on the sale of a patent.\n\nIncome tax expense in 2003 totaled $1.9 million, compared with $1.4 million in 2002 and $1.8 million in 2001. The effective tax rates for 2003, 2002 and\n\n2001 were 27.8 percent, 25.7 percent and 29.7 percent, respectively. Benefits from tax incentives for exports and R&D expenditures totaled $350,000 in\n\n2003, $408,000 in 2002 and $404,000 in 2001. The higher effective tax rate in 2003 is primarily a result of benefits from tax incentives for exports and\n\nR&D expenditures being a lesser percentage of taxable income in 2003 than in 2002. The lower effective tax rate in 2002 is primarily a result of benefits\n\nfrom tax incentives for exports and R&D expenditures being a larger percentage of taxable income in 2002 than in 2001 and the utilization of capital loss\n\ncarryforwards in 2002.\n\nThe Company believes that 2004 revenues will be higher than 2003 revenues and that the cost of goods sold, gross profit, operating income and income\n\nfrom continuing operations will each be higher in 2004 than in 2003. The Company further believes that it will have continuing volume growth in most of\n\nits product lines in 2004, complemented by the introduction of new products, and that it will achieve a double-digit annual rate of growth in earnings per\n\nshare from continuing operations for the next several years.\n\n**D I S C O N T I N U E D O P E R AT I O N S**\n\nDuring 1997, the Company sold all of its natural gas operations. The financial statements presented herein reflect the Company’s natural gas operations as\n\ndiscontinued operations for all periods presented. The financial statements also reflect an after-tax gain on disposal of these discontinued operations of\n\n$ .2 million, or $ .10 per basic and $ .09 per diluted share, in both 2003 and 2002, and $5.5 million, or $2.70 per basic and $2.42 per diluted share, in 2001.\n\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to\n\n$250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon\n\nrevenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from\n\nthe purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001\n\ngain also includes a $5,327,000 non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997.\n\nThis reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets.", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "##### * **Cost of Revenues and Gross Margin** *\n\n**Three Months Ended**\n\n**September 30, Change**\n\n**Nine Months Ended**\n\n**September 30, Change**\n\n(Dollars in millions) **2024 2023 $ % 2024 2023 $ %**\n\nCost of revenues\n\nAutomotive sales $ 15,743 $ 15,656 $ 87 1 % $ 45,602 $ 47,919 $ (2,317) (5)%\n\nAutomotive leasing 247 301 (54) (18)% 761 972 (211) (22)%\n\nTotal automotive cost of\n\nrevenues 15,990 15,957 33 0 % 46,363 48,891 (2,528) (5)%\n\nServices and other 2,544 2,037 507 25 % 7,192 5,723 1,469 26 %\n\nTotal automotive & services and\n\nother segment cost of revenues 18,534 17,994 540 3 % 53,555 54,614 (1,059) (2)%\n\nEnergy generation and storage\n\nsegment 1,651 1,178 473 40 % 5,157 3,770 1,387 37 %\n\nTotal cost of revenues $ 20,185 $ 19,172 $ 1,013 5 % $ 58,712 $ 58,384 $ 328 1 %\n\nGross profit total automotive $ 4,026 $ 3,668 $ 10,909 $ 11,965\n\nGross margin total automotive 20.1 % 18.7 % 19.0 % 19.7 %\n\nGross profit total automotive &\n\nservices and other segment $ 4,272 $ 3,797 $ 11,403 $ 12,395\n\nGross margin total automotive &\n\nservices and other segment 18.7 % 17.4 % 17.6 % 18.5 %\n\nGross profit energy generation and\n\nstorage segment $ 725 $ 381 $ 1,868 $ 827\n\nGross margin energy generation and\n\nstorage segment 30.5 % 24.4 % 26.6 % 18.0 %\n\nTotal gross profit $ 4,997 $ 4,178 $ 13,271 $ 13,222\n\nTotal gross margin 19.8 % 17.9 % 18.4 % 18.5 %\n\n*Automotive & Services and Other Segment*\n\nCost of automotive sales revenue increased $87 million, or 1%, in the three months ended September 30, 2024 as\n\ncompared to the three months ended September 30, 2023 due to the increases in deliveries year over year as discussed above,\n\npartially offset by a decrease in the average combined cost per unit of our vehicles primarily from lower raw material costs,\n\nfreight and duties as well as mix.\n\nCost of automotive sales revenue decreased $2.32 billion, or 5%, in the nine months ended September 30, 2024 as\n\ncompared to the nine months ended September 30, 2023 due to a decrease in the average combined cost per unit of our vehicles\n\nprimarily from lower raw material costs, freight and duties as well as mix, in addition to the volume changes in deliveries year\n\nover year as discussed above. The decreases were partially offset by higher costs for Cybertruck and the updated Model 3 at our\n\nFremont factory as a result of the temporary under-utilization of manufacturing capacity as production ramps.\n\nCost of automotive leasing revenue decreased $54 million, or 18%, in the three months ended September 30, 2024 as\n\ncompared to the three months ended September 30, 2023. Cost of automotive leasing revenue decreased $211 million, or 22%,\n\nin the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The decreases were\n\nprimarily due to a decrease in direct sales-type leasing cost of revenue driven by lower deliveries and a decrease in our direct\n\noperating lease cost of revenue driven by lower lease payoffs compared to the prior periods.\n\nCost of services and other revenue increased $507 million, or 25%, in the three months ended September 30, 2024 as\n\ncompared to the three months ended September 30, 2023. Cost of services and other revenue increased $1.47 billion, or 26%, in\n\nthe nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases were\n\nprimarily due to volume increases in used vehicle sales, insurance services, paid Supercharging, non-warranty maintenance\n\nservices and collision and part sales.\n\n30", - "page_start": 37, - "page_end": 37, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "36\n\n* **O FFI CE FURNI TURE** *\n\nOffice furniture comprised 74% of consolidated net sales for 2003 and\n\n76% of consolidated net sales for 2002 and 2001. Net sales for office\n\nfurniture increased 2% in 2003 and decreased 6% in 2002. The\n\nincrease in 2003 is due to the increased week from the Company’s\n\n52/53-week fiscal year. The office furniture industry has experienced an\n\nunprecedented three-year decline in shipments. The Business and\n\nInstitutional Furniture Manufacturer’s Association (BIFMA) reported\n\n2003 shipments down over 5% and 2002 shipments down 19%. The\n\nCompany’s estimated share of the market based on reported office\n\nfurniture shipments increased to 15.3% in 2003 compared to 14.4%\n\nin 2002 and 12.4% in 2001. This increase was achieved by provid-\n\ning strong brands, innovative products and services, and greater value\n\nto end-users.\n\nOperating profit as a percent of sales was 10.0% in 2003,\n\n10.2% in 2002, and 8.2% in 2001. Included in 2003 were $15.2 million\n\nof net pretax charges related to the closure of two office furniture\n\nfacilities, which impacted operating margins by 1.1 percentage points.\n\nIncluded in 2002 were $3.0 million of restructuring charges, which\n\nimpacted operating margins by 0.2 percentage points, and 2001\n\nincluded $22.5 million of restructuring charges, which impacted oper-\n\nating margins by 1.7 percentage points. The increase in operating\n\nmargins is due to increased gross profit from the benefits of restructur-\n\ning initiatives, rapid continuous improvement programs, and increased\n\nprice realization, offset by additional investments in brand building and\n\nselling initiatives and increased freight expense.\n\n* **HEARTH PRO D UCTS** *\n\nHearth products sales increased 9% in 2003 and decreased 3% in 2002,\n\nrespectively. The growth in 2003 was attributable to strong housing\n\nstarts, growth in market share in both the new construction and retail\n\nchannels, strengthening alliances with key distributors and dealers, as\n\nwell as focused new product introductions. The decrease in 2002 was\n\nmainly due to pruning out less profitable product lines.\n\nOperating profit as a percent of sales in 2003 was 12.1% com-\n\npared to 10.8% and 9.2% in 2002 and 2001, respectively. The improved\n\nprofitability in 2003 was the result of leveraging fixed costs over a\n\nhigher sales volume and increased sales through company-owned dis-\n\ntribution offset by increased freight costs and higher labor costs from\n\nincreased use of overtime and temporary labor to meet record levels of\n\ndemand. The increase in 2002 was mainly due to discontinuance of\n\ngoodwill and indefinite-lived intangible amortization of approximately\n\n$7 million due to the adoption of SFAS 142.\n\n####### **Liquidity and Capital Resources**\n\nDuring 2003, cash flow from operations was $141.3 million, which\n\nalong with funds from stock option exercises under employee stock\n\nplans, provided the funds necessary to meet working capital needs,\n\ninvest in capital improvements, repay long-term debt, repurchase com-\n\nmon stock, and pay increased dividends.\n\nCash, cash equivalents, and short-term investments totaled\n\n$204.2 million at the end of 2003 compared to $155.5 million at the\n\nend of 2002 and $78.8 million at the end of 2001. The Company used\n\napproximately $80 million of cash to acquire Paoli Inc. on January 5,\n\n2004. These remaining funds, coupled with cash from future opera-\n\ntions and additional long-term debt, if needed, are expected to be\n\nadequate to finance operations, planned improvements, and internal\n\ngrowth. The Company is not aware of any known trends or demands,\n\ncommitments, events, or uncertainties that are reasonably likely to\n\nresult in its liquidity increasing or decreasing in any material way.\n\nThe Company places special emphasis on the management\n\nand reduction of its working capital with a particular focus on trade\n\nreceivables and inventory levels. The success achieved in managing", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "initiatives, business simplification, new products, and improved price\n\nrealization. Included in 2003 gross profit was $6.7 million of acceler-\n\nated depreciation, which reduced gross profits 0.4 percentage points.\n\nThe Company expects to mitigate any future increases in material costs\n\nthrough various initiatives, including alternative materials and sup-\n\npliers and its rapid continuous improvement program.\n\n* **S EL LI N G AN D AD MI N I S TRATI VE EXPEN S ES** *\n\nSelling and administrative expenses, excluding restructuring charges,\n\nincreased 5.8% in 2003 and decreased 2.2% in 2002. The increase in\n\n2003 was due to additional investment of approximately $14 million in\n\nbrand building and selling initiatives, and increased freight costs of\n\n$7 million due to rate increases, fuel surcharges, and volume. The\n\ndecrease in 2002 was due to no longer amortizing goodwill and certain\n\nother intangible assets of approximately $9 million and lower overall", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "####### **Retail Business Gross Profit**\n\nThe following table summarizes the Retail Business gross profit:\n\n**Fiscal year 2014 2013 2012**\n\nRetail gross profit <sup>1</sup> **$4,709** $4,434 $4,335\n\nRetail gross profit as a % of net sales **35.9%** 36.4% 36.9%\n\nEnding inventory per square foot <sup>2</sup> **$64.05** $58.84 $53.77\n\nInventory turnover rate <sup>3</sup> **4.67** 5.07 5.37\n\n1 Retailers do not uniformly record the costs of buying and occupancy and supply chain operations (freight, purchasing, receiving, distribution, etc.) between gross profit and\n\nselling, general and administrative expense. As such, our gross profit and selling, general and administrative expenses and rates may not be comparable to other retailers’\n\nexpenses and rates.\n\n2 Ending inventory includes pack and hold inventory of $222, $173 and $125 in 2014, 2013 and 2012, which represents strategic purchases of merchandise for upcoming selling\n\nseasons.\n\n3 Inventory turnover rate is calculated as annual cost of sales and related buying and occupancy costs (for all segments) divided by 4-quarter average inventory. Retailers do not\n\nuniformly calculate inventory turnover as buying and occupancy costs may be included in selling, general and administrative expenses. As such, our inventory turnover rates\n\nmay not be comparable to other retailers.", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Revenues from continuing operations $ 62,803,000\n\n| $ 59,533,000 5,782,000 4,065,000 $ 2.18 1,863,000 |\n|:---|\n| 2002 |\n| $ 60,807,000 14,787,000 10,337,000 $ 41,691,000 |\n\nOperating income 6,923,000\n\nIncome from continuing operations 4,892,000\n\nEarnings per diluted share from continuing operations $ 2.66\n\nWeighted average diluted shares outstanding 1,839,000\n\nTotal assets $ 60,050,000\n\nWorking capital 13,803,000\n\nLong-term debt 4,287,000\n\nStockholders’ equity $ 44,604,000\n\nFor the year ended December 31, 2003 2002\n\nAs of December 31, 2003\n\n1999 2000 2001 2002 2003 1999 2000 2001 2002 2003 1999 2000 2001 2002 2003\n\n.50\n\n1.00\n\n1.50\n\n2.00\n\n2.50\n\n$3.00\n\n60\n\n$70\n\n50\n\n40\n\n30\n\n20\n\n10\n\n6.0 $7.0\n\n5.0\n\n4.0\n\n3.0\n\n2.0\n\n1.0\n\n*Earnings Per Diluted Share From*\n\n*Continuing Operations*\n\n*Revenues*\n\n*(In millions)*\n\n*Operating Income*\n\n*(In millions)*\n\n#### 2 0 0 3 F I N A N C I A L H I G H L I G H T S\n\n## 1", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "Over the years, we have learned that there are certain clear prerequisites to growth. Our path to growth is grounded on\n\nthese basic fundamentals: Managing our assets wisely. Making products that meet specific market needs. And maintaining\n\nour keen focus on productivity and profitability. It is our steady and consistent focus on the fundamentals that has\n\nenabled us to build strength and create an environment for growth, through favorable or unfavorable conditions in the\n\nmarket and the economy.\n\n####### **We manage our assets and resources carefully.**\n\nOur financial strategy centers on building the strength and stability that will position our company for\n\nongoing growth. We approach the management of our resources with discipline and diligence, striking the\n\nbalance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a\n\nstrong financial foundation, and investing in the resources, technology and assets that will ensure operating\n\nefficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial\n\nresults for 2003.\n\nFor the fifth consecutive year, Atrion’s earnings per diluted share from continuing operations increased\n\nby more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of\n\nthe economic pressures which have challenged virtually every business in recent years, we view five\n\nconsecutive years of EPS growth—ranging from 16 percent to over 50 percent—as a sign of solid financial\n\nstrength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09\n\nper share, net income totaled $2.75 per diluted share for 2003.\n\nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return\n\non equity (a) , which provides a good indication of how well we are utilizing investors’ dollars, has steadily\n\nincreased in recent years, from five percent in 1999 to 12 percent in 2003. This compares favorably to the\n\naverage return on equity for our industry, reported at 10.7 percent by statistical research sources.\n\nThe company’s ability to generate strong cash flow continued to flourish in 2003. This is a key strength\n\nfor our company, as it enables us to pursue a number of value-creating initiatives.\n\n- We initiated the payment of quarterly dividends on the company’s common stock in\n\nSeptember 2003. Recent changes in tax laws make this an efficient avenue for\n\nproviding a return to our shareholders and, with continuing growth in earnings and\n\ncash flow, we plan to increase the dividend periodically.\n\n- We repurchased 193,814 shares of our common stock in 2003. Over the last five\n\nyears, we have repurchased nearly two million shares of our stock, a strategy we\n\nregard as a wise investment for our company and our stockholders.\n\n- We reduced debt by $6 million, from $10.3 million at the end of 2002 to $4.3 million\n\nat year-end 2003.\n\n1999 2000 2001 2002 2003\n\n$2.70\n\n$3.92\n\n$4.78\n\n$5.48\n\n$6.33\n\n1\n\n2\n\n3\n\n4\n\n5\n\n$7\n\n6\n\nEBITDA Per Diluted Share From\n\nContinuing Operations <sup>(a)</sup>\n\n## 2\n\n###### T O O U R S T O C K H O L D E R S\n\n*(a) This is a non-GAAP financial measure*\n\n*which is defined and reconciled to GAAP*\n\n*on page 7 of this report.*", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "Goodwill for 2003 acquisitions totaled approximately $21.2 million. As of December 31, 2003, we had\n\ngoodwill, net of accumulated amortization, of $1,558.1 million. $27.7 million of the total purchase price paid\n\nfor acquisitions and contingent payments to former owners was allocated to landÑll airspace.\n\nGoodwill for 2002 acquisitions totaled approximately $40.1 million. As of December 31, 2002, we had\n\ngoodwill, net of accumulated amortization, of $1,544.2 million.\n\n####### **Consolidated Results of Operations**\n\n####### * **Years Ended December 31, 2004, 2003 and 2002** *\n\nOur income before cumulative eÅect of changes in accounting principles was $237.9 million for the year\n\nended December 31, 2004, as compared to $215.4 million in 2003 and $239.6 million in 2002. Net income was\n\n$237.9 million for year ended December 31, 2004, or $1.53 per diluted share, as compared to $177.6 million,\n\nor $1.10 per diluted share, in 2003 and $239.6 million, or $1.44 per diluted share, in 2002. Net income for the\n\nyear ended December 31, 2003 includes an after-tax expense of $37.8 million (net of an income tax beneÑt of\n\n$23.1 million), or $.23 per share, as a cumulative eÅect of a change in accounting principle resulting from the\n\nadoption of Statement of Financial Accounting Standards No. 143, \"\"Accounting for Asset Retirement\n\nObligations,'' and a change in accounting principle for our methane gas collection systems. See Note 1, Basis\n\nof Presentation, of the Notes to our Consolidated Financial Statements for further discussion of these changes\n\nin accounting principles. Our operating results for the year ended December 31, 2002 include other charges\n\n(income) described below.\n\nThe following table summarizes our costs and expenses in millions of dollars and as a percentage of our\n\nrevenue for 2002 through 2004:\n\n**2004 2003 2002**\n\n**$ % $ % $ %**\n\nRevenue ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $2,708.1 100.0% $2,517.8 100.0% $2,365.1 100.0%\n\nCost of operations ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 1,714.4 63.3 1,605.4 63.8 1,472.9 62.3\n\nDepreciation, amortization and\n\ndepletion of property and\n\nequipment ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 252.4 9.3 233.8 9.3 193.5 8.2\n\nAmortization of intangible assets ÏÏÏÏ 7.0 .3 5.3 .2 6.1 .2\n\nAccretion ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 13.7 .5 12.7 .5 Ì Ì\n\nSelling, general and administrative\n\nexpenses ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 268.3 9.9 247.9 9.8 238.7 10.1\n\nOther charges (income)ÏÏÏÏÏÏÏÏÏÏÏÏ Ì Ì Ì Ì (5.6) (.2)\n\nOperating income ÏÏÏÏÏÏÏÏÏ $ 452.3 16.7% $ 412.7 16.4% $ 459.5 19.4%\n\n*Revenue.* Revenue was $2,708.1 million, $2,517.8 million and $2,365.1 million for the years ended\n\nDecember 31, 2004, 2003 and 2002, respectively. Revenue increased by $190.3 million, or 7.6%, from 2003 to\n\n34", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_RSG_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EEFT_2000.pdf", - "query": "What the name of the first bridge buildt over Danube ?", - "target_page": 16, - "target_passage": "he Chain Bridge was the first bridge over the Danube", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Nature | Vol 637 | 2 January 2025 | **121**\n\nancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark\n\narchaeological complex has been linked to the later Chernyakhov cul-\n\nture to the southeast and to early Goths, an historical Germanic group\n\nthat flourished in the second to fifth centuries ce <sup>56</sup> . Our modelling\n\nsupports the idea that some groups that probably spoke Germanic\n\nlanguages from Scandinavia expanded south across the Baltic into\n\nthe area between the Oder and Vistula rivers in the early centuries ce,\n\nalthough whether these expansions can be linked specifically with\n\nhistorical Goths is still debatable. Moreover, since a considerable\n\nproportion of Wielbark burials during this period were cremations,\n\nthe possible presence of individuals with other ancestries cannot be\n\nstrictly rejected if they were exclusively cremated (and are therefore\n\ninvisible in the aDNA record).\n\nA previous study could not reject continuity in ancestry from the\n\nWielbark-associated individuals to later medieval individuals from\n\na similar region <sup>12</sup> . With the improved power of Twigstats, models of\n\ncontinuity are strongly rejected, with no one-source model of any pre-\n\nceding Iron Age or Bronze Age group providing a reasonable fit for the\n\n**a**\n\nScandinavian Peninsula EIA\n\nBritain\n\nCentral Europe\n\nPortugal\n\nHungary and Slovakia\n\nEastern Europe\n\nItaly\n\n0.002\n\n0\n\n- 0.002\n\nDimension 1\n\n- 0.004\n\n- 0.002 - 0.001 0 0.001\n\nDimension 2 0.002 0.003 0.004\n\nTwigstats *f* 3 -statistics\n\nScandinavian Peninsula EIA\n\nDenmark IA\n\nEarly medieval,\n\nincluding Wielbark,\n\nBaiuvarii,\n\nLongobards,\n\nEngland earlyMED,\n\nSlovakia earlyMED\n\nEngland Diffeld Terrace\n\nRegular *f* 3 -statistics\n\nDriffeld Terrace\n\nRoman outlier (second to\n\nfourth century CE )\n\n1\n\nAnatolia_EBA\n\nAustria_Klosterneuburg_Roman\n\nBaiuvari_earlyMED\n\n**Britain.lronRoman**\n\n**CentraIEurope.IronRoman(l)**\n\n**CentraIEurope.IronRoman(Il)**\n\n**CentraIEurope.IronRoman(IIl)**\n\nCordedWare_EBA\n\nCroatia.IronRoman_oNorthEurope\n\nDenmark_BA IrelandOrkney_BA\n\n**HungarySlovakia.lronRoman**\n\nHungary_earlyMED(II)\n\nHungary_earlyMED(I)\n\nEngland.Driffeld.Terrace.Scandinavia\n\nEngland_earlyMED_midCNE\n\nEngland_earlyMED_lowCNE\n\nEngland_earlyMED_highCNE\n\nDenmark_IA\n\nDenmark_EVA\n\nDimension 2\n\n0.002 0.003\n\nTwigstats *f* 3 -statistics\n\n0.004\n\nPoland_BA Saami\n\n**Russia_Sarmatian**\n\n**Portugal.lronRoman**\n\n**PolandUkraine_MLBA(II)**\n\n**PolandUkraine_MLBA(I)**\n\nPoland_Wielbark(III)\n\nPoland_Wielbark(II)\n\nPoland_Wielbark(I)\n\nPoland_Middle_Ages(II)\n\nPoland_Middle_Ages(I) **Scandinavian_Peninsula_EIA(I)**\n\n**Scandinavian_Peninsula_EIA(II)**\n\nSlovakia_Zohor_Germanic_Roman\n\nSlovakia_earlyMED\n\nSlovenia.lronRoman\n\nSlovenia.Roman.oNorthEurope\n\nNetherlands_Friesland_earlyMED\n\nMontenegro_earlyMED\n\nLongobard_earlyMED(II)\n\nLongobard_earlyMED(I)\n\n**Lithuania.lronRoman**\n\n**Kyrgyzstan_TianShanHun**\n\nltaly.lronRepublic\n\nltaly.lmperial(ll)\n\n**Italy.lmperial(l)**\n\n0.001 0 - 0.001 - 0.002\n\n- 0.004\n\n- 0.002\n\n0\n\nItaly\n\n0.002\n\nDimension 1\n\nPortugal\n\nCentral\n\nEurope\n\nBritain\n\nHungary and Slovakia\n\nEastern Europe\n\n28\n\n2\n\n3 13\n\n3.3\n\nI II III 6\n\nWielbark, Poland\n\n(frst to third century CE )\n\nMedieval Poland (tenth\n\nto eleventh century CE )\n\n2\n\nIron Age, Denmark\n\n(frst to third century CE )\n\nFriesland, the Netherlands\n\n(ffth to sixth century CE )\n\nBaiuvarii\n\n(ffth century CE )\n\nLongobard\n\n(sixth century CE )\n\nEarly medieval\n\nSlovakia\n\n(third to ffth century CE )\n\nZohor, Slovakia\n\n(frst to second\n\ncentury CE )\n\nLa Tène, Slovakia\n\n(frst century BCE\n\nto frst century CE )\n\n2.1\n\nLow CNE Mid CNE High CNE\n\nEarly medieval England\n\n(ffth to eighth century CE )\n\n9\n\nI II 7\n\n4.7\n\n1\n\n3\n\n**b c**\n\n**d**\n\nIron Age, Denmark Early Viking, Salme\n\nDriffeld Terrace\n\nRoman outlier\n\nEarly\n\nmedieval England\n\nWielbark, Poland\n\nEarly medieval Zohor\n\nLongobard Baiuvarii Friesland, the\n\nNetherlands Mid CNE Low CNE\n\nI II\n\n### **Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "NAVWEPS OD-SOT-80 BASIC AERODYNAMICS\n\nEFFECT OF FLAPS\n\nCL LIFT COEFFICIENT\n\nI\n\n5 IO I5 20 25\n\nANGLE OtATTACK\n\nEFFECT OF WEIGHT ON STALL SPEED\n\n### Figure 1.15. Flight at High Lift Conditions\n\n34", - "page_start": 53, - "page_end": 53, - "source_file": "00-80T-80.pdf" - }, - { - "text": "28 Notably the EU [Birds Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32009L0147) (2009/147/EC), [Habitats Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:31992L0043) (92/43/EEC), [Water Framework ](https://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:32000L0060) [Directive](https://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:32000L0060) (2000/60/EC), [Floods Directive](https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32007L0060) (2007/60/EC) and [Marine Strategy Framework Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32008L0056) (2008/56/EC). See [Fitness Check of the EU Nature Legislation](https://ec.europa.eu/environment/nature/legislation/fitness_check/docs/nature_fitness_check.pdf) (SWD(2016) 472) and [Fitness Check of the EU Water ](https://ec.europa.eu/environment/water/fitness_check_of_the_eu_water_legislation/documents/Water%20Fitness%20Check%20-%20SWD(2019)439%20-%20web.pdf) [Legislation](https://ec.europa.eu/environment/water/fitness_check_of_the_eu_water_legislation/documents/Water%20Fitness%20Check%20-%20SWD(2019)439%20-%20web.pdf) (SWD(2019) 439). See also below, Section 3.2. Habitats and species listed under the Birds and Habitats Directives.", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "[158. Marek, Miroslav. \"Capet 40\" (http://genealogy.euweb.cz/capet/capet40.html). ](http://genealogy.euweb.cz/capet/capet40.html) *euweb.cz* [. Archived (https://web.archi](https://web.archive.org/web/20131014145729/http://www.genealogy.euweb.cz/capet/capet40.html)\n\n[ve.org/web/20131014145729/http://www.genealogy.euweb.cz/capet/capet40.html) from the original on 14 October](https://web.archive.org/web/20131014145729/http://www.genealogy.euweb.cz/capet/capet40.html)\n\n2013. Retrieved 13 February 2009.\n\n[159. \"Suzanne de Mésenge\" (http://roglo.eu/roglo?lang=es;i=337437). ](http://roglo.eu/roglo?lang=es;i=337437) *roglo.eu* [. Archived (https://web.archive.org/web/](https://web.archive.org/web/20160411124656/http://roglo.eu/roglo?lang=es;i=337437)\n\n[20160411124656/http://roglo.eu/roglo?lang=es;i=337437) from the original on 11 April 2016. Retrieved](https://web.archive.org/web/20160411124656/http://roglo.eu/roglo?lang=es;i=337437)\n\n14 September 2009.\n\nAnselme de Sainte-Marie, Père (1726). *[Histoire généalogique et chronologique de la maison royale de France](https://gallica.bnf.fr/ark:/12148/bpt6k76026j)* (http\n\n[s://gallica.bnf.fr/ark:/12148/bpt6k76026j) [](https://gallica.bnf.fr/ark:/12148/bpt6k76026j) *Genealogical and chronological history of the royal house of France* ] (in\n\n[French). Vol. 1 (3rd ed.). Paris: La compagnie des libraires. Archived (https://web.archive.org/web/2022033108174](https://web.archive.org/web/20220331081748/https://gallica.bnf.fr/ark:/12148/bpt6k76026j)\n\n[8/https://gallica.bnf.fr/ark:/12148/bpt6k76026j) from the original on 31 March 2022. Retrieved 30 August 2018.](https://web.archive.org/web/20220331081748/https://gallica.bnf.fr/ark:/12148/bpt6k76026j)\n\nAntoine, Michel (1989). *Louis XV* [ (in French). Paris: Fayard. ISBN 978-2-2130-2277-2.](https://en.wikipedia.org/wiki/Special:BookSources/978-2-2130-2277-2)\n\n[Bailey, Gauvin Alexander (2018). ](https://en.wikipedia.org/wiki/Gauvin_Alexander_Bailey) *Architecture and Urbanism in the French Atlantic Empire: State, Church and Society,*\n\n*1604- 1830* [. Kingston, Ontario: McGill-Queen's University Press. ISBN 978-0-7735-5376-7.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-7735-5376-7)\n\nBarentine, John C. (2016). *Uncharted Constellations: Asterisms, Single-Source and Rebrands* [. Springer Publishing.](https://en.wikipedia.org/wiki/Springer_Publishing)\n\n[ISBN 978-3-3192-7619-9.](https://en.wikipedia.org/wiki/Special:BookSources/978-3-3192-7619-9)\n\nBarnes, Linda L. (2005). *Needles, Herbs, Gods, and Ghosts: China, Healing, and the West to 1848* . Harvard\n\n[University Press. ISBN 978-0-6740-1872-3.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-6740-1872-3)\n\nBeem, Charles (2018). *[Queenship in Early Modern Europe](https://books.google.com/books?id=301GEAAAQBAJ)* (https://books.google.com/books?id=301GEAAAQBAJ).\n\n[Red Globe Press. ISBN 978-1-1370-0506-9. Archived (https://web.archive.org/web/20231124053309/https://book](https://web.archive.org/web/20231124053309/https://books.google.com/books?id=301GEAAAQBAJ)\n\n[s.google.com/books?id=301GEAAAQBAJ) from the original on 24 November 2023. Retrieved 30 October 2023.](https://web.archive.org/web/20231124053309/https://books.google.com/books?id=301GEAAAQBAJ)\n\nBély, Lucien (2001). *The History of France* [. Paris: Editions Jean-Paul Gisserot. ISBN 978-2-8774-7563-1.](https://en.wikipedia.org/wiki/Special:BookSources/978-2-8774-7563-1)\n\nBlack, Jeremy (2011). *Beyond the Military Revolution: War in the Seventeenth Century World* . Palgrave Macmillan.\n\n[ISBN 978-0-2302-5156-4.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-2302-5156-4)\n\nBlanning, Tim (2008). *The Pursuit of Glory: The Five Revolutions That Made Modern Europe* . Penguin Books.\n\n[ISBN 978-0-1431-1389-8.](https://en.wikipedia.org/wiki/Special:BookSources/978-0-1431-1389-8)", - "page_start": 30, - "page_end": 30, - "source_file": "wikipedia5.pdf" - }, - { - "text": "443 Europeans and Health and Safety at Work, June 1992, [https://europa.eu/eurobarometer/surveys/detail/113](https://europa.eu/eurobarometer/surveys/detail/113) ;\n\nEuropeans and Health and Safety at Work, August 1996 [https://europa.eu/eurobarometer/surveys/detail/158](https://europa.eu/eurobarometer/surveys/detail/158)\n\n444 Eurobarometer: Working Conditions in Europe, June 1997, [https://europa.eu/eurobarometer/surveys/detail/151](https://europa.eu/eurobarometer/surveys/detail/151)\n\nEurobarometer: Working Conditions, April 2014, [https://europa.eu/eurobarometer/surveys/detail/2044](https://europa.eu/eurobarometer/surveys/detail/2044)\n\n445 Eurobarometer: Work-Life Balance, October 2018, [https://europa.eu/eurobarometer/surveys/detail/2185](https://europa.eu/eurobarometer/surveys/detail/2185)\n\n446 Eurobarometer: Undeclared work in the European Union, February 2020\n\n[https://europa.eu/eurobarometer/surveys/detail/2250](https://europa.eu/eurobarometer/surveys/detail/2250)\n\n447 The Horizon-project INGRID2 offers links to searchable databases on surveys related to working conditions.\n\n[https://www.ingridportal.eu/en](https://www.ingridportal.eu/en) Supporting expertise in inclusive growth, e-portal ‘Dataset on Working conditions’,\n\n448 e.g.: International Benchmarking on Occupational Safety and Health (OSH) Regulation, revised version 2018,\n\n[http://www.iali-aiit.org/](http://www.iali-aiit.org/) ,\n\n449 The Horizon-project INGRID2 also provides an overview on these types of databases\n\n( [https://www.ingridportal.eu/en](https://www.ingridportal.eu/en) )\n\n450 European Centre for the Development of Vocational Training CEDEFOP ( [https://www.cedefop.europa.eu/](https://www.cedefop.europa.eu/) )\n\nSkills Panorama: https://skillspanorama.cedefop.europa.eu/en\n\n451 European Institute for Gender Equality EIGE ( [https://eige.europa.eu/](https://eige.europa.eu/) ) Gender Statistics Database, Work and\n\nLabour market, [https://eige.europa.eu/gender-statistics/dgs](https://eige.europa.eu/gender-statistics/dgs) , [Gender Equality Index](https://eige.europa.eu/gender-equality-index/thematic-focus/digitalisation/country/EE) , e.g. index of digitalisation in\n\nthe world of work (2020)\n\n452 European Chemical Agency ECHA ( [https://echa.europa.eu/home](https://echa.europa.eu/home) ) [Exposure scenario examples](https://echa.europa.eu/support/practical-examples-of-exposure-scenarios)\n\n*453* *European Centre for Disease Prevention and Control,* *[https://www.ecdc.europa.eu/en](https://www.ecdc.europa.eu/en)*\n\n454 European Maritime Safety Agency EMSA ( [http://www.emsa.europa.eu/](http://www.emsa.europa.eu/) ), Section on Safety and Security\n\n[http://www.emsa.europa.eu/we-do/safety.html](http://www.emsa.europa.eu/we-do/safety.html)\n\n455 Fundamental Rights Agency FRA, [https://fra.europa.eu/en](https://fra.europa.eu/en) , Section on ‘Trafficking and labour exploitation, e.g\n\nthe report from June 2021 titled: Protecting migrants in an irregular situation from labour exploitation - Role of the\n\nEmployers Sanctions Directive\n\n456 European Monitoring Centre for Drugs and Drug Addiction EMCDDA ( [https://www.emcdda.europa.eu/](https://www.emcdda.europa.eu/) ),\n\nSection ‘Best practice’, Policy and practice briefings: Work places, [https://www.emcdda.europa.eu/best-](https://www.emcdda.europa.eu/best-practice/briefings/workplace_en)\n\n[practice/briefings/workplace_en](https://www.emcdda.europa.eu/best-practice/briefings/workplace_en)\n\nQuite unknown and difficult to estimate: between one and nine percent of the employees take so-called neuro", - "page_start": 157, - "page_end": 157, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "62 Such as the Directives on [Environmental Impact Assessment](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32014L0052) (2014/52/EU), on [Strategic Environmental ](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32001L0042) [Assessment](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32001L0042) (2001/42/EC), on [Environmental Liability](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32004L0035) (2004/35/CE) and on [Environmental Crime](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32008L0099) (2008/99/EC). 63 [https://ec.europa.eu/environment/aarhus/](https://ec.europa.eu/environment/aarhus/) 64 [Study on due diligence requirements through the supply chain - Final Report.](https://ec.europa.eu/info/business-economy-euro/doing-business-eu/company-law-and-corporate-governance_en#studies) [Directive 2014/95/EU amending Directive 2013/34/EU as regards disclosure of non-financial and ](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32014L0095) [diversity information by certain large undertakings](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32014L0095) . Such as the [EU Business @ Biodiversity Platform](https://ec.europa.eu/environment/biodiversity/business/index_en.htm) (B@B). See for example [Business for Nature](https://www.businessfornature.org/) or [One Planet Business for Biodiversity](https://op2b.org/) . BenDor et al. (2015), [Estimating the Size and Impact of the Ecological Restoration Economy](https://www.researchgate.net/publication/278792900_Estimating_the_Size_and_Impact_of_the_Ecological_Restoration_Economy) .", - "page_start": 16, - "page_end": 16, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "**Corporate Headquarters**\n\nEuronet Worldwide\n\n4601 College Boulevard, Suite 300\n\nLeawood, Kansas 66211\n\nTel: 913-327-4200\n\nFax: 913-327-1921\n\n**European Headquarters**\n\nEuronet Worldwide\n\nHorvát u. 14-24.\n\n1027 Budapest, Hungary\n\nTel: 36-1-224-1000\n\nFax: 36-1-224-1013", - "page_start": 47, - "page_end": 47, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n11\n\nvessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which\n\nmeans there will be very few occasions when the largest vessels in the industry have to make a\n\ntide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will\n\nnot suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby\n\nDamper Public Wharf in terms of entry and departure draft restrictions.\n\nThe function and purpose of Berth 1 will be:\n\n- To service the larger offshore supply boat market on a fast turnaround basis.\n\n- To receive and offload very heavy ro/ro cargoes up to 1500 tonne delivered by ocean going\n\nheavy lift ships and barges.\n\n- To handle inbound and outbound cargoes related to major offshore pipe lay projects.\n\n- To receive and efficiently load reel ships used for deep water small diameter pipelay.\n\nThe wharf will be an earth filled structure with steel sheet pile faces and concrete capping beam\n\nsurround. Most of the construction will be performed using land based equipment working from\n\nthe core of the earth filled system.\n\nMuch effort has gone into a design concept which allows very large cranes (>100 tonne\n\ncapacity) to operate without restriction on the wharf.\n\nThe separation between Berth 1 and Berth 2 is such to allow Road Train Triples (the max\n\nallowable) to turn unassisted on the wharf.\n\n##### **C. QUAY WALL (BERTH 2)**\n\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted\n\noperation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas\n\nindustry and mineral ports. This berth will offer excellent weather protection for small and\n\nmedium size vessels.\n\n##### **D. BREAKWATER.**\n\nThe rubble mount type breakwater will be an extension of the wharf, constructed using core and\n\narmor rock largely won from excavations on the Base. The excavations created will become\n\ndepositories for dredge spoil.\n\nBecause the storm surge associated with major cyclones can be up to 7 m above chart datum (low\n\ntide), before imposing the wave height, a fully protective breakwater is not practical. The", - "page_start": 14, - "page_end": 14, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "*information and privacy as never before through*\n\n*the Internet, wireless access and other exciting*\n\n*new technologies.*\n\n*New types of bridges - electronic bridges -*\n\n*are emerging to link consumers with these*\n\n*services in innovative ways that redefine the*\n\n*financial transactions process. Now as we*\n\n*face a world constantly on the go, our mission*\n\n*is to create and implement flexible, secure*\n\n*solutions to connect people with their*\n\n*personal information.*\n\n*Brooklyn Bridge, New York*", - "page_start": 14, - "page_end": 14, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "NAVWEPS OO-BOT-80 TABLE OF CONTENTS\n\nCHAPTER 5. OPERAilNG STRENGTH LIMITATIONS\n\nGENERAL OEFlNlTlONS AND STRUCTURAL REQUlREMENTS\n\nSTATIC STRENGTH .._.......... ~.~~~.~ ~..~\n\nLimit load Factor of safety Material properties\n\nSERVICE LIFE\n\nPati Loa r e consideration spectrum attd cumulative damage Creep considerations\n\nAEROELASTIC EFFECTS.\n\nStiffness and rigidity\n\nAIRCRAFT LOADS AND OPERATING LIMITATIONS\n\nFLIGHT LOADS-MANEUVERS AND GUSTS.\n\nLoadfactor..................................................... Maneuvering load factors.. .I\n\nMaximum lift capability Effect of gross weight ^ . ._ ClllStlOadtacfors..............,................................. Gust load increment Effect of gust intensity and lift curve slope Effect of wing loading and altitude Effect of overstrea.\n\nTHE V-n OR V-g DIAGRAM.\n\nEffect of weight, configuration;altihtde, and symmetry of Ior-Ang Limit load factors Ultitnute load facvxs Maximum lift capability Limit airspeed Operating env+pe Maneuver’speed and penetration of turbulence\n\nEFFECT OF HIGH SPEED FLIGHT..\n\nCritical gust Aileron reversal Divergence PIutter Compressibility problems\n\nLANDING AND GROUND LOADS.\n\nLanding load factor Effect of touchdown rate of descent Effect of gross weight Ported landing on unprepared .surfaces\n\nEFFECT OF OVERSTRESS ON SERVICE\n\nRecognition of overstress’damage Importance of operating limitations\n\nLIFE\n\n,... ,..,\n\n328\n\n330\n\n331\n\n331 331\n\n332\n\n,’ 334\n\n334\n\n339\n\n343\n\n344\n\nxiv", - "page_start": 15, - "page_end": 15, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EEFT_2000.pdf", - "query": "What was the total amount of operating expenses of 2000 by Network Wordwide in 2000 ?", - "target_page": 17, - "target_passage": "Total operating expenses increased to $88.1 million for the year ended December 31, 2000", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Revenues for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment\n\nResults of Operations sections below.\n\n**Operating Expenses** Total operating expenses increased to $88.1 million for the year ended\n\nDecember 31, 2000 from $68.3 million for the year ended December 31, 1999 and from $34.5\n\nmillion for the year ended December 31, 1998. The increase from 1999 to 2000 can be broken down\n\nby segment as follows: (1) a $3.5 million increase in Network Services Segment operating costs due to growth in the size of the network\n\noperations; (2) a $15.2 million increase in Software Services Segment due to write down of intangibles of $11.2 million and investment in\n\npersonnel and re s o u rces; and (3) a $1.1 million increase in Corporate Services Segment operating costs due to the expended operations. The\n\ni n c rease from 1998 to 1999 can be broken down by segment as follows: (1) a $13.0 million increase in Network Services Segment operating costs,\n\n(2) the addition of $19.6 million of Software Solutions Segment operating costs, and (3) a $1.2 million increase in Corporate Services Segment\n\noperating costs. Operating expenses for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment Results of\n\nOperations sections below.\n\n**Operating Loss** The Company generated an operating loss of $35.4 million for the year ended December 31, 2000 compared to $26.8 million\n\nfor the year ended December 31, 1999 and $22.6 million for the year ended December 31, 1998. The increased operating loss from 1999 to 2000\n\nis due to the net effect of three factors: (1) a $6.8 million decrease in the operating loss from the Company’s Network Services Segment; (2) a\n\n$14.3 million increase in the operating loss from the Company’s Software Solutions Segment; and (3) a $1.1 million increase in the operating loss\n\nf rom the Company’s Corporate Services Segment. The increased operating loss from 1998 to 1999 is due to the net effect of three factors: (1) a\n\n$1.9 million decrease in operating losses from the Company’s Network Services Segment; (2) the addition of $4.8 million in operating losses fro m\n\nthe Company’s Software Solutions Segment; and (3) a $1.3 million increase in operating losses from the Company’s Corporate Services Segment.\n\n1 5\n\n**Annual Consolidated Revenues**\n\n*27% increase for full year* *2000 over 1999*\n\n**1995 1996 1997 1998 1999 2000**\n\n**5 2 . 7**\n\n**4 1 . 5**\n\n**1 1 . 9**\n\n**5 . 3**\n\n**1 . 3 0 . 1**", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "The Company re c o rded an $800,000 write-down of certain ATM hard w a re assets associated with the\n\np u rchase of the Budapest Bank ATM network in May 2000 and the Service Bank ATM network in\n\nM a rch 1999 (see Note 10 to the Consolidated Financial Statements - Asset Write Down). In addition,\n\nthe Company re c o rded a one-time gain in its Central European Sub-segment of $1.2 million. The\n\ngain is related to a change in Hungarian law that eliminates a major portion of the Company’s\n\nliability for import taxes on ATM hard w a re to the Hungarian government. The gain is included as an\n\nelement of direct operating costs.\n\nThe operating expenses for the Central European Sub-segment totaled $21.7 million for the year\n\nended December 31, 2000 as compared to $20.7 million for the year ended December 31, 1999, an\n\ni n c rease of 5%. The increase in operating expenses is largely the result of an increase in the number\n\nof ATMs operated by the Company from 1,203 at December 31, 1999 to 1,391 at December 31,\n\n2000, and increased transaction volumes.\n\nThe operating expenses for the We s t e rn European Sub-segment totaled $18.9 million for the year\n\nended December 31, 2000 as compared to $16.5 million for the year ended December 31, 1999, an increase of 15%. The increase in operating\n\nexpenses is largely the result of an increase in the number of ATMs operated by the Company from 621 at December 31, 1999 to 787 at\n\nDecember 31, 2000, and increased transaction volumes.\n\nThe operating expenses for the Other ATM Operations Sub-segment were $2.4 million for the year ended December 31, 2000 as compared to\n\n$2.2 million for the year ended December 31, 1999, an increase of 9%. The operating expenses from this segment are the result of the acquisition\n\nof the Dash network located in the United States in August 1999 and the unallocated costs associated with the Company's processing facilities.\n\nD i rect operating costs in the Network Services Segment consist primarily of: ATM installation costs; ATM site rentals; and costs associated with\n\nmaintaining ATMs, ATM telecommunications, interest on network cash and cash delivery and security services to ATMs. Such costs increased to\n\n$24.4 million for the year ended December 31, 2000 from $21.9 million for the year ended December 31, 1999. The increase in direct operating\n\ncosts is primarily attributable to costs associated with operating the increased number of ATMs in the network during the periods. Also,\n\ni n t e rcompany allocations were made to charge the ATM operations with transaction switching and bank connection fees associated with the\n\noperations central processing center in Budapest. These allocations totalled $3.5 million and $2.9 million for the years ended December 31, 2000\n\nand 1999, re s p e c t i v e l y. Direct operating costs for 2000 include a one-time gain of $1.2 million due to a change in Hungarian law that eliminates a\n\nmajor portion of the Company’s liability for import taxes on ATM hard w a re. Direct operating costs also include a $657,000 gain realized in 1999\n\nf rom the sale of the Croatian network assets. The components of direct operating costs for the years ended December 31, 2000 and 1999 were:\n\n*(in thousands)* Years ending December 31,\n\n2 0 0 0 1 9 9 9\n\nATM communication $ 4 , 1 8 3 $ 3 , 9 8 2\n\nATM cash filling and interest on network cash 7 , 4 2 6 5 , 9 0 0\n\nATM maintenance 3 , 9 8 7 2 , 9 6 7\n\nATM site re n t a l 2 , 2 5 8 2 , 4 2 1\n\nATM installation 6 7 5 7 8 3 Transaction processing and ATM monitoring 5 , 2 4 2 4 , 2 0 5\n\nO t h e r 6 0 0 1 , 6 6 3\n\nTotal direct operating expenses $ 2 4 , 3 7 1 $ 2 1 , 9 2 1\n\nAs a percentage of network revenue, direct operating costs fell from 83% for the year ended December 31, 1999 to 66% for the year ended\n\nDecember 31, 2000. On a per ATM basis the direct operating costs fell from $12,782 per ATM for the year ended December 31, 1999 to $9,807", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "on the Company’s ATM network. In addition, the Company continues to invest in the on-going development of products that were re c e n t l y\n\ni n t roduced to the market. The Company’s re s e a rch and development costs incurred for computer products to be sold, leased or otherw i s e\n\nmarketed increased to $6.7 million for the year ended December 31, 2000 from $3.2 million for the year ended December 31, 1999. Of this total\n\nf i g u re, $1.0 million and $322,000 were capitalized, as at December 31, 2000 and 1999, re s p e c t i v e l y, in conjunction with the Company’s\n\naccounting policy requiring the capitalization of development costs on a product by product basis once technological feasibility is established.\n\nTechnological feasibility of computer software products is established when the Company has completed all planning, designing, coding, and\n\ntesting activities that are necessary to establish that the product can be produced to meet its design specifications including functions, feature s ,\n\nand technical perf o rmance re q u i rements.\n\n**Operating Loss** The Software Solutions Segment incurred an operating loss of $21.5 million for the year ended December 31, 2000 and $7.1\n\nmillion for the year ended December 31, 1999 as a result of the factors discussed above\n\nCorporate Services Segment\n\n**Operating Expenses** Operating expenses for the Corporate Services Segment increased to $7.9 million for the year ended December 31, 2000\n\nf rom $6.8 million for the year ended December 31, 1999. The components of corporate services operating costs for the years ended December 31,\n\n2000 and 1999 were:\n\n*(in thousands)* Years ending December 31,\n\n2 0 0 0 1 9 9 9\n\nSalaries and benefits $ 3 , 8 1 3 $ 3 , 3 3 5\n\nSelling, general and administrative 3 , 8 4 1 3 , 2 7 0\n\nD e p reciation and amort i z a t i o n 2 0 8 1 4 5\n\nTotal direct operating expenses $ 7 , 8 6 2 $ 6 , 7 5 0\n\nThe Company’s expansion of its network infrastru c t u re, and increases in corporate and administrative capabilities are the primary reasons for these\n\ni n c reased expenditures.\n\n**Non-Operating Results for the Years Ended December 31, 2000 and 1999**\n\n**Interest Income** I n t e rest income decreased to $1.1 million for the year ended December 31, 2000 from $2.0 million for the year ended December\n\n31, 1999 and from $2.5 million for the year ended December 31, 1998. The decrease is the result of the decrease in investment securities and cash\n\nas a result of negative cash flow from operations and capital expenditure s .\n\n**Interest Expense** I n t e rest expense decreased to $10.8 million for the year ended December 31, 2000 from $10.9 million for the year ended\n\nDecember 31, 1999 and increased from $7.8 million for the year ended December 31, 1998. The decrease from 1999 to 2000 is due to exchange\n\nrate diff e rences as the majority of the debt is denominated in Deutsche Mark. The increase from 1998 to 1999 is the result of accretion of the\n\nC o m p a n y ’s Notes Payable for a full year in 1999 in comparison to 6 months’ accretion in 1998.\n\n**Foreign Exchange Gain/Loss** The Company had a net foreign exchange loss of $3.2 million for the year ended December 31, 2000, as\n\nc o m p a red to $2.1 million for the year ended December 31, 1999, and $1.9 million for the year ended December 31, 1998. Exchange gains and\n\nlosses that result from re - m e a s u rement of certain Company assets and liabilities are re c o rded in determining net loss. A portion of the assets and\n\nliabilities of the Company are denominated in Euros, including capital lease obligations, notes payable (including the Notes issued in the\n\nC o m p a n y ’s public bond offering), cash and cash equivalents, investments, and forw a rd foreign exchange contracts. It is the Company’s policy to\n\nattempt to match local currency receivables and payables. The foreign currency denominated assets and liabilities give rise to foreign exchange", - "page_start": 20, - "page_end": 20, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "December 31, 2000. On a per ATM basis the direct operating costs fell from $12,782 per ATM for the year ended December 31, 1999 to $9,807\n\nper ATM for the year ended December 31, 2000, an improvement of 23%. On a per transaction basis the direct operating costs fell from $0.66\n\nper transaction for the year ended December 31, 1999 to $0.46 per transaction for the year ended December 31, 2000, an improvement of 30%.\n\nSegment salaries and benefits increased to $7.4 million for the year ended December 31, 2000 from $7.2 million for the year ended December\n\n31, 1999, an increase of 3%. The increase in the year-on-year expenses reflect the continued expansion of the operations to We s t e rn Euro p e a n\n\nmarkets with significantly higher labor costs than Central Europe as well as some increases in staff levels at the processing center re q u i red to\n\nmaintain quality service in line with the rising transaction volumes. As a percentage of Network Services Segment revenue, salaries and benefits\n\nfell from 27% for the year ended December 31, 1999 to 20% for the year ended December 31, 2000.\n\nSelling, general and administrative costs allocated to the Network Services Segment decreased to $2.4 million for the year ended December 31,\n\n2000 from $2.9 million for the year ended December 31, 1999. The $500,000 cost decrease for the year ended December 31, 2000 results fro m\n\nthe net effect of (1) a $600,000 increase in the allocation of costs from the selling, general and administrative line of the Budapest pro c e s s i n g\n\ncenter to the operating cost line, as discussed above, from $2.9 million for the year ended December 31, 1999 to $3.5 for the year ended\n\nDecember 31, 2000 and (2) a $100,000 increase in costs associated with the expansion of the Company’s network operations.\n\nD e p reciation and amortization increased to $8.0 million for the year ended December 31, 2000 from $7.4 million for the year ended December\n\n31, 1999. The increases are due primarily to the increase in the number of owned ATMs as discussed pre v i o u s l y. The Company also re c o rded an\n\n$800,000 write-down of certain ATM hard w a re assets for the year ended December 31, 2000, as previously discussed.\n\n1 7\n\n**Network Services: EBITDA**\n\n**Q1 Q2 Q3 Q4**\n\n**- 0 . 7**\n\n**0 . 4**\n\n**0 . 7**\n\n**1 . 3**", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "#### **To Our Shareholders**\n\n###### *I* *n our report to you last year, we noted that Euronet’s success has been built in large part on*\n\n###### *the question “Would you like another transaction?” The answer from our clients and their*\n\n###### *customers was a resounding “Yes!”*\n\n###### *To reflect the rapid changes taking place in financial transactions worldwide, even that question*\n\n###### *has evolved. So in 2000, we also began asking “How would you like your next transaction?”*\n\nIn 2000, Euronet Worldwide focused on providing ways people can access their financial accounts and transactions\n\nthrough various electronic touchpoints. New secure transaction types and touchpoints—ATMs, point-of-sale (POS)\n\ndevices, the Internet and mobile phones—continued to fuel transaction growth every month. In 2000, we processed a\n\nrecord 52.7 million billable transactions, a 60% increase over 1999, and in December 2000, our transaction levels\n\nexceeded 5 million per month and continue to accelerate.\n\nTaken together, our transaction growth and expanding number of consumer touchpoints\n\ntranslated into an accelerating and recurring revenue stream, which greatly improved our\n\nbottom line. Our 2000 revenue of $52.7 million represented a 27% increase over the\n\ncompany’s 1999 revenue of $41.5 million. Euronet’s 2000 EBITDA also improved\n\n$2.4 million, or 14.5%, over 1999.\n\nThis year we continued to focus on our core business of ATM driving and transaction\n\nprocessing, and we pursued new transactions through our mobile and Internet\n\nbanking solutions. We also implemented our bill payment initiative, starting\n\nwith electronic payments for prepaid mobile airtime. We are pleased to\n\nreport that in 2000 our Network Services business turned EBITDA\n\npositive and posted revenue of $36.9 million, an increase of 39% over\n\n1999 revenue.\n\nAdditional milestones were reached through several new strategic\n\npartnerships we announced late in the year. Gemplus, Sila\n\nCommunications and Aether Systems chose Euronet mobile products\n\nto supplement their product offerings, proving the strength of\n\nEuronet’s mobile products. Teaming up with these partners will\n\nfurther increase the sales penetration of our suite of mobile payment\n\nsolutions around the world.\n\n## **1**", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "3\n\n6\n\n9\n\n12\n\n$15\n\n1999 2000 2001\n\n**Assets Under**\n\n**Management**\n\n40\n\n80\n\n120\n\n160\n\n$200\n\n1999 2000 2001\n\n**Net Income**\n\nNet income excluding\n\nSeptember 11 and HLI\n\ntax benefit\n\nOperating income excluding\n\nSeptember 11 and HLI\n\ntax benefit\n\n200\n\n400\n\n600\n\n800\n\n$1,000\n\n1999 2000 2001\n\nin millions in millions in billions in billions\n\n240\n\n480\n\n720\n\n960\n\n$1,200\n\n1999 2000 2001\n\n**Financial Highlights**\n\n(in millions except for per share data) **2001** 2000 1999\n\nNet income [1] **$ 507** $ 974 $ 862\n\nOperating income [1] [2] **$ 724** $ 962 $ 837\n\nRevenues [3] **$ 15,147** $ 14,703 $ 13,528\n\nAssets under management **$ 198,047** $ 182,964 $173,425\n\nDiluted Earnings Per Share:\n\nNet income [1] **$ 2.10** $ 4.34 $ 3.79\n\nOperating income [1] **$ 3.00** $ 4.29 $ 3.68\n\n[1] 2001 includes $440 of losses ($1.85 per basic and $1.82 per diluted share) related to the September 11\n\nterrorist attack (“September 11”) and a $130 tax benefit ($0.55 per basic and $0.54 per diluted share) at\n\nHartford Life, Inc. (“HLI”).\n\n[2] Operating income represents after-tax operational results excluding, as applicable, net realized capital gains or\n\nlosses, extraordinary items, the cumulative effect of accounting changes and certain other items.\n\n[3] 2001 includes a $91 reduction in premiums from reinsurance cessions related to September 11.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HIG_2001.pdf" - }, - { - "text": "guarantees for financial instruments and as deposits with customs officials. The decrease resulted primarily from the settlement of the forw a rd\n\nf o reign exchange contracts using restricted cash and a release of restricted cash resulting from the posting of a surety bond with the Hungarian\n\nbanking institution that supplies cash to the Company’s ATM network in Hungary.\n\n**Trade Accounts** Trade accounts receivable increased to $9.5 million at December 31, 2000 from $7.9 million at December 31, 1999 due\n\nprimarily to sales from the Software Solutions Segment and increased Network Services Segment revenues.\n\n**P r o p e r t y, Plant and Equipment** Net pro p e rt y, plant and equipment decreased to $31.7 million at December 31, 2000 from $36.7 million at\n\nDecember 31, 1999. This decrease is due primarily to a reduction in the rate of installation of ATMs and fixed asset additions. Fixed asset\n\nd e p reciation was in excess of fixed asset additions, and the write-off of $800,000 in ATM hard w a re further reduced the net fixed asset position.\n\n**Intangible Assets** The decrease in net intangible assets to $2.6 million at December 31, 2000 from $16.3 million at December 31, 1999 is due\n\nprimarily to the $11.2 million write-down of goodwill and other identifiable intangible assets associated with the Software Solutions Segment (see\n\nNote 9 to the Consolidated Financial Statements - Intangibles). In addition, the decrease is the result of amortization of purchased intangibles\n\na c q u i red in the Euronet USA acquisition in 1998, and the SBK and Dash acquisitions in 1999.\n\n**Current Liabilities** C u rrent liabilities decreased to $20.5 million at December 31, 2000 from $26.9 million at December 31, 1999. This decre a s e\n\nis due primarily to decreases in accrued expenses, billings in excess of costs and estimated earnings on software installation costs and settlement of\n\nthe forw a rd foreign exchange contracts.\n\n**Capital Lease** Total capital lease obligations including current installments increased to $11.5 million at December 31, 2000 from $10.6 million\n\nat December 31, 1999. This increase is due primarily to additional capital leases resulting from the Company's purchase of Budapest Bank’s AT M\n\nnetwork, consisting of 147 ATMs on May 1, 2000.\n\n**Notes Payable** Notes payable increased to $77.2 million at December 31, 2000 from $72.8 million at December 31, 1999. This is the result of\n\nseveral transactions as follows:\n\n*(in millions)*\n\nBalance at December 31, 1999 $ 7 2 . 8 .\n\nU n realized foreign exchange gain (DEM vs. US$) (4.4)\n\nA c c retion of bond intere s t 8 . 8 .\n\nBalance at December 31, 2000 $ 7 7 . 2 .\n\n**S t o c k h o l d e r’s Deficit** Stockholders’ deficit increased to $44.8 million at December 31, 2000 from $9.5 million at December 31, 1999. This is\n\ndue to the net loss for the year ended December 31, 2000 of $49.6 million which was offset by an increase in additional paid in capital of $14.4\n\nmillion due to the sale of 1,882,723 shares of common stock for proceeds of $13.0 million, the issue of $400,000 of warrants and the exercise of\n\n390,231 stock options for proceeds of $900,000.\n\n**Year 2000 Compliance**\n\nThe Company’s European and U.S. Year 2000 compliance teams re p o rted no material Year 2000 problems during the advent of the year 2000,\n\neither with Euro n e t ’s own systems or the systems of its customers. The Company is unaware of any material Year 2000 complications to date.\n\n**Impact of New Accounting Pronouncements Not Yet Adopted**\n\n**S FAS 133** The Company is re q u i red to adopt Statement of Financial Accounting Standard (SFAS) No. 133 “Accounting for Derivative\n\nI n s t ruments and Hedging Activities” as amended by SFAS No. 138 for US GAAP re p o rting as of 1 January 2001. SFAS 133 and 138 establish\n\naccounting and re p o rting standards for derivative instruments, including certain derivative instruments embedded in other contracts (collectively\n\nre f e rred to as derivatives).", - "page_start": 22, - "page_end": 22, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY ■ 6\n\n0\n\n20\n\n40\n\n60\n\n80\n\n00\n\n1999 2000 2001 2002 2003\n\nWholesale\n\nPost-paid\n\n47\n\n10\n\n22\n\n70\n\n68 68\n\n89 89\n\n98\n\n0\n\n20\n\n40\n\n60\n\n80\n\n100\n\n1999 2000 2001 2002 2003\n\n69\n\n30\n\n44\n\n93\n\n106\n\n0\n\n10\n\n20\n\n30\n\n40\n\n1999 2000 2001 2002 2003\n\n29\n\n16\n\n44\n\n23\n\n12\n\n0\n\n20\n\n40\n\n60\n\n80\n\n100\n\n1999 2000 2001 2002 2003\n\nN t I\n\n6\n\n10\n\n16\n\n5\n\n32\n\n3\n\n10\n\n(-3)\n\n5\n\n10\n\nIncome from\n\nContinuing Operations\n\nNet Income\n\n*(Front, left to right): Earle A. MacKenzie, Executive VP, Len L. Greisz, Director of Internal Control, Christopher E. French, President,*\n\n*Daniel R. Detamore-Hunsberger, Controller, Marcy J. Engle, Human Resources Manager.*\n\n*(Back, left to right): David K. MacDonald, VP - Operations, David E. Ferguson, VP - Customer Services, Lori W. Warren, Director of*\n\n*Regulatory Affairs, Chris S. Kyle, Director of Planning, William L. Pirtle, VP - Sales, Laurence F. Paxton, VP - Information Technology*\n\n### **PCS Customers**\n\n##### **(thousands)**\n\n### **Revenue**\n\n##### **($ millions)**\n\n### **Capital Expenditures**\n\n##### **($ millions)**\n\n### **Net Income**\n\n##### **($ millions)**\n\n(-3)", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**Operating Loss** The total Network Services Segment operating loss decreased to $6.1 million for the year ended December 31, 2000 from $12.9\n\nmillion for the year ended December 31, 1999, an improvement of 53%, as a result of the factors discussed above. The Central European Sub-\n\nsegment re c o rded an operating loss of $3.1 million for the year ended December 31, 2000 compared to a loss of $8.0 million for the year ended\n\nDecember 30, 1999, an improvement of 61%, as a result of the factors discussed above. The We s t e rn European Sub-segment operating loss\n\nd e c reased to $2.3 million for year ended December 31, 2000 compared to a loss of $3.8 million for the year ended December 31, 1999, an\n\ni m p rovement of 39%, as a result of the factors discussed above. The Other ATM Operations Sub-segment incurred an operating loss of $700,000\n\nfor the year ended December 31, 2000 compared to a loss of $1.0 million for the year ended December 31, 1999, an improvement of 30%, as a\n\nresult of the factors discussed above.\n\nSoftware Solutions Segment\n\n**Software Solutions Revenue** Revenues from the Software Solutions Segment totaled $16.0 million before inter-segment eliminations for the\n\nyear ended December 31, 2000 as compared to revenue of $15.1 for the year ended December 31, 1999. Software revenues are grouped into four\n\nb road categories: software license fees, professional service fees, maintenance fees and hard w a re sales. Software license fees are the initial fees\n\nc h a rged by the Company for the licensing of its pro p r i e t a ry application software to customers. Professional service fees are charged for\n\ncustomization, installation and consulting services provided to customers. Software maintenance fees are the ongoing fees charged to customers\n\nfor the maintenance of the software products. Hard w a re sales revenues are derived from the sale of computer products and are re p o rted net of\n\ncost of sales. The components of software solutions revenue for the years ended December 31, 2000 and 1999 were:\n\n*(in thousands)* Years ending December 31,\n\n2 0 0 0 1 9 9 9\n\nS o f t w a re license fees $ 4 , 1 1 7 $ 2 , 4 3 0\n\nP rofessional service fees 6 , 8 6 7 8 , 2 9 8\n\nMaintenance fees 4 , 4 8 7 4 , 0 5 1\n\nH a rd w a re sales 5 3 5 3 7 0\n\nTotal direct operating expenses $ 1 6 , 0 0 6 $ 1 5 , 1 4 9\n\nThe increases in software license fees from 1999 to 2000 can be attributed to an increased number of software sales contracts signed in 2000 as\n\nc o m p a red to 1999, primarily in the first half of the year 2000. Sales of the Company’s core software products have dropped off substantially in\n\nthe third and fourth quarter of 2000 and are expected to be soft again during 2001. The Company believes that revenues of the Software\n\nSolutions Segment will increasingly be derived from the Company’s new set of software solutions, including its wireless banking solutions.\n\nThe decreases in professional service fees from 1999 to 2000 can be attributed to increased efficiency in the installation of software.\n\n**Software Sales Backlog** The Company defines “software sales backlog” as fees specified in contracts which have been executed by the\n\nCompany and for which the Company expects recognition of the related revenue within one year. At December 31, 2000 the revenue backlog was\n\n$3.5 million, as compared to December 31, 1999 the revenue backlog was $3.1 million. The increase in backlog from December 31, 1999 re s u l t s\n\nprincipally from growth in software sales. It is management’s intention to continue to focus on expediting delivery and implementation of software\n\nin an eff o rt to reduce backlog while continuing sales growth.\n\nT h e re can be no assurance that the contracts included in backlog will actually generate the specified revenues or that the revenues will be\n\ngenerated within the one-year period.", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "Revenues from continuing operations $ 62,803,000\n\n| $ 59,533,000 5,782,000 4,065,000 $ 2.18 1,863,000 |\n|:---|\n| 2002 |\n| $ 60,807,000 14,787,000 10,337,000 $ 41,691,000 |\n\nOperating income 6,923,000\n\nIncome from continuing operations 4,892,000\n\nEarnings per diluted share from continuing operations $ 2.66\n\nWeighted average diluted shares outstanding 1,839,000\n\nTotal assets $ 60,050,000\n\nWorking capital 13,803,000\n\nLong-term debt 4,287,000\n\nStockholders’ equity $ 44,604,000\n\nFor the year ended December 31, 2003 2002\n\nAs of December 31, 2003\n\n1999 2000 2001 2002 2003 1999 2000 2001 2002 2003 1999 2000 2001 2002 2003\n\n.50\n\n1.00\n\n1.50\n\n2.00\n\n2.50\n\n$3.00\n\n60\n\n$70\n\n50\n\n40\n\n30\n\n20\n\n10\n\n6.0 $7.0\n\n5.0\n\n4.0\n\n3.0\n\n2.0\n\n1.0\n\n*Earnings Per Diluted Share From*\n\n*Continuing Operations*\n\n*Revenues*\n\n*(In millions)*\n\n*Operating Income*\n\n*(In millions)*\n\n#### 2 0 0 3 F I N A N C I A L H I G H L I G H T S\n\n## 1", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_ATRI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EEFT_2000.pdf", - "query": "What was the share of revenues of Netwrok Wordwide made in Poland and Hungary in 2000 ?", - "target_page": 24, - "target_passage": "In 2000, 30% of the Company’s revenues were generated in Poland and Hungary", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Table 5: Physical health risks, Sectors and exposures - EWCS 2015**\n\nCountry colours: Romania aquamarine, Poland orange, Hungary blue.\n\nThe figure below illustrates country differences, based on data from the EWCS 2015: the values of\n\nIreland (green), the EU28 level (blue) with numbers, and the values of Poland (orange). Poland had a\n\nrelatively high share of employment in industry of 24%, for which Ireland has a share of 12%. The impact\n\non working conditions can be seen in the share of workers reporting exposures to vibrations (Poland\n\n27%, Ireland 16%) and loud noise (Poland 35%, Ireland 25%).\n\n**Figure 17: Physical health risks compared (%) - EWCS 2015**", - "page_start": 41, - "page_end": 41, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**(19) Business Segment Information**\n\nE u ronet and its subsidiaries operate in two business segments: (1) a segment that provides an independent shared ATM network and other\n\ne l e c t ronic payment network services to banks, retail and financial institutions (the “Network Services Segment”); and (2) a segment that\n\np roduces application software and solutions for payment and transaction delivery systems (the “Software Solutions Segment”). These\n\nbusiness segments are supported by a corporate service segment which provides corporate and other administrative services which are not\n\nd i rectly identifiable with the two business segments, (the “Corporate Services Segment”). The accounting policies of each segment are the\n\nsame as those described in the summary of significant accounting policies. The Company evaluates perf o rmance based on profit or loss fro m\n\noperations before income taxes not including nonre c u rring gains and net loss. Prior period segment information has been restated to conform\n\nto the current period’s presentation.\n\nAs the Network Services Segment continued to grow throughout 1999, the Company’s management began to divide the internal org a n i z a t i o n\n\nof the segment into Sub-segments. Accord i n g l y, beginning in January 2000, the Company divided the Network Services Segment into thre e\n\nSub-segments: “Central European Sub-segment” (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), “We s t e rn\n\nE u ropean Sub-segment” (including Germ a n y, France, and the United Kingdom) and “Other Operations Sub-segment” (including the United\n\nStates and unallocated processing center costs). Where practical, certain amounts have been reclassified to reflect the change in intern a l\n\nre p o rting. The Company is unable to present Network Services Segment assets by Sub-segment as of December 31, 1999. Prior to January 1,\n\n2000, certain assets that were used to provide support services to the Company as a whole were included in the assets in the balance sheet of\n\nthe Company’s wholly owned Hungarian subsidiary, Bank Tech. In order to segregate corporate assets from those of the Hungarian\n\noperations, these assets were transferred as of December 31, 1999, from Bank Tech to an existing Hungarian shell company, Administrative\n\nS e rvices. Those assets are now shown under the Other Operations Sub-segment.\n\nThe following tables present the segment results of the Company’s operations for the years ended December 31, 2000, 1999 and 1998.\n\nYear Ended December 31, 2000\n\nNetwork Serv i c e s\n\nN e t w o r k\n\nCentral We s t e rn S e rvices S o f t w a re C o r p o r a t e\n\nE u rope E u rope O t h e r To t a l Solutions S e rvices To t a l\n\n*(in thousands)*\n\nTotal Revenues $ 1 8 , 5 9 9 . $ 1 6 , 6 1 5 . $ 1 , 7 0 0 . $ 3 6 , 9 1 4 . $ 1 6 , 0 0 6 . $ — . $ 5 2 , 9 2 0 .\n\nTotal operating expenses ( 2 1 , 6 6 9 ) ( 1 8 , 9 0 1 ) ( 2 , 4 0 9 ) ( 4 2 , 9 7 9 ) ( 3 7 , 4 7 5 ) ( 7 , 8 6 2 ) ( 8 8 , 3 1 6 )\n\nOperating loss . ( 3 , 0 7 0 ) ( 2 , 2 8 6 ) ( 7 0 9 ) ( 6 , 0 6 5 ) ( 2 1 , 4 6 9 ) ( 7 , 8 6 2 ) ( 3 5 , 3 9 6 )\n\nI n t e rest income 2 8 9 . 6 5 . 1 9 0 . 5 4 4 . 1 0 3 . 4 4 2 . 1 , 0 8 9 .\n\nI n t e rest expense ( 1 , 0 1 6 ) ( 1 6 8 ) ( 1 5 0 ) ( 1 , 3 3 4 ) — . ( 9 , 4 9 5 ) ( 1 0 , 8 2 9 )\n\nF o reign exchange (loss)/gain, net ( 6 1 6 ) ( 4 9 4 ) ( 1 5 5 ) ( 1 , 2 6 5 ) 1 . . ( 1 , 9 6 3 ) ( 3 , 2 2 7 )\n\nNet loss before income taxes $ ( 4 , 4 1 3 ) $ ( 2 , 8 8 3 ) $ ( 8 2 4 ) $ ( 8 , 1 2 0 ) $( 2 1 , 3 6 5 ) $( 1 8 , 8 7 8 ) $ ( 4 8 , 3 6 3 )\n\nSegment assets $ 2 5 , 6 9 7 . $ 1 6 , 7 5 5 $ 3 , 6 5 2 . $ 4 6 , 1 0 4 . $ 9 , 4 3 3 . $ 5 , 3 5 3 . $ 6 0 , 8 9 0 .\n\nFixed assets 1 7 , 1 4 5 . 1 1 , 7 0 7 . 1 , 6 8 2 . 3 0 , 5 3 4 . 9 6 8 . 1 5 5 . 3 1 , 6 5 7 .\n\nD e p reciation and amort i z a t i o n 3 , 9 7 7 . 2 , 8 8 4 . 1 , 1 0 0 . 7 , 9 6 1 . 2 , 2 1 5 . 2 0 8 . 1 0 , 3 8 4 .\n\nAsset write down 6 6 8 . 1 1 0 . — 7 7 8 . 1 1 , 1 9 0 — . 1 1 , 9 6 8 .\n\nYear Ended December 31, 2000", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n\nNotes to Consolidated Financial Statements\n\nDecember 31, 2002, 2001 and 2000\n\nF-12\n\nStock Based Compensation\n\nThe Company grants stock options for a fixed number of shares to employees with an exercise price equal to the fair\n\nvalue of the shares at the date of grant. The Company accounts for stock option grants using the intrinsic value\n\nmethod prescribed by APB Opinion No. 25, “Accounting for Stock Issued to Employees” (“APB 25”). Under APB\n\n25, because the exercise price of the Company’s employee stock options equals the market price of the underlying\n\nstock on the date of grant, no compensation expense is recognized. Had compensation cost for the plan been\n\ndetermined consistent with Statement of Financial Accounting Standards No. 123, “Accounting for Stock-Based\n\nCompensation,” the Company’s net earnings and earnings per share would have been reduced by insignificant\n\namounts on a pro forma basis for the years ended December 31, 2002, 2001 and 2000. Note 15 provides additional\n\ninformation on the Company’s stock option plan.\n\nStock Repurchase\n\nOn July 25, 2000, the Company approved a stock repurchase plan, authorizing the repurchase of up to 740,690\n\nshares of the Company’s common stock. During the years ended December 31, 2001 and 2000, the Company\n\nrepurchased 9,900 and 126,100 shares, respectively. The treasury shares were purchased for $4,240,119, which\n\nrepresented an average purchase price of $31.18 per share. The treasury shares were retired in 2001.\n\nPer Share Data\n\nNet earnings per share (“EPS”) are computed by dividing net earnings by the weighted average number of shares of\n\ncommon stock outstanding during the period. The Company calculates dilutive EPS assuming all outstanding\n\noptions to purchase common stock have been exercised at the beginning of the year (or the time of issuance, if later.)\n\nThe dilutive effect of the outstanding options is reflected by application of the treasury stock method, whereby the\n\nproceeds from the exercised options are assumed to be used to purchase common stock at the average market price\n\nduring the period. The following table reconciles the computation of basic EPS to dilutive EPS:\n\nWeighted\n\nNet Average Per Share\n\nEarnings Shares Amount\n\nFor the year ended December 31, 2002:\n\nNet earnings per share, basic $33,952,550 12,359,966 $ 2.75\n\nEffect of stock options - 47,523\n\nNet earnings per share, assuming dilution $33,952,550 12,409,489 $ 2.74\n\nFor the year ended December 31, 2001:\n\nNet earnings per share, basic $29,354,505 12,318,346 $ 2.38\n\nEffect of stock options - 45,323\n\nNet earnings per share, assuming dilution $29,354,505 12,363,669 $ 2.37\n\nFor the year ended December 31, 2000:\n\nNet earnings per share, basic $28,316,047 12,426,344 $ 2.28\n\nEffect of stock options - 28,355\n\nNet earnings per share, assuming dilution $28,316,047 12,454,699 $ 2.27\n\nReclassifications\n\nCertain 2001 and 2000 amounts have been reclassified to conform to the 2002 presentation.", - "page_start": 75, - "page_end": 75, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "The subsidiaries of Euronet Services Inc., all of which are, directly or indire c t l y, wholly owned are:\n\n- EFT Services Holding B.V., incorporated in the Netherlands\n\n- Euronet Banktechnikai Szolgaltato Kft. (“Bank Tech”), incorporated in Hungary\n\n- Euronet Adminisztracios Szolgaltato Kft. (“Administrative Services”) (formerly SatComNet), incorporated in Hungary\n\n- Bankomat 24/Euronet Sp. z o.o. (“Bankomat”), incorporated in Poland\n\n- EFT-Usluge d o.o., incorporated in Croatia\n\n- Euronet Services GmbH, incorporated in Germany\n\n- EFT Services France SAS, incorporated in France\n\n- Euronet Services spol. s.r.o., incorporated in the Czech Republic\n\n- Euronet Services SRL, incorporated in Romania\n\n- Euronet Services (UK) Limited, incorporated in the United Kingdom\n\n- Euronet USA Inc. (formerly Arkansas Systems, Inc.) (“Euronet USA”) incorporated in Arkansas, United States of America\n\n- EFT Network Services LLC (“Dash”), incorporated in Arkansas, United States of America\n\n- Euronet Holding N.V., incorporated in the Netherlands Antilles (in liquidation)\n\n- Euronet Eft Services Hellas, incorporated in Greece\n\n**( 2 ) Financial Position and Basis of Preparation**\n\nThe Company generated an operating loss of $35.4 million and negative cash flows from operations of $16.4 million for the year ended\n\nDecember 31, 2000, primarily due to the significant costs associated with its investment in delivery, support, re s e a rch and development in its\n\ns o f t w a re subsidiary which was acquired in December 1998. Based on the Company’s current business plan and financial projections, the\n\nCompany expects to reduce operating losses and net cash used in operating activities in 2001. In the Network Services Segment, the\n\nCompany anticipates that increased transaction levels in its ATM network will result in additional revenues without a corresponding incre a s e\n\nin expenses. In addition, the Company expects to further expand its ATM outsourcing services and offer new value-added services, which will\n\np rovide continued revenue growth without significantly increasing direct operating expenses or capital investments. In the Software Solutions\n\nSegment, the Company expects reduced operating expenses and improved operating perf o rmance due to a cost re s t ructuring pro g r a m\n\ni n t roduced in the first quarter of 2001. The Company believes that the credit facility (see note 13), certain asset sales and cash and cash\n\nequivalents at December 31, 2000 will provide the Company with sufficient cash re s o u rces until it achieves positive cash flow.\n\nBased on the above, management is confident that the Company will be able to continue as a going concern. Accord i n g l y, these consolidated\n\nfinancial statements have been pre p a red on a going concern basis which contemplates the continuation and expansion of trading activities as\n\nwell as the realization of assets and liquidation of liabilities in the ord i n a ry course of business.\n\n**( 3 ) S u m m a ry of Significant Accounting Policies and Practices**\n\n(a) Basis of presentation\n\nThe accompanying consolidated financial statements have been pre p a red in accordance with generally accepted accounting principles in\n\nthe United States of America.\n\nAll significant intercompany balances and transactions have been eliminated.\n\n(b) Foreign currencies\n\nF o reign currency transactions are re c o rded at the exchange rate prevailing on the date of the transactions. Assets and\n\nliabilitiesdenominated in foreign currencies are re m e a s u red at rates of exchange on the balance sheet date. Resulting gains and losses on\n\nf o reign currency transactions are included in the consolidated statement of operations and comprehensive loss.\n\nThe financial statements of foreign subsidiaries where the local currency is the functional currency are translated to U.S. dollars using", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "[Notable researchers who hold this view include Anna Wierzbicka,](https://en.wikipedia.org/wiki/Anna_Wierzbicka) <sup>[96]</sup> Hakwan Lau and Matthias\n\nMichel. <sup>[97]</sup>\n\nWierzbicka (who is a linguist) argues that the vocabulary used by consciousness researchers (including\n\nwords like *experience* and *consciousness* [) are not universally translatable, and are \"parochially](https://en.wikipedia.org/wiki/Parochialism)\n\nEnglish.\" <sup>[96]</sup> Weirzbicka calls David Chalmers out by name for using these words, arguing that if\n\n##### **The \"hard-wired view\"**\n\n##### **The \"soft-wired view\"**", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia2.pdf" - }, - { - "text": "### NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS\n\n### FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n\n## **22. SUBSEQUENT EVENTS**\n\nOn 25 August 2000 the Company announced that it had reached two agreements for the\n\nplacement of a total of 16,666,666 ordinary fully paid shares in the Company at an issue price of\n\n30 cents each (Shares).\n\nThe first agreement was with Mr Mark Bradley, who agreed to take a placement of 3,225,000 Shares\n\nby 29 September 2000, followed by, if approved of by shareholders at the Company’s annual general\n\nmeeting, a further 3,441,666 within 7 days of that meeting.\n\nOn Mr Bradley being appointed a Director of the Company, in order to comply with the\n\nrequirements of the Corporations Law and the ASX Listing Rules, the Company and Mr Bradley\n\nagreed to defer the first issue of Shares, making both issues conditional on shareholder approval.\n\nThe second agreement was with Clough Engineering Limited, pursuant to which it agreed to take a\n\nplacement of 3,225,000 Shares by 29 September 2000, followed by, if approved of by shareholders\n\nat the Company’s annual general meeting, 6,775,000 shares, within 7 days of that meeting.\n\nOn 15 June 2000 the Company announced that with effect from 1 July 2000 it acquired a 50%\n\ninterest in OIS MOC Joint Venture Pty Ltd, to be paid for by the issue of 800,000 Shares in the\n\nCompany. OIS MOC Joint Venture Pty Ltd owns the goodwill of a successful labour hire company.\n\nThat company is to be renamed Mermaid Labour and Management Limited (MLML).\n\nMLML offers a full labour hire service inclusive of industrial relations consultancy, negotiating\n\nagreements and awards and were appropriate, provides ongoing management of the labour force.\n\nThe financial effect of the above events have not been reflected in these financial statements.\n\n## **23. EARNINGS PER SHARE**\n\n## **2000 1999**\n\n##### **Cents per Cents per**\n\n##### **Share Share**\n\nBasic earnings per share (0.62) 8.09\n\nDiluted earnings per share (0.21) 8.05\n\n## **2000 1999**\n\n##### **No. No.**\n\nWeighted average number of ordinary\n\nshares on issue used in the calculation\n\nof basic earnings per share 43,000,000 30,356,164\n\n53", - "page_start": 56, - "page_end": 56, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 39\n\n**Nordstrom, Inc.**\n\n**Consolidated Statements of Shareholders’ Equity**\n\nIn millions except per share amounts\n\n**Accumulated**\n\n**Other**\n\n**Common Stock Retained Comprehensive**\n\n**Shares Amount Earnings Loss Total**\n\n**Balance at January 28, 2012** 207.6 $1,484 $517 ($45) $1,956\n\nNet earnings — — 735 — 735\n\nOther comprehensive loss — — — (2) (2)\n\nDividends ($1.08 per share) — — (220) — (220)\n\nIssuance of common stock under stock compensation plans 3.3 114 — — 114\n\nStock-based compensation 0.1 47 — — 47\n\nRepurchase of common stock (14.0) — (717) — (717)\n\n**Balance at February 2, 2013** 197.0 1,645 315 (47) 1,913\n\nNet earnings — — 734 — 734\n\nOther comprehensive earnings — — — 8 8\n\nDividends ($1.20 per share) — — (234) — (234)\n\nIssuance of common stock under stock compensation plans 3.2 124 — — 124\n\nStock-based compensation 0.1 58 — — 58\n\nRepurchase of common stock (9.1) — (523) — (523)\n\n**Balance at February 1, 2014** 191.2 1,827 292 (39) 2,080\n\nNet earnings — — 720 — 720\n\nOther comprehensive loss — — — (25) (25)\n\nDividends ($1.32 per share) — — (251) — (251)\n\nIssuance of common stock for Trunk Club acquisition 3.7 280 — — 280\n\nIssuance of common stock under stock compensation plans 3.6 161 — — 161\n\nStock-based compensation 0.5 70 — — 70\n\nRepurchase of common stock (8.9) — (595) — (595)\n\n**Balance at January 31, 2015 190.1 $2,440**\n\nThe accompanying Notes to Consolidated Financial Statements are an integral part of these financial statements.", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**122** | Nature | Vol 637 | 2 January 2025\n\nmedieval individuals ( *P* ≪ 1 × 10 <sup>−32</sup> ). Instead, the majority of individuals\n\nfrom medieval Poland can be modelled only as a mixture of ancestries\n\nrelated to Roman Iron Age Lithuania, which is similar to ancestries of\n\nindividuals from middle to late Bronze Age Poland (44%, 95% confidence\n\ninterval 36- 51%), an ancestry component related to Hungarian Scyth-\n\nians or Slovakian La Tène individuals (49%, 95% confidence interval\n\n41- 57%) and potentially a minority component of ancestry related to\n\nSarmatians from the Caucasus ( *P* = 0.13) (Fig. 2c). Four out of twelve\n\nindividuals from medieval Poland, three of whom are from the late\n\nViking Age <sup>6</sup> , carried detectable Scandinavian-related ancestry. Some\n\nof the ancestry detected in individuals from later medieval Poland may\n\nhave persisted during the late first millennium ce in the cremating\n\nportion of the population, but regardless, this points to large-scale\n\nancestry transformation in medieval Poland (Fig. 3a). Future data could\n\nshed light on the extent to which this reflects the influence of groups\n\nspeaking Slavic languages in the region.\n\nIn present-day Slovakia, individuals associated with the Iron\n\nAge La Tène period appear close to Hungarian Scythians in the two\n\ndimensions of our MDS analysis, and are modelled as a mixture of\n\ncentral and eastern European ancestry. However, a first-century ce\n\nburial of a 50- 60-year-old woman from Zohor is modelled only with\n\nScandinavian-related ancestry, providing evidence of ancestry related\n\nto the Scandinavian EIA appearing southwest of the range of the Wiel-\n\nbark archaeological complex <sup>5,57</sup> (Fig. 3b). Later early medieval individu-\n\nals from Slovakia have partial Scandinavian-related ancestry, providing\n\nevidence for the integration between expanding and local groups.\n\nNearby, in present-day Hungary, we observe Scandinavian-related\n\nancestry components in several burials dating to the sixth century\n\nce associated with Longobards (Longobard_earlyMED(I)) <sup>10</sup> (Fig. 2c).\n\nThis is consistent with the original study <sup>10</sup> , which reported affinity to\n\npresent-day groups from northwestern Europe (GBR, CEU and FIN in\n\nthe 1000 Genomes Project (1000GP)) <sup>10</sup> but which we can resolve with\n\n3000 BCE 2000 BCE 1000 BCE 1000 CE 2000 CE\n\nScandinavia\n\nSouthern Europe\n\nBritain\n\nCentral\n\nEurope\n\nEastern Europe\n\nBA\n\nItaly\n\nCentral Europe\n\n3000 BCE 2000 BCE\n\nEBA\n\n1000 BCE\n\nTime\n\n0 1000 CE 2000 CE\n\nMLBA Wielbark Middle Ages\n\nLate Roman/Ottoman\n\nEarly Medieval\n\nBaiuvarii\n\nMedieval/present day\n\nEarly Medieval/Longobard Iron Roman\n\nPresent day\n\nPresent day BA/Scythian\n\nBell Beaker/EBA\n\nZohor\n\nSoutheastern Europe\n\nPoland\n\nBritain and Ireland\n\nScandinavia\n\n**e**\n\n**f**\n\n**d**\n\n**c**\n\n**b**\n\n**a**\n\nIron Roman\n\nIron/Republic Imperial Late Antiquity (Early) Medieval\n\nEarly Medieval\n\nPresent day\n\nPresent day Medieval Iron Roman BA\n\nBA EIA Viking Age Medieval Present day\n\nDriffeld\n\nTerrace\n\nTarquinia\n\nLate Etruscan\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n2000 BCE 0\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n### **Fig. 3 | Time transects across six geographical regions in Europe.**\n\n**a** - **f** , Ancestry change visualized over a time transect spanning from the Bronze\n\nAge to the present day in Poland ( **a** ), southeastern Europe ( **b** ), central Europe\n\n( **c** ), Italy ( **d** ), Britain and Ireland ( **e** ) and Scandinavia ( **f** ). The maps show sample\n\nlocations of all available ancient genomes with at least 0.5× coverage from\n\nthese regions (Supplementary Table 1). Their ancestry is shown on the same\n\nMDS model as in Fig. 2a for each time period. For each geographic region,\n\nthe early medieval period is highlighted in orange and the area in the MDS", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" - }, - { - "text": "guarantees for financial instruments and as deposits with customs officials. The decrease resulted primarily from the settlement of the forw a rd\n\nf o reign exchange contracts using restricted cash and a release of restricted cash resulting from the posting of a surety bond with the Hungarian\n\nbanking institution that supplies cash to the Company’s ATM network in Hungary.\n\n**Trade Accounts** Trade accounts receivable increased to $9.5 million at December 31, 2000 from $7.9 million at December 31, 1999 due\n\nprimarily to sales from the Software Solutions Segment and increased Network Services Segment revenues.\n\n**P r o p e r t y, Plant and Equipment** Net pro p e rt y, plant and equipment decreased to $31.7 million at December 31, 2000 from $36.7 million at\n\nDecember 31, 1999. This decrease is due primarily to a reduction in the rate of installation of ATMs and fixed asset additions. Fixed asset\n\nd e p reciation was in excess of fixed asset additions, and the write-off of $800,000 in ATM hard w a re further reduced the net fixed asset position.\n\n**Intangible Assets** The decrease in net intangible assets to $2.6 million at December 31, 2000 from $16.3 million at December 31, 1999 is due\n\nprimarily to the $11.2 million write-down of goodwill and other identifiable intangible assets associated with the Software Solutions Segment (see\n\nNote 9 to the Consolidated Financial Statements - Intangibles). In addition, the decrease is the result of amortization of purchased intangibles\n\na c q u i red in the Euronet USA acquisition in 1998, and the SBK and Dash acquisitions in 1999.\n\n**Current Liabilities** C u rrent liabilities decreased to $20.5 million at December 31, 2000 from $26.9 million at December 31, 1999. This decre a s e\n\nis due primarily to decreases in accrued expenses, billings in excess of costs and estimated earnings on software installation costs and settlement of\n\nthe forw a rd foreign exchange contracts.\n\n**Capital Lease** Total capital lease obligations including current installments increased to $11.5 million at December 31, 2000 from $10.6 million\n\nat December 31, 1999. This increase is due primarily to additional capital leases resulting from the Company's purchase of Budapest Bank’s AT M\n\nnetwork, consisting of 147 ATMs on May 1, 2000.\n\n**Notes Payable** Notes payable increased to $77.2 million at December 31, 2000 from $72.8 million at December 31, 1999. This is the result of\n\nseveral transactions as follows:\n\n*(in millions)*\n\nBalance at December 31, 1999 $ 7 2 . 8 .\n\nU n realized foreign exchange gain (DEM vs. US$) (4.4)\n\nA c c retion of bond intere s t 8 . 8 .\n\nBalance at December 31, 2000 $ 7 7 . 2 .\n\n**S t o c k h o l d e r’s Deficit** Stockholders’ deficit increased to $44.8 million at December 31, 2000 from $9.5 million at December 31, 1999. This is\n\ndue to the net loss for the year ended December 31, 2000 of $49.6 million which was offset by an increase in additional paid in capital of $14.4\n\nmillion due to the sale of 1,882,723 shares of common stock for proceeds of $13.0 million, the issue of $400,000 of warrants and the exercise of\n\n390,231 stock options for proceeds of $900,000.\n\n**Year 2000 Compliance**\n\nThe Company’s European and U.S. Year 2000 compliance teams re p o rted no material Year 2000 problems during the advent of the year 2000,\n\neither with Euro n e t ’s own systems or the systems of its customers. The Company is unaware of any material Year 2000 complications to date.\n\n**Impact of New Accounting Pronouncements Not Yet Adopted**\n\n**S FAS 133** The Company is re q u i red to adopt Statement of Financial Accounting Standard (SFAS) No. 133 “Accounting for Derivative\n\nI n s t ruments and Hedging Activities” as amended by SFAS No. 138 for US GAAP re p o rting as of 1 January 2001. SFAS 133 and 138 establish\n\naccounting and re p o rting standards for derivative instruments, including certain derivative instruments embedded in other contracts (collectively\n\nre f e rred to as derivatives).", - "page_start": 22, - "page_end": 22, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "#### **To Our Shareholders**\n\n###### *I* *n our report to you last year, we noted that Euronet’s success has been built in large part on*\n\n###### *the question “Would you like another transaction?” The answer from our clients and their*\n\n###### *customers was a resounding “Yes!”*\n\n###### *To reflect the rapid changes taking place in financial transactions worldwide, even that question*\n\n###### *has evolved. So in 2000, we also began asking “How would you like your next transaction?”*\n\nIn 2000, Euronet Worldwide focused on providing ways people can access their financial accounts and transactions\n\nthrough various electronic touchpoints. New secure transaction types and touchpoints—ATMs, point-of-sale (POS)\n\ndevices, the Internet and mobile phones—continued to fuel transaction growth every month. In 2000, we processed a\n\nrecord 52.7 million billable transactions, a 60% increase over 1999, and in December 2000, our transaction levels\n\nexceeded 5 million per month and continue to accelerate.\n\nTaken together, our transaction growth and expanding number of consumer touchpoints\n\ntranslated into an accelerating and recurring revenue stream, which greatly improved our\n\nbottom line. Our 2000 revenue of $52.7 million represented a 27% increase over the\n\ncompany’s 1999 revenue of $41.5 million. Euronet’s 2000 EBITDA also improved\n\n$2.4 million, or 14.5%, over 1999.\n\nThis year we continued to focus on our core business of ATM driving and transaction\n\nprocessing, and we pursued new transactions through our mobile and Internet\n\nbanking solutions. We also implemented our bill payment initiative, starting\n\nwith electronic payments for prepaid mobile airtime. We are pleased to\n\nreport that in 2000 our Network Services business turned EBITDA\n\npositive and posted revenue of $36.9 million, an increase of 39% over\n\n1999 revenue.\n\nAdditional milestones were reached through several new strategic\n\npartnerships we announced late in the year. Gemplus, Sila\n\nCommunications and Aether Systems chose Euronet mobile products\n\nto supplement their product offerings, proving the strength of\n\nEuronet’s mobile products. Teaming up with these partners will\n\nfurther increase the sales penetration of our suite of mobile payment\n\nsolutions around the world.\n\n## **1**", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_EEFT_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_AIT_2012.pdf", - "query": "Under which name was the Applied company initially fouded ?", - "target_page": 6, - "target_passage": "The Company was founded in 1923 by Joseph M. Bruening as The Ohio Ball Bearing Company", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "Company’s filings with the Securities and Exchange Commission.\n\nWe caution the reader that the above list of factors may not be exhaustive. The\n\nCompany does not assume any obligation to update any forward-looking state-\n\nment, whether as a result of new information, future events or otherwise.\n\n**FO RWARD - LO O K I NG S TATEMENTS**", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY ■ 22\n\n#### **SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n##### * **Recently Issued Accounting Standards:** *\n\nIn December 2003, the FASB issued FASB Interpretation No. 46 (revised December 2003),“Consolidation of Variable Interest Entities,” which addresses how a business enterprise should evaluate whether it has a controlling financial interest in an entity through means other than voting rights and accordingly should consolidate the entity. FIN 46R replaces FASB Interpretation No. 46, “Consolidation of Variable Interest Entities,” (VIE), which was issued in January 2003. The Company will be required to apply FIN 46R to variable interests in VIEs created after December 31, 2003. For variable interests in VIEs created before January 1, 2004, the Interpretation will be applied beginning on January 1, 2005, except it must be applied in the fourth quarter of 2003 for any VIE’s that are considered to be special purpose entities. For any VIEs that must be consolidated under FIN 46R that were created before January 1, 2004, the assets, liabilities and non-controlling interests of the VIE initially would be measured at their carrying amounts with any difference between the net amount added to the balance sheet and any previously recognized interest being recognized as the cumulative effect of an accounting change. If determining the carrying amounts is not practicable, fair value at the date FIN 46R first applies may be used to measure the assets, liabilities and non-controlling interest of the VIE. The Company is evaluating the impact of applying FIN 46R to existing VIEs in which it has variable interests and does not believe the application will have a material impact on the Company’s consolidated financial statements.\n\nIn May 2003, the Financial Accounting Standards Board (“FASB”) issued SFAS No. 150, “Accounting for Certain Financial Instruments with Characteristics of Liabilities and Equity,” which was effective at the beginning of the first interim period beginning after June 15, 2003. This Statement establishes standards for the classification and measurement of certain financial instruments with characteristics of both liabilities and equity. The Statement also includes required disclosures for financial instruments within its scope. For the Company, the Statement was effective for instruments entered into or modified after May 31, 2003 and otherwise will be effective as of January 1, 2004, except for mandatorily redeemable financial instruments. For certain mandatorily redeemable financial instruments, the Statement will be effective for the Company on January 1, 2005. The effective date has been deferred indefinitely for certain other types of mandatorily redeemable financial instruments. The Company currently does not have any financial instruments that are within the scope of this Statement.", - "page_start": 23, - "page_end": 23, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "46\n\nFIN 46R is effective at the end of the first interim period ending after\n\nMarch 15, 2004. Entities that have adopted FIN 46 prior to this effective\n\ndate can continue to apply the provision of FIN 46 until the effective date\n\nof FIN 46R. The Company adopted FIN 46 on January 3, 2004, and it did\n\nnot have an impact on the Company’s financial statements.\n\nThe Financial Accounting Standards Board finalized SFAS\n\nNo. 150, “Accounting for Certain Financial Instruments with Charac-\n\nteristics of both Liabilities and Equity,” effective for financial instru-\n\nments entered into or modified after May 31, 2003, and otherwise is\n\neffective at the beginning of the first interim period beginning after\n\nJune 15, 2003. The adoption of SFAS No. 150 did not have an impact\n\non the Company’s financial statements.\n\nDuring 2002, the Financial Accounting Standards Board\n\nfinalized SFAS No. 146, “Accounting for Costs Associated with Exit or\n\nDisposal Activities” for exit and disposal activities that are initiated\n\nafter December 31, 2002. This Statement requires that a liability for a\n\ncost associated with an exit or disposal activity be recognized when the\n\nliability is incurred. The Company applied this statement to its 2003\n\nrestructuring activities which resulted in a charge of $8.5 million\n\nduring 2003.\n\nThe Financial Accounting Standards Board also issued\n\nInterpretation No. 45, “Guarantor’s Accounting and Disclosure\n\nRequirements for Guarantees, Including Indirect Guarantees of\n\nIndebtedness to Other.” FIN 45 clarifies the requirements of SFAS\n\nNo. 5, “Accounting for Contingencies” relating to the guarantor’s\n\naccounting for and disclosure of the issuance of certain types of guar-\n\nantees. The provisions for initial recognition and measurement are\n\neffective on a prospective basis for guarantees that are issued or modi-\n\nfied after December 31, 2002. The adoption did not have a material\n\nimpact on the Company’s financial statements.\n\nIn December 2003, the Financial Accounting Standards\n\nBoard issued a revised SFAS No. 132, “Employers’ Disclosures about\n\nPensions and Other Postretirement Benefits.” In 2003, the Company\n\nadopted the revised disclosure requirements of this pronouncement.\n\n* **RECLAS S I FI CATI O N S** *\n\nCertain prior year amounts have been reclassified to conform to the\n\n2003 presentation.\n\n####### **Restructuring Related Charges**\n\nAs a result of the Company’s business simplification and cost reduction\n\nstrategies, the Company closed two office furniture facilities located in\n\nMilan, Tennessee, and Hazleton, Pennsylvania, and consolidated pro-\n\nduction into other U.S. manufacturing locations. Charges for the\n\nclosures totaled $15.7 million, which consists of $6.7 million of acceler-\n\nated depreciation of machinery and equipment which was recorded in\n\ncost of sales, $3.4 million of severance, and $5.6 million of facility exit,\n\nproduction relocation, and other costs which were recorded as restruc-\n\nturing costs. A total of 316 members were terminated and received\n\nseverance due to these shutdowns. The closures and consolidation are\n\nsubstantially complete.\n\nThe Hazleton, Pennsylvania, facility is an owned facility and\n\nhas been reclassified to current assets as it is currently being held as\n\navailable for sale. It is included in the “Prepaid expenses and other cur-\n\nrent assets” in the January 3, 2004, condensed consolidated balance\n\nsheet at its carrying value of $2.1 million. The Milan, Tennessee, facility\n\nis a leased facility that is no longer being used in the production of\n\ngoods. The restructuring expense for 2003 included $1.4 million of\n\ncosts that will continue to be incurred under the lease contract reduced\n\nby estimated sublease rentals that could be reasonably obtained.\n\nDuring 2002, the Company recorded a pretax charge of\n\napproximately $5.4 million due to the shutdown of an office furniture\n\nfacility in Jackson, Tennessee. A total of 125 members were terminated", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "38\n\nclaims. The Company currently has a claim for approximately $7.6 mil-\n\nlion pending against it arising out of the bankruptcy of a customer filed\n\nin 2001. The Company was named a critical vendor by the bankruptcy\n\ncourt and, accordingly, was paid in full for all outstanding receivables.\n\nThe claim alleges that the Company received preferential payments\n\nfrom the customer during the ninety days before the customer filed for\n\nbankruptcy protection. The claim was brought in February 2003. The\n\nCompany has recorded an accrual with respect to this contingency, in\n\nan amount substantially less than the full amount of the claim, which\n\nrepresents the best estimate within the range of likely exposure and\n\nintends to vigorously defend against the claim. Given the nature of this\n\nclaim, it is possible that the ultimate outcome could differ from the\n\nrecorded amount. It is our opinion, after consultation with legal coun-\n\nsel, that additional liabilities, if any, resulting from these matters, are\n\nnot expected to have a material adverse effect on our financial condi-\n\ntion, although such matters could have a material effect on our\n\nquarterly or annual operating results and cash flows when resolved in\n\na future period.\n\n####### **Looking Ahead**\n\nThe Company is encouraged by indications that the economy is recov-\n\nering and is cautiously optimistic that the office furniture industry will\n\nbegin to rebound in the second half of 2004. Global Insight, BIFMA’s\n\nforecasting consultant, increased its estimate for the industry shipment\n\ngrowth from 2.4% to 5.6% in 2004, with first quarter flat and improving\n\nas the year progresses.\n\nThe hearth segment is impacted by the housing market,\n\nwhich may experience a slight decline from record high levels, but is\n\nexpected to remain at healthy levels. Management believes its strong\n\nbrand recognition and new innovative product introductions in addition\n\nto strengthening distribution will allow it to grow its hearth segment.\n\nOn January 5, 2004, the Company completed the acquisition\n\nof Paoli Inc., a leading provider of wood case goods and seating. The\n\nCompany intends to continue to build on Paoli’s strong position in the\n\nmarket and excellent selling capabilities while leveraging its lean enter-\n\nprise practices to achieve greater cost efficiencies and improved\n\ncustomer performance.\n\nThe Company’s strategy is to grow its business through\n\naggressive investment in building its brands, enhancing its strong\n\nmember-owner culture, and remaining focused on its rapid continu-\n\nous improvement program to continue to build best total cost. The\n\nCompany plans to reinvest a large portion of its cost savings from plant\n\nconsolidations and its rapid continuous improvement program to con-\n\ntinue to build brands, product solutions, and selling models.\n\nBecause of the following factors, as well as other variables\n\naffecting the Company’s operating results, past financial performance\n\nmay not be a reliable indicator of future performance, and historical\n\ntrends should not be used to anticipate results or trends in future\n\nperiods:\n\n**-** competition within the office furniture and fireplace industries,\n\nincluding competition from imported products and competitive\n\npricing;\n\n**-** increases in the cost of raw materials, including steel, which is the\n\nCompany’s largest raw material category;\n\n**-** increases in the cost of health care benefits provided by the\n\nCompany;\n\n**-** reduced demand for the Company’s storage products caused by\n\nchanges in office technology, including the change from paper record\n\nstorage to electronic record storage;\n\n**-** the effects of economic conditions on demand for office furniture,\n\ncustomer insolvencies and related bad debts, and claims against the\n\nCompany that it received preferential payments;\n\n**-** changes in demand and order patterns from the Company’s customers,\n\nparticularly its top ten customers, which represented approximately\n\n36% of net sales in 2003;", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "flows or future changes in the Company’s business plan could materially affect its evaluations. No such changes are anticipated at this time.\n\nThe Company assesses goodwill for impairment pursuant to SFAS No. 142 which requires that goodwill be assessed whenever events or changes in\n\ncircumstances indicate that the carrying value may not be recoverable, or, at a minimum, on an annual basis by applying a fair value test.\n\n**F O R WA R D - L O O K I N G S T AT E M E N T S**\n\nThe statements in this Management’s Discussion and Analysis and elsewhere in this Annual Report that are forward-looking are based upon current\n\nexpectations, and actual results may differ materially. Therefore, the inclusion of such forward-looking information should not be regarded as a\n\nrepresentation by the Company that the objectives or plans of the Company will be achieved. Such statements include, but are not limited to, the Company’s\n\nexpectations regarding future revenues, cost of goods sold, gross profit, operating income, income from continuing operations, cash flows from operations,\n\ngrowth in product lines, annual growth in earnings per share from continuing operations, and availability of equity and debt financing. Words such as\n\n“anticipates,” “believes,” “intends,” “expects” and variations of such words and similar expressions are intended to identify such forward-looking statements.\n\nForward-looking statements contained herein involve numerous risks and uncertainties, and there are a number of factors that could cause actual results to\n\ndiffer materially, including, but not limited to, the following: changing economic, market and business conditions; acts of war or terrorism; the effects of\n\ngovernmental regulation; the impact of competition and new technologies; slower-than-anticipated introduction of new products or implementation of\n\nmarketing strategies; implementation of new manufacturing processes or implementation of new information systems; the Company’s ability to protect its\n\nintellectual property; changes in the prices of raw materials; changes in product mix; product liability claims and product recalls; the ability to attract and\n\nretain qualified personnel and the loss of any significant customers. In addition, assumptions relating to budgeting, marketing, product development and\n\nother management decisions are subjective in many respects and thus susceptible to interpretations and periodic review which may cause the Company to\n\nalter its marketing, capital expenditures or other budgets, which in turn may affect the Company’s results of operations and financial condition.", - "page_start": 28, - "page_end": 28, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "The Company adopted SFAS No. 142 effective January 1, 2002. The required adoption of SFAS No. 142 is considered a change in accounting principle and\n\nthe cumulative effect of adopting this standard resulted in a $1.6 million non-cash, after-tax charge in 2002. This charge had no effect on the Company’s\n\ncash position or the balance of its outstanding indebtedness, and it did not have any impact on earnings from continuing operations in 2002. As previously\n\ndiscussed, the Company recorded a non-cash gain from discontinued operations during 2001 related to the reversal of a reserve established when the\n\nCompany disposed of its natural gas operations in 1997. This gain had no effect on the Company’s cash position or the balance of its outstanding\n\nindebtedness, and it did not have any impact on earnings from continuing operations in 2001.\n\nThe Company believes that its existing cash and cash equivalents, cash flows from operations and borrowings available under the Company’s Credit Facility,\n\nsupplemented, if necessary, with equity or debt financing, which the Company believes would be available, will be sufficient to fund the Company’s cash\n\nrequirements for at least the foreseeable future.\n\nCompanies sometimes establish legal entities for a specific business transaction or activity in the form of a Variable Interest Entity (“VIE”). VIEs may be\n\nused to facilitate off-balance sheet financing, acquire financial assets, raise cash from owned assets and similar transactions. The Company has no VIEs, no\n\noff-balance sheet financing arrangements or any derivative financial instruments.\n\n**I M P A C T O F I N F L AT I O N**\n\nThe Company experiences the effects of inflation primarily in the prices it pays for labor, materials and services. Over the last three years, the Company has\n\nexperienced the effects of moderate inflation in these costs. At times, the Company has been able to offset a portion of these increased costs by increasing\n\nthe sales prices of its products. However, competitive pressures have not allowed for full recovery of these cost increases.\n\n**N E W A C C O U N T I N G P R O N O U N C E M E N T S**\n\nIn December 2003, the Financial Accounting Standards Board (“FASB”) issued a revised SFAS No. 132, “Employers’ Disclosures about Pensions and Other\n\nPostretirement Benefits.” The impact to the Company for this item is described in Note 1 of Notes to the Consolidated Financial Statements.\n\n**C R I T I C A L A C C O U N T I N G P O L I C I E S**\n\nIn the ordinary course of business, the Company makes estimates and assumptions relating to the reporting of results of operations and financial condition\n\nin the preparation of its financial statements in conformity with accounting principles generally accepted in the United States of America. The Company\n\nbelieves the following discussion addresses the Company's most critical accounting policies, which are those that are most important to the portrayal of\n\nthe Company's financial condition and results and require management's most difficult, subjective and complex judgments, often as a result of the need to\n\nmake estimates about the effect of matters that are inherently uncertain. Actual results could differ significantly from those estimates under different\n\nassumptions and conditions.\n\nThe Company assesses the impairment of its long-lived identifiable assets, excluding goodwill which is tested for impairment pursuant to SFAS No. 142 as\n\nexplained below, whenever events or changes in circumstances indicate that the carrying value may not be recoverable. This review is based upon projections\n\nof anticipated future cash flows. While the Company believes that its estimates of future cash flows are reasonable, different assumptions regarding such cash\n\nflows or future changes in the Company’s business plan could materially affect its evaluations. No such changes are anticipated at this time.", - "page_start": 28, - "page_end": 28, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "##### **Recently Issued Accounting Standards**\n\nIn December 2003, the FASB issued FASB Interpretation No. 46 (revised December 2003),“Consolidation of Variable Interest Entities,” which addresses how a business enterprise should evaluate whether it has a controlling financial interest in an entity through means other than voting rights and accordingly should consolidate the entity. FIN 46R replaces FASB Interpretation No. 46, “Consolidation of Variable Interest Entities,” (VIE), which was issued in January 2003. The Company will be required to apply FIN 46R to variable interests in VIEs created after December 31, 2003. For variable interests in VIEs created before January 1, 2004, the Interpretation will be applied beginning on January 1, 2005, except it must be applied in the fourth quarter of 2003 for any VIE’s that are considered to be special purpose entities. For any VIEs that must be consolidated under FIN 46R that were created before January 1, 2004, the assets, liabilities and non-controlling interests of the VIE initially would be measured at their carrying amounts with any difference between the net amount added to the balance sheet and any previously recognized interest being recognized as the cumulative effect of an accounting change. If determining the carrying amounts is not practicable, fair value at the date FIN 46R first applies may be used to measure the assets, liabilities and non-controlling interest of the VIE. The Company is evaluating the impact of applying FIN 46R to existing VIEs in which it has variable interests and does not believe the application will have a material impact on the Company’s consolidated financial statements.\n\nIn May 2003, the Financial Accounting Standards Board (“FASB”) issued SFAS No. 150, “Accounting for Certain Financial Instruments with Characteristics of Liabilities and Equity,” which was effective at the beginning of the first interim period beginning after June 15, 2003. This Statement establishes standards for the classification and measurement of certain financial instruments with characteristics of both liabilities and equity. The Statement also includes required disclosures for financial instruments within its scope. For the Company, the Statement was effective\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 54, - "page_end": 54, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "4\n\nAugust 15, 2012\n\nNeil A. Schrimsher\n\nChief Executive Officer\n\nBenjamin J. Mondics\n\nPresident & Chief Operating Officer\n\nLong-Range Strategy: *Translating Potential Into Results (continued)*\n\nAs a leadership team, we have developed a long-range strategic plan\n\nto accelerate profitable growth. Our plan includes numerous growth\n\nopportunities across our business, and implementation is underway, including:\n\n- Leveraging sales capabilities and existing CRM (Customer Relationship\n\nManagement) processes to expand our value-add and reach new customers\n\n- Strengthening our position in attractive vertical markets while growing in\n\nour core segments\n\n- Expanding our products and solutions; growing our core bearings and\n\npower transmission business at a rate greater than the market, along\n\nwith focused product expansion via logical extensions and enhanced local\n\ncapabilities\n\n- Building on our fluid power market leadership via strengthened product\n\nofferings and value-added services for OEM and MRO customers\n\n- Enhancing our operational excellence by capturing the full benefits of our\n\nERP system and driving continuous improvement with customers, suppliers\n\nand throughout our operations\n\n- Accelerating strategic acquisitions by leveraging our cash generation and\n\nstrong financial position to extend into new markets\n\nToday, nearly 90 years since our founding, we are well-positioned and\n\ncommitted to realizing our potential - a potential that builds upon a proud\n\npast and the dedication of our associates around the globe.\n\nAs we look ahead, we see a bright future with excellent opportunities for\n\ngrowth and increased profitability - organically, via acquisition, and through\n\nour technology investments. *We are in exciting times, and we firmly believe*\n\n*our best days are ahead.*\n\nThank you for your ongoing investment and support of Applied.\n\n##### **Celebrating**\n\n## **90 Years**\n\n##### **of Strength in**\n\n##### **Distribution**\n\nIn January 2013, Applied\n\nIndustrial Technologies\n\nwill celebrate its 90th\n\nanniversary. The Company\n\nwas founded in 1923 by\n\nJoseph M. Bruening as\n\nThe Ohio Ball Bearing\n\nCompany, a distributor\n\nof bearings to customers\n\nin Cleveland, Ohio. Over\n\nthe years, the Company\n\ngrew to become a regional\n\ndistributor of bearings,\n\nthen an international\n\ndistributor of a wide range\n\nof industrial technologies\n\nand components. Today,\n\nnearly 90 years since our\n\nbeginning, customers\n\nserved by Applied\n\nbenefit from our years of\n\naccumulated experience,\n\nexpertise and exceptional\n\nability to improve our\n\ncustomers’ operations.\n\nJoin us as we kick-off a\n\nyear-long celebration of\n\nour strength in distribution.\n\nWe thank all of you, our\n\nstakeholders, for making\n\nit possible.", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "N O T E S T O C O N S O L I D A T E D F I N A N C I A L S T A T E M E N T S ( C O N T I N U E D )\n\nS T O C K O P T I O N P L A N S\n\nThe Company’s 1997 Stock Incentive Plan provides for the grant to key employees of incentive and nonqualified stock options, stock appreciation rights,\n\nrestricted stock and performance shares. In addition, under the 1997 Stock Incentive Plan, outside directors (directors who are not employees of the\n\nCompany or any subsidiary) receive automatic annual grants of nonqualified stock options to purchase 2,000 shares of common stock. Under the 1997\n\nStock Incentive Plan, 624,425 shares in the aggregate of common stock were reserved for grants. The purchase price of shares issued on the exercise of\n\nincentive options must be at least equal to the fair market value of such shares on the date of grant. The purchase price for shares issued on the exercise\n\nof nonqualified options and restricted and performance shares is fixed by the Compensation Committee of the Board of Directors. The options granted\n\nbecome exercisable as determined by the Compensation Committee and expire no later than 10 years after the date of grant.\n\nDuring 1994, the stockholders of the Company approved the adoption of the Company’s 1994 Key Employee Stock Incentive Plan, which provided for the\n\ngrant to key employees of incentive and nonqualified options to purchase shares of common stock of the Company. During 1998, the Company’s\n\nstockholders approved the adoption of the Company’s 1998 Outside Directors Stock Option Plan which, as amended, provided for the automatic grant on\n\nFebruary 1, 1998 and February 1, 1999 of nonqualified stock options to the Company’s outside directors. Although no additional options may be granted\n\nunder the 1994 Key Employee Stock Incentive Plan or the 1998 Outside Directors Stock Option Plan, all outstanding options under those plans continue\n\nto be governed by the terms and conditions of those plans and the existing option agreements for those grants.\n\nOption transactions for the three years in the period ended December 31, 2003 are as follows:\n\nWEIGHTED AVERAGE\n\nSHARES EXERCISE PRICE\n\nOptions outstanding at January 1, 2001 492,350\n\n| $ 10.50 $ 15.31 $ 10.84 $ 10.46 |\n|:---|\n| $ 11.62 $ 21.05 $ 8.34 $ 11.06 |\n| $ 15.82 $ 29.30 $ 20.18 $ 14.19 |\n| $ 17.38 |\n| $ 11.89 $ 13.81 $ 15.41 |\n\nGranted in 2001 81,000\n\nExpired in 2001 (13,600)\n\nExercised in 2001 (234,900)\n\nOptions outstanding at December 31, 2001 324,850\n\nGranted in 2002 201,500\n\nExpired in 2002 (5,500)\n\nExercised in 2002 (53,500)\n\nOptions outstanding at December 31, 2002 467,350\n\nGranted in 2003 12,000\n\nExpired in 2003 (4,550)\n\nExercised in 2003 (187,200)\n\nOptions outstanding at December 31, 2003 287,600\n\nExercisable options at December 31, 2001 174,350\n\nExercisable options at December 31, 2002 261,100\n\nExercisable options at December 31, 2003 217,000\n\n8 As of December 31, 2003, there remained 72,534 shares for which options may be granted in the future under the 1997 Stock Incentive Plan. The following", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "**Headquarters:** Cleveland, Ohio, USA\n\n**Operating Facilities:** More than 500 in the\n\nUnited States, Canada, Mexico, Puerto Rico,\n\nAustralia and New Zealand\n\n**E-Commerce:** www.Applied.com\n\n**Distribution Centers:** 9\n\n**Stock Keeping Units (SKUs) Available**\n\n**to Customers:** More than 4 million\n\n**Product Manufacturers:** More than 2,000\n\n**Stock Ticker Symbol:** AIT, listed on the\n\nNew York Stock Exchange\n\n**Employee Associates:** Approximately 4,900\n\nData current as of August 1, 2012\n\nThis report contains statements that are forward-looking, as that term\n\nis defined by the Securities and Exchange Commission in its rules,\n\nregulations and releases. Applied intends that such forward-looking\n\nstatements be subject to the safe harbors created thereby. All forward-\n\nlooking statements are based on current expectations regarding\n\nimportant risk factors, including those identified on page 12 of this\n\nreport and in our Annual Report on Form 10-K for the fiscal year ended\n\nJune 30, 2012. Accordingly, actual results may differ materially from\n\nthose expressed in the forward-looking statements, and the making of\n\nsuch statements should not be regarded as a representation by Applied\n\nor any other person that results expressed therein will be achieved.\n\n*PURPOSE*\n\n*PRODUCT*\n\n*PERFORMANCE*\n\n*PEOPLE*\n\nApplied Industrial Technologies is a leading\n\nindustrial distributor that offers more than four\n\nmillion parts to serve the needs of MRO and\n\nOEM customers in virtually every industry. In\n\naddition, Applied <sup>®</sup> provides engineering, design\n\nand systems integration for industrial and fluid\n\npower applications, as well as customized\n\nmechanical, fabricated rubber and fluid power\n\nshop services. Applied also offers maintenance\n\ntraining and inventory management solutions\n\nthat provide added value to its customers.\n\n### Applied at a Glance", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_AIT_2012.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_AIT_2012.pdf", - "query": "By how much does Applied company plan to contribute to its pension benefits between 2018 and 2022 ?", - "target_page": 36, - "target_passage": "2018 through 2022 15,200", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\n\nNOTE 22: PENSIONS\n\nWe have contributory and non-contributory defined benefit pension\n\nplans that are made available to most of our employees. The plans\n\nprovide pensions based on years of service, years of contributions and\n\nearnings. We do not provide any non-pension post-retirement benefits.\n\nWe also provide unfunded supplemental pension benefits to certain\n\nexecutives.\n\nThe assets of the defined benefit pension plans are held in segregated\n\naccounts isolated from our assets. We administer the defined benefit\n\npension plans pursuant to applicable regulations, the Statement of\n\nInvestment Policies and Procedures and to the mandate of the Pension\n\nCommittee of the Board of Directors. The Pension Committee of the\n\nBoard of Directors oversees our administration of the defined benefits\n\npension plans, which includes the following principal areas:\n\n- overseeing the funding, administration, communication and\n\ninvestment management of the plans\n\n- selecting and monitoring the performance of all third parties\n\nperforming duties in respect of the plans, including audit, actuarial\n\nand investment management services\n\n- proposing, considering and approving amendments to the defined\n\nbenefit pension plans\n\n- proposing, considering and approving amendments of the Statement\n\nof Investment Policies and Procedures\n\n- reviewing management and actuarial reports prepared in respect of\n\nthe administration of the defined benefit pension plans\n\n- reviewing and approving the audited financial statements of the\n\ndefined benefit pension plan funds.\n\nThe assets of the defined benefit pension plans are invested and\n\nmanaged following all applicable regulations and the Statement of\n\nInvestment Policies and Procedures, and reflect the characteristics and\n\nasset mix of each defined benefit pension plan. Investment and market\n\nreturn risk is managed by:\n\n- contracting professional investment managers to execute the\n\ninvestment strategy following the Statement of Investment Policies\n\nand Procedures and regulatory requirements\n\n- specifying the kinds of investments that can be held in the plans and\n\nmonitoring compliance\n\n- using asset allocation and diversification strategies, and\n\n- purchasing annuities from time to time.\n\nThe funded pension plans are registered with the Office of the\n\nSuperintendent of Financial Institutions and are subject to the Federal\n\nPension Benefits Standards Act. The plans are also registered with the\n\nCanada Revenue Agency and are subject to the Canada Income Tax\n\nAct. The benefits provided under the plans and the contributions to the\n\nplans are funded and administered in accordance with all applicable\n\nlegislation and regulations.\n\nSignificant estimates are involved in determining pension related\n\nbalances. Actuarial estimates are based on projections of employees’\n\ncompensation levels at the time of retirement. Maximum retirement\n\nbenefits are primarily based on career average earnings, subject to\n\ncertain adjustments. The most recent actuarial valuations were\n\ncompleted as at January 1, 2013.\n\nThe table below sets out the estimated present value of accrued plan\n\nbenefits and the estimated market value of the net assets available to\n\nprovide these benefits for our funded plans at December 31, 2013 and\n\n2012.\n\n**2013** 2012\n\nPlan assets, at fair value **$ 1,037** $ 833\n\nAccrued benefit obligations **1,209** 1,167\n\nDeficiency of plan assets over accrued benefit obligations **(172)** (334)\n\nEffect of asset ceiling limit **(9)** -\n\nNet deferred pension liability **$ (181)** $ (334)\n\nConsists of:\n\nDeferred pension asset **$ 8** $ 9\n\nDeferred pension liability **(189)** (343)\n\nNet deferred pension liability **$ (181)** $ (334)\n\nThe table below shows our pension fund assets for the years ended\n\n2013 and 2012.\n\n**2013** 2012\n\nPlan assets, January 1 **$ 833** $ 684\n\nInterest income **40** 40\n\nRemeasurements, return on plan assets recognized in other", - "page_start": 121, - "page_end": 121, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Plan Assets\n\nThe fair value of each major class of plan assets for the Company’s Qualified Benefit Retirement Plan are valued using quoted market\n\nprices in active markets for identical instruments, or Level 1 in the fair value hierarchy. Following are the fair values and target\n\nallocation as of June 30:\n\nTarget Allocation Fair Value\n\n**2012** 2011\n\nAsset Class:\n\nEquity securities 40 - 70% **$ 3,735**\n\n$ 3,876\n\nDebt securities 20 - 50% **2,382**\n\n1,756\n\nOther 0 - 20% **322**\n\n424\n\nTotal 100% **$ 6,439**\n\n$ 6,056\n\nEquity securities do not include any Company common stock.\n\nThe Company has established an investment policy and regularly monitors the performance of the assets of the trust maintained in\n\nconjunction with the Qualified Defined Benefit Retirement Plan. The strategy implemented by the trustee of the Qualified Defined\n\nBenefit Retirement Plan is to achieve long-term objectives and invest the pension assets in accordance with ERISA and fiduciary\n\nstandards. The long-term primary objectives are to provide for a reasonable amount of long-term capital, without undue exposure\n\nto risk; to protect the Qualified Defined Benefit Retirement Plan assets from erosion of purchasing power; and to provide investment\n\nresults that meet or exceed the actuarially assumed long-term rate of return. The expected long-term rate of return on assets\n\nassumption was developed by considering the historical returns and the future expectations for returns of each asset class as well as\n\nthe target asset allocation of the pension portfolio.\n\nCash Flows\n\nEmployer Contributions\n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in\n\n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets.\n\nEstimated Future Benefit Payments\n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next\n\nfive years and in the aggregate for the subsequent five years:\n\nDuring Fiscal Years Pension Benefits Retiree Health Care\n\nBenefits\n\n2013 $ 6,200\n\n$ 240\n\n2014 5,900\n\n240\n\n2015 5,700\n\n240\n\n2016 4,500\n\n240\n\n2017 1,700\n\n260\n\n2018 through 2022 15,200\n\n1,420\n\n34\n\n#### NOTES TO CONSOLIDATED FINANCIAL STATEMENTS (Continued)\n\n(In thousands, except per share amounts)", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "tax of $1,200). The gross expense is recorded in selling, distribution and administrative expense in fiscal 2012.\n\nKey Executive Restoration Plan\n\nIn fiscal 2012, the Executive Organization & Compensation Committee of the Board of Directors adopted the Key Executive\n\nRestoration Plan (KERP), an unfunded, non-qualified deferred compensation plan, to replace the SERP. The Company recorded\n\n$128 of expense associated with this plan in fiscal 2012.\n\nQualified Defined Benefit Retirement Plan\n\nThe Company has a qualified defined benefit retirement plan that provides benefits to certain hourly associates at retirement.\n\nThese associates do not participate in the Retirement Savings Plan. The benefits are based on length of service and date of\n\nretirement.\n\n31 Applied Industrial Technologies, Inc. and Subsidiaries", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "Performance Grants\n\nIn fiscal 2009 and 2008, the Executive Organization and Compensation Committee made annual awards of three-year performance\n\ngrants to key officers. A target payout was established at the beginning of each three-year performance period. The actual payout\n\nat the end of the period is calculated based upon the Company’s achievement of sales growth, return on sales, and total shareholder\n\nreturn targets. All performance periods had expired by June 30, 2011. During fiscal 2011 and 2010, the Company recorded $1,020\n\nand $(231), respectively, of compensation expense (income) for achievement relative to the total shareholder return-based goals of\n\nthe Company’s performance grants. The liability at June 30, 2011 was $1,558; this was paid in fiscal 2012.\n\nNOTE 10: BENEFIT PLANS\n\nRetirement Savings Plan\n\nSubstantially all U.S. associates participate in the Applied Industrial Technologies, Inc. Retirement Savings Plan. Participants may elect\n\nto contribute up to 50% of their compensation, subject to Internal Revenue Code maximums. The Company makes a discretionary\n\nprofit-sharing contribution to the Retirement Savings Plan generally based upon a percentage of the Company’s U.S. income before\n\nincome taxes and before the amount of the contribution (5% for fiscal 2012, 2011 and 2010). The Company partially matches\n\n401(k) contributions by participants; this match was suspended from January 1, 2009 to June 30, 2010. The Company’s expense for\n\nprofit sharing and matching of associates’ 401(k) contributions was $10,866, $11,251 and $4,891 during fiscal 2012, 2011 and\n\n2010, respectively.\n\nDeferred Compensation Plans\n\nThe Company has deferred compensation plans that enable certain associates of the Company to defer receipt of a portion of their\n\ncompensation and non-employee directors to defer receipt of director fees. The Company funds these deferred compensation\n\nliabilities by making contributions to rabbi trusts. Assets held in these rabbi trusts consist of investments in money market and\n\nmutual funds and Company common stock.\n\nPostemployment Benefit Plans\n\nThe Company provides the following postemployment benefits which, except for the Qualified Defined Benefit Retirement Plan,\n\nare unfunded:\n\nSupplemental Executive Retirement Benefits Plan\n\nThe Company has a non-qualified pension plan to provide supplemental retirement benefits to certain officers. Benefits are\n\npayable beginning at retirement and determinable at retirement based upon a percentage of the participant’s historical\n\ncompensation. On December 19, 2011, the Executive Organization and Compensation Committee of the Board of Directors\n\nfroze participant benefits (credited service and final average earnings) and entry into the Supplemental Executive Retirement\n\nBenefits Plan (SERP) effective December 31, 2011. This action constituted a plan curtailment. The plan liability was remeasured\n\nin conjunction with the curtailment using a 3.5% discount rate and participant final average earnings through the curtailment\n\ndate. The remeasurement in conjunction with the curtailment resulted in an actuarial loss (recorded in other comprehensive\n\nincome (loss)) of $302 ($492 loss, net of income tax of $190).\n\nThe curtailment is reflected in the Company's consolidated balance sheets as: 1) a reduction to the overall SERP liability\n\n(included in postemployment benefits) of $8,860, 2) a reduction to deferred tax assets of $3,411 and 3) an increase in\n\naccumulated other comprehensive income (loss) of $5,449. Prior service costs previously recorded through accumulated other\n\ncomprehensive income (loss) were reclassified into the statements of consolidated income ($3,117 gross expense, net of income\n\ntax of $1,200). The gross expense is recorded in selling, distribution and administrative expense in fiscal 2012.\n\nKey Executive Restoration Plan", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n\nNotes to Consolidated Financial Statements\n\nDecember 31, 2002, 2001 and 2000\n\nF-22\n\nThe following table provides a reconciliation of the plan’s benefit obligations and fair value of plan assets for the\n\nyears ended December 31, 2002 and 2001, and a statement of the funded status as of December 31, 2002 and 2001:\n\n2002 2001\n\nReconciliation of benefit obligations:\n\nBenefit obligation at January 1 $ 14,183,582 $ 11,885,661\n\nService cost - benefits earned during the period 994,630 847,620\n\nInterest cost on projected benefit obligation 983,977 970,710\n\nActuarial loss 45,731 1,117,567\n\nBenefits paid (667,523) (637,976)\n\nBenefit obligation at December 31 15,540,397 14,183,582\n\nReconciliation of fair value of plan assets:\n\nFair value of plan assets at January 1 12,631,250 12,864,027\n\nActual return on plan assets (1,031,005) (337,724)\n\nEmployer contributions 726,989 742,923\n\nBenefits paid (667,523) (637,976)\n\nFair value of plan assets at December 31 11,659,711 12,631,250\n\nFunded status $ (3,880,686) $ (1,552,332)\n\nReconciliation of funded status to accrued\n\npension (liability) asset:\n\nFunded status at December 31 $ (3,880,686) $ (1,552,332)\n\nUnrecognized loss from past experience different than\n\nthat assumed and effects of changes in assumptions 5,109,193 3,268,617\n\nAdditional minimum liability recorded (2,409,795) -\n\nUnrecognized prior-service cost 193,975 211,935\n\nOther (36,644) -\n\nAccrued pension (liability) asset $ (1,023,957) $ 1,928,220\n\nThe Company recorded an additional minimum liability in the year ended December 31, 2002 to reflect the\n\nunderfunded status of the plan. The accrued pension liability at December 31, 2002 represents the difference\n\nbetween the fair value of plan assets and the accumulated benefit obligation. The accumulated benefit obligation is\n\nthe actuarial present value of benefits attributed by the pension benefit formula to employee service rendered prior to\n\nthat date and based on current and past compensation levels. The accumulated benefit obligation differs from the\n\nprojected benefit obligation in that it assumes no increase in future compensation. The following table details the\n\nfinancial statement captions affected by recording the minimum liability:\n\n2002 2001\n\nPrepaid pension asset before adjustment $ 1,385,838 $1,928,220\n\nIntangible asset recorded (included in other assets) (193,975) -\n\nMinimum liability adjustment (2,215,820) -\n\nAccrued pension (liability) asset $(1,023,957) $1,928,220", - "page_start": 85, - "page_end": 85, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "The following table provides information for pension plans with projected benefit obligations and accumulated benefit obligations in\n\nexcess of plan assets:\n\nPension Benefits\n\nJune 30, **2012** 2011\n\nProjected benefit obligations **$ 47,151**\n\n$ 53,490\n\nAccumulated benefit obligations **47,151**\n\n43,528\n\nFair value of plan assets **6,439**\n\n6,056\n\nThe net periodic costs are as follows:\n\nPension Benefits Retiree Health Care Benefits\n\nYear Ended June 30, **2012 --** 2011 -- 2010 -- **2012 --** 2011 -- 2010 --\n\nService cost **$ 289**\n\n$ 460\n\n$ 574\n\n**$ 30**\n\n$ 39\n\n$ 52\n\nInterest cost **2,047**\n\n2,232\n\n2,911\n\n**237**\n\n235\n\n259\n\nExpected return on plan assets **(396 )** (385 ) (351 ) —\n\n—\n\n—\n\nRecognized net actuarial loss (gain) **644**\n\n1,449\n\n924\n\n**(72 )** (83 ) (87 )\n\nAmortization of prior service cost **412**\n\n710\n\n797\n\n**139**\n\n139\n\n148\n\nRecognition of prior service cost upon plan curtailment **3,117**\n\n—\n\n—\n\n—\n\n—\n\n—\n\nNet periodic cost **$ 6,113**\n\n$ 4,466\n\n$ 4,855\n\n**$ 334**\n\n$ 330\n\n$ 372\n\nThe estimated net actuarial loss and prior service cost for the pension plans that will be amortized from accumulated other\n\ncomprehensive income (loss) into net periodic benefit cost over the next fiscal year are $735 and $83, respectively. The estimated\n\nnet actuarial gain and prior service cost for the retiree health care benefits that will be amortized from accumulated other\n\ncomprehensive income (loss) into net periodic benefit cost over the next fiscal year are $(53) and $107, respectively.\n\nAssumptions\n\nThe discount rate is used to determine the present value of future payments. In general, the Company’s liability increases as the\n\ndiscount rate decreases and decreases as the discount rate increases. The Company computes a weighted-average discount rate\n\ntaking into account anticipated plan payments and the associated interest rates from the Citigroup Pension Discount Yield Curve.\n\nThe weighted-average actuarial assumptions used to determine benefit obligations and net periodic benefit cost for the plans were\n\nas follows:\n\nPension Benefits Retiree Health Care Benefits\n\nJune 30, **2012** 2011 **2012** 2011\n\nAssumptions used to determine benefit obligations at year end:\n\nDiscount rate **2.8 %** 4.5 % **4.0 %** 5.5 %\n\nRate of compensation increase **N/A** 5.5 % **N/A** N/A\n\nAssumptions used to determine net periodic benefit cost:\n\nDiscount rate **3.5 %** 4.3 % **5.5 %** 5.5 %\n\nExpected return on plan assets **7.5 %** 7.5 % **N/A** N/A\n\nRate of compensation increase **5.5 %** 5.5 % **N/A** N/A\n\nDue to freezing participant benefits in the SERP plan, the rate of compensation increase is no longer applicable. The assumed health\n\ncare cost trend rates used in measuring the accumulated benefit obligation for retiree health care benefits were 7.5% and 8% as of\n\nJune 30, 2012 and 2011, respectively, decreasing to 5% by 2018.\n\nA one-percentage point change in the assumed health care cost trend rates would have had the following effects as of June 30,\n\n2012 and for the year then ended:\n\nOne-Percentage Point\n\nIncrease Decrease\n\nEffect on total service and interest cost components of periodic expense $ 48\n\n$ (39 )\n\nEffect on postretirement benefit obligation 854\n\n(701 )\n\n33 Applied Industrial Technologies, Inc. and Subsidiaries", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "year, and include actuarial gains and losses, return on plan assets and\n\nany change in the effect of the asset ceiling. These are recognized in\n\nother comprehensive income and retained earnings.\n\nThe cost of pensions is actuarially determined and takes into account\n\nthe following assumptions and methods for pension accounting related\n\nto our defined benefit plans:\n\n- the expected rates of salary increases for calculating increases in\n\nfuture benefits\n\n- mortality rates for calculating the life expectancy of plan members,\n\nand\n\n- past service costs from plan amendments are immediately expensed\n\nin net income.\n\nWe recognize contributions to defined contribution plans as an\n\nemployee benefit expense in operating costs in the consolidated\n\nstatements of income in the periods the employees provide the related\n\nservices.\n\nSee note 22 for more information about our pension plans.\n\n*Termination Benefits*\n\nWe recognize termination benefits as an expense when we are\n\ncommitted to a formal detailed plan to terminate employment before\n\nthe normal retirement date and it is not realistic that we will withdraw it.\n\n####### **Property, Plant and Equipment**\n\n*Recognition and Measurement*\n\nWe recognize property, plant and equipment at cost, less accumulated\n\ndepreciation and accumulated impairment losses.\n\nCost includes expenditures that are directly attributable to the\n\nacquisition of the asset. The cost of self-constructed assets also\n\nincludes:\n\n- the cost of materials and direct labour\n\n- costs directly associated with bringing the assets to a working\n\ncondition for their intended use\n\n- costs of dismantling and removing the items and restoring the site\n\nwhere they are located (see *Provisions* , above), and\n\n- borrowing costs on qualifying assets.\n\nWe use estimates to determine certain costs that are directly\n\nattributable to self-constructed assets. These estimates primarily include\n\ncertain internal and external direct labour associated with the\n\nacquisition, construction, development or betterment of our network.\n\nThey also include interest costs, which we capitalize to certain property,\n\nplant and equipment during construction and development.\n\nWe use significant estimates to determine the estimated useful lives of\n\nproperty, plant and equipment, considering industry trends such as\n\ntechnological advancements, our past experience, our expected use and\n\nour review of asset lives.\n\n98 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 101, - "page_end": 101, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n\nNotes to Consolidated Financial Statements\n\nDecember 31, 2002, 2001 and 2000\n\nF-23\n\nNet periodic pension cost for the years ended December 31, 2002, 2001, and 2000, included:\n\nYear Ended December 31,\n\n2002 2001 2000\n\nService cost - benefits earned during the period $ 994,630 $ 847,620 $ 845,372\n\nInterest cost on projected benefit obligation 983,977 970,710 816,583\n\nExpected return on plan assets (880,562) (1,153,733) (1,058,787)\n\nAmortization of unrecognized net loss 116,722 - -\n\nAmortization of prior-service cost 17,960 17,961 17,961\n\nOther (59,405) (58,954) 58,779\n\nNet periodic pension cost $1,173,322 $ 623,604 $ 679,908\n\nThe following table sets forth the rates used in the actuarial calculations of the present value of benefit obligations\n\nand the rate of return on plan assets:\n\n2002 2001 2000\n\nWeighted average discount rate 6.9% 6.9% 7.5%\n\nRate of increase in future compensation levels 4% 4% 4%\n\nExpected long-term rate of return on assets 6.5% 8.5% 8.5%\n\nAs of December 31, 2002 and 2001, the fair value of the plan’s assets included Company common stock valued at\n\napproximately $468,000 and $297,000, respectively.\n\nThe Company also provides a profit sharing plan, which covers substantially all full-time employees. The profit\n\nsharing plan is a defined contribution plan and allows employees to contribute up to 5% of their base annual salary.\n\nEmployees are fully vested to the extent of their contributions and become fully vested in the Company’s\n\ncontributions over a seven-year vesting period. Costs related to the Company’s defined contribution plan totaled\n\napproximately $2,681,000, $1,858,000 and $1,874,000 in 2002, 2001 and 2000, respectively, and are included in\n\nsalaries and employee benefits in the accompanying consolidated statements of earnings. As of December 31, 2002\n\nand 2001, the fair value of the plan’s assets included Company common stock valued at approximately $14,323,000\n\nand $10,881,000, respectively.\n\n13. DIVIDENDS FROM SUBSIDIARIES:\n\nAt December 31, 2002, approximately $20,728,000 was available for the declaration of dividends by the Company’s\n\nsubsidiary banks without the prior approval of regulatory agencies.\n\n14. REGULATORY MATTERS:\n\nThe Company is subject to various regulatory capital requirements administered by the federal banking agencies.\n\nFailure to meet minimum capital requirements can initiate certain mandatory, and possibly additional discretionary,\n\nactions by regulators that, if undertaken, could have a direct material effect on the Company’s financial statements.\n\nUnder capital adequacy guidelines and the regulatory framework for prompt corrective action, each of Bankshares’\n\nsubsidiaries must meet specific capital guidelines that involve quantitative measures of the subsidiaries’ assets,\n\nliabilities, and certain off-balance-sheet items as calculated under regulatory accounting practices. The subsidiaries’\n\ncapital amounts and classification are also subject to qualitative judgments by the regulators about components, risk\n\nweightings, and other factors.", - "page_start": 86, - "page_end": 86, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**95**\n\nNotes to the Financial Statements\n\ncontinued\n\n### 22. Dividends 2013\n\n$’000\n\n2012\n\n$’000\n\nFinal dividend declared for the year ended 30 June 2012 of 10 cents per fully paid share paid on 1 October 2012 15,148 6,829\n\nInterim dividend declared for the year ended 30 June 2013 of 5 cents per fully paid share paid on 12 April 2013 7,591 15,196\n\nTotal dividends 22,739 22,025\n\nRefer Note 18 for the dividend reinvestment plan portion of total dividends.\n\nThe Group’s franking credit balance as at 30 June 2013 is $880,548 (2012: $880,548).\n\n### 23. Related parties\n\nTransaction with related parties\n\nInformation on remuneration of Directors and Key Management Personnel is disclosed in Note 29.\n\nControlling entity\n\nThe ultimate parent entity of the Group is Kingsgate Consolidated Limited.\n\n### 24. Employee benefits and share-based payments\n\nProvision for employee benefits - current 3,797 2,993\n\nProvision for employee benefits - non-current 5,416 4,482\n\nTotal employee provisions 9,213 7,475\n\nShare-based payments\n\nThe following share-based payments were made during the year:\n\n〉 〉 performance and deferred rights issued to employees $917,397 (2012: nil); and\n\n〉 〉 shares issued as part consideration of a legal dispute $1,512,000 (2012: $3,024,000).\n\nSuperannuation\n\nThe Group makes contributions on behalf of employees to externally managed defined contribution superannuation funds. Contributions are based on\n\npercentages of employee’s wages and salaries and include any salary-sacrifice amounts. Contributions to defined contribution plans for 2013 were $964,000\n\n(2012: $752,000).\n\nKingsgate executive option plan\n\nThe terms of the options issued pursuant to the plan are as follows:\n\ni. each option will entitle the holder to subscribe for one ordinary share of the Company;\n\nii. options are granted under the plan for no consideration; and\n\niii. options granted under the plan carry no dividend or voting rights.", - "page_start": 96, - "page_end": 96, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**Nordstrom, Inc.**\n\n**Notes to Consolidated Financial Statements**\n\nDollar and share amounts in millions except per share, per option and per unit amounts\n\n50\n\n####### **NOTE 5: SELF-INSURANCE**\n\nOur self-insurance reserves are summarized as follows:\n\n**January 31, 2015 February 1, 2014**\n\nWorkers’ compensation **$70** $66\n\nEmployee health and welfare **23** 23\n\nGeneral liability **16** 16\n\n**Total self-insurance reserve $109** $105\n\nOur workers’ compensation policies have a retention per claim of $1 or less and no policy limits.\n\nWe are self-insured for the majority of our employee health and welfare coverage and we do not use stop-loss coverage. Participants\n\ncontribute to the cost of their coverage through both premiums and out-of-pocket expenses and are subject to certain plan limits and\n\ndeductibles.\n\nOur general liability policies, encompassing employment practices liability and commercial general liability, have a retention per claim of $3 or\n\nless and a policy limit up to $30 and $150, respectively.\n\n####### **NOTE 6: 401(k) PLAN**\n\nWe provide a 401(k) plan for our employees that allows for employee elective contributions and discretionary company contributions.\n\nEmployee elective contributions are funded through voluntary payroll deductions. Our discretionary company contribution is funded in an\n\namount determined by our Board of Directors each year. Our expense related to company contributions totaled $77, $77 and $83 in 2014,\n\n2013 and 2012.\n\n####### **NOTE 7: POSTRETIREMENT BENEFITS**\n\nWe have an unfunded defined benefit Supplemental Executive Retirement Plan (“SERP”), which provides retirement benefits to certain\n\nofficers and select employees. The SERP has different benefit levels depending on the participant’s role in the company. At the end of 2014,\n\nwe had 59 participants in the plan, including 27 officers and select employees eligible for SERP benefits, 31 retirees and 1 beneficiary. This\n\nplan is non-qualified and does not have a minimum funding requirement.", - "page_start": 61, - "page_end": 61, - "source_file": "NYSE_JWN_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_AIT_2012.pdf", - "query": "What does Applied has to say regarding the potential creadit risk it could be exposed to ?", - "target_page": 21, - "target_passage": "The Company has a broad customer base representing many diverse industries primarily across North America. As such, the Company does not believe that a significant concentration of credit risk exists in its accounts receivable", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**PART VIII**\n\n**Risk Management**\n\nKillam faces a variety of risks, the majority of which are common to real estate entities. Real estate investments are generally subject to varying\n\ndegrees of risk, depending on the nature of the property. These risks include (i) changes in general economic conditions, (ii) changes in local\n\nconditions (such as an oversupply of space or a reduction in demand for real estate in the area), (iii) changes to government regulations (such as\n\nnew or revised residential tenant legislations), (iv) competition from others with available space, and (v) the ability of the landlord or owner to\n\nprovide adequate maintenance economically.\n\nReal estate is relatively illiquid. Such illiquidity will tend to limit Killam’s ability to rebalance its portfolio promptly in response to changing\n\neconomic or investment conditions. In addition, financial difficulties of other property owners, resulting in distress sales, may depress real estate\n\nvalues in the markets in which the Company operates.\n\nKillam’s exposure to general risks associated with real estate investments is mitigated with both its geographic diversification, and investments in\n\nboth apartments and MHCs.\n\nKillam is exposed to other risks, as outlined below:\n\n**Interest Rate Risk**\n\nInterest risk is the risk that the Company would experience lower returns as the result of its exposure to a higher interest rate environment. The\n\nCompany is exposed to interest rate risk as a result of its mortgages and loans payable, however this risk is mitigated through the Company’s\n\nstrategy to have the majority of its mortgages payable in fixed‑term arrangements. The Company also structures its financings so as to stagger\n\nthe maturities of its debt, minimizing the Company’s exposure to interest rates in any one year.\n\nAs at December 31, 2013, no mortgages or vendor debt had floating interest rates except for four demand loans totaling $3.9 million. These\n\nloans have an interest rate of prime plus 1.0% ‑ 2.0% (December 31, 2012 ‑ prime plus 1.0% ‑ 1.5%). Killam also has one construction loan of\n\n$14.8 million with a floating interest rate of prime plus 0.75% and consequently, Killam is exposed to short‑term interest rate risk on these loans.\n\n**Liquidity Risk**\n\nLiquidity risk is the risk that the Company may not have access to sufficient debt and equity capital to fund its growth program and/or refinance\n\nits debt obligations as they mature. Senior Management manages the Company’s cash resources based on financial forecasts and anticipated\n\ncash flows. The maturities of the Company’s long‑term financial liabilities are set out in Notes 12 to 15 of the consolidated financial statements.\n\nThe Company structures its financings so as to stagger the maturities of its debt, thereby minimizing the Company’s exposure to liquidity risk in\n\nany one year. In addition, the Company’s apartments qualify for CMHC insured debt, reducing the refinancing risk on mortgage maturities. The\n\nCompany’s MHCs do not qualify for CMHC insured debt, however, they continue to have access to mortgage debt.\n\n**Increased Supply Risk**\n\nIncreased supply risk is the risk of loss from increased competition from the addition of new rental units in Killam’s core markets. Numerous\n\nother residential developers and apartment owners compete for potential tenants. Although it is Killam’s strategy to own multifamily residential\n\nproperties in premier locations in each market in which it operates, some of the apartments or MHCs of Killam’s competitors may be newer,\n\nbetter located or offer lower rents. An increase in alternative housing could have a material adverse effect on Killam’s ability to lease units and\n\nin the rents charged and could adversely affect Killam’s revenues and ability to meet its obligations. To mitigate against this risk Killam has a", - "page_start": 58, - "page_end": 58, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**assessments and of implemented risk management and reduction measures** . Previous\n\nstudies indicate that in many cases the risk assessment is conducted by an enterprise just to\n\ncomply with legal obligations (paper compliance). A possible approach could be an **anonymous**\n\n**evaluation of the quality of a representative share** of risk assessments.", - "page_start": 139, - "page_end": 139, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "in the rents charged and could adversely affect Killam’s revenues and ability to meet its obligations. To mitigate against this risk Killam has a\n\ngeographically diverse asset base. Management is expanding this diversification by increasing Killam’s investment in apartment markets outside\n\nAtlantic Canada.\n\n**Credit Risk**\n\nCredit risk arises from the possibility that tenants may experience financial difficulty and be unable to fulfill their lease term commitments. The\n\nCompany mitigates the risk of credit loss through the diversification of its existing portfolio and limiting its exposure to any one tenant. Credit\n\nassessments are conducted with respect to all new leasing and the Company also obtains a security deposit to assist in potential recovery\n\nrequirements. In addition, the receivable balances are monitored on an ongoing basis with the result that the Company’s exposure to bad debt is\n\nnot significant. The Company’s bad debt expense experience has historically been less than 0.4% of revenues. None of Killam’s tenants account\n\nfor more than 1% of tenant receivables.\n\n**Development Risk**\n\nDevelopment risk is the risk that costs of developments will exceed original estimates, unforeseen delays occur and/or units will not be leased in\n\nthe timeframe and/or at rents anticipated. Killam minimizes its exposure to development risk my limiting the amount of development underway\n\nat any one time. To reduce the Company’s exposure to price increases, Killam enters into fixed‑rate contracts when possible. To reduce the\n\nlease‑up risk, Killam does extensive market research in advance of each development to support expected rental rates, and pre‑markets its\n\nproperties early on in the process, to increase demand for the new developments.", - "page_start": 58, - "page_end": 58, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "And there are also **emerging and new risks** where health data will **not be available until a certain**\n\n**number of workers are exposed for quite a while** . Some prominent examples are nanotechnologies,\n\nthe significant increase of new chemically based technologies, vision impairment due to long hours of\n\nwork under artificial light at the same distance with small digital equipment, <sup>183</sup> more exposure to ‘global’\n\nbiological agents due to more interactional tasks, and travel and transport between countries and\n\ncontinents. On that note, the Covid-19 pandemic could also be used as an example. In 2022, the\n\nCommission proposed an update of the Recommendation on the ESOD to recognise Covid-19 as an\n\noccupational disease for workers particularly concerned: health and social care, home help or where\n\nthere is a proven risk of infection (during a pandemic) in other sectors <sup>184</sup> .\n\nIt adds to these difficulties that workers are often not only exposed to one disease causing exposure but\n\nto **several exposures** at the same time (exposure is understood here in a broad sense: ranging from\n\nlong working hours over postures and movements to harassment and violence and to noise and\n\nchemical and biological substances, etc.). **In theory, a single risk** — if below the threshold limit values\n\nand in line with legislation and standards — **will not cause harm — given that it is the only exposure** .\n\nThe impact of this single exposure is not strong enough to generate a disease on the level of severity\n\nof a recognised occupational disease. A **combination of several risks** might add several exposures,\n\nworsen the impact and cause serious harm.\n\nQuite well studied is the increased prevalence of musculoskeletal diseases, if not only ergonomic risks\n\nbut also high psychosocial risks are prevalent at the workplace. <sup>185</sup> Research has also found unexpected\n\nconnections like the synergistic effect of noise and certain chemicals on hearing impairments. Such\n\noutcomes of multi-risk profiles are often particularly difficult to identify and understand. Obviously, most\n\nsectors and occupations involve workplaces with **multi-risk profiles** . Some prominent major risks in\n\ncertain sectors or occupations are:\n\n- agriculture = accidents, chemical and biological agents, UV exposure;\n\n- delivery services = traffic accidents, ergonomics, time pressure, exhaust fumes;\n\n- decentralised renewable energy construction and maintenance = falls from height, electricity;\n\n- waste and recycling = biological and chemical agents, cuts and accidents;\n\n- mobile work = ergonomics, work without time and space limits;\n\n- care at home = emotional, ergonomic, difficult clients, unsafe household situations, infection\n\nrisks;\n\n- healthcare = emotional, ergonomics, biological;\n\n- personal and household services = emotional, ergonomic, unsafe household situations, e.g.\n\nunsafe electrical equipment, exposure to unknown chemicals;\n\n- long-haul sea, train, road or air transport = atypical working times, shift work, monotony, long\n\nphases of physical inactivity;\n\n- car repair = ergonomics, dust and fumes, chemicals;\n\n- construction = falls from height, accidents with machinery or vehicles, slips, trips and falls,\n\nergonomics, noise, chemicals, dust, UV exposure, etc.\n\n**ILO ‘List of Occupational Diseases Recommendation’**\n\n*2.4. Mental and behavioural disorders*\n\n- *2.4.1. Post-traumatic stress disorder*\n\n- *2.4.2. Other mental or behavioural disorders not mentioned in the preceding item where a*\n\n*direct link is established scientifically, or determined by methods appropriate to national*\n\n*conditions and practice, between the exposure to risk factors arising from work activities and*\n\n*the mental and behavioural disorder(s) contracted by the worker*", - "page_start": 75, - "page_end": 75, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**3** A combination of the above questions is also relevant—how does the range of outcomes at 2°C\n\ncompare to that at 1.5°C? This is also relevant to adaptation policy, as it can inform assessment on\n\nwhether to adapt to potential impacts at 2°C or just 1.5°C. Putting in place adaptation measures\n\nto deal with potential impacts at 1.5°C and then increasing these to deal with 2°C later may\n\nbe more expensive and difficult than adapting to potential risks at 2°C at the outset. On the\n\nother hand, because adaptation actions may themselves have consequences, unnecessary over-\n\nadaptation may have undesirable effects which it may be preferable to avoid or at least delay\n\nuntil absolutely necessary.\n\nBoth questions require an appropriate assessment of uncertainty. There are considerable\n\nuncertainties in projections of regional climate change, with different climate models projecting\n\nregional climate changes that can differ in magnitude or even, in the case of precipitation\n\nand impacts quantities strongly related to this, differ in sign [ 5 , 6 ]. This may have important\n\nimplications for regional impacts at specific levels of global warming. A common approach to\n\nexploring and presenting such uncertainties is to examine the ensemble mean and the level of\n\nconsensus among the ensemble members on the sign of the change. While this can often be useful\n\nin informing an assessment of the level of confidence in future projections, it may not always be\n\nsufficient to fully inform decisions. Risk assessment approaches require consideration of a range\n\nof possible risks, not just the most likely. This paper explores a range of regional climate states\n\nand related impacts that occur at global warming of 2°C, and a range of differences with warming\n\nlimited to 1.5°C.\n\nWe examine the implications of our new climate projections by applying some commonly\n\nused indices of climate extremes, and a further index quantifying relative vulnerability to food\n\ninsecurity which combines climate extremes indices with information on a range of factors\n\nrepresenting sensitivity and adaptability of food systems to climate hazards. We also use the\n\nclimate projections to drive a global land surface model to simulate changes in run-off as\n\nan indicator of freshwater availability. We assess whether regional extremes are projected to\n\nincrease or decrease at 2°C global warming, and whether the consequent impact on drought and\n\nvulnerability to food insecurity become greater or smaller. We also assess whether these changes\n\nare reduced by limiting global warming to 1.5°C. We explore some of the uncertainties in these\n\nprojections, and, in particular, examine whether the use of ensemble-mean projections is a useful\n\nsimple guide to impacts projections or whether this can lead to a misleading impression for some\n\nimpacts. Regarding vulnerability to food insecurity, we consider the impacts of global warming\n\nat 1.5°C and 2°C alongside socio-economic influences that affect the sensitivity to climate change.\n\nWe also consider our climate-change impacts results in comparison with other studies using older,\n\nlower-resolution climate projections.\n\nA large number of previous studies have assessed potential impacts of future climate change\n\nusing the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [ 7 ],\n\nand some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [ 8 , 9 ]. We\n\nalso base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere\n\nmodel to provide greater spatial detail and improved representation of atmospheric processes.\n\n## 2. Methods and models\n\n### (a) Global climate simulations at 1.5 ° C and 2 ° C global warming\n\nThere are a number of ways in which 1.5°C or 2°C global warming can be defined—one could\n\nbe the long-term climate state following a stabilization of warming at that level, another could", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" - }, - { - "text": "assessment would require specific knowledge of several aspects: of the specific topic, of the — real —\n\nsituation at the workplaces in an enterprise, and of the expected reduction of these risks by the proposed\n\nor recommended risk mitigation measures. This has rarely been done. Moreover, even inside one\n\nenterprise the **quality of a risk assessment might differ depending on the topic** , for example,\n\nbetween ‘easier’ topics as ‘correct provision of warning signals’ or ‘adequate temperatures’, and more\n\ncomplex topics like psychosocial, musculoskeletal, or chemical and biological risks. <sup>414</sup>", - "page_start": 126, - "page_end": 126, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nAUDIT CORPORATE\n\nGOVERNANCE\n\nNOMINATING HUMAN\n\nRESOURCES\n\nEXECUTIVE FINANCE PENSION\n\nCHAIR MEMBER **BOARD OF DIRECTORS AND ITS COMMITTEES**\n\nAS OF FEBRUARY 11, 2014\n\nAlan D. Horn\n\nJohn A. MacDonald\n\nIsabelle Marcoux\n\nThomas I. Hull\n\nPeter C. Godsoe, O.C., O. Ont.\n\nC. William D. Birchall\n\nStephen A. Burch\n\nJohn H. Clappison, FCPA, FCA\n\nGuy Laurence\n\nPhilip B. Lind, CM\n\nThe Hon. David R. Peterson, PC, QC\n\nEdward S. Rogers\n\nLoretta A. Rogers\n\nMartha L. Rogers\n\nMelinda M. Rogers\n\nDr. Charles Sirois\n\nJohn H. Tory, O. Ont.\n\n, CPA, CA\n\nRISK MANAGEMENT\n\nWe are committed to continually strengthening our risk management\n\ncapabilities to protect and enhance shareholder value. The purpose of\n\nrisk management is not to eliminate risk but to optimize trade-offs\n\nbetween risk and return to maximize value to the organization.\n\n####### **Risk Governance**\n\nThe Board has overall responsibility for risk governance and oversees\n\nmanagement in identifying the principal risks we face in our business\n\nand implementing appropriate risk assessment processes to manage\n\nthese risks. It delegates certain duties to the Audit Committee.\n\nThe Audit Committee discusses risk policies with management and the\n\nBoard, and assists the Board in overseeing our compliance with legal\n\nand regulatory requirements.\n\nThe Audit Committee also reviews:\n\n- the adequacy of the internal controls that have been adopted to\n\nsafeguard assets from loss and unauthorized use, to prevent, deter\n\nand detect fraud and to verify the accuracy of the financial records\n\n- the processes for identifying, assessing and managing risks\n\n- our exposure to major risks and trends and management’s\n\nimplementation of risk policies and procedures to monitor and\n\ncontrol these exposures\n\n- our business continuity and disaster recovery plans\n\n- any special audit steps adopted due to material weaknesses or\n\nsignificant deficiencies that may be identified\n\n- other risk management matters from time to time as determined by\n\nthe Committee or directed by the Board.\n\n####### **Enterprise Risk Management**\n\nOur Enterprise Risk Management program seeks to ensure we identify,\n\nassess, manage, monitor and communicate risk consistently throughout\n\nthe company and that we manage risk in a way that supports our\n\nstrategic and business goals. This program supports the Audit\n\nCommittee and the Board’s responsibility for risk by facilitating a formal\n\nstrategic risk assessment process.\n\nWe carry out an annual strategic risk assessment to identify our\n\nprincipal risks and their potential impact on our ability to achieve our\n\nstrategic plans. This assessment includes reviewing risk reports, audit\n\nreports and industry benchmarks, and interviewing key risk owners. We\n\nalso conduct a formal survey every two years to get management\n\nfeedback on the key risks facing the organization and identify emerging\n\nrisks. Then we prioritize the risks using standard risk assessment criteria.\n\nEnterprise Risk Management reports the results of the strategic risk\n\nassessment to the Executive Leadership Team and the Audit Committee.\n\nThe Executive Leadership Team is responsible for approving our\n\nenterprise risk policies and for identifying and assessing the key risks\n\nthat affect our ability to meet our corporate objectives. It is also\n\nresponsible for monitoring these key risks and our action plans to\n\nmitigate these risks.\n\nManagement develops risk management plans. They are responsible for\n\nidentifying, assessing, managing and monitoring risks in the business\n\nunits impacting our strategic and business plans, and reporting to the\n\nExecutive Leadership Team and Enterprise Risk Management.\n\n72 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "total risk-based and leverage ratios were 19.52% and 10.51%, respectively, as compared to total risk-based and\n\nleverage ratios of 18.08% and 9.92% as of December 31, 2001. We believe by all measurements our capital ratios\n\nremain above regulatory minimums.\n\n*Interest Rate Risk* . Interest rate risk results when the maturity or repricing intervals of interest-earning assets\n\nand interest-bearing liabilities are different. Our exposure to interest rate risk is managed primarily through our\n\nstrategy of selecting the types and terms of interest-earning assets and interest-bearing liabilities that generate", - "page_start": 52, - "page_end": 52, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "If **a risk assessment is conducted just for compliance purposes** , and not used appropriately for the\n\nsuccessful management of OSH and reduction of accidents and occupational diseases, the risk\n\nassessment may lose its dynamic nature, and findings may be neither implemented nor communicated\n\nappropriately to employees.\n\nThe **types of risks included in risk assessments** are related to the risk profiles of different sectors,\n\nfor example, it is likely that risk assessments in heavy industries and manual occupations focus more\n\non safety risks. However, while sectoral risk profiles will naturally bias the identification of risks, smaller\n\nestablishments seem to have **less of a focus on MSDs or psychosocial risk factors** , which would\n\nsuggest that they are less well recognised or understood, in particular for MSEs. <sup>415</sup> Establishments also\n\nreport that psychosocial risk factors are more difficult to manage than other OSH risks, while as business\n\nsize grows, so does the proportion of respondents who perceive psychosocial risks as more difficult to\n\nmanage than other OSH risks. <sup>416</sup>\n\nESENER 2019 shows that a **reluctance to talk openly** about these issues seems to be the main\n\ndifficulty for addressing psychosocial risks (60% of establishments in the EU27). This, as with all the\n\nother difficulties considered (lack of awareness among staff/management and lack of expertise or\n\nspecialist support), is reported in all enterprise sizes but more frequently as establishment size grows.\n\nSpecifically, among those establishments that report having to deal with difficult customers, patients or\n\npupils, 51% of those employing 20 or more workers report having a procedure in place to deal with\n\npossible cases of threats, abuse or assaults by clients, patients or other external persons. This share\n\nrises to 74% among establishments in human health and social work activities.\n\nThe development of concrete outputs such as measures to better manage risks that can result in\n\n**musculoskeletal diseases** has actually seen a decline between 2014 and 2019, as follows:\n\n- 85% to 77% on the measure of ‘provision of equipment to help with the lifting or moving of loads\n\nor other physical heavy work’; <sup>417</sup>\n\n- 73% to 67% concerning ‘provision of ergonomic equipment’; and\n\n- 66% to 60% regarding ‘encouraging regular breaks for people in uncomfortable or static\n\npostures including prolonged sitting’. <sup>418</sup>\n\n© chokniti/Adobe Stock", - "page_start": 127, - "page_end": 127, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**99**\n\nNotes to the Financial Statements\n\ncontinued\n\n### 27. Contingent liabilities\n\nThe Group had contingent liabilities at 30 June 2013 in respect of guarantees. Bank guarantees have been given by Kingsgate’s controlled entities to partici-\n\npating banks in the syndicated loan facility and corporate loan facility as described in Note 16 as part of the security package. These guarantees may give\n\nrise to liabilities in the parent entity if the controlled entities do not meet their obligations under the terms of the loans subject to guarantees. No material\n\nlosses are anticipated in respect of the above contingent liabilities.\n\nIncluded in non-current other asset is $1,838,000 relating to restricted cash deposits against bank guarantees supporting the rehabilitation bond require-\n\nments against the Group’s mining operations.\n\n### 28. Financial risk management and instruments\n\nFinancial risk management\n\nThe Group’s activities expose it to a variety of financial risks: market risk (including foreign currency risk, price risk, fair value risk, and interest rate risk),\n\ncredit risk and liquidity risk.\n\nAt this point, the Directors believe that it is in the interest of shareholders to expose the Group to foreign currency risk, price risk and interest rate risk.\n\nTherefore, the Group does not employ any derivative hedging of foreign currency or interest rate risks though has entered into forward gold sale contracts to\n\nmanage Australian gold price risk in respect of the forecast production from the Challenger Mine (refer “commodity price risk” section below). The Directors and\n\nmanagement monitor these risks, in particular market forecasts of future movements in foreign currency and prices movements and if it is to be believed to be\n\nin the interests of shareholders will implement risk management strategies to minimise potential adverse effects on the financial performance of the Group.\n\nRisk management is carried out by the senior executive team. The Board provides written principles for overall risk management, as well as policies covering\n\nspecific areas, such as foreign exchange risk, interest rate risk, credit risk, use of derivative financial instruments and non-derivative financial instruments,\n\nand investment of excess liquidity.\n\nThe Group holds the following financial instruments:\n\n2013\n\n$’000\n\n2012\n\n$’000\n\nFinancial assets\n\nCash and cash equivalents 32,987 90,623\n\nReceivables 9,431 12,226\n\nRestricted cash 5,474 -\n\nAvailable-for-sale financial assets 767 1,751\n\nOther financial assets 7,808 4,670\n\nTotal financial assets 56,467 109,270\n\nFinancial liabilities\n\nPayables (47,106) (49,278)\n\nBorrowings (202,565) (157,544)\n\nDerivatives held for trading (1,271) (2,685)\n\nTotal financial liabilities (250,942) (209,507)\n\n(a) Market risk\n\nForeign exchange risk\n\nThe Group operates internationally and is exposed to foreign exchange risk arising from currency exposures, primarily with respect to the US dollar and Thai\n\nBaht and as discussed earlier, no financial instruments are employed to mitigate the exposed risks. This is the Group’s current policy and it is reviewed regu-\n\nlarly including forecast movements in these currencies by management and the Board.\n\nCurrent year foreign exchange risks arise primarily from:\n\n〉 〉 the sale of gold, which is in US dollars;\n\n〉 〉 payables denominated in US dollars; and\n\n〉 〉 cash balances in US dollars.\n\nThe functional currency of the Thai subsidiaries is Thai Baht.", - "page_start": 100, - "page_end": 100, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", - "query": "To what system of logic do OWL ontologies belong to ?", - "target_page": 7, - "target_passage": "OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you have as well as the standards established by your organization or organizations that you work with.\n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have worked with most modern programming languages such as Python or Java, you are already familiar with the concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming conflicts between different ontologies. For example, you may have a class called Network in an ontology\n\nabout telecommunications. You might also have a class called Network in an ontology about graph\n\ntheory. The two concepts are related but are different. Just as with programming languages you use namespace prefixes to determine what specific namespace a name refers to. E.g., in this example you might have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when\n\nyou referred to the Network class for the Telecom ontology you would use tc:Network and\n\ngt:Network for the graph theory class.\n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl\n\nand is used to refer to classes such as owl:Thing and owl:Nothing . The Resource Description\n\nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that ontologies use such as rdfs:label leverage this namespace.\n\nIn the bottom view of the Active ontology tab there is a tab called Ontology Prefixes. This tab shows all the current namespace mappings in your ontology. There are certain concepts from OWL, RDF, RDFS, XML and XSD that are required for every ontology, so those namespaces are by default mapped in every new Protégé ontology. There is also a mapping to the empty string for whatever the namespace is for your ontology. This allows you to display and refer to entities in your ontology without entering a namespace prefix. If you look at that tab now you should see a row where the first column is blank, and the second column has the base IRI for your ontology. It should be the same IRI as the Ontology IRI at the top of the Active ontology tab, except it also has a # sign at the end. E.g., the Pizza tutorial developed for this tutorial has an IRI of: [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial) and the row that has a blank first column in Ontology Prefixes has the IRI: [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial) .", - "page_start": 61, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "correctness of arguments.\n\n[Logic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya,](https://en.wikipedia.org/wiki/Nyaya)\n\n[and Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the](https://en.wikipedia.org/wiki/Syllogism)\n\nmain system of logic in the Western world until it was replaced by modern formal logic, which has its\n\n[roots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly](https://en.wikipedia.org/wiki/Gottlob_Frege)\n\n[used system is classical logic. It consists of propositional logic and first-order logic. Propositional logic](https://en.wikipedia.org/wiki/First-order_logic)\n\nonly considers logical relations between full propositions. First-order logic also takes the internal parts of", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia1.pdf" - }, - { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two parts. The first part at the beginning consists of several namespace prefixes. These statements consist of the prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that these concepts were described in chapter 7. You may be wondering where all these prefixes came from\n\nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of\n\nnamespaces and prefixes that are required to define the ontology.\n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been discussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any language or database there is a lower level that describes how the concepts are mapped to actual data. In a relational database the fundamental construct to represent data is a table. In OWL the fundamental construct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF (Resource Description Framework) is a language to describe graphs (in the mathematical sense of the term). I.e., to describe nodes and links.\n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in what is called an undirected or network graph because objects can be subjects and vice versa. Whenever you define a property in OWL you are defining a predicate. An individual can be a subject or an object (or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1 . In this example\n\nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object.\n\nHowever, classes and properties themselves are also represented as triples. So for example, when you create the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to\n\nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class . Similarly when you add\n\nNamedPizza as a subclass of Pizza , Protégé adds the triple: NamedPizza rdfs: **s** ubClassOf\n\nPizza .\n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities that are the subjects of triples where the predicate is rdfs: **s** ubClassOf and the object is any other\n\nentity. The *?* before a name indicates that the name is a wildcard that can match anything that fits with the rest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate or even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this case our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the name of a class while in others it is a class expression with an orange circle in front of it. This is because when defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL axioms.\n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query determines what to match in the query. If you want to display everything matched in the WHERE clause you can just use a * for the SELECT clause. The initial default query in this tab is set up with no knowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes regardless of the ontology. To get information about Pizzas the first thing we need to do is to add\n\nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a mapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab discussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement:\n\nPREFIX pizza: < [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#>](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial)", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "###### **Exercise 3: Add a Comment Annotation to Your Ontology**\n\n_____________________________________________________________________________________\n\n1. Make sure you are in the Active Ontology tab. In the view just below the Ontology IRI and Ontology Version IRI fields find the Annotations option and click on the + sign. This will bring up a menu to create a new annotation on the ontology.\n\n2. The rdfs:comment annotation should be highlighted by default. If it isn’t highlighted click on it. Then type a new comment into the view to the right. Something like A tutorial ontology for the Pizza domain.\n\n3. Click OK. Your Active Ontology tab should like Figure 4.3.\n\n_____________________________________________________________________________________\n\nFigure 4.4: The Class Hierarchy View Options\n\n4.1 Named Classes The main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in the Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the Class hierarchy view as shown in Figure 4.5. <sup>4</sup> All empty ontologies contains one class called owl:Thing .\n\nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing\n\nall individuals. Because of this all classes are subclasses of owl:Thing .\n\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the\n\nClass hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or\n\nto create them as independent tabs.\n\nAdd Subclass\n\nAdd Sibling Class\n\nDelete Class", - "page_start": 13, - "page_end": 13, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "7\n\nrelations, transitive relations, and many more. An understanding of the basic concepts of set theory will help the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents an intuitive GUI that enables domain experts to define models without a background in set theory. However, developers are encouraged to refresh their knowledge on logic and set theory. A good source is the first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another good source is the PDF document *Overview of Set Theory* available at: [https://www.michaeldebellis.com/post/owl-theoretical-basics](https://www.michaeldebellis.com/post/owl-theoretical-basics)\n\n3.1.1 Individuals Individuals represent objects in the domain of interest. An important difference between OWL and most programming and knowledge representation languages is that OWL does not use the Unique Name Assumption (UNA). This means that two different names could actually refer to the same individual. For\n\nexample, “Queen Elizabeth”, “The Queen” and “Elizabeth Windsor” might all refer to the same\n\nindividual. In OWL, it must be explicitly stated that individuals are the same as each other, or different from each other. Figure 3.1 shows a representation of some individuals in a domain of people, nations, and relations — in this tutorial we represent individuals as diamonds.\n\nFigure 3.1: Representation of Individuals\n\nMichael\n\nJenna\n\nDiane\n\nTim\n\nUSA\n\nIndia\n\nItaly\n\nIndividuals are also known as *instances* . Individuals can be referred to as *instances of classes* .\n\nFigure 3.2: Representation of Properties\n\nMichael\n\nBiswanath\n\nlivesIn\n\nIndia\n\nhasFriend", - "page_start": 7, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "[Glossary of logic](https://en.wikipedia.org/wiki/Glossary_of_logic)\n\n[Outline of logic - Overview of and topical guide to logic](https://en.wikipedia.org/wiki/Outline_of_logic)\n\n[Critical thinking - Analysis of facts to form a judgment](https://en.wikipedia.org/wiki/Critical_thinking)\n\n[List of logic journals](https://en.wikipedia.org/wiki/List_of_logic_journals)\n\n[List of logic symbols - List of symbols used to express logical relations](https://en.wikipedia.org/wiki/List_of_logic_symbols)\n\n[List of logicians](https://en.wikipedia.org/wiki/List_of_logicians)\n\n[Logic puzzle - Puzzle deriving from the mathematics field of deduction](https://en.wikipedia.org/wiki/Logic_puzzle)\n\n[Logical reasoning - Process of drawing correct inferences](https://en.wikipedia.org/wiki/Logical_reasoning)\n\n[Logos - Concept in philosophy, religion, rhetoric, and psychology](https://en.wikipedia.org/wiki/Logos)\n\n[Vector logic](https://en.wikipedia.org/wiki/Vector_logic)\n\n[a. However, there are some forms of logic, like imperative logic, where this may not be the](https://en.wikipedia.org/wiki/Imperative_logic)\n\ncase. <sup>[42]</sup>\n\nb. Conductive arguments present reasons in favor of a conclusion without claiming that the\n\nreasons are strong enough to decisively support the conclusion.\n\n1. Velleman 2006, pp. 8, 103.\n\n2. Vickers 2022.\n\n3. Nunes 2011, pp. 2066- 2069.\n\n4. Pépin 2004, Logos; Online Etymology Staff.\n\n5. Hintikka 2019, lead section, §Nature and varieties of logic.\n\n6. Hintikka 2019, §Nature and varieties of logic; Haack 1978, pp. 1- 10, Philosophy of logics;\n\nSchlesinger, Keren-Portnoy & Parush 2001, p. 220.\n\n7. Hintikka & Sandu 2006, p. 13; Audi 1999b, Philosophy of logic; McKeon.\n\n8. Blair & Johnson 2000, pp. 93- 95; Craig 1996, Formal and informal logic.\n\n[9. Craig 1996, Formal and informal logic; Barnes 2007, p. 274; Planty-Bonjour 2012, p. 62 (htt](https://books.google.com/books?id=0EpFBgAAQBAJ&pg=PA62)\n\n[ps://books.google.com/books?id=0EpFBgAAQBAJ&pg=PA62); Rini 2010, p. 26 (https://boo](https://books.google.com/books?id=vard024vjFgC&pg=PA26)\n\n[ks.google.com/books?id=vard024vjFgC&pg=PA26).](https://books.google.com/books?id=vard024vjFgC&pg=PA26)\n\n10. MacFarlane 2017; Corkum 2015, pp. 753- 767; Blair & Johnson 2000, pp. 93- 95; Magnus\n\n2005, pp. 12- 4, 1.6 Formal languages.\n\n11. McKeon; Craig 1996, Formal and informal logic.\n\n12. Hintikka & Sandu 2006, p. 13.\n\n13. Magnus 2005, Proofs, p. 102.\n\n14. Hintikka & Sandu 2006, pp. 13- 16; Makridis 2022, pp. 1- 2; Runco & Pritzker 1999, p. 155.\n\n15. Gómez-Torrente 2019; Magnus 2005, 1.5 Other logical notions, p. 10.\n\n16. Hintikka & Sandu 2006, p. 16.\n\n17. Honderich 2005, logic, informal; Craig 1996, Formal and informal logic; Johnson 1999,\n\npp. 265- 268.\n\n18. Craig 1996, Formal languages and systems; Simpson 2008, p. 14.\n\n19. Craig 1996, Formal languages and systems.\n\n### **References**\n\n#### **Notes**\n\n#### **Citations**", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" - }, - { - "text": "Chapter 9 Queries: Description Logic and SPARQL Now that we have some individuals in our ontology, we can do some interesting queries. There are several tools for doing queries in Protégé.\n\n9.1 Description Logic Queries To start with the most straight forward one based on what you have already learned are Description Logic (DL) queries. These are essentially the same kind of statements you have been using to define classes. However, in addition to using such statements to define a class you can use it as a query.\n\n###### **Exercise 33: Try Some Description Logic Queries**\n\n_____________________________________________________________________________________\n\n1. To begin with navigate to the DL Query tab. If it doesn’t exist create it using: Window>Tabs>DL Query.\n\n2. At the top right of this tab you should see a view that says DL query: and below it Query (class expression).\n\n3 You can enter any DL statement you want in this box and then see all the entities that are subclasses, superclasses, and instances of it. As an example, enter: Customer and purchasedPizza some (hasTopping some (hasSpiciness value Hot)). I.e., all Customers who have purchased a Pizza that hasSpiciness\n\nHot . At first you may not see anything but don’t worry there is one more step.\n\n4. Look at the check boxes on the right under Query for. Check Superclasses, Subclasses (although it should already be checked by default) and Instances. Now your UI should look like figure 9.1. You may notice that owl:Nothing shows up as a subclass. Don’t worry that is actually expected. Remember that\n\nowl:Nothing is the empty set and the empty set is a subset of every set (including itself) so just as\n\nowl:Thing is a superclass of every class owl:Nothing is a subclass of every class. If you don’t want to\n\nsee owl:Nothing you can uncheck the box toward the bottom right that says Display owl:Nothing.\n\n5. Try some additional DL queries such as: hasTopping some (hasSpiciness value Hot) and VegetarianPizza and (hasTopping some (hasSpiciness some (isMilderThan value Hot))). Note that with this last query you are taking advantage of the transitive order you defined for the instances of the Spiciness class in chapter 6.\n\n6. You can also do queries for strings in the names of your entities. For example, first do a query simply with Pizza in the query window. Then type in Hot in the Name contains field. This should give you all the classes and individuals with *Hot* in their name.\n\n_____________________________________________________________________________________", - "page_start": 66, - "page_end": 66, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "### Chapter 4 Building an OWL Ontology\n\nThis chapter describes how to create an ontology of Pizzas. We use Pizzas because it is something almost everyone is familiar with.\n\n###### **Exercise 1: Create a new OWL Ontology**\n\n_____________________________________________________________________________________\n\n1. Start Protégé. When Protégé opens for the first time each day it puts up a screen of all the available plugins. You can also bring this up at any time by using File>Check for plugins. You won’t need any plugins at this point of the tutorial so just click the Not now button.\n\n2. The Protégé user-interface consists of several tabs such as Active ontology, Entities, etc. When you start Protégé you should be in the Active Ontology tab. This is for overview information about the entire ontology. Protégé always opens with a new untitled ontology you can start with. Your ontology should have an IRI something like: http://www.semanticweb.org/yourname/ontologies/2020/4/untitled-ontology- 27 Edit the name of the ontology (the part after the last “/” in this case untitled-ontology-27) and change it to something like PizzaTutorial. Note: the Pizza ontology IRIs shown below (e.g., figure 4.3) show the IRI after I edited the default that Protégé generated for me. Your IRI will look different and will be based on your name or the name of your organization.\n\n3. Now you want to save your new ontology. Select File>Save. This should bring up a window that says: Choose a format to use when saving the ‘PizzaTutorial’ ontology. There is a drop down menu of formats to use. The default RDF/XML Syntax should be selected by clicking the OK button. This should bring up the standard dialog your operating system uses for saving files. Navigate to the folder you want to use and then type in the file name, something like Pizza Tutorial and select Save. ____________________________________________________________________________________\n\nThe next step is to set some preferences related to the names of new entities. Remember than in Protégé any class, individual, object property, data property, annotation property, or rule is referred to as an entity. The term name in OWL can actually refer to two different concepts. It can be the last part of the IRI <sup>3</sup> or it can refer to the annotation property (usually rdfs:label ) used to provide a more user friendly name for\n\nthe entity. We will discuss this in more detail below in chapter 7. For now, we just want to set the parameters correctly so that future parts of the tutorial (especially the section on SPARQL queries) will work appropriately.\n\n3 An IRI is similar to a URL. This will be discussed in detail below in chapter 7.\n\nAs with any file you work on it is a good idea to save your work at regular intervals so that if\n\nsomething goes wrong you don’t lose your work. At certain points in the tutorial where saving\n\nis especially important the tutorial will prompt you to do so but it is a good idea to save your\n\nwork often, not just when prompted.", - "page_start": 10, - "page_end": 10, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Figure 4.23 The Reasoner Inferred that Margherita and Soho Pizzas are subclasses of VegetarianPizza\n\n4.14 Defining an Enumerated Class A powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. The idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a specific code library. One of the first and most common design patterns was the Model-View-Controller pattern first used in Smalltalk and now almost the default standard for good user interface design. Since there are significant differences between OWL and standard OOP the many excellent books on OOP design patterns don’t directly translate into OWL design patterns. Also, since the use of OWL is more recent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP community has. However, there are already many design patterns that have been documented for OWL and that can provide users with ways to save time and to standardize their designs according to best practices.\n\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value. We will show an example of such an enumerated class by creating a new", - "page_start": 44, - "page_end": 44, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "[propositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions](https://en.wikipedia.org/wiki/Quantifier_(logic))\n\n[behind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant](https://en.wikipedia.org/wiki/Epistemology)\n\nlogics, on the other hand, reject certain classical intuitions and provide alternative explanations of the\n\nbasic laws of logic.\n\nThe word \"logic\" originates from the Greek word *logos* , which has a variety of translations, such as\n\n[reason, discourse, or language.](https://en.wikipedia.org/wiki/Language) <sup>[4]</sup> [ Logic is traditionally defined as the study of the laws of thought or](https://en.wikipedia.org/wiki/Laws_of_thought)\n\n[correct reasoning,](https://en.wikipedia.org/wiki/Logical_reasoning) <sup>[5]</sup> [ and is usually understood in terms of inferences or arguments. Reasoning is the](https://en.wikipedia.org/wiki/Argument)\n\nactivity of drawing inferences. Arguments are the outward expression of inferences. <sup>[6]</sup> An argument is a\n\nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e.\n\nwhether their premises support the conclusion. <sup>[7]</sup> These general characterizations apply to logic in the\n\n[widest sense, i.e., to both formal and informal logic since they are both concerned with assessing the](https://en.wikipedia.org/wiki/Informal_logic)\n\ncorrectness of arguments. <sup>[8]</sup> Formal logic is the traditionally dominant field, and some logicians restrict\n\nlogic to formal logic. <sup>[9]</sup>\n\n[Formal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal](https://en.wikipedia.org/wiki/Formal_system)\n\napproach to study reasoning: it replaces concrete expressions with abstract symbols to examine the\n\n[logical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is](https://en.wikipedia.org/wiki/Logical_form)\n\nonly concerned with the abstract structure of arguments and not with their concrete content. <sup>[10]</sup>\n\n[Formal logic is interested in deductively valid arguments, for which the truth of their premises ensures](https://en.wikipedia.org/wiki/Validity_(logic))\n\nthe truth of their conclusion. This means that it is impossible for the premises to be true and the\n\nconclusion to be false. <sup>[11]</sup> For valid arguments, the logical structure of the premises and the conclusion\n\n[follows a pattern called a rule of inference.](https://en.wikipedia.org/wiki/Rule_of_inference) <sup>[12]</sup> [ For example, modus ponens is a rule of inference](https://en.wikipedia.org/wiki/Modus_ponens)\n\naccording to which all arguments of the form \"(1) *p* , (2) if *p* then *q* , (3) therefore *q* \" are valid, independent\n\nof what the terms *p* and *q* stand for. <sup>[13]</sup> In this sense, formal logic can be defined as the science of valid\n\n[inferences. An alternative definition sees logic as the study of logical truths.](https://en.wikipedia.org/wiki/Logical_truth) <sup>[14]</sup> A proposition is logically\n\n[true if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible](https://en.wikipedia.org/wiki/Possible_world)\n\n[worlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is](https://en.wikipedia.org/wiki/Interpretation_(logic))\n\nnot\". <sup>[15]</sup> These two definitions of formal logic are not identical, but they are closely related. For example,\n\nif the inference from *p* to *q* is deductively valid then the claim \"if *p* then *q* \" is a logical truth. <sup>[16]</sup>\n\n[Formal logic uses formal languages to express and analyze arguments.](https://en.wikipedia.org/wiki/Formal_language) <sup>[17]</sup> They normally have a very", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", - "query": "Concerning ontologies, what is an anonymous class ?", - "target_page": 30, - "target_passage": "They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "5. One last thing we want to do is to configure the reasoner. By default, the reasoner does not perform all possible inferences because some inferences can take a long time for large and complex ontologies. In this tutorial we will always be dealing with small and simple ontologies so we want to see everything the reasoner can do. Go to: Reasoner>Configure. This will bring up a dialog with several check boxes of\n\ninferences that the reasoner can perform. If they aren’t all checked then check them all. You may receive\n\na warning that some inferences can take a lot of time, but you can ignore those since your ontology will be small.\n\n_____________________________________________________________________________________\n\n### 4.3 Disjoint Classes\n\nHaving added the classes Pizza , PizzaTopping , and PizzaBase to the ontology, we now want to say\n\nthat these classes are *disjoint* . I.e., no individual can be an instance of more than one of those classes. In set theory terminology the intersection of these three classes is the empty set: owl:Nothing .\n\n###### **Exercise 6: Make Pizza, PizzaTopping, and PizzaBase disjoint from each other**\n\n_____________________________________________________________________________________\n\n1. Select the class Pizza in the class hierarchy.\n\n2. Find the Disjoint With option in the Description view and select the (+) sign next to it. See the red circle in figure 4.6.\n\n3. This should bring up a dialog with two tabs: Class hierarchy and Expression editor. You want Class hierarchy for now (we will use the expression editor later). This gives you an interface to select a class that is identical to the Class hierarchy view. Use it to navigate to PizzaBase. Hold down the shift key and select PizzaBase and PizzaTopping. Select OK.\n\n4. Do a Reasoner>Synchronize reasoner. Then look at PizzaBase and PizzaTopping . You should see\n\nthat they each have the appropriate disjoint axioms defined to indicate that each of these classes is disjoint with the other two.\n\n_____________________________________________________________________________________", - "page_start": 16, - "page_end": 16, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "###### **Exercise 3: Add a Comment Annotation to Your Ontology**\n\n_____________________________________________________________________________________\n\n1. Make sure you are in the Active Ontology tab. In the view just below the Ontology IRI and Ontology Version IRI fields find the Annotations option and click on the + sign. This will bring up a menu to create a new annotation on the ontology.\n\n2. The rdfs:comment annotation should be highlighted by default. If it isn’t highlighted click on it. Then type a new comment into the view to the right. Something like A tutorial ontology for the Pizza domain.\n\n3. Click OK. Your Active Ontology tab should like Figure 4.3.\n\n_____________________________________________________________________________________\n\nFigure 4.4: The Class Hierarchy View Options\n\n4.1 Named Classes The main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in the Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the Class hierarchy view as shown in Figure 4.5. <sup>4</sup> All empty ontologies contains one class called owl:Thing .\n\nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing\n\nall individuals. Because of this all classes are subclasses of owl:Thing .\n\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the\n\nClass hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or\n\nto create them as independent tabs.\n\nAdd Subclass\n\nAdd Sibling Class\n\nDelete Class", - "page_start": 13, - "page_end": 13, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "###### **Exercise 12: Define the domain and range for the hasBase property**\n\n_____________________________________________________________________________________\n\n1. Now we are going to repeat the same activities as in the previous exercise but for another property: hasBase . Make sure you are still on the Object properties tab. Select the hasBase property.\n\n2. Click on the Add icon (+) next to Domains (intersection) in the Description view for hasBase. Select\n\nthe ClassHierarchy tab. Then select Pizza from the class hierarchy..\n\n3. Repeat step 2 but this time start by using the (+) icon next to the Ranges (intersection) in the Description for hasBase . This time select the class PizzaBase as the range.\n\n4. Synchronize the reasoner. Now select isBaseOf You should see that the Domain and Range for isBaseOf have been filled in by the reasoner.\n\n_____________________________________________________________________________________\n\n4.10 Describing and Defining Classes Now that we have defined some properties, we can use these properties to define some more interesting classes. There are 3 types of classes in OWL:\n\n1. Primitive classes. These are classes that are defined by conditions that are *necessary* (but not sufficient) to hold for any individuals that are instances of that class or its subclasses. The condition may be as simple as: *Class A is a subclass of class B* . To start with we will define primitive classes first and then defined classes. When the reasoner encounters an individual that is an instance of a primitive class it infers that all the conditions defined for that class must hold for that individual. 2. Defined classes. These are classes that are defined by both *necessary* and *sufficient* conditions. When the reasoner encounters an individual that satisfies all the conditions for a defined class it will make the inference that the individual is an instance of that class. The reasoner can also use the conditions defined on classes to change the class hierarchy, e.g., to infer that *Class A is a* *subclass of Class B* . We will see examples of this later in the tutorial. 3. Anonymous classes. These are classes that you won’t encounter much and that won’t be discussed much in this tutorial, but it is good to know about them. They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing\n\nthe intersection of those two classes.\n\n4.10.1 Property restrictions In OWL properties define binary relations with the same semantics and characteristics as binary relations in First Order Logic. There are two types of OWL properties for describing a domain: Object properties and Data properties. Object properties have classes as their domain and range. Data properties have classes as their domain and simple datatypes such as xsd:string or xsd:dateTime as their range. In\n\nfigure 3.3 the individual Michael is related to the individual USA by the property livesIn . Consider all\n\nthe individuals who are an instance of Person and also have the same relation, that each livesIn the\n\nUSA . This group is a set or OWL class such as USAResidents . In OWL a class can be defined by\n\ndescribing the various properties and values that hold for all individuals in the class. Such definitions are called *restrictions* in OWL.", - "page_start": 29, - "page_end": 29, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "The following are some examples of classes of individuals that we might want to define via property restrictions:\n\n- The class of individuals with at least one hasChild relation.\n\n- The class of individuals with 2 or more hasChild relations.\n\n- The class of individuals that have at least one hasTopping relationship to individuals that are members of MozzarellaTopping - i.e. the class of things that have at least a mozzarella\n\ntopping.\n\n- The class of individuals that are Pizzas and only have hasTopping relations to instances of the class VegetableTopping (i.e., VegetarianPizza ).\n\nIn OWL we can describe all of the above classes using restrictions. OWL restrictions fall into three main categories:\n\n1. Quantifier restrictions. These describe that a property must have some or all values that are of a particular class. 2. Cardinality restrictions. These describe the number of individuals that must be related to a class by a specific property. 3. hasValue restrictions. These describe specific values that a property must have.\n\nWe will initially use quantifier restrictions. Quantifier restrictions can be further categorized as *existential* restrictions and *universal* restrictions <sup>6</sup> . Both types of restrictions will be illustrated with examples in this tutorial.\n\n- Existential restrictions describe classes of individuals that participate in at least one relation along a specified property. For example, the class of individuals who have at least one (or some) hasTopping relation to instances of VegetableTopping . In OWL the keyword some is used\n\n#### to denote existential restrictions.\n\n- Universal restrictions describe classes of individuals that for a given property *only* have relations along a property to individuals that are members of a specific class. For example, the class of individuals that only have hasTopping relations to instances of the class VegetableTopping .\n\nIn OWL they keyword only is used for universal restrictions.\n\nLet’s take a closer look at an example of an existential restriction. The restriction hasTopping some\n\nMozzarellaTopping is an existential restriction (as indicated by the some keyword), which restricts the\n\nhasTopping property, and has a filler MozzarellaTopping . This restriction describes the class of\n\nindividuals that have at least one hasTopping relationship to an individual that is a member of the class\n\nMozzarellaTopping .\n\n6 These have the same meaning as existential and universal quantification in First Order Logic.\n\nA restriction always describes a class. Sometimes (as we will soon see) it can be a defined class.\n\nOther times it may be an anonymous class. In all cases the class contains all of the individuals\n\nthat satisfy the restriction, i.e., all of the individuals that have the relationships required to be a\n\nmember of the class. In section 9.2 one of our SPARQL queries will return several anonymous\n\nclasses.", - "page_start": 30, - "page_end": 30, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "## * **5. Examining approaches to building a books data** * * **commons** *\n\nThere are many possible permutations for building a books data commons. To structure our\n\nexploration, we focused on two particular tracks, discussed below. We chose these tracks\n\nmindful of the above legal issues, and because there are already existence proofs that help\n\nto illuminate tradeoffs, challenges and potential paths forward for each.\n\n## *5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2** 27\n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large,\n\ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own\n\ntraining of LLMs, but also to lower the barriers for others. 28\n\nAlong with data drawn from the web at large, The Pile included books from three datasets.\n\nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second\n\nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books\n\nby otherwise unpublished authors; and a 28,752 books in the public domain and published\n\nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project\n\nGutenberg.\n\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright\n\nnotices to have the dataset taken down from various websites.\n\nDespite the takedown requests, the importance of books to EleutherAI and the broader\n\ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced\n\nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. 29\n\nAmong other things, v2 would “have many more books than the original Pile had, for\n\nexample, and more diverse representation of non-academic non-fiction domains.” At the\n\nsame time, it would only seek to include public domain books and permissively licensed\n\ncontent. As before, this corpus focuses on English language books.\n\nThis is an illustrative example, and there are also other projects of this ilk. For instance, see the 27\n\nCommon Corpus project, which includes an array of public domain books from a number of countries,\n\nat [https://huggingface.co./blog/Pclanglais/common-corpus](https://huggingface.co./blog/Pclanglais/common-corpus) ; see also [https://huggingface.co./datasets/](https://huggingface.co./datasets/storytracer/internet_archive_books_en)\n\n[storytracer/internet_archive_books_en](https://huggingface.co./datasets/storytracer/internet_archive_books_en) (“This dataset contains more than 650,000 English public domain\n\nbooks (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the\n\nOpen Library project.”)\n\nSee Gao et al, supra note 8. 28\n\nGoldman, Sharon. “One of the World’s Largest AI Training Datasets Is About to Get Bigger and 29\n\n“Substantially Better.” *VentureBeat* , 11 Jan. 2024, [venturebeat.com/ai/one-of-the-worlds-largest-ai-](http://venturebeat.com/ai/one-of-the-worlds-largest-ai-training-datasets-is-about-to-get-bigger-and-substantially-better/)\n\n[training-datasets-is-about-to-get-bigger-and-substantially-better/](http://venturebeat.com/ai/one-of-the-worlds-largest-ai-training-datasets-is-about-to-get-bigger-and-substantially-better/) . Accessed 20 Mar. 2024.", - "page_start": 12, - "page_end": 12, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "The restrictions for a class are displayed and edited using the Class Description View shown in Figure 4.17. The Class Description View holds most of the information used to describe a class. The Class Description View is a powerful way of describing and defining classes. It is one of the most important differences between describing classes in OWL and in other models such as most object-oriented programming languages. In other models there is no formal definition that describes why one class is a subclass of another, in OWL there is. Indeed, the OWL classifier can actually redefine the class hierarchy based on the logical restrictions defined by the user. We will see an example of this later in the tutorial.\n\n4.10.2 Existential Restrictions An existential restriction describes a class of individuals that have at least one (some) relationship along a specified property to an individual that is a member of a specified class or datatype. For example, hasBase some PizzaBase describes all of the individuals that have at least one relationship along the\n\nhasBase property to an individual that is a member of the class PizzaBase — in more natural English,\n\nall of the individuals that have at least one pizza base.\n\n###### **Exercise 13: Add a restriction to Pizza that specifies a Pizza must have a PizzaBase**\n\n_____________________________________________________________________________________\n\n1. Select Pizza from the class hierarchy on the Classes tab.\n\n2. Click on the Add icon (+) next to the SubClass Of field in the Description view for Pizza.\n\n3. This will bring up a new window with several tab options to define a new restriction. Select the Object restriction creator. This tab has the Restricted property on the left and the Restriction filler on the right.\n\n4. Expand the property hierarchy on the left and select hasBase as the property to restrict. Then in the Restriction filler on the right select the class PizzaBase. Finally, the Restriction type at the bottom should be set to Some (existential). This should be the default so you shouldn’t have to change anything but double check that this is the case. Your window should look like figure 4.16 now.\n\n5. When your UI looks like figure 4.16 click on the OK button. That should close the window. Run the reasoner to make sure things are consistent. Your main window should now look like figure 4.17.\n\n_____________________________________________________________________________________\n\nRestrictions are also called axioms in OWL. This has the same meaning as in logic. An axiom is a\n\nlogical formula defined by the user rather than deduced by the reasoner. As described above,\n\nin Protégé all axioms are shown in normal font whereas all inferences inferred by the reasoner\n\nare highlighted in yellow.", - "page_start": 31, - "page_end": 31, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "9\n\nprovide a language that is called Description Logic or DL for short. One of the key features of DL is that these superclass-subclass relationships (aka subsumption relationships) can be computed automatically by a reasoner - more on this later. Figure 3.3 shows a representation of some classes containing individuals - classes are represented as ovals, like sets in Venn diagrams.\n\nIn OWL classes can be built up of descriptions that specify the conditions that must be satisfied by an individual for it to be a member of the class. How to formulate these descriptions will be explained as the tutorial progresses.", - "page_start": 9, - "page_end": 9, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two parts. The first part at the beginning consists of several namespace prefixes. These statements consist of the prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that these concepts were described in chapter 7. You may be wondering where all these prefixes came from\n\nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of\n\nnamespaces and prefixes that are required to define the ontology.\n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been discussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any language or database there is a lower level that describes how the concepts are mapped to actual data. In a relational database the fundamental construct to represent data is a table. In OWL the fundamental construct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF (Resource Description Framework) is a language to describe graphs (in the mathematical sense of the term). I.e., to describe nodes and links.\n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in what is called an undirected or network graph because objects can be subjects and vice versa. Whenever you define a property in OWL you are defining a predicate. An individual can be a subject or an object (or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1 . In this example\n\nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object.\n\nHowever, classes and properties themselves are also represented as triples. So for example, when you create the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to\n\nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class . Similarly when you add\n\nNamedPizza as a subclass of Pizza , Protégé adds the triple: NamedPizza rdfs: **s** ubClassOf\n\nPizza .\n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities that are the subjects of triples where the predicate is rdfs: **s** ubClassOf and the object is any other\n\nentity. The *?* before a name indicates that the name is a wildcard that can match anything that fits with the rest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate or even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this case our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the name of a class while in others it is a class expression with an orange circle in front of it. This is because when defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL axioms.\n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query determines what to match in the query. If you want to display everything matched in the WHERE clause you can just use a * for the SELECT clause. The initial default query in this tab is set up with no knowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes regardless of the ontology. To get information about Pizzas the first thing we need to do is to add\n\nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a mapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab discussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement:\n\nPREFIX pizza: < [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#>](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial)", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you have as well as the standards established by your organization or organizations that you work with.\n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have worked with most modern programming languages such as Python or Java, you are already familiar with the concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming conflicts between different ontologies. For example, you may have a class called Network in an ontology\n\nabout telecommunications. You might also have a class called Network in an ontology about graph\n\ntheory. The two concepts are related but are different. Just as with programming languages you use namespace prefixes to determine what specific namespace a name refers to. E.g., in this example you might have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when\n\nyou referred to the Network class for the Telecom ontology you would use tc:Network and\n\ngt:Network for the graph theory class.\n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl\n\nand is used to refer to classes such as owl:Thing and owl:Nothing . The Resource Description\n\nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that ontologies use such as rdfs:label leverage this namespace.\n\nIn the bottom view of the Active ontology tab there is a tab called Ontology Prefixes. This tab shows all the current namespace mappings in your ontology. There are certain concepts from OWL, RDF, RDFS, XML and XSD that are required for every ontology, so those namespaces are by default mapped in every new Protégé ontology. There is also a mapping to the empty string for whatever the namespace is for your ontology. This allows you to display and refer to entities in your ontology without entering a namespace prefix. If you look at that tab now you should see a row where the first column is blank, and the second column has the base IRI for your ontology. It should be the same IRI as the Ontology IRI at the top of the Active ontology tab, except it also has a # sign at the end. E.g., the Pizza tutorial developed for this tutorial has an IRI of: [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial) and the row that has a blank first column in Ontology Prefixes has the IRI: [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial) .", - "page_start": 61, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "[The square of opposition is often used to visualize](https://en.wikipedia.org/wiki/Square_of_opposition)\n\n[the relations between the four basic categorical](https://en.wikipedia.org/wiki/Categorical_propositions)\n\n[propositions in Aristotelian logic. It shows, for](https://en.wikipedia.org/wiki/Categorical_propositions)\n\nexample, that the propositions \"All S are P\" and\n\n\"Some S are not P\" are contradictory, meaning that\n\none of them has to be true while the other is false.\n\n[Aristotelian logic encompasses a great variety of topics. They include metaphysical theses about](https://en.wikipedia.org/wiki/Metaphysics)\n\n[ontological categories and problems of scientific explanation. But in a more narrow sense, it is identical](https://en.wikipedia.org/wiki/Ontology)\n\n[to term logic or syllogistics. A syllogism is a form of argument involving three propositions: two](https://en.wikipedia.org/wiki/Syllogism)\n\n[premises and a conclusion. Each proposition has three essential parts: a subject, a predicate, and a copula](https://en.wikipedia.org/wiki/Copula_(linguistics))\n\nconnecting the subject to the predicate. <sup>[107]</sup> For example, the proposition \"Socrates is wise\" is made up of\n\nthe subject \"Socrates\", the predicate \"wise\", and the copula \"is\". <sup>[108]</sup> The subject and the predicate are the\n\n*terms* of the proposition. Aristotelian logic does not contain complex propositions made up of simple\n\npropositions. It differs in this aspect from propositional logic, in which any two propositions can be\n\nlinked using a logical connective like \"and\" to form a new complex proposition. <sup>[109]</sup>\n\nIn Aristotelian logic, the subject can be *universal* ,\n\n*particular* , *indefinite* , or *singular* . For example, the\n\nterm \"all humans\" is a universal subject in the\n\nproposition \"all humans are mortal\". A similar\n\nproposition could be formed by replacing it with the\n\nparticular term \"some humans\", the indefinite term\n\n\"a human\", or the singular term \"Socrates\". <sup>[110]</sup>\n\nAristotelian logic only includes predicates for\n\n[simple properties of entities. But it lacks predicates](https://en.wikipedia.org/wiki/Property_(philosophy))\n\n[corresponding to relations between entities.](https://en.wikipedia.org/wiki/Relations_(philosophy)) <sup>[111]</sup> The\n\npredicate can be linked to the subject in two ways:\n\neither by affirming it or by denying it. <sup>[112]</sup> For\n\nexample, the proposition \"Socrates is not a cat\"\n\ninvolves the denial of the predicate \"cat\" to the\n\nsubject \"Socrates\". Using combinations of subjects\n\nand predicates, a great variety of propositions and\n\nsyllogisms can be formed. Syllogisms are\n\ncharacterized by the fact that the premises are linked\n\nto each other and to the conclusion by sharing one\n\npredicate in each case. <sup>[113]</sup> Thus, these three\n\npropositions contain three predicates, referred to as\n\n*major term* , *minor term* , and *middle term* . <sup>[114]</sup> The\n\ncentral aspect of Aristotelian logic involves\n\nclassifying all possible syllogisms into valid and\n\ninvalid arguments according to how the propositions\n\nare formed. <sup>[112][115]</sup> For example, the syllogism \"all\n\nmen are mortal; Socrates is a man; therefore Socrates is mortal\" is valid. The syllogism \"all cats are\n\nmortal; Socrates is mortal; therefore Socrates is a cat\", on the other hand, is invalid. <sup>[116]</sup>\n\n[Classical logic is distinct from traditional or Aristotelian logic. It encompasses propositional logic and](https://en.wikipedia.org/wiki/Classical_logic)\n\nfirst-order logic. It is \"classical\" in the sense that it is based on basic logical intuitions shared by most\n\nlogicians. <sup>[117]</sup> [ These intuitions include the law of excluded middle, the double negation elimination, the](https://en.wikipedia.org/wiki/Double_negation_elimination)", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", - "query": "When to use an enumerated class in OWL ontologies ?", - "target_page": 46, - "target_passage": "When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "###### **Exercise 3: Add a Comment Annotation to Your Ontology**\n\n_____________________________________________________________________________________\n\n1. Make sure you are in the Active Ontology tab. In the view just below the Ontology IRI and Ontology Version IRI fields find the Annotations option and click on the + sign. This will bring up a menu to create a new annotation on the ontology.\n\n2. The rdfs:comment annotation should be highlighted by default. If it isn’t highlighted click on it. Then type a new comment into the view to the right. Something like A tutorial ontology for the Pizza domain.\n\n3. Click OK. Your Active Ontology tab should like Figure 4.3.\n\n_____________________________________________________________________________________\n\nFigure 4.4: The Class Hierarchy View Options\n\n4.1 Named Classes The main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in the Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the Class hierarchy view as shown in Figure 4.5. <sup>4</sup> All empty ontologies contains one class called owl:Thing .\n\nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing\n\nall individuals. Because of this all classes are subclasses of owl:Thing .\n\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the\n\nClass hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or\n\nto create them as independent tabs.\n\nAdd Subclass\n\nAdd Sibling Class\n\nDelete Class", - "page_start": 13, - "page_end": 13, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Figure 4.23 The Reasoner Inferred that Margherita and Soho Pizzas are subclasses of VegetarianPizza\n\n4.14 Defining an Enumerated Class A powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. The idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a specific code library. One of the first and most common design patterns was the Model-View-Controller pattern first used in Smalltalk and now almost the default standard for good user interface design. Since there are significant differences between OWL and standard OOP the many excellent books on OOP design patterns don’t directly translate into OWL design patterns. Also, since the use of OWL is more recent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP community has. However, there are already many design patterns that have been documented for OWL and that can provide users with ways to save time and to standardize their designs according to best practices.\n\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value. We will show an example of such an enumerated class by creating a new", - "page_start": 44, - "page_end": 44, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you have as well as the standards established by your organization or organizations that you work with.\n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have worked with most modern programming languages such as Python or Java, you are already familiar with the concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming conflicts between different ontologies. For example, you may have a class called Network in an ontology\n\nabout telecommunications. You might also have a class called Network in an ontology about graph\n\ntheory. The two concepts are related but are different. Just as with programming languages you use namespace prefixes to determine what specific namespace a name refers to. E.g., in this example you might have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when\n\nyou referred to the Network class for the Telecom ontology you would use tc:Network and\n\ngt:Network for the graph theory class.\n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl\n\nand is used to refer to classes such as owl:Thing and owl:Nothing . The Resource Description\n\nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that ontologies use such as rdfs:label leverage this namespace.\n\nIn the bottom view of the Active ontology tab there is a tab called Ontology Prefixes. This tab shows all the current namespace mappings in your ontology. There are certain concepts from OWL, RDF, RDFS, XML and XSD that are required for every ontology, so those namespaces are by default mapped in every new Protégé ontology. There is also a mapping to the empty string for whatever the namespace is for your ontology. This allows you to display and refer to entities in your ontology without entering a namespace prefix. If you look at that tab now you should see a row where the first column is blank, and the second column has the base IRI for your ontology. It should be the same IRI as the Ontology IRI at the top of the Active ontology tab, except it also has a # sign at the end. E.g., the Pizza tutorial developed for this tutorial has an IRI of: [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial) and the row that has a blank first column in Ontology Prefixes has the IRI: [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial) .", - "page_start": 61, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two parts. The first part at the beginning consists of several namespace prefixes. These statements consist of the prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that these concepts were described in chapter 7. You may be wondering where all these prefixes came from\n\nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of\n\nnamespaces and prefixes that are required to define the ontology.\n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been discussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any language or database there is a lower level that describes how the concepts are mapped to actual data. In a relational database the fundamental construct to represent data is a table. In OWL the fundamental construct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF (Resource Description Framework) is a language to describe graphs (in the mathematical sense of the term). I.e., to describe nodes and links.\n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in what is called an undirected or network graph because objects can be subjects and vice versa. Whenever you define a property in OWL you are defining a predicate. An individual can be a subject or an object (or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1 . In this example\n\nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object.\n\nHowever, classes and properties themselves are also represented as triples. So for example, when you create the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to\n\nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class . Similarly when you add\n\nNamedPizza as a subclass of Pizza , Protégé adds the triple: NamedPizza rdfs: **s** ubClassOf\n\nPizza .\n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities that are the subjects of triples where the predicate is rdfs: **s** ubClassOf and the object is any other\n\nentity. The *?* before a name indicates that the name is a wildcard that can match anything that fits with the rest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate or even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this case our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the name of a class while in others it is a class expression with an orange circle in front of it. This is because when defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL axioms.\n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query determines what to match in the query. If you want to display everything matched in the WHERE clause you can just use a * for the SELECT clause. The initial default query in this tab is set up with no knowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes regardless of the ontology. To get information about Pizzas the first thing we need to do is to add\n\nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a mapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab discussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement:\n\nPREFIX pizza: < [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#>](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial)", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "4\n\n### Chapter 1 Introduction\n\nThis introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions specific to this tutorial, please feel free to email me directly: [mdebellissf@gmail.com](mailto:mdebellissf@gmail.com) However, if you have general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the User Support for Protégé and Web Protégé email list. This list has many people (including me) who monitor it and can contribute their knowledge to help you understand how to get the most out of this technology. To subscribe to the list, go to: [https://protege.stanford.edu/support.php](https://protege.stanford.edu/support.php) and click on the first orange Subscribe button. That will enable you to subscribe to the list and give you the email to send questions to.\n\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the requirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of the OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object properties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the ontology and automatically compute the ontology class hierarchy.\n\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: adding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of an OWL entity.\n\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology has a small number of instances and property values already created which can be used to illustrate the tools in the later chapters for writing rules, doing queries, and defining constraints.\n\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter 10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and SQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the difference between defining logical axioms in Description Logic and data integrity constraints in SHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography.\n\n1.1 Licensing This document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International Public License. I typically distribute it as a PDF but if you want to make your own version send me an email and I will send you the Word version. For details on licensing see: [https://creativecommons.org/licenses/by-sa/4.0/legalcode](https://creativecommons.org/licenses/by-sa/4.0/legalcode)\n\n1.2 Conventions Class, property, rule, and individual names are written in Consolas font like this . The term used for\n\nany such construct in Protégé and in this document is an *Entity* . Individuals and classes can also be referred to as objects.\n\nNames for user interface tabs, views, menu selections, buttons, and text entry are highlighted like this.\n\nAny time you see highlighted text such as File>Preferences or OK or PizzaTopping it refers to something that you should or optionally could view or enter into the user interface. If you ever aren’t sure what to do to accomplish some task look for the highlighted text. Often, as with PizzaTopping the text you\n\nenter into a field in the Protégé UI will be the name of a class, property, etc. In those cases, where the", - "page_start": 4, - "page_end": 4, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "8\n\n3.1.2 Properties Properties are binary relations between individuals. I.e., properties link two individuals together. For example, the property hasFriend might link the individual Biswanath to the individual Michael , or\n\nthe property hasChild might link the individual Michael to the individual Oriana . Properties can have\n\ninverses. For example, the inverse of hasChild is hasParent . Properties can be limited to having a\n\nsingle value - i.e., to being functional. They can also be transitive or symmetric. These property characteristics are explained in detail in Section 4.8. Figure 3.2 shows a representation of some properties.\n\n3.1.3 Classes OWL classes are sets that contain individuals. They are described using formal (mathematical) descriptions that rigorously define the requirements for membership of the class. For example, the class Cat would contain all the individuals that are cats in our domain of interest. <sup>2</sup> Classes may be organized\n\ninto a superclass-subclass hierarchy, which is also known as a taxonomy. However, taxonomies are often trees. I.e., each node has only one parent node. Class hierarchies in OWL are not restricted to be trees and multiple inheritance can be a powerful tool to represent data in an intuitive manner.\n\nSubclasses specialize (aka *are subsumed by* ) their superclasses. For example, consider the classes Animal\n\nand Dog - Dog might be a subclass of Animal (so Animal is the superclass of Dog ). This says that *All*\n\n*dogs are animals* , *All members of the class* Dog *are members of the class* Animal . OWL and Protégé\n\n2 Individuals can belong to more than one class and classes can have more than one superclass. Unlike OOP where\n\nmultiple inheritance is typically unavailable or discouraged it is common in OWL.\n\nProperties are similar to properties in Object-Oriented Programming (OOP). However, there are\n\nimportant differences between properties in OWL and OOP. The most important difference is that OWL\n\nproperties are first class entities that exist independent of classes. OOP developers are encouraged to\n\nread: [https://www.w3.org/2001/sw/BestPractices/SE/ODSD/](https://www.w3.org/2001/sw/BestPractices/SE/ODSD/)\n\nMichael\n\nOriana\n\nhasChild\n\nPerson Country\n\nUSA\n\nItaly India\n\nlivesIn\n\nBuddy\n\nRover\n\nDog\n\nhasPet\n\nFigure 3.3: Representation of Classes containing Individuals", - "page_start": 8, - "page_end": 8, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "4.10.4 Detecting a Class that can’t Have Members Next, we are going to use the reasoner to detect a class with a definition that means it can never have any members. In the current version of Protégé when the reasoner detects an inconsistency or problem on some operating systems the UI can occasionally lock up and be hard to use. So to make sure you don’t lose any of your work save your ontology using File>Save.\n\nSometimes it can be useful to create a class that we think should be impossible to instantiate to make sure the ontology is modeled as we think it is. Such a class is called a Probe Class.\n\n###### **Exercise 19: Add a Probe Class called ProbeInconsistentTopping**\n\n_____________________________________________________________________________________\n\n1. Select the class CheeseTopping from the class hierarchy.\n\n2. Create a subclass of CheeseTopping called ProbeInconsistentTopping.\n\n3. Click on the Add icon (+) next to the SubClass Of field in the Description view for ProbeInconsistentTopping .\n\n4. Select the Class hierarchy tab from the dialogue that pops up. This will bring up a small view that looks like the class hierarchy tab you have been using to add new classes. Use this to navigate to and select the class VegetableTopping. Click on OK.\n\n5. Make sure to save your current ontology file. Now run the reasoner. You should see that ProbeInconsistentTopping is now highlighted in red indicating it is inconsistent.\n\n6. Click on ProbeInconsistentTopping to see why it is highlighted in red. Notice that at the top of the Description view you should now see owl:Nothing under the Equivalent To field. This means that the probe class is equivalent to owl:Nothing . The owl:Nothing class is the opposite of owl:Thing .\n\nWhereas all individuals are instances of owl:Thing , no individual can ever be an instance of\n\nowl:Nothing . The owl:Nothing class is equivalent to the empty set in set theory.\n\n7. There should be a ? icon just to the right of owl:Nothing. As with any inference of the reasoner it is possible to click on the new information and generate an explanation for it. Do that now, click on the ? icon. This should generate a new window that looks like figure 4.20. The explanation is that ProbeInconsistentTopping is a subclass of CheeseTopping and VegetableTopping but those\n\ntwo classes are disjoint.\n\n8. Click OK to dismiss the window. Delete the class ProbeInconsistentTopping by selecting it and then clicking on the delete class icon at the top of the classes view (see figure 4.4).\n\n9. Synchronize the reasoner.\n\n_____________________________________________________________________________________", - "page_start": 37, - "page_end": 37, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Chapter 9 Queries: Description Logic and SPARQL Now that we have some individuals in our ontology, we can do some interesting queries. There are several tools for doing queries in Protégé.\n\n9.1 Description Logic Queries To start with the most straight forward one based on what you have already learned are Description Logic (DL) queries. These are essentially the same kind of statements you have been using to define classes. However, in addition to using such statements to define a class you can use it as a query.\n\n###### **Exercise 33: Try Some Description Logic Queries**\n\n_____________________________________________________________________________________\n\n1. To begin with navigate to the DL Query tab. If it doesn’t exist create it using: Window>Tabs>DL Query.\n\n2. At the top right of this tab you should see a view that says DL query: and below it Query (class expression).\n\n3 You can enter any DL statement you want in this box and then see all the entities that are subclasses, superclasses, and instances of it. As an example, enter: Customer and purchasedPizza some (hasTopping some (hasSpiciness value Hot)). I.e., all Customers who have purchased a Pizza that hasSpiciness\n\nHot . At first you may not see anything but don’t worry there is one more step.\n\n4. Look at the check boxes on the right under Query for. Check Superclasses, Subclasses (although it should already be checked by default) and Instances. Now your UI should look like figure 9.1. You may notice that owl:Nothing shows up as a subclass. Don’t worry that is actually expected. Remember that\n\nowl:Nothing is the empty set and the empty set is a subset of every set (including itself) so just as\n\nowl:Thing is a superclass of every class owl:Nothing is a subclass of every class. If you don’t want to\n\nsee owl:Nothing you can uncheck the box toward the bottom right that says Display owl:Nothing.\n\n5. Try some additional DL queries such as: hasTopping some (hasSpiciness value Hot) and VegetarianPizza and (hasTopping some (hasSpiciness some (isMilderThan value Hot))). Note that with this last query you are taking advantage of the transitive order you defined for the instances of the Spiciness class in chapter 6.\n\n6. You can also do queries for strings in the names of your entities. For example, first do a query simply with Pizza in the query window. Then type in Hot in the Name contains field. This should give you all the classes and individuals with *Hot* in their name.\n\n_____________________________________________________________________________________", - "page_start": 66, - "page_end": 66, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "### Chapter 4 Building an OWL Ontology\n\nThis chapter describes how to create an ontology of Pizzas. We use Pizzas because it is something almost everyone is familiar with.\n\n###### **Exercise 1: Create a new OWL Ontology**\n\n_____________________________________________________________________________________\n\n1. Start Protégé. When Protégé opens for the first time each day it puts up a screen of all the available plugins. You can also bring this up at any time by using File>Check for plugins. You won’t need any plugins at this point of the tutorial so just click the Not now button.\n\n2. The Protégé user-interface consists of several tabs such as Active ontology, Entities, etc. When you start Protégé you should be in the Active Ontology tab. This is for overview information about the entire ontology. Protégé always opens with a new untitled ontology you can start with. Your ontology should have an IRI something like: http://www.semanticweb.org/yourname/ontologies/2020/4/untitled-ontology- 27 Edit the name of the ontology (the part after the last “/” in this case untitled-ontology-27) and change it to something like PizzaTutorial. Note: the Pizza ontology IRIs shown below (e.g., figure 4.3) show the IRI after I edited the default that Protégé generated for me. Your IRI will look different and will be based on your name or the name of your organization.\n\n3. Now you want to save your new ontology. Select File>Save. This should bring up a window that says: Choose a format to use when saving the ‘PizzaTutorial’ ontology. There is a drop down menu of formats to use. The default RDF/XML Syntax should be selected by clicking the OK button. This should bring up the standard dialog your operating system uses for saving files. Navigate to the folder you want to use and then type in the file name, something like Pizza Tutorial and select Save. ____________________________________________________________________________________\n\nThe next step is to set some preferences related to the names of new entities. Remember than in Protégé any class, individual, object property, data property, annotation property, or rule is referred to as an entity. The term name in OWL can actually refer to two different concepts. It can be the last part of the IRI <sup>3</sup> or it can refer to the annotation property (usually rdfs:label ) used to provide a more user friendly name for\n\nthe entity. We will discuss this in more detail below in chapter 7. For now, we just want to set the parameters correctly so that future parts of the tutorial (especially the section on SPARQL queries) will work appropriately.\n\n3 An IRI is similar to a URL. This will be discussed in detail below in chapter 7.\n\nAs with any file you work on it is a good idea to save your work at regular intervals so that if\n\nsomething goes wrong you don’t lose your work. At certain points in the tutorial where saving\n\nis especially important the tutorial will prompt you to do so but it is a good idea to save your\n\nwork often, not just when prompted.", - "page_start": 10, - "page_end": 10, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "I.e., it might be the case that we never get the data to satisfy every integrity constraint which would mean the reasoner is never of any use except to tell us that the ontology is not consistent.\n\nThus, SHACL provides a way to define data integrity constraints that overlap to some degree with what can be defined in OWL and SWRL. For example, both can define the number of values allowed for a specific property. E.g., that each instance of Employee must have one and only one social security\n\nnumber ( ssn ). If this were defined as a DL axiom, then the axiom would never fire for employees that\n\nhad no ssn because of the OWA. On the other hand, if an Employee accidentally had 2 ssn values then\n\nthe entire ontology would be inconsistent until one value was removed. SHACL on the other hand can handle both these examples and rather than making the entire ontology inconsistent it simply logs warnings at various levels of severity.\n\n11.3 Basic SHACL Concepts To understand SHACL recall that the language underlying OWL is RDF which describes graphs as triples of the form: Subject Predicate Object. SHACL also works at the level of RDF because some developers may want to simply use that lower level for reasons of efficiency. Thus, RDF can validate an RDF graph as well as an OWL ontology. Fundamentally, SHACL consists of two components:\n\n1. An RDF vocabulary for defining data constraints on RDF graphs (which includes OWL since an OWL ontology is an RDF graph). 2. A reasoner for applying the constraints defined in 1 to a specified data graph such as the Pizza ontology.\n\nOne of the most important classes in 1 is a SHACL Shape . An instance of the SHACL Shape class\n\nconsists of a set of Targets and Constraints. A Target defines which nodes in the RDF graph that the data constraints apply to. For OWL ontologies this is typically the name of a class which indicates that the constraints apply to all instances of that class. The Constraints define the specific property for the constraint as well as the actual constraints such as the minimum or maximum number of values and the datatype. In the following example, a Target is the Employee class in the Pizza ontology. An example\n\nconstraint is that the ssn property must have exactly one value. Another example constraint is that the\n\nformat of the ssn value must be a string of the form: “NNN-NN-NNNN” where each N must be an\n\ninteger. For more on SHACL see the references in the bibliography.\n\n11.4 The Protégé SHACL Plug-In To start go to Windows>Tabs and see if you have SHACL Editor as an option. If you don’t then go to File>Check for plugins and select the SHACL4Protege Constraint Validator. You need to restart Protégé to see the new plugin so save your work and then quit and start Protégé and load the Pizza ontology with data.\n\nBecause editing SHACL is a bit more complex for this version of the tutorial we are only going to view some already written SHACL constraints and see how the validator processes them rather than writing additional constraints. First download the PizzaShapes.txt file to your local hard drive. This file can be found at: [https://tinyurl.com/pizzatshapes](https://tinyurl.com/pizzatshapes) Once you have downloaded the file open the SHACL Editor: Window>Tabs>SHACL Editor.\n\nYou will see an example shapes file in the editor when it opens but that isn’t the shapes file you are looking for. From the editor click on the Open button at the top of the tab and navigate to the PizzaShapes.txt file you downloaded.", - "page_start": 77, - "page_end": 77, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - } - ] - }, - { - "references": { - "source_file": "sg246915.pdf", - "query": "Howcan I specify to Content Manager OnDemand to store the data on the server on which the program runs ?", - "target_page": 121, - "target_passage": "Local: Content Manager OnDemand stores data in a primary storage node on the server on which the data loading program runs", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Chapter 1. Overview and concepts **5**\n\n*Figure 1-1 Content Manager OnDemand system overview*\n\nContent Manager OnDemand Client programs provide authorized users with high-speed\n\naccess to the archived data that runs on the user devices (workstations) that are attached to\n\nthe network and communicate with the Content Manager OnDemand servers.\n\nA Content Manager OnDemand server consists of multiple components that can be installed\n\non a single system or multiple systems. In all cases, the installation appears to the users as a\n\nsingle server. The installation and is administered by the Content Manager OnDemand\n\nadministrator as a single system.\n\nThe Content Manager OnDemand server includes the following components:\n\n� A single library server: The library server manages a database that contains the\n\ninformation about the users of the system, and the reports and data that are stored on the\n\nsystem.\n\n� One or more object servers: The object servers manage the data on disk or tape storage\n\ndevices.\n\n� One or more archive servers: The archive server stores the archived data objects.\n\nDepending on the operating system, the archive servers might be IBM Tivoli® Storage\n\nManager, object access method (OAM), or Archive Storage Manager (ASM).\n\nThe library server and the object server can be packaged separately or as a single executable\n\nfile.\n\n**Content Manager OnDemand Client programs**\n\nContent Manager OnDemand Client programs operate on various environments, including\n\npersonal computers that are running on Windows, web browsers, and mobile devices. By\n\nusing the client program, users can search for and retrieve reports that are stored on the\n\nsystem. Specifically, users can construct queries and search for reports, retrieve documents\n\nfrom Content Manager OnDemand, view, print, and fax copies or pages of documents, and\n\nattach electronic notes to the pages of a document.\n\nNetwork\n\nOnDemand Client\n\nOnDemand Object Server\n\nOnDemand Library Server Full Text Search Server\n\nOnDemand Archive\n\nCache Storage", - "page_start": 28, - "page_end": 28, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 2. Setting up a Content Manager OnDemand instance **19**\n\n### **2.3 Implementing a Content Manager OnDemand instance on a**\n\n**multiplatform UNIX environment**\n\nIn this section, we describe how to set up a single instance in a Content Manager OnDemand\n\nfor a multiplatform UNIX environment. Always refer to the product documentation of your\n\nrelease for the specific steps to follow.\n\n#### **2.3.1 Defining a single instance**\n\nBy default, the initial instance on any library server is named archive . Creating a single\n\ninstance can be summarized by the following steps:\n\n1. Creating a user\n\n2. Creating a DB2 instance\n\n3. Installing IBM Global Security Kit\n\n4. Setting up Secure Sockets Layer (SSL)\n\n5. Storing user IDs and passwords in a stash file\n\n6. Installing and configuring Tivoli Storage Manager\n\n7. Configuring the instance\n\n8. Creating a Content Manager OnDemand database\n\n9. Initializing the system log and system load facility\n\n**Creating a user**\n\nNew installations (instances) of Content Manager OnDemand can be configured to run under\n\na user other than the root user. If you plan to run an instance under a user other than root,\n\ncomplete the following steps:\n\n1. Create the user for the Content Manager OnDemand instance owner that is a member of\n\nthe database owners group.\n\n2. Give the user administrator authority to the database.\n\n3. Set permissions for the cache storage file systems.\n\n4. Set permissions for the Content Manager OnDemand configuration and script files.\n\n5. Give the instance owner permission to write to the system console.\n\n6. Specify the instance owner in the ARS.INI file.\n\nIf you plan to run a distributed library and object server system, with one or more object\n\nservers on different workstations or nodes than the library server, you must also configure\n\nContent Manager OnDemand on the object servers.\n\nTo configure Content Manager OnDemand on the object servers, complete the following\n\nsteps:\n\n1. Create a group and user for the Content Manager OnDemand instance owner.\n\n2. Give ownership of the cache storage file systems that are listed in the ARS.CACHE file to the\n\ngroup and user for the Content Manager OnDemand instance owner.", - "page_start": 42, - "page_end": 42, - "source_file": "sg246915.pdf" - }, - { - "text": "### **6.5 Data security**\n\nAccess to the Content Manager OnDemand data tables is secured through various methods.\n\nThese methods include a secure data model, user authentication, SQL Query support,\n\nannotation security, and securing access to the Content Manager OnDemand commands.\n\nThese methods are described in further detail in this section.\n\n#### **6.5.1 Content Manager OnDemand object-owner model**\n\nContent Manager OnDemand internal security is based on an object-owner model, which is\n\nillustrated in Figure 6-6. Details about the object-owner model are in the *IBM Content*\n\n*Manager OnDemand for Multiplatforms, V9.5, Administration Guide* , SC19-3352. In this\n\ncontext, a Content Manager OnDemand instance is an implementation of the library server,\n\none or more object servers, the data access, and the storage model. The data access and\n\nstorage are implemented in the form of objects. The following objects are all Content Manager\n\nOnDemand objects:\n\n� Users\n\n� Groups\n\n� Application groups\n\n� Folders\n\n� Cabinets\n\n� Applications\n\n� Holds\n\n� Storage set\n\n� Printers\n\n*Figure 6-6 Content Manager OnDemand internal security*\n\nThe Content Manager OnDemand object-owner model design handles the following\n\nsituations:\n\n� A single system administrator to control one or more Content Manager OnDemand\n\ninstances through a single Administrator Client interface.\n\n� Flexibility to create user administrators who manage users and groups for a specific\n\nContent Manager OnDemand instance.\n\n� Flexibility to create report administrators who manage application groups, folders, and\n\ncabinets for a specific instance.\n\n**System Administrator**\n\nReport\n\nAdministrator\n\nUser Administrator Users Groups\n\nApplication Groups\n\nApplications\n\nOnDemand instance A\n\nHolds\n\nFolders Cabinets\n\nStorage Sets Printers\n\nOnDemand instance B", - "page_start": 161, - "page_end": 161, - "source_file": "sg246915.pdf" - }, - { - "text": "**18** IBM Content Manager OnDemand Guide\n\n- Manages the (optional) Report Distribution System\n\n- Manages the “interface” to the (optional) Full Text Index system\n\n- Performs user authentication through internal security or external security System\n\nAuthorization Facility (SAF) calls\n\n- Performs logging\n\n� Object server:\n\n- Provides the repository for Content Manager OnDemand data archives\n\n- Stores archive storage policy information\n\n- Manages the retention of Content Manager OnDemand data archives\n\n- Controls the transition of Content Manager OnDemand archives\n\n- Manages the expiration of Content Manager OnDemand archives\n\n#### **2.2.3 Choosing a platform**\n\nA Content Manager OnDemand server can run on many different operating systems and\n\nhardware environments. It can be set up to run on a workstation and can scale up to an\n\nIBM z™ Systems complex. The following factors need to be part of the decision to implement\n\nContent Manager OnDemand on one platform versus another platform:\n\n� Existing hardware platforms\n\n� Future hardware requirements (standardization, consolidation, and others)\n\n� Existing personnel and skill set\n\n� Current workload (number of users, quantity of data, and others)\n\n� Future workload requirements (number of users, quantity of data, and others)\n\n� Interfacing with other systems (software and data)\n\n� Vendor’s ability to support the environment (hardware, software, and users over any\n\ngeographic extent)\n\n**Default installation directory paths:** The default installation directory path names\n\nchanged for Content Manager OnDemand for Multiplatforms Server. The default\n\ninstallation paths for Content Manager OnDemand 9.5 are listed:\n\n� /opt/IBM/ondemand/V9.5 for AIX and Sun (HP is no longer a supported platform in\n\nV9.5.)\n\n� /opt/ibm/ondemand/V9.5 for Linux and Linux on IBM z Systems™\n\n� C:\\Program Files\\IBM\\OnDemand\\V9.5 for Microsoft Windows\n\n� /usr/lpp/ars/V9R5M0 for z/OS\n\n� /QIBM/ProdData/OnDemand for IBM i\n\nYou can install Content Manager OnDemand to the default path or specify a different path.\n\nBecause this book describes all Content Manager OnDemand platforms, you see various\n\ninterchangeable references to these paths. Ensure that you check your own installation for\n\nthe path name that is implemented and interpret the paths that are identified in the manual.\n\nStarting with version 9.5, the installation can be performed by a non-root user on AIX.\n\nWhen installed as a non-root user, the installation path is fixed under the home directory of\n\nthe user:\n\n� $HOME.$HOME/IBM/ondemand/V9.5 for AIX and Sun\n\n� $HOME/ibm/ondemand/V9.5 for Linux and Linux on IBM z Systems", - "page_start": 41, - "page_end": 41, - "source_file": "sg246915.pdf" - }, - { - "text": "The Content Manager OnDemand Enhanced Retention Management feature helps you\n\nmanage and enforce the retention of documents in a Content Manager OnDemand system. In\n\na Content Manager OnDemand system, you retain documents for a specific period. Retaining\n\ndocuments for a certain period is commonly referred to as *retention management* . *Records*\n\n*management* describes the process of retaining and deleting documents under a set of\n\ncircumstances that are not necessarily bound by time, for example, until the end of litigation.\n\nConsider the following important points when you select the correct retention solution:\n\n� Records management requires that you can control individual documents. Content\n\nManager OnDemand manages application groups, not individual documents, and it works\n\nwith a storage manager to delete (expire) documents.\n\n� Records management requires flexibility in defining when to delete documents. Content\n\nManager OnDemand defines the time to delete applications with fixed time ranges, for\n\nexample, five years after Content Manager OnDemand loads the documents.\n\nTo overcome these limitations, implement the Content Manager OnDemand Enhanced\n\nRetention Management feature. With the Enhanced Retention Management feature, you\n\ncontrol individual documents by introducing *holds* . Holds are a way to identify the documents\n\nthat you want to keep for a period of time. To expire the document, you must remove the hold.\n\nHolds give you the flexibility to choose when to delete documents because you control when\n\nto remove a hold. You can manage holds through any of the following interfaces:\n\n� Content Manager OnDemand Windows client, Content Navigator, WEBi, the **ARSDOC**\n\ncommand, or the Content Manager OnDemand Web Enablement Kit (ODWEK) Java APIs\n\nthat are provided by Content Manager OnDemand.\n\n� IBM FileNet P8, when integrated with Content Manager OnDemand by enabling the\n\nFileNet Content Federation Services for Content Manager OnDemand feature. Use\n\nContent Federation Services for Content Manager OnDemand to federate Content\n\nManager OnDemand repositories, which connect your Content Manager OnDemand\n\ncontent to business processes in the IBM Case Foundation and IBM Enterprise Records\n\nfeatures of FileNet P8.\n\nThe Enhanced Retention Management feature requires that you disable the expiration\n\nprocesses that the Content Manager OnDemand storage manager has on the documents\n\nthat you want to hold. Disabling the expiration process prevents the Content Manager\n\nOnDemand storage manager from deleting these documents.\n\n### **16.2 Configuring Enhanced Retention Management**\n\nYou must configure Content Manager OnDemand to identify documents in application groups\n\nthat you want to retain (hold) and also identify the users who can manage holds. You must\n\ndisable expiration processes by the storage manager so that it cannot expire data. You must\n\nalso convert application groups with an expiration type of DOCUMENT, SEGMENT, or\n\nSTORAGE MANAGER to an expiration type of LOAD.\n\nTo configure Enhanced Retention Management, you must perform the following tasks:\n\n� Enable Enhance Retention Management\n\n� Identify the application groups where Enhanced Retention Management is applied\n\n� Specify the application group “lockdown” field\n\n� Enable hold permission for the application group\n\n� Assign hold permissions to users", - "page_start": 377, - "page_end": 377, - "source_file": "sg246915.pdf" - }, - { - "text": "### Chapter 17. Content Federation Services for Content Manager OnDemand and IBM Enterprise Records\n\n**17.2 Administration of Content Federation Services for Content**\n\n**Manager OnDemand for Enterprise Records**\n\nConfigure Content Manager OnDemand for Content Federation Services to declare records\n\nby using Enterprise Records. You must disable expiration processes by the storage manager\n\nso that it cannot expire data. You must also convert application groups with an expiration type\n\nof DOCUMENT, SEGMENT, or STORAGE MANAGER to an expiration type of LOAD.\n\nTo configure Content Federation Services for Content Manager OnDemand, you must\n\nperform the following tasks:\n\n� Enable Content Federation Services for Content Manager OnDemand.\n\n� Identify the application groups where Content Federation will be enabled.\n\n� Specify the application group field.\n\n� Enable Content Federation permissions for the application group.\n\n� Federate document metadata to Content Federation Services for Content Manager\n\nOnDemand.\n\nThese items are discussed in more detail in the following sections.\n\n#### **17.2.1 Enabling Content Federation Services for Content Manager OnDemand**\n\nAll of the steps in this section assume that IBM FileNet P8 and FileNet Content Federation\n\nServices are installed correctly.\n\nIn this section, we describe the components in Content Manager OnDemand to enable the\n\nfederation capabilities to allow record declaration in Enterprise Records. We assume that you\n\nare familiar with Content Manager OnDemand administration, so detailed steps are not\n\nprovided in this chapter.\n\nFor more information about the installation and configuration of FileNet P8 and FileNet\n\nContent Federation Services, see *Federated Content Management: Accessing Content from*\n\n*Disparate Repositories with IBM Content Federation Services and IBM Content Integrator* ,\n\nSG24-7742.\n\nTo use IBM FileNet P8 Content Federation Services for Content Manager OnDemand, you\n\nmust enable the feature in Content Manager OnDemand by modifying the ars.cfg file and\n\nadding the following line:\n\nARS_SUPPORT_CFSOD=1\n\nIn Content Manager OnDemand for Windows, you can enable IBM FileNet P8 Content\n\nFederation Services for Content Manager OnDemand by using the Content Manager\n\nOnDemand Administrator Client Configurator. Figure 17-1 on page 368 shows the Content\n\nManager OnDemand configuration setup for Content Federation Services for Content\n\nManager OnDemand.", - "page_start": 390, - "page_end": 390, - "source_file": "sg246915.pdf" - }, - { - "text": "### **13.3 Data retrieval performance**\n\nAll Content Manager OnDemand clients (such as the Windows client, CICS client, IBM\n\nContent Navigator, ODWEK application programming interfaces (APIs), and structured APIs)\n\nretrieve data from the Content Manager OnDemand server by using a standard proprietary\n\nContent Manager OnDemand protocol. From a Content Manager OnDemand server\n\nperspective, no difference exists between one client and another client.\n\n#### **13.3.1 Data retrieval parameters**\n\nVarious parameters affect data retrieval performance.\n\n**Folder parameters: General tab**\n\nIn the Content Manager OnDemand Administrator Client, under the Folder parameter and on\n\nthe General tab, the following option is available:\n\n� Note Search: If the Annotation flags in a document database are set to No in the Advanced\n\ntab of the General window of the Application Group, this option determines when Content\n\nManager OnDemand searches the database for annotations and notifies users that\n\nannotations exist for the documents that match a query. Content Manager OnDemand\n\nprovides three search and notification methods:\n\n- Hit List: Content Manager OnDemand searches for annotations when the user runs a\n\nquery. When annotations exist for a document, the client programs display a note icon\n\nnext to it in the document list. This method has a direct performance impact on the\n\ngeneration of the document list.\n\n- Retrieve: Content Manager OnDemand searches for annotations when the user\n\nselects a document for viewing. This method is the default and recommended value.\n\n- Note: Content Manager OnDemand searches for annotations when the user chooses\n\nthe Note option while the user views a document.\n\n**Folder parameters: Permissions tab**\n\nIn the Content Manager OnDemand Administrator Client, under Folder parameters and on\n\nthe Permission tab, the following option is available:\n\n� Max Hits: Determines the maximum number of hits that are retrieved and transmitted to\n\nthe client. By reducing the maximum number of hits, users are forced to enter queries that\n\nbetter match the documents that they are searching for. By reducing the maximum number\n\nof hits, the system resources are used optimally both in performing the queries and in\n\ndownloading the resulting document list.\n\n**TCP/IP considerations**\n\nA known Windows configuration setting might affect performance when you connect to a\n\nContent Manager OnDemand server. During repeated searches and retrievals on a Content\n\nManager OnDemand server, many Windows sockets are opened and closed. Two default\n\nWindows settings might affect heavy traffic between the client and the Content Manager\n\nOnDemand server:\n\n� When an application closes a Windows socket, Windows places the socket’s port into\n\nTIME_WAIT status for 240 seconds; during this time, the port cannot be reused.\n\n� Windows limits the number of ports that an application can use to 5000.", - "page_start": 327, - "page_end": 327, - "source_file": "sg246915.pdf" - }, - { - "text": "*Figure 17-1 Configuration setup for Content Federation Services for Content Manager OnDemand*\n\nDisabling this configuration setting does not affect any existing documents that were placed\n\non hold by Enterprise Records. Documents continue to be held until Content Manager\n\nOnDemand is notified by Enterprise Records that the documents must be deleted.\n\n#### **17.2.2 Identify the application groups where Content Federation will be**\n\n**enabled**\n\nFor each application group, specify whether you want to enable FileNet P8 Content\n\nFederation Services for Content Manager OnDemand by using the Content Manager\n\nOnDemand Administrator Client, as shown in Figure 17-2 on page 369.", - "page_start": 391, - "page_end": 391, - "source_file": "sg246915.pdf" - }, - { - "text": "## **Chapter 1. Overview and concepts**\n\nIn this chapter, we provide an overview of the IBM Content Manager OnDemand (Content\n\nManager OnDemand) system. We describe how Content Manager OnDemand manages\n\nreports and index data. We also provide information to help you better understand how\n\nContent Manager OnDemand works.\n\nIn this chapter, we cover the following topics:\n\n� Overview of Content Manager OnDemand\n\n� Content Manager OnDemand concepts\n\n� Content Manager OnDemand server and its components\n\n**1**", - "page_start": 26, - "page_end": 26, - "source_file": "sg246915.pdf" - }, - { - "text": "**28** IBM Content Manager OnDemand Guide\n\n� Builds the Content Manager OnDemand system tables and indexes.\n\n� Binds the database to Content Manager OnDemand.\n\nSign on to the user account that you assigned as the owner of the Content Manager\n\nOnDemand instance (in the ARS.INI file). Run **arsdb** with the following options:\n\n/opt/IBM/ondemand/V9.5/bin/arsdb -I ondmd950 -cv\n\nIn our scenario, -I ondmd950 is the Content Manager OnDemand instance.\n\nAfter this command completes, you can log in to DB2 and connect to the new instance. List all\n\nof the tables by running the following command:\n\ndb2 list tables for all\n\n**Initializing the system log and system load facility**\n\nAfter you create the database, you can initialize the system log by running the following\n\ncommand:\n\n/opt/IBM/ondemand/V9.5/bin/arssyscr -I ondmd950 -l\n\n-I ondmd950 is the new Content Manager OnDemand instance.\n\nContent Manager OnDemand can track loading activity with the system load logging facility.\n\nContent Manager OnDemand stores these load messages in the system load log. You can\n\ninitialize the system load log by running the following command:\n\n/opt/IBM/ondemand/V9.5/bin/arssyscr -I ondmd950 -a\n\nAgain, -I ondmd950 is the new Content Manager OnDemand instance.\n\nThe **arssyscr** program creates the application groups, applications, and folders that are\n\nrequired by the system logging facility.\n\n#### **2.3.2 Starting and connecting to the new instance**\n\nAfter the instance is created, you can start the new instance and connect to it.\n\n**Starting and stopping arssockd**\n\nTo start the instance manually, run the following command and include the instance name\n\nafter the **arssockd** command:\n\n/opt/IBM/ondemand/V9.5/bin/arssockd -I ondmd950 -Sv\n\nRun the **ps** command to verify that the instance is started:\n\nps -ef | grep ars\n\nIf more than one instance is running, you see more than one **arssockd** process in the display.\n\nThe instance other than the default instance archive has a -instancename after **arssockd** for\n\nidentification:\n\nOnDemand95 65864128 1 0 Jun 11 - 0:00 arssockd-ondmd950:\n\n**Note:** The **arsdb** and **arssyscr** commands are in /opt/IBM/ondemand/V9.5/bin for AIX,\n\nHP-UX, and Sun Solaris, and in /opt/ibm/ondemand/V9.5/bin for Linux.", - "page_start": 51, - "page_end": 51, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "sg246915.pdf", - "query": "Does the XML indexer of Content Manager OnDemand support large objects ?", - "target_page": 188, - "target_passage": "No", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "## **Chapter 1. Overview and concepts**\n\nIn this chapter, we provide an overview of the IBM Content Manager OnDemand (Content\n\nManager OnDemand) system. We describe how Content Manager OnDemand manages\n\nreports and index data. We also provide information to help you better understand how\n\nContent Manager OnDemand works.\n\nIn this chapter, we cover the following topics:\n\n� Overview of Content Manager OnDemand\n\n� Content Manager OnDemand concepts\n\n� Content Manager OnDemand server and its components\n\n**1**", - "page_start": 26, - "page_end": 26, - "source_file": "sg246915.pdf" - }, - { - "text": "**OnDemand**\n\nContent Manager OnDemand users primarily search on the metadata (extracted index\n\nvalues) that is associated with documents. By using FTS, you can intelligently search through\n\nactual document content. To enable FTS, the documents are first parsed and an index is built.\n\nThis index can then be queried by a full text engine.\n\nThe FTS feature in Content Manager OnDemand comes with a new server, the Full Text\n\nSearch Server (FTS Server), which handles the text extraction, indexing, and searching of the\n\nindexed data. This new server offloads the processing of full text data to a machine other than\n\nyour Content Manager OnDemand library and object servers.\n\nThe full text engine is the same search services engine that is used by other IBM products,\n\nsuch as DB2 or IBM FileNet P8. It is based on the Lucene engine and allows advanced and\n\nflexible queries. Users can perform wildcard searches, fuzzy (or similar) searches, proximity\n\nsearches, Boolean searches, and other complex queries.\n\nThe full text feature can handle many formats, including Microsoft Office documents, XML\n\nfiles, and typical Content Manager OnDemand formats, such as AFP, Line Data, and Adobe\n\nPortable Document File (PDF).\n\nThe FTS feature supports full text indexing of both new and existing data. For new data, the\n\nFTS Server is configured to index the newly loaded reports by using the Administrator Client.\n\nFor existing data, indexing is invoked by using the Content Manager OnDemand\n\ncommand-line utilities or the Content Manager OnDemand Web Enablement Kit (ODWEK)\n\nJava application programming interface (API).\n\nFTS is enabled through the Content Manager OnDemand folder and allows all clients to take\n\nadvantage of full text queries after the server configuration is complete. Several new Content\n\nManager OnDemand folder field types are defined in support of FTS. Search score, highlight,\n\nand summary are returned, aiding the user in determining whether the document is a good\n\nmatch.\n\n### **15.2 Full text search architecture in Content Manager**\n\n**OnDemand**\n\nThe process of full text indexing can be lengthy in terms of time and processor consumption.\n\nTherefore, an integration architecture, which decouples the full text engine from the Content\n\nManager OnDemand server and keeps the different workloads separate, is required.\n\nThe components and their basic communication are shown in Figure 15-1 on page 337.\n\n**Note:** Before the release of the FTS option in Content Manager OnDemand, a document\n\ncontent-based search was possible by using the server-based text search functionality.\n\nHowever, this functionality is limited to AFP, Line, SCS, and PDF documents. It does not\n\nuse an index, but instead the server retrieves the documents and then scans those\n\ndocuments for the index values. This method limits the capabilities of the functions to exact\n\nmatches of a query string and might cause workload problems on the Content Manager\n\nOnDemand server. FTS eliminates these issues and limitations by introducing new\n\nprocessing components.", - "page_start": 359, - "page_end": 359, - "source_file": "sg246915.pdf" - }, - { - "text": "### **6.5 Data security**\n\nAccess to the Content Manager OnDemand data tables is secured through various methods.\n\nThese methods include a secure data model, user authentication, SQL Query support,\n\nannotation security, and securing access to the Content Manager OnDemand commands.\n\nThese methods are described in further detail in this section.\n\n#### **6.5.1 Content Manager OnDemand object-owner model**\n\nContent Manager OnDemand internal security is based on an object-owner model, which is\n\nillustrated in Figure 6-6. Details about the object-owner model are in the *IBM Content*\n\n*Manager OnDemand for Multiplatforms, V9.5, Administration Guide* , SC19-3352. In this\n\ncontext, a Content Manager OnDemand instance is an implementation of the library server,\n\none or more object servers, the data access, and the storage model. The data access and\n\nstorage are implemented in the form of objects. The following objects are all Content Manager\n\nOnDemand objects:\n\n� Users\n\n� Groups\n\n� Application groups\n\n� Folders\n\n� Cabinets\n\n� Applications\n\n� Holds\n\n� Storage set\n\n� Printers\n\n*Figure 6-6 Content Manager OnDemand internal security*\n\nThe Content Manager OnDemand object-owner model design handles the following\n\nsituations:\n\n� A single system administrator to control one or more Content Manager OnDemand\n\ninstances through a single Administrator Client interface.\n\n� Flexibility to create user administrators who manage users and groups for a specific\n\nContent Manager OnDemand instance.\n\n� Flexibility to create report administrators who manage application groups, folders, and\n\ncabinets for a specific instance.\n\n**System Administrator**\n\nReport\n\nAdministrator\n\nUser Administrator Users Groups\n\nApplication Groups\n\nApplications\n\nOnDemand instance A\n\nHolds\n\nFolders Cabinets\n\nStorage Sets Printers\n\nOnDemand instance B", - "page_start": 161, - "page_end": 161, - "source_file": "sg246915.pdf" - }, - { - "text": "**72** IBM Content Manager OnDemand Guide\n\n### **3.3 Content Manager OnDemand XML Batch Administration**\n\nIn addition to the Administrator Client that runs under Windows, Content Manager OnDemand\n\nprovides an administrative program that uses Extensible Markup Language (XML). The XML\n\nBatch Administration program (XML batch program) is run on the Content Manager\n\nOnDemand server and provides the same functionality as the Administrator Client.\n\nThe difference between the two programs is that for the Administrator Client, the user must\n\nprovide input through the graphical user interface (GUI) as opposed to the XML batch\n\nprogram, which receives input through the XML interface.\n\nIn this section, we describe the following items:\n\n� Benefits of using the XML batch program\n\n� Using the XML Batch Administration program\n\n� Special features of the XML batch program\n\n� Tips on using the ARSXML command\n\n**Benefits of using the XML batch program**\n\nMany benefits are possible when you use the XML batch program:\n\n� It provides another way to perform the Content Manager OnDemand system\n\nadministrative tasks.\n\n� It can process different types of objects, such as updating users in a group and application\n\ngroup permission at the same time.\n\n� The Administrator Client is not needed.\n\n� It is useful for replicating the same objects to multiple Content Manager OnDemand\n\nservers, and it can even replicate the object when no network connection exists between\n\nthe servers.\n\n� It simplifies the automation of system administrative tasks.\n\n� For Content Manager OnDemand support purposes, the output XML file can be used to\n\nprovide information to the support team for problem determination.\n\n#### **3.3.1 Using the XML Batch Administration program**\n\nThis section provides a brief explanation of how to use the new XML batch program. For more\n\ninformation, see *IBM Content Manager OnDemand for Multiplatforms - Administration Guide* ,\n\nSC19-3352.\n\nThe Batch Administration program is called **arsxml** . With this XML batch program, you can\n\nexport, add, delete, and update Content Manager OnDemand objects.\n\nTo use the program, you must have the following files:\n\n� The schema file, ondemand.xsd\n\n� An input XML file (for example, exportusers.xml )\n\n� A password stash file", - "page_start": 95, - "page_end": 95, - "source_file": "sg246915.pdf" - }, - { - "text": "**12** IBM Content Manager OnDemand Guide\n\n- The *XML Indexer* allows the rapid increase in XML archiving mandates that are based\n\non ISO 20022 standards with XML (including SEPA in Europe). The XML Indexer is\n\noptimized for high-volume batch archiving of XML, batch PDF, AFP, Line Data, and\n\ncheck images.\n\n- The *Full Text Indexer* provides the capability to index the full text of a document (or\n\nreport). You can search through an indexed document.\n\n� *Data loading programs* can be set up to automatically store report data into application\n\ngroups and update the database. The data loading programs can run on any Content\n\nManager OnDemand server.\n\n� *Report Distribution Facility* provides an easy way to automatically group reports and\n\nportions of reports and distribute the reports to multiple users. Distributions can be\n\nprinted, created as an output file, or emailed as an attachment.\n\n� Both the archived reports and their resources are stored in the Content Manager\n\nOnDemand Archive. The Content Manager OnDemand system manages the stored data\n\nthroughout its lifetime. It provides authorized users rapid access to the data and allows the\n\ndata to be converted into different formats for display or print.\n\n� A *server print* facility allows users to reprint a large volume of documents at high speed.\n\nPrint servers, such as Infoprint (on AIX), can be started to manage the server print\n\ndevices. These print servers are not part of Content Manager OnDemand and must be\n\npurchased separately.\n\n� Content Manager OnDemand *management programs* maintain the Content Manager\n\nOnDemand database and documents in cache storage.\n\n� A *system logging* facility provides administrators with tools to monitor server activity and\n\nrespond to specific events as they occur. The interface to the system logging facility is\n\nthrough the system log folder and the system log user exit.", - "page_start": 35, - "page_end": 35, - "source_file": "sg246915.pdf" - }, - { - "text": "Preface **xvii**\n\nSpecial thanks to the following people for their content contribution:\n\n**Ben Boltz** is a Senior Software Engineer. He has 32 years of experience in the Software\n\nIndustry. He has worked on Content Manager OnDemand for Multiplatforms for over 20 years.\n\n**Darrell Bryant** joined IBM as a manufacturing engineer and worked as a Systems Engineer\n\nwho specialized in S/36 and AS/400 systems. In 2000, Darrell joined the OnDemand team.\n\nHe has performed a mix of activities, including services, education, support, and testing.\n\nDarrell is now the lead tester for OnDemand for i. He also develops and teaches workshops to\n\nclients and partners. He is the editor of the OnDemand Newsletter.\n\n**Nelson Chen** is a Software Developer with Content Manager OnDemand. He has over 30\n\nyears of experience in software development, among them 27 years at IBM and last 20 years\n\nin OnDemand. His areas of expertise include ArsXML, Install, and Configurator.\n\n**Trang Kim Duong** is a Software Developer with Content Manager OnDemand. Among her 17\n\nyears of experience in software development, the last 11 years were in Content Manager\n\nOnDemand. Trang’s areas of expertise include workflow for Space Vehicle Design, Content\n\nManager OnDemand Report Distribution, Exporter utility for Content Federation Services for\n\nContent Manager OnDemand (CFS-CMOD), and the Content Manager OnDemand back-end\n\ndatabase component.\n\n**Hubert Hwang** is a Software Developer with Content Manager OnDemand. He is a Certified\n\nSolutions Expert for Content Manager OnDemand with over 10 years of experience with the\n\nproduct. His areas of expertise include the Content Manager OnDemand Web Enablement\n\nKit Java application programming interfaces (APIs), Content Navigator, and software test\n\nautomation. He has extensive experience troubleshooting all aspects of the product. He has\n\nauthored over 200 technotes on topics, such as migration, data collection, and\n\ntroubleshooting guides, for Content Manager OnDemand.\n\n**Vicki Miller** is a Senior Certified Client Technical Professional at IBM, working in the\n\ntechnology industry for 33 years with a focus on Enterprise Content Manager (ECM) since\n\n1999. Her area of expertise in the realm of ECM is focused on solution sales consulting and\n\ntechnical account leadership that revolves around the management, processing, and analysis\n\nof any type of electronic content to help organizations optimize and protect their business.\n\nVicki has spoken at IBM conferences on critical ECM topics, contributed to the development\n\nof technical publications, and led groups within IBM and client organizations to drive the\n\nenhancement ECM solutions and products.\n\n**Paula Muir** is a Software Developer with Content Manager OnDemand for Multiplatforms in\n\nBoulder, Colorado. Her areas of expertise include indexing and loading data, and AFP and\n\nPDF architecture.\n\n**Nancy O’Brian** started at IBM as an applications programmer, then transferred to a branch\n\noffice where she performed her first Content Manager OnDemand (then known as R/DARS)\n\nimplementation. After many more implementation service engagements, she joined the\n\nContent Manager OnDemand development team and continued to perform implementation\n\nservices, training, support, testing, and technical writing. She currently focuses primarily on\n\ntechnical writing and testing.\n\n**Sandi Pond** is a Software Developer with Content Manager OnDemand for Multiplatforms.\n\nShe has 17 years of experience with Content Manager OnDemand, working in various areas\n\nof the development team. Her area of expertise is the OnDemand Web Enablement Kit\n\n(ODWEK).\n\n**Debbie Wagner** is a Senior Software Engineer at IBM and has over 22 years of experience in\n\ncontent management, specifically, Content Manager OnDemand for Multiplatforms. Her areas", - "page_start": 18, - "page_end": 18, - "source_file": "sg246915.pdf" - }, - { - "text": "**Facility**\n\nBefore Content Manager OnDemand version 9.5, two report distribution components were\n\navailable:\n\n� OnDemand Distribution Facility for z/OS\n\n� Report Distribution Facility for Content Manager OnDemand for Multiplatforms\n\nBoth of these components contained certain strengths and weaknesses. In V9.5, the\n\nstrengths of both of these components were merged into a single component named\n\nOnDemand Distribution Facility (ODF), which offered the following advantages:\n\n� It runs on all Content Manager OnDemand platforms.\n\n� It can run on a separate platform from where the Content Manager OnDemand server is\n\ninstalled.\n\n� Its operation can be monitored through a new graphical monitor, the OnDemand Monitor.\n\n� It includes transform support where Content Manager OnDemand can transform content\n\nfrom one data type to another data type before the content is sent as part of an ODF\n\ndistribution.\n\nThis chapter describes ODF V9.5. For any new installations (on z/OS or AIX) before version\n\n9.5 of Content Manager OnDemand, we suggest that you install ODF.\n\nFigure 14-1 shows the evolution and merger of ODF 9.5 from its predecessors ODF9.0 and\n\nReport Distribution System (RDF) 9.0.\n\n*Figure 14-1 Evolution of ODF*\n\nWhen you load documents into Content Manager OnDemand, you might need to print these\n\ndocuments or send them to various people in your organization.\n\nContent Manager OnDemand automates the process of sending the documents that are\n\nloaded into Content Manager OnDemand to print (or the JES spool), a file (or a z/OS\n\ndataset), to a recipient as an email attachment, or to a recipient as an email notification.", - "page_start": 339, - "page_end": 339, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 3. Administration **73**\n\nIn XML, the definition and syntax of the markup language are defined in a *schema file* . For the\n\nContent Manager OnDemand XML batch program, the schema file is called ondemand.xsd . It\n\ncontains the definitions for the Content Manager OnDemand objects: users, groups,\n\napplications, application groups, storage sets, folders, printers, and others. Each Content\n\nManager OnDemand object definition contains one or more child objects. For example, a user\n\nobject has a child object for permissions, and a group object has a child object for users in the\n\ngroup. The schema file ( ondemand.xsd ) must not be changed in any way by the user.\n\nThe *input XML file* for the XML batch program is parsed to ensure that it is valid according to\n\nthe schema file. Each object within the file is examined to ensure that the attributes are valid\n\naccording to the object type. The XML batch program generates XML when Content Manager\n\nOnDemand objects are exported. The XML that is generated can be used as an input for the\n\nsubsequent **arsxml** command.\n\nExample 3-1 shows a sample of the file exportusers.xml from the XML samples directory.\n\nYou can change the names of the users to the users that you want to export.\n\n*Example 3-1 Sample XML input file for exporting users*\n\n<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n\n<onDemand xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\"\n\nxsi:noNamespaceSchemaLocation=\"../ondemand.xsd\">\n\n<user name=\"SAMPLEUSER0\" />\n\n<user name=\"SAMPLEUSER1\" />\n\n<user name=\"SAMPLEUSER2\" />\n\n<user name=\"SAMPLEUSER3\" />\n\n<user name=\"SAMPLEUSER4\" />\n\n</onDemand>\n\nYou can export objects by running **arsxml export** . The following command exports the users\n\nthat are listed in the exportuser.xml file, from the server odserver1, to an output file named\n\nusers.xml :\n\narsxml export -u oduser1 -p /my/stash/pwfile -h odserver1 -i exportusers.xml -o\n\nusers.xml -v\n\nYou can import objects by running **arsxml add** . The following command imports the users\n\nfrom the users.xml file (which is generated from the previous command) to server odserver2:\n\narsxml add -u oduser2 -p /my/stash/pwfile -h odserver2 -i users.xml -v\n\nYou can delete objects by running **arsxml delete** . The following command deletes the users\n\nfrom odserver2, based on the users that are listed in the users.xml file:\n\narsxml delete -u oduser2 -p /my/stash/pwfile -h odserver2 -i users.xml -v\n\nFor deletion, you are prompted before each object in the XML is deleted, unless the **-x**\n\nparameter is used.", - "page_start": 96, - "page_end": 96, - "source_file": "sg246915.pdf" - }, - { - "text": "If a FileNet P8 system is installed in your environment that serves as your primary content\n\nmanagement system and reports need to be available to users without their knowing that\n\nthose reports are in a different system, this integration might suit your needs. The same\n\nsituation applies to the use of FileNet P8 Records Management, which can be applied to\n\nContent Manager OnDemand documents as well, therefore bringing a level of federated\n\nrecords management capability to your documents.\n\nWhen you plan your integration with FileNet P8, remember this federation is active: Content\n\nManager OnDemand actively publishes document links into a FileNet P8 system. You must\n\nconsider both volumes (FileNet P8 systems usually are smaller than Content Manager\n\nOnDemand systems) and the active federation process.\n\nFor more information about Content Manager OnDemand and FileNet P8 integration, see\n\n*IBM FileNet Content Federation Services for Content Manager OnDemand* , SC19-2711.\n\n### **8.3 Client API overview**\n\nWith various client options, multiple API options are available to navigate through the system\n\nand access Content Manager OnDemand documents. Although the Java API that is provided\n\nby Content Manager ODWEK is the API that is used most by clients and the basis for most\n\ndevelopment projects, other APIs are available and used for a limited range of scenarios.\n\nThe following list shows the APIs that are available for Content Manager OnDemand:\n\n� Content Manager ODWEK: The Java API for Content Manager OnDemand\n\n� SOAP and Representational State Transfer (REST) web services that follow the CMIS\n\nstandard\n\n� Windows OLE (ActiveX control) that is provided by the Windows client\n\n� XML administrative API through the **ARSXML** server command\n\n� Structured APIs on z/OS environments\n\n� The standard Content Manager OnDemand server commands that serve as a\n\nconsole-based API to work with Content Manager OnDemand documents\n\n#### **8.3.1 Content Manager OnDemand Web Enablement Kit**\n\nODWEK provides a Java API to access Content Manager OnDemand servers and their\n\ndocuments. It is the strategic client API that provides the largest feature set of any Content\n\nManager OnDemand API. It is used by web clients, such as Content Navigator or WEBi, by\n\nabstraction layers, such as Information Integrator, or by API components, such as CMIS.\n\nThe ODWEK Java API and its use to develop Content Manager OnDemand clients are\n\ndescribed in detail in *IBM Content Manager OnDemand Web Enablement Kit Java APIs: The*\n\n*Basics and Beyond* , SG24-7646. This section covers only a basic overview and focuses on\n\nclient considerations about ODWEK. Developers are encouraged to read the referenced book\n\nbefore they plan a client development that is based on ODWEK.\n\n**Scope**\n\nODWEK is a Content Manager OnDemand component that can be used by all Content\n\nManager OnDemand customers. It is focused on typical client use cases, such as searching\n\nfor and accessing data that is stored in a Content Manager OnDemand archive. It also has\n\nweb viewers, such as the line data applet and Content Manager OnDemand AFP viewer.", - "page_start": 225, - "page_end": 225, - "source_file": "sg246915.pdf" - }, - { - "text": "© Copyright IBM Corp. 2003, 2015. All rights reserved. **xv**\n\n## **Preface**\n\nThis IBM® Redbooks® publication provides a practical guide to the design, installation,\n\nconfiguration, and maintenance of IBM Content Manager OnDemand Version 9.5.\n\nContent Manager OnDemand manages the high-volume storage and retrieval of electronic\n\nstatements and provides efficient enterprise report management. Content Manager\n\nOnDemand transforms formatted computer output and printed reports, such as statements\n\nand invoices, into electronic information for easy report management. Content Manager\n\nOnDemand helps eliminate costly, high-volume print output by capturing, indexing, archiving,\n\nand presenting electronic information for improved customer service.\n\nThis publication covers the key areas of Content Manager OnDemand, some of which might\n\nnot be known to the Content Manager OnDemand community or are misunderstood. The\n\nbook covers various topics, including basic information in administration, database structure,\n\nstorage management, and security. In addition, the book covers data indexing, loading,\n\nconversion, and expiration. Other topics include user exits, performance, retention\n\nmanagement, records management, and many more.\n\nBecause many other resources are available that address subjects on different platforms, this\n\npublication is not intended as a comprehensive guide for Content Manager OnDemand.\n\nRather, it is intended to complement the existing Content Manager OnDemand\n\ndocumentation and provide insight into the issues that might be encountered in the setup and\n\nuse of Content Manager OnDemand. This book is intended for individuals who need to\n\ndesign, install, configure, and maintain Content Manager OnDemand.\n\n### **Authors**\n\nThis book was produced by a team of specialists from around the world working at the\n\nInternational Technical Support Organization, San Jose Center.\n\n**Wei-Dong Zhu** is a Content Management Project Leader with the ITSO at IBM US,\n\nCalifornia. She is a Certified Solution Designer for IBM Content Manager. She has more than\n\n10 years of software development experience in accounting, image workflow processing, and\n\ndigital media distribution (DMD). Her development work in one of the DMD solutions\n\ncontributed to a first-time ever win for IBM of an Emmy award in 2005. Jackie joined IBM in\n\n1996. She holds a Master of Science degree in Computer Science from the University of\n\nSouthern California.\n\n**Jim Ilardi** is a Consulting Client Solution Professional in Carmel, New York. Jim has over 30\n\nyears of experience in IT and over 18 years working with Content Manager OnDemand. Jim\n\nstarted with IBM in Lab Services installing many OnDemand systems around the world.\n\nToday, Jim works in Pre-Sales Technical Sales covering Enterprise Content Manager in the\n\nNew York Area.\n\n**Deborah Matamoros** is a Software Developer with Content Manager OnDemand. She has\n\n26 years of development experience at IBM, with the last seven of those years in OnDemand.\n\nHer area of expertise is Report Distribution. Debbie holds a degree in Computer Science from\n\nthe University of Oregon and currently resides in Park City, Utah.", - "page_start": 16, - "page_end": 16, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "sg246915.pdf", - "query": "Considering storage efficiency, should I store my AFP documents as PDF to distribute them over the web ?", - "target_page": 232, - "target_passage": "If a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval tim", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "#### **13.4.1 PDF data**\n\nPortable Document Format (PDF) data is an increasingly common data type that can be\n\narchived within Content Manager OnDemand. The following key advantages are available by\n\nusing this data type as a document format:\n\n� It is a read-only format that does not require any external resources, such as images or\n\nfonts. It is self-contained.\n\n� The viewer for PDF can be downloaded at no charge from the Adobe website and the\n\nbrowser plug-ins for PDF are also available at no charge.\n\nDuring PDF document creation, resources, such as images and custom fonts, are placed in\n\nthe data stream once and then referenced many times from within the PDF file. If a large\n\nreport is produced from many small documents, that report requires only one copy of the\n\nresources.\n\nHowever, when the PDF is indexed, the PDF Indexer creates many PDF documents from the\n\ninput file. Each of these documents requires a certain number of PDF structures, which define\n\na document. These documents are concatenated together in the .out file, and then loaded\n\ninto Content Manager OnDemand as separate documents. Because the resources are\n\nextracted and placed into a separate resource file, they are not included in each document.\n\nFor an illustration of the process, see Figure 13-3.\n\n*Figure 13-3 PDF indexing*\n\nIf no resources are collected, the size of the .out file, which contains all of the individual\n\ndocuments, might be larger than the original file. For tips about how to reduce the size of the\n\noutput file, see 7.3.5, “PDF indexing: Using internal indexes (Page Piece Dictionary)” on\n\npage 173.\n\nConverted to\n\nDocument Resources\n\nOne PDF file with documents and resources\n\nMany separate PDF documents with resources removed in the .out file", - "page_start": 331, - "page_end": 331, - "source_file": "sg246915.pdf" - }, - { - "text": "To work with data conversion, understand the data conversions that are required, and when\n\nand how to convert the data. Perform detailed planning before you build your solution so that\n\nyou achieve a design that remains efficient for many years.\n\nIn this section, we describe why you might need data conversion, when to convert the data\n\nstream, and how to convert the data.\n\n#### **9.1.1 Why convert data streams**\n\nYou might want to convert data streams for many reasons:\n\n� Certain data streams, such as Hewlett-Packard (HP) Printer Command Language (PCL)\n\nor Xerox metacode, are printer-specific and cannot be displayed. Before you archive or\n\ndisplay the documents, these data streams must be transformed into a compatible format.\n\n� The archived data stream might need to comply with a company’s internal rules or\n\nregulations. Therefore, the produced data streams must be transformed into the defined\n\nand required final format before they are archived.\n\n� The documents might need to be accessible by a user that is outside of the company. The\n\ndocument must be displayed through standard tools that are available on any or at least\n\nmost of the clients, such as an Internet browser or Adobe Acrobat Reader.\n\n� The documents might need to be manipulated so that only part of the document is\n\ndisplayed in a personalized way.\n\n#### **9.1.2 When to convert data streams**\n\nThe decision of *when* to convert data streams relies mainly on the use of the system.\n\nTypically, converting data at load time requires more time to process the print stream file, and\n\nconverting data at retrieval time causes the user retrieval to be a little slower. The decision\n\nmight depend on how many documents are retrieved, compared to how many documents are\n\nloaded daily. It might also depend on legal requirements about the format of stored data.\n\n**AFP to PDF**\n\nIf a requirement exists to present AFP documents in the Portable Document Format (PDF)\n\nformat over the web, from a storage perspective, it is more efficient to store the documents in\n\ntheir native format and then convert them to PDF at retrieval time. AFP documents are stored\n\nmore efficiently than PDF documents.\n\nThe PDF print stream, when it is divided into separate customer statements, is larger than\n\nAFP because each statement contains its own set of structures that are required by the PDF\n\narchitecture to define a document.\n\nElapsed time and processor time are also essential factors in the decision-making process.\n\nThe amount of time (elapsed and CPU) that is needed to convert the document depends on\n\nhow large the document is and how many resources or fonts are associated with the\n\ndocument.", - "page_start": 231, - "page_end": 231, - "source_file": "sg246915.pdf" - }, - { - "text": "For example, when expiration processing starts on a specified server, you might see the\n\nfollowing message:\n\n“109 Cache Expiration (Date) (Min%) (Max%) (Server)”\n\nMigration processing uses the specified date (the default is “today” in internal format).\n\nExpiration processing begins on each cache file system that exceeds the Max% (default 80%)\n\nand ends when the free space that is available in the file system falls below the Min% (default\n\n80%).\n\nOne of these messages shows for each storage object that is deleted from cache storage. A\n\nstorage object is eligible to be deleted when its “Cache Document Data for *n* Days” or “Life of\n\nData” period passes (whichever occurs first).\n\nA storage deletion message looks similar to the following message:\n\n“196 Cache Migration (ApplGrp) (ObjName) (Server)”\n\nAlso, information-only messages report the percentage of space that is used in the file\n\nsystem.\n\nAn information message looks similar to the following message:\n\n“124 Filesystem Statistics (filesystem) (% full) (server)”\n\n**Load table (ARSLOAD)**\n\nThe ARSLOAD table can be used to track loads for expiration. This table maintains a record\n\nof all successful loads to application groups with the “expire by load” expiration type.\n\n#### **10.5.3 Removing documents from the Tivoli Storage Manager archive**\n\nRemoving a document from archive storage means that the backup (if the primary document\n\ncopy is in cache) or long-term copy (if the primary document copy is in archive) of the\n\ndocument is deleted from the system. You remove documents from archive storage when you\n\nno longer have a business or legal requirement to keep them.\n\nA *management class* contains an archive copy group that specifies the criteria that makes a\n\ndocument eligible for deletion. Documents become eligible for deletion under the following\n\nconditions:\n\n� Administrators delete documents from client nodes\n\n� An archived document exceeds the time criteria in the archive copy group (how long\n\narchived copies are kept)\n\nASM does not delete information about expired documents from its database until expiration\n\nprocessing runs. You can run expiration processing either automatically or manually by\n\ncommand. Ensure that expiration processing runs periodically to allow ASM to reuse storage\n\npool space that is occupied by expired documents.\n\nWhen expiration processing runs, ASM deletes documents from its database. The storage\n\nspace that these documents used to occupy then becomes reclaimable. For more\n\ninformation, see “Reclaiming space in storage pools” on page 233.\n\n**Note:** You see one set of messages for each object server on which you run the **ARSMAINT**\n\nprogram.", - "page_start": 255, - "page_end": 255, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 5. Storage management\n\n� Document: With this expiration type, a document at a time is deleted from the application\n\ngroup. Data that is stored in archive storage is deleted by the storage manager based on\n\nthe archive expiration date. Storing documents with an expiration type of Document\n\ncauses the expiration process to search through every document in the segment to\n\ndetermine whether the expiration date was reached, which results in long processing\n\ntimes.\n\nWhen the **arsmaint** expiration process is run, data is deleted only from the application group if\n\nthe upper threshold for the size of the cache storage is reached. By default, the cache\n\nthreshold is 80%. A lower threshold can be forced by the expiration command parameters.\n\nUnless a reason exists to clear cache, leaving data in cache improves retrieval performance.\n\n#### **5.2.6 Advanced application group storage management**\n\nBy using the advanced storage management settings (Figure 5-11), you can adjust the size of\n\nthe load object and determine when report data, indexes, and resources are migrated to\n\narchive storage.\n\n*Figure 5-11 Advanced application group storage management*\n\n**Object Size**\n\nThe Object Size parameter determines the size of a storage object in kilobytes (KB). Content\n\nManager OnDemand, by default, segments and compresses stored data into 10 MB storage\n\nobjects. The default of 10 MB is the most commonly used object size value.\n\n**Important:** Be careful when you change the value for Object Size. Setting the value too\n\nsmall or too large can adversely affect load performance. However, increasing this value\n\nmight be necessary if you load large files and run out of Object IDs during the loading\n\nprocess.\n\n**Note:** The object size that is defined here must be equal to or larger than the size of the\n\ncompressed storage objects that are defined in any application that is assigned to the\n\napplication group.", - "page_start": 126, - "page_end": 126, - "source_file": "sg246915.pdf" - }, - { - "text": "**90** IBM Content Manager OnDemand Guide\n\n### **5.1 Content Manager OnDemand cache storage**\n\nContent Manager OnDemand has a built-in cache storage management that is used to store\n\ndocuments on locally mounted disk subsystems. These subsystems can be network-attached\n\nstorage (NAS), storage area networks (SAN), or any type of locally addressable disk that is\n\navailable to the supported operating system. The cache storage manager uses a list of\n\ndirectories or file systems that are available to determine where space is available for storing\n\nand maintaining documents.\n\nEach Content Manager OnDemand object server in the system has a defined set of cache\n\nstorage devices on which you can maintain the report data for a period to provide the fastest\n\naccess times for system users.\n\nCertain implementations of Content Manager OnDemand use an all cache system to\n\nmaintain data for its full retention. Other implementations store to both cache and archive\n\nstorage. Other implementations store only to the archive.\n\nYou can configure Content Manager OnDemand so that at load time one of the following\n\nmethods of data storage occurs:\n\n� Data is stored in cache and later is automatically migrated from the cache subsystem to\n\nan archive system.\n\n� Data is stored to both local cache and archive storage.\n\n� Data is stored directly to archive storage.\n\nThese options are described in the following sections.\n\n### **5.2 IBM Tivoli Storage Manager for Multiplatforms**\n\nContent Manager OnDemand for Multiplatforms integrates with Tivoli Storage Manager and a\n\nlicense for this usage is included with Content Manager OnDemand. Within Tivoli Storage\n\nManager, documents can be archived on various media, such as disk, optical, tape, and\n\ncontent-addressable storage (CAS) devices. These archive storage devices must be defined\n\nto the Tivoli Storage Manager system. Content Manager OnDemand uses the archive\n\napplication programming interface (API) that is provided by Tivoli Storage Manager to store\n\nand retrieve documents.\n\nTo store application group data to the Tivoli Storage Manager ASM, the application group\n\nmust be configured within Content Manager OnDemand to a defined storage set. This\n\nstorage set contains a storage node that is defined within Tivoli Storage Manager and points\n\nto a specific storage area or media.\n\nWith the application group definition, you can specify whether and when the data is migrated\n\nto archive storage. For example, you can specify that the data will be migrated to archive\n\nstorage when the document is originally loaded into the system, or that the data migration\n\noccurs the next time that the migration maintenance process is run, or that the data migration\n\noccurs after a certain number of days pass from the date that the data was loaded; or never.", - "page_start": 113, - "page_end": 113, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 7. Indexing and loading\n\nConsider the following information about Table 7-1 on page 164:\n\n� The Generic indexer requires the user to manually create an index file in the generic index\n\nformat before the user starts the load process. The Generic indexer allows the capture of\n\ndocuments, index values, and resources that are identified to it. These documents, index\n\nvalues, and resources are then loaded into the Content Manager OnDemand archive and\n\nstored in the same manner as though they were loaded through any of the other indexers.\n\nAn existing resource file can be loaded with a generic index file.\n\nFor more information about the generic index format, see *IBM Content Manager*\n\n*OnDemand - Indexing Reference,* SC19-3354.\n\n� The ACIF, PDF, XML, and OS/400 indexers all generate intermediate files. These files are\n\nthen used to load the indexes and data into the Content Management OnDemand system.\n\n� The OS/390 indexer creates the index data while it loads the indexes and data into the\n\nContent Management OnDemand system.\n\n� *Conversion* refers to a conversion by the indexer. Other products integrate with Content\n\nManager OnDemand that also convert data.\n\n� Because of the architecture of PDF documents, large object support for PDF documents is\n\nnot possible.\n\n� Starting with V9.5, the PDF Indexer runs in the PASE environment on IBM i. PASE is a\n\nprerequisite on IBM i for V9.5.\n\n� Starting with V9.5, the PDF Indexer is no longer supported on z/OS.\n\n### **7.2 Getting started with PDF indexing**\n\nPDF is a standard that is specified by Adobe Systems, Incorporated, for the electronic\n\ndistribution of documents. PDF files are compact. They can be distributed globally through\n\nemail, the web, intranets, or CD-ROM, and viewed with Adobe Reader.\n\nPDF is a data type or file format that is platform (hardware, operating system)-independent. A\n\nPDF file contains a complete PDF document that is composed of text, graphics, and the\n\nresources that are referenced by that document.\n\nTwo PDF file layouts are possible:\n\n� Non-Linear (not “optimized”)\n\nThis file layout is optimized for space savings. Storing a PDF file by using a Non-Linear\n\nlayout consumes less disk space than storing the same PDF file linearly. It is slower to\n\naccess or display this type of layout because portions of the data that is required to\n\nassemble pages of the document are scattered throughout the PDF file, so the whole PDF\n\nfile must be downloaded and accessed before the file can be displayed.\n\n� Linear (“optimized” or “web optimized”)\n\nIn this file format, the PDF file is created in a linear (in page order) fashion. This file format\n\nallows the PDF viewer to start displaying the PDF document pages when they are\n\ndownloading without waiting for the whole PDF file to be downloaded.", - "page_start": 188, - "page_end": 188, - "source_file": "sg246915.pdf" - }, - { - "text": "## **Word PDF Accessibility**\n\nArticle - 11/26/2024\n\nAuthors can ensure that their Word documents are accessible to people with disabilities\n\neven when distributing them in PDF format using the following approach:\n\n1. First, they should follow the practices in [Make your Word documents accessible to](https://support.microsoft.com/office/d9bf3683-87ac-47ea-b91a-78dcacb3c66d)\n\n[people with disabilities](https://support.microsoft.com/office/d9bf3683-87ac-47ea-b91a-78dcacb3c66d) .\n\n2. Next, they should follow the steps in [Create accessible PDFs](https://support.microsoft.com/office/064625e0-56ea-4e16-ad71-3aa33bb4b7ed) to preserve the\n\naccessibility of the document in PDF format.\n\nThis article provides details about the information Word includes in the PDF to make it\n\naccessible.\n\n1. [PDF/UA](https://www.iso.org/standard/64599.html) tags are included to provide semantic information about the content in\n\nthe document.\n\n2. Decorative content does not need to be read, so it is marked as <Artifact> in the\n\nContent Tree in the PDF and no PDF/UA tags are included.\n\n3. Bookmarks for each section and slide are included to make it easier to navigate the\n\ncontent.\n\n| Type of content Tags |\n|:---|\n| Document <Document> |\n| Title <Title> |\n| H1, H2, etc. <H1>, <H2>, etc. |\n\n**Summary**\n\n**PDF/UA Tags**\n\nノ **Expand table**", - "page_start": 55, - "page_end": 55, - "source_file": "office-pdf.pdf" - }, - { - "text": "## Chapter 10. Migration and expiring data and indexes\n\nThe *object size* is defined by clicking **Advanced** on the Storage Manager tab of the\n\nApplication Group window. The object size is the size of a storage object in kilobytes (KB). By\n\ndefault, Content Manager OnDemand segments and compresses report data into 10 MB\n\nstorage objects. For most use cases, the default value is appropriate. Valid values are\n\n1 KB - 150 MB.\n\nThe storage objects are stored in *storage sets* . The storage sets contain one or more primary\n\n*storage nodes* . The storage node points to the location where the data is stored, which can be\n\ncache, the storage manager (Tivoli Storage Manager, object access method (OAM), or\n\nArchive Storage Manager (ASM)), or a combination.\n\nThe primary storage nodes can be on one or more object servers. When the Load Type is\n\nLocal , Content Manager OnDemand loads data on the server on which the data loading\n\nprogram runs in the primary storage node with the Load Data property specified. If the Load\n\nType is Local , and the storage set contains primary nodes on different object servers, you\n\nmust select the **Load Data** check box for one primary node on each object server.\n\nThe storage set must support the number of days that you plan to maintain reports in the\n\napplication group. For example, if you must maintain reports in archive storage for seven\n\nyears, the storage set must identify a storage node (or migration policy on an IBM i server)\n\nthat is maintained by ASM for seven years.\n\nA detailed description of adding storage sets and storage nodes is in Chapter 5, “Storage\n\nmanagement” on page 89 and the related *OnDemand Administrative Guide.*\n\n#### **10.2.1 Storing the report (document) data**\n\nTo improve efficiency and scalability, stored documents are embedded within storage objects.\n\nThe storage objects are then stored in cache or a storage manager (OAM, Tivoli Storage\n\nManager, or ASM). The storage objects are eventually expired from the system based on\n\nvalues that are defined by the Content Manager OnDemand administrator. In this section, we\n\ndescribe each scenario and how it is implemented. The parameters that are described in this\n\nsection are on the Storage Manager tab of the Application Group window unless otherwise\n\nspecified.\n\nThree sets of data are stored when you load a report:\n\n� Index data, which is extracted by the indexing program and used by the search process\n\n� Resources, such as an overlay and fonts, which are used to customize the viewed data\n\n� Documents (or report segments) that will be viewed\n\nFigure 10-2 on page 222 shows the datasets and illustrates four scenarios of their storage\n\nand expiration.\n\n**Object size value:** Exercise caution when you change the object size value. Specifying\n\ntoo large or too small a value can adversely affect performance when you load data.", - "page_start": 244, - "page_end": 244, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 10. Advanced features for storage efficiency **429**\n\n*Figure 10-17 Selecting capacity setting*\n\nAfter the copies are fully synchronized, the original volume copy is deleted automatically.\n\nAs a result, compressed data is on the volume. This process is nondisruptive, so the data\n\nremains online and accessible by applications and users.\n\nThis capability enables clients to regain space from the storage pool, which can then be\n\nreused for other applications.\n\nWith the virtualization of external storage systems, the ability to compress stored data\n\nsignificantly enhances and accelerates the benefit to users. This capability enables them to\n\nsee a tremendous return on their Storwize V7000 investment.\n\nOn the initial purchase of an Storwize V7000 with Real-time Compression, clients can defer\n\ntheir purchase of new storage. When storage is needed, IT purchases a lower amount of the\n\nrequired storage before compression.\n\nFor more information about volume migration for compressed volumes on standard pools to\n\nDRPs, see “Migrating to and from DRP” on page 425.\n\n### **10.6 Saving estimation for compression and deduplication**\n\nThis section provides information about the tools that are used for sizing the environment for\n\ncompression and deduplication.\n\n#### **10.6.1 Evaluate compression savings by using IBM Comprestimator**\n\nIBM Comprestimator is an integrated GUI and CLI host-based utility that estimates the space\n\nsavings that are achieved when compressed volumes are used for block devices. This utility\n\nprovides a quick and easy view of showing the benefits of the use of compression. The utility\n\nperforms read-only operations and therefore, does not affect the data that is being stored on\n\ndevice.\n\nIf the compression savings prove to be beneficial in your environment, volume mirroring can\n\nbe used to convert volumes to compressed volumes in the data reduction pools.", - "page_start": 450, - "page_end": 450, - "source_file": "sg247938.pdf" - }, - { - "text": "**Application Group Identifier and the Application Group ID**\n\nThe Application Group Identifier and the Application Group ID (AGID) are unique identifiers\n\nthat are used by Content Manager OnDemand to identify the application group in system\n\ntables.\n\n**Migrate Data from Cache**\n\nThe Migrate Data from Cache value determines when documents and resources are migrated\n\nto archive storage. A storage set that is associated with a Tivoli Storage Manager client node\n\nmust be selected to enable migration to archive storage.\n\nThe following values are valid:\n\n� No: Data is never migrated from cache. This option is unavailable when a storage set that\n\nis associated with a Tivoli Storage Manager client node is selected for the application\n\ngroup.\n\n� When data is loaded: Data is migrated to archive storage when the data is loaded into the\n\napplication group.\n\n� Next cache migration: Data is migrated to archive storage the next time that **ARSMAINT** is\n\nrun with the **-m** option. The **-m** option indicates that data and resources are copied from\n\ncache to archive storage.\n\n� After __ days in cache: This value specifies the number of days that data remains in cache\n\nstorage. After the prescribed number of days in cache storage are reached, the data is\n\ncopied to archive storage the next time that **ARSMAINT** is run with the **-m** option for data\n\nmigration.\n\n#### **5.2.7 IBM System Storage Archive Manager**\n\nCertain regulations require data to be stored in devices that are read only. In the past,\n\nphysical storage devices, such as tapes and optical disks that are Write Once Read Many\n\n(WORM), were used.\n\nWORM disks, such as the NetApp SnapLock or EMC Centera, can be used to store data in\n\nthe same manner as WORM tapes or optical platters. IBM System Storage Archive Manager\n\nallows critical data to be retained for a mandated period without the possibility of being\n\nrewritten or erased.\n\nIn this section, we describe System Storage Archive Manager and how Content Manager\n\nOnDemand can be configured to use this subsystem to support these WORM disk devices.\n\nFor more information about the Tivoli Storage Manager support of WORM disk devices, such\n\nas NetApp SnapLock, or EMC Centera, see the following IBM Knowledge Center documents:\n\n� *Tivoli Storage Manager for AIX Administrator’s Guide*\n\n� *Tivoli Storage Manager for Windows Administrator’s Guide*\n\nYou can obtain these documents from the IBM Tivoli Storage Manager Knowledge Center at\n\nthe following web address:\n\n[http://www.ibm.com/support/knowledgecenter/SSGSG7/welcome?lang=en:](http://www.ibm.com/support/knowledgecenter/SSGSG7/welcome?lang=en:)\n\n**Note:** Verify support for any particular device on a particular platform through the Tivoli\n\nStorage Manager Device support matrix before you plan your implementation.", - "page_start": 127, - "page_end": 127, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200438_en.pdf", - "query": "Where can I consult a summary of the impact of the International tax compliance regulations ?", - "target_page": 3, - "target_passage": "A Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- uks-automatic-exchange-of-information-agreements", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational\n\nneeds and disability in order to provide exceptions to time limits set out in that legislation where\n\nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus.\n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review\n\nthe effectiveness of the Regulations during the period in which they have effect. The Regulations\n\ncease to have effect on 25th September 2020.\n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the\n\nSEND Regulations 2014’).\n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain\n\nrequirements in those Regulations for actions to be taken within specified time limits where it is\n\nnot reasonably practicable for a person to meet those requirements for a reason relating to the\n\nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a\n\nrequirement for such action to be taken as soon as reasonably practicable.\n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits.\n\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014\n\n(‘the Personal Budgets Regulations 2014’).\n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as\n\nregulation 5 does in respect of the SEND Regulations 2014.\n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons)\n\nRegulations 2015 (‘the Detained Persons Regulations 2015’).\n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to\n\nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal\n\nBudgets Regulations 2014 respectively.\n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax\n\ntime limits.\n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal\n\nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’).\n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to\n\nthose in regulations 5, 17 and 20.\n\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency\n\nmeasure and no significant impact on business, charities or voluntary bodies is foreseen.\n\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk.\n\n© Crown copyright 2020\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be\n\nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments.\n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts\n\nwhich were previously excluded accounts.\n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015\n\nwas published on 18th March 2015 and is available on the HMRC website at\n\nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the-\n\nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the\n\nimpacts that apply to this instrument.\n\n© Crown copyright 2020\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "(3) In regulation 4ZA—\n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel\n\nand Operator Liability) (England) Regulations 2021”;\n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus,\n\nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute\n\n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator\n\nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability\n\nRegulations”)”;\n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations”\n\nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator\n\nLiability Regulations”;\n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph\n\n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”.\n\n**2.** —(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations\n\n2020( **a** ) are amended as follows.\n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International\n\nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection\n\n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”.\n\n(3) In regulation 6(1)—\n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating\n\nworker”, for “regulation 4” substitute “regulation 9”;\n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health\n\nProtection (Coronavirus, International Travel and Operator Liability) (England)\n\nRegulations 2021”.\n\nSCHEDULE 16 Regulation 26(3)\n\n#### Transitional provision\n\n**1.** Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to\n\nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations\n\n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information\n\nprovided for the purposes of these Regulations where the person arrives in England on or after that\n\ndate.\n\n**2.** Confirmation given by the Foreign, Commonwealth and Development Office that a person is\n\nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that\n\nthe person is not required to comply with regulation 6 of these Regulations where the person\n\narrives in England on or after 4.00 a.m. on 17th May 2021.\n\n**3.** A designation by the Secretary of State of a person as an authorised person under regulation\n\n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person\n\nunder of regulation 11(11)(c) of these Regulations.\n\n**4.** Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who\n\nexercises the powers in that regulation in relation to a person who arrived in England before 4.00\n\na.m. on 17th May 2021.\n\n( **a** ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "regulations or implement responsible business, social, environmental and supply chain practices, we could be subject to damage to our\n\nreputation, class action lawsuits, legal and settlement costs, civil and criminal liability, increased cost of regulatory compliance, restatements\n\nof our financial statements, disruption of our business and loss of customers. Any required changes to our employment practices could result\n\nin the loss of employees, reduced sales, increased employment costs, low employee morale and harm to our business and results of\n\noperations. In addition, political and economic factors could lead to unfavorable changes in federal, state and foreign tax laws, which may\n\nincrease our tax liabilities. An increase in our tax liabilities could adversely affect our results of operations. We are also regularly involved in\n\nvarious litigation matters that arise in the ordinary course of business. Litigation or regulatory developments could adversely affect our\n\nbusiness and financial condition.\n\n**We continue to face uncertainties due to financial services industry regulation and supervision that could have an adverse affect**\n\n####### **on our operations.**\n\nFederal and state regulation and supervision of the financial industry has increased in recent years due to implementation of consumer\n\nprotection and financial reform legislation such as the Credit Card Accountability Responsibility and Disclosure Act of 2009 (“CARD Act”) and\n\nthe Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (“Financial Reform Act”). The Financial Reform Act significantly\n\nrestructured regulatory oversight and other aspects of the financial industry, created the Consumer Financial Protection Bureau (“CFPB”) to\n\nsupervise and enforce consumer lending laws and regulations, and expanded state authority over consumer lending. The CARD Act included\n\nnew and revised rules and restrictions on credit card pricing, finance charges and fees, customer billing practices and payment application.\n\nWe anticipate more regulation and interpretations of the new rules to continue, and, depending on the nature and extent of these new\n\nregulations and interpretations, we may be required to make changes to our credit card practices and systems, which could adversely impact\n\nthe revenues and profitability of our Credit segment. In addition, we operate in a regulated environment where financial supervisory agencies\n\nprovide oversight over our activities. Compliance with applicable laws and regulations could limit or restrict our activities and the conduct of\n\nour business and enforcement actions by those agencies for failure to comply could have an adverse impact on us.", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**18.** Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the\n\n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these\n\nRegulations.\n\n###### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus,\n\nPublic Health Information for International Passengers) (England) Regulations 2020 and the\n\nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England)\n\n(Amendment) Regulations 2021.\n\nThey impose requirements on certain categories of person to provide information upon arrival in\n\nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the\n\nspread of infection or contamination from coronavirus or coronavirus disease. They also impose\n\nobligations on operators to ensure that passengers receive information and comply with the\n\nrequirements.\n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum\n\nhas been published alongside this instrument at www.legislation.gov.uk.\n\n© Crown copyright 2021\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "on or after January 1, 2013. In November 2013, Chapter 6 of IFRS 9 on hedge accounting was published. At the same time, Chapter 7,\n\ncontaining the effective date and transition provisions was amended to remove the mandatory effective date of IFRS 9. This was intended\n\nto provide sufficient time for preparers to make the transition to the new requirements. The Company may still choose to apply IFRS\n\nimmediately, but is not required to do so. In subsequent phases, the IASB is addressing impairment of financial assets. The adoption of the\n\nfirst phase of IFRS will have an effect on the classification and measurement of the Company’s financial assets, but will not have an impact\n\non the classification measurements of financial liabilities. The Company is in the process of assessing the impact IFRS 9 may have on future\n\nfinancial statements.\n\nIFRIC Interpretation 21 ‑ Levies (“IFRIC 21”)\n\nIFRIC 21 clarifies that an entity recognises a liability for a levy when the activity that triggers payment, as identified by the relevant\n\nlegislation, occurs. IFRIC 21 is effective for annual periods beginning on or after January 1, 2014. The Company is in the process of assessing\n\nthe impact IFRIC 21 may have on future financial statements.", - "page_start": 76, - "page_end": 76, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S\n\n## **2020 No. 438**\n\n## **TAXES**\n\n## The International Tax Compliance (Amendment) Regulations\n\n## 2020\n\n*Made* *-* *-* *-* *-* *20th April 2020*\n\n*Laid before the House of Commons* *21st April 2020*\n\n*Coming into force* *-* *-* *13th May 2020*\n\nThe Treasury make these Regulations in exercise of the powers conferred by section 222 of the\n\nFinance Act 2013( **a** ):\n\n### **Citation and commencement**\n\n**1.** These Regulations may be cited as the International Tax Compliance (Amendment)\n\nRegulations 2020 and come into force on 13th May 2020.\n\n### **Amendments to the International Tax Compliance Regulations 2015**\n\n**2.** —(1) The International Tax Compliance Regulations 2015( **b** ) are amended as follows.\n\n(2) In regulation 1(3)(b)(i), for “16th May 2019” substitute “19th April 2020”( **c** ).\n\n(3) In regulation 3(4A)(a), at the beginning insert “subject to regulation 24(3)”.\n\n(4) In regulation 24—\n\n(a) in the table in paragraph (2), in the column headed “the CRS”—\n\n(i) at the beginning of the entry for “new account” insert “subject to paragraph (3)”, and\n\n(ii) at the beginning of the entry for “pre-existing account” insert “subject to regulation\n\n3(4A)(a) and paragraph (3)”, and\n\n(b) after paragraph (2) insert—\n\n“(3) In respect of the accounts listed in paragraph (4)—\n\n( **a** ) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not\n\nrelevant to these Regulations.\n\n( **b** ) S.I. 2015/878 (referred to in these footnotes as “the principal Regulations”); relevant amending instruments are S.I.\n\n2017/598, 2018/490 and 2019/881.\n\n( **c** ) In accordance with the common reporting standard for automatic exchange of financial account information developed by\n\nthe Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom\n\nexchanges information received from financial institutions under the principal Regulations with a territory which is a\n\n“Reportable Jurisdiction” under the CRS and with which the United Kingdom has entered into international exchange\n\narrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrc-\n\ninternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at\n\nthe offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**Future Accounting Policy Changes**\n\nIFRS 9 ‑ Financial Instruments (“IFRS 9”)\n\nIFRS 9, as issued in 2010, reflects the first phase of the IASB’s work on the replacement of IAS 39 and applies to classification and measurement\n\nof financial assets and financial liabilities as defined in IAS 39. The standard was initially effective for annual periods beginning on or after January\n\n1, 2013. In November 2013, Chapter 6 of IFRS 9 on hedge accounting was published. At the same time, Chapter 7, containing the effective date\n\nand transition provisions, was amended to remove the mandatory effective date of IFRS 9. This was intended to provide sufficient time for\n\npreparers to make the transition to the new requirements. The Company may still choose to apply IFRS immediately, but is not required to do so.\n\nIn subsequent phases, the IASB is addressing impairment of financial assets. The adoption of the first phase of IFRS will have an effect on the\n\nclassification and measurement of the Company’s financial assets, but will not have an impact on the classification measurements of financial\n\nliabilities. The Company is in the process of assessing the impact IFRS 9 may have on future financial statements.\n\nIFRIC Interpretation 21 ‑ Levies (“IFRIC 21”)\n\nIFRIC 21 clarifies that an entity recognises a liability for a levy when the activity that triggers payment, as identified by the relevant legislation,\n\noccurs. IFRIC 21 is effective for annual periods beginning on or after January 1, 2014. The Company is in the process of assessing the impact IFRIC\n\n21 may have on future financial statements.\n\n**Disclosure Controls and Procedures and Internal Controls**\n\nThe Company’s management, including the Chief Executive Officer and the Chief Financial Officer, does not expect that the Company’s Disclosure\n\nControls and Procedures and Internal Controls will prevent or detect all error and all fraud. Because of the inherent limitations in all control\n\nsystems, an evaluation of controls can provide only reasonable, not absolute, assurance that all control issues and instances of fraud or error, if\n\nany, within the Company have been detected.\n\n*Disclosure Controls and Procedures*\n\nAs of December 31, 2013, the Company’s management evaluated the effectiveness of the operation of its disclosure controls and procedures\n\n(“Disclosure Controls”), as defined under rules adopted by the Canadian Securities Administrators. This evaluation was performed under the\n\nsupervision of, and with the participation of, the Chief Executive Officer and the Chief Financial Officer.\n\nDisclosure controls and procedures are designed to ensure that information required to be disclosed in documents filed with securities\n\nregulatory authorities is recorded, processed, summarized and reported on a timely basis, and is accumulated and communicated to the\n\nCompany’s management, including the Chief Executive Officer and the Chief Financial Officer, as appropriate, to allow timely decisions regarding\n\nrequired disclosure.\n\nBased on the evaluation of Disclosure Controls, the Chief Executive Officer and the Chief Financial Officer have concluded that, subject to the\n\ninherent limitations noted above, the Company’s Disclosure Controls are effective in ensuring that material information relating to the Company\n\nand its consolidated subsidiaries is made known to the Company’s management on a timely basis by others within those entities, and is included\n\nas appropriate in this MD&A.\n\n*Internal Controls over Financial Reportin* g\n\nInternal controls over financial reporting (“ICFR”) are designed to provide reasonable assurance regarding the reliability of the Company’s\n\nfinancial reporting and its preparation of financial statements for external purposes in accordance with IFRS. Management’s documentation and", - "page_start": 62, - "page_end": 62, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "notices from governmental authorities that have resulted in the need to expend funds for remedial work and\n\nrelated activities at various landÑlls and other facilities. There is no assurance that citations and notices will\n\nnot be issued in the future despite our regulatory compliance eÅorts. We have established remediation reserves\n\nthat we believe, based on currently available information, will be adequate to cover our current estimates of\n\nregulatory costs. However, we cannot assure you that actual costs will not exceed our reserves.\n\n*Federal Regulation.* The following summarizes the primary environmental, public and occupational\n\nhealth and safety-related statutes of the United States that aÅect our facilities and operations:\n\n(1) *The Solid Waste Disposal Act, as amended, including the Resource Conservation and Recovery*\n\n*Act.* RCRA and its implementing regulations establish a framework for regulating the handling,\n\n9", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**ASX Principle Reference Compliance**\n\nPrinciple 5: Make timely and balanced disclosure\n\n5.1 Establish written policies and procedures designed to ensure 11 Comply\n\ncompliance with ASX Listing Rules disclosure requirements and to\n\nensure accountability at a senior management level for that compliance.\n\nPrinciple 6: Respect the rights of shareholders\n\n6.1 Design and disclose a communications strategy to promote effective 11 Comply\n\ncommunication with shareholders and encourage effective participation\n\nat general meetings.\n\n6.2 Request the external auditor to attend the annual general meeting 11 Comply\n\nand be available to answer shareholder questions about the conduct\n\nof the audit and the preparation and content of the auditor’s report.\n\nPrinciple 7: Recognise and manage risk\n\n7.1 The Board or appropriate Board Committee should establish policies 8 Comply\n\non risk oversight and management.\n\n7.2 The chief executive officer (or equivalent) and the chief financial officer Comply\n\n(or equivalent) should state to the board in writing that:\n\n7.2.1 the statement given in accordance with best practice 6; 8\n\nrecommendations 4.1 (the integrity of financial statements) is founded\n\non a sound system of risk management and internal compliance and\n\ncontrol which implements the policies adopted by the Board; and\n\n7.2.2 the Company’s risk management and internal compliance 6; 8\n\nand control system is operating efficiently and effectively\n\nin all material respects.\n\n7.3 Provide the information indicated in Guide to reporting on Principle 7. 8; Annual Report pages 32 and 33. Comply\n\nPrinciple 8: Encourage enhanced performance\n\n8.1 Disclose the process for performance evaluation of the Board, 3; 5; Annual Report page 31. Comply\n\nits Committees and individual Directors, and key executives.\n\nPrinciple 9: Remunerate fairly and responsibly\n\n9.1 Provide disclosure in relation to the Company’s remuneration policies 5 Comply\n\nto enable investors to understand (i) the costs and benefits of those\n\npolicies, and (ii) the link between remuneration paid to Directors\n\nand key executives and corporate performance.\n\n9.2 The Board should establish a Remuneration Committee. 2.2; 5 Comply\n\n9.3 Clearly distinguish the structure of non-executive Directors’ 5 Comply\n\nremuneration from that of executives.\n\n9.4 Ensure that payment of equity-based executive remuneration 5 Comply\n\nis made in accordance with thresholds set in plans\n\napproved by shareholders.\n\n9.5 Provide the information indicated in Guide to reporting on Principle 9. 5; Annual Report pages 31 and 37 Comply\n\nto 40; Directors’ Statutory Report\n\nItems 1 and 9 on pages 47 and 49;\n\nNotes 18 and 26 to the Financial Statements.\n\nPrinciple 10: Recognise the legitimate interests of stakeholders\n\n10.1 Establish and disclose a code of conduct to guide compliance with 9 Comply\n\nlegal and other obligations.", - "page_start": 37, - "page_end": 37, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed12.pdf", - "query": "What was the muscle volume of the knee flexors of the 2024 word's strongest man ?", - "target_page": 7, - "target_passage": "Knee flexors 3,060 ", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "predictions of skeletal muscle mass nor dual-energy X-ray\n\nabsorptiometry provides detailed information on the size of\n\nspeci fi c individual muscles. Given the known importance of\n\nmuscle size as a determinant of muscular strength ( 9 - 11 ), pro-\n\nnounced muscle size seems likely to be critical to extreme\n\nhuman strength; however, the speci fi c muscle size of\n\nextremely strong individuals remains unknown. Similarly, a\n\nlarge moment arm (e.g., of the patella tendon at the knee joint)\n\ncould contribute to the expression of high muscular strength\n\n( 10 , 12 ), and a large tendon may mitigate the mechanical stress\n\nit experiences with very high muscular loads, and therefore,\n\nthese characteristics may also be expected in individuals\n\nselected for exceptional strength.\n\nIn this paper, we present the fi ndings from a unique op-\n\nportunity to examine the laboratory function, muscle size,\n\nand distribution of muscle mass, as well as patellar tendon\n\nsize and moment arm, of a World ’ s Strongest Man and dead-\n\nlift champion (WSM) in comparison with existing data on\n\nuntrained individuals, power athletes (100-m-track sprint-\n\ners), and long-term resistance-trained populations that we\n\nhave assessed previously ( 10 , 11 , 13 - 15 ).\n\n#### MATERIALS AND METHODS\n\n##### Participant\n\nThe WSM ’ s achievements included one World ’ s Strongest\n\nMan title (14 mo prior to measurement), fi ve Britain ’ s\n\nStrongest Man titles (the most recent 6 mo prior to measure-\n\nment), twice being World Deadlift Champion and Deadlift\n\nWorld Record holder (500 kg; at the time of measurement),\n\nand second place at Europe ’ s Strongest Man. Prior to agreeing\n\nto participate, the purpose of the research study and the test-\n\ning procedures were explained to the participant along with\n\nthe risks and bene fi ts of taking part. The participant gave his\n\nwritten informed consent to participate in the study that was\n\napproved by the Loughborough University Ethical Advisory\n\nCommittee (Ethics Number R18-P090). Included in the writ-\n\nten consent was a statement providing permission for publi-\n\ncation of the collected data and the likelihood that their\n\nidentity may be evident based on their achievements and\n\ncharacteristics, despite anonymization.\n\n##### Training History\n\nThe WSM had been continuously involved in systematic,\n\nregular upper- and lower-body resistance training for 15 yr at\n\nthe time of testing. In the 12 mo prior to testing, the partici-\n\npant ’ s resistance training consisted of the following typical\n\nexercises: lower body: squats, deadlifts, leg press, and knee\n\nextension; and upper body: bench press, shoulder press,\n\ndumbbell/barbell rows, and lat pull-down. The proportion of\n\nthe participant ’ s training within the following repetition\n\nranges over the last 12 mo was as follows: near maximum\n\nloads [1 - 5 repetition maximum (RM)]: 10%; heavy loads (6 -\n\n14 RM): 80%; and moderate loads ( � 15 RM): 10%. The partici- pant reported only occasional ( < 1 � /week) use of advanced resistance training practices (i.e., complex training and ac-\n\ncommodating resistance method) but frequently ( > 3 � / week) executed training repetitions with the intention to\n\nmove the load as fast as possible. The WSM ’ s nutritional\n\nsupplement consumption included protein, branched-chain\n\namino acids, and electrolytes.\n\n##### Overview\n\nThe WSM reported for a single test session that involved\n\nthe following assessments (listed in order): axial T1 weighted\n\n3.0-T MRI scans from T12 to the lateral malleolus [to assess\n\nmuscle size throughout the lower body (left and right sides)],\n\naxial and sagittal T1-weighted MRI scans of both knees [to\n\nassess patellar tendon cross-sectional area (CSA) and patellar\n\ntendon moment arm], maximum countermovement jumps\n\n(CMJ), and maximum isometric midthigh pulls (IMTPs). The\n\nmuscle size, patellar tendon CSA, and patellar tendon\n\nmoment arm of the WSM were compared with various popu-\n\nlations measured within our laboratory, as indicated in", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "by Bybon and Eumastus, respectively ( 1 ). Over the centuries,\n\nmany types of strength competitions have existed; some of\n\nwhich have been codi fi ed and endured within modern sport-\n\ning competitions (e.g., weightlifting, powerlifting, and shot\n\nput). In addition, professional strongman competitions, such\n\nas the annually contested “ World ’ s Strongest Man ” event,\n\ngenerate extensive global interest ( 2 ). Moreover, scienti fi c\n\nunderstanding of muscular strength is important because of\n\nits role in athletic performance ( 3 ), injury prevention ( 4 ), and\n\nhealthy aging ( 5 ). However, our knowledge of extreme human\n\nstrength is limited.\n\nTo date, there is little scienti fi c information on the charac-\n\nteristics of extremely strong humans in terms of laboratory-\n\nbased tests of strength and power, particularly the size and dis-\n\ntribution of their muscle mass, as well as tendon size and joint\n\nmechanics (moment arm). Kraemer et al. ( 6 ) examined the\n\nbody composition of elite strongman competitors using dual-\n\nenergy X-ray absorptiometry scanning and found that they\n\nhad a body mass (153±19 kg) and lean mass (118±12 kg)\n\napproximately twice that of an average untrained healthy\n\nyoung man. Whole body skeletal muscle mass of athletes from\n\nstrength- and power-based sports has also been estimated\n\nusing ultrasound measurements at a limited number of ana-\n\ntomical locations ( 7 , 8 ). However, neither ultrasound-derived\n\n[Correspondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk).](mailto:t.g.balshaw@lboro.ac.uk)\n\nSubmitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024\n\n[www.jappl.org](http://www.jappl.org) 8750-7587/24 Copyright © 2024 The Authors. Licensed under [ Creative Commons Attribution CC-BY 4.0](http://creativecommons.org/licenses/by/4.0/deed.en_US) .\n\nPublished by the American Physiological Society.\n\n789\n\nJ Appl Physiol 137: 789 - 799, 2024.\n\nFirst published August 15, 2024; doi: [10.1152/japplphysiol.00342.2024](https://doi.org/10.1152/japplphysiol.00342.2024)", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed12.pdf" - }, - { - "text": "changes in response to functional overload/resistance\n\ntraining. For example, we previously found patellar ten-\n\ndon CSA to show very subtle changes after 15 wk (45 train-\n\ning sessions) of heavy resistance training [ þ 1.4% ( 41 )] and no differences between long-term resistance-trained indi-\n\nviduals and untrained controls ( 15 ).\n\n##### Limitations\n\nAlthough the current investigation provides a detailed\n\nassessment of an individual at/toward the upper limit of\n\nhuman strength performance, it is important to appreciate\n\nstudy limitations. First, the participant was not measured im-\n\nmediately before their World ’ s Strongest Man championship\n\nsuccess or other landmark performances, and it is entirely pos-\n\nsible the functional and structural characteristics we assessed\n\nmay have been even higher directly prior to peak performan-\n\nces. Despite using a wide-bore MRI scanner, due to the size of\n\nthe WSM ’ s shoulders and arms, it was not possible to scan their\n\nupper body. Thus, we were not able to investigate this aspect of\n\nthe WSM ’ s muscle morphology; although given that greater hy-\n\npertrophy occurs in the upper body compared with the lower\n\nbody ( 42 ), it is possible that the WSM ’ s upper-body muscle size\n\nrelative to untrained controls may have been even more pro-\n\nnounced than what we have documented for the lower body.\n\nIn the current study to provide the most representative data on\n\nuntrained control participants, the largest available untrained\n\ncontrol populations were used for each category of measure-\n\nments. Thus, different untrained control populations were\n\nused [e.g., comparison of quadricep and hamstring size ( n ¼ 102) vs. comparison of all the leg muscles ( n ¼ 11)], which led to some subtle discrepancies in the contrasts between these\n\ngroups and the WSM [e.g., quadriceps femoris/knee extensors,\n\nþ 127% and þ 99% relative to our large pooled ( n ¼ 102) and smaller ( n ¼ 11) untrained control samples, respectively]. Importantly, however, this discrepancy does not appear to\n\nmeaningfully affect the interpretation of the fi ndings. There\n\nwere subtle differences in the precise scanning and analysis\n\napproaches used with the reference populations featured in\n\nthis study, including 1 ) magnetic fi eld strength [1.5 T ( 10 , 11 , 15 )\n\nvs. 3.0 T, WSM and ( 13 , 14 )]; 2 ) the interslice distance used to\n\nquantify quadriceps femoris and hamstrings muscle volume\n\n[1.5 cm ( 10 , 11 , 14 ) vs. 2.0 cm, WSM and ( 13 )]; 3 ) the calculation\n\nof muscle volume [area under the cubic spline ACSA-muscle\n\nlength curve: ( 10 , 11 , 14 ) vs. the equation detailed earlier: WSM\n\nand ( 13 )]; and 4 ) the use of unilateral MRI measures derived\n\nfrom one limb ( 10 , 11 , 14 , 15 ) or collapsed across two limbs\n\n[WSM and ( 13 )]. However, it seems likely that these subtle dif-\n\nferences would have had at most a very minor effect on the\n\nfi ndings. Finally, it is also important to highlight that the differ-\n\nences documented between the WSM and comparative popula-\n\ntions for the various measures included in the current study\n\ncannot be assumed to be anything other than a combination of\n\nboth innate (genetic) and environmental (training and nutri-\n\ntion) factors.\n\n##### Conclusions\n\nIn conclusion, this novel investigation documented the\n\nmuscle and tendon morphology and whole body strength\n\nand power characteristics of an exceptionally strong individ-\n\nual, relative to comparative athletic, trained, and untrained\n\npopulations. Overall leg muscle volume of the WSM was\n\napproximately twice that of untrained controls but with pro-\n\nnounced anatomical variability in the extent of muscular de-\n\nvelopment. The plantar fl exor muscle group and the guy\n\nrope muscles (sartorius, gracilis, and semitendinosus: þ 140 to þ 202%), which stabilize the pelvis and femur, demon- strated the largest differences. The pronounced quadriceps\n\nfemoris size of the WSM (greater than or equal to twice that", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "Although it was anticipated that the WSM would possess a\n\nlarger total lower-body muscle volume/mass than untrained\n\ncontrols and other athletic/trained groups we have previ-\n\nously measured, the magnitude and pattern of the differen-\n\nces were unknown. The results indicated that the total\n\nvolume of the measured muscles was almost twice that of av-\n\nerage untrained participants and 32 - 63% larger than subelite\n\nand elite sprinters. Pronounced development of the anti-\n\ngravity muscles (i.e., hip extensors, knee extensors, and plan-\n\ntar fl exors) was perhaps not that surprising given the WSM ’ s\n\nbackground in heavy lifting events (including being a double\n\ndeadlift world champion and record holder). However, the\n\nhip fl exors appear less important in these tasks, possibly\n\nexplaining their more modest size, which was inferior to that\n\nof three elite 100-m sprinters we have previously assessed.\n\nThe WSM ’ s plantar fl exors were particularly large relative to\n\nuntrained controls ( þ 120%). This could be due to the plan- tar fl exors being the smallest of the antigravity muscle\n\ngroups that may experience very high mechanical stress\n\nand, thus, a pronounced adaptive stimulus during heavy lift-\n\ning, carrying, and pulling tasks. Furthermore, the very heavy\n\nand, therefore, low-velocity nature of these tasks may limit\n\nthe contribution of the stretch-shortening cycle and tendon\n\nrecoil to the positive/concentric work done by the plantar\n\nfl exors, potentially placing a higher demand on the contract-\n\nile apparatus than for running and jumping tasks.\n\nConsidering individual muscles/compartments, the mus-\n\ncular development of the WSM was distinctly nonuniform. It\n\nis striking that the largest muscles relative to the untrained\n\ncontrol population were the three “ guy ropes ” (sartorius, gra-\n\ncilis, and semitendinosus: þ 140 - 202%). These three muscles provide stability to the pelvis and femur by having origins at\n\ndiverse points around the pelvis while sharing a common\n\ninsertion onto the anteromedial tibia [via pes anserinus, the\n\nconjoined tendons of these three muscles ( 39 )]. Large guy\n\nrope muscles likely enhance stabilization of the femur and\n\npelvis and would be expected to be critical during heavy\n\nweight-bearing tasks. In contrast, the WSM ’ s fi ve smallest\n\nmuscles (relative to untrained controls) consisted of two hip\n\nfl exors (iliopsoas and RF) and two monoarticular knee fl exors;\n\nactions that appear far less important for lifting, carrying, and\n\npulling tasks.\n\nThe WSM ’ s quadriceps volume and patellar tendon\n\nmoment arm were both greater than that of untrained con-\n\ntrols and indeed any individual we have previously measured.\n\nHowever, the magnitude of difference, relative to the\n\nuntrained controls, was noticeably larger for quadriceps femo-\n\nris volume (greater than or equal to twice as large) than for\n\n0 1000 2000 3000 4000 5000\n\nUntrained control\n\nSub-elite sprint runners\n\nElite sprint runners\n\nLong-term resistance-trained\n\nWSM\n\n### **A**\n\n**QF volume (cm <sup>3</sup> )**\n\n0 100 200 300 400 500 600\n\n### **E**\n\n**RF volume (cm <sup>3</sup> )**\n\n0 200 400 600 800 1000 1200 1400\n\nUntrained control\n\nSub-elite sprint runners\n\nElite sprint runners\n\nLong-term resistance-trained\n\nWSM\n\n### **D**\n\n**VI volume (cm <sup>3</sup> )**\n\n0 200 400 600 800 1000 1200\n\nUntrained control\n\nSub-elite sprint runners\n\nElite sprint runners\n\nLong-term resistance-trained\n\nWSM\n\n### **B**\n\n**VM volume (cm <sup>3</sup> )**\n\n0 200 400 600 800 1000 1200 1400 1600\n\n### **C**\n\n**VL volume (cm <sup>3</sup> )**\n\nFigure 4. Quadriceps femoris (QF; A ),\n\nvastus medialis (VM; B ), vastus lateralis\n\n(VL; C ), vastus intermedius (VI; D ), and rec-\n\ntus femoris (RF; E ) muscle volume of a\n\nWorld ’ s Strongest Man and deadlift cham-\n\npion (WSM) compared with long-term re-\n\nsistance-trained ( n ¼ 16, from the work by Maden-Wilkinson et al. ( 10 )], elite sprint", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed12.pdf" - }, - { - "text": "tibialis anterior, extensor digitorum longus, and extensor hal-\n\nlucis longus. The lateral shank compartment included the\n\nperoneus longus and brevis. The deep posterior compartment\n\nconsisted of plantaris, tibialis posterior, fl exor digitorum lon-\n\ngus, and fl exor hallucis longus. All muscles were manually\n\nsegmented in every other image (i.e., every 20 mm) starting\n\nfrom the most proximal image in which the muscle appeared,\n\nexcept the tensor fasciae latae, gluteus medius and minimus\n\n(combined), and popliteus, which were manually segmented\n\nin every slice (i.e., every 10 mm) due to their short length. The\n\nvolume of each individual muscle ( V m ) was calculated using\n\npreviously outlined methods ( 16 ) as follows:\n\nV m ¼ X n � 1\n\ni ¼ 1\n\nh 2 <sup>ð</sup> <sup>A</sup> <sup>m</sup> <sup>i</sup> <sup>þ</sup> <sup>A</sup> <sup>mi</sup> <sup>þ</sup> <sup>1</sup> <sup>Þ</sup>\n\nwhere A m represents the muscle CSA calculated from each image, i is the image number, n is the total number of\n\nimages, and h is the distance between images. The volume of\n\nfi ve functional muscle groups was calculated as the sum\n\nof the following muscles: hip extensors (gluteus maxi-\n\nmus, adductor magnus, BFlh, SM, and ST), hip fl exors\n\n(iliopsoas, RF, sartorius, and tensor fasciae latae), knee\n\nextensors (RF, VI, VM, and VL), knee fl exors (gracilis,\n\nBFlh and BFsh, SM, ST, sartorius, popliteus, and medial\n\nand lateral gastrocnemius), and plantar fl exors (medial\n\nand lateral gastrocnemius and soleus). The sum of all the\n\nmeasured lower-body muscles was also quanti fi ed as the\n\nvolume of “ all muscles. ”\n\nOnce muscle MRI scanning had been completed, a fl ex\n\ncoil (GE Medical) was used to acquire unilateral T1-weighted\n\naxial (time of repetition/time to echo 650/9.476 ms, image\n\nmatrix 512 � 512, fi eld of view 180 � 180 mm, pixel size 0.3516 � 0.3516 mm, slice thickness 2 mm, and interslice gap 0 mm) and sagittal images (time of repetition/time to echo\n\n606/9.512 ms, image matrix 512 � 512, fi eld of view 180 � 180 mm, pixel size 0.3516 � 0.3516 mm, slice thickness 2 mm, and interslice gap ¼ 0 mm) from both knee joints. The axial images were obtained perpendicular to the line of the tendon\n\nfrom � 2 cm superior to the apex of the patella to � 2 cm\n\ninferior to the patellar tendon ’ s inferior insertion. Patellar\n\ntendon CSA was measured in each contiguous image along\n\nthe length of the tendon (i.e., from the fi rst image where the\n\npatella was no longer visible to the fi nal image before the tib-\n\nial insertion). The axial images of the patellar tendon were\n\nviewed in grayscale, sharpened, and the perimeter manually\n\noutlined. The average of all measured axial patellar tendon\n\nCSAs was calculated to produce a mean tendon CSA (mm <sup>2</sup> )\n\nfor each leg. The moment arm length of the patellar tendon\n\nfor each leg was estimated from sagittal plane images as the\n\nperpendicular distance from the patellar tendon to the mid-\n\npoint of tibiofemoral contact ( 17 ).\n\n##### Countermovement Jump\n\nFollowing an � 10-min self-selected whole body loaded barbell-based warm-up and three submaximum warm-up\n\nCMJs performed with � 50% of perceived maximum effort, the WSM performed three maximal effort CMJs, with 30 s of\n\nrest between jumps, on a portable Kistler force plate (Quattro\n\nJump, Type 9290AD, Kistler, Switzerland), interfaced with a\n\npersonal computer. Prior to all jumps, the participant was\n\ninstructed to stand still on the force plate in an upright pos-\n\nture with their arms by their sides. Sampling was initiated\n\nwhen they provided an indication they were ready to begin,\n\nand after a 2-s pause to collect the force due to body mass\n\nand a 3-s countdown, the participant performed a CMJ for\n\nmaximal height, with arm movement and the depth of coun-\n\ntermovement self-selected by the participant. The Quattro\n\njump device records vertical ground reaction force at a sam-\n\npling frequency of 500 Hz and calculates jump height and", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed12.pdf" - }, - { - "text": "patellar tendon moment arm ( þ 18%). Therefore, of these two key strength determinants, muscle size, rather than joint lever-\n\nage, appeared to be the predominant factor responsible for the\n\nWSM ’ s extraordinary strength. Indeed, when we previously\n\ncompared the muscle morphology and joint mechanics of indi-\n\nviduals with distinct maximum strength capacity (long-term\n\nresistance-trained individuals vs. untrained controls), muscle\n\nsize was the primary factor separating the groups with much\n\nmore subtle differences in moment arm ( 10 ). The extreme\n\nexample of muscle size provided by the WSM ’ s quadriceps\n\nfemoris also gave the opportunity to investigate the scaling of\n\ntendon size to muscle size; extreme muscular size (greater\n\nthan or equal to twice that for untrained controls) might be\n\nexpected to be accompanied by comparable tendinous tissue\n\nsize to effectively transmit high muscular forces to the skele-\n\nton. However, the WSM ’ s patellar tendon CSA was only 30%\n\nlarger than untrained controls and within the range of indi-\n\nviduals we have previously measured ( Fig. 6 A ). This obser-\n\nvation supports the notion that tendon structure may be\n\nlargely fi xed by adulthood ( 40 ), with only slow/limited\n\n0 300 600 900 1200 1500 1800\n\nUntrained control\n\nSub-elite sprint runners\n\nElite sprint runners\n\nLong-term resistance-trained\n\nWSM\n\n### **A**\n\n**HAMS volume (cm <sup>3</sup> )**\n\n0 100 200 300 400 500\n\nUntrained control\n\nSub-elite sprint runners\n\nElite sprint runners\n\nLong-term resistance-trained\n\nWSM\n\n### **D**\n\n**BFlh volume (cm <sup>3</sup> )**\n\n0 100 200 300 400 500 600\n\n### **C**\n\n**ST volume (cm <sup>3</sup> )**\n\n0 100 200 300 400 500 600\n\nUntrained control\n\nSub-elite sprint runners\n\nElite sprint runners\n\nLong-term resistance-trained\n\nWSM\n\n### **B**\n\n**SM volume (cm <sup>3</sup> )**\n\n0 50 100 150 200 250\n\n### **E**\n\n**BFsh volume (cm <sup>3</sup> )**\n\nFigure 5. Overall hamstrings (HAMS; A ),\n\nsemimembranosus (SM; B ), semitendino-\n\nsus (ST; C ), biceps femoris long head\n\n(BFlh; D ), and biceps femoris short head\n\n(BFsh; E ) muscle volume of a World ’ s\n\nStrongest Man and deadlift champion\n\n(WSM) compared with long-term resist-\n\nance trained [ n ¼ 16, from the work by Maden-Wilkinson et al. ( 10 )], elite sprint\n\nrunners [ n ¼ 5, from the work by Miller et al. ( 13 )], subelite sprint runners [ n ¼ 26, from the work by Miller et al. ( 13 )], and\n\nuntrained control populations [ n ¼ 50, pooled population from the works by\n\nMiller et al. ( 13 ) ( n ¼ 11) and Balshaw et al. ( 14 ) (pretest data n ¼ 39)].\n\n60 80 100 120 140 160\n\nUntrained control\n\nLong-term resistance-trained\n\nWSM\n\n### **A**\n\n**Patellar tendon cross-sectional area (mm <sup>2</sup> )**\n\n30 35 40 45 50 55\n\n### **B**\n\n**Patellar tendon moment arm (mm)**\n\nFigure 6. Patellar tendon mean cross-sec-\n\ntional area ( A ) and patellar tendon moment\n\narm ( B ) of a World ’ s Strongest Man and\n\ndeadlift champion (WSM) compared with\n\nlong-term resistance trained [ n ¼ 16, from the work by Massey et al. ( 15 )] and untrained\n\ncontrol populations [ n ¼ 39, from the work by Massey et al. ( 15 )].\n\n797", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed12.pdf" - }, - { - "text": "assessed ( Fig. 5 B ). BFsh volume (135 cm <sup>3</sup> ) of the WSM was a\n\nmodest 26% greater than that of our pool of untrained control\n\nparticipants (107±31 cm <sup>3</sup> ; Fig. 5 E ) but smaller than that of\n\nboth long-term resistance-trained individuals ( � 1%; 136±27 cm <sup>3</sup> ) and elite sprinters ( � 19%; 167±26 cm <sup>3</sup> ; Fig. 5 E ).\n\n##### Patella Tendon Cross-Sectional Area and Moment Arm\n\nThe patellar tendon mean CSA of the WSM (133.8 mm <sup>2</sup> ) was\n\nlarger than that of average untrained ( þ 30%; 103.2±12.5 mm <sup>2</sup> ) and long-term resistance-trained individuals ( þ 27%; 105.4±13.0 mm <sup>2</sup> ; Fig. 6 A ) but was smaller than the largest\n\nindividual we have measured from these groups (149.5 mm <sup>2</sup> ).\n\nThe WSM ’ s patellar tendon moment arm (51.5 mm) was also\n\nlarger than that of average untrained ( þ 18%; 43.8±2.7 mm) or long-term resistance-trained groups ( þ 12%; 45.8±2.5 mm; Fig. 6 B ) as well as being 3% greater than the highest individ-\n\nual moment arm we have previously assessed within these\n\ngroups (49.9 mm).\n\n#### DISCUSSION\n\nThis study is the fi rst to document the lower-body muscle\n\nand tendon morphology of a World ’ s Strongest Man and\n\ndeadlift champion (i.e., an exceptionally strong individual),\n\nand these are presented alongside functional whole body\n\nassessments, which exceeded the highest IMTP force (gross\n\nand net) and CMJ power values previously reported by 54%,\n\n100%, and 164%, respectively. The WSM had overall lower-\n\nbody muscularity approximately twice that of untrained con-\n\ntrols ( þ 96%) and 32% greater than that of elite 100-m sprint- ers. However, there was substantial anatomical variability in\n\nthe magnitude of the differences, ranging from the plantar\n\nfl exors ( þ 120% vs. untrained) to the hip fl exors ( þ 65% vs. untrained). Similarly, some speci fi c muscles, such as the guy\n\nrope muscles that stabilize the femur and pelvis, were 2.5 - 3.0\n\ntimes the volume of untrained individuals (gracilis þ 140%, semitendinosus þ 157%, and sartorius þ 202%) but others dis- played more marginal differences (BFsh þ 23%, iliopsoas þ 32% vs. untrained). Considering the knee extensors, the WSM had both quadriceps femoris volume greater than or\n\nequal to twofold that of untrained controls and a greater pa-\n\ntella tendon moment arm than we have previously measured\n\n( þ 18% vs. untrained), which would be expected to combine to facilitate extraordinary strength. Furthermore, despite the\n\nWSM ’ s extremely large quadriceps femoris, their patellar ten-\n\ndon CSA was only 30% greater than that of untrained controls\n\nand not outside the range of tendons we have previously\n\nassessed. The results of this study provide novel insights into\n\nthe muscle and tendon characteristics, as well as the strength\n\nand power capabilities, of an extraordinarily strong individual\n\nthat may be toward the upper limit of human variation in\n\nthese characteristics.\n\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a\n\nWorld ’ s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained\n\n##### control participants\n\nMuscle Group/Muscle or Compartment\n\nMuscle Volume, cm <sup>3</sup>\n\nWSM Elite Sprinters ( n 5 5) Subelite Sprinters ( n 5 26) Untrained ( n 5 11)\n\nAll muscles 14,922 11,323 ± 1,328 9,164 ± 1,207 7,628 ± 1,548\n\nHip fl exors 1,704 1,620 ± 200 1,314 ± 216 1,031 ± 151\n\nHip extensors 4,724 4,002 ± 489 3,029 ± 422 2,257 ± 220\n\nKnee fl exors 3,060 2,304 ± 178 1,859 ± 301 1,460 ± 196\n\nKnee extensors 4,386 3,218 ± 400 2,636 ± 401 2,202 ± 315\n\nPlantar fl exors 1,888 1,112 ± 181 943 ± 156 860 ± 172\n\nIliopsoas 681 702 ± 97 618 ± 101 514 ± 75\n\nSartorius 429 306 ± 46 209 ± 50 142 ± 25\n\nTensor fasciae latae 142 135 ± 41 86 ± 25 73 ± 24\n\nAdductor magnus 1,334 1,056 ± 83 828 ± 128 624 ± 81\n\nGracilis 235 180 ± 37 142 ± 37 98 ± 23\n\nGluteus maximus 1,980 1,797 ± 376 1,257 ± 197 931 ± 108", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" - }, - { - "text": "8. Abe T , Buckner SL , Mattocks KT , Jessee MB , Dankel SJ , Mouser\n\nJG , Bell ZW , Loenneke JP. Skeletal muscle mass and architecture\n\nof the world ’ s strongest raw powerlifter: a case study. Asian J Sports\n\nMed 9: e61763, 2018. doi: [10.5812/asjsm.61763](https://doi.org/10.5812/asjsm.61763) .\n\n9. Powell PL , Roy RR , Kanim P , Bello MA , Edgerton VR. Predictability\n\nof skeletal muscle tension from architectural determinations in\n\nguinea pig hindlimbs. J Appl Physiol Respir Environ Exerc Physiol\n\n57: 1715 - 1721, 1984. doi: [10.1152/jappl.1984.57.6.1715](https://doi.org/10.1152/jappl.1984.57.6.1715) .\n\n10. Maden-Wilkinson TM , Balshaw TG , Massey G , Folland JP. What\n\nmakes long-term resistance-trained individuals so strong? A com-\n\nparison of skeletal muscle morphology, architecture, and joint\n\nmechanics. J Appl Physiol (1985) 128: 1000 - 1011, 2019. doi: [10.1152/](https://doi.org/10.1152/japplphysiol.00224.2019)\n\n[japplphysiol.00224.2019](https://doi.org/10.1152/japplphysiol.00224.2019) .\n\n11. Balshaw TG , Maden-Wilkinson TM , Massey GJ , Folland JP. The\n\nhuman muscle size and strength relationship: effects of architecture,\n\nmuscle force, and measurement location. Med Sci Sports Exerc 53:\n\n2140 - 2151, 2021. doi: [10.1249/mss.0000000000002691](https://doi.org/10.1249/mss.0000000000002691) .\n\n12. Baxter JR , Piazza SJ. Plantar fl exor moment arm and muscle volume\n\npredict torque-generating capacity in young men. J Appl Physiol\n\n(1985) 116: 538 - 544, 2014. doi: [10.1152/japplphysiol.01140.2013](https://doi.org/10.1152/japplphysiol.01140.2013) .\n\n13. Miller R , Balshaw TG , Massey GJ , Maeo S , Lanza MB , Johnston\n\nM , Allen SJ , Folland JP. The muscle morphology of elite sprint\n\nrunning. Med Sci Sports Exerc 53: 804 - 815, 2021. doi: [10.1249/](https://doi.org/10.1249/mss.0000000000002522)\n\n[mss.0000000000002522](https://doi.org/10.1249/mss.0000000000002522) .\n\n14. Balshaw TG , Funnell MP , McDermott E , Maden-Wilkinson TM ,\n\nAbela S , Quteishat B , Edsey M , James LJ , Folland JP. The effect of\n\nspeci fi c bioactive collagen peptides on function and muscle remod-\n\neling during human resistance training. Acta Physiol (Oxf) 237:\n\ne13903, 2023 [Erratum in Acta Physiol (Oxf) 237:e13952, 2023].\n\ndoi: [10.1111/apha.13903](https://doi.org/10.1111/apha.13903) .\n\n15. Massey GJ , Balshaw TG , Maden-Wilkinson TM , Folland JP.\n\nTendinous tissue properties after short- and long-term functional\n\noverload: differences between controls, 12 weeks and 4 years of re-\n\nsistance training. Acta Physiol (Oxf) 222: e13019, 2018. doi: [10.1111/](https://doi.org/10.1111/apha.13019)\n\n[apha.13019](https://doi.org/10.1111/apha.13019) .\n\n16. Sugisaki N , Kobayashi K , Tsuchie H , Kanehisa H. Associations\n\nbetween individual lower-limb muscle volumes and 100-m sprint\n\ntime in male sprinters. Int J Sports Physiol Perform 13: 214 - 219, 2018.\n\ndoi: [10.1123/ijspp.2016-0703](https://doi.org/10.1123/ijspp.2016-0703) .\n\n17. Seynnes OR , Erskine RM , Maganaris CN , Longo S , Simoneau EM ,\n\nGrosset JF , Narici MV. Training-induced changes in structural and\n\nmechanical properties of the patellar tendon are related to muscle\n\nhypertrophy but not to strength gains. J Appl Physiol (1985) 107:\n\n523 - 530, 2009. doi: [10.1152/japplphysiol.00213.2009](https://doi.org/10.1152/japplphysiol.00213.2009) .\n\n18. Beckham GK , Sato K , Santana HAP , Mizuguchi S , Haff GG , Stone\n\nMH. Effect of body position on force production during the isometric\n\nmidthigh pull. J Strength Cond Res 32: 48 - 56, 2018. doi: [10.1519/](https://doi.org/10.1519/jsc.0000000000001968)\n\n[jsc.0000000000001968](https://doi.org/10.1519/jsc.0000000000001968) .\n\n19. Travis SK , Goodin JR , Beckham GK , Bazyler CD. Identifying a test\n\nto monitor weightlifting performance in competitive male and female\n\nweightlifters. Sports 6: 46, 2018. doi: [10.3390/sports6020046](https://doi.org/10.3390/sports6020046) .\n\n20. Beckham G , Mizuguchi S , Carter C , Sato K , Ramsey M , Lamont H ,", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed12.pdf" - }, - { - "text": "adjustment to different heights. A bar height producing a\n\nknee joint angle of 145 <sup>�</sup> (measured by a manual goniometer)\n\nwas selected, and the participant was instructed to keep his\n\ntorso upright while completing the IMTP efforts. Two cali-\n\nbrated 10-kN-capacity force platforms (model 9286B, Kistler\n\nInstruments, Ltd., London, UK), one underneath each foot,\n\nwere placed on top of the isometric rig ’ s base plate, and verti-\n\ncal force signals from the eight individual load cells across the\n\ntwo force platforms were outputted (External Control Unit\n\nmodel 5233 A, Kistler Instruments, Ltd.) and sampled at 2,000\n\nHz using an external analog-to-digital converter (Micro 1401;\n\nCED, Cambridge, UK) and recorded with Spike 2 computer\n\nsoftware (CED, Cambridge, UK).\n\nFollowing a warm-up consisting of a series of incremental\n\nwarm-up contractions of � 5 s duration ranging from 50% to 90% of maximum perceived effort, two maximum IMTP\n\nefforts of 3 - 5 s duration were performed under the instruc-\n\ntion to “ pull as hard as possible. ” Six minutes separated the\n\nmaximum efforts, based on a self-selected recovery period.\n\nWrist wraps were worn to remove the in fl uence of grip\n\nstrength from the assessment. Real-time overall feedback\n\nfrom the force platforms (the sum of the force signals from\n\nFigure 1. Example axial MRI images from\n\nthe World ’ s Strongest Man and deadlift\n\nchampion (WSM; A - C ) and an untrained\n\ncontrol participant ( D - F ) from the hip\n\n( A and D ), thigh ( B and E ), and lower leg ( C\n\nand F ). Image location relative to femur\n\nand shank length was matched between\n\nthe WSM and the untrained control as fol-\n\nlows: hip image is at approximately midfe-\n\nmoral head, thigh image is at � 52% of femur length (0% is distal end of femur,\n\n100% is greater trochanter), and lower leg\n\nimage is at � 70% of shank length (0% is lateral malleolus, 100% is proximal end of\n\ntibia). The untrained control participant\n\ndisplayed was from the work by Miller et al.\n\n( 13 ) and had a total measured muscle vol-\n\nume of all measured muscles that was 5.1%\n\nsmaller than the mean of the untrained\n\ngroup within that study.\n\n792", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed12.pdf" - }, - { - "text": "### RESEARCH ARTICLE\n\n## Muscle and tendon morphology of a world strongman and deadlift champion\n\n[Thomas G. Balshaw,](https://orcid.org/0000-0001-6935-8228) <sup>1</sup> Garry J. Massey, <sup>1,2</sup> [Robert Miller,](https://orcid.org/0000-0002-9235-3158) <sup>1,3,4</sup> Emmet J. McDermott, <sup>1,5</sup> [Thomas M. Maden-Wilkinson,](https://orcid.org/0000-0002-6191-045X) <sup>6</sup> and [Jonathan P. Folland](https://orcid.org/0000-0003-3678-6044) <sup>1</sup>\n\n1 School of Sport, Exercise, and Health Sciences, Loughborough University, Loughborough, United Kingdom; 2 College of Life\n\nand Environmental Sciences, University of Exeter, Exeter, United Kingdom; <sup>3</sup> UK Athletics, Loughborough University,\n\nLoughborough, United Kingdom; <sup>4</sup> Department of Sport Science, Aspire Academy, Doha, Qatar; <sup>5</sup> Department of Physical\n\nEducation and Sport Sciences, University of Limerick, Limerick, Ireland; and <sup>6</sup> Academy of Sport and Physical Activity, Faculty\n\nof Health and Wellbeing, Shef fi eld Hallam University, Shef fi eld, United Kingdom\n\n#### Abstract\n\nThis study compared the muscle and tendon morphology of an extraordinarily strong individual, a World ’ s Strongest Man and deadlift\n\nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1 ) 3.0-T\n\nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec-\n\ntional area (CSA), and PT moment arm; and 2 ) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The\n\nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature\n\n(CMJ and IMTP). The WSM ’ s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than\n\nany previously published values. The WSM ’ s overall measured leg muscle volume was approximately twice that of untrained controls\n\n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar fl exor group ( þ 120%) and the guy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the largest differences relative to that of untrained controls. The WSM ’ s pronounced quadriceps size (greater than or equal to twofold vs.\n\nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT\n\nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, which may be toward the upper limit of human variation, such that the WSM ’ s very pronounced lower limb muscularity also exhibited\n\ndistinct anatomical variability and with muscle size largely uncoupled from tendon size.\n\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World ’ s Strongest Man and deadlift\n\nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the\n\nextent of muscular development ( þ 23 - 202%): the plantar fl exor group and guy rope muscles demonstrating the largest differen- ces. The WSM ’ s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten-\n\ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%).\n\nisometric force; magnetic resonance imaging; power; strength\n\n#### INTRODUCTION\n\nFeats of strength have fascinated man since the early stages\n\nof human civilization, as shown by the archeological evidence\n\nof inscribed heavy stones at Olympia and Thera in Greece,\n\ndated to the 6th century BC, detailing the way they were lifted\n\nby Bybon and Eumastus, respectively ( 1 ). Over the centuries,\n\nmany types of strength competitions have existed; some of\n\nwhich have been codi fi ed and endured within modern sport-", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed12.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed12.pdf", - "query": "What are the nutritionnal added components to the word's strongest man regime ?", - "target_page": 2, - "target_passage": "The WSM’s nutritional supplement consumption included protein, branched-chain amino acids, and electrolytes", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "predictions of skeletal muscle mass nor dual-energy X-ray\n\nabsorptiometry provides detailed information on the size of\n\nspeci fi c individual muscles. Given the known importance of\n\nmuscle size as a determinant of muscular strength ( 9 - 11 ), pro-\n\nnounced muscle size seems likely to be critical to extreme\n\nhuman strength; however, the speci fi c muscle size of\n\nextremely strong individuals remains unknown. Similarly, a\n\nlarge moment arm (e.g., of the patella tendon at the knee joint)\n\ncould contribute to the expression of high muscular strength\n\n( 10 , 12 ), and a large tendon may mitigate the mechanical stress\n\nit experiences with very high muscular loads, and therefore,\n\nthese characteristics may also be expected in individuals\n\nselected for exceptional strength.\n\nIn this paper, we present the fi ndings from a unique op-\n\nportunity to examine the laboratory function, muscle size,\n\nand distribution of muscle mass, as well as patellar tendon\n\nsize and moment arm, of a World ’ s Strongest Man and dead-\n\nlift champion (WSM) in comparison with existing data on\n\nuntrained individuals, power athletes (100-m-track sprint-\n\ners), and long-term resistance-trained populations that we\n\nhave assessed previously ( 10 , 11 , 13 - 15 ).\n\n#### MATERIALS AND METHODS\n\n##### Participant\n\nThe WSM ’ s achievements included one World ’ s Strongest\n\nMan title (14 mo prior to measurement), fi ve Britain ’ s\n\nStrongest Man titles (the most recent 6 mo prior to measure-\n\nment), twice being World Deadlift Champion and Deadlift\n\nWorld Record holder (500 kg; at the time of measurement),\n\nand second place at Europe ’ s Strongest Man. Prior to agreeing\n\nto participate, the purpose of the research study and the test-\n\ning procedures were explained to the participant along with\n\nthe risks and bene fi ts of taking part. The participant gave his\n\nwritten informed consent to participate in the study that was\n\napproved by the Loughborough University Ethical Advisory\n\nCommittee (Ethics Number R18-P090). Included in the writ-\n\nten consent was a statement providing permission for publi-\n\ncation of the collected data and the likelihood that their\n\nidentity may be evident based on their achievements and\n\ncharacteristics, despite anonymization.\n\n##### Training History\n\nThe WSM had been continuously involved in systematic,\n\nregular upper- and lower-body resistance training for 15 yr at\n\nthe time of testing. In the 12 mo prior to testing, the partici-\n\npant ’ s resistance training consisted of the following typical\n\nexercises: lower body: squats, deadlifts, leg press, and knee\n\nextension; and upper body: bench press, shoulder press,\n\ndumbbell/barbell rows, and lat pull-down. The proportion of\n\nthe participant ’ s training within the following repetition\n\nranges over the last 12 mo was as follows: near maximum\n\nloads [1 - 5 repetition maximum (RM)]: 10%; heavy loads (6 -\n\n14 RM): 80%; and moderate loads ( � 15 RM): 10%. The partici- pant reported only occasional ( < 1 � /week) use of advanced resistance training practices (i.e., complex training and ac-\n\ncommodating resistance method) but frequently ( > 3 � / week) executed training repetitions with the intention to\n\nmove the load as fast as possible. The WSM ’ s nutritional\n\nsupplement consumption included protein, branched-chain\n\namino acids, and electrolytes.\n\n##### Overview\n\nThe WSM reported for a single test session that involved\n\nthe following assessments (listed in order): axial T1 weighted\n\n3.0-T MRI scans from T12 to the lateral malleolus [to assess\n\nmuscle size throughout the lower body (left and right sides)],\n\naxial and sagittal T1-weighted MRI scans of both knees [to\n\nassess patellar tendon cross-sectional area (CSA) and patellar\n\ntendon moment arm], maximum countermovement jumps\n\n(CMJ), and maximum isometric midthigh pulls (IMTPs). The\n\nmuscle size, patellar tendon CSA, and patellar tendon\n\nmoment arm of the WSM were compared with various popu-\n\nlations measured within our laboratory, as indicated in", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "**14**\n\nACCESS1-0\n\n- 1.00 - 0.75 - 0.50 - 0.25 0 0.25 0.50 0.75 1.00\n\nIPSL-CM5A-LR\n\nensemble mean\n\nchange in vulnerability to food insecurity\n\nIPSL-CM5A-MR MIROC-ESM-CHEM\n\nGFDL-ESM2M\n\n**Figure 8.** Change in Hunger and Climate Vulnerability Index relative to baseline calculated for simulated climate states at 2 ° C\n\nglobalwarming,forfiveindividualHadGEM3simulationsdrivenbySSTsandSICsfromdifferentmembersoftheCMIP5ensemble,\n\nand the ensemble mean.\n\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher\n\nthan any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen.\n\nThe implication of such HCVI values is that climate change at 2°C is projected to cause levels\n\nof vulnerability to food insecurity that are greater than any seen in the present day. For\n\nindividual ensemble members, the number of countries with ‘unprecedented’ HCVI values at\n\n2°C varies from three to seven. Conversely, many countries in the baseline climate have levels\n\nof vulnerability to food insecurity that are greater than those expected in other countries under\n\n2°C global warming. This suggests that other factors are already posing greater risk for food\n\ninsecurity than 2°C climate change is expected to cause in other countries, so the increased risk\n\nfrom climate change should not overshadow the need to reduce vulnerability to food insecurity\n\narising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by\n\naddressing various socio-economic issues in such counties.\n\nThe JULES simulations show a general tendency towards increased run-off over\n\napproximately half of the land surface ( figure 9 ) and the majority of the major river basins\n\nassessed ( figure 10 ), but with large regional uncertainties including the possibility of decreased\n\nflows in many basins. The ensemble-mean change in mean streamflow shows an increase of\n\nbetween 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing\n\nan increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and\n\nsouthcentral USA, which see less than a 5% change in run-off, and the already very dry region of\n\nthe Sahara Desert where the existing very small run-off become even smaller.\n\nEnsemble-mean projected changes in low run-off flows are generally larger ( figure 11 ), with\n\nthe regions seeing an increase in mean run-off seeing a larger percentage increase in low\n\nrun-off—over 75% increases over much of North America, Eastern Europe and Asia. Note that\n\nthis does not necessarily imply a larger increase in absolute low flow compared to absolute mean\n\nflow, because the baseline is (by definition) smaller for low flows. In western Europe, where the\n\nchanges in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed11.pdf" - }, - { - "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. **68** ,\n\n1084- 1088 (1989).\n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real\n\nand reciprocal space,” J. Phys.-Condes. Matter **15** , R1549- R1582 (2003).\n\n[7] R. Seemann, S. Herminghaus, C. Neto, S. Schlagowski, D. Podzimek, R. Konrad, H. Mantz, and\n\nK. Jacobs, “Dynamics and structure formation in thin polymer melt films,” J. Phys.-Condes. Matter\n\n**17** , S267- S290 (2005).\n\n[8] U. Thiele, “Structure formation in thin liquid films,” in S. Kalliadasis and U. Thiele, editors, “Thin\n\nfilms of Soft Matter,” pages 25- 93, Springer, Wien (2007).\n\n[9] R. Xie, A. Karim, J. F. Douglas, C. C. Han, and R. A. Weiss, “Spinodal dewetting of thin polymer\n\nfilms,” Phys. Rev. Lett. **81** , 1251- 1254 (1998).\n\n[10] R. Seemann, S. Herminghaus, and K. Jacobs, “Dewetting patterns and molecular forces: A reconcil-\n\niation,” Phys. Rev. Lett. **86** , 5534- 5537 (2001).\n\n[11] U. Thiele, M. G. Velarde, and K. Neuffer, “Dewetting: Film rupture by nucleation in the spinodal\n\nregime,” Phys. Rev. Lett. **87** , 016104 (2001).\n\n[12] M. Bestehorn and K. Neuffer, “Surface patterns of laterally extended thin liquid films in three di-\n\nmensions,” Phys. Rev. Lett. **87** , 046101 (2001).\n\n[13] J. Becker, G. Gr¨un, R. Seemann, H. Mantz, K. Jacobs, K. R. Mecke, and R. Blossey, “Complex\n\ndewetting scenarios captured by thin-film models,” Nat. Mater. **2** , 59- 63 (2003).\n\n[14] C. Redon, F. Brochard-Wyart, and F. Rondelez, “Dynamics of dewetting,” Phys. Rev. Lett. **66** , 715-\n\n718 (1991).\n\n[15] R. Seemann, S. Herminghaus, and K. Jacobs, “Shape of a liquid front upon dewetting,” Phys. Rev.\n\nLett. **87** , 196101 (2001).\n\n[16] R. Fetzer, K. Jacobs, A. M¨unch, B. Wagner, and T. P. Witelski, “New slip regimes and the shape of\n\ndewetting thin liquid films,” Phys. Rev. Lett. **95** , 127801 (2005).\n\n[17] F. Brochard-Wyart and C. Redon, “Dynamics of liquid rim instabilities,” Langmuir **8** , 2324- 2329\n\n(1992).\n\n[18] G. Reiter and A. Sharma, “Auto-optimization of dewetting rates by rim instabilities in slipping poly-\n\nmer films,” Phys. Rev. Lett. **87** , 166103 (2001).\n\n[19] A. M¨unch and B. Wagner, “Contact-line instability of dewetting thin films,” Physica D **209** , 178- 190\n\n(2005).\n\n26", - "page_start": 25, - "page_end": 25, - "source_file": "1001.2669.pdf" - }, - { - "text": "changes in response to functional overload/resistance\n\ntraining. For example, we previously found patellar ten-\n\ndon CSA to show very subtle changes after 15 wk (45 train-\n\ning sessions) of heavy resistance training [ þ 1.4% ( 41 )] and no differences between long-term resistance-trained indi-\n\nviduals and untrained controls ( 15 ).\n\n##### Limitations\n\nAlthough the current investigation provides a detailed\n\nassessment of an individual at/toward the upper limit of\n\nhuman strength performance, it is important to appreciate\n\nstudy limitations. First, the participant was not measured im-\n\nmediately before their World ’ s Strongest Man championship\n\nsuccess or other landmark performances, and it is entirely pos-\n\nsible the functional and structural characteristics we assessed\n\nmay have been even higher directly prior to peak performan-\n\nces. Despite using a wide-bore MRI scanner, due to the size of\n\nthe WSM ’ s shoulders and arms, it was not possible to scan their\n\nupper body. Thus, we were not able to investigate this aspect of\n\nthe WSM ’ s muscle morphology; although given that greater hy-\n\npertrophy occurs in the upper body compared with the lower\n\nbody ( 42 ), it is possible that the WSM ’ s upper-body muscle size\n\nrelative to untrained controls may have been even more pro-\n\nnounced than what we have documented for the lower body.\n\nIn the current study to provide the most representative data on\n\nuntrained control participants, the largest available untrained\n\ncontrol populations were used for each category of measure-\n\nments. Thus, different untrained control populations were\n\nused [e.g., comparison of quadricep and hamstring size ( n ¼ 102) vs. comparison of all the leg muscles ( n ¼ 11)], which led to some subtle discrepancies in the contrasts between these\n\ngroups and the WSM [e.g., quadriceps femoris/knee extensors,\n\nþ 127% and þ 99% relative to our large pooled ( n ¼ 102) and smaller ( n ¼ 11) untrained control samples, respectively]. Importantly, however, this discrepancy does not appear to\n\nmeaningfully affect the interpretation of the fi ndings. There\n\nwere subtle differences in the precise scanning and analysis\n\napproaches used with the reference populations featured in\n\nthis study, including 1 ) magnetic fi eld strength [1.5 T ( 10 , 11 , 15 )\n\nvs. 3.0 T, WSM and ( 13 , 14 )]; 2 ) the interslice distance used to\n\nquantify quadriceps femoris and hamstrings muscle volume\n\n[1.5 cm ( 10 , 11 , 14 ) vs. 2.0 cm, WSM and ( 13 )]; 3 ) the calculation\n\nof muscle volume [area under the cubic spline ACSA-muscle\n\nlength curve: ( 10 , 11 , 14 ) vs. the equation detailed earlier: WSM\n\nand ( 13 )]; and 4 ) the use of unilateral MRI measures derived\n\nfrom one limb ( 10 , 11 , 14 , 15 ) or collapsed across two limbs\n\n[WSM and ( 13 )]. However, it seems likely that these subtle dif-\n\nferences would have had at most a very minor effect on the\n\nfi ndings. Finally, it is also important to highlight that the differ-\n\nences documented between the WSM and comparative popula-\n\ntions for the various measures included in the current study\n\ncannot be assumed to be anything other than a combination of\n\nboth innate (genetic) and environmental (training and nutri-\n\ntion) factors.\n\n##### Conclusions\n\nIn conclusion, this novel investigation documented the\n\nmuscle and tendon morphology and whole body strength\n\nand power characteristics of an exceptionally strong individ-\n\nual, relative to comparative athletic, trained, and untrained\n\npopulations. Overall leg muscle volume of the WSM was\n\napproximately twice that of untrained controls but with pro-\n\nnounced anatomical variability in the extent of muscular de-\n\nvelopment. The plantar fl exor muscle group and the guy\n\nrope muscles (sartorius, gracilis, and semitendinosus: þ 140 to þ 202%), which stabilize the pelvis and femur, demon- strated the largest differences. The pronounced quadriceps\n\nfemoris size of the WSM (greater than or equal to twice that", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "Competitive weightlifters ( *n* =4) (21)\n\nSub-elite weightlifters ( *n* =10) (20)\n\nWSM\n\n**Gross IMTP peak force (N)**\n\n### **A**\n\n### **D**\n\n### **B**\n\n0 2000 4000 6000 8000\n\nResistance-trained population ( *n* =8) (31)\n\nCollegiate rugby union athletes ( *n* =15) (30)\n\nCollegiate weightlifters ( *n* =8) (29)\n\nInternational Rugby union backs ( *n* =14) (27)\n\nSpecial Forces Selection Candidates ( *n* =59) (28)\n\nInternational rugby union forwards ( *n* =15) (27)\n\nCollegiate baseball players ( *n* =28) (26)\n\nCollegiate soccer players ( *n* =23) (26)\n\nWSM\n\n**Net IMTP peak force (N)**\n\nFigure 2. Gross (including body weight) isometric midthigh pull (IMTP) peak force ( A ), net (above body weight) IMTP peak force ( B ), countermovement\n\njump (CMJ) peak power ( C ), and CMJ height ( D ) of a World ’ s Strongest Man and deadlift champion (WSM) displayed against comparative data from the\n\nexisting research literature. CMJ was performed with an arm swing by WSM and within all comparative data included in the fi gure. <sup>�</sup> Athletes from differ-\n\nent sports or disciplines featured within the sample. Descriptive information (age, height, and body mass) of the groups included as comparative data\n\ncan be found in Supplemental Materials 1 (IMTP) and 2 (CMJ).\n\n793", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed12.pdf" - }, - { - "text": "HCVI which makes use of gridded climate model projections to understand the impact of climate\n\nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios\n\nof adaptation investment [ 23 ]. This iteration of the HCVI only considers in-country production\n\nof food and does not account for food trade. For this reason, the HCVI is only calculated for\n\n122 developing and least-developed countries (defined here as countries not in the OECD or EU\n\nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km <sup>2</sup> ).\n\nThe index provides quantification at the national level across the globe of the scale and\n\ndirection of impact of climate change on food insecurity. As such, it aims to provide the following:\n\n(i) information to help policy-makers understand the level of challenge to global food security that\n\nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the\n\nrelative benefits of mitigation and adaptation responses.\n\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the\n\nnature of the top-level threat to food insecurity that climate change presents, thereby supporting\n\nprioritization of effort.\n\nThe HCVI consists of three equally weighted components: exposure to climate-related hazards,\n\nsensitivity of national agricultural production to climate-related hazards, and adaptive capacity—\n\na measure of a country’s ability to cope with climate-related food shocks. The sensitivity and\n\nadaptive capacity components are based on data from the World Bank, World Resources Institute,", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" - }, - { - "text": "NAVWEPS OO-BOT-80 TABLE OF CONTENTS\n\nCHAPTER 5. OPERAilNG STRENGTH LIMITATIONS\n\nGENERAL OEFlNlTlONS AND STRUCTURAL REQUlREMENTS\n\nSTATIC STRENGTH .._.......... ~.~~~.~ ~..~\n\nLimit load Factor of safety Material properties\n\nSERVICE LIFE\n\nPati Loa r e consideration spectrum attd cumulative damage Creep considerations\n\nAEROELASTIC EFFECTS.\n\nStiffness and rigidity\n\nAIRCRAFT LOADS AND OPERATING LIMITATIONS\n\nFLIGHT LOADS-MANEUVERS AND GUSTS.\n\nLoadfactor..................................................... Maneuvering load factors.. .I\n\nMaximum lift capability Effect of gross weight ^ . ._ ClllStlOadtacfors..............,................................. Gust load increment Effect of gust intensity and lift curve slope Effect of wing loading and altitude Effect of overstrea.\n\nTHE V-n OR V-g DIAGRAM.\n\nEffect of weight, configuration;altihtde, and symmetry of Ior-Ang Limit load factors Ultitnute load facvxs Maximum lift capability Limit airspeed Operating env+pe Maneuver’speed and penetration of turbulence\n\nEFFECT OF HIGH SPEED FLIGHT..\n\nCritical gust Aileron reversal Divergence PIutter Compressibility problems\n\nLANDING AND GROUND LOADS.\n\nLanding load factor Effect of touchdown rate of descent Effect of gross weight Ported landing on unprepared .surfaces\n\nEFFECT OF OVERSTRESS ON SERVICE\n\nRecognition of overstress’damage Importance of operating limitations\n\nLIFE\n\n,... ,..,\n\n328\n\n330\n\n331\n\n331 331\n\n332\n\n,’ 334\n\n334\n\n339\n\n343\n\n344\n\nxiv", - "page_start": 15, - "page_end": 15, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**Simulation of maize yield using DSSAT.** According to the data of global warming by 1.5 °C and 2.0 °C selected above, we simulated global maize yield changes compared with the average yield during 1986- 2005 on grid level using CERES-Maize, which is part of DSSAT version 4.6 <sup>49</sup> . The inputs for DSSAT simulation include daily weather data, soil parameters, crop calendar data and man- agement information. All the inputs are formatted at a 0.5° × 0.5° grid resolution which are computed by high- performance computers. Weather data is from the AgMERRA dataset, including maximum and minimum tem- peratures, precipitation, total radiation and humidity. Crop calendar data were from the Center for Sustainability and Global Environment (SAGE), in which the existing observations of crop planting and harvesting dates are gridded formatted at a resolution of 5 ­min <sup>50</sup> . For management information, fertilizer applications, irrigation and other management practices are required. A crop-specific gridded dataset of nitrogen fertilizer application for the world was developed by integrating national and subnational fertilizer application data from a variety of sources, which is used to set up current fertilizer application rates for maize in each grid cell. Soil parameters are from the International Soil Profile Dataset (WISE), including soil texture, bulk density, pH, organic carbon content and fraction of calcium carbonate for each of five 20 cm thick soil ­layers <sup>51</sup> . All the soil data is allocated to be in accordance with the request of DSSAT simulation; the missing soil parameters for organic soils were adopted from FAO soil dataset. First maize yields across the world during the historical period 1986- 2005 were simulated at the 0.5° × 0.5° grid scale with two main production systems, including Spring maize and Summer maize. Historical national maize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from the gridded global dataset by combining two data ­products <sup>47</sup> . Second, genetic parameters of specific cultivars of maize from previous works were adopted for the initial parameters; model parameters related to crop genotype characteristics were calibrated and tuned following the method in Xiong et al. <sup>52</sup> , in which the simulated yields from 1986- 2005 were comparable to the statistical data. Third, maize yields across the world were simulated under global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from grid- ded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, comparing maize yield average for 1986- 2005.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" - }, - { - "text": "This code retrieves the raw document data from ODWEK, gathers all of the document details\n\nthat Content Manager OnDemand might store from loading the data, and then transforms the\n\ndocument data. The transformed document data can be passed back through ODWEK to the\n\noriginal client request.\n\nTable 9-1 lists the XmlTagNames for the transformation specification.\n\n*Table 9-1 XmlTagNames for the transform specification*\n\nTable 9-2 provides information about the XMLTags. These XML tags are used to pass specific\n\nvalues to the transform command line. These XML tags allow the mapping of the\n\ncommand-line option where the specified value can be passed.\n\n*Table 9-2 XmlTags detailed information*\n\n| XmlTagname | ODConstant | Description |\n|:---|:---|:---|\n| TransformName | TransFormName | Name of the transform. It is used as the viewer argument that is passed to ODWEK Retrieve APIs. |\n| TransformDescription | TRANSFORM_DESC | Description of the transform. |\n| ClientClass | TRANSFORM_CLIENTCLASS | The class name of the custom interface class. |\n| CmdLineExe | TRANSFORM_CMDLINEEXE | Fully qualified name of the transform executable file. |\n| OutputMimeType | TRANSFORM_MIMETYPE | The MIME type of the data as it is returned from the transform. |\n| OutputExtension | TRANSFORM_OUTPUTEXT | The extension of the data that is returned from the transform. |\n| CmdParms | TRANSFORM_PARMS | The mappings of OD Values to custom variables. See the constant key words that are shown in Table 9-2 on page 216. |\n| Passthru | TRANSFORM_PASSTHRU | These values are passed through ODWEK directly to the transform. |\n| Cmdlineparm | TRANSFORM_PASSTHRU_CMDLINE | These values are passed through ODWEK directly to the transform command line. |\n\n| XmlTagname | ODConstant | Description |\n|:---|:---|:---|\n| RECORDFORMAT | DOCUMENT_RECORD_FORMAT | The record format of the document as stored in Content Manager OnDemand. |\n| RECORDLENGTH | DOCUMENT_RECORD_LENGTH | The record length of the document as stored in Content Manager OnDemand. |\n| CARRIAGECONTROL | DOCUMENT _CARRIAGE_CONTROL | The carriage control of the document as stored in Content Manager OnDemand. |\n| TRC_EXIST | DOCUMENT_TRC _EXIST | The TRC settings as stored in Content Manager OnDemand. |\n| DOCROTATION | DOCUMENT _ROTATION | The rotation of the document as stored in Content Manager OnDemand. |", - "page_start": 239, - "page_end": 239, - "source_file": "sg246915.pdf" - }, - { - "text": "[110] L. Rockford, Y. Liu, P. Mansky, T. P. Russell, M. Yoon, and S. G. J. Mochrie, “Polymers on nanope-\n\nriodic, heterogeneous surfaces,” Phys. Rev. Lett. **82** , 2602- 2605 (1999).\n\n[111] A. Sehgal, V. Ferreiro, J. F. Douglas, E. J. Amis, and A. Karim, “Pattern-directed dewetting of\n\nultrathin polymer films,” Langmuir **18** , 7041- 7048 (2002).\n\n[112] M. Geoghegan and G. Krausch, “Wetting at polymer surfaces and interfaces,” Prog. Polym. Sci. **28** ,\n\n261- 302 (2003).\n\n[113] P. Lenz and R. Lipowsky, “Morphological transitions of wetting layers on structured surfaces,” Phys.\n\nRev. Lett. **80** , 1920- 1923 (1998).\n\n[114] C. Bauer, S. Dietrich, and A. O. Parry, “Morphological phase transitions of thin fluid films on chem-\n\nically structured substrates,” Europhys. Lett. **47** , 474- 480 (1999).\n\n[115] R. Konnur, K. Kargupta, and A. Sharma, “Instability and morphology of thin liquid films on chemi-\n\ncally heterogeneous substrates,” Phys. Rev. Lett. **84** , 931- 934 (2000).\n\n[116] M. Brinkmann and R. Lipowsky, “Wetting morphologies on substrates with striped surface domains,”\n\nJ. Appl. Phys. **92** , 4296- 4306 (2002).\n\n[117] L. Brusch, H. K¨uhne, U. Thiele, and M. B¨ar, “Dewetting of thin films on heterogeneous substrates:\n\nPinning vs. coarsening,” Phys. Rev. E **66** , 011602 (2002).\n\n[118] U. Thiele, L. Brusch, M. Bestehorn, and M. B¨ar, “Modelling thin-film dewetting on structured sub-\n\nstrates and templates: Bifurcation analysis and numerical simulations,” Eur. Phys. J. E **11** , 255- 271\n\n(2003).\n\n[119] U. Thiele, “Open questions and promising new fields in dewetting,” Eur. Phys. J. E **12** , 409- 416\n\n(2003).\n\n[120] D. M. Anderson, G. B. McFadden, and A. A. Wheeler, “Diffuse-interface methods in fluid mechan-\n\nics,” Ann. Rev. Fluid Mech. **30** , 139- 165 (1998).\n\n[121] U. Thiele, S. Madruga, and L. Frastia, “Decomposition driven interface evolution for layers of binary\n\nmixtures: I. Model derivation and stratified base states,” Phys. Fluids **19** , 122106 (2007).\n\n[122] O. A. Frolovskaya, A. A. Nepomnyashchy, A. Oron, and A. A. Golovin, “Stability of a two-layer\n\nbinary-fluid system with a diffuse interface,” Phys. Fluids **20** , 112105 (2008).\n\n[123] S. Madruga and U. Thiele, “Decomposition driven interface evolution for layers of binary mixtures:\n\nII. Influence of convective transport on linear stability,” Phys. Fluids **21** , 062104 (2009).\n\n33", - "page_start": 32, - "page_end": 32, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed12.pdf", - "query": "Why constraint made the scanning of the word's strongest man's upper body impossible using a MRI ?", - "target_page": 10, - "target_passage": "Despite using a wide-bore MRI scanner, due to the size of the WSM’s shoulders and arms, it was not possible to scan their upper body", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "3\n\nnature portfolio | reporting summary\n\nApril 2023\n\nMaterials & experimental systems\n\nn/a Involved in the study\n\nAntibodies\n\nEukaryotic cell lines\n\nPalaeontology and archaeology\n\nAnimals and other organisms\n\nClinical data\n\nDual use research of concern\n\nPlants\n\nMethods\n\nn/a Involved in the study\n\nChIP-seq\n\nFlow cytometry\n\nMRI-based neuroimaging\n\nMagnetic resonance imaging\n\nExperimental design\n\nDesign type Structural & Diffusion MRI\n\nDesign specifications No task-based fMRI used in this manuscript.\n\nBehavioral performance measures N/A; no performance metrics collected\n\nAcquisition\n\nImaging type(s) Structural\n\nField strength 3\n\nSequence & imaging parameters High-resolution anatomical scans were acquired using a T1-weighted (T1w) magnetization prepared rapid gradient echo\n\n(MPRAGE) sequence (TR = 2500 ms, TE = 2.31 ms, T1 = 934 ms, flip angle = 7°, 0.8 mm thickness) followed by a gradient\n\necho fieldmap (TR = 758 ms; TE1 = 4.92 ms; TE2 = 7.38 ms; flip angle = 60°). A T2-weighted (T2w) turbo spin echo (TSE)\n\nscan was also acquired with an oblique coronal orientation positioned orthogonally to the main axis of the hippocampus\n\n(TR/TE = 9860/50 ms, flip angle = 122°, 0.4 × 0.4 mm2 in-plane resolution, 2 mm slice thickness, 38 interleaved slices\n\nwith no gap, total acquisition time = 5:42 min).\n\nArea of acquisition T1-weighted and dMRI scans = whole-brain\n\nT2-weighted scan = high-resolution imaging of medial temporal lobe\n\nDiffusion MRI Used Not used\n\nParameters TR = 4300 ms, echo time = 100.2 ms, 139 directions, b-max = 4990, FoV = 259 x 259 mm, 78 slices, 1.7986 x 1.7986 x 1.8 mm voxel resolution\n\nPreprocessing\n\nPreprocessing software Gray Matter Volume & Cortical Thickness:\n\nAdvanced Normalization Tools (ANTs), version 2.1.0\n\nFreeSurfer, version 7\n\nT2-weighted MTL scans:\n\nAutomatic Segmentation of Hippocampal Subfields (ASHS), version 7/2018\n\nDiffusion imaging:\n\nQSIprep, version 0.15.3\n\nDSI Studio, version Chen-2022-07-31\n\nNormalization Normalization differed by modality due to inherent limitations of applicable processing pipelines.\n\nGray Matter Volume & Cortical Thickness:\n\nAll analyses were kept in native subject-space to limit the amount of warping and leverage the advantages of a precision\n\nimaging design.\n\nT2-weighted MTL scans:\n\nT2w images were registered to the segmentation template (see below) using ANTs deformable registration.\n\nDiffusion imaging:\n\nInitial preprocessing through QSIprep normalized diffusion images to the skull-stripped T1w images. Diffusion images were\n\nthen reconstructed in MNI space using DSI studio’s Q-space Diffeomorphic Reconstruction.", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed4.pdf" - }, - { - "text": "changes in response to functional overload/resistance\n\ntraining. For example, we previously found patellar ten-\n\ndon CSA to show very subtle changes after 15 wk (45 train-\n\ning sessions) of heavy resistance training [ þ 1.4% ( 41 )] and no differences between long-term resistance-trained indi-\n\nviduals and untrained controls ( 15 ).\n\n##### Limitations\n\nAlthough the current investigation provides a detailed\n\nassessment of an individual at/toward the upper limit of\n\nhuman strength performance, it is important to appreciate\n\nstudy limitations. First, the participant was not measured im-\n\nmediately before their World ’ s Strongest Man championship\n\nsuccess or other landmark performances, and it is entirely pos-\n\nsible the functional and structural characteristics we assessed\n\nmay have been even higher directly prior to peak performan-\n\nces. Despite using a wide-bore MRI scanner, due to the size of\n\nthe WSM ’ s shoulders and arms, it was not possible to scan their\n\nupper body. Thus, we were not able to investigate this aspect of\n\nthe WSM ’ s muscle morphology; although given that greater hy-\n\npertrophy occurs in the upper body compared with the lower\n\nbody ( 42 ), it is possible that the WSM ’ s upper-body muscle size\n\nrelative to untrained controls may have been even more pro-\n\nnounced than what we have documented for the lower body.\n\nIn the current study to provide the most representative data on\n\nuntrained control participants, the largest available untrained\n\ncontrol populations were used for each category of measure-\n\nments. Thus, different untrained control populations were\n\nused [e.g., comparison of quadricep and hamstring size ( n ¼ 102) vs. comparison of all the leg muscles ( n ¼ 11)], which led to some subtle discrepancies in the contrasts between these\n\ngroups and the WSM [e.g., quadriceps femoris/knee extensors,\n\nþ 127% and þ 99% relative to our large pooled ( n ¼ 102) and smaller ( n ¼ 11) untrained control samples, respectively]. Importantly, however, this discrepancy does not appear to\n\nmeaningfully affect the interpretation of the fi ndings. There\n\nwere subtle differences in the precise scanning and analysis\n\napproaches used with the reference populations featured in\n\nthis study, including 1 ) magnetic fi eld strength [1.5 T ( 10 , 11 , 15 )\n\nvs. 3.0 T, WSM and ( 13 , 14 )]; 2 ) the interslice distance used to\n\nquantify quadriceps femoris and hamstrings muscle volume\n\n[1.5 cm ( 10 , 11 , 14 ) vs. 2.0 cm, WSM and ( 13 )]; 3 ) the calculation\n\nof muscle volume [area under the cubic spline ACSA-muscle\n\nlength curve: ( 10 , 11 , 14 ) vs. the equation detailed earlier: WSM\n\nand ( 13 )]; and 4 ) the use of unilateral MRI measures derived\n\nfrom one limb ( 10 , 11 , 14 , 15 ) or collapsed across two limbs\n\n[WSM and ( 13 )]. However, it seems likely that these subtle dif-\n\nferences would have had at most a very minor effect on the\n\nfi ndings. Finally, it is also important to highlight that the differ-\n\nences documented between the WSM and comparative popula-\n\ntions for the various measures included in the current study\n\ncannot be assumed to be anything other than a combination of\n\nboth innate (genetic) and environmental (training and nutri-\n\ntion) factors.\n\n##### Conclusions\n\nIn conclusion, this novel investigation documented the\n\nmuscle and tendon morphology and whole body strength\n\nand power characteristics of an exceptionally strong individ-\n\nual, relative to comparative athletic, trained, and untrained\n\npopulations. Overall leg muscle volume of the WSM was\n\napproximately twice that of untrained controls but with pro-\n\nnounced anatomical variability in the extent of muscular de-\n\nvelopment. The plantar fl exor muscle group and the guy\n\nrope muscles (sartorius, gracilis, and semitendinosus: þ 140 to þ 202%), which stabilize the pelvis and femur, demon- strated the largest differences. The pronounced quadriceps\n\nfemoris size of the WSM (greater than or equal to twice that", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed12.pdf" - }, - { - "text": "segmentation pipeline automatically segmented the hippocampus in\n\nthe T2w MRI scans using a segmented population atlas, the Princeton\n\nYoung Adult 3T ASHS Atlas template <sup>68</sup> ( *n* = 24, mean age = 22.5 years).\n\nA rigid-body transformation aligned each T2w image to the respective\n\nT1w scan for each day. Using ANTs deformable registration, the T1w\n\nwas registered to the population atlas. The resulting deformation\n\nfields were used to resample the data into the space of the left and\n\nright template MTL ROI. Within each template ROI, each of the T2w\n\nscans of the atlas package was registered to that day’s T2w scan. The\n\nmanual atlas segmentations were then mapped into the space of the\n\nT2w scan, with segmentation of the T2w scan computed using joint\n\nlabel fusion <sup>69</sup> . Finally, the corrective learning classifiers contained in\n\nASHS were applied to the consensus segmentation produced by joint\n\nlabel fusion. The output of this step is a corrected segmentation of\n\nthe T2w scan. Further description of the ASHS protocol can be found\n\nhere <sup>67</sup> . T2w scans and segmentations were first visually examined using\n\nITK-SNAP <sup>70</sup> for quality assurance and then subjected to manual editing\n\nin native space using ITK-SNAP (v.3.8.0-b; C.M.T.). One session (scan\n\n15, third trimester) was discarded due to erroneous scan orientation.\n\nThe anterior extent of the segmented labels was anchored 4 mm (two\n\nslices) anterior to the appearance of the limen insulae, and the posterior\n\nextent was anchored to the disappearance of hippocampal gray matter\n\nfrom the trigone of the lateral ventricle. Boundaries between perirhinal,\n\nentorhinal and parahippocampal cortices were established in keeping\n\nwith the Olsen- Amaral- Palombo (OAP) segmentation protocol <sup>71</sup> . In\n\ninstances where automatic segmentation did not clearly correspond\n\nto the underlying neuroanatomy, such as when a certain label was\n\nmissing several gray matter voxels, manual retouching allowed for\n\nindividual voxels to be added or removed. All results are reported\n\nusing the manually retouched subregion volumes to ensure the most\n\nfaithful representation of the underlying neuroanatomy. Scans were\n\nrandomized and segmentation was performed in a random order,\n\nblind to pregnancy stage. To assess intrarater reliability for the pre-\n\nsent analyses, two days underwent manual editing a second time. The\n\ngeneralized Dice similarity coefficient <sup>72</sup> across subregions was 0.87\n\nand the intraclass correlation coefficient was 0.97, suggesting robust\n\nreliability in segmentation.\n\n*White matter microstructure* . Diffusion scans were preprocessed using\n\nthe automation software QSIprep (version 0.16.1) compiled using a\n\nsingularity container <sup>73</sup> and run primarily with the default parameters,\n\nwith the exceptions ‘- output resolution 1.8’, ‘- dwi denoise window 5′,\n\n- force-spatial-normalization’, ‘- hmc model 3dSHORE’, ‘- hmc-\n\ntransform Rigid’ and ‘- shoreline iters 2’. Twenty-three sessions were\n\npreprocessed and analyzed, with the remaining three scans excluded\n\ndue to missing DSI scans (sessions 9 and 15) or corresponding field map\n\nfor distortion correction (session 7). Despite passing QC assessments\n\nduring preprocessing, visual inspection of the field maps in session 10\n\nrevealed a slight artifact. However, removal of this session had minimal\n\nimpact on the overall results and remained in the final analyses. T1w\n\nimages were corrected for intensity nonuniformity (N4BiasFieldCorrec-\n\ntion) and skull-stripped (antsBrainExtraction). The images underwent\n\nspatial normalization and registration to the ICBM 152 Nonlinear Asym-\n\nmetric template. Finally, brain tissue segmentation of CSF, GM and WM\n\nwas performed on each brain-extracted T1w using FMRIB’s Automated\n\nSegmentation Tool (FAST). Preprocessing of diffusion images began by\n\nimplementing MP-PCA denoising with a 5-voxel window using MRtrix3’s", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed4.pdf" - }, - { - "text": "muscle size, patellar tendon CSA, and patellar tendon\n\nmoment arm of the WSM were compared with various popu-\n\nlations measured within our laboratory, as indicated in\n\nTable 1 , alongside participant descriptives ( 10 , 11 , 13 - 15 ). In\n\naddition, the IMTP and CMJ measures were compared with\n\nexisting published literature (included studies are summar-\n\nized in Supplemental Materials 1 and 2, alongside participant\n\ndescriptives).\n\n##### MRI Measurement of Muscle Tendon Unit Morphology\n\n##### and Moment Arm\n\nThe participant reported for their MRI scan [3.0-T\n\nDiscovery MR750W (70-cm-wide bore), GE Medical] having\n\nnot completed any strenuous physical activity in � 24 h and had received prior instruction to arrive in a relaxed state hav-\n\ning eaten and drunk normally. The participant sat quietly for\n\n15 min prior to their scan. The participant lay supine for the\n\nMRI scan of the lower-body musculature from T12 to the lat-\n\neral malleolus. A body coil (GE Medical) allowed axial T1-\n\nweighted images (time of repetition/time to echo 600/8.144\n\nms, image matrix 512 � 512, fi eld of view 500 � 500 mm, pixel size 0.9766 � 0.9766 mm, slice thickness 5 mm, and interslice gap 5 mm) to be acquired in fi ve overlapping\n\nblocks. Images of both sides of the body were acquired\n\nwithin a single scan for blocks 1 (T12 to pelvis), 4 (knee joint\n\nspace to midshank), and 5 (midshank to lateral malleolus).\n\nHowever, due to the size of the participant ’ s thighs, it was\n\nnecessary to scan each thigh individually for blocks 2 (pelvis\n\nto midthigh) and 3 (midthigh to knee joint space); this\n\ninvolved the radiographer repositioning the fi eld of view\n\nbetween scanning the fi rst and the second thigh but not\n\nphysically moving the coil or the participant. Oil- fi lled cap-\n\nsules were secured to the surface of the participant ’ s skin\n\nwith Transpore tape at intervals along the length of the lower\n\nbody prior to the scan and in an of fl ine analysis used to ver-\n\nify the alignment of the blocks (Horos software, Version 3.36,\n\n[https://horosproject.org/](https://horosproject.org/) ).\n\nThe of fl ine analysis was of the following muscles/com-\n\npartments ( Fig. 1 ): iliopsoas (psoas major and iliacus com-\n\nbined); sartorius; tensor fasciae latae; adductor magnus;\n\ngracilis; gluteus maximus; gluteus medius and minimus\n\n(combined, due to dif fi culty separating the two muscles);\n\nrectus femoris (RF); vastus lateralis (VL), medialis (VM), and\n\nintermedius (VI); semimembranosus (SM); semitendinosus\n\n(ST); biceps femoris long (BFlh) and short heads (BFsh); pop-\n\nliteus; lateral and medial gastrocnemius; soleus; and the an-\n\nterior, lateral, and deep posterior compartments of the\n\nshank. The anterior shank compartment consisted of the\n\n790", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "predictions of skeletal muscle mass nor dual-energy X-ray\n\nabsorptiometry provides detailed information on the size of\n\nspeci fi c individual muscles. Given the known importance of\n\nmuscle size as a determinant of muscular strength ( 9 - 11 ), pro-\n\nnounced muscle size seems likely to be critical to extreme\n\nhuman strength; however, the speci fi c muscle size of\n\nextremely strong individuals remains unknown. Similarly, a\n\nlarge moment arm (e.g., of the patella tendon at the knee joint)\n\ncould contribute to the expression of high muscular strength\n\n( 10 , 12 ), and a large tendon may mitigate the mechanical stress\n\nit experiences with very high muscular loads, and therefore,\n\nthese characteristics may also be expected in individuals\n\nselected for exceptional strength.\n\nIn this paper, we present the fi ndings from a unique op-\n\nportunity to examine the laboratory function, muscle size,\n\nand distribution of muscle mass, as well as patellar tendon\n\nsize and moment arm, of a World ’ s Strongest Man and dead-\n\nlift champion (WSM) in comparison with existing data on\n\nuntrained individuals, power athletes (100-m-track sprint-\n\ners), and long-term resistance-trained populations that we\n\nhave assessed previously ( 10 , 11 , 13 - 15 ).\n\n#### MATERIALS AND METHODS\n\n##### Participant\n\nThe WSM ’ s achievements included one World ’ s Strongest\n\nMan title (14 mo prior to measurement), fi ve Britain ’ s\n\nStrongest Man titles (the most recent 6 mo prior to measure-\n\nment), twice being World Deadlift Champion and Deadlift\n\nWorld Record holder (500 kg; at the time of measurement),\n\nand second place at Europe ’ s Strongest Man. Prior to agreeing\n\nto participate, the purpose of the research study and the test-\n\ning procedures were explained to the participant along with\n\nthe risks and bene fi ts of taking part. The participant gave his\n\nwritten informed consent to participate in the study that was\n\napproved by the Loughborough University Ethical Advisory\n\nCommittee (Ethics Number R18-P090). Included in the writ-\n\nten consent was a statement providing permission for publi-\n\ncation of the collected data and the likelihood that their\n\nidentity may be evident based on their achievements and\n\ncharacteristics, despite anonymization.\n\n##### Training History\n\nThe WSM had been continuously involved in systematic,\n\nregular upper- and lower-body resistance training for 15 yr at\n\nthe time of testing. In the 12 mo prior to testing, the partici-\n\npant ’ s resistance training consisted of the following typical\n\nexercises: lower body: squats, deadlifts, leg press, and knee\n\nextension; and upper body: bench press, shoulder press,\n\ndumbbell/barbell rows, and lat pull-down. The proportion of\n\nthe participant ’ s training within the following repetition\n\nranges over the last 12 mo was as follows: near maximum\n\nloads [1 - 5 repetition maximum (RM)]: 10%; heavy loads (6 -\n\n14 RM): 80%; and moderate loads ( � 15 RM): 10%. The partici- pant reported only occasional ( < 1 � /week) use of advanced resistance training practices (i.e., complex training and ac-\n\ncommodating resistance method) but frequently ( > 3 � / week) executed training repetitions with the intention to\n\nmove the load as fast as possible. The WSM ’ s nutritional\n\nsupplement consumption included protein, branched-chain\n\namino acids, and electrolytes.\n\n##### Overview\n\nThe WSM reported for a single test session that involved\n\nthe following assessments (listed in order): axial T1 weighted\n\n3.0-T MRI scans from T12 to the lateral malleolus [to assess\n\nmuscle size throughout the lower body (left and right sides)],\n\naxial and sagittal T1-weighted MRI scans of both knees [to\n\nassess patellar tendon cross-sectional area (CSA) and patellar\n\ntendon moment arm], maximum countermovement jumps\n\n(CMJ), and maximum isometric midthigh pulls (IMTPs). The\n\nmuscle size, patellar tendon CSA, and patellar tendon\n\nmoment arm of the WSM were compared with various popu-\n\nlations measured within our laboratory, as indicated in", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "**Endocrine procedures**\n\nThe participant underwent a blood draw ( *n* = 19; Fig. 1c ) before\n\nMRI scanning. Sex steroid concentrations were determined via\n\nultra-sensitive liquid chromatography- mass spectrometry at the\n\nBrigham and Women’s Hospital Research Assay Core (BRAC). Assay\n\nsensitivities, dynamic range and intra-assay coefficients of variation\n\nwere as follows: estradiol—1.0 pg ml <sup>−1</sup> , 1- 500 pg ml <sup>−1</sup> , <5% relative s.d.\n\n(RSD); progesterone—0.05 ng ml <sup>−1</sup> , 0.05- 10 ng ml <sup>−1</sup> , 9.33% RSD. Sero-\n\nlogical samples were not acquired in five sessions due to scheduling\n\nconflicts with UC Irvine’s Center for Clinical Research.\n\n**MRI acquisition .** MRI scanning sessions at the University of Califor-\n\nnia, Santa Barbara and Irvine were conducted on 3T Prisma scanners\n\nequipped with 64-channel phased-array head/neck coil (of which 50\n\ncoils are used for axial brain imaging). High-resolution anatomical scans\n\nwere acquired using a T1-weighted (T1w) magnetization prepared rapid\n\ngradient echo (MPRAGE) sequence (repetition time (TR) = 2,500 ms,\n\ntime to echo (TE) = 2.31 ms, inversion time (TI) = 934 ms, flip angle = 7°,\n\n0.8 mm thickness) followed by a gradient echo field map (TR = 758 ms,\n\nTE1 = 4.92 ms, TE2 = 7.38 ms, flip angle = 60°). A T2-weighted (T2w)\n\nturbo spin echo scan was also acquired with an oblique coronal orienta -\n\ntion positioned orthogonally to the main axis of the hippocampus (TR/\n\nTE = 9,860/50 ms, flip angle = 122°, 0.4 × 0.4 mm <sup>2</sup> in-plane resolution,\n\n2-mm slice thickness, 38 interleaved slices with no gap, total acquisi-\n\ntion time = 5 min and 42 sec). The Diffusion Spectrum Imaging (DSI)\n\nprotocol sampled the entire brain with the following parameters:\n\nsingle phase, TR = 4,300 ms, echo time = 100.2 ms, 139 directions,\n\n*b* -max = 4,990, FoV = 259 × 259 mm, 78 slices, 1.7986 × 1.7986 × 1.8 mm\n\nvoxel resolution. These images were linearly registered to the\n\nwhole-brain T1w MPRAGE image. A custom foam headcase was used\n\nto provide extra padding around the head and neck, as well as to mini-\n\nmize head motion. Additionally, a custom-built sound-absorbing foam\n\ngirdle was placed around the participant’s waist to attenuate sound\n\nnear the fetus during second-trimester and third-trimester scanning.\n\n**Image processing .** *Cortical volume and thickness* . CT and GMV were\n\nmeasured with Advanced Normalization Tools <sup>54</sup> version 2.1.0 (ANTs).\n\nWe first built a subject-specific template (SST) (antsMultivariateTem-\n\nplateConstruction2) and tissue priors (antsCookTemplatePriors)\n\nbased on our participant’s two preconception whole-brain T1-weighted\n\nscans to examine neuroanatomical changes relative to the participant’s\n\nprepregnancy baseline. We used labels from the OASIS population\n\ntemplate, provided by ANTs, as priors for this step. For each session,\n\nthe structural image was processed and registered to the SST using the\n\nANTs CT pipeline (antsCorticalThickness). This begins with an N4 bias\n\nfield correction for field inhomogeneity, then brain extraction using a\n\nhybrid registration/segmentation method <sup>55</sup> . Tissue segmentation was\n\nperformed using Atropos <sup>54</sup> to create tissue masks of CSF, gray matter,\n\nwhite matter and deep gray matter. Atropos allows prior knowledge\n\nto guide the segmentation algorithm, and we used labels from our SST\n\nas priors to minimize warping and remain in native participant space.\n\nCT measurements were then estimated using the DiReCT algorithm <sup>56</sup> ,\n\nwhich estimates the gray- white matter interface and the gray mat-\n\nter- CSF interface and computes a diffeomorphic mapping between\n\nthe two interactions, from which thickness is derived. Each gray matter\n\ntissue mask was normalized to the template and multiplied to a Jaco-\n\nbian image that was computed via affine and nonlinear transforms.\n\nUsing MATLAB (version 2022a), summary, regional-level estimates", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "To evaluate the effectiveness of such a defense against our attack, we compare the perplexity values of original and confounded queries. Figure 5 presents histograms of perplexity values for both the original evaluated GSM8K queries and their corresponding confounded versions, generated using one of the confounder gadgets, sampled uniformly at random. Additionally, the figure displays the ROC curve for the defense that detects confounded queries by checking if their perplexity exceeds a threshold. As can be seen, the confounded queries exhibit significantly higher perplexity values, making them readily distinguishable from the original queries. For instance, in the case of the *R* *SW* router, setting the threshold value at 55 yields a false-positive rate of 3% and a true-positive rate of 97% . Results are similar for other gadgets and benchmarks and were omitted due to space constraints.\n\nUnfortunately, this defense can be evaded if an adversary incorporates a perplexity constraint into the gadget generation process. To demonstrate the feasibility of this evasion strategy, we modify gadget generation to maximize the score of the routing algorithm *R* and simultaneously aligning the the gadget’s perplexity to some predefined perplexity value. In more detail, in each iteration *t* *∈* [ *T* ] , we uniformly sample a target index *j* *∈* [1 *, n* ] and generate a set *B* of *B* + 1 candidates as explained in Section 4. We then modify Eq. 1 such that we now find the candidate that maximizes the difference between the router’s score and the perplexity constraint for the confounder:\n\n*c* <sup>(</sup> *<sup>t</sup>* <sup>+1)</sup> *←* arg max *c* *∈B* � *S* *θ* ( *c* *∥* *x* *i* ) *−* *α* *· |* PPL ( *c* ) *−* *ρ* *|* � *,*\n\n14", - "page_start": 13, - "page_end": 13, - "source_file": "arxiv1.pdf" - }, - { - "text": "It is important to distinguish between strength and stiffness. Strength is simply the resistance to load while stiffness is the resist- ance to deflection or deformation. While strength and stiffness are related, it is necessary to appreciate that adequate structural strength does not automatically provide adequate stiff- ness. Thus, special consideration is necessary to provide the structural components with specific stiffness characteristics to prevent un- desirable aeroelastic effects during normal operation. An obvious solution to the apparent prob- lems of static strength, fatigue strength, stiffness and rigidity would be to build the airplane like a product of an anvil works, capable of withstanding all conceivable loads. However, high performance airplane con- figurations cannot be developed with inefi- cient, lowly stressed structures. The effect of additional weight is best illustrated by pre- liminary design studies of a very long range, high altitude bomber. In the preliminary phases of design, each additional pound of any weight would necessitate a 25-pound increase in gross weight to maintain the same performance. An increase in the weight of any item produced a chain reaction-more fuel, larger tanks, bigger engines, more fuel, heavier landing gear, more fuel, etc. In the competitive sense of design, no additional structural weight can be tolerated to provide more strength than is specified as necessary for the design mission requirement.\n\nAIRCRAFT LOADS AND OPERATING\n\nLIMITATIONS\n\nFLIGHT LOADS-MANEUVERS AND GUSTS\n\nThe loads imposed on an aircraft in flight are the result of maneuvers and gusts. The maneuver loads may predominate in the design of fighter airplanes while gust loads may predominate in the design of the large multiengine aircraft. The maneuver loads an\n\nNAVWEPS 00-EOT-80 OPERATING STRENGTH LIMITATIONS\n\nairplane may encounter depend in great part on the mission type of the airplane. However, the maximum maneuvering capability is of interest because of the relationship with strength limits. The flight load factor is defined as the pro- portion between airplane lift and weight, where\n\nn=L/W n= load factor L=lift, Ibs. W= weight, Ibs.\n\nMANEUVERING LOAD FACTORS. The maximum lift attainable at any airspeed occurs when the airplane is at CLmU. With the use\n\nof the basic lift equation, this maximum lift is expressed as:\n\nSince maximum lift must be equal to the weight at the stall speed,\n\nIf the effects of compressibility and viscosity\n\non Ch are neglected for simplification, the\n\nmaximum load factor attainable is determined by the following relationship.\n\nv.2 =(-) V*\n\nThus, if the airplane is flying at twice the stall speed and the angle of attack is increased to obtain maximum lift, a maximum load factor of four will result. At three times the stall speed, nine “g’s” would result; four times the stall speed, sixteen g’s result; five times the stall speed, twenty-five g’s result; etc. Therefore, any airplane which has high speed performance may have the capability of high maneuvering load factors. The airplane which is capable of flight speeds that are\n\n331", - "page_start": 348, - "page_end": 348, - "source_file": "00-80T-80.pdf" - }, - { - "text": "of interest. *Neuroimage* **31** , 968- 980 (2006).\n\n63. Fischl, B. et al. Whole brain segmentation: automated labeling\n\nof neuroanatomical structures in the human brain. *Neuron* **33** ,\n\n341- 355 (2002).\n\n64. Esteban, O. et al. MRIQC: advancing the automatic prediction\n\nof image quality in MRI from unseen sites. *PLoS ONE* **12** , e0184661\n\n(2017).\n\n65. Esteban, O. et al. MRIQC Web-API: crowdsourcing image quality\n\nmetrics and expert quality ratings of structural and functional\n\nMRI. Preprint at *bioRxiv* [https://doi.org/10.1101/216671](https://doi.org/10.1101/216671) (2017).\n\n66. Rosen, A. F. et al. Quantitative assessment of structural image\n\nquality. *Neuroimage* **169** , 407- 418 (2018).\n\n67. Yushkevich, P. A. et al. Automated volumetry and regional\n\nthickness analysis of hippocampal subfields and medial temporal\n\ncortical structures in mild cognitive impairment. *Hum. Brain*\n\n*Mapp.* **36** , 258- 287 (2015).\n\n68. Aly, M. & Turk-Browne, N. B. Attention stabilizes representations in\n\nthe human hippocampus. *Cereb. Cortex* **26** , 783- 796 (2016).\n\n69. Wang, H. et al. Multi-atlas segmentation with joint label fusion.\n\n*IEEE Trans. Pattern Anal. Mach. Intell.* **35** , 611- 623 (2013).\n\n70. Yushkevich, P. A. et al. User-guided 3D active contour\n\nsegmentation of anatomical structures: significantly improved\n\nefficiency and reliability. *Neuroimage* **31** , 1116- 1128 (2006).\n\n71. Palombo, D. J. et al. KIBRA polymorphism is associated with\n\nindividual differences in hippocampal subregions: evidence from\n\nanatomical segmentation using high-resolution MRI. *J. Neurosci.*\n\n**33** , 13088- 13093 (2013).\n\n72. Crum, W. R., Camara, O. & Hill, D. L. Generalized overlap\n\nmeasures for evaluation and validation in medical image analysis.\n\n*IEEE Trans. Med. Imaging* **25** , 1451- 1461 (2006).\n\n73. Cieslak, M. et al. QSIPrep: an integrative platform for\n\npreprocessing and reconstructing diffusion MRI data. *Nat.*\n\n*Methods* **18** , 775- 778 (2021).\n\n74. Yeh, F. C., Badre, D. & Verstynen, T. Connectometry: a statistical\n\napproach harnessing the analytical potential of the local\n\nconnectome. *Neuroimage* **125** , 162- 171 (2016).\n\n75. Yeh, F. C. & Tseng, W. Y. I. NTU-90: a high angular resolution brain\n\natlas constructed by q-space diffeomorphic reconstruction.\n\n*Neuroimage* **58** , 91- 99 (2011).\n\n76. Wood, S. N. *Generalized Additive Models: An Introduction With R,*\n\n*Second Edition* (Chapman and Hall/CRC, 2017).\n\n77. Sullivan, K. J., Shadish, W. R. & Steiner, P. M. An introduction to\n\nmodeling longitudinal data with generalized additive models:\n\napplications to single-case designs. *Psychol. Methods* **20** ,\n\n26- 42 (2015).\n\n78. Yeh, F. C., Verstynen, T. D., Wang, Y., Fernández-Miranda, J. C. &\n\nTseng, W. Y. I. Deterministic diffusion fiber tracking improved by\n\nquantitative anisotropy. *PLoS ONE* **8** , e80713 (2013).\n\n79. Jovicich, J. et al. Brain morphometry reproducibility in\n\nmulti-center 3T MRI studies: a comparison of cross-sectional and\n\nlongitudinal segmentations. *Neuroimage* **83** , 472- 484 (2013).\n\n80. Hedges, E. P. et al. Reliability of structural MRI measurements: the\n\neffects of scan session, head tilt, inter-scan interval, acquisition\n\nsequence, FreeSurfer version and processing stream. *Neuroimage*\n\n**246** , 118751 (2022).\n\n**Acknowledgements** The authors would like to thank M. Mendoza for his phlebotomy\n\nand MRI assistance at the UCSB Brain Imaging Center; C. Stark and\n\nR. Tain for MRI assistance at the UCI Facility for Imaging and Brain", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed4.pdf" - }, - { - "text": "**Methods**\n\n**Participant**\n\nOur participant (E.R.C.) was a healthy 38-year-old primiparous woman\n\nwho underwent in-vitro fertilization (IVF) to achieve pregnancy. Pre-\n\nvious studies reported no observable differences in neural changes\n\nfrom prepregnancy to postpregnancy between women who conceived\n\nnaturally versus women who conceived via IVF <sup>13</sup> , and doing so provides\n\na controlled way of monitoring pregnancy status. The participant\n\nexperienced no pregnancy complications (for example, gestational\n\ndiabetes and hypertension), delivered at full term via vaginal birth,\n\nnursed through 16 months postpartum, and had no history of neu-\n\nropsychiatric diagnosis, endocrine disorders, prior head trauma or\n\nhistory of smoking. The participant gave written informed consent and\n\nthe study was approved by the University of California, Irvine Human\n\nSubjects Committee.\n\n**Study design**\n\nThe participant underwent 26 MRI scanning sessions from 3 weeks\n\nbefore conception through 2 years postpartum (162 weeks), during\n\nwhich high-resolution anatomical and diffusion spectrum imaging\n\nscans of the brain were acquired. Scans were distributed throughout\n\nthis period, including prepregnancy (four scans), first trimester (four\n\nscans), second trimester (six scans), third trimester (five scans) and\n\npostpartum (seven scans; Fig. 1c ). The first 6 sessions took place at\n\nthe UCSB Brain Imaging Center (BIC), the final 20 sessions took place\n\nat the UCI Facility for Imaging and Brain Research (FIBRE). The major-\n\nity of scans took place between 9 AM and 2 PM, limiting significant\n\nAM- PM fluctuations <sup>49</sup> . The MRI protocol, scanner (Siemens 3T Prisma)\n\nand software (version MR E11) were identical across sites. Each scan-\n\nner was checked weekly for the duration of the study and passed all\n\nQC reports indicating no significant alterations in the geometry. To\n\nensure the robustness of the findings, after the final study session, the\n\nparticipant completed back-to-back validation scans at UCI and UCSB\n\nwithin a 12-h window to assess reliability between scanners. Intraclass\n\ncorrelation coefficients (two-way, random effects, absolute agreement,\n\nsingle rater) reveal ‘excellent’ test- retest reliability between scanners,\n\nincluding ROI-level GMV (ICC = 0.97, 95% CI: 0.80- 0.99), ROI-level\n\nCT (ICC = 0.96, 95% CI: 0.90- 0.98), MTL subfield volume (ICC = 0.99,\n\n95% CI: 0.97- 0.99) and ROI-level QA (ICC = 0.94, 95% CI: 0.91- 0.97).\n\nFurthermore, when examining the relationship between gestation\n\nweek and GMV among UCI-only gestational sessions, findings were\n\nconsistent (Supplementary Fig. 12), indicating that site differences\n\nare highly unlikely to have contributed meaningfully to the observed\n\neffects. Although not applicable here, we note that having a control\n\nparticipant scanned over a similar duration within the same scanner is\n\ncritical for estimating how much variation in the brain can be attributed\n\nto within-scanner variability.\n\nTo monitor state-dependent mood and lifestyle measures, the\n\nfollowing scales were administered on each experiment day: Perceived\n\nStress Scale <sup>50</sup> , Pittsburgh Sleep Quality Index <sup>51</sup> , State-Trait Anxiety\n\nInventory for Adults <sup>52</sup> and Profile of Mood States <sup>53</sup> . Correlation analy-\n\nses between state-dependent measures, summary brain metrics and\n\ngestation week revealed little to no relationships. The only exception\n\nto this was a moderate negative association between global QA and\n\nstate anxiety (Spearman’s correlation ( *ρ* ) = −0.65, *q* = 0.04; baseline—36\n\nweeks, *n* = 16). By making this data openly accessible, we encourage a\n\nmore nuanced approach toward exploring mood and lifestyle measures\n\nin relation to brain changes over pregnancy.\n\n**Endocrine procedures**\n\nThe participant underwent a blood draw ( *n* = 19; Fig. 1c ) before\n\nMRI scanning. Sex steroid concentrations were determined via", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed13.pdf", - "query": "What is typical age at which multiple sclerosis is diagnosed ?", - "target_page": 2, - "target_passage": "Multiple sclerosis (MS) is a progressive inflammatory disease of the central nervous system (CNS) that is typically diagnosed at 30– 40 years of ag", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Figure 11: Number of recent (within two years) OCU initiates presenting to treatment in 2005 and 2013, by age of individual at first presentation.**\n\nThe mode age of initiation has shifted from around 18 to around 25 and there is an older age profile throughout. Rises in average age of initiation have also been reported recently in cohorts of Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible explanations.\n\n- There is a genuine shift towards new initiates being older, and for them to present to treatment much faster than in previous years.\n\n- There is a consistent, but small number of individuals who mis-report their age of onset when attending treatment i.e. who report that they have only been using opiates/crack for a short period when in fact they have been using for a far longer period, and that this is starting to really bias the numbers for recent cohorts because attendees from the original epidemic are becoming smaller.\n\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of older initiates, although mis-reporting may also explain that phenomenon. Either way though, as this analysis has made clear throughout, absolute numbers of new OCUs appear to be small - probably fewer than 10,000 per annum and the numbers of those involved with crime will be smaller still. In addition, despite a flattening in the probable trend in new users, there is currently no sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to resume, though clearly it remains important to monitor the situation.", - "page_start": 28, - "page_end": 28, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "bronchial challenge testing into a case fi nding strategy\n\nidenti fi ed asthma in 26% of symptomatic individuals\n\nwho had normal spirometry and no response to BD. <sup>27</sup>\n\nIndividuals with undiagnosed respiratory symptoms,\n\ndetermined to have asthma or COPD through spirometry, experience poor health status. <sup>28</sup> Therefore,\n\nthe implementation of known treatment approaches for\n\nasthma or COPD is important to improve their conditions. <sup>29</sup> In contrast, those with normal spirometry\n\nor PRISm face unclear treatment approaches. Long-\n\nacting BD therapy in symptomatic individuals with\n\ntobacco exposure with normal spirometry is not effective. <sup>30</sup> Weight management programs may be useful\n\nfor individuals who are obese with PRISm-related\n\ndyspnea; however, this awaits de fi nitive clinical trials. <sup>31</sup>\n\nDyspnea was severe and prevalent within our study\n\ngroup; however, it remained undiagnosed. A study conducted by Stefan et al <sup>32</sup> revealed that physicians\n\nunderestimated their patients ’ dyspnea 37.9% of the\n\ntime, whereas nurses underestimated it 3.5% of the time.\n\nMoreover, many patients limit their physical activities,\n\nwhich lead them to downplay the extent of their dyspnea. <sup>19</sup> Patient underreporting of symptoms, coupled\n\nwith inadequate physician-led investigations of\n\nsymptoms, may explain why dyspnea often goes\n\nundiagnosed in the population. <sup>33</sup>\n\nIn conclusion, our study measured dyspnea impact in\n\nindividuals with no preexisting diagnosis of lung disease\n\nwho reported respiratory symptoms as part of a\n\npurposeful case fi nding strategy. Individuals with PRISm\n\nexhibited the greatest impact of dyspnea, even higher\n\nthan those newly diagnosed with asthma or COPD.\n\nAfter adjusting for patient factors, comorbidities,\n\npulmonary diseases, and severity of lung physiologic\n\nimpairment, most of the variability in dyspnea remained\n\nunexplained. We also showed that dyspnea was\n\nassociated with increased health care utilization,\n\nimpaired quality of life, and work productivity.\n\n### Funding/Support\n\nThis study is supported by the Canadian Institutes of\n\nHealth Research [FDN Grant 154322].\n\n### Financial/Non fi nancial Disclosures\n\nNone declared.\n\n### Acknowledgments\n\nAuthor contributions: S. D. A. and G. A. W.\n\ncontributed to conception and design. J. B., E.\n\nG., G. A. W., K. L. V., and S. D. A.\n\ncontributed to analysis and interpretation. J.\n\nB., E. G., G. A. W., K. L. V., S. D. A., C. B., C.\n\nL., L.-P. B., A. C., E. P., S. K. F., S. G., R. A.\n\nM., I. M., M. B., P. H., M. D. L., M. A., C. J. L.,\n\nT. A., N. E., G. G. A., and S. M. contributed to\n\ndrafting the manuscript for important\n\nintellectual content. All authors had access to\n\nand participated in the interpretation of the\n\ndata and provided input into the preparation\n\nand submission of the manuscript. The\n\nauthors vouch for the accuracy and\n\ncompleteness of the data.\n\nRole of sponsors: The sponsor had no role in\n\nthe design of the study, the collection and\n\nanalysis of the data, or the preparation of the\n\nmanuscript.\n\nOther contributions: We thank the\n\nfollowing individuals from the Canadian\n\nstudy sites: Ottawa Hospital Research\n\nInstitute, Ottawa, Ontario: Taylor Poulin;\n\nSusan Deveau, RRT; Victoria Thompson;\n\nMeredith McCleery; Angelina Tohme; Vicky\n\nPanteleakos, RRT; Geneviève Longtin, RRT;\n\nJoanne Cassidy, RRT; Amanda Bergeron,\n\nMSc; Jennifer Biggs, RN; Jessica Bergeron;\n\nand Elisabet White; Vancouver General\n\nHospital, Vancouver, British Columbia:\n\nShelley Abercromby, BSc; Jana Caine; David\n\nSavage; Natasha Verzosa; Ravneet Mahal; and\n\nMary Justine Angeles; Queen Elizabeth II\n\nHealth Sciences Centre, Halifax, NS: Scott\n\nFulton, RRT; Hôpital du Sacré Coeur de\n\nMontréal, Montréal, QC: Simone Chaboillez,\n\nMT; and Meliza Benabdallah; St. Joseph ’ s\n\nHamilton, Hamilton, ON: Liz Johnson; St.\n\nBoniface Hospital, Winnipeg, MB: Cheryl\n\nNoble, RN; Institut Universitaire de", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Dyspnea refers to a subjective sensation of breathing discomfort. <sup>1</sup> In a study involving a community-based\n\npopulation aged > 70 years, the prevalence of dyspnea was found to be 32%. <sup>2</sup> Dyspnea can lead to limitations in\n\ndaily activities, reduced exercise tolerance, and\n\nheightened mortality risks. <sup>3</sup>\n\nDyspnea not only affects individuals with diagnosed\n\nrespiratory conditions but also poses a signi fi cant\n\nburden on those with undiagnosed conditions. In a systematic review by Müller et al, <sup>4</sup> the combined\n\nprevalence of dyspnea in the adult general population\n\nacross 11 studies was estimated to be 10%. Dyspnea can\n\narise from a broad spectrum of underlying factors,\n\nincluding both respiratory and nonrespiratory\n\nconditions. Studies have revealed that dyspnea is not\n\nsolely attributable to respiratory conditions but is also\n\nheavily in fl uenced by cardiovascular deconditioning and\n\nby nonrespiratory factors, including psychosocial, social,\n\nand environmental determinants. <sup>5</sup> <sup>,</sup> <sup>6</sup>\n\nDyspnea is a prevalent symptom with consequences that\n\nextend beyond its physiologic implications. A study in\n\nEuropean patients with COPD explored the burden of\n\ndyspnea and identi fi ed potential correlates. The study\n\nrevealed that higher dyspnea impact correlated with\n\nlower health-related quality of life, increased work\n\nimpairment, and a higher frequency of emergency\n\ndepartment visits. <sup>7</sup>\n\nThe three objectives of our study were as follows: (1) to\n\nevaluate the impact of dyspnea in adults from the\n\ngeneral population who had no prior diagnosis of\n\nrespiratory disease but who reported having signi fi cant\n\nrespiratory symptoms in the past 6 months; (2) to\n\nidentify associated risk factors for dyspnea and estimate\n\ntheir in fl uence on the symptom; and (3) to explore the\n\nrelationship between dyspnea and health care utilization,\n\nquality of life, and work productivity in adults with\n\nundiagnosed respiratory symptoms.\n\n### Study Design and Methods\n\n#### Recruitment of Undiagnosed Cases and Healthy\n\nControl Patients\n\nBetween June 2017 and January 2023, adults aged $ 18\n\nyears were recruited through a two-step process into the\n\nUndiagnosed COPD and Asthma Population (UCAP) study, a multicenter case fi nding study. Approval for\n\nthe study was obtained from the research ethics boards\n\nof the 17 participating study sites across Canada.\n\nInformed, written consent was provided by all study\n\nparticipants.\n\nBoth landlines and cellphones within a 90-minute radius\n\nof any of the 17 study sites were dialed randomly. A\n\nTake-home Points\n\nStudy Question: How profoundly are adults with\n\nundiagnosed respiratory symptoms affected by\n\ndyspnea?\n\nResults: In community-based adults with undiag-\n\nnosed respiratory symptoms, those identi fi ed with\n\npreserved ratio impaired spirometry experienced the\n\ngreatest impact of dyspnea, followed by those with\n\nundiagnosed asthma or COPD. Greater dyspnea\n\nimpact was associated with increased health care\n\nutilization, lower quality of life, and reduced work\n\nproductivity.\n\nInterpretation: Dyspnea imposes burdens on the\n\nhealth care system and is associated with impaired\n\nquality of life and work productivity.\n\nABBREVIATIONS: ASQ = Asthma Screening Questionnaire; BD =\n\nbronchodilator; CAT = COPD Assessment Test; PCA = principal\n\ncomponent analysis; PRISm = preserved ratio impaired spirometry;\n\nSGRQ = St. George ’ s Respiratory Questionnaire\n\nAFFILIATIONS: From The Ottawa Hospital Research Institute (J. B., E.\n\nG., K. L. V., G. G. A., S. M., and S. D. A.), University of Ottawa,\n\nOttawa, ON; the Desautels Faculty of Management (G. A. W.), McGill\n\nUniversity, Montreal, QC; the Department of Medicine (C. B.), The\n\nUniversity of British Columbia, Vancouver, BC; the Centre de\n\nrecherche (L.-P. B. and A. C.), Institut de cardiologie et de pneumo-\n\nlogie de Québec, Université Laval, Quebec, QC; the Cumming School", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "7. Kalb R, Brown TR, Coote S, Costello K, Dalgas U, Garmon E, et al. Exercise and\n\nlifestyle physical activity recommendations for people with multiple sclerosis\n\nthroughout the disease course. Mult Scler . (2020) 26(12):1459 - [69. doi: 10.1177/](https://doi.org/10.1177/1352458520915629)\n\n[1352458520915629](https://doi.org/10.1177/1352458520915629)\n\n8. Moreno-Navarro P, Manca A, Martinez G, Ventura L, Barbado D, Vera-García FJ,\n\net al. Test-retest reliability and known-groups validity of trunk muscle tests in people\n\nwith multiple sclerosis: a cross-sectional, case-control study. Phys Ther . (2021) 101\n\n(5):1 - [9. doi: 10.1093/ptj/ptzab049](https://doi.org/10.1093/ptj/ptzab049)\n\n9. Raats J, Arntzen EC, Lamers I, Feys P, Normann B. What is the distribution of\n\ntrunk impairments and its relationship with disability level in individuals with\n\nmultiple sclerosis? Mul Scler Relat Disord [. (2021) 57:103325. doi: 10.1016/j.msard.](https://doi.org/10.1016/j.msard.2021.103325)\n\n[2021.103325](https://doi.org/10.1016/j.msard.2021.103325)\n\n10. Normann B, Arntzen EC. What are the relationships between trunk control,\n\nbalance and walking in individuals with multiple sclerosis with minor to moderate\n\ndisability? Eur J Physiother . (2021) 23(6):377 - [83. doi: 10.1080/21679169.2020.1772870](https://doi.org/10.1080/21679169.2020.1772870)\n\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the\n\nrelationship between trunk motor control and balance, functional mobility, and gait\n\ncapacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor\n\nkontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin\n\nincelenmesi. Türk Nöroloji Dergisi [. (2021) 27(3):283. doi: 10.4274/tdn.2021.41017](https://doi.org/10.4274/tdn.2021.41017)\n\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple\n\nsclerosis: a review and content analysis of qualitative research identifying perceived\n\ndeterminants and consequences. Disabil Rehabil . (2016) 38(13):1227 - [42. doi: 10.](https://doi.org/10.3109/09638288.2015.1077397)\n\n[3109/09638288.2015.1077397](https://doi.org/10.3109/09638288.2015.1077397)\n\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing\n\nsensorimotor function, physical activity and employment for people with MS — a\n\nfeasibility study. Fysioterapeuten . (2023) 90(1):32 - 42. doi: [10.52705/](https://doi.org/10.52705/c14a8ca05f7546dabc18bd0275cf2edd)\n\n[c14a8ca05f7546dabc18bd0275cf2edd](https://doi.org/10.52705/c14a8ca05f7546dabc18bd0275cf2edd)\n\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based,\n\nindividualized, comprehensive core stability and balance intervention provides\n\nimmediate and long-term improvements in walking in individuals with multiple\n\nsclerosis: a randomized controlled trial. Physiother Res Int . (2019) 25(1):e1798.\n\n[doi: 10.1002/pri.1798](https://doi.org/10.1002/pri.1798)\n\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Group-\n\nbased individualized comprehensive core stability intervention improves balance in\n\npersons with multiple sclerosis: a randomized controlled trial. Phys Ther . (2019) 99\n\n(8):1027 - [38. doi: 10.1093/ptj/pzz017](https://doi.org/10.1093/ptj/pzz017)\n\n16. Arntzen EC, Øberg GK, Gallagher S, Normann B. Group-based, individualized\n\nexercises can provide perceived bodily changes and strengthen aspects of self in\n\nindividuals with MS: a qualitative interview study. Physiother Theory Pract . (2019)\n\n37(10):1080 - [95. doi: 10.1080/09593985.2019.1683923](https://doi.org/10.1080/09593985.2019.1683923)\n\n17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The\n\nimportance of the patient ’ s perspective in decision-making in multiple sclerosis:\n\nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord . (2023)\n\n[75:104757. doi: 10.1016/j.msard.2023.104757](https://doi.org/10.1016/j.msard.2023.104757)", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed13.pdf" - }, - { - "text": "Even in the **short period between 2013 and 2018** (the period covered by these pilot statistics) the data\n\nshow an overall decline and a decline of several relevant occupational diseases. The strongest decrease\n\n— practically a halving — can be seen for hearing impairments (diseases of the inner ear).\n\nPneumoconiosis, mesothelioma and selected occupational cancers went down between 7% and 14%.\n\n**Asthma and some recognised MSDs** are more or less stagnating, probably due to unchanged\n\nexposure to biological or chemical substances and no change regarding the health outcomes of\n\nergonomic working conditions.\n\nIf work is **one of some** causative factors, a clear assignment of work to a health outcome is complex.\n\nMoreover, in many cases a quite **long observation period** is necessary simply due to the **latency time**\n\n**between exposure at work, outbreak and detection of a disease** , which is obviously very different\n\nfrom the clear and immediate consequence of an accident at work.\n\nThe detection of a disease and the correlation between work and this disease depends highly on the\n\n**monitoring capacities of the health system and its ability, tradition and standards to connect**\n\n**diseases and work-related causes** . In a study on ‘Asbestos ‐ related occupational diseases in Central\n\nand East European Countries’ the authors refer to different policies for identifying workers formerly\n\nexposed to asbestos and conclude:\n\n*‘Consequently, large differences are observed from one country to another regarding the number of*\n\n*recognised asbestos-related cases. In Slovenia, for example, the annual asbestosis rate (cases of*\n\n*asbestosis/population) amounts to 14.9, in Croatia 5.3, and in Poland 2.1. Moreover, in Estonia, the*\n\n*incidence of asbestosis is unknown as there is no systematic collection of data.’* <sup>181</sup>\n\nFor example, until now very few occupational diseases have been recognised as outcomes of\n\npsychosocial risks at work. The ILO proposes in its ‘List of Occupational Diseases Recommendation’ a\n\nlarge number of very specific and ‘classic’ occupational diseases — a very broad definition of *‘Mental*\n\n*and behavioural disorders’* but leaving the responsibility to science and to ‘national conditions’. <sup>182</sup>\n\nSimilarly, the development of the European Schedule of Occupational Diseases (ESOD) aims to\n\nimprove knowledge, step up prevention and provide assistance in linking occupational activities and\n\ndiseases.\n\n© Bernard Maurin/Adobe Stock", - "page_start": 74, - "page_end": 74, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Approximately 65% of the variability in dyspnea\n\nremained unexplained by the factors examined in our\n\nstudy. Most individuals in our study showed normal\n\nspirometry results but still carried a substantial\n\nburden of dyspnea, an inconsistency that needs\n\nexplanation. Several factors not included in our\n\nanalysis may have contributed to the unexplained\n\nvariation. Environmental factors (eg, air pollution,\n\nallergen exposure, seasonal variations in symptoms)\n\nare potential contributors to this unexplained variability. <sup>22</sup> Genetic predispositions could also play a\n\nsigni fi cant role, as suggested by a study that revealed\n\nthat parents with dyspnea were 1.8 times more likely to have offspring with dyspnea. <sup>23</sup> Additionally, fi tness\n\ncould be a contributing factor, especially in\n\nindividuals with undiagnosed PRISm, asthma, or\n\nCOPD who may restrict their activities to avoid\n\ndyspnea, and hence become deconditioned. <sup>6</sup>\n\nThere were signi fi cant but modest differences in mean\n\ndyspnea levels across the 17 study sites (data not\n\nshown), which are not explained by the risk factors we\n\naccounted for in our study. This fi nding is not surprising\n\nbecause some of the potential contributing factors\n\npreviously mentioned and other site-speci fi c factors\n\n(eg, climate, air quality/industrialization, socioeconomic\n\nstatus) of the catchment population tend to vary across\n\nstudy sites.\n\nDyspnea is a complex, subjective symptom that is\n\nmodi fi ed by nonrespiratory factors including\n\npsychosocial, social, and environmental in fl uences. <sup>5</sup>\n\nInterindividual variability in the perception of dyspnea,\n\nin fl uenced by these nonrespiratory factors, may play an\n\nimportant role. A study conducted by Ziegler et al <sup>24</sup>\n\nassessed the perception of dyspnea in 42 healthy\n\nindividuals using a standardized inspiratory resistive\n\nloading stimulus. The study used the modi fi ed Borg\n\nscale to measure dyspnea perception levels. Among the\n\nparticipants subjected to the same inspiratory resistive\n\nload, 31%, 45%, and 24% of participants classi fi ed their\n\nlevel of dyspnea as low, intermediate, and high,\n\nrespectively. The study revealed that differences between\n\nindividuals contribute considerable variability to the\n\nperception of dyspnea, even among healthy participants.\n\nThe affective dimension of dyspnea can be captured\n\nusing additional questionnaires (eg, Multidimensional\n\nDyspnea Pro fi le, Dyspnea-12). Studies have explored the\n\nuse of the Multidimensional Dyspnea Pro fi le in\n\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment\n\nDisease Group Overall P Value\n\n| Reversibility of FEV 1 , % | Post-BD FEV 1 /FVC Ratio | Post-BD FEV 1 % predicted |\n|:---|:---|:---|\n| � 0.163 ( P ¼ .47) 0.186 ( P ¼ .16) 0.545 (P [ .01) 0.392 (P [ .002) � 0.290 ( P ¼ .39) | � 0.274 (P [ .05) 0.240 (P [ .005) 0.107 ( P ¼ .58) � 0.307 (P [ .05) 0.854 (P [ .002) | � 0.090 ( P ¼ .17) � 0.131 (P < .001) � 0.158 ( P ¼ .08) � 0.075 ( P ¼ .37) � 0.650 (P [ .004) |\n\nControl .096\n\nNormal spirometry < .001\n\nAsthma .009\n\nCOPD < .001\n\nPRISm < .001\n\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-speci fi c factors and spirometry\n\ndisease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical signi fi cance. BD ¼ bronchodilator; PRISm ¼ preserved ratio impaired spirometry.\n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea Coef fi cient (95% CI) P Value Dyspnea Coef fi cient (95% CI) P Value", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "## Impact of Dyspnea on Adults With Respiratory Symptoms Without a De fi ned Diagnosis\n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD;\n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD;\n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD;\n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD;\n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD\n\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health\n\ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory\n\nsymptoms.\n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory\n\nsymptoms?\n\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were\n\nexperiencing respiratory symptoms. These individuals had not been previously diagnosed\n\nwith any lung conditions and were recruited from 17 Canadian centers using random digit\n\ndialing. Each participant underwent spirometry testing both before and after using a bron-\n\nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved\n\nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age-\n\nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A dyspnea impact assessment score from 0 to 100 was produced using questions from the\n\nCOPD Assessment Test and St. George ’ s Respiratory questionnaire.\n\nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, 63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; 95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All groups reported signi fi cantly more impactful dyspnea than the control group (mean score,\n\n13.8; 95% CI, 11.8-15.7). Patient-speci fi c risk factors including age, sex, BMI, smoking, and\n\ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the\n\nvariation was explained by disease classi fi cation and another 1.7% by the severity of lung\n\nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater\n\ndyspnea impact was associated with increased health care utilization, lower quality of life, and\n\nreduced work productivity.\n\nINTERPRETATION: Our fi ndings showed that in community-based adults with undiagnosed\n\nrespiratory symptoms, those identi fi ed with PRISm experienced the greatest impact of dys-\n\npnea. Dyspnea imposes burdens on the health care system and is associated with impaired\n\nquality of life and work productivity. CHEST 2024; 166(6):1296-1308\n\nKEY WORDS: asthma; case fi nding; COPD; dyspnea\n\nFOR EDITORIAL COMMENT, SEE PAGE 1259\n\n[ Asthma Original Research ]", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "35. Di Paolo E, Cuffari E, Jaegher H. Linguistic Bodies: The Continuity between Life\n\nand Language . Cambridge: MIT press (2018).\n\n36. Colombetti G. The embodied and situated nature of moods. Philosophia (Ramat\n\nGan) . (2017) 45(4):1437 - [51. doi: 10.1007/s11406-017-9817-0](https://doi.org/10.1007/s11406-017-9817-0)\n\n37. Bandura A. Health promotion by social cognitive means. Health Educ Behav .\n\n(2004) 31(2):143 - [64. doi: 10.1177/1090198104263660](https://doi.org/10.1177/1090198104263660)\n\n38. Casey B, Coote S, Hayes S, Gallagher S. Changing physical activity behavior in\n\npeople with multiple sclerosis: a systematic review and meta-analysis. Arch Phys Med\n\nRehabil . (2018) 99(10):2059 - [75. doi: 10.1016/j.apmr.2017.12.013](https://doi.org/10.1016/j.apmr.2017.12.013)\n\n39. Silveira SL, Cederberg KLJ, Jeng B, Sikes EM, Sandroff BM, Jones CD, et al. Do\n\nphysical activity and social cognitive theory variable scores differ across symptom\n\ncluser severity groups in multiple sclerosis? Disabil Health J . (2021) 14(4):101163.\n\n[doi: 10.1016/j.dhjo.2021.101163](https://doi.org/10.1016/j.dhjo.2021.101163)\n\n40. Learmonth YC, Motl RW. Exercise training for multiple sclerosis: a narrative\n\nreview of history, bene fi ts, safety, guidelines, and promotion. Int J Environ Res\n\nPublic Health [. (2021) 18(24):13245. doi: 10.3390/ijerph182413245](https://doi.org/10.3390/ijerph182413245)\n\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical\n\nactivity interventions among persons with multiple sclerosis. Neurorehabil Neural\n\nRepair . (2019) 33(1):3 - [14. doi: 10.1177/1545968318818904](https://doi.org/10.1177/1545968318818904)\n\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in fi tness,\n\nmobility and cognition with exercise-training in MS. Acta Neurol Scand . (2019) 139\n\n(2):183 - [91. doi: 10.1111/ane.13041](https://doi.org/10.1111/ane.13041)\n\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based,\n\nindividualized physiotherapy intervention for people with multiple sclerosis: a\n\nqualitative study. Physiother Res Int [. (2019) 25(3):e1829. doi: 10.1002/pri.1829](https://doi.org/10.1002/pri.1829)\n\n44. Normann B. Facilitation of movement: new perspectives provide expanded\n\ninsights to guide clinical practice. Physiother Theory Pract . (2020) 36(7):769 - 78.\n\n[doi: 10.1080/09593985.2018.1493165](https://doi.org/10.1080/09593985.2018.1493165)\n\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in\n\nphysical therapy. Physiother Theory Pract . (2015) 31(4):244 - [52. doi: 10.3109/](https://doi.org/10.3109/09593985.2014.1002873)\n\n[09593985.2014.1002873](https://doi.org/10.3109/09593985.2014.1002873)\n\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported\n\nphysical activity correlates in Swedish adults with multiple sclerosis: a\n\ncross-sectional study. BMC Neurol [. (2017) 17(1):204. doi: 10.1186/s12883-017-](https://doi.org/10.1186/s12883-017-0981-4)\n\n[0981-4](https://doi.org/10.1186/s12883-017-0981-4)\n\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for\n\npersons with multiple sclerosis: a review and agenda for future research. Int J MS\n\nCare . (2021) 23(4):186 - [92. doi: 10.7224/1537-2073.2020-066](https://doi.org/10.7224/1537-2073.2020-066)\n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among\n\nFive Approaches . 4th ed. California: Sage (2018).\n\nDahl et al. [10.3389/fresc.2024.1303094](https://doi.org/10.3389/fresc.2024.1303094)\n\n[Frontiers in Rehabilitation Sciences](https://www.frontiersin.org/journals/rehabilitation-sciences) 11 [frontiersin.org](https://www.frontiersin.org/)", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" - }, - { - "text": "*one causal agent and relatively easy to identify. On the other hand, there are all sorts of disorders*\n\n*without strong or specific connections to occupation and with numerous possible causal agents.’* <sup>176</sup>\n\nSome professions and regular work tasks had and have very specific risks, for example, hearing\n\ndisability through high noise levels, or musculoskeletal diseases caused by permanent repetition of a\n\ncertain movement or posture, or specific cancers after exposure to carcinogenic chemical substances,\n\ninfections in healthcare or work in laboratories, or allergies to natural substances in agriculture. Some\n\nexamples are:\n\n**Occupation, work task, exposure Occupational disease**\n\n- healthcare of infected persons - infection with the same disease\n\n- highly repetitive hand and arm movements - epicondylitis\n\n- quartz dust - silicosis\n\n- working long hours in a kneeling position - bursitis\n\n- extensive UV exposure - skin cancer\n\n- aromatic amines - bladder cancer\n\n- professional musicians - focal dystonia\n\n- grain dust (agriculture) - allergies, asthma\n\nSpecific and strong connections between **a risk and an outcome (risk pairs)** are **covered by**\n\n**occupational disease recognition schemes** in the EU Member States. <sup>177</sup> Some countries have\n\nopening options in their list systems, that is, in principle every disease with a dominant cause in working\n\nconditions can be recognised. However, many court cases about the recognition of occupational\n\ndiseases demonstrate that a clear cause-effect relationship is not always evident, that is, due to missing\n\nworkplace exposure data from the past or competing causes in private circumstances. All occupational\n\ndiseases with a principally unambiguous relation between cause and consequence account only for a\n\nsmall percentage of all **work-related diseases** . <sup>178</sup>\n\nWe can observe a **decrease of some of the major recognised diseases** , <sup>179</sup> either triggered by\n\npreventive measures or triggered by shifts of workforce to sectors with less recognised occupational diseases. The **new experimental EODS Statistics of Eurostat** <sup>180</sup> documents the following\n\ndevelopments of recognised occupational diseases.\n\n**Table 21: Development of recognised occupational diseases in the EU 2013-2019**", - "page_start": 73, - "page_end": 73, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "1.011; P < .001 for general practitioner visits; OR, 1.015;\n\nP < .001 for emergency department visits; and OR,\n\n1.023, P ¼ .005 for hospitalization for respiratory illness) ( Table 8 ).\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nassociated with a reduced likelihood of current\n\nemployment (OR, 0.993; P < .001), increased\n\nabsenteeism (coef fi cient, 0.066; P < .001), increased\n\npresenteeism (coef fi cient, 0.349; P < .001), higher work\n\nproductivity loss (coef fi cient, 0.383; P < .001), and\n\ngreater activity impairment (coef fi cient, 0.501; P < .001),\n\nas measured by the Work Productivity and Activity Impairment questionnaire <sup>21</sup> ( Table 9 ).\n\n### Discussion\n\nOur study explored dyspnea in community-based adults\n\nwith undiagnosed respiratory symptoms identi fi ed via\n\ncase fi nding. Surprisingly, we found that the dyspnea\n\nexperienced by those with PRISm had a greater impact\n\non their activities and health status than those with\n\nnewly diagnosed COPD or asthma.\n\nThe prevalence of individuals who were obese and\n\nmorbidly obese in the PRISm group partially explains\n\nthe between-group difference in dyspnea. The excess\n\ndyspnea seen in the PRISm group when compared with\n\nthe normal spirometry group is partly explained by\n\npatient-speci fi c risk factors, including BMI, which\n\nshrink the mean dyspnea differential between the groups\n\nfrom 11.2 to 5.5 points ( Tables 3-6 ). The remaining 5.5-\n\npoint difference indicates that PRISm patients have\n\nexcess dyspnea relative to symptomatic individuals with\n\nnormal spirometry for additional reasons other than\n\nobesity.\n\nTABLE 4 ] Sequential Regression Analyses of Risk Factors Contributing to Variability in Dyspnea: Dyspnea\n\nRegressed on Patient-Speci fi c Risk Factors (20.6% of Variability Explained)\n\nRisk Factor P Value\n\n| Regression Coef fi cient |\n|:---|\n| � 0.0909 8.217 0.899 1.420 � 2.149 0.144 5.123 0.00975 10.119 4.813 6.892 1.627 3.433 1.738 0.952 4.663 1.081 2.073 8.463 |\n\nAge .005\n\nFemale < .001\n\nBMI < .001\n\nHousehold income < CAD $30,000 .40\n\nHousehold income $ CAD $30,000 .07\n\nSmoking history, pack-y < .001\n\nSmoking exposure < .001\n\nOccupational exposure < .001\n\nCongestive heart failure .004\n\nCoronary artery disease .001\n\nDepression/anxiety < .001\n\nDiabetes mellitus .22\n\nHypertension < .001\n\nAnemia .15\n\nCancer .49\n\nGERD < .001\n\nLiver disease .61\n\nRenal disease .32\n\nStroke < .001\n\nBoldface indicates statitistical signi fi cance. GERD ¼ gastroesophageal re fl ux disease.\n\nTABLE 5 ] Dyspnea Regressed on Spirometry Disease\n\nGroup\n\nDisease Group P Value\n\n| Regression Coef fi cient |\n|:---|\n| � 31.2 NA 4.6 3.8 5.5 51.9 |\n\nControl < .001\n\nNormal spirometry <sup>a</sup> NA\n\nAsthma .001\n\nCOPD .003\n\nPRISm .001\n\nConstant NA\n\nDyspnea regressed on spirometry disease group, after removing contri-\n\nbutions from subject-speci fi c factors in Table 4 (12.4% of variability\n\nexplained). Boldface indicates statitistical signi fi cance. NA ¼ not appli- cable; PRISm ¼ preserved ratio impaired spirometry. a Normal spirometry group is the reference category.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed13.pdf", - "query": "What was the average year of the group that participated to the study concerning the impact of outdoor pysiotherapy on patient with multiple sclerosis", - "target_page": 4, - "target_passage": "Age in years Mean 47.6", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "bronchial challenge testing into a case fi nding strategy\n\nidenti fi ed asthma in 26% of symptomatic individuals\n\nwho had normal spirometry and no response to BD. <sup>27</sup>\n\nIndividuals with undiagnosed respiratory symptoms,\n\ndetermined to have asthma or COPD through spirometry, experience poor health status. <sup>28</sup> Therefore,\n\nthe implementation of known treatment approaches for\n\nasthma or COPD is important to improve their conditions. <sup>29</sup> In contrast, those with normal spirometry\n\nor PRISm face unclear treatment approaches. Long-\n\nacting BD therapy in symptomatic individuals with\n\ntobacco exposure with normal spirometry is not effective. <sup>30</sup> Weight management programs may be useful\n\nfor individuals who are obese with PRISm-related\n\ndyspnea; however, this awaits de fi nitive clinical trials. <sup>31</sup>\n\nDyspnea was severe and prevalent within our study\n\ngroup; however, it remained undiagnosed. A study conducted by Stefan et al <sup>32</sup> revealed that physicians\n\nunderestimated their patients ’ dyspnea 37.9% of the\n\ntime, whereas nurses underestimated it 3.5% of the time.\n\nMoreover, many patients limit their physical activities,\n\nwhich lead them to downplay the extent of their dyspnea. <sup>19</sup> Patient underreporting of symptoms, coupled\n\nwith inadequate physician-led investigations of\n\nsymptoms, may explain why dyspnea often goes\n\nundiagnosed in the population. <sup>33</sup>\n\nIn conclusion, our study measured dyspnea impact in\n\nindividuals with no preexisting diagnosis of lung disease\n\nwho reported respiratory symptoms as part of a\n\npurposeful case fi nding strategy. Individuals with PRISm\n\nexhibited the greatest impact of dyspnea, even higher\n\nthan those newly diagnosed with asthma or COPD.\n\nAfter adjusting for patient factors, comorbidities,\n\npulmonary diseases, and severity of lung physiologic\n\nimpairment, most of the variability in dyspnea remained\n\nunexplained. We also showed that dyspnea was\n\nassociated with increased health care utilization,\n\nimpaired quality of life, and work productivity.\n\n### Funding/Support\n\nThis study is supported by the Canadian Institutes of\n\nHealth Research [FDN Grant 154322].\n\n### Financial/Non fi nancial Disclosures\n\nNone declared.\n\n### Acknowledgments\n\nAuthor contributions: S. D. A. and G. A. W.\n\ncontributed to conception and design. J. B., E.\n\nG., G. A. W., K. L. V., and S. D. A.\n\ncontributed to analysis and interpretation. J.\n\nB., E. G., G. A. W., K. L. V., S. D. A., C. B., C.\n\nL., L.-P. B., A. C., E. P., S. K. F., S. G., R. A.\n\nM., I. M., M. B., P. H., M. D. L., M. A., C. J. L.,\n\nT. A., N. E., G. G. A., and S. M. contributed to\n\ndrafting the manuscript for important\n\nintellectual content. All authors had access to\n\nand participated in the interpretation of the\n\ndata and provided input into the preparation\n\nand submission of the manuscript. The\n\nauthors vouch for the accuracy and\n\ncompleteness of the data.\n\nRole of sponsors: The sponsor had no role in\n\nthe design of the study, the collection and\n\nanalysis of the data, or the preparation of the\n\nmanuscript.\n\nOther contributions: We thank the\n\nfollowing individuals from the Canadian\n\nstudy sites: Ottawa Hospital Research\n\nInstitute, Ottawa, Ontario: Taylor Poulin;\n\nSusan Deveau, RRT; Victoria Thompson;\n\nMeredith McCleery; Angelina Tohme; Vicky\n\nPanteleakos, RRT; Geneviève Longtin, RRT;\n\nJoanne Cassidy, RRT; Amanda Bergeron,\n\nMSc; Jennifer Biggs, RN; Jessica Bergeron;\n\nand Elisabet White; Vancouver General\n\nHospital, Vancouver, British Columbia:\n\nShelley Abercromby, BSc; Jana Caine; David\n\nSavage; Natasha Verzosa; Ravneet Mahal; and\n\nMary Justine Angeles; Queen Elizabeth II\n\nHealth Sciences Centre, Halifax, NS: Scott\n\nFulton, RRT; Hôpital du Sacré Coeur de\n\nMontréal, Montréal, QC: Simone Chaboillez,\n\nMT; and Meliza Benabdallah; St. Joseph ’ s\n\nHamilton, Hamilton, ON: Liz Johnson; St.\n\nBoniface Hospital, Winnipeg, MB: Cheryl\n\nNoble, RN; Institut Universitaire de", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Approximately 65% of the variability in dyspnea\n\nremained unexplained by the factors examined in our\n\nstudy. Most individuals in our study showed normal\n\nspirometry results but still carried a substantial\n\nburden of dyspnea, an inconsistency that needs\n\nexplanation. Several factors not included in our\n\nanalysis may have contributed to the unexplained\n\nvariation. Environmental factors (eg, air pollution,\n\nallergen exposure, seasonal variations in symptoms)\n\nare potential contributors to this unexplained variability. <sup>22</sup> Genetic predispositions could also play a\n\nsigni fi cant role, as suggested by a study that revealed\n\nthat parents with dyspnea were 1.8 times more likely to have offspring with dyspnea. <sup>23</sup> Additionally, fi tness\n\ncould be a contributing factor, especially in\n\nindividuals with undiagnosed PRISm, asthma, or\n\nCOPD who may restrict their activities to avoid\n\ndyspnea, and hence become deconditioned. <sup>6</sup>\n\nThere were signi fi cant but modest differences in mean\n\ndyspnea levels across the 17 study sites (data not\n\nshown), which are not explained by the risk factors we\n\naccounted for in our study. This fi nding is not surprising\n\nbecause some of the potential contributing factors\n\npreviously mentioned and other site-speci fi c factors\n\n(eg, climate, air quality/industrialization, socioeconomic\n\nstatus) of the catchment population tend to vary across\n\nstudy sites.\n\nDyspnea is a complex, subjective symptom that is\n\nmodi fi ed by nonrespiratory factors including\n\npsychosocial, social, and environmental in fl uences. <sup>5</sup>\n\nInterindividual variability in the perception of dyspnea,\n\nin fl uenced by these nonrespiratory factors, may play an\n\nimportant role. A study conducted by Ziegler et al <sup>24</sup>\n\nassessed the perception of dyspnea in 42 healthy\n\nindividuals using a standardized inspiratory resistive\n\nloading stimulus. The study used the modi fi ed Borg\n\nscale to measure dyspnea perception levels. Among the\n\nparticipants subjected to the same inspiratory resistive\n\nload, 31%, 45%, and 24% of participants classi fi ed their\n\nlevel of dyspnea as low, intermediate, and high,\n\nrespectively. The study revealed that differences between\n\nindividuals contribute considerable variability to the\n\nperception of dyspnea, even among healthy participants.\n\nThe affective dimension of dyspnea can be captured\n\nusing additional questionnaires (eg, Multidimensional\n\nDyspnea Pro fi le, Dyspnea-12). Studies have explored the\n\nuse of the Multidimensional Dyspnea Pro fi le in\n\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment\n\nDisease Group Overall P Value\n\n| Reversibility of FEV 1 , % | Post-BD FEV 1 /FVC Ratio | Post-BD FEV 1 % predicted |\n|:---|:---|:---|\n| � 0.163 ( P ¼ .47) 0.186 ( P ¼ .16) 0.545 (P [ .01) 0.392 (P [ .002) � 0.290 ( P ¼ .39) | � 0.274 (P [ .05) 0.240 (P [ .005) 0.107 ( P ¼ .58) � 0.307 (P [ .05) 0.854 (P [ .002) | � 0.090 ( P ¼ .17) � 0.131 (P < .001) � 0.158 ( P ¼ .08) � 0.075 ( P ¼ .37) � 0.650 (P [ .004) |\n\nControl .096\n\nNormal spirometry < .001\n\nAsthma .009\n\nCOPD < .001\n\nPRISm < .001\n\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-speci fi c factors and spirometry\n\ndisease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical signi fi cance. BD ¼ bronchodilator; PRISm ¼ preserved ratio impaired spirometry.\n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea Coef fi cient (95% CI) P Value Dyspnea Coef fi cient (95% CI) P Value", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "community healthcare in the two municipalities. The project team\n\nincluded three individuals representing users from the Nordland\n\nMS Association, along with an MS nurse and a neurologist from\n\nthe MS-outpatient clinic, and three physiotherapists/ researchers.\n\n#### 2.4 Research team and re fl exivity\n\nAll researchers on the team are clinical specialists in\n\nneurological physiotherapy. BN and ECA developed the\n\nCoreDISTparticipation intervention, and SSHD contributed to\n\nthe development of the outdoor part.\n\nThe researchers ’ closeness to the intervention and the\n\nclinical fi eld may have strengthened the depth and relevance\n\nof their interpretations in this study ( 27 ), as it was easy to\n\nunderstand what participants described and helped form\n\nfollow-up questions during the interviews. However, closeness\n\nmay also produce a risk of “ blind spots ” , as the researchers\n\nmay prejudice participants ’ experiences, omitting questions\n\nwhere the answers are believed to be obvious ( 27 ). Thus,\n\nthroughout the process, trustworthiness and rigor were\n\nenhanced by discussing the methodology, fi ndings, and\n\ninterpretations with external researchers (including specialists\n\nin enactive theory), as well as user representatives. The\n\npresented theoretical framework (enactive theory) enhanced\n\nthe distance to the material, as recommended in qualitative\n\nresearch ( 28 ).\n\n#### 2.5 Recruitment and participants\n\nPrior to recruitment, the study was introduced to individuals\n\nwith multiple sclerosis (pwMS) through a seminar hosted by the\n\nNordland MS Association. Additionally, seminars were\n\nconducted for health professionals in community healthcare and\n\nat the regional hospital. Written information about this study\n\n(and the RCT) was sent from the MS clinic at the regional\n\nhospital by post to all eligible individuals af fi liated with the\n\nhospital. Individuals who wished to participate signed the\n\nattached consent form and returned it in the pre-stamped\n\nenvelope. The inclusion criteria were as follows: had been\n\ndiagnosed with MS, had a score on the Expanded Disability\n\nStatus Scale (EDSS) ( 29 ) of ≤ 3.5, was ≥ 18 years, was employed\n\n(10% - 100% of full-time) and residential address in the two\n\nprede fi ned municipalities. The exclusion criteria were as follows:\n\npregnancy, exacerbation of symptoms within two weeks prior to\n\nenrollment and other serious conditions compromising balance,\n\nwalking or work capacity. All participants in the intervention\n\ngroup of the RCT ( n = 15) were included ( Table 3 ).\n\n#### 2.6 Data collection\n\nThe interview guide ( Table 4 ) was developed based on literature\n\nreviews, clinical experience and discussions within the research\n\ngroup and with user representatives. Two test interviews were\n\nconducted (with pwMS who were not part of the sample), and the\n\ninterview guide was then re fi ned around the following themes:\n\noverall experience and re fl ections from participation, content,\n\noutdoor setting, the group, and the physiotherapists. Questions\n\nwere open-ended to capture rich, in-depth re fl ections regarding\n\nparticipants ’ experiences, following a phenomenological approach.\n\nThe interviewer asked for both negative and positive experiences\n\nTABLE 4 Interview guide.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "Dyspnea refers to a subjective sensation of breathing discomfort. <sup>1</sup> In a study involving a community-based\n\npopulation aged > 70 years, the prevalence of dyspnea was found to be 32%. <sup>2</sup> Dyspnea can lead to limitations in\n\ndaily activities, reduced exercise tolerance, and\n\nheightened mortality risks. <sup>3</sup>\n\nDyspnea not only affects individuals with diagnosed\n\nrespiratory conditions but also poses a signi fi cant\n\nburden on those with undiagnosed conditions. In a systematic review by Müller et al, <sup>4</sup> the combined\n\nprevalence of dyspnea in the adult general population\n\nacross 11 studies was estimated to be 10%. Dyspnea can\n\narise from a broad spectrum of underlying factors,\n\nincluding both respiratory and nonrespiratory\n\nconditions. Studies have revealed that dyspnea is not\n\nsolely attributable to respiratory conditions but is also\n\nheavily in fl uenced by cardiovascular deconditioning and\n\nby nonrespiratory factors, including psychosocial, social,\n\nand environmental determinants. <sup>5</sup> <sup>,</sup> <sup>6</sup>\n\nDyspnea is a prevalent symptom with consequences that\n\nextend beyond its physiologic implications. A study in\n\nEuropean patients with COPD explored the burden of\n\ndyspnea and identi fi ed potential correlates. The study\n\nrevealed that higher dyspnea impact correlated with\n\nlower health-related quality of life, increased work\n\nimpairment, and a higher frequency of emergency\n\ndepartment visits. <sup>7</sup>\n\nThe three objectives of our study were as follows: (1) to\n\nevaluate the impact of dyspnea in adults from the\n\ngeneral population who had no prior diagnosis of\n\nrespiratory disease but who reported having signi fi cant\n\nrespiratory symptoms in the past 6 months; (2) to\n\nidentify associated risk factors for dyspnea and estimate\n\ntheir in fl uence on the symptom; and (3) to explore the\n\nrelationship between dyspnea and health care utilization,\n\nquality of life, and work productivity in adults with\n\nundiagnosed respiratory symptoms.\n\n### Study Design and Methods\n\n#### Recruitment of Undiagnosed Cases and Healthy\n\nControl Patients\n\nBetween June 2017 and January 2023, adults aged $ 18\n\nyears were recruited through a two-step process into the\n\nUndiagnosed COPD and Asthma Population (UCAP) study, a multicenter case fi nding study. Approval for\n\nthe study was obtained from the research ethics boards\n\nof the 17 participating study sites across Canada.\n\nInformed, written consent was provided by all study\n\nparticipants.\n\nBoth landlines and cellphones within a 90-minute radius\n\nof any of the 17 study sites were dialed randomly. A\n\nTake-home Points\n\nStudy Question: How profoundly are adults with\n\nundiagnosed respiratory symptoms affected by\n\ndyspnea?\n\nResults: In community-based adults with undiag-\n\nnosed respiratory symptoms, those identi fi ed with\n\npreserved ratio impaired spirometry experienced the\n\ngreatest impact of dyspnea, followed by those with\n\nundiagnosed asthma or COPD. Greater dyspnea\n\nimpact was associated with increased health care\n\nutilization, lower quality of life, and reduced work\n\nproductivity.\n\nInterpretation: Dyspnea imposes burdens on the\n\nhealth care system and is associated with impaired\n\nquality of life and work productivity.\n\nABBREVIATIONS: ASQ = Asthma Screening Questionnaire; BD =\n\nbronchodilator; CAT = COPD Assessment Test; PCA = principal\n\ncomponent analysis; PRISm = preserved ratio impaired spirometry;\n\nSGRQ = St. George ’ s Respiratory Questionnaire\n\nAFFILIATIONS: From The Ottawa Hospital Research Institute (J. B., E.\n\nG., K. L. V., G. G. A., S. M., and S. D. A.), University of Ottawa,\n\nOttawa, ON; the Desautels Faculty of Management (G. A. W.), McGill\n\nUniversity, Montreal, QC; the Department of Medicine (C. B.), The\n\nUniversity of British Columbia, Vancouver, BC; the Centre de\n\nrecherche (L.-P. B. and A. C.), Institut de cardiologie et de pneumo-\n\nlogie de Québec, Université Laval, Quebec, QC; the Cumming School", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Discussion: High-intensity training combined with detailed exercises in a\n\nphysiotherapy outdoor group was perceived to create meaningful bodily changes\n\nand enhance PA and prospects for both PA and life. Importantly, however, some\n\nnegative experiences were also reported from the high-intensity training. Enactive\n\ntheory allowed for the illumination of new perspectives: the importance of\n\nembodiment for self-ef fi cacy and of tailored physiotherapy and an outdoor-group\n\nenvironment for exploring one ’ s own limits to physical capabilities. These aspects\n\nshould inform future exercise interventions in pwMS with low disability.\n\nKEYWORDS\n\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy,\n\npostural balance, enactive theory\n\n### 1 Introduction\n\nMultiple sclerosis (MS) is a progressive in fl ammatory disease of\n\nthe central nervous system (CNS) that is typically diagnosed at 30 -\n\n40 years of age ( 1 ). A great concern is the signi fi cantly lower levels\n\nof physical activity (PA) in people with MS (pwMS) across\n\ndisability levels than in their healthy counterparts ( 2 , 3 ).\n\nEarly promotion of PA and exercise is recommended due to\n\nnumerous established bene fi ts in health, symptom management\n\nand well-being for pwMS ( 4 ). In particular, high-intensity\n\ntraining is endorsed, as it has possible neuroprotective effects in\n\nthe disease course ( 5 , 6 ). In addition, exercises addressing\n\nsensorimotor impairments (e.g., reduced muscle strength,\n\nreduced neuromuscular control) are recommended, as they target\n\nindividuals ’ capability to remain physically active ( 7 ).\n\nSensorimotor impairments can in fl uence trunk control, which is\n\ncommonly disturbed in pwMS, even when disability is low ( 8 , 9 ),\n\nand correlate with impaired balance, walking capacity and\n\ndistance ( 10 , 11 ). PwMS ’ s knowledge of exercise bene fi ts,\n\nattitudes and motivations, as well as contextual aspects such as\n\nlack of optimal exercise interventions, accessibility and support,\n\naffect the level of PA and exercise participation ( 12 ).\n\nCoreDISTparticipation ( Table 1 ) is a new comprehensive\n\nintervention addressing sensorimotor function, trunk control,\n\nhigh-intensity running/walking and work participation in pwMS\n\nwith low disability ( 13 ). It is based on the GroupCoreDIST <sup>1</sup>\n\nintervention, which has been shown to have signi fi cant short-\n\nand long-term effects on trunk control, balance and walking\n\namong pwMS ( 14 , 15 ). However, no effects of the intervention\n\non objectively measured PA have been identi fi ed, even though\n\nthe participants reported perceptions of new possibilities to be\n\nphysically active as their sensorimotor impairments improved\n\n( 16 ). To address PA challenges in pwMS, GroupCoreDIST was\n\nfurther developed to include a four-week period of outdoor\n\ntraining, in which high-intensity walking/running and\n\nGroupCoreDIST exercises are integrated ( Table 2 ). To our\n\nknowledge, combinations of high-intensity training and\n\nrehabilitation of speci fi c sensorimotor functions have been\n\nsparsely explored. Patient perspectives are essential for the\n\nevaluation of healthcare interventions ( 17 ); however, the new\n\noutdoor component of CoreDISTparticipation has yet to be\n\ninvestigated from a fi rst-person perspective. Particularly\n\ninteresting is what participants perceive as meaningful regarding\n\nthe intervention, as this is essential for motivation, motor\n\nlearning and exercise adherence ( 18 ).\n\nTo deepen our understanding of what the participants\n\nperceive as meaningful, we turn to a theoretical perspective\n\nthat integrates bodily capacities with the construction of\n\nmeaning. Enactive theory emphasizes that making sense of the\n\nworld depends essentially on the biological (living) body and\n\nthe phenomenological (lived or experienced) body ( 19 ), which\n\nimplies that the body is viewed as a neurobiological organism\n\nthat is concurrently experiencing, expressing and social", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed13.pdf" - }, - { - "text": "gave them advice for follow-up. Some participants said that when the\n\nphysiotherapist conducted the exercises or ran/walked together with\n\nthem, it made them increase their exercise intensity. One participant\n\ndescribed this as follows:\n\nThe physiotherapists pushed me to perform beyond what I\n\nthought I was able to — and that was great! There is no doubt\n\nthat if someone is running beside you and shouting “ come on-\n\nwell done ” , you manage to push yourself further. (ID8, EDSS: 2)\n\nHowever, one participant described an incident where the\n\ninteraction with the physiotherapists was not perceived as helpful:\n\nWhen I get tired, it gets dif fi cult. I can only do one thing at a\n\ntime, and then these physiotherapists came running, talking\n\nand trying to motivate at the same time. I got very tired, and\n\nmy leg would not follow my commands to run. (ID7, EDSS: 3.5)\n\nParticipants reported that they appreciated that the\n\nphysiotherapists made them engage in playful activities with a\n\nball, run for beanbags, and sing and in general created an\n\ninformal and nice atmosphere. The enjoyment created was\n\ndescribed as important for adherence to the intervention and as\n\nencouraging participants ’ physical effort during the session, as\n\nexercise felt easier when it was enjoyable. It was appreciated that\n\nthe physiotherapists were perceived as both cheerful and serious\n\nabout the intervention.\n\n### 4 Discussion\n\nThe main fi ndings of this study are that (1) being supported\n\nto explore and push one ’ s own physical capabilities by\n\ncombining high-intensity running/walking with detailed\n\nexercises was meaningful and evoked strong emotions.\n\nImproving one ’ s balance, walking, and running lead to\n\nincreased beliefs in one ’ s own possibilities. Some negative\n\nexperiences were also described, particularly from the high-\n\nintensity training. (2) An engaging outdoor group with tailored\n\nphysiotherapist-participant interactions and the co-creation of\n\nenjoyment was perceived to be important for the success of the\n\nindividual. These fi ndings illustrate how the dynamic\n\nintertwining of the body and movement, context and\n\nintersubjective interactions create meaning and beliefs in one ’ s\n\nown physical capabilities ( 19 ).\n\n4.1 Bodily experiences are inherent to\n\nbeliefs in the mastery of physical activity\n\nThe meaningfulness of exploring the limits of training\n\nintensity that we identi fi ed in our study corresponds with\n\nother studies of pwMS ’ s experiences of interventions\n\naddressing intensity of activity ( 31 , 32 ). The exercises\n\nemphasizing trunk control were reported to reduce movement\n\nimpairments and are in line with a study of pwMS with higher\n\ndisabilities participating in an indoor group intervention ( 16 ).\n\nHowever, the perceived interlinking of improved sensorimotor\n\nfunctions and the ease of and ef fi ciency in high-intensity\n\nwalking/running have not been reported previously. It is likely\n\nthat the detailed exercises prompted activations of the CNS\n\nand musculoskeletal systems, which are prerequisites for high-\n\nintensity walking and running ( 33 ). Impairments in such\n\nsystems commonly occur due to CNS lesions or secondary\n\ninactivity, and function can improve with increased use ( 18 ).\n\nOur results support the value of integrating such speci fi city to\n\noptimize the capability to train at high intensity, even in\n\nindividuals with low EDSS scores.\n\nThe described emotional associations of these bodily changes\n\nare interesting. Achieving higher exercise intensities, easier\n\nmovements, reduced pain and improved sensation lead to\n\npositive feelings and enhanced prospects for both PA and life,\n\nwhile for some individuals, a failure to achieve high-intensity or\n\nno immediate changes in impairments are associated with\n\nfeelings of loss and negative prospects. This calls attention to\n\nacknowledging that sensorimotor capacities facilitate or constrain\n\nhow an individual perceives the world, which is closely", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed13.pdf" - }, - { - "text": "However, explained variance estimates in our models\n\nranged from 34 to 61%, suggesting further research is\n\nnecessary to identify additional factors contributing to\n\nhealthcare utilization following physical therapy.\n\nThe primary limitation of the study is the high number\n\nof subjects lost to follow-up. We attempted to account\n\nfor the bias introduced by loss to follow-up in our\n\nmodels with IPAW, which is a robust strategy for con-\n\nducting analyses with missing data [ 41 , 51 ]. We observed\n\ngood concordance between results of complete case and\n\nweighted analyses, giving us confidence in our findings.\n\nHowever, important differences in age, race, education,\n\nsymptom onset, baseline pain intensity, and baseline\n\npain-related psychological distress were noted between\n\nthose who did and did not complete follow-up. These\n\ndifferences suggest that the group lost to follow-up may\n\nrepresent a unique population to whom these results\n\nmay not apply. Different factors may predict utilization\n\noutcomes for this unique population. As a result, readers\n\nshould exercise caution when extending these findings\n\nto individuals and populations that substantially differ\n\nfrom the analytic sample in this study. Specifically, these\n\npredictive models may need to be adjusted for younger\n\nindividuals of non-white race, with lower education\n\nlevels, sudden onset of symptoms, and those with higher\n\npain intensity and pain-associated distress.\n\nA second limitation is that we did not know about the\n\nsubjects ’ prior experiences with physical therapy, or\n\nwhether they arrived at physical therapy through direct\n\naccess or referral from another provider. These factors\n\ncould be associated with treatment expectations, which\n\nhave known effects on treatment outcomes [ 52 , 53 ]. We\n\nalso did not collect specific information on treatment.\n\nBut by including changes in pain, disability, and\n\npain-related psychological distress in the models, we\n\nwere able to account for treatment response. The benefit\n\nof this approach is that models are generalizable for pre-\n\ndicting utilization outcomes across “ real-world ” prag-\n\nmatic physical therapy settings where treatment\n\nvariation is expected. The drawback is that we are pro-\n\nhibited from making conclusions regarding which char-\n\nacteristics of the clinical encounter might influence\n\nsubsequent pain-related healthcare utilization. Important\n\ncharacteristics to consider would include number of\n\nvisits, type of interventions or whether patients com-\n\npleted their course of physical therapy. These have been\n\nproposed or identified as important contributors to\n\ndownstream costs following physical therapy [ 54 , 55 ]\n\nand may be a source of unexplained variance in our\n\nmodels. Characteristics of the clinical encounter should\n\nbe considered in future studies to refine the prediction\n\nmodels developed in our analyses.\n\nThird, we were unable to adequately model the spe-\n\ncific effects of worker ’ s compensation, self-pay and some\n\ncommercial insurance coverage on utilization due to the\n\nlow incidence of these forms of payment in our study\n\nsample. Modeling these separately would have created\n\nthe potential for unreliable and imprecise effect esti-\n\nmates. Readers should consider the within-group hetero-\n\ngeneity caused by this approach and exercise caution\n\nwhen applying these results to individuals who do not\n\nhave traditional public or private insurance coverage. Fu-\n\nture studies should investigate the performance of the\n\nOSPRO tools in predicting outcomes for patients with\n\nWorker ’ s Compensation.\n\nA final limitation is the use of patient recall to meas-\n\nure utilization. To mitigate recall bias, we used two\n\nfollow-up points, at 6 and 12 months. However, under-\n\nor over-reporting of utilization is often a concern with\n\nstudies requiring subject recall [ 56 - 58 ]. Medical record\n\nand claims data were not available for these subjects.\n\nReaders should consider our inability to independently", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed5.pdf" - }, - { - "text": "given the heterogenic pathology and symptoms of MS ( 41 , 42 ).\n\nHowever, our fi ndings illuminate qualitative aspects of how to\n\nachieve tailored and meaningful intersubjective interactions in an\n\nexercise intervention.\n\nWe consider the instances of the physiotherapist running\n\ntogether with the participant, which were perceived as important\n\nfor participants ’ performance, to be an example of “ participatory\n\nsense-making ” ( 22 ) . As participants appreciated being guided or\n\neven pushed by the physiotherapists, it appears that the\n\nphysiotherapists were trusted in directing this interaction. As\n\nsuch, we argue that the physiotherapists ’ ability to adapt to\n\nparticipants ’ movements, speech and gestures — tailoring the\n\ninteraction to their needs — was important for this ability to be\n\nperceived as purposeful. This is supported by the few negative\n\nincidents described where the participant-physiotherapist\n\ninteraction seemed to not be jointly coordinated and appeared to\n\nfail. The reported mutual in fl uences of sensorimotor capabilities\n\nand interpersonal coordination, with the physiotherapists but\n\nalso the group, are in accordance with sensorimotor capacities\n\nand intersubjective interactions being important for sense-\n\nmaking in the world ( 35 ). The bene fi ts of these individualized\n\nparticipant-physiotherapist interactions are also described in\n\nspeci fi c core-stability exercises in indoor groups ( 16 , 43 ) and are\n\nin line with the theoretical framework of facilitation of\n\nmovement through hands-on interaction previously proposed\n\n( 44 , 45 ). Our study informs new knowledge of physiotherapist-\n\nparticipant interactions to achieve the recommended high-\n\nintensity training and calls for physiotherapy clinical reasoning\n\nthrough bodily and verbal communication skills adapted to the\n\nparticipants ’ responses in an ongoing and situated way.\n\nEnjoyment has previously been reported to promote PA\n\nin pwMS, and our study brings requested knowledge of what\n\ncan constitute enjoyment in an exercise intervention ( 46 ):\n\nplayful group-exercise tasks, a cheerful physiotherapist, and the\n\noutdoor environment.\n\nThe appreciation of being active outdoors in the study sample\n\naligns with that in the general population ( 47 ). The outdoors\n\nprovided a natural environment, which both invited participants to\n\nactively explore abilities thought of as left behind after their\n\ndiagnosis with MS, such as running, and provided an appreciated\n\nbreak from focusing on MS symptoms. We also suggest that the\n\npositive experiences of mastering the challenging weather\n\nconditions and the added meaning of exercising among other\n\npeople in the city park can be explained according to such terms.\n\nThese positive experiences show how we are enmeshed in our\n\nhistory, context and social encounters ( 35 ) and how these aspects\n\nshould also be accounted for when designing exercise interventions.\n\n#### 4.3 Methodological considerations\n\nThe design and methods were adequate for deriving\n\nknowledge from individuals ’ experiences. The participants self-\n\nreferred to the intervention and were recruited based on pre-set\n\ncriteria. This approach yielded rich information from people\n\nwith mild to moderate disabilities due to MS who were\n\nmotivated for physical activity (PA), employed, and residing in\n\nnorthern Norway. Ethnicity or socio-economic class were not\n\nrecorded. However, considering that all these factors can\n\nin fl uence PA engagement ( 46 ), it is possible that additional\n\naspects of the phenomenon could be uncovered in a different\n\nsample ( 48 ). There was a higher percentage of women\n\nparticipating than men; however, this corresponds to the gender\n\ndistribution in the MS population ( 1 ).\n\nThe use of enactive theory was innovative within the fi eld and\n\nallowed for, in particular, new aspects of importance for self-\n\nef fi cacy to be identi fi ed. Transference of our results to similar", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed13.pdf" - }, - { - "text": "outpatients with cardiorespiratory disease <sup>25</sup> and the Dyspnea-12 in patients with asthma <sup>26</sup> and found that\n\nthe affective aspect of dyspnea can signi fi cantly in fl uence\n\nthe impact of dyspnea on health status, irrespective of\n\nthe intensity of breathlessness.\n\nIn those with PRISm, there was a strong, positive\n\nassociation between higher values for the FEV 1 /FVC\n\nratio and dyspnea. For the PRISm group, a higher\n\nFEV 1 /FVC ratio may re fl ect diminished lung\n\ncompliance due to interstitial lung disease and/or\n\nrespiratory system restriction due to obesity, which\n\ncould contribute to worse dyspnea. Conversely, the\n\nassociation of dyspnea with the FEV 1 /FVC ratio was in\n\nthe opposite direction for those with asthma or COPD,\n\nand a lower FEV 1 /FVC ratio correlated with worse\n\ndyspnea, as expected.\n\nOur study complements the literature by focusing on\n\nadults with undiagnosed respiratory symptoms who\n\nwere randomly selected and recruited through active\n\ncase fi nding in the community. This increases the\n\ngeneralizability of our results to a broader population.\n\nOur dyspnea questions were derived from widely used\n\nand validated respiratory health questionnaires, and\n\nour dyspnea assessment measure is a weighted average\n\nof responses to these validated questions.\n\nConsequently, the measure has an immediate\n\ninterpretation in terms of the lived day-to-day\n\nexperience of individuals.\n\nOur study has limitations. We did not undertake\n\nreliability/reproducibility testing of our questionnaire.\n\nThe dyspnea impact assessment score was statistically\n\nassociated with increased health care utilization, lower\n\nquality of life, and reduced work productivity; therefore,\n\nby virtue of this analysis, our questionnaire has\n\nconstruct validity. However, further attempts at external\n\nvalidation of the questionnaire using an independent\n\ndata set would be important. Health care utilization\n\nduring the preceding 12 months was assessed on entry\n\ninto the study, and there is potential for impaired recall\n\nof events. Our study may have missed asthma in some\n\nparticipants because bronchial challenge testing was not\n\nconducted on those who tested negative for air fl ow\n\nobstruction or BD responsiveness. A previous study\n\nshowed that an additional diagnostic step incorporating\n\nTABLE 8 ] Unadjusted and Adjusted Dyspnea Associations With Health Care Use\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea OR (95% CI) P Value Dyspnea OR (95% CI) P Value\n\nIn the past 12 mo, did you visit your general\n\npractitioner or a nurse practitioner or another\n\nphysician at a walk-in clinic for any breathing\n\nproblems?\n\n1.011 (1.007-1.014) < .001 1.011 (1.007-1.014) < .001\n\nIn the past 12 mo, did you visit an emergency\n\ndepartment for any breathing problems?\n\n1.015 (1.009-1.021) < .001 1.015 (1.009-1.022) < .001\n\nIn the past 12 mo, were you hospitalized for any\n\nbreathing problems or respiratory illness?\n\n1.021 (1.006-1.037) .006 1.023 (1.007-1.039) .005\n\nData are presented as OR (95% CI) with P values. Adjusted values are adjusted for age, sex, and BMI.\n\nTABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea OR (95% CI) P Value Dyspnea OR (95% CI) P Value\n\nAre you currently employed\n\n(working for pay)?\n\n0.995 (0.992-0.998) .002 0.993 (0.990-0.997) < .001\n\nMeasure <sup>a</sup> Dyspnea Coef fi cient\n\n(95% CI) P Value\n\nDyspnea Coef fi cient\n\n(95% CI) P Value\n\nAbsenteeism 0.061 (0.040-0.083) < .001 0.066 (0.044-0.089) < .001\n\nPresenteeism 0.334 (0.293-0.375) < .001 0.349 (0.306-0.392) < .001\n\nWork productivity loss 0.368 (0.323-0.413) < .001 0.383 (0.336-0.430) < .001\n\nActivity impairment 0.503 (0.463-0.544) < .001 0.501 (0.458-0.544) < .001\n\nORs and regression coef fi cients are presented with 95% CIs and P values. Adjusted coef fi cients are adjusted for age, sex, and BMI. WPAI ¼ Work Pro- ductivity and Activity Impairment questionnaire.\n\na Measures calculated from WPAI questions. 21", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "about challenging our comfort-zone . (ID4, EDSS: 0)\n\nThe natural environment was also described as taking focus\n\naway from MS symptoms. Cold, rainy or snowy weather\n\nconditions required planning of adequate clothing; in addition,\n\nthese conditions led some participants to use cautious behavior\n\nwhen the ground was slippery and led a few to omit sessions.\n\nHowever, mastering outdoor exercise was highlighted in positive\n\nterms, such as discovering new ways to become active.\n\n3.4 Professional leadership, tailoring and\n\nco-creation of enjoyment\n\nThe way the physiotherapists led the group and, in particular,\n\ninteracted with each participant were regarded as helpful for\n\nimproving their bodily functions and activity levels. Some\n\nparticipants reported being afraid to try out new activities or\n\ntraining at high intensities after being diagnosed with MS but felt\n\nsafe to explore when supervised by the physiotherapist because of\n\ntheir trust in the relationship between them and in the\n\nphysiotherapist ’ s professional knowledge.\n\nHow the physiotherapist approached the participants\n\nindividually was described as important from this perspective. In\n\nparticular, bodily interactions in which the physiotherapist\n\ndemonstrated with his or her own body or placed his or her\n\nhands on the participant ’ s body to correct a movement were\n\nreported to be successful, as it helped to increase speed and gave\n\nparticipants a sense of performing better or for a longer duration.\n\nIf they did an exercise in a suboptimal way, participants reported\n\nreceiving precise supervision, or if they expressed pain or were\n\ninjured, the physiotherapist was supportive, assessed them and\n\nDahl et al. [10.3389/fresc.2024.1303094](https://doi.org/10.3389/fresc.2024.1303094)\n\n[Frontiers in Rehabilitation Sciences](https://www.frontiersin.org/journals/rehabilitation-sciences) 07 [frontiersin.org](https://www.frontiersin.org/)", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed13.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed13.pdf", - "query": "What were the prerequisites allowing to be involved in the study concerning the impact of outdoor sport on patients witg multiple sclerosis ?", - "target_page": 4, - "target_passage": "The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed (10%–100% of full-time) and residential address in the two predefined municipalities", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "community healthcare in the two municipalities. The project team\n\nincluded three individuals representing users from the Nordland\n\nMS Association, along with an MS nurse and a neurologist from\n\nthe MS-outpatient clinic, and three physiotherapists/ researchers.\n\n#### 2.4 Research team and re fl exivity\n\nAll researchers on the team are clinical specialists in\n\nneurological physiotherapy. BN and ECA developed the\n\nCoreDISTparticipation intervention, and SSHD contributed to\n\nthe development of the outdoor part.\n\nThe researchers ’ closeness to the intervention and the\n\nclinical fi eld may have strengthened the depth and relevance\n\nof their interpretations in this study ( 27 ), as it was easy to\n\nunderstand what participants described and helped form\n\nfollow-up questions during the interviews. However, closeness\n\nmay also produce a risk of “ blind spots ” , as the researchers\n\nmay prejudice participants ’ experiences, omitting questions\n\nwhere the answers are believed to be obvious ( 27 ). Thus,\n\nthroughout the process, trustworthiness and rigor were\n\nenhanced by discussing the methodology, fi ndings, and\n\ninterpretations with external researchers (including specialists\n\nin enactive theory), as well as user representatives. The\n\npresented theoretical framework (enactive theory) enhanced\n\nthe distance to the material, as recommended in qualitative\n\nresearch ( 28 ).\n\n#### 2.5 Recruitment and participants\n\nPrior to recruitment, the study was introduced to individuals\n\nwith multiple sclerosis (pwMS) through a seminar hosted by the\n\nNordland MS Association. Additionally, seminars were\n\nconducted for health professionals in community healthcare and\n\nat the regional hospital. Written information about this study\n\n(and the RCT) was sent from the MS clinic at the regional\n\nhospital by post to all eligible individuals af fi liated with the\n\nhospital. Individuals who wished to participate signed the\n\nattached consent form and returned it in the pre-stamped\n\nenvelope. The inclusion criteria were as follows: had been\n\ndiagnosed with MS, had a score on the Expanded Disability\n\nStatus Scale (EDSS) ( 29 ) of ≤ 3.5, was ≥ 18 years, was employed\n\n(10% - 100% of full-time) and residential address in the two\n\nprede fi ned municipalities. The exclusion criteria were as follows:\n\npregnancy, exacerbation of symptoms within two weeks prior to\n\nenrollment and other serious conditions compromising balance,\n\nwalking or work capacity. All participants in the intervention\n\ngroup of the RCT ( n = 15) were included ( Table 3 ).\n\n#### 2.6 Data collection\n\nThe interview guide ( Table 4 ) was developed based on literature\n\nreviews, clinical experience and discussions within the research\n\ngroup and with user representatives. Two test interviews were\n\nconducted (with pwMS who were not part of the sample), and the\n\ninterview guide was then re fi ned around the following themes:\n\noverall experience and re fl ections from participation, content,\n\noutdoor setting, the group, and the physiotherapists. Questions\n\nwere open-ended to capture rich, in-depth re fl ections regarding\n\nparticipants ’ experiences, following a phenomenological approach.\n\nThe interviewer asked for both negative and positive experiences\n\nTABLE 4 Interview guide.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "Discussion: High-intensity training combined with detailed exercises in a\n\nphysiotherapy outdoor group was perceived to create meaningful bodily changes\n\nand enhance PA and prospects for both PA and life. Importantly, however, some\n\nnegative experiences were also reported from the high-intensity training. Enactive\n\ntheory allowed for the illumination of new perspectives: the importance of\n\nembodiment for self-ef fi cacy and of tailored physiotherapy and an outdoor-group\n\nenvironment for exploring one ’ s own limits to physical capabilities. These aspects\n\nshould inform future exercise interventions in pwMS with low disability.\n\nKEYWORDS\n\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy,\n\npostural balance, enactive theory\n\n### 1 Introduction\n\nMultiple sclerosis (MS) is a progressive in fl ammatory disease of\n\nthe central nervous system (CNS) that is typically diagnosed at 30 -\n\n40 years of age ( 1 ). A great concern is the signi fi cantly lower levels\n\nof physical activity (PA) in people with MS (pwMS) across\n\ndisability levels than in their healthy counterparts ( 2 , 3 ).\n\nEarly promotion of PA and exercise is recommended due to\n\nnumerous established bene fi ts in health, symptom management\n\nand well-being for pwMS ( 4 ). In particular, high-intensity\n\ntraining is endorsed, as it has possible neuroprotective effects in\n\nthe disease course ( 5 , 6 ). In addition, exercises addressing\n\nsensorimotor impairments (e.g., reduced muscle strength,\n\nreduced neuromuscular control) are recommended, as they target\n\nindividuals ’ capability to remain physically active ( 7 ).\n\nSensorimotor impairments can in fl uence trunk control, which is\n\ncommonly disturbed in pwMS, even when disability is low ( 8 , 9 ),\n\nand correlate with impaired balance, walking capacity and\n\ndistance ( 10 , 11 ). PwMS ’ s knowledge of exercise bene fi ts,\n\nattitudes and motivations, as well as contextual aspects such as\n\nlack of optimal exercise interventions, accessibility and support,\n\naffect the level of PA and exercise participation ( 12 ).\n\nCoreDISTparticipation ( Table 1 ) is a new comprehensive\n\nintervention addressing sensorimotor function, trunk control,\n\nhigh-intensity running/walking and work participation in pwMS\n\nwith low disability ( 13 ). It is based on the GroupCoreDIST <sup>1</sup>\n\nintervention, which has been shown to have signi fi cant short-\n\nand long-term effects on trunk control, balance and walking\n\namong pwMS ( 14 , 15 ). However, no effects of the intervention\n\non objectively measured PA have been identi fi ed, even though\n\nthe participants reported perceptions of new possibilities to be\n\nphysically active as their sensorimotor impairments improved\n\n( 16 ). To address PA challenges in pwMS, GroupCoreDIST was\n\nfurther developed to include a four-week period of outdoor\n\ntraining, in which high-intensity walking/running and\n\nGroupCoreDIST exercises are integrated ( Table 2 ). To our\n\nknowledge, combinations of high-intensity training and\n\nrehabilitation of speci fi c sensorimotor functions have been\n\nsparsely explored. Patient perspectives are essential for the\n\nevaluation of healthcare interventions ( 17 ); however, the new\n\noutdoor component of CoreDISTparticipation has yet to be\n\ninvestigated from a fi rst-person perspective. Particularly\n\ninteresting is what participants perceive as meaningful regarding\n\nthe intervention, as this is essential for motivation, motor\n\nlearning and exercise adherence ( 18 ).\n\nTo deepen our understanding of what the participants\n\nperceive as meaningful, we turn to a theoretical perspective\n\nthat integrates bodily capacities with the construction of\n\nmeaning. Enactive theory emphasizes that making sense of the\n\nworld depends essentially on the biological (living) body and\n\nthe phenomenological (lived or experienced) body ( 19 ), which\n\nimplies that the body is viewed as a neurobiological organism\n\nthat is concurrently experiencing, expressing and social", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed13.pdf" - }, - { - "text": "TABLE 1 Overview of the CoreDISTparticipation intervention.\n\n| Week 1: MS outpatient clinic | Consultation with the MS nurse (20 min) to address work-related issues based on a structured guide comprising the following themes: knowledge of MS at the workplace, experienced work-related challenges due to MS, potential needs and facilitators . |\n|:---|:---|\n| Week 1: MS outpatient clinic | Physiotherapy assessment (60 min) to explore the potential for changes in balance and walking aiming to turn focus toward possibilities and thus, motivate the patient . |\n| Week 1: MS outpatient clinic | Based on these assessments the MS nurse and the physiotherapist indicated the aspects of importance on a standardized form to inform the municipal physiotherapist. |\n| Week 1: MS outpatient clinic | Standardized testing (baseline, for the RCT). |\n| Week 2 - 5: Municipality | Physiotherapy assessment (60 - 90 min) to explore the patient ’ s impairments and potential for improvements in a clinical examination prior to group-training. |\n| Week 2 - 5: Municipality | Indoor group (60 min × 2 weekly, for 4 weeks). There were three to fi ve participants in each group and one physiotherapist. Trunk control, balance and physical activity were addressed (GroupCoreDIST). Participants received a link to CoreDIST digital exercise-videos and were advised to do them 1 × weekly throughout the intervention. (videos can be accessed here: https://www.nord.no/en/node/35,098 ) |\n| Week 2 - 5: Municipality | Digital meeting with a multidisciplinary team (pwMS, employer, physiotherapist & MS nurse) (20 min) regarding barriers to work participation and needs for adaptations regarding work and physical activity, according to a structured meeting-guide (one meeting). |\n| Week 6 | Standardized testing (midway, for the RCT). |\n| Week 7 - 10: Municipality | Outdoor group (60 min × 2 weekly, for 4 weeks). A maximum of ten participants and two physiotherapists were included in each group. Trunk control and balance (GroupCoreDIST exercises) were addressed, and high-intensity walking or running was performed. The intervention was conducted in a city park where both fl at and uneven surfaces and hilly terrain were available ( Table 2 ). |\n| Week 7 - 10: Municipality | Additionally, participants were encouraged to comply with the exercise-videos through a weekly SMS-reminder. |\n| Week 11 - 14 | Standardized testing ( fi nal, for the RCT) and qualitative interviews. |\n\nDahl et al. [10.3389/fresc.2024.1303094](https://doi.org/10.3389/fresc.2024.1303094)\n\n[Frontiers in Rehabilitation Sciences](https://www.frontiersin.org/journals/rehabilitation-sciences) 03 [frontiersin.org](https://www.frontiersin.org/)", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed13.pdf" - }, - { - "text": "given the heterogenic pathology and symptoms of MS ( 41 , 42 ).\n\nHowever, our fi ndings illuminate qualitative aspects of how to\n\nachieve tailored and meaningful intersubjective interactions in an\n\nexercise intervention.\n\nWe consider the instances of the physiotherapist running\n\ntogether with the participant, which were perceived as important\n\nfor participants ’ performance, to be an example of “ participatory\n\nsense-making ” ( 22 ) . As participants appreciated being guided or\n\neven pushed by the physiotherapists, it appears that the\n\nphysiotherapists were trusted in directing this interaction. As\n\nsuch, we argue that the physiotherapists ’ ability to adapt to\n\nparticipants ’ movements, speech and gestures — tailoring the\n\ninteraction to their needs — was important for this ability to be\n\nperceived as purposeful. This is supported by the few negative\n\nincidents described where the participant-physiotherapist\n\ninteraction seemed to not be jointly coordinated and appeared to\n\nfail. The reported mutual in fl uences of sensorimotor capabilities\n\nand interpersonal coordination, with the physiotherapists but\n\nalso the group, are in accordance with sensorimotor capacities\n\nand intersubjective interactions being important for sense-\n\nmaking in the world ( 35 ). The bene fi ts of these individualized\n\nparticipant-physiotherapist interactions are also described in\n\nspeci fi c core-stability exercises in indoor groups ( 16 , 43 ) and are\n\nin line with the theoretical framework of facilitation of\n\nmovement through hands-on interaction previously proposed\n\n( 44 , 45 ). Our study informs new knowledge of physiotherapist-\n\nparticipant interactions to achieve the recommended high-\n\nintensity training and calls for physiotherapy clinical reasoning\n\nthrough bodily and verbal communication skills adapted to the\n\nparticipants ’ responses in an ongoing and situated way.\n\nEnjoyment has previously been reported to promote PA\n\nin pwMS, and our study brings requested knowledge of what\n\ncan constitute enjoyment in an exercise intervention ( 46 ):\n\nplayful group-exercise tasks, a cheerful physiotherapist, and the\n\noutdoor environment.\n\nThe appreciation of being active outdoors in the study sample\n\naligns with that in the general population ( 47 ). The outdoors\n\nprovided a natural environment, which both invited participants to\n\nactively explore abilities thought of as left behind after their\n\ndiagnosis with MS, such as running, and provided an appreciated\n\nbreak from focusing on MS symptoms. We also suggest that the\n\npositive experiences of mastering the challenging weather\n\nconditions and the added meaning of exercising among other\n\npeople in the city park can be explained according to such terms.\n\nThese positive experiences show how we are enmeshed in our\n\nhistory, context and social encounters ( 35 ) and how these aspects\n\nshould also be accounted for when designing exercise interventions.\n\n#### 4.3 Methodological considerations\n\nThe design and methods were adequate for deriving\n\nknowledge from individuals ’ experiences. The participants self-\n\nreferred to the intervention and were recruited based on pre-set\n\ncriteria. This approach yielded rich information from people\n\nwith mild to moderate disabilities due to MS who were\n\nmotivated for physical activity (PA), employed, and residing in\n\nnorthern Norway. Ethnicity or socio-economic class were not\n\nrecorded. However, considering that all these factors can\n\nin fl uence PA engagement ( 46 ), it is possible that additional\n\naspects of the phenomenon could be uncovered in a different\n\nsample ( 48 ). There was a higher percentage of women\n\nparticipating than men; however, this corresponds to the gender\n\ndistribution in the MS population ( 1 ).\n\nThe use of enactive theory was innovative within the fi eld and\n\nallowed for, in particular, new aspects of importance for self-\n\nef fi cacy to be identi fi ed. Transference of our results to similar", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed13.pdf" - }, - { - "text": "about challenging our comfort-zone . (ID4, EDSS: 0)\n\nThe natural environment was also described as taking focus\n\naway from MS symptoms. Cold, rainy or snowy weather\n\nconditions required planning of adequate clothing; in addition,\n\nthese conditions led some participants to use cautious behavior\n\nwhen the ground was slippery and led a few to omit sessions.\n\nHowever, mastering outdoor exercise was highlighted in positive\n\nterms, such as discovering new ways to become active.\n\n3.4 Professional leadership, tailoring and\n\nco-creation of enjoyment\n\nThe way the physiotherapists led the group and, in particular,\n\ninteracted with each participant were regarded as helpful for\n\nimproving their bodily functions and activity levels. Some\n\nparticipants reported being afraid to try out new activities or\n\ntraining at high intensities after being diagnosed with MS but felt\n\nsafe to explore when supervised by the physiotherapist because of\n\ntheir trust in the relationship between them and in the\n\nphysiotherapist ’ s professional knowledge.\n\nHow the physiotherapist approached the participants\n\nindividually was described as important from this perspective. In\n\nparticular, bodily interactions in which the physiotherapist\n\ndemonstrated with his or her own body or placed his or her\n\nhands on the participant ’ s body to correct a movement were\n\nreported to be successful, as it helped to increase speed and gave\n\nparticipants a sense of performing better or for a longer duration.\n\nIf they did an exercise in a suboptimal way, participants reported\n\nreceiving precise supervision, or if they expressed pain or were\n\ninjured, the physiotherapist was supportive, assessed them and\n\nDahl et al. [10.3389/fresc.2024.1303094](https://doi.org/10.3389/fresc.2024.1303094)\n\n[Frontiers in Rehabilitation Sciences](https://www.frontiersin.org/journals/rehabilitation-sciences) 07 [frontiersin.org](https://www.frontiersin.org/)", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed13.pdf" - }, - { - "text": "highest quintile, a difference of 21% (EU27, 2019). <sup>196</sup> The **European Quality of Life Survey** (EQLS)\n\nfinds that 13% of the lowest quartile report bad health (EU28, 2016), compared to only 4% of the\n\nrespondents of the highest income quartile. <sup>197</sup>\n\nThe **relation between socioeconomic status — measured by income — and working conditions**\n\nis often not further analysed, at least not on an aggregated statistical level. Due to complex\n\nmethodological difficulties and strong national variations of the health systems, there are until now **no**\n\n**EU-wide morbidity statistics available, based on administrative data** . <sup>198</sup> A ‘Morbidity Task Force’\n\nat EU level worked between 2005 and 2011 on the development of such statistics. <sup>199</sup> Country-specific\n\ndata — without a harmonised approach between countries — are provided in EU and OECD publication\n\nseries. <sup>200</sup>\n\nThe system of **European Core Health Indicators (ECHI)** provides an overview on prevalence of major\n\ndiseases. <sup>201</sup> Main morbidities covered until now are asthma, chronic obstructive pulmonary diseases\n\n(COPD), communicable diseases, depression, dementia, diabetes, diseases caused by drugs,\n\nHIV/AIDS, and physical or sensory functional limitations. However, in ECHI there is no option to relate\n\nthese diseases to sectors or occupations.\n\nThe impact of work — as one essential element of the socioeconomic status — on health was the subject\n\nof numerous academic studies, often performed as specific case studies. The authors of an overview\n\nstudy on ‘Cross-country inequality in the EU’ summarise (more references in the original text):\n\n*‘Occupational grade and labour market status are among the factors most often studied in relation to*\n\n*health and mortality. Occupational grade has been found to be associated with self-rated health, mental*\n\n*and physical health, such as the presence of long-standing illness and a number of diseases. Lower*\n\n*occupation might affect health through poor working conditions, such as the higher exposure to*\n\n*occupational hazards and toxic compounds, health-damaging behaviours and psychosocial stress.*\n\n*Work-based stress combined with a lack of autonomy over one’s work are believed to be the*\n\n*psychosocial factors that can cause physiological changes, such as increased risk of cardiovascular*\n\n*diseases and reduced immune system response. It has been shown that the gaps in mortality between*\n\n*different occupational grades persist in old age and tend to widen with age.* <sup>202</sup>\n\nEurostat provides in the LFS **2020 Ad hoc module** on ‘Accidents at work and other work-related health\n\nproblems’ a rough overview on such relations, with some specification, for example, for sectors,\n\nattainment levels, professional status, size of enterprise or occupation. <sup>203</sup> The differences between four\n\naggregated occupational groups and work-related health problems is shown in the next table.\n\n**Table 23: People reporting work-related health problems by group of occupations (ISCO) - LFS Ad hoc**\n\n**2020 <sup>204</sup>**\n\n9.4% of the group of ‘ Managers, professionals, technicians and associate professionals’ and also 9.4%\n\nof the group of ‘Clerical support workers, service and sales workers’ report work-related health problems,\n\n2.4% to 4% lower than the two groups with predominantly manual occupations.\n\nBased on a systematic review of literature on the topic of health factors, a consortium of World Bank\n\nand Harvard School of Public Health developed for the WHO in the early 1990s a new approach, the\n\n**Global Burden of Disease (BoD)** . <sup>205</sup> This approach is meanwhile used by researchers and health\n\ninstitutes across the globe. <sup>206</sup>", - "page_start": 79, - "page_end": 79, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "However, explained variance estimates in our models\n\nranged from 34 to 61%, suggesting further research is\n\nnecessary to identify additional factors contributing to\n\nhealthcare utilization following physical therapy.\n\nThe primary limitation of the study is the high number\n\nof subjects lost to follow-up. We attempted to account\n\nfor the bias introduced by loss to follow-up in our\n\nmodels with IPAW, which is a robust strategy for con-\n\nducting analyses with missing data [ 41 , 51 ]. We observed\n\ngood concordance between results of complete case and\n\nweighted analyses, giving us confidence in our findings.\n\nHowever, important differences in age, race, education,\n\nsymptom onset, baseline pain intensity, and baseline\n\npain-related psychological distress were noted between\n\nthose who did and did not complete follow-up. These\n\ndifferences suggest that the group lost to follow-up may\n\nrepresent a unique population to whom these results\n\nmay not apply. Different factors may predict utilization\n\noutcomes for this unique population. As a result, readers\n\nshould exercise caution when extending these findings\n\nto individuals and populations that substantially differ\n\nfrom the analytic sample in this study. Specifically, these\n\npredictive models may need to be adjusted for younger\n\nindividuals of non-white race, with lower education\n\nlevels, sudden onset of symptoms, and those with higher\n\npain intensity and pain-associated distress.\n\nA second limitation is that we did not know about the\n\nsubjects ’ prior experiences with physical therapy, or\n\nwhether they arrived at physical therapy through direct\n\naccess or referral from another provider. These factors\n\ncould be associated with treatment expectations, which\n\nhave known effects on treatment outcomes [ 52 , 53 ]. We\n\nalso did not collect specific information on treatment.\n\nBut by including changes in pain, disability, and\n\npain-related psychological distress in the models, we\n\nwere able to account for treatment response. The benefit\n\nof this approach is that models are generalizable for pre-\n\ndicting utilization outcomes across “ real-world ” prag-\n\nmatic physical therapy settings where treatment\n\nvariation is expected. The drawback is that we are pro-\n\nhibited from making conclusions regarding which char-\n\nacteristics of the clinical encounter might influence\n\nsubsequent pain-related healthcare utilization. Important\n\ncharacteristics to consider would include number of\n\nvisits, type of interventions or whether patients com-\n\npleted their course of physical therapy. These have been\n\nproposed or identified as important contributors to\n\ndownstream costs following physical therapy [ 54 , 55 ]\n\nand may be a source of unexplained variance in our\n\nmodels. Characteristics of the clinical encounter should\n\nbe considered in future studies to refine the prediction\n\nmodels developed in our analyses.\n\nThird, we were unable to adequately model the spe-\n\ncific effects of worker ’ s compensation, self-pay and some\n\ncommercial insurance coverage on utilization due to the\n\nlow incidence of these forms of payment in our study\n\nsample. Modeling these separately would have created\n\nthe potential for unreliable and imprecise effect esti-\n\nmates. Readers should consider the within-group hetero-\n\ngeneity caused by this approach and exercise caution\n\nwhen applying these results to individuals who do not\n\nhave traditional public or private insurance coverage. Fu-\n\nture studies should investigate the performance of the\n\nOSPRO tools in predicting outcomes for patients with\n\nWorker ’ s Compensation.\n\nA final limitation is the use of patient recall to meas-\n\nure utilization. To mitigate recall bias, we used two\n\nfollow-up points, at 6 and 12 months. However, under-\n\nor over-reporting of utilization is often a concern with\n\nstudies requiring subject recall [ 56 - 58 ]. Medical record\n\nand claims data were not available for these subjects.\n\nReaders should consider our inability to independently", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed5.pdf" - }, - { - "text": "gave them advice for follow-up. Some participants said that when the\n\nphysiotherapist conducted the exercises or ran/walked together with\n\nthem, it made them increase their exercise intensity. One participant\n\ndescribed this as follows:\n\nThe physiotherapists pushed me to perform beyond what I\n\nthought I was able to — and that was great! There is no doubt\n\nthat if someone is running beside you and shouting “ come on-\n\nwell done ” , you manage to push yourself further. (ID8, EDSS: 2)\n\nHowever, one participant described an incident where the\n\ninteraction with the physiotherapists was not perceived as helpful:\n\nWhen I get tired, it gets dif fi cult. I can only do one thing at a\n\ntime, and then these physiotherapists came running, talking\n\nand trying to motivate at the same time. I got very tired, and\n\nmy leg would not follow my commands to run. (ID7, EDSS: 3.5)\n\nParticipants reported that they appreciated that the\n\nphysiotherapists made them engage in playful activities with a\n\nball, run for beanbags, and sing and in general created an\n\ninformal and nice atmosphere. The enjoyment created was\n\ndescribed as important for adherence to the intervention and as\n\nencouraging participants ’ physical effort during the session, as\n\nexercise felt easier when it was enjoyable. It was appreciated that\n\nthe physiotherapists were perceived as both cheerful and serious\n\nabout the intervention.\n\n### 4 Discussion\n\nThe main fi ndings of this study are that (1) being supported\n\nto explore and push one ’ s own physical capabilities by\n\ncombining high-intensity running/walking with detailed\n\nexercises was meaningful and evoked strong emotions.\n\nImproving one ’ s balance, walking, and running lead to\n\nincreased beliefs in one ’ s own possibilities. Some negative\n\nexperiences were also described, particularly from the high-\n\nintensity training. (2) An engaging outdoor group with tailored\n\nphysiotherapist-participant interactions and the co-creation of\n\nenjoyment was perceived to be important for the success of the\n\nindividual. These fi ndings illustrate how the dynamic\n\nintertwining of the body and movement, context and\n\nintersubjective interactions create meaning and beliefs in one ’ s\n\nown physical capabilities ( 19 ).\n\n4.1 Bodily experiences are inherent to\n\nbeliefs in the mastery of physical activity\n\nThe meaningfulness of exploring the limits of training\n\nintensity that we identi fi ed in our study corresponds with\n\nother studies of pwMS ’ s experiences of interventions\n\naddressing intensity of activity ( 31 , 32 ). The exercises\n\nemphasizing trunk control were reported to reduce movement\n\nimpairments and are in line with a study of pwMS with higher\n\ndisabilities participating in an indoor group intervention ( 16 ).\n\nHowever, the perceived interlinking of improved sensorimotor\n\nfunctions and the ease of and ef fi ciency in high-intensity\n\nwalking/running have not been reported previously. It is likely\n\nthat the detailed exercises prompted activations of the CNS\n\nand musculoskeletal systems, which are prerequisites for high-\n\nintensity walking and running ( 33 ). Impairments in such\n\nsystems commonly occur due to CNS lesions or secondary\n\ninactivity, and function can improve with increased use ( 18 ).\n\nOur results support the value of integrating such speci fi city to\n\noptimize the capability to train at high intensity, even in\n\nindividuals with low EDSS scores.\n\nThe described emotional associations of these bodily changes\n\nare interesting. Achieving higher exercise intensities, easier\n\nmovements, reduced pain and improved sensation lead to\n\npositive feelings and enhanced prospects for both PA and life,\n\nwhile for some individuals, a failure to achieve high-intensity or\n\nno immediate changes in impairments are associated with\n\nfeelings of loss and negative prospects. This calls attention to\n\nacknowledging that sensorimotor capacities facilitate or constrain\n\nhow an individual perceives the world, which is closely", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed13.pdf" - }, - { - "text": "exposure; many of these diseases are recognised as occupational diseases. Much less clear are the\n\nattributions of work to cardiovascular, mental, other respiratory diseases like asthma or COPD, and\n\ndigestive diseases.\n\nLately, the **WHO and ILO have made joint efforts** to identify the best possible estimates based on the\n\nsystematic review of scientific literature on such connections. The newest WHO/ILO review of risk\n\npairs <sup>214</sup> identified several significant relations between specific risks of work conditions and related\n\ndiseases, for example, long working hours and stroke, or exposure to particulate matter, gases and\n\nchronic obstructive pulmonary diseases. For some specific chemicals and metals, the AF is very low\n\nbecause other exposures — nutrition, environment — might have a much bigger impact than workplace", - "page_start": 80, - "page_end": 80, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Even in the **short period between 2013 and 2018** (the period covered by these pilot statistics) the data\n\nshow an overall decline and a decline of several relevant occupational diseases. The strongest decrease\n\n— practically a halving — can be seen for hearing impairments (diseases of the inner ear).\n\nPneumoconiosis, mesothelioma and selected occupational cancers went down between 7% and 14%.\n\n**Asthma and some recognised MSDs** are more or less stagnating, probably due to unchanged\n\nexposure to biological or chemical substances and no change regarding the health outcomes of\n\nergonomic working conditions.\n\nIf work is **one of some** causative factors, a clear assignment of work to a health outcome is complex.\n\nMoreover, in many cases a quite **long observation period** is necessary simply due to the **latency time**\n\n**between exposure at work, outbreak and detection of a disease** , which is obviously very different\n\nfrom the clear and immediate consequence of an accident at work.\n\nThe detection of a disease and the correlation between work and this disease depends highly on the\n\n**monitoring capacities of the health system and its ability, tradition and standards to connect**\n\n**diseases and work-related causes** . In a study on ‘Asbestos ‐ related occupational diseases in Central\n\nand East European Countries’ the authors refer to different policies for identifying workers formerly\n\nexposed to asbestos and conclude:\n\n*‘Consequently, large differences are observed from one country to another regarding the number of*\n\n*recognised asbestos-related cases. In Slovenia, for example, the annual asbestosis rate (cases of*\n\n*asbestosis/population) amounts to 14.9, in Croatia 5.3, and in Poland 2.1. Moreover, in Estonia, the*\n\n*incidence of asbestosis is unknown as there is no systematic collection of data.’* <sup>181</sup>\n\nFor example, until now very few occupational diseases have been recognised as outcomes of\n\npsychosocial risks at work. The ILO proposes in its ‘List of Occupational Diseases Recommendation’ a\n\nlarge number of very specific and ‘classic’ occupational diseases — a very broad definition of *‘Mental*\n\n*and behavioural disorders’* but leaving the responsibility to science and to ‘national conditions’. <sup>182</sup>\n\nSimilarly, the development of the European Schedule of Occupational Diseases (ESOD) aims to\n\nimprove knowledge, step up prevention and provide assistance in linking occupational activities and\n\ndiseases.\n\n© Bernard Maurin/Adobe Stock", - "page_start": 74, - "page_end": 74, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_STO_2004.pdf", - "query": "What was the sales revenue of Santos in 2004 ?", - "target_page": 12, - "target_passage": " Sales revenue was a record $1,501 million", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "**MALEO NEGOTIATIONS**\n\n**ADVANCED**\n\nOutside Australia, Santos and\n\nits co-venturers have executed\n\na Heads of Agreement for the\n\nsale of the entire gas reserves\n\nof the Maleo field offshore East\n\nJava, Indonesia. Santos continued\n\nnegotiations with PT Perusahaan\n\nGas Negara, Indonesia’s state-\n\nowned gas distributor, on behalf\n\nof the joint venture to finalise\n\nthe Gas Sales Agreement. The\n\nproject is targeting first\n\nproduction in the first half of\n\n2006 at rates of up to 100\n\nmmcf/d for more than five years.\n\n**FIRST RETAIL GAS SALES WITH**\n\n**SANTOS DIRECT**\n\nAs well as selling gas into the\n\nwholesale gas market, Santos\n\nsecured a retail gas licence from\n\nthe Victorian Government in\n\n2004. This allows Santos to sell\n\ngas direct to industrial customers\n\nand into the Victorian spot\n\nmarket through a wholly-owned\n\nsubsidiary, Santos Direct Pty Ltd\n\n(‘Santos Direct’).\n\nSantos Direct will market Santos’\n\n10% share of gas production from\n\nthe Minerva field - around 15\n\nTJ/d - in the offshore Otway\n\nBasin, which commenced\n\nproduction at the end of 2004.\n\nThe move to market and sell gas\n\ndirectly into the Victorian retail\n\nmarket is a first for Santos and\n\nleverages off Santos’ position as\n\none of Australia’s largest gas\n\nproducers, supplying wholesale\n\ngas to major industrial customers\n\nand specialist marketers in all\n\nmainland Australian states and\n\nterritories.\n\n**LIQUIDS MARKETING**\n\n**ALLIANCE WITH BP**\n\nAnother important marketing\n\ndevelopment during the year was\n\nthe decision to outsource the\n\nmarketing of crude oil and natural\n\ngas liquids to BP. The new\n\nmarketing arrangements are in\n\nresponse to the significantly\n\nhigher volumes of crude oil\n\nthat Santos will receive from\n\nthe Mutineer-Exeter and Oyong\n\nprojects, coming on stream\n\nin 2005, and the increasing\n\nglobalisation of the liquids\n\nmarketplace.\n\nThe validity of this approach has\n\nalready been demonstrated by the\n\nsale of the first Mutineer-Exeter\n\noil cargo at a premium to Tapis\n\ndespite a discount for the\n\nuncertain delivery date.\n\nSantos continues to build\n\nan inventory of high quality\n\noptions to provide a platform\n\nfor production growth over\n\nthe coming years. Santos is\n\ncommitted to a program of\n\ndiversification while capitalising\n\non the long-term Cooper Basin\n\nlegacy asset. Most importantly,\n\nthis involves leveraging\n\nthe strengths of the core\n\ncompetencies built up over\n\na number of years and Santos'\n\nwell-positioned domestic\n\ngas franchise.\n\nAnnual Report 2004 21\n\n**‘During 2004 we brought**\n\n**together everyone at Santos**\n\n**responsible for commercialisation**\n\n**into a single team. One of the**\n\n**outcomes from this was the**\n\n**introduction of gas swaps,**\n\n**where we were able to move**\n\n**gas between Santos assets in**\n\n**different states.’**\n\n**RICK WILKINSON**\n\nVice President\n\nGas Marketing\n\nand Commercialisation\n\n**The alignment of joint venture**\n\n**interests in the John Brookes and**\n\n**East Spar fields has created an**\n\n**important production hub at**\n\n**Varanus Island, Carnarvon Basin,**\n\n**offshore Western Australia.**", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 23\n\nIn 2004, Santos continued its\n\nnormal business of actively\n\nmanaging its portfolio through\n\nthe divestment of non-core assets\n\nand the acquisition of assets that\n\nfit well with existing Santos\n\nassets or can add to the ability\n\nof the Company to meet its\n\nstrategic goals.\n\nAs a result of this activity,\n\nSantos realised an after-tax profit\n\nof $47.4 million on oil and gas\n\nasset sales and will continue to\n\nhigh-grade its portfolio on an\n\nongoing basis.\n\nSantos entered into an agreement\n\nwith PT Medco during the first\n\nhalf of 2004 to acquire some of\n\nNovus Petroleum’s Indonesian and\n\nCooper Basin assets conditional\n\non the success of PT Medco’s\n\ntakeover offer for Novus, which\n\nwas ultimately successful.\n\nSpecifically, Santos announced\n\nin September 2004 that it had\n\nexecuted formal agreements to\n\nacquire an additional 4.75% of\n\nthe South Australian Cooper\n\nBasin, 18% of the Brantas PSC\n\nand 9% of the Kakap PSC from\n\nMedco for US$110 million. On\n\n31 December 2004, Santos paid\n\nMedco US$98 million for the\n\nmajority of the assets, with\n\npayment for the remaining 2.75%\n\nof Kakap PSC expected to be\n\nmade in the first quarter of 2005.\n\nThis acquisition was an important\n\npiece in the strategic puzzle to\n\ntie up access to follow-up\n\npotential from the successful\n\nexploration at Jeruk and to\n\nprovide a production base for\n\nthe newly established Indonesian\n\ncore area.\n\nAlso during the first half of 2004,\n\nSantos divested its remaining\n\n18.4% shareholding in Magellan\n\nPetroleum Australia Ltd, raising\n\napproximately $10.6 million.\n\nEarly in the second half of 2004,\n\nSantos concluded the sale of its\n\nnon-core onshore Otway Basin\n\ninterests to Origin Energy for\n\n$25.75 million. This sale\n\nresulted in an after-tax profit\n\nof $18 million that was booked\n\nin 2004.\n\nIn addition, an exploration\n\njoint venture was formed with\n\nConocoPhillips in the NT/P61\n\nblock offshore Darwin, Northern\n\nTerritory, to drill the Caldita well\n\nand provide Santos with access\n\nrights to a potential expansion of\n\nthe Wickham Point LNG facility.\n\nThis deal further enhances Santos’\n\ninfrastructure strategy to leverage\n\nits position within vital\n\ninfrastructure to improve\n\nshareholder value while reducing\n\nthe risk profile of the wildcat\n\nexploration program.\n\nDuring the third quarter, Santos\n\nexpanded its offshore Victorian\n\ngas interests to 50% in both the\n\nPatricia-Baleen and the Sole gas\n\nfields through the acquisition\n\nfrom Trinity Gas Resources of an\n\nadditional 30% interest in the\n\nPatricia-Baleen gas field and\n\nassociated processing facilities in\n\neastern Victoria and an additional\n\n15% interest in the Sole gas field.\n\nSantos earned its 30% additional\n\nequity in the Patricia-Baleen gas\n\nfield by meeting Trinity’s\n\nremaining share of drilling costs\n\non the Baleen 4 well which was\n\ndrilled successfully as a sidetrack\n\nwell of Baleen 3. Santos will earn\n\nits 15% additional equity in the\n\nSole gas field by meeting certain\n\ndevelopment costs on behalf of\n\nTrinity, if and when the Sole joint\n\nventure partners proceed to\n\ndevelop this gas resource.\n\nThe acquisition of these Victorian\n\ngas interests strengthens Santos’\n\ndomestic gas and infrastructure\n\nstrategy that was further\n\nenhanced by the OMV purchase\n\nannounced early in 2005.\n\nImportantly, Santos is now the\n\noperator of the strategic Orbost\n\ngas processing facility.\n\nLate in the year, Santos sold its\n\n18.02% share in the Carpentaria\n\nGas Pipeline between Ballera\n\nand Mount Isa in Queensland\n\nto Australian Pipeline Trust for\n\n$59 million, resulting in a\n\n$21 million after-tax profit\n\nthat was booked in the 2004\n\nfinancial year.\n\nENHANCING THE PORTFOLIO\n\n**BRANTAS PSC**", - "page_start": 24, - "page_end": 24, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 28\n\nof opportunities to use fewer\n\ngreenhouse-emitting or renewable\n\nsources of energy.\n\nTo achieve these commitments\n\nSantos is actively pursuing an\n\nemissions intensity reduction\n\ntarget (greenhouse emissions\n\nper unit of production) of 20%\n\nin the period from 2002 to 2008.\n\n**SUPPORTING COMMUNITIES**\n\nSantos has relationships with a\n\nnumber of communities where it\n\noperates. Some have been long-\n\nterm and others are just beginning.\n\nRelationships with communities\n\noutside Australia, such as Indonesia\n\nand the United States, are also\n\nemerging as Santos’ business grows\n\nin these locations.\n\nSantos made contributions\n\nduring 2004 to a wide variety of\n\norganisations and events through\n\nthe sponsorship program as part\n\nof the Company’s commitment\n\nto supporting the communities\n\nto which it belongs.\n\nPartnerships continued in 2004\n\nwith the Australian School of\n\nPetroleum, the Adelaide Symphony\n\nOrchestra, the State Opera\n\nCompany of South Australia, the\n\nArt Gallery of South Australia and\n\nthe Lloyd McDermott Foundation.\n\nOne of the highlights of the 2004\n\nprogram was the establishment\n\nof the Santos Community Fund.\n\nIt brings together all of the\n\ncontributions Santos makes to\n\ncommunity-based organisations\n\nand recognises and supports the\n\nefforts of Santos employees who\n\nchoose to contribute their own\n\ntime and resources to improving\n\ntheir communities.\n\nThe ‘Our Patch’ program was a\n\nrecipient of this fund in 2004.\n\nThis is a joint initiative of the\n\nPatawalonga and Torrens\n\nCatchment Management Boards\n\nwhich encourages the local\n\ncommunity to assist with the\n\nrehabilitation and management\n\nof Adelaide’s water catchment.\n\nSantos has adopted a patch of\n\nthe River Torrens and employees\n\nare assisting with the remediation\n\nand revegetation of this area in\n\na volunteering program.\n\n**CORPORATE GOVERNANCE**\n\nFor the third year running, the\n\nintegrity of Santos’ corporate\n\ngovernance was recognised in\n\n2004 with the maximum five-star\n\nrating in the Corporate\n\nGovernance Research Report\n\nprepared by Horwath and the\n\nUniversity of Newcastle.\n\nA more detailed overview of\n\ncorporate governance at Santos\n\nfollows on page 29 of this\n\nAnnual Report.\n\nMore detailed information about\n\nsustainability at Santos is\n\ncontained in the Sustainability\n\nReview and copies are available\n\nfrom the Company and via the\n\nSantos website www.santos.com.\n\n**Santos employees rehabilitating a section of the River Torrens in Adelaide, as part of Santos’ three-year**\n\n**commitment to the Our Patch project.**", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 TAPPING INTO THE ENERGY… INSIDE Santos Ltd ABN 80 007 550 923 CHAIRMAN’S REVIEW **2** Stephen Gerlach comments on Santos’ performance in 2004. 2004 ACHIEVEMENTS 2005 AND BEYOND **3** Key achievements in 2004 and three-year performance, plus what to look for in the near-term future. MANAGING DIRECTOR’S REVIEW **4** John Ellice-Flint reviews Santos’ 50th year, where the values embodied in the great explorers of yesteryear are shaping Santos today. THE WORLD OF SANTOS **8** Locations of Santos’ global exploration, development and production activities. ANALYSING FINANCIAL PERFORMANCE **10** Putting the numbers in perspective and explaining the 2004 financial results. LEVERAGING BASE BUSINESS **12** Production results for 2004 plus a review of activities that are creating value in Santos’ base business. CREATING OPPORTUNITIES **15** Exploration strategy, results and acreage acquisitions, 2005 program and new venture opportunities.", - "page_start": 0, - "page_end": 0, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 11\n\n**DEPRECIATION, DEPLETION AND**\n\n**AMORTISATION**\n\nAll things being equal, DD&A\n\ncould have been expected to\n\nbe lower this year, as Santos\n\nproduced lower volumes and had\n\nwritten off the Heytesbury plant\n\nin the onshore Otway Basin\n\nlast year.\n\nHowever, two factors caused an\n\nincrease in 2004 DD&A. Firstly,\n\nwhile reserve revisions were\n\npositive overall, negative\n\nrevisions were predominantly in\n\nproducing areas which increased\n\ndepletion rates in 2004, while\n\npositive reserve revisions were in\n\nareas where Santos is not yet\n\nproducing or where straight line\n\ndepreciation is dominant; for\n\nexample, Casino and John\n\nBrookes.\n\nSecondly, on the future\n\ndevelopment cost side, depletion\n\nis up partly because Santos is\n\nstarting to factor in higher steel\n\nand service company costs into\n\nlong-term economic models.\n\n**CASH FLOW LOWER**\n\nWhile Santos had a strong profit\n\nyear, this is not fully reflected in\n\ncash flows.\n\nThere were large movements\n\nin trade debtors between years,\n\nreflecting the timing of liftings\n\nand the payments for them.\n\nIn addition, Santos has not yet\n\nbeen paid for the insurance claim\n\nrelating to the Moomba incident.\n\nA total of $117 million was\n\nrecognised in sundry income,\n\nwhich represents an estimate\n\nof the amount receivable from\n\ninsurers for lost revenue,\n\nadditional costs and replacement\n\nplant and equipment. At year end\n\nthe money was still owed and so\n\nis not shown as part of operating\n\ncash flow. The final quantification\n\nof the claim with insurers is\n\nprogressing.\n\n**RECORD CAPITAL EXPENDITURE**\n\nCapital expenditure ended\n\nright on target at $930 million -\n\na record year for Santos -\n\napproaching a level which is\n\ndouble DD&A, reflecting how\n\nrapidly the portfolio is changing.\n\nSantos will continue with a high\n\ndevelopment expenditure in 2005,\n\nbut expects to spend more in line\n\nwith cash generation. Exploration\n\nspend is estimated to be about\n\n$150 million, while development\n\nspend is expected to be reduced\n\nto $530 million and delineation\n\nto $90 million. Other capital\n\nspending is expected to be\n\nreduced to $80 million.\n\nThis results in a total planned\n\ncapital expenditure for 2005 of\n\napproximately $850 million.\n\n**FINANCIAL FLEXIBILITY INTACT**\n\nSantos ended the year in a\n\nstrong financial position with its\n\nfinancial flexibility intact, despite\n\nthe record development spending.\n\nThe FUELS issue was successful\n\nand Santos’ gearing increased\n\nonly marginally, despite the large\n\ncapital program in 2004.\n\nThis is important in Santos’\n\nbusiness as the Company needs\n\nto be able to fund exploration\n\nsuccess as it occurs, and our\n\ndevelopment projects are\n\nincreasing in size.\n\n’01 ’02 ’03 **’04**\n\n**OPERATING CASH FLOW AND CAPITAL EXPENDITURE**\n\n$million\n\nOperating cash flow Capital expenditure\n\n0\n\n200\n\n400\n\n600\n\n800\n\n1000\n\n717\n\n660\n\n761 750\n\n**605**\n\n821 897 **930**", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 10\n\n**2004 WAS A YEAR OF GOOD**\n\n**OPERATING RESULTS**\n\nOverall the increase in 2004 profit\n\nof 16% reflected a year of sound\n\noperating performance. Sales\n\nrevenue was a record $1,501\n\nmillion, up 2.5% on 2003,\n\nreflecting higher prices across\n\nmost products and was achieved\n\ndespite lower production as a\n\nresult of the Moomba incident\n\nand declining output from late\n\nlife fields.\n\nSantos benefited from higher\n\nworld oil prices and realised\n\nUS$51.83 per boe in 2004, an\n\nincrease of 19% over 2003. The\n\nbenefit of higher world oil prices\n\nsubstantially offset the impact\n\nof lower production volumes.\n\nSantos was also able to negotiate\n\nhigher domestic gas prices (up\n\n4% on average) and deliver new\n\nrevenue streams from project\n\nstart-ups and acquisitions during\n\nthe year.\n\n**PRODUCTION HAMPERED BY**\n\n**MOOMBA INCIDENT**\n\n2004 production was lower due\n\nto the Moomba incident, which\n\nreduced production by 4.6 million\n\nboe. Field decline reduced\n\nproduction by a further\n\n5.0 million boe.\n\nOffsetting these factors, Santos’\n\ngrowth projects are starting to\n\ncome on line and have begun to\n\nreverse the decline experienced\n\nover the past three years. Two\n\nprojects were commissioned in\n\n2004: the Bayu-Undan liquids\n\nproject and the Minerva gas\n\nproject. In addition, acquisitions\n\ncontributed 0.8 million boe to\n\nproduction.\n\nFor 2005, production is expected\n\nto improve by around 15%, or\n\n4% excluding the impact of the\n\nMoomba incident. Santos now\n\nexpects production to be around\n\n54 million boe in 2005. This\n\nincrease is largely driven by the\n\ncommissioning of Mutineer-Exeter\n\nin March 2005 and the John\n\nBrookes gas field in the middle\n\nof the year.\n\n**PRODUCTION COSTS**\n\n**UNDER CONTROL**\n\nProduction costs in 2004 were\n\n$309 million, up $45 million or\n\n17% on 2003. Analysis shows\n\nthat Santos was able to continue\n\nto effectively control its costs\n\nin the face of significant external\n\npressures in the form of rising\n\nservices and materials prices.\n\nExamining production costs in\n\ndetail reveals:\n\n- the start-up of Bayu-Undan and\n\nacquisitions added $16 million\n\nto Santos’ cost base\n\n- changes in our accounting\n\nadded a further $16 million\n\nto Santos’ production costs\n\n- higher insurance premiums\n\n($8 million) and one-off stock\n\nwrite-offs ($5 million) were\n\noffset by $17 million in cost\n\nsavings largely as a result of\n\nSantos’ continuous\n\nimprovement initiatives\n\n- the Moomba incident resulted\n\nin $17 million of one-off costs\n\nin 2004.\n\nPiecing this together, the key\n\nthemes in our financial\n\nperformance were:\n\n- cost savings in established\n\nproduction areas more than\n\noffset increases in the price\n\nof services and materials\n\n- Santos’ cost base rose as\n\nproduction from new\n\ndevelopments and acquisitions\n\nwere added to the Company’s\n\nexpanding portfolio of\n\nproducing assets.\n\n## ANALYSING FINANCIAL PERFORMANCE\n\n**‘The sound operating results**\n\n**achieved in 2004 underline**\n\n**the changing face of Santos**\n\n**towards a higher value, higher**\n\n**margin business. We ended the**\n\n**year with a strong financial**\n\n**position and our financial**\n\n**flexibility intact.’**\n\n**PETER WASOW**\n\nChief Financial Officer\n\n’01 ’02 ’03 **’04**\n\n**PRODUCTION AND SALES REVENUE**\n\nRevenue Net profit after tax Production\n\n1,460\n\n445 322 327 **380**\n\n1,478 1,465\n\n54.2 57.3 55.7\n\n**1,501**\n\n**47.1**\n\n0\n\n500\n\n1000\n\n1500\n\n2000\n\n0\n\n10\n\n20\n\n30\n\n40\n\n50\n\n60\n\n$million mmboe", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 70\n\nNOTES TO THE FINANCIAL STATEMENTS\n\nfor the year ended 31 December 2004\n\n**22. Investments in Controlled Entities**\n\n**Name Place of Name Place of**\n\n**incorporation incorporation**\n\n1 Beneficial interests in all controlled entities is 100% except for Kipper GS Pty Ltd in which two shares of the total issued capital of 9,246,353\n\nshares are owned by a third party.\n\n2 Company acquired during the year.\n\n3 Company incorporated during the year.\n\n**Santos Ltd (Parent Entity)** SA\n\n**Controlled entities <sup>1</sup> :**\n\nAlliance Petroleum Australia Pty Ltd VIC\n\nBoston L.H.F. Pty Ltd VIC\n\nBridgefield Pty Ltd QLD\n\nBridge Oil Developments Pty Limited NSW\n\nCanso Resources Pty Ltd NSW\n\nCoveyork Pty Ltd NSW\n\nDoce Pty Ltd QLD\n\nFarmout Drillers Pty Ltd NSW\n\nKipper GS Pty Ltd WA\n\n*Controlled entity of Kipper GS Pty Ltd*\n\nCrusader (Victoria) Pty Ltd VIC\n\nMoonie Pipeline Company Pty Ltd QLD\n\nNovus Australia Resources NL <sup>2</sup> VIC\n\nReef Oil Pty Ltd NSW\n\nSantos Asia Pacific Pty Ltd QLD\n\n*Controlled entities of Santos Asia Pacific Pty Ltd*\n\nSantos (Sampang) Pty Ltd SA\n\nSantos (Warim) Pty Ltd SA\n\nSantos Australian Hydrocarbons Pty Ltd QLD\n\nSantos (BOL) Pty Ltd NSW\n\n*Controlled entity of Santos (BOL) Pty Ltd*\n\nBridge Oil Exploration Pty Limited ACT\n\nSantos Darwin LNG Pty Ltd ACT\n\nSantos Direct Pty Ltd <sup>3</sup> SA\n\nSantos Facilities Pty Ltd SA\n\nSantos Finance Ltd NSW\n\nSantos Globe Pty Ltd *(formerly Globex Far East Pty Ltd)* WA\n\nSantos International Holdings Pty Ltd ACT\n\n*Controlled entities of Santos International Holdings Pty Ltd*\n\nBarracuda Limited PNG\n\nLavana Limited PNG\n\nNovus UK (Kakap 2) Limited <sup>2</sup> UK\n\nPeko Offshore Ltd BER\n\nSanro Insurance Pte Ltd SING\n\nSantos Americas and Europe Corporation USA\n\n*Controlled entity of Santos Americas and Europe Corporation*\n\nSantos USA Corp USA\n\nSantos (Bawean) Pty Ltd SA\n\nSantos Brantas Pty Ltd <sup>3</sup> VIC\n\nSantos (Donggala) Pty Ltd <sup>3</sup> VIC\n\nSantos Egypt Pty Ltd <sup>3</sup> VIC\n\nSantos Hides Ltd PNG\n\nSantos International Operations Pty Ltd QLD\n\nSantos (Madura Offshore) Pty Ltd WA\n\nSantos Niugini Exploration Limited PNG\n\nSantos (Nth Bali 1) Pty Ltd SA\n\nSantos (Papalang) Pty Ltd SA\n\nSantos (Popodi) Pty Ltd SA\n\nSantos (JPDA 91-01) Pty Ltd ACT\n\nSantos (JPDA 91-12) Pty Ltd ACT\n\nSantos (NGA) Pty Ltd VIC\n\nSantos (N.T.) Pty Ltd ACT\n\n*Controlled entity of Santos (N.T.) Pty Ltd*\n\nBonaparte Gas & Oil Pty Limited NSW\n\nSantos Offshore Pty Ltd VIC\n\nSantos Oil Exploration (Malaysia) Sdn Bhd (in liquidation) MAL\n\nSantos Petroleum Pty Ltd NSW\n\nSantos QNT Pty Ltd QLD\n\n*Controlled entities of Santos QNT Pty Ltd*\n\nSantos QNT (No. 1) Pty Ltd QLD\n\n*Controlled entities of Santos QNT (No. 1) Pty Ltd*\n\nSantos Petroleum Management Pty Ltd QLD\n\nSantos Petroleum Operations Pty Ltd QLD\n\nTMOC Exploration Proprietary Limited QLD\n\nSantos QNT (No. 2) Pty Ltd QLD\n\n*Controlled entities of Santos QNT (No. 2) Pty Ltd*\n\nAssociated Petroleum Pty Ltd QLD\n\nMoonie Oil Pty Ltd QLD\n\nPetromin Pty Ltd QLD\n\nSantos (299) Pty Ltd QLD\n\nSantos Exploration Pty Ltd VIC\n\nSantos Gnuco Pty Ltd QLD\n\nTransoil Pty Ltd QLD\n\nSantos Resources Pty Ltd QLD\n\nSantos Timor Sea Pipeline Pty Ltd NSW\n\nSesap Pty Ltd <sup>2</sup> VIC\n\nVamgas Pty Ltd VIC", - "page_start": 71, - "page_end": 71, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 26\n\nLate in 2004 Santos published\n\n*First Steps: Sustainability Review* ,\n\nthe Company’s first standalone\n\npublication on this topic.\n\nIt describes how Santos is\n\nimplementing the principles\n\nof sustainability in the areas\n\nof corporate governance, the\n\nenvironment, social responsibility\n\nand economic performance.\n\nThis was a significant milestone\n\nfor Santos as it represents a\n\nstarting point for the collection\n\nof data and the ongoing\n\nmeasurement of performance\n\nin the area of sustainability.\n\nCommunicating with stakeholders\n\nis an important activity and the\n\npublication of the Sustainability\n\nReview is a further extension\n\nof Santos’ commitment in this\n\nregard. Santos applies considerable\n\nresources to the communication\n\neffort and aims to present\n\ninformation in a clear and concise\n\nmanner in order to generate a\n\ngreater understanding of the\n\nbusiness by its stakeholders.\n\nSantos has been recognised for\n\nits achievements in this area.\n\nSantos’ 2003 Annual Report\n\nwas featured as an example\n\nof best practice reporting in\n\nPricewaterhouseCoopers’ *Trends*\n\n*in Corporate Reporting 2004*\n\npublication. Reports from\n\ncompanies worldwide are\n\nconsidered in compiling this\n\npublication and they must\n\nmeet specified criteria. This is\n\nthe third time a Santos annual\n\nreport has been featured. Santos\n\nwas also awarded a 2004 Silver\n\nAward for Excellence in Annual\n\nReporting for the 2002 Annual\n\nReport by the Australasian\n\nReporting Awards.\n\nReceiving independent recognition\n\nfor these activities serves as\n\na reference point for Santos’\n\ndesire to continually improve\n\ncommunication performance.\n\nSantos has been listed as\n\nan inaugural member of the\n\nAustralian SAM Sustainability\n\nIndex (AuSSI). The AuSSI tracks\n\nthe performance of around 70\n\nAustralian companies that lead\n\ntheir industry in terms of\n\neconomic, environmental and\n\nsocial criteria. The index is\n\ncalculated daily by Dow Jones\n\nIndexes and published in *The*\n\n*Australian* newspaper.\n\nFollowing is an overview of\n\nprogress and achievements in the\n\narea of sustainability for 2004.\n\n**SAFETY IMPROVING**\n\nThe health and safety of employees\n\nis of paramount concern to Santos.\n\nSantos delivered another year of\n\nimprovement in 2004 and achieved\n\nits lowest total recordable case\n\nfrequency rate of 6.4.\n\nFurther improvements were also\n\nmade with the implementation\n\nof the Environment, Health and\n\nSafety Management System\n\nstandards, with Santos operations\n\nundergoing full assessments\n\nagainst standards for the\n\nfirst time.\n\nThe results demonstrated\n\nconsiderable improvement\n\nover the baseline assessments\n\nconducted in 2003 with steady\n\nprogress in the implementation\n\nof the procedures, processes and\n\ntools needed to achieve the\n\nrequirements of the standards.\n\nProcess safety capability which\n\ndeals with plant and equipment\n\nintegrity assurance, design and\n\nconstruction, and maintenance,\n\nis being developed through\n\nthe formation of a new set of\n\nstandards to be incorporated\n\ninto the health and safety\n\nmanagement system.\n\nThe safety focus in 2005 will be\n\non finalising a comprehensive set\n\nof hazard standards which outline\n\nthe required controls to ensure\n\nthat hazards encountered across\n\nSantos’ operations and activities\n\nare well managed.\n\n**POSITIONING THE WORKFORCE**\n\n**FOR THE FUTURE**\n\nSantos commenced a major\n\ncompany-wide transformational\n\nchange program in late 2003.\n\nThe program was designed to\n\nsignificantly improve Santos’\n\nperformance in four areas: key\n\nbusiness processes, financial\n\nperformance, organisation\n\nstructure and company culture.\n\nReorganising and simplifying the\n\nCompany’s structure was one of\n\nthe major outcomes and in May\n\n2004 Santos began operating\n\nunder a new functionally-based\n\norganisation structure.\n\nThe new structure is designed\n\nto support the exploration-\n\nfocused growth strategy.\n\nIt mirrors the ‘conveyor belt’\n\nlifecycle of an exploration\n\nand production company where\n\nexploration success leads\n\nto commercialisation and", - "page_start": 27, - "page_end": 27, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 83\n\n**30. Superannuation Commitments (continued)**\n\nThe Santos Superannuation Plan has employee accrued benefits and assets as disclosed in the most recent financial report of the plan, as follows:\n\n**As at**\n\n**31 December 2003**\n\n**$million**\n\nNet market value of assets 195.8\n\nLess present value of employees’ accrued benefits as determined\n\nby actuarial assessment as at 1 January 2004 (194.8)\n\nExcess 1.0\n\nAt 31 December 2004 the vested benefits, or the benefits payable in the event of the termination of employment of each plan member, were\n\n$198.2 million (2003: $198.8 million) and the net market value of assets was $202.0 million (2003: $194.2 million).\n\n**Consolidated Santos Ltd**\n\n**2004** 2003 **2004** 2003\n\n**31. Contingent Liabilities $million** $million **$million** $million\n\nSantos Ltd and its controlled entities have the following contingent liabilities\n\narising in respect of:\n\nPerformance guarantees **9.8** 9.6 **6.3** 6.5\n\nClaims and litigation **8.1** 11.0 **2.3** 2.3\n\n**17.9** 20.6 **8.6** 8.8\n\nLegal advice in relation to the claims and litigation referred to above indicates that on the basis of available information, liability in respect of these\n\nclaims is unlikely to exceed $1.0 million on a consolidated basis.\n\nA number of the Australian interests of the Santos Group are located within areas the subject of one or more claims or applications for native title\n\ndetermination. Whatever the outcome of those claims or applications, it is not believed that they will significantly impact the Santos Group’s asset\n\nbase. The decision of the High Court of Australia in the “Wik” case has the potential to introduce delay in the grant of mineral and petroleum\n\ntenements and consequently to impact generally the timing of exploration, development and production operations. An assessment of the impact\n\nupon the timing of particular operations may require consideration and determination of complex legal and factual issues.\n\nGuarantees provided by Santos Ltd for borrowings in respect of controlled entities are disclosed in note 15.\n\nSantos Ltd has provided parent company guarantees in respect of:\n\n(a) the funding obligations of its subsidiary companies, Santos Timor Sea Pipeline Pty Ltd and Santos Darwin LNG Pty Ltd, relating to the\n\nconstruction of a pipeline from the Bayu-Undan Field to Wickham Point in Darwin and the construction of the LNG Plant in Darwin respectively,\n\nand has provided a funding commitment letter to these subsidiary companies together with Santos (JPDA 91-12) Pty Ltd. As at 31 December\n\n2004 the expenditure commitments of Santos Timor Sea Pipeline Pty Ltd and Santos Darwin LNG Pty Ltd for the above mentioned projects\n\ntotalled US$41.3 million (2003: US$107.6 million);\n\n(b) payment of Santos Egypt Ltd’s financial obligations under a farmout agreement and certain concessions in the Gulf of Suez in the Arab Republic\n\nof Egypt up to a maximum of US$46.9 million.", - "page_start": 84, - "page_end": 84, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 5\n\nis also located in relatively\n\nshallow water with infrastructure\n\nnearby, creating options for\n\nearly production.\n\nAt Santos, we are proud that an\n\nAustralian company took on that\n\nchallenge and succeeded, and I\n\ncongratulate the exploration and\n\ndrilling teams on a great effort.\n\nWith the Jeruk discovery behind\n\nus, Indonesia is at the forefront\n\nof our international exploration\n\nefforts. With eight wells planned\n\nin the region for 2005, Santos is\n\ncurrently the most active explorer\n\nin Indonesia.\n\n**A STRONG FINANCIAL**\n\n**PERFORMANCE**\n\nIt was pleasing that Santos\n\nwas able to conclude 2004\n\non a higher note than it started.\n\nWe achieved record annual\n\nrevenue thanks to higher oil and\n\ngas prices combined with the\n\nreturn of full production at\n\nMoomba to produce a 21.5% jump\n\nin second half sales: the best\n\nresult for any six-month period\n\nin Santos' history.\n\nThe average realised price for\n\ncrude oil was up nearly 19%\n\nto A$51.83 per barrel.\n\nThese results have left Santos\n\nwell positioned to continue its\n\nstrong investment program which\n\nsaw capital expenditure peak at\n\n$930 million in 2004.\n\nIn 2005 we expect to invest\n\naround $850 million of new\n\ncapital in projects and our\n\nstrategy is to plan for firm\n\ndevelopments based on\n\naffordability at relatively low oil\n\nprices. If higher prices continue\n\nand some projects mature quickly\n\nand can be given the green light,\n\nour overall capital expenditure\n\nmay be higher.\n\nProduction is expected to rise\n\nin 2005 when, as usual, our\n\nfinancial performance will be\n\nsubject to oil prices, exchange\n\nrates and interest rates. These\n\nfactors have a significant effect\n\non our bottom line. A US$1 per\n\nbarrel change in the oil price\n\nequates to a A$16 million change\n\nin net profit after tax in 2005.\n\nA one US cent movement in the\n\nAustralia- US dollar exchange rate\n\nwould produce a change in profit\n\nafter tax of A$8 million, and\n\na 1% change in interest rates\n\nequates to a change in net profit\n\nafter tax of A$9 million.\n\n2004 has also been an important\n\nperiod for shareholders, with a\n\nsignificant improvement in the\n\nSantos share price combined with\n\nan increase in the dividend.\n\n**PRODUCTION TO REBOUND**\n\nWhile we expected lower\n\nproduction overall in 2004, our\n\noutput was obviously curtailed\n\nfurther by the incident at the\n\nMoomba plant. The good news\n\nis that several projects emerged\n\nfrom the development pipeline\n\nduring the year and made positive\n\ncontributions to our expanding\n\nsuite of oil and gas facilities.\n\nProduction is forecast to increase\n\nby 15% in 2005, or by 4% after\n\nexcluding the effect of the\n\nMoomba downtime, to about\n\n54 million boe. We expect this\n\npositive forward trend to be\n\nfollowed by further production\n\ngrowth of more than 10% in 2006.\n\nThe Bayu-Undan liquids project\n\ncame on line in April 2004\n\nand, at its increased design\n\nthroughput of just over one\n\nbillion cubic feet of gas per day,\n\nproduced liquids at a rate of\n\n100,000 barrels per day.\n\nBayu-Undan is currently stripping\n\nliquids and re-injecting the gas\n\npending tie-in of the pipeline to\n\nDarwin in May 2005 for future\n\nLNG production. The onshore LNG\n\nfacilities are more than two-thirds\n\ncomplete. With a gross production\n\nof 19 million barrels, 22% above\n\nexpectations for the year, we were\n\npleased with the performance of\n\nBayu-Undan and look forward to\n\na full year contribution from this\n\nexciting project in 2005.\n\nThe Minerva gas field off\n\nVictoria's western coast started\n\nproduction in December 2004\n\nand is ramping up to full field\n\nproduction of around 150 TJ\n\nper day. Our share in this project\n\nis 10%, and is significant because\n\nit represents our first foray\n\ninto marketing gas directly to\n\ncustomers or into the Victorian\n\nspot market through our sales\n\nvehicle, Santos Direct, aimed\n\nat delivering higher prices.\n\n**RECORD EXPLORATION**\n\n**EFFORT AHEAD**\n\nExploration is a great way to\n\nincrease shareholder value so\n\nI am pleased to be able to report", - "page_start": 6, - "page_end": 6, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "1002.2525.pdf", - "query": "How have been confirmed nonvanishing neutrino ?", - "target_page": 2, - "target_passage": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## I. INTRODUCTION\n\nThe nonvanishing neutrino masses have been confirmed by various neutrino oscillation\n\nphenomena and indicate the evidence of new physics beyond the Standard Model. The most\n\nattractive idea to naturally explain the tiny neutrino masses is the seesaw mechanism [1], in\n\nwhich the right-handed (RH) neutrinos singlet under the SM gauge group are introduced.\n\nThe minimal gauged U (1) B − L model based on the gauge group SU (3) C × SU (2) L × U (1) Y × U (1) B − L [2] is an elegant and simple extension of the SM, in which the RH neutrinos of\n\nthree generations are necessarily introduced because of the gauge and gravitational anomaly\n\ncancellations. In addition, the mass of RH neutrinos arises associated with the U (1) B − L\n\ngauge symmetry breaking.\n\nAlthough the scale of the B − L gauge symmetry breaking is basically arbitrary as long as\n\nphenomenological constraints are satisfied, one interesting option is to take it to be the TeV\n\nscale [3]. It has been recently pointed out [4] that when the classical conformal invariance\n\nis imposed on the minimal U (1) B − L model, the symmetry breaking scale appears to be the TeV scale naturally. If this is the case, all new particles, the Z <sup>′</sup> gauge boson, the B − L\n\nHiggs boson H and the RH neutrinos appear at the TeV scale unless the U (1) B − L gauge\n\ncoupling is extremely small, and they can be discovered at Large Hadron Collider [5- 8].\n\nThen we may be able to understand the relation between the gauge symmetry breaking and\n\nthe origin of neutrino masses.\n\nAlthough such a TeV scale model is interesting and appealing, one might think that the\n\nabsence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino\n\nwith mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple\n\nidea to introduce the DM candidate in the minimal gauged U (1) B − L model. We introduce\n\nthe Z 2 parity into the model and impose one of three RH neutrinos to be odd, while the\n\nothers even. In this way, the Z 2 -odd RH neutrino becomes stable and the DM candidate.\n\nNote that two RH neutrinos are enough to reconcile with the observed neutrino oscillation\n\ndata, with a prediction of one massless light neutrino. Therefore, without introducing any\n\nadditional new dynamical degrees of freedom, the DM particle arises in the minimal gauged\n\nU (1) B − L model.\n\nThe paper is organized as follows. In the next section, we briefly describe our model. In\n\nsection III, we estimate the thermal relic density of the RH neutrino and identify the model\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1002.2525.pdf" - }, - { - "text": "[arXiv:1002.2525v2 [hep-ph] 13 Feb 2010](http://arxiv.org/abs/1002.2525v2)\n\nHGU-CAP 002\n\nHiggs portal dark matter in the minimal gauged U (1) B − L model\n\nNobuchika Okada <sup>∗</sup>\n\nDepartment of Physics and Astronomy,\n\nUniversity of Alabama, Tuscaloosa, AL 35487, USA\n\nOsamu Seto <sup>†</sup>\n\nDepartment of Architecture and Building Engineering,\n\nHokkai-Gakuen University, Sapporo 062-8605, Japan\n\nAbstract\n\nWe propose a scenario of the right-handed neutrino dark matter in the context of the minimal\n\ngauged U (1) B − L model by introducing an additional parity which ensures the stability of dark\n\nmatter particle. The annihilation of this right-handed neutrino takes place dominantly through the\n\ns -channel Higgs boson exchange, so that this model can be called Higgs portal dark matter model.\n\nWe show that the thermal relic abundance of the right-handed neutrino dark matter with help of\n\nHiggs resonance can match the observed dark matter abundance. In addition we estimate the cross\n\nsection with nucleon and show that the next generation direct dark matter search experiments can\n\nexplore this model.\n\nPACS numbers:\n\n∗ [Electronic address: okadan@ua.edu](mailto:okadan@ua.edu)\n\n† [Electronic address: seto@phyics.umn.edu](mailto:seto@phyics.umn.edu)\n\n1", - "page_start": 0, - "page_end": 0, - "source_file": "1002.2525.pdf" - }, - { - "text": "parameters to be consistent with the current observations. Next we calculate the scattering\n\ncross section between the DM particle and a proton and discuss the implication for the direct\n\nDM search experiments.\n\n### A. Thermal relic density\n\nThe DM RH neutrino interacts with the SM particles through couplings with B − L\n\ngauge and B − L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent\n\nbecause of the Z 2 parity. The most of annihilation of the RH neutrinos occurs via Z <sup>′</sup> , H and\n\nh exchange processes in the s -channel. In practice, the dominant contributions come from\n\nthe Higgs ( h and H ) exchange diagrams, because the Z <sup>′</sup> exchange processes are suppressed\n\nby the inverse square of the B − L Higgs VEV v <sup>′</sup> ≳ 3 TeV. Thus, we obtain Higgs portal DM\n\nof RH neutrino effectively. The relevant annihilation modes are the annihilation into f <sup>¯</sup> f ,\n\nW <sup>+</sup> W <sup>−</sup> , ZZ , and h ( H ) h ( H ). Since RH neutrino DM couples to only B − L Higgs Ψ while\n\na SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing\n\nbetween these two Higgs bosons. Although it is not so severe, the precision electroweak\n\nmeasurements [12] as well as the unitarity bound [13] give constraints on the mixing angle\n\nand mass spectrum of the Higgs bosons.\n\nThe thermal relic abundance of DM\n\nΩ N h <sup>2</sup> = 1 . 1 × 10 <sup>9</sup> m N /T d √ g ∗ M P ⟨ σv ⟩ GeV <sup>−</sup> <sup>1</sup> , (14)\n\nwith the Planck mass M P , the thermal averaged product of the annihilation cross section\n\nand the relative velocity ⟨ σv ⟩ , the total number of relativistic degrees of freedom in the\n\nthermal bath g ∗ , and the decoupling temperature T d , is evaluated by solving the Boltzmann\n\nequation for the number density of RH neutrino n N ;\n\ndn N dt <sup>+ 3</sup> <sup>Hn</sup> <sup>N</sup> <sup>=</sup> <sup>−⟨</sup> <sup>σv</sup> <sup>⟩</sup> <sup>(</sup> <sup>n</sup> <sup>2</sup> N <sup>−</sup> <sup>n</sup> <sup>2</sup> EQ <sup>)</sup> <sup>,</sup> (15)\n\nand the Friedmann equation\n\nH <sup>2</sup> ≡ � ˙ a\n\na � 2\n\n= 8 π\n\n3 M <sup>2</sup> P\n\nρ, (16)\n\nwith n EQ and a ( t ) being the equilibrium number density and the scale factor, under the\n\nradiation dominated Universe with the energy density ρ = ρ rad [14].\n\n5", - "page_start": 4, - "page_end": 4, - "source_file": "1002.2525.pdf" - }, - { - "text": "Fig. 1 shows the relic density Ω N h <sup>2</sup> as a function of the DM mass m N for a set of\n\nparameters: ( v <sup>′</sup> , M h , M H , M Z ′ , sin θ ) = (4000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7), for\n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as\n\nΩ DM h <sup>2</sup> ≃ 0 . 1 [15]. The figure shows that a desired DM relic abundance can be obtained for\n\nonly near Higgs resonances, m N ≈ M h / 2 or M H / 2.\n\nFig. 2 shows the relic density Ω N h <sup>2</sup> as a function of the DM mass m N for a smaller Higgs\n\nmixing sin θ = 0 . 3 (others are the same as in Fig. 1). Compared with Fig. 1, for m N ≲ M W\n\nwhere the DM particles dominantly annihilate into f <sup>¯</sup> f , the relic density further increases\n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into\n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not\n\nenough to reach Ω N h <sup>2</sup> ≃ 0 . 1.\n\n0.001\n\n0.01\n\n0.1\n\n1\n\n10\n\n100\n\n1000\n\n60 80 100 120 140 160 180 200\n\nΩ\n\nN h 2\n\nm N [GeV]\n\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter\n\nset: ( v <sup>′</sup> , M h , M H , M Z ′ , sin θ ) = (3000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7).\n\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16- 18].\n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the\n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and\n\nthe DM particle. In our model, B − L Higgs VEV v <sup>′</sup> can play the same role for m N < M W ,\n\nnamely a larger v <sup>′</sup> corresponds to weaker coupling between DM and Higgs for a fixed DM\n\nmass. On the other hand, for m N > M W the difference appears. Even if the annihilation\n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1002.2525.pdf" - }, - { - "text": "objective quantitative assessment of neuron death after peripheral nerve\n\ninjury. Exp Neurol 2007;203:22- 33.\n\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after\n\nupper limb nerve injury and protective effect of repair: clinical evaluation\n\nusing volumetric magnetic resonance imaging of dorsal root ganglia.\n\nNeurosurgery 2013;73:632- 40.\n\n[67] West SJ, Bonboire D, Bennett DL. StereoMate: 3D stereological\n\nautomated analysis of biological structures. bioRxiv 2020:648337.\n\n[68] Wiberg R, Novikova LN, Kingham PJ. Evaluation of apoptotic pathways in\n\ndorsal root ganglion neurons following peripheral nerve injury.\n\nNeuroreport 2018;29:779- 85.\n\n[69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum\n\nAI. Dorsal root ganglion macrophages contribute to both the initiation and\n\npersistence of neuropathic pain. Nat Commun 2020;11:264.\n\n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia\n\ngelatinosa mediate interaction of signals from primary afferents. J Physiol\n\n2010;588:2065- 75.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "From Eq. (19), one can see that σ <sup>(</sup> <sup>p</sup> <sup>)</sup> SI <sup>∝</sup> <sup>(sin 2</sup> <sup>θ/v</sup> <sup>′</sup> <sup>)</sup> <sup>2</sup> <sup>for a given DM mass</sup> <sup>m</sup> <sup>N</sup> <sup>. Fig. 3 shows</sup> the spin-independent cross section of RH neutrino with a proton. The resultant cross section\n\nis found to be far below the current limits reported by XENON10 [24] and CDMSII [25]:\n\nσ SI ≲ 4 × 10 <sup>−</sup> <sup>8</sup> − 2 × 10 <sup>−</sup> <sup>7</sup> pb, for a DM mass of 100 GeV-1 TeV. Future experiments such\n\nas XENON1T [26] can reach the cross section predicted in our model.\n\n10 <sup>-10</sup>\n\n10 <sup>-9</sup>\n\n10 <sup>-8</sup>\n\n60 80 100 120 140 160 180 200\n\nσ\n\np [pb]\n\nm N [GeV]\n\nFIG. 3: The spin independent scattering cross section with a proton. All parameters are same as\n\nthose used in the previous section. The upper and lower lines correspond to sin θ = 0 . 7 and 0 . 3,\n\nrespectively.\n\n## IV. SUMMARY\n\nWe have proposed a scenario of the RH neutrino dark matter in the context of the minimal\n\ngauged U (1) B − L model. We have introduced a discrete Z 2 parity in the model, so that one\n\nRH neutrino assigned as Z 2 -odd can be stable and, hence, the DM candidate, while the other\n\ntwo RH neutrinos account for neutrino masses and mixings through the seesaw mechanism.\n\nNo additional degrees of freedom are necessary to be added. We have evaluated the relic\n\ndensity of the dark matter particle. The dominant annihilation modes are via the Higgs\n\nboson exchange processes in the s -channel and thus, our model can be called Higgs portal\n\nDM model. It has been found that the relic density consistent with the current observation\n\n8", - "page_start": 7, - "page_end": 7, - "source_file": "1002.2525.pdf" - }, - { - "text": "parameter to be consistent with the current observations. We also calculate the scattering\n\ncross section between the DM particle and nucleon and discuss the implication for the direct\n\nDM search experiments. We summarize our results in the section IV. Our notations and the\n\nformulas used in our analysis are listed in Appendix.\n\n## II. THE MINIMAL GAUGED U (1) B − L MODEL WITH Z 2 PARITY\n\nThe model is based on the gauge group SU (3) C × SU (2) L × U (1) Y × U (1) B − L . Additional\n\nfields besides the standard model fields are a gauge field Z <sup>′</sup> µ <sup>of the</sup> <sup>U</sup> <sup>(1)</sup> <sup>B</sup> <sup>−</sup> <sup>L</sup> <sup>, a SM singlet</sup>\n\nB − L Higgs boson Ψ with two U (1) B − L charge, and three RH neutrinos N i which are\n\nnecessary for the gauge and gravitational anomaly cancellations. In describing the RH\n\nneutrinos, we use the four component representation of RH neutrino constructed from the\n\nWeyl spinor ν R i ,\n\nN i ≡   <sup>ν</sup> <sup>R</sup> <sup>i</sup> ǫ ν <sup>∗</sup> R i\n\n  , (1)\n\nFor the two RH neutrinos, N 1 and N 2 , we assign Z 2 parity even, while odd for N 3 , so that\n\nthe RH neutrino N 3 is stable and, hence, the DM candidate.\n\nDue to the additional gauge symmetry U (1) B − L , the covariant derivative for each fields\n\nis given by\n\nD µ = D <sup>(</sup> <sup>SM</sup> <sup>)</sup> µ − iq B − L g B − L Z <sup>′</sup> µ <sup>,</sup> (2)\n\nwhere D <sup>(</sup> <sup>SM</sup> <sup>)</sup> µ is the covariant derivative in the SM, and q B − L is the charge of each fields\n\nunder the U (1) B − L with its gauge coupling g B − L .\n\nYukawa interactions relevant for the neutrino masses are given by\n\nL int =\n\n3\n\n� α =1\n\n2\n\n� i =1\n\ny αi <sup>¯</sup> L α <sup>˜</sup> Φ N i − <sup>1</sup> 2\n\n3\n\n� i =1\n\nλ R i <sup>¯</sup> N i Ψ P R N i + h . c ., (3)\n\nwhere <sup>˜</sup> Φ = − iτ 2 Φ <sup>∗</sup> for Φ being the SM Higgs doublet, and without loss of generality we have\n\nworked out in the basis where the second term in the right-hand-side is in flavor diagonal\n\nfor RH neutrinos. Because of the Z 2 parity, the DM candidate N 3 has no Yukawa couplings\n\nwith the left-handed lepton doublets.\n\nThe general Higgs potential for the SU (2) L doublet Φ and a singlet B − L Higgs Ψ is\n\ngenerally given by\n\nV (Φ , Ψ) = m <sup>2</sup> 1 <sup>|</sup> <sup>Φ</sup> <sup>|</sup> <sup>2</sup> <sup>+</sup> <sup>m</sup> <sup>2</sup> 2 <sup>|</sup> <sup>Ψ</sup> <sup>|</sup> <sup>2</sup> <sup>+</sup> <sup>λ</sup> <sup>1</sup> <sup>|</sup> <sup>Φ</sup> <sup>|</sup> <sup>4</sup> <sup>+</sup> <sup>λ</sup> <sup>2</sup> <sup>|</sup> <sup>Ψ</sup> <sup>|</sup> <sup>4</sup> <sup>+</sup> <sup>λ</sup> <sup>3</sup> <sup>|</sup> <sup>Φ</sup> <sup>|</sup> <sup>2</sup> <sup>|</sup> <sup>Ψ</sup> <sup>|</sup> <sup>2</sup> <sup>.</sup> (4)\n\n3", - "page_start": 2, - "page_end": 2, - "source_file": "1002.2525.pdf" - }, - { - "text": "sensory neuron-spinal cord connectivity. Neuroscience 2009;163:\n\n1220- 32.\n\n[10] Cobos EJ, Nickerson CA, Gao F, Chandran V, Bravo-Caparr ´os I,\n\nGonz ´alez-Cano R, Riva P, Andrews NA, Latremoliere A, Seehus CR,\n\nPerazzoli G, Nieto FR, Joller N, Painter MW, Ma CHE, Omura T, Chesler\n\nEJ, Geschwind DH, Coppola G, Rangachari M, Woolf CJ, Costigan M.\n\nMechanistic differences in neuropathic pain modalities revealed by\n\ncorrelating behavior with global expression profiling. Cell Rep 2018;22:\n\n1301- 12.\n\n[11] Coggeshall RE. A consideration of neural counting methods. Trends\n\nNeurosci 1992;15:9- 13.\n\n[12] Decosterd I, Woolf CJ. Spared nerve injury: an animal model of persistent\n\nperipheral neuropathic pain. PAIN 2000;87:149- 58.\n\n[13] Denk F, Ramer LM, Erskine ELKS, Nassar MA, Bogdanov Y, Signore M,\n\nWood JN, McMahon SB, Ramer MS. Tamoxifen induces cellular stress in\n\nthe nervous system by inhibiting cholesterol synthesis. Acta Neuropathol\n\nCommun 2015;3:74.\n\n[14] Dobin A, Davis CA, Schlesinger F, Drenkow J, Zaleski C, Jha S, Batut P,\n\nChaisson M, Gingeras TR. STAR: ultrafast universal RNA-seq aligner.\n\nBioinformatics 2013;29:15- 21.\n\n[15] Faul F, Erdfelder E, Lang AG, Buchner A. G*Power 3: a flexible statistical\n\npower analysis program for the social, behavioral, and biomedical\n\nsciences. Behav Res Methods 2007;39:175- 91.\n\n[16] Feng G, Mellor RH, Bernstein M, Keller-Peck C, Nguyen QT, Wallace M,\n\nNerbonne JM, Lichtman JW, Sanes JR. Imaging neuronal subsets in\n\ntransgenic mice expressing multiple spectral variants of GFP. Neuron\n\n2000;28:41- 51.\n\n[17] Gangadharan V, Zheng H, Taberner FJ, Landry J, Nees TA, Pistolic J,\n\nAgarwal N, M ¨annich D, Benes V, Helmstaedter M, Ommer B, Lechner\n\nSG, Kuner T, Kuner R. Neuropathic pain caused by miswiring and\n\nabnormal end organ targeting. Nature 2022;606:137- 45.\n\n[18] Guillery RW. On counting and counting errors. J Comp Neurol 2002;447:\n\n1- 7.\n\n[19] Hall BE, Macdonald E, Cassidy M, Yun S, Sapio MR, Ray P, Doty M, Nara\n\nP, Burton MD, Shiers S, Ray-Chaudhury A, Mannes AJ, Price TJ, Iadarola\n\nMJ, Kulkarni AB. Transcriptomic analysis of human sensory neurons in\n\npainful diabetic neuropathy reveals inflammation and neuronal loss. Sci\n\nRep 2022;12:4729.\n\n[20] Haroutounian S, Nikolajsen L, Bendtsen TF, Finnerup NB, Kristensen AD,\n\nHasselstrøm JB, Jensen TS. Primary afferent input critical for maintaining\n\nspontaneous pain in peripheral neuropathy. PAIN 2014;155:1272- 9.\n\n[21] Hart AM, Terenghi G, Kellerth JO, Wiberg M. Sensory neuroprotection,\n\nmitochondrial preservation, and therapeutic potential of n-acetyl-cysteine\n\nafter nerve injury. Neuroscience 2004;125:91- 101.\n\n[22] Hart AM, Wiberg M, Youle M, Terenghi G. Systemic acetyl-l-carnitine\n\neliminates sensory neuronal loss after peripheral axotomy: a new clinical\n\napproach in the management of peripheral nerve trauma. Exp Brain Res\n\n2002;145:182- 9.\n\n[23] Hu G, Huang K, Hu Y, Du G, Xue Z, Zhu X, Fan G. Single-cell RNA-seq\n\nreveals distinct injury responses in different types of DRG sensory\n\nneurons. Sci Rep 2016;6:31851.\n\n[24] Hu P, McLachlan EM. Selective reactions of cutaneous and muscle\n\nafferent neurons to peripheral nerve transection in rats. J Neurosci 2003;\n\n23:10559- 67.\n\n[25] Hulsen T, de Vlieg J, Alkema W. BioVenn—a web application for the\n\ncomparison and visualization of biological lists using area-proportional\n\nVenn diagrams. BMC Genomics 2008;9:488.\n\n[26] King T, Vera-Portocarrero L, Gutierrez T, Vanderah TW, Dussor G, Lai J,\n\nFields HL, Porreca F. Unmasking the tonic-aversive state in neuropathic\n\npain. Nat Neurosci 2009;12:1364- 6.\n\n[27] Leibovich H, Buzaglo N, Tsuriel S, Peretz L, Caspi Y, Katz B, Lev S,\n\nLichtstein D, Binshtok AM. Abnormal reinnervation of denervated areas\n\nfollowing nerve injury facilitates neuropathic pain. Cells 2020;9:1007.\n\n[28] Li H, Handsaker B, Wysoker A, Fennell T, Ruan J, Homer N, Marth G,\n\nAbecasis G, Durbin R; 1000 Genome Project Data Processing Subgroup.", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed2.pdf" - }, - { - "text": "Figure 11.3 Gruff Visualization of the EmployeeShape\n\nFigure 11.4 Gruff Visualization of the CustomerShape", - "page_start": 81, - "page_end": 81, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "cell death and apoptosis with more than 10 genes were\n\nexamined. Filtered count data of expressed and nondifferentially\n\nexpressed genes were used as a background.\n\n2.8. Dorsal root ganglion culture\n\nDorsal root ganglia were dissected from MrgD <sup>CreERT2</sup> ;Ai32 and\n\nCalca <sup>CreERT2</sup> ;Ai32 mice . 1 week after dosing with tamoxifen and\n\nenzymatically digested at 37˚˚C for 80 minutes in dispase type II\n\n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington Biochemical), as described previously. <sup>63</sup> Mechanically dissoci-\n\nated cells were plated onto laminin/poly-D-lysine (R&D Systems,\n\nMinneapolis, MN) treated coverslips in complete Neurobasal Plus\n\nmedium (Neurobasal Plus media supplemented with 2% (vol/vol)\n\nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic- antimycotic\n\n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth\n\nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech,\n\nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor\n\n(GDNF, PeproTech) were added to the media under some\n\nconditions. Cytosine b -D-arabinofuranoside (4 m M) was added to\n\nthe media for 24 hours the day after plating to reduce the\n\nproliferation of nonneuronal cells. Media was refreshed 3 times\n\nper week thereafter. Cultures were fixed for 10 minutes at room\n\ntemperature with 4% paraformaldehyde and subsequently\n\nprocessed by immunocytochemistry (described earlier).\n\n2.9. Statistical analysis\n\nData are expressed as mean 6 SEM unless otherwise specified,\n\nand P values of less than 0.05 were considered significant. Power calculations were performed using G*Power 3.1.9.7. <sup>15</sup> A quantitative Venn diagram was created using BioVenn. <sup>25</sup> All\n\nother statistical analyses were performed in Prism 10 (GraphPad\n\nSoftware, Inc, Boston, MA) or R using paired t tests or 1- or 2-way\n\nRM ANOVAs (repeated measures analysis of variance), where\n\nappropriate. Normality was assessed by the Shapiro- Wilk test. If\n\nthe main analysis of variance effect was significant, <sup>ˇ</sup> S´ıd ´ak or\n\nTukey multiple comparisons tests were performed. To compare\n\npopulation distributions of soma cross-sectional area or volume,\n\nKolmogorov- Smirnov tests were performed.\n\n3. Results\n\n3.1. Peripheral nerve injury induces a loss of small neurons\n\nfrom the dorsal root ganglion\n\nTo assess the gross loss of neurons from DRG following nerve\n\ninjury, we generated the Avil <sup>FlpO</sup> ;Atf3 <sup>CreERT2</sup> ;RC::FLTG mouse\n\nline in which na¨ıve and axotomized sensory neurons were\n\ndifferentially labelled. In this mouse line, all neurons express\n\ntdTomato (Flp-dependent) in the na¨ıve state and switch to\n\nexpressing green fluorescent protein (GFP) upon axonal damage\n\nand concurrent tamoxifen treatment (Flp- and Cre-dependent)\n\n( Figs. 1A and B ). Following pilot experiments to optimize\n\ntamoxifen dosing regimen, this approach was both highly efficient\n\nand specific (with the caveat that it was necessary to wait for\n\nseveral days after nerve injury for Cre-induced GFP expression):\n\n14 days after SNI trans surgery, GFP was expressed by 99.1 6\n\n0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we\n\nobserved GFP in only 4.6 6 0.7% of contralateral DRG neurons\n\n[(Figs. S2A- D, http://links.lww.com/PAIN/C84). We then used](http://links.lww.com/PAIN/C84)\n\na stereological approach to quantify the total number of neurons\n\nin L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNI trans, as\n\nwell as contralateral to injury. One week after SNI trans , we\n\nobserved 7809 6 153 neurons per DRG; this was not significantly\n\ndifferent to the number of neurons in the contralateral DRG\n\n(7917 6 349), whereas cell number approximately halved by\n\n8 weeks postinjury to 3963 6 410 neurons per DRG ( Fig. 1C ).\n\nSeparating analysis into intact vs axotomized afferents revealed\n\nthat only axotomized afferents were lost, with no difference\n\nobserved in numbers of intact afferents ( Fig. 1D ). Between 1 and", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "1002.2525.pdf", - "query": "What are the dominant contributions in thermal relic density ?", - "target_page": 5, - "target_passage": "In practice, the dominant contributions come from the Higgs (h and H) exchange diagrams.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Fig. 1 shows the relic density Ω N h <sup>2</sup> as a function of the DM mass m N for a set of\n\nparameters: ( v <sup>′</sup> , M h , M H , M Z ′ , sin θ ) = (4000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7), for\n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as\n\nΩ DM h <sup>2</sup> ≃ 0 . 1 [15]. The figure shows that a desired DM relic abundance can be obtained for\n\nonly near Higgs resonances, m N ≈ M h / 2 or M H / 2.\n\nFig. 2 shows the relic density Ω N h <sup>2</sup> as a function of the DM mass m N for a smaller Higgs\n\nmixing sin θ = 0 . 3 (others are the same as in Fig. 1). Compared with Fig. 1, for m N ≲ M W\n\nwhere the DM particles dominantly annihilate into f <sup>¯</sup> f , the relic density further increases\n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into\n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not\n\nenough to reach Ω N h <sup>2</sup> ≃ 0 . 1.\n\n0.001\n\n0.01\n\n0.1\n\n1\n\n10\n\n100\n\n1000\n\n60 80 100 120 140 160 180 200\n\nΩ\n\nN h 2\n\nm N [GeV]\n\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter\n\nset: ( v <sup>′</sup> , M h , M H , M Z ′ , sin θ ) = (3000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7).\n\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16- 18].\n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the\n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and\n\nthe DM particle. In our model, B − L Higgs VEV v <sup>′</sup> can play the same role for m N < M W ,\n\nnamely a larger v <sup>′</sup> corresponds to weaker coupling between DM and Higgs for a fixed DM\n\nmass. On the other hand, for m N > M W the difference appears. Even if the annihilation\n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1002.2525.pdf" - }, - { - "text": "[arXiv:1002.2525v2 [hep-ph] 13 Feb 2010](http://arxiv.org/abs/1002.2525v2)\n\nHGU-CAP 002\n\nHiggs portal dark matter in the minimal gauged U (1) B − L model\n\nNobuchika Okada <sup>∗</sup>\n\nDepartment of Physics and Astronomy,\n\nUniversity of Alabama, Tuscaloosa, AL 35487, USA\n\nOsamu Seto <sup>†</sup>\n\nDepartment of Architecture and Building Engineering,\n\nHokkai-Gakuen University, Sapporo 062-8605, Japan\n\nAbstract\n\nWe propose a scenario of the right-handed neutrino dark matter in the context of the minimal\n\ngauged U (1) B − L model by introducing an additional parity which ensures the stability of dark\n\nmatter particle. The annihilation of this right-handed neutrino takes place dominantly through the\n\ns -channel Higgs boson exchange, so that this model can be called Higgs portal dark matter model.\n\nWe show that the thermal relic abundance of the right-handed neutrino dark matter with help of\n\nHiggs resonance can match the observed dark matter abundance. In addition we estimate the cross\n\nsection with nucleon and show that the next generation direct dark matter search experiments can\n\nexplore this model.\n\nPACS numbers:\n\n∗ [Electronic address: okadan@ua.edu](mailto:okadan@ua.edu)\n\n† [Electronic address: seto@phyics.umn.edu](mailto:seto@phyics.umn.edu)\n\n1", - "page_start": 0, - "page_end": 0, - "source_file": "1002.2525.pdf" - }, - { - "text": "parameters to be consistent with the current observations. Next we calculate the scattering\n\ncross section between the DM particle and a proton and discuss the implication for the direct\n\nDM search experiments.\n\n### A. Thermal relic density\n\nThe DM RH neutrino interacts with the SM particles through couplings with B − L\n\ngauge and B − L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent\n\nbecause of the Z 2 parity. The most of annihilation of the RH neutrinos occurs via Z <sup>′</sup> , H and\n\nh exchange processes in the s -channel. In practice, the dominant contributions come from\n\nthe Higgs ( h and H ) exchange diagrams, because the Z <sup>′</sup> exchange processes are suppressed\n\nby the inverse square of the B − L Higgs VEV v <sup>′</sup> ≳ 3 TeV. Thus, we obtain Higgs portal DM\n\nof RH neutrino effectively. The relevant annihilation modes are the annihilation into f <sup>¯</sup> f ,\n\nW <sup>+</sup> W <sup>−</sup> , ZZ , and h ( H ) h ( H ). Since RH neutrino DM couples to only B − L Higgs Ψ while\n\na SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing\n\nbetween these two Higgs bosons. Although it is not so severe, the precision electroweak\n\nmeasurements [12] as well as the unitarity bound [13] give constraints on the mixing angle\n\nand mass spectrum of the Higgs bosons.\n\nThe thermal relic abundance of DM\n\nΩ N h <sup>2</sup> = 1 . 1 × 10 <sup>9</sup> m N /T d √ g ∗ M P ⟨ σv ⟩ GeV <sup>−</sup> <sup>1</sup> , (14)\n\nwith the Planck mass M P , the thermal averaged product of the annihilation cross section\n\nand the relative velocity ⟨ σv ⟩ , the total number of relativistic degrees of freedom in the\n\nthermal bath g ∗ , and the decoupling temperature T d , is evaluated by solving the Boltzmann\n\nequation for the number density of RH neutrino n N ;\n\ndn N dt <sup>+ 3</sup> <sup>Hn</sup> <sup>N</sup> <sup>=</sup> <sup>−⟨</sup> <sup>σv</sup> <sup>⟩</sup> <sup>(</sup> <sup>n</sup> <sup>2</sup> N <sup>−</sup> <sup>n</sup> <sup>2</sup> EQ <sup>)</sup> <sup>,</sup> (15)\n\nand the Friedmann equation\n\nH <sup>2</sup> ≡ � ˙ a\n\na � 2\n\n= 8 π\n\n3 M <sup>2</sup> P\n\nρ, (16)\n\nwith n EQ and a ( t ) being the equilibrium number density and the scale factor, under the\n\nradiation dominated Universe with the energy density ρ = ρ rad [14].\n\n5", - "page_start": 4, - "page_end": 4, - "source_file": "1002.2525.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "(iii)\n\n(iv)\n\n(ii)\n\n(i)\n\nFIG. 8: (Colour online) Space-time plots are given for (left) the film thickness *h* and (right) the nanoparticle\n\nlayer height *h* *p* = *hφ* . The plot corresponds to the complete evolution resulting in the ring profile of\n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright\n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four\n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning,\n\n(iii) slow motion after depinning, and (iv) final evaporation from the center.\n\nshould also be investigated further in the simple case presented here.\n\n## **IV. CONCLUSION**\n\nWe have discussed recent work on pattern formation processes in films and drops of evaporating\n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of\n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and\n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics\n\non the mesoscale has been described as well as more microscopic models for the dynamics in the\n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film\n\nmodel.\n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to\n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures\n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic\n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n\n23", - "page_start": 22, - "page_end": 22, - "source_file": "1001.2669.pdf" - }, - { - "text": "If a signature match is found, the data chunk is replaced by a reference to a stored chunk,\n\nwhich reduces storage space that is required for storing the data. Conversely, if no match is\n\nfound, the data chunk is stored without modification and its signature is added to the\n\ndeduplication database.\n\nTo maximize the space that is available for the deduplication database, the system distributes\n\nit between all nodes in the I/O groups that contain deduplicated volumes. Each node holds\n\na distinct portion of the records that are stored in the database. If nodes are removed or\n\nadded to the system, the database is redistributed between the anodes to ensure optimal use\n\nof available resources.\n\nDepending on the data type that is stored on the volume, the capacity savings can be\n\nsignificant. Examples of use cases that typically benefit from deduplication are virtual\n\nenvironments with multiple VMs running the same operating system and backup servers. In\n\nboth cases, it is expected, that multiple copies of identical files exist, such as components of\n\nthe standard operating system or applications that are used in the organization. Conversely,\n\ndata that is encrypted or compressed at the file system level do not benefit from deduplication\n\nbecause these operations remove redundancy of the data patterns.\n\nAlthough deduplication (as with other features of IBM Spectrum Virtualize) is transparent to\n\nusers and applications, it needs to be planned for and understood before implementation\n\nbecause it might reduce the redundancy of a solution. For example, if an application stores\n\ntwo copies of a file to reduce chances of data corruption by way of a random event, the copies\n\nare deduplicated and thus the intended redundancy is removed from the system if these\n\ncopies are on the same volume.\n\nWhen planning the use of deduplicated volumes be aware of update and performance\n\nconsiderations and the following software and hardware requirements:\n\n� Code level V8.1.2 or higher is needed for data reduction pools.\n\n� Code level V8.1.3 or higher is needed for deduplication.\n\n� Nodes must have at least 32 GB memory to support deduplication. Nodes that have more\n\nthan 64 GB memory can use a bigger deduplication fingerprint database, which might lead\n\nto better deduplication.\n\n� You must run supported IBM Storwize V7000 hardware. For more information about the\n\ncurrent table that specifies valid hardware and features combinations, see [this website](https://ibm.biz/BdY6LS) [. ](https://ibm.biz/BdY6LS)\n\n#### **7.1.11 Capacity reclamation**\n\nFile deletion in modern file systems is realized by updating file system metadata and marking\n\nthe physical storage space that is used by the removed file as unused. The data of the\n\nremoved file is not overwritten. This improves file system performance by reducing the\n\nnumber of I/O operations on physical storage required to perform file deletion.\n\nHowever, this approach affects the management of real capacity of volumes with enabled\n\ncapacity savings. File system deletion frees space at the file system level, but physical data\n\nblocks that are allocated by the storage for the file still take up the real capacity of a volume.\n\n**Note:** You can use the management GUI or the command-line interface to run the built-in\n\ncompression estimation tool. This tool can be used to determine the capacity savings that\n\nare possible for existing data on the system by using compression.", - "page_start": 275, - "page_end": 275, - "source_file": "sg247938.pdf" - }, - { - "text": "NAVWEPS 00-801-80 AIRPLANE PERFORMANCE\n\nis subjected to the bending and torsion of the tangential impulse-reaction forces. The blade must wirhstand these stresses which are generally of a vibratory and cyclic nature while at high temperatures. The elevated temperatures at which the turbine must func- tion produce extreme conditions for struc- tural creep and fatigue considerations. Conse- quently, the engine speed and temperature op- erating limits demand very careful considera- tion. Excessive engine temperatures or speeds may produce damage which is immediately apparent. However, creep and fatigue damage is cumulative and even though damage may not be immediately apparent by visual inspec- tion, proper inspection methods (other than visual) must be utilized and proper records kept regarding the occurrence. Actually, the development of high tempera- ture alloys for turbines is a critical factor in the develop,mcnt of high ei%ciciicy, high output aircraft gas turbines. The higher the tem- peratute of gases entering the turbine, the higher can be the temperature and pressure of the gases at discharge from the turbine with greater exhaust jet velocity and thrust. The function of the t&pipe or exhaust no?& is to discharge the exhaust gases to the atmos- phere at the highest possible velocity to pro- duce the greatest momentum change and thrust. If a majority of the expansion occurs through the turbine section, there remains only to con- duct the exhaust gases rearward with a mini- mum energy loss. However, if the turbine operates against a noticeable back pressure, the nozzle must convert the remaining pressure energy into exhaust gas velocity. Under ideal conditions, the nozzle would expand the flow to the ambient static pressure at the exhaust and the area distribution in the nozzle must provide these conditions. When the ratio af\n\nexhaust gas pressure to ambient pressure is relatively low and incapable of producing sonic flow, a converging nozzle provides the expan- sion. The exit area must be of proper size to bring about proper exit conditions. If the exit\n\n114", - "page_start": 131, - "page_end": 131, - "source_file": "00-80T-80.pdf" - }, - { - "text": "52\n\nboundary layer. This smooth laminar flow exists without the air particles moving from a given elevation. As the flow continues back from the leading edge, friction forces in the boundary layer continue to dissipate energy of the airstream and the laminar boundary layer increases in thickness with distance from the leading edge. After some distance back from the leading edge, the laminar boundary layer begins an oscillatory disturbance which is unstable. A waviness occurs in the laminar boundary layer which ultimately grows larger and more severe and destroys the smooth laminar flow. Thus, a transition takes place in which the laminar boundary layer decays into a “turbu- lent” boundary layer. The same sort of transition can be noticed inthe smoke from a cigarette in still air. At, first, the smoke ribbon is smooth and laminar, then develops a definite waviness, and decays into a random turbulent smoke pattern. As soon as the transition to. the turbulent boundary layer takes place, the boundary layer thickens and grows at a more rapid rate. (The small scale, turbulent flow within the boundary layer should not be confused with the large scale turbulence associated with airflow separation.) The flow in the turbu- lent boundary layer allows the air particles to travel from one layer to another producing an energy exchange. However, some small lami- nar flow continues to exist in the very lower levels of the turbulent boundary layer and is referred to as the “laminar sub-layer.” The turbulence which exists in the turbulent bound- ary layer allows determination of the point of transition by several means. Since the turbu- lent boundary layer transfers heat more easily than the laminar layer, frost, water, and oil films will be removed more rapidly from the area aft of the transition point. Also, a-small probe may be attached to a stethoscope and positioned at various points along a surface. When the probe is in the laminar area, a low “hiss” will be heard; when the probe is in", - "page_start": 69, - "page_end": 69, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**31**\n\nExploration Report\n\nExploration Report\n\ncontinued\n\nSayabouly Project - Lao PDR\n\nWith the grant of the prospecting and explora-\n\ntion permit in early 2012, exploration activity\n\nfocused on the definition of an extensive copper\n\n(Cu), platinum (Pt), chromium (Cr), nickel (Ni)\n\nstream sediment anomaly within the permit\n\narea. Surface geochemistry and mapping has\n\ndefined an extensive multi-element soil anomaly\n\nover 16 kilometres in length and 700 metres\n\nwidth with peak values of 829ppm copper (Cu),\n\n1.05% nickel (Ni), 1.54 ppm platinum (Pt), and\n\n0.27% cobalt (Co) and 0.57 ppm palladium (Pd).\n\nThe style of mineralisation is thought to be\n\nsimilar to Cu, Platinum Group Element deposits\n\nsuch as the Great Dyke (Zimbabwe) Deposits.\n\nThree broad spaced trenches were completed\n\nwith another two trenched partially completed\n\nup until the commencement of the wet season\n\nwith results 2.0m @ 1.73 ppm Pt and a broad\n\nzone nickel mineralisation including 51 m (853-\n\n904 m) @ 0.96% Ni. In addition to this prospect,\n\nseveral gold occurrences are beginning to take\n\nshape and recent high grade rockchip samples\n\n(96.0 g/t Au, 82.7 g/t Au, 53.3 g/t Au, 44.7 g/t\n\nAu, 30.0 g/t Au and 18.8 g/t Au) in several adja-\n\ncent creeks appear to be defining a gold target\n\nthat will also require drilling at the end of the\n\nwet season.", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "on the model (see above). The purely two-dimensional character of the KMC was extended to\n\na ‘pseudo three-dimensional’ one by making the effective chemical potential dependent on the\n\nmean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to\n\nthe introduction of a ‘global’ thickness-dependent disjoining pressure into the evaporation term\n\nwithout an explicit consideration of a film thickness. The amended model can reproduce bimodal\n\nstructures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully three-\n\ndimensional models are also discussed in the literature [76, 77].\n\n### **B. Dynamical Density Functional theory**\n\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related\n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle.\n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid,\n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to\n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the\n\nsubstrate, as all such interactions are absorbed into the effective chemical potential.\n\nHowever, using dynamical density functional theory (DDFT) [78- 83] one can develop a model\n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit\n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to\n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes\n\nthe coupled dynamics of the density fields of the liquid *ρ* *l* and the nanoparticles *ρ* *n* . The densities\n\n*ρ* *l* and *ρ* *n* are defined as the probabilities of finding a given lattice site on the surface to be occupied\n\nby a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond\n\nto number densities as we use the lattice spacing *σ* = 1 as our unit of length.\n\nTo develop the DDFT, one must first derive the underlying free energy functional *F* [ *ρ* *l* *, ρ* *n* ] , and\n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the\n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively.\n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams)\n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution\n\nand contributions from the interactions between the different species (nanoparticles and liquid).\n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is\n\ncoupled to a reservoir with chemical potential *µ* ), whereas the nanoparticles are treated in the\n\n14", - "page_start": 13, - "page_end": 13, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1002.2525.pdf", - "query": "What happend to the annihilation and the relic density when the DM is heavier ?", - "target_page": 6, - "target_passage": "When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Fig. 1 shows the relic density Ω N h <sup>2</sup> as a function of the DM mass m N for a set of\n\nparameters: ( v <sup>′</sup> , M h , M H , M Z ′ , sin θ ) = (4000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7), for\n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as\n\nΩ DM h <sup>2</sup> ≃ 0 . 1 [15]. The figure shows that a desired DM relic abundance can be obtained for\n\nonly near Higgs resonances, m N ≈ M h / 2 or M H / 2.\n\nFig. 2 shows the relic density Ω N h <sup>2</sup> as a function of the DM mass m N for a smaller Higgs\n\nmixing sin θ = 0 . 3 (others are the same as in Fig. 1). Compared with Fig. 1, for m N ≲ M W\n\nwhere the DM particles dominantly annihilate into f <sup>¯</sup> f , the relic density further increases\n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into\n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not\n\nenough to reach Ω N h <sup>2</sup> ≃ 0 . 1.\n\n0.001\n\n0.01\n\n0.1\n\n1\n\n10\n\n100\n\n1000\n\n60 80 100 120 140 160 180 200\n\nΩ\n\nN h 2\n\nm N [GeV]\n\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter\n\nset: ( v <sup>′</sup> , M h , M H , M Z ′ , sin θ ) = (3000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7).\n\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16- 18].\n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the\n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and\n\nthe DM particle. In our model, B − L Higgs VEV v <sup>′</sup> can play the same role for m N < M W ,\n\nnamely a larger v <sup>′</sup> corresponds to weaker coupling between DM and Higgs for a fixed DM\n\nmass. On the other hand, for m N > M W the difference appears. Even if the annihilation\n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1002.2525.pdf" - }, - { - "text": "Chapter 10. Migration and expiring data and indexes\n\n* **Turning off data retention protection** *\n\nWhen you turn off data retention protection, the following descriptions explain what happens\n\nwhen you use the creation-based object expiration policy and the event-based retention\n\nobject expiration policy:\n\n� Creation-based object expiration policy: Content Manager OnDemand issues a **delete**\n\n**object** command through the Tivoli Storage Manager API. Objects are deleted during the\n\nnext inventory expiration. If a Content Manager OnDemand application group is deleted, a\n\n**delete filespace** command is issued instead, and the objects are immediately deleted\n\nwith the file space.\n\n� Event-based retention object expiration policy: Content Manager OnDemand issues an\n\n**event trigger** command through the Tivoli Storage Manager API. The status of the\n\nobjects that are affected changes from PENDING to STARTED , and the objects are expired by\n\nTivoli Storage Manager based on their retention parameters. If the retention parameters\n\nare set to NOLIMIT , the objects never expire. If a Content Manager OnDemand application\n\ngroup is deleted, a **delete filespace** command is issued instead, and the objects are\n\nimmediately deleted with the file space.\n\n* **Turning on data retention protection** *\n\nWhen you turn on data retention protection, the following descriptions explain what happens\n\nwhen you use creation-based object expiration policy and event-based retention object\n\nexpiration policy:\n\n� Creation-based object expiration policy: Content Manager OnDemand issues no\n\ncommands to Tivoli Storage Manager. The objects are effectively orphaned by Content\n\nManager OnDemand and are expired by Tivoli Storage Manager based on their retention\n\nparameters. If the retention parameters are set to NOLIMIT , the objects never expire.\n\n� Event-based retention object expiration policy: Content Manager OnDemand issues an\n\n**event trigger** command through the Tivoli Storage Manager API. The event status of the\n\nobjects that are affected is changed from PENDING to STARTED, and the affected objects\n\nare expired by Tivoli Storage Manager based on their retention parameters. If the retention\n\nparameters are set to NOLIMIT , the objects never expire.\n\nIf a Content Manager OnDemand application group is deleted, a **delete filespace**\n\ncommand cannot be used with data retention protection; the operation is treated the same\n\nas though a delete is indicated. The status of all of the affected objects is changed from\n\nPENDING to STARTED, and the affected objects are expired by Tivoli Storage Manager\n\nbased on their retention parameters. This action leaves the file space entries in Tivoli\n\nStorage Manager, so you must manually delete these entries when the file space is empty\n\n(even with data retention protection on).\n\n* **Recommendations** *\n\nConsider the following preferred practices when you work with data retention protection:\n\n� Set up the application groups to expire by load.\n\n� Define the Tivoli Storage Manager archive copy groups to be event-based, and retain data\n\nfor 0 days.\n\n� Run the Tivoli Storage Manager inventory expiration regularly to ensure that expired data\n\nis removed.", - "page_start": 258, - "page_end": 258, - "source_file": "sg246915.pdf" - }, - { - "text": "Table 5-1 shows the action by Tivoli Storage Manager when a Content Manager OnDemand\n\nobject is deleted, unloaded, or during the deletion of an application group when data\n\nprotection is turned OFF.\n\n*Table 5-1 Comparison of expiration methods with data protection OFF*\n\nTable 5-2 shows the action by Tivoli Storage Manager when data protection is turned ON.\n\n*Table 5-2 Comparison of expiration methods with data protection ON*\n\n| Tivoli Storage Manager RETINIT | Content Manager OnDemand action: Unload | Content Manager OnDemand action: Delete application group |\n|:---|:---|:---|\n| Creation | The Delete Object command is issued through the Tivoli Storage Manager API. Objects are deleted during the next Tivoli Storage Manager expiration. | The Delete Filespace command is issued. Objects are immediately deleted with the file space. |\n| Event | Content Manager OnDemand issues an event trigger command through the Tivoli Storage Manager API. The status of the objects that are affected is changed from PENDING to STARTED and is expired by Tivoli Storage Manager based on their retention parameters. If the retention parameters are set to NOLIMIT , the objects never expire. | The Delete Filespace command is issued. Objects are immediately deleted with the file space. |\n\n| Tivoli Storage Manager RETINIT | Content Manager OnDemand action: Unload | Content Manager OnDemand action: Delete application group |\n|:---|:---|:---|\n| Creation | Content Manager OnDemand issues no commands to Tivoli Storage Manager. The objects are effectively orphaned by Content Manager OnDemand and are expired by Tivoli Storage Manager based on their retention parameters. If the retention parameters are set to NOLIMIT , the objects never expire. | Content Manager OnDemand issues no commands to Tivoli Storage Manager. The objects are effectively orphaned by Content Manager OnDemand and are expired by Tivoli Storage Manager based on their retention parameters. If the retention parameters are set to NOLIMIT , the objects never expire. |\n| Event | Content Manager OnDemand issues an event trigger command through the Tivoli Storage Manager API. The status of the objects that are affected are changed from PENDING to STARTED and are expired by Tivoli Storage Manager based on their retention parameters. If the retention parameters are set to NOLIMIT , the objects never expire. | The Delete Filespace command cannot be used with DRP ON, so the operation is treated the same as though a delete were indicated and the status of all of the affected objects is changed from PENDING to STARTED. They are expired by Tivoli Storage Manager based on their retention parameters. This action unfortunately leaves the file space entries in Tivoli Storage Manager. These entries can be manually deleted after the file space is empty even with DRP ON. |", - "page_start": 129, - "page_end": 129, - "source_file": "sg246915.pdf" - }, - { - "text": "For this chapter, unless explicitly stated otherwise, the term “data” is used to refer to the\n\nreport data, the extracted documents or segments, and their related indexes and the\n\nextracted resources.\n\nA Content Manager OnDemand system logically stores data in *application groups* . An\n\napplication group is defined by the Content Manager OnDemand administrator. It consists of\n\ndata that has the same indexing, data storage, and expiration requirements. The application\n\ngroup definition also specifies where the report and document data are stored, how long the\n\ndata is stored, and how the data expires. The method or methods that can be used to expire\n\nthe data are a function of the application group parameters that are defined before the data is\n\nloaded into Content Manager OnDemand. In a Content Manager OnDemand system, data\n\ntypically goes through a lifecycle of loading, storing, migration, and an expiration process.\n\n### **10.2 Loading and storing the data**\n\nThe Content Manager OnDemand architecture allows the control and management of the\n\ndata throughout its lifecycle. The data lifecycle begins with running an efficient load process.\n\nEach load process invocation ingests report data for a specified application group.\n\nDuring a load process, Content Manager OnDemand stores report (document) data, its\n\nresources, and index data, as shown in Figure 10-1.\n\n*Figure 10-1 Data and index storage locations*\n\nThe Content Manager OnDemand load process identifies, segments, and compresses\n\ngroups of documents into storage objects that are then stored in the Content Manager\n\nOnDemand archive, as illustrated in Figure 10-1. To improve the efficiency of the storage\n\nprocess, Content Manager OnDemand aggregates the stored documents (typically a few\n\nkilobytes in size) into storage objects. This aggregation provides efficient, high-volume\n\nstorage, retrieval, and expiration performance.\n\nStorage set\n\ncache\n\nSM manager\n\nStor age Node 1\n\nStorage node n\n\nCache dir 1\n\nCache dir n\n\nAgData\n\nTable\n\nSegment-1\n\ntable\n\nSegment-n\n\ntable\n\nStorage set\n\nAnd or\n\nDatabase\n\nManager\n\n**Load**\n\n**Process**\n\n**Indexes**\n\n**Report Data**\n\n**(storage objects /**\n\n**docu ments)**", - "page_start": 243, - "page_end": 243, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 12. Scalability, reliability, and availability architectures\n\n**Application design**\n\nModern computer systems contain multiple cores. They can perform multithreaded\n\nprocessing. Modern computer system operating systems allow parallelism in operations. To\n\ntake advantage of these hardware and software features, an application must be designed so\n\nthat it can run in parallel at multiple levels. Content Manager OnDemand can take advantage\n\nof both.\n\nAt the process level, the Content Manager OnDemand server runs multiple processes:\n\n� A library server\n\n� One or more object servers\n\n� One or more load jobs\n\n� The expiration process\n\nAt the thread level:\n\n� The library server is designed so that it is multithreaded and it can service multiple\n\nincoming data requests on different threads and perform multiple database queries in\n\nparallel.\n\n� The object server is also multithreaded so that multiple users can concurrently retrieve\n\ndata from the Content Manager OnDemand archive.\n\n**Parallel archive access**\n\nWhen you access the Tivoli Storage Manager or object access method (OAM) archives, a\n\nstore or retrieve request is sent to Archive Storage Manager (ASM). ASM then either stores or\n\nretrieves the data and returns the result to the Content Manager OnDemand server. If this\n\nprocess is conducted in a serial fashion, the archive storage access mechanism becomes a\n\nbottleneck at high transaction rates. To overcome this potential bottleneck, Content Manager\n\nOnDemand implements connection pooling to the storage archives.\n\nContent Manager OnDemand maintains a pool of connections to the archive. When an\n\narchive store or retrieve request is received, an available connection from the pool is selected\n\nto perform the request. This connection allows both faster access to the archive (by\n\neliminating the start process each time a connection is requested) and for the parallel\n\nexecution of the store or retrieve operations.\n\nOn IBM i, when you access the ASM archives, connection pooling is not required for store\n\nrequests. When a store request is made, ASM opens a connection and keeps it open until the\n\ndata store request is complete. In addition, ASM allows the aggregation of objects, sending\n\nfewer objects to storage media than otherwise are sent without aggregation.\n\nOn Multiplatforms and z/OS, you can aggregate documents that are loaded from Content\n\nManager OnDemand Web Enablement Kit (ODWEK) before you store them in the archive.\n\nThe document is stored to cache where it is appended to the storage object until the object\n\nreaches 10 MB (defined storage object size), at which point it is migrated to a storage\n\nmanager, such as Tivoli Storage Manager. For more information about this topic, see the\n\nfollowing website:\n\n[http://www.ibm.com/support/docview.wss?uid=swg21587507](http://www.ibm.com/support/docview.wss?uid=swg21587507)", - "page_start": 310, - "page_end": 310, - "source_file": "sg246915.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - }, - { - "text": "This section defines scalability, reliability, and availability and how they relate to a Content\n\nManager OnDemand system.\n\n**Scalability**\n\nScalability is the ability of a Content Manager OnDemand system to handle a growing amount\n\nof work with no performance degradation. A Content Manager OnDemand system’s\n\nperformance improves with the addition of hardware and network resources and therefore is\n\ndefined as a scalable system. Two types of scalability are defined:\n\n� *Horizontal scalability* (or scale out): This type of scalability is achieved by adding more\n\nnodes, systems, or logical partitions (LPARs) to a Content Manager OnDemand instance.\n\nAn example of horizontal scalability is adding more object servers to a Content Manager\n\nOnDemand instance.\n\n� *Vertical scalability* (or scale up): This type of scalability is achieved by adding more\n\nresources to a single node in a Content Manager OnDemand instance. Typically, this type\n\nof scalability involves faster processors, more processors, memory, disks, or networking\n\nhardware.\n\nContent Manager OnDemand is both horizontally and vertically scalable.\n\n**Reliability**\n\nReliability is the ability of Content Manager OnDemand to perform and maintain functionality\n\nduring regular workloads and during peak workloads. Peak workloads might occur regularly\n\n(for example, when everyone signs on at 9:00 a.m.) or periodically (at the end of the month\n\nwhen more processing than usual occurs). Or, peak workloads might occur sporadically (for\n\nexample, when a special event occurs, such as a sales drive that results in more users using\n\nthe system).\n\n**Availability**\n\nAvailability is a measure of the time that a Content Manager OnDemand server or process\n\nfunctions normally, and a measure of the time that the recovery process requires after a\n\ncomponent failure. It is the downtime (unavailability) that defines system availability.\n\nAvailability is the amount of system uptime when the system is fully functional and accessible\n\nby all users.\n\nAvailability requires that the system provides a degree of redundancy to eliminate single\n\npoints of failure (SPOFs). The greater the redundancy that is provided, the higher the\n\navailability of the system. A single physical machine is still a SPOF. For this reason, a high\n\navailability system topology typically involves horizontal scaling and redundancy across\n\nmultiple machines.\n\n**High availability**\n\nHigh availability implies that no human intervention is needed to restore operation if a failure\n\nor outage occurs. A highly available system has an availability limit of at least 99%, which\n\nallows an average of 15 minutes each day to perform maintenance tasks (during which period\n\nthe system is inaccessible to users). The degree of high availability that is achieved is a\n\nfunction of the amount of redundancy within the system and the degree to which this\n\nredundancy is automatically enabled.", - "page_start": 307, - "page_end": 307, - "source_file": "sg246915.pdf" - }, - { - "text": "### **5.3 Object access method for z/OS**\n\nIn this section, we provide an introduction to object access method (OAM) and show its\n\nrelationship with Content Manager OnDemand in a z/OS environment.\n\nFor more information about setting up OAM, see the following documentation:\n\n� *DFSMS Object Access Method Planning, Installation, and Storage Administration Guide*\n\n*for Object Support* , SC35-0426\n\n� Chapter 3, “OAM and System Management Subsystem customization”, in *Image and*\n\n*Workflow Library: Content Manager for ImagePlus on OS/390 Implementation and EIP* ,\n\nSG24-4055\n\nOAM is a hierarchical data management system (disk → optical → tape) that is used for\n\narchive storage.\n\nOAM uses the OSREQ macro interface and uses DB2 both for its internal (indexing) tables\n\nand for online storage objects. OAM is the DFSMSdfp component that manages a class of\n\ndata, which is called *objects* , in a z/OS environment. *Objects* are bit strings that are handled\n\nas one large byte string rather than processing them as records, as is done with datasets.\n\nThe content of this byte string is not known to OAM. No restrictions exist on the data type of\n\nthis object; it can be an image, compressed data, or coded data.\n\nHow to handle this data is left up to the application. OAM handles an unlimited number of\n\nobjects, which can be stored on magnetic disk, magnetic tape, or optical storage. Objects are\n\ndifferent from datasets, which are handled by existing access methods. The following\n\ncharacteristics distinguish objects from traditional datasets:\n\n� Lack of record orientation: No concept of individual records within an object exists.\n\n� Broad range of size: An object might contain less than 1 KB or up to 256 MB of data.\n\n� Volume: Objects are much smaller than datasets; however, they can use much more\n\nexternal storage, depending on the type of application that creates them, such as image\n\napplications.\n\n� Access time requirements: Reference patterns for objects change over time, allowing less\n\ncritical objects to be placed on lower-cost, slower devices or media.\n\n**Note:** When you use OAM as the storage manager, Content Manager OnDemand can\n\nretrieve the stored object directly from disk, optical drive, or tape.", - "page_start": 131, - "page_end": 131, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 5. Storage management\n\n� Document: With this expiration type, a document at a time is deleted from the application\n\ngroup. Data that is stored in archive storage is deleted by the storage manager based on\n\nthe archive expiration date. Storing documents with an expiration type of Document\n\ncauses the expiration process to search through every document in the segment to\n\ndetermine whether the expiration date was reached, which results in long processing\n\ntimes.\n\nWhen the **arsmaint** expiration process is run, data is deleted only from the application group if\n\nthe upper threshold for the size of the cache storage is reached. By default, the cache\n\nthreshold is 80%. A lower threshold can be forced by the expiration command parameters.\n\nUnless a reason exists to clear cache, leaving data in cache improves retrieval performance.\n\n#### **5.2.6 Advanced application group storage management**\n\nBy using the advanced storage management settings (Figure 5-11), you can adjust the size of\n\nthe load object and determine when report data, indexes, and resources are migrated to\n\narchive storage.\n\n*Figure 5-11 Advanced application group storage management*\n\n**Object Size**\n\nThe Object Size parameter determines the size of a storage object in kilobytes (KB). Content\n\nManager OnDemand, by default, segments and compresses stored data into 10 MB storage\n\nobjects. The default of 10 MB is the most commonly used object size value.\n\n**Important:** Be careful when you change the value for Object Size. Setting the value too\n\nsmall or too large can adversely affect load performance. However, increasing this value\n\nmight be necessary if you load large files and run out of Object IDs during the loading\n\nprocess.\n\n**Note:** The object size that is defined here must be equal to or larger than the size of the\n\ncompressed storage objects that are defined in any application that is assigned to the\n\napplication group.", - "page_start": 126, - "page_end": 126, - "source_file": "sg246915.pdf" - }, - { - "text": "© Copyright IBM Corp. 2003, 2015. All rights reserved.\n\n**Chapter 12. Scalability, reliability, and**\n\n**availability architectures**\n\nIBM Content Manager OnDemand (Content Manager OnDemand) is a lightweight process,\n\nthat is, the Content Manager OnDemand code itself does not require extensive system\n\nresources to perform the functions that are required of it. Content Manager OnDemand\n\ninstallations scale to handle both large quantities of data and many users. The total quantity\n\nof data that is stored or retrieved at any time is the main contributor to the resource\n\nconsumption on the server. This chapter focuses on the scalability, reliability, and availability\n\nof Content Manager OnDemand systems.\n\nIn this chapter, we cover the following topics:\n\n� Scalability, reliability, and availability defined\n\n� Scaling a Content Manager OnDemand system\n\n� High availability\n\n**12 12.1 Scalability, reliability, and availability defined**", - "page_start": 306, - "page_end": 306, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv1.pdf", - "query": "What is the aim of LLM routers ?", - "target_page": 1, - "target_passage": "LLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of responses [31, 45, 57, 58].\n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes do. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying models to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, but route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference costs by using fewer and/or less complex underlying models.\n\n**Applications of LLM routers.** A key use case for LLM routers is to help LLM-based application reduce cost. Several commercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a few lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The service selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant cost savings: up to 98% in the case of Martian [5], and 10 *×* in the case of NotDiamond [7].\n\n## **3 LLM Control Plane Integrity**\n\nIn this section, we define *LLM control plane integrity* . Informally, it means that decisions made about underlying LLM queries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus on one class of control plane: predictive LLM routing as used to manage cost.\n\n**Formalizing control planes.** An LLM control plane *R* *ω* is a potentially randomized algorithm. It is parameterized by a string *ω* , called the parameters. It utilizes some number *n* of LLMs denoted by *M* . We will mostly focus on the case of *n* = 2 , and, for reasons that will be clear in a moment, use *M* s (“strong”) and *M* w (“weak”) to denote the two underlying LLMs. Then inference on an input *x* *∈X* for some set *X* of allowed queries is performed by computing a response via *y* *←* <sup>$</sup> *R* *<sup>M</sup>* *ω* <sup>(</sup> *<sup>x</sup>* <sup>)</sup> <sup>. Here we use</sup> *<sup>←</sup>* <sup>$</sup> <sup>to denote running</sup> *<sup>R</sup>* <sup>with fresh random coins; we use</sup> *<sup>←</sup>* <sup>when</sup> *<sup>R</sup>* <sup>is</sup> deterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control planes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a function of a sequence of queries and responses.\n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying LLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive control plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, predictive binary routers use relatively simple classifiers to determine which of *M* s or *M* w should be used to respond to a query.\n\n**Inference flow.** Given a set of LLMs *M* , a control plane *R* *ω* , and an input *x* , an LLM inference flow is the sequence of LLM invocations *M* *i* *j* ( *z* *j* ) for 1 *≤* *j* *≤* *m* and *i* *j* *∈{* w *,* s *}* made when executing *R* *<sup>M</sup>* *ω* <sup>(</sup> *<sup>x</sup>* <sup>)</sup> <sup>. Here</sup> *<sup>m</sup>* <sup>is the total number of</sup> LLM invocations, and *z* 1 *, . . . , z* *m* are the queries made to the underlying LLMs. Should *R* be randomized, the sequence and its length are random variables. An inference flow can be written as a transcript\n\n*T* = ( *i* 1 *, z* 1 ) *,* ( *i* 2 *, z* 2 ) *, . . . ,* ( *i* *m* *, z* *m* )", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "R EROUTING LLM R OUTERS\n\nA P REPRINT\n\n**Avital Shafran** The Hebrew University of Jerusalem\n\n**Roei Schuster** Wild Moose **Thomas Ristenpart** Cornell Tech **Vitaly Shmatikov** Cornell Tech\n\n**A BSTRACT**\n\nLLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. Routers represent one type of what we call LLM control planes: systems that orchestrate use of one or more LLMs. In this paper, we investigate routers’ adversarial robustness.\n\nWe first define LLM control plane integrity, i.e., robustness of LLM orchestration to adversarial in- puts, as a distinct problem in AI safety. Next, we demonstrate that an adversary can generate query- independent token sequences we call “confounder gadgets” that, when added to any query, cause LLM routers to send the query to a strong LLM.\n\nOur quantitative evaluation shows that this attack is successful both in white-box and black-box settings against a variety of open-source and commercial routers, and that confounding queries do not affect the quality of LLM responses. Finally, we demonstrate that gadgets can be effective while maintaining low perplexity, thus perplexity-based filtering is not an effective defense. We finish by investigating alternative defenses.\n\n## **1 Introduction**\n\nLarge language models (LLMs) exhibit remarkable capabilities on many tasks. Today, hundreds of open-source and proprietary LLMs are available at different prices, ranging from expensive, state-of-the-art models to cheaper, smaller, less capable ones. LLM operators typically provide API access to their models (especially higher-quality models) on a pay-per-query basis. This imposes non-trivial costs on LLM-based applications and systems.\n\nDevelopers who want to integrate LLMs into their applications must therefore consider both utility and cost. They want to maximize the quality of responses to their queries while minimizing the cost. The two objectives conflict with each other: larger models tend to generate higher-quality answers but charge more per query. For example, at the time of this writing, GPT-3.5-turbo costs $0 *.* 5 */* $1 *.* 5 per 1M input/output tokens, GPT-4o-mini $0 *.* 15 */* $0 *.* 6 , GPT-4o $2 *.* 5 */* $10 , o1-preview $15 */* $60 . The difference in quality between models is not uniform across queries. For some queries, even a cheap model can generate an acceptable response. More complex queries require an expensive model to obtain a quality answer.\n\nA natural solution to balancing performance and economic considerations is to take advantage of the availability of mul- tiple LLMs at different price-performance points. Recently proposed * **LLM routing** * systems [5, 12, 27, 47, 53] orchestrate two or more LLMs and adaptively route each query to the cheapest LLM they deem likely to generate a response of sufficient quality. In the two-LLM case, let *M* *s* be an expensive, high-quality model and *M* *w* a weaker, lower-grade one. Given query *q* , the routing algorithm *R* ( *·* ) applies a classifier to *q* that outputs 0 if *M* *w* is sufficient for answering *q* , or 1 if *M* *s* is required. The system then routes *q* accordingly.\n\nLLM routing is an example of a general class of systems we call LLM control planes, which orchestrate the use of multiple LLMs to process inputs, as further described in Section 2.\n\n**Our contributions.** First, we introduce * **LLM control plane integrity** * as a novel problem in AI safety. Recently proposed LLM control-plane algorithms are learned, calibrated classifiers (see Section 2). Their inputs are queries from potentially adversarial users. Robustness of control-plane algorithms to adversarial queries is a new problem, distinct from adversarial robustness of the underlying LLMs.\n\narXiv:2501.01818v1 [cs.CR] 3 Jan 2025", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv1.pdf" - }, - { - "text": "**Attacks against MoE.** Mixture-of-Experts (MoE) architectures enable using multiple expert modules for processing a given query with a lower computational cost by including an inner routing mechanism that in every layer routes different tokens to a small number of experts [29, 30, 52, 56]. This can be thought of as an internal router within a single LLM, rather than an external control plane that orchestrates multiple LLMs. MoE has increased in popularity as it allows to build larger models at a fixed compute budget—not all parameters are used at the same time.\n\nHayes et al. [34] identified a vulnerability in MoE that can be exploited for a denial-of-service attack against MoE. Thus control plane integrity issues appear to extend to the context of single-LLM MoE systems, and future work could explore this connection further.\n\nYona et al. [67] presented a side-channel attack on MoE that enables an attacker to reveal other users’ prompts. We expect that side-channel attacks against LLM control planes exist as well, for example, to infer which models are used via timing of responses. Such attacks, which target confidentiality, are outside the scope of control plane integrity.\n\n## **10 Conclusion**\n\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an example of a broader, emerging class of systems we call “LLM control planes” that aim to achieve various quality, efficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query.\n\n17", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - }, - { - "text": "Figure 1: LLM routers classify queries and route complex ones to an expensive/strong model, others to a cheaper/weak model. To control costs, LLM routers can be calibrated to maintain (for an expected workload) a specific ratio between queries sent to the strong and weak models.\n\nTo initiate the study of this problem, we show that existing LLM routing algorithms are not adversarially robust. We design, implement, and evaluate a method that generates *query-independent* adversarial token sequences we call “con- founder gadgets.” If a gadget is added to any query, this query is routed to the strong model with high probability. Next, we show that this attack is effective even in the *transfer* setting where the adversary does not have full knowledge of the target LLM router (it is black-box), but has access to another router (e.g., an internally trained surrogate). We also evaluate the integrity of commercial LLM routers, showing that they can be confounded as well.\n\nThird, we investigate defenses. Our basic method generates gadgets that have anomalously high perplexity. Confounded queries are thus easily distinguished from normal queries and can be filtered out by the routing system. Unfortunately, this defense can be evaded by an adversary who incorporates a low-perplexity objective into the gadget generation algorithm, producing gadgets that have low perplexity—and yet are effective at re-routing queries to the strong model. We also discuss higher-level defenses, such as identifying users whose queries are routed to the strong model with abnormal frequency.\n\nRouting attacks can be deployed for various adversarial objectives, e.g., to ensure that the adversary always obtains the highest-quality answer regardless of the target applications’s internal routing policies and cost constraints, or to mali- ciously inflate the target’s LLM costs. As LLM control planes grow in importance and sophistication, we hope that this work will motivate further research on their adversarial robustness.\n\n## **2 LLM Control Planes and Routing**\n\nInference using large language models (LLMs) is traditionally monolithic: a single model is applied to an input or se- quence of inputs. This methodology can be sub-optimal for various reasons. State-of-the-art models are often expensive, with API access to LLMs costing as much as several dollars for each query. Elsewhere, distinct LLMs may excel at dif- ferent tasks, and selectively using them may improve overall quality on a diverse workload. Finally, combining multiple LLMs, even all trained for similar tasks, may become increasingly prevalent as performance improvements of individual LLMs plateaus [8- 10].\n\nResearchers and practitioners are therefore now developing inference architectures that use multiple LLMs to answer queries. These LLMs are orchestrated by what we call an *LLM control plane* (borrowing the terminology from network- ing [13]). The control plane may route queries or parts of queries to different LLMs, derive new strings to query to underlying LLMs, combine answers from underlying LLMs, and more.\n\n**LLM routers.** A prominent example of this emerging class of LLM control planes are *LLM routers* [27, 41, 47, 53, 59]. LLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, the router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a response. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure a score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative workloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv1.pdf" - }, - { - "text": "We introduced and defined a new safety property, *LLM control plane integrity* . Informally, this property holds if an adversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not satisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating query- independent “confounder gadgets.” When added to any query, the confounder gadget confuses the router into routing the query to the adversary-chosen LLM.\n\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that they successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against these attacks and indicated directions for future research.\n\n**Acknowledgments**\n\nThis research was supported in part by the Google Cyber NYC Institutional Research Program, the Israel Science Founda- tion (Grant No. 1336/22), and the European Union (ERC, FTRC, 101043243). Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Research Council. Neither the European Union nor the granting authority can be held responsible for them.\n\n18", - "page_start": 17, - "page_end": 17, - "source_file": "arxiv1.pdf" - }, - { - "text": "an extra potentially expensive LLM invocation for each query processed by the router. Second, it may degrade the quality of responses from the destination LLMs, which are sensitive to the phrasing of queries and prompts.\n\n**Detecting anomalous user workloads.** Another possible defense requires the router to monitor individual user work- loads, and identify those users whose queries are routed to the strongest model with an abnormally high frequency. The router can then impose a user-specific threshold. Of course such workloads may have a benign explanation, e.g., the user’s queries may be unusually complex. Even so, routers could potentially be designed to perform user-specific routing. For example, one could imagine using per-user thresholds that are calibrated dynamically to attempt to maintain a consistent fraction of queries being routed to the strong model.\n\nSuch user-specific routing would complicate implementations, and would make inaccurate decisions for a user until there is sufficient data about their queries. The latter is relevant in adversarial settings, since such an approach would still be circumventable should attackers be able to mount Sybil attacks in which the attacker creates a new user for, in the limit, each query.\n\n## **9 Related Work**\n\n**Evasion attacks against ML systems.** A large body of work has investigated evasion attacks against ML systems [25, 43, 60], also referred to as adversarial examples [32, 48, 49], and these attacks are now being explored in the context of multi-modal LLMs [28] as well as text-only LLMs (for just one example, see [22]). We discussed in Section 3 how our results compare: LLM control plane integrity is a distinct AI safety issue, but related in that: (1) control plane integrity attacks may use evasion-style techniques, and (2) control plane integrity attacks might be useful for performing evasion.\n\n**Prompt injection against LLMs.** Prompt injection is a class of attacks against LLMs in which the adversary manipulates the prompt, i.e., the textual input fed directly to the LLM, causing the LLM to generate outputs that satisfy some adver- sarial objective [50, 64]. Evasion attacks as discussed above can use prompt injection, jailbreaking attacks being a widely explored example in which the adversary aims to bypass some safety guardrail included in the LLM system, such as “do not output expletives” [23, 42, 54, 66, 72, 73].\n\nPrompt injection is also used for extraction attacks that aim to infer some information from or about the model, for example, the system prompt [50, 54, 70], training data samples [46], or model parameters [18]. In indirect prompt injection attacks [33], the adversaries do not directly interact with the target LLM, and instead inject adversarial inputs into third- party data, which is then added to the LLM prompt (intentionally or unintentionally) by the victim application and/or its users. This relates to another category of attacks that target LLM-based applications, such as RAG systems, and invalidate their integrity by exploiting the weaknesses of the underlying LLM [19, 55].\n\nOur attacks also modify queries, but with a different aim than the above types of attacks: undermining the integrity of the control plane routing, rather than the LLM itself. Future work might investigate indirect control plane integrity attacks that, analogously to indirect prompt injection, serve to somehow trick users of a routing system into forming control- plane-confounding queries.", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - }, - { - "text": "**Routers Notation** Similarity-weighted ranking *R* *SW* Matrix factorization *R* *MF* BERT classifier *R* *CLS* LLM scoring *R* *LLM*\n\n**LLM pair Strong (** *M* s **) Weak (** *M* w **)** 1 Llama-3.1-8B 4-bit Mixtral 8x7B 2 Llama-3.1-8B Mistral-7B-Instruct-v0.3 3 Llama-3.1-8B Llama-2-7B-chat-hf 4 GPT-4-1106-preview 4-bit Mixtral 8x7B\n\n**Benchmark Description** MT-Bench [71] 160 open-ended questions MMLU [35] 14,042 multi-choice questions GSM8K [24] 1,319 grade-school math problems\n\nFigure 3: Summary of our setup for routers, underlying LLMs, and benchmark datasets used in the experiments.\n\nIn all experiments, we assume that the adversary’s goal is to reroute queries to the strong model. In Appendix E, we evaluate efficacy of the attack when the goal is to reroute to the weak model.\n\n**Target routers.** We focus our evaluation on the four prescriptive routing algorithms proposed by Ong et al. [47], which provides open-source code and trained parameters, and does so for a representative variety of routing ap- proaches: similarity-based classification [41, 59], an MLP constructed via matrix factorization [59], BERT-based clas- sification [27, 53, 59], and a fine-tuned LLM.\n\nThe routers we evaluate were trained in a supervised fashion using a set of reference (training) queries whose performance score on each of the considered models is known. The scores were computed from a collection of human pairwise rankings of model answers for each of the queries. We note that while the routers we consider are all learned using this training set, there is no reason to believe a non-learning-based approach (e.g., rule based) to routing would be more adversarially robust.\n\nWe now outline the routing methods considered in this work. See Ong et al. [47] for their full implementation details.\n\n*Similarity-weighted ranking:* The first method is based on the Bradley-Terry (BT) model [17]. For a given user query, this model derives a function to compute the probability of the weak model being preferred over the strong model. The probability-function expressions all share parameters, which are optimized to minimize the sum of cross-entropy losses over the training-set queries, where each element in the sum is weighted by the respective query’s similarity with the user’s query (computed as embeddings cosine similarity, with the embedding derived using OpenAI’s text-embedding-3- small [6]). We denote this method as *R* *SW* .\n\n*Matrix factorization:* The second method is based on matrix factorization. The training queries are used to train a bilinear function mapping a model’s embedding and a query’s embedding to a score corresponding to how well the model performs on the query. Routing is done by computing the score of the input query for each model, and choosing the highest-scoring model. We denote this method as *R* *MF* .\n\n*BERT classifier:* The third method involves fine-tuning a classifier, based on the BERT-base architecture [26], to predict which of the two models produces a better response for the given query or whether they do equally well (a tie). The routing decision is based on the probability of the weak model providing a better response versus the strong model or the tie. We denote this method as *R* *CLS* .\n\n*LLM classifier:* The last method is based on asking an LLM to provide a score in the range 1 - 5 of how an AI expert would struggle to respond to a given query based on the query’s complexity. For this, Ong et al. fine-tuned a Llama-3-8B model [4] using their reference set of queries and corresponding scores. We denote this method as *R* *LLM* .\n\n**Underlying LLMs.** In [47], Ong et al. trained the routers with GPT-4-1106-preview [14] as the strong model and Mixtral 8x7B [39] as the weak model. They report successful generalization between the underlying LLMs, stating that their routers trained for a particular strong-weak LLM pair can be used with other strong-weak LLM pairs.", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv1.pdf" - }, - { - "text": "To further demonstrate that the attack improves the quality of responses when there is a significant gap between the weak and strong LLMs, we perform an additional evaluation with Mistral-7B-Instruct-v0.3 [38] and Llama-2-7B-chat-hf [63] as the weak LLMs (LLM pairs 2 and 3). Mistral-7B achieves 7 *.* 4 , 57% , and 25% on MT-bench, MMLU, and GSM8K, respectively. Llama-2-7B achieves 6 *.* 4 , 44% , and 21% . Table 4 shows that the rerouting attack improves quality of responses when either of these LLMs is the weak model, and in particular for the weaker Llama-2-7B model.\n\nLLM responses are sometimes affected by the confounder gadget. In some cases, the LLM responded with, for example, “I can’t answer that question as it appears to be a jumbled mix of characters”. Still, the response continued with “However, I can help you with the actual question you’re asking,” followed by the actual answer. We observed very few cases where an LLM refused to answer due to the presence of the gadget. In most cases, the response did not mention anything\n\n1 Some responses had abnormally high perplexity values ( *>* 100 ), which we found do not correlate with quality, but these variations disproportionately contribute to the average. We thus filter out such high-perplexity responses as outliers in both benign and attack settings. We provide examples of filtered responses in Appendix D.\n\n10", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv1.pdf" - }, - { - "text": "Chapter 12. Scalability, reliability, and availability architectures\n\n*Figure 12-4 Horizontal and vertical scaling with multiple LPARs*\n\nThis scenario is in organizations with large systems, such as AIX or z/OS, that are installed\n\nand that have enough available capacity to support the required Content Manager\n\nOnDemand workload. One advantage of this configuration is that you can control the priority\n\nof work and computer resource distribution to each of the LPARs, such as the number of\n\nprocessors or the processing priority (depending on the computer system/operating system\n\narchitecture) that is allocated to each of the LPARs. So, for example, load jobs can be\n\nassigned a low priority during the day when the focus is on data retrieval and a high priority\n\nduring the night when the focus is on data loading.\n\nThis setup supports horizontal scalability by using multiple technologies as appropriate. The\n\nmain constraint is that clients must have access to all systems through TCP/IP.\n\n#### **12.2.6 Multiple server configuration rules**\n\nThe following general rules apply when you configure multiple Content Manager OnDemand\n\nservers. In all cases, for additional guidance, see the appropriate Content Manager\n\nOnDemand documentation or contact Content Manager OnDemand Lab Services.\n\n� Each Content Manager OnDemand server has its own set of configuration files.\n\n� The parameters in all configuration files must be set so that all of the servers are part of\n\nthe same instance.\n\n� The Content Manager OnDemand clients connect to the IP address listening port of the\n\nContent Manager OnDemand server (library server module).\n\n� The documents are retrieved from the various object servers based on the location\n\ninformation that is returned by the library server. This retrieval is transparent to the client\n\nsystems.\n\n� Parallel load processes must have separate temp directories.\n\nFigure 12-5 on page 292 depicts this configuration type.\n\nLPAR\n\n1\n\nLPAR\n\n2\n\nLPAR\n\nn\n\n**Syst em A**\n\nLPAR\n\n1\n\nLPAR\n\n2\n\nLPAR\n\nn\n\n**System B**\n\nLibrary\n\nServer\n\nObject\n\nServer\n\nObject\n\nServer\n\n+\n\n**OnDemand Instance**\n\nLoad\n\nProcess\n\nLoad\n\nProcess\n\n+\n\nLPAR\n\n2\n\nLPAR\n\n2", - "page_start": 314, - "page_end": 314, - "source_file": "sg246915.pdf" - }, - { - "text": "Non-prescriptive routing [15, 20, 68] uses the responses from one or more underlying LLMs to determine which response to return to the user. For example, FrugalGPT [20] submits the query to a sequence of models (ordered by price) called a cascade, stopping when it obtains a response classified by the router as sufficient.\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv1.pdf", - "query": "What is an LLM control plane ?", - "target_page": 3, - "target_passage": " An LLM control plane Rω is a potentially randomized algorithm.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of responses [31, 45, 57, 58].\n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes do. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying models to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, but route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference costs by using fewer and/or less complex underlying models.\n\n**Applications of LLM routers.** A key use case for LLM routers is to help LLM-based application reduce cost. Several commercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a few lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The service selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant cost savings: up to 98% in the case of Martian [5], and 10 *×* in the case of NotDiamond [7].\n\n## **3 LLM Control Plane Integrity**\n\nIn this section, we define *LLM control plane integrity* . Informally, it means that decisions made about underlying LLM queries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus on one class of control plane: predictive LLM routing as used to manage cost.\n\n**Formalizing control planes.** An LLM control plane *R* *ω* is a potentially randomized algorithm. It is parameterized by a string *ω* , called the parameters. It utilizes some number *n* of LLMs denoted by *M* . We will mostly focus on the case of *n* = 2 , and, for reasons that will be clear in a moment, use *M* s (“strong”) and *M* w (“weak”) to denote the two underlying LLMs. Then inference on an input *x* *∈X* for some set *X* of allowed queries is performed by computing a response via *y* *←* <sup>$</sup> *R* *<sup>M</sup>* *ω* <sup>(</sup> *<sup>x</sup>* <sup>)</sup> <sup>. Here we use</sup> *<sup>←</sup>* <sup>$</sup> <sup>to denote running</sup> *<sup>R</sup>* <sup>with fresh random coins; we use</sup> *<sup>←</sup>* <sup>when</sup> *<sup>R</sup>* <sup>is</sup> deterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control planes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a function of a sequence of queries and responses.\n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying LLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive control plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, predictive binary routers use relatively simple classifiers to determine which of *M* s or *M* w should be used to respond to a query.\n\n**Inference flow.** Given a set of LLMs *M* , a control plane *R* *ω* , and an input *x* , an LLM inference flow is the sequence of LLM invocations *M* *i* *j* ( *z* *j* ) for 1 *≤* *j* *≤* *m* and *i* *j* *∈{* w *,* s *}* made when executing *R* *<sup>M</sup>* *ω* <sup>(</sup> *<sup>x</sup>* <sup>)</sup> <sup>. Here</sup> *<sup>m</sup>* <sup>is the total number of</sup> LLM invocations, and *z* 1 *, . . . , z* *m* are the queries made to the underlying LLMs. Should *R* be randomized, the sequence and its length are random variables. An inference flow can be written as a transcript\n\n*T* = ( *i* 1 *, z* 1 ) *,* ( *i* 2 *, z* 2 ) *, . . . ,* ( *i* *m* *, z* *m* )", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" - }, - { - "text": "**Attacks against MoE.** Mixture-of-Experts (MoE) architectures enable using multiple expert modules for processing a given query with a lower computational cost by including an inner routing mechanism that in every layer routes different tokens to a small number of experts [29, 30, 52, 56]. This can be thought of as an internal router within a single LLM, rather than an external control plane that orchestrates multiple LLMs. MoE has increased in popularity as it allows to build larger models at a fixed compute budget—not all parameters are used at the same time.\n\nHayes et al. [34] identified a vulnerability in MoE that can be exploited for a denial-of-service attack against MoE. Thus control plane integrity issues appear to extend to the context of single-LLM MoE systems, and future work could explore this connection further.\n\nYona et al. [67] presented a side-channel attack on MoE that enables an attacker to reveal other users’ prompts. We expect that side-channel attacks against LLM control planes exist as well, for example, to infer which models are used via timing of responses. Such attacks, which target confidentiality, are outside the scope of control plane integrity.\n\n## **10 Conclusion**\n\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an example of a broader, emerging class of systems we call “LLM control planes” that aim to achieve various quality, efficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query.\n\n17", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - }, - { - "text": "R EROUTING LLM R OUTERS\n\nA P REPRINT\n\n**Avital Shafran** The Hebrew University of Jerusalem\n\n**Roei Schuster** Wild Moose **Thomas Ristenpart** Cornell Tech **Vitaly Shmatikov** Cornell Tech\n\n**A BSTRACT**\n\nLLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. Routers represent one type of what we call LLM control planes: systems that orchestrate use of one or more LLMs. In this paper, we investigate routers’ adversarial robustness.\n\nWe first define LLM control plane integrity, i.e., robustness of LLM orchestration to adversarial in- puts, as a distinct problem in AI safety. Next, we demonstrate that an adversary can generate query- independent token sequences we call “confounder gadgets” that, when added to any query, cause LLM routers to send the query to a strong LLM.\n\nOur quantitative evaluation shows that this attack is successful both in white-box and black-box settings against a variety of open-source and commercial routers, and that confounding queries do not affect the quality of LLM responses. Finally, we demonstrate that gadgets can be effective while maintaining low perplexity, thus perplexity-based filtering is not an effective defense. We finish by investigating alternative defenses.\n\n## **1 Introduction**\n\nLarge language models (LLMs) exhibit remarkable capabilities on many tasks. Today, hundreds of open-source and proprietary LLMs are available at different prices, ranging from expensive, state-of-the-art models to cheaper, smaller, less capable ones. LLM operators typically provide API access to their models (especially higher-quality models) on a pay-per-query basis. This imposes non-trivial costs on LLM-based applications and systems.\n\nDevelopers who want to integrate LLMs into their applications must therefore consider both utility and cost. They want to maximize the quality of responses to their queries while minimizing the cost. The two objectives conflict with each other: larger models tend to generate higher-quality answers but charge more per query. For example, at the time of this writing, GPT-3.5-turbo costs $0 *.* 5 */* $1 *.* 5 per 1M input/output tokens, GPT-4o-mini $0 *.* 15 */* $0 *.* 6 , GPT-4o $2 *.* 5 */* $10 , o1-preview $15 */* $60 . The difference in quality between models is not uniform across queries. For some queries, even a cheap model can generate an acceptable response. More complex queries require an expensive model to obtain a quality answer.\n\nA natural solution to balancing performance and economic considerations is to take advantage of the availability of mul- tiple LLMs at different price-performance points. Recently proposed * **LLM routing** * systems [5, 12, 27, 47, 53] orchestrate two or more LLMs and adaptively route each query to the cheapest LLM they deem likely to generate a response of sufficient quality. In the two-LLM case, let *M* *s* be an expensive, high-quality model and *M* *w* a weaker, lower-grade one. Given query *q* , the routing algorithm *R* ( *·* ) applies a classifier to *q* that outputs 0 if *M* *w* is sufficient for answering *q* , or 1 if *M* *s* is required. The system then routes *q* accordingly.\n\nLLM routing is an example of a general class of systems we call LLM control planes, which orchestrate the use of multiple LLMs to process inputs, as further described in Section 2.\n\n**Our contributions.** First, we introduce * **LLM control plane integrity** * as a novel problem in AI safety. Recently proposed LLM control-plane algorithms are learned, calibrated classifiers (see Section 2). Their inputs are queries from potentially adversarial users. Robustness of control-plane algorithms to adversarial queries is a new problem, distinct from adversarial robustness of the underlying LLMs.\n\narXiv:2501.01818v1 [cs.CR] 3 Jan 2025", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv1.pdf" - }, - { - "text": "e.g., cruise, climb, maneuvers, etc. The region of reversed command is encountered primarily in the low speed phases of flight during takeoff and landing. Because of the extensive low speed flight during carrier operations, the Naval Aviator will be more familiar with the region of reversed command than the ordinary pilot. The characteristics of flight in the region’of normal command are illustrated at point A on the second curve of figure 6.2. If the airplane is established in steady, level flight at point A, lift is equal to weight and the power available is set equal to the power required. When the airplane is disturbed to some airspeed slightly greater than point ‘A, a power deficiency exists and, wheq,:the &+la&is disturbed to some air- speed slightly lower than point A, a power excess exists. This relationship provides a tendency for the airplane to return to the equili- brium of point A and resume the original flight condition following a disturbance. Also, the static longitudinal stability of the airplane tends to return the airplane to the original trimmed CL and velocity corresponding to this C,. The phugoid usually has most satisfactory qualities at low values of C,. so the high speed of the region ‘of normal command provides little tendency of. the airplane’s, airspeed to vary or wander abom. With all factors considered, flight in Lhe region of noi& command is characterized by a relatively strong tendency of the airplane to maintain the trim speed quite naturally. How- ever, flight in the region of normal command can lead to some unusual and erroneous impres-, sions regarding proper flying technique. For example, if the airplane is established at point A in steady level flight, a controlled increase in airspeed without a change in power setting will create a deficiency of power and cause the airplane to descend. Similarly, a controlled decrease in airspeed without a change in power setting will create an excess of power and cause the airplane to climb. This fact, coupled with Lhe transient motion of the airplane when the\n\nNAVWEPS OD4OT-80 APPLICATION OF AERODYNAMICS TO SPECIFIC PROBLEMS OF FLYING", - "page_start": 372, - "page_end": 372, - "source_file": "00-80T-80.pdf" - }, - { - "text": "an extra potentially expensive LLM invocation for each query processed by the router. Second, it may degrade the quality of responses from the destination LLMs, which are sensitive to the phrasing of queries and prompts.\n\n**Detecting anomalous user workloads.** Another possible defense requires the router to monitor individual user work- loads, and identify those users whose queries are routed to the strongest model with an abnormally high frequency. The router can then impose a user-specific threshold. Of course such workloads may have a benign explanation, e.g., the user’s queries may be unusually complex. Even so, routers could potentially be designed to perform user-specific routing. For example, one could imagine using per-user thresholds that are calibrated dynamically to attempt to maintain a consistent fraction of queries being routed to the strong model.\n\nSuch user-specific routing would complicate implementations, and would make inaccurate decisions for a user until there is sufficient data about their queries. The latter is relevant in adversarial settings, since such an approach would still be circumventable should attackers be able to mount Sybil attacks in which the attacker creates a new user for, in the limit, each query.\n\n## **9 Related Work**\n\n**Evasion attacks against ML systems.** A large body of work has investigated evasion attacks against ML systems [25, 43, 60], also referred to as adversarial examples [32, 48, 49], and these attacks are now being explored in the context of multi-modal LLMs [28] as well as text-only LLMs (for just one example, see [22]). We discussed in Section 3 how our results compare: LLM control plane integrity is a distinct AI safety issue, but related in that: (1) control plane integrity attacks may use evasion-style techniques, and (2) control plane integrity attacks might be useful for performing evasion.\n\n**Prompt injection against LLMs.** Prompt injection is a class of attacks against LLMs in which the adversary manipulates the prompt, i.e., the textual input fed directly to the LLM, causing the LLM to generate outputs that satisfy some adver- sarial objective [50, 64]. Evasion attacks as discussed above can use prompt injection, jailbreaking attacks being a widely explored example in which the adversary aims to bypass some safety guardrail included in the LLM system, such as “do not output expletives” [23, 42, 54, 66, 72, 73].\n\nPrompt injection is also used for extraction attacks that aim to infer some information from or about the model, for example, the system prompt [50, 54, 70], training data samples [46], or model parameters [18]. In indirect prompt injection attacks [33], the adversaries do not directly interact with the target LLM, and instead inject adversarial inputs into third- party data, which is then added to the LLM prompt (intentionally or unintentionally) by the victim application and/or its users. This relates to another category of attacks that target LLM-based applications, such as RAG systems, and invalidate their integrity by exploiting the weaknesses of the underlying LLM [19, 55].\n\nOur attacks also modify queries, but with a different aim than the above types of attacks: undermining the integrity of the control plane routing, rather than the LLM itself. Future work might investigate indirect control plane integrity attacks that, analogously to indirect prompt injection, serve to somehow trick users of a routing system into forming control- plane-confounding queries.", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" - }, - { - "text": "NAVWEPS OD4OT-80 APPLICATION OF AERODYNAMICS TO SPECIFIC PROBLEMS OF FLYING\n\nangle of attack is changed rapidly, may lead to the impression thal rate of climb and descent can be controlled by changes in angle of attack. While such is true in the region of normal com- mand, for the conditions of stead’ flight, pri- mary control of altitude remains the power setting and the primary control of airspeed re- mains the angle of attack. The impressions and habits that can be developed in the region of normal command can bring about disastrous consequences in the region of reversed com- mand The characteristics of flight in the region of reversed command are illustrated at point B on the second curve of figure 6.2. If the air- plane is established in steady, level flight at point B, lift is equal to weight and the power available is set equal to the. power required. When the airplane is disturbed to some air- speed slightly greater than point B, an excess of power exists and, when the airplane is dis- turbed to some airspeed slightly lower than point B, a deficiency of power exists. This relationship is basically unstable because the variation of excess power to either side of point B tends to magnify any original dis- turbance. While the static longitudinal sta- bility of the airplane tends to maintain the original trimmed C, and airspeed correspond- ing to that CL, the phugoid usually has the least satisfactory qualities at the high values of CL corresponding to low speed flight. When all factors are considered, flight in the region of reversed command is characterized by a relatively weak tendency of the airplane to maintain the trim speed naturally. In fact it is likely that the airplane will exhibit no inherent tendency to maintain the trim speed in this regime of flight. For this reason, the pilot inust give particular attention to precise control of airspeed when operating in the low flight speeds of the region of reversed command. While flight in the region of normal com- mand may create doubt as to the primary con- trol of airspeed and altitude, operation in the region of reversed command should leave little", - "page_start": 372, - "page_end": 372, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-BOT-80 STABILITY AND CONTROL\n\nflaps are fully extended, and power is set at idle. This configuration will provide the most stable condition which is most demand- ing of controllability. The full deflection of flaps usually provides the greatest wing diving moment and idle power will produce the most critical (least) dynamic pressure at the hoti- zontal tail. The landing control requirement has one particular difference from the maneuvering control requirement of free flight. As the airplane approaches the ground surface, there will be a change in the three-dimensional flow of the airplane due to ground effect. A wing in proximity to the ground plane will experience a decrease in tip vortices and downwash at a given lift coefficient. The decrease in down- wash at the tail tends to increase the static stability and produce a nosedown moment from the reduction in download on the tail. Thus, the airplane just off the runway surface will requite additional control deflection to trim at a given lift coefficient and the landing con- trol requirement may be critical in the design of longitudinal control power. As an example of ground effect, a typical propeller powered airplane may requite as much as 15” more up elevator to trim at CL- in ground effect than in free flight away from the ground plane. Because of this effect, many aitplaneshavesufIicientcontrolpowertoachieve full stall out of ground effect but do not have the ability to achieve full stall when in close proximity to the ground. In some cases the effectiveness of the control surface is adversely affected by the use of trim tabs. If trim tabs are used to excess in ttim- ming stick forces, the effectiveness of the elevator.may be reduced to hinder landing or takeoff control. Each of the three principal conditions re- quiting adequate longitudinal control are ctit- ical for high static stability. If the forward c.g. limit is exceeded, the airplane may en- counter a deficiency of controllability in any of these conditions. Thus, the forward c.g.\n\n177", - "page_start": 294, - "page_end": 294, - "source_file": "00-80T-80.pdf" - }, - { - "text": "loo. ................. l.lm 1.30 20.00 110 .................. ,826 1.24 15.P 17.0 .................. ,694 1.04 12.7’ lY) .................. .444 .61 8.20 200 .................. 230 .38 4.6’ MO. ................. ,111 .I7 2.10 4&l. ................. .c453 .o!J 1.10 30.7. ................. ,040 .06 .T=\n\n600 .................. .028 .04 .5O\n\nNote that for the conditions of steady flight, each airspeed requites a specific angle of attack and lift coefficient. This fact provides a fun- damental concept of flying technique: Angle of attack is tbs primary Control of airspeed in steady flight. Of course, the control stick or wheel allows the pilot to control the angle of attack and, thus, control the airspeed in steady flight. In the same sense, the throttle controls the output of the powerplant and allows the pilot to control rate of climb and descent at various airspeeds. The teal believers of these concepts ate pro- fessional instrument pilots, LSO’s, and glider pilots.. The glider pilot (or flameout enthusi- ast) has no recourse but to control airspeed by angle of attack and accept whatever rate of descent is incurred at the various airspeeds. The LSO must become quite proficient at judg- ing the flight path and angle of attack of the airplane in the pattern. The more complete visual reference field available to the LSO allows him to judge the angle of attack of the airplane mote accurately than the pilot. When the airplane approaches the LSO, the precise judgment of airspeed is by the angle of attack rather than the rate of closure. If the LSO sees the airplane on the desired flight path but with too low an angle of attack, the airspeed is too high; if the angle of attack is too high, the airspeed is too low and the ait- plane is approaching the stall. The mirror landing system coupled with an angle of attack indicator is an obvious refinement. The mit- tot indicates the desired flight path and the\n\nNAVWEPS WOT-BO BASIC AERODYNAMICS", - "page_start": 44, - "page_end": 44, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Figure 1: LLM routers classify queries and route complex ones to an expensive/strong model, others to a cheaper/weak model. To control costs, LLM routers can be calibrated to maintain (for an expected workload) a specific ratio between queries sent to the strong and weak models.\n\nTo initiate the study of this problem, we show that existing LLM routing algorithms are not adversarially robust. We design, implement, and evaluate a method that generates *query-independent* adversarial token sequences we call “con- founder gadgets.” If a gadget is added to any query, this query is routed to the strong model with high probability. Next, we show that this attack is effective even in the *transfer* setting where the adversary does not have full knowledge of the target LLM router (it is black-box), but has access to another router (e.g., an internally trained surrogate). We also evaluate the integrity of commercial LLM routers, showing that they can be confounded as well.\n\nThird, we investigate defenses. Our basic method generates gadgets that have anomalously high perplexity. Confounded queries are thus easily distinguished from normal queries and can be filtered out by the routing system. Unfortunately, this defense can be evaded by an adversary who incorporates a low-perplexity objective into the gadget generation algorithm, producing gadgets that have low perplexity—and yet are effective at re-routing queries to the strong model. We also discuss higher-level defenses, such as identifying users whose queries are routed to the strong model with abnormal frequency.\n\nRouting attacks can be deployed for various adversarial objectives, e.g., to ensure that the adversary always obtains the highest-quality answer regardless of the target applications’s internal routing policies and cost constraints, or to mali- ciously inflate the target’s LLM costs. As LLM control planes grow in importance and sophistication, we hope that this work will motivate further research on their adversarial robustness.\n\n## **2 LLM Control Planes and Routing**\n\nInference using large language models (LLMs) is traditionally monolithic: a single model is applied to an input or se- quence of inputs. This methodology can be sub-optimal for various reasons. State-of-the-art models are often expensive, with API access to LLMs costing as much as several dollars for each query. Elsewhere, distinct LLMs may excel at dif- ferent tasks, and selectively using them may improve overall quality on a diverse workload. Finally, combining multiple LLMs, even all trained for similar tasks, may become increasingly prevalent as performance improvements of individual LLMs plateaus [8- 10].\n\nResearchers and practitioners are therefore now developing inference architectures that use multiple LLMs to answer queries. These LLMs are orchestrated by what we call an *LLM control plane* (borrowing the terminology from network- ing [13]). The control plane may route queries or parts of queries to different LLMs, derive new strings to query to underlying LLMs, combine answers from underlying LLMs, and more.\n\n**LLM routers.** A prominent example of this emerging class of LLM control planes are *LLM routers* [27, 41, 47, 53, 59]. LLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, the router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a response. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure a score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative workloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers.", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv1.pdf" - }, - { - "text": "NAVWEPS O&ROT-SO APPLICATION OF AERODYNAMICS TO SPECIFIC PROBLEMS OF FLYl.NG\n\ninvitation for trouble of many sorts. The normal and emergency procedures applicable to each specific airplane will insure the proper operation of the equipment. (3) Operating Limitatiom. The operation of the airplane and powerplant must be conducted within the established limitations. Failure to do so will invite failure or malfunction of the equipment and increase the operating cost or possibly cause an accident. (4) Flight Characteristics. While all aircraft will have certain minimum requirements for flying qualities, the actual peculiarities and special features of specific airplanes will differ. These particular flight characteristics must be well known and understood by the pilot.\n\n(5) Operating Data. The performance of each specific airplane defines its application to various uses and missions. The handbook operating data must be available at all times to properly plan and elnccate the flight of an aircraft. Constant reference to the operating data will insure safe and effective operation of the airplane. Great time and effort are expended in the 1 preparation of the flight handbook to provide the most exact information, data, and pro- cedures. Diligent study and continuous UC of the flight handbook will ensure that the greatest effectiveness is achieved from the airplane while still operating within the inherent capabilities of the design.\n\n412", - "page_start": 429, - "page_end": 429, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv1.pdf", - "query": "What is a confounder gadget ?", - "target_page": 5, - "target_passage": " Given a query xi, we prepend a confounder gadget ci, which is a short sequence of adversarially chosen tokens.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "(1) (Preprocessing) Develop a single query-independent confounder gadget *c* , using either the target router or surrogate to score the confounder.\n\n(2) (Input adaptation) For each query *x* *i* , submit ˆ *x* *i* = *c* *∥* *x* *i* instead to obtain a response ˆ *y* *i* .\n\nThe confounder is applied to all queries, i.e., the adversary does not need to guess whether the original query would have been routed to the weak or strong model. In the rest of the paper, we demonstrate the confounders rarely result in “downgrades,” i.e., rerouting of queries from the strong to weak model.\n\nWe have experimented with variations of this approach that don’t work quite as well, for example adding *c* as a suffix instead of a prefix. See Appendix B for details.\n\n## **5 Open-Source Routers: Experimental Setup**\n\nTo evaluate efficacy of confounder gadgets generated using the method from Section 4, we perform experiments with several LLM routers. This section explains our experimental setup for the open-source routers proposed in the research literature [47]; results of this evaluation appear in Section 6. In Section 7, we discuss experiments with proprietary, commercial routers. Figure 3 shows the summary of our experimental setup.\n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv1.pdf" - }, - { - "text": "We introduced and defined a new safety property, *LLM control plane integrity* . Informally, this property holds if an adversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not satisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating query- independent “confounder gadgets.” When added to any query, the confounder gadget confuses the router into routing the query to the adversary-chosen LLM.\n\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that they successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against these attacks and indicated directions for future research.\n\n**Acknowledgments**\n\nThis research was supported in part by the Google Cyber NYC Institutional Research Program, the Israel Science Founda- tion (Grant No. 1336/22), and the European Union (ERC, FTRC, 101043243). Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Research Council. Neither the European Union nor the granting authority can be held responsible for them.\n\n18", - "page_start": 17, - "page_end": 17, - "source_file": "arxiv1.pdf" - }, - { - "text": "## **6 Rerouting Open-Source Routers**\n\nWe now empirically evaluate our rerouting attack against the open-source routers described in the previous section. Unless otherwise specified, our evaluation focuses on the query-independent attack setting where the attacker first finds a fixed set of gadgets and then uses them to attack arbitrarily many queries. This is the conservative setting, and query-specific gadgets — which carry a higher computational cost — generally work better.\n\nIn Appendix C we evaluate optimization-free alternatives for generating our confounding gadgets, and show they signifi- cantly underperform our optimization-based approach.\n\n**White-box confounder gadget generation.** Following our attack framework described in Section 4, we construct a query-independent control-plane gadget designed to confuse each router. We start with the white-box setting, setting the batch size to *B* = 32 and the number of iterations to *T* = 100 , ignoring thresholds. We generate four sets of *n* = 10 gadgets, i.e., ten for each router. Examples of generated gadgets can be found in Appendix A.\n\nWhen reporting scores below, we therefore report the average over the *n* gadgets used with all 72 MT-bench queries, 100 randomly selected MMLU queries, and 100 randomly selected GSM8K queries. None of these testing queries were used in the training of the routers or their calibration.\n\n**Runtime and convergence.** Figure 4 shows the convergence rates for 10 different gadgets, against different routing algorithms. The overall average number of iterations before convergence is 58. Generation against *R* *SW* converges the\n\n8", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv1.pdf" - }, - { - "text": "Let *B* = *{* ˜ *c* 0 *, . . . ,* ˜ *c* *B* *}* .\n\n(3) Find the candidate that maximizes the score:\n\n*c* <sup>(</sup> *<sup>t</sup>* <sup>+1)</sup> *i* *←* arg max *c* *∈B*\n\n*S* *θ* ( *c* *∥* *x* *i* ) *.* (1)\n\nThe final confounder *c* <sup>(</sup> *<sup>T</sup>* <sup>)</sup> *i* is used with query *x* *i* . We early abort if, after 25 iterations, there is no update to the confounder gadget. Technically, we could abort early if we find a confounder whose score exceeds *τ* . Running further can be useful when an adversary does not know *τ* .\n\nThe attack’s runtime is dominated by *T* *·* *B* times the cost of executing *S* . In practice, *S* are designed to be fast (otherwise routers would significantly increase the latency of applications that use them). We report precise timings later; in summary, the attack is fast because we can set *T* to be relatively small and still find high-scoring confounders.\n\nDue to the randomness in index and token selection, the method converges to different, yet similarly effective, confounder gadgets on each run. Our evaluation will thus measure average performance over multiple gadgets.\n\n**Query-independent confounders.** One downside of the per-query approach is that the adversary must repeat, for each query, the search for a good confounder. In practice, the adversary might prefer a *query-independent* attack. Our con- founder gadget approach extends to this setting readily: perform the search routine above for an empty query. In other words, just ignore *x* *i* in the query-dependent attack above, replacing *S* *θ* ( *c* *∥* *x* *i* ) in Eq. 1 with *S* *θ* ( *c* ) . This finds a sin- gle query-independent confounder *c* that can be prefixed to all queries, i.e., ˆ *x* *i* = *c* *∥* *x* *i* . We will show that this works surprisingly well.\n\nIt is tempting to assume the reason a query-independent confounder works well is that a good scoring function should be roughly monotonic in query extensions, i.e., one might expect that *S* *θ* ( *c* *∥* *x* ) *≥* *S* *θ* ( *c* ) for almost any suffix *x* . This intuition is not correct. In our experiments, we found that *S* *θ* ( *c* *∥* *x* ) *< S* *θ* ( *c* ) for many *x* and some of the routers discussed below. Nevertheless, by ensuring that *S* *θ* ( *c* ) is pretty high (set the number of iterations *T* higher) the resulting query-independent confounder works well. That is, we at least get that *S* *θ* ( *c* *∥* *x* ) *> S* *θ* ( *x* ) .\n\n**The black-box setting: confounders that transfer.** Finally, the attacks so far are in the white-box setting, where the attacker can optimize directly against *S* *θ* . While in some cases routing control planes will be public knowledge, in others, including the proprietary control planes we explore in Section 7, they are hidden. This gives rise to the black-box setting. While an attacker might seek to perform model extraction attacks [43, 65] to learn *θ* , we instead explore attacks that transfer from one router to another.\n\nIn more detail, we assume the adversary has access to a router *R* *<sup>′</sup>* *ω* *<sup>′</sup>* <sup>, called the</sup> *<sup>surrogate</sup>* <sup>, that is trained on data similar to</sup> that used for the target router. Then the attack is the same as above, except that we use the surrogate’s scoring function *S* *<sup>′</sup>* *θ* *<sup>′</sup>* <sup>instead of the target’s</sup> *<sup>S</sup>* *<sup>θ</sup>* <sup>. Again, we will see that this works surprisingly well: the query-independent confounders</sup> found for the surrogate transfer to successfully reroute queries against the target router.\n\n**Putting it all together.** In summary, our methodology for input adaptation attacks is:\n\n(1) (Preprocessing) Develop a single query-independent confounder gadget *c* , using either the target router or surrogate to score the confounder.", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv1.pdf" - }, - { - "text": "and view content on demand. They can search content and control their\n\nPVR remotely from their smartphone. They can stream programming to\n\ntheir tablet anywhere in their home. A single Rogers Nextbox serves as\n\na master PVR for the entire home enabling simultaneous viewing and\n\nrecording of up to eight separate shows and storage of over 250 hours\n\nof high-definition programming. And customers can access television\n\nand movie content on-demand from anywhere by laptop, tablet or\n\nsmartphone using the Rogers Anyplace TV app.\n\nTelevision has never been this good, this easy, or this simple to control.\n\nAnd it’s even better when combined with innovative Rogers features,\n\nsuch as the ability to screen phone calls on their TV, listen to voicemail\n\non their tablet, or receive talking text messages on their home phone.\n\nWireless customers can also use Rogers One Number to switch calls\n\namong their computer, home phone and wireless device without\n\ninterruption; manage e-mails; text messages and voicemail; hold live\n\nvideo chats; and combine and sync contacts from across multiple devices.\n\nWhen they’re not at home, more and more customers also rely on\n\nRogers Smart Home Monitoring, a complete monitoring, automation\n\nand security solution that includes the most innovative technology and\n\nfeatures available. Smart Home Monitoring lets customers monitor,\n\ncontrol and receive alerts by smartphone or online, staying connected\n\nto their home from almost anywhere, and enjoying the peace of mind\n\nthat comes with having the most reliable monitoring solution available.\n\nSmart Home Monitoring also gives customers the ability to automate\n\nlights, appliances, thermostats and more, so they know their homes are\n\nnot only secure but more energy-efficient and convenient, also.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 09", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**B** . **Bind to the APP**\n\n**1. APP download method**\n\n1.1 Scan the QR code to download\n\n1.2 Search the application at App market and download\n\nFor Android users:\n\nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download,\n\nremember to check the pop-up box on your phone when installing, and agree to the permission.\n\nFor iOS users:\n\nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your\n\nphone when installing, and agree to the permission.\n\nAfter WearPro is installed, the app icon appears as .\n\n2.Bind Bluetooth\n\n2.1 Unconnected to the APP state:\n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the\n\nAPK/APP, go to Devices > Add Device > click to start searching, select and click the\n\ncorresponding watch device name, and the watch will be successfully bound to the app.\n\n2.2 Connected to the APP state:\n\nWatch time synchronization: the time shown at the smartwatch and your mobile phone will\n\nsynchronized after the smartwatch is bound to the APP successfully.\n\n2.3 Binding the audio/calling Bluetooth\n\nWhen the smartwatch is in the dial interface, you can find the audio/calling Bluetooth icon, and\n\nclick it to turn it on, then go to the Bluetooth settings of your mobile phone and click the name of\n\nthe audio/calling Bluetooth of the smartwatch to bind it.\n\n**3. Find Watch**\n\nAfter the smartwatch is bound to the APP, you click “Find Watch” in the APP, the smartwatch\n\nwill light up and vibrate for once.\n\n**4. Camera**", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "**4. When the user needs the device repaired, please take the device to**\n\n**our company or our company's dealership.**\n\n**5. All functions of the device please refer to the actual product.**\n\n**Purchase date:**\n\n**IMEI code:**\n\n**Where to buy:**\n\n**Customer Signature:**\n\n**Signature of Store Clerk:**\n\n**Stamp of Store:**\n\n**FCC Caution:**\n\nThis device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:\n\n(1) This device may not cause harmful interference, and (2) this device must accept any interference received,\n\nincluding interference that may cause undesired operation.\n\nAny changes or modifications not expressly approved by the party responsible for compliance could void\n\nthe user's authority to operate the equipment.\n\nNOTE: This equipment has been tested and found to comply with the limits for a Class B digital device,\n\npursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against\n\nharmful interference in a residential installation. This equipment generates, uses and can radiate radio\n\nfrequency energy and, if not installed and used in accordance with the instructions, may cause harmful\n\ninterference to radio communications. However, there is no guarantee that interference will not occur in a\n\nparticular installation.\n\nIf this equipment does cause harmful interference to radio or television reception,\n\nwhich can be determined by turning the equipment off and on, the user is encouraged to try to correct the\n\ninterference by one or more of the following measures:\n\n-- Reorient or relocate the receiving antenna.\n\n-- Increase the separation between the equipment and receiver.\n\n-- Connect the equipment into an outlet on a circuit different\n\nfrom that to which the receiver is connected.\n\n-- Consult the dealer or an experienced radio/TV technician for help.\n\nThe device has been evaluated to meet general RF exposure requirement. The device can be used in\n\nportable exposure condition without restriction.\n\n**FCC ID:2A54U-DT3MATE**", - "page_start": 9, - "page_end": 9, - "source_file": "6126797.pdf" - }, - { - "text": "To evaluate the effectiveness of such a defense against our attack, we compare the perplexity values of original and confounded queries. Figure 5 presents histograms of perplexity values for both the original evaluated GSM8K queries and their corresponding confounded versions, generated using one of the confounder gadgets, sampled uniformly at random. Additionally, the figure displays the ROC curve for the defense that detects confounded queries by checking if their perplexity exceeds a threshold. As can be seen, the confounded queries exhibit significantly higher perplexity values, making them readily distinguishable from the original queries. For instance, in the case of the *R* *SW* router, setting the threshold value at 55 yields a false-positive rate of 3% and a true-positive rate of 97% . Results are similar for other gadgets and benchmarks and were omitted due to space constraints.\n\nUnfortunately, this defense can be evaded if an adversary incorporates a perplexity constraint into the gadget generation process. To demonstrate the feasibility of this evasion strategy, we modify gadget generation to maximize the score of the routing algorithm *R* and simultaneously aligning the the gadget’s perplexity to some predefined perplexity value. In more detail, in each iteration *t* *∈* [ *T* ] , we uniformly sample a target index *j* *∈* [1 *, n* ] and generate a set *B* of *B* + 1 candidates as explained in Section 4. We then modify Eq. 1 such that we now find the candidate that maximizes the difference between the router’s score and the perplexity constraint for the confounder:\n\n*c* <sup>(</sup> *<sup>t</sup>* <sup>+1)</sup> *←* arg max *c* *∈B* � *S* *θ* ( *c* *∥* *x* *i* ) *−* *α* *· |* PPL ( *c* ) *−* *ρ* *|* � *,*\n\n14", - "page_start": 13, - "page_end": 13, - "source_file": "arxiv1.pdf" - }, - { - "text": "As can be seen, the gadgets reroute almost all weak queries to the strong model. In most cases we see 100% success, or close to it. The worst case still achieves 88% rerouting success, boosting the fraction of queries sent to the strong LLM by 1.5x. Rerouting fails only for some queries that even after confounding are sent to the weak model: the fixed gadget did not sufficiently increase the router’s estimate of those queries’ complexity. This is the only source of error for the attack: *no* queries in these experiments got “downgraded”, i.e., a query that would otherwise be sent to *M* s ends up rerouted to *M* w . This also means that adding the confounder to every single query does not have negative impact on rerouting efficacy. We report standard error values for both the upgrade rates and the total percentage of queries routed to the strong model. The maximal standard error is in the low single digits, indicating similar success rates across gadgets.\n\n**Quality of attack responses.** We now turn to evaluating the quality of the responses generated by the attack. Note that because we have calibrated the routers to target *ϵ* = 0 *.* 5 , our attacks can improve response quality by rerouting to the stronger model. In the other direction, our attacks add confounder gadgets which might degrade response quality.\n\n9", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv1.pdf" - }, - { - "text": "[71] L. Zheng, W.-L. Chiang, Y. Sheng, S. Zhuang, Z. Wu, Y. Zhuang, Z. Lin, Z. Li, D. Li, E. Xing *et al.* , “Judging LLM- as-a-judge with MT-Bench and chatbot arena,” *Advances in Neural Information Processing Systems (NeurIPS)* , 2023.\n\n[72] S. Zhu, R. Zhang, B. An, G. Wu, J. Barrow, Z. Wang, F. Huang, A. Nenkova, and T. Sun, “AutoDAN: Automatic and interpretable adversarial attacks on large language models,” *arXiv preprint arXiv:2310.15140* , 2023.\n\n[73] A. Zou, Z. Wang, J. Z. Kolter, and M. Fredrikson, “Universal and transferable adversarial attacks on aligned language models,” *arXiv preprint arXiv:2307.15043* , 2023.\n\n## **A Gadget Examples**\n\nBelow are a few examples of the optimized confounder gadgets *c* we got, for the different routing algorithms:\n\n- *R* *SW* :\n\nlegationbelongs967reglo’hui (DictionaryizedNameantal bidi.numberOf\n\ndemanding RESULTS! XVI-ioibili Written Hormchriftlatable\n\n- *R* *MF* :\n\n041 personne.nama tomeTN Exact relac¸˜ao tinha seis.Description\n\nNUMAGEMENTMedian157 mut-camerauacao nije Hir Ter\n\n- *R* *CLS* :\n\ncontiene DEM USERNAME fourteen chees781 consultants200 inici DOJ\n\n571: Ord:nth Norwegian Mercer docs Abr226 METADATA\n\n- *R* *LLM* :\n\ndated:frameifyumi345 Kurdasciiuzeiphertext\n\nMidnightexecution431!784 below1 unwrap : / n / n\n\n## **B Ablation Study**\n\nIn this section, we evaluate the effect of different hyperparameters and design choices (in the white-box setting).\n\n**Prefix vs. suffix.** As described in Section 4, we prepend the confounder gadget to the query. An alternative is to append it. This is straightforward for MT-bench and GSM8K, but MMLU consists of multi-choice questions followed by a list of possible answers, and the term “Answer:”. We insert the gadget at the end of the question text and before the possible answers. If we append it at the very end, after “Answer:”, the LLM assumes the query was answered and in many cases does not generate any output at all.\n\nTable 12 shows that average upgrade rates are similar regardless of whether the gadget was inserted as a prefix or a suffix. For MMLU, prefix works better. The downgrade rate is 0% in all cases.\n\n22", - "page_start": 21, - "page_end": 21, - "source_file": "arxiv1.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2670.pdf", - "query": "What is called bad-cavity Ramsey laser ?", - "target_page": 1, - "target_passage": "We considerthe case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. ", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "[arXiv:1001.2670v1 [quant-ph] 15 Jan 2010](http://arxiv.org/abs/1001.2670v1)\n\n.\n\n## **The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen, <sup>∗</sup> and Hong Guo <sup>†</sup> *CREAM Group, State Key Laboratory of Advanced Optical Communication*\n\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n\n*School of Electronics Engineering and Computer Science,*\n\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China* (Dated: October 29, 2018)\n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying the linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth is more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that of conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. Since any cavity related noise is reduced to cavity-pulling e ff ect in bad cavity laser, this Ramsey laser provides the possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical clock and atom interferometers.\n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r\n\n*Introduction:* Since the invention of the separated-field technique [1], it has played an important role in the field of precision spectroscopy due to its linewidth narrowing e ff ect via multiple coherent interaction. Atomic clocks based on this technique have greatly extended our ability for frequency measurement, further, almost all the atom interferometers are based on this technique [2].\n\nThough, the natural linewidth of quantum transition was regarded as the ultimate limit to high-resolution laser spec- troscopy [4], several methods of subnatural linewidth spec- troscopy have been proposed to gain subnatural linewidth [3- 10]. However, in all these e ff orts, including optical Ramsey spectroscopy, subnatural line is realized at the expense of a quick reduction in signal-to-noise (SNR) ratio due to the ex- ponential decaying of signal, thus all these schemes can only get the linewidth several times narrower than the atomic nat- ural linewidth. In the past three decades, this situation does not change in the field of the precision laser spectroscopy. On the other hand, the thermal noise of the cavity mirrors is the main obstacle for further linewidth reduction of a laser [11, 12], and it is a challenge to substantially reduce this noise further[13]. Recently, a new scheme, called active optical clock [14- 18], was proposed to substantially reduce the laser linewidth. With lattice trapped atoms, it is possible to reach mHz linewidth laser based on the mechanism of active optical clock [14, 15, 19]. The principal mechanism of active optical clock is to directly extract light emitted from the ultranarrow atomic transition with a cavity mode linewidth much wider than that of lasing. This bad cavity ensures that any frequency shift due to cavity noise reduces to cavity-pulling e ff ect [15- 17], then the thermal noise is not the major obstacle again for reducing the linewidth. This means the bad cavity can play an indispensable role in new subnatural linewidth spectroscopy.\n\nIn this Letter, we propose a new scheme called Ramsey laser with bad cavity. Distinct from any previous applications of conventional Ramsey separated oscillating fields method [1], which focuses on the absorption spectrum, we here fo-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "*Conclusion:* In summary, we propose a new subnatural linewidth spectroscopy technique, which is a laser by us- ing Ramsey seperated-field cavity to realize the output of stimulated-emission radiation via multiple coherent interac- tion with atomic beam. We find the linewidth of Ramsey laser is subnatural if we choose an appropriate atomic level, and the bad-cavity laser mechanism will dramatically reduce cavity- related noise as discussed in active optical clock [15- 19]. Our results show that this new subnatural linewidth spectroscopy is superior to conventional optical Ramsey seperated-field spectroscopy and any other available subnatural spectroscopy technique at present [3- 10]. Considering one have to ap- ply the separated-field method in any phase detection as in Ramsey-Bord *e* ´interferometer [2], to investigate the e ff ects of phase di ff erences between the two oscillating fields [31] in this stimulated separated-field method with such subnatural linewidth will be our next research aim. We acknowledge Yiqiu Wang and Deshui Yu for fruitful discussions. This work is supported by MOST of China (grant 2005CB724500, National Natural Science Foundation of China (grant 60837004, 10874009), National Hi-Tech Re- search and Development (863) Program.\n\n∗ E-mail: jbchen@pku.edu.cn † E-mail: hongguo@pku.edu.cn. [1] N. F. Ramsey, Phys. Rev. **76** , 996 (1949). [2] B. Dubetsky and P. R. Berman, In *Atom Interferometry* , edited by P. R. Berman (Academic Press, Cambridge, MA, 1997). [3] M. M. Salour, Rev. Mod. Phys. **50** , 667 (1978). [4] J. Wong and J. C. Garrison, Phys. Rev. Lett. **44** , 1254 (1980). [5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. **13** 4345 (1980). [6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A **24** , 1914 (1981). [7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A **28** , 2248 (1983). [8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.\n\nLett. **48** , 871 (1982). [9] H. J. Carmichael, R. J. Brecha, M. G. Raizen, H. J. Kimble, and P. R. Rice, Phys. Rev. A **40** , 5516 (1989). [10] U. W. Rathe, M. O. Scully, Letters in Mathematical Physics **34** , 297 (1995) [11] K. Numata, A. Kemery, J. Camp, Phys Rev Lett, **93** , 250602 (2004). [12] A. D. Ludlow *et al.* , Opt. Lett. **32** , 641 (2007). [13] H. J. Kimble, B. L. Lev, and J. Ye, Phys. Rev. Lett. **101** , 260602 (2008). [14] J. Chen, and X.Chen, In *Proceedings of the 2005 IEEE Inter-* *national Frequency Control Symposium and Exposition* , (IEEE, 2005), p.608. [15] J. Chen, e-print arXiv:0512096 quant-ph; Chinese Science Bul- letin **54** , 348 (2009). [16] D. Yu and J. Chen, Phys. Rev. A **78** , 013846 (2008). [17] J. Chen, In *Frequency Standards and Metrology: Proceedings* *of the 7th Symposium* , edited by Maleki Lute (World Scientific Publishing Company, 2009). [18] Y. Wang, Chinese Science Bulletin **54** , 347 (2009).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "cus on the stimulated emission spectrum via multiple coher- ent interactions inside the cavity. We find this Ramsey laser can provide a stimulated-emission spectrum with a linewidth much narrower than that of any conventional optical Ramsey seperated-field spectroscopy, which is commonly applied in optical atomic clock. Our results also show that a subnatural linewidth spectroscopy, superior to any other available subnat- ural spectroscopy technique at present [3- 10], can be reached by this kind of laser, if a suitable atomic level structure is cho- sen. Thus, this method can provide an e ff ective subnatural spectroscopy, and the possibilities for the new optical clock scheme [15] and atom interferometers [2].\n\n*Theoretical framework:* We consider the case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. All atoms are pumped onto the upper lasing state **a** before entering the first cavity of seperated field, and the lower lasing state is **b** . We assume all the atoms have the same velocities υ , that means what we consider here is a homogeneous laser system. And for the sake of simplicity, we consider the two-standing waves linear optical Ramsey configuration with a grid as spatial selector [20, 21]. Our treatment can be extended to other configura- tions as in [22- 24]. The length of each oscillating part is *l* , and the length of the free drift region is *L* . The corresponding Hamiltonian is\n\n*H* = ℏ ω ˆ *a* <sup>†</sup> ˆ *a* + ℏ � *j*\n\n[ ω *<sup>j</sup>* *a* <sup>(</sup> *<sup>t</sup>* <sup>)</sup> <sup>σ</sup> *<sup>j</sup>* *a* <sup>+</sup> <sup>ω</sup> *<sup>j</sup>* *b* <sup>(</sup> *<sup>t</sup>* <sup>)</sup> <sup>σ</sup> *<sup>j</sup>* *b* <sup>]</sup>\n\n+ ℏ *g* � *j*\n\nΓ *j* ( *t* )(ˆ *a* <sup>†</sup> ˆ σ *<sup>j</sup>* − *<sup>e</sup>* <sup>−</sup> *<sup>i</sup>* <sup>⃗</sup> *<sup>k</sup>* <sup>·</sup> <sup>⃗</sup> *<sup>r</sup>* *<sup>j</sup>* <sup>+</sup> <sup>ˆ</sup> <sup>σ</sup> *<sup>j</sup>* + <sup>ˆ</sup> *<sup>ae</sup>* *<sup>i</sup>* <sup>⃗</sup> *<sup>k</sup>* <sup>·</sup> <sup>⃗</sup> *<sup>r</sup>* *<sup>j</sup>* <sup>)</sup> <sup>,</sup> (1)\n\nwhere ˆ *a* , ˆ *a* <sup>†</sup> are the annihilation and creation operators of the field mode inside the cavity, with the frequency ω , σ *<sup>j</sup>* *a* <sup>=</sup> ( | *a* ⟩⟨ *a* | ) *<sup>j</sup>* and σ *<sup>j</sup>* *b* <sup>=</sup> <sup>(</sup> <sup>|</sup> *<sup>b</sup>* <sup>⟩⟨</sup> *<sup>b</sup>* <sup>|</sup> <sup>)</sup> *<sup>j</sup>* <sup>are the projection operators for the</sup> jth atom corresponding to the upper and lower lasing levels,", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. Lett. **102** , 163601 (2009) [20] F. Strumia, Metrologia **8** , 85 (1972). [21] G. Kramer, J. Opt. Soc. Am. **68** , 1634 (1978). [22] V. S. Letokhov and B. D. Pavlik, Opt. Spectrosc. USSR **32** , 455 (1972). [23] Ye. V. Baklanov, B. Ya, Dubetsky, V. P. Chebotayev, Appl. Phys. **9** , 171 (1976). [24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett. **38** , 159 (1977). [25] L. Davidovich, Rev. Mod. Phys. **68** , 127 (1996). [26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, Phys. Rev. A **47** , 1431 (1993). [27] M. Sargent III, M. O. Scully, and W. E. Lamb, *Laser Physics* (Addition Wesley, Reading, MA, 1974). [28] N. A. Abraham, P. Mandel, and L. M. Narducci, *Dynamic In-* *stabilities and Pulsations in Lasers* , Progress in Optics XXV, edited by E. Wolf (Elsevier, Amsterdam, 1988). [29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, J. Phys. B **13** , 2231 (1980). [30] K. An and M. S. Feld, Phys. Rev. A **56** , 1662(1997). [31] N. F. Ramsey and H. B. Silsbee, Phys. Rev. **84** , 506(1951).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "[65] J. P. Burelbach, S. G. Bankoff, and S. H. Davis, “Nonlinear stability of evaporating/condensing liquid\n\nfilms,” J. Fluid Mech. **195** , 463- 494 (1988).\n\n[66] A. Oron and S. G. Bankoff, “Dewetting of a heated surface by an evaporating liquid film under\n\nconjoining/disjoining pressures,” J. Colloid Interface Sci. **218** , 152- 166 (1999).\n\n[67] L. W. Schwartz, R. V. Roy, R. R. Eley, and S. Petrash, “Dewetting patterns in a drying liquid film,”\n\nJ. Colloid Interface Sci. **214** , 363- 374 (2001).\n\n[68] K. Kargupta, R. Konnur, and A. Sharma, “Spontaneous dewetting and ordered patterns in evaporating\n\nthin liquid films on homogeneous and heterogeneous substrates,” Langmuir **17** , 1294- 1305 (2001).\n\n[69] M. Bestehorn and D. Merkt, “Regular surface patterns on Rayleigh-Taylor unstable evaporating films\n\nheated from below,” Phys. Rev. Lett. **97** , 127802 (2006).\n\n[70] G. F. Teletzke, H. T. Davis, and L. E. Scriven, “Wetting hydrodynamics,” Rev. Phys. Appl. **23** , 989-\n\n1007 (1988).\n\n[71] J. N. Israelachvili, *Intermolecular and Surface Forces* , Academic Press, London (1992).\n\n[72] V. S. Mitlin, “Dewetting of solid surface: Analogy with spinodal decomposition,” J. Colloid Interface\n\nSci. **156** , 491- 497 (1993).\n\n[73] L. M. Pismen and Y. Pomeau, “Disjoining potential and spreading of thin liquid layers in the diffuse\n\ninterface model coupled to hydrodynamics,” Phys. Rev. E **62** , 2480- 2492 (2000).\n\n[74] L. Onsager, “Crystal statistics. I. A two-dimensional model with an order-disorder transition,” Phys.\n\nRev. **65** , 117- 149 (1944).\n\n[75] G. Reiter, “Unstable thin polymer films: Rupture and dewetting processes,” Langmuir **9** , 1344- 1351\n\n(1993).\n\n[76] C. G. Sztrum, O. Hod, and E. Rabani, “Self-assembly of nanoparticles in three-dimensions: Forma-\n\ntion of stalagmites,” J. Phys. Chem. B **109** , 6741- 6747 (2005).\n\n[77] G. Yosef and E. Rabani, “Self-assembly of nanoparticles into rings: A lattice-gas model,” J. Phys.\n\nChem. B **110** , 20965- 20972 (2006).\n\n[78] J. F. Gouyet, M. Plapp, W. Dieterich, and P. Maass, “Description of far-from-equilibrium processes\n\nby mean-field lattice gas models,” Adv. Phys. **52** , 523- 638 (2003).\n\n[79] U. M. B. Marconi and P. Tarazona, “Dynamic density functional theory of fluids,” J. Chem. Phys.\n\n**110** , 8032- 8044 (1999).\n\n[80] U. M. B. Marconi and P. Tarazona, “Dynamic density functional theory of fluids,” J. Phys.-Condes.\n\nMatter **12** , A413- A418 (2000).\n\n30", - "page_start": 29, - "page_end": 29, - "source_file": "1001.2669.pdf" - }, - { - "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. **68** ,\n\n1084- 1088 (1989).\n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real\n\nand reciprocal space,” J. Phys.-Condes. Matter **15** , R1549- R1582 (2003).\n\n[7] R. Seemann, S. Herminghaus, C. Neto, S. Schlagowski, D. Podzimek, R. Konrad, H. Mantz, and\n\nK. Jacobs, “Dynamics and structure formation in thin polymer melt films,” J. Phys.-Condes. Matter\n\n**17** , S267- S290 (2005).\n\n[8] U. Thiele, “Structure formation in thin liquid films,” in S. Kalliadasis and U. Thiele, editors, “Thin\n\nfilms of Soft Matter,” pages 25- 93, Springer, Wien (2007).\n\n[9] R. Xie, A. Karim, J. F. Douglas, C. C. Han, and R. A. Weiss, “Spinodal dewetting of thin polymer\n\nfilms,” Phys. Rev. Lett. **81** , 1251- 1254 (1998).\n\n[10] R. Seemann, S. Herminghaus, and K. Jacobs, “Dewetting patterns and molecular forces: A reconcil-\n\niation,” Phys. Rev. Lett. **86** , 5534- 5537 (2001).\n\n[11] U. Thiele, M. G. Velarde, and K. Neuffer, “Dewetting: Film rupture by nucleation in the spinodal\n\nregime,” Phys. Rev. Lett. **87** , 016104 (2001).\n\n[12] M. Bestehorn and K. Neuffer, “Surface patterns of laterally extended thin liquid films in three di-\n\nmensions,” Phys. Rev. Lett. **87** , 046101 (2001).\n\n[13] J. Becker, G. Gr¨un, R. Seemann, H. Mantz, K. Jacobs, K. R. Mecke, and R. Blossey, “Complex\n\ndewetting scenarios captured by thin-film models,” Nat. Mater. **2** , 59- 63 (2003).\n\n[14] C. Redon, F. Brochard-Wyart, and F. Rondelez, “Dynamics of dewetting,” Phys. Rev. Lett. **66** , 715-\n\n718 (1991).\n\n[15] R. Seemann, S. Herminghaus, and K. Jacobs, “Shape of a liquid front upon dewetting,” Phys. Rev.\n\nLett. **87** , 196101 (2001).\n\n[16] R. Fetzer, K. Jacobs, A. M¨unch, B. Wagner, and T. P. Witelski, “New slip regimes and the shape of\n\ndewetting thin liquid films,” Phys. Rev. Lett. **95** , 127801 (2005).\n\n[17] F. Brochard-Wyart and C. Redon, “Dynamics of liquid rim instabilities,” Langmuir **8** , 2324- 2329\n\n(1992).\n\n[18] G. Reiter and A. Sharma, “Auto-optimization of dewetting rates by rim instabilities in slipping poly-\n\nmer films,” Phys. Rev. Lett. **87** , 166103 (2001).\n\n[19] A. M¨unch and B. Wagner, “Contact-line instability of dewetting thin films,” Physica D **209** , 178- 190\n\n(2005).\n\n26", - "page_start": 25, - "page_end": 25, - "source_file": "1001.2669.pdf" - }, - { - "text": "blazars are observed on the rising part of the syn-\n\nchrotron component (at lower energies than the peak),\n\nall of the objects have very steeply falling *γ* -ray energy\n\nspectral indexes, putting the *γ* -ray peak at lower en-\n\nergies than the observed *Fermi* band. Knowing that\n\nwe are not observing the synchrotron and *γ* -ray com-\n\nponents at analagous points in the spectrum may al-\n\nlow us to better understand the magnetic field in the\n\nparsec-scale jet region and the population of external\n\nphotons that is being upscattered to *γ* -rays.\n\nIn Figure 5, the ratio between *L* *γ* and *νL* *ν,* 1mm re-\n\nflects the division between BL Lacs and FSRQs as well\n\n**eConf C091122**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0806.pdf" - }, - { - "text": "[arXiv:1001.0770v1 [astro-ph.HE] 5 Jan 2010](http://arxiv.org/abs/1001.0770v1)\n\n## **VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration *Harvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645,* *USA*\n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is\n\nused to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is\n\ncurrently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration’s Key\n\nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class\n\nof identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which\n\nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE\n\nexposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including\n\n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected\n\nresults are presented.\n\n## **1. Introduction**\n\nActive galactic nuclei are the most numerous class\n\nof identified VHE γ -ray sources. These objects emit\n\nnon-thermal radiation across ∼ 20 orders of magnitude\n\nin energy and rank among the most powerful particle\n\naccelerators in the universe. A small fraction of AGN\n\npossess strong collimated outflows (jets) powered by\n\naccretion onto a supermassive black hole (SMBH).\n\nVHE γ -ray emission can be generated in these jets,\n\nlikely in a compact region very near the SMBH event\n\nhorizon. Blazars, a class of AGN with jets pointed\n\nalong the line-of-sight to the observer, are of par-\n\nticular interest in the VHE regime. Approximately\n\n30 blazars, primarily high-frequency-peaked BL Lacs\n\n(HBL), are identified as sources of VHE γ -rays, and\n\nsome are spectacularly variable on time scales com-\n\nparable to the light crossing time of their SMBH ( ∼ 2\n\nmin; [1]). VHE blazar studies probe the environment\n\nvery near the central SMBH and address a wide range\n\nof physical phenomena, including the accretion and\n\njet-formation processes. These studies also have cos-\n\nmological implications, as VHE blazar data can be\n\nused to strongly constrain primordial radiation fields\n\n(see the extragalactic background light (EBL) con-\n\nstraints from, e.g., [2, 3]).\n\nVHE blazars have double-humped spectral energy\n\ndistributions (SEDs), with one peak at UV/X-ray en-\n\nergies and another at GeV/TeV energies. The ori-\n\ngin of the lower-energy peak is commonly explained\n\nas synchrotron emission from the relativistic electrons\n\nin the blazar jets. The origin of the higher-energy\n\npeak is controversial, but is widely believed to be the\n\nresult of inverse-Compton scattering of seed photons\n\noff the same relativistic electrons. The origin of the\n\nseed photons in these leptonic scenarios could be the\n\nsynchrotron photons themselves, or photons from an\n\nexternal source. Hadronic scenarios are also plausible\n\nexplanations for the VHE emission, but generally are\n\nnot favored.\n\nContemporaneous multi-wavelength (MWL) obser-\n\nvations of VHE blazars, can measure both SED peaks\n\nand are crucial for extracting information from the\n\nobservations of VHE blazars. They are used to con-\n\nstrain the size, magnetic field and Doppler factor of\n\nthe emission region, as well as to determine the origin\n\n(leptonic or hadronic) of the VHE γ -rays. In leptonic\n\nscenarios, such MWL observations are used to mea-\n\nsure the spectrum of high-energy electrons producing\n\nthe emission, as well as to elucidate the nature of the\n\nseed photons. Additionally, an accurate measure of\n\nthe cosmological EBL density requires accurate mod-\n\neling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "[24] M. Strange, I. S. Kristensen, K. S. Thygesen, and K. W. Ja-\n\ncobsen, “Benchmark density functional theory calculations for\n\nnanoscale conductance”, J. Chem. Phys. **128** (11), 114714 (Mar. 2008), doi: [10.1063/1.2839275](http://dx.doi.org/10.1063/1.2839275) .\n\n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or-\n\ndej´on, and D. S´anchez-Portal, “The SIESTA method for *ab ini-*\n\n*tio* order- *n* materials simulation”, J. Phys.: Condens. Matter\n\n**14** (11), 2745 (Mar. 2002), doi: [10.1088/0953-8984/14/11/302](http://dx.doi.org/10.1088/0953-8984/14/11/302) . [26] J. S. Griffith, *The Theory of Transition-Metal Ions* (Cambridge\n\nUniversity Press, London, 1961).\n\n[27] P. Atkins and J. de Paula, *Physical Chemistry* , 8th ed. (Oxford\n\nUniversity Press, London, 2006).\n\n[28] D. Lide, *Handbook of Chemistry and Physics* , 87th ed. (CRC-\n\nPress, 2006- 2007).\n\n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal-\n\ning theory put into practice: First-principles modeling of trans-\n\nport in doped silicon wires”, Phys. Rev. Lett. **99** (7), 076803 (Aug. 2007), doi: [10.1103/PhysRevLett.99.076803](http://dx.doi.org/10.1103/PhysRevLett.99.076803) .\n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari,\n\nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine\n\nstructure (XAFS) analyses of Ni species trapped in graphene\n\nsheet of carbon nanofibers”, Phys. Rev. B **73** (14), 144103 (Apr. 2006), doi: [10.1103/PhysRevB.73.144103](http://dx.doi.org/10.1103/PhysRevB.73.144103) .\n\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel,\n\nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con-\n\nductance of single-walled carbon nanotubes by ion irradiation\n\nin the Anderson localization regime”, Nature Materials **4** , 534 (Jun. 2005), doi: [10.1038/nmat1414](http://dx.doi.org/10.1038/nmat1414) .", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" - }, - { - "text": "Chapter 11. Exits\n\n/* OUTPUT: */\n\n/* */\n\n/* 1) OnDemand will invoke the exit with action == 1 */\n\n/* so that the exit can create the table space (tblsp_name) */\n\n/* using (sql) */\n\n/* *created -> 0 exit did not create the table space, */\n\n/* OnDemand needs to create the table space */\n\n/* using (sql), which can be left unchanged */\n\n/* or modified by the exit */\n\n/* *created -> 1 exit created the table space */\n\n/* */\n\n/* 2) OnDemand will then invoke the exit with action == 2 */\n\n/* so that the exit can create the table (table_name) */\n\n/* inside of the table space (tblsp_name) using (sql) */\n\n/* *created -> 0 exit did not create the table, */\n\n/* OnDemand needs to create the table */\n\n/* using (sql), which can be left unchanged */\n\n/* or modified by the exit */\n\n/* *created -> 1 exit created the table */\n\n/* */\n\n/* 3) OnDemand will then invoke the exit with action == 3 */\n\n/* so that the exit can create the table indexes (idx_name) */\n\n/* inside of the table space (tblsp_name) for table */\n\n/* (table_name) using (sql). This will be invoked based */\n\n/* on the number of indexes to create for the appl_grp */\n\n/* *created -> 0 exit did not create the index, */\n\n/* OnDemand needs to create the index */\n\n/* using (sql), which can be left unchanged */\n\n/* or modified by the exit */\n\n/* *created -> 1 exit created the index */\n\n/* */\n\n/* 4) OnDemand will then invoke the exit with action == 4 */\n\n/* so that the exit can perform any additional work */\n\n/* *created -> Is not used */\n\n/* sql -> If sql is not an empty string, OnDemand */\n\n/* will issue (sql) to the database */\n\n/* */\n\n/* If ARS_DB_TABLESPACE_USEREXIT_EXTRA=1 is defined in */\n\n/* ars.cfg, then the following actions will also be invoked */\n\n/* when OnDemand needs to do further actions: */\n\n/* */\n\n/* 5) OnDemand will invoke the exit with action == 5 */\n\n/* so that the exit can drop the table space (tblsp_name) */\n\n/* using (sql) */\n\n/* *created -> 0 exit did not drop the table space, */\n\n/* OnDemand needs to drop the table space */\n\n/* using (sql), which can be left unchanged */\n\n/* or modified by the exit */\n\n/* *created -> 1 exit dropped the table space */\n\n/* */\n\n/* 6) OnDemand will invoke the exit with action == 6 */\n\n/* so that the exit can drop the table (table_name) */\n\n/* using (sql) when OnDemand needs to drop a table */", - "page_start": 296, - "page_end": 296, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2670.pdf", - "query": "How the steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained ?", - "target_page": 2, - "target_passage": "The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the c-number Langevin equations and setting the time derivatives equal to zero.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "*Conclusion:* In summary, we propose a new subnatural linewidth spectroscopy technique, which is a laser by us- ing Ramsey seperated-field cavity to realize the output of stimulated-emission radiation via multiple coherent interac- tion with atomic beam. We find the linewidth of Ramsey laser is subnatural if we choose an appropriate atomic level, and the bad-cavity laser mechanism will dramatically reduce cavity- related noise as discussed in active optical clock [15- 19]. Our results show that this new subnatural linewidth spectroscopy is superior to conventional optical Ramsey seperated-field spectroscopy and any other available subnatural spectroscopy technique at present [3- 10]. Considering one have to ap- ply the separated-field method in any phase detection as in Ramsey-Bord *e* ´interferometer [2], to investigate the e ff ects of phase di ff erences between the two oscillating fields [31] in this stimulated separated-field method with such subnatural linewidth will be our next research aim. We acknowledge Yiqiu Wang and Deshui Yu for fruitful discussions. This work is supported by MOST of China (grant 2005CB724500, National Natural Science Foundation of China (grant 60837004, 10874009), National Hi-Tech Re- search and Development (863) Program.\n\n∗ E-mail: jbchen@pku.edu.cn † E-mail: hongguo@pku.edu.cn. [1] N. F. Ramsey, Phys. Rev. **76** , 996 (1949). [2] B. Dubetsky and P. R. Berman, In *Atom Interferometry* , edited by P. R. Berman (Academic Press, Cambridge, MA, 1997). [3] M. M. Salour, Rev. Mod. Phys. **50** , 667 (1978). [4] J. Wong and J. C. Garrison, Phys. Rev. Lett. **44** , 1254 (1980). [5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. **13** 4345 (1980). [6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A **24** , 1914 (1981). [7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A **28** , 2248 (1983). [8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev.\n\nLett. **48** , 871 (1982). [9] H. J. Carmichael, R. J. Brecha, M. G. Raizen, H. J. Kimble, and P. R. Rice, Phys. Rev. A **40** , 5516 (1989). [10] U. W. Rathe, M. O. Scully, Letters in Mathematical Physics **34** , 297 (1995) [11] K. Numata, A. Kemery, J. Camp, Phys Rev Lett, **93** , 250602 (2004). [12] A. D. Ludlow *et al.* , Opt. Lett. **32** , 641 (2007). [13] H. J. Kimble, B. L. Lev, and J. Ye, Phys. Rev. Lett. **101** , 260602 (2008). [14] J. Chen, and X.Chen, In *Proceedings of the 2005 IEEE Inter-* *national Frequency Control Symposium and Exposition* , (IEEE, 2005), p.608. [15] J. Chen, e-print arXiv:0512096 quant-ph; Chinese Science Bul- letin **54** , 348 (2009). [16] D. Yu and J. Chen, Phys. Rev. A **78** , 013846 (2008). [17] J. Chen, In *Frequency Standards and Metrology: Proceedings* *of the 7th Symposium* , edited by Maleki Lute (World Scientific Publishing Company, 2009). [18] Y. Wang, Chinese Science Bulletin **54** , 347 (2009).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" - }, - { - "text": "[arXiv:1001.2670v1 [quant-ph] 15 Jan 2010](http://arxiv.org/abs/1001.2670v1)\n\n.\n\n## **The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen, <sup>∗</sup> and Hong Guo <sup>†</sup> *CREAM Group, State Key Laboratory of Advanced Optical Communication*\n\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n\n*School of Electronics Engineering and Computer Science,*\n\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China* (Dated: October 29, 2018)\n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying the linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth is more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that of conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. Since any cavity related noise is reduced to cavity-pulling e ff ect in bad cavity laser, this Ramsey laser provides the possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical clock and atom interferometers.\n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r\n\n*Introduction:* Since the invention of the separated-field technique [1], it has played an important role in the field of precision spectroscopy due to its linewidth narrowing e ff ect via multiple coherent interaction. Atomic clocks based on this technique have greatly extended our ability for frequency measurement, further, almost all the atom interferometers are based on this technique [2].\n\nThough, the natural linewidth of quantum transition was regarded as the ultimate limit to high-resolution laser spec- troscopy [4], several methods of subnatural linewidth spec- troscopy have been proposed to gain subnatural linewidth [3- 10]. However, in all these e ff orts, including optical Ramsey spectroscopy, subnatural line is realized at the expense of a quick reduction in signal-to-noise (SNR) ratio due to the ex- ponential decaying of signal, thus all these schemes can only get the linewidth several times narrower than the atomic nat- ural linewidth. In the past three decades, this situation does not change in the field of the precision laser spectroscopy. On the other hand, the thermal noise of the cavity mirrors is the main obstacle for further linewidth reduction of a laser [11, 12], and it is a challenge to substantially reduce this noise further[13]. Recently, a new scheme, called active optical clock [14- 18], was proposed to substantially reduce the laser linewidth. With lattice trapped atoms, it is possible to reach mHz linewidth laser based on the mechanism of active optical clock [14, 15, 19]. The principal mechanism of active optical clock is to directly extract light emitted from the ultranarrow atomic transition with a cavity mode linewidth much wider than that of lasing. This bad cavity ensures that any frequency shift due to cavity noise reduces to cavity-pulling e ff ect [15- 17], then the thermal noise is not the major obstacle again for reducing the linewidth. This means the bad cavity can play an indispensable role in new subnatural linewidth spectroscopy.\n\nIn this Letter, we propose a new scheme called Ramsey laser with bad cavity. Distinct from any previous applications of conventional Ramsey separated oscillating fields method [1], which focuses on the absorption spectrum, we here fo-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "f. On the toolbar, click the fourth icon from the right to place the report window back into\n\nadd mode.\n\n9. Define a field and an index:\n\na. Find a text string that can be used to identify the location of the field. The text string\n\nneeds to contain a sample index value. For example, if you want to extract account\n\nnumber values from the input file, find where the account number is printed on the\n\npage.\n\nb. By using the mouse, draw a box around the text string. Start just outside of the\n\nupper-left corner of the string. Click and then drag the mouse toward the lower-right\n\ncorner of the string. As you drag the mouse, the graphical indexer uses a dotted line to\n\ndraw a box. After you enclose the text string inside of a box, release the mouse. The\n\ngraphical indexer highlights the text string inside the box.\n\nc. Click the Define a Field icon on the toolbar.\n\nd. In the Add a Field window, complete the following steps:\n\ni. On the Field Information tab, verify the attributes of the Index field. For example, the\n\ntext string that you selected in the report window is displayed under Reference\n\nString and the trigger identifies the trigger on which the field is based. Click **Help** for\n\nassistance with the options and values that you can specify.\n\nii. On the Database Field Attributes tab, verify the attributes of the database field. In\n\nthe Database Field Name field, enter the name of the application group field into\n\nwhich you want Content Manager OnDemand to store the index value. In the Folder\n\nField Name field, enter the name of the folder field to display in the client search\n\nwindow. Click **Help** for assistance with the other options and values that you can\n\nspecify.\n\niii. Click **OK** to define the field and index.\n\ne. To verify the locations of the fields, complete the following steps:\n\ni. Place the report window into display mode. Blue boxes are drawn around the fields.\n\nii. Click the **Select** tool.\n\niii. In the Select window, under Fields, double-click **Field 1** . The graphical indexer\n\nhighlights the text string in the current document. Double-click **Field 1** again. The\n\ngraphical indexer moves to the next document and highlights the text string.\n\niv. Use the Select window to move forward to each document and display the field.\n\nThen, return to the first document in the input file.\n\nf. Place the report window back into add mode.\n\n10.Click **Create Indexer Parameters and Fields Report** to create the indexer parameter\n\nreport that the PDF Indexer uses to process the input files that you load into the\n\napplication. At a minimum, you must have one trigger, one field, and one index. For more\n\ninformation about the indexing parameters, see *IBM Content Manager OnDemand -*\n\n*Indexing Reference* , SC19-3354.\n\n11.After you define all of the triggers, fields, and indexes, press Esc to close the report\n\nwindow.\n\n**Important:** Use the same principles for collecting fields as collecting the trigger text\n\nstring in step 8b on page 170. If the fields that must be collected are close together,\n\noverlap them with adjacent fields to ensure that the box is as large as possible and\n\nto ensure that the data is collected at load time.", - "page_start": 195, - "page_end": 195, - "source_file": "sg246915.pdf" - }, - { - "text": "Θ is then described by a Dirichlet distribution parametrised by a set of concentration\n\nparameters *θ* :\n\n*p* ( Θ ) = *Dir* ( Θ *|* *θ* ) (19)\n\nThe concentration parameter of a Dirichlet distribution is essentially a non-negative count\n\nof how many times the given category (be it a type of observation or state transition) has\n\noccurred. The distribution of concentration parameter counts will determine the shape\n\nof the estimated categorical probability distribution, while the scale of the concentration\n\nparameters will determine the certainty per precision of the belief. Updating beliefs about\n\nΘ (the parameters in the matrices) then corresponds to updating these concentration\n\nparameters *θ* with the following update equation:\n\n*θ* *t* + 1 = *ω* *∗* *θ* *t* + *η* *∗* *χ* *t* (20)\n\nThe updated value for the concentration parameter ( *θ* *t* + 1 ) is found by adding the previous\n\nconcentration parameter *θ* *t* multiplied by a forgetting rate *ω* to the observed data count\n\n*χ* (either the observation in the case of **A** learning, or the inferred state or state transition\n\nfor other matrices) multiplied by a learning rate *η* . With this relatively simple update\n\nequation—which, in essence, amounts to just counting the occurrences of categories—an\n\nAIF agent can update its beliefs about the various matrices it uses to make inferences about\n\nenvironmental states. For more details on parameter learning with POMDPs, see [ 23 , 33 , 52 ].\n\n## **3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to\n\noperate ActiveInference . This includes functionalities for creating POMDP agents, for sim-\n\nulating behaviour and for fitting the models to data. In the next section, we demonstrate\n\nhow to use the package on a concrete worked example. ActiveInference is under continual\n\ndevelopment, and the newest version of the package, including documentation for how to\n\nuse it, can be found at [ github.com/ilabcode/ActiveInference.jl](https://github.com/ilabcode/ActiveInference.jl) .\n\n### *3.1. Creating and Using a POMDP*\n\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [ 23 ],\n\na Python library for implementing simulations of AIF in discrete state spaces. Those\n\nalready acquainted with pymdp should find the syntax here familiar. ActiveInference\n\ncan be installed as normal from the official Julia General Registry using the Julia’s native\n\npackage manager Pkg: � � **using** Pkg\n\nPkg.add(ActiveInference) � � It can then be loaded into the current project environment: � � **using** ActiveInference � � Central to the package is the AIF object. This is a structure containing all the components of\n\nthe generative model, as well as the dynamic belief states and the various settings needed to\n\nperform AIF, and is used in conjunction with most of the high-level functions of the package.\n\nAn AIF object can be created with the init_aif function, which takes as arguments the\n\ncomponents of the generative model and a dictionary of various settings and parameters:", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "change in CNT resistivity may then be obtained from the cal-\n\nculated coverages and single impurity conductances.\n\nWe find that oxidation of the active metal site passivates\n\nthe sensor in the case of doping by Ti, V, Cr, and Mn un-\n\nder standard conditions (room temperature and 1 bar of pres-\n\nsure). Among the remaining metals, we identify Ni as is the\n\nmost promising candidate for CO detection. For this system\n\nthe change in resistance per active site is generally significant\n\n( *>* 1 Ω ) for small changes in CO concentration in the relevant\n\nrange of around 0.1- 10 ppm. Our approach is quite general\n\nand is directly applicable to other nanostructures than CNTs,\n\nother functionalizations than metal doping, and other back-\n\ngrounds than atmospheric air.\n\nAll total energy calculations and structure optimizations\n\nhave been performed with the real-space density functional\n\ntheory (DFT) code GPAW [ 22 ] which is based on the projector augmented wave method. We use a grid spacing of 0.2 <sup>˚</sup> A for\n\nrepresenting the density and wave functions and the PBE ex-\n\nchange correlation functional [ 23 ]. Transport calculations for\n\nthe optimized structures have been performed using the non-\n\nequilibrium Green’s function method [ 24 ] with an electronic\n\nHamiltonian obtained from the SIESTA code [ 25 ] in a dou-\n\nble zeta polarized (DZP) basis set. Spin polarization has been\n\ntaken into account in all calculations.\n\nMetallic doping of a (6,6) CNT has been modeled in a su-\n\npercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 <sup>˚</sup> A *×* 15 <sup>˚</sup> A *×* 14.622 <sup>˚</sup> A). For this size\n\nof supercell a Γ -point sampling of the Brillouin zone was\n\nfound to be sufficient. The formation energy for creating a\n\nvacancy (VC) occupied by a transition metal atom (M) was\n\ncalculated using the relation\n\n*E* form [ M @ VC ] = *E* [ M @ VC ] + *nE* [ C ] *−* *E* [ M@NT ] (1) where *E* [M@VC] is the total energy of a transition metal\n\natom occupying a vacancy in the nanotube, *n* is the number\n\nof carbon atoms removed to form the vacancy, *E* [C] is the en-\n\nergy per carbon atom in a pristine nanotube, and *E* [M@NT]\n\narXiv:1001.2538v1 [cond-mat.mes-hall] 14 Jan 2010 Ti V Cr Mn Fe Co Ni Cu Zn 0", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2538.pdf" - }, - { - "text": "� � aif_agent = init_aif(\n\nA, B, C = C, D = D, E = E, pA = pA, settings = settings, parameters = parameters\n\n### ) � � *4.2. Simulating Behaviour*\n\nSince the environment and agent were set up, we could proceed to simulate the\n\nbehaviour of the agent in the environment. We created a for loop, where the agent received\n\nan observation, made inferences about the environment, updated **A** , inferred policies\n\nand sampled actions: � � # Run 1000 time steps\n\nT = 1000\n\n# Sample initial observation\n\nobs = reset_TMaze!(Env)\n\n# For loop over every time step\n\n**for** t = 1 :T\n\n# Infer states based on the current observation\n\ninfer_states!(aif_agent, obs)\n\n# Infer policies and calculate expected free energy\n\ninfer_policies!(aif_agent)\n\n# Updating A. This is the learning part ,\n\n# that includes the counting of the pA Dirichlet.\n\nupdate_parameters!(aif_agent)\n\n# Sample an action based on the inferred policies\n\nchosen_action = sample_action!(aif_agent)\n\n# Feed the action into the environment and get new observation.\n\nobs = step_TMaze!(Env, chosen_action)\n\n**end** � � The agent here started by moving to the cue location, and then proceeded to move to the\n\nleft arm repeatedly. The main objects of learning here were the reward condition state and\n\nthe **A** parameters for rewards under the two reward conditions. After observing the cue,\n\nthe agent updated its belief (correctly) to be certain of being in the left reward condition\n\n(Figure 4 ). Over time, the agent learned the correct probability of receiving rewards in the\n\nleft arm (0.94 versus a correct 0.95). It did not learn the probabilities for the right arm; this\n\nwas because it never moved to that location, having already learnt that the left arm was\n\nmore likely to produce rewards (Figure 5 ). This would be less likely to be the case with\n\nlower *γ* and *α* values, as well as a more entropic **C** .\n\n**Figure 4.** State inference for the reward condition. The agent’s beliefs about the reward condition\n\nchanged from agnostic ( **left** ) to certain that it was the left reward condition ( **right** ) after observing\n\nthe cue.", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "� � # Give single observation to the agent\n\nobservation = [ 1 ]\n\naction = single_in put! (agent, observation)\n\n# Give multiple observations to the agent and simulate actions\n\nobservations = [ 1 , 2 , 1 , 2 , 3 ]\n\nactions = give_inputs!(agent, observations) � � Additionally, a set of convenience functions can extract and set parameters and (histories\n\nof) beliefs. We briefly show how to extract the current or histories of past states: � � # Get all current belief states\n\nstates = get_states(agent)\n\n# Get a specific state , like the expected free energies only\n\nefe = get_states(agent, \"expected_free_energies\" )\n\n# Get history for all states\n\nhistory = get_history(agent)\n\n# Get history of expected free energies only\n\nhistory_efe = get_history(agent, \"expected_free_energies\" ) � � And how to change the parameters of a created agent: � � # Set individual parameter , alpha to 1.0\n\nset_parameters!(agent, \"alpha\" , 1 .0 )\n\n# Set multiple parameters by passing a dictionary\n\nnew_parameters = Dict (\n\n\"alpha\" => 1 .0 , # Set alpha to 1.0\n\n\"lr_pA\" => 0 .5 # Set learning rate of A to 0.5\n\n)\n\nset_parameters!(agent, new_parameters) # Set new parameters to agent � � *3.3. Model Fitting with* ActionModels\n\nIn addition to simulating the behaviour and belief updating of agents, ActionModels\n\nalso makes it possible to fit models to data and perform parameter estimation. This is\n\nused in general to form better models and theories of mental processes, as well as to\n\nfind mechanistic differences (usually prior beliefs in AIF) between, for example, clinical\n\npopulations or investigating how computational constructs, like Bayesian beliefs, relate\n\nto, for example, neuronal dynamics. This is performed in fields like cognitive modelling\n\nand mathematical psychology [ 34 ], as well as computational psychiatry [ 14 , 53 ]. In the\n\nfollowing, we briefly describe the high-level functions needed to fit AIF models to empirical\n\ndata with ActionModels .\n\nWe have our agent object defined as above. We then need to specify priors for the\n\nparameters we want to estimate. Here, we estimate the *α* parameter, and use a gamma\n\ndistribution as prior: � � # Load package for specifying distributions\n\n**using** Distributions\n\n# Initialize priors\n\npriors = Dict ( \"alpha\" => Gamma( 4 , 4 )) � � We can now use the create_model function to instantiate a probabilistic model object with\n\ndata. This takes the agent object, the priors, and a set of observations and actions as\n\nthe arguments:", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "[81] A. J. Archer and M. Rauscher, “Dynamical density functional theory for interacting brownian parti-\n\ncles: Stochastic or deterministic?” J. Phys. A-Math. Gen. **37** , 9325- 9333 (2004).\n\n[82] A. J. Archer and R. Evans, “Dynamical density functional theory and its application to spinodal\n\ndecomposition,” J. Chem. Phys. **121** , 4246- 4254 (2004).\n\n[83] P. A. Monson, “Mean field kinetic theory for a lattice gas model of fluids confined in porous materi-\n\nals,” J. Chem. Phys. **128** , 084701 (2008).\n\n[84] P. M. Chaikin and T. C. Lubensky, *Principles of condensed matter physics* , Cambridge University\n\nPress (1997).\n\n[85] J. S. Langer, “An introduction to the kinetics of first-order phase transitions,” in C. Godreche, editor,\n\n“Solids far from Equilibrium,” pages 297- 363, Cambridge University Press (1992).\n\n[86] M. A. Spaid and G. M. Homsy, “Stability of Newtonian and viscoelastic dynamic contact lines,”\n\nPhys. Fluids **8** , 460- 478 (1996).\n\n[87] U. Thiele and E. Knobloch, “Front and back instability of a liquid film on a slightly inclined plate,”\n\nPhys. Fluids **15** , 892- 907 (2003).\n\n[88] M. R. E. Warner, R. V. Craster, and O. K. Matar, “Surface patterning via evaporation of ultrathin\n\nfilms containing nanoparticles,” J. Colloid Interface Sci. **267** , 92- 110 (2003).\n\n[89] O. K. Matar, R. V. Craster, and K. Sefiane, “Dynamic spreading of droplets containing nanoparticles,”\n\nPhys. Rev. E **76** , 056315 (2007).\n\n[90] J. J. Zhou, B. Dupuy, A. L. Bertozzi, and A. E. Hosoi, “Theory for shock dynamics in particle-laden\n\nthin films,” Phys. Rev. Lett. **94** , 117803 (2005).\n\n[91] B. P. Cook, A. L. Bertozzi, and A. E. Hosoi, “Shock solutions for particle-laden thin films,” SIAM J.\n\nAppl. Math. **68** , 760- 783 (2008).\n\n[92] R. V. Craster, O. K. Matar, and K. Sefiane, “Pinning, retraction, and terracing of evaporating droplets\n\ncontaining nanoparticles,” Langmuir (2009), online available.\n\n[93] D. Quemada, “Rheology of concentrated disperse systems and minimum energy-dissipation principle\n\nI. Viscosity-concentration relationship,” Rheol. Acta **16** , 82- 94 (1977).\n\n[94] D. Quemada and C. Berli, “Energy of interaction in colloids and its implications in rheological\n\nmodeling,” Adv. Colloid Interface Sci. **98** , 51- 85 (2002).\n\n[95] J. J. Stickel and R. L. Powell, “Fluid mechanics and rheology of dense suspensions,” Annu. Rev.\n\nFluid Mech. **37** , 129- 149 (2005).\n\n[96] J. K. G. Dhont, *An Introduction to Dynamics of Colloids* , Elsevier, Amsterdam (1996).\n\n31", - "page_start": 30, - "page_end": 30, - "source_file": "1001.2669.pdf" - }, - { - "text": "Chapter 11. Advanced Copy Services\n\n*Figure 11-38 Creating a consistency group*\n\n2. Enter the FlashCopy Consistency Group name that you want to use and click **Create** , as\n\nshown in Figure 11-39.\n\n*Figure 11-39 Enter the name of new consistency group*\n\n#### **11.2.8 Creating FlashCopy mappings in a Consistency Group**\n\nTo create a FlashCopy Consistency Group in the GUI, complete the following steps:\n\n1. Open the Consistency Groups window by clicking **Copy Services** → **Consistency**\n\n**Groups** . This example assumes that source and target volumes were created previously.\n\n2. Select the Consistency Group in which you want to create the FlashCopy mapping. If you\n\nprefer not to create a FlashCopy mapping in a Consistency Group, select **Not in a Group** ,\n\nand right-click the selected consistency group or click **Actions** → **Create FlashCopy**\n\n**Mapping** , as shown in Figure 11-40.\n\n*Figure 11-40 Creating a FlashCopy mapping*\n\n**Consistency Group name:** You can use the letters A - Z and a - z, the numbers 0 - 9, and\n\nthe underscore (_) character. The volume name can be 1 - 63 characters.", - "page_start": 504, - "page_end": 504, - "source_file": "sg247938.pdf" - }, - { - "text": "**50** IBM Content Manager OnDemand Guide\n\n**Field Information tab**\n\nThe Field Information tab (Figure 3-5) is used to define the attributes of the database fields\n\nthat make up the Content Manager OnDemand report index data. These attributes determine\n\nthe characteristics of the index data and control many aspects of loading and processing data\n\nin the system. A database field must be added for each index value that is required by\n\napplications to be part of the application group.\n\n*Figure 3-5 Application group’s Field Information tab*\n\nWhen you define a field, you specify the field name, field type, data type, whether it is a\n\nsegment field, the expiration date, and more. In the following sections, we take a closer look\n\nat field type and whether it is a segment or an application ID field.\n\n* **Type** *\n\nThe Type attribute determines the manner in which the database field is used by Content\n\nManager OnDemand. The main types of attributes are *index* and *filter* .\n\nA field needs a type of *index* if it is used to uniquely identify a document or if it is frequently\n\nused when a user searches for documents in the application group. Designating a field as an\n\nindex serves to enhance query performance but increases the required processing during\n\nloading and database maintenance. A separate index table is created and maintained for\n\napplication group fields that are designated as indexes. These index tables are searched first\n\nwhen a *folder* query is run to quickly pinpoint the documents to include in the document “hit”\n\nlist.\n\nA field needs a type of *filter* if it does not uniquely identify a document. A filter is used with an\n\nindex field during folder queries.\n\n**Note:** You can update the application group to add a database field.", - "page_start": 73, - "page_end": 73, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2670.pdf", - "query": "What are the consequences on the linewidth for regular and Poissonian injections ?", - "target_page": 3, - "target_passage": " For regular injection (p = 1), the linewidth is the narrowest, while for Poissonian injection (p = 0), the linewidth is the broadest.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "[arXiv:1001.2670v1 [quant-ph] 15 Jan 2010](http://arxiv.org/abs/1001.2670v1)\n\n.\n\n## **The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen, <sup>∗</sup> and Hong Guo <sup>†</sup> *CREAM Group, State Key Laboratory of Advanced Optical Communication*\n\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n\n*School of Electronics Engineering and Computer Science,*\n\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China* (Dated: October 29, 2018)\n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying the linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth is more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that of conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. Since any cavity related noise is reduced to cavity-pulling e ff ect in bad cavity laser, this Ramsey laser provides the possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical clock and atom interferometers.\n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r\n\n*Introduction:* Since the invention of the separated-field technique [1], it has played an important role in the field of precision spectroscopy due to its linewidth narrowing e ff ect via multiple coherent interaction. Atomic clocks based on this technique have greatly extended our ability for frequency measurement, further, almost all the atom interferometers are based on this technique [2].\n\nThough, the natural linewidth of quantum transition was regarded as the ultimate limit to high-resolution laser spec- troscopy [4], several methods of subnatural linewidth spec- troscopy have been proposed to gain subnatural linewidth [3- 10]. However, in all these e ff orts, including optical Ramsey spectroscopy, subnatural line is realized at the expense of a quick reduction in signal-to-noise (SNR) ratio due to the ex- ponential decaying of signal, thus all these schemes can only get the linewidth several times narrower than the atomic nat- ural linewidth. In the past three decades, this situation does not change in the field of the precision laser spectroscopy. On the other hand, the thermal noise of the cavity mirrors is the main obstacle for further linewidth reduction of a laser [11, 12], and it is a challenge to substantially reduce this noise further[13]. Recently, a new scheme, called active optical clock [14- 18], was proposed to substantially reduce the laser linewidth. With lattice trapped atoms, it is possible to reach mHz linewidth laser based on the mechanism of active optical clock [14, 15, 19]. The principal mechanism of active optical clock is to directly extract light emitted from the ultranarrow atomic transition with a cavity mode linewidth much wider than that of lasing. This bad cavity ensures that any frequency shift due to cavity noise reduces to cavity-pulling e ff ect [15- 17], then the thermal noise is not the major obstacle again for reducing the linewidth. This means the bad cavity can play an indispensable role in new subnatural linewidth spectroscopy.\n\nIn this Letter, we propose a new scheme called Ramsey laser with bad cavity. Distinct from any previous applications of conventional Ramsey separated oscillating fields method [1], which focuses on the absorption spectrum, we here fo-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "also shift the spinodal and binodal lines as compared to the locations of these lines in the phase\n\ndiagram for the pure solvent [41]. As a consequence, the solute concentration influences the hole\n\nnucleation rate. More importantly, the solute particles may also destabilise the dewetting fronts.\n\nAs a result, one may find strongly ramified structures in all three systems [23, 25, 40, 42]. A\n\nselection of images exhibiting some of the possible structures is displayed in Fig.1.\n\nFor volatile solvents, the contact lines retract even for wetting fluids. It has been found that such\n\nevaporatively receding contact lines may deposit very regular line or ring patterns parallel to the\n\nmoving contact line [24, 43]. The deposition of a single ring of colloids from a evaporating\n\ndrop of colloidal suspension is well known as the ‘coffee stain effect’ [44]. Detailed investiga-\n\ntions reveal the emergence of rich structures including multiple irregular rings, networks, regular\n\ndroplet patterns, sawtooth patterns, Sierpinski carpets, and - in the case of DNA - liquid crys-\n\ntalline structures [22, 30, 45- 49]. The deposition of regularly spaced straight lines orthogonal to\n\nthe moving contact line has also been reported [50]. Droplet patterns may as well be created em-\n\nploying solvent-induced dewetting of glassy polymer layers below the glass transition temperature\n\n[51- 53].\n\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and\n\ntheoretically [55- 58]. In this case, different contact line instabilities have been observed for evap-\n\norating liquid drops [59, 60].\n\nIn the present article we review and preview the experiments and in particular the various mod-\n\nelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting sol-\n\nvents. After reviewing the basic experimental results in Section II, we discuss in Section III sev-\n\neral theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A,\n\na dynamic density functional theory in Section III B, and a thin film evolution equation in Sec-\n\ntion III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the\n\nindividual approaches and future challenges to all of them.\n\n## **II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS**\n\nWe focus on experiments that use monodisperse colloidal suspensions of thiol-passivated gold\n\nnanoparticles in toluene [33, 34, 37- 40, 61]. The gold core of 2 - 3 nm diameter is coated by a layer\n\nof alkyl-thiol molecules. The length of the carbon backbone of the thiol used in the experiments\n\nranges from 6 to 12 carbon atoms ( *C* 6 to *C* 12 ) [40]. By varying the chain length, one can control\n\n4", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" - }, - { - "text": "2.3. FastBlue tracer injections\n\nMice were briefly anesthetized during the procedure, induced with\n\n3%to5%isoflurane,andthenmaintainedat 1.5%to2%asrequired.\n\nHindlimbs were taped with the plantar surface of the paw facing up,\n\nand a custom, 26G removable needle with a 30˚ bevel, attached to\n\na 25- m L Hamilton syringe, was inserted between the 2 distal-most\n\nfootpads, towards the medial aspect of the hindpaw. The needle\n\nwas then rotated 90˚, so the bevel faced medially. Furthermore, 4- m L\n\nFastBlue (FB; 2% in sterile phosphate-buffered saline (PBS); CAS#\n\n73819-41-7; Polysciences, Inc, Warrington, PA) per paw was then\n\nslowly injected, and the needle was left in place for 10 seconds,\n\nbefore rotating and carefully retracting to avoid backflow of FB along\n\nthe needle track. This prevented the FB bolus from contacting the\n\nsural innervation territory of the lateral hindpaw, restricting it largely to\n\nthe tibial innervation territory of the glabrous hindpaw skin.\n\n2.4. Immunohistochemistry and image acquisition\n\nMice were anesthetized with an overdose of pentobarbital (20\n\nmg) and transcardially perfused with a fixative containing 4%\n\nformaldehyde. L3 to L5 DRGs were removed and postfixed for\n\nanother 2 hours, cryoprotected in 30% sucrose overnight, and\n\nthen embedded in optimal cutting temperature media (OCT;\n\nTissue Tek, Alphen aan den Rijn, the Netherlands). Dorsal root\n\nganglia were sectioned on a Leica CM1950 cryostat at 30 m m,\n\nwith every section collected serially on 5 Superfrost Plus slides\n\n(VWR, Lutterworth, United Kingdom) and each slide containing 1\n\nin every 5 sections (4-7 sections per slide). One slide per DRG was\n\nselected at random and was washed with PBS, before being\n\nincubated with appropriate primary antibodies ( Table 2 ) diluted in\n\n5% normal donkey serum and 0.3% Triton X-100 in PBS for\n\n3 days at 4˚C. After PBS washes, slides were incubated with\n\nappropriate secondary antibodies ( Table 2 ) in the same PBS/\n\n(normal donkey serum) NDS/Triton-X100 solution as for prima-\n\nries, overnight at room temperature. Slides were washed and\n\ncoverslipped with VectaShield Vibrance Hardset mounting media\n\n(Vector Labs, Newark, CA), with 4’,6-diamidino-2-phenylindole\n\nincluded in mounting media where FB-labelled cells were not\n\nbeing examined. Sections were imaged using a Zeiss LSM900\n\nAiryscan confocal microscope equipped with 405-, 488-, 561-,\n\nTable 2\n\nPrimary and secondary antibodies used in the study.\n\nAntibody Source Identifiers Working dilution\n\nAnti-GFP (Chicken polyclonal) Abcam, plc, Cambridge, United Kingdom Cat#: ab13970\n\nRRID: AB_300798\n\n1:1000\n\nAnti-NeuN (Guinea pig polyclonal) Synaptic Systems, G¨ottingen, Germany Cat#: 266004\n\nRRID: AB_2619988\n\n1:500\n\nAnti-mCherry (Rat monoclonal) Invitrogen, Waltham, MA; Thermo Fisher Scientific,\n\nUnited Kingdom\n\nCat#: M11217\n\nRRID: AB_2536611\n\n1:500\n\nAnti-Atf3 (Rabbit polyclonal) Novus Biologicals, Minneapolis, MN Cat#: NBP1-85816\n\nRRID: AB_11014863\n\n1:500\n\nAnti-NF200 (Rabbit polyclonal) Sigma-Aldrich, Saint Louis, MO Cat#: N4142\n\nRRID: AB_477272\n\n1:1000\n\nAnti-TrkA (Goat polyclonal) R&D Systems, Minneapolis, MN Cat#: AF1056\n\nRRID: AB_2283049\n\n1:500\n\nAnti-TDP43 (Rabbit polyclonal) Abcam, plc, Cambridge, United Kingdom Cat#: ab133547\n\nRRID: AB_2920621\n\n1:100\n\nAnti-RFP (Mouse monoclonal) Thermo Fisher Scientific, United Kingdom Cat#: MA5-15257\n\nRRID: AB_10999796\n\n1:200\n\nAnti-RFP (Chicken polyclonal) Sigma-Aldrich, United Kingdom Cat#: AB3528\n\nRRID: AB_11212735\n\n1:200\n\nAlexa Fluor 488 Donkey Anti-Chicken IgY\n\n(Donkey polyclonal)\n\nJackson ImmunoResearch, Ely, United Kingdom Cat#: 703-545-155\n\nRRID: AB_2340375\n\n1:500\n\nAlexa Fluor 647 Donkey Anti-Guinea pig IgG\n\n(Donkey polyclonal)\n\nJackson ImmunoResearch, Ely, United Kingdom Cat#: 706-605-148\n\nRRID: AB_2340476\n\n1:250\n\nRhodamine Red-X Donkey Anti-Rat IgG (Donkey\n\npolyclonal)\n\nJackson ImmunoResearch, Ely, United Kingdom Cat#: 712-295-153\n\nRRID: AB_2340676\n\n1:100\n\nAlexa Fluor 647 Donkey Anti-Rabbit IgG (Donkey\n\npolyclonal)", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed2.pdf" - }, - { - "text": "224 [ Pega et al., 2022: Global, regional and national burden of disease attributable to 19 selected occupational risk ](https://www.sjweh.fi/index.php?page=list-articles&author_id=10935)\n\nfactors for 183 countries, 2000- 2016: A systematic analysis from the WHO/ILO Joint Estimates of the Work-\n\n[related Burden of Disease and Injury, ](https://doi.org/10.5271/sjweh.4001) here\n\n225 Kauppinen et al., 1998: Occupational exposure to carcinogens in the European Union in 1990-1993:\n\ninternational information system on occupational exposure to carcinogens, [here](https://research.wur.nl/en/publications/occupational-exposure-to-carcinogens-in-the-european-union-in-199)\n\n[CAREX Canada](https://www.carexcanada.ca/)\n\nFevotte et al., 2011: [Matgéné: A Program to Develop Job-Exposure Matrices in the General Population in France](https://doi.org/10.1093/annhyg/mer067)\n\nMannetje et al., 2011: [Developing a general population job-exposure matrix in the absence of sufficient exposure ](https://doi.org/10.1093/annhyg/mer045)\n\n[monitoring data](https://doi.org/10.1093/annhyg/mer045)\n\n226 YLDs = years lived with disability, together with YLLs = years of life lost, it composes the DALY (DALY = YLL +\n\nYLD).\n\n227 GBD 2019 Mental Disorders Collaborators, 2022: Global, regional, and national burden of 12 mental disorders\n\nin 204 countries and territories, 1990- 2019: a systematic analysis from the Global Burden of Disease Study 2019,\n\n[here](https://doi.org/10.1016/S2215-0366(21)00395-3)\n\n228 WHO: [Mental disorders, Key facts](https://www.who.int/news-room/fact-sheets/detail/mental-disorders) and\n\nIHME: Global Health Data Exchange (GHDx), [here](https://vizhub.healthdata.org/gbd-results/)\n\n229 OECD, 2015: [Sick on the Job?: Myths and Realities about Mental Health and Work](https://www.oecd.org/els/mental-health-and-work-9789264124523-en.htm)\n\n230 OECD/European Union, 2018: [Health at a Glance: Europe 2018: State of Health in the EU Cycle](https://doi.org/10.1787/health_glance_eur-2018-en)\n\n231 [ Andlin-Sobocki et al., 2005: ](https://onlinelibrary.wiley.com/action/doSearch?ContribAuthorRaw=Andlin-Sobocki%2C+Patrik) [Cost of disorders of the brain in Europe](https://doi.org/10.1111/j.1468-1331.2005.01202.x)\n\n232 Niedhammer et al.; 2021: Update of the fractions of cardiovascular diseases and mental disorders attributable\n\nto psychosocial work factors in Europe, [here](https://doi.org/10.1007/s00420-021-01737-4)\n\n233 Norder et al., 2017: Beyond return to work from sickness absence due to mental disorders: 5-year longitudinal\n\nstudy of employment status among production workers, [here](https://doi.org/10.1093/eurpub/ckw178)\n\n234 Leka & Jain, 2017: [EU Compass for Action on Mental Health and Well-Being - Mental Health in the Workplace ](https://health.ec.europa.eu/system/files/2017-07/compass_2017workplace_en_0.pdf)\n\n[in Europe](https://health.ec.europa.eu/system/files/2017-07/compass_2017workplace_en_0.pdf)\n\n235 Musculoskeletal disorders refer to backache and/or muscular pains in shoulders, neck, upper limbs and/or\n\nlower limbs (hips, legs, knees, feet, etc.). In the medical systematic it is the IC 10 group of diseases: Diseases of\n\nthe musculoskeletal system and connective tissue.\n\n236 EU-OSHA, 2019: [Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU](https://osha.europa.eu/en/publications/work-related-musculoskeletal-disorders-prevalence-costs-and-demographics-eu/view)\n\n237 Graveling, 2018: [Ergonomics and Musculoskeletal Disorders (MSDs) in the Workplace. A Forensic and ](https://doi.org/10.1201/b22154)\n\n[Epidemiological Analysis](https://doi.org/10.1201/b22154)\n\n238 Da Costa & Viera, 2010: Risk factors for work-related musculoskeletal disorders: a systematic review of recent\n\nlongitudinal studies, [here](https://doi.org/10.1002/ajim.20750)", - "page_start": 149, - "page_end": 149, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "C3 trolleybus in the third district\n\nC3 trolleybus in Old Lyon\n\nVelo'v, Ennemond Fousseret square\n\n(Old Lyon)\n\n[Lyon is served by the Eurolines intercity coach organisation. Its Lyon terminal is](https://en.wikipedia.org/wiki/Eurolines)\n\nlocated at the city's Perrache railway station, which serves as an intermodal\n\ntransportation hub for tramways, local and regional trains and buses, the terminus of\n\nMetro line A, of the Tramway T2, the bicycle service Vélo'v, and taxis. <sup>[77]</sup>\n\n[The Transports en commun lyonnais (TCL), Lyon's public transit system, consisting](https://en.wikipedia.org/wiki/Transports_en_commun_lyonnais)\n\nof metro, tramways and buses, serves 62 communes of the Lyon metropolis. <sup>[78][79]</sup>\n\n[The metro network has four lines (A, B, C and D), 42 stations, and runs with a](https://en.wikipedia.org/wiki/Lyon_Metro_Line_D)\n\n[frequency of up to a train every 2 minutes. There are eight Lyon tram lines since](https://en.wikipedia.org/wiki/Lyon_tramway)\n\nnovember 2020: T1 from *Debourg* in the south to *IUT-Feyssine* in the north, Tram T2\n\nfrom *Hôtel de région Montrochet* [ to Saint-Priest in the south-east, Tram T3 from Part-](https://en.wikipedia.org/wiki/Saint-Priest,_Rh%C3%B4ne)\n\n[Dieu to Meyzieu, Tram T4 from 'Hôptial Feyzin Venissieux' to La Doua Gaston](https://en.wikipedia.org/wiki/Meyzieu)\n\nBerger. Tram T5 from Grange Blanche, in the south-east to Eurexpo in the south-west.\n\nTram T6 from Debourg, in the south to Hôpitaux Est-Pinel in the east. Tram T7 from\n\nVaux-en-Velin la soie, in the north-east to Décines - OL Vallée in the east. <sup>[79]</sup> And\n\nRhône Express tramline from Part-Dieu to Lyon- Saint-Exupéry Airport. <sup>[80][81]</sup> The\n\n[Lyon bus network consists of the Lyon trolleybus system, motorbuses, and coaches](https://en.wikipedia.org/wiki/Motorbuses)\n\nfor areas outside the centre. There are also two funicular lines from Vieux Lyon to\n\nSaint-Just and Fourvière. The ticketing system is relatively simple as the city has only\n\none public transport operator, the SYTRAL.\n\nThe public transit system was complemented in 2005 by *[Vélo'v](https://en.wikipedia.org/wiki/V%C3%A9lo%27v)* , a bicycle network\n\nproviding a low-cost bicycle-hire service made up of 340 stations throughout the city.\n\nBorrowing a bicycle for less than 30 minutes is free. Free rental time can be extended\n\nfor another 30 minutes at any station. Lyon was the first city in France to introduce\n\n[this bicycle renting system. In 2011 the Auto'lib car rental service was introduced; it](https://en.wikipedia.org/wiki/Autolib%27)\n\nworks much the same way as the Velo'v but for cars.\n\nThe average amount of time people spend commuting with public transit in Lyon on a\n\nweekday is 45 minutes. The average amount of time people wait at a stop or station\n\nfor public transit is 11 min, while 17% of riders wait for over 20 minutes on average\n\nevery day. The average distance people usually ride in a single trip with public transit\n\nis 4.7 km, while 4% travel for over 12 km in a single direction. <sup>[82]</sup>\n\nNetwork of\n\nhighways around\n\nLyon\n\nPublic transport map\n\nLyon is a pilot city of the Council of Europe and the European Commission \"Intercultural cities\" program. <sup>[83]</sup> Lyon is\n\n[twinned with:](https://en.wikipedia.org/wiki/Twin_towns_and_sister_cities) <sup>[84]</sup>\n\n[Addis Ababa, Ethiopia](https://en.wikipedia.org/wiki/Addis_Ababa)\n\n[Bamako, Mali](https://en.wikipedia.org/wiki/Bamako)\n\n[Barcelona, Spain](https://en.wikipedia.org/wiki/Barcelona)\n\n[Beersheba, Israel](https://en.wikipedia.org/wiki/Beersheba)\n\n[Birmingham, England, United Kingdom](https://en.wikipedia.org/wiki/Birmingham)\n\n[Boston, United States](https://en.wikipedia.org/wiki/Boston)\n\n[Craiova, Romania](https://en.wikipedia.org/wiki/Craiova)\n\n[Curitiba, Brazil](https://en.wikipedia.org/wiki/Curitiba)\n\n#### **Maps**\n\n### **International relations**", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia4.pdf" - }, - { - "text": "215 Ibid., pp. 55-56.\n\n216 WHO/ILO , 2021: [WHO/ILO joint estimates of the work-related burden of disease and injury, 2000- 2016: ](https://apps.who.int/iris/rest/bitstreams/1370920/retrieve)\n\n[Global monitoring report](https://apps.who.int/iris/rest/bitstreams/1370920/retrieve) (p. 18).\n\n217 The figures of the working age population of 16 years and above are based on EU-OSHA calculations of data\n\nprovided by the United Nations World Population Prospects database: United Nations, Department of Economic\n\nand Social Affairs, Population Division (2019). World Population Prospects 2019, Online Edition. Rev. 1., File\n\nPOP/1-1: Total population (both sexes combined) by region, subregion and country, annually for 1950-2100\n\n(thousands), [here](https://population.un.org/wpp/DataSources/)\n\n218 WHO, Occupational Burden of Disease Application, [https://who-ilo-joint-](https://who-ilo-joint-estimates.shinyapps.io/OccupationalBurdenOfDisease/)\n\n[estimates.shinyapps.io/OccupationalBurdenOfDisease/](https://who-ilo-joint-estimates.shinyapps.io/OccupationalBurdenOfDisease/) and EU-OSHA calculations\n\n219 International Commission on Occupational Health (ICOH) data based on new and until today unpublished\n\ncalculations: Takala et al.: Comparative Global Estimates on the Work-related Burden of Accidents and Diseases\n\n(preprint)\n\n220 WHO, Occupational Burden of Disease Application, [https://who-ilo-joint-](https://who-ilo-joint-estimates.shinyapps.io/OccupationalBurdenOfDisease/)\n\n[estimates.shinyapps.io/OccupationalBurdenOfDisease/](https://who-ilo-joint-estimates.shinyapps.io/OccupationalBurdenOfDisease/) and EU-OSHA calculations\n\n221 WHO/ILO , 2021: [WHO/ILO joint estimates of the work-related burden of disease and injury, 2000- 2016: ](https://apps.who.int/iris/rest/bitstreams/1370920/retrieve)\n\n[Global monitoring report](https://apps.who.int/iris/rest/bitstreams/1370920/retrieve) (pp. 55-56).\n\n222 WHO applied for the global estimates as reference the population with an age above 15 years. At EU level, 16\n\nyears — probably even older — is the minimum age to start work or an apprenticeship.\n\n223 WHO, Occupational Burden of Disease Application, [https://who-ilo-joint-](https://who-ilo-joint-estimates.shinyapps.io/OccupationalBurdenOfDisease/)\n\n[estimates.shinyapps.io/OccupationalBurdenOfDisease/](https://who-ilo-joint-estimates.shinyapps.io/OccupationalBurdenOfDisease/) and EU-OSHA calculations", - "page_start": 148, - "page_end": 148, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Jesse Dodge, Gabriel Ilharco, Roy Schwartz, Ali\n\nFarhadi, Hannaneh Hajishirzi, and Noah Smith.\n\n2020. [ Fine-Tuning Pretrained Language Models:](http://arxiv.org/abs/2002.06305)\n\n[Weight Initializations, Data Orders, and Early](http://arxiv.org/abs/2002.06305)\n\n[Stopping](http://arxiv.org/abs/2002.06305) . *arXiv:2002.06305 [cs]* .\n\nYanai Elazar, Shauli Ravfogel, Alon Jacovi, and\n\nYoav Goldberg. 2020. [ When Bert Forgets How](http://arxiv.org/abs/2006.00995)\n\n[To POS: Amnesic Probing of Linguistic Proper-](http://arxiv.org/abs/2006.00995)\n\n[ties and MLM Predictions](http://arxiv.org/abs/2006.00995) . *arXiv:2006.00995*\n\n*[cs]* .\n\nKawin Ethayarajh. 2019. [How Contextual are](https://www.aclweb.org/anthology/D19-1006)\n\n[Contextualized Word Representations? Compar-](https://www.aclweb.org/anthology/D19-1006)\n\n[ing the Geometry of BERT, ELMo, and GPT-2](https://www.aclweb.org/anthology/D19-1006)\n\n[Embeddings](https://www.aclweb.org/anthology/D19-1006) . In *Proceedings of the 2019 Con-*\n\n*ference on Empirical Methods in Natural Lan-*\n\n*guage Processing and the 9th International Joint*\n\n*Conference on Natural Language Processing*\n\n*(EMNLP-IJCNLP)* , pages 55- 65, Hong Kong,\n\nChina. Association for Computational Linguis-\n\ntics.\n\nAllyson Ettinger. 2019. [What](http://arxiv.org/abs/1907.13528) BERT is\n\nnot: [Lessons from a new suite of psy-](http://arxiv.org/abs/1907.13528)\n\n[cholinguistic diagnostics for language models](http://arxiv.org/abs/1907.13528) .\n\n*arXiv:1907.13528 [cs]* .\n\nAngela Fan, Edouard Grave, and Armand Joulin.\n\n2019. [ Reducing Transformer Depth on Demand](https://openreview.net/forum?id=SylO2yStDr)\n\n[with Structured Dropout](https://openreview.net/forum?id=SylO2yStDr) . In *International Con-*\n\n*ference on Learning Representations* .\n\nMaxwell Forbes, Ari Holtzman, and Yejin Choi.\n\n2019. [Do Neural Language Representations](https://arxiv.org/pdf/1908.02899.pdf)\n\n[Learn Physical Commonsense?](https://arxiv.org/pdf/1908.02899.pdf) In *Proceedings*\n\n*of the 41st Annual Conference of the Cognitive*\n\n*Science Society (CogSci 2019)* , page 7.\n\nJonathan Frankle and Michael Carbin. 2019. [ The](https://openreview.net/forum?id=rJl-b3RcF7)\n\nLottery Ticket Hypothesis: [Finding Sparse,](https://openreview.net/forum?id=rJl-b3RcF7)\n\n[Trainable Neural Networks](https://openreview.net/forum?id=rJl-b3RcF7) . In *International*\n\n*Conference on Learning Representations* .\n\nPrakhar Ganesh, Yao Chen, Xin Lou, Moham-\n\nmad Ali Khan, Yin Yang, Deming Chen, Mari-\n\nanne Winslett, Hassan Sajjad, and Preslav Nakov.\n\n2020. [Compressing large-scale transformer-](https://arxiv.org/abs/2002.11985)\n\n[based models: A case study on BERT](https://arxiv.org/abs/2002.11985) . *arXiv*\n\n*preprint arXiv:2002.11985* .\n\nSiddhant Garg, Thuy Vu, and Alessandro Moschitti.\n\n2020. [ TANDA: Transfer and Adapt Pre-Trained](http://arxiv.org/abs/1911.04118)\n\n[Transformer Models for Answer Sentence Selec-](http://arxiv.org/abs/1911.04118)\n\n[tion](http://arxiv.org/abs/1911.04118) . In *AAAI* .\n\nMichael Glass, Alfio Gliozzo, Rishav Chakravarti,\n\nAnthony Ferritto, Lin Pan, G P Shrivatsa Bhar-\n\ngav, Dinesh Garg, and Avi Sil. 2020. [Span](https://www.aclweb.org/anthology/2020.acl-main.247)\n\n[Selection Pre-training for Question Answering](https://www.aclweb.org/anthology/2020.acl-main.247) .\n\nIn *Proceedings of the 58th Annual Meeting of*\n\n*the Association for Computational Linguistics* ,\n\npages 2773- 2782, Online. Association for Com-\n\nputational Linguistics.\n\nGoran Glavaš and Ivan Vuli´c. 2020. [Is Super-](http://arxiv.org/abs/2008.06788)\n\n[vised Syntactic Parsing Beneficial for Language](http://arxiv.org/abs/2008.06788)\n\n[Understanding?](http://arxiv.org/abs/2008.06788) An Empirical Investigation .\n\n*arXiv:2008.06788 [cs]* .\n\nAdele Goldberg. 2006. *Constructions at Work: The*\n\n*Nature of Generalization in Language* . Oxford\n\nUniversity Press, USA.\n\nYoav Goldberg. 2019. [ Assessing BERT’s syntactic](http://arxiv.org/abs/1901.05287)", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "40. Hoffman, M.D.; Gelman, A. The No-U-Turn Sampler: Adaptively Setting Path Lengths in Hamiltonian Monte Carlo.\n\n2014. Available online: [ https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://jmlr.org/](https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://jmlr.org/papers/volume15/hoffman14a/hoffman14a.pdf&ved=2ahUKEwjPzP32seCKAxXLENAFHRziJ-0QFnoECBcQAQ&usg=AOvVaw3adSH1tmvDJ1-6CEuitKet)\n\n[papers/volume15/hoffman14a/hoffman14a.pdf&ved=2ahUKEwjPzP32seCKAxXLENAFHRziJ-0QFnoECBcQAQ&usg=](https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://jmlr.org/papers/volume15/hoffman14a/hoffman14a.pdf&ved=2ahUKEwjPzP32seCKAxXLENAFHRziJ-0QFnoECBcQAQ&usg=AOvVaw3adSH1tmvDJ1-6CEuitKet)\n\n[AOvVaw3adSH1tmvDJ1-6CEuitKet](https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://jmlr.org/papers/volume15/hoffman14a/hoffman14a.pdf&ved=2ahUKEwjPzP32seCKAxXLENAFHRziJ-0QFnoECBcQAQ&usg=AOvVaw3adSH1tmvDJ1-6CEuitKet) (accessed on 17 May 2024).\n\n41. Mathys, C.; Weber, L. Hierarchical Gaussian Filtering of Sufficient Statistic Time Series for Active Inference. In *Active Inference* ;\n\nVerbelen, T., Lanillos, P., Buckley, C.L., De Boom, C., Eds.; Communications in Computer and Information Science; Springer:\n\nCham, Switzerland, 2020; pp. 52- 58. [ [CrossRef](http://dx.doi.org/10.1007/978-3-030-64919-7_7) ]\n\n42. Rescorla, R.A. A theory of Pavlovian conditioning: Variations in the effectiveness of reinforcement and non-reinforcement. *Class.*\n\n*Cond. Curr. Res. Theory* **1972** , *2* , 64- 69.\n\n43. Frässle, S.; Aponte, E.A.; Bollmann, S.; Brodersen, K.H.; Do, C.T.; Harrison, O.K.; Harrison, S.J.; Heinzle, J.; Iglesias, S.; Kasper,\n\nL.; et al. TAPAS: An Open-Source Software Package for Translational Neuromodeling and Computational Psychiatry. *Front.*\n\n*Psychiatry* **2021** , *12* , 680811. [ [CrossRef](http://dx.doi.org/10.3389/fpsyt.2021.680811) ]\n\n44. Smith, R.; Schwartenbeck, P.; Parr, T.; Friston, K.J. An Active Inference Approach to Modeling Structure Learning: Concept\n\nLearning as an Example Case. *Front. Comput. Neurosci.* **2020** , *14* , 41. [ [CrossRef](http://dx.doi.org/10.3389/fncom.2020.00041) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/32508611) ]\n\n45. Neacsu, V.; Mirza, M.B.; Adams, R.A.; Friston, K.J. Structure learning enhances concept formation in synthetic Active Inference\n\nagents. *PLoS ONE* **2022** , *17* , e0277199. [ [CrossRef](http://dx.doi.org/10.1371/journal.pone.0277199) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/36374909) ]\n\n46. Xia, R.; Zhang, Y.; Liu, X.; Yang, B. A survey of sum- product networks structural learning. *Neural Netw.* **2023** , *164* , 645- 666.\n\n[ [CrossRef](http://dx.doi.org/10.1016/j.neunet.2023.05.010) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/37245478) ]\n\n47. Friston, K.J.; Da Costa, L.; Tschantz, A.; Kiefer, A.; Salvatori, T.; Neacsu, V.; Koudahl, M.; Heins, C.; Sajid, N.; Markovic, D.; et al.\n\nSupervised structure learning. *arXiv* **2023** , arXiv:2311.10300. [ [CrossRef](http://dx.doi.org/10.1016/j.biopsycho.2024.108891) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/39433209) ]\n\n48. Serrano, S.A.; Santiago, E.; Martinez-Carranza, J.; Morales, E.F.; Sucar, L.E. Knowledge-Based Hierarchical POMDPs for Task\n\nPlanning. *J. Intell. Robot. Syst.* **2021** , *101* , 82. [ [CrossRef](http://dx.doi.org/10.1007/s10846-021-01348-8) ]\n\n49. Friston, K.J.; Rosch, R.; Parr, T.; Price, C.; Bowman, H. Deep temporal models and active inference. *Neurosci. Biobehav. Rev.* **2017** ,\n\n*77* , 388- 402. [ [CrossRef](http://dx.doi.org/10.1016/j.neubiorev.2017.04.009) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/28416414) ]\n\n50. Friston, K.; Mattout, J.; Trujillo-Barreto, N.; Ashburner, J.; Penny, W. Variational free energy and the Laplace approximation.", - "page_start": 31, - "page_end": 31, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Baptismal certificate, 1638\n\n[Louis XIV, then Dauphin of France,](https://en.wikipedia.org/wiki/Dauphin_of_France)\n\nin 1642, one year before his\n\n[accession to the throne, by Philippe](https://en.wikipedia.org/wiki/Philippe_de_Champaigne)\n\n[de Champaigne](https://en.wikipedia.org/wiki/Philippe_de_Champaigne)\n\n[Louis XIV in 1643, by Claude Deruet](https://en.wikipedia.org/wiki/Claude_Deruet)\n\n[Europe after the Peace of](https://en.wikipedia.org/wiki/Peace_of_Westphalia)\n\n[Westphalia in 1648](https://en.wikipedia.org/wiki/Peace_of_Westphalia)\n\nThe Queen sought a lasting peace between Catholic nations, but only after a French victory over\n\nher native Spain. She also gave a partial Catholic orientation to French foreign policy. This was\n\nfelt by the Netherlands, France's Protestant ally, which negotiated a separate peace with Spain in\n\n1648. <sup>[18]</sup>\n\n[In 1648, Anne and Mazarin successfully negotiated the Peace of Westphalia, which ended the](https://en.wikipedia.org/wiki/Peace_of_Westphalia)\n\n[Thirty Years' War.](https://en.wikipedia.org/wiki/Thirty_Years%27_War) <sup>[19]</sup> [ Its terms ensured Dutch independence from Spain, awarded some autonomy](https://en.wikipedia.org/wiki/Spanish_Empire)\n\n[to the various German princes of the Holy Roman Empire, and granted Sweden seats on the](https://en.wikipedia.org/wiki/Holy_Roman_Empire)\n\n[Imperial Diet and territories controlling the mouths of the Oder, Elbe, and Weser Rivers.](https://en.wikipedia.org/wiki/Weser) <sup>[20]</sup>\n\n[France, however, profited most from the settlement. Austria, ruled by the Habsburg Emperor](https://en.wikipedia.org/wiki/House_of_Habsburg)\n\n[Ferdinand III, ceded all Habsburg lands and claims in Alsace to France and acknowledged her ](https://en.wikipedia.org/wiki/Alsace) *de*\n\n*facto* [ sovereignty over the Three Bishoprics of Metz, Verdun, and Toul.](https://en.wikipedia.org/wiki/Toul) <sup>[21]</sup> Moreover,\n\nmany petty German states sought French protection, eager to emancipate themselves from\n\n[Habsburg domination. This anticipated the formation of the 1658 League of the Rhine,](https://en.wikipedia.org/wiki/League_of_the_Rhine)\n\nwhich further diminished Imperial power.\n\n[As the Thirty Years' War came to an end, a civil war known as the Fronde erupted in](https://en.wikipedia.org/wiki/The_Fronde)\n\nFrance. It effectively checked France's ability to exploit the Peace of Westphalia. Anne and\n\nMazarin had largely pursued the policies of Cardinal Richelieu, augmenting the Crown's\n\npower at the expense of the nobility and the *[Parlements](https://en.wikipedia.org/wiki/Parlement)* . Anne was more concerned with\n\ninternal policy than foreign affairs; she was a very proud queen who insisted on the divine\n\nrights of the King of France. <sup>[22]</sup>\n\nAll this led her to advocate a forceful policy in all matters relating to the King's authority,\n\nin a manner that was much more radical than the one proposed by Mazarin. The Cardinal\n\ndepended totally on Anne's support and had to use all his influence on the Queen to temper\n\nsome of her radical actions. Anne imprisoned any aristocrat or member of parliament who\n\nchallenged her will; her main aim was to transfer to her son an absolute authority in the\n\nmatters of finance and justice. One of the leaders of the Parlement of Paris, whom she had\n\njailed, died in prison. <sup>[23]</sup>\n\nThe *Frondeurs* , political heirs of the disaffected feudal aristocracy, sought to protect their\n\ntraditional feudal privileges from the increasingly centralized royal government.\n\nFurthermore, they believed their traditional influence and authority was being usurped by\n\nthe recently ennobled bureaucrats (the *Noblesse de Robe* , or \"nobility of the robe\"), who\n\nadministered the kingdom and on whom the monarchy increasingly began to rely. This\n\nbelief intensified the nobles' resentment.\n\nIn 1648, Anne and Mazarin attempted to tax members of the *Parlement de Paris* . The", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2449.pdf", - "query": "Give me the advantages of Ferromagnetic semiconductors", - "target_page": 1, - "target_passage": "Ferromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material.", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "gin of the interface magnetism then had to be inferred by\n\ncomparison to a series of reference samples <sup>7</sup> . Demonstra- tion of coupling between the bulk of the layers, i.e. , an\n\nexchange bias effect, would provide direct evidence of the\n\ninterface magnetic order. Moreover, such coupling would\n\noffer new means of manipulating the FM semiconductor\n\nspin state and utilizing the proximity polarization effect\n\nin a spintronic device.\n\nHere, we demonstrate an antiferromagnetic coupling\n\nand exchange bias in Fe/(Ga,Mn)As bilayer films, by\n\ncombining element-specific XMCD measurements and\n\nbulk-sensitive superconducting quantum interference de-\n\nvice (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers <sup>4,5</sup> (and in con-\n\ntrast to AFM coupled FM metal/FM metal exchange bias\n\nstructures <sup>10,11</sup> ) the layers are in direct contact without\n\na non-magnetic spacer in between. We distinguish in-\n\nterface and bulk (Ga,Mn)As layers that are respectively\n\nstrongly and weakly antiferromagnetically coupled to the\n\nFe overlayer. In agreement with Ref. <sup>7</sup> , the interface layer\n\nremains polarized at room temperature.\n\nThe Fe and (Ga,Mn)As layers of the present study\n\nwere both grown by molecular beam epitaxy in the same\n\nultra-high vacuum system, in order to ensure a clean in-\n\nterface between them. The (Ga,Mn)As layer of thickness\n\n10 to 50 nm was deposited on a GaAs(001) substrate\n\nat a temperature of 260 <sup>◦</sup> C, using previously established\n\nmethods <sup>3,8</sup> . A low Mn concentration of x ≈ 0 . 03 was\n\nchosen in order to avoid the formation of compensating\n\nMn interstitials. The substrate temperature was then\n\nreduced to ∼ 0 <sup>◦</sup> C, before depositing a 2 nm Fe layer,\n\nplus a 2 nm Al capping layer. In-situ reflection high\n\nenergy electron diffraction and ex-situ x-ray reflectivity\n\nand diffraction measurements confirmed that the layers\n\nare single-crystalline with sub-nm interface roughness.\n\nSQUID magnetometry measurements were performed us-\n\ning a Quantum Design Magnetic Property Measurement\n\nSystem. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "measurements were performed on beamline I06 at the\n\nDiamond Light Source, and on beamline 4.0.2 at the Ad-\n\nvanced Light Source. Total-electron yield (TEY) and\n\nfluorescence yield (FY) were monitored simultaneously\n\nusing the sample drain current and the photocurrent of a\n\ndiode mounted at 90 <sup>◦</sup> to the incident beam, respectively.\n\nSQUID magnetometry measurements were\n\nfirst performed on control Fe/GaAs(001) and\n\n(Ga,Mn)As/GaAs(001) samples, grown under the\n\nsame conditions as the bilayers, to determine the\n\nmagnetic anisotropies of the individual layers and the\n\nCurie temperature of the (Ga,Mn)As layer. The Fe film\n\nhas a uniaxial magnetic anisotropy with easy axis along\n\nthe [110] orientation, similar to previous studies <sup>6</sup> . For\n\nthe (Ga,Mn)As control sample, there is a competition\n\nbetween cubic and uniaxial magnetic anisotropies, with\n\nthe former dominant at low temperatures and favoring\n\neasy axes along the in-plane ⟨ 100 ⟩ orientations, and the\n\nlatter dominant close to T C ( ∼ 35 K) giving an easy axis\n\nalong the [1 <sup>¯</sup> 10] orientation. Figure 1 shows [110] magne-\n\ntization versus temperature curves and low temperature\n\nhysteresis loops for a bilayer film containing a 20 nm\n\nthick (Ga,Mn)As layer. The total remnant moment of\n\nthe bilayer film decreases on cooling under zero magnetic\n\nfield below the T C of the (Ga,Mn)As, indicating that\n\nthis layer aligns antiparallel to the Fe magnetization\n\nat zero field. The hysteresis curve shows a two-step\n\nmagnetization reversal, indicating different behavior of\n\nthe Fe and (Ga,Mn)As layers, with the smaller loop\n\nattributed to the dilute moment (Ga,Mn)As film. The\n\nminor hysteresis loop shown in Fig. 1 clearly shows a\n\nshift from zero field by a bias field H E , indicating that\n\nthe Fe layer induces an exchange bias in the magnetic\n\nsemiconductor. The shape and size of the minor loop\n\nis in agreement with the hysteresis loop for the control\n\n(Ga,Mn)As sample, also shown in Fig. 1. This strongly\n\nindicates that the exchange bias affects the whole of the\n\n(Ga,Mn)As layer in the bilayer sample.\n\nSimilar behavior is observed for bilayer samples con-\n\ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a\n\nbias field which is approximately inversely proportional\n\nto the thickness d of the ferromagnetic semiconductor\n\nlayer (Fig. 1, inset). This 1/ d dependence of H E was found previously for MnAs/(Ga,Mn)As bilayers <sup>4</sup> , and\n\nis generally observed in exchanged-biased thin films <sup>12</sup> .\n\nFrom this dependence it is possible to describe the ex-\n\nchange bias in terms of an interface energy per unit area,\n\n∆ E = M F S H E d = 0 . 003 erg/cm <sup>2</sup> . This value is rather\n\nsmall compared to typical exchange bias systems <sup>12</sup> , re-\n\nflecting the low moment density M F S of the diluted\n\nFM semiconductor layer. However, the bias field for a\n\ngiven (Ga,Mn)As thickness is larger than is observed for\n\nMnO/(Ga,Mn)As structures <sup>13</sup> , while the reproducibility\n\nand flexibility of the present structures is much higher\n\ndue to the single-crystalline ferromagnetic nature of the\n\nFe layer.\n\nTo confirm the presence of AFM interlayer coupling,\n\nwe performed XMCD measurements at the Mn and Fe\n\nL 2 , 3 absorption edges in order to determine the magnetic\n\nresponse of the individual elements. In L 2 , 3 XMCD, elec-\n\ntrons are excited from a 2 p core level to the unoccupied\n\n3 d valence states of the element of interest by circularly\n\npolarized x-rays at the resonance energies of the transi-\n\ntions. The difference in absorption for opposite polariza-\n\ntions gives a direct and element-specific measurement of\n\nthe projection of the 3 d magnetic moment along the x-\n\nray polarization vector. The absorption cross-section is\n\nconventionally obtained by measuring the decay products\n\n- either fluorescent x-rays or electrons - of the photoex-\n\ncited core hole. The type of decay product measured\n\ndetermines the probing depth of the technique. For Mn", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "- either fluorescent x-rays or electrons - of the photoex-\n\ncited core hole. The type of decay product measured\n\ndetermines the probing depth of the technique. For Mn\n\nL 2 , 3 absorption, the probing depths for FY and TEY de-\n\ntection are λ F Y ≈ 100 nm and λ T EY ≈ 3 nm. In the\n\ncurrent experiment, the Mn XMCD measured using FY\n\nand TEY are thus sensitive to the bulk of the (Ga,Mn)As\n\nfilm and the near-interface layers, respectively.\n\nFigure 2(a)-(c) shows the magnetic field dependence of\n\nXMCD asymmetry, defined as ( I l − I r ) / ( I l + I r ) where\n\nI l ( r ) is the absorption for left- (right-) circularly polarized\n\nx-rays. This is measured at the Fe and Mn L 3 absorption\n\npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K.\n\nThe external field is applied along the photon incidence\n\ndirection, which is at 70 <sup>◦</sup> to the surface normal with\n\nan in-plane projection along the [110] axis. The XMCD\n\ndata show that the Fe film displays a square hysteresis\n\nloop with a single magnetization switch, as expected for\n\na monocrystalline Fe film with strong uniaxial magnetic\n\nanisotropy. The Mn XMCD shows a more complicated\n\nloop due to the effect of the interlayer coupling. The pro-\n\njected Mn moment aligns antiparallel to the Fe moment\n\nat remanence, and undergoes a magnetization reversal of\n\nopposite sign to the Fe. With further increase of the ex-\n\nternal magnetic field, the Mn moment gradually rotates\n\naway from antiparallel alignment with the Fe layer, and\n\ninto the field direction. Qualitatively similar behavior\n\nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam-\n\nple: the (Ga,Mn)As layer is aligned antiparallel to the\n\nFe layer at zero field, although the bias field is lower by\n\napproximately a factor of two.\n\nClear differences are observed between the Mn XMCD\n\nhysteresis loops obtained using TEY and FY detection\n\nmodes. For FY the magnitude of the XMCD is similar\n\n(but of opposite sign) at remanence and at high mag-\n\nnetic fields, whereas for TEY at remanence it is approx-\n\nimately a factor of two larger than at 1000 Oe. The\n\nMn L 2 , 3 XMCD spectra recorded at remanence and at\n\n1000 Oe, shown in Fig. 3, confirm this result. At re-\n\nmanence the FY and TEY detected XMCD have similar\n\nmagnitudes. However, under a large external field the\n\nXMCD is substantially smaller in TEY than in FY, con-\n\nfirming that the net magnetization of the Mn ions near\n\nthe interface is significantly less than in the bulk of the\n\n(Ga,Mn)As film. This is the case even up to the high-\n\nest field applied (20 kOe). By applying the XMCD sum rules <sup>14</sup> to the TEY data, and by comparing the spectra to\n\nprevious measurements on well-characterized (Ga,Mn)As", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "[arXiv:1001.0266v2 [cond-mat.str-el] 4 May 2010](http://arxiv.org/abs/1001.0266v2)\n\n## Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin\n\n## Rotation Invariant System\n\nFa Wang <sup>1</sup>\n\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\n\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil-\n\ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low\n\nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series\n\nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and\n\ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model\n\nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet\n\nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre-\n\nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this\n\nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2\n\nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the\n\nhigh order spin interactions from more natural couplings, which involves perturbative expansions\n\nthus breaks the exact mapping, although in a controlled manner.\n\nPACS numbers: 75.10.Jm, 75.10.Kt\n\nContents\n\nI. Introduction. 1\n\nII. Formulation of the Pseudo-spin-1/2 from\n\nFour-spin Cluster. 2\n\nIII. Realization of the Kitaev Model. 3\n\nIV. Generate the High Order Physical Spin\n\nInteractions by Perturbative Expansion. 5\n\nA. Generate the High Order Terms by Coupling\n\nto Optical Phonon. 5\n\nB. Generate the High Order Terms by Magnetic\n\nInteractions between Clusters. 7\n\nV. Conclusions. 8\n\nAcknowledgments 8\n\nA. Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins 8\n\nB. Derivation of the Terms Generated by\n\nSecond Order Perturbation of Inter-cluster\n\nMagnetic Interactions 9\n\nReferences 10\n\nI. INTRODUCTION.\n\nKitaev’s exactly solvable spin-1/2 honeycomb lattice model <sup>1</sup> (noted as the Kitaev model hereafter) has in-\n\nspired great interest since its debut, due to its exact\n\nsolvability, fractionalized excitations, and the potential\n\nto realize non-Abelian anyons. The model simply reads\n\nH Kitaev = − � x − links <jk>\n\nJ x τ <sup>x</sup> j <sup>τ</sup> <sup>x</sup> k <sup>−</sup> � y − links <jk>\n\nJ y τ <sup>y</sup> j <sup>τ</sup> <sup>y</sup> k\n\n− � z − links <jk>\n\nJ z τ <sup>z</sup> j <sup>τ</sup> <sup>z</sup> k\n\n(1)\n\nwhere τ <sup>x,y,z</sup> are Pauli matrices, and x, y, z -links are de- fined in FIG. 1. It was shown by Kitaev <sup>1</sup> that this spin-\n\n1/2 model can be mapped to a model with one Majo-\n\nrana fermion per site coupled to Ising gauge fields on the\n\nlinks. And as the Ising gauge flux has no fluctuation, the\n\nmodel can be regarded as, under each gauge flux config-\n\nuration, a free Majorana fermion problem. The ground\n\nstate is achieved in the sector of zero gauge flux through\n\neach hexagon. The Majorana fermions in this sector have\n\nDirac-like gapless dispersion resembling that of graphene,\n\nas long as | J x | , | J y | , and | J z | satisfy the triangular rela- tion, sum of any two of them is greater than the third\n\none <sup>1</sup> . It was further proposed by Kitaev <sup>1</sup> that opening of\n\nfermion gap by magnetic field can give the Ising vortices\n\nnon-Abelian anyonic statistics, because the Ising vortex\n\nwill carry a zero-energy Majorana mode, although mag-\n\nnetic field destroys the exact solvability.\n\nGreat efforts have been invested to better understand\n\nthe properties of the Kitaev model. For example, sev-\n\neral groups have pointed out that the fractionalized Ma-\n\njorana fermion excitations may be understood from the\n\nmore familiar Jordan-Wigner transformation of 1D spin", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has\n\nbeen proposed <sup>38</sup> .\n\nOur model (8) is achieved at second order of the per-\n\nturbation series. Higher order terms become trunca-\n\ntion errors but may be controlled by small parameters\n\nλ x,y,z /J cluster ∼ � | J x,y,z | /J cluster .\n\nV. CONCLUSIONS.\n\nWe constructed the exactly solvable Kitaev honeycomb model <sup>1</sup> as the exact low energy effective Hamiltonian of\n\na spin-1/2 model [equations (8) or (9)] with spin-rotation\n\nand time reversal symmetry. The spin in Kitaev model is\n\nrepresented as the pseudo-spin in the two-fold degenerate\n\nspin singlet subspace of a cluster of four antiferromag-\n\nnetically coupled spin-1/2 moments. The physical spin\n\nmodel is a honeycomb lattice of such four-spin clusters,\n\nwith certain inter-cluster interactions. The machinery\n\nfor the exact mapping to pseudo-spin Hamiltonian was\n\ndeveloped (see e.g. TABLE I), which is quite general\n\nand can be used to construct other interesting (exactly\n\nsolvable) spin-1/2 models from spin rotation invariant\n\nsystems.\n\nIn this construction the pseudo-spin correlations in the\n\nKitaev model will be mapped to dimer or spin-chirality\n\ncorrelations in the physical spin system. The correspond-\n\ning picture of the fractionalized Majorana fermion exci-\n\ntations and Ising vortices still remain to be clarified.\n\nThis exact construction contains high order physical\n\nspin interactions, which is undesirable for practical im-\n\nplementation. We described two possible approaches to\n\nreduce this problem: generating the high order spin in-\n\nteractions by perturbative expansion of the coupling to\n\noptical phonon, or the magnetic coupling between clus-\n\nters. This perturbative construction will introduce trun-\n\ncation error of perturbation series, which may be con-\n\ntrolled by small expansion parameters. Whether these\n\nconstructions can be experimentally engineered is how-\n\never beyond the scope of this study. It is conceivable that\n\nother perturbative expansion can also generate these high\n\norder spin interactions, but this possibility will be left for\n\nfuture works.\n\nAcknowledgments\n\nThe author thanks Ashvin Vishwanath, Yong-Baek\n\nKim and Arun Paramekanti for inspiring discussions, and\n\nTodadri Senthil for critical comments. The author is sup-\n\nported by the MIT Pappalardo Fellowship in Physics.\n\nAppendix A: Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins\n\nIn this Appendix we reproduce from Ref. <sup>35</sup> the cou-\n\nplings of all tetrahedron distortion modes to the spin\n\nsystem. And convert them to pseudo-spin notation in\n\nthe physical spin singlet sector.\n\nConsider a general small distortion of the tetrahedron,\n\nthe spin Hamiltonian becomes\n\nH cluster , SL = ( J cluster / 2)( � ℓ\n\nS ℓ ) <sup>2</sup> + J <sup>′</sup> <sup>�</sup> ℓ<m\n\nδr ℓm ( S ℓ · S m )\n\n(A1)\n\nwhere δr ℓm is the change of bond length between spins ℓ and m , J <sup>′</sup> is the derivative of J cluster with respect to\n\nbond length.\n\nThere are six orthogonal distortion modes of the tetra-\n\nhedron [TABLE 1.1 in Ref. <sup>35</sup> ]. One of the modes A is the\n\ntrivial representation of the tetrahedral group T d ; two E\n\nmodes form the two dimensional irreducible representa-\n\ntion of T d ; and three T 2 modes form the three dimen-\n\nsional irreducible representation. The E modes are also\n\nillustrated in FIG. 3.\n\nThe generic couplings in (A1) [second term] can be\n\nconverted to couplings to these orthogonal modes,\n\nJ <sup>′</sup> ( Q <sup>A</sup> f <sup>A</sup> + Q <sup>E</sup> 1 <sup>f</sup> <sup>E</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>f</sup> <sup>E</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 1 <sup>f</sup> <sup>T</sup> <sup>2</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 2 <sup>f</sup> <sup>T</sup> <sup>2</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 3 <sup>f</sup> <sup>T</sup> <sup>2</sup> 3 <sup>)</sup>", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "samples <sup>15</sup> , the projected Mn 3 d magnetic moments are\n\nobtained as − 1.4 µ B and +0.8 µ B per ion at remanence\n\nand 1000 Oe, respectively.\n\nThe difference between these values can be understood\n\nas being due to an interface layer which is strongly anti-\n\nferromagnetically coupled to the Fe layer. At zero field,\n\nboth the interfacial and bulk Mn are aligned antiparallel\n\nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As\n\nlayer away from the interface is re-oriented into the exter-\n\nnal field direction. However, the interfacial Mn remains\n\nantiparallel to the Fe layer and thus partially compen-\n\nsates the XMCD signal from the bulk of the (Ga,Mn)As.\n\nFrom the size of the remanent and 1000 Oe magnetic\n\nmoments, it can be estimated that around 25-30% of the\n\nTEY XMCD signal can be ascribed to the interfacial Mn\n\nwhich is strongly coupled to the Fe moments.\n\nThe interfacial Mn moments are ascribed to the prox-\n\nimity polarization of the (Ga,Mn)As interface by the Fe\n\nlayer, such as was shown previously by XMCD as well as ab initio theory <sup>7</sup> . Evidence for this can be observed from\n\nmeasurement of the Mn L 2 , 3 XMCD signal at tempera-\n\ntures above the (Ga,Mn)As T C . Similar to the previous\n\nstudy <sup>7</sup> , we observe a small but not negligible signal at\n\nroom temperature (Fig. 3), with opposite sign to the Fe\n\nL 2 , 3 XMCD. Its spectral shape is characteristic of a local- ized electronic configuration close to d <sup>5</sup> , similar to bulk (Ga,Mn)As <sup>7,9,15</sup> but in contrast to Mn in more metallic\n\nenvironments such as Mn x Fe 1 − x <sup>7</sup> or MnAs <sup>16</sup> . A slight\n\nbroadening is observed on the low energy side of the Mn\n\nL 3 peak, which may be due to the different screening in-\n\nduced by proximity to the Fe layer. Since the measured\n\nintensity is attenuated with distance z from the surface\n\nas I = I 0 exp( − z/λ T EY ), the thickness of the strongly\n\ncoupled interface layer is estimated to be ∼ 0.7 nm or 2-3\n\nmonolayers, assuming a uniform distribution of Mn ions\n\nand magnetic moments throughout the (Ga,Mn)As film.\n\nThis is around a factor of three thinner than in Ref. <sup>7</sup> ,\n\nwhich could be due to the lower Mn concentration or the\n\ndifferent preparation method of the present samples.\n\nIn summary, we have demonstrated antiferromagnetic\n\ncoupling between Fe and (Ga,Mn)As layers in bilayer\n\nstructures. A markedly different coupling is observed for\n\nthe bulk of the (Ga,Mn)As layer and for Mn moments\n\nin the near-interface region. A thickness-dependent ex-\n\nchange bias field is observed to affect the whole of the\n\nbulk (Ga,Mn)As layer, which aligns antiparallel to the\n\nFe layer at low fields, and switches to parallel when the\n\nexternal field is large enough to overcome the bias field\n\nand the magnetocrystalline anisotropy fields. In contrast,\n\nthe interfacial Mn moments remain aligned antiparallel\n\nto the Fe layer even at 20 kOe, the largest field studied,\n\nand are polarized at temperatures well above the T C of\n\nthe bulk (Ga,Mn)As layer. The latter observation con-\n\nfirms the recently reported result of Ref. 7, in which\n\nthe Fe/(Ga,Mn)As bilayers were produced by a different\n\nmethod but showed qualitatively similar behavior of the\n\ninterfacial moments. Our results shed new light on the\n\nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which\n\nare of potential interest for room temperature spintron-\n\nics, and also offer a means of controlling the spin orien-\n\ntation in a FM semiconductor.\n\nWe acknowledge support from EU grants\n\nSemiSpinNet-215368 and NAMASTE-214499, and\n\nSTFC studentship grant CMPC07100. The Advanced\n\nLight Source is supported by the U.S. Department of\n\nEnergy under Contract No. DE-AC02-05CH11231.\n\nWe thank Leigh Shelford for help during the Diamond\n\nbeamtime.\n\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. Mac-\n\nDonald, Phys. Rev. B 59 , 9818 (1999); P. Sankowski and\n\nP. Kacman, Phys. Rev. B 71 , 201303(R) (2005); A. D.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "[arXiv:1001.2449v1 [cond-mat.mtrl-sci] 14 Jan 2010](http://arxiv.org/abs/1001.2449v1)\n\n## Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\n\nK. Olejnik, <sup>1, 2</sup> P. Wadley, <sup>3</sup> J. Haigh, <sup>3</sup> K. W. Edmonds, <sup>3</sup> R. P. Campion, <sup>3</sup> A. W. Rushforth, <sup>3</sup> B. L. Gallagher, <sup>3</sup> C. T. Foxon, <sup>3</sup> T. Jungwirth, <sup>2, 3</sup> J. Wunderlich, <sup>1, 2</sup> S. S. Dhesi, <sup>4</sup> S. Cavill, <sup>4</sup> G. van der Laan, <sup>4</sup> and E. Arenholz <sup>5</sup>\n\n1 Hitachi Cambridge Laboratory, Cambridge CB3 0HE, United Kingdom 2 Institute of Physics ASCR, v.v.i., Cukrovarnicka 10, 16253 Praha 6, Czech Republic 3 School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD, United Kingdom 4 Diamond Light Source, Harwell Science and Innovation Campus,\n\nDidcot, Oxfordshire, OX11 0DE, United Kingdom 5 Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, California 94720, USA\n\n(Dated: August 24, 2018)\n\nWe demonstrate an exchange bias in (Ga,Mn)As induced by antiferromagnetic coupling to a thin\n\noverlayer of Fe. Bias fields of up to 240 Oe are observed. Using element-specific x-ray magnetic\n\ncircular dichroism measurements, we distinguish a strongly exchange coupled (Ga,Mn)As interface\n\nlayer in addition to the biassed bulk of the (Ga,Mn)As film. The interface layer remains polarized\n\nat room temperature.\n\nPACS numbers: 75.70.Cn, 75.50.Pp, 75.50.Bb\n\nFerromagnetic (FM) semiconductors offer the prospect\n\nof combining high-density storage and gate-controlled\n\nlogic in a single material. The realization of spin-valve\n\ndevices from FM semiconductors requires the controlled\n\nswitching of magnetization in adjacent layers between\n\nantiferromagnetic (AFM) and FM configurations. This\n\nhas motivated several theoretical investigations of inter-\n\nlayer coupling in all-semiconductor devices <sup>1</sup> , and AFM\n\ncoupling has recently been demonstrated in (Ga,Mn)As\n\nmultilayers separated by p -type non-magnetic spacers <sup>2</sup> .\n\nHowever, the Curie temperature T C of (Ga,Mn)As is currently limited to 185 K in single layers <sup>3</sup> , and is\n\ntypically much lower for layers embedded within a\n\nheterostructure <sup>2</sup> , which is an obstacle to the practical\n\nimplementation of semiconductor spintronics.\n\nThe development of FM metal/FM semiconductor het-\n\nerostructures has the potential to bring together the\n\nbenefits of metal and semiconductor based spintron-\n\nics, offering access to new functionalities and physi-\n\ncal phenomena. Recent studies of MnAs/(Ga,Mn)As\n\nand NiFe/(Ga,Mn)As bilayer films have shown FM in-\n\nterlayer coupling and independent magnetization be-\n\nhavior, respectively <sup>4,5</sup> . Of particular interest is the\n\nFe/(Ga,Mn)As system, since the growth of epitaxial\n\nFe/GaAs(001) films is well-established <sup>6</sup> . Remarkably, a\n\nrecent x-ray magnetic circular dichroism (XMCD) study\n\nhas shown that Fe may induce a proximity polariza-\n\ntion in the near-surface region of (Ga,Mn)As, antipar-\n\nallel to the Fe moment and persisting even above room\n\ntemperature <sup>7</sup> . Devices incorporating Fe/(Ga,Mn)As\n\ntherefore offer the prospect of obtaining non-volatile\n\nroom temperature spin-polarization in a semiconductor.\n\nUntil now, no information has been revealed about the\n\ncoupling of Fe to (Ga,Mn)As layers away from the near-\n\nsurface region. At the surface, the (Ga,Mn)As layer may\n\nbe highly non-stoichiometric and Mn-rich, due to its non-\n\nequilibrium nature <sup>8,9</sup> . Previously, Fe/(Ga,Mn)As layers\n\nwere produced by a process including exposure to air fol-\n\nlowed by sputtering and annealing prior to Fe deposition,\n\nwhich may further disrupt the interface order. The ori-\n\ngin of the interface magnetism then had to be inferred by\n\ncomparison to a series of reference samples <sup>7</sup> . Demonstra- tion of coupling between the bulk of the layers, i.e. , an", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain\n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally\n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding\n\nexcess thiol one can also vary the properties of the solvent [40].\n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin-\n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the\n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds\n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo-\n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For\n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin-\n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing\n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by\n\nthe solvent. This allows for a better control of the process and enables the use of contrast-enhanced\n\nmicroscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the\n\nregion of the receding contact line of toluene, silicon and air. With both techniques one may find\n\nmono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched\n\npatterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a\n\nmore controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the\n\ninteraction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold\n\ncores. For short chains (C 5 and C 8 ) no formation of branched structures is observed. At similar\n\nconcentrations, well-developed branched structures are formed for longer chains (C 10 and C 12 ).\n\nFor even longer chains (C 14 ), however, one again finds less branching. It also depends on the\n\namount of excess thiol in the solvent (for details see Ref. [40]).\n\nWhen following the evolution of the branched patterns in situ (see the complementary video\n\nmaterial of Ref. [40]), one clearly observes that different processes occur on different lenght\n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate.\n\nThe macroscopic front can be transversely unstable resulting in large-scale ( *>* 100 *µ* m) strongly\n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc-\n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be-\n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this\n\nstage it is possible to appreciate that the seemingly dry region left behind by the front is not at all\n\ndry, but covered by an ultrathin ‘postcursor’ film that is itself unstable. The thickness of this film\n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2669.pdf" - }, - { - "text": "*x*\n\n*z*\n\n*y*\n\n## *J* *J*\n\n## *J*\n\n*1*\n\n*0*\n\n*2*\n\nFIG. 1: (colors online) (a) : body-centered tetragonal (BCT)\n\nlattice with J 0 in-plane coupling constant, and out-of-plane\n\nJ 1 , and J 2 competing interactions.\n\nbe achieved with different number of interacting layers:\n\nnotably, nearest and next-nearest layers competitive in-\n\nteractions are enough to get a helical structure with a\n\nwhatever pitch wavevector. Such observation gives us a\n\npossible way to solve the conundrum previously emerged,\n\nas we have the possibility of varying the range of inter-\n\nactions without modifying the helical pitch, thus decou-\n\npling the two relevant length scales along the film growth\n\ndirection, and making accessible a range of n of the or-\n\nder of, or smaller than, the helical pitch, but still large\n\nenough that a substantial number of layers can behave\n\nas “bulk” layers. Therefore, while in the previous papers\n\nwe have studied the properties of ultrathin magnetic films\n\nof Ho assuming a model with six interlayer exchange in-\n\nteractions, here we investigate by MC simulations the\n\nproperties of the same system by making use of the sim-\n\nplest model Hamiltonian able to describe the onset of a\n\nhelical magnetic order in Holmium, i.e. we consider only\n\ntwo inter-layer coupling constants, as previously done in\n\nRef. 11.\n\nThe paper is organized as follows: In Sec. II the model\n\nHamiltonian will be defined, and the MC techniques, and\n\nall the thermodynamic quantities relevant for this study,\n\nwill be introduced. In Sec. III the results obtained for\n\ndifferent thicknesses will be presented, both in the matter\n\nof the critical properties of the model and of the magnetic\n\nordered structures observed. Finally, in Sec. IV we shall\n\ndiscuss such results, drawing also some conclusions.\n\nII. MODEL HAMILTONIAN AND MONTE\n\nCARLO OBSERVABLES\n\nThe model Hamiltonian we use in our simulations is the\n\nminimal one able to describe helimagnetic structures:\n\nH = −   J 0 � ⟨ ij ⟩\n\n⃗S i · ⃗S j + J 1 � ⟨ ik ⟩\n\n⃗S i · ⃗S k + J 2 � ⟨ il ⟩\n\n⃗S i · ⃗S l   .\n\n(1)\n\n⃗S i are classical planar unit vectors representing the di-\n\nrection of the total angular momentum of the magnetic\n\nions, whose magnitude � j ( j + 1) ( j = 8 for Holmium\n\nions) is already encompassed within the definition of the\n\ninteraction constants J 0 , 1 , 2 . As sketched in Fig. 1, the\n\nmagnetic ions are located on the sites of a body-centered\n\ntetragonal (BCT) lattice; the first sum appearing in the\n\nHamiltonian describes the in-plane ( xy ) nearest neigh-\n\nbor (NN) interaction, which is taken ferromagnetic (FM),\n\nwith exchange strength J 0 > 0; the second sum rep-\n\nresents the coupling, of exchange strength J 1 , between\n\nspins belonging to nearest neighbor (NN) planes along\n\nthe z -direction (which we will assume to coincide with\n\nthe film growth direction); finally, the third sum takes\n\ninto account the interaction, of exchange strength J 2 , be-\n\ntween spins lying on next-nearest neighbor (NNN) planes\n\nalong z . In order to have frustration, giving rise to non-\n\ncollinear order along z in the bulk, NN interaction J 1\n\ncan be taken both ferro- or antiferromagnetic, but NNN\n\ncoupling J 2 has necessarily to be antiferromagnetic, and\n\nthe condition | J 2 | > | J 1 | / 4 must be fulfilled. Such simpli-\n\nfied Hamiltonian was already employed to simulate he- lical ordering in bulk systems by Diep <sup>1,17</sup> and Loison <sup>18</sup> .\n\nIn the bulk limit, the state of minimal energy of a sys-\n\ntem described by Eq.(1) corresponds to a helical arrange-\n\nment of spins. The ground state energy per spin is equal\n\nto e g ( Q z ) = [ − 4 J 0 − 2 J 1 (4 cos ( Q z c <sup>′</sup> ) + δ cos (2 Q z c <sup>′</sup> ))] where c <sup>′</sup> is the distance between NN layers, δ = J 2\n\nJ 1 <sup>,</sup>\n\nand Q z c <sup>′</sup> = arccos � − <sup>1</sup> δ � is the angle between spins ly-\n\ning on adjacent planes along the z -direction. The ob-\n\nserved helical arrangement in bulk holmium corresponds", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "Recycling yields approximately 0.1mg of rare Recycling yields approximately 0.1mg of rare\n\nearth product per expired card. earth product per expired card.\n\nRare earths are special metals, unobtainable Rare earths are special metals, unobtainable\n\nin Japan, which are essential to in Japan, which are essential to PCs and s and\n\ncellphones, electric vehicles and solar power cellphones, electric vehicles and solar power\n\ngenerators. Given that Japan is dependent on generators. Given that Japan is dependent on\n\nimports for nearly its entire supply, we believe imports for nearly its entire supply, we believe\n\nrecycling rare earths is a worthwhile endeavor recycling rare earths is a worthwhile endeavor\n\nin terms of national energy policy. in terms of national energy policy.\n\nCard microcircuits that have become unusable Card microcircuits that have become unusable\n\ndue to changes in card design are collected due to changes in card design are collected\n\nfrom cards with IC chips, which are separated from cards with IC chips, which are separated\n\nfrom cards without IC chips. Both types are from cards without IC chips. Both types are\n\npulverized at the company pulverized at the company’s Shimura Center s Shimura Center\n\nin Tokyo and sealed separately in recycling in Tokyo and sealed separately in recycling\n\nbags, under supervision of a company official. bags, under supervision of a company official.\n\nThe bags are then sent off for processing by The bags are then sent off for processing by\n\nan outside company, which analyzes and an outside company, which analyzes and\n\npurifies the contents and then extracts the purifies the contents and then extracts the\n\nrare earths. rare earths.\n\nExpired\n\ncredit cards\n\nwith IC chips\n\nRecovery\n\nAnalysis\n\nand\n\npurification\n\nRare earth\n\nproduct\n\nBase metals, alloys,\n\nchemical products, etc. ( )\n\nRecycling and reuse of old equipment and machinery\n\nEnvironment-friendly model branches Environmental business matching\n\nEco-Products is one of Japan’s largest comprehensive environmental exhibitions\n\nload through measures such as “carbon load through measures such as “carbon\n\nneutral leases” (with carbon credits allocated neutral leases” (with carbon credits allocated\n\nin proportion to emission volumes of leased in proportion to emission volumes of leased\n\nassets) and leasing of environment-friendly assets) and leasing of environment-friendly\n\nand energy-saving equipment. and energy-saving equipment.\n\nLikewise, by trading used machinery and Likewise, by trading used machinery and\n\nsemiconductor- manufacturing equipment, semiconductor- manufacturing equipment,\n\nSumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is\n\nsupporting more efficient capital investment supporting more efficient capital investment\n\nby its customers, while itself evolving into a by its customers, while itself evolving into a\n\nrecycling-oriented, environment-friendly recycling-oriented, environment-friendly\n\ncompany. company.\n\n**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report\n\n**A new venue for confabs:**\n\n**SMFG Environmental**\n\n**Business Forum**\n\n**at Eco-Products**\n\n**The eco japan cup:**\n\n**“A Contest for Unearthing**\n\n**and Growing Seeds of**\n\n**New Businesses”**\n\n**Sumitomo Mitsui**\n\n**Finance & Leasing:**\n\n**Promoting recycling**\n\n**and reuse**\n\n**Recycling of rare earths**\n\n**used in smart cards**\n\n#### **Environmental**\n\n#### **Activities**\n\n**Committed to supporting environmental businesses, a CSR priority,**\n\n**through our core businesses**", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2449.pdf", - "query": "I do not remember on wich samples SQUID magnetometry measurements were first performed", - "target_page": 2, - "target_passage": "SQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "measurements were performed on beamline I06 at the\n\nDiamond Light Source, and on beamline 4.0.2 at the Ad-\n\nvanced Light Source. Total-electron yield (TEY) and\n\nfluorescence yield (FY) were monitored simultaneously\n\nusing the sample drain current and the photocurrent of a\n\ndiode mounted at 90 <sup>◦</sup> to the incident beam, respectively.\n\nSQUID magnetometry measurements were\n\nfirst performed on control Fe/GaAs(001) and\n\n(Ga,Mn)As/GaAs(001) samples, grown under the\n\nsame conditions as the bilayers, to determine the\n\nmagnetic anisotropies of the individual layers and the\n\nCurie temperature of the (Ga,Mn)As layer. The Fe film\n\nhas a uniaxial magnetic anisotropy with easy axis along\n\nthe [110] orientation, similar to previous studies <sup>6</sup> . For\n\nthe (Ga,Mn)As control sample, there is a competition\n\nbetween cubic and uniaxial magnetic anisotropies, with\n\nthe former dominant at low temperatures and favoring\n\neasy axes along the in-plane ⟨ 100 ⟩ orientations, and the\n\nlatter dominant close to T C ( ∼ 35 K) giving an easy axis\n\nalong the [1 <sup>¯</sup> 10] orientation. Figure 1 shows [110] magne-\n\ntization versus temperature curves and low temperature\n\nhysteresis loops for a bilayer film containing a 20 nm\n\nthick (Ga,Mn)As layer. The total remnant moment of\n\nthe bilayer film decreases on cooling under zero magnetic\n\nfield below the T C of the (Ga,Mn)As, indicating that\n\nthis layer aligns antiparallel to the Fe magnetization\n\nat zero field. The hysteresis curve shows a two-step\n\nmagnetization reversal, indicating different behavior of\n\nthe Fe and (Ga,Mn)As layers, with the smaller loop\n\nattributed to the dilute moment (Ga,Mn)As film. The\n\nminor hysteresis loop shown in Fig. 1 clearly shows a\n\nshift from zero field by a bias field H E , indicating that\n\nthe Fe layer induces an exchange bias in the magnetic\n\nsemiconductor. The shape and size of the minor loop\n\nis in agreement with the hysteresis loop for the control\n\n(Ga,Mn)As sample, also shown in Fig. 1. This strongly\n\nindicates that the exchange bias affects the whole of the\n\n(Ga,Mn)As layer in the bilayer sample.\n\nSimilar behavior is observed for bilayer samples con-\n\ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a\n\nbias field which is approximately inversely proportional\n\nto the thickness d of the ferromagnetic semiconductor\n\nlayer (Fig. 1, inset). This 1/ d dependence of H E was found previously for MnAs/(Ga,Mn)As bilayers <sup>4</sup> , and\n\nis generally observed in exchanged-biased thin films <sup>12</sup> .\n\nFrom this dependence it is possible to describe the ex-\n\nchange bias in terms of an interface energy per unit area,\n\n∆ E = M F S H E d = 0 . 003 erg/cm <sup>2</sup> . This value is rather\n\nsmall compared to typical exchange bias systems <sup>12</sup> , re-\n\nflecting the low moment density M F S of the diluted\n\nFM semiconductor layer. However, the bias field for a\n\ngiven (Ga,Mn)As thickness is larger than is observed for\n\nMnO/(Ga,Mn)As structures <sup>13</sup> , while the reproducibility\n\nand flexibility of the present structures is much higher\n\ndue to the single-crystalline ferromagnetic nature of the\n\nFe layer.\n\nTo confirm the presence of AFM interlayer coupling,\n\nwe performed XMCD measurements at the Mn and Fe\n\nL 2 , 3 absorption edges in order to determine the magnetic\n\nresponse of the individual elements. In L 2 , 3 XMCD, elec-\n\ntrons are excited from a 2 p core level to the unoccupied\n\n3 d valence states of the element of interest by circularly\n\npolarized x-rays at the resonance energies of the transi-\n\ntions. The difference in absorption for opposite polariza-\n\ntions gives a direct and element-specific measurement of\n\nthe projection of the 3 d magnetic moment along the x-\n\nray polarization vector. The absorption cross-section is\n\nconventionally obtained by measuring the decay products\n\n- either fluorescent x-rays or electrons - of the photoex-\n\ncited core hole. The type of decay product measured\n\ndetermines the probing depth of the technique. For Mn", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "gin of the interface magnetism then had to be inferred by\n\ncomparison to a series of reference samples <sup>7</sup> . Demonstra- tion of coupling between the bulk of the layers, i.e. , an\n\nexchange bias effect, would provide direct evidence of the\n\ninterface magnetic order. Moreover, such coupling would\n\noffer new means of manipulating the FM semiconductor\n\nspin state and utilizing the proximity polarization effect\n\nin a spintronic device.\n\nHere, we demonstrate an antiferromagnetic coupling\n\nand exchange bias in Fe/(Ga,Mn)As bilayer films, by\n\ncombining element-specific XMCD measurements and\n\nbulk-sensitive superconducting quantum interference de-\n\nvice (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers <sup>4,5</sup> (and in con-\n\ntrast to AFM coupled FM metal/FM metal exchange bias\n\nstructures <sup>10,11</sup> ) the layers are in direct contact without\n\na non-magnetic spacer in between. We distinguish in-\n\nterface and bulk (Ga,Mn)As layers that are respectively\n\nstrongly and weakly antiferromagnetically coupled to the\n\nFe overlayer. In agreement with Ref. <sup>7</sup> , the interface layer\n\nremains polarized at room temperature.\n\nThe Fe and (Ga,Mn)As layers of the present study\n\nwere both grown by molecular beam epitaxy in the same\n\nultra-high vacuum system, in order to ensure a clean in-\n\nterface between them. The (Ga,Mn)As layer of thickness\n\n10 to 50 nm was deposited on a GaAs(001) substrate\n\nat a temperature of 260 <sup>◦</sup> C, using previously established\n\nmethods <sup>3,8</sup> . A low Mn concentration of x ≈ 0 . 03 was\n\nchosen in order to avoid the formation of compensating\n\nMn interstitials. The substrate temperature was then\n\nreduced to ∼ 0 <sup>◦</sup> C, before depositing a 2 nm Fe layer,\n\nplus a 2 nm Al capping layer. In-situ reflection high\n\nenergy electron diffraction and ex-situ x-ray reflectivity\n\nand diffraction measurements confirmed that the layers\n\nare single-crystalline with sub-nm interface roughness.\n\nSQUID magnetometry measurements were performed us-\n\ning a Quantum Design Magnetic Property Measurement\n\nSystem. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "###### **Day 2 tests: private provider requirements**\n\n**7.** —(1) For the purposes of paragraph 6(1)(b)(iii), a private provider complies with this\n\nparagraph where—\n\n(a) they comply with the requirements of paragraph 3(1)(a) and (e) to (h) of Schedule 10 as if\n\nany reference in those provisions to an appropriate test were a reference to a day 2 test;\n\n(b) if the provider is a laboratory that conducts diagnostic test evaluation for testing in\n\naccordance with this Schedule, they have made a declaration to the Department of Health\n\nand Social Care that they meet the minimum standards for private sector-provided testing\n\nat https://support-covid-19-testing.dhsc.gov.uk/InternationalTesting;\n\n(c) they have provided the Department of Health and Social Care with a list of all\n\norganisations that they work with (whether by sub-contract or otherwise) to carry out the\n\ntesting service or to carry out genomic sequencing, indicating the nature of the service\n\nthat each organisation is providing, and kept that list updated as appropriate;\n\n(d) the person responsible for the taking of samples meets the relevant requirements for\n\naccreditation to ISO standard 15189 or ISO/IEC standard 17025 in respect of the taking\n\nof samples;\n\n(e) the laboratory used by the test provider for the processing of samples meets the relevant\n\nrequirements for ISO standard 15189 or ISO/IEC standard 17025 in respect of the\n\nevaluation of the established molecular detection method and the genomic sequencing of\n\nsamples;\n\n(f) they receive the information required by paragraph 10(3) or (4) (as appropriate), and if\n\nthey administer the test to P, they do so no later than the end of the second day after the\n\nday on which P arrived in England;\n\n(g) each day, they notify the Secretary of State in writing of—\n\n(i) the number of tests they sold on that day, and\n\n(ii) in relation to each test sold on that day—\n\n(aa) the date of the arrival in England of the person in respect of whom the test\n\nwas sold, and\n\n(bb) whether the person in respect of whom the test was sold is a category 1 arrival\n\nor not;\n\n(h) they sequence each sample with a cycle threshold less than 30 (equivalent to ~1,000 viral\n\ngenome copies per millilitre);\n\n(i) in respect of the sequencing of samples, they must secure a reference genome coverage\n\nbreadth of at least 50% and at least 30 times coverage;\n\n(j) on a request by the Secretary of State or the COVID-19 Genomics UK Consortium, they\n\nmake samples available for the purpose of dual sequencing;\n\n(k) they preserve and transport samples in a manner that enables genome sequencing;\n\n(l) they have in place a process to remove human reads from any data submitted in a\n\nnotification to Public Health England pursuant to the Health Protection (Notification)\n\nRegulations 2010; and\n\n(m) if they arrange with another person (“X”) for X to carry out any element of the single\n\nend-to-end testing service on their behalf, the test provider ensures that X complies with\n\nthe following so far as relevant to the carrying out of that element—\n\n(i) paragraph 3(1)(e) to (h) of Schedule 10 as applied by paragraph (a) of this sub-\n\nparagraph,\n\n(ii) paragraph (c) to (l) of this sub-paragraph,\n\n(iii) paragraph 11(2), (3) and (4).\n\n(2) For the purposes of sub-paragraph (1)(m), “single end-to-end testing service” has the\n\nmeaning given in paragraph 3(2)(c) of Schedule 10.", - "page_start": 61, - "page_end": 61, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "On any of these views, you can select any point by using your cursor to know the exact value\n\nand when it occurred. When you place your cursor over the timeline, it becomes a dotted line\n\nwith the various values gathered, as shown in Figure A-7.\n\n*Figure A-7 Viewing performance with details*\n\nFor each of the resources, various metrics are available and you can select which to be\n\ndisplayed. For example, as shown in Figure A-8, from the four available metrics for the\n\nMDisks view (Read, Write, Read latency, and Write latency) only Read and Write IOPS are\n\nselected.\n\n*Figure A-8 Displaying performance counters*\n\n#### **Performance data collection and IBM Spectrum Control**\n\nAlthough you can obtain performance statistics in standard . xml files, the use of .xml files is a\n\nless practical and more complicated method to analyze the IBM Spectrum Virtualize\n\nperformance statistics. IBM Spectrum Control is the supported IBM tool to collect and analyze\n\nStorwize V7000 performance statistics.", - "page_start": 773, - "page_end": 773, - "source_file": "sg247938.pdf" - }, - { - "text": "###### **Test providers**\n\n**3.** —(1) A test provider complies with this paragraph where—\n\n(a) they provide appropriate tests in a single end-to-end testing service (whether or not they\n\narrange with another person (“X”) for X to provide one or more elements of the service\n\non their behalf);\n\n(b) they have made a declaration to the Department of Health and Social Care that they meet\n\nthe minimum standards for private sector-provided testing at https://support-covid-19-\n\ntesting.dhsc.gov.uk/PrivateSectorSelfDeclaration;\n\n(c) in relation to a test which requires laboratory processing—\n\n(i) the person responsible for the taking of samples meets the relevant requirements for\n\naccreditation to ISO standard 15189 or ISO/IEC standard 17025, in respect of the\n\ntaking of samples, and\n\n(ii) the laboratory used by the test provider for the processing of samples meets the\n\nrelevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard\n\n17025, in respect of the processing of samples;\n\n(d) in relation to a point of care test, they meet the relevant requirements for accreditation to\n\nISO standard 15189 and ISO standard 22870( **a** );\n\n(e) a registered medical practitioner has oversight and approval of medical practices\n\nundertaken by the test provider, and responsibility for reporting medical issues;\n\n(f) they have an effective system of clinical governance in place which includes appropriate\n\nstandard operating procedures in relation to the carrying out of appropriate tests;\n\n(g) a registered clinical scientist has oversight of clinical practices undertaken by the test\n\nprovider, and responsibility for reporting clinical issues;\n\n(h) they have systems in place to identify any adverse incidents or quality control issues in\n\nrelation to appropriate tests and be able to report them as soon as reasonably practicable\n\nto the Secretary of State;\n\n(i) they administer or provide an appropriate test to P, on or after the fifth day after the day\n\non which P arrived in England having received the information required by paragraph\n\n4(b) and (c) (as appropriate); and\n\n(j) if they arrange with another person (“X”) for X to carry out any element of the single\n\nend-to-end testing service on their behalf, the test provider ensures that X complies with\n\nany of paragraphs (c) to (i) and 5(2), (3) and (5) as is relevant to the carrying out of that\n\nelement.\n\n(2) For the purposes of sub-paragraph (1)—\n\n(a) “point of care test” means a test processed outside a laboratory environment;\n\n(b) “registered clinical scientist” means a person registered as a clinical scientist with the\n\nHealth and Care Professions Council pursuant to article 5 of the Health Professions Order\n\n2001( **b** );\n\n(c) “single end-to-end testing service” means a service which comprises accepting the\n\nbooking from the person to be tested, collecting and processing the sample to be tested,\n\ncarrying out genomic sequencing and providing the test result to P.\n\n(3) For the purposes of sub-paragraph (1)(c) and (d), a person or laboratory (as the case may be)\n\nmeets the relevant requirements for accreditation to a standard where that person, or in the case of\n\na laboratory where the person who is the operator of the laboratory—\n\n(a) has made a valid application for accreditation to UKAS (“stage one”); and\n\n( **a** ) ISO 22870 Point-of-care testing (POCT) requirements for quality and competence was published in November 2016.\n\n( **b** ) S.I. 2002/254.", - "page_start": 69, - "page_end": 69, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "predictions of skeletal muscle mass nor dual-energy X-ray\n\nabsorptiometry provides detailed information on the size of\n\nspeci fi c individual muscles. Given the known importance of\n\nmuscle size as a determinant of muscular strength ( 9 - 11 ), pro-\n\nnounced muscle size seems likely to be critical to extreme\n\nhuman strength; however, the speci fi c muscle size of\n\nextremely strong individuals remains unknown. Similarly, a\n\nlarge moment arm (e.g., of the patella tendon at the knee joint)\n\ncould contribute to the expression of high muscular strength\n\n( 10 , 12 ), and a large tendon may mitigate the mechanical stress\n\nit experiences with very high muscular loads, and therefore,\n\nthese characteristics may also be expected in individuals\n\nselected for exceptional strength.\n\nIn this paper, we present the fi ndings from a unique op-\n\nportunity to examine the laboratory function, muscle size,\n\nand distribution of muscle mass, as well as patellar tendon\n\nsize and moment arm, of a World ’ s Strongest Man and dead-\n\nlift champion (WSM) in comparison with existing data on\n\nuntrained individuals, power athletes (100-m-track sprint-\n\ners), and long-term resistance-trained populations that we\n\nhave assessed previously ( 10 , 11 , 13 - 15 ).\n\n#### MATERIALS AND METHODS\n\n##### Participant\n\nThe WSM ’ s achievements included one World ’ s Strongest\n\nMan title (14 mo prior to measurement), fi ve Britain ’ s\n\nStrongest Man titles (the most recent 6 mo prior to measure-\n\nment), twice being World Deadlift Champion and Deadlift\n\nWorld Record holder (500 kg; at the time of measurement),\n\nand second place at Europe ’ s Strongest Man. Prior to agreeing\n\nto participate, the purpose of the research study and the test-\n\ning procedures were explained to the participant along with\n\nthe risks and bene fi ts of taking part. The participant gave his\n\nwritten informed consent to participate in the study that was\n\napproved by the Loughborough University Ethical Advisory\n\nCommittee (Ethics Number R18-P090). Included in the writ-\n\nten consent was a statement providing permission for publi-\n\ncation of the collected data and the likelihood that their\n\nidentity may be evident based on their achievements and\n\ncharacteristics, despite anonymization.\n\n##### Training History\n\nThe WSM had been continuously involved in systematic,\n\nregular upper- and lower-body resistance training for 15 yr at\n\nthe time of testing. In the 12 mo prior to testing, the partici-\n\npant ’ s resistance training consisted of the following typical\n\nexercises: lower body: squats, deadlifts, leg press, and knee\n\nextension; and upper body: bench press, shoulder press,\n\ndumbbell/barbell rows, and lat pull-down. The proportion of\n\nthe participant ’ s training within the following repetition\n\nranges over the last 12 mo was as follows: near maximum\n\nloads [1 - 5 repetition maximum (RM)]: 10%; heavy loads (6 -\n\n14 RM): 80%; and moderate loads ( � 15 RM): 10%. The partici- pant reported only occasional ( < 1 � /week) use of advanced resistance training practices (i.e., complex training and ac-\n\ncommodating resistance method) but frequently ( > 3 � / week) executed training repetitions with the intention to\n\nmove the load as fast as possible. The WSM ’ s nutritional\n\nsupplement consumption included protein, branched-chain\n\namino acids, and electrolytes.\n\n##### Overview\n\nThe WSM reported for a single test session that involved\n\nthe following assessments (listed in order): axial T1 weighted\n\n3.0-T MRI scans from T12 to the lateral malleolus [to assess\n\nmuscle size throughout the lower body (left and right sides)],\n\naxial and sagittal T1-weighted MRI scans of both knees [to\n\nassess patellar tendon cross-sectional area (CSA) and patellar\n\ntendon moment arm], maximum countermovement jumps\n\n(CMJ), and maximum isometric midthigh pulls (IMTPs). The\n\nmuscle size, patellar tendon CSA, and patellar tendon\n\nmoment arm of the WSM were compared with various popu-\n\nlations measured within our laboratory, as indicated in", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" - }, - { - "text": "pain-related psychological distress. Current risk pre-\n\ndiction paradigms in musculoskeletal pain consider\n\nonly baseline pain-related psychological distress. How-\n\never, these results underscore the importance of\n\nTable 7 Summary of consistent individual predictors for each utilization outcome <sup>*</sup>\n\nDependent variable Utilization outcome\n\nAny care Opioids Injection Surgery Diagnostic tests or imaging Emergency room\n\nAge X\n\nInsurance X\n\nComorbidities (CCI) X X\n\nBaseline disability X X X X X\n\nBaseline pain X\n\nChange in pain X X X X\n\nChange in disability X\n\nChange in 10-item OSPRO-YF X\n\nCCI Charlson comorbidity index, OSPRO-YF Pain-related psychological distress screening tool\n\n* Significant predictors ( p < .05) for each dependent variable denoted with “ X ”\n\nPage 10 of 14", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed5.pdf" - }, - { - "text": "you have been traced as a contact of someone who tested positive\n\nFor advice on when you might need to self-isolate and what to do, go to\n\nwww.nhs.uk/conditions/coronavirus-covid-19 and read ‘Self-isolation and treating symptoms’.\n\n###### **Form B: positive test result**\n\nYour coronavirus test result is positive. You had the virus when the test was done.\n\nEven if you have not had symptoms of coronavirus, you must self-isolate for 10 days from the day\n\nafter your test date. Your test sample may be genome sequenced to check whether you have a\n\nvirus variant of concern or variant under investigation.\n\nPeople you live with or have travelled with should also self-isolate for 10 days from the day after\n\nyou took a test.\n\nIf you received a positive test result for the test taken you do not need to take any further tests.\n\nPeople you are travelling with must still take a day 8 test if they have travelled from an amber list\n\ncountry.\n\nYou may be contacted for contact tracing and to check that you, and those who you live or are\n\ntravelling with, are self-isolating.\n\nYou must not travel, including to leave the UK, during self-isolation.\n\nContact 111 if you need medical help. In an emergency dial 999.\n\n###### **Form C: unclear test result**\n\nYour coronavirus test result is unclear. It is not possible to say if you had the virus when the test\n\nwas done.\n\nYou must take another test or self-isolate for 10 days from the day after your test date.\n\nYou may be contacted to check that you are self-isolating.\n\n(4) Where—\n\n(a) regulation 4 or 4A of the Health Protection (Notification) Regulations 2010 applies in\n\nrelation to the test provider; or\n\n(b) if the test provider arranges with another person (“X”) for X to carry out any element of\n\nthe single end-to-end testing service on their behalf, either of those regulations applies to\n\nX in the carrying out of that element,\n\nthe regulation applies as if it required the information described in sub-paragraph (5) to be\n\nincluded in the notification to Public Health England.\n\n(5) The information mentioned in sub-paragraph (4) is—\n\n(a) the date on which P last departed from or transited through a category 2 country or\n\nterritory;\n\n(b) P’s coach number, flight number or vessel name (as appropriate);\n\n(c) the country or territory P was travelling from when P arrived in England, and any country\n\nor territory they transited through as part of that journey;\n\n(d) the date on which P undertook the appropriate test;\n\n(e) whether the test is—\n\n(i) a day 2 test for a category 1 arrival,\n\n(ii) a day 2 test for a person who is not a category 1 arrival, or\n\n(iii) a day 8 test.", - "page_start": 65, - "page_end": 65, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "- either fluorescent x-rays or electrons - of the photoex-\n\ncited core hole. The type of decay product measured\n\ndetermines the probing depth of the technique. For Mn\n\nL 2 , 3 absorption, the probing depths for FY and TEY de-\n\ntection are λ F Y ≈ 100 nm and λ T EY ≈ 3 nm. In the\n\ncurrent experiment, the Mn XMCD measured using FY\n\nand TEY are thus sensitive to the bulk of the (Ga,Mn)As\n\nfilm and the near-interface layers, respectively.\n\nFigure 2(a)-(c) shows the magnetic field dependence of\n\nXMCD asymmetry, defined as ( I l − I r ) / ( I l + I r ) where\n\nI l ( r ) is the absorption for left- (right-) circularly polarized\n\nx-rays. This is measured at the Fe and Mn L 3 absorption\n\npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K.\n\nThe external field is applied along the photon incidence\n\ndirection, which is at 70 <sup>◦</sup> to the surface normal with\n\nan in-plane projection along the [110] axis. The XMCD\n\ndata show that the Fe film displays a square hysteresis\n\nloop with a single magnetization switch, as expected for\n\na monocrystalline Fe film with strong uniaxial magnetic\n\nanisotropy. The Mn XMCD shows a more complicated\n\nloop due to the effect of the interlayer coupling. The pro-\n\njected Mn moment aligns antiparallel to the Fe moment\n\nat remanence, and undergoes a magnetization reversal of\n\nopposite sign to the Fe. With further increase of the ex-\n\nternal magnetic field, the Mn moment gradually rotates\n\naway from antiparallel alignment with the Fe layer, and\n\ninto the field direction. Qualitatively similar behavior\n\nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam-\n\nple: the (Ga,Mn)As layer is aligned antiparallel to the\n\nFe layer at zero field, although the bias field is lower by\n\napproximately a factor of two.\n\nClear differences are observed between the Mn XMCD\n\nhysteresis loops obtained using TEY and FY detection\n\nmodes. For FY the magnitude of the XMCD is similar\n\n(but of opposite sign) at remanence and at high mag-\n\nnetic fields, whereas for TEY at remanence it is approx-\n\nimately a factor of two larger than at 1000 Oe. The\n\nMn L 2 , 3 XMCD spectra recorded at remanence and at\n\n1000 Oe, shown in Fig. 3, confirm this result. At re-\n\nmanence the FY and TEY detected XMCD have similar\n\nmagnitudes. However, under a large external field the\n\nXMCD is substantially smaller in TEY than in FY, con-\n\nfirming that the net magnetization of the Mn ions near\n\nthe interface is significantly less than in the bulk of the\n\n(Ga,Mn)As film. This is the case even up to the high-\n\nest field applied (20 kOe). By applying the XMCD sum rules <sup>14</sup> to the TEY data, and by comparing the spectra to\n\nprevious measurements on well-characterized (Ga,Mn)As", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "(c) they have provided the Department of Health and Social Care with a list of all\n\norganisations that they work with (whether by sub-contract or otherwise) to carry out the\n\ntesting service or to carry out genomic sequencing, indicating the nature of the service\n\nthat each organisation is providing and kept that list updated as appropriate;\n\n(d) in relation to a test which requires laboratory processing—\n\n(i) the person responsible for the taking of samples meets the relevant requirements for\n\naccreditation to ISO standard 15189 or ISO/IEC standard 17025 in respect of the\n\ntaking of samples, and\n\n(ii) the laboratory used by the test provider for the processing of samples meets the\n\nrelevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard\n\n17025 in respect of the processing of samples;\n\n(e) in relation to a point of care test, they meet the relevant requirements for accreditation to\n\nISO Standard 15189 and ISO standard 22870;\n\n(f) they receive the information required by paragraph 10(3) or (4) (as appropriate), and if\n\nthey administer the test to P, they do so no earlier than the end of the seventh day after the\n\nday on which P arrived in England;\n\n(g) each day, they notify the Secretary of State in writing of—\n\n(i) the number of tests they sold on that day, and\n\n(ii) in relation to each test sold on that day—\n\n(aa) the date of arrival in England of the person in respect of whom the test was\n\nsold, and\n\n(bb) whether the person in respect of whom the test was sold is a category 1 arrival\n\nor not;\n\n(h) if they arrange with another person (“X”) for X to carry out any element of the single\n\nend-to-end testing service on their behalf, the test provider ensures that X complies with\n\nthe following so far as relevant to the carrying out of that element—\n\n(i) paragraph 3(1)(e) to (i) of Schedule 10 as applied by paragraph (a) of this sub-\n\nparagraph,\n\n(ii) paragraph (b) to (g) of this sub-paragraph,\n\n(iii) paragraph 11(2), (3) and (4).\n\n(2) For the purposes of sub-paragraph (1)(h), “single end-to-end testing service” has the\n\nmeaning given in paragraph 3(2)(c) of Schedule 10.\n\n(3) For the purposes of sub-paragraph (1)(d) and (e), a person or laboratory (as the case may be)\n\nmeets the relevant requirements for accreditation to a standard where the person who is the\n\noperator of the laboratory complies with the requirements of regulation 6 of the Health Protection\n\n(Coronavirus, Testing Requirements and Standards) (England) Regulations 2020 as if—\n\n(a) a reference to an applicable test were a reference to a day 8 test;\n\n(b) a reference to a test provider were a reference to a private provider.\n\n###### **Required circumstances for undertaking a day 2 test or a day 8 test**\n\n**10.** —(1) The circumstances mentioned in regulation 6(12)(a) and (b) are as follows.\n\n(2) In relation to—\n\n(a) a day 2 test, P undertakes the test no later than the end of the second day after the day on\n\nwhich P arrived in England;\n\n(b) a day 8 test, P undertakes the test no earlier than the end of the seventh day after the day\n\non which P arrived in England.\n\n(3) Subject to sub-paragraph (4), at the time the test is booked P notifies the test provider that P\n\nis to undertake the test under these Regulations, and provides the test provider with—\n\n(a) the information set out in paragraph 4(b)(i) to (v) and (vii) to (xiii) of Schedule 10; and", - "page_start": 63, - "page_end": 63, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.2449.pdf", - "query": "What are the differences observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes ?", - "target_page": 2, - "target_passage": "For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high mag netic fields, whereas for TEY at remanence it is approx imately a factor of two larger than at 1000 Oe.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "- either fluorescent x-rays or electrons - of the photoex-\n\ncited core hole. The type of decay product measured\n\ndetermines the probing depth of the technique. For Mn\n\nL 2 , 3 absorption, the probing depths for FY and TEY de-\n\ntection are λ F Y ≈ 100 nm and λ T EY ≈ 3 nm. In the\n\ncurrent experiment, the Mn XMCD measured using FY\n\nand TEY are thus sensitive to the bulk of the (Ga,Mn)As\n\nfilm and the near-interface layers, respectively.\n\nFigure 2(a)-(c) shows the magnetic field dependence of\n\nXMCD asymmetry, defined as ( I l − I r ) / ( I l + I r ) where\n\nI l ( r ) is the absorption for left- (right-) circularly polarized\n\nx-rays. This is measured at the Fe and Mn L 3 absorption\n\npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K.\n\nThe external field is applied along the photon incidence\n\ndirection, which is at 70 <sup>◦</sup> to the surface normal with\n\nan in-plane projection along the [110] axis. The XMCD\n\ndata show that the Fe film displays a square hysteresis\n\nloop with a single magnetization switch, as expected for\n\na monocrystalline Fe film with strong uniaxial magnetic\n\nanisotropy. The Mn XMCD shows a more complicated\n\nloop due to the effect of the interlayer coupling. The pro-\n\njected Mn moment aligns antiparallel to the Fe moment\n\nat remanence, and undergoes a magnetization reversal of\n\nopposite sign to the Fe. With further increase of the ex-\n\nternal magnetic field, the Mn moment gradually rotates\n\naway from antiparallel alignment with the Fe layer, and\n\ninto the field direction. Qualitatively similar behavior\n\nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam-\n\nple: the (Ga,Mn)As layer is aligned antiparallel to the\n\nFe layer at zero field, although the bias field is lower by\n\napproximately a factor of two.\n\nClear differences are observed between the Mn XMCD\n\nhysteresis loops obtained using TEY and FY detection\n\nmodes. For FY the magnitude of the XMCD is similar\n\n(but of opposite sign) at remanence and at high mag-\n\nnetic fields, whereas for TEY at remanence it is approx-\n\nimately a factor of two larger than at 1000 Oe. The\n\nMn L 2 , 3 XMCD spectra recorded at remanence and at\n\n1000 Oe, shown in Fig. 3, confirm this result. At re-\n\nmanence the FY and TEY detected XMCD have similar\n\nmagnitudes. However, under a large external field the\n\nXMCD is substantially smaller in TEY than in FY, con-\n\nfirming that the net magnetization of the Mn ions near\n\nthe interface is significantly less than in the bulk of the\n\n(Ga,Mn)As film. This is the case even up to the high-\n\nest field applied (20 kOe). By applying the XMCD sum rules <sup>14</sup> to the TEY data, and by comparing the spectra to\n\nprevious measurements on well-characterized (Ga,Mn)As", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "measurements were performed on beamline I06 at the\n\nDiamond Light Source, and on beamline 4.0.2 at the Ad-\n\nvanced Light Source. Total-electron yield (TEY) and\n\nfluorescence yield (FY) were monitored simultaneously\n\nusing the sample drain current and the photocurrent of a\n\ndiode mounted at 90 <sup>◦</sup> to the incident beam, respectively.\n\nSQUID magnetometry measurements were\n\nfirst performed on control Fe/GaAs(001) and\n\n(Ga,Mn)As/GaAs(001) samples, grown under the\n\nsame conditions as the bilayers, to determine the\n\nmagnetic anisotropies of the individual layers and the\n\nCurie temperature of the (Ga,Mn)As layer. The Fe film\n\nhas a uniaxial magnetic anisotropy with easy axis along\n\nthe [110] orientation, similar to previous studies <sup>6</sup> . For\n\nthe (Ga,Mn)As control sample, there is a competition\n\nbetween cubic and uniaxial magnetic anisotropies, with\n\nthe former dominant at low temperatures and favoring\n\neasy axes along the in-plane ⟨ 100 ⟩ orientations, and the\n\nlatter dominant close to T C ( ∼ 35 K) giving an easy axis\n\nalong the [1 <sup>¯</sup> 10] orientation. Figure 1 shows [110] magne-\n\ntization versus temperature curves and low temperature\n\nhysteresis loops for a bilayer film containing a 20 nm\n\nthick (Ga,Mn)As layer. The total remnant moment of\n\nthe bilayer film decreases on cooling under zero magnetic\n\nfield below the T C of the (Ga,Mn)As, indicating that\n\nthis layer aligns antiparallel to the Fe magnetization\n\nat zero field. The hysteresis curve shows a two-step\n\nmagnetization reversal, indicating different behavior of\n\nthe Fe and (Ga,Mn)As layers, with the smaller loop\n\nattributed to the dilute moment (Ga,Mn)As film. The\n\nminor hysteresis loop shown in Fig. 1 clearly shows a\n\nshift from zero field by a bias field H E , indicating that\n\nthe Fe layer induces an exchange bias in the magnetic\n\nsemiconductor. The shape and size of the minor loop\n\nis in agreement with the hysteresis loop for the control\n\n(Ga,Mn)As sample, also shown in Fig. 1. This strongly\n\nindicates that the exchange bias affects the whole of the\n\n(Ga,Mn)As layer in the bilayer sample.\n\nSimilar behavior is observed for bilayer samples con-\n\ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a\n\nbias field which is approximately inversely proportional\n\nto the thickness d of the ferromagnetic semiconductor\n\nlayer (Fig. 1, inset). This 1/ d dependence of H E was found previously for MnAs/(Ga,Mn)As bilayers <sup>4</sup> , and\n\nis generally observed in exchanged-biased thin films <sup>12</sup> .\n\nFrom this dependence it is possible to describe the ex-\n\nchange bias in terms of an interface energy per unit area,\n\n∆ E = M F S H E d = 0 . 003 erg/cm <sup>2</sup> . This value is rather\n\nsmall compared to typical exchange bias systems <sup>12</sup> , re-\n\nflecting the low moment density M F S of the diluted\n\nFM semiconductor layer. However, the bias field for a\n\ngiven (Ga,Mn)As thickness is larger than is observed for\n\nMnO/(Ga,Mn)As structures <sup>13</sup> , while the reproducibility\n\nand flexibility of the present structures is much higher\n\ndue to the single-crystalline ferromagnetic nature of the\n\nFe layer.\n\nTo confirm the presence of AFM interlayer coupling,\n\nwe performed XMCD measurements at the Mn and Fe\n\nL 2 , 3 absorption edges in order to determine the magnetic\n\nresponse of the individual elements. In L 2 , 3 XMCD, elec-\n\ntrons are excited from a 2 p core level to the unoccupied\n\n3 d valence states of the element of interest by circularly\n\npolarized x-rays at the resonance energies of the transi-\n\ntions. The difference in absorption for opposite polariza-\n\ntions gives a direct and element-specific measurement of\n\nthe projection of the 3 d magnetic moment along the x-\n\nray polarization vector. The absorption cross-section is\n\nconventionally obtained by measuring the decay products\n\n- either fluorescent x-rays or electrons - of the photoex-\n\ncited core hole. The type of decay product measured\n\ndetermines the probing depth of the technique. For Mn", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" - }, - { - "text": "-0.004\n\n0.000\n\n0.004\n\n| (a) Fe TEY |\n|:---|\n| (b) Mn TEY |\n| (c) Mn FY |\n\n-0.2\n\n-0.1\n\n0.0\n\n0.1\n\n0.2\n\nXMCD asymmetry\n\n-250 0 250 500 750 1000\n\n-0.004\n\n0.000\n\n0.004\n\nField (Oe)\n\nFIG. 2. (color online) XMCD asymmetry versus applied field\n\nalong the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As\n\n(10 nm) film. (a) Fe L 3 , total electron yield; (b) Mn L 3 ,\n\ntotal electron yield; (c) Mn L 3 , fluorescent yield. Black and\n\nred points are data for increasing and decreasing fields respec-\n\ntively; lines are to guide the eye.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2449.pdf" - }, - { - "text": "640 650\n\n0.9\n\n1.0\n\n(d) H = 2 kOe, T = 300K\n\n(c) H = 1 kOe, T = 2K\n\n(a) absorption\n\n(b) H = 0, T = 2K\n\nX-ray absorption (arb. units)\n\nX-ray energy (eV)\n\nXMCD (arb. units)\n\nFIG. 3. (color online) (a) Polarization-averaged Mn L 2 , 3 spec- trum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured\n\nin remanence at 2 K; (c) XMCD spectra measured under a\n\n1000 Oe applied field at 2 K; (d) XMCD spectrum measured\n\nunder a 2000 Oe applied field at 300 K. XMCD spectra are\n\nobtained using TEY (thick red lines) and FY (thin blue lines)\n\ndetection.", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2449.pdf" - }, - { - "text": "samples <sup>15</sup> , the projected Mn 3 d magnetic moments are\n\nobtained as − 1.4 µ B and +0.8 µ B per ion at remanence\n\nand 1000 Oe, respectively.\n\nThe difference between these values can be understood\n\nas being due to an interface layer which is strongly anti-\n\nferromagnetically coupled to the Fe layer. At zero field,\n\nboth the interfacial and bulk Mn are aligned antiparallel\n\nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As\n\nlayer away from the interface is re-oriented into the exter-\n\nnal field direction. However, the interfacial Mn remains\n\nantiparallel to the Fe layer and thus partially compen-\n\nsates the XMCD signal from the bulk of the (Ga,Mn)As.\n\nFrom the size of the remanent and 1000 Oe magnetic\n\nmoments, it can be estimated that around 25-30% of the\n\nTEY XMCD signal can be ascribed to the interfacial Mn\n\nwhich is strongly coupled to the Fe moments.\n\nThe interfacial Mn moments are ascribed to the prox-\n\nimity polarization of the (Ga,Mn)As interface by the Fe\n\nlayer, such as was shown previously by XMCD as well as ab initio theory <sup>7</sup> . Evidence for this can be observed from\n\nmeasurement of the Mn L 2 , 3 XMCD signal at tempera-\n\ntures above the (Ga,Mn)As T C . Similar to the previous\n\nstudy <sup>7</sup> , we observe a small but not negligible signal at\n\nroom temperature (Fig. 3), with opposite sign to the Fe\n\nL 2 , 3 XMCD. Its spectral shape is characteristic of a local- ized electronic configuration close to d <sup>5</sup> , similar to bulk (Ga,Mn)As <sup>7,9,15</sup> but in contrast to Mn in more metallic\n\nenvironments such as Mn x Fe 1 − x <sup>7</sup> or MnAs <sup>16</sup> . A slight\n\nbroadening is observed on the low energy side of the Mn\n\nL 3 peak, which may be due to the different screening in-\n\nduced by proximity to the Fe layer. Since the measured\n\nintensity is attenuated with distance z from the surface\n\nas I = I 0 exp( − z/λ T EY ), the thickness of the strongly\n\ncoupled interface layer is estimated to be ∼ 0.7 nm or 2-3\n\nmonolayers, assuming a uniform distribution of Mn ions\n\nand magnetic moments throughout the (Ga,Mn)As film.\n\nThis is around a factor of three thinner than in Ref. <sup>7</sup> ,\n\nwhich could be due to the lower Mn concentration or the\n\ndifferent preparation method of the present samples.\n\nIn summary, we have demonstrated antiferromagnetic\n\ncoupling between Fe and (Ga,Mn)As layers in bilayer\n\nstructures. A markedly different coupling is observed for\n\nthe bulk of the (Ga,Mn)As layer and for Mn moments\n\nin the near-interface region. A thickness-dependent ex-\n\nchange bias field is observed to affect the whole of the\n\nbulk (Ga,Mn)As layer, which aligns antiparallel to the\n\nFe layer at low fields, and switches to parallel when the\n\nexternal field is large enough to overcome the bias field\n\nand the magnetocrystalline anisotropy fields. In contrast,\n\nthe interfacial Mn moments remain aligned antiparallel\n\nto the Fe layer even at 20 kOe, the largest field studied,\n\nand are polarized at temperatures well above the T C of\n\nthe bulk (Ga,Mn)As layer. The latter observation con-\n\nfirms the recently reported result of Ref. 7, in which\n\nthe Fe/(Ga,Mn)As bilayers were produced by a different\n\nmethod but showed qualitatively similar behavior of the\n\ninterfacial moments. Our results shed new light on the\n\nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which\n\nare of potential interest for room temperature spintron-\n\nics, and also offer a means of controlling the spin orien-\n\ntation in a FM semiconductor.\n\nWe acknowledge support from EU grants\n\nSemiSpinNet-215368 and NAMASTE-214499, and\n\nSTFC studentship grant CMPC07100. The Advanced\n\nLight Source is supported by the U.S. Department of\n\nEnergy under Contract No. DE-AC02-05CH11231.\n\nWe thank Leigh Shelford for help during the Diamond\n\nbeamtime.\n\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. Mac-\n\nDonald, Phys. Rev. B 59 , 9818 (1999); P. Sankowski and\n\nP. Kacman, Phys. Rev. B 71 , 201303(R) (2005); A. D.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" - }, - { - "text": "3\n\nnature portfolio | reporting summary\n\nApril 2023\n\nMaterials & experimental systems\n\nn/a Involved in the study\n\nAntibodies\n\nEukaryotic cell lines\n\nPalaeontology and archaeology\n\nAnimals and other organisms\n\nClinical data\n\nDual use research of concern\n\nPlants\n\nMethods\n\nn/a Involved in the study\n\nChIP-seq\n\nFlow cytometry\n\nMRI-based neuroimaging\n\nMagnetic resonance imaging\n\nExperimental design\n\nDesign type Structural & Diffusion MRI\n\nDesign specifications No task-based fMRI used in this manuscript.\n\nBehavioral performance measures N/A; no performance metrics collected\n\nAcquisition\n\nImaging type(s) Structural\n\nField strength 3\n\nSequence & imaging parameters High-resolution anatomical scans were acquired using a T1-weighted (T1w) magnetization prepared rapid gradient echo\n\n(MPRAGE) sequence (TR = 2500 ms, TE = 2.31 ms, T1 = 934 ms, flip angle = 7°, 0.8 mm thickness) followed by a gradient\n\necho fieldmap (TR = 758 ms; TE1 = 4.92 ms; TE2 = 7.38 ms; flip angle = 60°). A T2-weighted (T2w) turbo spin echo (TSE)\n\nscan was also acquired with an oblique coronal orientation positioned orthogonally to the main axis of the hippocampus\n\n(TR/TE = 9860/50 ms, flip angle = 122°, 0.4 × 0.4 mm2 in-plane resolution, 2 mm slice thickness, 38 interleaved slices\n\nwith no gap, total acquisition time = 5:42 min).\n\nArea of acquisition T1-weighted and dMRI scans = whole-brain\n\nT2-weighted scan = high-resolution imaging of medial temporal lobe\n\nDiffusion MRI Used Not used\n\nParameters TR = 4300 ms, echo time = 100.2 ms, 139 directions, b-max = 4990, FoV = 259 x 259 mm, 78 slices, 1.7986 x 1.7986 x 1.8 mm voxel resolution\n\nPreprocessing\n\nPreprocessing software Gray Matter Volume & Cortical Thickness:\n\nAdvanced Normalization Tools (ANTs), version 2.1.0\n\nFreeSurfer, version 7\n\nT2-weighted MTL scans:\n\nAutomatic Segmentation of Hippocampal Subfields (ASHS), version 7/2018\n\nDiffusion imaging:\n\nQSIprep, version 0.15.3\n\nDSI Studio, version Chen-2022-07-31\n\nNormalization Normalization differed by modality due to inherent limitations of applicable processing pipelines.\n\nGray Matter Volume & Cortical Thickness:\n\nAll analyses were kept in native subject-space to limit the amount of warping and leverage the advantages of a precision\n\nimaging design.\n\nT2-weighted MTL scans:\n\nT2w images were registered to the segmentation template (see below) using ANTs deformable registration.\n\nDiffusion imaging:\n\nInitial preprocessing through QSIprep normalized diffusion images to the skull-stripped T1w images. Diffusion images were\n\nthen reconstructed in MNI space using DSI studio’s Q-space Diffeomorphic Reconstruction.", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed4.pdf" - }, - { - "text": "gin of the interface magnetism then had to be inferred by\n\ncomparison to a series of reference samples <sup>7</sup> . Demonstra- tion of coupling between the bulk of the layers, i.e. , an\n\nexchange bias effect, would provide direct evidence of the\n\ninterface magnetic order. Moreover, such coupling would\n\noffer new means of manipulating the FM semiconductor\n\nspin state and utilizing the proximity polarization effect\n\nin a spintronic device.\n\nHere, we demonstrate an antiferromagnetic coupling\n\nand exchange bias in Fe/(Ga,Mn)As bilayer films, by\n\ncombining element-specific XMCD measurements and\n\nbulk-sensitive superconducting quantum interference de-\n\nvice (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers <sup>4,5</sup> (and in con-\n\ntrast to AFM coupled FM metal/FM metal exchange bias\n\nstructures <sup>10,11</sup> ) the layers are in direct contact without\n\na non-magnetic spacer in between. We distinguish in-\n\nterface and bulk (Ga,Mn)As layers that are respectively\n\nstrongly and weakly antiferromagnetically coupled to the\n\nFe overlayer. In agreement with Ref. <sup>7</sup> , the interface layer\n\nremains polarized at room temperature.\n\nThe Fe and (Ga,Mn)As layers of the present study\n\nwere both grown by molecular beam epitaxy in the same\n\nultra-high vacuum system, in order to ensure a clean in-\n\nterface between them. The (Ga,Mn)As layer of thickness\n\n10 to 50 nm was deposited on a GaAs(001) substrate\n\nat a temperature of 260 <sup>◦</sup> C, using previously established\n\nmethods <sup>3,8</sup> . A low Mn concentration of x ≈ 0 . 03 was\n\nchosen in order to avoid the formation of compensating\n\nMn interstitials. The substrate temperature was then\n\nreduced to ∼ 0 <sup>◦</sup> C, before depositing a 2 nm Fe layer,\n\nplus a 2 nm Al capping layer. In-situ reflection high\n\nenergy electron diffraction and ex-situ x-ray reflectivity\n\nand diffraction measurements confirmed that the layers\n\nare single-crystalline with sub-nm interface roughness.\n\nSQUID magnetometry measurements were performed us-\n\ning a Quantum Design Magnetic Property Measurement\n\nSystem. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "buildup may overpower the resisting torsional stiffness and “divergence” will occur. The divergence speed of the surfaces must be suf- ficiently high that the airplane does not en- counter this phenomenon within the normal operating envelope. Sweepback, short span, and high taper help raise the divergence speed. F/titter involves aerodynamic forces, inertia forces and the elastic properties of a surface. The distribution of mass and stiffness in a structure determine certain natural frequencies and modes of vibration. If the structure is sub- ject to a forcing frequency near these natural frequencies, a resonant condition can result with an unstable oscillation. The aircraft is subject to many aerodynamic excitations while in operation and the aerodynamic forces at various speeds have characteristic properties for rate of change of force and moment. The aerodynamic forces may interact with the structure in a fashion which may excite or negatively damp the natural modes of the structure and allow flutter. Flutter must not occur within the normal flight operating en- velope and the natural modes must be damped if possible or designed to occur beyond the limit speed. A’typical flutter mode is illus- ‘trated in figure 5.5. Since the problem is one of high speed flight, it is generally desirable to have ‘very high natural frequencies and flutter speeds well above the normal operating speeds. Any change of stiffness or mass distribution will alter the modes and frequencies and thus allow a change in the flutter speeds. If the aircraft is not properly maintained and excessive play and flexibility exist, flutter could occur at flight speeds below the limit airspeed. Compres&ility pmblems may define the limit airspeed for an airplane in terms of Mach num- ber. The supersonic airplane may experience a great decay of stability at some high Mach number or encounter critical structural or engine inlet temperatures due to aerodynamic heating. The transonic airplane at an excessive\n\n342", - "page_start": 359, - "page_end": 359, - "source_file": "00-80T-80.pdf" - }, - { - "text": "0 40 80 4\n\n5\n\n-1000 0 1000\n\n-4\n\n-2\n\n0\n\n2\n\n4\n\nH E (Oe)\n\nApplied f ield (Oe)\n\nMom ent (10 -5 em u)\n\n0 20 40 0\n\n100\n\n200\n\n300\n\nd (nm)\n\nH = 0.5 k Oe\n\nH = 0\n\nT (K)\n\nFIG. 1. (color) Main figure: Major (red/black) and minor\n\n(green) hysteresis loops along the [110] axis at 5 K, for a\n\nFe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop\n\nfor a control (Ga,Mn)As (20 nm) film along the same axis\n\n(blue). Left inset: Magnetization versus temperature for the\n\nFe/(Ga,Mn)As film at remanence (black) and under a 500 Oe\n\napplied field (red). Right inset: Exchange bias field versus\n\nthickness d of the (Ga,Mn)As film (points) and fit showing\n\n1/ d dependence (dashed line).\n\nM. Sawicki, M. Polini, J. Sinova, A. H. MacDonald, R. P.\n\nCampion, L. X. Zhao, N. R. S. Farley, T. K. Johal, G. van\n\nder Laan, C. T. Foxon, and B. L. Gallagher, Phys. Rev. B\n\n73 , 165205 (2006). 16 K. W. Edmonds, A. A. Freeman, N. R. S. Farley, K. Y.\n\nWang, R. P. Campion, B. L. Gallagher, C. T. Foxon, G.\n\nvan der Laan, and E. Arenholz, J. Appl. Phys. 102 , 023902\n\n(2007).", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2449.pdf" - }, - { - "text": "Image mode creates one-to-one mapping of logical block addresses (LBAs) between a\n\nvolume and an MDisk (LU presented by the virtualized storage). Image mode volumes have\n\nthe minimum size of one block (512 bytes) and always occupy at least one extent. An Image\n\nmode MDisk cannot be used as a quorum disk and no IBM Spectrum Virtualize system\n\nmetadata extents are allocated from it; however, all of the IBM Spectrum Virtualize copy\n\nservices functions can be applied to image mode disks. The difference between a managed\n\nmode volume (with striped extent allocation) and an image mode volume is shown in\n\nFigure 7-4.\n\n*Figure 7-4 Image mode volume versus striped volume*\n\nAn image mode volume is mapped to one, and only one, image mode MDisks and is mapped\n\nto the entirety of the MDisk. Therefore, the image mode volume capacity must be equal to the\n\nsize of the corresponding image mode MDisk. If the size of the (image mode) MDisk is not a\n\nmultiple of the MDisk group’s extent size, the last extent is marked as partial (not filled).\n\nWhen you create an image mode volume, the specified MDisk must be in unmanaged mode\n\nand must not be a member of a storage pool. As the image mode volume is configured, the\n\nMDisk is made a member of the specified storage pool ( Storage Pool_IMG_ *xxx* ).\n\nIBM Spectrum Virtualize also supports the reverse process, in which a managed mode\n\nvolume can be migrated to an image mode volume. The extent size that is chosen for this\n\nspecific storage pool must be the same as the extent size of the storage pool into which you\n\nplan to migrate the data off the image mode volumes. If a volume is migrated to another\n\nMDisk, it is represented as being in managed mode during the migration. Its mode changes to\n\n“image” only after the process completes.\n\nIt is a preferred practice to put image mode MDisks in a dedicated storage pool and use\n\na special name for it (for example, Storage Pool_IMG_ *xxx* ).", - "page_start": 267, - "page_end": 267, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_KCN_2013.pdf", - "query": "What is Kingsgate ?", - "target_page": 2, - "target_passage": "Kingsgate is a highly successful gold mining, development and exploration company with two operating gold mines and two advanced development projects.", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "**39**\n\n## Senior Management\n\nSenior Management\n\nKingsgate’s executives have a comprehensive\n\nrange of skills and experience including mine\n\ndevelopment and operations, exploration, finance\n\nand administration. They are supported by highly\n\nqualified specialists, whose backgrounds cover\n\nthe full scope of mining resources activities.\n\nSenior members of Kingsgate’s management\n\nteam are:\n\nGavin Thomas\n\nBSc (Geology), FAusIMM\n\nManaging Director and Chief Executive Officer\n\nGavin Thomas was appointed Chief Executive\n\nOfficer of Kingsgate in 2004 and joined the\n\nKingsgate Board on 16th November 2007. Gavin\n\nhas had a successful career in developing mining\n\ncompanies from the exploration phase into\n\nmid-tier gold or copper producers. He has over\n\n42 years of international experience in exploring\n\nfor, evaluating, developing, operating and\n\nreclaiming mines in North and South America,\n\nAustralia, the Southwest Pacific, Asia and\n\nEurope. Amongst Gavin’s credits is the discovery\n\nof “Lihir” in Papua New Guinea, one of the\n\nlargest gold deposits in the world. In particular,\n\nhe has extensive experience in Thailand and\n\nSouth America.\n\nDuane Woodbury\n\nBEc (Hons)\n\nChief Financial Officer\n\nDuane Woodbury was appointed Chief Financial\n\nOfficer of Kingsgate on 1 September 2011.\n\nDuane has a BEc (Hons) Degree and has worked\n\nin various financial, accounting and advisory\n\nroles during his career in a number of locations,\n\nincluding London, New York and Singapore. He\n\nhas been assisting Kingsgate in its business\n\ndevelopment initiatives since August 2007 and\n\nbrings over 20 years of experience in financial\n\nmarkets and corporate finance transactions,\n\nprincipally with the Macquarie Group.\n\nTim Benfield\n\nDip CSM (mining), MBA, MAusIMM\n\nChief Operating Officer\n\nTim Benfield joined Kingsgate in February 2012\n\nas Chief Operating Officer. Tim is a mining\n\nengineer with over 21 years underground and\n\nopen pit experience in the mining industry in\n\nboth operational and corporate roles. He has\n\noperational and project development experience\n\nin Australia, Africa and Saudi Arabia. This\n\nincludes 10 years with Barrick Gold of Australia\n\nwhere he provided support to four operating\n\nmines and two development projects. Tim was\n\nmost recently General Manager of the Pajingo\n\nGold mine in Queensland for Evolution Mining\n\nLimited.\n\nRoss Coyle\n\nBA, FCPA, FCIS\n\nGeneral Manager Finance and Administration\n\nCompany Secretary\n\nRoss Coyle joined Kingsgate in March 2011\n\nfollowing the Company’s acquisition of Dominion\n\nMining Limited and was with the Dominion\n\ngroup for over 25 years. He is a qualified\n\naccountant and has over 30 years experience in\n\nfinance and accounting within the resource\n\nindustry. He was Finance Director of Dominion\n\nfrom 1996. Ross was appointed Kingsgate’s\n\nCompany Secretary in September 2011.\n\nJoel Forwood\n\nBsc (Hons) FFin\n\nGeneral Manager Corporate and Markets\n\nJoel Forwood joined Kingsgate in November\n\n2010 and has over 27 years experience in the\n\nresource and investment industries covering\n\ninvestor relations, funds management and\n\nexploration. For over 12 years, he has been\n\nleading investor relations at a number of listed\n\ncompanies, most recently for Lihir Gold Limited.\n\nPrior to this he was a fund manager with\n\nQueensland Investment Corporation (QIC)\n\nfollowing his early career in mineral exploration\n\nwith BHP and corporate development with RGC.\n\nRonald James\n\nBSc (Geology), MAusIMM, MAIG\n\nGeneral Manager Exploration and Resource\n\nDevelopment\n\nRon James has 30 years of experience in explora-\n\ntion and mining at management level inclusive\n\nof setting up gold mines and exploration\n\nprojects from their earliest stages through to\n\ndevelopment and sustainability. Before joining\n\nKingsgate, he was Chief Mine Geologist at the\n\nGold Ridge Mine in the Solomon Islands and\n\nlater Group Exploration Manager for Ross Mining\n\nNL. Ron is familiar with the technical and oper-\n\nating requirements for emerging projects in a", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**10**\n\nFinance Report\n\nwww.kingsgate.com.au\n\nFinancing Arrangements\n\nCorporate loan facility\n\nKingsgate has a three year secured loan facility\n\nwith Investec which was amended during the\n\nyear. The amended facility has a limit of $40\n\nmillion (30 June 2012: $50 million), of which $20\n\nmillion has been drawn down as at 30 June 2013\n\n(30 June 2012: $40 million).\n\nConvertible loan facility\n\nKingsgate has a five year A$35 million convert-\n\nible loan facility with Investec entered into in a\n\nprior period to provide funding for the Bowdens\n\nacquisition. Kingsgate has the option to make a\n\nprepayment against the facility with an issue of\n\nKingsgate shares.\n\nRestructure of corporate loan and\n\nconvertible loan facilities\n\nAs indicated previously in the Preliminary Final\n\nreport, at balance date it was the Group’s inten-\n\ntion to restructure and amalgamate these\n\nfacilities in the next financial year. This relates to\n\nthe potential for completion of the Initial Public\n\nOffering (“IPO”) of Akara on the Stock Exchange\n\nof Thailand and the updated mine plan for\n\nChallenger. Any restructure would optimise the\n\nGroup’s anticipated balance sheet liquidity and\n\noperational cash flows. Accordingly, the Group\n\nclassified the total amount drawn down under\n\nthese facilities of $55 million as a current liability\n\nat 30 June 2013.\n\nSubsequent to the end of the financial year, the\n\nGroup received from its lenders a credit\n\napproved term sheet (subject to formal docu-\n\nmentation) for the restructure of the corporate\n\nloan and convertible loan facilities. Following\n\ncompletion of the restructure the total amount\n\noutstanding will be reduced to $40 million. This\n\nloan will be provided through a single senior\n\ncorporate facility which will consist of two\n\ntranches:\n\n〉 〉 Tranche one will be a $25 million Akara Pre\n\nIPO Bond with a maturity date of 31 July\n\n2015. The current intention is for this\n\ntranche to be repaid as part of the Akara IPO,\n\nalthough at Kingsgate’s election repayment\n\ncan be made by either cash or in Kingsgate’s\n\nshares.\n\n〉 〉 Tranche two is an amortising facility with $5\n\nmillion to be repaid during the 2014 financial\n\nyear and the balance of $10 million repaid\n\nduring the 2015 financial year.\n\nConvertible revolving credit facility\n\nThe Group also has a three year $25 million\n\nConvertible Revolving Credit Facility available.\n\nAs at the date of this report the facility is\n\nundrawn. Under the terms of this facility,\n\nKingsgate has the option of repaying any funds\n\ndrawn down under the facility through either\n\ncash or by issuing ordinary shares. It is intended\n\nthat this facility will be utilised during the 2014\n\nfinancial year for corporate and working capital\n\npurposes. It is the current intention of the\n\ncompany to repay any cash drawdown under the\n\nfacility by the issuance of fully paid ordinary\n\nshares which would rank parri pasu with all\n\nexisting ordinary shares, although this position\n\nwill be reviewed at the appropriate time. The\n\nnumber of shares has not yet been determined\n\nand they will be issued at a 2.5% discount to\n\nVWAP over a period by reference to the draw\n\ndown date. Shareholder approval is not required.\n\nMulti-currency and syndicated\n\nloan facilities\n\nKingsgate’s Thai operating subsidiary, Akara,\n\nestablished a six year amortising multi-currency\n\nloan facility equivalent to US$125 million (fully\n\ndrawn as at period end) and an additional Thai\n\nBaht denominated working capital facility\n\nequivalent to US$15 million (undrawn as at year\n\nend) during the period. The proceeds from these\n\nborrowings were used to fully repay the\n\noutstanding balance on the US$100 million Baht\n\ndenominated syndicated loan facility in exist-\n\nence at the beginning of the period as well as to\n\nrepay part of the corporate loan facility noted\n\nabove.\n\nFinancial Position\n\nShareholders’ equity at 30 June 2013 was $474\n\nmillion (2012: $776 million). The decrease of\n\n$302 million reflects the year’s loss together\n\nwith dividends paid.\n\nDividends", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**110**\n\n32. Parent entity financial information continued\n\nContingent liabilities of the parent entity\n\nBank guarantees have been given by Kingsgate’s controlled entities to participating banks in the syndicated loan facility and revolving loan facility as\n\ndescribed in Note 16 as part of the security package.\n\nThese guarantees may give rise to liabilities in the parent entity if the controlled entities do not meet their obligations under the terms of the loans subject\n\nto guarantees. No material losses are anticipated in respect of the above contingent liabilities.\n\n### 33. Sale of exploration assets\n\nOn 28 March 2013, the Group sold its exploration assets in Western Australia and Queensland through the sale of shares in its subsidiary company, Quadrio\n\nResources Limited, to Caravel Minerals Limited (“Caravel”), an Australian company listed on the ASX.\n\nKingsgate received 135,000,000 fully paid ordinary shares in the issued capital of Caravel and 20,000,000 unlisted options to acquire Caravel shares\n\nexercisable at 10 cents on or before three years from the date of issue. Subsequent to the sale, Kingsgate became the largest shareholder in Caravel with\n\n35.54% held at 30 June 2013. Kingsgate’s holding in Caravel reduced to 27.04% post 30 June 2013 following a rights issue by Caravel that Kingsgate did\n\nnot participate in.\n\nThe financial impact of the sale transaction as at the date of disposal is summarised below:\n\nFair value of consideration 2013\n\n$’000\n\n135,000,000 Caravel shares at $0.025 per share 3,375\n\n20,000,000 unlisted Caravel options -\n\nTotal consideration 3,375\n\nCarry value of the exploration assets sold 20,084\n\nLoss on sale 16,709", - "page_start": 111, - "page_end": 111, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**30**\n\n## Exploration Report\n\nwww.kingsgate.com.au\n\n**Exploration Report**\n\nSummary\n\nKingsgate has a portfolio of exploration tene-\n\nments and applications in Thailand, Chile and Lao\n\nPDR. Following the sale of exploration tenements\n\nto Caravel Minerals, exploration in Australia is\n\ncurrently only conducted in the vicinity of the\n\nChallenger Mine in South Australia and the\n\nBowdens Silver Project in New South Wales.\n\nKingsgate’s South East Asian exploration team\n\ncontinued their exploration activities on Thailand\n\nand surrounding countries. Strategically the\n\nteam has turned the majority of their attention\n\nto projects which have the capacity to add value\n\nto the Company through exploration drilling\n\nsubsequent resource expansion. These projects\n\ninclude the granted Mining Leases at Chatree\n\nand the granted Sayabouly Concession in the\n\nLao PDR.\n\nOutside of these active areas, the South East\n\nAsian exploration team continues to review new\n\nopportunities throughout Thailand, Laos and\n\ntheir neighbouring countries.", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Directors’ Report\n\n**42**\n\nYour Directors present their report on the Group consisting of Kingsgate Consolidated Limited and the entities it controlled at the end of,\n\nor during, the year ended 30 June 2013.\n\nDirectors\n\nThe following persons were Directors of\n\nKingsgate Consolidated Limited during the\n\nwhole of the financial year and up to the date of\n\nthis report.\n\n〉 〉 Ross Smyth-Kirk Chairman\n\n〉 〉 Peter Alexander Non-Executive Director\n\n〉 〉 Craig Carracher Non-Executive Director\n\n〉 〉 Peter McAleer Non-Executive Director\n\n〉 〉 Gavin Thomas Executive Director\n\nPrincipal activities\n\nThe principal activities of Kingsgate\n\nConsolidated Limited are mining and mineral\n\nexploration in Australia, South East Asia and\n\nSouth America.\n\nDividends\n\nDividends paid to members during the financial\n\nyear were as follows:\n\n2013\n\n$’000 2012\n\n$’000\n\nFinal dividend declared for the year ended 30 June 2012 of\n\n10 cents per fully paid share paid on 1 October 2012 15,148 6,829\n\nInterim dividend declared for the year ended 30 June 2013 of\n\n5 cents per fully paid share paid on 12 April 2013 7,591 15,196\n\nTotal dividends 22,739 22,025\n\nReview of operations and results\n\nOperational performance\n\nKingsgate is a gold mining, development and\n\nexploration company based in Sydney, Australia.\n\nKingsgate owns and operates two gold mines,\n\nthe world class Chatree Mine in Thailand and the\n\nunderground Challenger Mine in South Australia.\n\nIn addition, the Company has two advanced\n\ndevelopment projects, the Nueva Esperanza\n\nSilver / Gold Project, in the highly prospective\n\nMaricunga Gold / Silver Belt in Chile, and the\n\nBowdens Silver Project in New South Wales,\n\nAustralia. From this operating and development\n\nplatform, Kingsgate aims to build value for all\n\nshareholders.\n\nGroup gold production was 199,897 ounces, a\n\ndecrease of 4% on the previous corresponding\n\nyear. The contribution from Chatree was\n\n133,681 ounces with 66,216 ounces from\n\nChallenger.\n\nChatree gold production was 10% higher than\n\nthe previous corresponding period as a result of\n\nan increase in throughput from the expanded\n\nChatree process plant and access to higher\n\ngrade oxide ore from Q Prospect.\n\nChallenger gold production was 24% lower than\n\nthe previous corresponding year given additional\n\ndilution and depletion at Challenger Deeps and a\n\nshortfall in planned development. This resulted\n\nin lower ore tonnes from the mine that was\n\nsupplemented by low grade stockpiled ore.\n\nFollowing the fall in the gold price a strategic\n\nreview of Challenger was implemented that has\n\nresulted in a new mine plan to focus primarily on\n\nthe higher grade Challenger West orebody. The\n\nnew mine plan will be implemented during the\n\nfirst three months of the 2014 financial year.\n\nA lower gold price and industry wide cost pres-\n\nsures had a negative impact on the underlying\n\nearnings of the Group which contributed to a\n\nmajor impairment to the carrying value of a\n\nnumber of Group assets, particularly assets\n\nrelating to the Challenger Gold Operations.\n\nImpairments totalling $332,808,000 were the\n\nmajor contributor to the after tax loss of\n\n$323,726,000 for the year.\n\nThe development projects continued to advance\n\nduring the year. At Nueva Esperanza, the feasi-\n\nbility work shifted to focus on identifying the\n\nlowest cost and lowest power consumption\n\ndevelopment alternatives. This included\n\nreviewing a heap leach process option with\n\non-site power generation. Further work is\n\nexpected to be completed in the December\n\nquarter 2013. At Bowdens, the feasibility work\n\nhas confirmed the optimum process route.\n\nCompletion of the technical feasibility study\n\nincluding mine planning, infrastructure and\n\nmetallurgy, and lodging of the Environmental\n\nImpact Statement (“EIS”) are scheduled for\n\n2014.\n\n**Directors’ Report**", - "page_start": 43, - "page_end": 43, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "via profits and dividends despite a difficult\n\nexternal environment. Shareholders can look\n\nforward to a steady performance from Chatree\n\nand a turn-around at Challenger coupled with the\n\ncompletion of feasibility studies at the two major\n\ndevelopment projects over the coming year.\n\nI would also like to thank our Chief Executive\n\nOfficer and Managing Director, Gavin Thomas,\n\nKingsgate management and all of the Kingsgate,\n\nAkara and Challenger personnel and the project\n\nteams for their part in delivering the operational\n\nperformance during what was a difficult year for\n\nyour Company.\n\n* **The Board** * * **of Kingsgate is** * * **determined to** * * **re-establish the** * * **path to building** * * **shareholder wealth** * * **via profits and** * * **dividends...** *\n\nRoss Smyth-Kirk\n\nDirector\n\n**Chairman’s Review**", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**94**\n\n### 21. Controlled entities\n\nEntity\n\nCountry of\n\nIncorporation\n\nClass of\n\nshares\n\nEquity holding\n\n2013\n\n%\n\n2012\n\n%\n\nParent Entity\n\nKingsgate Consolidated Limited\n\nSubsidiaries\n\nDominion Mining Ltd Australia Ordinary 100 100\n\nChallenger Gold Operations Pty Ltd(i) Australia Ordinary 100 100\n\nQuadrio Resources Limited(ii) Australia Ordinary - 100\n\nGawler Gold Mining Pty Ltd Australia Ordinary 100 100\n\nDominion Copper Pty Ltd Australia Ordinary 100 100\n\nDominion Metals Proprietary Limited Australia Ordinary 100 100\n\nYilgarn Metals Limited Australia Ordinary 100 100\n\nKingsgate Treasury Pty Ltd(iii) Australia Ordinary 100 100\n\nKingsgate Bowdens Pty Limited Australia Ordinary 100 100\n\nKingsgate Capital Pty Ltd Australia Ordinary 100 100\n\nKingsgate Nominees Pty Limited Australia Ordinary 100 100\n\nKingsgate South America Pty Ltd Australia Ordinary 100 100\n\nLaguna Resources NL Australia Ordinary 100 100\n\nLaguna Exploration Pty Ltd Australia Ordinary 100 100\n\nAkara Mining Limited (iv) Thailand Ordinary 100 100\n\nIssara Mining Ltd Thailand Ordinary 100 100\n\nSuan Sak Patana Ltd Thailand Ordinary 100 100\n\nPhar Mai Exploration Ltd Thailand Ordinary 100 100\n\nRichaphum Mining Ltd Thailand Ordinary 100 100\n\nPhar Lap Ltd Thailand Ordinary 100 100\n\nPhar Rong Ltd Thailand Ordinary 100 100\n\nDominion (Lao) Co., Ltd Laos Ordinary 100 100\n\nLaguna Chile Ltda Chile Ordinary 100 100\n\nMinera Kingsgate Limitada Chile Ordinary 100 100\n\nKingsgate Peru SRL Peru Ordinary 100 100\n\nMinera Kingsgate Argentina S.A. Argentina Ordinary 100 100\n\n*(i)* *Challenger Gold Operations Pty Ltd changed its name from Dominion Gold Operations Pty Ltd on 26 March 2013.*\n\n*(ii)* *Quadrio Resources Limited was sold by the Group during the year.*\n\n*(iii)* *Kingsgate Treasury Pty Ltd changed its name from Yilgarn Metals Exploration Pty Ltd on 29 November 2012.*\n\n*(iv)* *Akara Mining Limited changed its name to Akara Resource Public Company Limited on 29 August 2013.*", - "page_start": 95, - "page_end": 95, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**62**\n\n## Auditor’s Independence Declaration\n\nAs lead auditor for the audit of Kingsgate Consolidated Limited for the year ended 30 June 2013,\n\nI declare that to the best of my knowledge and belief, there have been:\n\na) \u0007no contraventions of the auditor independence requirements of the *Corporations Act 2001*\n\nin relation to the audit; and\n\nb) no contraventions of any applicable code of professional conduct in relation to the audit.\n\nThis declaration is in respect of Kingsgate Consolidated Limited and the entities it controlled during\n\nthe period.\n\nBrett Entwistle\n\nPartner\n\nPricewaterhouseCoopers\n\n23 September 2013\n\nAuditor’s Independence Declaration\n\n**Auditor’s Independence Declaration**", - "page_start": 63, - "page_end": 63, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "THAILAND\n\nAUSTRALIA\n\n* **Kingsgate is a highly successful gold** *\n\n* **mining, development and exploration** *\n\n* **company with two operating gold mines** *\n\n* **and two advanced development projects.** *\n\n* **Shareholders can look forward to the** *\n\n* **benefits of this strong operating and** *\n\n* **development platform, where Kingsgate** *\n\n* **aims to build value though operating,** *\n\n* **earnings and dividend growth for** *\n\n* **the benefit of all stakeholders.** *", - "page_start": 1, - "page_end": 1, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "over 600 days Lost Time Injury free since\n\nKingsgate exploration and pre-development\n\nactivities began on site.\n\nEnvironmental, regulatory and NSW Govern-\n\nment approvals remain the key determinants to\n\nthe timing of project development at Bowdens.\n\nOf particular note were two recent NSW Land\n\nand Environment Court decisions relating to the\n\noverturning of existing mining approvals that will\n\nrequire extra diligence and consideration as the\n\nBowdens Project moves forward. Community\n\nrelations was undertaken throughout the year\n\nutilising a variety of techniques including:\n\nletters, telephone calls, attendance at trade\n\nshows, industry presentations, site tours,\n\nCommunity Liaison Group meetings, govern-\n\nmental meetings and two open days.\n\nThe open days were highly successful in\n\nengaging with the community with more than\n\n200 local people providing feedback on a range\n\nof topics. Sentiment capture and management\n\nremains an important aspect for the project as\n\npart of the ongoing community relations\n\nprogram, and a full time Community and\n\nGovernment Relations Manager has been\n\nengaged on that basis.", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_KCN_2013.pdf", - "query": "What does demonstatre the feasibility study on the Nueva Esperanza Project ?", - "target_page": 6, - "target_passage": "The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible, although high capital and power costs negatively impacted project economic returns. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "70°\n\n50°\n\n20°\n\n30°\n\n40°\n\n3\n\nCOPIAPO\n\nNUEVA ESPERANZA\n\nCOPIAPO\n\nNUEVA ESPERANZA\n\nSantiago\n\nLa Serena\n\nAntofagasta\n\nChañaral\n\nA R G E N T I N A\n\nB O L I V I A\n\nP E R U\n\n**28**\n\nProjects Report\n\n## **Nueva Esperanza Project**\n\nChile\n\nSummary\n\nThe Nueva Esperanza Project is 100% owned\n\nby Kingsgate since February 2012. Nueva\n\nEsperanza is located in the Maricunga Gold Belt\n\nnear Copiapó, a regional mining centre in\n\nNorthern Chile. The silver-rich mineralisation is\n\nhosted by the Esperanza high-sulphidation\n\nepithermal alteration system associated with\n\nthe Cerros Bravos volcanic complex.\n\nThe project consists of three well-defined miner-\n\nalised deposits and a number of undeveloped\n\nexploration targets. The main deposits are\n\nArqueros, Chimberos and Teterita. Arqueros was\n\npreviously mined on a limited scale by under-\n\nground methods and Chimberos was exploited\n\nas an open pit mine, delivering about 40 million\n\nounces of silver in 1998/99. All three deposits\n\ncurrently have a combined Mineral Resources of\n\nabout 93 million ounces of silver equivalent or\n\n1.6 million ounces of gold equivalent (EQ60) <sup>1</sup> .\n\nA feasibility study for a decision to mine the\n\nArqueros portion of Nueva Esperanza was\n\ncompleted in late 2012, demonstrating that open\n\npit mining at two million tonnes per year and\n\nprocessing by milling and agitation leaching in\n\ncyanide was technically feasible. Work remained\n\nto integrate the Teterita and Chimberos deposits\n\ninto the project, as well as to test lower cost\n\noptions for processing. Continued metallurgical\n\ntestwork has shown that mineralisation from all\n\nthree deposits by heap leaching is technically and\n\neconomically feasible and the preferred alterna-\n\ntive for development.\n\nEnvironmental approvals to commence\n\nconstruction and mining at Nueva Esperanza\n\nwere granted in July 2013 for the original\n\nArqueros project. Work is underway to modify\n\nand update the environmental assessment to\n\nincorporate the heap leach process.\n\nu\n\n1 \u0007Equivalence is based on gold/silver price ratio\n\nof 60. Gold equivalence = gold content plus\n\n(silver content *divided* by 60), whereas Silver\n\nequivalent silver content plus (gold content\n\nmultiplied by 60).", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**4**\n\nManaging Director and CEO’s Report\n\nwww.kingsgate.com.au\n\nDevelopment Projects\n\nBowdens\n\nThe Bowdens Project continued to advance\n\nduring the year with field programs supporting\n\nthe ongoing feasibility and environmental\n\nstudies. Sterilisation drilling and additional\n\nmetallurgical sampling were undertaken with\n\nthe resource evaluation drilling completed in\n\nOctober 2012.\n\nDuring 2013, the process design and engineering\n\nwork for the Definitive Feasibility Study (“DFS”)\n\nprogressed to a point where the draft study was\n\nclose to completion as at 30 June 2013. The study\n\nencompassed detailed process design based on\n\nusing the most recent metallurgical test results,\n\ncapital and operating cost estimates, project\n\nwater and power supply, infrastructure require-\n\nments and mine optimisation.\n\nThe preparation for lodgement of an Environ-\n\nmental Impact Statement (“EIS”) to the NSW\n\nDepartment of Planning continues. It is envis-\n\naged that the EIS will be completed and lodged\n\nin 2014. Data for flora and fauna, surface water,\n\ngroundwater, meteorology, ambient noise and\n\ndust levels are collected routinely. Further inves-\n\ntigations of cultural heritage, social-economic\n\nimpact, traffic impact, soil type and agricultural\n\nsuitability have also been undertaken.\n\nWith the fall in metal prices in late 2013, work\n\nand expenditure on the DFS and EIS have been\n\nphased to coordinate and synchronise the\n\ntiming of the two programs with completion\n\nand lodgement now not expected before\n\nmid-2014.\n\nNueva Esperanza\n\nThe Nueva Esperanza Project was advanced\n\nduring the year with the completion of a draft\n\nfeasibility study. This study included a decision\n\nto mine the Arqueros and Teterita portions of\n\nNueva Esperanza. The study demonstrated that\n\nopen pit mining at two million tonnes per year\n\nand processing by milling and agitation leaching\n\nin cyanide was technically feasible, although\n\nhigh capital and power costs negatively\n\nimpacted project economic returns.\n\nAs a consequence, feasibility work has tran-\n\nsitioned to assess a lower capital cost and lower\n\npower requirement options, namely the poten-\n\ntial for heap leach processing. Metallurgical\n\ntestwork recently completed demonstrated\n\nthat processing of mineralisation from all three\n\ndeposits by heap leaching has the potential to\n\nbe technically and economically feasible and as\n\na consequence may become the preferred\n\nalternative for development.\n\nEnvironmental approval for the original Arqueros\n\nProject was granted in July 2013.\n\nFinancials\n\nKingsgate made an after tax loss of $323.7\n\nmillion for the full year to 30 June 2013 compared\n\nto an after tax profit of $75.0 million for the\n\nprevious corresponding year. The result for the\n\nyear reflected an impairment of $311.9 million\n\npre-tax ($291.3 million post-tax) against the\n\nChallenger Mine and associated assets and an\n\nimpairment of $20.4 million against greenfield\n\nexploration projects in Australia and Thailand.\n\n**Financial Summary** 2013\n\n$000 2012\n\n$000\n\nTotal sales revenue 329,282 357,372\n\nEBITDA before significant items 115,845 168,583\n\n(Loss) / profit before tax (339,615) 91,277\n\nIncome tax benefit / (expense) 15,889 (16,271)\n\n(Loss) / profit after income after tax (323,726) 75,006\n\nDividend declared (¢/share) 5 20", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "The environmental permitting process for the\n\noriginal Arqueros project has been completed,\n\nwith approval to commence construction and\n\nmining granted by the Chilean authorities.\n\nA modification of the environmental assessment\n\nis being prepared to have the approvals modified\n\nfor heap leaching and on-site power generation.\n\nExtensive community consultation has been\n\nundertaken with positive outcomes, and rela-\n\ntionships with indigenous rural and urban\n\ncommunities remain a priority.\n\nProjects Report", - "page_start": 30, - "page_end": 30, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "cyanide was technically feasible although high\n\ncapital and power costs negatively impacted\n\nproject economic returns.\n\nAs a consequence, feasibility work has transi-\n\ntioned to assess a lower capital cost and lower\n\npower requirement option, namely the potential\n\nfor heap leach processing. Recently completed\n\nmetallurgical testwork demonstrated that\n\nprocessing of mineralisation from all three\n\ndeposits by heap leaching has the potential to\n\nbe technically and economically feasible and, as\n\na consequence, may become the preferred\n\nalternative for development.\n\nEnvironmental approval for the original Arqueros\n\nProject was granted in July 2013.\n\nBowdens Silver Project\n\nThe Bowdens Project continued to advance\n\nduring the year with field programs supporting\n\nthe feasibility and environmental studies\n\nongoing. Sterilisation drilling and additional\n\nmetallurgical sampling were undertaken with\n\nthe resource evaluation drilling completed in\n\nOctober 2012.\n\nDuring 2013, the process design and engi-\n\nneering work for the Definitive Feasibility Study\n\n(“DFS”) progressed to a point where the study\n\nwas close to draft completion as at 30 June\n\n2013. The study encompassed detailed process\n\ndesign based on using the most recent metal-\n\nlurgical test results, capital and operating cost\n\nestimates, project water and power supply,\n\ninfrastructure requirements and mine\n\noptimisation.\n\nThe preparation for lodgement of an EIS to the\n\nNSW Department of Planning continues. It is\n\nenvisaged that the EIS will be completed and\n\nlodged in 2014. Data for flora and fauna, surface\n\nwater, groundwater, meteorology, ambient\n\nnoise and dust levels are collected routinely.\n\nFurther investigations of cultural heritage,\n\nsocial-economic impact, traffic impact, soil\n\ntype and agricultural suitability have also been\n\nundertaken.\n\nWith the fall in metal prices in late 2013, work\n\nand expenditure on the DFS and EIS have been\n\nphased to coordinate the two programs with\n\ncompletion and submission now not expected\n\nbefore mid-2014.\n\nExploration\n\nThe Group has a portfolio of exploration tene-\n\nments and applications in Thailand, Chile and\n\nLao PDR. Following the sale of exploration\n\ntenements to Caravel (refer below), exploration\n\nin Australia is currently only conducted in the\n\nvicinity of the Challenger Mine in South Australia\n\nand the Bowdens Silver Project in New South\n\nWales.\n\nSale of Exploration Assets\n\nOn 28 March 2013, the Group sold its explora-\n\ntion assets in Western Australia and Queensland\n\nthrough the sale of shares in its subsidiary\n\ncompany, Quadrio Resources Limited, to Caravel\n\nMinerals Limited (“Caravel”), an Australian\n\ncompany listed on the ASX.\n\nKingsgate received 135,000,000 fully paid\n\nordinary shares in the issued capital of Caravel\n\nand 20,000,000 unlisted options to acquire\n\nCaravel shares exercisable at 10 cents on or\n\nbefore three years from the date of issue.\n\nSubsequent to the sale, Kingsgate became the\n\nlargest shareholder in Caravel with 35.54% held\n\nat 30 June 2013. Kingsgate’s holding in Caravel\n\nreduced to 27.04% post 30 June 2013 following\n\na rights issue by Caravel that Kingsgate did not\n\nparticipate in.\n\ncontinued", - "page_start": 44, - "page_end": 44, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "community healthcare in the two municipalities. The project team\n\nincluded three individuals representing users from the Nordland\n\nMS Association, along with an MS nurse and a neurologist from\n\nthe MS-outpatient clinic, and three physiotherapists/ researchers.\n\n#### 2.4 Research team and re fl exivity\n\nAll researchers on the team are clinical specialists in\n\nneurological physiotherapy. BN and ECA developed the\n\nCoreDISTparticipation intervention, and SSHD contributed to\n\nthe development of the outdoor part.\n\nThe researchers ’ closeness to the intervention and the\n\nclinical fi eld may have strengthened the depth and relevance\n\nof their interpretations in this study ( 27 ), as it was easy to\n\nunderstand what participants described and helped form\n\nfollow-up questions during the interviews. However, closeness\n\nmay also produce a risk of “ blind spots ” , as the researchers\n\nmay prejudice participants ’ experiences, omitting questions\n\nwhere the answers are believed to be obvious ( 27 ). Thus,\n\nthroughout the process, trustworthiness and rigor were\n\nenhanced by discussing the methodology, fi ndings, and\n\ninterpretations with external researchers (including specialists\n\nin enactive theory), as well as user representatives. The\n\npresented theoretical framework (enactive theory) enhanced\n\nthe distance to the material, as recommended in qualitative\n\nresearch ( 28 ).\n\n#### 2.5 Recruitment and participants\n\nPrior to recruitment, the study was introduced to individuals\n\nwith multiple sclerosis (pwMS) through a seminar hosted by the\n\nNordland MS Association. Additionally, seminars were\n\nconducted for health professionals in community healthcare and\n\nat the regional hospital. Written information about this study\n\n(and the RCT) was sent from the MS clinic at the regional\n\nhospital by post to all eligible individuals af fi liated with the\n\nhospital. Individuals who wished to participate signed the\n\nattached consent form and returned it in the pre-stamped\n\nenvelope. The inclusion criteria were as follows: had been\n\ndiagnosed with MS, had a score on the Expanded Disability\n\nStatus Scale (EDSS) ( 29 ) of ≤ 3.5, was ≥ 18 years, was employed\n\n(10% - 100% of full-time) and residential address in the two\n\nprede fi ned municipalities. The exclusion criteria were as follows:\n\npregnancy, exacerbation of symptoms within two weeks prior to\n\nenrollment and other serious conditions compromising balance,\n\nwalking or work capacity. All participants in the intervention\n\ngroup of the RCT ( n = 15) were included ( Table 3 ).\n\n#### 2.6 Data collection\n\nThe interview guide ( Table 4 ) was developed based on literature\n\nreviews, clinical experience and discussions within the research\n\ngroup and with user representatives. Two test interviews were\n\nconducted (with pwMS who were not part of the sample), and the\n\ninterview guide was then re fi ned around the following themes:\n\noverall experience and re fl ections from participation, content,\n\noutdoor setting, the group, and the physiotherapists. Questions\n\nwere open-ended to capture rich, in-depth re fl ections regarding\n\nparticipants ’ experiences, following a phenomenological approach.\n\nThe interviewer asked for both negative and positive experiences\n\nTABLE 4 Interview guide.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "correlated (see Figure 12 ). We preferred to propose\n\ndatasets even if they could introduce biases rather\n\nthan not address the task in the benchmark. Note\n\nthat each task type can be considered individually.\n\nWe hope additional resources will be developed\n\nin the French-speaking community to enrich our\n\ncomparison.\n\n**Benchmark validity over time** As with all\n\nbenchmarks, their reliability over time can be dis-\n\ncussed as the field evolves fast. The models se-\n\nlected for the analysis conducted in this paper are\n\nthose available at this time, new outperforming\n\nmodels will be created and shall be evaluated. Our\n\nwork extends MTEB and thus simplifies the ad-\n\ndition of new datasets for evaluation and allows\n\nrunning new models. With this effort, we hope\n\nthis will simplify the evaluation of new models pro-\n\nposed by the community to keep our work up to\n\ndate.\n\n**Data contamination issues** Bias may exist for\n\nmodels that use the training sets of the provided\n\nevaluation datasets for their training. It consider-\n\nably improves their performance on the benchmark,\n\nfavouring them over other models. This is particu-\n\nlarly worrying for models that do not communicate\n\nabout the datasets used during training, such as pro-\n\nprietary models. Generally speaking, it would be\n\ninteresting to calculate the similarity between the\n\ndatasets used to train the models and those used to\n\ntest them to check that they are far enough apart to\n\ndraw general conclusions.\n\n**Focus on sentence embeddings** Finally, like the\n\noriginal version of MTEB, the comparison focuses\n\nmainly on sentence embeddings. Other tasks could\n\nbe added to cover word embeddings and, therefore,\n\nmore NLP tasks.\n\n**Acknowledgements**\n\nWe would like to thank Wikit <sup>11</sup> and Esker <sup>12</sup> for\n\nproviding compute and funding this research.\n\n**References**\n\nDavid Ifeoluwa Adelani, Marek Masiak, Israel Abebe Azime, Jesujoba Oluwadara Alabi, Atnafu Lam- bebo Tonja, Christine Mwase, Odunayo Ogun- depo, Bonaventure F. P. Dossou, Akintunde Oladipo, Doreen Nixdorf, Chris C. Emezue,\n\n11 [https://www.wikit.ai/](https://www.wikit.ai/)\n\n12 [https://www.esker.com/](https://www.esker.com/)\n\nSana Al-Azzawi, Blessing K. Sibanda, Davis David, Lolwethu Ndolela, Jonathan Mukiibi, Tunde Oluwaseyi Ajayi, Tatiana Moteu Ngoli, Brian Odhiambo, Abraham Toluwase Owodunni, Nnae- meka Obiefuna, Shamsuddeen Hassan Muham- mad, Saheed Salahudeen Abdullahi, Mesay Gemeda Yigezu, Tajuddeen Rabiu Gwadabe, Idris Abdulmu- min, Mahlet Taye Bame, Oluwabusayo Olufunke Awoyomi, Iyanuoluwa Shode, Tolulope Anu Ade- lani, Habiba Abdulganiy Kailani, Abdul-Hakeem Omotayo, Adetola Adeeko, Afolabi Abeeb, An- uoluwapo Aremu, Olanrewaju Samuel, Clemen- cia Siro, Wangari Kimotho, Onyekachi Raphael Ogbu, Chinedu E. Mbonu, Chiamaka Ijeoma Chuk- wuneke, Samuel Fanijo, Jessica Ojo, Oyinkansola F. Awosan, Tadesse Kebede Guge, Sakayo Toadoum Sari, Pamela Nyatsine, Freedmore Sidume, Oreen Yousuf, Mardiyyah Oduwole, Ussen Kimanuka, Kanda Patrick Tshinu, Thina Diko, Siyanda Nx- akama, Abdulmejid Tuni Johar, Sinodos Gebre, Muhidin A. Mohamed, Shafie Abdi Mohamed, Fuad Mire Hassan, Moges Ahmed Mehamed, Evrard Ngabire, and Pontus Stenetorp. 2023. [ Masakhanews:](https://api.semanticscholar.org/CorpusID:258236351) [News topic classification for african languages](https://api.semanticscholar.org/CorpusID:258236351) . In *International Joint Conference on Natural Language* *Processing* .\n\nEneko Agirre, Carmen Banea, Daniel Cer, Mona Diab, Aitor Gonzalez-Agirre, Rada Mihalcea, German Rigau, and Janyce Wiebe. 2016. [SemEval-2016](https://doi.org/10.18653/v1/S16-1081) [task 1: Semantic textual similarity, monolingual](https://doi.org/10.18653/v1/S16-1081) [and cross-lingual evaluation](https://doi.org/10.18653/v1/S16-1081) . In *Proceedings of the* *10th International Workshop on Semantic Evaluation* *(SemEval-2016)* , pages 497- 511, San Diego, Califor- nia. Association for Computational Linguistics.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv4.pdf" - }, - { - "text": "given the heterogenic pathology and symptoms of MS ( 41 , 42 ).\n\nHowever, our fi ndings illuminate qualitative aspects of how to\n\nachieve tailored and meaningful intersubjective interactions in an\n\nexercise intervention.\n\nWe consider the instances of the physiotherapist running\n\ntogether with the participant, which were perceived as important\n\nfor participants ’ performance, to be an example of “ participatory\n\nsense-making ” ( 22 ) . As participants appreciated being guided or\n\neven pushed by the physiotherapists, it appears that the\n\nphysiotherapists were trusted in directing this interaction. As\n\nsuch, we argue that the physiotherapists ’ ability to adapt to\n\nparticipants ’ movements, speech and gestures — tailoring the\n\ninteraction to their needs — was important for this ability to be\n\nperceived as purposeful. This is supported by the few negative\n\nincidents described where the participant-physiotherapist\n\ninteraction seemed to not be jointly coordinated and appeared to\n\nfail. The reported mutual in fl uences of sensorimotor capabilities\n\nand interpersonal coordination, with the physiotherapists but\n\nalso the group, are in accordance with sensorimotor capacities\n\nand intersubjective interactions being important for sense-\n\nmaking in the world ( 35 ). The bene fi ts of these individualized\n\nparticipant-physiotherapist interactions are also described in\n\nspeci fi c core-stability exercises in indoor groups ( 16 , 43 ) and are\n\nin line with the theoretical framework of facilitation of\n\nmovement through hands-on interaction previously proposed\n\n( 44 , 45 ). Our study informs new knowledge of physiotherapist-\n\nparticipant interactions to achieve the recommended high-\n\nintensity training and calls for physiotherapy clinical reasoning\n\nthrough bodily and verbal communication skills adapted to the\n\nparticipants ’ responses in an ongoing and situated way.\n\nEnjoyment has previously been reported to promote PA\n\nin pwMS, and our study brings requested knowledge of what\n\ncan constitute enjoyment in an exercise intervention ( 46 ):\n\nplayful group-exercise tasks, a cheerful physiotherapist, and the\n\noutdoor environment.\n\nThe appreciation of being active outdoors in the study sample\n\naligns with that in the general population ( 47 ). The outdoors\n\nprovided a natural environment, which both invited participants to\n\nactively explore abilities thought of as left behind after their\n\ndiagnosis with MS, such as running, and provided an appreciated\n\nbreak from focusing on MS symptoms. We also suggest that the\n\npositive experiences of mastering the challenging weather\n\nconditions and the added meaning of exercising among other\n\npeople in the city park can be explained according to such terms.\n\nThese positive experiences show how we are enmeshed in our\n\nhistory, context and social encounters ( 35 ) and how these aspects\n\nshould also be accounted for when designing exercise interventions.\n\n#### 4.3 Methodological considerations\n\nThe design and methods were adequate for deriving\n\nknowledge from individuals ’ experiences. The participants self-\n\nreferred to the intervention and were recruited based on pre-set\n\ncriteria. This approach yielded rich information from people\n\nwith mild to moderate disabilities due to MS who were\n\nmotivated for physical activity (PA), employed, and residing in\n\nnorthern Norway. Ethnicity or socio-economic class were not\n\nrecorded. However, considering that all these factors can\n\nin fl uence PA engagement ( 46 ), it is possible that additional\n\naspects of the phenomenon could be uncovered in a different\n\nsample ( 48 ). There was a higher percentage of women\n\nparticipating than men; however, this corresponds to the gender\n\ndistribution in the MS population ( 1 ).\n\nThe use of enactive theory was innovative within the fi eld and\n\nallowed for, in particular, new aspects of importance for self-\n\nef fi cacy to be identi fi ed. Transference of our results to similar", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed13.pdf" - }, - { - "text": "### 2 Materials and methods\n\n#### 2.1 Design\n\nIndividual in-depth interviews using a phenomenological-\n\ninspired approach were chosen, as this is suitable for exploring\n\nthe meaning and signi fi cance of pwMS ’ s experiences and\n\nre fl ections ( 23 , 24 ).\n\n#### 2.2 Ethical considerations\n\nThe study was conducted according to the Declaration of\n\nHelsinki and approved by the Regional Committee for Medical\n\nResearch Ethics in North Norway (REK North: 174837). Written\n\ninformed consent was obtained prior to the intervention and\n\ncon fi rmed verbally when arranging the interviews. Participation\n\nwas voluntary and anonymous, and the participants were\n\ninformed about the opportunity to withdraw from the study. The\n\nConsolidated Criteria for Reporting Qualitative Research (COREQ)\n\n( 25 ) were used to optimize the conduct and reporting of the study.\n\n#### 2.3 Study context\n\nThis interview study was nested within a randomized\n\ncontrolled trial (RCT) comparing the CoreDISTparticipation\n\nintervention to usual care ( 26 ) and conducted at a regional\n\nhospital MS-outpatient clinic (Nordland Hospital Trust) and in\n\ntwo af fi liated municipalities in the northern Norway. The current\n\nstudy investigates participants in the intervention group ’ s\n\nexperiences of the four-week outdoor group, which was part of\n\nthis new intervention ( Table 2 ). The outdoor sessions were\n\nconducted by three trained physiotherapists working in the\n\nTABLE 2 Description of the outdoor group.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed13.pdf" - }, - { - "text": "Figure 5.6 Defining the hasCaloricContent data property restriction\n\nUsing the datatype property, we have created, we will now create defined classes that specify a range of interesting values. We will define a HighCaloriePizza to be any pizza that has a calorific value equal\n\nto or higher than 400.\n\n###### **Exercise 32: Create a HighCaloriePizza Defined Class**\n\n_____________________________________________________________________________________\n\n1. Navigate to the Classes tab.\n\n2. Select the Pizza class. Create a subclass of Pizza called HighCaloriePizza.\n\n3 Make sure HighCaloriePizza is selected. Click on the (+) icon next to the SubClass Of field in the Description view. In the Class expression editor type hasCaloricContent some xsd:integer[>= 400] and click OK.\n\n4. Make sure HighCaloriePizza is still selected and use Edit>Convert to defined class to make it a defined class.", - "page_start": 56, - "page_end": 56, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "the worldwide provision for income taxes. There\n\nare certain transactions and calculations under-\n\ntaken during the ordinary course of business for\n\nwhich the ultimate tax determination is uncer-\n\ntain. The Group estimates its tax liabilities based\n\non the Group understanding of the tax law.\n\nWhere the final tax outcome of these matters is\n\ndifferent from the amounts that were initially\n\nrecorded, such differences will impact the\n\ncurrent and deferred income tax assets and\n\nliabilities in the period in which such determina-\n\ntion is made.\n\n(x) \u0007Capitalisation of borrowing costs\n\nto exploration, evaluation and\n\ndevelopment\n\nThe Group’s funding of Bowdens Silver Project\n\nincluded borrowings of $35,000,000. In applying\n\nthe Group’s accounting policy on borrowing\n\ncosts (see Note 2s), the Bowdens Silver Project\n\nis considered to be a qualifying asset as defined\n\nin AASB 123. As such finance costs in relation to\n\nthese borrowings have been capitalised as part\n\nof the Bowdens Silver Project.\n\n### 4. Segment information\n\nThe Group’s operating segments are based on\n\nthe internal management reports that are\n\nreviewed and used by the Board of Directors\n\n(chief operating decision maker). The operating\n\nsegments represent the Group’s operating\n\nmines and projects and include the following:\n\n〉 〉 Chatree Mine, Thailand;\n\n〉 〉 Challenger Mine, South Australia, Australia;\n\n〉 〉 Bowdens Silver Project, New South Wales,\n\nAustralia;\n\n〉 〉 Nueva Esperanza Silver / Gold Project, Chile;\n\nand\n\n〉 〉 Exploration, South East Asia.\n\nInformation regarding the results of each\n\nreportable segment is included as follows:", - "page_start": 77, - "page_end": 77, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_KCN_2013.pdf", - "query": "What is the Kingsgate net cash outflows from finiancing activities in 2013 ?", - "target_page": 11, - "target_passage": " Net cash outflows from financing activities was $1.7 million", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**10**\n\nFinance Report\n\nwww.kingsgate.com.au\n\nFinancing Arrangements\n\nCorporate loan facility\n\nKingsgate has a three year secured loan facility\n\nwith Investec which was amended during the\n\nyear. The amended facility has a limit of $40\n\nmillion (30 June 2012: $50 million), of which $20\n\nmillion has been drawn down as at 30 June 2013\n\n(30 June 2012: $40 million).\n\nConvertible loan facility\n\nKingsgate has a five year A$35 million convert-\n\nible loan facility with Investec entered into in a\n\nprior period to provide funding for the Bowdens\n\nacquisition. Kingsgate has the option to make a\n\nprepayment against the facility with an issue of\n\nKingsgate shares.\n\nRestructure of corporate loan and\n\nconvertible loan facilities\n\nAs indicated previously in the Preliminary Final\n\nreport, at balance date it was the Group’s inten-\n\ntion to restructure and amalgamate these\n\nfacilities in the next financial year. This relates to\n\nthe potential for completion of the Initial Public\n\nOffering (“IPO”) of Akara on the Stock Exchange\n\nof Thailand and the updated mine plan for\n\nChallenger. Any restructure would optimise the\n\nGroup’s anticipated balance sheet liquidity and\n\noperational cash flows. Accordingly, the Group\n\nclassified the total amount drawn down under\n\nthese facilities of $55 million as a current liability\n\nat 30 June 2013.\n\nSubsequent to the end of the financial year, the\n\nGroup received from its lenders a credit\n\napproved term sheet (subject to formal docu-\n\nmentation) for the restructure of the corporate\n\nloan and convertible loan facilities. Following\n\ncompletion of the restructure the total amount\n\noutstanding will be reduced to $40 million. This\n\nloan will be provided through a single senior\n\ncorporate facility which will consist of two\n\ntranches:\n\n〉 〉 Tranche one will be a $25 million Akara Pre\n\nIPO Bond with a maturity date of 31 July\n\n2015. The current intention is for this\n\ntranche to be repaid as part of the Akara IPO,\n\nalthough at Kingsgate’s election repayment\n\ncan be made by either cash or in Kingsgate’s\n\nshares.\n\n〉 〉 Tranche two is an amortising facility with $5\n\nmillion to be repaid during the 2014 financial\n\nyear and the balance of $10 million repaid\n\nduring the 2015 financial year.\n\nConvertible revolving credit facility\n\nThe Group also has a three year $25 million\n\nConvertible Revolving Credit Facility available.\n\nAs at the date of this report the facility is\n\nundrawn. Under the terms of this facility,\n\nKingsgate has the option of repaying any funds\n\ndrawn down under the facility through either\n\ncash or by issuing ordinary shares. It is intended\n\nthat this facility will be utilised during the 2014\n\nfinancial year for corporate and working capital\n\npurposes. It is the current intention of the\n\ncompany to repay any cash drawdown under the\n\nfacility by the issuance of fully paid ordinary\n\nshares which would rank parri pasu with all\n\nexisting ordinary shares, although this position\n\nwill be reviewed at the appropriate time. The\n\nnumber of shares has not yet been determined\n\nand they will be issued at a 2.5% discount to\n\nVWAP over a period by reference to the draw\n\ndown date. Shareholder approval is not required.\n\nMulti-currency and syndicated\n\nloan facilities\n\nKingsgate’s Thai operating subsidiary, Akara,\n\nestablished a six year amortising multi-currency\n\nloan facility equivalent to US$125 million (fully\n\ndrawn as at period end) and an additional Thai\n\nBaht denominated working capital facility\n\nequivalent to US$15 million (undrawn as at year\n\nend) during the period. The proceeds from these\n\nborrowings were used to fully repay the\n\noutstanding balance on the US$100 million Baht\n\ndenominated syndicated loan facility in exist-\n\nence at the beginning of the period as well as to\n\nrepay part of the corporate loan facility noted\n\nabove.\n\nFinancial Position\n\nShareholders’ equity at 30 June 2013 was $474\n\nmillion (2012: $776 million). The decrease of\n\n$302 million reflects the year’s loss together\n\nwith dividends paid.\n\nDividends", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**39**\n\n## Senior Management\n\nSenior Management\n\nKingsgate’s executives have a comprehensive\n\nrange of skills and experience including mine\n\ndevelopment and operations, exploration, finance\n\nand administration. They are supported by highly\n\nqualified specialists, whose backgrounds cover\n\nthe full scope of mining resources activities.\n\nSenior members of Kingsgate’s management\n\nteam are:\n\nGavin Thomas\n\nBSc (Geology), FAusIMM\n\nManaging Director and Chief Executive Officer\n\nGavin Thomas was appointed Chief Executive\n\nOfficer of Kingsgate in 2004 and joined the\n\nKingsgate Board on 16th November 2007. Gavin\n\nhas had a successful career in developing mining\n\ncompanies from the exploration phase into\n\nmid-tier gold or copper producers. He has over\n\n42 years of international experience in exploring\n\nfor, evaluating, developing, operating and\n\nreclaiming mines in North and South America,\n\nAustralia, the Southwest Pacific, Asia and\n\nEurope. Amongst Gavin’s credits is the discovery\n\nof “Lihir” in Papua New Guinea, one of the\n\nlargest gold deposits in the world. In particular,\n\nhe has extensive experience in Thailand and\n\nSouth America.\n\nDuane Woodbury\n\nBEc (Hons)\n\nChief Financial Officer\n\nDuane Woodbury was appointed Chief Financial\n\nOfficer of Kingsgate on 1 September 2011.\n\nDuane has a BEc (Hons) Degree and has worked\n\nin various financial, accounting and advisory\n\nroles during his career in a number of locations,\n\nincluding London, New York and Singapore. He\n\nhas been assisting Kingsgate in its business\n\ndevelopment initiatives since August 2007 and\n\nbrings over 20 years of experience in financial\n\nmarkets and corporate finance transactions,\n\nprincipally with the Macquarie Group.\n\nTim Benfield\n\nDip CSM (mining), MBA, MAusIMM\n\nChief Operating Officer\n\nTim Benfield joined Kingsgate in February 2012\n\nas Chief Operating Officer. Tim is a mining\n\nengineer with over 21 years underground and\n\nopen pit experience in the mining industry in\n\nboth operational and corporate roles. He has\n\noperational and project development experience\n\nin Australia, Africa and Saudi Arabia. This\n\nincludes 10 years with Barrick Gold of Australia\n\nwhere he provided support to four operating\n\nmines and two development projects. Tim was\n\nmost recently General Manager of the Pajingo\n\nGold mine in Queensland for Evolution Mining\n\nLimited.\n\nRoss Coyle\n\nBA, FCPA, FCIS\n\nGeneral Manager Finance and Administration\n\nCompany Secretary\n\nRoss Coyle joined Kingsgate in March 2011\n\nfollowing the Company’s acquisition of Dominion\n\nMining Limited and was with the Dominion\n\ngroup for over 25 years. He is a qualified\n\naccountant and has over 30 years experience in\n\nfinance and accounting within the resource\n\nindustry. He was Finance Director of Dominion\n\nfrom 1996. Ross was appointed Kingsgate’s\n\nCompany Secretary in September 2011.\n\nJoel Forwood\n\nBsc (Hons) FFin\n\nGeneral Manager Corporate and Markets\n\nJoel Forwood joined Kingsgate in November\n\n2010 and has over 27 years experience in the\n\nresource and investment industries covering\n\ninvestor relations, funds management and\n\nexploration. For over 12 years, he has been\n\nleading investor relations at a number of listed\n\ncompanies, most recently for Lihir Gold Limited.\n\nPrior to this he was a fund manager with\n\nQueensland Investment Corporation (QIC)\n\nfollowing his early career in mineral exploration\n\nwith BHP and corporate development with RGC.\n\nRonald James\n\nBSc (Geology), MAusIMM, MAIG\n\nGeneral Manager Exploration and Resource\n\nDevelopment\n\nRon James has 30 years of experience in explora-\n\ntion and mining at management level inclusive\n\nof setting up gold mines and exploration\n\nprojects from their earliest stages through to\n\ndevelopment and sustainability. Before joining\n\nKingsgate, he was Chief Mine Geologist at the\n\nGold Ridge Mine in the Solomon Islands and\n\nlater Group Exploration Manager for Ross Mining\n\nNL. Ron is familiar with the technical and oper-\n\nating requirements for emerging projects in a", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 27\n\n####### **LIQUIDITY AND CAPITAL RESOURCES**\n\nWe strive to maintain a level of liquidity sufficient to allow us to cover our seasonal cash needs and to maintain appropriate levels of short-\n\nterm borrowings. We believe that our operating cash flows, available credit facilities and potential future borrowings are sufficient to finance\n\nour cash requirements for the next 12 months and beyond.\n\nOver the long term, we manage our cash and capital structure to maximize shareholder return, maintain our financial position, manage\n\nrefinancing risk and allow flexibility for strategic initiatives. We regularly assess our debt and leverage levels, capital expenditure\n\nrequirements, debt service payments, dividend payouts, potential share repurchases and other future investments. We believe that as of\n\nJanuary 31, 2015, our existing cash and cash equivalents on-hand of $827, available credit facilities of $800 and potential future operating\n\ncash flows and borrowings will be sufficient to fund these scheduled future payments and potential long-term initiatives. Additionally, if an\n\nagreement is reached and a transaction is consummated in regards to our credit card receivables, it could result in additional cash flows to\n\nfurther support our capital requirements and strategic initiatives.\n\n####### **Operating Activities**\n\nNet cash provided by operating activities was $1,220 in 2014, $1,320 in 2013 and $1,110 in 2012. The majority of our operating cash inflows\n\nare derived from sales. We also receive cash payments for property incentives from developers. Our operating cash outflows generally\n\nconsist of payments to our merchandise vendors (net of vendor allowances), payments to our employees for wages, salaries and other\n\nemployee benefits and payments to our landlords for rent. Operating cash outflows also include payments for income taxes and interest\n\npayments on our short-term and long-term borrowings.\n\nCash provided by operating activities decreased in 2014 compared with 2013, which was primarily due to higher state tax payments made in\n\n2014 compared with 2013, as well as changes in working capital in 2014.\n\nCash provided by operating activities increased in 2013 compared with 2012, resulting from less state tax payments made in 2013 due to\n\nadditional payments made in 2012 as a result of the 53rd week, along with increased property incentives received from developers and\n\nchanges in working capital.\n\n####### **Investing Activities**\n\nNet cash used in investing activities was $889 in 2014, $822 in 2013 and $369 in 2012. Our investing cash flows primarily consist of capital\n\nexpenditures, changes in restricted cash accumulated for debt maturities and changes in credit card receivables associated with cardholder\n\npurchases outside of Nordstrom using our Nordstrom Visa credit cards.\n\nCapital Expenditures\n\nOur capital expenditures over the last three years totaled $2,177, with $861 in 2014, $803 in 2013 and $513 in 2012. Capital expenditures\n\nincreased in 2014 compared with 2013 primarily due to ongoing store expansion and increased technology investments.\n\nCapital expenditures increased in 2013 compared with 2012 as we continued to make progress executing our customer strategy through\n\nincreased investments in technology, ecommerce, remodels and new stores, including Nordstrom Rack and our Manhattan full-line store.\n\nThe following table summarizes our store count and square footage activity:\n\n**Store count Square footage**\n\n**Fiscal year 2014 2013 2012 2014 2013 2012**\n\nTotal, beginning of year **260** 240 225 **26.0** 25.3 24.7\n\nStore openings:\n\nNordstrom full-line stores - U.S. **2** — 1 **0.3** — 0.1\n\nNordstrom Rack and other stores <sup>1</sup> **29** 22 15 **1.2** 0.7 0.6\n\nStores acquired **4** — — **—** —\n\nStores closed **(3)** (2) (1) **(0.4)** — (0.1)\n\n**Total, end of year 292** 260 240 **27.1** 26.0 25.3", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Financial Statements\n\n**67**\n\nFinancial Statements\n\nNote\n\n2013\n\n$’000\n\n2012\n\n$’000\n\nCash flows from operating activities\n\nReceipts from customers (net of goods and services tax) 332,624 361,754\n\nPayments to suppliers and employees (net of goods and services tax) (224,500) (182,759)\n\nInterest received 2,587 1,394\n\nFinance costs paid (10,120) (8,431)\n\nIncome tax paid (15,571) (6,711)\n\nNet cash inflow from operating activities 25 85,020 165,247\n\nCash flows from investing activities\n\nPayments for property, plant and equipment (7,035) (92,343)\n\nPayments for exploration, evaluation and development (122,722) (75,054)\n\nPayments for acquisition of Bowdens Silver Project - (41,000)\n\nCash acquired on acquisition of subsidiaries, net of cash paid - 136\n\nInterest capitalised to expansion and development projects (3,948) (6,939)\n\nDeposits and debt service reserve account (8,612) (2,470)\n\nPayments for other assets (108) (3,526)\n\nNet cash outflow from investing activities (142,425) (221,196)\n\nCash flows from financing activities\n\nProceeds from borrowings, net of transaction costs 133,968 96,627\n\nRepayment of borrowings (116,250) (26,622)\n\nProceeds from the issue of shares - 70,792\n\nPayments for acquisition of non-controlling interests - (11,359)\n\nDividends paid (19,409) (18,933)\n\nNet cash (outflow) / inflow from financing activities (1,691) 110,505\n\nNet (decrease) / increase in cash held (59,096) 54,556\n\nCash at the beginning of the year 90,623 35,864\n\nEffects of exchange rates on cash and cash equivalents 1,460 203\n\nCash at the end of the year 7 32,987 90,623\n\nThe above Statement of Cash Flows should be read in conjunction with the accompanying notes.\n\n## **Statement of Cash Flows**\n\nfor the year ended 30 June 2013", - "page_start": 68, - "page_end": 68, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "As of September 30, 2024, we had $18.11 billion and $15.54 billion of cash and cash equivalents and short-term\n\ninvestments, respectively. Balances held in foreign currencies had a U.S. dollar equivalent of $3.32 billion and consisted\n\nprimarily of Chinese yuan and euros. We had $5.00 billion of unused committed credit amounts as of September 30, 2024. For\n\ndetails regarding our indebtedness, refer to Note 7, *Debt* , to the consolidated financial statements included elsewhere in this\n\nQuarterly Report on Form 10-Q.\n\nWe continue adapting our strategy to meet our liquidity and risk objectives, such as investing in U.S. government\n\nsecurities and other investments, invest in autonomy, do more vertical integration, expand our product roadmap and provide\n\nfinancing options to our customers.\n\n##### * **Summary of Cash Flows** *\n\n**Nine Months Ended September 30,**\n\n(Dollars in millions) **2024 2023**\n\nNet cash provided by operating activities $ 10,109 $ 8,886\n\nNet cash used in investing activities $ (11,184) $ (10,780)\n\nNet cash provided by financing activities $ 2,868 $ 1,702\n\n*Cash Flows from Operating Activities*\n\nNet cash provided by operating activities increased by $1.22 billion to $10.11 billion during the nine months ended\n\nSeptember 30, 2024 from $8.89 billion during the nine months ended September 30, 2023. This increase was primarily due to\n\nfavorable changes in net operating assets and liabilities of $1.78 billion, partially offset by a decrease in net income excluding\n\nnon-cash expenses, gains and losses of $558 million.\n\n*Cash Flows from Investing Activities*\n\nNet cash flows from investing activities and their variability across each period related primarily to capital expenditures,\n\nwhich were $8.56 billion and $6.59 billion for the nine months ended September 30, 2024 and 2023, respectively, mainly for\n\nAI-related capital expenditures, global factory expansion, machinery and equipment as we expand and enhance our product\n\nroadmap. We also purchased $2.62 billion and $4.12 billion of short-term investments, net of proceeds from maturities and\n\nsales, for the nine months ended September 30, 2024 and 2023, respectively.\n\n*Cash Flows from Financing Activities*\n\nNet cash flows from financing activities increased by $1.17 billion to $2.87 billion during the nine months ended\n\nSeptember 30, 2024 from $1.70 billion during the nine months ended September 30, 2023. The increase was primarily due to a\n\n$1.83 billion increase in proceeds from issuances of debt, partially offset by a $896 million increase in repayments of debt. See\n\nNote 7, *Debt* , to the consolidated financial statements included elsewhere in this Quarterly Report on Form 10-Q for further\n\ndetails regarding our debt obligations. Additionally, there was an increase of $240 million in proceeds from exercises of stock\n\noptions and other stock issuances compared to the prior period.\n\n34", - "page_start": 44, - "page_end": 44, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**110**\n\n32. Parent entity financial information continued\n\nContingent liabilities of the parent entity\n\nBank guarantees have been given by Kingsgate’s controlled entities to participating banks in the syndicated loan facility and revolving loan facility as\n\ndescribed in Note 16 as part of the security package.\n\nThese guarantees may give rise to liabilities in the parent entity if the controlled entities do not meet their obligations under the terms of the loans subject\n\nto guarantees. No material losses are anticipated in respect of the above contingent liabilities.\n\n### 33. Sale of exploration assets\n\nOn 28 March 2013, the Group sold its exploration assets in Western Australia and Queensland through the sale of shares in its subsidiary company, Quadrio\n\nResources Limited, to Caravel Minerals Limited (“Caravel”), an Australian company listed on the ASX.\n\nKingsgate received 135,000,000 fully paid ordinary shares in the issued capital of Caravel and 20,000,000 unlisted options to acquire Caravel shares\n\nexercisable at 10 cents on or before three years from the date of issue. Subsequent to the sale, Kingsgate became the largest shareholder in Caravel with\n\n35.54% held at 30 June 2013. Kingsgate’s holding in Caravel reduced to 27.04% post 30 June 2013 following a rights issue by Caravel that Kingsgate did\n\nnot participate in.\n\nThe financial impact of the sale transaction as at the date of disposal is summarised below:\n\nFair value of consideration 2013\n\n$’000\n\n135,000,000 Caravel shares at $0.025 per share 3,375\n\n20,000,000 unlisted Caravel options -\n\nTotal consideration 3,375\n\nCarry value of the exploration assets sold 20,084\n\nLoss on sale 16,709", - "page_start": 111, - "page_end": 111, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "##### **Tesla, Inc.**\n\n##### **Consolidated Statements of Cash Flows**\n\n##### **(in millions)**\n\n##### **(unaudited)**\n\n**Nine Months Ended September 30,**\n\n**2024 2023**\n\n**Cash Flows from Operating Activities**\n\nNet income $ 4,821 $ 7,031\n\nAdjustments to reconcile net income to net cash provided by operating activities:\n\nDepreciation, amortization and impairment 3,872 3,435\n\nStock-based compensation 1,420 1,328\n\nInventory and purchase commitments write-downs 247 361\n\nForeign currency transaction net unrealized loss (gain) 197 (317)\n\nDeferred income taxes 418 (316)\n\nNon-cash interest and other operating activities 83 94\n\nChanges in operating assets and liabilities:\n\nAccounts receivable 144 377\n\nInventory (1,107) (1,953)\n\nOperating lease vehicles (82) (1,858)\n\nPrepaid expenses and other assets (2,639) (1,992)\n\nAccounts payable, accrued and other liabilities 2,504 1,922\n\nDeferred revenue 231 774\n\nNet cash provided by operating activities 10,109 8,886\n\n**Cash Flows from Investing Activities**\n\nPurchases of property and equipment excluding finance leases, net of sales (8,556) (6,592)\n\nPurchases of solar energy systems, net of sales (6) —\n\nPurchases of investments (20,797) (13,221)\n\nProceeds from maturities of investments 17,975 8,959\n\nProceeds from sales of investments 200 138\n\nBusiness combinations, net of cash acquired — (64)\n\nNet cash used in investing activities (11,184) (10,780)\n\n**Cash Flows from Financing Activities**\n\nProceeds from issuances of debt 4,360 2,526\n\nRepayments of debt (1,783) (887)\n\nProceeds from exercises of stock options and other stock issuances 788 548\n\nPrincipal payments on finance leases (291) (340)\n\nDebt issuance costs (6) (23)\n\nDistributions paid to noncontrolling interests in subsidiaries (76) (105)\n\nPayments for buy-outs of noncontrolling interests in subsidiaries (124) (17)\n\nNet cash provided by financing activities 2,868 1,702\n\nEffect of exchange rate changes on cash and cash equivalents and restricted cash (8) (142)\n\nNet increase (decrease) in cash and cash equivalents and restricted cash 1,785 (334)\n\nCash and cash equivalents and restricted cash, beginning of period 17,189 16,924\n\nCash and cash equivalents and restricted cash, end of period $ 18,974 $ 16,590\n\n**Supplemental Non-Cash Investing and Financing Activities**\n\nAcquisitions of property and equipment included in liabilities $ 2,727 $ 1,717\n\nLeased assets obtained in exchange for finance lease liabilities $ 32 $ 1\n\nLeased assets obtained in exchange for operating lease liabilities $ 1,232 $ 1,548\n\nThe accompanying notes are an integral part of these consolidated financial statements.\n\n9", - "page_start": 11, - "page_end": 11, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**103**\n\nNotes to the Financial Statements\n\ncontinued\n\nThe contractual cash flows presented above in respect of 30 June 2013 and the increase in the one year or less time category of $46,132,000 when\n\ncompared to 30 June 2012 mainly relates to classification of the corporate loan facility of $20,000,000 and the convertible loan facility of $35,000,000 as\n\ncurrent liability at 30 June 2013. These facilities were mainly included in the one to two years and two to five years’ time category at 30 June 2012. As indi-\n\ncated in Note 16, these facilities have been classified as current liabilities at 30 June 2013 on the basis that at balance sheet date it was the Group’s intention\n\nto restructure and amalgamate these facilities in the next financial year.\n\nSubsequent to the end of the financial year, the Group has received from its lenders a credit approved term sheet (subject to formal documentation) for the\n\nrestructure of the corporate loan and convertible loan facilities. Following completion of the restructure the total amount outstanding will be reduced to\n\n$40,000,000. This loan will be provided through a single senior corporate facility which will consist of two tranches:\n\n〉 〉 Tranche one will be a $25,000,000 Akara Pre IPO Bond with a maturity date of 31 July 2015. The current intention is for this tranche to be repaid as part\n\nof the Akara IPO although at Kingsgate’s election repayment can be made by either cash or in Kingsgate’s shares.\n\n〉 〉 Tranche two is an amortising facility with $5,000,000 to be repaid during the 2014 financial year and the balance of $10,000,000 repaid during the 2015\n\nfinancial year.\n\nThe Group also has a three year $25,000,000 Convertible Revolving Credit Facility available. At the date of this report the facility is undrawn. Under the\n\nterms of this facility, Kingsgate has the option of repaying any funds drawn down under the facility through either cash or by issuing ordinary shares. It is\n\nintended that this facility will be utilised during the 2014 financial year for corporate and working capital purposes. It is the current intention of the Company\n\nto repay any cash drawdown under the facility by issuance of fully paid ordinary shares which would rank parri pasu with all existing ordinary shares, although\n\nthis position will be reviewed at the appropriate time. The number of shares has not yet been determined and they will be issued at a 2.5% discount to VWAP\n\nover a period by reference to the draw down date. Shareholder approval is not required.\n\nAs indicated in Note 16, Kingsgate’s Thai operating subsidiary, Akara, established a six year amortising multi-currency loan facility equivalent to\n\nUS$125,000,000 (fully drawn as at year end) and an additional Thai Baht denominated working capital facility equivalent to US$15,000,000 (undrawn as at\n\nyear end) during the period. The proceeds from these borrowings were used to fully repay the outstanding balance on the US$100,000,000 Baht denomi-\n\nnated syndicated loan facility in existence at the beginning of the period as well as to repay part of the corporate loan facility noted above.\n\n(d) Fair value measurements\n\nThe carrying values of financial assets and liabilities of the Group approximate their fair values. Fair values of financial assets and liabilities have been deter-\n\nmined for measurement and / or disclosure purposes.\n\nFair value hierarchy\n\nThe Group classifies assets and liabilities carried at fair value using a fair value hierarchy that reflects the significance of the inputs used in determining that\n\nvalue. The table following analyses financial instruments carried at fair value, by the valuation method. The different levels in the hierarchy have been defined\n\nas follows:\n\n〉 〉 Level 1: quoted prices (unadjusted) in active markets for identical assets or liabilities;", - "page_start": 104, - "page_end": 104, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**94**\n\n### 21. Controlled entities\n\nEntity\n\nCountry of\n\nIncorporation\n\nClass of\n\nshares\n\nEquity holding\n\n2013\n\n%\n\n2012\n\n%\n\nParent Entity\n\nKingsgate Consolidated Limited\n\nSubsidiaries\n\nDominion Mining Ltd Australia Ordinary 100 100\n\nChallenger Gold Operations Pty Ltd(i) Australia Ordinary 100 100\n\nQuadrio Resources Limited(ii) Australia Ordinary - 100\n\nGawler Gold Mining Pty Ltd Australia Ordinary 100 100\n\nDominion Copper Pty Ltd Australia Ordinary 100 100\n\nDominion Metals Proprietary Limited Australia Ordinary 100 100\n\nYilgarn Metals Limited Australia Ordinary 100 100\n\nKingsgate Treasury Pty Ltd(iii) Australia Ordinary 100 100\n\nKingsgate Bowdens Pty Limited Australia Ordinary 100 100\n\nKingsgate Capital Pty Ltd Australia Ordinary 100 100\n\nKingsgate Nominees Pty Limited Australia Ordinary 100 100\n\nKingsgate South America Pty Ltd Australia Ordinary 100 100\n\nLaguna Resources NL Australia Ordinary 100 100\n\nLaguna Exploration Pty Ltd Australia Ordinary 100 100\n\nAkara Mining Limited (iv) Thailand Ordinary 100 100\n\nIssara Mining Ltd Thailand Ordinary 100 100\n\nSuan Sak Patana Ltd Thailand Ordinary 100 100\n\nPhar Mai Exploration Ltd Thailand Ordinary 100 100\n\nRichaphum Mining Ltd Thailand Ordinary 100 100\n\nPhar Lap Ltd Thailand Ordinary 100 100\n\nPhar Rong Ltd Thailand Ordinary 100 100\n\nDominion (Lao) Co., Ltd Laos Ordinary 100 100\n\nLaguna Chile Ltda Chile Ordinary 100 100\n\nMinera Kingsgate Limitada Chile Ordinary 100 100\n\nKingsgate Peru SRL Peru Ordinary 100 100\n\nMinera Kingsgate Argentina S.A. Argentina Ordinary 100 100\n\n*(i)* *Challenger Gold Operations Pty Ltd changed its name from Dominion Gold Operations Pty Ltd on 26 March 2013.*\n\n*(ii)* *Quadrio Resources Limited was sold by the Group during the year.*\n\n*(iii)* *Kingsgate Treasury Pty Ltd changed its name from Yilgarn Metals Exploration Pty Ltd on 29 November 2012.*\n\n*(iv)* *Akara Mining Limited changed its name to Akara Resource Public Company Limited on 29 August 2013.*", - "page_start": 95, - "page_end": 95, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "Directors’ Report\n\n**47**\n\nDirectors’ Report\n\n〉 〉 Tranche one will be a $25,000,000 Akara Pre\n\nIPO Bond with a maturity date of 31 July\n\n2015. The current intention is for this\n\ntranche to be repaid as part of the Akara IPO\n\nalthough at Kingsgate’s election repayment\n\ncan be made by either cash or in Kingsgate’s\n\nshares.\n\n〉 〉 Tranche two is an amortising facility with\n\n$5,000,000 to be repaid during the 2014\n\nfinancial year and the balance of\n\n$10,000,000 repaid during the 2015\n\nfinancial year.\n\nSubsequent to year-end the Group forward sold\n\n50,000 ounces of gold over a 12 month period at\n\nan average price of A$1,435 per ounce to manage\n\nAustralian gold price risk associated with fore-\n\ncast production from the Challenger Mine.\n\nKingsgate’s Thai subsidiary, Akara Resources\n\nPublic Company Limited (“Akara”) has\n\nsubmitted its listing application and draft\n\nProspectus to the Thai Securities Exchange\n\nCommission (SEC) and the Stock Exchange of\n\nThailand (SET) for an initial public offering of its\n\nshares on the SET.\n\nThe SEC and SET will review the draft Prospectus\n\nin the coming months in order to approve the\n\nlisting of Akara. The decision to list Akara will\n\ndepend on market conditions and other factors\n\nat the time of approval.\n\nNo other matter or circumstance has arisen\n\nsince 30 June 2013 that has significantly\n\naffected, or may significantly affect:\n\n〉 〉 the Group’s operations in future financial\n\nyears;\n\n〉 〉 the results of those operations in future\n\nfinancial years; or\n\n〉 〉 the Group’s state of affairs in future financial\n\nyears.\n\nLikely developments and expected results of operations\n\nThe outlook for the Group in fiscal year 2014\n\nis for gold production to be in the range of\n\n190,000 to 210,000 ounces. At the Chatree\n\nMine in Thailand, the expanded plant will result\n\nin gold production of between 120,000 to\n\n130,000 ounces and at the Challenger Mine in\n\nSouth Australia, following the implementation\n\nof the new mine plan, production for the year is\n\nexpected to be in the range of 70,000 ounces to\n\n80,000 ounces of gold.\n\ncontinued\n\nSignificant progress has been made at Nueva\n\nEsperanza in Chile. The feasibility work shifted\n\nto focus on identifying a lower cost and power\n\nconsumption development alternative. This\n\nincluded assessing a heap leach process option\n\nand on-site power generation. Further work is\n\nexpected to be undertaken in the December\n\nquarter 2013.\n\nThe DFS for the Bowdens Silver Project in\n\nNew South Wales is currently expected to be\n\ncompleted during the 2014 financial year and,\n\nin addition, it is also currently anticipated an EIS\n\nwill be lodged shortly thereafter.\n\nEnvironmental regulation\n\nThe Group is subject to environmental regula-\n\ntion in respect to its gold mining operations and\n\nexploration activities in Australia, Thailand,\n\nArgentina, Chile, Peru and PDR Laos. For the year\n\nended 30 June 2013, the Group has operated\n\nwithin all environmental laws.\n\nDirectors’ meetings\n\nThe numbers of meetings of the Company’s\n\nBoard of Directors and of each Board Committee\n\nheld during the year ended 30 June 2013, and\n\nthe numbers of meetings attended by each\n\nDirector were:\n\nDirector Board\n\nMeetings Audit Committee\n\nMeetings\n\nNomination\n\nCommittee\n\nMeetings\n\nRemuneration\n\nCommittee\n\nMeetings\n\nA B A B A B A B\n\nR Smyth-Kirk 11 11 2 2 1 1 1 1\n\nP Alexander 11 10 - - - - 1 1\n\nC Carracher 11 11 2 2 1 1 1 1\n\nP McAleer 11 11 2 2 1 1 1 1\n\nG Thomas 11 11 - - - - - -\n\n*A: Number of meetings held while in office*\n\n*B: Meetings attended*", - "page_start": 48, - "page_end": 48, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210538_en.pdf", - "query": "To which countries extend the marriage regulations ?", - "target_page": 1, - "target_passage": "These Regulations extend to England and Wales. ", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "I approve\n\n*Kevin Foster*\n\nParliamentary Under Secretary of State\n\n29th April 2021 Home Office\n\n### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the\n\nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage\n\nAct 1949 applies (naval, military and air force chapels).\n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage\n\nservices” to churches and chapels in their parish in which banns of matrimony may be published,\n\nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes\n\nrequirements relating to the durability and pre-printed content of these registers, and provides that\n\nthey belong to the parochial church council.\n\nRegulation 3 requires specified information to be recorded in a register of marriage services when\n\na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of\n\nEngland or Church in Wales in a church or chapel in which banns of matrimony may be\n\npublished. The record must be made and signed by the member of the clergy by whom the\n\nmarriage was solemnized.\n\nRegulation 4 imposes requirements relating to the keeping of registers of marriage services\n\nprovided under regulation 2.\n\nA full impact assessment has not been produced for this instrument because no, or no significant,\n\nimpact on the private, public or voluntary sector is foreseen.\n\n© Crown copyright 2021\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational\n\nneeds and disability in order to provide exceptions to time limits set out in that legislation where\n\nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus.\n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review\n\nthe effectiveness of the Regulations during the period in which they have effect. The Regulations\n\ncease to have effect on 25th September 2020.\n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the\n\nSEND Regulations 2014’).\n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain\n\nrequirements in those Regulations for actions to be taken within specified time limits where it is\n\nnot reasonably practicable for a person to meet those requirements for a reason relating to the\n\nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a\n\nrequirement for such action to be taken as soon as reasonably practicable.\n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits.\n\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014\n\n(‘the Personal Budgets Regulations 2014’).\n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as\n\nregulation 5 does in respect of the SEND Regulations 2014.\n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons)\n\nRegulations 2015 (‘the Detained Persons Regulations 2015’).\n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to\n\nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal\n\nBudgets Regulations 2014 respectively.\n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax\n\ntime limits.\n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal\n\nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’).\n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to\n\nthose in regulations 5, 17 and 20.\n\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency\n\nmeasure and no significant impact on business, charities or voluntary bodies is foreseen.\n\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk.\n\n© Crown copyright 2020\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of\n\nregulation 3(2) in relation to the marriage, and\n\n(b) provides corresponding spaces for recording information required by each of those sub-\n\nparagraphs in relation to the marriage.\n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council\n\nbelongs to that parochial church council.\n\n### **Duty to record information about marriages solemnized according to the rites of the Church**\n\n### **of England or Church in Wales**\n\n**3.** —(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the\n\nrites of the Church of England in a church or chapel in which banns of matrimony may be\n\npublished.\n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the\n\nmarriage was solemnized must make a record of the following information in relation to that\n\nmarriage in a register of marriage services provided to the church or chapel under regulation\n\n2(1)—\n\n(a) the date and place of the marriage;\n\n(b) the name and surname of each party;\n\n(c) the date of birth of each party;\n\n(d) the occupation (if any) of each party;\n\n(e) the address of each party at the time of the marriage;\n\n(f) the names and surnames of each party’s parents, so far as those names and surnames are\n\nknown to the clergyman who solemnized the marriage;\n\n(g) the name and surname of each of the witnesses in whose presence the marriage was\n\nsolemnized;\n\n(h) the name and surname of the clergyman by whom the marriage was solemnized.\n\n(3) The clergyman must record the information required by paragraph (2) in English, and may\n\nalso record information required by that paragraph in Welsh where the church or chapel is situated\n\nin Wales.\n\n(4) After making a record under paragraph (2) the clergyman must sign it.\n\n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021.\n\n### **Requirements about the keeping of registers of marriage services**\n\n**4.** —(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage\n\nservices has been provided under regulation 2(1) must—\n\n(a) ensure that the register is kept in that church or chapel, and\n\n(b) do everything that is reasonably practicable to ensure that the register is protected against\n\ntheft, loss or damage.\n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of\n\nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in\n\nrespect of that register fall on the churchwardens of the parish in which the church or chapel is\n\nsituated.\n\nGiven under my hand on 29th April 2021\n\n*Abi Tierney*\n\nRegistrar General", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S\n\n## **2021 No. 538**\n\n## **MARRIAGE, ENGLAND AND WALES**\n\n## The Marriage (Keeping of Records in Churches and Chapels)\n\n## Regulations 2021\n\n*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in\n\nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act\n\n1949( **a** ).\n\n### **Citation, commencement, extent and interpretation**\n\n**1.** —(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and\n\nChapels) Regulations 2021.\n\n(2) These Regulations come into force on 4th May 2021.\n\n(3) These Regulations extend to England and Wales.\n\n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act\n\n1949 (marriages in naval, military and air force chapels) applies( **b** ).\n\n### **Duty of parochial church councils to provide registers of marriage services**\n\n**2.** —(1) The parochial church council of a parish must provide books for the purpose of making\n\nrecords under regulation 3 to each church and chapel of the Church of England( **c** ) in that parish in\n\nwhich banns of matrimony may be published.\n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”.\n\n(3) A register of marriage services provided under paragraph (1) must meet the requirements of\n\nparagraphs (4) and (5).\n\n(4) The register must be made of durable material.\n\n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect\n\nof a marriage, the register must be printed in such a way that it—\n\n( **a** ) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by\n\nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently\n\nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic\n\nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act\n\n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also\n\ninserted subsection (1A).\n\n( **b** ) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to\n\nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15).\n\n( **c** ) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including\n\nreferences to the Church in Wales.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "### SCHEDULES\n\nSCHEDULE 1 Regulation 2(1)\n\n#### Category 1 countries and territories\n\nAustralia\n\nBrunei\n\nFalkland Islands\n\nFaroe Islands\n\nGibraltar\n\nIceland\n\nIsrael\n\nNew Zealand\n\nPortugal, including the Azores and Madeira\n\nSaint Helena, Ascension and Tristan da Cunha\n\nSingapore\n\nSouth Georgia and the South Sandwich Islands\n\nSCHEDULE 2 Regulation 2(1)\n\n#### Category 2 countries and territories\n\nAny country or territory outside the common travel area not listed in Schedule 1 or Schedule 3.\n\nSCHEDULE 3 Regulation 2(1)\n\n#### Category 3 countries and territories\n\nAngola\n\nArgentina\n\nBangladesh\n\nBolivia\n\nBotswana\n\nBrazil\n\nBurundi\n\nCape Verde\n\nChile", - "page_start": 31, - "page_end": 31, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be\n\nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments.\n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts\n\nwhich were previously excluded accounts.\n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015\n\nwas published on 18th March 2015 and is available on the HMRC website at\n\nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the-\n\nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the\n\nimpacts that apply to this instrument.\n\n© Crown copyright 2020\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200438_en.pdf" - }, - { - "text": "(3) In regulation 4ZA—\n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel\n\nand Operator Liability) (England) Regulations 2021”;\n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus,\n\nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute\n\n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator\n\nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability\n\nRegulations”)”;\n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations”\n\nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator\n\nLiability Regulations”;\n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph\n\n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”.\n\n**2.** —(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations\n\n2020( **a** ) are amended as follows.\n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International\n\nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection\n\n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”.\n\n(3) In regulation 6(1)—\n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating\n\nworker”, for “regulation 4” substitute “regulation 9”;\n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health\n\nProtection (Coronavirus, International Travel and Operator Liability) (England)\n\nRegulations 2021”.\n\nSCHEDULE 16 Regulation 26(3)\n\n#### Transitional provision\n\n**1.** Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to\n\nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations\n\n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information\n\nprovided for the purposes of these Regulations where the person arrives in England on or after that\n\ndate.\n\n**2.** Confirmation given by the Foreign, Commonwealth and Development Office that a person is\n\nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that\n\nthe person is not required to comply with regulation 6 of these Regulations where the person\n\narrives in England on or after 4.00 a.m. on 17th May 2021.\n\n**3.** A designation by the Secretary of State of a person as an authorised person under regulation\n\n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person\n\nunder of regulation 11(11)(c) of these Regulations.\n\n**4.** Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who\n\nexercises the powers in that regulation in relation to a person who arrived in England before 4.00\n\na.m. on 17th May 2021.\n\n( **a** ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "of a similar kind, for example, the **definition of essential work** that needs to be continued despite a\n\nhigh infection risk, and safety and hygiene measures for work in education, care or public transport.\n\n### **Legal and regulatory frameworks**\n\nOSH is a shared EU and national responsibility. Over the last 35 years, the EU developed a\n\ncomprehensive legal framework that covers and regulates OSH risks. It changed the focus from\n\nprescription of obligatory prevention measures for certain predominantly safety risks towards a general\n\npreventive and participative approach. That is, all OSH risks have to be assessed, consultation between\n\nemployers and workers is required, and OSH training, expertise and preventive capacities are required\n\nfor every enterprise. All EU OSH directives have to be transposed into national law. In parallel, national,", - "page_start": 14, - "page_end": 14, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "regulations or implement responsible business, social, environmental and supply chain practices, we could be subject to damage to our\n\nreputation, class action lawsuits, legal and settlement costs, civil and criminal liability, increased cost of regulatory compliance, restatements\n\nof our financial statements, disruption of our business and loss of customers. Any required changes to our employment practices could result\n\nin the loss of employees, reduced sales, increased employment costs, low employee morale and harm to our business and results of\n\noperations. In addition, political and economic factors could lead to unfavorable changes in federal, state and foreign tax laws, which may\n\nincrease our tax liabilities. An increase in our tax liabilities could adversely affect our results of operations. We are also regularly involved in\n\nvarious litigation matters that arise in the ordinary course of business. Litigation or regulatory developments could adversely affect our\n\nbusiness and financial condition.\n\n**We continue to face uncertainties due to financial services industry regulation and supervision that could have an adverse affect**\n\n####### **on our operations.**\n\nFederal and state regulation and supervision of the financial industry has increased in recent years due to implementation of consumer\n\nprotection and financial reform legislation such as the Credit Card Accountability Responsibility and Disclosure Act of 2009 (“CARD Act”) and\n\nthe Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (“Financial Reform Act”). The Financial Reform Act significantly\n\nrestructured regulatory oversight and other aspects of the financial industry, created the Consumer Financial Protection Bureau (“CFPB”) to\n\nsupervise and enforce consumer lending laws and regulations, and expanded state authority over consumer lending. The CARD Act included\n\nnew and revised rules and restrictions on credit card pricing, finance charges and fees, customer billing practices and payment application.\n\nWe anticipate more regulation and interpretations of the new rules to continue, and, depending on the nature and extent of these new\n\nregulations and interpretations, we may be required to make changes to our credit card practices and systems, which could adversely impact\n\nthe revenues and profitability of our Credit segment. In addition, we operate in a regulated environment where financial supervisory agencies\n\nprovide oversight over our activities. Compliance with applicable laws and regulations could limit or restrict our activities and the conduct of\n\nour business and enforcement actions by those agencies for failure to comply could have an adverse impact on us.", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "343 Gagliardi et al., 2012: [Occupational safety and health in Europe: lessons from the past, challenges and ](http://doi.org/10.2486/indhealth.ms1342)\n\n[opportunities for the future](http://doi.org/10.2486/indhealth.ms1342)\n\n344 Directive 80/1107/EEC, Council Directive of 27 November 1980 on the protection of workers from risks related\n\nto exposure to chemical, physical and biological agents at work, [here](http://eurlex.europa.eu/legal-content/EN/TXT/?uri=CELEX:31980L1107)\n\n345 Directive 86/188/EEC, Council Directive of 12 May 1986 in the protection of workers from the risks related to\n\nexposure to noise at work, [here](https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=celex:31986L0188)\n\n346 An overview on these directives can be found [here](https://osha.europa.eu/en/safety-and-health-legislation/european-directives)\n\n347 See for reasons from a trade union point of view: Vogel, 2015: The machinery of occupational safety and\n\nhealth policy in the European Union. History, institutions, actors, [here](https://www.etui.org/publications/guides/the-machinery-of-occupational-safety-and-health-policy-in-the-european-union-history-institutions-actors)\n\n348 COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE\n\nEUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS: EU strategic\n\nframework on health and safety at work 2021-2027: Occupational safety and health in a changing world of work,\n\n{SWD(2021) 148 final} - {SWD(2021) 149 final, Brussels, 28.6.2021, [here](https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52021DC0323)\n\n349 European Commission, 2019: [Guide to application of the Machinery Directive 2006/42/EC, Edition 2.2](https://ec.europa.eu/docsroom/documents/38022) (p. 174).\n\n350 Regarding other sources: The authors of the DG EMPL Evaluation did not consider the National\n\nImplementation Reports (due every five years by each Member State on each directive) as relevant for their\n\nstudy: *‘In this context, one relevant conclusion is that the attempt to map the findings of the National*\n\n*Implementation Reports has yielded no result. The reporting requirements of the National Implementation Reports*\n\n*have proven to be formulated too broadly to facilitate quantifications of the replies across MSs or to allow for*\n\n*comparability* .’\n\nFor this Status Report, SLIC evaluations of the labour inspection systems in Member States were not taken into\n\naccount, because most of them are confidential.\n\n351 DG Employment, Social Affairs and Inclusion, 2015: [Evaluation of the Practical Implementation of the EU ](https://ec.europa.eu/social/BlobServlet?docId=16897&langId=en)\n\n[Occupational Safety and Health (OSH) Directives in EU Member States](https://ec.europa.eu/social/BlobServlet?docId=16897&langId=en) ( p. 89).\n\n352 Ibid., p. 105. See also p. 89: *‘The Directives represent a mix of a goal-oriented approach - strongly expressed*\n\n*in the Framework Directive, but also mirrored in the individual Directives - and a prescriptive approach - which is,*\n\n*for instance, seen in the very detailed and specific requirements included in the annexes of some Directives.*\n\n353 Ibid., p. 67.\n\n354 Ibid., p. 94.\n\n355 Graveling, 2018: [Transposition, implementation and enforcement of EU OSH legislation - Thematic Discussion ](https://ec.europa.eu/social/BlobServlet?docId=20102&langId=en)\n\n[Paper](https://ec.europa.eu/social/BlobServlet?docId=20102&langId=en)\n\n356 EU-OSHA, 2021: [Summary - Improving compliance with occupational safety and health regulations: an ](https://osha.europa.eu/en/publications/summary-improving-compliance-occupational-safety-and-health-regulations-overarching)\n\n[overarching review](https://osha.europa.eu/en/publications/summary-improving-compliance-occupational-safety-and-health-regulations-overarching) ( p. 4).\n\n357 The authors explain the difference between ‘substantive and rule compliance as follows: *‘... “substantive*", - "page_start": 153, - "page_end": 153, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210538_en.pdf", - "query": "What the parochial church council must provide to make marriage records ?", - "target_page": 1, - "target_passage": " The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England(c) in that parish in which banns of matrimony may be published.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of\n\nregulation 3(2) in relation to the marriage, and\n\n(b) provides corresponding spaces for recording information required by each of those sub-\n\nparagraphs in relation to the marriage.\n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council\n\nbelongs to that parochial church council.\n\n### **Duty to record information about marriages solemnized according to the rites of the Church**\n\n### **of England or Church in Wales**\n\n**3.** —(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the\n\nrites of the Church of England in a church or chapel in which banns of matrimony may be\n\npublished.\n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the\n\nmarriage was solemnized must make a record of the following information in relation to that\n\nmarriage in a register of marriage services provided to the church or chapel under regulation\n\n2(1)—\n\n(a) the date and place of the marriage;\n\n(b) the name and surname of each party;\n\n(c) the date of birth of each party;\n\n(d) the occupation (if any) of each party;\n\n(e) the address of each party at the time of the marriage;\n\n(f) the names and surnames of each party’s parents, so far as those names and surnames are\n\nknown to the clergyman who solemnized the marriage;\n\n(g) the name and surname of each of the witnesses in whose presence the marriage was\n\nsolemnized;\n\n(h) the name and surname of the clergyman by whom the marriage was solemnized.\n\n(3) The clergyman must record the information required by paragraph (2) in English, and may\n\nalso record information required by that paragraph in Welsh where the church or chapel is situated\n\nin Wales.\n\n(4) After making a record under paragraph (2) the clergyman must sign it.\n\n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021.\n\n### **Requirements about the keeping of registers of marriage services**\n\n**4.** —(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage\n\nservices has been provided under regulation 2(1) must—\n\n(a) ensure that the register is kept in that church or chapel, and\n\n(b) do everything that is reasonably practicable to ensure that the register is protected against\n\ntheft, loss or damage.\n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of\n\nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in\n\nrespect of that register fall on the churchwardens of the parish in which the church or chapel is\n\nsituated.\n\nGiven under my hand on 29th April 2021\n\n*Abi Tierney*\n\nRegistrar General", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "I approve\n\n*Kevin Foster*\n\nParliamentary Under Secretary of State\n\n29th April 2021 Home Office\n\n### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the\n\nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage\n\nAct 1949 applies (naval, military and air force chapels).\n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage\n\nservices” to churches and chapels in their parish in which banns of matrimony may be published,\n\nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes\n\nrequirements relating to the durability and pre-printed content of these registers, and provides that\n\nthey belong to the parochial church council.\n\nRegulation 3 requires specified information to be recorded in a register of marriage services when\n\na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of\n\nEngland or Church in Wales in a church or chapel in which banns of matrimony may be\n\npublished. The record must be made and signed by the member of the clergy by whom the\n\nmarriage was solemnized.\n\nRegulation 4 imposes requirements relating to the keeping of registers of marriage services\n\nprovided under regulation 2.\n\nA full impact assessment has not been produced for this instrument because no, or no significant,\n\nimpact on the private, public or voluntary sector is foreseen.\n\n© Crown copyright 2021\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S\n\n## **2021 No. 538**\n\n## **MARRIAGE, ENGLAND AND WALES**\n\n## The Marriage (Keeping of Records in Churches and Chapels)\n\n## Regulations 2021\n\n*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in\n\nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act\n\n1949( **a** ).\n\n### **Citation, commencement, extent and interpretation**\n\n**1.** —(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and\n\nChapels) Regulations 2021.\n\n(2) These Regulations come into force on 4th May 2021.\n\n(3) These Regulations extend to England and Wales.\n\n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act\n\n1949 (marriages in naval, military and air force chapels) applies( **b** ).\n\n### **Duty of parochial church councils to provide registers of marriage services**\n\n**2.** —(1) The parochial church council of a parish must provide books for the purpose of making\n\nrecords under regulation 3 to each church and chapel of the Church of England( **c** ) in that parish in\n\nwhich banns of matrimony may be published.\n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”.\n\n(3) A register of marriage services provided under paragraph (1) must meet the requirements of\n\nparagraphs (4) and (5).\n\n(4) The register must be made of durable material.\n\n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect\n\nof a marriage, the register must be printed in such a way that it—\n\n( **a** ) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by\n\nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently\n\nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic\n\nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act\n\n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also\n\ninserted subsection (1A).\n\n( **b** ) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to\n\nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15).\n\n( **c** ) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including\n\nreferences to the Church in Wales.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "*Louis* [, was a comprehensive legal code imposing a uniform regulation of civil procedure](https://en.wikipedia.org/wiki/Civil_procedure)\n\nthroughout the kingdom. Among other things, it prescribed baptismal, marriage and death\n\nrecords in the state's registers, not the church's, and it strictly regulated the right of the\n\n*Parlements* to remonstrate. <sup>[37]</sup> The *Code Louis* [ later became the basis for the Napoleonic](https://en.wikipedia.org/wiki/Napoleonic_code)\n\n[code, which in turn inspired many modern legal codes.](https://en.wikipedia.org/wiki/Napoleonic_code)\n\nOne of Louis's more infamous decrees was the *Grande Ordonnance sur les Colonies* of\n\n1685, the *[Code Noir](https://en.wikipedia.org/wiki/Code_Noir)* (black code). Although it sanctioned slavery, it attempted to humanise\n\nthe practice by prohibiting the separation of families. Additionally, in the colonies, only\n\nRoman Catholics could own slaves, and these had to be baptised.\n\nLouis ruled through a number of councils:\n\nConseil d'en haut (\"High Council\", concerning the most important matters of\n\nstate)—composed of the king, the crown prince, the controller-general of\n\nfinances, and the secretaries of state in charge of various departments. The\n\nmembers of that council were called ministers of state.\n\nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces).\n\nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments).\n\nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an\n\nhonorary post in most cases)—this was one of the few posts in the council available to the high aristocracy. <sup>[38]</sup>\n\n[The death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had](https://en.wikipedia.org/wiki/War_of_Devolution)\n\n[married Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees.](https://en.wikipedia.org/wiki/Treaty_of_the_Pyrenees) <sup>[39]</sup> The marriage\n\ntreaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants. <sup>[39]</sup> Mazarin\n\n#### **Relations with the major colonies**\n\n### **Early wars in the Low Countries**\n\n#### **Spain**", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia5.pdf" - }, - { - "text": "good officers for the King, and in a short time force his enemies to sue for peace. <sup>[66]</sup>\n\n[Louis decided to persecute Protestants and revoke the 1598 Edict of Nantes, which awarded Huguenots political and religious](https://en.wikipedia.org/wiki/Edict_of_Nantes)\n\nfreedom. He saw the persistence of Protestantism as a disgraceful reminder of royal powerlessness. After all, the Edict was the\n\n[pragmatic concession of his grandfather Henry IV to end the longstanding French Wars of Religion. An additional factor in](https://en.wikipedia.org/wiki/French_Wars_of_Religion)\n\nLouis's thinking was the prevailing contemporary European principle to assure socio-political stability, *[cuius regio, eius religio](https://en.wikipedia.org/wiki/Cuius_regio,_eius_religio)*\n\n(\"whose realm, his religion\"), the idea that the religion of the ruler should be the religion of the realm (as originally confirmed in\n\n[central Europe in the Peace of Augsburg of 1555).](https://en.wikipedia.org/wiki/Peace_of_Augsburg) <sup>[67]</sup>\n\n[Responding to petitions, Louis initially excluded Protestants from office, constrained the meeting of synods, closed churches](https://en.wikipedia.org/wiki/Synods)\n\noutside of Edict-stipulated areas, banned Protestant outdoor preachers, and prohibited domestic Protestant migration. He also\n\ndisallowed Protestant-Catholic intermarriages to which third parties objected, encouraged missions to the Protestants, and\n\n#### **France as the pivot of warfare**\n\n### **Edict of Fontainebleau**", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia5.pdf" - }, - { - "text": "( *d* ) the Industrial Court. (2) In this Constitution, unless the context otherwise requires, references to offices in the public service shall be construed as including references to the offices of judges of the Court of Appeal and judges of the High Court and the offices of members of all subordinate courts (being offices the emoluments attaching to which, or any part of the emoluments attaching to which, are paid directly out of moneys provided by Parliament). (3) For the purposes of this Constitution a person shall not be considered to be a public officer by reason only that he or she is in receipt of any remuneration or allowance as the President, Vice-President, a Minister or Assistant Minister, Speaker, Deputy Speaker or Member of the Assembly, a Member of the *Ntlo ya Dikgosi* or a member of any Commission established by this Constitution. (4) For the purposes of this Constitution, a person shall not be considered as holding a public office by reason only of the fact that he or she is in receipt of a pension or other like allowance in respect of service under the Government of Botswana or the former Protectorate of Bechuanaland. (5) In this Constitution, unless the context otherwise requires, a reference to the holder of an office by the term designating his or her office shall be construed as including a reference to any person for the time being lawfully acting in or performing the functions of that office: Provided that nothing in this subsection shall apply to references to the President or Vice-President in section 35, 36 or 39 of this Constitution. (6) In this Constitution, unless it is otherwise provided or required by the context, a reference to the power to make appointments to any office shall be construed as including a reference to the power to make appointments on promotion and transfer and to confirm appointments and to the power to appoint a person to act in or perform the functions of that office at any time when the office is vacant or the holder thereof is unable (whether by reason of absence or infirmity of mind or body or any other cause) to perform the functions of that office. (7) References in this Constitution to the power to remove a public officer from his or her office shall be construed as including references to any power conferred by any law to require or permit that officer to retire from the public service: Provided that nothing in this subsection shall be construed as conferring on any person or authority power to require a judge of the Court of Appeal or the High Court, the Auditor-General or the Director of Public Prosecutions to retire from the public service. (8) Any provision in this Constitution that vests in any person or authority power to remove any public officer from his or her office shall be without prejudice to the power of any person or authority to abolish any office or to any law providing for the compulsory retirement of public officers generally or in any class of public officer on attaining an age specified therein. (9) Where power is vested by this Constitution in any person or authority to appoint any person to act in or perform the functions of any office if the holder thereof is himself unable to perform those functions, no such appointment shall be called in question on the ground that the holder of the office was not unable to perform those functions. (10) No provision of this Constitution that any person or authority shall not be subject to the direction or control of any other person or authority in the exercise of any functions under this Constitution shall be construed as precluding a court of law from exercising jurisdiction in relation to any question whether that person or authority has performed those functions in accordance with this Constitution or any other law. (11) Where any power is conferred by this Constitution to make any Act, order,", - "page_start": 54, - "page_end": 54, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "communication be to the public generally or to any person or class of persons) and freedom from interference with his or her correspondence. (2) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) that is reasonably required in the interests of defence, public safety, public order, public morality or public health; or ( *b* ) that is reasonably required for the purpose of protecting the reputations, rights and freedoms of other persons or the private lives of persons concerned in legal proceedings, preventing the disclosure of information received in confidence, maintaining the authority and independence of the courts, regulating educational institutions in the interests of persons receiving instruction therein, or regulating the technical administration or the technical operation of telephony, telegraphy, posts, wireless, broadcasting or television; or ( *c* ) that imposes restrictions upon public officers, employees of local government bodies, or teachers, and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be reasonably justifiable in a democratic society. **13. Protection of freedom of assembly and association** (1) Except with his or her own consent, no person shall be hindered in the enjoyment of his or her freedom of assembly and association, that is to say, his or her right to assemble freely and associate with other persons and in particular to form or belong to trade unions or other associations for the protection of his or her interests. (2) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) that is reasonably required in the interests of defence, public safety, public order, public morality or public health; ( *b* ) that is reasonably required for the purpose of protecting the rights or freedoms of other persons; ( *c* ) that imposes restrictions upon public officers, employees of local government bodies, or teachers; or ( *d* ) for the registration of trade unions and associations of trade unions in a register established by or under any law, and for imposing reasonable conditions relating to the requirements for entry on such a register (including conditions as to the minimum number of persons necessary to constitute a trade union qualified for registration, or of members necessary to constitute an association of trade unions qualified for registration) and conditions whereby registration may be refused on the grounds that any other trade union already registered, or association of trade unions already registered, as the case may be, is sufficiently representative of the whole or of a substantial proportion of the interests in respect of which registration of a trade union or association of trade unions is sought, and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be reasonably justifiable in a democratic society. **14. Protection of freedom of movement** (1) No person shall be deprived of his or her freedom of movement, and for the purposes of this section the said freedom means the right to move freely throughout Botswana, the right to reside in any part of Botswana, the right to enter Botswana and immunity from expulsion from Botswana. (2) Any restriction on a person's freedom of movement that is involved in his or", - "page_start": 11, - "page_end": 11, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "own procedure. (14) Except as may be otherwise provided in its rules or procedure, the Commission may act notwithstanding any vacancy in its membership or the absence of any member and its proceedings shall not be invalidated by the presence or participation of any person not entitled to be present at or to participate in those proceedings. (15) Any decision of the Commission shall require the concurrence of a majority of all the members thereof. (16) A member of the Commission shall not, during the tenure of his or her office or during the three years immediately following such tenure, be eligible for appointment to any public office other than that of Ambassador, High Commissioner or other principal representative of Botswana in any other country or accredited to any international organization. **110. Appointment, etc., of public officers** (1) Subject to the provisions of this section and of sections 111, 113 and 114 of this Constitution, power to appoint persons to hold or to act in any office in the public service, to exercise disciplinary control over persons holding or acting in such offices and to remove from such offices shall vest in such person or persons as may be prescribed by Act of Parliament. (2) The provisions of this section shall not apply in relation to the following offices, that is to say- ( *a* ) the office of judge of the Court of Appeal or of the High Court; ( *b* ) any office to which section 104 or 112 of the Constitution applies. (3) Before any person or persons as may have been prescribed under the provisions of subsection (1) exercise power to appoint to or to act in any public office any person who holds or is acting in any office the power to make appointments to which is vested by this Constitution in the President acting in accordance with the advice of the Judicial Service Commission such person shall consult with the Judicial Service Commission. **111. Appeals to President** (1) Any person other than a member of the Botswana Police Force or the Prison Service who has been removed from office or subjected to any other punishment by the exercise of any powers conferred on any person under the provisions of section 110 of this Constitution may appeal to the Public Service Commission who may dismiss such appeal or allow it wholly or in part. (2) Subject to the provisions of subsection (3) every decision of the Public Service Commission under the provisions of this section shall be final. (3) Notwithstanding anything contained in subsection (2) if the Public Service Commission dismisses an appeal or allows it in part only the person who appealed may appeal to the President. (4) If any person appeals to the President in accordance with the provisions of subsection (3) of this section the President shall either dismiss the appeal or shall order that it be heard by a tribunal appointed by the President, the Chairman of which shall be a person who holds or has held high judicial office or is qualified to be appointed as a judge of the High Court. (5) If the President appoints a tribunal to hear an appeal in accordance with subsection (4) of this section the tribunal shall hear the appeal and shall advise the President whether or not the appeal should be allowed either wholly or in part, and the President shall act in accordance with that advice. **112. Powers of President in relation to certain public offices** (1) The power to appoint a person to hold or act in offices to which this section applies and to remove from office and to exercise disciplinary control over persons", - "page_start": 47, - "page_end": 47, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "Louis XIV in 1685, the year he\n\n[revoked the Edict of Nantes](https://en.wikipedia.org/wiki/Edict_of_Nantes)\n\n[Protestant peasants rebelled](https://en.wikipedia.org/wiki/Camisard)\n\nagainst the officially sanctioned\n\n*[dragonnades](https://en.wikipedia.org/wiki/Dragonnades)* (conversions enforced\n\n[by dragoons, labeled \"missionaries](https://en.wikipedia.org/wiki/Dragoon)\n\nin boots\") that followed the Edict of\n\nFontainebleau.\n\nrewarded converts to Catholicism. <sup>[68]</sup> This discrimination did not encounter much\n\nProtestant resistance, and a steady conversion of Protestants occurred, especially among\n\nthe noble elites.\n\nIn 1681, Louis dramatically increased his persecution of Protestants. The principle of *cuius*\n\n*regio, eius religio* generally also meant that subjects who refused to convert could\n\nemigrate, but Louis banned emigration and effectively insisted that all Protestants must be\n\nconverted. Secondly, following the proposal of René de Marillac and the Marquis of\n\n[Louvois, he began quartering dragoons in Protestant homes. Although this was within his](https://en.wikipedia.org/wiki/Dragoon)\n\nlegal rights, the *dragonnades* inflicted severe financial strain on Protestants and atrocious\n\nabuse. Between 300,000 and 400,000 Huguenots converted, as this entailed financial\n\nrewards and exemption from the *[dragonnades](https://en.wikipedia.org/wiki/Dragonnades)* . <sup>[69]</sup>\n\n[On 15 October 1685, Louis issued the Edict of](https://en.wikipedia.org/wiki/Edict_of_Fontainebleau)\n\n[Fontainebleau, which cited the redundancy of](https://en.wikipedia.org/wiki/Edict_of_Fontainebleau)\n\nprivileges for Protestants given their scarcity after\n\nthe extensive conversions. The Edict of\n\nFontainebleau revoked the Edict of Nantes and\n\nrepealed all the privileges that arose therefrom. <sup>[4]</sup>\n\nBy his edict, Louis no longer tolerated the existence\n\nof Protestant groups, pastors, or churches in France.\n\nNo further churches were to be constructed, and those already existing were to be\n\ndemolished. Pastors could choose either exile or secular life. Those Protestants who had\n\n[resisted conversion were now to be baptised forcibly into the established church.](https://en.wikipedia.org/wiki/Forced_conversion) <sup>[70]</sup>\n\nHistorians have debated Louis's reasons for issuing the Edict of Fontainebleau. He may\n\n[have been seeking to placate Pope Innocent XI, with whom relations were tense and whose](https://en.wikipedia.org/wiki/Pope_Innocent_XI)\n\n[aid was necessary to determine the outcome of a succession crisis in the Electorate of](https://en.wikipedia.org/wiki/Electorate_of_Cologne)\n\n[Cologne. He may also have acted to upstage Emperor Leopold I and regain international](https://en.wikipedia.org/wiki/Leopold_I,_Holy_Roman_Emperor)\n\nprestige after the latter defeated the Turks without Louis's help. Otherwise, he may simply\n\n[have desired to end the remaining divisions in French society dating to the Wars of Religion by fulfilling his coronation oath to](https://en.wikipedia.org/wiki/Coronation_of_the_French_monarch)\n\neradicate heresy. <sup>[71][72]</sup>\n\nMany historians have condemned the Edict of Fontainebleau as gravely harmful to France. <sup>[73]</sup> In support, they cite the emigration\n\nof about 200,000 highly skilled Huguenots (roughly one quarter of the Protestant population, or 1% of the French population)\n\nwho defied royal decrees and fled France for various Protestant states, weakening the French economy and enriching that of\n\nProtestant states. On the other hand, some historians view this as an exaggeration. They argue that most of France's preeminent\n\nProtestant businessmen and industrialists converted to Catholicism and remained. <sup>[74]</sup>\n\nWhat is certain is that the reaction to the Edict was mixed. Even while French Catholic leaders exulted, Pope Innocent XI still\n\nargued with Louis over Gallicanism and criticized the use of violence. Protestants across Europe were horrified at the treatment of", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia5.pdf" - }, - { - "text": "description of the boundaries of those constituencies. (2) The boundaries of each constituency shall be such that the number of inhabitants thereof is as nearly equal to the population quota as is reasonably practicable: Provided that the number of inhabitants of a constituency may be greater or less than the population quota in order to take account of natural community of interest, means of communication, geographical features, density of population, and the boundaries of Tribal Territories and administrative districts. (3) In this section \"population quota\" means the number obtained by dividing the number of inhabitants of Botswana (as ascertained by reference to the latest comprehensive national population census in Botswana) by the number of constituencies into which Botswana is divided under section 63 of this Constitution. (4) The President shall as soon as practicable after the submission of the report of the Delimitation Commission, by Proclamation published in the *Gazette* , declare the boundaries of the constituencies as delimited by the Commission. (5) A Proclamation made under subsection (4) of this section shall come into force at the next dissolution of the National Assembly after it is made. (6) The Commission may by regulation or otherwise regulate its own procedure and may, subject to its rules of procedure, act notwithstanding any vacancy in its membership or the absence of any member and its proceedings shall not be invalidated by the presence or participation of any person not entitled to be present at or to participate in those proceedings: Provided that any decision of the Commission shall require the concurrence of a majority of all its members. (7) In the exercise of its functions under this section the Delimitation Commission shall not be subject to the direction or control of any other person or authority. (8) A Delimitation Commission shall stand dissolved upon the date on which its report is delivered to the President. **65A. Appointment of Independent Electoral Commission** (1) There shall be an Independent Electoral Commission which shall consist of- ( *a* ) a Chairman who shall be a judge of the High Court appointed by the Judicial Service Commission; ( *b* ) a legal practitioner appointed by the Judicial Service Commission; and ( *c* ) five other persons who are fit, proper and impartial, appointed by the Judicial Service Commission from a list of persons recommended by the All Party Conference. (2) Where the All Party Conference fail to agree on all or any number of persons referred to in subsection (1)( *c* ) of this section up to dissolution of Parliament, the Judicial Service Commission shall appoint such person or persons as are necessary to fill any vacancy. (3) For the purposes of this section, \"All Party Conference\" means a meeting of all registered political parties convened from time to time by the Minister. (4) The first appointments of the Chairman and the Members of the Commission shall be made not later than 31st January, 1999, and thereafter subsequent appointments shall be made at the last dissolution of every two successive lives of Parliament. (5) The Chairman and the members of the Commission shall hold office for a period of two successive lives of Parliament. (6) A person shall not be qualified to be appointed as a member of the Independent Electoral Commission if- ( *a* ) he or she has been declared insolvent or adjudged or otherwise declared", - "page_start": 29, - "page_end": 29, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "legal4_opengouvernementlicense.pdf", - "query": "What is the prison population grew in average by year between 1993 and 2008 ?", - "target_page": 8, - "target_passage": "The prison population grew rapidly between 1993 to 2008, at an average of 4% a year.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## **2. Recent trends in the population**\n\nThe ‘Story of the Prison Population 1993 to 2012’ is an in-depth look at what happened to the prison population between 1993 and 2012 and the major factors contributing to the changes. <sup>4</sup>\n\nThe prison population grew rapidly between 1993 to 2008, at an average of 4% a year. This rapid rise was driven by:\n\n- increased numbers of people sentenced to immediate custody from 1993 to 2002;\n\n- increases in the average custodial sentence length and increased use of indeterminate sentences; and\n\n- an increase in numbers recalled to prison following breaches of the conditions of licence and these offenders spending longer in prison once recalled.\n\nThe rise in the prison population slowed considerably from the summer of 2008, in part due to the introduction of the Criminal Justice and Immigration Act (CJIA) 2008 <sup>5</sup> which changed sentencing and offender management in ways which helped to reduce growth in the prison population.\n\nThis flatter trend continued until the public disorder seen in UK cities from 6 to 9 August 2011 which had an immediate but temporary impact on the prison population.\n\nDuring 2012 and into 2013, the prison population began to fall due to a falling remand population and a continued decline in the number of under 18s in custody. The falling remand population during 2012 reflected falling volumes going through the courts plus the introduction, in December 2012, of measures restricting the use of remand for all offenders who would be unlikely to receive a custodial sentence. <sup>6</sup>\n\nFrom the end of August 2013 to the end of October 2013, the remand population rose sharply, driving an overall increase in the prison population. This was being driven by an increase in demand in the Crown Courts, especially among more serious tri-able either way cases. The total population has continued to rise since the beginning of 2014 and reached 85,925 <sup>7</sup> on the\n\n4 [ Story of the Prison Population: www.gov.uk/government/publications/story-of-the-prison-](https://www.gov.uk/government/publications/story-of-the-prison-population-1993-2012) [population-1993-2012](https://www.gov.uk/government/publications/story-of-the-prison-population-1993-2012)\n\n5 [ services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html](http://services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html) 6 http://services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html 7 [ www.gov.uk/government/statistics/prison-population-figures-2014 ](https://www.gov.uk/government/statistics/prison-population-figures-2014)\n\n6", - "page_start": 7, - "page_end": 7, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "## **Key points**\n\nThis bulletin presents projections of the prison population in England and Wales from November 2014 to December 2020. The prison population projections are based on assumptions about future custodial convictions and incorporate the anticipated impacts of agreed policy and procedural initiatives.\n\nThe “Central Scenario” estimates that the prison population will increase from the current position 85,925 <sup>1</sup> to 87,700 by June 2015. By the end of June 2020 the prison population is projected to be 90,200. This Central Scenario is our best estimate based on the available information. The projected prison population under our Central Scenario is shown in Chart 1.\n\nThe prison population projections are produced using a model of flows of offenders into and out of prison which counts the resulting prison population each month.\n\n**Chart 1: Projected prison population (Central Scenario)**\n\n**Total Prison Population**\n\n**Prison population projections from November 2014 to December 2020**\n\n70,000\n\n75,000\n\n80,000\n\n85,000\n\n90,000\n\n95,000\n\n100,000\n\n105,000\n\nNov-14 Mar-15 Jul-15 Nov-15 Mar-16 Jul-16 Nov-16 Mar-17 Jul-17 Nov-17 Mar-18 Jul-18 Nov-18 Mar-19 Jul-19 Nov-19 Mar-20 Jul-20 Nov-20\n\n**Month End**\n\n**Prison Population**\n\nCentral Scenario\n\nThe Central Scenario has been modelled assuming custodial convictions are broadly in line with recent trends and average length of sentence to be flat based on recent trends.\n\nThe projections do not attempt to estimate the impact of any future Government policy that is yet to achieve Royal Assent, and therefore become less certain over time.\n\n1 [As at 21 November 2014: www.gov.uk/government/statistics/prison-population-figures-2014](https://www.gov.uk/government/statistics/prison-population-figures-2014)\n\n2", - "page_start": 3, - "page_end": 3, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**3a) Producing prison population projections**\n\nPrison population projections are produced using the Prison Population Stock- Flow Model. The principal sub-populations in prison - determinate sentence, life sentence, imprisonment for public protection (IPP) and remand - are modelled using stock-flow structures based on the generic structure shown in Figure B2. The stock-flow structures model the flow of offenders into and out of prison and count the resulting prison population at the end of each month.\n\n**Figure B2: Generic stock-flow structure in the Prison Population Stock-Flow Model**\n\nPrison Population\n\nReceptions / Pre-tariff ends Discharges\n\nAverage Time Served\n\nPrison Population\n\nReceptions / Pre-tariff ends Discharges\n\nAverage Time Served\n\nFor the determinate population, the monthly inflows to prison are based on the custodial convictions projections described above. These custodial convictions include offenders that may already be serving a sentence for a previous crime or those who would serve their whole custodial sentence on remand, meaning that they would not be a new reception to prison. To convert from custodial convictions to prison receptions we apply a conversion ratio derived from the historical proportions of custodial convictions to prison receptions for each sub-population averaged over the last twelve months of historical data (April 2013 to March 2014 inclusive).\n\nMonthly outflows for the determinate population are based on observed custodial sentence lengths and the observed percentage of sentence length served taken from October 2013 to April 2014. Each projected offender that enters the model is given a custodial sentence length that is randomly selected from the relevant distribution. These distributions are populated with custodial sentence lengths from actual offender receptions who share the same characteristics of offence, gender and age group in the observed time period. The percent of custodial sentence length served is derived in the same manner, except that the observed distribution is made up of discharged offenders further disaggregated by custodial sentence length band.\n\nFor offenders who receive the new EDS sentence an adjustment is made to the percent of custodial length served to reflect that these offenders will spend a greater proportion of their sentence in custody than standard determinate sentenced offenders discharged to date.\n\nProjected prison receptions are sub-divided by age category (Juvenile, Young Adult, Adult) with the exact age of the offender attributed in the same manner as the custodial sentence lengths. This allows the model to explicitly age the offenders whilst in prison (e.g. move from Juvenile to Young Adult categories).\n\n25", - "page_start": 26, - "page_end": 26, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "## **4. Results**\n\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\n\nChart 2 presents Prison population projections from November 2014 to December 2020.\n\n**Chart 2: Projected monthly prison population (all scenarios)**\n\n**Total Prison Population**\n\n**Prison population projections from November 2014 to December 2020**\n\n70,000\n\n75,000\n\n80,000\n\n85,000\n\n90,000\n\n95,000\n\n100,000\n\n105,000\n\nNov-14 Mar-15 Jul-15 Nov-15 Mar-16 Jul-16 Nov-16 Mar-17 Jul-17 Nov-17 Mar-18 Jul-18 Nov-18 Mar-19 Jul-19 Nov-19 Mar-20 Jul-20 Nov-20\n\n**Month End**\n\n**Prison Population**\n\nScenario 1 Central Scenario Scenario 2\n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 by the end of June 2015 and then fall to 81,400 by the end of June 2020.\n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 by the end of June 2015 and to 98,900 by the end of June 2020.\n\nThe projected trends reflect the cumulative impacts of the various sentencing, legislative and procedural assumptions that are used to generate the projections. The seasonal pattern reflects the dip in the prison population which is always seen around the Christmas period.\n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by June 2020. The projected population increase is largely due to the recent trends in case mix where we have seen more serious cases come before the courts. This results in offenders receiving longer custodial sentence lengths, which in turn places an upward pressure on the prison population. The growth in this scenario is largely driven by the rise in the determinate population which is projected to grow to 60,200 by June 2020. This is partially due to the\n\n11", - "page_start": 12, - "page_end": 12, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "## **1. Central Scenario**\n\nThis bulletin presents prison population projections for England and Wales from November 2014 to December 2020. The central projection is produced to aid development, capacity planning and resource allocation within the Criminal Justice System (CJS) and the National Offender Management Service (NOMS). The latest published useable operational capacity (21 November 2014) is 88,015 <sup>2</sup> .\n\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\n\nThe Central Scenario tracks the impact of current trends in sentencing on custodial convictions, custodial sentence lengths and hence on the resulting prison population. These assumptions have been agreed through a consultative process. Government policy is only included in these projections when it has received Royal Assent. These projections also take into account other drivers including:\n\n- trends in the age, gender and offence of defendants entering the system and in the flow of cases through the courts;\n\n- assumptions regarding future parole hearing frequency and expected outcomes for indeterminate (Life and Indeterminate for the Public Protection) sentences;\n\n- the Home Office gaining access to all 580 places at the Verne Immigration Removal Centre (IRC) by January 2015;\n\n- the impacts of the Offender Rehabilitation Act 2014 <sup>3</sup> which achieved Royal Assent on 13 March 2014 meaning offenders sentenced to custodial sentences of less than 12 months will be released subject to licence. There will also be a new post-sentence supervision period following licence for offenders released from custodial sentences of less than 2 years;\n\n- the impacts of the Release on Temporary Licence (ROTL) review deciding that all offenders who have previously absconded will no longer be allowed to return to the open estate or be released on temporary licence except in exceptional circumstances.\n\n2 [ www.gov.uk/government/statistics/prison-population-figures-2014](https://www.gov.uk/government/statistics/prison-population-figures-2014) 3 [ www.justice.gov.uk/transforming-rehabilitation ](https://www.justice.gov.uk/transforming-rehabilitation)\n\n4", - "page_start": 5, - "page_end": 5, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "At the core of the method is a model of flows of offenders into and out of prison which counts the resulting prison population each month for sentenced, recall and remand prisoners.\n\nInputs to the prison projections model include projections of future custodial convictions. These are generated from time series projections of numbers of defendants entering the criminal courts and take into account the age, gender and offence of defendants entering the system, the flow of cases through the courts and the sentences which concluded cases attract.\n\nThe prison projections model monitors the sizes of the sentenced, recall and remand prison populations. These populations depend on the inflows defined above and the outflows. These outflows are defined by observed distributions of custodial sentence lengths, and the proportion of custodial sentences served for subsets of these populations. The model also simulates the ageing of the prison population over time.\n\nThe projection model is based on data up to June 2014 from various sources including court proceedings and performance data, sentencing data and prison receptions and population data.\n\nThe results of the prison projections model are supplemented with an estimate of the future non-criminal and fine defaulter populations, which is based on the latest available data to September 2014.\n\nThree scenarios have been modelled. These scenarios track the impact of three different incremental changes in sentencing behaviour:\n\n- The Central Scenario assumes custodial convictions are broadly in line with recent trends. The average length of sentence is assumed to be flat based on recent trends in sentence lengths. This broadly reflects the assumptions for Scenario 2 in the November 2013 projections.\n\nWe also consider two illustrative scenarios\n\n- Scenario 1 assumes that custodial convictions will fall against recent trends. The average length of sentence is assumed to be lower than what has been observed in recent trends in sentence lengths.\n\n- Scenario 2 assumes a rise in custodial convictions when compared to recent trends. Also the average length of sentence is assumed to be higher than what has been observed in recent trends in sentence lengths.\n\nThe three scenarios also incorporate the impact of:\n\n- trends in the age, gender and offence of defendants entering the system and in the flow of cases through the courts;\n\n9", - "page_start": 10, - "page_end": 10, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "The approach for the other sub-populations is similar and has not been substantially revised since the 2013 publication. The methodology applied to each is briefly outlined below.\n\nThe recall population is projected going forward based on time-series data available to October 2014.\n\nFor remand prisoners the average time served on remand is calculated from the ratio of the remand population to remand receptions. The modelled stock of prisoners is calibrated to historical actuals by varying levels of receptions. The remand population is generated in two parts both using this approach - untried remand and unsentenced remand populations being treated separately.\n\nIPP and life sentence prisoners have an extra section in the stock-flow structure which models the indeterminate nature of their sentence lengths. Outflows for IPP and life sentence prisoners depend on the tariff lengths they receive and on the frequency and outcome of Parole Board hearings. The values of these parameters are set and calibrated to reflect the most recent data on Parole Board outcomes.\n\nNOMS have made an agreement with the Home Office to hold an increased number of immigration detainees, which are only seen in the final two periods of historical data. The projected size of the non-criminal population is therefore set equal to the average size of the non-criminal population over the last two months of available data. This ensures that the non-criminal projections reflect the latest and most accurate count of the non-criminal population.\n\nThe population in prison at the end of each modelled month is aggregated into the categories defined by gender, current age group and, for determinate sentence prisoners, sentence length band, to produce raw, unadjusted prison population projections.\n\n**3b) Accounting for the impacts of circumstance, legislation, and for seasonal effects**\n\nThe raw, unadjusted prison population projections are subject to model adjustments to show the impact of certain provisions in the Offender Rehabilitation Act 2014, changes at the Verne and the ROTL review. Model adjustments are also used to account for seasonal variation in the population. Model adjustments have been applied equally to all the scenarios modelled.\n\nThe Home Office is to gain access to all 580 places at the Verne IRC by January 2015. The estimated impacts have been applied to the non-criminal projection in the model.\n\nProvisions in the Offender Rehabilitation Act 2014 will mean that offenders sentenced to custodial sentences of less than 12 months will be released subject to licence (in the same way as offenders currently released from\n\n26", - "page_start": 27, - "page_end": 27, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "## **Appendix B: Detail of models, scenarios and assumptions**\n\n**The updated modelling approach**\n\nThe prison projections form part of the Ministry of Justice’s wider work to develop a consistent and coherent suite of models of the criminal courts and offender management, driven by common projections of demand for the Ministry of Justice’s services.\n\nThe prisons model used to generate the 2014 projections has not changed substantially from that used in the 2013 projections. As in the 2013 projections custodial sentence lengths used in the model are disaggregated by gender, age of the offender and offence type. The total time to be served in prison by projected future prisoners is assigned by matching their gender and age characteristics to relevant distributions of (i) custodial sentence lengths and (ii) the percentage of custodial sentence served. These distributions are derived from data for the period October 2013 to April 2014. This allows us to:\n\n- understand the Criminal Justice System factors which contribute to change in the prison population, including sentences lengths issued, the percentage of sentence served in custody, trial court and sentencing court changes, or shifts in the demographic characteristics of defendants;\n\n- model the impact on the prison population of specific Ministry of Justice and other Criminal Justice Agency policy changes; and\n\n- quantify the impact of uncertainty around the time a defendant serves in prison on the prison population.\n\n**Overview of the modelling approach**\n\nCentral to the modelling approach is the Prison Population Stock-Flow model. Projections of future custodial convictions are fed into this model and outputs are adjusted to account for the impact of changes in legislation and process on the prison population, as shown in Figure B1, and described below.\n\n21", - "page_start": 22, - "page_end": 22, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "longer custodial terms). During the licence period, offenders are under probation supervision and can be subject to various conditions for the purposes of rehabilitation and public protection. The 2014 Act will also introduce a new post-sentence supervision period that follows licence for offenders released from custodial sentences of less than 2 years. Breaches of these licence or supervision periods could result in the offender being recalled or committed to custody, impacting the prison population. The estimated impacts have been applied to the recall populations in the model.\n\nThe impact of the ROTL review has also been included as a post model adjustment. The review decided that all offenders who have previously absconded will no longer be allowed to return to the open estate or be released on temporary licence except in exceptional circumstances. Alongside protecting the public this may have the impact of delaying the release decision for such offenders impacting the prison population. The estimated impacts have been applied to the determinate population with sentences of greater than 12 months and the indeterminate population.\n\nOther ongoing changes within the system - included in previous published projections as model adjustments - are assumed to be captured in the past data and the trends detected therein.\n\nCustodial conviction projections for each sub-population were smoothed using a centred 12 month average. No seasonality in prison receptions and discharges was modelled explicitly. Seasonality was measured in the historical prison population and applied as a series of percentage adjustments to the final population projections. Seasonal factors for a set of sub-population categories (Remand, Determinate by sentence length band and Recall) were identified for each month by measuring statistically significant deviations from a centred 12 month average.\n\n27", - "page_start": 28, - "page_end": 28, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "21 November 2014. The latest projections assume demand in the courts remains at this higher level.\n\nTable 1 summarises these changes.\n\n**Table 1: Population in custody changes from 2006 to 2014**\n\n| | Offender Management Statistics | Offender Management Statistics | Year on year % difference |\n|:---|:---|:---|:---|\n| | Start of Year | End of Year | Year on year % difference |\n| June 2006 to June 2007 June 2007 to June 2008 June 2008 to June 2009 June 2009 to June 2010 June 2010 to June 2011 June 2011 to June 2012 June 2012 to June 2013 June 2013 to June 2014 | 77,982 79,734 83,194 83,454 85,002 85,374 86,048 83,842 | 79,734 83,194 83,454 85,002 85,374 86,048 83,842 85,509 | 2.2% 4.3% 0.3% 1.9% 0.4% 0.8% -2.6% 2.0% |\n\nFurther statistics and commentary on the changes seen in prison population over the last year, is presented in the Offender Management Statistics Quarterly publication. This is available online on GOV.UK at: [www.gov.uk/government/collections/offender-management-statistics-quarterly ](https://www.gov.uk/government/collections/offender-management-statistics-quarterly)\n\n7", - "page_start": 8, - "page_end": 8, - "source_file": "legal4_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal4_opengouvernementlicense.pdf", - "query": "Do you know the prison population estimation for the and of June 2020 ?", - "target_page": 13, - "target_passage": "The Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "## **Key points**\n\nThis bulletin presents projections of the prison population in England and Wales from November 2014 to December 2020. The prison population projections are based on assumptions about future custodial convictions and incorporate the anticipated impacts of agreed policy and procedural initiatives.\n\nThe “Central Scenario” estimates that the prison population will increase from the current position 85,925 <sup>1</sup> to 87,700 by June 2015. By the end of June 2020 the prison population is projected to be 90,200. This Central Scenario is our best estimate based on the available information. The projected prison population under our Central Scenario is shown in Chart 1.\n\nThe prison population projections are produced using a model of flows of offenders into and out of prison which counts the resulting prison population each month.\n\n**Chart 1: Projected prison population (Central Scenario)**\n\n**Total Prison Population**\n\n**Prison population projections from November 2014 to December 2020**\n\n70,000\n\n75,000\n\n80,000\n\n85,000\n\n90,000\n\n95,000\n\n100,000\n\n105,000\n\nNov-14 Mar-15 Jul-15 Nov-15 Mar-16 Jul-16 Nov-16 Mar-17 Jul-17 Nov-17 Mar-18 Jul-18 Nov-18 Mar-19 Jul-19 Nov-19 Mar-20 Jul-20 Nov-20\n\n**Month End**\n\n**Prison Population**\n\nCentral Scenario\n\nThe Central Scenario has been modelled assuming custodial convictions are broadly in line with recent trends and average length of sentence to be flat based on recent trends.\n\nThe projections do not attempt to estimate the impact of any future Government policy that is yet to achieve Royal Assent, and therefore become less certain over time.\n\n1 [As at 21 November 2014: www.gov.uk/government/statistics/prison-population-figures-2014](https://www.gov.uk/government/statistics/prison-population-figures-2014)\n\n2", - "page_start": 3, - "page_end": 3, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "## **4. Results**\n\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\n\nChart 2 presents Prison population projections from November 2014 to December 2020.\n\n**Chart 2: Projected monthly prison population (all scenarios)**\n\n**Total Prison Population**\n\n**Prison population projections from November 2014 to December 2020**\n\n70,000\n\n75,000\n\n80,000\n\n85,000\n\n90,000\n\n95,000\n\n100,000\n\n105,000\n\nNov-14 Mar-15 Jul-15 Nov-15 Mar-16 Jul-16 Nov-16 Mar-17 Jul-17 Nov-17 Mar-18 Jul-18 Nov-18 Mar-19 Jul-19 Nov-19 Mar-20 Jul-20 Nov-20\n\n**Month End**\n\n**Prison Population**\n\nScenario 1 Central Scenario Scenario 2\n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 by the end of June 2015 and then fall to 81,400 by the end of June 2020.\n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 by the end of June 2015 and to 98,900 by the end of June 2020.\n\nThe projected trends reflect the cumulative impacts of the various sentencing, legislative and procedural assumptions that are used to generate the projections. The seasonal pattern reflects the dip in the prison population which is always seen around the Christmas period.\n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by June 2020. The projected population increase is largely due to the recent trends in case mix where we have seen more serious cases come before the courts. This results in offenders receiving longer custodial sentence lengths, which in turn places an upward pressure on the prison population. The growth in this scenario is largely driven by the rise in the determinate population which is projected to grow to 60,200 by June 2020. This is partially due to the\n\n11", - "page_start": 12, - "page_end": 12, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "## **3. Modelling methodology and projection scenarios**\n\nThe prison projections model is part of wider work within the Ministry of Justice to develop a consistent and coherent suite of models of the criminal courts and offender management, driven by common projections of demand for the Ministry of Justice’s services.\n\nThe custodial convictions model uses projections of numbers of defendants entering the criminal courts. In order to project volumes of defendants being given a custodial sentence, it also takes into account:\n\n- the age, gender and offence of defendants entering the system;\n\n- the flow of cases through the courts; and\n\n- the sentences which concluded cases attract.\n\nThe prison population projections model takes projections of custodial convictions, converts them to projections of prison receptions and then models the amount of time that offenders spend in prison to calculate the resulting prison population.\n\nThe benefits of this method are that it allows us to:\n\n- explicitly project custodial convictions (rather than just convictions);\n\n- understand the Criminal Justice System factors which contribute to change in the prison population, such as time served, sentences given, trial and sentencing court changes or shifts in defendant demographics; and\n\n- more easily model the impact on the prison population of specific Ministry of Justice and other Criminal Justice Agency policy changes relating to specific offences or specific sentences.\n\nAppendix B provides details of the methods used to produce the prison population projections and the assumptions behind them.\n\nThe assumptions informing these projections, and therefore the projections themselves, are subject to significant uncertainty. This is represented by the three scenarios, with each scenario being only as likely as the assumptions which inform it.\n\nThe method used for generating projections of the prison population in England and Wales for the 2014-2020 projections is consistent with the approach used to generate the 2013-2019 projections published on 7 November 2013.\n\n8", - "page_start": 9, - "page_end": 9, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "## **2. Recent trends in the population**\n\nThe ‘Story of the Prison Population 1993 to 2012’ is an in-depth look at what happened to the prison population between 1993 and 2012 and the major factors contributing to the changes. <sup>4</sup>\n\nThe prison population grew rapidly between 1993 to 2008, at an average of 4% a year. This rapid rise was driven by:\n\n- increased numbers of people sentenced to immediate custody from 1993 to 2002;\n\n- increases in the average custodial sentence length and increased use of indeterminate sentences; and\n\n- an increase in numbers recalled to prison following breaches of the conditions of licence and these offenders spending longer in prison once recalled.\n\nThe rise in the prison population slowed considerably from the summer of 2008, in part due to the introduction of the Criminal Justice and Immigration Act (CJIA) 2008 <sup>5</sup> which changed sentencing and offender management in ways which helped to reduce growth in the prison population.\n\nThis flatter trend continued until the public disorder seen in UK cities from 6 to 9 August 2011 which had an immediate but temporary impact on the prison population.\n\nDuring 2012 and into 2013, the prison population began to fall due to a falling remand population and a continued decline in the number of under 18s in custody. The falling remand population during 2012 reflected falling volumes going through the courts plus the introduction, in December 2012, of measures restricting the use of remand for all offenders who would be unlikely to receive a custodial sentence. <sup>6</sup>\n\nFrom the end of August 2013 to the end of October 2013, the remand population rose sharply, driving an overall increase in the prison population. This was being driven by an increase in demand in the Crown Courts, especially among more serious tri-able either way cases. The total population has continued to rise since the beginning of 2014 and reached 85,925 <sup>7</sup> on the\n\n4 [ Story of the Prison Population: www.gov.uk/government/publications/story-of-the-prison-](https://www.gov.uk/government/publications/story-of-the-prison-population-1993-2012) [population-1993-2012](https://www.gov.uk/government/publications/story-of-the-prison-population-1993-2012)\n\n5 [ services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html](http://services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html) 6 http://services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html 7 [ www.gov.uk/government/statistics/prison-population-figures-2014 ](https://www.gov.uk/government/statistics/prison-population-figures-2014)\n\n6", - "page_start": 7, - "page_end": 7, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "## **1. Central Scenario**\n\nThis bulletin presents prison population projections for England and Wales from November 2014 to December 2020. The central projection is produced to aid development, capacity planning and resource allocation within the Criminal Justice System (CJS) and the National Offender Management Service (NOMS). The latest published useable operational capacity (21 November 2014) is 88,015 <sup>2</sup> .\n\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\n\nThe Central Scenario tracks the impact of current trends in sentencing on custodial convictions, custodial sentence lengths and hence on the resulting prison population. These assumptions have been agreed through a consultative process. Government policy is only included in these projections when it has received Royal Assent. These projections also take into account other drivers including:\n\n- trends in the age, gender and offence of defendants entering the system and in the flow of cases through the courts;\n\n- assumptions regarding future parole hearing frequency and expected outcomes for indeterminate (Life and Indeterminate for the Public Protection) sentences;\n\n- the Home Office gaining access to all 580 places at the Verne Immigration Removal Centre (IRC) by January 2015;\n\n- the impacts of the Offender Rehabilitation Act 2014 <sup>3</sup> which achieved Royal Assent on 13 March 2014 meaning offenders sentenced to custodial sentences of less than 12 months will be released subject to licence. There will also be a new post-sentence supervision period following licence for offenders released from custodial sentences of less than 2 years;\n\n- the impacts of the Release on Temporary Licence (ROTL) review deciding that all offenders who have previously absconded will no longer be allowed to return to the open estate or be released on temporary licence except in exceptional circumstances.\n\n2 [ www.gov.uk/government/statistics/prison-population-figures-2014](https://www.gov.uk/government/statistics/prison-population-figures-2014) 3 [ www.justice.gov.uk/transforming-rehabilitation ](https://www.justice.gov.uk/transforming-rehabilitation)\n\n4", - "page_start": 5, - "page_end": 5, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "## **Appendix B: Detail of models, scenarios and assumptions**\n\n**The updated modelling approach**\n\nThe prison projections form part of the Ministry of Justice’s wider work to develop a consistent and coherent suite of models of the criminal courts and offender management, driven by common projections of demand for the Ministry of Justice’s services.\n\nThe prisons model used to generate the 2014 projections has not changed substantially from that used in the 2013 projections. As in the 2013 projections custodial sentence lengths used in the model are disaggregated by gender, age of the offender and offence type. The total time to be served in prison by projected future prisoners is assigned by matching their gender and age characteristics to relevant distributions of (i) custodial sentence lengths and (ii) the percentage of custodial sentence served. These distributions are derived from data for the period October 2013 to April 2014. This allows us to:\n\n- understand the Criminal Justice System factors which contribute to change in the prison population, including sentences lengths issued, the percentage of sentence served in custody, trial court and sentencing court changes, or shifts in the demographic characteristics of defendants;\n\n- model the impact on the prison population of specific Ministry of Justice and other Criminal Justice Agency policy changes; and\n\n- quantify the impact of uncertainty around the time a defendant serves in prison on the prison population.\n\n**Overview of the modelling approach**\n\nCentral to the modelling approach is the Prison Population Stock-Flow model. Projections of future custodial convictions are fed into this model and outputs are adjusted to account for the impact of changes in legislation and process on the prison population, as shown in Figure B1, and described below.\n\n21", - "page_start": 22, - "page_end": 22, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "The approach for the other sub-populations is similar and has not been substantially revised since the 2013 publication. The methodology applied to each is briefly outlined below.\n\nThe recall population is projected going forward based on time-series data available to October 2014.\n\nFor remand prisoners the average time served on remand is calculated from the ratio of the remand population to remand receptions. The modelled stock of prisoners is calibrated to historical actuals by varying levels of receptions. The remand population is generated in two parts both using this approach - untried remand and unsentenced remand populations being treated separately.\n\nIPP and life sentence prisoners have an extra section in the stock-flow structure which models the indeterminate nature of their sentence lengths. Outflows for IPP and life sentence prisoners depend on the tariff lengths they receive and on the frequency and outcome of Parole Board hearings. The values of these parameters are set and calibrated to reflect the most recent data on Parole Board outcomes.\n\nNOMS have made an agreement with the Home Office to hold an increased number of immigration detainees, which are only seen in the final two periods of historical data. The projected size of the non-criminal population is therefore set equal to the average size of the non-criminal population over the last two months of available data. This ensures that the non-criminal projections reflect the latest and most accurate count of the non-criminal population.\n\nThe population in prison at the end of each modelled month is aggregated into the categories defined by gender, current age group and, for determinate sentence prisoners, sentence length band, to produce raw, unadjusted prison population projections.\n\n**3b) Accounting for the impacts of circumstance, legislation, and for seasonal effects**\n\nThe raw, unadjusted prison population projections are subject to model adjustments to show the impact of certain provisions in the Offender Rehabilitation Act 2014, changes at the Verne and the ROTL review. Model adjustments are also used to account for seasonal variation in the population. Model adjustments have been applied equally to all the scenarios modelled.\n\nThe Home Office is to gain access to all 580 places at the Verne IRC by January 2015. The estimated impacts have been applied to the non-criminal projection in the model.\n\nProvisions in the Offender Rehabilitation Act 2014 will mean that offenders sentenced to custodial sentences of less than 12 months will be released subject to licence (in the same way as offenders currently released from\n\n26", - "page_start": 27, - "page_end": 27, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "At the core of the method is a model of flows of offenders into and out of prison which counts the resulting prison population each month for sentenced, recall and remand prisoners.\n\nInputs to the prison projections model include projections of future custodial convictions. These are generated from time series projections of numbers of defendants entering the criminal courts and take into account the age, gender and offence of defendants entering the system, the flow of cases through the courts and the sentences which concluded cases attract.\n\nThe prison projections model monitors the sizes of the sentenced, recall and remand prison populations. These populations depend on the inflows defined above and the outflows. These outflows are defined by observed distributions of custodial sentence lengths, and the proportion of custodial sentences served for subsets of these populations. The model also simulates the ageing of the prison population over time.\n\nThe projection model is based on data up to June 2014 from various sources including court proceedings and performance data, sentencing data and prison receptions and population data.\n\nThe results of the prison projections model are supplemented with an estimate of the future non-criminal and fine defaulter populations, which is based on the latest available data to September 2014.\n\nThree scenarios have been modelled. These scenarios track the impact of three different incremental changes in sentencing behaviour:\n\n- The Central Scenario assumes custodial convictions are broadly in line with recent trends. The average length of sentence is assumed to be flat based on recent trends in sentence lengths. This broadly reflects the assumptions for Scenario 2 in the November 2013 projections.\n\nWe also consider two illustrative scenarios\n\n- Scenario 1 assumes that custodial convictions will fall against recent trends. The average length of sentence is assumed to be lower than what has been observed in recent trends in sentence lengths.\n\n- Scenario 2 assumes a rise in custodial convictions when compared to recent trends. Also the average length of sentence is assumed to be higher than what has been observed in recent trends in sentence lengths.\n\nThe three scenarios also incorporate the impact of:\n\n- trends in the age, gender and offence of defendants entering the system and in the flow of cases through the courts;\n\n9", - "page_start": 10, - "page_end": 10, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "longer custodial terms). During the licence period, offenders are under probation supervision and can be subject to various conditions for the purposes of rehabilitation and public protection. The 2014 Act will also introduce a new post-sentence supervision period that follows licence for offenders released from custodial sentences of less than 2 years. Breaches of these licence or supervision periods could result in the offender being recalled or committed to custody, impacting the prison population. The estimated impacts have been applied to the recall populations in the model.\n\nThe impact of the ROTL review has also been included as a post model adjustment. The review decided that all offenders who have previously absconded will no longer be allowed to return to the open estate or be released on temporary licence except in exceptional circumstances. Alongside protecting the public this may have the impact of delaying the release decision for such offenders impacting the prison population. The estimated impacts have been applied to the determinate population with sentences of greater than 12 months and the indeterminate population.\n\nOther ongoing changes within the system - included in previous published projections as model adjustments - are assumed to be captured in the past data and the trends detected therein.\n\nCustodial conviction projections for each sub-population were smoothed using a centred 12 month average. No seasonality in prison receptions and discharges was modelled explicitly. Seasonality was measured in the historical prison population and applied as a series of percentage adjustments to the final population projections. Seasonal factors for a set of sub-population categories (Remand, Determinate by sentence length band and Recall) were identified for each month by measuring statistically significant deviations from a centred 12 month average.\n\n27", - "page_start": 28, - "page_end": 28, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "**3a) Producing prison population projections**\n\nPrison population projections are produced using the Prison Population Stock- Flow Model. The principal sub-populations in prison - determinate sentence, life sentence, imprisonment for public protection (IPP) and remand - are modelled using stock-flow structures based on the generic structure shown in Figure B2. The stock-flow structures model the flow of offenders into and out of prison and count the resulting prison population at the end of each month.\n\n**Figure B2: Generic stock-flow structure in the Prison Population Stock-Flow Model**\n\nPrison Population\n\nReceptions / Pre-tariff ends Discharges\n\nAverage Time Served\n\nPrison Population\n\nReceptions / Pre-tariff ends Discharges\n\nAverage Time Served\n\nFor the determinate population, the monthly inflows to prison are based on the custodial convictions projections described above. These custodial convictions include offenders that may already be serving a sentence for a previous crime or those who would serve their whole custodial sentence on remand, meaning that they would not be a new reception to prison. To convert from custodial convictions to prison receptions we apply a conversion ratio derived from the historical proportions of custodial convictions to prison receptions for each sub-population averaged over the last twelve months of historical data (April 2013 to March 2014 inclusive).\n\nMonthly outflows for the determinate population are based on observed custodial sentence lengths and the observed percentage of sentence length served taken from October 2013 to April 2014. Each projected offender that enters the model is given a custodial sentence length that is randomly selected from the relevant distribution. These distributions are populated with custodial sentence lengths from actual offender receptions who share the same characteristics of offence, gender and age group in the observed time period. The percent of custodial sentence length served is derived in the same manner, except that the observed distribution is made up of discharged offenders further disaggregated by custodial sentence length band.\n\nFor offenders who receive the new EDS sentence an adjustment is made to the percent of custodial length served to reflect that these offenders will spend a greater proportion of their sentence in custody than standard determinate sentenced offenders discharged to date.\n\nProjected prison receptions are sub-divided by age category (Juvenile, Young Adult, Adult) with the exact age of the offender attributed in the same manner as the custodial sentence lengths. This allows the model to explicitly age the offenders whilst in prison (e.g. move from Juvenile to Young Adult categories).\n\n25", - "page_start": 26, - "page_end": 26, - "source_file": "legal4_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal4_opengouvernementlicense.pdf", - "query": "What is the phone number of the Ministry of Justice press office ?", - "target_page": 30, - "target_passage": "Press enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536 ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## **Contact Points for further information**\n\nCurrent and previous editions of this publication are available for download from www.justice.gov.uk/publications/statistics-and-data/index.htm\n\nPress enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536\n\nOther enquiries about these statistics should be directed to:\n\nJustice Statistics Analytical Services Ministry of Justice 7th Floor 102 Petty France London SW1H 9AJ\n\nGeneral enquiries about the statistical work of the Ministry of Justice can be e- mailed to: statistics.enquiries@justice.gsi.gov.uk\n\nGeneral information about the official statistics system of the UK is available from www.statistics.gov.uk\n\n28 29", - "page_start": 29, - "page_end": 29, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "Alternative format versions of this report are available on request from the [Ministry of Justice at statistics.enquiries@justice.gsi.gov.uk ](mailto:statistics.enquiries@justice.gsi.gov.uk)\n\n© Crown copyright Produced by the Ministry of Justice", - "page_start": 30, - "page_end": 30, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "holding or acting in such offices shall, subject to the provisions of sections 113 and 114 of this Constitution, vest in the President. (2) The offices to which this section applies are- ( *a* ) Ambassador, High Commissioner or other principal representative of Botswana in any other country or accredited to any international organisation; ( *b* ) Secretary to the Cabinet; ( *c* ) Attorney-General; ( *c* A) Director of Public Prosecutions; ( *d* ) Permanent Secretary; ( *e* ) Commissioner of Police; and ( *f* ) any other superscale office (other than an office to which this Constitution makes specific provision for appointment or an office to which appointment is made under the provisions of section 104 of this Constitution) which may be prescribed by Act of Parliament. **113. Tenure of office of Director of Public Prosecutions** (1) Subject to the provisions of this section, a person appointed as Director of Public Prosecutions shall hold office for a 5 year renewable term or until he or she attains the age of 60 years, whichever is the earlier. (2) A person holding the office of Director of Public Prosecutions may be removed from office only for inability to perform the functions of his or her office (whether arising from infirmity of body or mind or any other cause) or for misbehaviour or for incompetence and shall not be so removed except in accordance with the provisions of this section. (3) If the President considers that the question of removing a person holding the office of Director of Public Prosecutions from office ought to be investigated then- ( *a* ) he or she shall appoint a tribunal which shall consist of a Chairman and not less than two other members, who hold or have held high judicial office; and ( *b* ) the tribunal shall enquire into the matter and report on the facts thereof to the President and advise the President whether the person holding the office of Director of Public Prosecutions ought to be removed from office under this section for inability as aforesaid or for misbehaviour or for incompetence. (4) Where a tribunal appointed under subsection (3) of this section advises the President that a person holding the office of Director of Public Prosecutions ought to be removed from office for inability as aforesaid or for misbehaviour or for incompetence, the President shall remove such person from office. (5) If the question of removing a person holding the office of Director of Public Prosecutions from office has been referred to a tribunal under this section, the President may suspend that person from performing the functions of his or her office, and any such suspension may at any time be revoked by the President and shall in any case cease to have effect if the tribunal advises the President that the person ought not to be removed from office. **114. Tenure of office of Auditor-General** (1) Subject to the provisions of this section, a person holding the office of Auditor- General shall vacate his or her office when he or she attains the age of 60 years or such other age as may be prescribed by Parliament. (2) A person holding the office of Auditor-General may be removed from office only for inability to perform the functions of his or her office (whether arising from infirmity of body or mind or any other cause) or for misbehaviour and shall not be so removed except in accordance with the provisions of this section. (3) If the National Assembly resolves that the question of removing a person holding the office of Auditor-General from office under this section ought to be", - "page_start": 48, - "page_end": 48, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "PART IV *Powers of Parliament* 86. Legislative powers 87. Mode of exercising legislative powers 88. Introduction of Bills 89. Alteration of Constitution\n\nPART V *Summoning, Prorogation and Dissolution* 90. Sessions of Parliament 91. Prorogation and dissolution of Parliament 92. Vote of no confidence in the Government 93. Sittings of National Assembly\n\nPART VI *Interpretation* 94. Votes of two-thirds of the Assembly\n\nCHAPTER VI The Judicature PART I *The High Court* 95. Jurisdiction and composition 96. Appointment of judges of High Court 97. Tenure of office of judges of High Court 98. Oaths to be taken by judges of High Court\n\nPART II *Court of Appeal* 99. Composition and jurisdiction 100. Appointment of judges of Court of Appeal 101. Tenure of office of judges of Court of Appeal 102. Oaths to be taken by judges of Court of Appeal\n\nPART III *Judicial Service Commission* 103. Composition and procedure 104. Appointment, etc., of judicial officers\n\nPART IV *Interpretation of the Constitution* 105. Reference to High Court of cases involving interpretation of Constitution 106. Appeal to Court of Appeal\n\nPART V *Judicial Committee* 107. ...... CHAPTER VII The Public Service 108. Power to specify qualifications for certain offices 109. Public Service Commission 110. Appointment, etc., of public officers 111. Appeals to President 112. Powers of President in relation to certain public offices", - "page_start": 2, - "page_end": 2, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**Prison Population Projections 2014 - 2020 England and Wales**\n\nMinistry of Justice Statistics Bulletin\n\nPublished 27th November 2014\n\nFrontpage graphicMoJ logoNational Statistics logo", - "page_start": 0, - "page_end": 0, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "she has attained the age of 70 years or such other age as may be prescribed for the purposes of section 101 of this Constitution; (ii) a person appointed under this subsection, who is not a judge of the Court of Appeal, may, notwithstanding the assumption or resumption of the functions of the office of President of the Court of Appeal by the holder of that office, continue to act as a judge of the Court of Appeal for so long thereafter and to such extent as may be necessary to enable him or her to deliver judgment or to do any other thing in relation to proceedings that were commenced before him or her previously thereto. (6) If the office of a Justice of Appeal is vacant or if any Justice of Appeal is appointed to act as Chief Justice or President of the Court of Appeal or is for any reason unable to perform the functions of his or her office, the President, acting in accordance with the advice of the Judicial Service Commission, may appoint a person qualified for appointment as a Justice of Appeal to act as a Justice of Appeal: Provided that a person may be so appointed notwithstanding that he or she has attained the age of 70 years or such other age as may be prescribed for the purposes of section 101 of this Constitution. (7) Any person appointed under subsection (6) of this section to act as a Justice of Appeal, shall subject to the provisions of section 101(4) and (5) of this Constitution, continue to act for the period of his or her appointment or, if no such period is specified, until his or her appointment is revoked by the President, acting in accordance with the advice of the Judicial Service Commission: Provided that the President, acting in accordance with the advice of the Judicial Service Commission, may permit a person whose appointment to act as a Justice of Appeal has expired or been revoked to continue to act as such a judge for such period as may be necessary to enable him or her to deliver judgment or to do any other thing in relation to proceedings that were commenced before him or her previously thereto. **101. Tenure of office of judges of Court of Appeal** (1) Subject to the provisions of this section, a person holding the office of a judge of the Court of Appeal shall vacate that office on attaining the age of 70 years or such other age as may be prescribed by Parliament: Provided that- (i) the President, acting in accordance with the advice of the Judicial Service Commission, may permit a judge who has attained that age to continue in office for such period as may be necessary to enable him or her to deliver judgment or to do any other thing in relation to proceedings that were commenced before him or her before he or she attained that age; (ii) a person may be appointed as President of the Court of Appeal or as a Justice of Appeal for a fixed period of three years notwithstanding that he or she has attained the age referred to in this subsection or that he or she will before the expiry of his or her appointment have attained that age; and (iii) the appointment as President of the Court of Appeal or as Justice of Appeal serving for a fixed period under paragraph (ii) above shall not affect the date at which he or she is due to retire. (2) A judge of the Court of Appeal may be removed from office only for inability to perform the functions of his or her office (whether arising from infirmity of body or mind or from any other cause) or for misbehaviour, and shall not be so removed except in accordance with the provisions of this section. (3) If the President considers that the question of removing a judge of the Court of Appeal under this section ought to be investigated then- ( *a* ) he or she shall appoint a tribunal which shall consist of a Chairman and not less", - "page_start": 43, - "page_end": 43, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "than two other members, who hold or have held high judicial office; ( *b* ) the tribunal shall enquire into the matter and report on the facts thereof to the President and advise the President whether the judge ought to be removed from office under this section for inability as aforesaid or for misbehaviour. (4) Where a tribunal, appointed under subsection (3) of this section, advises the President that a judge of the Court of Appeal ought to be removed from office for inability as aforesaid or for misbehaviour, the President shall remove such judge from office. (5) If the question of removing a judge of the Court of Appeal from office has been referred to a tribunal under subsection (3) of this section, the President may suspend the judge from performing the functions of his or her office, and any such suspension may at any time be revoked by the President and shall in any case cease to have effect if the tribunal advises the President that the judge ought not to be removed from office. **102. Oaths to be taken by judges of Court of Appeal** A judge of the Court of Appeal shall not enter upon the duties of his or her office unless he or she has taken and subscribed such oath for the due execution of his or her office as may be prescribed by Parliament. **PART III** * **Judicial Service Commission** * **(ss 103-104) 103. Composition and procedure** (1) There shall be a Judicial Service Commission for Botswana which shall consist of- ( *a* ) the Chief Justice who shall be Chairman; ( *b* ) the President of the Court of Appeal (not being the Chief Justice or the most Senior Justice of the Court of Appeal); ( *c* ) the Attorney-General; ( *d* ) the Chairman of the Public Service Commission; ( *e* ) a member of the Law Society nominated by the Law Society; and ( *f* ) a person of intergrity and experience not being a legal practitioner appointed by the President. (2) A member nominated under paragraph ( *e* ) or appointed under paragraph ( *f* ) of subsection (1) shall hold office for a period of two years, but shall be eligible for re- nomination or re-appointment, as the case may be, for another term of office for two years: Provided that- (i) a member nominated under paragraph ( *e* ) may be removed from office by the rest of the members of the Commission acting together only for inability of the member to discharge the functions of his or her office whether arising from infirmity of mind or body or any other cause or for gross misbehaviour; or (ii) a member appointed under paragraph ( *f* ) may be removed from office by the President only for inability of the member to discharge the functions of his or her office whether arising from infirmity of mind or body or any other cause or for gross misbehaviour. (3) A member of the Commission shall not enter upon the duties of his or her office until he or she has taken and subscribed such oath for the due execution of his or her office as may be prescribed by Parliament. (4) The Judicial Service Commission shall not be subject to the direction or control of any other person or authority in the exercise of its functions under this Constitution. (5) The Commission may regulate its own procedure and, subject to that procedure, may act notwithstanding any vacancy in its membership or the absence of", - "page_start": 44, - "page_end": 44, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "citizenship in force at that time, shall be regarded as a citizen by descent. **34. Tenure of office of President** (1) The President shall, subject to the provisions of this section, hold office for an aggregate period not exceeding 10 years beginning from the date of his or her first assumption of office of President after the commencement of this Act. (2) The President shall cease to hold the office of President if at any time during his or her tenure of office any circumstances arise that would, if he or she were not a member of the National Assembly, cause him or her to be disqualified for election thereto. (3) The President shall cease to hold office of President at the expiry of the period prescribed under subsection (1) of this section, or when the person elected at the next election of President following a dissolution of Parliament assumes office. **35. Vacancy in office of President** (1) Whenever the President dies, resigns or ceases to hold office, the Vice- President shall assume office as President with effect from the date of the death, resignation or ceasing to be President. (2) If the office of President- ( *a* ) becomes vacant in circumstances in which there is no Vice-President; or ( *b* ) is vacant whilst the Vice-President is absent from Botswana or is, by reason of physical or mental infirmity unable to perform the functions of his or her office, the functions of the office of President shall, until such time as a new President assumes office in accordance with this section or section 32 of this Constitution, be performed by such Minister as the Cabinet shall appoint. For the purposes of this subsection, a certificate of the Chief Justice that the Vice-President is by reason of physical or mental infirmity unable to discharge the functions of his or her office, shall, in respect of any period for which it is in force, be conclusive and shall not be questioned in any court. (3) Any person performing the functions of the office of President by virtue of subsection (1) or (2) of this section shall not exercise the power of the President to revoke the appointment of Vice-President or to dissolve Parliament. (4) If the office of President becomes vacant, the National Assembly shall, unless Parliament is dissolved, and notwithstanding that it may be prorogued, meet on the seventh day after the office of President becomes vacant, or on such earlier day as may be appointed by the Speaker, and shall elect a person to the office in such manner as is prescribed by the next following subsection and, subject thereto, by or under an Act of Parliament. (5) In an election of a President under this section- ( *a* ) the Speaker shall preside at the meeting and conduct the election; ( *b* ) a person may be a candidate if and shall not be a candidate unless he or she has been nominated as a candidate with his or her consent prior to the sitting of the National Assembly at which the election takes place, by not less than 10 Members of the National Assembly entitled to vote in that election; ( *c* ) at the election every Member of the Assembly except the Speaker shall be entitled to vote; ( *d* ) the votes of the Members of the Assembly who are entitled to vote shall be given by ballot in such manner as not to disclose how any particular Member voted, and any person who receives the votes of more than one half of the total number of persons entitled to vote shall be declared elected as President; ( *e* ) a person elected as President under this section shall assume the office of President on the day upon which he or she is declared to be elected; ( *f* ) not more than three ballots shall be taken unless in the opinion of the Speaker the holding of further ballots is likely to result in the election of a President, in", - "page_start": 18, - "page_end": 18, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "Assistant Minister. **43. Tenure of office of Ministers and Assistant Ministers** The office of any Minister or Assistant Minister shall become vacant- ( *a* ) in the case of a Minister or Assistant Minister appointed from among the Members of the National Assembly, or in the case of a Minister or Assistant Minister appointed from among persons who are not Members of the Assembly who becomes a Member of the Assembly before the expiration of four months from the date of his or her appointment- (i) if he or she ceases to be a Member of the National Assembly otherwise than by reason of a dissolution of the National Assembly; or (ii) if, at the first sitting of the Assembly after a general election, he or she is not a Member of the Assembly; ( *b* ) in the case of a Minister or Assistant Minister appointed from among persons who are not Members of the Assembly, if before the expiration of four months from the date of his or her appointment- (i) circumstances arise (other than a dissolution of the Assembly) that, if he or she were such a Member, would cause him or her to vacate his or her seat in the Assembly; or (ii) he or she does not become a Member of the Assembly; ( *c* ) if the holder of the office is removed from office by the President; ( *d* ) upon the assumption by any person of the office of President. **44. Cabinet** (1) There shall be a Cabinet which shall consist of the President, Vice-President and the Ministers. (2) There shall preside at meetings of the Cabinet- ( *a* ) the President; ( *b* ) in the absence of the President, the Vice-President; or ( *c* ) in the absence of the President and the Vice-President, such Minister as the President may designate. (3) The Cabinet may act notwithstanding any vacancy in its membership. **45. Oaths to be taken by Ministers and Assistant Ministers** The Vice-President, a Minister or an Assistant Minister shall not enter upon the duties of his or her office unless he or she has taken and subscribed the oath of allegiance and such oath for the due execution of his or her office as may be prescribed by Parliament. **46. Secretary to the Cabinet** (1) There shall be a Secretary to the Cabinet whose office shall be a public office. (2) The Secretary to the Cabinet shall have charge of the Cabinet Office and shall be responsible, in accordance with such instructions as may be given to him or her by the President, for arranging the business for, and keeping the minutes of, the Cabinet, for conveying decisions of the Cabinet to the appropriate person or authority, and shall have such other functions as the President may from time to time direct. **PART III** * **Executive Functions** * **(ss 47-56) 47. Functions of President** (1) The executive power of Botswana shall vest in the President and, subject to the provisions of this Constitution, shall be exercised by him or her either directly or through officers subordinate to him or her. (2) In the exercise of any function conferred upon him or her by this Constitution or any other law the President shall, unless it is otherwise provided, act in his or her own deliberate judgment and shall not be obliged to follow the advice tendered by any other", - "page_start": 22, - "page_end": 22, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "tribunal advises the President that the judge ought not to be removed from office. **98. Oaths to be taken by judges of High Court** A judge of the High Court shall not enter upon the duties of his or her office unless he or she has taken and subscribed such oath for the due execution of his or her office as may be prescribed by Parliament. **PART II** * **Court of Appeal** * **(ss 99-102) 99. Composition and jurisdiction** (1) There shall be a Court of Appeal for Botswana which shall have such jurisdiction and powers as may be conferred on it by this Constitution or any other law. (2) The judges of the Court of Appeal shall be- ( *a* ) the President of the Court of Appeal; ( *b* ) such number, if any, of Justices of Appeal as may be prescribed by Parliament; and ( *c* ) the Chief Justice and the other judges of the High Court: Provided that Parliament may make provision for the office of President of the Court of Appeal to be held by the Chief Justice *ex-officio.* (3) The office of a Justice of Appeal shall not be abolished while there is a substantive holder thereof. (4) The Court of Appeal shall be a superior court of record and save as otherwise provided by Parliament shall have all the powers of such a court. **100. Appointment of judges of Court of Appeal** (1) The President of the Court of Appeal shall, unless that office is held *ex-officio* by the Chief Justice, be appointed by the President. (2) The Justices of Appeal, if any, shall be appointed by the President, acting in accordance with the advice of the Judicial Service Commission. (3) A person shall not be qualified to be appointed as a judge of the Court of Appeal unless- ( *a* ) he or she holds, or has held office as, a judge of a court having unlimited jurisdiction in civil and criminal matters in Botswana, in a Commonwealth country or in any country outside the Commonwealth that may be prescribed by Parliament or a court having jurisdiction in appeals from such a court; or ( *b* ) he or she is qualified to practise as an advocate or attorney in such a court and has been qualified for not less than ten years to practise as an advocate or attorney in such a court; or ( *c* ) he or she is qualified to practise as an advocate or attorney and he or she has had experience in the teaching of law in a recognised university for not less than ten years. (4) In computing, for the purposes of subsection (3) of this section, the period during which any person has been qualified to practise as an advocate or attorney any period during which he or she has held judicial office after becoming so qualified shall be included. (5) If the office of President of the Court of Appeal is vacant or if the President of the Court of Appeal is for any reason unable to perform the functions of his or her office, then, until a person has been appointed to and has assumed the functions of that office or until the President of the Court of Appeal has resumed those functions, as the case may be, those functions shall be performed by such one of the other judges of the Court of Appeal or such other person qualified for appointment as a judge of the Court of Appeal as the President may appoint for that purpose: Provided that- (i) a person may be appointed under this subsection notwithstanding that he or", - "page_start": 42, - "page_end": 42, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", - "query": "What is SOLR ?", - "target_page": 4, - "target_passage": "Search engine used for portal content search and dataset search ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "#### **3.7.4 SPARQL Queries**\n\nThe third tab displays all queries set to “public”. Upon creating or modifying a query the user may set\n\nthe attribute “public”, which will make the query accessible to everyone.\n\nOnce the user is logged-in, another list with all private queries including the owned public queries\n\nwill be displayed. Besides “Query name” and “Query comment”, the attribute “Enabled” visualizes if\n\nthe query is currently running on a recurring time interval.\n\nAll attributes may be changed upon selecting “Details” if the logged-in user is the owner of selected\n\nquery.", - "page_start": 56, - "page_end": 56, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**7** of 57\n\n| | Module Name | Function |\n|:---|:---|:---|\n| | | - SPARQL Assistant - SPARQL Saving/Modifying a Query - SPARQL Queries |\n\n*Table 1-3: Main functions of the Portal Version 3.0*", - "page_start": 6, - "page_end": 6, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "Figure 9.1 The DL Query Tab\n\n9.2 SPARQL Queries SPARQL is a powerful language, and one could write a whole book about it. In fact, there are books written about it. The best one I have seen is the O’Reilly book Learning SPARQL by Bob DuCharme. This is an excellent book that not only goes into SPARQL but into topics such as RDF/RDFS and how triples are used to represent all information in OWL. I will only touch on those issues here, there is much more to say about them and DuCharme’s book is a great place to learn more. If some of the following is a\n\nbit hard to understand don’t be discouraged. This is just an attempt to give a very high level introduction\n\nto something that requires significant study to really understand.\n\nEssentially SPARQL is to the Semantic Web and Knowledge Graphs as SQL is to relational databases. Just as SQL can do more than just query, it can also assert new information into a database, so SPARQL can as well. The current SPARQL plugins for Protégé are somewhat limited and don’t support the statements such as INSERT for entering new data so we will just cover the basics of using SPARQL as a query language but keep in mind there is a lot more to it than what we briefly cover here.\n\n9.21 Some SPARQL Pizza Queries To start with go to the SPARQL Query tab. If it isn’t already there you can as always add it using Window>Tabs>SPARQL Query. This tab consists of two views, the top which holds the query and the bottom which holds the results. There should be some text already there. It may look confusing, but we’ll explain it. Just to start with hit the Execute button at the bottom of the tab. You should see a bunch of classes and class expressions returned.", - "page_start": 67, - "page_end": 67, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "**5** of 57\n\n| Acronym | Description |\n|:---|:---|\n| SPARQL | Query language for linked data (RDF) |\n| SSL | Secure Socket Layer |\n| URL | Uniform Resource Locator |\n| XML | Extensible Markup Language |\n\n*Table 1-2: Abbreviations and Acronyms*", - "page_start": 4, - "page_end": 4, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "#### **3.2.3 How to store personal queries**\n\nAs a **logged-in user** it is possible to store queries. This includes the search term and selected facets.\n\nThe option is available by clicking on “Save Query” on the datasets view.\n\nThe user has to enter a title and description for the query. After submitting the form by clicking on\n\n“Save Query” the current state of the search query will stored.\n\nA list of all stored queries can be found in the user’s dashboard: Data > Dashboard > My Queries.\n\nEach user can only access their own queries. It is possible to search, sort and delete the queries. By\n\nclicking on the title of the query the respective search is executed.", - "page_start": 28, - "page_end": 28, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "### **3.7 SPARQL Manager**\n\nThe SPARQL Manager provides a graphical user interface (GUI) for sending user defined queries to\n\nthe Virtuoso SPARQL query engine.\n\nThe powerful SPARQL Protocol and RDF Query Language are primarily aimed at professionals for\n\nquerying metadata as Linked Data. A basic knowledge of the DCAT-AP specification is highly\n\nrecommended.\n\nIn the future, users of the SPARQL Manager will be able to save their queries for scheduled\n\nexecution. Additionally a notification will be send to the user when a result has changed.\n\nClicking the info icon in the upper right corner will display a step-by-step walkthrough of all\n\ncomponents with a short info about their function.\n\nThis is possible in both of modes of the SPARQL Manager, the search and the assistant mode, which\n\nwill be described in the following sections.\n\n#### **3.7.1 SPARQL Search**\n\nIn this mode you can load some predefined example queries from the right side into the editable text\n\narea to introduce yourself with the very basic SPARQL syntax. Limiting the number of returned\n\nresults is possible by selecting a value from the Limit-dropdown or by editing the query directly.\n\nFurthermore the format for the result can be selected. After clicking the Search-Button the result is\n\ndisplayed in Result data preview area below. The preview may be truncated depending on the size of\n\nthe result. The complete result could always be downloaded as a file by clicking the Download-link on\n\nthe right side.", - "page_start": 53, - "page_end": 53, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**166** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\nWhen you access the application link http://myapp.apps.domain.example.com , as shown in\n\nFigure 7-1, notice the index page Page view count reads “No database configured”. To fix this\n\nissue, add a MongoDB service.\n\n*Figure 7-1 http://myapp.apps.domain.example.com without MongoDB*\n\n6. Deploy the mongodb-36-rhel7 application from the Red Hat registry, as shown in\n\nExample 7-6.\n\n*Example 7-6 Deploy mongodb application*\n\n**# oc new-app \\**\n\n**-e MONGODB_USER=admin \\**\n\n**-e MONGODB_PASSWORD=secret \\**\n\n**-e MONGODB_DATABASE=mongo_db\\**\n\n**-e MONGODB_ADMIN_PASSWORD=super-secret \\**\n\n**registry.access.redhat.com/rhscl/mongodb-36-rhel7**\n\n--> Found Docker image 3414ee2 (4 weeks old) from registry.access.redhat.com for\n\n\"registry.access.redhat.com/rhscl/mongodb-36-rhel7\"\n\nMongoDB 3.6\n\n-----------\n\nMongoDB (from humongous) is a free and open-source cross-platform document-oriented\n\ndatabase program. Classified as a NoSQL database program, MongoDB uses JSON-like documents\n\nwith schemas. This container image contains programs to run mongod server.\n\nTags: database, mongodb, rh-mongodb36\n\n* An image stream tag will be created as \"mongodb-36-rhel7:latest\" that will track this\n\nimage\n\n* This image will be deployed in deployment config \"mongodb-36-rhel7\"\n\n* Port 27017/tcp will be load balanced by service \"mongodb-36-rhel7\"\n\n* Other containers can access this service through the hostname \"mongodb-36-rhel7\"\n\n* This image declares volumes and will default to use non-persistent, host-local\n\nstorage.\n\nYou can add persistent volumes later by running 'volume dc/mongodb-36-rhel7 --add\n\n...'\n\n--> Creating resources ...\n\nimagestream.image.openshift.io \"mongodb-36-rhel7\" created", - "page_start": 181, - "page_end": 181, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 3. Administration **57**\n\n**Server Based Sorting option**\n\nThe Server Based Sorting option (Figure 3-8 on page 56) is used to sort the document hit list\n\non the server before it is returned to the client.\n\n**Text Search**\n\nText Search (Figure 3-9) is used to search documents that contain a specific word or phrase\n\nbefore the document hit list is built. Only documents that contain the specified word or phrase\n\nare returned as part of the hit list. The search takes place on the server.\n\nFigure 3-9 shows the Text Search option in the Field Definition tab of the Add a Folder\n\nwindow.\n\n*Figure 3-9 Text Search*\n\nBy using Text Search, a user can further qualify a search without adding the processing that\n\nis associated with adding and maintaining additional index fields to the database. Text search\n\nis performed on the documents that match the criteria for the other query fields. For example,\n\nif the other query fields are date and account number, a text search is performed on the\n\ndocuments that match the specified date and account number. If the document contains the\n\ntext search string, it is returned as part of the hit list. Text search fields are not mapped to\n\ndatabase fields.\n\n**Important:** Sorting might still occur on the client if any of the following items are true:\n\n� Multiple application groups are searched. (The folder contains multiple application\n\ngroups.)\n\n� The search query is too long or too complex for a single SQL statement.\n\n� The user specifies the Append option.", - "page_start": 80, - "page_end": 80, - "source_file": "sg246915.pdf" - }, - { - "text": "add query flexibility to get all inventory. This is not a DynamoDB requirements, just a convention\n\nby the developer to make retrieval more flexible.\n\nAll of the data for account1234 will be stored in the same database partition to ensure retrieval of\n\nrelated data is quick.\n\nRelated resources:\n\n- [ Item collections - how to model one-to-many relationships in DynamoDB](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/WorkingWithItemCollections.html) - example of using\n\nan item collection, a group of related items that share the same partition key value, as a way to\n\nmodel one-to-many relationships\n\n- [ Characteristics of databases](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/SQLtoNoSQL.Accessing.html) - comparison of SQL and NoSQL qualities of DynamoDB\n\n##### **Reading data**\n\nDynamoDB is a non-relational NoSQL database that does not support table joins. Instead,\n\napplications read data from one table at a time. There are four ways to read data:\n\n- GetItem\n\n- Retrieves a single item from a table. This is the most efficient way to read a single\n\nitem because it provides direct access to the physical location of the item. (DynamoDB also\n\nprovides the BatchGetItem operation, allowing you to perform up to 100 GetItem calls in a\n\nsingle operation.)\n\nFundamentals", - "page_start": 79, - "page_end": 79, - "source_file": "serverless-core.pdf" - }, - { - "text": "Gold Ridge Mine in the Solomon Islands and\n\nlater Group Exploration Manager for Ross Mining\n\nNL. Ron is familiar with the technical and oper-\n\nating requirements for emerging projects in a\n\nvariety of terrains and environments and has a\n\nstrong focus on maximising returns from ore\n\nbodies through optimum waste and ore classifi-\n\ncation as well as increasing reserves from near-\n\nmine resource development.\n\n**Senior Management**\n\ncontinued", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", - "query": "What is the function of the Graphical Data Visualisation Tool module ?", - "target_page": 6, - "target_passage": "How to visualize graphical data from a dataset resource ", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "### **3.4 Graphical Data Visualisation Tool**\n\nThis section describes the features of the graphical visualisation tool for numeric data. The features\n\nare currently available for XLS (Excel) and CSV files, except for the selection of the sheet name which\n\nis applicable only for Excel files.\n\nMost GUI elements from the “Graph” tab (records selection, search box, filters and fields buttons)\n\nare also available on the “Grid” tab and work in the same way.\n\n#### **3.4.1 How to visualize graphical data from a dataset resource**\n\nAs a result of a dataset search, the system displays on the “Dataset” tab all distributions\n\n(resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset\n\ncan be further explored by clicking on “Open Visualization” under the “Options” button - if available.", - "page_start": 42, - "page_end": 42, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "### **3.3 Visualization of Geo-Spatial Data (map.apps)**\n\nThe visualization of geo-spatial data within the European Data Portal provides previewing\n\nfunctionality for spatial open data. The aim is to allow the user to assess if a dataset meets specific\n\nrequirements in terms of spatial and thematic coverage. The functionality that is provided in the\n\nheader (links to disclaimers and language switching) is consistent in the entire portal.\n\n#### **3.3.1 How to visualize geo-spatial data from a dataset resource**\n\nAccessing the geo-spatial visualization is achieved via the Data Platform interface. A user searches for\n\nspecific data, enters the dataset view of reasonable results and displays the available distributions\n\n(see Section 3.2.5). If a dataset distribution is supported by the geo-spatial visualization, a globe\n\nbutton is displayed (see Figure 3 ). This is the entry point into the map viewer application. Supported\n\nformats are OGC Web Map Service (WMS) and GeoJSON. If the user visits the geo-spatial\n\nvisualization for the first time, an interactive user tutorial is provided to guide the use through\n\nspecific functions of the user interface, similar to this written user manual.\n\n## *Figure 3 - Dataset Resource Page with Link to Geo-Spatial Visualisation.*", - "page_start": 37, - "page_end": 37, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**6** of 57\n\n## **2 Approach**\n\nThe approach used for this User Manual was based on the identification of the main user functions of\n\nthe Portal and the description of each function from the user’s perspective in terms of “ *How to* …”.\n\nEach main function documentation consists of a screen snapshot, the steps required to execute the\n\nfunction and optionally a screenshot with the results.\n\n## **3 Main User Functions of the Portal**\n\nThis section describes all of the main user functions supported by the Portal Version 3.0.\n\nThe table 1-3 below lists the described functions by module.\n\n| | Module Name | Function |\n|:---|:---|:---|\n| 1 | Portal HomePage | - How to browse through the Editorial Content (how to access Resources on Open Data: eLearning modules, Training Companion, Reports about Open Data) - How to view / search for “Latest News” - How to view / search for “Open Data Events” - How to subscribe to the EDP Newsletter - How to view “Tweets” on the EDP - How to switch to another User Language |\n| 1 | Portal HomePage | - How to search for EDP Site Content |\n| 1 | Portal HomePage | - How to search for Datasets by Data Category - How to search for Datasets by Keyword |\n| 2 | Datasets (Data Platform) | Entering the Datasets-View |\n| | | How to filter datasets by using “Faceted Search” |\n| | | How to store personal queries |\n| | | How to filter datasets by geographical area |\n| | | How to download dataset distributions |\n| | | How to view licensing information |\n| | | How to switch to another user language |\n| | | How to browse by data catalogues |\n| 3 | Visualization of Geo-Spatial Data (map.apps) | How to visualize geo-spatial data from a dataset resource |\n| 4 | Graphical Data Visualisation Tool | How to visualize graphical data from a dataset resource |\n| 5 | Help Desk | How to contact The Portal’s Help Desk |\n| 6 | Metadata Quality Assurance (MQA) | Monitoring tool for the metadata quality: ‐ The Global Dashboard View ‐ The Catalogue details view |\n| 7 | SPARQL Manager | How to run SPARQL Queries using: - SPARQL Search |", - "page_start": 5, - "page_end": 5, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "Appendix A. Performance data and statistics gathering\n\nYou can also display a Node Comparison by selecting the same information as for the cluster,\n\nand then switching the button, as shown in Figure A-1 and Figure A-2.\n\n*Figure A-1 IBM Spectrum Virtualize Dashboard displaying System performance overview*\n\nFigure A-2 shows the display after switching the button.\n\n*Figure A-2 IBM Spectrum Virtualize Dashboard displaying Nodes performance overview*\n\nYou can also use real-time statistics to monitor CPU utilization, volume, interface, and MDisk\n\nbandwidth of your system and nodes. Each graph represents 5 minutes of collected statistics\n\nand provides a means of assessing the overall performance of your system.\n\nThe real-time statistics are available from the IBM Spectrum Virtualize GUI. Click\n\n**Monitoring** → **Performance** (as shown in Figure A-3) to open the Performance Monitoring\n\nwindow.\n\n*Figure A-3 Selecting performance pane in the monitoring menu*", - "page_start": 770, - "page_end": 770, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 8. User clients\n\nDepending on the data that you are working with, consider these options:\n\n� For Line Data:\n\n- The line data applet supports annotations. It can work with large object (LOB) reports if\n\nthe large object functionality is employed at load time.\n\n- The Ajax viewer and direct rendering capabilities of Content Navigator work only on\n\nshorter reports. Additionally, the viewing of annotations and large object documents is\n\nnot supported.\n\n� For AFP data:\n\n- The AFP plug-in is the best choice, because it is almost identical to the client. However,\n\nit does not support annotations.\n\nThe only viewers that use this functionality are the line data applet, the AFP plug-in\n\nviewer, and the Content Manager OnDemand Windows client.\n\n- AFP to PDF is a choice that does not require a plug-in rollout at the users’ computers if\n\nthe Acrobat plug-in is installed on their workstations. Font mappings must be\n\nconfigured at a central location. The additional workload on a rendering system and\n\nadditional license costs must be considered. Large reports might not be able to be\n\nrendered or viewed.\n\n**Annotations**\n\nOnly the native ODWEK viewers and the Windows client support annotations. These viewers\n\nand Windows clients support annotations in the following ways:\n\n� Line data applet: Supports text. Starting with version 9, the viewer can work with graphical\n\nannotations, also.\n\n� Windows Client: Supports maximum capabilities for all data types.\n\n� Other viewers, for example, the AFP plug-in viewer: Do not support and are not aware of\n\nannotations.\n\nWeb clients, such as Content Navigator or the ODWEK Java API, can work with annotations\n\nand provide access to them through the hit list. Graphical annotations cannot be accessed\n\nthat way because they are not exposed through the Java API.\n\n**Large object support**\n\nLarge object (LOB) support is the methodology for working with large reports. For more\n\ninformation about how LOB affects your reports, see “Large object” on page 52.\n\nFrom a viewer’s perspective, if a large document is transferred, it generates high network\n\ntraffic, resource consumption, and long wait times for users. If the viewer supports LOB\n\ndocuments, the viewer communicates with the server to transfer only the chunk of data that\n\nthe user is looking at (for example, a 200 page chunk out of a 10,000 page report). If the user\n\nscrolls to a different chunk of pages, the viewer downloads only that relevant portion of the\n\ndocument that the user scrolled to.\n\n**Note:** The AFP viewer plug-in, which is available with ODWEK and Content\n\nManager OnDemand, is a version of the AFP viewer plug-in from the InfoPrint\n\nSolutions Company. Although the standard InfoPrint viewer can be used for viewing\n\nAFP, the ODWEK version uses direct communication with the Content Manager\n\nOnDemand server, enabling segmented document transfer for LOB documents.", - "page_start": 212, - "page_end": 212, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 10. Advanced features for storage efficiency **431**\n\n#### **10.6.2 Evaluating compression and deduplication**\n\nTo help with the profiling and analysis of user workloads that must be migrated to the new\n\nsystem, IBM provides a highly accurate data reduction estimation tool that supports both\n\ndeduplication and compression. The tool operates by scanning target workloads on any\n\nlegacy array (from IBM or third party) and then merging all scan results to provide an\n\nintegrated system level data reduction estimate.\n\nThe Data Reduction Estimator Tool (DRET) utility uses advanced mathematical and statistical\n\nalgorithms to perform an analysis with low memory footprint. The utility runs on a host that\n\ncan access the devices to be analyzed. It performs only read operations so it has no effect on\n\nthe data stored on the device.\n\nThe following sections provide information about installing DRET on a host and using it to\n\nanalyze devices on it. Depending on the environment configuration, in many cases DRET is\n\nused on more than one host to analyze more data types.\n\nWhen DRET is used to analyze a block device that is used by a file system, all underlying\n\ndata in the device is analyzed, regardless of whether this data belongs to files that were\n\ndeleted from the file system. For example, you can fill a 100 GB file system and make it 100%\n\nused, and then, delete all the files in the file system to make it 0% used. When scanning the\n\nblock device that is used for storing the file system in this example, the DRET accesses the\n\ndata that belongs to the files that are deleted.\n\nFor more information and the latest version of this utility, see this IBM Support [web page](http://www14.software.ibm.com/webapp/set2/sas/f/dretool/home.html) .\n\n### **10.7 Data deduplication and compression on external storage**\n\nStarting from IBM Spectrum Virtualize V8.1.x, it supports over-provisioning on selected\n\nback-end controllers. This means that if back-end storage performs data deduplication or data\n\ncompression on LUs provisioned from it, they still can be used as external MDisks on IBM\n\nStorwize V7000.\n\nThin-provisioned MDisks from controllers that are supported by this feature can be used as\n\nmanaged mode MDisks in IBM Storwize V7000 and added to storage pools (including DRPs).\n\nImplementation steps for thin-provisioned MDisks are same as for fully allocated storage\n\ncontrollers. Extra caution is used when planning capacity for such configurations.\n\n**Note:** Comprestimator can run for a long period (a few hours) when it is scanning a\n\nrelatively empty device. The utility randomly selects and reads 256 KB samples from the\n\ndevice. If the sample is empty (that is, full of null values), it is skipped. A minimum number\n\nof samples with data is required to provide an accurate estimation. When a device is\n\nmostly empty, many random samples are empty. As a result, the utility runs for a longer\n\ntime as it tries to gather enough non-empty samples that are required for an accurate\n\nestimate. The scan is stopped if the number of empty samples is over 95%.\n\n**Important:** The preferred method of using DRET is to analyze volumes that contain as\n\nmuch active data as possible rather than volumes that are mostly empty of data. This\n\nincreases the accuracy level and reduces the risk of analyzing old data that is deleted, but\n\nmight still have traces on the device.", - "page_start": 452, - "page_end": 452, - "source_file": "sg247938.pdf" - }, - { - "text": "**414** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\nIBM STAT can be downloaded from this IBM Support [web page](http://www.ibm.com/support/docview.wss?uid=ssg1S4000935) .\n\nYou can download the Storage Tier Advisor Tool and install it on your Windows-based\n\ncomputer. The tool is packaged as an ISO file that must be extracted to a temporary location.\n\nThe tool installer is at temporary_location\\IMAGES\\STAT\\Disk1\\InstData\\NoVM\\ . By default,\n\nthe Storage Tier Advisor Tool is installed in C:\\Program Files\\IBM\\STAT\\ *.*\n\nOn IBM Storwize V7000, the heat data files are found in the /dumps/easytier directory on the\n\nconfiguration node and are named dpa_heat.node_panel_name.time_stamp.data . Any heat\n\ndata file is erased when it exists for longer than 7 days.\n\nHeat files must be offloaded and Storage Tier Advisor Tool started from a Windows command\n\nprompt console with the file specified as a parameter, as shown in Example 10-6.\n\n*Example 10-6 Running STAT in Windows command prompt*\n\nC:\\Program Files (x86)\\IBM\\STAT>stat dpa_heat.7822DFF-1.181028.073824.data\n\nThe Storage Tier Advisor Tool creates a set of .html and .csv files that can be used for Easy\n\nTier analysis.\n\nTo download a heat data file, open **Settings** → **Support** → **Support Package** → **Download Support Package** → **Download Existing Package** , as shown in Figure 10-8.\n\n*Figure 10-8 Download Easy Tier heat file: Download Support Package*", - "page_start": 435, - "page_end": 435, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 7. Indexing and loading\n\n**Installation**\n\nContent Manager OnDemand provides the ARSPDF32.API file to enable PDF viewing from the\n\nclient.\n\nIf you install the client after you install Adobe Acrobat, the installation program copies the\n\napplication programming interface (API) file to the Acrobat plug-in directory.\n\nIf you install the client before you install Adobe Acrobat, you must copy the API file to the\n\nAcrobat plug-in directory manually.\n\nIf you upgrade to a new version of Acrobat, you must copy the API file to the new Acrobat\n\nplug-in directory.\n\nThe default location of the ARSPDF32.API file is:\n\nC:\\Program Files (x86)\\IBM\\OnDemand Clients\\V9.5\\PDF\n\nThe default Acrobat plug-in directory is C:\\Program Files (x86)\\Adobe\\Acrobat\n\n*x.y* \\Acrobat\\plug_ins . The variables *x.y* represent the version of Acrobat, for example,\n\nC:\\Program Files (x86)\\Adobe\\Acrobat 10.0\\Acrobat\\plug_ins .\n\n**Graphical indexer example**\n\nBy using the graphical indexer, you can define triggers, fields, and indexes for PDF reports\n\nwithin the application component of Content Manager OnDemand in a similar way to defining\n\nthem for line data. This section serves as an introduction to the PDF graphical indexer by\n\nstepping through an example of indexing a PDF document.\n\nThe example describes how to use the graphical indexer from the report wizard to create\n\nindexing information for an input file. The indexing information consists of a trigger that\n\nuniquely identifies the beginning of a document in the input file and the fields and indexes for\n\neach document. We elaborate on this example by clarifying several of the instructions, and\n\nthroughout each step, we add important hints, tips, and explanations.\n\nThe process consists of these steps:\n\n1. Start the Administrator Client and log on to a server.\n\n2. Start the report wizard. Click the report wizard icon on the toolbar.\n\n3. In the Sample Data window, select **PDF** from the drop-down list of data types, and then\n\nclick **Select Sample Data** .\n\n4. In the Open window, enter the name or full path name of your file in the space that is\n\nprovided or use the **Browse** option to locate your PDF file.\n\n5. Click **Open** . The graphical indexer opens the input file in the report window.\n\nIf the PDF data fails to display, or an error message, such as the message that is shown in\n\nFigure 7-2, is displayed, you must follow the steps in “Installation” on page 169 to verify\n\nthat the API file is in the correct Acrobat plug-in directory.\n\n*Figure 7-2 Error message if PDF does not display*", - "page_start": 192, - "page_end": 192, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 8. User clients\n\nThe generic applet viewer (“applet viewer”) is a Java applet, which can handle various types\n\nof documents, such as PDF and Microsoft Office documents (which it renders), images, line\n\ndata, and AFP documents. The generic applet viewer might be an option if you work with\n\nimages that are stored in Content Manager OnDemand.\n\nIf you want to avoid the use of Java applets and your content is viewable by browsers (for\n\nexample, certain image types or textual data), try the browser pass-through viewer, which lets\n\nthe browser handle the data natively. If you work with AFP and must use the AFP browser\n\nplug-in, register the Content Navigator plug-in, AFPViewerPlugin.jar , and configure the\n\nviewer map that is assigned to your Content Navigator desktop to use the AFP viewer for the\n\napplication/afp MIME type. The AFPViewerPlugin.jar file ships with Content Navigator. You\n\nmust choose the web browser pass-through viewer.\n\nThe Ajax viewer is a Web 2.0 JavaScript application that provides basic document functions,\n\nsuch as page-wise browsing, rotation, or zoom. It is not a Java applet.\n\nThe generic applet viewer, the built-in PDF and HTML conversion, and the Ajax viewer can all\n\nwork with various data types:\n\n� Images (such as TIFF, JPEG, and DICOM)\n\n� Office documents\n\n� PDF\n\n� Most line data documents\n\n� Certain AFP data\n\nHowever, they all use a rendering engine to display Office, PDF, and AFP data into an image.\n\nThis rendering might work well with certain Office and PDF files, but it fails on most non-basic\n\nAFP data streams.\n\nFor more information, see 8.1.1, “Viewer options” on page 186.\n\n**Extending Content Navigator**\n\nContent Navigator is not designed as a client that is dedicated solely to Content Manager\n\nOnDemand, so a more complex configuration is necessary than with simpler client options.\n\nContent Navigator provides many configuration and customization options through its API\n\nand plug-in methodology. For more information about the customization options of Content\n\nNavigator, see *Customizing and Extending IBM Content Navigator* , SG24-8055.\n\n#### **8.2.2 Content Manager OnDemand Windows client**\n\nThe Content Manager OnDemand Windows client is a full function, feature-rich client that\n\nmeets the needs of line-of-business application areas and customer service representatives.\n\nThe Windows client displays content in its native format and is considered a corporate\n\ninternal access client. Many technical aspects of the Windows client are described in 8.1.1,\n\n“Viewer options” on page 186 and 8.1.2, “Client infrastructure options” on page 190.\n\n**Note:** Content Navigator is a Web 2.0 client and relies on HTML 5 and JavaScript for its\n\ncore client functionality and especially for the Ajax viewers. Not all browsers are suitable for\n\nrunning Content Navigator fast and efficiently, especially for Microsoft Internet Explorer\n\nbrowsers before version 9. Test Content Navigator with your user browser thoroughly\n\nbefore you consider a deployment.", - "page_start": 220, - "page_end": 220, - "source_file": "sg246915.pdf" - }, - { - "text": "Once within the map viewer application, the user can decide which layers to be displayed. Most Web\n\nMap Service (WMS) instances provide more than one layer. The geo-spatial visualization provides a\n\ndialog for choosing the desired layers for display (see Figure 4 ).\n\n## *Figure 4 - Selection of layers.*\n\nIn order to examine the resource in more detail, the user can click on a geographic feature while the\n\n“Feature Info” tool is enabled (see Figure 5 ). This function is only enabled if the service supports this\n\nkind of detailed query.", - "page_start": 38, - "page_end": 38, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - } - ] - }, - { - "references": { - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", - "query": "How to view “Tweets” on the EDP ?", - "target_page": 20, - "target_passage": "The Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the right hand side. ‐ ‐ Click on any of the tweets to display the complete tweet on twitter. Scroll vertically to see previous tweets. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "#### **3.1.5 How to view “Tweets” on the EDP**\n\nThe Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the\n\nright hand side.\n\n‐ **Click on any of the tweets to display the complete tweet on twitter.**\n\n‐ **Scroll vertically to see previous tweets.**", - "page_start": 19, - "page_end": 19, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "## **3. Methods**\n\n### *3.1. Data Source*\n\nAs Twitter has been recognized as a popular discussion forum [ 75 ] and a social activity platform [ 76 ]\n\nfor climate issues, we followed the literature [ 5 , 8 , 18 ] and used tweets to investigate distinct perceptions\n\nof climate issues and evolution on social media. Although Twitter’s ecosystem has been changing\n\nin terms of the number of active users, user demographics, and tweeting conventions in the past\n\nyears [ 77 , 78 ], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter\n\nis one of the most popular social websites, we defined our study as characterizing the perception of\n\nclimate issues among social media users rather than all the netizens or the whole population.\n\n*3.2. Data*\n\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming,\n\nas these two hashtags exactly correspond to climate change and global warming, respectively, the two\n\ncompeting definitions of climate issues. We did not follow [ 79 ] to include #AGW (anthropogenic global\n\nwarming) as query hashtags in our research because we think that this refers to global warming in\n\na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the\n\nscope of the search to English-language tweets generated between 1 January 2009 and 31 December\n\n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather\n\nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or\n\nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies.\n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to\n\nselect hashtags, language, start date, and end date as inputs. Once the first request was completed,\n\nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending\n\norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain\n\nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler\n\nwas automatically terminated when all the qualified tweets publicly available were collected. Our\n\ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in\n\nour study.\n\nGiven our goal of exploring the di ff erence between the two discourses, the 615,816 tweets\n\ncontaining both hashtags simultaneously were excluded to di ff erentiate between the two datasets\n\nfollowing [ 67 , 80 ]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange,\n\nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange\n\nand #globalwarming in each year is displayed in Figure 1 a.\n\n*Int. J. Environ. Res. Public Health* **2020** , *xx* , 5 5 of 22\n\n**3. Methods**\n\n*3.1. Data Source*\n\nAs Twitter has been recognized as a popular discussion forum [ 75 ] and a social activity\n\nplatform [ 76 ] for climate issues, we followed the literature [ 5 , 8 , 18 ] and used tweets to investigate\n\ndistinct perceptions of climate issues and evolution on social media. Although Twitter’s ecosystem\n\nhas been changing in terms of the number of active users, user demographics, and tweeting\n\nconventions in the past years [ 77 , 78 ], the problem is unavoidable for all the information ecosystems\n\non the Internet. As Twitter is one of the most popular social websites, we defined our study as\n\ncharacterizing the perception of climate issues among social media users rather than all the netizens or\n\nthe whole population.\n\n*3.2. Data*\n\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming,\n\nas these two hashtags exactly correspond to climate change and global warming, respectively, the two", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - }, - { - "text": "as these two hashtags exactly correspond to climate change and global warming, respectively, the two\n\ncompeting definitions of climate issues. We did not follow [ 79 ] to include #AGW (anthropogenic\n\nglobal warming) as query hashtags in our research because we think that this refers to global\n\nwarming in a defined category so cannot be regarded in parallel with the two considered hashtags.\n\nWe limited the scope of the search to English-language tweets generated between 1 January 2009\n\nand 31 December 2018. We only collected tweets containing either of the two hashtags in the body\n\nof the tweets rather than those containing these hashtags in the retweeted or quoted text, as we\n\nthink that retweeted text or quoted texts cannot directly represent the tweeter’s usage pattern of the\n\ntwo terminologies.\n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to\n\nselect hashtags, language, start date, and end date as inputs. Once the first request was completed,\n\nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending\n\norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain\n\nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler was\n\nautomatically terminated when all the qualified tweets publicly available were collected. Our crawler\n\nrespected Twitter’s robot.txt and we did not collect, analyze or display any user information in\n\nour study.\n\nGiven our goal of exploring the difference between the two discourses, the 615,816 tweets\n\ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets\n\nfollowing [ 67 , 80 ]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained\n\n#climatechange, and 887,731 contained “#globalwarming”. The number of qualified tweets containing\n\n#climatechange and #globalwarming in each year is displayed in Figure 1 a.\n\n( **a** ) ( **b** )\n\n**Figure 1.** The number of tweets containing #climatechange or #globalwarming, and their ratio from\n\n2009 to 2018 ( **a** ). The number of hashtags contained in the “climate change” or “global warming”\n\ndatasets, and their ratio from 2009 to 2018 ( **b** ).\n\n**Figure 1.** The number of tweets containing #climatechange or #globalwarming, and their ratio from\n\n2009 to 2018 ( **a** ). The number of hashtags contained in the “climate change” or “global warming”\n\ndatasets, and their ratio from 2009 to 2018 ( **b** ).", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" - }, - { - "text": "approaches, such as LDA and STM [ 32 , 73 ], can help to extract topics from unstructured texts. But in\n\nthis study, targeting on hashtags is more in line with our research question. Firstly, hashtags were\n\ninvented spontaneously by users of Twitter in 2007 as a mechanism to categorize discussions [ 74 ].\n\nWords with hashtags are recognized as topics and considered worthy of public discussion. Secondly,\n\nby attaching # to certain words in tweets, the users intentionally anchor their tweets to certain topics.\n\nThe operator # explicitly reflects the author’s emphasis, which can help us extract rather than infer the\n\nauthor’s identification of the topic of the tweets. Our research question is to analyze and visualize\n\nthe associations of topics in public climate discourse. Compared with other approaches, analyzing\n\nhashtags co-occurrence pattern has advantage in extracting the structure of public discussions.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed10.pdf" - }, - { - "text": "**6** of 57\n\n## **2 Approach**\n\nThe approach used for this User Manual was based on the identification of the main user functions of\n\nthe Portal and the description of each function from the user’s perspective in terms of “ *How to* …”.\n\nEach main function documentation consists of a screen snapshot, the steps required to execute the\n\nfunction and optionally a screenshot with the results.\n\n## **3 Main User Functions of the Portal**\n\nThis section describes all of the main user functions supported by the Portal Version 3.0.\n\nThe table 1-3 below lists the described functions by module.\n\n| | Module Name | Function |\n|:---|:---|:---|\n| 1 | Portal HomePage | - How to browse through the Editorial Content (how to access Resources on Open Data: eLearning modules, Training Companion, Reports about Open Data) - How to view / search for “Latest News” - How to view / search for “Open Data Events” - How to subscribe to the EDP Newsletter - How to view “Tweets” on the EDP - How to switch to another User Language |\n| 1 | Portal HomePage | - How to search for EDP Site Content |\n| 1 | Portal HomePage | - How to search for Datasets by Data Category - How to search for Datasets by Keyword |\n| 2 | Datasets (Data Platform) | Entering the Datasets-View |\n| | | How to filter datasets by using “Faceted Search” |\n| | | How to store personal queries |\n| | | How to filter datasets by geographical area |\n| | | How to download dataset distributions |\n| | | How to view licensing information |\n| | | How to switch to another user language |\n| | | How to browse by data catalogues |\n| 3 | Visualization of Geo-Spatial Data (map.apps) | How to visualize geo-spatial data from a dataset resource |\n| 4 | Graphical Data Visualisation Tool | How to visualize graphical data from a dataset resource |\n| 5 | Help Desk | How to contact The Portal’s Help Desk |\n| 6 | Metadata Quality Assurance (MQA) | Monitoring tool for the metadata quality: ‐ The Global Dashboard View ‐ The Catalogue details view |\n| 7 | SPARQL Manager | How to run SPARQL Queries using: - SPARQL Search |", - "page_start": 5, - "page_end": 5, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "All the hashtags in the tweets were automatically extracted with the Regular Expression Library\n\nin Python. Hashtags were transformed to lowercase letters, and clear synonyms were stemmed\n\n(e.g., #trump, #DonaldTrump, #donaldtrump). As all the tweets in the “climate change” dataset\n\ncontained the #climatechange hashtag and all the tweets in the “global warming” dataset contained the\n\n#globalwarming hashtag, we did not document these two hashtags when processing data. The number\n\nof hashtags contained in the two discourses in each year is displayed in Figure 1 b. Hashtags whose\n\nfrequency was lower than ten times are excluded in the network analysis. As hashtags are intended\n\nto be a topic anchor [ 52 ], extremely low frequency means that the hashtag is not recognized socially,\n\nand excluding them helps researchers focus on meaningful rather than occasional associations.\n\n### *3.3. Measurement*\n\n#### 3.3.1. Hashtag Co-Occurrence Network\n\nThe co-occurrence patterns of hashtags in tweets from two datasets were documented to build\n\nsemantic networks for climate change and global warming. For instance, for “#cimatechange\n\nredistributes #fish species at high latitudes. @_OScience @AarhusUni #Arctic”, a tweet in the climate\n\nchange dataset, hashtags #fish and #arctic were documented as co-occurring and their associations plus\n\none in the semantic network of climate change. In the semantic network, nodes represent hashtags and\n\nthe weight of edge refers to the frequency at which two hashtags co-occurred.\n\nWe visualized the network using Gephi software [ 81 ]. Following the established literature\n\n[ 60 , 61 , 82 ], only the most prominent hashtags were included in the visualization to concentrate our\n\nanalysis on the most important hashtags. In this research, the top 50 hashtags with the highest centrality\n\nin each network were selected for visualization. Modularity analysis was then analyzed to identify the\n\nclusters of hashtags in each semantic network, and hashtags belonging to the same cluster were drawn\n\nin the same color. The network spatialization was conducted with Gephi’s built-in force-directed\n\nlayout algorithm proposed by Fruchterman and Reingold [ 83 ], where the more associated the hashtags,\n\nthe closer they are to each other in the spatial layout.\n\n#### 3.3.2. Temporal Analysis\n\nA temporal analysis was introduced to understand the evolution of the two climate discourses\n\nover a long period. We first examined how the two semantic networks evolved in the past years.\n\nAll the nodes once ranked top 50 in any of the 10 years were gathered to form a union set for each\n\ndataset. Then, they were clustered according to the strength of their associations in the whole dataset\n\nand mapped with a force-directed layout algorithm in Gephi to produce a graph of nodes. With the\n\ndynamic network function supplied by Gephi, we then added the associations between the nodes\n\nranked on the top 50 list in 2009 to the graph of nodes and obtained the relationship of the top 50 nodes\n\nfor 2009. Similarly, we produced a total of 10 graphs from 2009 to 2018, where the positions of the\n\nnodes on the 10 maps are the same, but the strengths of their associations are di ff erent to represent the\n\nchanges in the associations of key hashtags for each discourse.\n\nThe correlation between climate change and global warming discourses was measured every\n\nyear to observe whether the two discourses converged or diverged over time. Considering computing\n\npower limitations, only key hashtags ranked in either of the top 50 lists for the two discourses in that\n\nyear were included in the calculations. First, we measured to what extent the two discourses resemble\n\neach other in the order of importance for the hashtags in each year. For every year, the top 50 hashtags\n\nin each network were selected with a rank order according to their centrality. Then, Spearman’s rank", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed10.pdf" - }, - { - "text": "**4** of 57\n\n## **1 Introduction**\n\n### **1.1 Purpose of the Document**\n\nThe main purpose of this document is to present a User Manual for the main user functionalities of\n\nthe **Portal Version 4.3** , launched in production in May 2019. This document consists of an update of\n\nthe User Manual for the Portal Version 3.0 published in November 2017[4].\n\n### **1.2 Reference Documents**\n\n| Id | Reference | Title | Version |\n|:---|:---|:---|---:|\n| [1] | EDP_S1_MAN | EDP_S1_MAN_Portal-Version1-UserManual_v1.0 | 1 |\n| [2] | EDP_S1_MAN | EDP_S1_MAN_Portal-Version1.3-UserManual_v1.2 | 1.3 |\n| [3] | EDP_S1_MAN | EDP_S1_MAN_Portal-Version2.0-UserManual_v1.0 | 2 |\n| [4] | EDP_S1_MAN | EDP_S1_MAN_Portal-Version3.0-UserManual_v1.0 | 3 |\n\n*Table 1-1: Reference Documents*\n\n### **1.3 Terminology**\n\n| Acronym | Description |\n|:---|:---|\n| API | Application Programmer Interface |\n| CKAN | (replaced by the “Data Platform”) |\n| CSV | Comma separated values |\n| Data Platform | Single page web app for managing and displaying datasets |\n| DCAT-AP | DCAT Application Profile - Metadata specification based on the Data Catalogue vocabulary (DCAT) |\n| DRUPAL | Content Management System |\n| ECAS / EU-Login | EU user login page |\n| EDP | European Data Portal |\n| FME | Feature Manipulation Engine |\n| GUI | Graphical User Interface |\n| HTTP | Hypertext Transfer Protocol |\n| JSON | JavaScript Object Notation (a lightweight data-interchange format) |\n| maps.app | Geo-spatial data visualization application |\n| MQA | Metadata Quality Assistant |\n| RDF | Resource Description Framework |\n| SOLR | Search engine used for portal content search and dataset search |", - "page_start": 3, - "page_end": 3, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "58. Yang, L.; Sun, T.; Zhang, M.; Mei, Q. We know what@ you# tag: Does the dual role a ff ect hashtag adoption?\n\nIn Proceedings of the 21st international conference on World Wide Web, Lyon, France, 16- 20 April 2012;\n\npp. 261- 270.\n\n59. Weller, K.; Dröge, E.; Puschmann, C. Citation Analysis in Twitter: Approaches for Defining and Measuring\n\nInformation Flows within Tweets during Scientific Conferences. In Proceedings of the Making Sense of\n\nMicroposts 2011, Heraklion, Greece, 30 May 2011; pp. 1- 12.\n\n60. Meraz, S. Hashtag wars and networked framing: The private / public networked protest repertoires of occupy\n\non twitter. In *Between the Public and Private in Mobile Communication* ; Routledge: Abingdon, UK, 2017;\n\npp. 303- 323.\n\n61. Meraz, S.; Papacharissi, Z. Networked gatekeeping and networked framing on# Egypt. *Int. J. Press.* **2013** , *18* ,\n\n138- 166.\n\n62. Papacharissi, Z.; de Fatima Oliveira, M. A ff ective news and networked publics: The rhythms of news\n\nstorytelling on# Egypt. *J. Commun.* **2012** , *62* , 266- 282.\n\n63. Wang, X.; Wei, F.; Liu, X.; Zhou, M.; Zhang, M. Topic sentiment analysis in twitter: A graph-based hashtag\n\nsentiment classification approach. In Proceedings of the 20th ACM International Conference on Information\n\nand Knowledge Management, Scotland, UK, 24- 28 October 2011; pp. 1031- 1040.\n\n64. Laniado, D.; Mika, P. Making sense of twitter. In Proceedings of the International Semantic Web Conference\n\n2010, Shanghai, China, 7- 11 November 2010; pp. 470- 485.\n\n65. Gonz á lez-Ib á nez, R.; Muresan, S.; Wacholder, N. Identifying sarcasm in Twitter: A closer look. In Proceedings\n\nof the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies:\n\nShort Papers—Volume 2, Portland, OR, USA, 19- 24 June 2011; pp. 581- 586.\n\n66. Conover, M.D.; Ratkiewicz, J.; Francisco, M.; Gonçalves, B.; Menczer, F.; Flammini, A. Political polarization on\n\ntwitter. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, Barcelona,\n\nSpain, 17- 21 July 2011.\n\n67. Kitzie, V.; Ghosh, D. # Criming and# Alive: Network and content analysis of two sides of a story on twitter.\n\nIn Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for\n\nthe Community, St. Louis, MO, USA, 6- 10 October; 2015; p. 41.\n\n68. Burgess, J.; Galloway, A.; Sauter, T. Hashtag as hybrid forum: The case of# agchatoz. In *Hashtag Publics.*\n\n*The Power and Politics of Discursive Networks* ; Peter Lang: New York, NY, USA, 2015; pp. 61- 76.\n\n69. Rushko ff , D. 17. Permanent revolution: Occupying democracy. In *The Playful Citizen* ; Amsterdam University\n\nPress: Amsterdam, The Netherlands, 2013; p. 335.\n\n70. Grundberg, M.D.; Lindgren, S. Translocal frame extensions in a networked protest: Situating the# IdleNoMore\n\nhashtag. *IC Rev. Cient* *í* *fica De Inf. Y Comun.* **2015** , *11* , 49- 57.\n\n71. Bruns, A.; Burgess, J.E. # ausvotes: How Twitter covered the 2010 Australian federal election. *Commun.*\n\n*Politics Cult.* **2011** , *44* , 37- 56.\n\n72. Pearce, W.; Holmberg, K.; Hellsten, I.; Nerlich, B. Climate change on Twitter: Topics, communities and\n\nconversations about the 2013 IPCC Working Group 1 report. *PLoS ONE* **2014** , *9* , e94785. [ [CrossRef](http://dx.doi.org/10.1371/journal.pone.0094785) ]\n\n73. Zhao, W.X.; Jiang, J.; Weng, J.; He, J.; Lim, E.P.; Yan, H.; Li, X. Comparing twitter and traditional media using\n\ntopic models. In Proceedings of the European Conference on Information Retrieval, Dublin, Ireland, 18- 21\n\nApril 2011; pp. 338- 349.\n\n74. Doctor, V. Hashtag History: When and What Started It? Available online: https: // [www.hashtags.org](https://www.hashtags.org/featured/hashtag-history-when-and-what-started-it/) / featured /\n\n[hashtag-history-when-and-what-started-it](https://www.hashtags.org/featured/hashtag-history-when-and-what-started-it/) / (accessed on 16 January 2020).", - "page_start": 19, - "page_end": 19, - "source_file": "pubmed10.pdf" - }, - { - "text": "[hashtag-history-when-and-what-started-it](https://www.hashtags.org/featured/hashtag-history-when-and-what-started-it/) / (accessed on 16 January 2020).\n\n75. Newman, T.P. Tracking the release of IPCC AR5 on Twitter: Users, comments, and sources following the\n\nrelease of the Working Group I Summary for Policymakers. *Public Underst. Sci.* **2017** , *26* , 815- 825. [ [CrossRef](http://dx.doi.org/10.1177/0963662516628477) ]\n\n76. Segerberg, A.; Bennett, W.L. Social media and the organization of collective action: Using Twitter to explore\n\nthe ecologies of two climate change protests. *Commun. Rev.* **2011** , *14* , 197- 215. [ [CrossRef](http://dx.doi.org/10.1080/10714421.2011.597250) ]\n\n77. Statista. Number of Monthly Active Twitter Users Worldwide from 1st Quarter 2010 to 1st Quarter 2019 (in\n\nMillions). 2019. Available online: https: // [www.statista.com](https://www.statista.com/statistics/282087/number-of-monthly-active-twitter-users/) / statistics / 282087 / number-of-monthly-active-\n\n[twitter-users](https://www.statista.com/statistics/282087/number-of-monthly-active-twitter-users/) / (accessed on 10 October 2019).\n\n78. Liu, Y.; Kliman-Silver, C.; Mislove, A. The tweets they are a-changin’: Evolution of Twitter users and behavior.\n\nIn Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI,\n\nUSA, 1- 4 June 2014.", - "page_start": 19, - "page_end": 19, - "source_file": "pubmed10.pdf" - }, - { - "text": "#### **3.1.7 How to search for EDP Site Content**\n\nIn order to search within the Portal’s site content (i.e. editorial content, articles, events, reports etc.),\n\n**enter any keyword in the “Search site content” text box and click on the button** .\n\nThe site will display all matching content found (here for keyword “Brussels”):\n\n**Note:**\n\nThe “Search site content” does **not** perform any search on datasets.\n\nIn order to search for datasets from the EDP Home page, the user should refer to section 3.2.", - "page_start": 21, - "page_end": 21, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - } - ] - }, - { - "references": { - "source_file": "welcome_to_word_template.pdf", - "query": "Where can we open a document saved on OneDrive ?", - "target_page": 2, - "target_passage": "When you save this document in OneDrive, you’ll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "### Count on Word to count your words\n\n**Try it:** Hit return after this line and type some words.\n\nThe status bar at the bottom of the window keeps a running count of the number of words in\n\nthe document.\n\n### Save this for later, access it anywhere\n\nWhen you save this document in OneDrive, you’ll be able to open it anywhere: on your\n\ncomputer, tablet, or phone. Your changes will be saved automatically.\n\n**Try it:** Select **File** > **Save As** , and then select OneDrive and give this document a name.\n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files.\n\nYou can pick up where you left off… even if you left the document open on the computer you’re\n\nusing now.", - "page_start": 1, - "page_end": 1, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Create something\n\nBegin with a **Blank document** to get right to work. Or start with a template to save yourself time and steps. Just select **File** > **New** , and then select or search for the template you want.\n\nAccess files anywhere\n\nNeed to work on the go and across different devices? Click **File** > **Account** to sign in with your Microsoft account and access your recently used files anywhere, on any device, through seamless integration between Office, OneDrive, OneDrive for Business, and SharePoint.\n\nFind recent files\n\nWhether you only work with files stored on your PC’s local hard drive or you store files in multiple shared locations, selecting **File** > **Open** takes you to your recently used documents and any files that you may have pinned to your list.\n\nDiscover related options\n\nWhen you select objects in your document, options related to your selection will appear. For example, selecting a table displays the **Table Design** and **Layout** tabs, which offer additional options.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "### Share and collaborate\n\nWith this document saved in OneDrive, you can share it with others. They don’t even need Word\n\nto open it.\n\n**Try it:** Select **Share** , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\n\nYou can send the link by typing someone’s email address or by copying the link and pasting it\n\ninto a message or chat. If you want them to read the document but not edit it, set their\n\npermission to view-only.\n\nIf they don’t have Word, the document will open in their web browser, in Word Online.\n\n### Add visuals with pictures from the web\n\nWord works with Bing to give you access to thousands of pictures you can use in your\n\ndocuments.\n\n**Try it:** Hit enter after this line to make a blank line:\n\n**1.** With your cursor in the blank space above, go to the Insert tab, select **Online Pictures** ,\n\nand then search for something, like *puppy clip art* .\n\n**2.** Select the picture you want, and select **Insert** .", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "For example, when expiration processing starts on a specified server, you might see the\n\nfollowing message:\n\n“109 Cache Expiration (Date) (Min%) (Max%) (Server)”\n\nMigration processing uses the specified date (the default is “today” in internal format).\n\nExpiration processing begins on each cache file system that exceeds the Max% (default 80%)\n\nand ends when the free space that is available in the file system falls below the Min% (default\n\n80%).\n\nOne of these messages shows for each storage object that is deleted from cache storage. A\n\nstorage object is eligible to be deleted when its “Cache Document Data for *n* Days” or “Life of\n\nData” period passes (whichever occurs first).\n\nA storage deletion message looks similar to the following message:\n\n“196 Cache Migration (ApplGrp) (ObjName) (Server)”\n\nAlso, information-only messages report the percentage of space that is used in the file\n\nsystem.\n\nAn information message looks similar to the following message:\n\n“124 Filesystem Statistics (filesystem) (% full) (server)”\n\n**Load table (ARSLOAD)**\n\nThe ARSLOAD table can be used to track loads for expiration. This table maintains a record\n\nof all successful loads to application groups with the “expire by load” expiration type.\n\n#### **10.5.3 Removing documents from the Tivoli Storage Manager archive**\n\nRemoving a document from archive storage means that the backup (if the primary document\n\ncopy is in cache) or long-term copy (if the primary document copy is in archive) of the\n\ndocument is deleted from the system. You remove documents from archive storage when you\n\nno longer have a business or legal requirement to keep them.\n\nA *management class* contains an archive copy group that specifies the criteria that makes a\n\ndocument eligible for deletion. Documents become eligible for deletion under the following\n\nconditions:\n\n� Administrators delete documents from client nodes\n\n� An archived document exceeds the time criteria in the archive copy group (how long\n\narchived copies are kept)\n\nASM does not delete information about expired documents from its database until expiration\n\nprocessing runs. You can run expiration processing either automatically or manually by\n\ncommand. Ensure that expiration processing runs periodically to allow ASM to reuse storage\n\npool space that is occupied by expired documents.\n\nWhen expiration processing runs, ASM deletes documents from its database. The storage\n\nspace that these documents used to occupy then becomes reclaimable. For more\n\ninformation, see “Reclaiming space in storage pools” on page 233.\n\n**Note:** You see one set of messages for each object server on which you run the **ARSMAINT**\n\nprogram.", - "page_start": 255, - "page_end": 255, - "source_file": "sg246915.pdf" - }, - { - "text": "You might be tempted to resolve this thread (note the Resolve link at the top of the initial comment) however, we aren’t really done. Remember that we need to not just create the class but also define the axiom that a ChicagoPizza must have a DeepPanBase . Since we can’t add axioms in Web Protégé we\n\nneed to export our ontology back to Protégé. Typically, we would collect many more comments and changes before exporting but we want to demonstrate how round-trip editing works between Protégé and Web Protégé. We could of course just export the ontology from Web Protégé to Protégé and then create another new Project, but it would be cumbersome to have to constantly create new projects every time you want to make a change in Protégé and if we did this, we would lose our audit trail of comments and changes. Luckily, there is a better way to do it.\n\nTo start we need to export the ontology to a file. Note that one of the tabs at the top is History. Select that tab. This tab shows a list of each version of the ontology. There should be 2 versions labelled R1 and R2 (in the right corner of each version). The most recent version is always at the top since that is typically what you want although it is also possible to roll back changes to previous versions. We want to export the latest version R2. Click on the R2 icon. This should give you a drop-down menu with two options: Revert changes in revision 2 and Download revision 2. Select Download revision 2. This will prompt you with the standard file browser for your OS to save a zip file with the new ontology. The ontology is saved with a zip file because ontologies can be large and since Web Protégé is working over a network we may want to limit the network traffic for large ontologies. Select the appropriate place to save the Zip archive file on the machine where you have Protégé. Do the standard things you would do to unzip the file and load it into Protégé. Note that when you unzip the file it will create a directory as well, so the file won’t be directly under whatever directory you save it to. Instead, there will be a directory titled something like pizza-with-data-ontologies-owl-REVISION-2 that the OWL file will be in.\n\nLoad the downloaded file into Protégé. Go to the Class hierarchy tab and navigate to the new ChicagoPizza class under NamedPizza. Add the axiom (refer back to chapter 4 if you need to remember how to add axioms to classes) hasBase some DeepPanBase. Save the file. Now go back to Web Protégé and your version of the Pizza ontology there. Note that in the upper right corner of the window there are links (drop down menus) such as Display and Project. Select Project and from the drop down menu select Apply External Edits. This will give you a small dialog titled Upload ontologies with a little button to Choose File. Click on Choose File. That will give you the standard OS dialog for selecting a file. Navigate to the file you saved from Protégé and select that then choose OK. That should result in a new pop-up window titled Merge ontologies where you will see the changes (in this case only the addition of the ChicagoPizza axiom) and a text box where you can describe the changes. Add an appropriate\n\nCommit message or just take the default and select OK. You should get a message that says the changes were successfully applied.\n\nIf you navigate back to ChicagoPizza you should see that it now has that axiom. You can also navigate back to NamedPizza. In the right most column, you should see the comments about needing to add ChicagoPizza as a subclass. Now that this has been done you can click on the Resolve link in the upper\n\nright corner of the comment thread and the comments will be removed from NamedPizza .", - "page_start": 87, - "page_end": 87, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "To view and configure DNS server information in IBM Spectrum Virtualize, complete the\n\nfollowing steps:\n\n1. In the left pane, click the **DNS** icon and enter the **IP address** and the **Name** of each DNS\n\nserver. The IBM Spectrum Virtualize supports up two DNS Servers, IPv4 or IPv6 (see\n\nFigure 5-75).\n\n*Figure 5-75 DNS information*\n\n2. Click **Save** after you complete entering the DNS server information.\n\n**Transparent Cloud Tiering**\n\nTransparent cloud tiering is a licensed function that enables volume data to be copied and\n\ntransferred to cloud storage. The system supports creating connections to cloud service\n\nproviders to store copies of volume data in private or public cloud storage.\n\nWith transparent cloud tiering, administrators can move older data to cloud storage to free up\n\ncapacity on the system. Point-in-time snapshots of data can be created on the system and\n\nthen copied and stored on the cloud storage. An external cloud service provider manages the\n\ncloud storage, which reduces storage costs for the system. Before data can be copied to\n\ncloud storage, a connection to the cloud service provider must be created from the system.\n\nA cloud account is an object on the system that represents a connection to a cloud service\n\nprovider by using a particular set of credentials. These credentials differ depending on the\n\ntype of cloud service provider that is being specified. Most cloud service providers require the\n\nhost name of the cloud service provider and an associated password, and some cloud\n\nservice providers also require certificates to authenticate users of the cloud storage.\n\nPublic clouds use certificates that are signed by well-known certificate authorities. Private\n\ncloud service providers can use self-signed certificate or a certificate that is signed by a\n\ntrusted certificate authority. These credentials are defined on the cloud service provider and\n\npassed to the system through the administrators of the cloud service provider. A cloud\n\naccount defines whether the system can successfully communicate and authenticate with the\n\ncloud service provider by using the account credentials.\n\nIf the system is authenticated, it can then access cloud storage to copy data to the cloud\n\nstorage or restore data that is copied to cloud storage back to the system. The system\n\nsupports one cloud account to a single cloud service provider. Migration between providers is\n\nnot supported.", - "page_start": 199, - "page_end": 199, - "source_file": "sg247938.pdf" - }, - { - "text": "there is no mandate to support one group to centralize it.\n\nKenya's own OpenData.go.ke website has only ever seen a small handful of data sets,\n\nnone of which are now (early April 2011) available anymore. Groups like the Ministry\n\nof Education might publish some information on schools, but they won't give anyone\n\nthe location data.\n\n## **3. Emerging trends and issues related to Open**\n\n**Data**\n\nOne of the most common activities for Open Data activists in this moment is the creation of\n\ncountry-wide catalogs of all data sources, to facilitate individuation and correlation of independent\n\ndata sets. Normally, all initiatives of this type are announced on the Open Knowledge Foundation\n\n[blog](http://okfn.org/) and/or its data hub [CKAN](http://ckan.net/) . Another relevant development is the publication of an [Open Data ](http://opendatamanual.org/)\n\n[Manual](http://opendatamanual.org/) that *\"can be used by anyone but is especially designed for those seeking to open up data,*\n\n*since it discusses why to go open, what open is, and the how to 'Open' Data.\"* Activists in several\n\nEuropean countries have already published local versions of the manual, or equivalent documents.\n\nOn this background, several interesting issues, some of which were anticipated in the Open Data,\n\nOpen Society report, are coming in full light. They are presented, one at a time, in the following\n\nsections of this chapter.\n\n### **3.1. Cost of not opening PSI is increasing**\n\nMuch has been said on the *economic* benefits of opening public sector information, and much more\n\nremains to be said and studied. One part of this issue that is becoming more evident over time is that\n\nOpen Data are the simplest, if not the only way, to save Public Administrations from the costs that\n\nthey have *already* (and rightfully!) forced themselves to bear, through assorted laws and official\n\nregulations. This is explained well in the report from LinkedGov about the [economic impact of ](http://wiki.linkedgov.org/index.php/The_economic_impact_of_open_data)\n\n[open data](http://wiki.linkedgov.org/index.php/The_economic_impact_of_open_data) :\n\n*(p. 2) \"As the costs of disseminating and accessing information have declined, the*\n\n*transactions costs associated with charging for access to information, and controlling*\n\n*subsequent redistribution have come to constitute a major barrier to access in*\n\n*themselves. As a result, the case for free (gratis) provision of Public Sector Information*\n\n*is stronger than has already been recognized.*\n\nEaves provides a practical example from Canada in [Access to Information is Fatally Broken… You ](http://eaves.ca/2011/03/30/access-to-information-is-fatally-broken-you-just-dont-know-it-yet/)\n\n[Just Don't Know it Yet](http://eaves.ca/2011/03/30/access-to-information-is-fatally-broken-you-just-dont-know-it-yet/) : *the number of Access to Information Requests (ATIP) has almost tripled*", - "page_start": 10, - "page_end": 10, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "Chapter 10. Advanced features for storage efficiency **429**\n\n*Figure 10-17 Selecting capacity setting*\n\nAfter the copies are fully synchronized, the original volume copy is deleted automatically.\n\nAs a result, compressed data is on the volume. This process is nondisruptive, so the data\n\nremains online and accessible by applications and users.\n\nThis capability enables clients to regain space from the storage pool, which can then be\n\nreused for other applications.\n\nWith the virtualization of external storage systems, the ability to compress stored data\n\nsignificantly enhances and accelerates the benefit to users. This capability enables them to\n\nsee a tremendous return on their Storwize V7000 investment.\n\nOn the initial purchase of an Storwize V7000 with Real-time Compression, clients can defer\n\ntheir purchase of new storage. When storage is needed, IT purchases a lower amount of the\n\nrequired storage before compression.\n\nFor more information about volume migration for compressed volumes on standard pools to\n\nDRPs, see “Migrating to and from DRP” on page 425.\n\n### **10.6 Saving estimation for compression and deduplication**\n\nThis section provides information about the tools that are used for sizing the environment for\n\ncompression and deduplication.\n\n#### **10.6.1 Evaluate compression savings by using IBM Comprestimator**\n\nIBM Comprestimator is an integrated GUI and CLI host-based utility that estimates the space\n\nsavings that are achieved when compressed volumes are used for block devices. This utility\n\nprovides a quick and easy view of showing the benefits of the use of compression. The utility\n\nperforms read-only operations and therefore, does not affect the data that is being stored on\n\ndevice.\n\nIf the compression savings prove to be beneficial in your environment, volume mirroring can\n\nbe used to convert volumes to compressed volumes in the data reduction pools.", - "page_start": 450, - "page_end": 450, - "source_file": "sg247938.pdf" - }, - { - "text": "**54** IBM Content Manager OnDemand Guide\n\nFor more information, see Technote 1215957, which is available at the following web address:\n\n[http://www.ibm.com/support/docview.wss?uid=swg21215957](http://www.ibm.com/support/docview.wss?uid=swg21215957)\n\n#### **3.1.4 Folders**\n\nA *folder* is the interface that allows a user to search for reports and documents that are stored\n\nin the Content Manager OnDemand system. One or more application groups can be defined\n\nto a folder. The user enters index search criteria into the folder search fields. In the\n\nbackground, an SQL search is issued for each included application group. The results of the\n\nqueries are accumulated, and a document hit list is constructed and returned to the user. The\n\nfolder can be customized to provide the look and feel that is wanted for the users of the\n\nContent Manager OnDemand system. The Content Manager OnDemand administrator can\n\nalso grant specific permissions for users and groups to use the folders.\n\nFigure 3-7 shows the Add a Folder window.\n\n*Figure 3-7 Folder general information*\n\n**Display Document Location**\n\nThe Display Document Location setting (Figure 3-7) determines whether the client shows the\n\nstorage location of each document in the document list by placing an icon next to each entry.\n\nThe possible locations are cache storage (on the library server or an object server) or archive\n\nstorage.\n\n**Note:** For the best indexing results, select a monospacing font with the line data graphical\n\nindexer.\n\nIf the font is changed by using the Administrator Client, the selected font is also used by the\n\nWindows client the next time that the Windows client is started and a line data document is\n\nviewed.", - "page_start": 77, - "page_end": 77, - "source_file": "sg246915.pdf" - }, - { - "text": "#### **13.4.1 PDF data**\n\nPortable Document Format (PDF) data is an increasingly common data type that can be\n\narchived within Content Manager OnDemand. The following key advantages are available by\n\nusing this data type as a document format:\n\n� It is a read-only format that does not require any external resources, such as images or\n\nfonts. It is self-contained.\n\n� The viewer for PDF can be downloaded at no charge from the Adobe website and the\n\nbrowser plug-ins for PDF are also available at no charge.\n\nDuring PDF document creation, resources, such as images and custom fonts, are placed in\n\nthe data stream once and then referenced many times from within the PDF file. If a large\n\nreport is produced from many small documents, that report requires only one copy of the\n\nresources.\n\nHowever, when the PDF is indexed, the PDF Indexer creates many PDF documents from the\n\ninput file. Each of these documents requires a certain number of PDF structures, which define\n\na document. These documents are concatenated together in the .out file, and then loaded\n\ninto Content Manager OnDemand as separate documents. Because the resources are\n\nextracted and placed into a separate resource file, they are not included in each document.\n\nFor an illustration of the process, see Figure 13-3.\n\n*Figure 13-3 PDF indexing*\n\nIf no resources are collected, the size of the .out file, which contains all of the individual\n\ndocuments, might be larger than the original file. For tips about how to reduce the size of the\n\noutput file, see 7.3.5, “PDF indexing: Using internal indexes (Page Piece Dictionary)” on\n\npage 173.\n\nConverted to\n\nDocument Resources\n\nOne PDF file with documents and resources\n\nMany separate PDF documents with resources removed in the .out file", - "page_start": 331, - "page_end": 331, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "welcome_to_word_template.pdf", - "query": "What is the bold keyboard shortcut on word ?", - "target_page": 4, - "target_passage": "Bold (keyboard shortcut: Ctrl+B)", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "### Make your meaning more visual by\n\n### formatting text\n\nTo format text, select it, and then select a button in the **Font** or **Paragraph** area on the Home\n\ntab.\n\n**Try it:** Select text in the lines below and choose formatting options so that the text is an\n\nexample of the formatting it’s describing:\n\nBold (keyboard shortcut: Ctrl+B)\n\nItalic (keyboard shortcut: Ctrl+I)\n\nHighlight\n\nFont color\n\nBullets\n\nNumbering\n\n**Pro tip:** If you selected whole words for this exercise, did you notice that Word popped up a\n\nlittle toolbar, with the font formatting options?\n\nBetween that and keyboard shortcuts like Ctrl+B\n\nand Ctrl+I, you save time by not having to go up to\n\nthe Home tab all the time.", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "*Page 2*\n\n###### **N AVIGATING IN A F ILE**\n\n| Arrow Keys | Move one cell to the right, left, up or down |\n|:---|:---|\n| Tab | Move once cell to the right |\n| Ctrl+Home | To beginning file |\n| Ctrl+End | To end of typed information |\n| Home | Beginning of a line |\n| End | End of a line |\n| Page Down | Down one screen |\n| Page Up | Up one screen |\n| F5 | To a specific page |\n| Scroll bars | Appear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document. |", - "page_start": 5, - "page_end": 5, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to\n\nreactivate the watch.\n\n**Button down:**\n\nShort press to enter multi-sport mode.\n\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any\n\nbuttons.\n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below.\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the\n\nshortcut.\n\n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth\n\nconnection status, time, power, brightness adjustment and other functions.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "### Make magic: use Heading styles\n\nThe heading for this part (“Make magic: use Heading styles”) looks the same as the other\n\nheadings in this document, but it’s not as useful. It’s formatted with *font settings* (font, size, and\n\ncolor), while the other headings are formatted with a *Heading style* (Heading 1, to be exact).\n\nSee the little triangle when you mouse over those other\n\nheadings?\n\nYou can collapse and expand everything under a heading, like an\n\noutline. But this one’s not working. Let’s fix it.\n\n**Try it:** Apply the **Heading 1** style:\n\n**1.** Put your cursor somewhere in the heading above (“Make magic: use Heading styles”) -\n\ndon’t select anything.\n\n**2.** On the **Home** tab, find **Styles** , and select **Heading 1** (keyboard shortcut Ctrl+Alt+1).\n\nTa-da! Now it looks like a heading, and acts like one too.", - "page_start": 4, - "page_end": 4, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "*Figure B-2 Generate keys*\n\n3. After the keys are generated, save them for later use. Click **Save public key** , as shown in\n\nFigure B-3.\n\n*Figure B-3 Save public key*\n\n**To generate keys** : The blank area that is indicated by the message is the large blank\n\nrectangle on the GUI inside the section of the GUI labeled Key. Continue to move the\n\nmouse pointer over the blank area until the progress bar reaches the far right. This\n\naction generates random characters to create a unique key pair.", - "page_start": 779, - "page_end": 779, - "source_file": "sg247938.pdf" - }, - { - "text": "###### **HANGING F ONTS**\n\nThe appearance that you choose for your text is referred to as the * **font** * or * **typeface** * . Font traditionally refers to a combination of typeface, style and size in points (e.g. Arial Bold 12 pt).\n\nIn Excel 2007, * **font** * just refers to the typeface or shape of the letters. Typical classic fonts include Times New Roman , Arial, Century Gothic and **Copperplate** .\n\n**Try This Yourself:**\n\n* **Same** * * **File** *\n\n*Continue using the previous* *file with this exercise, or open* *the file E722 Font* *Formatting_1.xls...*\n\n Click in cell * **A1** * to make the cell with the main heading the active cell  Click on the drop arrow next to\n\nthe * **Font** * command in\n\nthe * **Font** * group on the * **Home** * tab to display a gallery of available fonts  Point to **Arial Narrow** , then **Book Antiqua** , **Garamond** and **Gill Sans MT**\n\n*If you don’t have these fonts,* *try different ones. As you point* *to each font, the preview will* *change...*  Scroll to and click on Comics\n\nSans MS , or another font of\n\nyour choice if you don’t have this one\n\n*This time the font formatting* *has changed in the cell and is* *no longer just a preview - it*\n\n*won’t change again unless you* *make another font selection.*\n\n**For Your Reference…**\n\nTo * **apply font formatting** * :\n\n1. Select the text\n\n2. Click on the drop arrow for * **Font** *\n\n3. Point to a font to preview it\n\n4. Click on the font to apply it\n\n**Handy to Know…**\n\n- You can jump directly to a font. For example, if you want to preview Garamond , click on the name of the font in the * **Font** * command and\n\npress . Excel will jump to the fonts that start with * **G** * and * **Live Preview** * will display the text temporarily. Keep typing the name until you reach the required font.\n\n-\n\n## **1**\n\n## **4**", - "page_start": 21, - "page_end": 21, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "### Share and collaborate\n\nWith this document saved in OneDrive, you can share it with others. They don’t even need Word\n\nto open it.\n\n**Try it:** Select **Share** , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\n\nYou can send the link by typing someone’s email address or by copying the link and pasting it\n\ninto a message or chat. If you want them to read the document but not edit it, set their\n\npermission to view-only.\n\nIf they don’t have Word, the document will open in their web browser, in Word Online.\n\n### Add visuals with pictures from the web\n\nWord works with Bing to give you access to thousands of pictures you can use in your\n\ndocuments.\n\n**Try it:** Hit enter after this line to make a blank line:\n\n**1.** With your cursor in the blank space above, go to the Insert tab, select **Online Pictures** ,\n\nand then search for something, like *puppy clip art* .\n\n**2.** Select the picture you want, and select **Insert** .", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "## Welcome to Word\n\n#### Instructions you can edit, share, and print\n\nUnlike old-school user guides, this doc is yours to tailor exactly for your needs. Reading it will\n\nteach you some basics about Word, but this document isn’t just for reading. It’s for editing too,\n\nso you can learn by doing.\n\nFor practice using Word features, watch for **Try it** text in red throughout this document.\n\n**Time saver:** If you’ve only got a minute\n\nand you want to see how this works,\n\nwatch this Video: Welcome to Word .\n\n### Write eloquently, with a little help\n\nWord automatically checks spelling and grammar, and marks misspelled words with a red\n\nsquiggly underline. Grammatical glitches get a blue double underline.\n\n**Try it:** Put your cursor at the end of this paragraph, and hit Enter to start a new paragraph. Write\n\na sentence with some spelling or grammatical mistakes, and press Enter to finish the paragraph.\n\nRight-click the text that’s marked with underlines, or Press F7. Choose a suggestion to correct\n\nthe mistakes.", - "page_start": 0, - "page_end": 0, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "| Type of content Tags |\n|:---|\n| Decorative Object no tags |\n| Object with Alt Text <Figure> Alt= alt text (object type) |\n| Object other than Shape without Alt Text <Figure> Alt= blank |\n| Shape without Alt Text, text, fill, outline, or hyperlink no tags |\n| Shape without Alt Text with whitespace text or no text <Figure> Alt= blank |\n| Shape without Alt Text with Equation <Formula> Alt= equation spelled out in words |\n| Shape without Alt Text with non-whitespace text without Equation <Sect> text content |\n| Shape with Alt Text with non-whitespace text without Equation <Figure> Alt= alt text + text (shape type) |\n| WordArt without Alt Text or Decorative <Sect> text content |", - "page_start": 50, - "page_end": 50, - "source_file": "office-pdf.pdf" - }, - { - "text": "Bookmarks are included in the PDF for headings or Word bookmarks depending on the\n\noption selected.\n\nThe information in this article is applicable to the following versions of Word.\n\nWord for Windows Version 2408 and later.\n\nWord for Mac Version 16.89 and later.\n\nWord for iOS Version 2.89 and later.\n\nWord for Android Build 16.0.18025.XXXXX or later.\n\nWord for the web Build 16.0.18025.XXXXX or later.\n\nIt is available to customers with Office 2024 or Office LTSC 2024 and to customers with a\n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For\n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will\n\nbe available on January 14, 2025.\n\n**Bookmarks**\n\n**Availability**", - "page_start": 60, - "page_end": 60, - "source_file": "office-pdf.pdf" - } - ] - }, - { - "references": { - "source_file": "welcome_to_word_template.pdf", - "query": "What is the advise to make the style sets and themes work well ? ", - "target_page": 6, - "target_passage": "They work best when your document is formatted with styles", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "### Give your doc an instant makeover\n\nStyle sets and themes let you completely change the look of your document in an instant. They\n\nwork best when your document is formatted with styles (so it’s good that we fixed that Heading\n\nstyle, above).\n\n**Try it:** Explore style sets and themes:\n\n**1.** On the **Design** tab, select **Themes** , and choose a theme from the drop-down.\n\nNotice that the gallery of style sets updates to reflect the theme you picked.\n\n**2.** Select any theme you like from the drop-down and click to apply.", - "page_start": 5, - "page_end": 5, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "###### CHAPTER 10:\n\nLANGUAGE SKILLS AT WORK HOW TO WRITE A COVER LETTER\n\nIf you’ve ever applied for a job, you’ll know that writing\n\nthe cover letter is the most difficult part of almost any job\n\napplication. Your cover letter creates the first impression, and\n\noften determines whether an employer will even look at your CV.\n\nYou need to use this opportunity to introduce yourself and your\n\nskills, and to set yourself apart from all the other candidates.\n\nYou can also use this opportunity to explain any gaps in your CV,\n\nand to motivate why you are the right person for the job.\n\ntips tips tips tips tips tips tips tips tips tips tips tips tips", - "page_start": 44, - "page_end": 44, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "First Paragraph\n\nIntroduce yourself, and explain why you are writing the letter.\n\nIf you are responding to a job advertisement, state which advertisement\n\nyou are responding to, and indicate where you found it.\n\nFor example:\n\n“I would like to apply for the position of Graphic Designer, as advertised\n\nin the Career Times on 1 March 2015.”\n\nIf possible, mention a mutual contact or acquaintance.\n\nFor example:\n\n“Samantha Stevens mentioned that you are looking for an experienced\n\nGraphic Designer with a keen interest in the fashion industry.”\n\nSecond Paragraph\n\nMention your qualifications, skills and experience, and relate them to the\n\nneeds of the company. Give relevant examples of how you have used\n\nyour skills in the past to perform similar tasks and responsibilities to\n\nthose set out in the job description.\n\nThird Paragraph\n\nExplain why you want to work for this organisation in particular. Where\n\nrelevant, explain any gaps in your CV. If you don’t have the required\n\nacademic qualifications, for example, you can explain how your practical\n\nwork experience makes up for it.\n\nFourth paragraph\n\nMention any documents or attachments that you have included with your\n\ncover letter, and state your availability for an interview.\n\nClose\n\nThank the recipient for taking the time to read your letter, and sign off\n\nwith a professional greeting, such as “Yours sincerely” or “Kind regards”,\n\nfollowed by your full name, telephone number and e-mail address.", - "page_start": 46, - "page_end": 46, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "Directors’ Report\n\n**50**\n\nIntroduction\n\nThis Remuneration Report forms part of the\n\nDirectors’ Report. It outlines the Remuneration\n\nPolicy and framework applied by the Company\n\nas well as details of the remuneration paid to\n\nKey Management Personnel. Key Management\n\nPersonnel are defined as those persons having\n\nthe authority and responsibility for planning,\n\ndirecting and controlling the activities of the\n\nCompany, directly or indirectly, including\n\nDirectors and members of the Executive\n\nManagement group.\n\nThe information provided in this report has been\n\nprepared in accordance with s300A and audited\n\nas required by section 308 (3c) of the\n\n*Corporations Act 2001* .\n\nThe objective of the Company’s remuneration\n\nphilosophy is to ensure that Directors and senior\n\nstaff are remunerated fairly and responsibly at a\n\nlevel that is competitive, reasonable and appro-\n\npriate, in order to attract and retain suitably\n\nskilled and experienced people.\n\nDuring the year the Company introduced a STI\n\nPlan that is based on Key Management Personnel\n\nindividual performance measures and a Long-\n\nTerm Incentive (“LTI”) Executive Rights Plan that\n\nprovides performance-based remuneration to\n\nmembers of management through the issue of\n\nDeferred Rights and Performance Rights vesting\n\nover a period of three years. These new plans are\n\ndiscussed in further detail later in this report.\n\nVoting and comments made at the Company’s 2012 AGM\n\nThe table below provides a summary of the\n\nBoard’s action and / or comments in response to\n\nconcerns raised by shareholders at the 2012\n\nAGM in relation to remuneration.\n\nRemuneration Policy\n\nThe Remuneration Policy has been designed to\n\nalign the interests of shareholders, Directors,\n\nand employees. This is achieved by setting a\n\nframework to:\n\n〉 〉 help ensure an applicable balance of fixed\n\nand at-risk remuneration, with the at-risk\n\ncomponent linking incentive and perfor-\n\nmance measures to both Group and indi-\n\nvidual performance;\n\n〉 〉 provide an appropriate reward for Directors\n\nand Executive Management to manage and\n\nlead the business successfully and to drive\n\nstrong, long-term growth in line with the\n\nCompany’s strategy and business objectives;\n\n〉 〉 encourage executives to strive for superior\n\nperformance;\n\n〉 〉 facilitate transparency and fairness in execu-\n\ntive remuneration policy and practices;\n\n〉 〉 be competitive and cost effective in the\n\ncurrent employment market; and\n\n〉 〉 contribute to appropriate attraction and\n\nretention strategies for Directors and\n\nexecutives.\n\nIn consultation with external remuneration\n\nconsultants, the Group has structured an execu-\n\ntive remuneration framework that is market\n\ncompetitive and complimentary to the business\n\nstrategy of the organisation.\n\nThe framework is intended to provide a mix of\n\nfixed and variable remuneration, with a blend of\n\nshort and long-term incentives as appropriate.\n\nAs executives gain seniority within the Group,\n\nthe balance of this mix shifts to a higher propor-\n\ntion of “at risk” rewards (refer to chart -\n\nRemuneration Reward Mix on the following\n\npage).\n\nRemuneration Governance\n\nRole of the Remuneration Committee\n\nThe Remuneration Committee is a committee\n\nof the Board and has responsibility for setting\n\npolicy for determining the nature and amount\n\nof emoluments of Board members and senior\n\nexecutives. The Committee makes recommenda-\n\ntions to the Board concerning:\n\n〉 〉 Non-Executive Director fees;\n\n〉 〉 remuneration levels of Executive Directors\n\nand other Key Management Personnel;\n\n〉 〉 the executive remuneration framework and\n\noperation of the incentive plan; and\n\n〉 〉 key performance indicators and performance\n\nhurdles for the executive team.\n\nIn forming its recommendations the Committee\n\ntakes into consideration the Group’s stage of\n\ndevelopment, remuneration in the industry and\n\nperformance. The Corporate Governance\n\nStatement provides further information on\n\nthe role of this committee.\n\nRemuneration Consultants", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**2.2 Remuneration and Nominations Committee**\n\nThe remuneration and nominations committee is structured so that it:\n\n- Consists of a majority of independent Directors;\n\n- Is chaired by an independent Director; and\n\n- Has at least three members.\n\nThe responsibilities of the committee include recommendations to the Board about:\n\n- Remuneration practices and levels of Executives and Non-executive Directors;\n\n- The necessary and desirable competencies of Directors;\n\n- Review of board succession plans;\n\n- The development of a process for evaluation of the performance of the board, its committees and Directors; and,\n\n- The appointment and re-election of Directors.\n\nThe combined Remuneration and Nominations Committee consists of three independent Non-Executive Directors and reports\n\nits recommendations to the Board for approval. Formal minutes are kept of each meeting and submitted to the Board for review.\n\nThe members of the Remuneration and Nominations Committee is listed on page 26 of the Directors’ Report. A Remuneration\n\nand Nominations Committee charter is published on the Company’s website.\n\nThe Board reviews the composition and skill sets of the Committee on a regular basis, and considers that the current\n\ncomposition, size and skills of the Committee to be appropriate.\n\nCurrently no formal description of the procedure for the selection and appointment of new Directors or the re-election of\n\nincumbent Directors exists as it is considered that due to the size of the Company that this process is effectively managed by the\n\nBoard. However, this activity is discussed by the Committee from time to time.\n\n**2.3 Director Performance Review and Evaluation**\n\nIn fiscal year 2014, Sundance’s Board regularly met, both formally and informally, to discuss Board matters and to ensure that\n\nthe Board acts in an effective way. The Board is provided with information that allows it to discharge its duties effectively, and\n\nNon-Executive Directors can and do request additional information as necessary to make informed decisions. The skills,\n\nexperience and expertise relevant to the position of Director held by each director in office at the date of the annual report can\n\nbe found in the Directors’ Report on pages 23 to 25.\n\nNo formal process exists for Directors to access continuing education, as this is not considered practicable for the size of the\n\nCompany and the financial resources available. However the four Non-Executive Directors have wide experience of directors’\n\nduties and are involved in a variety of outside business and professional activities that add to their knowledge and\n\nprofessionalism.\n\nThe Company Secretary is D Connor. He is accountable to the Board through the Chairman and accessible to all Directors. The\n\nappointment and removal of the Company Secretary is a matter for decision by the Board as a whole.\n\n**Principle 3: Promote Ethical and Responsible Decision-making**\n\n**3.1 Code of Conduct**\n\nThe Company has a Code of Conduct and Ethics which establishes the practices that Directors, management and staff must\n\nfollow in order to comply with the law, meet shareholder expectations, maintain public confidence in the Company’s integrity,\n\nand provide a process for reporting and investigating unethical practices. The Code of Conduct is available in the corporate\n\ngovernance section of Sundance’s website.\n\n**3.2 Diversity**\n\nSundance believes it is important to maintain a diverse, empowered and inclusive workforce to gain valuable perspectives from\n\npeople of different gender, race, religion, marital status, disability or national origin. Sundance management recruits on the\n\nbasis of skills, qualifications, abilities and achievements of the individual. Sundance has published a Diversity policy which is\n\navailable in the corporate governance section of Sundance’s website.", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "### **3.4 Mobile work, home as workplace and domestic work**\n\nThe place of work — premises of the employer or any other place — is another major characteristic of\n\nworking conditions, which significantly influences the risks and the preventive measures. This chapter\n\ntakes a closer look at three types of work, that is, mobile work, private homes as workplace and domestic\n\nwork, All pose — in a broad sense — similar challenges for OSH. <sup>77</sup>\n\nFor OSH, the major **question for all mobile and non-stationery work** is: **to what degree** does the\n\nOSH level at these workplaces’ deviate **from the OSH level at stationary workplaces** ? Current OSH\n\nlegislation illustrates these difficulties: The Workplace Directive <sup>78</sup> excludes several types of mobile work,\n\nand the Display screen equipment directive <sup>79</sup> was issued in 1990 and does not reflect the variety and\n\nspecific OSH issues of digital equipment development of the past 30 years. Both directives are currently\n\nunder revision.\n\n**Mobile work** is a standard characteristic of work in the **construction and transport sector** , extreme\n\nfor workers in the maritime and other long-distance and international transport sectors, often in tourism\n\nand also for certain categories of **sales personnel** , and often standard for qualified **craft workers** during\n\nservice or construction of plants and installations and during maintenance. <sup>80</sup>\n\nTriggered by developments in digital and communication technologies, several new types of mobile\n\nwork have developed. In principle, the place of work can be anywhere, in a car, train, hotel, at the\n\npremises of other employers, at remote office-like locations, or at the client’s workplace or at private\n\nhomes of clients; it is not ‘place-bound’. Most of this mobile work still takes place in the contractual form\n\nof regular employment, but mobile work is also a major field for many new forms of new work contracts,\n\ntriggered by the technological possibilities.\n\n**Traditional home-based work** consists of the production of small goods that — from a technical point\n\nof view — can be produced in private homes (clothes, artisan work and very repetitive work like sorting).\n\nThis work is performed for an enterprise or a person contracted by the enterprise for the organisation of\n\nhome-based work and is located at the homes of the workers. It might require extra technical equipment,\n\nbut sometimes usual private equipment is sufficient. The traditional home-based work very probably has\n\ndecreased to a low level, the quantity of this type of home-based work is not monitored at EU level. <sup>81</sup>\n\nRegulation of OSH for such home-based work has a long tradition in OSH legislation, mostly aimed at\n\nachieving working conditions as similar as possible to the other employees in an enterprise, regarding\n\nwages, social protection, and safety and health.\n\n**Work at, from and in homes.** We can distinguish major types: **work at (own) home** , either as\n\nindependent work (self-employed) or classical home-based work; **work from private home** embedded\n\nin daily routine work processes in an enterprise or institution; and **work in homes of others** . Long-term\n\ncare work, domestic work and teaching are large categories of work in homes; the work is performed in\n\nthe private homes of clients. Regarding work that is done at **home, from home and in homes** , the\n\napplication of some basic OSH standards has to take into account the dominantly private character of a\n\nhome. This triggers the question of **responsibility and supervision** : Who is responsible for risk\n\nassessment and prevention measures? Is a supervision of compliance by state authorities in private\n\nhomes legally possible?\n\nThe craft workers who are doing **technical services in homes** of clients are statistically not counted as\n\nhome workers but as workers at the premises of clients (Eurostat). In some important OSH aspects, it", - "page_start": 48, - "page_end": 48, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "##### TABLE OF CONTENTS:\n\n1. General Language Tips to Get You Started\n\n2. Parts of Speech\n\n3. Punctuation\n\n4. Commonly Confused Words and Phrases\n\n5. Tips for Filling in Your College Registration Form\n\n6. Learn How to Summarise Your Study Material\n\n7. How to Ask for Help from Your Tutor\n\n8. Tips for Completing Your Written Assignments\n\n9. Tips for Answering Exam Questions\n\n10. Language Skills at Work - How to Write a Cover Letter\n\n11. Language Skills at Work - How to Write a Resignation Letter\n\n12. Language Skills at Work - Sending E-mails to Your Colleagues", - "page_start": 2, - "page_end": 2, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "*months of follow-up, certain non-standard workers were at increased risk of death compared to*\n\n*permanently employed workers.’* <sup>63</sup>\n\nThe **conventional non-standard types** of work start with widespread temporary (or fixed-term) work,\n\nseasonal work, casual work, remote work in different forms (at home or other places), self-employed\n\nwork, family work, mobile work in transport and often in construction, domestic work, care and craft work\n\nat the places of clients, plus several types of less regular and undeclared work.\n\nHigh public awareness is directed to those types of non-standard work that are connected either to **new**\n\n**forms of contracts** (voucher, platform, zero-hours, etc.) or new types of work made possible by the", - "page_start": 44, - "page_end": 44, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "remuneration consultant for the 2014 fiscal year. Meridian was retained to provide executive and director remuneration\n\nconsulting services to the Committee, including advice regarding the design and implementation of remuneration programs that\n\nare competitive and common among the U.S. oil and gas exploration and production industry, competitive market information,\n\ncomparison advice with Australian companies and practice, regulatory updates and analyses and trends on executive base salary,", - "page_start": 33, - "page_end": 33, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Get writing suggestions\n\nWith **Editor** , bring out your best writing. Editor helps you bring out your best writing by giving you intelligent writing suggestions. It also calculates an Editor Score based on the number and types of suggestions you have yet to address. Select an underlined word or phrase to accept or ignore a suggestion.\n\nReview and track changes\n\nWhether you just want to check spelling, keep your word count in check, or fully collaborate with other people, the **Review** tab has essential commands to track, discuss, and manage all of the changes made to your documents.\n\nView who else is typing\n\nCo-authoring Word documents that are shared on OneDrive or on a SharePoint site happens in real-time, which means you can easily view where other authors are making changes in the same document that you’re currently working in.\n\nFormat with styles\n\n**Styles** lets you create, apply, and review the formatting styles in your current document. To open it, select the **Home** tab, and then select the small arrow in the lower right corner of the Styles gallery.", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0770.pdf", - "query": "Where are the peaks of the VHE blazars ?", - "target_page": 1, - "target_passage": " VHE blazars have double-humped spectral energy distributions (SEDs), with one peak at UV/X-ray energies and another at GeV/TeV energies.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "## **3. VERITAS Blazar KSP**\n\nVERITAS observes for ∼ 750 h and ∼ 250 h each\n\nyear during periods of astronomical darkness and par-\n\ntial moonlight, respectively. The moonlight observa-\n\ntions are almost exclusively used for a blazar discovery\n\nprogram, and a large fraction of the dark time is used\n\nfor the blazar KSP, which consists of:\n\n- A VHE blazar discovery program ( ∼ 200 h / yr):\n\nEach year ∼ 10 targets are selected to receive\n\n∼ 10 h of observations each during astronomi-\n\ncal darkness. These data are supplemented by\n\ndiscovery observations during periods of partial\n\nmoonlight.\n\n- A target-of-opportunity (ToO) observation pro-\n\ngram ( ∼ 50 h / yr): VERITAS blazar obser-\n\nvations can be triggered by either a VERI-\n\nTAS blazar discovery, a VHE flaring alert ( > 2\n\nCrab) from the blazar monitoring program of\n\nthe Whipple 10-m telescope or from another\n\nVHE instrument, or a lower-energy flaring alert\n\n(optical, X-ray or Fermi-LAT). Should the guar-\n\nanteed allocation be exhausted, further time can\n\nbe requested from a pool of director’s discre-\n\ntionary time.\n\n- Multi-wavelength (MWL) studies of VHE\n\nblazars ( ∼ 50 h / yr + ToO): Each year one\n\nblazar receives a deep exposure in a pre-planned\n\ncampaign of extensive, simultaneous MWL (X-\n\nray, optical, radio) measurements. ToO observa-\n\ntion proposals for MWL measurements are also\n\nsubmitted to lower-energy observatories (e.g.\n\nSwift) and are triggered by a VERITAS discov-\n\nery or flaring alert.\n\n- Distant VHE blazar studies to constrain the ex-\n\ntragalactic background light (EBL): Here dis-\n\ntant targets are given a higher priority in the\n\nblazar discovery program, as well as for the\n\nMWL observations of known VHE blazars, par-\n\nticularly those with hard VHE spectra.\n\n## **4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are\n\nlargely high-frequency-peaked BL Lac objects. How-\n\never, the program also includes IBLs (intermediate-\n\npeaked) and LBLs (low-peaked), as well as flat spec-\n\ntrum radio quasars (FSRQs), in an attempt to in-\n\ncrease the types of blazars known to emit VHE γ -rays.\n\nThe observed targets are drawn from a target list con-\n\ntaining objects visible to the telescopes at reasonable\n\nzenith angles ( − 8 <sup>◦</sup> < δ < 72 <sup>◦</sup> ), without a previously\n\npublished VHE limit below 1.5% Crab, and with a\n\nmeasured redshift z < 0 . 3. To further the study of the\n\nEBL a few objects having a large ( z > 0 . 3) are also\n\nincluded in the target list. The target list includes:\n\n- All nearby ( z < 0 . 3) HBL and IBL recom-\n\nmended as potential VHE emitters in [5, 6, 7].\n\n- The X-ray brightest HBL ( z < 0 . 3) in the recent\n\nSedentary [8] and ROXA [9] surveys.\n\n- Four distant ( z > 0 . 3) BL Lac objects recom-\n\nmended by [5, 10].\n\n- Several FSRQ recommended as potential VHE\n\nemitters in [6, 11].\n\n- All nearby ( z < 0 . 3) blazars detected by\n\nEGRET [12].\n\n- All nearby ( z < 0 . 3) blazars contained in the\n\nFermi-LAT Bright AGN Sample [13].\n\n- All sources ( | b | > 10 <sup>◦</sup> ) detected by Fermi-LAT\n\nwhere extrapolations of their MeV-GeV γ -ray\n\nspectrum (including EBL absorption; assuming\n\nz = 0.3 if the redshift is unknown) indicates a\n\npossible VERITAS detection in less than 20 h.\n\nThis criteria is the focus of the 2009-10 VERI-\n\nTAS blazar discovery program.\n\n## **5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ -ray emission from\n\n16 AGN (15 blazars), including 8 VHE discoveries.\n\nThese AGN are shown in Table I, and each has been\n\ndetected by the Large Area Telescope (LAT) instru-\n\nment aboard the Fermi Gamma-ray Space Telescope.\n\nEvery blazar discovered by VERITAS was the sub-\n\nject of ToO MWL observations to enable modeling of\n\nits simultaneously-measured SED. The known VHE\n\nblazars detected by VERITAS were similarly the tar-\n\ngets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "[arXiv:1001.0770v1 [astro-ph.HE] 5 Jan 2010](http://arxiv.org/abs/1001.0770v1)\n\n## **VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration *Harvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645,* *USA*\n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is\n\nused to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is\n\ncurrently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration’s Key\n\nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class\n\nof identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which\n\nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE\n\nexposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including\n\n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected\n\nresults are presented.\n\n## **1. Introduction**\n\nActive galactic nuclei are the most numerous class\n\nof identified VHE γ -ray sources. These objects emit\n\nnon-thermal radiation across ∼ 20 orders of magnitude\n\nin energy and rank among the most powerful particle\n\naccelerators in the universe. A small fraction of AGN\n\npossess strong collimated outflows (jets) powered by\n\naccretion onto a supermassive black hole (SMBH).\n\nVHE γ -ray emission can be generated in these jets,\n\nlikely in a compact region very near the SMBH event\n\nhorizon. Blazars, a class of AGN with jets pointed\n\nalong the line-of-sight to the observer, are of par-\n\nticular interest in the VHE regime. Approximately\n\n30 blazars, primarily high-frequency-peaked BL Lacs\n\n(HBL), are identified as sources of VHE γ -rays, and\n\nsome are spectacularly variable on time scales com-\n\nparable to the light crossing time of their SMBH ( ∼ 2\n\nmin; [1]). VHE blazar studies probe the environment\n\nvery near the central SMBH and address a wide range\n\nof physical phenomena, including the accretion and\n\njet-formation processes. These studies also have cos-\n\nmological implications, as VHE blazar data can be\n\nused to strongly constrain primordial radiation fields\n\n(see the extragalactic background light (EBL) con-\n\nstraints from, e.g., [2, 3]).\n\nVHE blazars have double-humped spectral energy\n\ndistributions (SEDs), with one peak at UV/X-ray en-\n\nergies and another at GeV/TeV energies. The ori-\n\ngin of the lower-energy peak is commonly explained\n\nas synchrotron emission from the relativistic electrons\n\nin the blazar jets. The origin of the higher-energy\n\npeak is controversial, but is widely believed to be the\n\nresult of inverse-Compton scattering of seed photons\n\noff the same relativistic electrons. The origin of the\n\nseed photons in these leptonic scenarios could be the\n\nsynchrotron photons themselves, or photons from an\n\nexternal source. Hadronic scenarios are also plausible\n\nexplanations for the VHE emission, but generally are\n\nnot favored.\n\nContemporaneous multi-wavelength (MWL) obser-\n\nvations of VHE blazars, can measure both SED peaks\n\nand are crucial for extracting information from the\n\nobservations of VHE blazars. They are used to con-\n\nstrain the size, magnetic field and Doppler factor of\n\nthe emission region, as well as to determine the origin\n\n(leptonic or hadronic) of the VHE γ -rays. In leptonic\n\nscenarios, such MWL observations are used to mea-\n\nsure the spectrum of high-energy electrons producing\n\nthe emission, as well as to elucidate the nature of the\n\nseed photons. Additionally, an accurate measure of\n\nthe cosmological EBL density requires accurate mod-\n\neling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "ferent event selection criteria (e.g. soft cuts optimized\n\nfor sources with Γ VHE > 4). The distribution of VHE\n\nflux upper limits is shown in Figure 1. These 49 VHE\n\nflux upper limits are generally the most-constraining\n\never reported for these objects.\n\n## **7. Multi-wavelength Studies of VHE Blazars**\n\nDuring the first three seasons of VERITAS obser-\n\nvations, pre-planned extensive MWL campaigns were\n\norganized for three blazars 1ES 2344+514 (2007-08),\n\n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009-\n\n10 - ongoing). In addition, numerous ToO MWL-\n\nobservation campaigns were performed. These include\n\ncampaigns for every blazar/AGN discovered by VER-\n\nITAS, and all include Swift (XRT and UVOT) data.\n\nAll MWL campaigns on the VHE blazars discovered\n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "gets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included\n\nthe first VHE-detected IBL, W Comae [14, 15], and\n\nthe HBL 1ES 0806+524 [16]. VERITAS has discov-\n\nered 6 VHE blazars since the launch of Fermi. Three\n\nof these were initially observed by VERITAS prior to\n\nthe release of Fermi-LAT results, due to the X-ray\n\nbrightness of the synchrotron peaks of their SEDs.\n\nVHE emission from 3C 66A was discovered by VER-\n\nITAS in September 2008 [17] during a flaring episode\n\nthat was also observed by the Fermi-LAT [18]. The\n\nobserved flux above 200 GeV was 6% of the Crab Neb-\n\nula flux and the measured VHE spectrum was very\n\nsoft (Γ VHE ∼ 4 . 1). RGB J0710+591 was detected\n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "future of the VERITAS blazar discovery program is\n\nclearly very bright.\n\nThe MWL aspect of the VERITAS blazar KSP has\n\nalso been highly successful. Every VERITAS obser-\n\nvation of a known, or newly discovered, VHE blazar\n\nhas been accompanied by contemporaneous MWL ob-\n\nservations. These data have resulted in the identifica-\n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as\n\nwell as correlated spectral hardening in both the VHE\n\nand X-ray bands. The VHE MWL observations were\n\nperformed in both ”quiescent” and flaring states for\n\nsome of the observed blazars. For the observed HBL\n\nobjects, the SEDs can be well described by a simple\n\nSSC model in both high and low states. However, an\n\nadditional external Compton component is necessary\n\nto adequately fit the SEDs of the IBL objects.\n\nThe Fermi-LAT is already having a significant im-\n\npact on the blazar KSP. In future seasons, the VER-\n\nITAS blazar discovery program will focus its dis-\n\ncovery program on hard-spectrum blazars detected\n\nby Fermi-LAT, and will likely have a greater focus\n\non high-risk/high-reward objects at larger redshifts\n\n(0 . 3 < z < 0 . 7). In addition, the number of VHE\n\nblazars studied in pre-planned MWL campaigns will\n\nincrease as data from the Fermi-LAT will be publicly\n\navailable. In particular, the extensive pre-planned\n\nMWL campaigns will focus on objects that are note-\n\nworthy for the impact their data may have on under-\n\nstanding the EBL. The simultaneous observations of\n\nblazars by VERITAS and Fermi-LAT will completely\n\nresolve the higher-energy SED peak, often for the first\n\ntime, enabling unprecedented constraints on the un-\n\nderlying blazar phenomena to be derived.\n\n### **Acknowledgments**\n\nThis research is supported by grants from the US\n\nDepartment of Energy, the US National Science Foun-\n\ndation, and the Smithsonian Institution, by NSERC in\n\nCanada, by Science Foundation Ireland, and by STFC\n\nin the UK. We acknowledge the excellent work of the\n\ntechnical support staff at the FLWO and the collab-\n\norating institutions in the construction and operation\n\nof the instrument.\n\n### **References**\n\n[1] F. Aharonian et al. 2007, ApJ , 664 , L71\n\n[2] F. Aharonian et al. 2006, Nature , 440 , 1018\n\n[3] F. Aharonian et al. 2007, A&A , 475 , L9\n\n[4] J. Holder, et al. 2008, AIPC , 1085 , 657\n\n[5] L. Costamante & G. Ghisellini 2002, A&A , 384 ,\n\n56\n\n[6] E.S. Perlman 2000, AIPC , 515 , 53\n\n[7] F.W. Stecker et al. 1996, ApJ , 473 , L75\n\n[8] P. Giommi et al. 2005, A&A , 434 , 385\n\n[9] S. Turriziani et al. 2007, A&A , 472 , 699\n\n[10] L. Costamante 2006, arXiv:0612709\n\n[11] P. Padovani et al. 2002, ApJ , 581 , 895\n\n[12] R. Muhkerjee et al. 2001, AIPC , 558 , 324\n\n[13] A.A. Abdo et al. 2009, ApJ , 700 , 597\n\n[14] V.A. Acciari et al. 2008, ApJ , 684 , L73\n\n[15] V.A. Acciari et al. 2009, ApJ , 707 , 612\n\n[16] V.A. Acciari et al. 2009, ApJ , 690 , L126\n\n[17] V.A. Acciari et al. 2009, ApJ , 693 , L104\n\n[[18] L.C. Reyes 2009, arXiv:0907.5175](http://arxiv.org/abs/0907.5175)\n\n[19] R.A. Ong 2009, ATel , 1941\n\n[20] R.A. Ong et al. 2009, ATel , 2272\n\n[21] V.A. Acciari et al. 2009, ApJ , 708 , L100\n\n[22] R.A. Ong et al. 2009, ATel , 2301\n\n[23] R.A. Ong et al. 2009, ATel , 2260\n\n[24] R.A. Ong et al. 2009, ATel , 2309\n\n[[25] W. Benbow 2009, arXiv:0908.1412](http://arxiv.org/abs/0908.1412)\n\n[26] V.A. Acciari et al. 2009, ApJ , submitted\n\n[27] V.A. Acciari et al. 2009, ApJ , 695 , 1370\n\n[28] V.A. Acciari et al. 2009, ApJ , in press\n\n[[29] J. Grube 2009, arXiv:0907.4862](http://arxiv.org/abs/0907.4862)\n\neConf C091122", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "σ **−5 −4 −3 −2 −1 0 1 2 3 4 5**\n\n**Entries**\n\n**0**\n\n**2**\n\n**4**\n\n**6**\n\n**8**\n\n**10**\n\n**12**\n\n**Crab Flux % 0 2 4 6 8 10 12 14**\n\n**Entries**\n\n**0**\n\n**2**\n\n**4**\n\n**6**\n\n**8**\n\n**10**\n\n**12**\n\n**14**\n\n**16**\n\n**18**\n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard\n\nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the\n\nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The\n\ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation\n\nthreshold. The time-weighted average limit is less than ∼ 2% Crab flux.\n\nsince the launch of Fermi include LAT detections. In\n\naddition, several MWL campaigns on the well-studied\n\nVHE blazars Mkn 421 and Mkn 501 (please see the\n\ncontributions of D. Gall and A. Konopelko in these\n\nproceedings) were also performed. Highlights of these\n\ncampaigns include:\n\n- 1ES 2344+514: A major (50% Crab) VHE flare,\n\nalong with correlations of the VHE and X-ray\n\nflux were observed from this HBL. The VHE\n\nand X-ray spectra harden during bright states,\n\nand a synchrotron self-Compton (SSC) model\n\ncan explain the observed SED in both the high\n\nand low states [26].\n\n- 1ES 1218+304: This HBL flared during VER-\n\nITAS MWL observations. Its unusually hard\n\nVHE spectrum strongly constrains the EBL.\n\nThe observed flaring rules out kpc-scale jet emis-\n\nsion as the explanation of the spectral hardness\n\nand places the EBL constraints on more solid-\n\nfooting [27, 28].\n\n- 1ES 0806+524: The observed SED of this new\n\nVHE HBL can be explained by an SSC model\n\n[16].\n\n- W Comae: This IBL, the first discovered at\n\nVHE, flared twice in 2008 [14, 15]. Modeling of\n\nthe SED is improved by including an external-\n\nCompton (EC) component in an SSC interpre-\n\ntation.\n\n- 3C 66A: This IBL flared at VHE and MeV-GeV\n\nenergies in 2008[17, 18]. Similar to W Comae\n\nand PKS 1424+240, modeling of observed SED\n\nsuggests a strong EC component in addition to\n\nan SSC component.\n\n- Mkn 421: This HBL exhibited major flaring be-\n\nhavior for several months in 2008. Correlations\n\nof the VHE and X-ray flux were observed, along\n\nwith spectral hardening with increased flux in\n\nboth bands [29].\n\n- RGB J0710+591: Modeling the SED of this\n\nHBL with an SSC model yields a good fit to\n\nthe data. The inclusion of an external Compton\n\ncomponent does not improve the fit.\n\n- PKS 1424+240: The broadband SED of this IBL\n\n(at unknown redshift) is well described by an\n\nSSC model favoring a redshift of less than 0.1\n\n[21]. Using the photon index measured with\n\nFermi-LAT in combination with recent EBL ab-\n\nsorption models, the VERITAS data indicate\n\nthat the redshift of PKS 1424+240 is less than\n\n0.66.\n\n## **8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP\n\nwere highly successful. Highlights include the detec-\n\ntion of more than a 16 VHE blazars with the obser-\n\nvations almost always having contemporaneous MWL\n\ndata. Among these detections are 8 VHE blazar dis-\n\ncoveries, including the first three IBLs known to emit\n\nVHE γ -rays. All but a handful of the blazars on the\n\ninitial VERITAS discovery target list were observed,\n\nand the flux limits generated for those not VHE de-\n\ntected are generally the most-constraining ever. The\n\nexcess seen in the stacked blazar analysis suggests\n\nthat the initial direction of the VERITAS discovery\n\nprogram was well justified, and that follow-up obser-\n\nvations of many of these initial targets will result in\n\nVHE discoveries. In addition, the Fermi-LAT is iden-\n\ntifying many new compelling targets for the VERITAS\n\nblazar discovery program. These new candidates have\n\nalready resulted in 3 VHE blazar discoveries. The\n\nfuture of the VERITAS blazar discovery program is\n\nclearly very bright.\n\nThe MWL aspect of the VERITAS blazar KSP has\n\nalso been highly successful. Every VERITAS obser-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "**Submillimeter Variability and the Gamma-ray Connection in** * **Fermi** *\n\n**Blazars**\n\nA. Strom *Univ. of Arizona, AZ 85721, USA*\n\nA. Siemiginowska, M. Gurwell, B. Kelly *CfA, MA 02138, USA*\n\nWe present multi-epoch observations from the *Submillimeter Array* ( *SMA* ) for a sample of 171 bright blazars,\n\n43 of which were detected by *Fermi* during the first three months of observations. We explore the correlation\n\nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special\n\nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de-\n\ntermined using a combination of *Fermi* designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS),\n\nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate\n\nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands\n\nduring the months August- October 2008. The submillimeter light curves are modeled as first-order continuous\n\nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ-\n\nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity.\n\nAll of the the light curves are consistent with being produced by a single process that accounts for both low\n\nand high states, and there is additional evidence that objects may be transitioning between blazar class during\n\nflaring epochs.\n\n## **1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring\n\nevents occur in blazars indicate that much of the en-\n\nergy is being produced deep within the jet on small,\n\nsub-parsec scales [1, 2]. Understanding if/how emis-\n\nsion differs between blazar subclasses (i.e., BL Lacs\n\nobjects and flat-spectrum radio quasars (FSRQs))\n\nmay offer important insight into the similarity be-\n\ntween blazars and, furthermore, can provide con-\n\nstraints on the formation and acceleration of the jets\n\nthemselves.\n\nFor the synchrotron component of blazar spectra,\n\nthe low-frequency spectral break due to synchrotron\n\nself-absorption moves to higher frequencies as one\n\nmeasures closer to the base of the jet [2]. This of-\n\nten places the peak of the spectrum in the millime-\n\nter and submillimeter bands, where the emission is\n\noptically-thin and originates on parsec and sub-parsec\n\nscales [3], allowing direct observation of the most com-\n\npact regions near the central engine. The high en-\n\nergy *γ* -ray emission originates as a Compton process,\n\ntypically a combination of synchrotron-self-Compton\n\n(SSC) and external-radiation-Compton (ERC). De-\n\npending on the source properties, the synchrotron\n\nphotons or external photons are upscattered by the\n\nsame population of electrons that emit the millimeter\n\nand submillimeter spectra. Therefore the submillime-\n\nter and *γ* -ray emission are closely linked and give the\n\nfull information about the source emission.\n\nA systematic study of the submillimeter properties\n\nof the entire sample of *Fermi* blazars has yet to be con-\n\nducted and is one of the primary goals of our work. We\n\npresent here preliminary analysis of the submillimeter\n\nproperties of *Fermi* blazars detected by the *Submil-*\n\n*limeter Array* <sup>1</sup> ( *SMA* ) at 1mm and 850 *µ* m, including\n\nan investigation of variable behavior and the deter-\n\nmination of submillimeter energy spectral indices. In\n\naddition, we consider the connection to the observed\n\n*γ* -ray indices and luminosities.\n\n## **2.** * **SMA** * **BLAZARS**\n\nThe *Submillimeter Array* [4] consists of eight 6 m\n\nantennas located near the summit of Mauna Kea. The\n\n*SMA* is used in a variety of baseline configurations\n\nand typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 5: Ratio of *γ* -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this\n\nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower\n\nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n\n*-* BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter vari-\n\nability or characteristic timescale, but our sam-\n\nple of BL Lacs may be dominated by high-\n\npeaked BL Lacs (HBLs), which exhibit obser-\n\nvational similarities with FSRQs.\n\n*-* Blazar submillimeter light curves are consistent with being produced by a single process that ac-\n\ncounts for both high and low states, with char-\n\nacteristic timescales 10 *< τ* rest *<* 500 days.\n\n*-* The blazars detected by *Fermi* have synchrotron peaks at higher frequencies, regardless of sub-\n\nmillimeter luminosity.\n\n*-* FSRQs exhibit higher ratios of *γ* -ray to sub- millimeter luminosity than BL Lacs (Figure 5),\n\nbut all objects inhabit a region of parameter\n\nspace suggesting transitions between states dur-\n\ning flaring epochs.\n\nAs *Fermi* continues to observe fainter sources, the\n\nsample of objects for which we can perform this type of\n\nanalysis will increase and provide better limits on our\n\nresults. To understand the physical relevance of these\n\nresults, however, it is important to be able to distin-\n\nguish between the difference in variability between BL\n\nLacs and FSRQs. One avenue for exploring this dif-\n\nference is to monitor changing submillimeter energy\n\nspectral index and the ratio of *γ* -ray to submillime-\n\nter luminosity as functions of time. The full mean-\n\ning of the results of our autoregressive method is not\n\nyet clear, and will require better-sampled blazar light\n\ncurves and the comparison between *τ* rest with physical\n\ntimescales such as the synchrotron cooling timescale.\n\nThese analyses would allow us to place constraints\n\non the processes occurring near the base of the jet in\n\nblazars and further understand the intimate connec-\n\ntion between them.\n\n## **Acknowledgments**\n\nThis work was supported in part by the NSF\n\nREU and DoD ASSURE programs under Grant no.\n\n0754568 and by the Smithsonian Institution. Par-\n\ntial support was also provided by NASA contract\n\nNAS8-39073 and NASA grant NNX07AQ55G. We\n\nhave made use of the SIMBAD database, operated at\n\nCDS, Strasbourg, France, and the NASA/IPAC Ex-\n\ntragalactic Database (NED) which is operated by the\n\nJPL, Caltech, under contract with NASA.\n\n**eConf C091122**", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "Table I VERITAS AGN Detections. The only non-blazar\n\nobject is the radio galaxy M 87. The blazars discovered\n\nat VHE by VERITAS are marked with a dagger.\n\nObject Class Redshift\n\nM 87 FR I 0.004\n\nMkn 421 HBL 0.030\n\nMkn 501 HBL 0.034\n\n1ES 2344+514 HBL 0.044\n\n1ES 1959+650 HBL 0.047\n\nW Comae <sup>†</sup> IBL 0.102\n\nRGB J0710+591 <sup>†</sup> HBL 0.125\n\nH 1426+428 HBL 0.129\n\n1ES 0806+524 <sup>†</sup> HBL 0.138\n\n1ES 0229+200 HBL 0.139\n\n1ES 1218+304 HBL 0.182\n\nRBS 0413 <sup>†</sup> HBL 0.190\n\n1ES 0502+675 <sup>†</sup> HBL 0.341\n\n3C 66A <sup>†</sup> IBL 0.444?\n\nPKS 1424+240 <sup>†</sup> IBL ?\n\nVER J0521+211 <sup>†</sup> ? ?\n\n( ∼ 5.5 σ ; 3% Crab flux above 300 GeV; Γ VHE ∼ 2 . 7)\n\nduring VERITAS observations from December 2008\n\nto March 2009. The initial announcement of the VHE\n\ndiscovery [19] led to its discovery above 1 GeV in the\n\nFermi-LAT data using a special analysis. RBS 0413,\n\na relatively distant HBL (z=0.19), was observed for 16 h good-quality live time in 2008-09 <sup>2</sup> . These data\n\nresulted in the discovery of VHE gamma-rays ( > 270 γ ,\n\n∼ 6 σ ) at a flux ( > 200 GeV) of ∼ 2% of the Crab Neb-\n\nula flux. The discovery [20] was announced simultane-\n\nously with the LAT MeV-GeV detection. The VHE\n\nand other MWL observations, including Fermi-LAT\n\ndata, for each of these three sources will be the sub-\n\nject of a joint publication involving both the VERI-\n\nTAS and LAT collaborations.\n\n### **5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by\n\nVERITAS of three blazars was motivated primarily\n\nby results from the first year of LAT data taking. In\n\nparticular, the VHE detections of PKS 1424+240 [21]\n\nand 1ES 0502+675 [22] were the result of VERITAS\n\nobservations triggered by the inclusion of these objects\n\nin the Fermi-LAT Bright AGN List [13]. The former\n\nis only the third IBL known to emit VHE gamma-\n\nrays, and the latter is the most distant BL Lac object\n\n2 RBS 0413 was observed further by VERITAS in Fall 2009.\n\n( z = 0 . 341) detected in the VHE band. In addition,\n\nVER J0521+211, likely associated with the radio-loud\n\nAGN RGB J0521.8+2112, was detected by VERTAS\n\nin ∼ 4 h of observations in October 2009 [23]. These\n\nobservations were motivated by its identification as a\n\n> 30 GeV γ -ray source in the public Fermi-LAT data.\n\nIts VHE flux is 5% of the Crab Nebula flux, placing it\n\namong the brightest VHE blazars detected in recent\n\nyears. VERITAS later observed even brighter VHE\n\nflaring from VER J0521+211 in November 2009 [24],\n\nleading to deeper VHE observations.\n\n## **6. Blazars Upper Limits**\n\nMore than 50 VHE blazar candidates were observed\n\nby VERITAS between September 2007 and June 2009.\n\nThe total exposure on the 49 non-detected candi-\n\ndates is ∼ 305 h live time (average of 6.2 h per can-\n\ndidate). Approximately 55% of the total exposure is\n\nsplit amongst the 27 observed HBL. The remainder is\n\ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9\n\nFSRQ (13%). There are no clear indications of signifi-\n\ncant VHE γ -ray emission from any of these 49 blazars\n\n[25]. However, the observed significance distribution is\n\nclearly skewed towards positive values (see Figure 1).\n\nA stacking analysis performed on the entire data sam-\n\nple shows an overall excess of 430 γ -rays, correspond-\n\ning to a statistical significance of 4.8 σ , observed from\n\nthe directions of the candidate blazars. The IBL and\n\nHBL targets make up 96% of the observed excess. Ob-\n\nservations of these objects also comprise ∼ 80% of the\n\ntotal exposure. An identical stacked analysis of all\n\nthe extragalactic non-blazar targets observed, but not\n\nclearly detected ( > 5 σ ), by VERITAS does not show\n\na significant excess ( ∼ 120 h exposure). The stacked\n\nexcess persists using alternate methods for estimating\n\nthe background at each blazar location, and with dif-\n\nferent event selection criteria (e.g. soft cuts optimized\n\nfor sources with Γ VHE > 4). The distribution of VHE\n\nflux upper limits is shown in Figure 1. These 49 VHE", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0770.pdf", - "query": "What are the blazars observed in the discovery program ?", - "target_page": 2, - "target_passage": "The blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. How ever, the program also includes IBLs (intermediate peaked) and LBLs (low-peaked), as well as flat spec trum radio quasars (FSRQs), in an attempt to in crease the types of blazars known to emit VHE γ-rays.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## **3. VERITAS Blazar KSP**\n\nVERITAS observes for ∼ 750 h and ∼ 250 h each\n\nyear during periods of astronomical darkness and par-\n\ntial moonlight, respectively. The moonlight observa-\n\ntions are almost exclusively used for a blazar discovery\n\nprogram, and a large fraction of the dark time is used\n\nfor the blazar KSP, which consists of:\n\n- A VHE blazar discovery program ( ∼ 200 h / yr):\n\nEach year ∼ 10 targets are selected to receive\n\n∼ 10 h of observations each during astronomi-\n\ncal darkness. These data are supplemented by\n\ndiscovery observations during periods of partial\n\nmoonlight.\n\n- A target-of-opportunity (ToO) observation pro-\n\ngram ( ∼ 50 h / yr): VERITAS blazar obser-\n\nvations can be triggered by either a VERI-\n\nTAS blazar discovery, a VHE flaring alert ( > 2\n\nCrab) from the blazar monitoring program of\n\nthe Whipple 10-m telescope or from another\n\nVHE instrument, or a lower-energy flaring alert\n\n(optical, X-ray or Fermi-LAT). Should the guar-\n\nanteed allocation be exhausted, further time can\n\nbe requested from a pool of director’s discre-\n\ntionary time.\n\n- Multi-wavelength (MWL) studies of VHE\n\nblazars ( ∼ 50 h / yr + ToO): Each year one\n\nblazar receives a deep exposure in a pre-planned\n\ncampaign of extensive, simultaneous MWL (X-\n\nray, optical, radio) measurements. ToO observa-\n\ntion proposals for MWL measurements are also\n\nsubmitted to lower-energy observatories (e.g.\n\nSwift) and are triggered by a VERITAS discov-\n\nery or flaring alert.\n\n- Distant VHE blazar studies to constrain the ex-\n\ntragalactic background light (EBL): Here dis-\n\ntant targets are given a higher priority in the\n\nblazar discovery program, as well as for the\n\nMWL observations of known VHE blazars, par-\n\nticularly those with hard VHE spectra.\n\n## **4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are\n\nlargely high-frequency-peaked BL Lac objects. How-\n\never, the program also includes IBLs (intermediate-\n\npeaked) and LBLs (low-peaked), as well as flat spec-\n\ntrum radio quasars (FSRQs), in an attempt to in-\n\ncrease the types of blazars known to emit VHE γ -rays.\n\nThe observed targets are drawn from a target list con-\n\ntaining objects visible to the telescopes at reasonable\n\nzenith angles ( − 8 <sup>◦</sup> < δ < 72 <sup>◦</sup> ), without a previously\n\npublished VHE limit below 1.5% Crab, and with a\n\nmeasured redshift z < 0 . 3. To further the study of the\n\nEBL a few objects having a large ( z > 0 . 3) are also\n\nincluded in the target list. The target list includes:\n\n- All nearby ( z < 0 . 3) HBL and IBL recom-\n\nmended as potential VHE emitters in [5, 6, 7].\n\n- The X-ray brightest HBL ( z < 0 . 3) in the recent\n\nSedentary [8] and ROXA [9] surveys.\n\n- Four distant ( z > 0 . 3) BL Lac objects recom-\n\nmended by [5, 10].\n\n- Several FSRQ recommended as potential VHE\n\nemitters in [6, 11].\n\n- All nearby ( z < 0 . 3) blazars detected by\n\nEGRET [12].\n\n- All nearby ( z < 0 . 3) blazars contained in the\n\nFermi-LAT Bright AGN Sample [13].\n\n- All sources ( | b | > 10 <sup>◦</sup> ) detected by Fermi-LAT\n\nwhere extrapolations of their MeV-GeV γ -ray\n\nspectrum (including EBL absorption; assuming\n\nz = 0.3 if the redshift is unknown) indicates a\n\npossible VERITAS detection in less than 20 h.\n\nThis criteria is the focus of the 2009-10 VERI-\n\nTAS blazar discovery program.\n\n## **5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ -ray emission from\n\n16 AGN (15 blazars), including 8 VHE discoveries.\n\nThese AGN are shown in Table I, and each has been\n\ndetected by the Large Area Telescope (LAT) instru-\n\nment aboard the Fermi Gamma-ray Space Telescope.\n\nEvery blazar discovered by VERITAS was the sub-\n\nject of ToO MWL observations to enable modeling of\n\nits simultaneously-measured SED. The known VHE\n\nblazars detected by VERITAS were similarly the tar-\n\ngets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "future of the VERITAS blazar discovery program is\n\nclearly very bright.\n\nThe MWL aspect of the VERITAS blazar KSP has\n\nalso been highly successful. Every VERITAS obser-\n\nvation of a known, or newly discovered, VHE blazar\n\nhas been accompanied by contemporaneous MWL ob-\n\nservations. These data have resulted in the identifica-\n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as\n\nwell as correlated spectral hardening in both the VHE\n\nand X-ray bands. The VHE MWL observations were\n\nperformed in both ”quiescent” and flaring states for\n\nsome of the observed blazars. For the observed HBL\n\nobjects, the SEDs can be well described by a simple\n\nSSC model in both high and low states. However, an\n\nadditional external Compton component is necessary\n\nto adequately fit the SEDs of the IBL objects.\n\nThe Fermi-LAT is already having a significant im-\n\npact on the blazar KSP. In future seasons, the VER-\n\nITAS blazar discovery program will focus its dis-\n\ncovery program on hard-spectrum blazars detected\n\nby Fermi-LAT, and will likely have a greater focus\n\non high-risk/high-reward objects at larger redshifts\n\n(0 . 3 < z < 0 . 7). In addition, the number of VHE\n\nblazars studied in pre-planned MWL campaigns will\n\nincrease as data from the Fermi-LAT will be publicly\n\navailable. In particular, the extensive pre-planned\n\nMWL campaigns will focus on objects that are note-\n\nworthy for the impact their data may have on under-\n\nstanding the EBL. The simultaneous observations of\n\nblazars by VERITAS and Fermi-LAT will completely\n\nresolve the higher-energy SED peak, often for the first\n\ntime, enabling unprecedented constraints on the un-\n\nderlying blazar phenomena to be derived.\n\n### **Acknowledgments**\n\nThis research is supported by grants from the US\n\nDepartment of Energy, the US National Science Foun-\n\ndation, and the Smithsonian Institution, by NSERC in\n\nCanada, by Science Foundation Ireland, and by STFC\n\nin the UK. We acknowledge the excellent work of the\n\ntechnical support staff at the FLWO and the collab-\n\norating institutions in the construction and operation\n\nof the instrument.\n\n### **References**\n\n[1] F. Aharonian et al. 2007, ApJ , 664 , L71\n\n[2] F. Aharonian et al. 2006, Nature , 440 , 1018\n\n[3] F. Aharonian et al. 2007, A&A , 475 , L9\n\n[4] J. Holder, et al. 2008, AIPC , 1085 , 657\n\n[5] L. Costamante & G. Ghisellini 2002, A&A , 384 ,\n\n56\n\n[6] E.S. Perlman 2000, AIPC , 515 , 53\n\n[7] F.W. Stecker et al. 1996, ApJ , 473 , L75\n\n[8] P. Giommi et al. 2005, A&A , 434 , 385\n\n[9] S. Turriziani et al. 2007, A&A , 472 , 699\n\n[10] L. Costamante 2006, arXiv:0612709\n\n[11] P. Padovani et al. 2002, ApJ , 581 , 895\n\n[12] R. Muhkerjee et al. 2001, AIPC , 558 , 324\n\n[13] A.A. Abdo et al. 2009, ApJ , 700 , 597\n\n[14] V.A. Acciari et al. 2008, ApJ , 684 , L73\n\n[15] V.A. Acciari et al. 2009, ApJ , 707 , 612\n\n[16] V.A. Acciari et al. 2009, ApJ , 690 , L126\n\n[17] V.A. Acciari et al. 2009, ApJ , 693 , L104\n\n[[18] L.C. Reyes 2009, arXiv:0907.5175](http://arxiv.org/abs/0907.5175)\n\n[19] R.A. Ong 2009, ATel , 1941\n\n[20] R.A. Ong et al. 2009, ATel , 2272\n\n[21] V.A. Acciari et al. 2009, ApJ , 708 , L100\n\n[22] R.A. Ong et al. 2009, ATel , 2301\n\n[23] R.A. Ong et al. 2009, ATel , 2260\n\n[24] R.A. Ong et al. 2009, ATel , 2309\n\n[[25] W. Benbow 2009, arXiv:0908.1412](http://arxiv.org/abs/0908.1412)\n\n[26] V.A. Acciari et al. 2009, ApJ , submitted\n\n[27] V.A. Acciari et al. 2009, ApJ , 695 , 1370\n\n[28] V.A. Acciari et al. 2009, ApJ , in press\n\n[[29] J. Grube 2009, arXiv:0907.4862](http://arxiv.org/abs/0907.4862)\n\neConf C091122", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "[arXiv:1001.0770v1 [astro-ph.HE] 5 Jan 2010](http://arxiv.org/abs/1001.0770v1)\n\n## **VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration *Harvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645,* *USA*\n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is\n\nused to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is\n\ncurrently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration’s Key\n\nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class\n\nof identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which\n\nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE\n\nexposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including\n\n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected\n\nresults are presented.\n\n## **1. Introduction**\n\nActive galactic nuclei are the most numerous class\n\nof identified VHE γ -ray sources. These objects emit\n\nnon-thermal radiation across ∼ 20 orders of magnitude\n\nin energy and rank among the most powerful particle\n\naccelerators in the universe. A small fraction of AGN\n\npossess strong collimated outflows (jets) powered by\n\naccretion onto a supermassive black hole (SMBH).\n\nVHE γ -ray emission can be generated in these jets,\n\nlikely in a compact region very near the SMBH event\n\nhorizon. Blazars, a class of AGN with jets pointed\n\nalong the line-of-sight to the observer, are of par-\n\nticular interest in the VHE regime. Approximately\n\n30 blazars, primarily high-frequency-peaked BL Lacs\n\n(HBL), are identified as sources of VHE γ -rays, and\n\nsome are spectacularly variable on time scales com-\n\nparable to the light crossing time of their SMBH ( ∼ 2\n\nmin; [1]). VHE blazar studies probe the environment\n\nvery near the central SMBH and address a wide range\n\nof physical phenomena, including the accretion and\n\njet-formation processes. These studies also have cos-\n\nmological implications, as VHE blazar data can be\n\nused to strongly constrain primordial radiation fields\n\n(see the extragalactic background light (EBL) con-\n\nstraints from, e.g., [2, 3]).\n\nVHE blazars have double-humped spectral energy\n\ndistributions (SEDs), with one peak at UV/X-ray en-\n\nergies and another at GeV/TeV energies. The ori-\n\ngin of the lower-energy peak is commonly explained\n\nas synchrotron emission from the relativistic electrons\n\nin the blazar jets. The origin of the higher-energy\n\npeak is controversial, but is widely believed to be the\n\nresult of inverse-Compton scattering of seed photons\n\noff the same relativistic electrons. The origin of the\n\nseed photons in these leptonic scenarios could be the\n\nsynchrotron photons themselves, or photons from an\n\nexternal source. Hadronic scenarios are also plausible\n\nexplanations for the VHE emission, but generally are\n\nnot favored.\n\nContemporaneous multi-wavelength (MWL) obser-\n\nvations of VHE blazars, can measure both SED peaks\n\nand are crucial for extracting information from the\n\nobservations of VHE blazars. They are used to con-\n\nstrain the size, magnetic field and Doppler factor of\n\nthe emission region, as well as to determine the origin\n\n(leptonic or hadronic) of the VHE γ -rays. In leptonic\n\nscenarios, such MWL observations are used to mea-\n\nsure the spectrum of high-energy electrons producing\n\nthe emission, as well as to elucidate the nature of the\n\nseed photons. Additionally, an accurate measure of\n\nthe cosmological EBL density requires accurate mod-\n\neling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "**Submillimeter Variability and the Gamma-ray Connection in** * **Fermi** *\n\n**Blazars**\n\nA. Strom *Univ. of Arizona, AZ 85721, USA*\n\nA. Siemiginowska, M. Gurwell, B. Kelly *CfA, MA 02138, USA*\n\nWe present multi-epoch observations from the *Submillimeter Array* ( *SMA* ) for a sample of 171 bright blazars,\n\n43 of which were detected by *Fermi* during the first three months of observations. We explore the correlation\n\nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special\n\nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de-\n\ntermined using a combination of *Fermi* designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS),\n\nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate\n\nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands\n\nduring the months August- October 2008. The submillimeter light curves are modeled as first-order continuous\n\nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ-\n\nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity.\n\nAll of the the light curves are consistent with being produced by a single process that accounts for both low\n\nand high states, and there is additional evidence that objects may be transitioning between blazar class during\n\nflaring epochs.\n\n## **1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring\n\nevents occur in blazars indicate that much of the en-\n\nergy is being produced deep within the jet on small,\n\nsub-parsec scales [1, 2]. Understanding if/how emis-\n\nsion differs between blazar subclasses (i.e., BL Lacs\n\nobjects and flat-spectrum radio quasars (FSRQs))\n\nmay offer important insight into the similarity be-\n\ntween blazars and, furthermore, can provide con-\n\nstraints on the formation and acceleration of the jets\n\nthemselves.\n\nFor the synchrotron component of blazar spectra,\n\nthe low-frequency spectral break due to synchrotron\n\nself-absorption moves to higher frequencies as one\n\nmeasures closer to the base of the jet [2]. This of-\n\nten places the peak of the spectrum in the millime-\n\nter and submillimeter bands, where the emission is\n\noptically-thin and originates on parsec and sub-parsec\n\nscales [3], allowing direct observation of the most com-\n\npact regions near the central engine. The high en-\n\nergy *γ* -ray emission originates as a Compton process,\n\ntypically a combination of synchrotron-self-Compton\n\n(SSC) and external-radiation-Compton (ERC). De-\n\npending on the source properties, the synchrotron\n\nphotons or external photons are upscattered by the\n\nsame population of electrons that emit the millimeter\n\nand submillimeter spectra. Therefore the submillime-\n\nter and *γ* -ray emission are closely linked and give the\n\nfull information about the source emission.\n\nA systematic study of the submillimeter properties\n\nof the entire sample of *Fermi* blazars has yet to be con-\n\nducted and is one of the primary goals of our work. We\n\npresent here preliminary analysis of the submillimeter\n\nproperties of *Fermi* blazars detected by the *Submil-*\n\n*limeter Array* <sup>1</sup> ( *SMA* ) at 1mm and 850 *µ* m, including\n\nan investigation of variable behavior and the deter-\n\nmination of submillimeter energy spectral indices. In\n\naddition, we consider the connection to the observed\n\n*γ* -ray indices and luminosities.\n\n## **2.** * **SMA** * **BLAZARS**\n\nThe *Submillimeter Array* [4] consists of eight 6 m\n\nantennas located near the summit of Mauna Kea. The\n\n*SMA* is used in a variety of baseline configurations\n\nand typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "ferent event selection criteria (e.g. soft cuts optimized\n\nfor sources with Γ VHE > 4). The distribution of VHE\n\nflux upper limits is shown in Figure 1. These 49 VHE\n\nflux upper limits are generally the most-constraining\n\never reported for these objects.\n\n## **7. Multi-wavelength Studies of VHE Blazars**\n\nDuring the first three seasons of VERITAS obser-\n\nvations, pre-planned extensive MWL campaigns were\n\norganized for three blazars 1ES 2344+514 (2007-08),\n\n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009-\n\n10 - ongoing). In addition, numerous ToO MWL-\n\nobservation campaigns were performed. These include\n\ncampaigns for every blazar/AGN discovered by VER-\n\nITAS, and all include Swift (XRT and UVOT) data.\n\nAll MWL campaigns on the VHE blazars discovered\n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "gets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included\n\nthe first VHE-detected IBL, W Comae [14, 15], and\n\nthe HBL 1ES 0806+524 [16]. VERITAS has discov-\n\nered 6 VHE blazars since the launch of Fermi. Three\n\nof these were initially observed by VERITAS prior to\n\nthe release of Fermi-LAT results, due to the X-ray\n\nbrightness of the synchrotron peaks of their SEDs.\n\nVHE emission from 3C 66A was discovered by VER-\n\nITAS in September 2008 [17] during a flaring episode\n\nthat was also observed by the Fermi-LAT [18]. The\n\nobserved flux above 200 GeV was 6% of the Crab Neb-\n\nula flux and the measured VHE spectrum was very\n\nsoft (Γ VHE ∼ 4 . 1). RGB J0710+591 was detected\n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "circles represent the 850 *µ* m observations, and the open\n\ntriangles represent the 1mm observations.\n\nJ1751+096) which have conflicting classifications be-\n\ntween *Fermi* and CGRaBS. Some blazars found in the\n\ncalibrator list have been studied extensively (e.g., 3C\n\n279 and 3C 454.3) but the *SMA* blazars have not been\n\nstudied collectively.\n\nForty-four of the objects in our total blazar sample\n\nwere detected by *Fermi* and can be found in the cata-\n\nlog of LAT Bright AGN Sources (LBAS) from Abdo et\n\nal. [7]. J0050-094 has no redshift in either the LBAS\n\ncatalog or CGRaBS and is not included in our study.\n\nOf the 43 remaining sources, 14 are BL Lac objects\n\nand 29 are FSRQs, with 0 *.* 03 *≤* *z* *≤* 2 *.* 19. We examined submillimeter light curves for all of\n\nthe *SMA* blazars, with observations beginning in ap-\n\nproximately 2003 (see Figure 1). Typically, the 1mm\n\nband is much more well-sampled in comparison to the\n\n850m band, but visual inspection reveals that the reg-\n\nularity and quality of observations vary greatly from\n\nsource to source. Many of the objects exhibit non-\n\nperiodic variability, either in the form of persistent,\n\nlow-amplitude fluctuations or higher amplitude flar-\n\ning behavior.\n\n### **2.1. Submillimeter Properties**\n\n**Submillimeter Luminosities.** Since we are pri-\n\nmarily concerned with comparisons to *Fermi* observa-\n\ntions, we note that only 129 of the *SMA* blazars (23 BL\n\nLacs and 106 FSRQs) were observed by the *SMA* in\n\neither band during the three months August-October\n\n2008. For these objects, submillimeter luminosities\n\nare calculated in the standard way:\n\n*ν* *e* *L* *ν* *e* = 4 *πD* <sup>2</sup> L\n\n*ν* obs *F* obs\n\n1 + *z* *,* (1)\n\nwhere *D* L is the luminosity distance, *ν* obs is the fre-\n\nquency of the observed band, and *F* obs is the average\n\nFigure 2: Variability index for our sample (top: 1mm,\n\nbottom: 850 *µ* m), with FSRQs as the hatched\n\ndistribution and BL Lacs as the solid distribution. There\n\nis no signicant difference in the class distributions in\n\neither band; the “tail” to the left is populated by objects\n\nwith errors larger than the intrinsic variability.\n\nflux (in erg cm *<sup>−</sup>* <sup>2</sup> s *<sup>−</sup>* <sup>1</sup> Hz *<sup>−</sup>* <sup>1</sup> ) over the three month pe-\n\nriod. We adopt a lambda cold dark matter cosmology\n\nwith values of *H* 0 = 71 km s *<sup>−</sup>* <sup>1</sup> Mpc *<sup>−</sup>* <sup>1</sup> , Ω M = 0 *.* 27,\n\nand Λ = 0 *.* 73.\n\n**Energy Spectral Indices.** We derive submillime-\n\nter spectral energy indices from observations quasi-\n\nsimultaneous with the *Fermi* observations. To be con-\n\nsistent with the use of *α* *γ* , we define spectral energy in-\n\ndex as *νF* *ν* = *ν* *<sup>−</sup>* *<sup>α</sup>* <sup>S</sup> and calculate *α* S from the average\n\nof the energy spectral indices over the corresponding\n\nthree months. We only calculate *α* S for the 16 objects\n\n(8 BL Lacs and 35 FSRQs) with observations at both\n\n1mm and 850 *µ* m during this time frame.\n\n## **3. VARIABILITY ANALYSIS**\n\n### **3.1. Variability Index**\n\nWe roughly characterize the level of variability of\n\neach source using the variability index from Hovatta\n\net al. [8]:\n\n*V* = <sup>(</sup> *<sup>F</sup>* <sup>max</sup> *<sup>−</sup>* *<sup>σ</sup>* *<sup>F</sup>* <sup>max</sup> <sup>)</sup> *<sup>−</sup>* <sup>(</sup> *<sup>F</sup>* <sup>min</sup> <sup>+</sup> *<sup>σ</sup>* *<sup>F</sup>* <sup>min</sup> <sup>)</sup> ( *F* max *−* *σ* *F* max ) + ( *F* min + *σ* *F* min ) (2)\n\nFigure 2 shows the distribution for the *SMA* blazars.\n\nObjects with *V* *≤* 0 are typically unsuitable for more\n\n**eConf C091122**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 5: Ratio of *γ* -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this\n\nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower\n\nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n\n*-* BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter vari-\n\nability or characteristic timescale, but our sam-\n\nple of BL Lacs may be dominated by high-\n\npeaked BL Lacs (HBLs), which exhibit obser-\n\nvational similarities with FSRQs.\n\n*-* Blazar submillimeter light curves are consistent with being produced by a single process that ac-\n\ncounts for both high and low states, with char-\n\nacteristic timescales 10 *< τ* rest *<* 500 days.\n\n*-* The blazars detected by *Fermi* have synchrotron peaks at higher frequencies, regardless of sub-\n\nmillimeter luminosity.\n\n*-* FSRQs exhibit higher ratios of *γ* -ray to sub- millimeter luminosity than BL Lacs (Figure 5),\n\nbut all objects inhabit a region of parameter\n\nspace suggesting transitions between states dur-\n\ning flaring epochs.\n\nAs *Fermi* continues to observe fainter sources, the\n\nsample of objects for which we can perform this type of\n\nanalysis will increase and provide better limits on our\n\nresults. To understand the physical relevance of these\n\nresults, however, it is important to be able to distin-\n\nguish between the difference in variability between BL\n\nLacs and FSRQs. One avenue for exploring this dif-\n\nference is to monitor changing submillimeter energy\n\nspectral index and the ratio of *γ* -ray to submillime-\n\nter luminosity as functions of time. The full mean-\n\ning of the results of our autoregressive method is not\n\nyet clear, and will require better-sampled blazar light\n\ncurves and the comparison between *τ* rest with physical\n\ntimescales such as the synchrotron cooling timescale.\n\nThese analyses would allow us to place constraints\n\non the processes occurring near the base of the jet in\n\nblazars and further understand the intimate connec-\n\ntion between them.\n\n## **Acknowledgments**\n\nThis work was supported in part by the NSF\n\nREU and DoD ASSURE programs under Grant no.\n\n0754568 and by the Smithsonian Institution. Par-\n\ntial support was also provided by NASA contract\n\nNAS8-39073 and NASA grant NNX07AQ55G. We\n\nhave made use of the SIMBAD database, operated at\n\nCDS, Strasbourg, France, and the NASA/IPAC Ex-\n\ntragalactic Database (NED) which is operated by the\n\nJPL, Caltech, under contract with NASA.\n\n**eConf C091122**", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 4: The *γ* -ray index versus submillimeter index plane. The blazars fall more steeply in the *γ* -rays than in the\n\nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full *SMA* sample,\n\nwhere the blazars are more distributed around *α* S *∼* 0.\n\nas the presence of SSC versus ERC. Here, we use sub-\n\nmillimeter luminosity as a proxy for jet power, which\n\nis correlated with the integrated luminosity of the syn-\n\nchrotron component. Elevated *γ* -ray luminosity with\n\nrespect to the synchrotron component (which is often\n\nseen in FSRQs) suggests the upscattering of external\n\nphotons off the synchrotron-emitting electrons. These\n\nobjects should occupy the upper right of the ratio/jet\n\npower plot, and BL Lacs, which generally exhibit com-\n\nponents with roughly comparable luminosities, should\n\noccupy the lower left. It is clear from the figure, how-\n\never, that many FSRQs exhibit ratios similar to those\n\nof the BL Lacs and vis versa.\n\nSikora et al. [10] report that, during its flaring\n\nepochs, 3C 454.3 transitions from its typical FSRQ\n\nstate to a more BL Lac-like state, where the syn-\n\nchrotron component emits much more strongly com-\n\npared to the *γ* -ray component than during its “low\n\nstate”. 3C 454.3, which is the highest submillime-\n\nter luminosity FSRQ in our sample, would then shift\n\ndown and to the right in Figure 5 when it enters a\n\nflaring period. For the first three months of the *Fermi*\n\nmission, 3C 454.3 was not flaring, which may explain\n\nits present location in Figure 5. The three objects for\n\nwhich there is a type discrepancy between CGRaBS\n\nand LBAS are all FSRQs (in CGRaBS) and exhibit\n\nlow luminosity ratios and high luminosity, which sug-\n\ngest they may be undergoing the same changes as 3C\n\n454.3. A possible interpretation of the elevated lumi-\n\nnosity ratios observed in some BL Lacs objects is that\n\nthere has been a dramatic increase in *γ* -ray luminos-\n\nity due to ERC, which would not be reflected in the\n\nsynchrotron component.\n\n## **5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub-\n\nmillimeter is to study behavior close to the central\n\nengine, where the jet material is presumably still be-\n\ning accelerated. The separate emission processes that\n\ncontribute to overall SED may present differently in\n\nBL Lacs and FSRQs, allowing us to understand the\n\nsimilarities and differences between blazar types. We\n\nhave investigated these differences between objects in\n\nterms of submillimeter behavior and, in conclusion,\n\nfind that\n\n*-* The *SMA* blazars exhibit submillimeter energy spectral indexes that follow the spectral se-\n\nquence interpretation of blazars.\n\n**eConf C091122**", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0770.pdf", - "query": "How many VHE blazar candidates were observed by VERITAS between September 2007 andJune 2009 ?", - "target_page": 3, - "target_passage": "More than 50 VHE blazar candidates were observed by VERITAS betweenSeptember 2007 andJune 2009.", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "[arXiv:1001.0770v1 [astro-ph.HE] 5 Jan 2010](http://arxiv.org/abs/1001.0770v1)\n\n## **VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration *Harvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645,* *USA*\n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is\n\nused to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is\n\ncurrently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration’s Key\n\nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class\n\nof identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which\n\nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE\n\nexposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including\n\n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected\n\nresults are presented.\n\n## **1. Introduction**\n\nActive galactic nuclei are the most numerous class\n\nof identified VHE γ -ray sources. These objects emit\n\nnon-thermal radiation across ∼ 20 orders of magnitude\n\nin energy and rank among the most powerful particle\n\naccelerators in the universe. A small fraction of AGN\n\npossess strong collimated outflows (jets) powered by\n\naccretion onto a supermassive black hole (SMBH).\n\nVHE γ -ray emission can be generated in these jets,\n\nlikely in a compact region very near the SMBH event\n\nhorizon. Blazars, a class of AGN with jets pointed\n\nalong the line-of-sight to the observer, are of par-\n\nticular interest in the VHE regime. Approximately\n\n30 blazars, primarily high-frequency-peaked BL Lacs\n\n(HBL), are identified as sources of VHE γ -rays, and\n\nsome are spectacularly variable on time scales com-\n\nparable to the light crossing time of their SMBH ( ∼ 2\n\nmin; [1]). VHE blazar studies probe the environment\n\nvery near the central SMBH and address a wide range\n\nof physical phenomena, including the accretion and\n\njet-formation processes. These studies also have cos-\n\nmological implications, as VHE blazar data can be\n\nused to strongly constrain primordial radiation fields\n\n(see the extragalactic background light (EBL) con-\n\nstraints from, e.g., [2, 3]).\n\nVHE blazars have double-humped spectral energy\n\ndistributions (SEDs), with one peak at UV/X-ray en-\n\nergies and another at GeV/TeV energies. The ori-\n\ngin of the lower-energy peak is commonly explained\n\nas synchrotron emission from the relativistic electrons\n\nin the blazar jets. The origin of the higher-energy\n\npeak is controversial, but is widely believed to be the\n\nresult of inverse-Compton scattering of seed photons\n\noff the same relativistic electrons. The origin of the\n\nseed photons in these leptonic scenarios could be the\n\nsynchrotron photons themselves, or photons from an\n\nexternal source. Hadronic scenarios are also plausible\n\nexplanations for the VHE emission, but generally are\n\nnot favored.\n\nContemporaneous multi-wavelength (MWL) obser-\n\nvations of VHE blazars, can measure both SED peaks\n\nand are crucial for extracting information from the\n\nobservations of VHE blazars. They are used to con-\n\nstrain the size, magnetic field and Doppler factor of\n\nthe emission region, as well as to determine the origin\n\n(leptonic or hadronic) of the VHE γ -rays. In leptonic\n\nscenarios, such MWL observations are used to mea-\n\nsure the spectrum of high-energy electrons producing\n\nthe emission, as well as to elucidate the nature of the\n\nseed photons. Additionally, an accurate measure of\n\nthe cosmological EBL density requires accurate mod-\n\neling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "gets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included\n\nthe first VHE-detected IBL, W Comae [14, 15], and\n\nthe HBL 1ES 0806+524 [16]. VERITAS has discov-\n\nered 6 VHE blazars since the launch of Fermi. Three\n\nof these were initially observed by VERITAS prior to\n\nthe release of Fermi-LAT results, due to the X-ray\n\nbrightness of the synchrotron peaks of their SEDs.\n\nVHE emission from 3C 66A was discovered by VER-\n\nITAS in September 2008 [17] during a flaring episode\n\nthat was also observed by the Fermi-LAT [18]. The\n\nobserved flux above 200 GeV was 6% of the Crab Neb-\n\nula flux and the measured VHE spectrum was very\n\nsoft (Γ VHE ∼ 4 . 1). RGB J0710+591 was detected\n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "ferent event selection criteria (e.g. soft cuts optimized\n\nfor sources with Γ VHE > 4). The distribution of VHE\n\nflux upper limits is shown in Figure 1. These 49 VHE\n\nflux upper limits are generally the most-constraining\n\never reported for these objects.\n\n## **7. Multi-wavelength Studies of VHE Blazars**\n\nDuring the first three seasons of VERITAS obser-\n\nvations, pre-planned extensive MWL campaigns were\n\norganized for three blazars 1ES 2344+514 (2007-08),\n\n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009-\n\n10 - ongoing). In addition, numerous ToO MWL-\n\nobservation campaigns were performed. These include\n\ncampaigns for every blazar/AGN discovered by VER-\n\nITAS, and all include Swift (XRT and UVOT) data.\n\nAll MWL campaigns on the VHE blazars discovered\n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "future of the VERITAS blazar discovery program is\n\nclearly very bright.\n\nThe MWL aspect of the VERITAS blazar KSP has\n\nalso been highly successful. Every VERITAS obser-\n\nvation of a known, or newly discovered, VHE blazar\n\nhas been accompanied by contemporaneous MWL ob-\n\nservations. These data have resulted in the identifica-\n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "## **3. VERITAS Blazar KSP**\n\nVERITAS observes for ∼ 750 h and ∼ 250 h each\n\nyear during periods of astronomical darkness and par-\n\ntial moonlight, respectively. The moonlight observa-\n\ntions are almost exclusively used for a blazar discovery\n\nprogram, and a large fraction of the dark time is used\n\nfor the blazar KSP, which consists of:\n\n- A VHE blazar discovery program ( ∼ 200 h / yr):\n\nEach year ∼ 10 targets are selected to receive\n\n∼ 10 h of observations each during astronomi-\n\ncal darkness. These data are supplemented by\n\ndiscovery observations during periods of partial\n\nmoonlight.\n\n- A target-of-opportunity (ToO) observation pro-\n\ngram ( ∼ 50 h / yr): VERITAS blazar obser-\n\nvations can be triggered by either a VERI-\n\nTAS blazar discovery, a VHE flaring alert ( > 2\n\nCrab) from the blazar monitoring program of\n\nthe Whipple 10-m telescope or from another\n\nVHE instrument, or a lower-energy flaring alert\n\n(optical, X-ray or Fermi-LAT). Should the guar-\n\nanteed allocation be exhausted, further time can\n\nbe requested from a pool of director’s discre-\n\ntionary time.\n\n- Multi-wavelength (MWL) studies of VHE\n\nblazars ( ∼ 50 h / yr + ToO): Each year one\n\nblazar receives a deep exposure in a pre-planned\n\ncampaign of extensive, simultaneous MWL (X-\n\nray, optical, radio) measurements. ToO observa-\n\ntion proposals for MWL measurements are also\n\nsubmitted to lower-energy observatories (e.g.\n\nSwift) and are triggered by a VERITAS discov-\n\nery or flaring alert.\n\n- Distant VHE blazar studies to constrain the ex-\n\ntragalactic background light (EBL): Here dis-\n\ntant targets are given a higher priority in the\n\nblazar discovery program, as well as for the\n\nMWL observations of known VHE blazars, par-\n\nticularly those with hard VHE spectra.\n\n## **4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are\n\nlargely high-frequency-peaked BL Lac objects. How-\n\never, the program also includes IBLs (intermediate-\n\npeaked) and LBLs (low-peaked), as well as flat spec-\n\ntrum radio quasars (FSRQs), in an attempt to in-\n\ncrease the types of blazars known to emit VHE γ -rays.\n\nThe observed targets are drawn from a target list con-\n\ntaining objects visible to the telescopes at reasonable\n\nzenith angles ( − 8 <sup>◦</sup> < δ < 72 <sup>◦</sup> ), without a previously\n\npublished VHE limit below 1.5% Crab, and with a\n\nmeasured redshift z < 0 . 3. To further the study of the\n\nEBL a few objects having a large ( z > 0 . 3) are also\n\nincluded in the target list. The target list includes:\n\n- All nearby ( z < 0 . 3) HBL and IBL recom-\n\nmended as potential VHE emitters in [5, 6, 7].\n\n- The X-ray brightest HBL ( z < 0 . 3) in the recent\n\nSedentary [8] and ROXA [9] surveys.\n\n- Four distant ( z > 0 . 3) BL Lac objects recom-\n\nmended by [5, 10].\n\n- Several FSRQ recommended as potential VHE\n\nemitters in [6, 11].\n\n- All nearby ( z < 0 . 3) blazars detected by\n\nEGRET [12].\n\n- All nearby ( z < 0 . 3) blazars contained in the\n\nFermi-LAT Bright AGN Sample [13].\n\n- All sources ( | b | > 10 <sup>◦</sup> ) detected by Fermi-LAT\n\nwhere extrapolations of their MeV-GeV γ -ray\n\nspectrum (including EBL absorption; assuming\n\nz = 0.3 if the redshift is unknown) indicates a\n\npossible VERITAS detection in less than 20 h.\n\nThis criteria is the focus of the 2009-10 VERI-\n\nTAS blazar discovery program.\n\n## **5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ -ray emission from\n\n16 AGN (15 blazars), including 8 VHE discoveries.\n\nThese AGN are shown in Table I, and each has been\n\ndetected by the Large Area Telescope (LAT) instru-\n\nment aboard the Fermi Gamma-ray Space Telescope.\n\nEvery blazar discovered by VERITAS was the sub-\n\nject of ToO MWL observations to enable modeling of\n\nits simultaneously-measured SED. The known VHE\n\nblazars detected by VERITAS were similarly the tar-\n\ngets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as\n\nwell as correlated spectral hardening in both the VHE\n\nand X-ray bands. The VHE MWL observations were\n\nperformed in both ”quiescent” and flaring states for\n\nsome of the observed blazars. For the observed HBL\n\nobjects, the SEDs can be well described by a simple\n\nSSC model in both high and low states. However, an\n\nadditional external Compton component is necessary\n\nto adequately fit the SEDs of the IBL objects.\n\nThe Fermi-LAT is already having a significant im-\n\npact on the blazar KSP. In future seasons, the VER-\n\nITAS blazar discovery program will focus its dis-\n\ncovery program on hard-spectrum blazars detected\n\nby Fermi-LAT, and will likely have a greater focus\n\non high-risk/high-reward objects at larger redshifts\n\n(0 . 3 < z < 0 . 7). In addition, the number of VHE\n\nblazars studied in pre-planned MWL campaigns will\n\nincrease as data from the Fermi-LAT will be publicly\n\navailable. In particular, the extensive pre-planned\n\nMWL campaigns will focus on objects that are note-\n\nworthy for the impact their data may have on under-\n\nstanding the EBL. The simultaneous observations of\n\nblazars by VERITAS and Fermi-LAT will completely\n\nresolve the higher-energy SED peak, often for the first\n\ntime, enabling unprecedented constraints on the un-\n\nderlying blazar phenomena to be derived.\n\n### **Acknowledgments**\n\nThis research is supported by grants from the US\n\nDepartment of Energy, the US National Science Foun-\n\ndation, and the Smithsonian Institution, by NSERC in\n\nCanada, by Science Foundation Ireland, and by STFC\n\nin the UK. We acknowledge the excellent work of the\n\ntechnical support staff at the FLWO and the collab-\n\norating institutions in the construction and operation\n\nof the instrument.\n\n### **References**\n\n[1] F. Aharonian et al. 2007, ApJ , 664 , L71\n\n[2] F. Aharonian et al. 2006, Nature , 440 , 1018\n\n[3] F. Aharonian et al. 2007, A&A , 475 , L9\n\n[4] J. Holder, et al. 2008, AIPC , 1085 , 657\n\n[5] L. Costamante & G. Ghisellini 2002, A&A , 384 ,\n\n56\n\n[6] E.S. Perlman 2000, AIPC , 515 , 53\n\n[7] F.W. Stecker et al. 1996, ApJ , 473 , L75\n\n[8] P. Giommi et al. 2005, A&A , 434 , 385\n\n[9] S. Turriziani et al. 2007, A&A , 472 , 699\n\n[10] L. Costamante 2006, arXiv:0612709\n\n[11] P. Padovani et al. 2002, ApJ , 581 , 895\n\n[12] R. Muhkerjee et al. 2001, AIPC , 558 , 324\n\n[13] A.A. Abdo et al. 2009, ApJ , 700 , 597\n\n[14] V.A. Acciari et al. 2008, ApJ , 684 , L73\n\n[15] V.A. Acciari et al. 2009, ApJ , 707 , 612\n\n[16] V.A. Acciari et al. 2009, ApJ , 690 , L126\n\n[17] V.A. Acciari et al. 2009, ApJ , 693 , L104\n\n[[18] L.C. Reyes 2009, arXiv:0907.5175](http://arxiv.org/abs/0907.5175)\n\n[19] R.A. Ong 2009, ATel , 1941\n\n[20] R.A. Ong et al. 2009, ATel , 2272\n\n[21] V.A. Acciari et al. 2009, ApJ , 708 , L100\n\n[22] R.A. Ong et al. 2009, ATel , 2301\n\n[23] R.A. Ong et al. 2009, ATel , 2260\n\n[24] R.A. Ong et al. 2009, ATel , 2309\n\n[[25] W. Benbow 2009, arXiv:0908.1412](http://arxiv.org/abs/0908.1412)\n\n[26] V.A. Acciari et al. 2009, ApJ , submitted\n\n[27] V.A. Acciari et al. 2009, ApJ , 695 , 1370\n\n[28] V.A. Acciari et al. 2009, ApJ , in press\n\n[[29] J. Grube 2009, arXiv:0907.4862](http://arxiv.org/abs/0907.4862)\n\neConf C091122", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "eling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m\n\natmospheric-Cherenkov telescopes located in Arizona,\n\nis used to study VHE γ -rays from a variety of astro-\n\nphysical sources [4]. VERITAS began scientific obser-\n\nvations with a partial array in September 2006 and has\n\nroutinely observed with the full array since Septem-\n\nber 2007. The performance metrics of VERITAS in-\n\nclude an energy threshold of ∼ 100 GeV, an energy\n\nresolution of ∼ 15%, an angular resolution of ∼ 0.1 <sup>◦</sup> ,\n\nand a sensitivity yielding a 5 σ detection of a 1% Crab Nebula flux object in < 30 hours <sup>1</sup> . VERITAS has an\n\nactive maintenance program (e.g. frequent mirror re-\n\ncoating and alignment) to ensure its continued high\n\nperformance over time, and an upgrade improving\n\nboth the camera (higher quantum-efficiency PMTs)\n\nand the trigger system has been proposed to the fund-\n\ning agencies.\n\n1 A VERITAS telescope was relocated during Summer 2009,\n\nincreasing the array’s sensitivity by a factor ∼ 1.3.\n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "Table I VERITAS AGN Detections. The only non-blazar\n\nobject is the radio galaxy M 87. The blazars discovered\n\nat VHE by VERITAS are marked with a dagger.\n\nObject Class Redshift\n\nM 87 FR I 0.004\n\nMkn 421 HBL 0.030\n\nMkn 501 HBL 0.034\n\n1ES 2344+514 HBL 0.044\n\n1ES 1959+650 HBL 0.047\n\nW Comae <sup>†</sup> IBL 0.102\n\nRGB J0710+591 <sup>†</sup> HBL 0.125\n\nH 1426+428 HBL 0.129\n\n1ES 0806+524 <sup>†</sup> HBL 0.138\n\n1ES 0229+200 HBL 0.139\n\n1ES 1218+304 HBL 0.182\n\nRBS 0413 <sup>†</sup> HBL 0.190\n\n1ES 0502+675 <sup>†</sup> HBL 0.341\n\n3C 66A <sup>†</sup> IBL 0.444?\n\nPKS 1424+240 <sup>†</sup> IBL ?\n\nVER J0521+211 <sup>†</sup> ? ?\n\n( ∼ 5.5 σ ; 3% Crab flux above 300 GeV; Γ VHE ∼ 2 . 7)\n\nduring VERITAS observations from December 2008\n\nto March 2009. The initial announcement of the VHE\n\ndiscovery [19] led to its discovery above 1 GeV in the\n\nFermi-LAT data using a special analysis. RBS 0413,\n\na relatively distant HBL (z=0.19), was observed for 16 h good-quality live time in 2008-09 <sup>2</sup> . These data\n\nresulted in the discovery of VHE gamma-rays ( > 270 γ ,\n\n∼ 6 σ ) at a flux ( > 200 GeV) of ∼ 2% of the Crab Neb-\n\nula flux. The discovery [20] was announced simultane-\n\nously with the LAT MeV-GeV detection. The VHE\n\nand other MWL observations, including Fermi-LAT\n\ndata, for each of these three sources will be the sub-\n\nject of a joint publication involving both the VERI-\n\nTAS and LAT collaborations.\n\n### **5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by\n\nVERITAS of three blazars was motivated primarily\n\nby results from the first year of LAT data taking. In\n\nparticular, the VHE detections of PKS 1424+240 [21]\n\nand 1ES 0502+675 [22] were the result of VERITAS\n\nobservations triggered by the inclusion of these objects\n\nin the Fermi-LAT Bright AGN List [13]. The former\n\nis only the third IBL known to emit VHE gamma-\n\nrays, and the latter is the most distant BL Lac object\n\n2 RBS 0413 was observed further by VERITAS in Fall 2009.\n\n( z = 0 . 341) detected in the VHE band. In addition,\n\nVER J0521+211, likely associated with the radio-loud\n\nAGN RGB J0521.8+2112, was detected by VERTAS\n\nin ∼ 4 h of observations in October 2009 [23]. These\n\nobservations were motivated by its identification as a\n\n> 30 GeV γ -ray source in the public Fermi-LAT data.\n\nIts VHE flux is 5% of the Crab Nebula flux, placing it\n\namong the brightest VHE blazars detected in recent\n\nyears. VERITAS later observed even brighter VHE\n\nflaring from VER J0521+211 in November 2009 [24],\n\nleading to deeper VHE observations.\n\n## **6. Blazars Upper Limits**\n\nMore than 50 VHE blazar candidates were observed\n\nby VERITAS between September 2007 and June 2009.\n\nThe total exposure on the 49 non-detected candi-\n\ndates is ∼ 305 h live time (average of 6.2 h per can-\n\ndidate). Approximately 55% of the total exposure is\n\nsplit amongst the 27 observed HBL. The remainder is\n\ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9\n\nFSRQ (13%). There are no clear indications of signifi-\n\ncant VHE γ -ray emission from any of these 49 blazars\n\n[25]. However, the observed significance distribution is\n\nclearly skewed towards positive values (see Figure 1).\n\nA stacking analysis performed on the entire data sam-\n\nple shows an overall excess of 430 γ -rays, correspond-\n\ning to a statistical significance of 4.8 σ , observed from\n\nthe directions of the candidate blazars. The IBL and\n\nHBL targets make up 96% of the observed excess. Ob-\n\nservations of these objects also comprise ∼ 80% of the\n\ntotal exposure. An identical stacked analysis of all\n\nthe extragalactic non-blazar targets observed, but not\n\nclearly detected ( > 5 σ ), by VERITAS does not show\n\na significant excess ( ∼ 120 h exposure). The stacked\n\nexcess persists using alternate methods for estimating\n\nthe background at each blazar location, and with dif-\n\nferent event selection criteria (e.g. soft cuts optimized\n\nfor sources with Γ VHE > 4). The distribution of VHE\n\nflux upper limits is shown in Figure 1. These 49 VHE", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "σ **−5 −4 −3 −2 −1 0 1 2 3 4 5**\n\n**Entries**\n\n**0**\n\n**2**\n\n**4**\n\n**6**\n\n**8**\n\n**10**\n\n**12**\n\n**Crab Flux % 0 2 4 6 8 10 12 14**\n\n**Entries**\n\n**0**\n\n**2**\n\n**4**\n\n**6**\n\n**8**\n\n**10**\n\n**12**\n\n**14**\n\n**16**\n\n**18**\n\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard\n\nanalysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the\n\nnumber of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The\n\ndistribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation\n\nthreshold. The time-weighted average limit is less than ∼ 2% Crab flux.\n\nsince the launch of Fermi include LAT detections. In\n\naddition, several MWL campaigns on the well-studied\n\nVHE blazars Mkn 421 and Mkn 501 (please see the\n\ncontributions of D. Gall and A. Konopelko in these\n\nproceedings) were also performed. Highlights of these\n\ncampaigns include:\n\n- 1ES 2344+514: A major (50% Crab) VHE flare,\n\nalong with correlations of the VHE and X-ray\n\nflux were observed from this HBL. The VHE\n\nand X-ray spectra harden during bright states,\n\nand a synchrotron self-Compton (SSC) model\n\ncan explain the observed SED in both the high\n\nand low states [26].\n\n- 1ES 1218+304: This HBL flared during VER-\n\nITAS MWL observations. Its unusually hard\n\nVHE spectrum strongly constrains the EBL.\n\nThe observed flaring rules out kpc-scale jet emis-\n\nsion as the explanation of the spectral hardness\n\nand places the EBL constraints on more solid-\n\nfooting [27, 28].\n\n- 1ES 0806+524: The observed SED of this new\n\nVHE HBL can be explained by an SSC model\n\n[16].\n\n- W Comae: This IBL, the first discovered at\n\nVHE, flared twice in 2008 [14, 15]. Modeling of\n\nthe SED is improved by including an external-\n\nCompton (EC) component in an SSC interpre-\n\ntation.\n\n- 3C 66A: This IBL flared at VHE and MeV-GeV\n\nenergies in 2008[17, 18]. Similar to W Comae\n\nand PKS 1424+240, modeling of observed SED\n\nsuggests a strong EC component in addition to\n\nan SSC component.\n\n- Mkn 421: This HBL exhibited major flaring be-\n\nhavior for several months in 2008. Correlations\n\nof the VHE and X-ray flux were observed, along\n\nwith spectral hardening with increased flux in\n\nboth bands [29].\n\n- RGB J0710+591: Modeling the SED of this\n\nHBL with an SSC model yields a good fit to\n\nthe data. The inclusion of an external Compton\n\ncomponent does not improve the fit.\n\n- PKS 1424+240: The broadband SED of this IBL\n\n(at unknown redshift) is well described by an\n\nSSC model favoring a redshift of less than 0.1\n\n[21]. Using the photon index measured with\n\nFermi-LAT in combination with recent EBL ab-\n\nsorption models, the VERITAS data indicate\n\nthat the redshift of PKS 1424+240 is less than\n\n0.66.\n\n## **8. Conclusions**\n\nThe first two years of the VERITAS blazar KSP\n\nwere highly successful. Highlights include the detec-\n\ntion of more than a 16 VHE blazars with the obser-\n\nvations almost always having contemporaneous MWL\n\ndata. Among these detections are 8 VHE blazar dis-\n\ncoveries, including the first three IBLs known to emit\n\nVHE γ -rays. All but a handful of the blazars on the\n\ninitial VERITAS discovery target list were observed,\n\nand the flux limits generated for those not VHE de-\n\ntected are generally the most-constraining ever. The\n\nexcess seen in the stacked blazar analysis suggests\n\nthat the initial direction of the VERITAS discovery\n\nprogram was well justified, and that follow-up obser-\n\nvations of many of these initial targets will result in\n\nVHE discoveries. In addition, the Fermi-LAT is iden-\n\ntifying many new compelling targets for the VERITAS\n\nblazar discovery program. These new candidates have\n\nalready resulted in 3 VHE blazar discoveries. The\n\nfuture of the VERITAS blazar discovery program is\n\nclearly very bright.\n\nThe MWL aspect of the VERITAS blazar KSP has\n\nalso been highly successful. Every VERITAS obser-", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "**Submillimeter Variability and the Gamma-ray Connection in** * **Fermi** *\n\n**Blazars**\n\nA. Strom *Univ. of Arizona, AZ 85721, USA*\n\nA. Siemiginowska, M. Gurwell, B. Kelly *CfA, MA 02138, USA*\n\nWe present multi-epoch observations from the *Submillimeter Array* ( *SMA* ) for a sample of 171 bright blazars,\n\n43 of which were detected by *Fermi* during the first three months of observations. We explore the correlation\n\nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special\n\nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de-\n\ntermined using a combination of *Fermi* designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS),\n\nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate\n\nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands\n\nduring the months August- October 2008. The submillimeter light curves are modeled as first-order continuous\n\nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ-\n\nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity.\n\nAll of the the light curves are consistent with being produced by a single process that accounts for both low\n\nand high states, and there is additional evidence that objects may be transitioning between blazar class during\n\nflaring epochs.\n\n## **1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring\n\nevents occur in blazars indicate that much of the en-\n\nergy is being produced deep within the jet on small,\n\nsub-parsec scales [1, 2]. Understanding if/how emis-\n\nsion differs between blazar subclasses (i.e., BL Lacs\n\nobjects and flat-spectrum radio quasars (FSRQs))\n\nmay offer important insight into the similarity be-\n\ntween blazars and, furthermore, can provide con-\n\nstraints on the formation and acceleration of the jets\n\nthemselves.\n\nFor the synchrotron component of blazar spectra,\n\nthe low-frequency spectral break due to synchrotron\n\nself-absorption moves to higher frequencies as one\n\nmeasures closer to the base of the jet [2]. This of-\n\nten places the peak of the spectrum in the millime-\n\nter and submillimeter bands, where the emission is\n\noptically-thin and originates on parsec and sub-parsec\n\nscales [3], allowing direct observation of the most com-\n\npact regions near the central engine. The high en-\n\nergy *γ* -ray emission originates as a Compton process,\n\ntypically a combination of synchrotron-self-Compton\n\n(SSC) and external-radiation-Compton (ERC). De-\n\npending on the source properties, the synchrotron\n\nphotons or external photons are upscattered by the\n\nsame population of electrons that emit the millimeter\n\nand submillimeter spectra. Therefore the submillime-\n\nter and *γ* -ray emission are closely linked and give the\n\nfull information about the source emission.\n\nA systematic study of the submillimeter properties\n\nof the entire sample of *Fermi* blazars has yet to be con-\n\nducted and is one of the primary goals of our work. We\n\npresent here preliminary analysis of the submillimeter\n\nproperties of *Fermi* blazars detected by the *Submil-*\n\n*limeter Array* <sup>1</sup> ( *SMA* ) at 1mm and 850 *µ* m, including\n\nan investigation of variable behavior and the deter-\n\nmination of submillimeter energy spectral indices. In\n\naddition, we consider the connection to the observed\n\n*γ* -ray indices and luminosities.\n\n## **2.** * **SMA** * **BLAZARS**\n\nThe *Submillimeter Array* [4] consists of eight 6 m\n\nantennas located near the summit of Mauna Kea. The\n\n*SMA* is used in a variety of baseline configurations\n\nand typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed7_cc4.pdf", - "query": "For which language have been introduced the ActiveInference.jl library ?", - "target_page": 1, - "target_passage": " We introduce a new software package for the Julia programming language, the library ActiveInference.jl.", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Θ is then described by a Dirichlet distribution parametrised by a set of concentration\n\nparameters *θ* :\n\n*p* ( Θ ) = *Dir* ( Θ *|* *θ* ) (19)\n\nThe concentration parameter of a Dirichlet distribution is essentially a non-negative count\n\nof how many times the given category (be it a type of observation or state transition) has\n\noccurred. The distribution of concentration parameter counts will determine the shape\n\nof the estimated categorical probability distribution, while the scale of the concentration\n\nparameters will determine the certainty per precision of the belief. Updating beliefs about\n\nΘ (the parameters in the matrices) then corresponds to updating these concentration\n\nparameters *θ* with the following update equation:\n\n*θ* *t* + 1 = *ω* *∗* *θ* *t* + *η* *∗* *χ* *t* (20)\n\nThe updated value for the concentration parameter ( *θ* *t* + 1 ) is found by adding the previous\n\nconcentration parameter *θ* *t* multiplied by a forgetting rate *ω* to the observed data count\n\n*χ* (either the observation in the case of **A** learning, or the inferred state or state transition\n\nfor other matrices) multiplied by a learning rate *η* . With this relatively simple update\n\nequation—which, in essence, amounts to just counting the occurrences of categories—an\n\nAIF agent can update its beliefs about the various matrices it uses to make inferences about\n\nenvironmental states. For more details on parameter learning with POMDPs, see [ 23 , 33 , 52 ].\n\n## **3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to\n\noperate ActiveInference . This includes functionalities for creating POMDP agents, for sim-\n\nulating behaviour and for fitting the models to data. In the next section, we demonstrate\n\nhow to use the package on a concrete worked example. ActiveInference is under continual\n\ndevelopment, and the newest version of the package, including documentation for how to\n\nuse it, can be found at [ github.com/ilabcode/ActiveInference.jl](https://github.com/ilabcode/ActiveInference.jl) .\n\n### *3.1. Creating and Using a POMDP*\n\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [ 23 ],\n\na Python library for implementing simulations of AIF in discrete state spaces. Those\n\nalready acquainted with pymdp should find the syntax here familiar. ActiveInference\n\ncan be installed as normal from the official Julia General Registry using the Julia’s native\n\npackage manager Pkg: � � **using** Pkg\n\nPkg.add(ActiveInference) � � It can then be loaded into the current project environment: � � **using** ActiveInference � � Central to the package is the AIF object. This is a structure containing all the components of\n\nthe generative model, as well as the dynamic belief states and the various settings needed to\n\nperform AIF, and is used in conjunction with most of the high-level functions of the package.\n\nAn AIF object can be created with the init_aif function, which takes as arguments the\n\ncomponents of the generative model and a dictionary of various settings and parameters:", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "parameter recovery and predictive checks. In this section, we outline how to use\n\nActiveInference for simulation and model fitting in conjunction with ActionModels . In the\n\nfollowing section, we show how to achieve this on a concrete worked example.\n\n## **4. Usage Example**\n\nIn this section, we demonstrate a full usage example of how to create an AIF agent, sim-\n\nulate behaviour in a classic T-maze environment and fit the AIF agent to a simulated exam-\n\nple dataset. We provide the necessary code to run this simulation. All code required to repro-\n\nduce the example simulation can be found in an open source OSF repository [ osf.io/j3k5q/](https://osf.io/j3k5q/) .\n\nThis example was performed with the current version of ActiveInference.jl (0.1.1); the\n\nnewest version can be found at [ github.com/ilabcode/ActiveInference.jl](https://github.com/ilabcode/ActiveInference.jl) .\n\n### *4.1. Setting Up Environment and Agent*\n\nA T-maze is a simple task commonly employed in the behavioural sciences, as well\n\nas in the AIF literature [ 14 , 54 - 57 ]. It is a minimal type of task that requires balancing\n\nexploration and exploitation, or epistemic and pragmatic value, respectively. It is also\n\nsuitably represents in a discrete state space. Together, this makes it easily compatible with\n\na POMDP-based AIF approach.\n\nThe structure of the T-maze is, as the name suggests, a T-shaped maze, consisting\n\nof a centre location, a cue location (bottom of the T), and reward and loss locations (one\n\nin each arm of the T) (Figure 2 ). On every trial, the agent can move to one of the two\n\narms of the T to receive a reward; one, called the reward location, will yield rewards with\n\na higher probability than the other side. At the cue location, which the agent can move\n\nto, the agent receives a cue that indicates which of the locations is the reward location.\n\nGenerally, the cue may be more or less informative; in this example, it always accurately\n\nreflected the reward conditions state (reward in the right or left arm). The reward location\n\nonly provides a reward probabilistically. This means the agent can either take a chance\n\nand go directly to one of the two upper arms, or spend its first move seeking information\n\nabout where the reward is before moving to the reward location. Since the clue location\n\nis not preferred, the second option comes with a cost in terms of pragmatic value, which\n\nhas to be outweighed by the epistemic value in resolving uncertainty about the reward\n\nlocation state. Note that for the agent to realise that this uncertainty reduction will aid it in\n\nits subsequent choice of arm, it would have to be able to anticipate the effect of its actions\n\non its own future beliefs, a process called “sophisticated inference” [ 58 ].\n\n**Figure 2.** A depiction of the T-maze. ( **A** ) The full layout of the T-maze task, with the centre location,\n\nthe cue location and the two reward conditions. ( **B** ) A three-step example of a T-maze trial. The agent\n\n(in this case, a mouse) starts at the centre location. In order to reduce the uncertainty regarding which\n\narm the reward is located in, the agent moves to the cue location. The cue location reveals the right\n\narm to be the reward location, and in the subsequent time step, it goes to the right arm and observes\n\nthe reward with some probability.", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "3 of 33\n\nJulia uses its “just-in-time” (JIT) compilations via the LLVM framework to approach the\n\nspeed of languages like C without relying on external compilers [ 36 ]. Julia is also natively\n\nauto-differentiable, which means it can solve what is called the two-language problem\n\n(i.e., that high-level languages often have to rely on lower-level languages, either for\n\nperformance or for auto-differentiability; this is the case with standard tools for cognitive\n\nmodelling, where languages like R [ 37 ] must rely on external languages like STAN [ 38 ] for\n\nBayesian model fitting). This means that ActiveInference , in conjunction with Turing [ 39 ],\n\nJulia’s powerful library for Bayesian model fitting, and its newly developed extension for\n\nbehavioural modelling, ActionModels , makes it possible to use cutting-edge Markov Chain\n\nMonte Carlo [ 40 ] methods, as well as variational methods [ 35 ], for Bayesian model fitting\n\nwith AIF. Crucially, this allows researchers to not only simulate AIF in a fast programming\n\nlanguage, but to also fit them to empirical behaviour, as is performed in cognitive modelling\n\nand computational psychiatry. Importantly, this also places AIF models in an ecosystem\n\nof other models for computational psychiatry so that it can easily be compared with\n\nmodels, like Hierarchical Gaussian Filters [ 41 ], and reinforcement learning models, like the\n\nclassic Rescorla- Wagner model [ 42 ]. As part of making ActiveInference.jl available to the\n\nscientific community, and to the larger software ecosystem within computational psychiatry,\n\nit is implemented as part of the Translational Algorithms for Psychiatry-Advancing Science\n\n(TAPAS) ecosystem [ 43 ].\n\nIn the next section, we provide a conceptual and formal introduction to AIF, particu-\n\nlarly in the context of using POMDP generative models. In Section 3 , we demonstrate how\n\nto use the package in practice, both for simulation and parameter estimation. In Section 4 ,\n\nwe give a fully worked example of how ActiveInference can be used with a concrete\n\nsimulated dataset. Finally, we discuss potential applications and future directions for\n\ndeveloping the package.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "doing variational Bayesian parameter estimation based on empirical data, but only in\n\nM ATLAB and restricted to a particular class of variational parameter estimation methods\n\n(variational Laplace), instead of the sampling-based methods that currently predominate in\n\nthe field of cognitive modelling [ 34 , 35 ].\n\nIn this paper, we introduce ActiveInference.jl , a new software library for Julia [ 28 ]\n\nthat aims to provide easy-to-use tools for model fitting with AIF models and to introduce\n\nAIF to the growing community of researchers using Julia for computational psychiatry and\n\ncognitive modelling. Julia is a free and open-source high-level programming language that\n\nretains an easy user interface reminiscent of that in M ATLAB and Python. Simultaneously,", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "[26] J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, “BERT: Pre-training of deep bidirectional transformers for language understanding,” in *Proceedings of the 2019 Conference of the North American Chapter of the Association* *for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers)* , 2019.\n\n[27] D. Ding, A. Mallick, C. Wang, R. Sim, S. Mukherjee, V. R¨uhle, L. V. Lakshmanan, and A. H. Awadallah, “Hybrid LLM: Cost-efficient and quality-aware query routing,” in *International Conference on Learning Representations* *(ICLR)* , 2024.\n\n[28] Y. Dong, H. Chen, J. Chen, Z. Fang, X. Yang, Y. Zhang, Y. Tian, H. Su, and J. Zhu, “How robust is Google’s Bard to adversarial image attacks?” *arXiv preprint arXiv:2309.11751* , 2023.\n\n[29] N. Du, Y. Huang, A. M. Dai, S. Tong, D. Lepikhin, Y. Xu, M. Krikun, Y. Zhou, A. W. Yu, O. Firat *et al.* , “Glam: Efficient scaling of language models with mixture-of-experts,” in *International Conference on Machine Learning* *(ICML)* , 2022.\n\n[30] W. Fedus, B. Zoph, and N. Shazeer, “Switch transformers: Scaling to trillion parameter models with simple and efficient sparsity,” *Journal of Machine Learning Research (JMLR)* , 2022.\n\n[31] T. Feng, Y. Shen, and J. You, “Graphrouter: A graph-based router for LLM selections,” *arXiv preprint* *arXiv:2410.03834* , 2024.\n\n[32] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,” in *International* *Conference on Learning Representations (ICLR)* , 2015.\n\n[33] K. Greshake, S. Abdelnabi, S. Mishra, C. Endres, T. Holz, and M. Fritz, “Not what you’ve signed up for: Compro- mising real-world LLM-integrated applications with indirect prompt injection,” in *ACM AISec* , 2023.\n\n[34] J. Hayes, I. Shumailov, and I. Yona, “Buffer overflow in mixture of experts,” *arXiv preprint arXiv:2402.05526* , 2024.\n\n[35] D. Hendrycks, C. Burns, S. Basart, A. Zou, M. Mazeika, D. Song, and J. Steinhardt, “Measuring massive multitask language understanding,” in *International Conference on Learning Representations (ICLR)* , 2021.\n\n[36] N. Jain, A. Schwarzschild, Y. Wen, G. Somepalli, J. Kirchenbauer, P.-y. Chiang, M. Goldblum, A. Saha, J. Geip- ing, and T. Goldstein, “Baseline defenses for adversarial attacks against aligned language models,” *arXiv preprint* *arXiv:2309.00614* , 2023.\n\n[37] F. Jelinek, “Interpolated estimation of Markov source parameters from sparse data,” 1980. [Online]. Available: [https://api.semanticscholar.org/CorpusID:61012010](https://api.semanticscholar.org/CorpusID:61012010)\n\n[38] A. Q. Jiang, A. Sablayrolles, A. Mensch, C. Bamford, D. S. Chaplot, D. d. l. Casas, F. Bressand, G. Lengyel, G. Lample, L. Saulnier *et al.* , “Mistral 7B,” *arXiv preprint arXiv:2310.06825* , 2023.\n\n[39] A. Q. Jiang, A. Sablayrolles, A. Roux, A. Mensch, B. Savary, C. Bamford, D. S. Chaplot, D. d. l. Casas, E. B. Hanna, F. Bressand *et al.* , “Mixtral of experts,” *arXiv preprint arXiv:2401.04088* , 2024.\n\n[40] D. Jiang, X. Ren, and B. Y. Lin, “LLM-Blender: Ensembling large language models with pairwise ranking and generative fusion,” in *Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics* *(Volume 1: Long Papers)* , 2023.\n\n[41] C.-H. Lee, H. Cheng, and M. Ostendorf, “OrchestraLLM: Efficient orchestration of language models for dialogue state tracking,” in *Proceedings of the 2024 Conference of the North American Chapter of the Association for Com-* *putational Linguistics: Human Language Technologies (Volume 1: Long Papers)* , 2024.\n\n[42] Y. Liu, G. Deng, Z. Xu, Y. Li, Y. Zheng, Y. Zhang, L. Zhao, T. Zhang, K. Wang, and Y. Liu, “Jailbreaking ChatGPT via prompt engineering: An empirical study,” *arXiv preprint arXiv:2305.13860* , 2023.\n\n[43] D. Lowd and C. Meek, “Adversarial learning,” in *ACM International Conference on Knowledge Discovery in Data* *Mining (SIGKDD)* , 2005.", - "page_start": 19, - "page_end": 19, - "source_file": "arxiv1.pdf" - }, - { - "text": "64. TuringLang/ParetoSmooth.jl. 2024. Available online: [ https://github.com/TuringLang/ParetoSmooth.jl](https://github.com/TuringLang/ParetoSmooth.jl) (accessed on 25 October 2024).\n\n65. Palmeri, T.J.; Love, B.C.; Turner, B.M. Model-based cognitive neuroscience. *J. Math. Psychol.* **2017** , *76* , 59- 64. [ [CrossRef](http://dx.doi.org/10.1016/j.jmp.2016.10.010) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/30147145) ]\n\n66. Kagan, B.J.; Kitchen, A.C.; Tran, N.T.; Habibollahi, F.; Khajehnejad, M.; Parker, B.J.; Bhat, A.; Rollo, B.; Razi, A.; Friston, K.J. In vitro\n\nneurons learn and exhibit sentience when embodied in a simulated game-world. *Neuron* **2022** , *110* , 3952- 3969.e8. [ [CrossRef](http://dx.doi.org/10.1016/j.neuron.2022.09.001) ]\n\n67. Waade, P.T.; Olesen, C.L.; Laursen, J.E.; Nehrer, S.W.; Heins, C.; Friston, K.; Mathys, C. As One and Many: Relating Individual\n\nand Emergent Group-Level Generative Models in Active Inference. *Preprints* **2024** , 2024101895. [ [CrossRef](http://dx.doi.org/10.20944/preprints202410.1895.v1) ]", - "page_start": 31, - "page_end": 31, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "It is also an example predicated on copyright’s limitations and exceptions — in this case, on\n\nU.S. fair use. While the Authors Guild filed a copyright infringement suit against HathiTrust,\n\nfederal courts in 2012 and 2014 ruled that HathiTrust’s use of books was fair use. 32\n\nA nonprofit founded in 2008, HathiTrust grew out of a partnership among major US university\n\nlibraries and today is “an international community of research libraries committed to the\n\nlong-term curation and availability of the cultural record.” It started in what it calls the “early 33\n\ndays of mass digitization” — that is, at a time when it started to become economical to take\n\nexisting physical artifacts in libraries and turn them into digital files at a large scale.\n\nThe founding members of HathiTrust were among the initial partners for Google’s Book\n\nSearch product, which allows people to search across and view small snippets of text from\n\nin-copyright books and read full copies of public domain books scanned from libraries’ 34\n\ncollections. The libraries provided Google with books from their collections, Google would\n\nthen scan the books for use in Book Search, and return to the libraries a digital copy for their\n\nown uses. These uses included setting up HathiTrust not only to ensure long-term\n\npreservation of the digital books and their metadata, but also to facilitate other uses,\n\nincluding full text search of books and accessibility for people with print disabilities. In\n\nseparate court cases, both Google and HathiTrust’s uses of the books were deemed\n\nconsistent with copyright law.\n\nThe uses most relevant to this paper are those enabled by what HathiTrust refers to today as\n\nthe Research Center. The Center grew in part out of a research discipline called “digital\n\nhumanities,” which, among other things, seeks to use computational resources or other\n\ndigital technologies to analyze information and contribute to the study of literature, media,\n\nhistory, and other areas. For instance, imagine you want to understand how a given term\n\n(e.g., “war on drugs”) became used; one might seek to analyze when the term was first used\n\nand how often it was used over time by analyzing a vast quantity of sources, searching out\n\nthe term’s use. The insight here is that there is much to be learned not just from reading or\n\notherwise consuming specific material, but also from “non-consumptive research,” or\n\n\"research in which computational analysis is performed on one or more volumes (textual or\n\nimage objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use.\n\nToday, the Center “[s]upports large-scale computational analysis of the works in the\n\nHathiTrust Digital Library to facilitate non-profit and educational research.” It includes over 18\n\nmillion books in over 400 languages from the HathiTrust Digital Library collection. Roughly\n\n58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has\n\nlimitations in terms of its representation across subject matter, language, geography, and\n\nother dimensions. In terms of subject matter, the corpus is skewed towards humanities\n\n(64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English,\n\n*Authors Guild v. HathiTrust,* 902 F.Supp.2d 445 (SDNY October 10, 2012) and *Authors Guild v.* 32\n\n*HathiTrust* , 755 F.3d 87 (2d Cir. 2014).\n\nSee [https://www.hathitrust.org/member-libraries/member-list/ ](https://www.hathitrust.org/member-libraries/member-list/) — the membership is principally US 33\n\ninstitutions, and most of the non-US members are from English speaking countries or institutions that\n\nuse English as the primary language of operations.\n\nThis functionality is limited to scanned books provided by library partners in the US. 34", - "page_start": 14, - "page_end": 14, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "[48] N. Papernot, P. McDaniel, I. Goodfellow, S. Jha, Z. B. Celik, and A. Swami, “Practical black-box attacks against machine learning,” in *Proceedings of the 2017 ACM on Asia conference on computer and communications security* , 2017.\n\n[49] N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, “The limitations of deep learning in adversarial settings,” in *IEEE European symposium on security and privacy (EuroS&P)* , 2016.\n\n[50] F. Perez and I. Ribeiro, “Ignore previous prompt: Attack techniques for language models,” in *NeurIPS ML Safety* *Workshop* , 2022.\n\n[51] A. Radford, J. Wu, R. Child, D. Luan, D. Amodei, and I. Sutskever, “Language models are unsupervised [multitask learners,” https://cdn.openai.com/better-language-models/language models are unsupervised multitask](https://cdn.openai.com/better-language-models/language_models_are_unsupervised_multitask_learners.pdf) [learners.pdf, 2019.](https://cdn.openai.com/better-language-models/language_models_are_unsupervised_multitask_learners.pdf)\n\n[52] C. Riquelme, J. Puigcerver, B. Mustafa, M. Neumann, R. Jenatton, A. Susano Pinto, D. Keysers, and N. Houlsby, “Scaling vision with sparse mixture of experts,” *Advances in Neural Information Processing Systems (NeurIPS)* , 2021.\n\n[53] M. <sup>ˇ</sup> Sakota, M. Peyrard, and R. West, “Fly-swat or cannon? cost-effective language model choice via meta-modeling,” in *Proceedings of the 17th ACM International Conference on Web Search and Data Mining* , 2024.\n\n[54] S. Schulhoff, J. Pinto, A. Khan, L.-F. Bouchard, C. Si, S. Anati, V. Tagliabue, A. Kost, C. Carnahan, and J. Boyd- Graber, “Ignore this title and HackAPrompt: Exposing systemic vulnerabilities of LLMs through a global prompt hacking competition,” in *EMNLP* , 2023.\n\n[55] A. Shafran, R. Schuster, and V. Shmatikov, “Machine against the RAG: Jamming retrieval-augmented generation with blocker documents,” *arXiv preprint arXiv:2406.05870* , 2024.\n\n[56] N. Shazeer, A. Mirhoseini, K. Maziarz, A. Davis, Q. Le, G. Hinton, and J. Dean, “Outrageously large neural net- works: The sparsely-gated mixture-of-experts layer,” in *International Conference on Learning Representations* , 2016.\n\n[57] T. Shnitzer, A. Ou, M. Silva, K. Soule, Y. Sun, J. Solomon, N. Thompson, and M. Yurochkin, “Large language model routing with benchmark datasets,” *arXiv preprint arXiv:2309.15789* , 2023.\n\n[58] K. Srivatsa, K. K. Maurya, and E. Kochmar, “Harnessing the power of multiple minds: Lessons learned from LLM routing,” *arXiv preprint arXiv:2405.00467* , 2024.\n\n[59] D. Stripelis, Z. Hu, J. Zhang, Z. Xu, A. Shah, H. Jin, Y. Yao, S. Avestimehr, and C. He, “Tensoropera router: A multi-model router for efficient LLM inference,” *arXiv preprint arXiv:2408.12320* , 2024.\n\n[60] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, “Intriguing properties of neural networks,” *arXiv preprint arXiv:1312.6199* , 2013.\n\n[61] G. Team, R. Anil, S. Borgeaud, J.-B. Alayrac, J. Yu, R. Soricut, J. Schalkwyk, A. M. Dai, A. Hauth, K. Millican *et al.* , “Gemini: a family of highly capable multimodal models,” *arXiv preprint arXiv:2312.11805* , 2023.\n\n[62] Teknium, “Openhermes 2.5: An open dataset of synthetic data for generalist LLM assistants,” 2023. [Online]. [Available: https://huggingface.co./datasets/teknium/OpenHermes-2.5](https://huggingface.co./datasets/teknium/OpenHermes-2.5)\n\n[63] H. Touvron, L. Martin, K. Stone, P. Albert, A. Almahairi, Y. Babaei, N. Bashlykov, S. Batra, P. Bhargava, S. Bhosale *et al.* , “Llama 2: Open foundation and fine-tuned chat models,” *arXiv preprint arXiv:2307.09288* , 2023.\n\n[64] S. Toyer, O. Watkins, E. A. Mendes, J. Svegliato, L. Bailey, T. Wang, I. Ong, K. Elmaaroufi, P. Abbeel, T. Darrell *et al.* , “Tensor Trust: Interpretable prompt injection attacks from an online game,” in *International Conference on* *Learning Representations (ICLR)* , 2023.", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv1.pdf" - }, - { - "text": "in [ 21 , 93 ] and direct resources away from efforts that would facili- tate long-term progress towards natural language understanding, without using unfathomable training data. Furthermore, the tendency of human interlocutors to impute meaning where there is none can mislead both NLP researchers and the general public into taking synthetic text as meaningful. Combined with the ability of LMs to pick up on both subtle biases and overtly abusive language patterns in training data, this leads to risks of harms, including encountering derogatory language and experiencing discrimination at the hands of others who reproduce racist, sexist, ableist, extremist or other harmful ideologies rein- forced through interactions with synthetic language. We explore these potential harms in §6 and potential paths forward in §7. We hope that a critical overview of the risks of relying on ever- increasing size of LMs as the primary driver of increased perfor- mance of language technology can facilitate a reallocation of efforts towards approaches that avoid some of these risks while still reap- ing the benefits of improvements to language technology.\n\n## **2 BACKGROUND**\n\nSimilar to [ 14 ], we understand the term *language model* (LM) to refer to systems which are trained on string prediction tasks: that is, predicting the likelihood of a token (character, word or string) given either its preceding context or (in bidirectional and masked LMs) its surrounding context. Such systems are unsupervised and when deployed, take a text as input, commonly outputting scores or string predictions. Initially proposed by Shannon in 1949 [ 117 ], some of the earliest implemented LMs date to the early 1980s and were used as components in systems for automatic speech recognition (ASR), machine translation (MT), document classification, and more [ 111 ]. In this section, we provide a brief overview of the general trend of language modeling in recent years. For a more in-depth survey of pretrained LMs, see [105]. Before neural models, n-gram models also used large amounts of data [ 20 , 87 ]. In addition to ASR, these large n-gram models of English were developed in the context of machine translation from another source language with far fewer direct translation examples. For example, [ 20 ] developed an n-gram model for English with a total of 1.8T n-grams and noted steady improvements in BLEU score on the test set of 1797 Arabic translations as the training data was increased from 13M tokens. The next big step was the move towards using pretrained rep- resentations of the distribution of words (called *word embeddings* ) in other (supervised) NLP tasks. These word vectors came from systems such as word2vec [ 85 ] and GloVe [ 98 ] and later LSTM models such as context2vec [ 82 ] and ELMo [ 99 ] and supported state of the art performance on question answering, textual entail- ment, semantic role labeling (SRL), coreference resolution, named entity recognition (NER), and sentiment analysis, at first in Eng- lish and later for other languages as well. While training the word embeddings required a (relatively) large amount of data, it reduced the amount of labeled data necessary for training on the various supervised tasks. For example, [ 99 ] showed that a model trained with ELMo reduced the necessary amount of training data needed to achieve similar results on SRL compared to models without, as shown in one instance where a model trained with ELMo reached\n\n**Year Model # of Parameters Dataset Size**\n\n2019 BERT [39] 3.4E+08 16GB 2019 DistilBERT [113] 6.60E+07 16GB 2019 ALBERT [70] 2.23E+08 16GB 2019 XLNet (Large) [150] 3.40E+08 126GB 2020 ERNIE-Gen (Large) [145] 3.40E+08 16GB 2019 RoBERTa (Large) [74] 3.55E+08 161GB 2019 MegatronLM [122] 8.30E+09 174GB 2020 T5-11B [107] 1.10E+10 745GB 2020 T-NLG [112] 1.70E+10 174GB 2020 GPT-3 [25] 1.75E+11 570GB 2020 GShard [73] 6.00E+11 - 2021 Switch-C [43] 1.57E+12 745GB\n\n**Table 1: Overview of recent large language models**", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "generative models, or even (deep learning-based) amortised inference models. These vari-\n\nous extensions could provide valuable tools for using AIF models in both theoretical and\n\napplied research.\n\n**Author Contributions:** Conceptualisation, S.W.N., J.E.L. and P.T.W.; methodology, S.W.N., J.E.L. and\n\nP.T.W.; software, S.W.N., J.E.L. and P.T.W.; formal analysis, S.W.N. and J.E.L.; writing—original draft\n\npreparation, S.W.N. and J.E.L.; writing—review and editing, C.H., K.F., C.M. and P.T.W.; visualisation,\n\nS.W.N. and J.E.L.; supervision, C.M. and P.T.W.; project administration, P.T.W. All authors read and\n\nagreed to the published version of this manuscript.\n\n**Funding:** C.M. acknowledges funding from Aarhus Universitets Forskningsfonds (grant no. AUFF-\n\nE-2019-7-10) and from the Carlsberg Foundation (grant no. CF21-0439).\n\n**Institutional Review Board Statement:** Not applicable.\n\n**Informed Consent Statement:** Not applicable.\n\n**Data Availability Statement:** The original data presented in this study are openly available in\n\nActiveInferenceJuliaPaper at URL: [ https://osf.io/j3k5q/](https://osf.io/j3k5q/) .\n\n**Conflicts of Interest:** The authors declare no conflicts of interest. The funders had no role in the design\n\nof this study; in the collection, analyses or interpretation of data; in the writing of this manuscript; or\n\nin the decision to publish the results.\n\n**Abbreviations**\n\nThe following abbreviations are used in this manuscript:\n\nAIF Active inference\n\nFEP Free energy principle\n\nVFE Variational free energy\n\nEFE Expected free energy\n\nMCMC Markov Chain Monte Carlo\n\nPOMDP Partially Observed Markov Decision Process\n\n## **References**\n\n1. Parr, T.; Pezzulo, G.; Friston, K.J. *Active Inference: The Free Energy Principle in Mind, Brain, and Behavior* ; The MIT Press: Cambridge,\n\nMA, USA, 2022. [ [CrossRef](http://doi.org/10.7551/mitpress/12441.001.0001) ]\n\n2. Friston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; O’Doherty, J.; Pezzulo, G. Active inference and learning. *Neurosci.*\n\n*Biobehav. Rev.* **2016** , *68* , 862- 879. [ [CrossRef](http://dx.doi.org/10.1016/j.neubiorev.2016.06.022) ]\n\n3. Friston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; Pezzulo, G. Active inference: A process theory. *Neural Comput.* **2017** ,\n\n*29* , 1- 49. [ [CrossRef](http://dx.doi.org/10.1162/NECO_a_00912) ]\n\n4. Friston, K.J.; Stephan, K.E. Free-energy and the brain. *Synthese* **2007** , *159* , 417- 458. [ [CrossRef](http://dx.doi.org/10.1007/s11229-007-9237-y) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/19325932) ]\n\n5. Friston, K. The free-energy principle: A unified brain theory? *Nat. Rev. Neurosci.* **2010** , *11* , 127- 138. [ [CrossRef](http://dx.doi.org/10.1038/nrn2787) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/20068583) ]\n\n6. Friston, K. The free-energy principle: A rough guide to the brain? *Trends Cogn. Sci.* **2009** , *13* , 293- 301. [ [CrossRef](http://dx.doi.org/10.1016/j.tics.2009.04.005) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/19559644) ]\n\n7. Friston, K. A free energy principle for a particular physics. *arXiv* **2019** , arXiv:1906.10184. [ [CrossRef](http://dx.doi.org/10.48550/arXiv.1906.10184) ]\n\n8. Friston, K.; Da Costa, L.; Sajid, N.; Heins, C.; Ueltzhöffer, K.; Pavliotis, G.A.; Parr, T. The free energy principle made simpler but\n\nnot too simple. *Phys. Rep.* **2023** , *1024* , 1- 29. [ [CrossRef](http://dx.doi.org/10.1016/j.physrep.2023.07.001) ]\n\n9. Friston, K.; Kiebel, S. Predictive coding under the free-energy principle. *Philos. Trans. R. Soc. B Biol. Sci.* **2009** , *364* , 1211- 1221.\n\n[ [CrossRef](http://dx.doi.org/10.1098/rstb.2008.0300) ] [ [PubMed](http://www.ncbi.nlm.nih.gov/pubmed/19528002) ]\n\n10. Karl, F. A Free Energy Principle for Biological Systems. *Entropy* **2012** , *14* , 2100- 2121. [ [CrossRef](http://dx.doi.org/10.3390/e14112100) ]", - "page_start": 29, - "page_end": 29, - "source_file": "pubmed7_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed7_cc4.pdf", - "query": "To which system does the AIF apply ?", - "target_page": 2, - "target_passage": "AIF was argued to be applicable to any self organising system that actively maintains a stable boundary that defines its integrity [10], a broad category that includes cells and plants [11], as well as humans [2] and even collectives [12].", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "[Vincent van Gogh in watercolour](https://en.wikipedia.org/wiki/Vincent_van_Gogh)\n\ncreated by generative AI software\n\nArtificial intelligent (AI) agents are software entities designed to\n\nperceive their environment, make decisions, and take actions\n\nautonomously to achieve specific goals. These agents can interact\n\nwith users, their environment, or other agents. AI agents are used\n\n[in various applications, including virtual assistants, chatbots,](https://en.wikipedia.org/wiki/Chatbots)\n\n[autonomous vehicles, game-playing systems, and industrial](https://en.wikipedia.org/wiki/Industrial_robotics)\n\n[robotics. AI agents operate within the constraints of their](https://en.wikipedia.org/wiki/Industrial_robotics)\n\nprogramming, available computational resources, and hardware\n\nlimitations. This means they are restricted to performing tasks\n\nwithin their defined scope and have finite memory and processing\n\ncapabilities. In real-world applications, AI agents often face time\n\nconstraints for decision-making and action execution. Many AI\n\nagents incorporate learning algorithms, enabling them to improve\n\ntheir performance over time through experience or training. Using\n\nmachine learning, AI agents can adapt to new situations and\n\noptimise their behaviour for their designated tasks. <sup>[175][176][177]</sup>\n\nThere are also thousands of successful AI applications used to solve specific problems for specific\n\nindustries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in\n\nsome offerings or processes. <sup>[178]</sup> [ A few examples are energy storage, medical diagnosis, military](https://en.wikipedia.org/wiki/Energy_storage)\n\n[logistics, applications that predict the result of judicial decisions, foreign policy, or supply chain](https://en.wikipedia.org/wiki/Foreign_policy)\n\nmanagement.\n\n[AI applications for evacuation and disaster management are growing. AI has been used to investigate if](https://en.wikipedia.org/wiki/Disaster)\n\nand how people evacuated in large scale and small scale evacuations using historical data from GPS,\n\nvideos or social media. Further, AI can provide real time information on the real time evacuation\n\nconditions. <sup>[179][180][181]</sup>\n\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments\n\nor increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict\n\nthe ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct\n\n[predictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests,](https://en.wikipedia.org/wiki/Predictive_analytics)\n\nand save water.\n\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and\n\napplications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the\n\ndevelopment of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting\n\nsolar activity, and distinguishing between signals and instrumental effects in gravitational wave\n\nastronomy. Additionally, it could be used for activities in space, such as space exploration, including the\n\nanalysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance,\n\nand more autonomous operation.\n\n#### **Other industry-specific tasks**", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[The first global AI Safety Summit was held](https://en.wikipedia.org/wiki/AI_Safety_Summit)\n\nin 2023 with a declaration calling for\n\ninternational cooperation.\n\nPromotion of the wellbeing of the people and communities that these technologies affect requires\n\nconsideration of the social and ethical implications at all stages of AI system design, development and\n\nimplementation, and collaboration between job roles such as data scientists, product managers, data\n\nengineers, domain experts, and delivery managers. <sup>[300]</sup>\n\n[The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations](https://en.wikipedia.org/wiki/AI_Safety_Institute_(United_Kingdom))\n\navailable under a MIT open-source licence which is freely available on GitHub and can be improved with\n\nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge,\n\nability to reason, and autonomous capabilities. <sup>[301]</sup>\n\nThe regulation of artificial intelligence is the development\n\nof public sector policies and laws for promoting and\n\nregulating AI; it is therefore related to the broader regulation\n\nof algorithms. <sup>[302]</sup> The regulatory and policy landscape for\n\nAI is an emerging issue in jurisdictions globally. <sup>[303]</sup>\n\n[According to AI Index at Stanford, the annual number of](https://en.wikipedia.org/wiki/Stanford)\n\nAI-related laws passed in the 127 survey countries jumped\n\nfrom one passed in 2016 to 37 passed in 2022\n\nalone. <sup>[304][305]</sup> Between 2016 and 2020, more than 30\n\ncountries adopted dedicated strategies for AI. <sup>[306]</sup> Most EU\n\nmember states had released national AI strategies, as had\n\nCanada, China, India, Japan, Mauritius, the Russian\n\nFederation, Saudi Arabia, United Arab Emirates, U.S., and\n\nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia\n\nand Tunisia. <sup>[306]</sup> [ The Global Partnership on Artificial Intelligence was launched in June 2020, stating a](https://en.wikipedia.org/wiki/Global_Partnership_on_Artificial_Intelligence)\n\nneed for AI to be developed in accordance with human rights and democratic values, to ensure public\n\nconfidence and trust in the technology. <sup>[306]</sup> [ Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher](https://en.wikipedia.org/wiki/Daniel_Huttenlocher)\n\npublished a joint statement in November 2021 calling for a government commission to regulate AI. <sup>[307]</sup>\n\nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they\n\nbelieve may happen in less than 10 years. <sup>[308]</sup> In 2023, the United Nations also launched an advisory\n\nbody to provide recommendations on AI governance; the body comprises technology company\n\nexecutives, governments officials and academics. <sup>[309]</sup> [ In 2024, the Council of Europe created the first](https://en.wikipedia.org/wiki/Council_of_Europe)\n\n[international legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence](https://en.wikipedia.org/wiki/Framework_Convention_on_Artificial_Intelligence_and_Human_Rights,_Democracy_and_the_Rule_of_Law)\n\n[and Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United](https://en.wikipedia.org/wiki/Framework_Convention_on_Artificial_Intelligence_and_Human_Rights,_Democracy_and_the_Rule_of_Law)\n\nStates, the United Kingdom, and other signatories. <sup>[310]</sup>\n\n[In a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only](https://en.wikipedia.org/wiki/Ipsos)\n\n35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\". <sup>[304]</sup>\n\n[A 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to](https://en.wikipedia.org/wiki/Reuters)", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - }, - { - "text": "160. Alex McFarland: *[7 Best AI for Math Tools.](https://www.unite.ai/best-ai-for-math-tools/)* (https://www.unite.ai/best-ai-for-math-tools/)\n\n[Archived (https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-mat](https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-math-tools/)\n\n[h-tools/) 11 September 2024 at the Wayback Machine unite.ai. Retrieved 2024-08-07](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n161. Matthew Finio & Amanda Downie: IBM Think 2024 Primer, \"What is Artificial Intelligence (AI)\n\nin Finance?\" 8 Dec. 2023\n\n162. M. Nicolas, J. Firzli: Pensions Age/European Pensions magazine, \"Artificial Intelligence: Ask\n\n[the Industry\" May June 2024 https://videovoice.org/ai-in-finance-innovation-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[intended/ Archived (https://web.archive.org/web/20240911125502/https://videovoice.org/ai-i](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[n-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[act-wont-work-as-intended/) 11 September 2024 at the Wayback Machine.](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n163. Congressional Research Service (2019). *[Artificial Intelligence and National Security](https://fas.org/sgp/crs/natsec/R45178.pdf)* (https://f\n\n[as.org/sgp/crs/natsec/R45178.pdf) (PDF). Washington, DC: Congressional Research](https://fas.org/sgp/crs/natsec/R45178.pdf)\n\n[Service.PD-notice](https://en.wikipedia.org/wiki/Template:PD-notice)\n\n164. Slyusar, Vadym (2019). Artificial intelligence as the basis of future control networks\n\n[(Preprint). doi:10.13140/RG.2.2.30247.50087 (https://doi.org/10.13140%2FRG.2.2.30247.5](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[0087).](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[165. Iraqi, Amjad (3 April 2024). \" 'Lavender': The AI machine directing Israel's bombing spree in](https://www.972mag.com/lavender-ai-israeli-army-gaza/)\n\n[Gaza\" (https://www.972mag.com/lavender-ai-israeli-army-gaza/). ](https://www.972mag.com/lavender-ai-israeli-army-gaza/) *+972 Magazine* . Retrieved\n\n6 April 2024.\n\n[166. Davies, Harry; McKernan, Bethan; Sabbagh, Dan (1 December 2023). \" 'The Gospel': how](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[Israel uses AI to select bombing targets in Gaza\" (https://www.theguardian.com/world/2023/](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets). ](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets) *The Guardian* . Retrieved\n\n4 December 2023.\n\n[167. Marti, J Werner (10 August 2024). \"Drohnen haben den Krieg in der Ukraine revolutioniert,](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)\n\n[doch sie sind empfindlich auf Störsender - deshalb sollen sie jetzt autonom operieren\" (http](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[artificial neural networks would never be useful for solving real-world tasks, thus discrediting the](https://en.wikipedia.org/wiki/Artificial_neural_networks)\n\napproach altogether. <sup>[333]</sup> [ The \"AI winter\", a period when obtaining funding for AI projects was difficult,](https://en.wikipedia.org/wiki/AI_winter)\n\nfollowed. <sup>[9]</sup>\n\n[In the early 1980s, AI research was revived by the commercial success of expert systems,](https://en.wikipedia.org/wiki/Expert_system) <sup>[334]</sup> a form of\n\nAI program that simulated the knowledge and analytical skills of human experts. By 1985, the market for\n\n[AI had reached over a billion dollars. At the same time, Japan's fifth generation computer project inspired](https://en.wikipedia.org/wiki/Fifth_generation_computer)\n\n[the U.S. and British governments to restore funding for academic research.](https://en.wikipedia.org/wiki/Academic_research) <sup>[8]</sup> However, beginning with\n\n[the collapse of the Lisp Machine market in 1987, AI once again fell into disrepute, and a second, longer-](https://en.wikipedia.org/wiki/Lisp_Machine)\n\nlasting winter began. <sup>[10]</sup>\n\n### **History**", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia3.pdf" - }, - { - "text": "## **Artificial intelligence**\n\n**Artificial intelligence** ( **AI** [), in its broadest sense, is intelligence exhibited by machines, particularly](https://en.wikipedia.org/wiki/Machine)\n\n[computer systems. It is a field of research in computer science that develops and studies methods and](https://en.wikipedia.org/wiki/Computer_science)\n\n[software that enable machines to perceive their environment and use learning and intelligence to take](https://en.wikipedia.org/wiki/Machine_learning)\n\nactions that maximize their chances of achieving defined goals. <sup>[1]</sup> Such machines may be called AIs.\n\n[High-profile applications of AI include advanced web search engines (e.g., Google Search);](https://en.wikipedia.org/wiki/Google_Search)\n\n[recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google](https://en.wikipedia.org/wiki/Google_Assistant)\n\n[Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g.,](https://en.wikipedia.org/wiki/Computational_creativity)\n\n[ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However,](https://en.wikipedia.org/wiki/Go_(game))\n\nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general\n\napplications, often without being called AI because once something becomes useful enough and common\n\n[enough it's not labeled AI anymore.\"](https://en.wikipedia.org/wiki/AI_effect) <sup>[2][3]</sup>\n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The\n\n[traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural](https://en.wikipedia.org/wiki/Natural_language_processing)\n\n[language processing, perception, and support for robotics.](https://en.wikipedia.org/wiki/Robotics) <sup>[a]</sup> [ General intelligence—the ability to complete](https://en.wikipedia.org/wiki/Artificial_general_intelligence)\n\nany task performed by a human on an at least equal level—is among the field's long-term goals. <sup>[4]</sup> To\n\nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including\n\n[search and mathematical optimization, formal logic, artificial neural networks, and methods based on](https://en.wikipedia.org/wiki/Artificial_neural_network)\n\n[statistics, operations research, and economics.](https://en.wikipedia.org/wiki/Economics) <sup>[b]</sup> [ AI also draws upon psychology, linguistics, philosophy,](https://en.wikipedia.org/wiki/Philosophy_of_artificial_intelligence)\n\n[neuroscience, and other fields.](https://en.wikipedia.org/wiki/Neuroscience) <sup>[5]</sup>\n\nArtificial intelligence was founded as an academic discipline in 1956, <sup>[6]</sup> and the field went through\n\n[multiple cycles of optimism throughout its history,](https://en.wikipedia.org/wiki/History_of_artificial_intelligence) <sup>[7][8]</sup> followed by periods of disappointment and loss of\n\n[funding, known as AI winters.](https://en.wikipedia.org/wiki/AI_winter) <sup>[9][10]</sup> [ Funding and interest vastly increased after 2012 when deep learning](https://en.wikipedia.org/wiki/Deep_learning)\n\noutperformed previous AI techniques. <sup>[11]</sup> [ This growth accelerated further after 2017 with the transformer](https://en.wikipedia.org/wiki/Transformer_architecture)\n\n[architecture,](https://en.wikipedia.org/wiki/Transformer_architecture) <sup>[12]</sup> and by the early 2020s many billions of dollars were being invested in AI and the field\n\n[experienced rapid ongoing progress in what has become known as the AI boom. The emergence of](https://en.wikipedia.org/wiki/AI_boom)\n\nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed\n\n[several unintended consequences and harms in the present and raised concerns about the risks of AI and](https://en.wikipedia.org/wiki/AI_risk)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Some authors have suggested in practice, that the definition of AI is vague and difficult to define, with\n\ncontention as to whether classical algorithms should be categorised as AI, <sup>[367]</sup> with many companies\n\n[during the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not](https://en.wikipedia.org/wiki/Buzzword)\n\nactually use AI in a material way\". <sup>[368]</sup>\n\n[No established unifying theory or paradigm has guided AI research for most of its history.](https://en.wikipedia.org/wiki/Paradigm) <sup>[aa]</sup> The\n\nunprecedented success of statistical machine learning in the 2010s eclipsed all other approaches (so much\n\nso that some sources, especially in the business world, use the term \"artificial intelligence\" to mean\n\n[\"machine learning with neural networks\"). This approach is mostly sub-symbolic, soft and narrow. Critics](https://en.wikipedia.org/wiki/Artificial_general_intelligence)\n\nargue that these questions may have to be revisited by future generations of AI researchers.\n\n[Symbolic AI (or \"GOFAI\")](https://en.wikipedia.org/wiki/GOFAI) <sup>[370]</sup> simulated the high-level conscious reasoning that people use when they\n\nsolve puzzles, express legal reasoning and do mathematics. They were highly successful at \"intelligent\"\n\n[tasks such as algebra or IQ tests. In the 1960s, Newell and Simon proposed the physical symbol systems](https://en.wikipedia.org/wiki/Physical_symbol_systems_hypothesis)\n\n[hypothesis: \"A physical symbol system has the necessary and sufficient means of general intelligent](https://en.wikipedia.org/wiki/Physical_symbol_systems_hypothesis)\n\naction.\" <sup>[371]</sup>\n\nHowever, the symbolic approach failed on many tasks that humans solve easily, such as learning,\n\n[recognizing an object or commonsense reasoning. Moravec's paradox is the discovery that high-level](https://en.wikipedia.org/wiki/Moravec%27s_paradox)\n\n\"intelligent\" tasks were easy for AI, but low level \"instinctive\" tasks were extremely difficult. <sup>[372]</sup>\n\n[Philosopher Hubert Dreyfus had argued since the 1960s that human expertise depends on unconscious](https://en.wikipedia.org/wiki/Dreyfus%27_critique_of_AI)\n\ninstinct rather than conscious symbol manipulation, and on having a \"feel\" for the situation, rather than\n\nexplicit symbolic knowledge. <sup>[373]</sup> Although his arguments had been ridiculed and ignored when they\n\nwere first presented, eventually, AI research came to agree with him. <sup>[ab][16]</sup>\n\n[The issue is not resolved: sub-symbolic reasoning can make many of the same inscrutable mistakes that](https://en.wikipedia.org/wiki/Sub-symbolic)\n\n[human intuition does, such as algorithmic bias. Critics such as Noam Chomsky argue continuing research](https://en.wikipedia.org/wiki/Noam_Chomsky)\n\ninto symbolic AI will still be necessary to attain general intelligence, <sup>[375][376]</sup> in part because sub-\n\n[symbolic AI is a move away from explainable AI: it can be difficult or impossible to understand why a](https://en.wikipedia.org/wiki/Explainable_AI)\n\n[modern statistical AI program made a particular decision. The emerging field of neuro-symbolic artificial](https://en.wikipedia.org/wiki/Neuro-symbolic_AI)\n\n[intelligence attempts to bridge the two approaches.](https://en.wikipedia.org/wiki/Neuro-symbolic_AI)\n\n[\"Neats\" hope that intelligent behavior is described using simple, elegant principles (such as logic,](https://en.wikipedia.org/wiki/Logic)\n\n[optimization, or neural networks). \"Scruffies\" expect that it necessarily requires solving a large number of](https://en.wikipedia.org/wiki/Artificial_neural_network)\n\nunrelated problems. Neats defend their programs with theoretical rigor, scruffies rely mainly on\n\nincremental testing to see if they work. This issue was actively discussed in the 1970s and 1980s, <sup>[377]</sup> but\n\neventually was seen as irrelevant. Modern AI has elements of both.\n\n#### **Evaluating approaches to AI**", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - }, - { - "text": "init_aif function, including the policy length and which parts of the information gain to\n\nuse, as well as the policy precision *γ* . � � # Infer policies\n\ninfer_policies!(aif) � � Finally, sample_action! then samples the next action from the agent. This is performed by\n\nmarginalising the policy probabilities to obtain the probabilities for the action on the next\n\ntime step, and then softmax transforming it with the *α* action precision parameter. � � # Sample Action\n\nsample_action!(aif) � � These functions can be combined by users in various ways, depending on their purpose.\n\nOften, however, users will want to combine them in a single function that implements\n\nthe full action- perception loop that receives an observation and returns an action. This is\n\nimplemented with the ActionModels sister package for behavioural modelling.\n\n### *3.2. Simulation with* ActionModels\n\nActionModels is a library for implementing, simulating and fitting various behavioural\n\nmodels to data. Here, we show how to use it in conjunction with ActiveInference to\n\nmake the simulation of AIF models easy and in a fully generalised framework that is\n\ncompatible with other types of cognitive and behavioural models as well. ActiveInference\n\nprovides a full \"action model\"—a full model of the action-generating process in an agent—\n\nfor using AIF called action_pomdp! . In this case, all this information is contained in the\n\nAIF object. action_pomdp! then takes the AIF object and a single-time-step observation\n\nas arguments, and then runs state inference, parameter learning and policy inference,\n\nand returns probability distributions over the possible actions of the agent. � � observation = [ 1 ] # observation with one modality\n\n# Run the action model for a single observation\n\naction_distributions = action_pomdp!(aif::AIF, observation) � � This can conveniently be used in conjunction with an ActionModels agent , a more abstract\n\nstructure that is used for running behavioural models in general, and which is used when\n\nfitting models to data. We therefore begin with initialising an agent that contains the\n\nAIF object: � � # Initialize ActionModels Agent with active inference agent as a substruct.\n\nagent = init_agent(\n\naction_model = action_pomdp!, # The active inference action model\n\nsubstruct = aif, # The AIF object\n\n) � � The agent object can be used with a set of standard functions. single_input! provides\n\nthe agent with an observation, updates it is beliefs and returns a sampled action; for non-\n\naction-dependent observations, give_inputs! provides a series of observations across time\n\nsteps and returns actions for each. These can be easily used in an agent-based simulation to\n\nhave AIF agents evolve and act over time.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "[297. Alan Turing Institute (2023). \"AI Ethics and Governance in Practice\" (https://www.turing.ac.u](https://www.turing.ac.uk/sites/default/files/2023-12/aieg-ati-ai-ethics-an-intro_1.pdf)\n\n[k/sites/default/files/2023-12/aieg-ati-ai-ethics-an-intro_1.pdf) (PDF). Archived (https://web.ar](https://web.archive.org/web/20240911125504/https://www.turing.ac.uk/sites/default/files/2023-12/aieg-ati-ai-ethics-an-intro_1.pdf)\n\n[chive.org/web/20240911125504/https://www.turing.ac.uk/sites/default/files/2023-12/aieg-ati-](https://web.archive.org/web/20240911125504/https://www.turing.ac.uk/sites/default/files/2023-12/aieg-ati-ai-ethics-an-intro_1.pdf)\n\n[ai-ethics-an-intro_1.pdf) (PDF) from the original on 11 September 2024. Retrieved](https://web.archive.org/web/20240911125504/https://www.turing.ac.uk/sites/default/files/2023-12/aieg-ati-ai-ethics-an-intro_1.pdf)\n\n5 October 2024.\n\n[298. Floridi, Luciano; Cowls, Josh (23 June 2019). \"A Unified Framework of Five Principles for AI](https://hdsr.mitpress.mit.edu/pub/l0jsh9d1)\n\n[in Society\" (https://hdsr.mitpress.mit.edu/pub/l0jsh9d1). ](https://hdsr.mitpress.mit.edu/pub/l0jsh9d1) *Harvard Data Science Review* . **1**\n\n[(1). doi:10.1162/99608f92.8cd550d1 (https://doi.org/10.1162%2F99608f92.8cd550d1).](https://doi.org/10.1162%2F99608f92.8cd550d1)\n\n[S2CID 198775713 (https://api.semanticscholar.org/CorpusID:198775713).](https://api.semanticscholar.org/CorpusID:198775713)\n\n[299. Buruk, Banu; Ekmekci, Perihan Elif; Arda, Berna (1 September 2020). \"A critical perspective](https://doi.org/10.1007/s11019-020-09948-1)\n\n[on guidelines for responsible and trustworthy artificial intelligence\" (https://doi.org/10.1007/s](https://doi.org/10.1007/s11019-020-09948-1)\n\n[11019-020-09948-1). ](https://doi.org/10.1007/s11019-020-09948-1) *Medicine, Health Care and Philosophy* . **23** (3): 387- 399.\n\n[doi:10.1007/s11019-020-09948-1 (https://doi.org/10.1007%2Fs11019-020-09948-1).](https://doi.org/10.1007%2Fs11019-020-09948-1)\n\n[ISSN 1572-8633 (https://search.worldcat.org/issn/1572-8633). PMID 32236794 (https://pub](https://pubmed.ncbi.nlm.nih.gov/32236794)\n\n[med.ncbi.nlm.nih.gov/32236794). S2CID 214766800 (https://api.semanticscholar.org/Corpu](https://api.semanticscholar.org/CorpusID:214766800)\n\n[sID:214766800). Archived (https://web.archive.org/web/20241005170206/https://link.springe](https://web.archive.org/web/20241005170206/https://link.springer.com/article/10.1007/s11019-020-09948-1)\n\n[r.com/article/10.1007/s11019-020-09948-1) from the original on 5 October 2024. Retrieved](https://web.archive.org/web/20241005170206/https://link.springer.com/article/10.1007/s11019-020-09948-1)\n\n5 October 2024.\n\n[300. Kamila, Manoj Kumar; Jasrotia, Sahil Singh (1 January 2023). \"Ethical issues in the](https://doi.org/10.1108/IJOES-05-2023-0107)\n\n[development of artificial intelligence: recognizing the risks\" (https://doi.org/10.1108/IJOES-0](https://doi.org/10.1108/IJOES-05-2023-0107)\n\n[5-2023-0107). ](https://doi.org/10.1108/IJOES-05-2023-0107) *International Journal of Ethics and Systems* . ahead-of-print (ahead-of-print).\n\n[doi:10.1108/IJOES-05-2023-0107 (https://doi.org/10.1108%2FIJOES-05-2023-0107).](https://doi.org/10.1108%2FIJOES-05-2023-0107)\n\n[ISSN 2514-9369 (https://search.worldcat.org/issn/2514-9369). S2CID 259614124 (https://ap](https://api.semanticscholar.org/CorpusID:259614124)\n\n[i.semanticscholar.org/CorpusID:259614124). Archived (https://web.archive.org/web/202410](https://web.archive.org/web/20241005170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/html)\n\n[05170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/ht](https://web.archive.org/web/20241005170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/html)\n\n[ml) from the original on 5 October 2024. Retrieved 5 October 2024.](https://web.archive.org/web/20241005170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/html)", - "page_start": 46, - "page_end": 46, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Arts and Entertainment](https://about.newsusa.com/taxonomy/term/78) / New Artificial Intelligence Summit Series Begins With Energy\n\n## New Artificial Intelligence Summit Series Begins With\n\n## Energy\n\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain\n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative\n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit\n\nSeries.\n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington,\n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and\n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant\n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote\n\npartnerships between AI and energy stakeholders.\n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy\n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in\n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced\n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research.\n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy,\n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and\n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American\n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts.\n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan.\n\nArticle Link\n\n[https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…](https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with-energy)\n\n[ARTS AND ENTERTAINMENT](https://about.newsusa.com/taxonomy/term/78)\n\n07/31/2024\n\n[Celebrate St. Patrick's Day with](https://about.newsusa.com/celebrate-st-patricks-day-with-no-booze-just-pure-irish-fun-and-entertainment)\n\nNo Booze, Just Pure Irish Fun and\n\nEntertainment\n\nMar 06, 2024\n\nSay Hello to Your Big Break at the\n\nStapleton Library Job Fair in\n\n[Vocation, Trade, or Civil Service](https://about.newsusa.com/say-hello-to-your-big-break-at-the-stapleton-library-job-fair-in-vocation-trade-or-civil-service)\n\nMar 06, 2024\n\nLocal Artists Collaborate for a\n\n[Unique Fusion of Groove and](https://about.newsusa.com/local-artists-collaborate-for-a-unique-fusion-of-groove-and-collage)\n\nCollage\n\nMar 06, 2024\n\n[Explore Downtown San Pedro](https://about.newsusa.com/explore-downtown-san-pedro-with-flair-ride-the-iconic-red-car-trolley-for-free)\n\nwith Flair: Ride the Iconic Red Car\n\nTrolley for Free\n\nMar 06, 2024\n\nRetrain Your Emotional Brain: A\n\n[Natural Alternative to Weight](https://about.newsusa.com/retrain-your-emotional-brain-a-natural-alternative-to-weight-loss-drugs)\n\nLoss Drugs\n\nFeb 22, 2024\n\nSerial Entrepreneur Teaches Us\n\n[How to Go the Distance in](https://about.newsusa.com/serial-entrepreneur-teaches-us-how-to-go-the-distance-in-business-and-in-life)\n\nBusiness and in Life\n\nFeb 21, 2024\n\n[FASHION](https://about.newsusa.com/taxonomy/term/1)\n\n[BUSINESS](https://about.newsusa.com/taxonomy/term/2)\n\n[INFOGRAPHIC](https://about.newsusa.com/taxonomy/term/16)\n\n[ENVIRONMENT](https://about.newsusa.com/taxonomy/term/17)\n\n[HEALTH](https://about.newsusa.com/taxonomy/term/18)", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "show that even a computer capable of perfectly simulating human behavior would not have a mind. <sup>[387]</sup>\n\n[It is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel),](https://en.wikipedia.org/wiki/Sentient_AI)\n\nand if so, to what degree. <sup>[388]</sup> But if there is a significant chance that a given machine can feel and suffer,\n\nthen it may be entitled to certain rights or welfare protection measures, similarly to animals. <sup>[389][390]</sup>\n\n[Sapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may](https://en.wikipedia.org/wiki/Self-awareness)\n\nprovide another moral basis for AI rights. <sup>[389]</sup> [ Robot rights are also sometimes proposed as a practical](https://en.wikipedia.org/wiki/Robot_rights)\n\nway to integrate autonomous agents into society. <sup>[391]</sup>\n\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI\n\nsystems. Similarly to the legal status of companies, it would have conferred rights but also\n\nresponsibilities. <sup>[392]</sup> Critics argued in 2018 that granting rights to AI systems would downplay the\n\n[importance of human rights, and that legislation should focus on user needs rather than speculative](https://en.wikipedia.org/wiki/Human_rights)\n\nfuturistic scenarios. They also noted that robots lacked the autonomy to take part to society on their\n\nown. <sup>[393][394]</sup>\n\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI\n\n[sentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot](https://en.wikipedia.org/wiki/Moral_blindness)\n\n[analogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created](https://en.wikipedia.org/wiki/Suffering_risks)\n\nand carelessly exploited. <sup>[390][389]</sup>\n\n[A superintelligence is a hypothetical agent that would possess intelligence far surpassing that of the](https://en.wikipedia.org/wiki/Superintelligence)\n\nbrightest and most gifted human mind. <sup>[379]</sup> [ If research into artificial general intelligence produced](https://en.wikipedia.org/wiki/Artificial_general_intelligence)\n\n[sufficiently intelligent software, it might be able to reprogram and improve itself. The improved software](https://en.wikipedia.org/wiki/Recursive_self-improvement)\n\n[would be even better at improving itself, leading to what I. J. Good called an \"intelligence explosion\" and](https://en.wikipedia.org/wiki/Intelligence_explosion)\n\n[Vernor Vinge called a \"singularity\".](https://en.wikipedia.org/wiki/Technological_singularity) <sup>[395]</sup>\n\n[However, technologies cannot improve exponentially indefinitely, and typically follow an S-shaped](https://en.wikipedia.org/wiki/S-shaped_curve)\n\n[curve, slowing when they reach the physical limits of what the technology can do.](https://en.wikipedia.org/wiki/S-shaped_curve) <sup>[396]</sup>\n\n[Robot designer Hans Moravec, cyberneticist Kevin Warwick and inventor Ray Kurzweil have predicted](https://en.wikipedia.org/wiki/Ray_Kurzweil)\n\n[that humans and machines may merge in the future into cyborgs that are more capable and powerful than](https://en.wikipedia.org/wiki/Cyborg)\n\n[either. This idea, called transhumanism, has roots in the writings of Aldous Huxley and Robert](https://en.wikipedia.org/wiki/Robert_Ettinger)\n\n[Ettinger.](https://en.wikipedia.org/wiki/Robert_Ettinger) <sup>[397]</sup>\n\n##### **AI welfare and rights**\n\n### **Future**\n\n#### **Superintelligence and the singularity**\n\n#### **Transhumanism**", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed7_cc4.pdf", - "query": "What is the definition of POMDP ?", - "target_page": 4, - "target_passage": " The Partially Observable Markov Decision Process is a type of flexible generative model that is widely used in the AIF literature. In discrete time and usually a discrete state space, this model type is parametrised to fit a given task by a set matrices containing probability distributions.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "also be added, like hierarchical and temporally deep POMDPs. Model structure learning\n\ncould be considered, where different model structures are compared and chosen between\n\nby evaluating their free energies. Sophisticated inference, where predictions are also made\n\nabout changes in one’s own beliefs—depending on expected action-dependent observations\n\nin the future—could also be implemented [ 58 ]. Finally, the package could be extended to\n\nother types of generative models than POMDPs, including other universal models, like\n\ngeneralised filtering [ 17 ] and Hierarchical Gaussian Filter models [ 41 ], as well as custom", - "page_start": 28, - "page_end": 28, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Θ is then described by a Dirichlet distribution parametrised by a set of concentration\n\nparameters *θ* :\n\n*p* ( Θ ) = *Dir* ( Θ *|* *θ* ) (19)\n\nThe concentration parameter of a Dirichlet distribution is essentially a non-negative count\n\nof how many times the given category (be it a type of observation or state transition) has\n\noccurred. The distribution of concentration parameter counts will determine the shape\n\nof the estimated categorical probability distribution, while the scale of the concentration\n\nparameters will determine the certainty per precision of the belief. Updating beliefs about\n\nΘ (the parameters in the matrices) then corresponds to updating these concentration\n\nparameters *θ* with the following update equation:\n\n*θ* *t* + 1 = *ω* *∗* *θ* *t* + *η* *∗* *χ* *t* (20)\n\nThe updated value for the concentration parameter ( *θ* *t* + 1 ) is found by adding the previous\n\nconcentration parameter *θ* *t* multiplied by a forgetting rate *ω* to the observed data count\n\n*χ* (either the observation in the case of **A** learning, or the inferred state or state transition\n\nfor other matrices) multiplied by a learning rate *η* . With this relatively simple update\n\nequation—which, in essence, amounts to just counting the occurrences of categories—an\n\nAIF agent can update its beliefs about the various matrices it uses to make inferences about\n\nenvironmental states. For more details on parameter learning with POMDPs, see [ 23 , 33 , 52 ].\n\n## **3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to\n\noperate ActiveInference . This includes functionalities for creating POMDP agents, for sim-\n\nulating behaviour and for fitting the models to data. In the next section, we demonstrate\n\nhow to use the package on a concrete worked example. ActiveInference is under continual\n\ndevelopment, and the newest version of the package, including documentation for how to\n\nuse it, can be found at [ github.com/ilabcode/ActiveInference.jl](https://github.com/ilabcode/ActiveInference.jl) .\n\n### *3.1. Creating and Using a POMDP*\n\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [ 23 ],\n\na Python library for implementing simulations of AIF in discrete state spaces. Those\n\nalready acquainted with pymdp should find the syntax here familiar. ActiveInference\n\ncan be installed as normal from the official Julia General Registry using the Julia’s native\n\npackage manager Pkg: � � **using** Pkg\n\nPkg.add(ActiveInference) � � It can then be loaded into the current project environment: � � **using** ActiveInference � � Central to the package is the AIF object. This is a structure containing all the components of\n\nthe generative model, as well as the dynamic belief states and the various settings needed to\n\nperform AIF, and is used in conjunction with most of the high-level functions of the package.\n\nAn AIF object can be created with the init_aif function, which takes as arguments the\n\ncomponents of the generative model and a dictionary of various settings and parameters:", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "5 of 33\n\nquantities as its target: the variational free energy ( *VFE* ) in the case of perception and the\n\nexpected free energy ( *EFE* ) in the case of action. The *VFE* is the free energy associated with\n\na given sensory observation and is resolved perceptually by updating beliefs about the\n\nenvironment. The *EFE* is the free energy that is expected in the future, contingent on a\n\ngiven policy or course of action. Choosing action policies associated with a low *EFE* lead\n\nto reducing uncertainty about the environment, as well as making preferred observations\n\nmore likely.\n\n### *2.1. POMDPs in Active Inference*\n\nIn AIF, the POMDP is one of the most common families of generative models used\n\nto make inferences about the environment. It is a Markovian discrete state-space model,\n\nwhere employing it means representing the environment and observations as inhabiting\n\none among a set of possible (possibly multidimensional) states, and that the changes\n\nin these states can only depend on the system’s previous state and the agent’s actions.\n\nEnvironmental states are not directly observable, so they have to be inferred based on\n\nincoming sensory observations. In AIF for POMDPs and other generative models in general,\n\nboth perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3 ), as well\n\nas the learning of parameters of the generative model (see Section 2.4 ). Crucially, an agent’s\n\ngenerative model does not a priori have to be isomorphic to the true environment (i.e.,\n\nthe data-generating process), although this will generally lead to a successful inference,\n\nand that the generative model will therefore often come to resemble the environment\n\nthrough learning.\n\nA discrete state-space POMDP in AIF is conventionally defined by five main sets of\n\nparameters: **A** , **B** , **C** , **D** and **E** [ 1 , 33 ], see Figure 1 . Together, these parametrise the agent’s\n\nprior beliefs about the prior probability of different states in the environment, how states\n\nof the environment change and how they generate observations. Typically, they will be\n\nvectors, matrices or tensors; however, henceforth we denote them by their corresponding\n\nletter in bold. These make up the components needed for the agent to perform AIF.\n\n**A** , also called the *observation model* , represents the state-to-observation likelihood model.\n\nThis describes how observations depend on or are generated by states of the environment.\n\nIt is structured as a matrix with a column for each possible environmental state *s* , and a row\n\nfor each possible observation *o* . Each column is then a categorical probability distribution\n\nover the observations that will occur given the environmental state (meaning that each\n\ncolumn must contain non-negative values that sum to 1). If the observations are multidi-\n\nmensional (i.e., multiple observations are made at each time point), there is a matrix for\n\neach observation modality. If two or more states determine the observation, the likelihood\n\nmodel then becomes a tensor. If **A** is imprecise (i.e., the probabilities are highly entropic and\n\nevenly distributed), observations are taken to carry less information about the environment,\n\nin many cases leading to more uncertain inferences, and vice versa.\n\n**B** , also called the *transition model* , describes the state-to-state transition probabilities of\n\nenvironmental states *s* . **B** encodes the agent’s assumptions about how the environment\n\nchanges over time, depending on its actions. It has a column and a row for each environ-\n\nmental state *s* , where each column is a categorical probability distribution over the states\n\nthe environment will take on the next time step, given the state it is currently in. If the envi-\n\nronment is modelled as multidimensional, there will be a matrix for each environmental\n\nstate factor. Additionally, there is a separate matrix for each possible action (making each", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "[20] C. Tomlinson, “On the motion of certain liquids on the surface of water,” Phil. Mag. Ser. 4 **39** , 32- 48\n\n(1870).\n\n[21] C. G. Marangoni, “Ueber die Ausbreitung der Tropfen einer Fl¨ussigkeit auf der Oberfl¨ache einer\n\nanderen,” Ann. Phys. (Poggendorf) **143** , 337- 354 (1871).\n\n[22] O. Karthaus, L. Grasj¨o, N. Maruyama, and M. Shimomura, “Formation of ordered mesoscopic poly-\n\nmer arrays by dewetting,” Chaos **9** , 308- 314 (1999).\n\n[23] X. Gu, D. Raghavan, J. F. Douglas, and A. Karim, “Hole-growth instability in the dewetting of\n\nevaporating polymer solution films,” J. Polym. Sci. Pt. B-Polym. Phys. **40** , 2825- 2832 (2002).\n\n[24] S. W. Hong, J. F. Xia, and Z. Q. Lin, “Spontaneous formation of mesoscale polymer patterns in an\n\nevaporating bound solution,” Adv. Mater. **19** , 1413- 1417 (2007).\n\n[25] G. Liu, C. F. Zhang, J. Zhao, and Y. X. Zhu, “Study of the morphology of the three-phase contact\n\nline and its evolution by morphological examination after droplet evaporation of aqueous polymer\n\nsolutions,” Langmuir **24** , 7923- 7930 (2008).\n\n[26] M. Mertig, U. Thiele, J. Bradt, G. Leibiger, W. Pompe, and H. Wendrock, “Scanning force mi-\n\ncroscopy and geometrical analysis of two-dimensional collagen network formation,” Surface and\n\nInterface Analysis **25** , 514- 521 (1997).\n\n[27] M. Mertig, U. Thiele, J. Bradt, D. Klemm, and W. Pompe, “Dewetting of thin collagenous precursor\n\nfilms,” Appl. Phys. A **66** , S565- S568 (1998).\n\n[28] U. Thiele, M. Mertig, and W. Pompe, “Dewetting of an evaporating thin liquid film: Heterogeneous\n\nnucleation and surface instability,” Phys. Rev. Lett. **80** , 2869- 2872 (1998).\n\n[29] H. Maeda, “An atomic force microscopy study of ordered molecular assemblies and concentric ring\n\npatterns from evaporating droplets of collagen solutions,” Langmuir **15** , 8505- 8513 (1999).\n\n[30] I. I. Smalyukh, O. V. Zribi, J. C. Butler, O. D. Lavrentovich, and G. C. L. Wong, “Structure and\n\ndynamics of liquid crystalline pattern formation in drying droplets of DNA,” Phys. Rev. Lett. **96** ,\n\n177801 (2006).\n\n[31] L. Zhang, S. Maheshwari, H. C. Chang, and Y. X. Zhu, “Evaporative self-assembly from complex\n\nDNA-colloid suspensions,” Langmuir **24** , 3911- 3917 (2008).\n\n[32] M. Maillard, L. Motte, A. T. Ngo, and M. P. Pileni, “Rings and hexagons made of nanocrystals: A\n\nMarangoni effect,” J. Phys. Chem. B **104** , 11871- 11877 (2000).\n\n[33] G. L. Ge and L. Brus, “Evidence for spinodal phase separation in two-dimensional nanocrystal self-\n\nassembly,” J. Phys. Chem. B **104** , 9573- 9575 (2000).\n\n27", - "page_start": 26, - "page_end": 26, - "source_file": "1001.2669.pdf" - }, - { - "text": "The parameters that are subject to learning in POMDPs are usually the entries in the\n\nfive matrices. Since the matrices consist of categorical probability distributions, it is natural\n\nto use Dirichlet distributions—distributions over categorical probability distributions—as\n\nbelief distributions over their values [ 33 , 52 ]. Beliefs about each probability distribution", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "init_aif function, including the policy length and which parts of the information gain to\n\nuse, as well as the policy precision *γ* . � � # Infer policies\n\ninfer_policies!(aif) � � Finally, sample_action! then samples the next action from the agent. This is performed by\n\nmarginalising the policy probabilities to obtain the probabilities for the action on the next\n\ntime step, and then softmax transforming it with the *α* action precision parameter. � � # Sample Action\n\nsample_action!(aif) � � These functions can be combined by users in various ways, depending on their purpose.\n\nOften, however, users will want to combine them in a single function that implements\n\nthe full action- perception loop that receives an observation and returns an action. This is\n\nimplemented with the ActionModels sister package for behavioural modelling.\n\n### *3.2. Simulation with* ActionModels\n\nActionModels is a library for implementing, simulating and fitting various behavioural\n\nmodels to data. Here, we show how to use it in conjunction with ActiveInference to\n\nmake the simulation of AIF models easy and in a fully generalised framework that is\n\ncompatible with other types of cognitive and behavioural models as well. ActiveInference\n\nprovides a full \"action model\"—a full model of the action-generating process in an agent—\n\nfor using AIF called action_pomdp! . In this case, all this information is contained in the\n\nAIF object. action_pomdp! then takes the AIF object and a single-time-step observation\n\nas arguments, and then runs state inference, parameter learning and policy inference,\n\nand returns probability distributions over the possible actions of the agent. � � observation = [ 1 ] # observation with one modality\n\n# Run the action model for a single observation\n\naction_distributions = action_pomdp!(aif::AIF, observation) � � This can conveniently be used in conjunction with an ActionModels agent , a more abstract\n\nstructure that is used for running behavioural models in general, and which is used when\n\nfitting models to data. We therefore begin with initialising an agent that contains the\n\nAIF object: � � # Initialize ActionModels Agent with active inference agent as a substruct.\n\nagent = init_agent(\n\naction_model = action_pomdp!, # The active inference action model\n\nsubstruct = aif, # The AIF object\n\n) � � The agent object can be used with a set of standard functions. single_input! provides\n\nthe agent with an observation, updates it is beliefs and returns a sampled action; for non-\n\naction-dependent observations, give_inputs! provides a series of observations across time\n\nsteps and returns actions for each. These can be easily used in an agent-based simulation to\n\nhave AIF agents evolve and act over time.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "Chapter 9. Data conversion\n\nimport com.ibm.edms.od.*;\n\npublic class CustomTransform {\n\npublic static HashMap transformData(HashMap odMap) throws Exception {\n\nSystem.out.println(\"Inside transformData method\");\n\n// List this transform name from the XML file\n\nSystem.out.println(\" Transform name: \" +\n\n(String)odMap.get(ODTransform.TXFRM_REQ_NAME));\n\n// List the property keys and values ODWEK read from the transform XML\n\n// file and provided to this Custom Class\n\nSystem.out.println(\" Transform properties:\");\n\nProperties gtProps = (Properties)odMap.get(ODTransform.TXFRM_REQ_PROPS);\n\nEnumeration<?> enumeration = gtProps.keys();\n\nList<String> list = new ArrayList<String>();\n\nwhile (enumeration.hasMoreElements()) {\n\nlist.add((String)enumeration.nextElement());\n\n}\n\nCollections.sort(list);\n\nfor (String key : list)\n\nSystem.out.println(String.format(\"%25s = %-25s\", key,\n\ngtProps.getProperty(key)));\n\n// Retrieve the native document from ODWEK\n\nbyte[] inDoc = (byte [])odMap.get(ODTransform.TXFRM_REQ_DATA);\n\nSystem.out.println(\" Native document size: \" + (inDoc == null ? null:\n\ninDoc.length));\n\n// Retrieve the document resources from ODWEK\n\nbyte[] inRes = (byte [])odMap.get(ODTransform.TXFRM_REQ_RES);\n\nSystem.out.println(\" Native doc resource size: \" + (inRes == null ? null:\n\ninRes.length));\n\n// Normally this is where you do the transform or do something with the\n\nbyte data.\n\n// Let's just concat the resources if there are any to the doc\n\nbyte[] transformedDoc;\n\nif (inRes != null) {\n\ntransformedDoc = new byte[inRes.length + inDoc.length];\n\nSystem.arraycopy(inRes, 0, transformedDoc, 0, inRes.length);\n\nSystem.arraycopy(inDoc, 0, transformedDoc, inRes.length,\n\ninDoc.length);\n\n}\n\nelse\n\ntransformedDoc = inDoc;\n\nSystem.out.println(\" Concatenated resources to doc size: \" +\n\ntransformedDoc.length);\n\n// Send the transformed data back to ODWEK\n\nHashMap rtnMap = new HashMap();\n\nrtnMap.put(ODTransform.TXFRM_RESP_DATA, transformedDoc);\n\nreturn rtnMap;\n\n}\n\n}\n\nExample 9-4 on page 214 shows how to set up the HashMap to pass document byte arrays in\n\nand out of this custom interface, and how to define a custom Java class that contains the\n\n**transformData()** method.", - "page_start": 238, - "page_end": 238, - "source_file": "sg246915.pdf" - }, - { - "text": "**9** ensemble mean\n\nIPSL-CM5A-LR GFDL-ESM2M\n\n- 2 - 1 0 2\n\n°C\n\n3 4 5 6 1\n\nHadGEM2-ES\n\nIPSL-CM5A-MR MIROC-ESM-CHEM ACCESS1-0\n\n**Figure2.** Simulatedchangesinannualdailymaximumtemperaturerelativeto1981- 2010at2 ° Cglobalwarming,forindividual\n\nHadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The\n\nlabels above each panel identify the driving CMIP5 model (or ensemble mean).\n\n**Table 4.** Time of reaching GWLs of 1.5 ° C and 2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven\n\nbydifferentsetsofCMIP5sea-surfacetemperatures.Thedatesarethecentreyearofa20yearperiodforwhichtheclimatedata\n\nis applied to the HCVI calculation and JULES simulations.\n\ndriving SSTs 1.5 ° C 2.0 ° C\n\nIPSL-CM5A-LR 2024 2035 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nGFDL-ESM2M 2036 2051 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nHadGEM2-ES 2019 2033 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nIPSL-CM5A-MR 2023 2036 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nMIROC-ESM-CHEM 2020 2032 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nACCESS1-0 2026 2040 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nland surface sees an increase in annual daily maximum temperature which is similar to the global\n\nannual mean temperature increase. In the IPSL-driven simulations, increases in TXx substantially\n\nlarger than the GWL are confined to the eastern USA, Europe and part of northeast Asia. By\n\ncontrast, the GFDL-driven simulation shows much of the global land surface seeing increases\n\nin annual daily maximum temperature larger than the global mean warming. Much of the mid-\n\nlatitudes experience an increase in TXx of over 4°C. The very largest increases of 5°C or more\n\nare seen in central North America, Europe and northwestern Asia. Similar results are seen in the", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed11.pdf" - }, - { - "text": "**11** ensemble mean\n\nIPSL-CM5A-LR GFDL-ESM2M\n\n- 20 - 10 0 10 20\n\ndays\n\nHadGEM2-ES\n\nIPSL-CM5A-MR MIROC-ESM-CHEM ACCESS1-0\n\n**Figure4.** Simulatedchangesinthenumberofconsecutivedrydaysrelativeto1981- 2010,at2 ° Cglobalwarming,forindividual\n\nHadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The\n\nlabels above each panel identify the driving CMIP5 model (or ensemble mean).\n\n**Table 5.** Global mean changes at 2 ° C global warming compared to present day for individual ensemble members, for the\n\nClimPACT indices, the flood and drought proxies used as input to the HCVI calculations, and percentage change in mean\n\nprecipitation (Pmean), mean run-off (Rmean) and low run-off (Rlow).\n\nIPSL-\n\nCM5A-LR\n\nGFDL-\n\nESM2M\n\nHadGEM2-\n\nES\n\nIPSL-\n\nCM5A-MR\n\nMIRC-ESM-\n\nCHEM ACCESS1-0\n\nensemble\n\nmean\n\nTXx ( ° C) 2.1 2.8 2.5 2.9 2.4 2.8 2.6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nTX90p (% time) 20.1 24.3 24.9 29.0 23.5 27.9 25.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nCDD − 3.0 0.9 − 3.4 − 5.7 − 2.0 − 5.5 − 2.9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nRX5day (mm) 3.5 5.4 6.9 6.8 6.0 6.7 5.9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\ndrought proxy 0.76 0.89 n.a. 0.38 0.38 0.66 0.61 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nflood proxy 0.83 0.82 n.a. 0.75 0.73 0.78 0.78 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .\n\nPmean (%) 2.1 3.4 5.0 3.0 5.3 2.9 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed11.pdf" - }, - { - "text": "**x** IBM Content Manager OnDemand Guide\n\n18.2.7 Content Manager OnDemand server hangs or crashes . . . . . . . . . . . . . . . . . . 396\n\n18.2.8 Exporting information to a local server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397\n\n18.3 Content Manager OnDemand trace facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399\n\n18.3.1 Enabling the trace facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400\n\n18.3.2 Setting trace parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400\n\n18.4 Other tracing options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402\n\n18.4.1 ARSLOAD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402\n\n18.4.2 MidServer trace (z/OS only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403\n\n18.4.3 ODWEK trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403\n\n18.4.4 TCP/IP packet trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404\n\n18.4.5 Language Environment (z/OS only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405\n\n18.4.6 ARSSUPPORT utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405\n\n18.4.7 ARSJESD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406\n\n18.4.8 PDF Indexer trace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406\n\n18.4.9 Trace resolver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407\n\n18.4.10 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407\n\n**Related publications** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409\n\nIBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409\n\nOther publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409\n\nOnline resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410\n\nHelp from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411", - "page_start": 11, - "page_end": 11, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed6_cc4.pdf", - "query": "What is dyspnea ?", - "target_page": 2, - "target_passage": "Dyspnea refers to a subjective sensation of breathing discomfort.", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Approximately 65% of the variability in dyspnea\n\nremained unexplained by the factors examined in our\n\nstudy. Most individuals in our study showed normal\n\nspirometry results but still carried a substantial\n\nburden of dyspnea, an inconsistency that needs\n\nexplanation. Several factors not included in our\n\nanalysis may have contributed to the unexplained\n\nvariation. Environmental factors (eg, air pollution,\n\nallergen exposure, seasonal variations in symptoms)\n\nare potential contributors to this unexplained variability. <sup>22</sup> Genetic predispositions could also play a\n\nsigni fi cant role, as suggested by a study that revealed\n\nthat parents with dyspnea were 1.8 times more likely to have offspring with dyspnea. <sup>23</sup> Additionally, fi tness\n\ncould be a contributing factor, especially in\n\nindividuals with undiagnosed PRISm, asthma, or\n\nCOPD who may restrict their activities to avoid\n\ndyspnea, and hence become deconditioned. <sup>6</sup>\n\nThere were signi fi cant but modest differences in mean\n\ndyspnea levels across the 17 study sites (data not\n\nshown), which are not explained by the risk factors we\n\naccounted for in our study. This fi nding is not surprising\n\nbecause some of the potential contributing factors\n\npreviously mentioned and other site-speci fi c factors\n\n(eg, climate, air quality/industrialization, socioeconomic\n\nstatus) of the catchment population tend to vary across\n\nstudy sites.\n\nDyspnea is a complex, subjective symptom that is\n\nmodi fi ed by nonrespiratory factors including\n\npsychosocial, social, and environmental in fl uences. <sup>5</sup>\n\nInterindividual variability in the perception of dyspnea,\n\nin fl uenced by these nonrespiratory factors, may play an\n\nimportant role. A study conducted by Ziegler et al <sup>24</sup>\n\nassessed the perception of dyspnea in 42 healthy\n\nindividuals using a standardized inspiratory resistive\n\nloading stimulus. The study used the modi fi ed Borg\n\nscale to measure dyspnea perception levels. Among the\n\nparticipants subjected to the same inspiratory resistive\n\nload, 31%, 45%, and 24% of participants classi fi ed their\n\nlevel of dyspnea as low, intermediate, and high,\n\nrespectively. The study revealed that differences between\n\nindividuals contribute considerable variability to the\n\nperception of dyspnea, even among healthy participants.\n\nThe affective dimension of dyspnea can be captured\n\nusing additional questionnaires (eg, Multidimensional\n\nDyspnea Pro fi le, Dyspnea-12). Studies have explored the\n\nuse of the Multidimensional Dyspnea Pro fi le in\n\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment\n\nDisease Group Overall P Value\n\n| Reversibility of FEV 1 , % | Post-BD FEV 1 /FVC Ratio | Post-BD FEV 1 % predicted |\n|:---|:---|:---|\n| � 0.163 ( P ¼ .47) 0.186 ( P ¼ .16) 0.545 (P [ .01) 0.392 (P [ .002) � 0.290 ( P ¼ .39) | � 0.274 (P [ .05) 0.240 (P [ .005) 0.107 ( P ¼ .58) � 0.307 (P [ .05) 0.854 (P [ .002) | � 0.090 ( P ¼ .17) � 0.131 (P < .001) � 0.158 ( P ¼ .08) � 0.075 ( P ¼ .37) � 0.650 (P [ .004) |\n\nControl .096\n\nNormal spirometry < .001\n\nAsthma .009\n\nCOPD < .001\n\nPRISm < .001\n\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-speci fi c factors and spirometry\n\ndisease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical signi fi cance. BD ¼ bronchodilator; PRISm ¼ preserved ratio impaired spirometry.\n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea Coef fi cient (95% CI) P Value Dyspnea Coef fi cient (95% CI) P Value", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "spirometry.\n\n#### Assessment of the Impact of Participants ’ Dyspnea\n\nAlthough neither the CAT nor the SGRQ are dyspnea-\n\nspeci fi c tools, both are recommended by the Global Initia-\n\ntive for Chronic Obstructive Lung Disease to evaluate symptoms, including dyspnea, <sup>20</sup> and both yield a richer\n\nassessment of dyspnea than the modi fi ed Medical Research Council breathlessness scale. <sup>20</sup> Fifteen questions\n\nwere taken from the CAT and SGRQ questionnaires that\n\nreferred to individuals ’ experiences with dyspnea, and a\n\ncomposite measure of dyspnea impact using a weighted\n\nsum of the responses to the 15 questions was constructed.\n\nQuestions were coded so that larger values indicate more\n\nimpactful dyspnea. Weights used for question responses\n\nin calculating the dyspnea impact assessment measure\n\nwere those of the fi rst component of a principal compo-\n\nnent analysis (PCA) based on the covariance matrix of\n\nquestion responses. Questions with multiple responses\n\nand ordinal structure are individually more informative\n\nand thus were accorded higher weight than individual\n\ntrue-false questions. No additional PCA component was\n\nanticipated a priori to be material for our investigation,\n\nand an eigenvalue analysis of the PCA was conducted to\n\nverify this assumption.\n\nThe composite dyspnea impact measure was scaled so its\n\nminimum value was 0 if the response to each of the 15\n\nquestions was 0, and the maximum value was scaled to\n\n100 if the individual responses for all 15 questions rep-\n\nresented the most severe dyspnea response.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "outpatients with cardiorespiratory disease <sup>25</sup> and the Dyspnea-12 in patients with asthma <sup>26</sup> and found that\n\nthe affective aspect of dyspnea can signi fi cantly in fl uence\n\nthe impact of dyspnea on health status, irrespective of\n\nthe intensity of breathlessness.\n\nIn those with PRISm, there was a strong, positive\n\nassociation between higher values for the FEV 1 /FVC\n\nratio and dyspnea. For the PRISm group, a higher\n\nFEV 1 /FVC ratio may re fl ect diminished lung\n\ncompliance due to interstitial lung disease and/or\n\nrespiratory system restriction due to obesity, which\n\ncould contribute to worse dyspnea. Conversely, the\n\nassociation of dyspnea with the FEV 1 /FVC ratio was in\n\nthe opposite direction for those with asthma or COPD,\n\nand a lower FEV 1 /FVC ratio correlated with worse\n\ndyspnea, as expected.\n\nOur study complements the literature by focusing on\n\nadults with undiagnosed respiratory symptoms who\n\nwere randomly selected and recruited through active\n\ncase fi nding in the community. This increases the\n\ngeneralizability of our results to a broader population.\n\nOur dyspnea questions were derived from widely used\n\nand validated respiratory health questionnaires, and\n\nour dyspnea assessment measure is a weighted average\n\nof responses to these validated questions.\n\nConsequently, the measure has an immediate\n\ninterpretation in terms of the lived day-to-day\n\nexperience of individuals.\n\nOur study has limitations. We did not undertake\n\nreliability/reproducibility testing of our questionnaire.\n\nThe dyspnea impact assessment score was statistically\n\nassociated with increased health care utilization, lower\n\nquality of life, and reduced work productivity; therefore,\n\nby virtue of this analysis, our questionnaire has\n\nconstruct validity. However, further attempts at external\n\nvalidation of the questionnaire using an independent\n\ndata set would be important. Health care utilization\n\nduring the preceding 12 months was assessed on entry\n\ninto the study, and there is potential for impaired recall\n\nof events. Our study may have missed asthma in some\n\nparticipants because bronchial challenge testing was not\n\nconducted on those who tested negative for air fl ow\n\nobstruction or BD responsiveness. A previous study\n\nshowed that an additional diagnostic step incorporating\n\nTABLE 8 ] Unadjusted and Adjusted Dyspnea Associations With Health Care Use\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea OR (95% CI) P Value Dyspnea OR (95% CI) P Value\n\nIn the past 12 mo, did you visit your general\n\npractitioner or a nurse practitioner or another\n\nphysician at a walk-in clinic for any breathing\n\nproblems?\n\n1.011 (1.007-1.014) < .001 1.011 (1.007-1.014) < .001\n\nIn the past 12 mo, did you visit an emergency\n\ndepartment for any breathing problems?\n\n1.015 (1.009-1.021) < .001 1.015 (1.009-1.022) < .001\n\nIn the past 12 mo, were you hospitalized for any\n\nbreathing problems or respiratory illness?\n\n1.021 (1.006-1.037) .006 1.023 (1.007-1.039) .005\n\nData are presented as OR (95% CI) with P values. Adjusted values are adjusted for age, sex, and BMI.\n\nTABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea OR (95% CI) P Value Dyspnea OR (95% CI) P Value\n\nAre you currently employed\n\n(working for pay)?\n\n0.995 (0.992-0.998) .002 0.993 (0.990-0.997) < .001\n\nMeasure <sup>a</sup> Dyspnea Coef fi cient\n\n(95% CI) P Value\n\nDyspnea Coef fi cient\n\n(95% CI) P Value\n\nAbsenteeism 0.061 (0.040-0.083) < .001 0.066 (0.044-0.089) < .001\n\nPresenteeism 0.334 (0.293-0.375) < .001 0.349 (0.306-0.392) < .001\n\nWork productivity loss 0.368 (0.323-0.413) < .001 0.383 (0.336-0.430) < .001\n\nActivity impairment 0.503 (0.463-0.544) < .001 0.501 (0.458-0.544) < .001\n\nORs and regression coef fi cients are presented with 95% CIs and P values. Adjusted coef fi cients are adjusted for age, sex, and BMI. WPAI ¼ Work Pro- ductivity and Activity Impairment questionnaire.\n\na Measures calculated from WPAI questions. 21", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Dyspnea refers to a subjective sensation of breathing discomfort. <sup>1</sup> In a study involving a community-based\n\npopulation aged > 70 years, the prevalence of dyspnea was found to be 32%. <sup>2</sup> Dyspnea can lead to limitations in\n\ndaily activities, reduced exercise tolerance, and\n\nheightened mortality risks. <sup>3</sup>\n\nDyspnea not only affects individuals with diagnosed\n\nrespiratory conditions but also poses a signi fi cant\n\nburden on those with undiagnosed conditions. In a systematic review by Müller et al, <sup>4</sup> the combined\n\nprevalence of dyspnea in the adult general population\n\nacross 11 studies was estimated to be 10%. Dyspnea can\n\narise from a broad spectrum of underlying factors,\n\nincluding both respiratory and nonrespiratory\n\nconditions. Studies have revealed that dyspnea is not\n\nsolely attributable to respiratory conditions but is also\n\nheavily in fl uenced by cardiovascular deconditioning and\n\nby nonrespiratory factors, including psychosocial, social,\n\nand environmental determinants. <sup>5</sup> <sup>,</sup> <sup>6</sup>\n\nDyspnea is a prevalent symptom with consequences that\n\nextend beyond its physiologic implications. A study in\n\nEuropean patients with COPD explored the burden of\n\ndyspnea and identi fi ed potential correlates. The study\n\nrevealed that higher dyspnea impact correlated with\n\nlower health-related quality of life, increased work\n\nimpairment, and a higher frequency of emergency\n\ndepartment visits. <sup>7</sup>\n\nThe three objectives of our study were as follows: (1) to\n\nevaluate the impact of dyspnea in adults from the\n\ngeneral population who had no prior diagnosis of\n\nrespiratory disease but who reported having signi fi cant\n\nrespiratory symptoms in the past 6 months; (2) to\n\nidentify associated risk factors for dyspnea and estimate\n\ntheir in fl uence on the symptom; and (3) to explore the\n\nrelationship between dyspnea and health care utilization,\n\nquality of life, and work productivity in adults with\n\nundiagnosed respiratory symptoms.\n\n### Study Design and Methods\n\n#### Recruitment of Undiagnosed Cases and Healthy\n\nControl Patients\n\nBetween June 2017 and January 2023, adults aged $ 18\n\nyears were recruited through a two-step process into the\n\nUndiagnosed COPD and Asthma Population (UCAP) study, a multicenter case fi nding study. Approval for\n\nthe study was obtained from the research ethics boards\n\nof the 17 participating study sites across Canada.\n\nInformed, written consent was provided by all study\n\nparticipants.\n\nBoth landlines and cellphones within a 90-minute radius\n\nof any of the 17 study sites were dialed randomly. A\n\nTake-home Points\n\nStudy Question: How profoundly are adults with\n\nundiagnosed respiratory symptoms affected by\n\ndyspnea?\n\nResults: In community-based adults with undiag-\n\nnosed respiratory symptoms, those identi fi ed with\n\npreserved ratio impaired spirometry experienced the\n\ngreatest impact of dyspnea, followed by those with\n\nundiagnosed asthma or COPD. Greater dyspnea\n\nimpact was associated with increased health care\n\nutilization, lower quality of life, and reduced work\n\nproductivity.\n\nInterpretation: Dyspnea imposes burdens on the\n\nhealth care system and is associated with impaired\n\nquality of life and work productivity.\n\nABBREVIATIONS: ASQ = Asthma Screening Questionnaire; BD =\n\nbronchodilator; CAT = COPD Assessment Test; PCA = principal\n\ncomponent analysis; PRISm = preserved ratio impaired spirometry;\n\nSGRQ = St. George ’ s Respiratory Questionnaire\n\nAFFILIATIONS: From The Ottawa Hospital Research Institute (J. B., E.\n\nG., K. L. V., G. G. A., S. M., and S. D. A.), University of Ottawa,\n\nOttawa, ON; the Desautels Faculty of Management (G. A. W.), McGill\n\nUniversity, Montreal, QC; the Department of Medicine (C. B.), The\n\nUniversity of British Columbia, Vancouver, BC; the Centre de\n\nrecherche (L.-P. B. and A. C.), Institut de cardiologie et de pneumo-\n\nlogie de Québec, Université Laval, Quebec, QC; the Cumming School", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "exposure in an array of risky occupations. These risk\n\nfactors, taken as a whole, accounted for 21% of the\n\nvariability in dyspnea.\n\nAfter adjustment for patient-speci fi c risk factors in the\n\nfi rst stage analysis, we adjusted for spirometry-de fi ned\n\ndisease (PRISm, asthma, COPD, or normal\n\nspirometry) in Table 5 . Adjustment for disease\n\nclassi fi cation accounted for 12% of the total variability\n\nof dyspnea.\n\nTable 6 presents the contribution of lung function\n\nmeasures of physiologic impairment after accounting for\n\npatient-related risk factors and disease classi fi cation. For\n\nthe PRISm disease group, a higher post-BD FEV 1 /FVC\n\nratio and a lower post-BD FEV 1 % predicted value were\n\nassociated with greater dyspnea impact. For the COPD\n\ndisease group, a lower post-BD FEV 1 /FVC ratio was\n\nassociated with greater dyspnea impact. Reversibility of\n\nFEV 1 was associated with higher dyspnea impact only in\n\npatients with asthma or COPD. Lung function measures\n\nof disease severity accounted for 2% of the variability in\n\ndyspnea.\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nnegatively associated with all domains of quality of life,\n\nincluding physical functioning (coef fi cient, � 0.655; P < .001), role limitations due to physical health\n\n(coef fi cient, � 0.628; P < .001), general health (coef fi cient, � 0.382; P < .001), and total score (coef fi cient, � 0.473; P < .001) ( Table 7 ).\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nassociated with an increased likelihood of annual visits\n\nto health care providers for respiratory complaints (OR,\n\nTABLE 3 ] Intergroup Comparisons of Dyspnea Impact\n\nPairwise Comparison P Value\n\n| Mean Dyspnea Score (95% CI) | Mean Difference (95% CI) |\n|:---|:---|\n| 13.8 (11.8-15.7) 51.8 (50.7-52.8) 13.8 (11.8-15.7) 57.5 (55.1-59.9) 13.8 (11.8-15.7) 56.6 (53.9-59.3) 13.8 (11.8-15.7) 63.0 (59.5-66.4) 51.8 (50.7-52.8) 57.5 (55.1-59.9) 51.8 (50.7-52.8) 56.6 (53.9-59.3) 51.8 (50.7-52.8) 63.0 (59.5-66.4) 63.0 (59.5-66.4) 57.5 (55.1-59.9) 63.0 (59.5-66.4) 56.6 (53.9-59.3) 56.6 (53.9-59.3) 57.5 (55.1-59.9) | � 38.0 ( � 41.1 to � 34.9) � 43.7 ( � 47.6 to � 39.8) � 42.8 ( � 46.9 to � 38.7) � 49.2 ( � 53.7 to � 44.6) 5.7 (3.0 to 8.4) 4.8 (1.8, 7.8) 11.2 (7.5 to 14.8) 5.5 (1.1 to 9.8) 6.4 (1.9 to 10.9) 0.9 ( � 2.8 to 4.7) |\n\nControl < .001\n\nNormal spirometry\n\nControl < .001\n\nCOPD\n\nControl < .001\n\nAsthma\n\nControl < .001\n\nPRISm\n\nNormal spirometry < .001\n\nCOPD\n\nNormal spirometry .002\n\nAsthma\n\nNormal spirometry < .001\n\nPRISm\n\nPRISm .014\n\nCOPD\n\nPRISm .005\n\nAsthma\n\nAsthma .63\n\nCOPD\n\nPRISm ¼ preserved ratio impaired spirometry.\n\n**Dyspnea assessment**\n\n100\n\n80\n\n60\n\n40\n\n20\n\nNormal\n\nspirometry\n\nAsthma COPD PRISm Healthy\n\ncontrol\n\nparticipants\n\n0\n\nFigure 2 - Box plot demonstrating dyspnea impact according to\n\nspirometry disease classi fi cation. The center line marks the median. The\n\nboxes span the interquartile range (IQR). The outer fences are set at\n\ndistances 1.5 � IQR from the box. Outliers appear as plotted dots.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "1.011; P < .001 for general practitioner visits; OR, 1.015;\n\nP < .001 for emergency department visits; and OR,\n\n1.023, P ¼ .005 for hospitalization for respiratory illness) ( Table 8 ).\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nassociated with a reduced likelihood of current\n\nemployment (OR, 0.993; P < .001), increased\n\nabsenteeism (coef fi cient, 0.066; P < .001), increased\n\npresenteeism (coef fi cient, 0.349; P < .001), higher work\n\nproductivity loss (coef fi cient, 0.383; P < .001), and\n\ngreater activity impairment (coef fi cient, 0.501; P < .001),\n\nas measured by the Work Productivity and Activity Impairment questionnaire <sup>21</sup> ( Table 9 ).\n\n### Discussion\n\nOur study explored dyspnea in community-based adults\n\nwith undiagnosed respiratory symptoms identi fi ed via\n\ncase fi nding. Surprisingly, we found that the dyspnea\n\nexperienced by those with PRISm had a greater impact\n\non their activities and health status than those with\n\nnewly diagnosed COPD or asthma.\n\nThe prevalence of individuals who were obese and\n\nmorbidly obese in the PRISm group partially explains\n\nthe between-group difference in dyspnea. The excess\n\ndyspnea seen in the PRISm group when compared with\n\nthe normal spirometry group is partly explained by\n\npatient-speci fi c risk factors, including BMI, which\n\nshrink the mean dyspnea differential between the groups\n\nfrom 11.2 to 5.5 points ( Tables 3-6 ). The remaining 5.5-\n\npoint difference indicates that PRISm patients have\n\nexcess dyspnea relative to symptomatic individuals with\n\nnormal spirometry for additional reasons other than\n\nobesity.\n\nTABLE 4 ] Sequential Regression Analyses of Risk Factors Contributing to Variability in Dyspnea: Dyspnea\n\nRegressed on Patient-Speci fi c Risk Factors (20.6% of Variability Explained)\n\nRisk Factor P Value\n\n| Regression Coef fi cient |\n|:---|\n| � 0.0909 8.217 0.899 1.420 � 2.149 0.144 5.123 0.00975 10.119 4.813 6.892 1.627 3.433 1.738 0.952 4.663 1.081 2.073 8.463 |\n\nAge .005\n\nFemale < .001\n\nBMI < .001\n\nHousehold income < CAD $30,000 .40\n\nHousehold income $ CAD $30,000 .07\n\nSmoking history, pack-y < .001\n\nSmoking exposure < .001\n\nOccupational exposure < .001\n\nCongestive heart failure .004\n\nCoronary artery disease .001\n\nDepression/anxiety < .001\n\nDiabetes mellitus .22\n\nHypertension < .001\n\nAnemia .15\n\nCancer .49\n\nGERD < .001\n\nLiver disease .61\n\nRenal disease .32\n\nStroke < .001\n\nBoldface indicates statitistical signi fi cance. GERD ¼ gastroesophageal re fl ux disease.\n\nTABLE 5 ] Dyspnea Regressed on Spirometry Disease\n\nGroup\n\nDisease Group P Value\n\n| Regression Coef fi cient |\n|:---|\n| � 31.2 NA 4.6 3.8 5.5 51.9 |\n\nControl < .001\n\nNormal spirometry <sup>a</sup> NA\n\nAsthma .001\n\nCOPD .003\n\nPRISm .001\n\nConstant NA\n\nDyspnea regressed on spirometry disease group, after removing contri-\n\nbutions from subject-speci fi c factors in Table 4 (12.4% of variability\n\nexplained). Boldface indicates statitistical signi fi cance. NA ¼ not appli- cable; PRISm ¼ preserved ratio impaired spirometry. a Normal spirometry group is the reference category.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "bronchial challenge testing into a case fi nding strategy\n\nidenti fi ed asthma in 26% of symptomatic individuals\n\nwho had normal spirometry and no response to BD. <sup>27</sup>\n\nIndividuals with undiagnosed respiratory symptoms,\n\ndetermined to have asthma or COPD through spirometry, experience poor health status. <sup>28</sup> Therefore,\n\nthe implementation of known treatment approaches for\n\nasthma or COPD is important to improve their conditions. <sup>29</sup> In contrast, those with normal spirometry\n\nor PRISm face unclear treatment approaches. Long-\n\nacting BD therapy in symptomatic individuals with\n\ntobacco exposure with normal spirometry is not effective. <sup>30</sup> Weight management programs may be useful\n\nfor individuals who are obese with PRISm-related\n\ndyspnea; however, this awaits de fi nitive clinical trials. <sup>31</sup>\n\nDyspnea was severe and prevalent within our study\n\ngroup; however, it remained undiagnosed. A study conducted by Stefan et al <sup>32</sup> revealed that physicians\n\nunderestimated their patients ’ dyspnea 37.9% of the\n\ntime, whereas nurses underestimated it 3.5% of the time.\n\nMoreover, many patients limit their physical activities,\n\nwhich lead them to downplay the extent of their dyspnea. <sup>19</sup> Patient underreporting of symptoms, coupled\n\nwith inadequate physician-led investigations of\n\nsymptoms, may explain why dyspnea often goes\n\nundiagnosed in the population. <sup>33</sup>\n\nIn conclusion, our study measured dyspnea impact in\n\nindividuals with no preexisting diagnosis of lung disease\n\nwho reported respiratory symptoms as part of a\n\npurposeful case fi nding strategy. Individuals with PRISm\n\nexhibited the greatest impact of dyspnea, even higher\n\nthan those newly diagnosed with asthma or COPD.\n\nAfter adjusting for patient factors, comorbidities,\n\npulmonary diseases, and severity of lung physiologic\n\nimpairment, most of the variability in dyspnea remained\n\nunexplained. We also showed that dyspnea was\n\nassociated with increased health care utilization,\n\nimpaired quality of life, and work productivity.\n\n### Funding/Support\n\nThis study is supported by the Canadian Institutes of\n\nHealth Research [FDN Grant 154322].\n\n### Financial/Non fi nancial Disclosures\n\nNone declared.\n\n### Acknowledgments\n\nAuthor contributions: S. D. A. and G. A. W.\n\ncontributed to conception and design. J. B., E.\n\nG., G. A. W., K. L. V., and S. D. A.\n\ncontributed to analysis and interpretation. J.\n\nB., E. G., G. A. W., K. L. V., S. D. A., C. B., C.\n\nL., L.-P. B., A. C., E. P., S. K. F., S. G., R. A.\n\nM., I. M., M. B., P. H., M. D. L., M. A., C. J. L.,\n\nT. A., N. E., G. G. A., and S. M. contributed to\n\ndrafting the manuscript for important\n\nintellectual content. All authors had access to\n\nand participated in the interpretation of the\n\ndata and provided input into the preparation\n\nand submission of the manuscript. The\n\nauthors vouch for the accuracy and\n\ncompleteness of the data.\n\nRole of sponsors: The sponsor had no role in\n\nthe design of the study, the collection and\n\nanalysis of the data, or the preparation of the\n\nmanuscript.\n\nOther contributions: We thank the\n\nfollowing individuals from the Canadian\n\nstudy sites: Ottawa Hospital Research\n\nInstitute, Ottawa, Ontario: Taylor Poulin;\n\nSusan Deveau, RRT; Victoria Thompson;\n\nMeredith McCleery; Angelina Tohme; Vicky\n\nPanteleakos, RRT; Geneviève Longtin, RRT;\n\nJoanne Cassidy, RRT; Amanda Bergeron,\n\nMSc; Jennifer Biggs, RN; Jessica Bergeron;\n\nand Elisabet White; Vancouver General\n\nHospital, Vancouver, British Columbia:\n\nShelley Abercromby, BSc; Jana Caine; David\n\nSavage; Natasha Verzosa; Ravneet Mahal; and\n\nMary Justine Angeles; Queen Elizabeth II\n\nHealth Sciences Centre, Halifax, NS: Scott\n\nFulton, RRT; Hôpital du Sacré Coeur de\n\nMontréal, Montréal, QC: Simone Chaboillez,\n\nMT; and Meliza Benabdallah; St. Joseph ’ s\n\nHamilton, Hamilton, ON: Liz Johnson; St.\n\nBoniface Hospital, Winnipeg, MB: Cheryl\n\nNoble, RN; Institut Universitaire de", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "## Impact of Dyspnea on Adults With Respiratory Symptoms Without a De fi ned Diagnosis\n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD;\n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD;\n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD;\n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD;\n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD\n\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health\n\ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory\n\nsymptoms.\n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory\n\nsymptoms?\n\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were\n\nexperiencing respiratory symptoms. These individuals had not been previously diagnosed\n\nwith any lung conditions and were recruited from 17 Canadian centers using random digit\n\ndialing. Each participant underwent spirometry testing both before and after using a bron-\n\nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved\n\nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age-\n\nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A dyspnea impact assessment score from 0 to 100 was produced using questions from the\n\nCOPD Assessment Test and St. George ’ s Respiratory questionnaire.\n\nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, 63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; 95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All groups reported signi fi cantly more impactful dyspnea than the control group (mean score,\n\n13.8; 95% CI, 11.8-15.7). Patient-speci fi c risk factors including age, sex, BMI, smoking, and\n\ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the\n\nvariation was explained by disease classi fi cation and another 1.7% by the severity of lung\n\nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater\n\ndyspnea impact was associated with increased health care utilization, lower quality of life, and\n\nreduced work productivity.\n\nINTERPRETATION: Our fi ndings showed that in community-based adults with undiagnosed\n\nrespiratory symptoms, those identi fi ed with PRISm experienced the greatest impact of dys-\n\npnea. Dyspnea imposes burdens on the health care system and is associated with impaired\n\nquality of life and work productivity. CHEST 2024; 166(6):1296-1308\n\nKEY WORDS: asthma; case fi nding; COPD; dyspnea\n\nFOR EDITORIAL COMMENT, SEE PAGE 1259\n\n[ Asthma Original Research ]", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "#### Risk Factors Associated With Dyspnea\n\nPatient-related risk factors were considered fi rst, and re-\n\nsults of spirometry considered afterward. The spirom-\n\netry risk factors chosen for the second stage analysis\n\nincluded the spirometry-based diagnosis of the patient\n\n(asthma, COPD, PRISm, or normal) and lung function\n\nresults indicative of the severity of physiologic impair-\n\nment. Severity was gauged by assessing three principal\n\nlung function measures: (1) post-BD FEV 1 % predicted,\n\n(2) post-BD FEV 1 /FVC ratio, and (3) percentage\n\nreversal of FEV 1 with BD.\n\n#### Dyspnea Impact and Health Care Use, Quality of\n\nLife, and Work Productivity\n\nThe impact of dyspnea and its associations with health\n\ncare use, quality of life, and work productivity were exam-\n\nined. Health care utilization was assessed through self-\n\nreported data. Quality of life was assessed using the 36-\n\nItem Short Form Health Survey questionnaire, where\n\nhigher scores indicate better health status. Work produc-\n\ntivity was assessed using the Work Productivity and Activ-\n\nity Impairment questionnaire, where higher scores\n\nindicate greater impairment in work productivity and\n\ndaily activities.\n\n#### Statistical Analysis\n\nBox plots were used to compare distribution patterns of\n\ndyspnea impact assessments among the disease groups.\n\nPairwise comparison tests were conducted to evaluate\n\nmean dyspnea differences between groups. Multiple\n\nlinear regression analysis was used to measure contribu-\n\ntions to variability of dyspnea by selected patient-speci fi c\n\nrisk factors, spirometry disease classi fi cation, and key\n\nlung function measures. The selected sets of risk factors\n\nwere evaluated using successive regression analyses.\n\nAnalysis of variance sums of squares from the successive\n\nregression analyses provided the cumulative percentage\n\ncontributions to variability of dyspnea. Simple, multiple,\n\nand logistic regression analyses were used to study asso-\n\nciations between dyspnea and health care utilization,\n\nquality of life, and work productivity outcomes. All sta-\n\ntistical analyses were done using STATA 16 statistical\n\nsoftware (StataCorp).\n\n### Results\n\nFigure 1 illustrates the results of the case fi nding\n\napproach, including the enrollment of the control group.\n\nAmong 5,631 potentially eligible participants, 1,359\n\nparticipants (24%) did not meet the threshold of $ 6\n\npoints on the ASQ or $ 20 points on the COPD-\n\nDiagnostic Questionnaire and were thus excluded,\n\nleaving 4,272 individuals deemed eligible for spirometry.\n\n38,353 individuals indicated that they had respiratory\n\nsymptoms and were phoned back by study personnel\n\n26,905 were symptomatic\n\n11,448 had no respiratory symptoms\n\n5,631 potentially eligible for the\n\ncase finding study\n\n1,359 did not score ≥ 6\n\npoints on ASQ or ≥ 20\n\npoints on the COPD-DQ\n\n2,090 (73.2%) had normal\n\nspirometry\n\n265 (9.3%) had\n\nundiagnosed asthma\n\n330 (11.5%) had\n\nundiagnosed COPD 172 (6.0%) had PRISM\n\n21,274 excluded\n\n8,273 Previous diagnosis of asthma\n\n5,363 Previous diagnosis of COPD\n\n190 Age < 18 years\n\n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary\n\nfibrosis, or lung cancer\n\n1,331 History of MI, heart problems, stroke, aortic or cerebral\n\naneurysm, eye surgery, or detached retina in past 3 mos.\n\n19 Pregnant, in the third trimester\n\n3,715 Under care of respirologist or using an inhaled respiratory\n\n1,415 did not complete spirometry\n\n1,337 refused to travel to study site\n\n67 participants unable to complete acceptable\n\nspirometry\n\n11 participants deemed ineligible after consent\n\n4,272 potentially eligible for the\n\ncase finding study\n\n2,857 completed pre and post\n\nbronchodilator spirometry and\n\ncould be evaluated for a\n\ndiagnosis of asthma or COPD\n\n231 healthy controls with\n\nno respiratory symptoms\n\nwho scored 0 points on the\n\nASQ were selected and\n\ncompleted pre and post\n\nbronchodilator spirometry", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "complete adequate spirometry. Ultimately, 2,857 (67%)\n\nof those eligible underwent both pre- and post-BD\n\nspirometry.\n\nOf these 2,857 participants, 2,090 (73.2%) had normal\n\nspirometry, 265 (9.3%) had undiagnosed asthma, 330\n\n(11.5%) had undiagnosed COPD, and 172 (6.0%) had\n\nPRISm based on post-BD spirometry. Of the 595\n\nindividuals with spirometric evidence of asthma or\n\nCOPD, 253 were independently assessed by a\n\npulmonologist. In 245 of these 253 cases (97%), the\n\nindependent physician diagnosis agreed with the study\n\ndiagnosis of asthma or COPD.\n\nIndividuals in the COPD group were generally older\n\nand more likely to be male compared with all other\n\nstudy groups ( Table 1 ). All groups, including healthy\n\ncontrol participants, had mean BMIs in the overweight\n\nor obese ranges. The PRISm group was heaviest with an\n\naverage BMI of 34.7, and 22% of PRISm patients met\n\nBMI criteria for morbid obesity. Compared with all\n\nother groups, those with COPD were the most likely to\n\nhave active or previous tobacco use, with the highest\n\naverage total pack-years of 32.7. The control group had\n\nthe lowest number of people with active or previous\n\ntobacco use.\n\nTable 2 shows mean responses to the 15 dyspnea\n\nquestions for each disease classi fi cation and presents\n\nquestion weights (PCA scoring coef fi cients) used for\n\ncalculating the dyspnea impact assessment.\n\nIndividuals with PRISm reported the highest dyspnea\n\nimpact, with a signi fi cantly greater mean score (63.0;\n\n95% CI, 59.5-66.4) than those with undiagnosed\n\nasthma or COPD ( Table 3 ). Those with undiagnosed\n\nasthma or COPD had similar mean scores (56.6;\n\n95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9,\n\nrespectively), followed by those with normal\n\nspirometry (51.8; 95% CI, 50.7-52.8). All four groups\n\nreported signi fi cantly more impactful dyspnea than\n\nthe control group (mean score, 13.8; 95% CI, 11.8-\n\n15.7). Table 3 shows between-group differences in\n\nmean dyspnea impact assessments for each pair of\n\ndisease outcomes. Figure 2 compares box plots of the\n\ndyspnea impact assessment values across disease\n\nclassi fi cations.\n\nTable 4 presents the association of dyspnea with\n\npatient-speci fi c risk factors. Dyspnea impact increased\n\nwith younger age, being female, higher BMI, higher\n\nsmoking and smoke exposure history, and total work TABLE 2\n\n]\n\n(Continued)\n\nQuestions About Dyspnea From CAT and SGRQ\n\nControl Group (n\n\n¼\n\n231)\n\nNormal Spirometry Group (n\n\n¼\n\n2,090)\n\nAsthma Group (n\n\n¼\n\n265)\n\nCOPD Group (n\n\n¼\n\n330)\n\nPRISm Group (n\n\n¼\n\n172)\n\nQ13 (weight\n\n¼\n\n0.132)\n\nMy breathing makes it dif\n\nfi\n\ncult to do things such as climbing up hills, carrying things up stairs, light gardening such as weeding, dancing, bowling, or gol fi ng, %\n\n8\n\n54\n\n59\n\n69\n\n74\n\nQ14 (weight\n\n¼\n\n0.123)\n\nMy breathing makes it dif\n\nfi\n\ncult to do things such as carrying heavy loads, digging the garden or shoveling snow, jogging, or walking at 5 km/h, playing tennis or swimming, %\n\n13\n\n65\n\n71\n\n78\n\n81\n\nQ15 (weight\n\n¼\n\n0.108)\n\nMy breathing makes it dif\n\nfi\n\ncult to do things such as very heavy manual work, running, cycling, swimming fast, or playing competitive sports, %\n\n17\n\n74\n\n79\n\n85\n\n88 Data are presented as mean (SD) for Q1, Q2, and Q3 (total), and Q3 to Q15 were presented to participants as yes or no questions, where percentages of participants who answered yes are shown. Question weights (principal component analysis scoring coef\n\nfi cients) used for calculating the dyspnea assessment are shown below individual questions. CAT\n\n¼\n\nCOPD Assessment Test; PRISm\n\n¼\n\npreserved ratio impaired spirometry;\n\nQ\n\n¼\n\nquestion; SGRQ\n\n¼\n\nSt. George\n\n’\n\ns Respiratory Questionnaire.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed6_cc4.pdf", - "query": "What are the criterion to be control patient in the dyspnea study ?", - "target_page": 3, - "target_passage": "Control patients reported no respiratory symptoms in the preceding 6 months and obtained a score of 0 on the ASQ.", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "outpatients with cardiorespiratory disease <sup>25</sup> and the Dyspnea-12 in patients with asthma <sup>26</sup> and found that\n\nthe affective aspect of dyspnea can signi fi cantly in fl uence\n\nthe impact of dyspnea on health status, irrespective of\n\nthe intensity of breathlessness.\n\nIn those with PRISm, there was a strong, positive\n\nassociation between higher values for the FEV 1 /FVC\n\nratio and dyspnea. For the PRISm group, a higher\n\nFEV 1 /FVC ratio may re fl ect diminished lung\n\ncompliance due to interstitial lung disease and/or\n\nrespiratory system restriction due to obesity, which\n\ncould contribute to worse dyspnea. Conversely, the\n\nassociation of dyspnea with the FEV 1 /FVC ratio was in\n\nthe opposite direction for those with asthma or COPD,\n\nand a lower FEV 1 /FVC ratio correlated with worse\n\ndyspnea, as expected.\n\nOur study complements the literature by focusing on\n\nadults with undiagnosed respiratory symptoms who\n\nwere randomly selected and recruited through active\n\ncase fi nding in the community. This increases the\n\ngeneralizability of our results to a broader population.\n\nOur dyspnea questions were derived from widely used\n\nand validated respiratory health questionnaires, and\n\nour dyspnea assessment measure is a weighted average\n\nof responses to these validated questions.\n\nConsequently, the measure has an immediate\n\ninterpretation in terms of the lived day-to-day\n\nexperience of individuals.\n\nOur study has limitations. We did not undertake\n\nreliability/reproducibility testing of our questionnaire.\n\nThe dyspnea impact assessment score was statistically\n\nassociated with increased health care utilization, lower\n\nquality of life, and reduced work productivity; therefore,\n\nby virtue of this analysis, our questionnaire has\n\nconstruct validity. However, further attempts at external\n\nvalidation of the questionnaire using an independent\n\ndata set would be important. Health care utilization\n\nduring the preceding 12 months was assessed on entry\n\ninto the study, and there is potential for impaired recall\n\nof events. Our study may have missed asthma in some\n\nparticipants because bronchial challenge testing was not\n\nconducted on those who tested negative for air fl ow\n\nobstruction or BD responsiveness. A previous study\n\nshowed that an additional diagnostic step incorporating\n\nTABLE 8 ] Unadjusted and Adjusted Dyspnea Associations With Health Care Use\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea OR (95% CI) P Value Dyspnea OR (95% CI) P Value\n\nIn the past 12 mo, did you visit your general\n\npractitioner or a nurse practitioner or another\n\nphysician at a walk-in clinic for any breathing\n\nproblems?\n\n1.011 (1.007-1.014) < .001 1.011 (1.007-1.014) < .001\n\nIn the past 12 mo, did you visit an emergency\n\ndepartment for any breathing problems?\n\n1.015 (1.009-1.021) < .001 1.015 (1.009-1.022) < .001\n\nIn the past 12 mo, were you hospitalized for any\n\nbreathing problems or respiratory illness?\n\n1.021 (1.006-1.037) .006 1.023 (1.007-1.039) .005\n\nData are presented as OR (95% CI) with P values. Adjusted values are adjusted for age, sex, and BMI.\n\nTABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea OR (95% CI) P Value Dyspnea OR (95% CI) P Value\n\nAre you currently employed\n\n(working for pay)?\n\n0.995 (0.992-0.998) .002 0.993 (0.990-0.997) < .001\n\nMeasure <sup>a</sup> Dyspnea Coef fi cient\n\n(95% CI) P Value\n\nDyspnea Coef fi cient\n\n(95% CI) P Value\n\nAbsenteeism 0.061 (0.040-0.083) < .001 0.066 (0.044-0.089) < .001\n\nPresenteeism 0.334 (0.293-0.375) < .001 0.349 (0.306-0.392) < .001\n\nWork productivity loss 0.368 (0.323-0.413) < .001 0.383 (0.336-0.430) < .001\n\nActivity impairment 0.503 (0.463-0.544) < .001 0.501 (0.458-0.544) < .001\n\nORs and regression coef fi cients are presented with 95% CIs and P values. Adjusted coef fi cients are adjusted for age, sex, and BMI. WPAI ¼ Work Pro- ductivity and Activity Impairment questionnaire.\n\na Measures calculated from WPAI questions. 21", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Approximately 65% of the variability in dyspnea\n\nremained unexplained by the factors examined in our\n\nstudy. Most individuals in our study showed normal\n\nspirometry results but still carried a substantial\n\nburden of dyspnea, an inconsistency that needs\n\nexplanation. Several factors not included in our\n\nanalysis may have contributed to the unexplained\n\nvariation. Environmental factors (eg, air pollution,\n\nallergen exposure, seasonal variations in symptoms)\n\nare potential contributors to this unexplained variability. <sup>22</sup> Genetic predispositions could also play a\n\nsigni fi cant role, as suggested by a study that revealed\n\nthat parents with dyspnea were 1.8 times more likely to have offspring with dyspnea. <sup>23</sup> Additionally, fi tness\n\ncould be a contributing factor, especially in\n\nindividuals with undiagnosed PRISm, asthma, or\n\nCOPD who may restrict their activities to avoid\n\ndyspnea, and hence become deconditioned. <sup>6</sup>\n\nThere were signi fi cant but modest differences in mean\n\ndyspnea levels across the 17 study sites (data not\n\nshown), which are not explained by the risk factors we\n\naccounted for in our study. This fi nding is not surprising\n\nbecause some of the potential contributing factors\n\npreviously mentioned and other site-speci fi c factors\n\n(eg, climate, air quality/industrialization, socioeconomic\n\nstatus) of the catchment population tend to vary across\n\nstudy sites.\n\nDyspnea is a complex, subjective symptom that is\n\nmodi fi ed by nonrespiratory factors including\n\npsychosocial, social, and environmental in fl uences. <sup>5</sup>\n\nInterindividual variability in the perception of dyspnea,\n\nin fl uenced by these nonrespiratory factors, may play an\n\nimportant role. A study conducted by Ziegler et al <sup>24</sup>\n\nassessed the perception of dyspnea in 42 healthy\n\nindividuals using a standardized inspiratory resistive\n\nloading stimulus. The study used the modi fi ed Borg\n\nscale to measure dyspnea perception levels. Among the\n\nparticipants subjected to the same inspiratory resistive\n\nload, 31%, 45%, and 24% of participants classi fi ed their\n\nlevel of dyspnea as low, intermediate, and high,\n\nrespectively. The study revealed that differences between\n\nindividuals contribute considerable variability to the\n\nperception of dyspnea, even among healthy participants.\n\nThe affective dimension of dyspnea can be captured\n\nusing additional questionnaires (eg, Multidimensional\n\nDyspnea Pro fi le, Dyspnea-12). Studies have explored the\n\nuse of the Multidimensional Dyspnea Pro fi le in\n\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment\n\nDisease Group Overall P Value\n\n| Reversibility of FEV 1 , % | Post-BD FEV 1 /FVC Ratio | Post-BD FEV 1 % predicted |\n|:---|:---|:---|\n| � 0.163 ( P ¼ .47) 0.186 ( P ¼ .16) 0.545 (P [ .01) 0.392 (P [ .002) � 0.290 ( P ¼ .39) | � 0.274 (P [ .05) 0.240 (P [ .005) 0.107 ( P ¼ .58) � 0.307 (P [ .05) 0.854 (P [ .002) | � 0.090 ( P ¼ .17) � 0.131 (P < .001) � 0.158 ( P ¼ .08) � 0.075 ( P ¼ .37) � 0.650 (P [ .004) |\n\nControl .096\n\nNormal spirometry < .001\n\nAsthma .009\n\nCOPD < .001\n\nPRISm < .001\n\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-speci fi c factors and spirometry\n\ndisease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical signi fi cance. BD ¼ bronchodilator; PRISm ¼ preserved ratio impaired spirometry.\n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea Coef fi cient (95% CI) P Value Dyspnea Coef fi cient (95% CI) P Value", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Dyspnea refers to a subjective sensation of breathing discomfort. <sup>1</sup> In a study involving a community-based\n\npopulation aged > 70 years, the prevalence of dyspnea was found to be 32%. <sup>2</sup> Dyspnea can lead to limitations in\n\ndaily activities, reduced exercise tolerance, and\n\nheightened mortality risks. <sup>3</sup>\n\nDyspnea not only affects individuals with diagnosed\n\nrespiratory conditions but also poses a signi fi cant\n\nburden on those with undiagnosed conditions. In a systematic review by Müller et al, <sup>4</sup> the combined\n\nprevalence of dyspnea in the adult general population\n\nacross 11 studies was estimated to be 10%. Dyspnea can\n\narise from a broad spectrum of underlying factors,\n\nincluding both respiratory and nonrespiratory\n\nconditions. Studies have revealed that dyspnea is not\n\nsolely attributable to respiratory conditions but is also\n\nheavily in fl uenced by cardiovascular deconditioning and\n\nby nonrespiratory factors, including psychosocial, social,\n\nand environmental determinants. <sup>5</sup> <sup>,</sup> <sup>6</sup>\n\nDyspnea is a prevalent symptom with consequences that\n\nextend beyond its physiologic implications. A study in\n\nEuropean patients with COPD explored the burden of\n\ndyspnea and identi fi ed potential correlates. The study\n\nrevealed that higher dyspnea impact correlated with\n\nlower health-related quality of life, increased work\n\nimpairment, and a higher frequency of emergency\n\ndepartment visits. <sup>7</sup>\n\nThe three objectives of our study were as follows: (1) to\n\nevaluate the impact of dyspnea in adults from the\n\ngeneral population who had no prior diagnosis of\n\nrespiratory disease but who reported having signi fi cant\n\nrespiratory symptoms in the past 6 months; (2) to\n\nidentify associated risk factors for dyspnea and estimate\n\ntheir in fl uence on the symptom; and (3) to explore the\n\nrelationship between dyspnea and health care utilization,\n\nquality of life, and work productivity in adults with\n\nundiagnosed respiratory symptoms.\n\n### Study Design and Methods\n\n#### Recruitment of Undiagnosed Cases and Healthy\n\nControl Patients\n\nBetween June 2017 and January 2023, adults aged $ 18\n\nyears were recruited through a two-step process into the\n\nUndiagnosed COPD and Asthma Population (UCAP) study, a multicenter case fi nding study. Approval for\n\nthe study was obtained from the research ethics boards\n\nof the 17 participating study sites across Canada.\n\nInformed, written consent was provided by all study\n\nparticipants.\n\nBoth landlines and cellphones within a 90-minute radius\n\nof any of the 17 study sites were dialed randomly. A\n\nTake-home Points\n\nStudy Question: How profoundly are adults with\n\nundiagnosed respiratory symptoms affected by\n\ndyspnea?\n\nResults: In community-based adults with undiag-\n\nnosed respiratory symptoms, those identi fi ed with\n\npreserved ratio impaired spirometry experienced the\n\ngreatest impact of dyspnea, followed by those with\n\nundiagnosed asthma or COPD. Greater dyspnea\n\nimpact was associated with increased health care\n\nutilization, lower quality of life, and reduced work\n\nproductivity.\n\nInterpretation: Dyspnea imposes burdens on the\n\nhealth care system and is associated with impaired\n\nquality of life and work productivity.\n\nABBREVIATIONS: ASQ = Asthma Screening Questionnaire; BD =\n\nbronchodilator; CAT = COPD Assessment Test; PCA = principal\n\ncomponent analysis; PRISm = preserved ratio impaired spirometry;\n\nSGRQ = St. George ’ s Respiratory Questionnaire\n\nAFFILIATIONS: From The Ottawa Hospital Research Institute (J. B., E.\n\nG., K. L. V., G. G. A., S. M., and S. D. A.), University of Ottawa,\n\nOttawa, ON; the Desautels Faculty of Management (G. A. W.), McGill\n\nUniversity, Montreal, QC; the Department of Medicine (C. B.), The\n\nUniversity of British Columbia, Vancouver, BC; the Centre de\n\nrecherche (L.-P. B. and A. C.), Institut de cardiologie et de pneumo-\n\nlogie de Québec, Université Laval, Quebec, QC; the Cumming School", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "spirometry.\n\n#### Assessment of the Impact of Participants ’ Dyspnea\n\nAlthough neither the CAT nor the SGRQ are dyspnea-\n\nspeci fi c tools, both are recommended by the Global Initia-\n\ntive for Chronic Obstructive Lung Disease to evaluate symptoms, including dyspnea, <sup>20</sup> and both yield a richer\n\nassessment of dyspnea than the modi fi ed Medical Research Council breathlessness scale. <sup>20</sup> Fifteen questions\n\nwere taken from the CAT and SGRQ questionnaires that\n\nreferred to individuals ’ experiences with dyspnea, and a\n\ncomposite measure of dyspnea impact using a weighted\n\nsum of the responses to the 15 questions was constructed.\n\nQuestions were coded so that larger values indicate more\n\nimpactful dyspnea. Weights used for question responses\n\nin calculating the dyspnea impact assessment measure\n\nwere those of the fi rst component of a principal compo-\n\nnent analysis (PCA) based on the covariance matrix of\n\nquestion responses. Questions with multiple responses\n\nand ordinal structure are individually more informative\n\nand thus were accorded higher weight than individual\n\ntrue-false questions. No additional PCA component was\n\nanticipated a priori to be material for our investigation,\n\nand an eigenvalue analysis of the PCA was conducted to\n\nverify this assumption.\n\nThe composite dyspnea impact measure was scaled so its\n\nminimum value was 0 if the response to each of the 15\n\nquestions was 0, and the maximum value was scaled to\n\n100 if the individual responses for all 15 questions rep-\n\nresented the most severe dyspnea response.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "bronchial challenge testing into a case fi nding strategy\n\nidenti fi ed asthma in 26% of symptomatic individuals\n\nwho had normal spirometry and no response to BD. <sup>27</sup>\n\nIndividuals with undiagnosed respiratory symptoms,\n\ndetermined to have asthma or COPD through spirometry, experience poor health status. <sup>28</sup> Therefore,\n\nthe implementation of known treatment approaches for\n\nasthma or COPD is important to improve their conditions. <sup>29</sup> In contrast, those with normal spirometry\n\nor PRISm face unclear treatment approaches. Long-\n\nacting BD therapy in symptomatic individuals with\n\ntobacco exposure with normal spirometry is not effective. <sup>30</sup> Weight management programs may be useful\n\nfor individuals who are obese with PRISm-related\n\ndyspnea; however, this awaits de fi nitive clinical trials. <sup>31</sup>\n\nDyspnea was severe and prevalent within our study\n\ngroup; however, it remained undiagnosed. A study conducted by Stefan et al <sup>32</sup> revealed that physicians\n\nunderestimated their patients ’ dyspnea 37.9% of the\n\ntime, whereas nurses underestimated it 3.5% of the time.\n\nMoreover, many patients limit their physical activities,\n\nwhich lead them to downplay the extent of their dyspnea. <sup>19</sup> Patient underreporting of symptoms, coupled\n\nwith inadequate physician-led investigations of\n\nsymptoms, may explain why dyspnea often goes\n\nundiagnosed in the population. <sup>33</sup>\n\nIn conclusion, our study measured dyspnea impact in\n\nindividuals with no preexisting diagnosis of lung disease\n\nwho reported respiratory symptoms as part of a\n\npurposeful case fi nding strategy. Individuals with PRISm\n\nexhibited the greatest impact of dyspnea, even higher\n\nthan those newly diagnosed with asthma or COPD.\n\nAfter adjusting for patient factors, comorbidities,\n\npulmonary diseases, and severity of lung physiologic\n\nimpairment, most of the variability in dyspnea remained\n\nunexplained. We also showed that dyspnea was\n\nassociated with increased health care utilization,\n\nimpaired quality of life, and work productivity.\n\n### Funding/Support\n\nThis study is supported by the Canadian Institutes of\n\nHealth Research [FDN Grant 154322].\n\n### Financial/Non fi nancial Disclosures\n\nNone declared.\n\n### Acknowledgments\n\nAuthor contributions: S. D. A. and G. A. W.\n\ncontributed to conception and design. J. B., E.\n\nG., G. A. W., K. L. V., and S. D. A.\n\ncontributed to analysis and interpretation. J.\n\nB., E. G., G. A. W., K. L. V., S. D. A., C. B., C.\n\nL., L.-P. B., A. C., E. P., S. K. F., S. G., R. A.\n\nM., I. M., M. B., P. H., M. D. L., M. A., C. J. L.,\n\nT. A., N. E., G. G. A., and S. M. contributed to\n\ndrafting the manuscript for important\n\nintellectual content. All authors had access to\n\nand participated in the interpretation of the\n\ndata and provided input into the preparation\n\nand submission of the manuscript. The\n\nauthors vouch for the accuracy and\n\ncompleteness of the data.\n\nRole of sponsors: The sponsor had no role in\n\nthe design of the study, the collection and\n\nanalysis of the data, or the preparation of the\n\nmanuscript.\n\nOther contributions: We thank the\n\nfollowing individuals from the Canadian\n\nstudy sites: Ottawa Hospital Research\n\nInstitute, Ottawa, Ontario: Taylor Poulin;\n\nSusan Deveau, RRT; Victoria Thompson;\n\nMeredith McCleery; Angelina Tohme; Vicky\n\nPanteleakos, RRT; Geneviève Longtin, RRT;\n\nJoanne Cassidy, RRT; Amanda Bergeron,\n\nMSc; Jennifer Biggs, RN; Jessica Bergeron;\n\nand Elisabet White; Vancouver General\n\nHospital, Vancouver, British Columbia:\n\nShelley Abercromby, BSc; Jana Caine; David\n\nSavage; Natasha Verzosa; Ravneet Mahal; and\n\nMary Justine Angeles; Queen Elizabeth II\n\nHealth Sciences Centre, Halifax, NS: Scott\n\nFulton, RRT; Hôpital du Sacré Coeur de\n\nMontréal, Montréal, QC: Simone Chaboillez,\n\nMT; and Meliza Benabdallah; St. Joseph ’ s\n\nHamilton, Hamilton, ON: Liz Johnson; St.\n\nBoniface Hospital, Winnipeg, MB: Cheryl\n\nNoble, RN; Institut Universitaire de", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "exposure in an array of risky occupations. These risk\n\nfactors, taken as a whole, accounted for 21% of the\n\nvariability in dyspnea.\n\nAfter adjustment for patient-speci fi c risk factors in the\n\nfi rst stage analysis, we adjusted for spirometry-de fi ned\n\ndisease (PRISm, asthma, COPD, or normal\n\nspirometry) in Table 5 . Adjustment for disease\n\nclassi fi cation accounted for 12% of the total variability\n\nof dyspnea.\n\nTable 6 presents the contribution of lung function\n\nmeasures of physiologic impairment after accounting for\n\npatient-related risk factors and disease classi fi cation. For\n\nthe PRISm disease group, a higher post-BD FEV 1 /FVC\n\nratio and a lower post-BD FEV 1 % predicted value were\n\nassociated with greater dyspnea impact. For the COPD\n\ndisease group, a lower post-BD FEV 1 /FVC ratio was\n\nassociated with greater dyspnea impact. Reversibility of\n\nFEV 1 was associated with higher dyspnea impact only in\n\npatients with asthma or COPD. Lung function measures\n\nof disease severity accounted for 2% of the variability in\n\ndyspnea.\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nnegatively associated with all domains of quality of life,\n\nincluding physical functioning (coef fi cient, � 0.655; P < .001), role limitations due to physical health\n\n(coef fi cient, � 0.628; P < .001), general health (coef fi cient, � 0.382; P < .001), and total score (coef fi cient, � 0.473; P < .001) ( Table 7 ).\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nassociated with an increased likelihood of annual visits\n\nto health care providers for respiratory complaints (OR,\n\nTABLE 3 ] Intergroup Comparisons of Dyspnea Impact\n\nPairwise Comparison P Value\n\n| Mean Dyspnea Score (95% CI) | Mean Difference (95% CI) |\n|:---|:---|\n| 13.8 (11.8-15.7) 51.8 (50.7-52.8) 13.8 (11.8-15.7) 57.5 (55.1-59.9) 13.8 (11.8-15.7) 56.6 (53.9-59.3) 13.8 (11.8-15.7) 63.0 (59.5-66.4) 51.8 (50.7-52.8) 57.5 (55.1-59.9) 51.8 (50.7-52.8) 56.6 (53.9-59.3) 51.8 (50.7-52.8) 63.0 (59.5-66.4) 63.0 (59.5-66.4) 57.5 (55.1-59.9) 63.0 (59.5-66.4) 56.6 (53.9-59.3) 56.6 (53.9-59.3) 57.5 (55.1-59.9) | � 38.0 ( � 41.1 to � 34.9) � 43.7 ( � 47.6 to � 39.8) � 42.8 ( � 46.9 to � 38.7) � 49.2 ( � 53.7 to � 44.6) 5.7 (3.0 to 8.4) 4.8 (1.8, 7.8) 11.2 (7.5 to 14.8) 5.5 (1.1 to 9.8) 6.4 (1.9 to 10.9) 0.9 ( � 2.8 to 4.7) |\n\nControl < .001\n\nNormal spirometry\n\nControl < .001\n\nCOPD\n\nControl < .001\n\nAsthma\n\nControl < .001\n\nPRISm\n\nNormal spirometry < .001\n\nCOPD\n\nNormal spirometry .002\n\nAsthma\n\nNormal spirometry < .001\n\nPRISm\n\nPRISm .014\n\nCOPD\n\nPRISm .005\n\nAsthma\n\nAsthma .63\n\nCOPD\n\nPRISm ¼ preserved ratio impaired spirometry.\n\n**Dyspnea assessment**\n\n100\n\n80\n\n60\n\n40\n\n20\n\nNormal\n\nspirometry\n\nAsthma COPD PRISm Healthy\n\ncontrol\n\nparticipants\n\n0\n\nFigure 2 - Box plot demonstrating dyspnea impact according to\n\nspirometry disease classi fi cation. The center line marks the median. The\n\nboxes span the interquartile range (IQR). The outer fences are set at\n\ndistances 1.5 � IQR from the box. Outliers appear as plotted dots.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "1.011; P < .001 for general practitioner visits; OR, 1.015;\n\nP < .001 for emergency department visits; and OR,\n\n1.023, P ¼ .005 for hospitalization for respiratory illness) ( Table 8 ).\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nassociated with a reduced likelihood of current\n\nemployment (OR, 0.993; P < .001), increased\n\nabsenteeism (coef fi cient, 0.066; P < .001), increased\n\npresenteeism (coef fi cient, 0.349; P < .001), higher work\n\nproductivity loss (coef fi cient, 0.383; P < .001), and\n\ngreater activity impairment (coef fi cient, 0.501; P < .001),\n\nas measured by the Work Productivity and Activity Impairment questionnaire <sup>21</sup> ( Table 9 ).\n\n### Discussion\n\nOur study explored dyspnea in community-based adults\n\nwith undiagnosed respiratory symptoms identi fi ed via\n\ncase fi nding. Surprisingly, we found that the dyspnea\n\nexperienced by those with PRISm had a greater impact\n\non their activities and health status than those with\n\nnewly diagnosed COPD or asthma.\n\nThe prevalence of individuals who were obese and\n\nmorbidly obese in the PRISm group partially explains\n\nthe between-group difference in dyspnea. The excess\n\ndyspnea seen in the PRISm group when compared with\n\nthe normal spirometry group is partly explained by\n\npatient-speci fi c risk factors, including BMI, which\n\nshrink the mean dyspnea differential between the groups\n\nfrom 11.2 to 5.5 points ( Tables 3-6 ). The remaining 5.5-\n\npoint difference indicates that PRISm patients have\n\nexcess dyspnea relative to symptomatic individuals with\n\nnormal spirometry for additional reasons other than\n\nobesity.\n\nTABLE 4 ] Sequential Regression Analyses of Risk Factors Contributing to Variability in Dyspnea: Dyspnea\n\nRegressed on Patient-Speci fi c Risk Factors (20.6% of Variability Explained)\n\nRisk Factor P Value\n\n| Regression Coef fi cient |\n|:---|\n| � 0.0909 8.217 0.899 1.420 � 2.149 0.144 5.123 0.00975 10.119 4.813 6.892 1.627 3.433 1.738 0.952 4.663 1.081 2.073 8.463 |\n\nAge .005\n\nFemale < .001\n\nBMI < .001\n\nHousehold income < CAD $30,000 .40\n\nHousehold income $ CAD $30,000 .07\n\nSmoking history, pack-y < .001\n\nSmoking exposure < .001\n\nOccupational exposure < .001\n\nCongestive heart failure .004\n\nCoronary artery disease .001\n\nDepression/anxiety < .001\n\nDiabetes mellitus .22\n\nHypertension < .001\n\nAnemia .15\n\nCancer .49\n\nGERD < .001\n\nLiver disease .61\n\nRenal disease .32\n\nStroke < .001\n\nBoldface indicates statitistical signi fi cance. GERD ¼ gastroesophageal re fl ux disease.\n\nTABLE 5 ] Dyspnea Regressed on Spirometry Disease\n\nGroup\n\nDisease Group P Value\n\n| Regression Coef fi cient |\n|:---|\n| � 31.2 NA 4.6 3.8 5.5 51.9 |\n\nControl < .001\n\nNormal spirometry <sup>a</sup> NA\n\nAsthma .001\n\nCOPD .003\n\nPRISm .001\n\nConstant NA\n\nDyspnea regressed on spirometry disease group, after removing contri-\n\nbutions from subject-speci fi c factors in Table 4 (12.4% of variability\n\nexplained). Boldface indicates statitistical signi fi cance. NA ¼ not appli- cable; PRISm ¼ preserved ratio impaired spirometry. a Normal spirometry group is the reference category.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "#### Risk Factors Associated With Dyspnea\n\nPatient-related risk factors were considered fi rst, and re-\n\nsults of spirometry considered afterward. The spirom-\n\netry risk factors chosen for the second stage analysis\n\nincluded the spirometry-based diagnosis of the patient\n\n(asthma, COPD, PRISm, or normal) and lung function\n\nresults indicative of the severity of physiologic impair-\n\nment. Severity was gauged by assessing three principal\n\nlung function measures: (1) post-BD FEV 1 % predicted,\n\n(2) post-BD FEV 1 /FVC ratio, and (3) percentage\n\nreversal of FEV 1 with BD.\n\n#### Dyspnea Impact and Health Care Use, Quality of\n\nLife, and Work Productivity\n\nThe impact of dyspnea and its associations with health\n\ncare use, quality of life, and work productivity were exam-\n\nined. Health care utilization was assessed through self-\n\nreported data. Quality of life was assessed using the 36-\n\nItem Short Form Health Survey questionnaire, where\n\nhigher scores indicate better health status. Work produc-\n\ntivity was assessed using the Work Productivity and Activ-\n\nity Impairment questionnaire, where higher scores\n\nindicate greater impairment in work productivity and\n\ndaily activities.\n\n#### Statistical Analysis\n\nBox plots were used to compare distribution patterns of\n\ndyspnea impact assessments among the disease groups.\n\nPairwise comparison tests were conducted to evaluate\n\nmean dyspnea differences between groups. Multiple\n\nlinear regression analysis was used to measure contribu-\n\ntions to variability of dyspnea by selected patient-speci fi c\n\nrisk factors, spirometry disease classi fi cation, and key\n\nlung function measures. The selected sets of risk factors\n\nwere evaluated using successive regression analyses.\n\nAnalysis of variance sums of squares from the successive\n\nregression analyses provided the cumulative percentage\n\ncontributions to variability of dyspnea. Simple, multiple,\n\nand logistic regression analyses were used to study asso-\n\nciations between dyspnea and health care utilization,\n\nquality of life, and work productivity outcomes. All sta-\n\ntistical analyses were done using STATA 16 statistical\n\nsoftware (StataCorp).\n\n### Results\n\nFigure 1 illustrates the results of the case fi nding\n\napproach, including the enrollment of the control group.\n\nAmong 5,631 potentially eligible participants, 1,359\n\nparticipants (24%) did not meet the threshold of $ 6\n\npoints on the ASQ or $ 20 points on the COPD-\n\nDiagnostic Questionnaire and were thus excluded,\n\nleaving 4,272 individuals deemed eligible for spirometry.\n\n38,353 individuals indicated that they had respiratory\n\nsymptoms and were phoned back by study personnel\n\n26,905 were symptomatic\n\n11,448 had no respiratory symptoms\n\n5,631 potentially eligible for the\n\ncase finding study\n\n1,359 did not score ≥ 6\n\npoints on ASQ or ≥ 20\n\npoints on the COPD-DQ\n\n2,090 (73.2%) had normal\n\nspirometry\n\n265 (9.3%) had\n\nundiagnosed asthma\n\n330 (11.5%) had\n\nundiagnosed COPD 172 (6.0%) had PRISM\n\n21,274 excluded\n\n8,273 Previous diagnosis of asthma\n\n5,363 Previous diagnosis of COPD\n\n190 Age < 18 years\n\n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary\n\nfibrosis, or lung cancer\n\n1,331 History of MI, heart problems, stroke, aortic or cerebral\n\naneurysm, eye surgery, or detached retina in past 3 mos.\n\n19 Pregnant, in the third trimester\n\n3,715 Under care of respirologist or using an inhaled respiratory\n\n1,415 did not complete spirometry\n\n1,337 refused to travel to study site\n\n67 participants unable to complete acceptable\n\nspirometry\n\n11 participants deemed ineligible after consent\n\n4,272 potentially eligible for the\n\ncase finding study\n\n2,857 completed pre and post\n\nbronchodilator spirometry and\n\ncould be evaluated for a\n\ndiagnosis of asthma or COPD\n\n231 healthy controls with\n\nno respiratory symptoms\n\nwho scored 0 points on the\n\nASQ were selected and\n\ncompleted pre and post\n\nbronchodilator spirometry", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "complete adequate spirometry. Ultimately, 2,857 (67%)\n\nof those eligible underwent both pre- and post-BD\n\nspirometry.\n\nOf these 2,857 participants, 2,090 (73.2%) had normal\n\nspirometry, 265 (9.3%) had undiagnosed asthma, 330\n\n(11.5%) had undiagnosed COPD, and 172 (6.0%) had\n\nPRISm based on post-BD spirometry. Of the 595\n\nindividuals with spirometric evidence of asthma or\n\nCOPD, 253 were independently assessed by a\n\npulmonologist. In 245 of these 253 cases (97%), the\n\nindependent physician diagnosis agreed with the study\n\ndiagnosis of asthma or COPD.\n\nIndividuals in the COPD group were generally older\n\nand more likely to be male compared with all other\n\nstudy groups ( Table 1 ). All groups, including healthy\n\ncontrol participants, had mean BMIs in the overweight\n\nor obese ranges. The PRISm group was heaviest with an\n\naverage BMI of 34.7, and 22% of PRISm patients met\n\nBMI criteria for morbid obesity. Compared with all\n\nother groups, those with COPD were the most likely to\n\nhave active or previous tobacco use, with the highest\n\naverage total pack-years of 32.7. The control group had\n\nthe lowest number of people with active or previous\n\ntobacco use.\n\nTable 2 shows mean responses to the 15 dyspnea\n\nquestions for each disease classi fi cation and presents\n\nquestion weights (PCA scoring coef fi cients) used for\n\ncalculating the dyspnea impact assessment.\n\nIndividuals with PRISm reported the highest dyspnea\n\nimpact, with a signi fi cantly greater mean score (63.0;\n\n95% CI, 59.5-66.4) than those with undiagnosed\n\nasthma or COPD ( Table 3 ). Those with undiagnosed\n\nasthma or COPD had similar mean scores (56.6;\n\n95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9,\n\nrespectively), followed by those with normal\n\nspirometry (51.8; 95% CI, 50.7-52.8). All four groups\n\nreported signi fi cantly more impactful dyspnea than\n\nthe control group (mean score, 13.8; 95% CI, 11.8-\n\n15.7). Table 3 shows between-group differences in\n\nmean dyspnea impact assessments for each pair of\n\ndisease outcomes. Figure 2 compares box plots of the\n\ndyspnea impact assessment values across disease\n\nclassi fi cations.\n\nTable 4 presents the association of dyspnea with\n\npatient-speci fi c risk factors. Dyspnea impact increased\n\nwith younger age, being female, higher BMI, higher\n\nsmoking and smoke exposure history, and total work TABLE 2\n\n]\n\n(Continued)\n\nQuestions About Dyspnea From CAT and SGRQ\n\nControl Group (n\n\n¼\n\n231)\n\nNormal Spirometry Group (n\n\n¼\n\n2,090)\n\nAsthma Group (n\n\n¼\n\n265)\n\nCOPD Group (n\n\n¼\n\n330)\n\nPRISm Group (n\n\n¼\n\n172)\n\nQ13 (weight\n\n¼\n\n0.132)\n\nMy breathing makes it dif\n\nfi\n\ncult to do things such as climbing up hills, carrying things up stairs, light gardening such as weeding, dancing, bowling, or gol fi ng, %\n\n8\n\n54\n\n59\n\n69\n\n74\n\nQ14 (weight\n\n¼\n\n0.123)\n\nMy breathing makes it dif\n\nfi\n\ncult to do things such as carrying heavy loads, digging the garden or shoveling snow, jogging, or walking at 5 km/h, playing tennis or swimming, %\n\n13\n\n65\n\n71\n\n78\n\n81\n\nQ15 (weight\n\n¼\n\n0.108)\n\nMy breathing makes it dif\n\nfi\n\ncult to do things such as very heavy manual work, running, cycling, swimming fast, or playing competitive sports, %\n\n17\n\n74\n\n79\n\n85\n\n88 Data are presented as mean (SD) for Q1, Q2, and Q3 (total), and Q3 to Q15 were presented to participants as yes or no questions, where percentages of participants who answered yes are shown. Question weights (principal component analysis scoring coef\n\nfi cients) used for calculating the dyspnea assessment are shown below individual questions. CAT\n\n¼\n\nCOPD Assessment Test; PRISm\n\n¼\n\npreserved ratio impaired spirometry;\n\nQ\n\n¼\n\nquestion; SGRQ\n\n¼\n\nSt. George\n\n’\n\ns Respiratory Questionnaire.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "## Impact of Dyspnea on Adults With Respiratory Symptoms Without a De fi ned Diagnosis\n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD;\n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD;\n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD;\n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD;\n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD\n\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health\n\ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory\n\nsymptoms.\n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory\n\nsymptoms?\n\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were\n\nexperiencing respiratory symptoms. These individuals had not been previously diagnosed\n\nwith any lung conditions and were recruited from 17 Canadian centers using random digit\n\ndialing. Each participant underwent spirometry testing both before and after using a bron-\n\nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved\n\nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age-\n\nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A dyspnea impact assessment score from 0 to 100 was produced using questions from the\n\nCOPD Assessment Test and St. George ’ s Respiratory questionnaire.\n\nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, 63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; 95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All groups reported signi fi cantly more impactful dyspnea than the control group (mean score,\n\n13.8; 95% CI, 11.8-15.7). Patient-speci fi c risk factors including age, sex, BMI, smoking, and\n\ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the\n\nvariation was explained by disease classi fi cation and another 1.7% by the severity of lung\n\nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater\n\ndyspnea impact was associated with increased health care utilization, lower quality of life, and\n\nreduced work productivity.\n\nINTERPRETATION: Our fi ndings showed that in community-based adults with undiagnosed\n\nrespiratory symptoms, those identi fi ed with PRISm experienced the greatest impact of dys-\n\npnea. Dyspnea imposes burdens on the health care system and is associated with impaired\n\nquality of life and work productivity. CHEST 2024; 166(6):1296-1308\n\nKEY WORDS: asthma; case fi nding; COPD; dyspnea\n\nFOR EDITORIAL COMMENT, SEE PAGE 1259\n\n[ Asthma Original Research ]", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RSG_2004.pdf", - "query": "What is the revenue of Republic Services in 2002 ?", - "target_page": 2, - "target_passage": " $ 2,365.1", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS** We also use significant judgment in the following areas:\n\n- determining cash generating units and the allocation of goodwill for\n\nthe purpose of impairment testing (see note 13)\n\n- choosing methods for depreciating our property, plant, and\n\nequipment that we believe most accurately represent the\n\nconsumption of benefits derived from those assets and are more\n\nrepresentative of the economic substance of the use of the\n\nunderlying assets (see *Property, Plant and Equipment* , below)\n\n- deciding to designate our spectrum licences as assets with indefinite\n\nuseful lives since we believe they are likely to be renewed for the\n\nforeseeable future (see *Goodwill and Intangible assets* , below)\n\n- interpreting tax rules and regulations when we calculate income\n\ntaxes (see note 27), and\n\n- determining the probability of loss when we assess contingent\n\nliabilities (see note 27).\n\n####### **Revenue Recognition**\n\nWe recognize revenue when we can estimate its amount and are reasonably assured that we can collect it. Revenue is recorded net of discounts.\n\n####### **Source of revenue How we recognize it**\n\nMonthly subscriber fees for wireless, cable, telephony and Internet\n\nservices, rental of equipment, network services and media subscriptions\n\n- Record revenue as the service is provided\n\nRevenue from airtime, data services, roaming, long-distance and optional\n\nservices, pay-per-use services and other sales of products\n\n- Record revenue as the services or products are delivered\n\nRevenue from the sale of wireless and cable equipment - Record revenue when the equipment is delivered and accepted by\n\nthe independent dealer or subscriber in direct sales\n\nEquipment subsidies related to providing equipment to new and existing\n\nsubscribers\n\n- Record a reduction of equipment revenues when the equipment is\n\nactivated\n\nInstallation fees charged to subscribers in Cable - These fees do not meet the criteria as a separate unit of accounting\n\n- We defer and amortize these fees over the related service period,\n\nwhich is approximately three years\n\n- In Business Solutions we defer and amortize fees over the length of\n\nthe customer contract\n\nActivation fees charged to subscribers in Wireless - These fees do not meet the criteria as a separate unit of accounting\n\n- We record these fees as part of equipment revenue\n\nAdvertising revenue - Record revenue in the period the advertising airs on our radio or\n\ntelevision stations, is featured in our publications or displayed on our\n\ndigital properties\n\nMonthly subscription revenues received by television stations for\n\nsubscriptions from cable and satellite providers\n\n- Record revenue in the month the services are delivered to cable and\n\nsatellite providers’ subscribers\n\nToronto Blue Jays’ revenue from home game admission and concessions - Recognize revenue as the related games are played during the\n\nbaseball season and goods are sold\n\nToronto Blue Jays’ revenue from the Major League Baseball Revenue\n\nSharing Agreement which redistributes funds between member clubs\n\nbased on each club’s relative revenues\n\n- Recognize revenue when it can be determined\n\nRevenue from Toronto Blue Jays, radio and television broadcast\n\nagreements\n\n- Record revenue at the time the related games are aired\n\nAwards granted to customers through customer loyalty programs, which\n\nare considered a separately identifiable component of the sales\n\ntransactions\n\n- Estimate the portion of the original sale to allocate to the award\n\ncredit based on the fair value of the future goods and services that\n\ncan be obtained when the credit is redeemed\n\n- Defer the allocated amount until the awards are redeemed by the\n\ncustomer and we provide the goods or services\n\n- Recognize revenue based on the redemption of award credits relative\n\nto the award credits that we expect to be redeemed", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Other revenues, primarily consisting of Internet and 511Virginia service revenues were $5.8 million in 2003, an increase of $0.7 million or 13.5%. The Company had 17,420 dial-up Internet subscribers at December 31, 2003, compared to 18,050 at the end of the previous year. During 2003, the Company’s DSL high-speed Internet access subscriber count increased to 1,298 from 646. Total Internet service revenue was $4.5 million, an increase of $0.3 million or 10.7%. The 511Virginia contract with the Virginia Department of Transportation contributed $1.3 million to other revenues, an increase of $0.4 million or 41.3%. Telecommunications equipment sales, services and lease revenues were $1.1 million, which reflects a $0.1 million decrease from 2002 results.\n\nWireline revenues from cable television services were $4.4 million, an increase of $0.1 million or 1.7%. The number of subscribers and service plan prices remained relatively constant during 2003.\n\nBilling and collection services and other revenues contributed $0.4 million to wireline revenues, which was the same as 2002 results. Revenues from this service had declined in recent years, with interexchange carriers now issuing a greater proportion of their bills directly to their customers.\n\nFacility lease revenue contributed $5.5 million to wireline revenues, a decrease of $0.2 million or 3.5%. The decrease was primarily the result of the prolonged decline of lease rates associated with competitive pricing pressures and the economic downturn in the telecommunications industry. During 2002 the Company completed a second, diverse fiber route to its existing interconnection point in the Dulles airport area of Northern Virginia. This fiber route provides increased reliability for customers in the event of fiber cuts or breaks, and extends the availability of the Company’s fiber network to additional market locations but to date has not added additional revenue to the Company’s operation.\n\n47 ■ 2003 ANNUAL REPORT\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 48, - "page_end": 48, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "could materially impact the financial statements. Management believes\n\nthe following critical accounting policies reflect its more significant\n\nestimates and assumptions used in the preparation of the Consolidated\n\nFinancial Statements.\n\n* **Fiscal year end** * - The Company’s fiscal year ends on the Saturday\n\nnearest December 31. Fiscal year 2003, the year ended January 3,\n\n2004, contained 53 weeks, while fiscal year 2002, the year ended\n\nDecember 28, 2002, and fiscal year 2001, the year ended December 29,\n\n2001, contained 52 weeks. A 53-week year occurs approximately every\n\nsixth year.\n\n* **Revenue recognition** * - Revenue is normally recognized upon\n\nshipment of goods to customers. In certain circumstances revenue is\n\nnot recognized until the goods are received by the customer or upon\n\ninstallation and customer acceptance based on the terms of the sale\n\nagreement. Revenue includes freight charged to customers; related\n\nMA NA GEMENT ’S DI SCUSSI ON A ND A NA LYSI S", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "####### **EXHIBIT 23.1**\n\n####### **CONSENT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n\nWe consent to the incorporation by reference in the Registration Statements (Form S-8 Nos. 333-81801,\n\n333-78125, 333-45542 and 333-104048) pertaining to the Republic Services 401(k) Plan, 1998 Stock\n\nIncentive Plan, Republic Services, Inc. Amended and Restated Employee Stock Purchase Plan, and Republic\n\nServices, Inc. Amended and Restated 1998 Stock Incentive Plan, respectively, of our reports dated\n\nFebruary 24, 2005, with respect to the consolidated Ñnancial statements and schedule of Republic Services,\n\nInc., Republic Services, Inc. management's assessment of the eÅectiveness of internal control over Ñnancial\n\nreporting, and the eÅectiveness of internal control over Ñnancial reporting of Republic Services, Inc., included\n\nin this Annual Report (Form 10-K) for the year ended December 31, 2004.\n\n/s/ E RNST & Y OUNG LLP\n\nCertiÑed Public Accountants\n\nFort Lauderdale, Florida\n\nFebruary 24, 2005\n\n95", - "page_start": 102, - "page_end": 102, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "tender offer. The other income in 2001 was primarily related to the Company’s one-time pre-tax gain of $428,000 on the sale of a patent.\n\nIncome tax expense in 2003 totaled $1.9 million, compared with $1.4 million in 2002 and $1.8 million in 2001. The effective tax rates for 2003, 2002 and\n\n2001 were 27.8 percent, 25.7 percent and 29.7 percent, respectively. Benefits from tax incentives for exports and R&D expenditures totaled $350,000 in\n\n2003, $408,000 in 2002 and $404,000 in 2001. The higher effective tax rate in 2003 is primarily a result of benefits from tax incentives for exports and\n\nR&D expenditures being a lesser percentage of taxable income in 2003 than in 2002. The lower effective tax rate in 2002 is primarily a result of benefits\n\nfrom tax incentives for exports and R&D expenditures being a larger percentage of taxable income in 2002 than in 2001 and the utilization of capital loss\n\ncarryforwards in 2002.\n\nThe Company believes that 2004 revenues will be higher than 2003 revenues and that the cost of goods sold, gross profit, operating income and income\n\nfrom continuing operations will each be higher in 2004 than in 2003. The Company further believes that it will have continuing volume growth in most of\n\nits product lines in 2004, complemented by the introduction of new products, and that it will achieve a double-digit annual rate of growth in earnings per\n\nshare from continuing operations for the next several years.\n\n**D I S C O N T I N U E D O P E R AT I O N S**\n\nDuring 1997, the Company sold all of its natural gas operations. The financial statements presented herein reflect the Company’s natural gas operations as\n\ndiscontinued operations for all periods presented. The financial statements also reflect an after-tax gain on disposal of these discontinued operations of\n\n$ .2 million, or $ .10 per basic and $ .09 per diluted share, in both 2003 and 2002, and $5.5 million, or $2.70 per basic and $2.42 per diluted share, in 2001.\n\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to\n\n$250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon\n\nrevenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from\n\nthe purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001\n\ngain also includes a $5,327,000 non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997.\n\nThis reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets.", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "For the Company’s wireless customers that purchase and activate their service through a channel not covered by EITF 00-21, the wireless customers generally pay an activation fee to the Company when they initiate service. The Company defers the activation fee revenue (except when a special promotion reduces or waives the fee) over the average life of its subscribers, which is estimated to be 30 months. The Company recognizes service revenue from its subscribers as they use the service. The Company provides a reduction of recorded revenue for billing adjustments and the portion of revenue (8%) that is retained by Sprint. The Company also reduces recorded revenue for rebates and discounts given to subscribers on wireless handset sales in accordance with (\"EITF\") Issue No. 01-9 “Accounting for Consideration Given by a Vendor to a Subscriber (Including a Reseller of the Vendor's Products).” The Company\n\n##### * **Revenue Recognition** *\n\nBad Debt expense summary, net of recoveries for the three years ended December 31, 2003:\n\nIn thousands **2003** 2002 2001 PCS subscribers **$1,716** $ 3,744 $ 1,241 Interexchange carriers **48** 488 - Other subscribers and entities **71** 170 82 Total bad debt expense **$1,835** $ 4,402 $ 1,323\n\ncarrier accounts, but due to the telecommunication industry down-turn of the last few years, the Company experienced write-offs in this area of the business totaling $0.5 million in 2002, due to bankruptcy filings of several significant telecommunications companies. In 2003, the inter-carrier segment of the business improved and the Company recovered $240 thousand of bad debt from the sale of certain accounts that were previously written-off.\n\n**2003** 2002 2001", - "page_start": 45, - "page_end": 45, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nBusiness Solutions generates revenue from services and equipment\n\nsales.\n\nNext generation revenue is generated by the provision of high-speed,\n\nhigh-reliability data and voice communications, provided on Rogers\n\nadvanced IP and Ethernet and Cloud platforms and mainly over the\n\nextensive Rogers fibre, cable and wireless networks. Next generation\n\nrevenue also includes Data Centre services revenue from the 2013 dates\n\nof business acquisitions.\n\nLegacy revenue is generated mainly by long distance, switched voice\n\nservices and lower speed data communications, provided over TDM and\n\nend of life data platforms with client access primarily delivered through\n\nthe use of third-party networks and tariffed ILEC services.\n\nBusiness Solutions continues to focus mainly on next generation IP-\n\nbased services, and on leveraging higher margin on-net and near-net\n\nservice revenue opportunities, using existing network facilities to\n\nexpand offerings to the medium and large sized enterprise, public\n\nsector and carrier markets. Next generation services now represent 59%\n\nof total service revenue.\n\nRevenue from the lower margin off-net legacy business generally\n\nincludes local and long-distance voice services and legacy data services\n\nwhich often use facilities that are leased rather than owned.\n\nFollowing our recent data centre business acquisitions, Business\n\nSolutions is now also focused on data centre colocation, hosting, cloud\n\nand disaster recovery services.\n\n####### **Higher Operating Revenue**\n\nOperating revenue was 7% higher this year compared to last year, the\n\nnet result of:\n\n- higher revenue from next generation services, which grew by 31%,\n\nreflecting the impact of our acquisitions of Blackiron and Pivot Data\n\nCentres\n\n- continued execution of our plan to grow higher margin on-net and\n\nnext generation IP-based services revenue\n\n- partially offset by ongoing decline in the legacy voice and data\n\nbusiness, a trend management expects to continue as customers\n\nmove to faster and more reliable IP services.\n\n####### **Higher Operating Expenses**\n\nWe assess Business Solutions operating expenses in two categories:\n\n- the cost of operating and maintaining telecom and data networking\n\nequipment\n\n- all other expenses involved in day-to-day operations, to service\n\nexisting subscriber relationships and attract new subscribers.\n\nOperating expenses were higher this year, the net result of:\n\n- higher expenses related to our data centre acquisitions\n\n- partially offset by expected lower legacy service-related costs related\n\nto lower volumes and customer levels and ongoing initiatives to\n\nimprove costs and productivity.\n\n####### **Higher Adjusted Operating Profit**\n\nAdjusted operating profit was 19% higher this year because of the\n\ncontribution of new data centres, the ongoing growth in the higher\n\nmargin on-net next generation business and cost efficiencies.\n\nExcluding the impact of the Blackiron and Pivot Data Centres\n\nacquisitions:\n\n- operating revenue would have been 3% lower this year compared to\n\nlast year, instead of 7% higher as reported\n\n- adjusted operating profit would have been 11% higher this year\n\ncompared to last year, instead of 19% higher as reported\n\nWe continue to work on data centre business integration and the\n\noptimization of Business Solutions’ overall cost structures.\n\n(IN MILLIONS OF DOLLARS)\n\n**BUSINESS SOLUTIONS ADJUSTED OPERATING PROFIT**\n\n**2013**\n\n2012\n\n2011\n\n**$106**\n\n$89\n\n$86\n\n46 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 49, - "page_end": 49, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "$2.75 per diluted share, in 2003, compared with $2.6 million, or $1.51 per basic and $1.39 per diluted share, in 2002 and $9.8 million, or $4.80 per\n\nbasic and $4.30 per diluted share, in 2001. The Company adopted Statement of Financial Accounting Standards (“SFAS”) No. 142 effective January 1, 2002.\n\nThe required adoption of SFAS No. 142 as discussed in Note 2 to the Company’s Consolidated Financial Statements included herein is considered a change\n\nin accounting principle and the cumulative effect of adopting this standard resulted in a $1.6 million, or $ .96 per basic and $ .88 per diluted share, non-\n\ncash, after-tax charge in 2002.\n\nOperating revenues were $62.8 million in 2003, compared with $59.5 million in 2002 and $57.6 million in 2001. These revenue increases are generally\n\nattributable to higher sales volumes. The 5 percent revenue increase in 2003 over the prior year is primarily attributable to an 8 percent increase in the\n\nrevenues of the Company’s ophthalmic products, an 8 percent increase in the revenues of the Company’s cardiovascular products, a 3 percent increase in\n\nthe Company’s fluid delivery products and a 2 percent increase in the Company’s other medical and non-medical products and services. The 3 percent\n\nrevenue increase in 2002 over the prior year is primarily attributable to an 8 percent increase in the revenues of the Company’s cardiovascular products,\n\na 4 percent increase in the Company’s fluid delivery products and a 4 percent increase in the Company’s other medical and non-medical products and\n\nservices.\n\nThe Company’s cost of goods sold was $40.6 million in 2003, compared with $39.2 million in 2002 and $35.8 million in 2001. The increase in cost of\n\ngoods sold for 2003 over 2002 was primarily related to the increase in revenues discussed above and increased insurance costs partially offset by an\n\nimprovement in manufacturing variances resulting from increased production volumes. The increase in cost of goods sold for 2002 over 2001 was\n\nprimarily related to a shift in product mix, which resulted in lower gross margins, and the increase in revenues discussed above.\n\nGross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company’s gross profit in 2003 was 35\n\npercent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003\n\nA N D A N A L Y S I S O F F I N A N C I A L C O N D I T I O N A N D R E S U L T S O F O P E R A T I O N S", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "9\n\nGifts of cash and other assets are reported as contributions with donor restrictions if they are received with donor stipulations that limit the use of the donated assets or are restricted as to time. When a donor restriction expires, that is, when a stipulated time restriction ends or purpose restriction is accomplished, net assets with donor restrictions are reclassified to net assets without donor restrictions and reported in the consolidated statement of activities as net assets released from restrictions.\n\n* **(l) Contributions of Nonfinancial Assets and Services** *\n\nContributions of nonfinancial assets and services include contributed services, as described below.\n\nContributed services are reported at fair value in the consolidated financial statements for voluntary donations of services when those services (1) create or enhance nonfinancial assets, (2) require specialized skills provided by individuals possessing those skills and are services that would be typically purchased if not provided by the donation, and (3) are professional in nature, and have been explicitly agreed to in advance. Contributed services are reported as contributions of nonfinancial assets and services revenue and in-kind service expenses in the consolidated statements of activities. Fair value is estimated based on current local rates for similar services.\n\nA substantial number of volunteers make significant contributions of their time in the furtherance of the Foundation’s projects. The value of this contributed time is not reflected in the accompanying consolidated financial statements, as the criteria above are not met.\n\nContributed service revenue and expenses recorded in the consolidated statements of activities consist of contributed legal services, engineering services, subscription services, and internet hosting services and bandwidth. The amounts of specialized contributed legal services as revenue and expenses are $82,638 and $493,315 for the years ended June 30, 2024 and 2023, respectively. The value of specialized engineering services as revenue and expenses are $0 and $498,800 for the years ended June 30, 2024 and 2023, respectively. The value of donated subscription services as revenue and expenses was $124,738 and $0 for the years ended June 30, 2024 and 2023, respectively. The amounts of contributed internet hosting services and bandwidth for the years ended June 30, 2024 and 2023 is $56,100 and $48,338, respectively. Included in the 2024 and 2023 amounts are donated hosting services and bandwidth from the following companies: (1) FiberRing, (2) Tele2, (3) Datahop, (4) LibertyGlobal, (5) Init7, and (6) Arelion.\n\n* **(m) Revenue Recognition - Contracts With Customers** *\n\nThe Foundation recognizes revenue from contracts with customers related to Wikimedia, LLC under Accounting Standards Codification Topic 606, Revenue from Contracts with Customers, which establishes a principle that revenue is recognized upon transfer of control of promised products and services to customers in an amount that reflects the consideration the Foundation expects to receive in exchange for those products or services.\n\nThe Foundation determines the amount of revenue to be recognized through the application of the following 5-step process: 1) identification of the contract, or contracts, with a customer; 2) identification of the performance obligations in the contract; 3) determination of the transaction price; 4) allocation of the transaction price to the performance obligations in the contract; and 5) recognition of revenue when or as the Foundation satisfies the performance obligations.", - "page_start": 10, - "page_end": 10, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\n####### **Key Achievements**\n\n####### **Higher Operating Revenue and Adjusted Operating Profit**\n\n- Consolidated operating revenue was 2% higher this year compared\n\nto 2012, led by an increase in data revenue at Wireless, higher\n\nInternet revenue at Cable, higher Next Generation revenue at\n\nBusiness Solutions and higher subscriber revenue at Media. Revenue\n\ngrew by 3% in Cable, 7% in Business Solutions and 5% in Media,\n\nwhile revenue at Wireless remained unchanged as the increase in\n\ndata revenue was offset by the decrease in voice revenue.\n\n- Consolidated adjusted operating profit rose 3% this year to $4,993\n\nmillion, with consolidated adjusted operating profit margins of 39.3%,\n\nresulting from higher revenue, the realization of cost efficiencies and\n\nshifts in the mix of revenue from products and services sold.\n\n- Postpaid Wireless subscriber growth continued with net additions of\n\n228,000 and lower churn of 1.24%.\n\n- Cable high-speed Internet subscribers grew by 97,000 and cable\n\ntelephony lines grew by 79,000, while television households\n\ndecreased by 87,000 compared to 2012.\n\n####### **Strong Cash Flow**\n\n- Pre-tax free cash flow, defined as adjusted operating profit less\n\nspending on property, plant and equipment, and interest on long-\n\nterm debt (net of capitalized interest), increased by 1% compared to\n\n2012 to $2,044 million due to a 3% increase in adjusted operating\n\nprofit offset by higher spending on property, plant and equipment.\n\nAfter-tax cash flow decreased by 6% from 2012 levels to $1,548 due\n\nto a 31% increase in cash taxes.\n\n####### **Strong Balance Sheet and Liquidity Position**\n\n- Issued and fully hedged US$2.5 billion of ten and thirty year senior\n\nnotes at some of the lowest coupon rates ever achieved for Rogers\n\ncorporate debt, in two separate offerings comprising:\n\n- US$500 million of 3.00% senior notes due 2023 and US$500\n\nmillion of 4.50% senior notes due 2043\n\n- US$850 million of 4.10% senior notes due 2023 and US$650\n\nmillion of 5.45% senior notes due 2043\n\n- Our overall weighted average cost of debt was 5.50% at\n\nDecember 31, 2013 compared to 6.10% at December 31, 2012 and\n\nthe weighted average term to maturity on our debt was 11.3 years,\n\ncompared to 9.2 years at December 31, 2012.\n\n- Ended the year with $4.5 billion of available liquidity, comprised of\n\n$2.3 billion cash on hand, $2 billion available under our bank credit\n\nfacility and $0.2 billion available under our $0.9 billion accounts\n\nreceivable securitization program.\n\n- In May 2013, each of Fitch Ratings and Standard and Poor’s Ratings\n\nServices upgraded RCI’s senior unsecured debt to BBB+ (from BBB) with\n\na stable outlook, while Moody’s Investors Service’s comparable rating is\n\nBaa1 with a stable outlook remained unchanged from last year.\n\n####### **Growing Dividends**\n\n- We increased our annualized dividend rate in February 2013 by 10%\n\nto $1.74 per Class A Voting and Class B Non-Voting share and paid a\n\nquarterly dividend of $0.435 per share during 2013. We further\n\nincreased our annualized dividend on February 12, 2014, by 5%\n\nto $1.83.\n\n####### **New CEO**\n\n- Guy Laurence joined Rogers in December 2013, as our new President\n\nand Chief Executive Officer, succeeding Nadir Mohamed who retired\n\nfrom Rogers. Mr. Laurence brings 30 years of global experience in\n\nthe telecommunications and media industries.\n\n####### **Significant Developments**\n\n- Exclusive 12-year licensing agreement to broadcast national NHL\n\ngames, beginning with the 2014-2015 season was signed. The\n\nagreement grants Rogers the exclusive distribution rights of all\n\nnational regular season and playoff games within Canada, in multiple\n\nlanguages, across all platforms. At the same time, we executed\n\nseparate agreements to sublicence certain of these broadcasting\n\nrights to TVA Sports and CBC.\n\n- Strategic acquisitions of Score Media Inc. (theScore), Mountain", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RSG_2004.pdf", - "query": "Who is the Vice Chairmain of the Board of Republic Services ?", - "target_page": 5, - "target_passage": " Harris W. Hudson1 Vice Chairman of the Board", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Annual Report 2004 41\n\n## BOARD OF DIRECTORS\n\n**STEPHEN GERLACH**\n\nLLB\n\nAge 59. Director since 5\n\nSeptember 1989 and Chairman\n\nsince 4 May 2001. Chairman of\n\nSantos Finance Ltd and of the\n\nEnvironmental and Safety\n\nCommittee, Finance Committee\n\nand Nomination Committee and\n\nmember of the Remuneration\n\nCommittee of the Board.\n\nChairman of Futuris Corporation\n\nLtd and Challenger Beston\n\nLimited and a Director of\n\nSouthcorp Ltd. Former Managing\n\nPartner of the Adelaide legal\n\nfirm, Finlaysons. Former Chairman\n\nof Amdel Ltd and Equitoral\n\nMining Ltd.\n\n**JOHN CHARLES ELLICE-FLINT**\n\nBSc (Hons)\n\nAge 54. Managing Director since\n\n19 December 2000, member of\n\nthe Environmental and Safety\n\nCommittee of the Board, Director\n\nof Santos Finance Ltd and also\n\nChairman of other Santos Ltd\n\nsubsidiary companies. Thirty\n\nyears’ experience in the\n\ninternational oil and gas industry\n\nincluding twenty six years with\n\nUnocal, including as Senior Vice\n\nPresident: Global Exploration and\n\nTechnology and Vice President:\n\nCorporate Planning and Economics.\n\nMember and Chair of the South\n\nAustralian Museum Board.\n\n**PETER CHARLES BARNETT**\n\nFCPA\n\nAge 64. Director since\n\n31 October 1995 and member\n\nof the Environmental and Safety\n\nCommittee, Nomination\n\nCommittee, Finance Committee\n\nand Remuneration Committee\n\nof the Board. Director of AMCIL\n\nLtd and Opis Capital Ltd. Former\n\nManaging Director and Chief\n\nExecutive Officer of Pasminco\n\nLtd (1988- 1995) and Chief\n\nExecutive Officer of EZ Industries\n\nLtd. Former director of Mayne\n\nGroup Ltd.\n\n**KENNETH ALFRED DEAN**\n\nFCPA, MAICD\n\nAge 52. Independent non-\n\nexecutive Director effective 23\n\nFebruary 2005. Extensive financial\n\nexperience in the international\n\npetroleum industry, having held\n\nthe position of Chief Executive\n\nOfficer, Shell Financial Services.\n\nDuring his 30-year career with\n\nShell, held several other senior\n\nexecutive positions in treasury,\n\naudit, accounting, IT and\n\nfinancial and corporate services.\n\nFellow of the Australian Society of\n\nCertified Practising Accountants\n\nand member of the Australian\n\nInstitute of Company Directors.\n\n**RICHARD MICHAEL HARDING**\n\nMSc\n\nAge 55. Director since 1 March\n\n2004 and member of the Audit\n\nCommittee of the Board. Former\n\nPresident and General Manager\n\nof BP Developments Australia\n\nLimited and former Vice-Chairman\n\nand Council member of the\n\nAustralian Petroleum Production\n\nand Exploration Association.\n\nChairman of the Ministry of\n\nDefence Command Support,\n\nTraining and Simulation Project\n\nGovernance Board and Director\n\nof Arc Energy Ltd.\n\n**GRAEME WILLIAM MCGREGOR**\n\nAO, BEc, FCPA, FAIM, FAICD\n\nAge 66. Director since\n\n3 September 1999. Chairman of\n\nthe Audit Committee and member\n\nof the Finance Committee and\n\nNomination Committee of\n\nthe Board. Director of Santos\n\nFinance Ltd. Director of Foster’s\n\nGroup Ltd, Nufarm Ltd, WMC\n\nResources Ltd and Goldman Sachs\n\nJB Were Managed Funds Limited.\n\nMember of the Financial Reporting\n\nCouncil. Former Executive Director\n\nFinance of The Broken Hill\n\nProprietary Company Limited and\n\nformer Director of Community\n\nFoundation Network Ltd.\n\n**MICHAEL ANTHONY O’LEARY**\n\nDipMinE, BSc, FAusIMM, FAIM,\n\nFAICD\n\nAge 69. Director since\n\n15 October 1996 and member\n\nof the Environmental and Safety\n\nCommittee of the Board. Director\n\nof Newcrest Mining Ltd. Former\n\nChairman of Hamersley Iron,\n\nArgyle Diamonds, Dampier Salt,\n\nformer Deputy Chairman of Bank\n\nof Western Australia Ltd and\n\nformer Director of Rio Tinto Ltd\n\nand Rio Tinto plc.\n\n**CHRISTOPHER JOHN RECNY**\n\nBSc, MSc, MBA\n\nAge 51. Independent non-\n\nexecutive Director effective\n\n23 February 2005. Extensive\n\ninternational management and\n\nproject management experience,\n\nincluding as global head of\n\ninternational consultancy L.E.K.’s\n\nnatural resources practice - a\n\ncompany he helped establish\n\nin the 1980s. Regional head\n\nof Asia-Pacific for L.E.K. and\n\npreviously spent eight years with\n\nFluor Corporation as a project\n\nmanager on, and undertaking\n\nfeasibility studies for, major", - "page_start": 42, - "page_end": 42, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "#### * **Board of Directors** *\n\nJames E. O’Connor *Chairman & Chief Executive Officer*\n\nMichael J. Cordesman *President & Chief Operating Officer*\n\nDavid A. Barclay *Senior Vice President & General Counsel*\n\nTod C. Holmes *Senior Vice President & Chief Financial Officer*\n\nLee V. Twyford *Senior Vice President & Chief Information Officer*\n\nBrian A. Bales *Vice President, Corporate Development*\n\nKenneth M. Baylor *Vice President, Employee & Labor Relations*\n\nTim M. Benter *Vice President & Associate General Counsel*\n\nJerry S. Clark *Vice President & Controller*\n\nPaul J. Connealy *Vice President, Tax*\n\nMatthew E. Davies *Vice President, Environmental Engineering & Compliance*\n\nArthur J. Dudzinski *Regional Vice President - Western Region*\n\nWilliam C. Flower *Vice President, Communications*\n\nMatthew D. Katz *Vice President & Associate General Counsel*\n\nRonald R. Krall *Regional Vice President - Eastern Region*\n\nEdward A. Lang III *Vice President, Finance & Treasurer*\n\nThomas E. Miller *Regional Vice President - Southwest Region*\n\nCraig J. Nichols *Vice President, Human Resources*\n\nCharles F. Serianni *Vice President & Chief Accounting Officer*\n\nRobert N. Shepard *Regional Vice President - Southern Region*\n\nGary L. Sova *Vice President, Marketing & Sales*\n\nKevin C. Walbridge *Regional Vice President - Central Region*\n\nGerard W. Wickett *Vice President, Purchasing & Maintenance*\n\nJames E. O’Connor <sup>1</sup> *Chairman &* *Chief Executive Officer*\n\nHarris W. Hudson <sup>1</sup> *Vice Chairman of the Board*\n\nMichael W. Wickham <sup>2, 3, 4</sup> *Retired Chairman, President*\n\n*& Chief Executive Officer,*\n\n*Roadway Corporation*\n\nJohn W. Croghan <sup>2, 3, 4</sup> *Chairman, Nominating and* *Corporate Governance Committee* *Chairman, Rail-Splitter* *Capital Management, LLC* *(an investment management firm)*\n\nW. Lee Nutter <sup>2, 3, 4</sup> *Chairman, Compensation*\n\n*Committee* *Chairman, President &* *Chief Executive Officer* *Rayonier, Inc.* *(a forest products company)*\n\nRamon A. Rodriguez <sup>2, 3, 4</sup> *Chairman, Audit Committee*\n\n*President & Chief Executive Officer* *Madsen, Sapp, Mena,* *Rodriguez & Co.* *(a public accounting firm)*\n\nAllan C. Sorensen <sup>2, 3, 4</sup> *Presiding Director* *President & Chief Executive Officer* *Interim Health Care, Inc.* *(a provider of temporary labor* *to the healthcare industry)*\n\n##### * **Officers** *\n\n1 *Member, Executive Committee* - 2 *Member, Audit Committee* - 3 *Member, Compensation Committee* - 4 *Member, Nominating and Corporate Governance Committee*", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "2010 ANNUAL REPORT | **29**\n\n##### OFFICERS »\n\nJeffrey A. Fisher\n\nSenior Vice President -\n\nProduction\n\nMichael A. Johnson\n\nSenior Vice President -\n\nAccounting, Controller\n\nand Chief Accounting Officer\n\nJ. Mike Stice\n\nSenior Vice President - Natural Gas\n\nProjects and Chief Executive Officer\n\nChesapeake Midstream Partners, L.P.\n\nSteven C. Dixon\n\nExecutive Vice President -\n\nOperations and Geosciences\n\nand Chief Operating Officer\n\nHenry J. Hood\n\nSenior Vice President - Land\n\nand Legal and General Counsel\n\nJeffrey L. Mobley\n\nSenior Vice President -\n\nInvestor Relations and Research\n\nDomenic J. Dell’Osso, Jr.\n\nExecutive Vice President\n\nand Chief Financial Officer\n\nMartha A. Burger\n\nSenior Vice President -\n\nHuman and Corporate Resources\n\nJames C. Johnson\n\nSenior Vice President -\n\nEnergy Marketing\n\nThomas S. Price, Jr.\n\nSenior Vice President -\n\nCorporate Development\n\nand Government Relations\n\nAubrey K. McClendon\n\nChairman of the Board\n\nand Chief Executive Officer\n\nJennifer M. Grigsby\n\nSenior Vice President,\n\nTreasurer and Corporate Secretary\n\nCathy L. Tompkins\n\nSenior Vice President -\n\nInformation Technology\n\nand Chief Information Officer\n\nStephen W. Miller\n\nSenior Vice President - Drilling\n\nDouglas J. Jacobson\n\nExecutive Vice President -\n\nAcquisitions and Divestitures", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Annual Report 2004 30\n\nof, non-executive, independent\n\nDirectors, except for the\n\nEnvironmental and Safety\n\nCommittee, which includes\n\nthe CEO as a member.\n\nThe Board Guidelines prescribe\n\nthat the Board is to meet at\n\nleast eight times a year,\n\nincluding a strategy meeting of\n\ntwo days duration. The number\n\nof meetings of the Board and of\n\neach of its Committees and the\n\nnames of attendees at those\n\nmeetings are set out on page 47\n\nof this Annual Report. Board\n\nMeetings are structured in two\n\nseparate sessions, without\n\nmanagement present for one of\n\nthose sessions. The agenda for\n\nmeetings is prepared by the\n\nCompany Secretary in\n\nconjunction with the Chairman\n\nand CEO, with periodic input\n\nfrom the Board. Comprehensive\n\nBoard papers are distributed to\n\nDirectors in advance of\n\nscheduled meetings. Board\n\nmeetings take place both at the\n\nCompany’s head office and at key\n\noperating sites, to assist the\n\nBoard in its understanding of\n\noperational issues.\n\nExecutive management attend\n\nBoard and Committee meetings,\n\nat which they report to Directors\n\nwithin their respective areas of\n\nresponsibility. This assists the\n\nBoard in maintaining its\n\nunderstanding of the Company’s\n\nbusiness and assessing the\n\nexecutive management team.\n\nWhere appropriate, advisors to\n\nthe Company attend meetings of\n\nthe Board and of its Committees.\n\n**2.3 Composition of the Board**\n\nThe composition of the Board is\n\ndetermined in accordance with\n\nthe Company’s Constitution and\n\nthe Board Guidelines which,\n\namong other things, require that:\n\n- the Board is to comprise\n\na minimum of five and a\n\nmaximum of ten Directors\n\n(exclusive of the CEO);\n\n- the Board should comprise a\n\nsubstantial majority of\n\nindependent, non-executive\n\nDirectors;\n\n- there should be a separation\n\nof the roles of Chairman and\n\nChief Executive Officer of the\n\nCompany; and\n\n- the Chairman of the Board\n\nshould be an independent,\n\nnon-executive Director.\n\nUnder the Company’s\n\nConstitution approximately one-\n\nthird of Directors retire by\n\nrotation each year and Directors\n\nappointed during the year are\n\nrequired to submit themselves\n\nfor election by shareholders at\n\nthe Company’s next Annual\n\nGeneral Meeting. The Board\n\nGuidelines encourage Directors to\n\nretire at the first Annual General\n\nMeeting after reaching the age\n\nof 72 years and not seek re-\n\nappointment.\n\nCurrently, the Board comprises\n\neight non-executive Directors\n\nand one executive Director. The\n\nBoard has adopted the definition\n\nset out in the ASX Best Practice\n\nRecommendations and as defined\n\nin the 2002 guidelines of the\n\nInvestment and Financial\n\nServices Association Limited and\n\nconsiders all current non-\n\nexecutive Directors, including the\n\nChairman, to be independent\n\ndirectors.\n\nGenerally, the Board considers a\n\nDirector to be independent if he\n\nor she is not a member of\n\nmanagement and is free of any\n\nbusiness or other relationship\n\nthat could materially interfere\n\nwith, or could reasonably be\n\nperceived to materially interfere\n\nwith, the Director’s ability to\n\nact in the best interests of the\n\nCompany. The Board will assess\n\nthe materiality of any given\n\nrelationship that may affect\n\nindependence on a case by case\n\nbasis and has adopted\n\nmateriality guidelines to assist in\n\nthat assessment. Under these\n\nguidelines, the following\n\ninterests are regarded as material\n\nin the absence of any mitigating\n\nfactors:\n\n- a holding of 5% or more of\n\nthe Company’s voting shares or\n\na direct association with an\n\nentity that holds more than\n\n5% of the Company’s voting\n\nshares;\n\n- an affiliation with an entity\n\nwhich accounts for 5% or more\n\nor the revenue or expense of\n\nthe Company.\n\nThe Board has determined that\n\nthere should not be any arbitrary\n\nlength of tenure that should be\n\nconsidered to materially interfere\n\nwith a Director’s ability to act in\n\nthe best interests of the\n\nCompany, as it believes this\n\nassessment must be made on a\n\ncase by case basis with reference\n\nto the length of service of all\n\nmembers of the Board.", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "the best interests of the\n\nCompany, as it believes this\n\nassessment must be made on a\n\ncase by case basis with reference\n\nto the length of service of all\n\nmembers of the Board.\n\nEach Director’s independence is\n\nassessed by the Board on an\n\nindividual basis, with reference\n\nto the above materiality\n\nguidelines and focussing on an\n\nassessment of each Director’s\n\ncapacity to bring independence\n\nof judgment to Board decisions.\n\nIn this context, as mentioned\n\nbelow, Directors are required to\n\npromptly disclose their interests\n\nin contracts and other\n\ndirectorships and offices held.\n\nThe names and details of the\n\nexperience, qualifications, special\n\nresponsibilities, and term of\n\noffice of each Director of the\n\nCompany are set out on page 41\n\nof this Annual Report. Details\n\nof each Director’s attendance at\n\nBoard and Committee Meetings\n\nand their shareholdings are also\n\nset out on page 47 of this\n\nAnnual Report.\n\n**2.4 Nomination Committee**\n\nThe role, responsibilities and\n\nmembership requirements of\n\nthe Nomination Committee are\n\ndocumented in the Board\n\nGuidelines and in a separate\n\nCharter, approved by the Board.\n\nUnder the Board Guidelines,\n\nit is the responsibility of the\n\nNomination Committee to devise\n\nthe criteria for, and review\n\nmembership of, and nominations\n\nto, the Board. The primary\n\ncriteria adopted in selection of\n\nsuitable Board candidates is their\n\ncapacity to contribute to the\n\nongoing development of the\n\nCompany having regard to the\n\nlocation and nature of the\n\nCompany’s significant business\n\ninterests and to the candidates’\n\nage and experience by reference\n\nto the attributes of existing\n\nBoard members.\n\nWhen a Board vacancy exists or\n\nwhere it is considered that the\n\nBoard would benefit from the\n\nservices of a new Director with\n\nparticular skills, the Nomination\n\nCommittee has responsibility for\n\nproposing candidates for\n\nconsideration by the Board and,\n\nwhere appropriate, engages the\n\nservices of external consultants.\n\nPrior to appointment, each\n\nDirector is provided with a letter\n\nof appointment which encloses a\n\ncopy of the Company’s\n\nConstitution and of the relevant\n\npolicies. Additionally, the\n\nexpectations of the Board in", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 31\n\nrespect to a proposed appointee\n\nto the Board and the workings of\n\nthe Board and its Committees are\n\nconveyed in interviews with the\n\nChairman and induction\n\nprocedures include access to\n\nappropriate executives in relation\n\nto details of the business of the\n\nCompany.\n\nThe Chairman of the Board is\n\nthe Chairman of the Nomination\n\nCommittee. The current members\n\nof the Nomination Committee,\n\nall of whom are independent\n\nnon-executive Directors, are\n\nMr S Gerlach (Chairman), Mr P C\n\nBarnett and Mr G W McGregor.\n\n**3. REVIEW OF BOARD AND**\n\n**EXECUTIVE PERFORMANCE**\n\nThe Board Guidelines provide\n\nthat:\n\n- non-executive Directors are\n\nto be appointed on the basis\n\nthat their nomination for\n\nre-election as a Director is\n\nsubject to review and support\n\nby the Board;\n\n- there should be appropriate\n\ncircumstances justifying re-\n\nelection after a specified\n\nperiod of service as a Director;\n\nand\n\n- the contribution of the Board\n\nand of individual Directors is\n\nthe subject of formal review\n\nand discussion on a biennial\n\nand annual basis, respectively.\n\nAs the biennial review of the\n\nBoard and of its Committees was\n\nconducted by an independent\n\nconsultant in 2003, no formal\n\nperformance appraisal of the\n\nBoard was conducted in 2004.\n\nPerformance evaluation of key\n\nexecutives is undertaken on a\n\nquarterly and annual basis by\n\nthe CEO and summarised in\n\npresentation to the\n\nRemuneration Committee of the\n\nBoard, both specifically for\n\ndetermination of remuneration\n\nand generally in relation to\n\nmanagement succession planning\n\nfor review by the Board.\n\n**4. INDEMNITY, ACCESS TO**\n\n**INFORMATION AND**\n\n**INDEPENDENT PROFESSIONAL**\n\n**ADVICE**\n\nInformation in respect to\n\nindemnity and insurance\n\narrangements for Directors and\n\nsenior executives appears in the\n\nDirectors’ Statutory Report on\n\npage 49 of this Annual Report.\n\nThe Board Guidelines set out the\n\ncircumstances and procedures\n\npursuant to which a Director, in\n\nfurtherance of his or her duties,\n\nmay seek independent\n\nprofessional advice at the\n\nCompany’s expense. Those\n\nprocedures require prior\n\nconsultation with, and approval\n\nby, the Chairman and assurances\n\nas to the qualifications and\n\nreasonableness of the fees of\n\nthe relevant expert and, under\n\nnormal circumstances, the\n\nprovision of the expert’s advice\n\nto the Board.\n\nPursuant to a deed executed by\n\nthe Company and each Director,\n\na Director also has the right to\n\nhave access to all documents\n\nwhich have been presented to\n\nmeetings of the Board or to any\n\nCommittee of the Board or\n\notherwise made available to the\n\nDirector whilst in office. This\n\nright continues for a term of\n\nseven years after ceasing to be a\n\nDirector or such longer period as\n\nis necessary to determine\n\nrelevant legal proceedings that\n\ncommenced during that term.\n\n**5. REMUNERATION**\n\nThe role, responsibilities and\n\ncomposition of the Remuneration\n\nCommittee and details of\n\nthe Company’s remuneration\n\nobjectives and principles, non-\n\nexecutive Director remuneration\n\nand executive remuneration are\n\nset out on pages 37 to 40 of this\n\nAnnual Report in the Directors’\n\nand Executives’ Remuneration\n\nsection, as well as in the\n\nDirectors’ Statutory Report\n\nand in Notes 18 and 26 of\n\nthe Financial Statements.\n\nDetails of the nature and amount\n\nof the remuneration of:\n\n- the Directors; and\n\n- the Specified Executives;\n\nare set out on pages 37 to 40\n\nof this Annual Report.\n\n**6. AUDIT COMMITTEE**\n\nThe role of the Audit Committee\n\nis documented in a Charter,\n\napproved by the Board. This\n\nCharter was revised in August\n\n2004 in line with contemporary\n\nbest practice, and can be found\n\non the Company’s website.\n\n**6.1 Composition of the Audit**\n\n**Committee**\n\nThe Committee is required to\n\nconsist of no less than three\n\nmembers and to meet at least\n\nthree times per year. All\n\nmembers must be independent,\n\nnon-executive Directors and\n\nfinancially literate, with at\n\nleast one member having past\n\nemployment experience in", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "80\n\n**Executive Officers**\n\n**Teri Bariquit,** 49 **Steven C. Mattics,** 46 **Robert B. Sari,** 58\n\nExecutive Vice President, Executive Vice President; Executive Vice President,\n\nNordstrom Merchandising Group Chairman and Chief Executive Officer of General Counsel and Secretary\n\nNordstrom fsb,\n\n**Kirk Beardsley,** 46 President of Nordstrom Credit, Inc. **Michael Sato,** 48\n\nExecutive Vice President, Executive Vice President,\n\nOnline Merchandising **Scott A. Meden,** 52 Supply Chain\n\nExecutive Vice President and\n\n**Terence Boyle,** 42 General Merchandise Manager, **Tricia D. Smith,** 43\n\nExecutive Vice President, Shoe Division Executive Vice President and\n\nNordstromrack.com|HauteLook General Merchandise Manager,\n\n**Robert J. Middlemas,** 58 Designer, Women’s and Kids’\n\n**Brian K. Dennehy,** 49 Executive Vice President and Apparel\n\nExecutive Vice President and Regional Manager,\n\nChief Marketing Officer Southern California **Geevy S. K. Thomas,** 50\n\nExecutive Vice President and\n\n**James A. Howell,** 49 **Margaret Myers,** 68 President, Nordstrom Rack\n\nExecutive Vice President, Executive Vice President and\n\nFinance and Treasurer General Merchandise Manager, **Paige L. Thomas,** 43\n\nAccessories and Women’s Executive Vice President and\n\n**Michael G. Koppel,** 58 Specialized Divisions General Merchandise Manager,\n\nExecutive Vice President and Nordstrom Rack\n\nChief Financial Officer **Blake W. Nordstrom,** 54\n\nPresident **Mark J. Tritton,** 51\n\n**Gemma Lionello,** 49 Executive Vice President and\n\nExecutive Vice President and **Erik B. Nordstrom,** 51 President, Nordstrom Product Group\n\nGeneral Merchandise Manager, Executive Vice President and\n\nCosmetics Division President, Nordstrom.com **David M. Witman,** 56\n\nExecutive Vice President and\n\n**Daniel F. Little,** 53 **James F. Nordstrom, Jr.,** 42 General Merchandise Manager,\n\nExecutive Vice President and Executive Vice President and Men’s Apparel\n\nChief Information Officer President, Stores\n\n**Kenneth J. Worzel,** 50\n\n**Lisa Luther,** 46 **Peter E. Nordstrom,** 53 Executive Vice President,\n\nExecutive Vice President of Executive Vice President and Strategy and Development\n\nFinance and Operations, President, Merchandising\n\nNordstrom.com\n\n**Brian Saltzman,** 47\n\nExecutive Vice President,\n\nUser Experience and Optimization", - "page_start": 91, - "page_end": 91, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Directors’ Report\n\n**48**\n\nInformation on Directors\n\nRoss Smyth-Kirk\n\nB Com, CPA, F Fin\n\nChairman - Non-Executive\n\nRoss Smyth-Kirk was a founding Director of\n\nthe former leading investment management\n\ncompany, Clayton Robard Management Limited\n\nand has had extensive experience over a number\n\nof years in investment management including a\n\nclose involvement with the minerals and mining\n\nsectors. He has been a Director of a number of\n\ncompanies over the past 33 years in Australia\n\nand the UK. Mr Smyth-Kirk was previously\n\nChairman of the Australian Jockey Club Limited\n\nand retired in May 2013 as a Director of Argent\n\nMinerals Limited.\n\nResponsibilities:\n\nChairman of the Board, member of the Audit\n\nCommittee and Chairman of the Remuneration\n\nCommittee and Nomination Committee.\n\nPeter McAleer\n\nB Com (Hons), B L (Kings Inn - Dublin, Ireland)\n\nNon-Executive Director\n\nPeter McAleer was until the end of May 2013 the\n\nSenior Independent Director and Chairman of\n\nthe Audit Committee of Kenmare Resources PLC\n\n(Ireland). He is now a member of the Advisory\n\nPanel to the Board of Kenmare. Previously, he\n\nwas Chairman of Latin Gold Limited, Director\n\nand Chief Executive Officer of Equatorial Mining\n\nLimited and was a Director of Minera El Tesoro\n\n(Chile).\n\nResponsibilities:\n\nMember of the Audit Committee, Remuneration\n\nCommittee and Nomination Committee.\n\nCraig Carracher\n\nLLB (Sydney), BCL (Oxford)\n\nNon-Executive Director\n\nCraig Carracher graduated from Sydney\n\nUniversity Law School with an LLB (First Class\n\nHonours) (1991) and the University Medal and\n\nalso graduated on a Commonwealth Scholarship\n\nwith a BCL Law Degree from Magdalen College,\n\nOxford University (First Class Honours) (1993).\n\nHe has considerable commercial experience in\n\nAsia and was managing partner of an interna-\n\ntional law firm based in Thailand for many years.\n\nMr Carracher has held numerous directorships of\n\nlisted and private groups throughout Asia. He\n\nwas previously Group General Counsel with\n\nConsolidated Press Holdings Limited, Managing\n\nDirector of Asian private equity firm Arctic\n\nCapital based in Hong Kong, Special Advisor to\n\nthe Chairman of the Australian Securities and\n\nInvestment Commission and Associate to the\n\nformer Chief Justice of the Supreme Court of\n\nNew South Wales. Mr Carracher is Managing\n\nDirector of Telopea Capital Partners, an Asia-\n\nfocussed private equity group based in Sydney.\n\nMr Carracher is also a Non-Executive Director\n\nof ASX listed Sunland Group Limited.\n\nResponsibilities:\n\nChairman of the Audit Committee, member of\n\nthe Nomination and Remuneration Committees.\n\nPeter Alexander\n\nAss. Appl. Geol\n\nNon-Executive Director\n\nPeter Alexander has had 40 years experience in\n\nthe Australian and off-shore mining and explora-\n\ntion industry. He was Managing Director of\n\nDominion Mining Limited for 10 years prior to\n\nhis retirement in January 2008. Mr Alexander\n\nwas appointed a Non-Executive Director of\n\nDominion Mining Limited in February 2008 and\n\nresigned on 21 February 2011. Mr Alexander is\n\nChairman of the ASX listed company Doray\n\nMinerals Limited, a Director of ASX listed compa-\n\nnies Fortunis Resources Limited and Caravel\n\nMinerals Limited.\n\nResponsibilities:\n\nMember of the Remuneration Committee.\n\nGavin Thomas\n\nBSc FAusIMM\n\nManaging Director\n\nGavin Thomas has had a successful career in\n\ndeveloping mining companies from the explora-\n\ntion phase into mid-tier gold and / or copper\n\nproduction entities. He has over 42 years of\n\ninternational experience in exploring for, evalu-\n\nating, developing, operating and reclaiming\n\nmines in North America, South America,\n\nAustralia, the Southwest Pacific, Asia and\n\nEurope. Amongst other things he was credited\n\nwith the discovery of the Lihir gold deposit in\n\nPapua New Guinea, one of the largest gold\n\ndeposits in the world. In particular he has exten-\n\nsive experience in Thailand, south-west Pacific\n\nand South America. Mr Thomas was previously\n\nChairman of the TSX listed company Mercator", - "page_start": 49, - "page_end": 49, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "in the 1980s. Regional head\n\nof Asia-Pacific for L.E.K. and\n\npreviously spent eight years with\n\nFluor Corporation as a project\n\nmanager on, and undertaking\n\nfeasibility studies for, major\n\nresource developments.\n\n**PROFESSOR JUDITH SLOAN**\n\nBA (Hons), MA, MSc\n\nAge 50. Director since\n\n5 September 1994. Chairperson\n\nof the Remuneration Committee\n\nand member of the Audit\n\nCommittee of the Board.\n\nDeputy Chair of the Australian\n\nBroadcasting Corporation and\n\nPart-time Commissioner of the\n\nProductivity Commission. Former\n\nProfessor of Labour Studies at\n\nthe Flinders University of South\n\nAustralia and Director of the\n\nNational Institute of Labour\n\nStudies. Former Chairperson of\n\nSGIC Holdings Ltd and Director\n\nof Mayne Group Ltd.\n\n**Santos Board of Directors during November 2004 Board meeting held at Moomba, Cooper Basin.**\n\n**Left to right: Graeme McGregor, John Ellice-Flint, Peter Barnett, Stephen Gerlach, Michael Harding, Judith**\n\n**Sloan, Michael O’Leary and Frank Conroy (who retired in December 2004). Kenneth Dean and Christopher**\n\n**Recny subsequently joined the Board in February 2005.**", - "page_start": 42, - "page_end": 42, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "####### **Information on Directors**\n\n**Michael Damer Hannell**\n\n*Chairman, BSc Eng (Hons), FIEAust*\n\n*Experience*\n\nMike has been a Director of Sundance since March 2006 and chairman of our board of directors since December 2008.\n\nMr. Hannell has over 45 years of experience in the oil and gas industry, initially in the downstream sector and subsequently in\n\nthe upstream sector. His extensive experience has been in a wide range of design and construction, engineering, operations,\n\nexploration and development, marketing and commercial, financial and corporate areas in the United States, United Kingdom,\n\ncontinental Europe and Australia at the senior executive level with Mobil Oil (now Exxon) and Santos Ltd. Mr. Hannell recently\n\nfinished his term as the chairman of Rees Operations Pty Ltd (doing business as Milford Industries Pty Ltd), an Australian\n\nautomotive components and transportation container manufacturer and supplier. He has also held a number of other board\n\nappointments including the chairman of Sydac Pty Ltd, a designer and producer of simulation training products for industry.\n\nMr. Hannell has also served on a number of not-for-profit boards, with appointments as president of the Adelaide-based\n\nChamber of Mines and Energy, president of Business SA (formerly the South Australian Chamber of Commerce and Industry),\n\nchairman of the Investigator Science and Technology Centre, chairman of the Adelaide Graduate School of Business, and a\n\nmember of the South Australian Legal Practitioners Conduct Board. Mr. Hannell holds a Bachelor of Science degree in\n\nEngineering (with Honors) from the University of London and is a Fellow of the Institution of Engineers Australia.\n\n*Interest in Shares* :\n\n1,059,000 ordinary shares in Sundance Energy Australia Limited\n\n*Special Responsibilities* :\n\n-Chairman of the Board of Directors\n\n-Chairman of the Remuneration and Nominations Committee\n\n-Member of the Audit and Risk Management Committee\n\n-Member of the Reserves Committee\n\n*Other Directorships* :\n\nNil\n\n**Eric P. McCrady**\n\n*Director, BS in Business* Administration\n\n*Experience*\n\nEric has been our Chief Executive Officer since April 2011 and Managing Director of our board of directors since November\n\n2011. He also served as our Chief Financial Officer from June 2010 until becoming Chief Executive Officer in 2011. Mr. McCrady\n\nhas served in numerous positions in the energy, private investment and retail industries. From 2004 to 2010, Mr. McCrady was\n\nemployed by The Broe Group, a private investment firm, in various financial and executive management positions across a\n\nvariety of industry investment platforms, including energy, transportation and real estate. From 1997 to 2003, Mr. McCrady\n\nwas employed by American Coin Merchandising, Inc. in various corporate finance roles. Mr. McCrady holds a degree in Business\n\nAdministration from the University of Colorado, Boulder.\n\n*Interest in Shares, Restricted Share Units and Options:*\n\n1,908,581 Ordinary Shares in Sundance Energy Australia Limited and 791,561 Restricted Share Units\n\n*Special Responsibilities* :\n\nManaging Director and Chief Executive Officer of the Company\n\n*Other Directorships* :\n\nNil", - "page_start": 24, - "page_end": 24, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_STO_2004.pdf", - "query": "How mush did the Moomba incident cost to Santos in 2004 ?", - "target_page": 12, - "target_passage": " the Moomba incident resulted in $17 million of one-off costs in 2004.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Annual Report 2004 10\n\n**2004 WAS A YEAR OF GOOD**\n\n**OPERATING RESULTS**\n\nOverall the increase in 2004 profit\n\nof 16% reflected a year of sound\n\noperating performance. Sales\n\nrevenue was a record $1,501\n\nmillion, up 2.5% on 2003,\n\nreflecting higher prices across\n\nmost products and was achieved\n\ndespite lower production as a\n\nresult of the Moomba incident\n\nand declining output from late\n\nlife fields.\n\nSantos benefited from higher\n\nworld oil prices and realised\n\nUS$51.83 per boe in 2004, an\n\nincrease of 19% over 2003. The\n\nbenefit of higher world oil prices\n\nsubstantially offset the impact\n\nof lower production volumes.\n\nSantos was also able to negotiate\n\nhigher domestic gas prices (up\n\n4% on average) and deliver new\n\nrevenue streams from project\n\nstart-ups and acquisitions during\n\nthe year.\n\n**PRODUCTION HAMPERED BY**\n\n**MOOMBA INCIDENT**\n\n2004 production was lower due\n\nto the Moomba incident, which\n\nreduced production by 4.6 million\n\nboe. Field decline reduced\n\nproduction by a further\n\n5.0 million boe.\n\nOffsetting these factors, Santos’\n\ngrowth projects are starting to\n\ncome on line and have begun to\n\nreverse the decline experienced\n\nover the past three years. Two\n\nprojects were commissioned in\n\n2004: the Bayu-Undan liquids\n\nproject and the Minerva gas\n\nproject. In addition, acquisitions\n\ncontributed 0.8 million boe to\n\nproduction.\n\nFor 2005, production is expected\n\nto improve by around 15%, or\n\n4% excluding the impact of the\n\nMoomba incident. Santos now\n\nexpects production to be around\n\n54 million boe in 2005. This\n\nincrease is largely driven by the\n\ncommissioning of Mutineer-Exeter\n\nin March 2005 and the John\n\nBrookes gas field in the middle\n\nof the year.\n\n**PRODUCTION COSTS**\n\n**UNDER CONTROL**\n\nProduction costs in 2004 were\n\n$309 million, up $45 million or\n\n17% on 2003. Analysis shows\n\nthat Santos was able to continue\n\nto effectively control its costs\n\nin the face of significant external\n\npressures in the form of rising\n\nservices and materials prices.\n\nExamining production costs in\n\ndetail reveals:\n\n- the start-up of Bayu-Undan and\n\nacquisitions added $16 million\n\nto Santos’ cost base\n\n- changes in our accounting\n\nadded a further $16 million\n\nto Santos’ production costs\n\n- higher insurance premiums\n\n($8 million) and one-off stock\n\nwrite-offs ($5 million) were\n\noffset by $17 million in cost\n\nsavings largely as a result of\n\nSantos’ continuous\n\nimprovement initiatives\n\n- the Moomba incident resulted\n\nin $17 million of one-off costs\n\nin 2004.\n\nPiecing this together, the key\n\nthemes in our financial\n\nperformance were:\n\n- cost savings in established\n\nproduction areas more than\n\noffset increases in the price\n\nof services and materials\n\n- Santos’ cost base rose as\n\nproduction from new\n\ndevelopments and acquisitions\n\nwere added to the Company’s\n\nexpanding portfolio of\n\nproducing assets.\n\n## ANALYSING FINANCIAL PERFORMANCE\n\n**‘The sound operating results**\n\n**achieved in 2004 underline**\n\n**the changing face of Santos**\n\n**towards a higher value, higher**\n\n**margin business. We ended the**\n\n**year with a strong financial**\n\n**position and our financial**\n\n**flexibility intact.’**\n\n**PETER WASOW**\n\nChief Financial Officer\n\n’01 ’02 ’03 **’04**\n\n**PRODUCTION AND SALES REVENUE**\n\nRevenue Net profit after tax Production\n\n1,460\n\n445 322 327 **380**\n\n1,478 1,465\n\n54.2 57.3 55.7\n\n**1,501**\n\n**47.1**\n\n0\n\n500\n\n1000\n\n1500\n\n2000\n\n0\n\n10\n\n20\n\n30\n\n40\n\n50\n\n60\n\n$million mmboe", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 28\n\nof opportunities to use fewer\n\ngreenhouse-emitting or renewable\n\nsources of energy.\n\nTo achieve these commitments\n\nSantos is actively pursuing an\n\nemissions intensity reduction\n\ntarget (greenhouse emissions\n\nper unit of production) of 20%\n\nin the period from 2002 to 2008.\n\n**SUPPORTING COMMUNITIES**\n\nSantos has relationships with a\n\nnumber of communities where it\n\noperates. Some have been long-\n\nterm and others are just beginning.\n\nRelationships with communities\n\noutside Australia, such as Indonesia\n\nand the United States, are also\n\nemerging as Santos’ business grows\n\nin these locations.\n\nSantos made contributions\n\nduring 2004 to a wide variety of\n\norganisations and events through\n\nthe sponsorship program as part\n\nof the Company’s commitment\n\nto supporting the communities\n\nto which it belongs.\n\nPartnerships continued in 2004\n\nwith the Australian School of\n\nPetroleum, the Adelaide Symphony\n\nOrchestra, the State Opera\n\nCompany of South Australia, the\n\nArt Gallery of South Australia and\n\nthe Lloyd McDermott Foundation.\n\nOne of the highlights of the 2004\n\nprogram was the establishment\n\nof the Santos Community Fund.\n\nIt brings together all of the\n\ncontributions Santos makes to\n\ncommunity-based organisations\n\nand recognises and supports the\n\nefforts of Santos employees who\n\nchoose to contribute their own\n\ntime and resources to improving\n\ntheir communities.\n\nThe ‘Our Patch’ program was a\n\nrecipient of this fund in 2004.\n\nThis is a joint initiative of the\n\nPatawalonga and Torrens\n\nCatchment Management Boards\n\nwhich encourages the local\n\ncommunity to assist with the\n\nrehabilitation and management\n\nof Adelaide’s water catchment.\n\nSantos has adopted a patch of\n\nthe River Torrens and employees\n\nare assisting with the remediation\n\nand revegetation of this area in\n\na volunteering program.\n\n**CORPORATE GOVERNANCE**\n\nFor the third year running, the\n\nintegrity of Santos’ corporate\n\ngovernance was recognised in\n\n2004 with the maximum five-star\n\nrating in the Corporate\n\nGovernance Research Report\n\nprepared by Horwath and the\n\nUniversity of Newcastle.\n\nA more detailed overview of\n\ncorporate governance at Santos\n\nfollows on page 29 of this\n\nAnnual Report.\n\nMore detailed information about\n\nsustainability at Santos is\n\ncontained in the Sustainability\n\nReview and copies are available\n\nfrom the Company and via the\n\nSantos website www.santos.com.\n\n**Santos employees rehabilitating a section of the River Torrens in Adelaide, as part of Santos’ three-year**\n\n**commitment to the Our Patch project.**", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**MALEO NEGOTIATIONS**\n\n**ADVANCED**\n\nOutside Australia, Santos and\n\nits co-venturers have executed\n\na Heads of Agreement for the\n\nsale of the entire gas reserves\n\nof the Maleo field offshore East\n\nJava, Indonesia. Santos continued\n\nnegotiations with PT Perusahaan\n\nGas Negara, Indonesia’s state-\n\nowned gas distributor, on behalf\n\nof the joint venture to finalise\n\nthe Gas Sales Agreement. The\n\nproject is targeting first\n\nproduction in the first half of\n\n2006 at rates of up to 100\n\nmmcf/d for more than five years.\n\n**FIRST RETAIL GAS SALES WITH**\n\n**SANTOS DIRECT**\n\nAs well as selling gas into the\n\nwholesale gas market, Santos\n\nsecured a retail gas licence from\n\nthe Victorian Government in\n\n2004. This allows Santos to sell\n\ngas direct to industrial customers\n\nand into the Victorian spot\n\nmarket through a wholly-owned\n\nsubsidiary, Santos Direct Pty Ltd\n\n(‘Santos Direct’).\n\nSantos Direct will market Santos’\n\n10% share of gas production from\n\nthe Minerva field - around 15\n\nTJ/d - in the offshore Otway\n\nBasin, which commenced\n\nproduction at the end of 2004.\n\nThe move to market and sell gas\n\ndirectly into the Victorian retail\n\nmarket is a first for Santos and\n\nleverages off Santos’ position as\n\none of Australia’s largest gas\n\nproducers, supplying wholesale\n\ngas to major industrial customers\n\nand specialist marketers in all\n\nmainland Australian states and\n\nterritories.\n\n**LIQUIDS MARKETING**\n\n**ALLIANCE WITH BP**\n\nAnother important marketing\n\ndevelopment during the year was\n\nthe decision to outsource the\n\nmarketing of crude oil and natural\n\ngas liquids to BP. The new\n\nmarketing arrangements are in\n\nresponse to the significantly\n\nhigher volumes of crude oil\n\nthat Santos will receive from\n\nthe Mutineer-Exeter and Oyong\n\nprojects, coming on stream\n\nin 2005, and the increasing\n\nglobalisation of the liquids\n\nmarketplace.\n\nThe validity of this approach has\n\nalready been demonstrated by the\n\nsale of the first Mutineer-Exeter\n\noil cargo at a premium to Tapis\n\ndespite a discount for the\n\nuncertain delivery date.\n\nSantos continues to build\n\nan inventory of high quality\n\noptions to provide a platform\n\nfor production growth over\n\nthe coming years. Santos is\n\ncommitted to a program of\n\ndiversification while capitalising\n\non the long-term Cooper Basin\n\nlegacy asset. Most importantly,\n\nthis involves leveraging\n\nthe strengths of the core\n\ncompetencies built up over\n\na number of years and Santos'\n\nwell-positioned domestic\n\ngas franchise.\n\nAnnual Report 2004 21\n\n**‘During 2004 we brought**\n\n**together everyone at Santos**\n\n**responsible for commercialisation**\n\n**into a single team. One of the**\n\n**outcomes from this was the**\n\n**introduction of gas swaps,**\n\n**where we were able to move**\n\n**gas between Santos assets in**\n\n**different states.’**\n\n**RICK WILKINSON**\n\nVice President\n\nGas Marketing\n\nand Commercialisation\n\n**The alignment of joint venture**\n\n**interests in the John Brookes and**\n\n**East Spar fields has created an**\n\n**important production hub at**\n\n**Varanus Island, Carnarvon Basin,**\n\n**offshore Western Australia.**", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 5\n\nis also located in relatively\n\nshallow water with infrastructure\n\nnearby, creating options for\n\nearly production.\n\nAt Santos, we are proud that an\n\nAustralian company took on that\n\nchallenge and succeeded, and I\n\ncongratulate the exploration and\n\ndrilling teams on a great effort.\n\nWith the Jeruk discovery behind\n\nus, Indonesia is at the forefront\n\nof our international exploration\n\nefforts. With eight wells planned\n\nin the region for 2005, Santos is\n\ncurrently the most active explorer\n\nin Indonesia.\n\n**A STRONG FINANCIAL**\n\n**PERFORMANCE**\n\nIt was pleasing that Santos\n\nwas able to conclude 2004\n\non a higher note than it started.\n\nWe achieved record annual\n\nrevenue thanks to higher oil and\n\ngas prices combined with the\n\nreturn of full production at\n\nMoomba to produce a 21.5% jump\n\nin second half sales: the best\n\nresult for any six-month period\n\nin Santos' history.\n\nThe average realised price for\n\ncrude oil was up nearly 19%\n\nto A$51.83 per barrel.\n\nThese results have left Santos\n\nwell positioned to continue its\n\nstrong investment program which\n\nsaw capital expenditure peak at\n\n$930 million in 2004.\n\nIn 2005 we expect to invest\n\naround $850 million of new\n\ncapital in projects and our\n\nstrategy is to plan for firm\n\ndevelopments based on\n\naffordability at relatively low oil\n\nprices. If higher prices continue\n\nand some projects mature quickly\n\nand can be given the green light,\n\nour overall capital expenditure\n\nmay be higher.\n\nProduction is expected to rise\n\nin 2005 when, as usual, our\n\nfinancial performance will be\n\nsubject to oil prices, exchange\n\nrates and interest rates. These\n\nfactors have a significant effect\n\non our bottom line. A US$1 per\n\nbarrel change in the oil price\n\nequates to a A$16 million change\n\nin net profit after tax in 2005.\n\nA one US cent movement in the\n\nAustralia- US dollar exchange rate\n\nwould produce a change in profit\n\nafter tax of A$8 million, and\n\na 1% change in interest rates\n\nequates to a change in net profit\n\nafter tax of A$9 million.\n\n2004 has also been an important\n\nperiod for shareholders, with a\n\nsignificant improvement in the\n\nSantos share price combined with\n\nan increase in the dividend.\n\n**PRODUCTION TO REBOUND**\n\nWhile we expected lower\n\nproduction overall in 2004, our\n\noutput was obviously curtailed\n\nfurther by the incident at the\n\nMoomba plant. The good news\n\nis that several projects emerged\n\nfrom the development pipeline\n\nduring the year and made positive\n\ncontributions to our expanding\n\nsuite of oil and gas facilities.\n\nProduction is forecast to increase\n\nby 15% in 2005, or by 4% after\n\nexcluding the effect of the\n\nMoomba downtime, to about\n\n54 million boe. We expect this\n\npositive forward trend to be\n\nfollowed by further production\n\ngrowth of more than 10% in 2006.\n\nThe Bayu-Undan liquids project\n\ncame on line in April 2004\n\nand, at its increased design\n\nthroughput of just over one\n\nbillion cubic feet of gas per day,\n\nproduced liquids at a rate of\n\n100,000 barrels per day.\n\nBayu-Undan is currently stripping\n\nliquids and re-injecting the gas\n\npending tie-in of the pipeline to\n\nDarwin in May 2005 for future\n\nLNG production. The onshore LNG\n\nfacilities are more than two-thirds\n\ncomplete. With a gross production\n\nof 19 million barrels, 22% above\n\nexpectations for the year, we were\n\npleased with the performance of\n\nBayu-Undan and look forward to\n\na full year contribution from this\n\nexciting project in 2005.\n\nThe Minerva gas field off\n\nVictoria's western coast started\n\nproduction in December 2004\n\nand is ramping up to full field\n\nproduction of around 150 TJ\n\nper day. Our share in this project\n\nis 10%, and is significant because\n\nit represents our first foray\n\ninto marketing gas directly to\n\ncustomers or into the Victorian\n\nspot market through our sales\n\nvehicle, Santos Direct, aimed\n\nat delivering higher prices.\n\n**RECORD EXPLORATION**\n\n**EFFORT AHEAD**\n\nExploration is a great way to\n\nincrease shareholder value so\n\nI am pleased to be able to report", - "page_start": 6, - "page_end": 6, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 11\n\n**DEPRECIATION, DEPLETION AND**\n\n**AMORTISATION**\n\nAll things being equal, DD&A\n\ncould have been expected to\n\nbe lower this year, as Santos\n\nproduced lower volumes and had\n\nwritten off the Heytesbury plant\n\nin the onshore Otway Basin\n\nlast year.\n\nHowever, two factors caused an\n\nincrease in 2004 DD&A. Firstly,\n\nwhile reserve revisions were\n\npositive overall, negative\n\nrevisions were predominantly in\n\nproducing areas which increased\n\ndepletion rates in 2004, while\n\npositive reserve revisions were in\n\nareas where Santos is not yet\n\nproducing or where straight line\n\ndepreciation is dominant; for\n\nexample, Casino and John\n\nBrookes.\n\nSecondly, on the future\n\ndevelopment cost side, depletion\n\nis up partly because Santos is\n\nstarting to factor in higher steel\n\nand service company costs into\n\nlong-term economic models.\n\n**CASH FLOW LOWER**\n\nWhile Santos had a strong profit\n\nyear, this is not fully reflected in\n\ncash flows.\n\nThere were large movements\n\nin trade debtors between years,\n\nreflecting the timing of liftings\n\nand the payments for them.\n\nIn addition, Santos has not yet\n\nbeen paid for the insurance claim\n\nrelating to the Moomba incident.\n\nA total of $117 million was\n\nrecognised in sundry income,\n\nwhich represents an estimate\n\nof the amount receivable from\n\ninsurers for lost revenue,\n\nadditional costs and replacement\n\nplant and equipment. At year end\n\nthe money was still owed and so\n\nis not shown as part of operating\n\ncash flow. The final quantification\n\nof the claim with insurers is\n\nprogressing.\n\n**RECORD CAPITAL EXPENDITURE**\n\nCapital expenditure ended\n\nright on target at $930 million -\n\na record year for Santos -\n\napproaching a level which is\n\ndouble DD&A, reflecting how\n\nrapidly the portfolio is changing.\n\nSantos will continue with a high\n\ndevelopment expenditure in 2005,\n\nbut expects to spend more in line\n\nwith cash generation. Exploration\n\nspend is estimated to be about\n\n$150 million, while development\n\nspend is expected to be reduced\n\nto $530 million and delineation\n\nto $90 million. Other capital\n\nspending is expected to be\n\nreduced to $80 million.\n\nThis results in a total planned\n\ncapital expenditure for 2005 of\n\napproximately $850 million.\n\n**FINANCIAL FLEXIBILITY INTACT**\n\nSantos ended the year in a\n\nstrong financial position with its\n\nfinancial flexibility intact, despite\n\nthe record development spending.\n\nThe FUELS issue was successful\n\nand Santos’ gearing increased\n\nonly marginally, despite the large\n\ncapital program in 2004.\n\nThis is important in Santos’\n\nbusiness as the Company needs\n\nto be able to fund exploration\n\nsuccess as it occurs, and our\n\ndevelopment projects are\n\nincreasing in size.\n\n’01 ’02 ’03 **’04**\n\n**OPERATING CASH FLOW AND CAPITAL EXPENDITURE**\n\n$million\n\nOperating cash flow Capital expenditure\n\n0\n\n200\n\n400\n\n600\n\n800\n\n1000\n\n717\n\n660\n\n761 750\n\n**605**\n\n821 897 **930**", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 TAPPING INTO THE ENERGY… INSIDE Santos Ltd ABN 80 007 550 923 CHAIRMAN’S REVIEW **2** Stephen Gerlach comments on Santos’ performance in 2004. 2004 ACHIEVEMENTS 2005 AND BEYOND **3** Key achievements in 2004 and three-year performance, plus what to look for in the near-term future. MANAGING DIRECTOR’S REVIEW **4** John Ellice-Flint reviews Santos’ 50th year, where the values embodied in the great explorers of yesteryear are shaping Santos today. THE WORLD OF SANTOS **8** Locations of Santos’ global exploration, development and production activities. ANALYSING FINANCIAL PERFORMANCE **10** Putting the numbers in perspective and explaining the 2004 financial results. LEVERAGING BASE BUSINESS **12** Production results for 2004 plus a review of activities that are creating value in Santos’ base business. CREATING OPPORTUNITIES **15** Exploration strategy, results and acreage acquisitions, 2005 program and new venture opportunities.", - "page_start": 0, - "page_end": 0, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 70\n\nNOTES TO THE FINANCIAL STATEMENTS\n\nfor the year ended 31 December 2004\n\n**22. Investments in Controlled Entities**\n\n**Name Place of Name Place of**\n\n**incorporation incorporation**\n\n1 Beneficial interests in all controlled entities is 100% except for Kipper GS Pty Ltd in which two shares of the total issued capital of 9,246,353\n\nshares are owned by a third party.\n\n2 Company acquired during the year.\n\n3 Company incorporated during the year.\n\n**Santos Ltd (Parent Entity)** SA\n\n**Controlled entities <sup>1</sup> :**\n\nAlliance Petroleum Australia Pty Ltd VIC\n\nBoston L.H.F. Pty Ltd VIC\n\nBridgefield Pty Ltd QLD\n\nBridge Oil Developments Pty Limited NSW\n\nCanso Resources Pty Ltd NSW\n\nCoveyork Pty Ltd NSW\n\nDoce Pty Ltd QLD\n\nFarmout Drillers Pty Ltd NSW\n\nKipper GS Pty Ltd WA\n\n*Controlled entity of Kipper GS Pty Ltd*\n\nCrusader (Victoria) Pty Ltd VIC\n\nMoonie Pipeline Company Pty Ltd QLD\n\nNovus Australia Resources NL <sup>2</sup> VIC\n\nReef Oil Pty Ltd NSW\n\nSantos Asia Pacific Pty Ltd QLD\n\n*Controlled entities of Santos Asia Pacific Pty Ltd*\n\nSantos (Sampang) Pty Ltd SA\n\nSantos (Warim) Pty Ltd SA\n\nSantos Australian Hydrocarbons Pty Ltd QLD\n\nSantos (BOL) Pty Ltd NSW\n\n*Controlled entity of Santos (BOL) Pty Ltd*\n\nBridge Oil Exploration Pty Limited ACT\n\nSantos Darwin LNG Pty Ltd ACT\n\nSantos Direct Pty Ltd <sup>3</sup> SA\n\nSantos Facilities Pty Ltd SA\n\nSantos Finance Ltd NSW\n\nSantos Globe Pty Ltd *(formerly Globex Far East Pty Ltd)* WA\n\nSantos International Holdings Pty Ltd ACT\n\n*Controlled entities of Santos International Holdings Pty Ltd*\n\nBarracuda Limited PNG\n\nLavana Limited PNG\n\nNovus UK (Kakap 2) Limited <sup>2</sup> UK\n\nPeko Offshore Ltd BER\n\nSanro Insurance Pte Ltd SING\n\nSantos Americas and Europe Corporation USA\n\n*Controlled entity of Santos Americas and Europe Corporation*\n\nSantos USA Corp USA\n\nSantos (Bawean) Pty Ltd SA\n\nSantos Brantas Pty Ltd <sup>3</sup> VIC\n\nSantos (Donggala) Pty Ltd <sup>3</sup> VIC\n\nSantos Egypt Pty Ltd <sup>3</sup> VIC\n\nSantos Hides Ltd PNG\n\nSantos International Operations Pty Ltd QLD\n\nSantos (Madura Offshore) Pty Ltd WA\n\nSantos Niugini Exploration Limited PNG\n\nSantos (Nth Bali 1) Pty Ltd SA\n\nSantos (Papalang) Pty Ltd SA\n\nSantos (Popodi) Pty Ltd SA\n\nSantos (JPDA 91-01) Pty Ltd ACT\n\nSantos (JPDA 91-12) Pty Ltd ACT\n\nSantos (NGA) Pty Ltd VIC\n\nSantos (N.T.) Pty Ltd ACT\n\n*Controlled entity of Santos (N.T.) Pty Ltd*\n\nBonaparte Gas & Oil Pty Limited NSW\n\nSantos Offshore Pty Ltd VIC\n\nSantos Oil Exploration (Malaysia) Sdn Bhd (in liquidation) MAL\n\nSantos Petroleum Pty Ltd NSW\n\nSantos QNT Pty Ltd QLD\n\n*Controlled entities of Santos QNT Pty Ltd*\n\nSantos QNT (No. 1) Pty Ltd QLD\n\n*Controlled entities of Santos QNT (No. 1) Pty Ltd*\n\nSantos Petroleum Management Pty Ltd QLD\n\nSantos Petroleum Operations Pty Ltd QLD\n\nTMOC Exploration Proprietary Limited QLD\n\nSantos QNT (No. 2) Pty Ltd QLD\n\n*Controlled entities of Santos QNT (No. 2) Pty Ltd*\n\nAssociated Petroleum Pty Ltd QLD\n\nMoonie Oil Pty Ltd QLD\n\nPetromin Pty Ltd QLD\n\nSantos (299) Pty Ltd QLD\n\nSantos Exploration Pty Ltd VIC\n\nSantos Gnuco Pty Ltd QLD\n\nTransoil Pty Ltd QLD\n\nSantos Resources Pty Ltd QLD\n\nSantos Timor Sea Pipeline Pty Ltd NSW\n\nSesap Pty Ltd <sup>2</sup> VIC\n\nVamgas Pty Ltd VIC", - "page_start": 71, - "page_end": 71, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 23\n\nIn 2004, Santos continued its\n\nnormal business of actively\n\nmanaging its portfolio through\n\nthe divestment of non-core assets\n\nand the acquisition of assets that\n\nfit well with existing Santos\n\nassets or can add to the ability\n\nof the Company to meet its\n\nstrategic goals.\n\nAs a result of this activity,\n\nSantos realised an after-tax profit\n\nof $47.4 million on oil and gas\n\nasset sales and will continue to\n\nhigh-grade its portfolio on an\n\nongoing basis.\n\nSantos entered into an agreement\n\nwith PT Medco during the first\n\nhalf of 2004 to acquire some of\n\nNovus Petroleum’s Indonesian and\n\nCooper Basin assets conditional\n\non the success of PT Medco’s\n\ntakeover offer for Novus, which\n\nwas ultimately successful.\n\nSpecifically, Santos announced\n\nin September 2004 that it had\n\nexecuted formal agreements to\n\nacquire an additional 4.75% of\n\nthe South Australian Cooper\n\nBasin, 18% of the Brantas PSC\n\nand 9% of the Kakap PSC from\n\nMedco for US$110 million. On\n\n31 December 2004, Santos paid\n\nMedco US$98 million for the\n\nmajority of the assets, with\n\npayment for the remaining 2.75%\n\nof Kakap PSC expected to be\n\nmade in the first quarter of 2005.\n\nThis acquisition was an important\n\npiece in the strategic puzzle to\n\ntie up access to follow-up\n\npotential from the successful\n\nexploration at Jeruk and to\n\nprovide a production base for\n\nthe newly established Indonesian\n\ncore area.\n\nAlso during the first half of 2004,\n\nSantos divested its remaining\n\n18.4% shareholding in Magellan\n\nPetroleum Australia Ltd, raising\n\napproximately $10.6 million.\n\nEarly in the second half of 2004,\n\nSantos concluded the sale of its\n\nnon-core onshore Otway Basin\n\ninterests to Origin Energy for\n\n$25.75 million. This sale\n\nresulted in an after-tax profit\n\nof $18 million that was booked\n\nin 2004.\n\nIn addition, an exploration\n\njoint venture was formed with\n\nConocoPhillips in the NT/P61\n\nblock offshore Darwin, Northern\n\nTerritory, to drill the Caldita well\n\nand provide Santos with access\n\nrights to a potential expansion of\n\nthe Wickham Point LNG facility.\n\nThis deal further enhances Santos’\n\ninfrastructure strategy to leverage\n\nits position within vital\n\ninfrastructure to improve\n\nshareholder value while reducing\n\nthe risk profile of the wildcat\n\nexploration program.\n\nDuring the third quarter, Santos\n\nexpanded its offshore Victorian\n\ngas interests to 50% in both the\n\nPatricia-Baleen and the Sole gas\n\nfields through the acquisition\n\nfrom Trinity Gas Resources of an\n\nadditional 30% interest in the\n\nPatricia-Baleen gas field and\n\nassociated processing facilities in\n\neastern Victoria and an additional\n\n15% interest in the Sole gas field.\n\nSantos earned its 30% additional\n\nequity in the Patricia-Baleen gas\n\nfield by meeting Trinity’s\n\nremaining share of drilling costs\n\non the Baleen 4 well which was\n\ndrilled successfully as a sidetrack\n\nwell of Baleen 3. Santos will earn\n\nits 15% additional equity in the\n\nSole gas field by meeting certain\n\ndevelopment costs on behalf of\n\nTrinity, if and when the Sole joint\n\nventure partners proceed to\n\ndevelop this gas resource.\n\nThe acquisition of these Victorian\n\ngas interests strengthens Santos’\n\ndomestic gas and infrastructure\n\nstrategy that was further\n\nenhanced by the OMV purchase\n\nannounced early in 2005.\n\nImportantly, Santos is now the\n\noperator of the strategic Orbost\n\ngas processing facility.\n\nLate in the year, Santos sold its\n\n18.02% share in the Carpentaria\n\nGas Pipeline between Ballera\n\nand Mount Isa in Queensland\n\nto Australian Pipeline Trust for\n\n$59 million, resulting in a\n\n$21 million after-tax profit\n\nthat was booked in the 2004\n\nfinancial year.\n\nENHANCING THE PORTFOLIO\n\n**BRANTAS PSC**", - "page_start": 24, - "page_end": 24, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 83\n\n**30. Superannuation Commitments (continued)**\n\nThe Santos Superannuation Plan has employee accrued benefits and assets as disclosed in the most recent financial report of the plan, as follows:\n\n**As at**\n\n**31 December 2003**\n\n**$million**\n\nNet market value of assets 195.8\n\nLess present value of employees’ accrued benefits as determined\n\nby actuarial assessment as at 1 January 2004 (194.8)\n\nExcess 1.0\n\nAt 31 December 2004 the vested benefits, or the benefits payable in the event of the termination of employment of each plan member, were\n\n$198.2 million (2003: $198.8 million) and the net market value of assets was $202.0 million (2003: $194.2 million).\n\n**Consolidated Santos Ltd**\n\n**2004** 2003 **2004** 2003\n\n**31. Contingent Liabilities $million** $million **$million** $million\n\nSantos Ltd and its controlled entities have the following contingent liabilities\n\narising in respect of:\n\nPerformance guarantees **9.8** 9.6 **6.3** 6.5\n\nClaims and litigation **8.1** 11.0 **2.3** 2.3\n\n**17.9** 20.6 **8.6** 8.8\n\nLegal advice in relation to the claims and litigation referred to above indicates that on the basis of available information, liability in respect of these\n\nclaims is unlikely to exceed $1.0 million on a consolidated basis.\n\nA number of the Australian interests of the Santos Group are located within areas the subject of one or more claims or applications for native title\n\ndetermination. Whatever the outcome of those claims or applications, it is not believed that they will significantly impact the Santos Group’s asset\n\nbase. The decision of the High Court of Australia in the “Wik” case has the potential to introduce delay in the grant of mineral and petroleum\n\ntenements and consequently to impact generally the timing of exploration, development and production operations. An assessment of the impact\n\nupon the timing of particular operations may require consideration and determination of complex legal and factual issues.\n\nGuarantees provided by Santos Ltd for borrowings in respect of controlled entities are disclosed in note 15.\n\nSantos Ltd has provided parent company guarantees in respect of:\n\n(a) the funding obligations of its subsidiary companies, Santos Timor Sea Pipeline Pty Ltd and Santos Darwin LNG Pty Ltd, relating to the\n\nconstruction of a pipeline from the Bayu-Undan Field to Wickham Point in Darwin and the construction of the LNG Plant in Darwin respectively,\n\nand has provided a funding commitment letter to these subsidiary companies together with Santos (JPDA 91-12) Pty Ltd. As at 31 December\n\n2004 the expenditure commitments of Santos Timor Sea Pipeline Pty Ltd and Santos Darwin LNG Pty Ltd for the above mentioned projects\n\ntotalled US$41.3 million (2003: US$107.6 million);\n\n(b) payment of Santos Egypt Ltd’s financial obligations under a farmout agreement and certain concessions in the Gulf of Suez in the Arab Republic\n\nof Egypt up to a maximum of US$46.9 million.", - "page_start": 84, - "page_end": 84, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 2\n\n## Chairman’s Review\n\nDELIVERING ON THE STRATEGY\n\nDear Shareholder,\n\nI am pleased to report that\n\nin 2004 Santos continued\n\nto deliver on its strategy to\n\ntransform the Company into a\n\ntruly international exploration\n\nand production business with\n\nworld-class operations.\n\nWhile the year saw many\n\npositives in terms of development\n\nand exploration success, it did\n\nnot get off to a good start with\n\nthe incident on New Year’s Day\n\nat the Moomba processing facility\n\nin central Australia.\n\nImportantly, Santos was able\n\nto work effectively with its key\n\nstakeholders, including customers,\n\njoint venturers and government\n\ndepartments, to minimise the\n\ncommercial impacts.\n\nNatural gas supplies were quickly\n\nrestored, in part by recovering\n\nprocessed gas from underground\n\nstorage reservoirs. Liquids\n\nprocessing facilities were\n\nprogressively reinstated allowing\n\nfurther increases to gas production\n\nand sales volumes, with the\n\nramp-up to full liquids production\n\nachieved by August as planned.\n\nA large proportion of the costs\n\nand foregone revenues associated\n\nwith the repair of the damaged\n\nplant and the reduced oil and\n\ngas production volumes are\n\nbeing recovered under\n\ninsurance policies.\n\nDue to the long cycle times\n\ninherent in the oil and gas\n\nbusiness, it had been recognised\n\nthat 2004 would be a year in\n\nwhich production was marginally\n\nbelow the previous year, with\n\nsubsequent increases in 2005\n\nand beyond driven by new\n\ndevelopment projects.\n\nIn this light, it is pleasing to\n\nreport that the Minerva gas and\n\nBayu-Undan liquids projects\n\ncommenced production during the\n\nyear as planned, while first oil\n\nfrom Mutineer-Exeter and several\n\nother key growth projects are\n\nprogressing to plan.\n\nIndonesia matured into a core\n\narea during 2004, through a\n\nstrategy of prudent acquisition,\n\nportfolio management and\n\nexploration. In particular, the\n\nJeruk discovery has the potential\n\nto add significant value, with\n\nfurther evaluation activities\n\nunderway.\n\nEven with the large effort\n\nexpended on the Moomba\n\nincident, Santos was able to\n\ndeliver strong results for 2004,\n\nreflecting higher average prices\n\nacross most products.\n\nGroup sales revenue increased by\n\n2.5% to a record $1,501 million,\n\nearnings before interest and tax\n\nimproved by 23% to $574 million\n\nand net profit after tax rose by\n\n16% to $380 million.\n\nThis strong financial performance,\n\ncombined with the confidence\n\nthat Santos will continue to grow\n\nearnings in the future, enabled\n\nthe Board to increase the final\n\ndividend on ordinary shares by\n\n20% from 15 cents to 18 cents\n\nper share, fully franked. For the\n\nfull year, dividends increased\n\nby 10% to 33 cents per share,\n\ncompared with 30 cents per share\n\nin each of the four previous\n\nyears. On a grossed up basis, this\n\nrepresents a yield of over 5%.\n\nIn response to increasing interest\n\nand enquiry from shareholders,\n\nthe Dividend Reinvestment Plan\n\nhas been reintroduced and\n\napplied to the final dividend\n\npaid during March 2005.\n\nSantos continued its proactive\n\napproach to capital management\n\nwith the redemption and buyback\n\nof the outstanding Preference\n\nShares and the issue of FUELS\n\n(Franked Unsecured Equity Listed\n\nSecurities). This initiative was\n\ndriven by the alignment of\n\nAustralian accounting standards\n\nwith international requirements,\n\nand closed oversubscribed, raising\n\n$600 million in new equity.\n\nThe total shareholder return for\n\nthe year, including share price\n\nappreciation and dividends paid,\n\nwas 28% - an excellent result.\n\nIn addition to our focus\n\non shareholder value, Santos\n\ntakes its corporate social\n\nresponsibilities seriously and\n\nis committed to sustainability\n\nas a core value in all operations.\n\nThe Company’s first Sustainability\n\nReview was released during\n\nthe year.\n\nSantos continues to be\n\nrecognised for the high quality\n\nof its corporate governance,\n\nreceiving a measure of five out\n\nof five for corporate governance\n\nfor the third successive year", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_STO_2004.pdf", - "query": "What is the main focus of the Santos 2005 program ?", - "target_page": 19, - "target_passage": " Oil is the main focus of the 2005 program", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Annual Report 2004 28\n\nof opportunities to use fewer\n\ngreenhouse-emitting or renewable\n\nsources of energy.\n\nTo achieve these commitments\n\nSantos is actively pursuing an\n\nemissions intensity reduction\n\ntarget (greenhouse emissions\n\nper unit of production) of 20%\n\nin the period from 2002 to 2008.\n\n**SUPPORTING COMMUNITIES**\n\nSantos has relationships with a\n\nnumber of communities where it\n\noperates. Some have been long-\n\nterm and others are just beginning.\n\nRelationships with communities\n\noutside Australia, such as Indonesia\n\nand the United States, are also\n\nemerging as Santos’ business grows\n\nin these locations.\n\nSantos made contributions\n\nduring 2004 to a wide variety of\n\norganisations and events through\n\nthe sponsorship program as part\n\nof the Company’s commitment\n\nto supporting the communities\n\nto which it belongs.\n\nPartnerships continued in 2004\n\nwith the Australian School of\n\nPetroleum, the Adelaide Symphony\n\nOrchestra, the State Opera\n\nCompany of South Australia, the\n\nArt Gallery of South Australia and\n\nthe Lloyd McDermott Foundation.\n\nOne of the highlights of the 2004\n\nprogram was the establishment\n\nof the Santos Community Fund.\n\nIt brings together all of the\n\ncontributions Santos makes to\n\ncommunity-based organisations\n\nand recognises and supports the\n\nefforts of Santos employees who\n\nchoose to contribute their own\n\ntime and resources to improving\n\ntheir communities.\n\nThe ‘Our Patch’ program was a\n\nrecipient of this fund in 2004.\n\nThis is a joint initiative of the\n\nPatawalonga and Torrens\n\nCatchment Management Boards\n\nwhich encourages the local\n\ncommunity to assist with the\n\nrehabilitation and management\n\nof Adelaide’s water catchment.\n\nSantos has adopted a patch of\n\nthe River Torrens and employees\n\nare assisting with the remediation\n\nand revegetation of this area in\n\na volunteering program.\n\n**CORPORATE GOVERNANCE**\n\nFor the third year running, the\n\nintegrity of Santos’ corporate\n\ngovernance was recognised in\n\n2004 with the maximum five-star\n\nrating in the Corporate\n\nGovernance Research Report\n\nprepared by Horwath and the\n\nUniversity of Newcastle.\n\nA more detailed overview of\n\ncorporate governance at Santos\n\nfollows on page 29 of this\n\nAnnual Report.\n\nMore detailed information about\n\nsustainability at Santos is\n\ncontained in the Sustainability\n\nReview and copies are available\n\nfrom the Company and via the\n\nSantos website www.santos.com.\n\n**Santos employees rehabilitating a section of the River Torrens in Adelaide, as part of Santos’ three-year**\n\n**commitment to the Our Patch project.**", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 TAPPING INTO THE ENERGY… INSIDE Santos Ltd ABN 80 007 550 923 CHAIRMAN’S REVIEW **2** Stephen Gerlach comments on Santos’ performance in 2004. 2004 ACHIEVEMENTS 2005 AND BEYOND **3** Key achievements in 2004 and three-year performance, plus what to look for in the near-term future. MANAGING DIRECTOR’S REVIEW **4** John Ellice-Flint reviews Santos’ 50th year, where the values embodied in the great explorers of yesteryear are shaping Santos today. THE WORLD OF SANTOS **8** Locations of Santos’ global exploration, development and production activities. ANALYSING FINANCIAL PERFORMANCE **10** Putting the numbers in perspective and explaining the 2004 financial results. LEVERAGING BASE BUSINESS **12** Production results for 2004 plus a review of activities that are creating value in Santos’ base business. CREATING OPPORTUNITIES **15** Exploration strategy, results and acreage acquisitions, 2005 program and new venture opportunities.", - "page_start": 0, - "page_end": 0, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**MALEO NEGOTIATIONS**\n\n**ADVANCED**\n\nOutside Australia, Santos and\n\nits co-venturers have executed\n\na Heads of Agreement for the\n\nsale of the entire gas reserves\n\nof the Maleo field offshore East\n\nJava, Indonesia. Santos continued\n\nnegotiations with PT Perusahaan\n\nGas Negara, Indonesia’s state-\n\nowned gas distributor, on behalf\n\nof the joint venture to finalise\n\nthe Gas Sales Agreement. The\n\nproject is targeting first\n\nproduction in the first half of\n\n2006 at rates of up to 100\n\nmmcf/d for more than five years.\n\n**FIRST RETAIL GAS SALES WITH**\n\n**SANTOS DIRECT**\n\nAs well as selling gas into the\n\nwholesale gas market, Santos\n\nsecured a retail gas licence from\n\nthe Victorian Government in\n\n2004. This allows Santos to sell\n\ngas direct to industrial customers\n\nand into the Victorian spot\n\nmarket through a wholly-owned\n\nsubsidiary, Santos Direct Pty Ltd\n\n(‘Santos Direct’).\n\nSantos Direct will market Santos’\n\n10% share of gas production from\n\nthe Minerva field - around 15\n\nTJ/d - in the offshore Otway\n\nBasin, which commenced\n\nproduction at the end of 2004.\n\nThe move to market and sell gas\n\ndirectly into the Victorian retail\n\nmarket is a first for Santos and\n\nleverages off Santos’ position as\n\none of Australia’s largest gas\n\nproducers, supplying wholesale\n\ngas to major industrial customers\n\nand specialist marketers in all\n\nmainland Australian states and\n\nterritories.\n\n**LIQUIDS MARKETING**\n\n**ALLIANCE WITH BP**\n\nAnother important marketing\n\ndevelopment during the year was\n\nthe decision to outsource the\n\nmarketing of crude oil and natural\n\ngas liquids to BP. The new\n\nmarketing arrangements are in\n\nresponse to the significantly\n\nhigher volumes of crude oil\n\nthat Santos will receive from\n\nthe Mutineer-Exeter and Oyong\n\nprojects, coming on stream\n\nin 2005, and the increasing\n\nglobalisation of the liquids\n\nmarketplace.\n\nThe validity of this approach has\n\nalready been demonstrated by the\n\nsale of the first Mutineer-Exeter\n\noil cargo at a premium to Tapis\n\ndespite a discount for the\n\nuncertain delivery date.\n\nSantos continues to build\n\nan inventory of high quality\n\noptions to provide a platform\n\nfor production growth over\n\nthe coming years. Santos is\n\ncommitted to a program of\n\ndiversification while capitalising\n\non the long-term Cooper Basin\n\nlegacy asset. Most importantly,\n\nthis involves leveraging\n\nthe strengths of the core\n\ncompetencies built up over\n\na number of years and Santos'\n\nwell-positioned domestic\n\ngas franchise.\n\nAnnual Report 2004 21\n\n**‘During 2004 we brought**\n\n**together everyone at Santos**\n\n**responsible for commercialisation**\n\n**into a single team. One of the**\n\n**outcomes from this was the**\n\n**introduction of gas swaps,**\n\n**where we were able to move**\n\n**gas between Santos assets in**\n\n**different states.’**\n\n**RICK WILKINSON**\n\nVice President\n\nGas Marketing\n\nand Commercialisation\n\n**The alignment of joint venture**\n\n**interests in the John Brookes and**\n\n**East Spar fields has created an**\n\n**important production hub at**\n\n**Varanus Island, Carnarvon Basin,**\n\n**offshore Western Australia.**", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 27\n\nbe working in business operations\n\nwith a lean and efficient\n\ncorporate and services group.\n\nWith the exception of a small\n\nnumber of project teams, all\n\nnon-award based positions\n\nin the Company were declared\n\nvacant and a selection process\n\ncommenced around a set of\n\ncriteria designed to ensure that\n\npeople with the right skills and\n\nthe ability to successfully grow\n\nSantos were appointed.\n\nAs is often the case with\n\ntransformational change\n\ninitiatives, not everyone was\n\nre-appointed and, as a result, the\n\nworkforce was reduced by 9%.\n\n**CULTURE CHANGE**\n\nThe need to develop a culture\n\nthat supports the newly designed\n\nbusiness processes was another\n\nof the major outcomes of the\n\nchange program. A Santos-wide\n\nculture change program led by\n\nemployees is currently underway.\n\nThis long-term program is\n\ndesigned to ensure that the\n\nway employees work together\n\nenhances Santos’ ability\n\nto be successful.\n\nOne of the first tasks undertaken\n\nwas a voluntary employee survey\n\nto identify the gaps between the\n\nexisting culture and the desired\n\nculture. The outcomes of the\n\nsurvey will assist in the\n\ndevelopment of programs and\n\nactivities that will better align\n\nwork practices with Santos’\n\nstrategic goals.\n\n**TRAINING AND DEVELOPING**\n\n**PEOPLE**\n\nMaking sure training and\n\ndevelopment supports current\n\nand future business requirements,\n\nand provides opportunities for\n\npeople to develop their skills to\n\nachieve optimum performance,\n\nare key aspects of Santos’ human\n\nresources strategy.\n\nSantos has a number of long-term\n\nprojects underway which will\n\noptimise the substantial\n\ninvestment the Company makes\n\nin training people. Importantly,\n\nthese projects will deliver\n\nprograms that are targeted to\n\nmeet business and individual\n\nneeds and to support culture\n\nchange initiatives.\n\n**BANKSIA AWARDS**\n\nSantos was selected in 2004\n\nas a finalist in the Banksia\n\nEnvironmental Awards for the\n\nwork undertaken in the Company-\n\nled initiative to protect the\n\nworld-renowned Coongie Lakes,\n\nresulting in the area being\n\ndeclared a new National Park by\n\nthe South Australian Government.\n\nAs a finalist for this award Santos\n\nwas recognised for its leadership\n\nrole in bringing together a group\n\nof disparate parties to develop a\n\nMemorandum of Understanding\n\nrecommending further protection\n\nfor the Coongie Lakes.\n\n**WASTE MANAGEMENT**\n\nSantos trialled innovative waste\n\nmanagement techniques during\n\n2004 to reduce the volume of\n\nhydrocarbon waste generated\n\nfrom Cooper Basin operations.\n\nPreliminary results indicate that\n\nthese waste volumes can be\n\nreduced to 3-5% of their original\n\nvolume, which is a significant\n\nachievement.\n\nThis technology will be\n\nimplemented where possible\n\nacross Santos operations. The\n\nlong-term environmental and\n\nfinancial benefits of using this\n\ntechnology are expected to be\n\nconsiderable.\n\n**REDUCED OIL SPILLS**\n\nThere was a substantial reduction\n\nin the volume of hydrocarbons\n\nreleased to the environment\n\nin 2004, with uncontained\n\nhydrocarbons spilt reducing from\n\n1,943 cubic metres to 83 cubic\n\nmetres and Santos continues to\n\nfocus on reducing oil spills.\n\n**GREENHOUSE POLICY**\n\nSantos released its Greenhouse\n\nPolicy in 2004 to drive performance\n\nimprovements in this area through\n\nreducing emissions and producing\n\noil and gas more efficiently.\n\nSantos’ Greenhouse Policy is\n\nbeing rolled out across the\n\norganisation through cross-\n\nfunctional greenhouse gas teams\n\nthat have the right skill sets and\n\nresponsibilities to progress this\n\ninitiative. These teams will\n\nmanage Greenhouse Policy and\n\nregulation, carbon management\n\nand trading opportunities, and\n\nenergy efficiency. A key internal\n\ndriver for emissions reduction\n\nwill be the promotion of energy\n\nefficiency.\n\nSantos is committed to achieving\n\neffective emission reduction\n\ntargets, to the pursuit of energy\n\nefficiency strategies and to the\n\nidentification and implementation\n\n’01 ’02 ’03 ’04\n\n**OIL SPILL VOLUMES**\n\nm <sup>3</sup>\n\n0\n\n500\n\n1000", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 23\n\nIn 2004, Santos continued its\n\nnormal business of actively\n\nmanaging its portfolio through\n\nthe divestment of non-core assets\n\nand the acquisition of assets that\n\nfit well with existing Santos\n\nassets or can add to the ability\n\nof the Company to meet its\n\nstrategic goals.\n\nAs a result of this activity,\n\nSantos realised an after-tax profit\n\nof $47.4 million on oil and gas\n\nasset sales and will continue to\n\nhigh-grade its portfolio on an\n\nongoing basis.\n\nSantos entered into an agreement\n\nwith PT Medco during the first\n\nhalf of 2004 to acquire some of\n\nNovus Petroleum’s Indonesian and\n\nCooper Basin assets conditional\n\non the success of PT Medco’s\n\ntakeover offer for Novus, which\n\nwas ultimately successful.\n\nSpecifically, Santos announced\n\nin September 2004 that it had\n\nexecuted formal agreements to\n\nacquire an additional 4.75% of\n\nthe South Australian Cooper\n\nBasin, 18% of the Brantas PSC\n\nand 9% of the Kakap PSC from\n\nMedco for US$110 million. On\n\n31 December 2004, Santos paid\n\nMedco US$98 million for the\n\nmajority of the assets, with\n\npayment for the remaining 2.75%\n\nof Kakap PSC expected to be\n\nmade in the first quarter of 2005.\n\nThis acquisition was an important\n\npiece in the strategic puzzle to\n\ntie up access to follow-up\n\npotential from the successful\n\nexploration at Jeruk and to\n\nprovide a production base for\n\nthe newly established Indonesian\n\ncore area.\n\nAlso during the first half of 2004,\n\nSantos divested its remaining\n\n18.4% shareholding in Magellan\n\nPetroleum Australia Ltd, raising\n\napproximately $10.6 million.\n\nEarly in the second half of 2004,\n\nSantos concluded the sale of its\n\nnon-core onshore Otway Basin\n\ninterests to Origin Energy for\n\n$25.75 million. This sale\n\nresulted in an after-tax profit\n\nof $18 million that was booked\n\nin 2004.\n\nIn addition, an exploration\n\njoint venture was formed with\n\nConocoPhillips in the NT/P61\n\nblock offshore Darwin, Northern\n\nTerritory, to drill the Caldita well\n\nand provide Santos with access\n\nrights to a potential expansion of\n\nthe Wickham Point LNG facility.\n\nThis deal further enhances Santos’\n\ninfrastructure strategy to leverage\n\nits position within vital\n\ninfrastructure to improve\n\nshareholder value while reducing\n\nthe risk profile of the wildcat\n\nexploration program.\n\nDuring the third quarter, Santos\n\nexpanded its offshore Victorian\n\ngas interests to 50% in both the\n\nPatricia-Baleen and the Sole gas\n\nfields through the acquisition\n\nfrom Trinity Gas Resources of an\n\nadditional 30% interest in the\n\nPatricia-Baleen gas field and\n\nassociated processing facilities in\n\neastern Victoria and an additional\n\n15% interest in the Sole gas field.\n\nSantos earned its 30% additional\n\nequity in the Patricia-Baleen gas\n\nfield by meeting Trinity’s\n\nremaining share of drilling costs\n\non the Baleen 4 well which was\n\ndrilled successfully as a sidetrack\n\nwell of Baleen 3. Santos will earn\n\nits 15% additional equity in the\n\nSole gas field by meeting certain\n\ndevelopment costs on behalf of\n\nTrinity, if and when the Sole joint\n\nventure partners proceed to\n\ndevelop this gas resource.\n\nThe acquisition of these Victorian\n\ngas interests strengthens Santos’\n\ndomestic gas and infrastructure\n\nstrategy that was further\n\nenhanced by the OMV purchase\n\nannounced early in 2005.\n\nImportantly, Santos is now the\n\noperator of the strategic Orbost\n\ngas processing facility.\n\nLate in the year, Santos sold its\n\n18.02% share in the Carpentaria\n\nGas Pipeline between Ballera\n\nand Mount Isa in Queensland\n\nto Australian Pipeline Trust for\n\n$59 million, resulting in a\n\n$21 million after-tax profit\n\nthat was booked in the 2004\n\nfinancial year.\n\nENHANCING THE PORTFOLIO\n\n**BRANTAS PSC**", - "page_start": 24, - "page_end": 24, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 11\n\n**DEPRECIATION, DEPLETION AND**\n\n**AMORTISATION**\n\nAll things being equal, DD&A\n\ncould have been expected to\n\nbe lower this year, as Santos\n\nproduced lower volumes and had\n\nwritten off the Heytesbury plant\n\nin the onshore Otway Basin\n\nlast year.\n\nHowever, two factors caused an\n\nincrease in 2004 DD&A. Firstly,\n\nwhile reserve revisions were\n\npositive overall, negative\n\nrevisions were predominantly in\n\nproducing areas which increased\n\ndepletion rates in 2004, while\n\npositive reserve revisions were in\n\nareas where Santos is not yet\n\nproducing or where straight line\n\ndepreciation is dominant; for\n\nexample, Casino and John\n\nBrookes.\n\nSecondly, on the future\n\ndevelopment cost side, depletion\n\nis up partly because Santos is\n\nstarting to factor in higher steel\n\nand service company costs into\n\nlong-term economic models.\n\n**CASH FLOW LOWER**\n\nWhile Santos had a strong profit\n\nyear, this is not fully reflected in\n\ncash flows.\n\nThere were large movements\n\nin trade debtors between years,\n\nreflecting the timing of liftings\n\nand the payments for them.\n\nIn addition, Santos has not yet\n\nbeen paid for the insurance claim\n\nrelating to the Moomba incident.\n\nA total of $117 million was\n\nrecognised in sundry income,\n\nwhich represents an estimate\n\nof the amount receivable from\n\ninsurers for lost revenue,\n\nadditional costs and replacement\n\nplant and equipment. At year end\n\nthe money was still owed and so\n\nis not shown as part of operating\n\ncash flow. The final quantification\n\nof the claim with insurers is\n\nprogressing.\n\n**RECORD CAPITAL EXPENDITURE**\n\nCapital expenditure ended\n\nright on target at $930 million -\n\na record year for Santos -\n\napproaching a level which is\n\ndouble DD&A, reflecting how\n\nrapidly the portfolio is changing.\n\nSantos will continue with a high\n\ndevelopment expenditure in 2005,\n\nbut expects to spend more in line\n\nwith cash generation. Exploration\n\nspend is estimated to be about\n\n$150 million, while development\n\nspend is expected to be reduced\n\nto $530 million and delineation\n\nto $90 million. Other capital\n\nspending is expected to be\n\nreduced to $80 million.\n\nThis results in a total planned\n\ncapital expenditure for 2005 of\n\napproximately $850 million.\n\n**FINANCIAL FLEXIBILITY INTACT**\n\nSantos ended the year in a\n\nstrong financial position with its\n\nfinancial flexibility intact, despite\n\nthe record development spending.\n\nThe FUELS issue was successful\n\nand Santos’ gearing increased\n\nonly marginally, despite the large\n\ncapital program in 2004.\n\nThis is important in Santos’\n\nbusiness as the Company needs\n\nto be able to fund exploration\n\nsuccess as it occurs, and our\n\ndevelopment projects are\n\nincreasing in size.\n\n’01 ’02 ’03 **’04**\n\n**OPERATING CASH FLOW AND CAPITAL EXPENDITURE**\n\n$million\n\nOperating cash flow Capital expenditure\n\n0\n\n200\n\n400\n\n600\n\n800\n\n1000\n\n717\n\n660\n\n761 750\n\n**605**\n\n821 897 **930**", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 26\n\nLate in 2004 Santos published\n\n*First Steps: Sustainability Review* ,\n\nthe Company’s first standalone\n\npublication on this topic.\n\nIt describes how Santos is\n\nimplementing the principles\n\nof sustainability in the areas\n\nof corporate governance, the\n\nenvironment, social responsibility\n\nand economic performance.\n\nThis was a significant milestone\n\nfor Santos as it represents a\n\nstarting point for the collection\n\nof data and the ongoing\n\nmeasurement of performance\n\nin the area of sustainability.\n\nCommunicating with stakeholders\n\nis an important activity and the\n\npublication of the Sustainability\n\nReview is a further extension\n\nof Santos’ commitment in this\n\nregard. Santos applies considerable\n\nresources to the communication\n\neffort and aims to present\n\ninformation in a clear and concise\n\nmanner in order to generate a\n\ngreater understanding of the\n\nbusiness by its stakeholders.\n\nSantos has been recognised for\n\nits achievements in this area.\n\nSantos’ 2003 Annual Report\n\nwas featured as an example\n\nof best practice reporting in\n\nPricewaterhouseCoopers’ *Trends*\n\n*in Corporate Reporting 2004*\n\npublication. Reports from\n\ncompanies worldwide are\n\nconsidered in compiling this\n\npublication and they must\n\nmeet specified criteria. This is\n\nthe third time a Santos annual\n\nreport has been featured. Santos\n\nwas also awarded a 2004 Silver\n\nAward for Excellence in Annual\n\nReporting for the 2002 Annual\n\nReport by the Australasian\n\nReporting Awards.\n\nReceiving independent recognition\n\nfor these activities serves as\n\na reference point for Santos’\n\ndesire to continually improve\n\ncommunication performance.\n\nSantos has been listed as\n\nan inaugural member of the\n\nAustralian SAM Sustainability\n\nIndex (AuSSI). The AuSSI tracks\n\nthe performance of around 70\n\nAustralian companies that lead\n\ntheir industry in terms of\n\neconomic, environmental and\n\nsocial criteria. The index is\n\ncalculated daily by Dow Jones\n\nIndexes and published in *The*\n\n*Australian* newspaper.\n\nFollowing is an overview of\n\nprogress and achievements in the\n\narea of sustainability for 2004.\n\n**SAFETY IMPROVING**\n\nThe health and safety of employees\n\nis of paramount concern to Santos.\n\nSantos delivered another year of\n\nimprovement in 2004 and achieved\n\nits lowest total recordable case\n\nfrequency rate of 6.4.\n\nFurther improvements were also\n\nmade with the implementation\n\nof the Environment, Health and\n\nSafety Management System\n\nstandards, with Santos operations\n\nundergoing full assessments\n\nagainst standards for the\n\nfirst time.\n\nThe results demonstrated\n\nconsiderable improvement\n\nover the baseline assessments\n\nconducted in 2003 with steady\n\nprogress in the implementation\n\nof the procedures, processes and\n\ntools needed to achieve the\n\nrequirements of the standards.\n\nProcess safety capability which\n\ndeals with plant and equipment\n\nintegrity assurance, design and\n\nconstruction, and maintenance,\n\nis being developed through\n\nthe formation of a new set of\n\nstandards to be incorporated\n\ninto the health and safety\n\nmanagement system.\n\nThe safety focus in 2005 will be\n\non finalising a comprehensive set\n\nof hazard standards which outline\n\nthe required controls to ensure\n\nthat hazards encountered across\n\nSantos’ operations and activities\n\nare well managed.\n\n**POSITIONING THE WORKFORCE**\n\n**FOR THE FUTURE**\n\nSantos commenced a major\n\ncompany-wide transformational\n\nchange program in late 2003.\n\nThe program was designed to\n\nsignificantly improve Santos’\n\nperformance in four areas: key\n\nbusiness processes, financial\n\nperformance, organisation\n\nstructure and company culture.\n\nReorganising and simplifying the\n\nCompany’s structure was one of\n\nthe major outcomes and in May\n\n2004 Santos began operating\n\nunder a new functionally-based\n\norganisation structure.\n\nThe new structure is designed\n\nto support the exploration-\n\nfocused growth strategy.\n\nIt mirrors the ‘conveyor belt’\n\nlifecycle of an exploration\n\nand production company where\n\nexploration success leads\n\nto commercialisation and", - "page_start": 27, - "page_end": 27, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Santos’ Strategic Projects team\n\nfocuses on assets that have\n\nproven difficult to commercialise\n\nor that need to be considered\n\nin a regional context rather than\n\non an individual basis.\n\nThe other key activity for this\n\nteam has been to lead Santos’\n\ncontinuous improvement focus.\n\n**UNITED STATES GAS**\n\nThe US gas business was a major\n\nfocus in 2004 for a number of\n\nreasons, not the least of which\n\nare the higher gas prices in the\n\nUS compared with the domestic\n\nAustralian market, and the ability\n\nto rapidly commercialise new\n\ndiscoveries.\n\nAn ongoing development and\n\ndelineation program was carried\n\nout during the year, yielding\n\nbetter than planned production.\n\nThe exploration initiative also\n\ncontinued to seek higher risk\n\nbut more material prospects,\n\naimed at enhancing the move\n\ninto the shallow water area of\n\nthe Gulf of Mexico. Exploration\n\nresults in this area during 2005\n\nwill shape Santos’ future strategy\n\nin the US.\n\n**TIGHT GAS**\n\nHydrocarbons contained in traps\n\nwith poor permeability are known\n\nas ‘tight gas’. Large tight gas\n\nresources are known to exist in\n\nthe Cooper Basin. Under current\n\ncircumstances, this gas cannot\n\nbe economically developed but,\n\nwith the combination of improved\n\nproduction techniques and better\n\ncommercial terms, could prove\n\nattractive.\n\nSantos assessed the resources\n\nand potential technologies that\n\ncould be applied to unlock these\n\nresources during 2004 and is now\n\nworking up a range of possible\n\nevaluation projects to be\n\nundertaken in 2005.\n\n**NORTHERN AUSTRALIA GAS**\n\nSantos has a significant existing\n\ngas resource base and some\n\npromising exploration acreage\n\nin the waters offshore Darwin,\n\nwhere it intends to drill a gas\n\nexploration well later this year.\n\nThe Company currently operates\n\nthe Mereenie gas field in the\n\nAmadeus Basin in central\n\nAustralia, which supplies gas to\n\nDarwin. Santos’ first offshore gas\n\nproduction in northern Australia\n\nbegins in 2006, sending Bayu-\n\nUndan gas to Darwin for\n\nconversion to LNG. Santos plans\n\nto build upon its growing\n\nposition in the region to target\n\nfurther development which could\n\nensure long-term gas supplies\n\nfor the current market, or an\n\nexpanded Northern Territory\n\ndomestic market, or for export.\n\n**PAPUA NEW GUINEA GAS**\n\nSantos is in active discussions\n\nwith the PNG Gas Project\n\nparticipants to potentially\n\nre-enter the PNG Gas Project.\n\nSantos has a significant interest\n\nin a large part of the liquids-rich\n\nHides gas field which is integral\n\nto the development of\n\nthe Project.\n\nAnnual Report 2004 22\n\n**‘Our objective is to derive value**\n\n**from undeveloped assets which**\n\n**have been outside of Santos’**\n\n**base business.’**\n\n**BRUCE WOOD**\n\nVice President\n\nStrategic Projects\n\n## Managing Options\n\nUNLOCKING THE VALUE OF STRATEGIC ASSETS\n\n**2004 CONTINGENT RESOURCES**\n\n(TOTAL 1,443 mmboe)\n\nNorthern Australia\n\n709 mmboe\n\nWestern Australia\n\n71 mmboe\n\nCentral Australia\n\n240 mmboe\n\nSouthern Australia\n\n32 mmboe\n\nPapua New Guinea\n\n391 mmboe", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 10\n\n**2004 WAS A YEAR OF GOOD**\n\n**OPERATING RESULTS**\n\nOverall the increase in 2004 profit\n\nof 16% reflected a year of sound\n\noperating performance. Sales\n\nrevenue was a record $1,501\n\nmillion, up 2.5% on 2003,\n\nreflecting higher prices across\n\nmost products and was achieved\n\ndespite lower production as a\n\nresult of the Moomba incident\n\nand declining output from late\n\nlife fields.\n\nSantos benefited from higher\n\nworld oil prices and realised\n\nUS$51.83 per boe in 2004, an\n\nincrease of 19% over 2003. The\n\nbenefit of higher world oil prices\n\nsubstantially offset the impact\n\nof lower production volumes.\n\nSantos was also able to negotiate\n\nhigher domestic gas prices (up\n\n4% on average) and deliver new\n\nrevenue streams from project\n\nstart-ups and acquisitions during\n\nthe year.\n\n**PRODUCTION HAMPERED BY**\n\n**MOOMBA INCIDENT**\n\n2004 production was lower due\n\nto the Moomba incident, which\n\nreduced production by 4.6 million\n\nboe. Field decline reduced\n\nproduction by a further\n\n5.0 million boe.\n\nOffsetting these factors, Santos’\n\ngrowth projects are starting to\n\ncome on line and have begun to\n\nreverse the decline experienced\n\nover the past three years. Two\n\nprojects were commissioned in\n\n2004: the Bayu-Undan liquids\n\nproject and the Minerva gas\n\nproject. In addition, acquisitions\n\ncontributed 0.8 million boe to\n\nproduction.\n\nFor 2005, production is expected\n\nto improve by around 15%, or\n\n4% excluding the impact of the\n\nMoomba incident. Santos now\n\nexpects production to be around\n\n54 million boe in 2005. This\n\nincrease is largely driven by the\n\ncommissioning of Mutineer-Exeter\n\nin March 2005 and the John\n\nBrookes gas field in the middle\n\nof the year.\n\n**PRODUCTION COSTS**\n\n**UNDER CONTROL**\n\nProduction costs in 2004 were\n\n$309 million, up $45 million or\n\n17% on 2003. Analysis shows\n\nthat Santos was able to continue\n\nto effectively control its costs\n\nin the face of significant external\n\npressures in the form of rising\n\nservices and materials prices.\n\nExamining production costs in\n\ndetail reveals:\n\n- the start-up of Bayu-Undan and\n\nacquisitions added $16 million\n\nto Santos’ cost base\n\n- changes in our accounting\n\nadded a further $16 million\n\nto Santos’ production costs\n\n- higher insurance premiums\n\n($8 million) and one-off stock\n\nwrite-offs ($5 million) were\n\noffset by $17 million in cost\n\nsavings largely as a result of\n\nSantos’ continuous\n\nimprovement initiatives\n\n- the Moomba incident resulted\n\nin $17 million of one-off costs\n\nin 2004.\n\nPiecing this together, the key\n\nthemes in our financial\n\nperformance were:\n\n- cost savings in established\n\nproduction areas more than\n\noffset increases in the price\n\nof services and materials\n\n- Santos’ cost base rose as\n\nproduction from new\n\ndevelopments and acquisitions\n\nwere added to the Company’s\n\nexpanding portfolio of\n\nproducing assets.\n\n## ANALYSING FINANCIAL PERFORMANCE\n\n**‘The sound operating results**\n\n**achieved in 2004 underline**\n\n**the changing face of Santos**\n\n**towards a higher value, higher**\n\n**margin business. We ended the**\n\n**year with a strong financial**\n\n**position and our financial**\n\n**flexibility intact.’**\n\n**PETER WASOW**\n\nChief Financial Officer\n\n’01 ’02 ’03 **’04**\n\n**PRODUCTION AND SALES REVENUE**\n\nRevenue Net profit after tax Production\n\n1,460\n\n445 322 327 **380**\n\n1,478 1,465\n\n54.2 57.3 55.7\n\n**1,501**\n\n**47.1**\n\n0\n\n500\n\n1000\n\n1500\n\n2000\n\n0\n\n10\n\n20\n\n30\n\n40\n\n50\n\n60\n\n$million mmboe", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "Annual Report 2004 70\n\nNOTES TO THE FINANCIAL STATEMENTS\n\nfor the year ended 31 December 2004\n\n**22. Investments in Controlled Entities**\n\n**Name Place of Name Place of**\n\n**incorporation incorporation**\n\n1 Beneficial interests in all controlled entities is 100% except for Kipper GS Pty Ltd in which two shares of the total issued capital of 9,246,353\n\nshares are owned by a third party.\n\n2 Company acquired during the year.\n\n3 Company incorporated during the year.\n\n**Santos Ltd (Parent Entity)** SA\n\n**Controlled entities <sup>1</sup> :**\n\nAlliance Petroleum Australia Pty Ltd VIC\n\nBoston L.H.F. Pty Ltd VIC\n\nBridgefield Pty Ltd QLD\n\nBridge Oil Developments Pty Limited NSW\n\nCanso Resources Pty Ltd NSW\n\nCoveyork Pty Ltd NSW\n\nDoce Pty Ltd QLD\n\nFarmout Drillers Pty Ltd NSW\n\nKipper GS Pty Ltd WA\n\n*Controlled entity of Kipper GS Pty Ltd*\n\nCrusader (Victoria) Pty Ltd VIC\n\nMoonie Pipeline Company Pty Ltd QLD\n\nNovus Australia Resources NL <sup>2</sup> VIC\n\nReef Oil Pty Ltd NSW\n\nSantos Asia Pacific Pty Ltd QLD\n\n*Controlled entities of Santos Asia Pacific Pty Ltd*\n\nSantos (Sampang) Pty Ltd SA\n\nSantos (Warim) Pty Ltd SA\n\nSantos Australian Hydrocarbons Pty Ltd QLD\n\nSantos (BOL) Pty Ltd NSW\n\n*Controlled entity of Santos (BOL) Pty Ltd*\n\nBridge Oil Exploration Pty Limited ACT\n\nSantos Darwin LNG Pty Ltd ACT\n\nSantos Direct Pty Ltd <sup>3</sup> SA\n\nSantos Facilities Pty Ltd SA\n\nSantos Finance Ltd NSW\n\nSantos Globe Pty Ltd *(formerly Globex Far East Pty Ltd)* WA\n\nSantos International Holdings Pty Ltd ACT\n\n*Controlled entities of Santos International Holdings Pty Ltd*\n\nBarracuda Limited PNG\n\nLavana Limited PNG\n\nNovus UK (Kakap 2) Limited <sup>2</sup> UK\n\nPeko Offshore Ltd BER\n\nSanro Insurance Pte Ltd SING\n\nSantos Americas and Europe Corporation USA\n\n*Controlled entity of Santos Americas and Europe Corporation*\n\nSantos USA Corp USA\n\nSantos (Bawean) Pty Ltd SA\n\nSantos Brantas Pty Ltd <sup>3</sup> VIC\n\nSantos (Donggala) Pty Ltd <sup>3</sup> VIC\n\nSantos Egypt Pty Ltd <sup>3</sup> VIC\n\nSantos Hides Ltd PNG\n\nSantos International Operations Pty Ltd QLD\n\nSantos (Madura Offshore) Pty Ltd WA\n\nSantos Niugini Exploration Limited PNG\n\nSantos (Nth Bali 1) Pty Ltd SA\n\nSantos (Papalang) Pty Ltd SA\n\nSantos (Popodi) Pty Ltd SA\n\nSantos (JPDA 91-01) Pty Ltd ACT\n\nSantos (JPDA 91-12) Pty Ltd ACT\n\nSantos (NGA) Pty Ltd VIC\n\nSantos (N.T.) Pty Ltd ACT\n\n*Controlled entity of Santos (N.T.) Pty Ltd*\n\nBonaparte Gas & Oil Pty Limited NSW\n\nSantos Offshore Pty Ltd VIC\n\nSantos Oil Exploration (Malaysia) Sdn Bhd (in liquidation) MAL\n\nSantos Petroleum Pty Ltd NSW\n\nSantos QNT Pty Ltd QLD\n\n*Controlled entities of Santos QNT Pty Ltd*\n\nSantos QNT (No. 1) Pty Ltd QLD\n\n*Controlled entities of Santos QNT (No. 1) Pty Ltd*\n\nSantos Petroleum Management Pty Ltd QLD\n\nSantos Petroleum Operations Pty Ltd QLD\n\nTMOC Exploration Proprietary Limited QLD\n\nSantos QNT (No. 2) Pty Ltd QLD\n\n*Controlled entities of Santos QNT (No. 2) Pty Ltd*\n\nAssociated Petroleum Pty Ltd QLD\n\nMoonie Oil Pty Ltd QLD\n\nPetromin Pty Ltd QLD\n\nSantos (299) Pty Ltd QLD\n\nSantos Exploration Pty Ltd VIC\n\nSantos Gnuco Pty Ltd QLD\n\nTransoil Pty Ltd QLD\n\nSantos Resources Pty Ltd QLD\n\nSantos Timor Sea Pipeline Pty Ltd NSW\n\nSesap Pty Ltd <sup>2</sup> VIC\n\nVamgas Pty Ltd VIC", - "page_start": 71, - "page_end": 71, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed5.pdf", - "query": "What is the primary aim of the OSPRO cohort study ?", - "target_page": 2, - "target_passage": " The primary aim of the OSPRO cohort study was to de velop and validate review of systems (i.e. evidence of sys temic involvement) and yellow flag (i.e. pain-related psychological distress) screening tools for use in out patient orthopedic physical therapy settings", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "participants at initial evaluation and directed them to a se-\n\ncure study website for the informed consent process and\n\nbaseline self-report assessment. Eligibility criteria have\n\nbeen thoroughly reported elsewhere [ 19 ] and were\n\nintentionally broad to develop a cohort that was\n\ngeneralizable to those seeking physical therapy for com-\n\nmon musculoskeletal conditions in the US. Participants\n\ncompleted follow-up self-reported assessments on the\n\nstudy website at 4 weeks, 6 months and 12 months. Partic-\n\nipants were notified of a pending assessment by an email\n\nthat directed them back to the study website to complete\n\ntheir follow-up assessment. For additional details of the\n\ndataset and cohort, readers are directed to the published\n\ncohort profile [ 19 ].\n\nThe primary aim of the OSPRO cohort study was to de-\n\nvelop and validate review of systems (i.e. evidence of sys-\n\ntemic involvement) and yellow flag (i.e. pain-related\n\npsychological distress) screening tools for use in out-\n\npatient orthopedic physical therapy settings. These screen-\n\ning tools, once validated and refined for clinical decision\n\nmaking, may improve the value of care delivery by accur-\n\nately identifying individuals who 1) are appropriate for\n\nreferral to other providers for management of\n\nnon-musculoskeletal symptoms, and/or 2) would benefit\n\nfrom enhanced, psychologically-informed physical ther-\n\napy. Early identification of individuals most appropriate\n\nfor these modified pathways of care has the potential to\n\nreduce wasteful downstream health care utilization, limit\n\nthe risk of unwarranted and costly care escalation, and im-\n\nprove clinical outcomes. Results of the primary analyses\n\nexamining the predictive ability of the OSPRO tools for\n\npain, disability, health status, and comorbidity outcomes\n\nhave been previously published [ 20 ]. Pre-planned second-\n\nary analyses included prediction of persistent pain state\n\n[ 21 ] and this current analysis predicting future healthcare\n\nutilization. All subjects consented to participation in the\n\nstudy and ethics approval was granted by the University of\n\nFlorida Institutional Review Board.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed5.pdf" - }, - { - "text": "studies requiring subject recall [ 56 - 58 ]. Medical record\n\nand claims data were not available for these subjects.\n\nReaders should consider our inability to independently\n\nconfirm utilization when interpreting results.\n\nIn future studies, we will embed the OSPRO tools into\n\nelectronic medical record (EMR) databases to refine and\n\ntest outcomes prediction models at the health care systems\n\nlevel. Importantly, we will collect clinical encounter data\n\nthrough the EMR and combine it with administrative or\n\nbilling data to confirm the results of this study with more\n\nobjective measures of health care use. These studies will\n\nalso allow us to provide better guidance on how to use the\n\nOSPRO tools to identify serious psychiatric involvement or\n\nsystemic sources of pain that require medical referral. Fi-\n\nnally, we will explore alternative scoring strategies for the\n\ntools, such as weighted scoring for the OSPRO-ROS and\n\nuse of predicted full-length psychological questionnaire\n\nscores for the OSPRO-YF. Healthcare providers could then\n\nuse the collective information from these studies to build\n\nlearning health systems that facilitate effective, real-time\n\nclinical decision-making support to improve value of care\n\nfor patients with musculoskeletal pain.\n\n## Conclusion\n\nBaseline disability and change in pain intensity were im-\n\nportant predictors of any subsequent pain-related\n\nhealthcare utilization, while predictors of individual ser-\n\nvice utilization were outcome-specific. Identification of\n\nrisk is improved through treatment monitoring for pain\n\nand, in some cases, disability and pain-related psycho-\n\nlogical distress. Comorbidity burden was an important\n\npredictor of subsequent utilization of opioids and diag-\n\nnostic tests and imaging, both of which have been recent\n\ntargets of healthcare policy to constrain their unneces-\n\nsary use. Future research is needed to refine these pre-\n\ndictor variables and incorporate them into risk models\n\nthat support clinical decision-making so that treatment\n\neffectiveness and efficiency are optimized in value-based\n\nsystems.\n\nPage 12 of 14", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed5.pdf" - }, - { - "text": "nosed with by a physician ” . Conditions are weighted\n\nand added for an overall measure of comorbidity\n\nburden. The CCI has demonstrated good test-retest re-\n\nliability (0.91) and positive but weak to modest correla-\n\ntions with medication use, hospitalizations, length of\n\nstay, total charges, and pharmacy and laboratory\n\ncharges for older adults in general medical care and\n\nsurgical care settings [ 35 ].\n\n### Assessment tools\n\n#### OSPRO Review of Systems tool (OSPRO-ROS)\n\nThe OSPRO-ROS is a review-of-systems screening tool for\n\nuse in outpatient orthopedic physical therapy settings [ 36 ].\n\nThe OSPRO-ROS has demonstrated good concurrent val-\n\nidity with depression and a comprehensive 97-item battery\n\nof non-musculoskeletal symptoms (i.e., red flags). [ 36 ]\n\nModerate to strong predictive capabilities of the\n\nOSPRO-ROS have been reported for persistence of pain,\n\nquality of life, and change in comorbidity 12 months fol-\n\nlowing physical therapy in patients with musculoskeletal\n\npain [ 20 , 21 ]. The OSPRO-ROS includes standard symp-\n\ntom descriptors to aid with identification of systemic or\n\nnon-musculoskeletal origins of musculoskeletal pain. It\n\nincludes questions related to symptoms of the cardiovascu-\n\nlar, gastrointestinal, endocrine, nervous, integumentary,\n\npulmonary, and musculoskeletal systems. The full-length\n\n23-item version of the OSPRO-ROS is capable of identify-\n\ning 100% of positive red-flag responders (i.e. indicating\n\n“ yes ” to at least one systemic symptom on a questionnaire)\n\nin outpatient orthopedic physical therapy settings. [ 36 ] A\n\nshorter, 10-item version is also available that has been", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "shown to identify approximately 95% of positive red-flag re-\n\nsponders. For statistical analyses, the “ yes ” responses were\n\nadded for each version and included in each model as a\n\ncontinuous independent variable.\n\n#### OSPRO Yellow Flag tool (OSPRO-YF)\n\nThe OSPRO-YF is a yellow flag assessment tool that in-\n\ncludes items from pain vulnerability domains (negative\n\naffect and fear-avoidance) and pain resilience domains\n\n(positive affect and self-efficacy) to aid with identification\n\nof pain-related psychological distress in outpatient ortho-\n\npedic physical therapy settings [ 37 ]. The OSPRO-YF has\n\ngood concurrent validity with pain intensity and\n\nregion-specific disability [ 37 ] and is capable of predicting\n\npain intensity, disability, quality of life and persistent pain\n\n12 months following physical therapy in patients with\n\nmusculoskeletal pain [ 20 , 21 ]. The full-length OSPRO-YF\n\nhas 17-items, however a shortened 10-item version is also\n\navailable with an acceptable trade-off in accuracy. Like the\n\nOSPRO-ROS, the OSPRO-YF is designed for implementa-\n\ntion into electronic medical record (EMR) systems to\n\nquickly and accurately identify risk for a variety of clinical\n\noutcomes [ 19 ]. For statistical analyses, a summary score\n\nwas derived for each version by adding the item responses\n\nafter reverse-scoring items 2, 13, 14, 15 and 17 so that\n\nhigher scores indicate higher pain-related psychological\n\ndistress. The summary score was then included in each\n\nmodel as a continuous independent variable.\n\n### Intervention\n\nAll physical therapy treatment was provided at the discre-\n\ntion of the treating clinician. The duration of the episode,\n\nthe number of physical therapy visits, and individual treat-\n\nment parameters (type, intensity, duration, frequency)\n\nwere not collected for pragmatic reasons. In particular,\n\nclinical and utilization data are not commonly collected in\n\na standardized format and would need to be extracted\n\nfrom disparate medical record databases across different\n\nhealth care systems to assess treatment. This was not feas-\n\nible given the scope and design of this multisite\n\nsurvey-based study. However, instead of coding treatment\n\ntype we included baseline-to-4 week change in pain inten-\n\nsity, region-specific disability, and OSPRO-YF scores in\n\neach model as measures of treatment response. In that\n\nmanner the individual effects of the treatment received\n\nwere included in the predictive models, without directly\n\naccounting for the type of treatment.\n\n### Healthcare utilization outcomes\n\nSelf-reported health care utilization was assessed at 6- and\n\n12-months following initial evaluation by online assessment.\n\nQuestions were derived from previous population-based\n\nstudies involving musculoskeletal pain that have used survey\n\nmethods for follow-up assessment [ 22 , 23 ]. Study\n\nparticipants were asked whether they used any of the fol-\n\nlowing healthcare services for their primary musculoskeletal\n\npain complaint in the time following their physical therapy\n\ntreatment:\n\n1. Opioid painkillers (eg. Vicodin, Lortab,\n\nHydrocodone, Fentanyl, Percocet, Oxycontin,\n\nOxycodone, tramadol, Ultram, Diludid, etc)\n\n2. Injections\n\n3. Surgery\n\n4. Diagnostic tests or Imaging (eg. xray, MRI, CT\n\nscan, nerve conduction test, etc.)\n\n5. Emergency room visits\n\n“ Yes ” responses were followed by questions regarding\n\nthe quantity of services utilized (i.e. number of opioid\n\npainkillers, number of diagnostic tests or number of\n\nemergency room visits). All utilization questions were\n\nanswered on a categorical scale (0, 1, 2 - 5, 5 - 10, or > 10)\n\nindicating the quantity of a particular service received\n\nduring the applicable follow-up timeframe. At 6-month\n\nfollow-up, study participants reported their use of ser-\n\nvices for the previous 2 months, allowing a timeframe of\n\n4 months from initial evaluation for them to complete\n\nphysical therapy. At 12-month follow-up, study partici-\n\npants reported their use of services over the previous", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" - }, - { - "text": "Block 2: 10-item OSPRO-YF and 10-item OSPRO-ROS\n\nat baseline.\n\nBlock 3: Remaining items from the OSPRO-YF\n\n(+ 7 items) and OSPRO-ROS (+ 13 items). These were\n\nincluded to determine whether full-length versions of\n\nthe tools provided better prediction over shortened\n\nversions.\n\nBlock 4: Baseline-to-4 week change in pain intensity,\n\nregion-specific disability, and OSPRO-YF scores. Early\n\nchanges in these variables may be associated with\n\nimproved prediction of outcomes over baseline vari-\n\nables alone [ 38 ]. This approach modeled change in\n\nthese variables as a measure of treatment response and\n\nallowed us to assess the relative value of treatment\n\nmonitoring for the prediction of healthcare utilization\n\noutcomes.\n\nFor the first analysis, binary logistic regression was used\n\nto determine predictors of any healthcare utilization fol-\n\nlowing physical therapy, with the dependent variable\n\ndefined as reporting one or more utilization events for any\n\nof the potential healthcare services over the entire\n\nfollow-up period. For analyses of specific services,\n\nutilization was dichotomized for each service. Specific\n\nservice utilization over early (through 6 months) and late\n\n(6 months to 12 months) phases following physical ther-\n\napy were collapsed to create a single dichotomous\n\nutilization indicator for each service over the entire study\n\nfollow-up period. Any utilization of the service over that\n\nperiod was categorized as YES. Separate multivariate bin-\n\nary logistic regression models were then fitted for the\n\ndichotomous utilization indicator (i.e. YES or NO) of each\n\nhealthcare service (e.g. opioid use, injection, imaging, sur-\n\ngery, and emergency room visits).\n\nFor all analyses, full hierarchical multivariate models\n\nwere first fit to assess the unique contributions of each\n\nblock. This approach allowed us to determine the rela-\n\ntive contributions of baseline demographic and\n\nhealth-related variables, the newly developed\n\nOSPRO-ROS and OSPRO-YF tools, and response to\n\ntreatment via time varying variables (e.g., pain intensity\n\nand region specific function). However, since our pri-\n\nmary aim was to develop concise and accurate\n\nutilization prediction models for efficient assessment of\n\nrisk, we then separately developed stepwise models using\n\nbackward selection for each dependent variable to derive\n\nparsimonious prediction item sets. Parsimonious models\n\nwere chosen as a more conservative approach to identi-\n\nfying individual predictors given the potential for overfit-\n\nting full multivariate models because of high subject\n\nattrition. For stepwise models, the p -value threshold was\n\n0.05 for entry and 0.10 for removal. Overall fit for each\n\nmodel was examined with Hosmer & Lemeshow test, chi-square and pseudo-R <sup>2</sup> values (e.g. Nagelkerke) when\n\nappropriate. Comparison of adjusted odds ratios (OR)\n\nand 95% confidence interval (CI) were used to determine\n\nthe relative strength of each predictor in parsimonious\n\nmodels. Multicollinearity was assessed using variance\n\ninflation factor (VIF) and tolerance, where VIFs < 10 and\n\ntolerances > 0.1 suggested no significant collinearity\n\namong independent variables [ 39 ].\n\n### Planned sensitivity analyses for missing data\n\nThe electronic OPT-IN data collection forms required\n\ncomplete data from respondents before they were\n\nallowed to proceed to subsequent survey pages. There-\n\nfore, the occurrence of missing data for independent\n\npredictor variables was minimal (< 1% of sample). How-\n\never, for subjects who were lost to follow-up, we planned\n\ntwo approaches to assess the potential influence of miss-\n\ning data on study outcomes. First, demographic and\n\nbaseline health variables would be compared between\n\nthose with complete follow-up at 1 year and those with-\n\nout follow-up at 1 year to identify any potential group\n\ndifferences related to completion of follow-up. Second,\n\nsensitivity analyses would be conducted by repeating\n\neach analysis using inverse probability of attrition", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed5.pdf" - }, - { - "text": "## Abbreviations\n\nCCI: Charlson comorbidity index; OSPRO: Optimal Screening for Prediction of\n\nReferral and Outcome; OSPRO-ROS: Review of systems screening tool from\n\nOSPRO cohort study; OSPRO-YF: Pain-related psychological distress screening\n\ntool from OSPRO cohort study\n\n## Acknowledgements\n\nThe authors wish to acknowledge Dr. Roger B. Fillingim and Dr. Nicole M.\n\nMarlow for their input on study design and analysis. OPT-IN Network\n\nParticipants included: University of Florida: Joel Bialosky; UF Health: Giorgio\n\nZeppieri, Jr., Daniel Broome, Marty Huegel, Debi Jones, Steve Emery, Mike\n\nHodges, Derek Miles, Jodi Davis, Charlene Stubbington, Mike Darcy; ATI\n\nPhysical Therapy: Ellen Shanley, Thomas Denninger, Jenna Bartsokas, Elise\n\nHarris, Jordan Floyd, Wade Harrell; University of Southern California: Lori\n\nMichener, Amy Pomrantz, Brooks Rehabilitation: Raine Osborne, Nata\n\nSalvatori, John Leschitz, Brian Hagist, Laura Langer, Tim Shreve, Nando\n\nMalaman, Michael Bourassa, Justin Zych, Tasha Mouton Shanklin; University\n\nof Illinois at Chicago: Aaron Keil, Brad Myers, Deb Davey, Justin Payette,\n\nAdam Wielechowski, Richard Severin, Erik Martinez; Indiana State University:\n\nRyan Hanigan, Carolina Valencia, Danielle Jena, Nicole Woodard; Arcadia\n\nUniversity: Angela Tate; Life ’ s Work Physical Therapy: Sandra Stryker, Aaron\n\nLeonard, Erin Courtney, Brandon Little, Kathryn Jankord, Brad Simpson,\n\nCharleen Hall, Paige Nixon, Julia Neufeld; University of Colorado, Denver: Paul\n\nMintken, Virginia Arnette, Andrea Barsch.\n\n## Funding\n\nThis project was supported by the 2013 Clinical Research Network grant\n\nfrom the Orthopaedic Section, American Physical Therapy Association. The\n\nfunding body had no role in the design of the study or collection, analysis,\n\nand interpretation of the data or in writing the manuscript. TAL received\n\nadditional support from the Foundation for Physical Therapy with Promotion\n\nof Doctoral Studies I & II (PODS I& II) Awards. SZG and JMB received additional\n\nsupport from Brooks Rehabilitation while designing this study. JMB received\n\nsupport from the American National Institutes of Health (NIH) Rehabilitation\n\nResearch Career Development Program (K12-HD055929).\n\n## Availability of data and materials\n\nThe data that support the findings of this study are available from the\n\ncorresponding author upon reasonable request.\n\n## Authors ’ contributions\n\nTAL provided input on study design and analysis plan, drafted the manuscript\n\nand approved final version of the manuscript. SZG secured funding, provided\n\noverall design, gave input on the analysis plan and approved final version of\n\nthe manuscript. JMB provided input on design and analysis plan and approved\n\nfinal version of the manuscript.\n\n## Ethics approval and consent to participate\n\nEthics approval for this study was granted by the University of Florida\n\nInstitutional Review Board-01 (Study #: 525 - 2012). All participants provided\n\nwritten consent to participate in the study.\n\n## Consent for publication\n\nNot applicable.\n\n## Competing interests\n\nThe authors declare that they have no competing interests.\n\n## Publisher ’ s Note\n\nSpringer Nature remains neutral with regard to jurisdictional claims in\n\npublished maps and institutional affiliations.\n\n## Author details\n\n1 Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\n\nNC 27705, USA. <sup>2</sup> Department of Physical Therapy, College of Public Health &\n\nHealth Professions, University of Florida, Box 100154, UFHSC, Gainesville, FL\n\n32610-0154, USA. <sup>3</sup> Brooks Rehabilitation Clinical Research Center, 3901\n\nUniversity Blvd. South, Suite 103, Jacksonville, FL 32216, USA. <sup>4</sup> Duke Clinical\n\nResearch Institute, Department of Orthopaedic Surgery, Duke University, 2400\n\nPratt Street, Durham, NC 27705, USA.\n\nReceived: 9 November 2017 Accepted: 14 August 2018\n\n## References\n\n1. Von Korff M, Scher AI, Helmick C, Carter-Pokras O, Dodick DW, Goulet J, et", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "### Appendix\n\n**Charts showing age-of-onset distributions (by percentage of total cohort) for different cohorts based on year of first treatment**", - "page_start": 30, - "page_end": 30, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "reproduced in an independent sample [ 42 , 43 ]. With 18\n\npotential predictors, a sample of n = 180 reporting\n\nhealthcare utilization at follow-up would be sufficient\n\nfor the proposed analyses. However, this estimate is con-\n\nservative. Other methods for determining sample size\n\nfor prediction analyses suggest an overall sample size of\n\nN > 50 + 8* m (where m = number of independent vari-\n\nables) [ 44 ] or N > 104 + number of independent predic-\n\ntors [ 45 , 46 ]. For these less conservative estimates, the\n\nprojected study sample size is sufficient for the proposed\n\nanalyses.\n\n## Results\n\nFour hundred and forty subjects were recruited at initial\n\nevaluation. Follow-up at 4 weeks was 75.0% ( n = 330), at\n\n6 months was 69.0% ( n = 304) and at 12 months was\n\n65.2% ( n = 287). Baseline demographics and health-related\n\ncharacteristics for the full cohort, as well as those who did\n\nand did not complete all follow-up are presented in\n\nTables 1 , 2 and 3 . Those who did not complete follow-up\n\nwere younger, more likely to be non-white, had less than a\n\ncollege degree, were more likely to have had sudden\n\nsymptom onset, had higher baseline pain intensity, and\n\nhad higher baseline pain-related psychological distress\n\nmeasured by the OSPRO-YF. Only those with complete\n\nfollow-up data at each time point were considered for pre-\n\ndiction analyses ( n = 246, 55.9%).\n\nOverall, 43.1% ( n = 106/246) of those with complete\n\nfollow-up data utilized at least one healthcare service\n\nfollowing the physical therapy episode. Distribution of\n\nutilization for specific services is provided in Table 4 .\n\nFor multivariate analyses, all VIFs were less than 10 and\n\ntolerance values greater than 0.1 suggesting no signifi-\n\ncant multicollinearity among independent variables.\n\n### Full multivariate model performance\n\nOverall performance for each full multivariate model is\n\nlisted in Table 5 . Block 1 (Demographic, clinical and co-\n\nmorbidity) consistently contributed to prediction of\n\nhealthcare utilization and accounted for the greatest\n\namount of variation in utilization outcome for all\n\nmodels. Block 4 (change scores for pain, disability, and\n\nOSPRO-YF) provided statistically significant contribu-\n\ntions in all models except prediction of injection. Blocks\n\nincluding baseline OSPRO-YF and OSPRO-ROS, both\n\nshort and long forms, did not predict utilization out-\n\ncomes. Weighted models consistently outperformed\n\ntheir complete case analysis model counterparts with overall model pseudo-R <sup>2</sup> values ranging from .337 (Any\n\ncare) to .611 (Emergency room).\n\nTable 1 Demographic information for the full cohort, and for those with complete and incomplete follow-up\n\nVariable Label Full cohort at baseline\n\n( n = 440)\n\nCompleted follow-up\n\n( n = 246)\n\nDid not complete follow-up\n\n( n = 194)\n\np -value <sup>a</sup>\n\nDemographic information\n\nAge Mean ± SD 45.06 ± 15.82 46.59 ± 16.00 43.15 ± 15.43 0.02\n\nMedian (min, max) 45 (18 - 75) 47 (18 - 75) 42 (18 - 74)\n\nSex (1 missing) Male 164 (37.3%) 85 (34.6%) 79 (40.7%) 0.20\n\nFemale 275 (62.5%) 160 (65.0%) 115 (59.3%)\n\nRace (7 missing) White 343 (78.0%) 200 (81.3%) 143 (73.7%) 0.05\n\nNon-white 90 (20.5%) 42 (17.1%) 48 (24.7%)\n\nEthnicity (33 missing) Hispanic or Latino 31 (7.0%) 20 (8.1%) 11 (5.7%) 0.36\n\nNot Hispanic or Latino 376 (85.5%) 211 (85.8%) 165 (85.1%)\n\nEducation (6 missing) Less than college graduate 161 (36.6%) 71 (28.9%) 90 (46.4%) < 0.001\n\nCollege graduate or higher 273 (62.0%) 172 (69.9%) 101 (52.1%)\n\nIncome (66 missing) $35,000 or less 112 (25.5%) 62 (25.2%) 50 (25.8%) 0.30\n\n$35,000 to $70,000 106 (24.1%) 59 (24.0%) 47 (24.2%)\n\nGreater than 70,000 156 (35.5%) 99 (40.2%) 57 (29.4%)\n\nInsurance (26 missing) Private 273 (62.0%) 156 (63.4%) 117 (60.3%) 0.70\n\nPublic 75 (17.0%) 46 (18.7%) 29 (14.9%)\n\nOther 66 (15.0%) 36 (14.6%) 30 (15.5%)\n\nGeographic region Southeast 275 (62.5%) 146 (59.3%) 129 (66.5%) 0.10\n\nMidwest 47 (10.7%) 23 (9.3%) 24 (12.4%)\n\nWest 98 (22.3%) 65 (26.4%) 33 (17.0%)", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed5.pdf" - }, - { - "text": "2\n\nnature portfolio | reporting summary\n\nApril 2023\n\nData\n\nPolicy information about availability of data\n\nAll manuscripts must include a data availability statement . This statement should provide the following information, where applicable:\n\n- Accession codes, unique identifiers, or web links for publicly available datasets\n\n- A description of any restrictions on data availability\n\n- For clinical datasets or third party data, please ensure that the statement adheres to our policy\n\nThe dataset consists of 26 MRI scans (T1w, T2w, and diffusion scans) alongside state-dependent measures and serum assessments of ovarian sex hormones for each\n\nsession. The data is publicly available on https://openneuro.org/datasets/ds005299.\n\nResearch involving human participants, their data, or biological material\n\nPolicy information about studies with human participants or human data . See also policy information about sex, gender (identity/presentation),\n\nand sexual orientation and race, ethnicity and racism .\n\nReporting on sex and gender Our study focused on a single female participant to explore how pregnancy shapes the human brain.\n\nReporting on race, ethnicity, or\n\nother socially relevant\n\ngroupings\n\nThe subject was white.\n\nPopulation characteristics This was a precision imaging study of one 38-year old primiparous woman.\n\nRecruitment Our participant (corresponding author E.R.C.) was a healthy primiparous woman who underwent in-vitro fertilization (IVF) to\n\nachieve pregnancy. The project was conceived by E.R.C. and she wished to use herself as the participant, as has been done in\n\nprevious \"dense-sampling\" studies (cf. Poldrack et al., 2015; Pritschet et al., 2020).\n\nEthics oversight The participant gave written informed consent and the study was approved by the University of California, Irvine Human\n\nSubjects Committee.\n\nNote that full information on the approval of the study protocol must also be provided in the manuscript.\n\nField-specific reporting\n\nPlease select the one below that is the best fit for your research. If you are not sure, read the appropriate sections before making your selection.\n\nLife sciences Behavioural & social sciences Ecological, evolutionary & environmental sciences\n\nFor a reference copy of the document with all sections, see nature.com/documents/nr-reporting-summary-flat.pdf\n\nLife sciences study design\n\nAll studies must disclose on these points even when the disclosure is negative.\n\nSample size We used precision imaging to deeply-phenotype, densely-sample an individual over the gestational window. As this study was the first of it's\n\nkind, our sample size was an N=1 design. Although this limits the generalizability of our findings, this project serves as a proof-of-concept,\n\nshowcasing the value and feasibility of studying a woman's brain during the transition to motherhood.\n\nData exclusions no history of neuropsychiatric diagnosis, endocrine disorders, prior head trauma or history of smoking\n\nReplication This is the first study of it's kind; therefore, there are no study replications as of yet. However, to reproduce our results internally across\n\nsoftware packages, we also ran the T1w data through the longitudinal FreeSurfer cortical thickness pipeline (Dale et al., 1999), which\n\ncorroborated our finding that gray matter volume declines throughout gestation (e.g., successful internal replication). This pattern of results\n\nnot only held across software packages, but also brain parcellations (e.g., Schaefer 400-cortical atlas and Desikan-Killiany cortical atlas).\n\nRandomization This was an observational study design, and therefore not randomized.\n\nBlinding For medial temporal lobe segmentation, scans were randomized and segmentation was performed in a random order, blind to pregnancy\n\nstage. No other blinding was applicable, given the observational study of brain changes in response to advancing gestational week.\n\nReporting for specific materials, systems and methods", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed4.pdf" - }, - { - "text": "routine pain-related psychological distress monitoring\n\nthroughout the early phases of rehabilitation espe-\n\ncially if the goal is to identify risk for subsequent\n\npain-related healthcare utilization. The implications of\n\nthese collective findings are that treatment pathways\n\nmay provide greater value by 1) addressing modifiable\n\nhealth-related variables like pain, disability and\n\npain-related psychological distress, 2) routine moni-\n\ntoring of these health-related variables and 3) offering\n\ntreatment alternatives that safely escalate care if\n\nneeded while minimizing risk of harm and unhelpful\n\nutilization.\n\nOpioids and diagnostic tests and imaging were the two\n\nmost common subsequent healthcare services utilized\n\nfollowing physical therapy. Of the individuals that com-\n\npleted follow up and had any subsequent healthcare\n\nutilization, approximately 42% reported opioid use and\n\n70% reported use of diagnostic tests and imaging. An\n\nimportant health-related predictor of these services was\n\nlevel of comorbidity burden. For those with high comor-\n\nbidity burden and inadequate treatment response to\n\nphysical therapy, use of additional diagnostic tests and\n\nimaging or low-dose opioids may be appropriate in some\n\ncases. But given the growing public health concern over\n\nopioid use and the desire to avoid unnecessary treat-\n\nment driven by imaging, our results suggest the import-\n\nance of considering disease burden when developing\n\ntreatment pathways and healthcare policy to mitigate\n\nrisk for avoidable use of these services. Interestingly,\n\nneither versions of the OSPRO-ROS predicted\n\nutilization outcomes even though it has been linked to\n\nmental health, comorbidity, and persistent pain state in\n\nother analyses [ 20 , 21 ]. Systemic symptom burden is a\n\nmeasure of patient complexity that is related to but dis-\n\ntinct from comorbidity burden [ 36 , 47 ]. In these ana-\n\nlyses, the chronic condition measure (i.e. the CCI) was\n\na better predictor of utilization than symptom burden\n\n(i.e. OSPRO-ROS). The reasons for this finding are un-\n\nclear but may be related to providers and patients being\n\nmore likely to pursue follow-up medical care for mus-\n\nculoskeletal pain when known co-existing conditions\n\nare present as opposed to reporting of symptoms alone.\n\nThe distinction between symptom and disease burden\n\nin defining musculoskeletal patient complexity, and its\n\ninfluence on clinical decision-making and outcomes,\n\nshould be the subject of future research particularly re-\n\nlated to aging populations [ 48 ].\n\nUtilization outcomes benchmarks have not been estab-\n\nlished to determine how the percentage of subsequent\n\nhealthcare use in this study compares to outcomes using\n\nother health services. Prior studies suggest physical ther-\n\napy is associated with reduced incidence of additional\n\nhealthcare use compared to not using physical therapy\n\nin patients with acute low back pain [ 10 , 49 ]. Some\n\nadditional healthcare use is expected following physical\n\ntherapy, especially among individuals that are on\n\nlong-term pain management pathways due to chronic or\n\npersistent symptoms. Yet with over 40% reporting subse-\n\nquent pain-related healthcare among those completing\n\nfollow-up, it is apparent that opportunities exist to im-\n\nprove pathway selection and/or the effectiveness of\n\nphysical therapy for individuals with musculoskeletal\n\npain. This finding is particularly notable given recent\n\nefforts to define physical therapy as an effective first line,\n\nnon-pharmacological treatment option against more\n\ninvasive or higher risk services, such as surgery or opioid\n\nuse, respectively. Predictive variables identified in this\n\nanalysis can be used to develop risk models that better\n\ninform pathway selection for those seeking physical ther-\n\napy for musculoskeletal pain. The precise application of\n\nthese risk models, and how they inform policy and prac-\n\ntice should be the target of future study. However, phys-", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed5.pdf", - "query": "What is the range of the pain rating scale ?", - "target_page": 3, - "target_passage": "Pain intensity was assessed by the numerical pain rating scale (NPRS) ranging from “0” (no pain) to “10” (worst pain imaginable)", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "RESEARCH ARTICLE Open Access\n\nPrediction of healthcare utilization following an episode of physical therapy for musculoskeletal pain\n\nTrevor A. Lentz <sup>1*</sup> , Jason M. Beneciuk <sup>2,3</sup> and Steven Z. George <sup>4</sup>\n\n## Abstract\n\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively\n\nidentify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The\n\npurpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode\n\nof physical therapy for musculoskeletal pain.\n\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO)\n\nlongitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder\n\npain in physical therapy ( n = 440). Demographics, health-related information, review of systems, comorbidity and\n\npain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in\n\npain intensity, disability, and pain-related psychological distress were measured as treatment response variables.\n\nAt 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests\n\nor imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models\n\nwere developed for any subsequent care and service-specific utilization.\n\nResults: Subsequent pain-related healthcare utilization was reported by 43% ( n = 106) of the study sample that completed\n\nthe 12-month follow-up ( n = 246). Baseline disability and 4-week change in pain intensity were important global predictors\n\nof subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain\n\nintensity, disability and pain-related psychological distress predicted specific service utilization.\n\nConclusion: In those completing follow up measures, risk of additional pain-related healthcare utilization after physical\n\ntherapy was best predicted by baseline characteristics and 4-week treatment response variables for pain intensity, disability\n\nand pain-related psychological distress. These findings suggest treatment monitoring of specific response variables could\n\nenhance identification of those at risk for future healthcare utilization in addition to baseline assessment. Further study is\n\nrequired to determine how specific characteristics of the clinical encounter influence future utilization.\n\nKeywords: Screening, Psychological distress, Multimorbidity, Value, Treatment monitoring\n\n## Background\n\nMusculoskeletal pain is a prevalent and costly health\n\ncondition with far-reaching public health consequences\n\nincluding chronic pain, disability and opioid-related ad-\n\ndiction [ 1 ]. Clinical practice guidelines now recom-\n\nmend non-pharmacological treatment as frontline\n\nmanagement for musculoskeletal pain, which will lead\n\nto increased utilization of services such as physical\n\ntherapy [ 1 - 3 ]. Physical therapy is effective for improving\n\ndisability and reducing costs associated with many muscu-\n\nloskeletal pain conditions [ 4 - 9 ]. However, pain-related\n\nhealthcare utilization beyond the physical therapy episode\n\n(e.g. subsequent use of surgery, injection, opioids, etc.)\n\nmay indicate suboptimal treatment response, the presence\n\nof more complex needs, or unwarranted escalation of care.\n\nDownstream healthcare utilization is not often considered\n\nas an outcome of care or indication of treatment effective-\n\nness for musculoskeletal pain. But the importance of\n\n* Correspondence: [ trevor.lentz@duke.edu](mailto:trevor.lentz@duke.edu)\n\n1 Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\n\nNC 27705, USA\n\nFull list of author information is available at the end of the article", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "21. Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistent\n\nmusculoskeletal pain at 12 months: a secondary analysis of the Optimal\n\nScreening for Prediction of Referral and Outcome (OSPRO) validation cohort\n\nstudy. Phys Ther. 2018;98:290 - 301.\n\n22. Freburger JK, Holmes GM, Agans RP, Jackman AM, Darter JD, Wallace AS, et\n\nal. The rising prevalence of chronic low back pain. Arch Intern Med. 2009;\n\n169:251 - 8.\n\n23. Carey TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al.\n\nRace, care seeking, and utilization for chronic back and neck pain:\n\npopulation perspectives. J Pain Off J Am Pain Soc. 2010;11:343 - 50.\n\n24. Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and\n\nvalidity of chronic pain intensity measures. Pain. 1999;83:157 - 62.\n\n25. Bolton JE. Accuracy of recall of usual pain intensity in back pain patients.\n\nPain. 1999;83:533 - 9.\n\n26. Childs JD, Piva SR, Fritz JM. Responsiveness of the numeric pain rating scale\n\nin patients with low back pain. Spine. 2005;30:1331 - 4.\n\n27. Vernon H. The neck disability index: state-of-the-art, 1991-2008. J Manip\n\nPhysiol Ther. 2008;31:491 - 502.\n\n28. Vernon H, Mior S. The neck disability index: a study of reliability and validity.\n\nJ Manip Physiol Ther. 1991;14:409 - 15.\n\n29. Hudson-Cook N, Tomes-Nicholson K, Breen A. A revised Oswestry disability\n\nquestionnaire. In: Roland M, Jenner J, editors. Back pain: new approaches to\n\nrehabilitation and education. New York: Manchester University Press; 1989.\n\np. 187 - 204.\n\n30. Fritz JM, Irrgang JJ. A comparison of a modified Oswestry low back pain\n\ndisability questionnaire and the Quebec back pain disability scale. Phys\n\nTher. 2001;81:776 - 88.\n\n31. Beaton DE, Wright JG, Katz JN, Upper Extremity Collaborative Group.\n\nDevelopment of the QuickDASH: comparison of three item-reduction\n\napproaches. J Bone Joint Surg Am. 2005;87:1038 - 46.\n\n32. Irrgang JJ, Anderson AF, Boland AL, Harner CD, Kurosaka M, Neyret P, et al.\n\nDevelopment and validation of the international knee documentation\n\ncommittee subjective knee form. Am J Sports Med. 2001;29:600 - 13.\n\n33. Butera KA, Lentz TA, Beneciuk JM, George SZ. Preliminary evaluation of a\n\nmodified STarT back screening tool across different musculoskeletal pain\n\nconditions. Phys Ther. 2016;96:1251 - 61.\n\n34. Charlson ME, Pompei P, Ales KL, MacKenzie CR. A new method of classifying\n\nprognostic comorbidity in longitudinal studies: development and validation.\n\nJ Chronic Dis. 1987;40:373 - 83.\n\n35. Katz JN, Chang LC, Sangha O, Fossel AH, Bates DW. Can comorbidity be\n\nmeasured by questionnaire rather than medical record review? Med Care.\n\n1996;34:73 - 84.\n\n36. George SZ, Beneciuk JM, Bialosky JE, Lentz TA, Zeppieri G, Pei Q, et al.\n\nDevelopment of a review-of-systems screening tool for orthopaedic\n\nphysical therapists: results from the Optimal Screening for Prediction of\n\nReferral and Outcome (OSPRO) cohort. J Orthop Sports Phys Ther. 2015;45:\n\n512 - 26.\n\n37. Lentz TA, Beneciuk JM, Bialosky JE, Zeppieri G, Dai Y, Wu SS, et al.\n\nDevelopment of a yellow flag assessment tool for orthopaedic physical\n\ntherapists: results from the Optimal Screening for Prediction of Referral and\n\nOutcome (OSPRO) cohort. J Orthop Sports Phys Ther. 2016;46:327 - 43.\n\n38. Beneciuk JM, Fritz JM, George SZ. The STarT back screening tool for\n\nprediction of 6-month clinical outcomes: relevance of change patterns in\n\noutpatient physical therapy settings. J Orthop Sports Phys Ther. 2014;44:\n\n656 - 64.\n\n39. Myers RH. Classical and modern regression with applications. 2nd ed. Pacific\n\nGrove: Duxbury Press; 2000.\n\n40. Weuve J, Tchetgen Tchetgen EJ, Glymour MM, Beck TL, Aggarwal NT,\n\nWilson RS, et al. Accounting for bias due to selective attrition: the example\n\nof smoking and cognitive decline. Epidemiol Camb Mass. 2012;23:119 - 28.\n\n41. Hernán MA, Hernández-Díaz S, Robins JM. A structural approach to\n\nselection bias. Epidemiol Camb Mass. 2004;15:615 - 25.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - }, - { - "text": "### Healthcare utilization predictors\n\nWe collected potential predictors by self-reported ques-\n\ntionnaires at initial evaluation using an online study web-\n\nsite. Participants were directed back to the study website\n\n4 weeks following initial evaluation to again complete\n\nquestions on pain intensity, disability, and pain-related\n\npsychological distress. Change in pain intensity, disability,\n\nand pain-related psychological distress from baseline to\n\n4 weeks were modeled as treatment response variables\n\nand included as potential predictors.\n\n### Sociodemographic and health-related information\n\nParticipants completed a standard intake questionnaire\n\nform previously used in our clinical studies that assessed\n\nage, sex, race, and insurance provider type. This ques-\n\ntionnaire also assessed health-related variables included\n\nanatomical region of primary pain complaint (low back,\n\nneck, shoulder, or knee) and whether the patient had\n\nundergone surgery for their primary pain complaints\n\n(yes or no). Due to small cell sizes for certain categories,\n\nrace was dichotomized as white or non-white. For insur-\n\nance type, participants were asked to choose one of the\n\nfollowing options: private, public (Medicare and/or Me-\n\ndicaid), uninsured/self-pay, worker ’ s compensation, and\n\nother/commercial insurance. Among the study sample,\n\nwe observed few with no insurance ( n = 7) or worker ’ s\n\ncompensation ( n = 14). The study also included relatively\n\nfew with ‘ other/commercial insurance ’ ( n = 45). Within\n\nthis group, informal assessment of these various plans\n\nsuggested high heterogeneity of plan characteristics and\n\ncoverage. Due to the small number of subjects in these\n\nindividual insurance strata and to improve interpretabil-\n\nity of results, we collapsed those reporting no insurance,\n\nworker ’ s compensation and other/commercial insurance\n\ninto a single category (i.e., ‘ Other ’ ). Therefore, insurance\n\ntype was categorized as private, public, or other (no in-\n\nsurance, worker ’ s compensation, or other/commercial\n\ninsurance) for purposes of analysis.\n\n### Pain-related clinical variables\n\nPain status was determined using established definitions\n\nthat account for the duration of pain and activity limita-\n\ntions [ 22 , 23 ] using the following two questions: 1)\n\n“ How long have you been experiencing your current\n\npainful symptoms? ” and 2) “ Have you experienced ANY\n\npain and activity limitations every day for the past 3\n\nmonths? ” Responses to question 1 of “ greater than 90\n\ndays ” or responses to question 2 of “ Yes ” were used to\n\nclassify patients as having persistent pain at initial\n\nevaluation.\n\n### Pain intensity\n\nPain intensity was assessed by the numerical pain rating\n\nscale (NPRS) ranging from “ 0 ” (no pain) to “ 10 ” (worst\n\npain imaginable) [ 24 - 26 ]. Participants rated their\n\ncurrent pain intensity, as well as their best (lowest) and\n\nworst (highest) pain intensity over the past 24 h.\n\nCurrent, best and worst pain ratings were averaged for\n\npurposes of analysis.\n\n### Region-specific disability\n\nSelf-reported region-specific disability was assessed with\n\nthe Neck Disability Index [ 27 , 28 ], Oswestry Disability\n\nQuestionnaire [ 29 , 30 ], Quick Disability of Arm Shoulder\n\nand Hand [ 31 ] or International Knee Documentation\n\nCommittee Subjective Knee Form [ 32 ] for cervical, low\n\nback, shoulder and knee pain, respectively. Region-specific\n\ndisability measures were z-transformed for purposes of\n\nanalysis, consistent with our prior work involving multiple\n\nanatomical regions [ 33 ].\n\n### Comorbidities\n\n#### Charlson comorbidity index (CCI)\n\nThe Charlson Comorbidity Index was used to measure\n\nthe presence of chronic comorbid medical conditions\n\n[ 34 ]. It lists 19 medical conditions that participants are\n\nasked to indicate whether they “ have ever been diag-\n\nnosed with by a physician ” . Conditions are weighted\n\nand added for an overall measure of comorbidity\n\nburden. The CCI has demonstrated good test-retest re-", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "shown to identify approximately 95% of positive red-flag re-\n\nsponders. For statistical analyses, the “ yes ” responses were\n\nadded for each version and included in each model as a\n\ncontinuous independent variable.\n\n#### OSPRO Yellow Flag tool (OSPRO-YF)\n\nThe OSPRO-YF is a yellow flag assessment tool that in-\n\ncludes items from pain vulnerability domains (negative\n\naffect and fear-avoidance) and pain resilience domains\n\n(positive affect and self-efficacy) to aid with identification\n\nof pain-related psychological distress in outpatient ortho-\n\npedic physical therapy settings [ 37 ]. The OSPRO-YF has\n\ngood concurrent validity with pain intensity and\n\nregion-specific disability [ 37 ] and is capable of predicting\n\npain intensity, disability, quality of life and persistent pain\n\n12 months following physical therapy in patients with\n\nmusculoskeletal pain [ 20 , 21 ]. The full-length OSPRO-YF\n\nhas 17-items, however a shortened 10-item version is also\n\navailable with an acceptable trade-off in accuracy. Like the\n\nOSPRO-ROS, the OSPRO-YF is designed for implementa-\n\ntion into electronic medical record (EMR) systems to\n\nquickly and accurately identify risk for a variety of clinical\n\noutcomes [ 19 ]. For statistical analyses, a summary score\n\nwas derived for each version by adding the item responses\n\nafter reverse-scoring items 2, 13, 14, 15 and 17 so that\n\nhigher scores indicate higher pain-related psychological\n\ndistress. The summary score was then included in each\n\nmodel as a continuous independent variable.\n\n### Intervention\n\nAll physical therapy treatment was provided at the discre-\n\ntion of the treating clinician. The duration of the episode,\n\nthe number of physical therapy visits, and individual treat-\n\nment parameters (type, intensity, duration, frequency)\n\nwere not collected for pragmatic reasons. In particular,\n\nclinical and utilization data are not commonly collected in\n\na standardized format and would need to be extracted\n\nfrom disparate medical record databases across different\n\nhealth care systems to assess treatment. This was not feas-\n\nible given the scope and design of this multisite\n\nsurvey-based study. However, instead of coding treatment\n\ntype we included baseline-to-4 week change in pain inten-\n\nsity, region-specific disability, and OSPRO-YF scores in\n\neach model as measures of treatment response. In that\n\nmanner the individual effects of the treatment received\n\nwere included in the predictive models, without directly\n\naccounting for the type of treatment.\n\n### Healthcare utilization outcomes\n\nSelf-reported health care utilization was assessed at 6- and\n\n12-months following initial evaluation by online assessment.\n\nQuestions were derived from previous population-based\n\nstudies involving musculoskeletal pain that have used survey\n\nmethods for follow-up assessment [ 22 , 23 ]. Study\n\nparticipants were asked whether they used any of the fol-\n\nlowing healthcare services for their primary musculoskeletal\n\npain complaint in the time following their physical therapy\n\ntreatment:\n\n1. Opioid painkillers (eg. Vicodin, Lortab,\n\nHydrocodone, Fentanyl, Percocet, Oxycontin,\n\nOxycodone, tramadol, Ultram, Diludid, etc)\n\n2. Injections\n\n3. Surgery\n\n4. Diagnostic tests or Imaging (eg. xray, MRI, CT\n\nscan, nerve conduction test, etc.)\n\n5. Emergency room visits\n\n“ Yes ” responses were followed by questions regarding\n\nthe quantity of services utilized (i.e. number of opioid\n\npainkillers, number of diagnostic tests or number of\n\nemergency room visits). All utilization questions were\n\nanswered on a categorical scale (0, 1, 2 - 5, 5 - 10, or > 10)\n\nindicating the quantity of a particular service received\n\nduring the applicable follow-up timeframe. At 6-month\n\nfollow-up, study participants reported their use of ser-\n\nvices for the previous 2 months, allowing a timeframe of\n\n4 months from initial evaluation for them to complete\n\nphysical therapy. At 12-month follow-up, study partici-\n\npants reported their use of services over the previous", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" - }, - { - "text": "access to liquidity and capital.\n\nWe have engaged each of Fitch Ratings (Fitch), Moody’s Investors\n\nService (Moody’s) and Standard & Poor’s Ratings Services (Standard &\n\nPoor’s) to rate our public debt issues. In May 2013, each of Fitch and\n\nStandard & Poor’s upgraded RCI’s senior unsecured debt to BBB+ (from\n\nBBB) with a stable outlook. Moody’s comparably equivalent rating of\n\nBaa1 with a stable outlook has not changed from last year.\n\nThe table below shows the credit ratings on our borrowings received\n\nfrom the rating agencies as of December 31, 2013:\n\n**2013**\n\n**Corporate credit issuer**\n\n**default rating Senior unsecured debt**\n\nStandard and Poor’s BBB+ with a stable outlook BBB+ with a stable outlook\n\nFitch BBB+ with a stable outlook BBB+ with a stable outlook\n\nMoody’s Baa1, stable outlook Baa1, stable outlook\n\nRatings for debt instruments across the universe of composite rates\n\nrange from AAA (Standard & Poor’s and Fitch) or Aaa (Moody’s)\n\nrepresenting the highest quality of securities rated, to D (Standard &\n\nPoor’s), C (Moody’s) and Substantial Risk (Fitch) for the lowest quality of\n\nsecurities rated.\n\nCredit ratings are not recommendations for investors to purchase, hold\n\nor sell the rated securities, nor are they a comment on market price or\n\ninvestor suitability. There is no assurance that a rating will remain in\n\neffect for a given period of time, or that a rating will not be revised or\n\nwithdrawn entirely by a rating agency if it believes circumstances\n\nwarrant it. The ratings on our senior debt provided by Standard &\n\nPoor’s, Fitch and Moody’s are investment grade ratings.\n\n**RATIO OF ADJUSTED OPERATING PROFIT TO INTEREST**\n\n**2013**\n\n2012\n\n2011\n\n**6.8x**\n\n6.8x\n\n7.1x\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 61", - "page_start": 64, - "page_end": 64, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "nosed with by a physician ” . Conditions are weighted\n\nand added for an overall measure of comorbidity\n\nburden. The CCI has demonstrated good test-retest re-\n\nliability (0.91) and positive but weak to modest correla-\n\ntions with medication use, hospitalizations, length of\n\nstay, total charges, and pharmacy and laboratory\n\ncharges for older adults in general medical care and\n\nsurgical care settings [ 35 ].\n\n### Assessment tools\n\n#### OSPRO Review of Systems tool (OSPRO-ROS)\n\nThe OSPRO-ROS is a review-of-systems screening tool for\n\nuse in outpatient orthopedic physical therapy settings [ 36 ].\n\nThe OSPRO-ROS has demonstrated good concurrent val-\n\nidity with depression and a comprehensive 97-item battery\n\nof non-musculoskeletal symptoms (i.e., red flags). [ 36 ]\n\nModerate to strong predictive capabilities of the\n\nOSPRO-ROS have been reported for persistence of pain,\n\nquality of life, and change in comorbidity 12 months fol-\n\nlowing physical therapy in patients with musculoskeletal\n\npain [ 20 , 21 ]. The OSPRO-ROS includes standard symp-\n\ntom descriptors to aid with identification of systemic or\n\nnon-musculoskeletal origins of musculoskeletal pain. It\n\nincludes questions related to symptoms of the cardiovascu-\n\nlar, gastrointestinal, endocrine, nervous, integumentary,\n\npulmonary, and musculoskeletal systems. The full-length\n\n23-item version of the OSPRO-ROS is capable of identify-\n\ning 100% of positive red-flag responders (i.e. indicating\n\n“ yes ” to at least one systemic symptom on a questionnaire)\n\nin outpatient orthopedic physical therapy settings. [ 36 ] A\n\nshorter, 10-item version is also available that has been", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "apy for musculoskeletal pain. The precise application of\n\nthese risk models, and how they inform policy and prac-\n\ntice should be the target of future study. However, phys-\n\nical therapy re-design might incorporate enhanced\n\ntreatment monitoring to assess ongoing risk for down-\n\nstream utilization, as well as physical therapist-led inter-\n\nventions to more thoroughly address important\n\nmodifiable factors such as pain intensity, disability and\n\npain-related psychological distress [ 38 ]. Improved path-\n\nway selection might entail the consideration of referral\n\nto or co-treatment with other providers to more ad-\n\nequately address non-modifiable characteristics. Collect-\n\nively, these approaches could improve the value of\n\nphysical therapy by minimizing risk for high downstream\n\nhealthcare utilization and potentially unwarranted escal-\n\nation of care.\n\nThe primary strength of the study is longitudinal\n\nfollow-up at multiple time points following an episode\n\nof physical therapy for a variety of musculoskeletal pain\n\nconditions. Anatomical location of pain was not a sig-\n\nnificant predictor of healthcare use in all but one model,\n\nsuggesting results are widely applicable across a\n\nspectrum of musculoskeletal pain conditions. Another\n\nstrength of this cohort study is the assessment of various\n\nhealthcare utilization outcomes of interest for establish-\n\ning health policy. When considered alongside more trad-\n\nitional pain- or disability-related outcomes prediction\n\nmodels, these findings will improve the ability of health-\n\ncare systems and providers to make decisions in\n\nvalue-based purchasing environments. The consideration\n\nof multiple screening tools (i.e. yellow flags and review\n\nof systems) and treatment monitoring variables is also a\n\nstrength of this study as screening and systematic treat-\n\nment monitoring are not routine in clinical practice. A\n\nfinal strength is inclusion of multiple sociodemographic,\n\nhealth-related and psychosocial factors as potential pre-\n\ndictors. Healthcare outcomes and utilization exhibit\n\nemergent properties that require the consideration of\n\nmultiple, competing factors to fully explain [ 50 ].\n\nPage 11 of 14", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" - }, - { - "text": "Summary type R-1 <sup>a</sup> R-2 <sup>a</sup> R-L <sup>a</sup> BERT-p BERT-r SCALE\n\nLLM-generated 0.494 0.322 0.391 0.859 0.876 0.691\n\nPhysician-written 0.251 0.088 0.154 0.796 0.827 0.456\n\nAbbreviations: BERT, bidirectional encoder representations from transformers; p, precision-based scores; r, recall-based scores; R, recall-oriented understudy for gisting evaluation;\n\nSCALE, source chunking approach for large-scale inconsistency evaluation.\n\na R-1, R-2, R-L are the 3 types of recall-oriented understudy for gisting evaluation scores. Higher is better for all metrics.\n\nDecember 3, 2024 6/12", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed8.pdf" - }, - { - "text": "services, suggesting injection may be the most difficult\n\nservice to predict with the included variable set.\n\n#### Surgery\n\nBaseline disability (OR = 3.13 - 3.25, p < 0.001), change in\n\ndisability (OR = 3.04 - 3.05, p = 0.01) and change in\n\n10-item OSPRO-YF score (OR = 1.12 - 1.14, p < 0.05)\n\nwhere consistent predictors of subsequent surgery. Not-\n\nably, magnitude of prediction was comparable between\n\nchange in disability and baseline disability. This was the\n\nonly parsimonious model to include an OSPRO tool. In\n\nthis case, an increase in pain-related psychological dis-\n\ntress measured by the OSPRO-YF 10-item questionnaire\n\nover the first 4 weeks was associated with higher odds of\n\nsurgery. The 3 predictors in this model explained just\n\nover 30% of the variance in surgery utilization.\n\n#### Diagnostic tests or imaging\n\nComorbidity index score (OR = 1.35 - 1.45, p < 0.05),\n\nbaseline disability (OR = 2.25 - 2.66, p < 0.001), and base-\n\nline to 4-week change in pain intensity (OR = 3.04 - 3.05,\n\np = 0.01) were significant predictors of diagnostic test or\n\nimaging utilization. Among these, baseline disability was\n\nthe strongest predictor. In these models, higher comor-\n\nbidity index, higher baseline disability and worsening\n\npain were associated with higher odds of utilization.\n\nTogether, these variables explained approximately 30%\n\nof the variance in utilization.\n\n#### Emergency room\n\nModels for emergency room use had the highest pseudo-R <sup>2</sup>\n\nvalues of any individual service (0.48 - 0.50), but also had\n\nthe largest number of predictors (8 - 9). Agreement between\n\ncomplete case and weighted models was moderate. The\n\nmodels converged on the following predictors: age (OR =\n\n0.91 - 0.94, p < 0.05), insurance (OR = 8.99 - 13.15, p < 0.05),\n\nbaseline disability (OR = 3.33 - 4.88, p < 0.001), and change\n\nin pain (OR = 1.59 - 1.77, p < 0.05). Higher utilization was\n\nassociated with younger age, other insurance (e.g., self-pay,\n\nWorker ’ s Compensation, or other commercial insurance)\n\ncompared to private insurance, higher baseline disability\n\nand worsening of pain. In the weighted analysis, subjects\n\nwith knee pain were less likely to utilize the emergency\n\nroom than those with low back pain. However, this rela-\n\ntionship was not significant ( p = .06) in the complete case\n\nanalysis. Of the significant predictors in both models, insur-\n\nance status was the strongest individual predictor of subse-\n\nquent emergency room use.\n\n## Discussion\n\nThis study identified novel predictors for pain-related\n\nutilization outcomes following an episode of physical\n\ntherapy for a primary complaint of musculoskeletal\n\npain. The most robust finding from these analyses\n\nwas that baseline disability and change in pain inten-\n\nsity over the first 4 weeks following physical therapy\n\nevaluation were consistent predictors of subsequent\n\npain-related healthcare utilization in those participants\n\nthat completed all follow up. Aside from these robust\n\npredictors, other individual predictors of utilization\n\nwere highly outcome-specific. High model specificity\n\nfor utilization outcomes observed in this study is con-\n\nsistent with a recent systematic review that found\n\nsimilar levels of model specificity for more traditional\n\noutcomes like pain intensity, disability and work\n\nabsenteeism [ 14 ]. Across models, health-related vari-\n\nables were generally stronger predictors than sociode-\n\nmographic factors, which is also supported by prior\n\nresearch [ 15 , 16 ]. Additionally, there were cases when\n\nprediction models were improved for specific services\n\n(e.g. surgery, use of opioids) when considering change\n\nin pain, disability or pain-related psychological dis-\n\ntress. A notable finding is that the OSPRO-YF had\n\nthe greatest utility when used to measure change in\n\npain-related psychological distress. Current risk pre-\n\ndiction paradigms in musculoskeletal pain consider\n\nonly baseline pain-related psychological distress. How-", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed5.pdf" - }, - { - "text": "routine pain-related psychological distress monitoring\n\nthroughout the early phases of rehabilitation espe-\n\ncially if the goal is to identify risk for subsequent\n\npain-related healthcare utilization. The implications of\n\nthese collective findings are that treatment pathways\n\nmay provide greater value by 1) addressing modifiable\n\nhealth-related variables like pain, disability and\n\npain-related psychological distress, 2) routine moni-\n\ntoring of these health-related variables and 3) offering\n\ntreatment alternatives that safely escalate care if\n\nneeded while minimizing risk of harm and unhelpful\n\nutilization.\n\nOpioids and diagnostic tests and imaging were the two\n\nmost common subsequent healthcare services utilized\n\nfollowing physical therapy. Of the individuals that com-\n\npleted follow up and had any subsequent healthcare\n\nutilization, approximately 42% reported opioid use and\n\n70% reported use of diagnostic tests and imaging. An\n\nimportant health-related predictor of these services was\n\nlevel of comorbidity burden. For those with high comor-\n\nbidity burden and inadequate treatment response to\n\nphysical therapy, use of additional diagnostic tests and\n\nimaging or low-dose opioids may be appropriate in some\n\ncases. But given the growing public health concern over\n\nopioid use and the desire to avoid unnecessary treat-\n\nment driven by imaging, our results suggest the import-\n\nance of considering disease burden when developing\n\ntreatment pathways and healthcare policy to mitigate\n\nrisk for avoidable use of these services. Interestingly,\n\nneither versions of the OSPRO-ROS predicted\n\nutilization outcomes even though it has been linked to\n\nmental health, comorbidity, and persistent pain state in\n\nother analyses [ 20 , 21 ]. Systemic symptom burden is a\n\nmeasure of patient complexity that is related to but dis-\n\ntinct from comorbidity burden [ 36 , 47 ]. In these ana-\n\nlyses, the chronic condition measure (i.e. the CCI) was\n\na better predictor of utilization than symptom burden\n\n(i.e. OSPRO-ROS). The reasons for this finding are un-\n\nclear but may be related to providers and patients being\n\nmore likely to pursue follow-up medical care for mus-\n\nculoskeletal pain when known co-existing conditions\n\nare present as opposed to reporting of symptoms alone.\n\nThe distinction between symptom and disease burden\n\nin defining musculoskeletal patient complexity, and its\n\ninfluence on clinical decision-making and outcomes,\n\nshould be the subject of future research particularly re-\n\nlated to aging populations [ 48 ].\n\nUtilization outcomes benchmarks have not been estab-\n\nlished to determine how the percentage of subsequent\n\nhealthcare use in this study compares to outcomes using\n\nother health services. Prior studies suggest physical ther-\n\napy is associated with reduced incidence of additional\n\nhealthcare use compared to not using physical therapy\n\nin patients with acute low back pain [ 10 , 49 ]. Some\n\nadditional healthcare use is expected following physical\n\ntherapy, especially among individuals that are on\n\nlong-term pain management pathways due to chronic or\n\npersistent symptoms. Yet with over 40% reporting subse-\n\nquent pain-related healthcare among those completing\n\nfollow-up, it is apparent that opportunities exist to im-\n\nprove pathway selection and/or the effectiveness of\n\nphysical therapy for individuals with musculoskeletal\n\npain. This finding is particularly notable given recent\n\nefforts to define physical therapy as an effective first line,\n\nnon-pharmacological treatment option against more\n\ninvasive or higher risk services, such as surgery or opioid\n\nuse, respectively. Predictive variables identified in this\n\nanalysis can be used to develop risk models that better\n\ninform pathway selection for those seeking physical ther-\n\napy for musculoskeletal pain. The precise application of\n\nthese risk models, and how they inform policy and prac-\n\ntice should be the target of future study. However, phys-", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed5.pdf", - "query": "What are the health consequences of musculoskeletal pain ?", - "target_page": 1, - "target_passage": "Musculoskeletal pain is a prevalent and costly health condition with far-reaching public health consequences including chronic pain, disability and opioid-related ad diction [1].", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "RESEARCH ARTICLE Open Access\n\nPrediction of healthcare utilization following an episode of physical therapy for musculoskeletal pain\n\nTrevor A. Lentz <sup>1*</sup> , Jason M. Beneciuk <sup>2,3</sup> and Steven Z. George <sup>4</sup>\n\n## Abstract\n\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively\n\nidentify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The\n\npurpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode\n\nof physical therapy for musculoskeletal pain.\n\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO)\n\nlongitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder\n\npain in physical therapy ( n = 440). Demographics, health-related information, review of systems, comorbidity and\n\npain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in\n\npain intensity, disability, and pain-related psychological distress were measured as treatment response variables.\n\nAt 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests\n\nor imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models\n\nwere developed for any subsequent care and service-specific utilization.\n\nResults: Subsequent pain-related healthcare utilization was reported by 43% ( n = 106) of the study sample that completed\n\nthe 12-month follow-up ( n = 246). Baseline disability and 4-week change in pain intensity were important global predictors\n\nof subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain\n\nintensity, disability and pain-related psychological distress predicted specific service utilization.\n\nConclusion: In those completing follow up measures, risk of additional pain-related healthcare utilization after physical\n\ntherapy was best predicted by baseline characteristics and 4-week treatment response variables for pain intensity, disability\n\nand pain-related psychological distress. These findings suggest treatment monitoring of specific response variables could\n\nenhance identification of those at risk for future healthcare utilization in addition to baseline assessment. Further study is\n\nrequired to determine how specific characteristics of the clinical encounter influence future utilization.\n\nKeywords: Screening, Psychological distress, Multimorbidity, Value, Treatment monitoring\n\n## Background\n\nMusculoskeletal pain is a prevalent and costly health\n\ncondition with far-reaching public health consequences\n\nincluding chronic pain, disability and opioid-related ad-\n\ndiction [ 1 ]. Clinical practice guidelines now recom-\n\nmend non-pharmacological treatment as frontline\n\nmanagement for musculoskeletal pain, which will lead\n\nto increased utilization of services such as physical\n\ntherapy [ 1 - 3 ]. Physical therapy is effective for improving\n\ndisability and reducing costs associated with many muscu-\n\nloskeletal pain conditions [ 4 - 9 ]. However, pain-related\n\nhealthcare utilization beyond the physical therapy episode\n\n(e.g. subsequent use of surgery, injection, opioids, etc.)\n\nmay indicate suboptimal treatment response, the presence\n\nof more complex needs, or unwarranted escalation of care.\n\nDownstream healthcare utilization is not often considered\n\nas an outcome of care or indication of treatment effective-\n\nness for musculoskeletal pain. But the importance of\n\n* Correspondence: [ trevor.lentz@duke.edu](mailto:trevor.lentz@duke.edu)\n\n1 Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\n\nNC 27705, USA\n\nFull list of author information is available at the end of the article", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "In a similar way, **the levels of ergonomic risks** are related with the sectoral structure of a country,\n\ndetermining the type of occupations and work tasks. EU-OSHA provided a detailed analysis of the\n\nprevalence of musculoskeletal disorders (MSDs) and the related risk factors in several studies on\n\n[musculoskeletal diseases, for example, ‘Work-related musculoskeletal disorders: why are they still so ](https://osha.europa.eu/en/publications/work-related-musculoskeletal-disorders-why-are-they-still-so-prevalent-evidence-literature-review)\n\n[prevalent?’](https://osha.europa.eu/en/publications/work-related-musculoskeletal-disorders-why-are-they-still-so-prevalent-evidence-literature-review) <sup>58</sup>\n\nAn example of the **interrelation between sectors and risks is the connection** between the sector\n\naggregate ‘Trade, transport, food/accommodation and recreation activities’ and three major indicators\n\nof ergonomic burden, that is, ‘Painful, tiring positions’, ‘Repetitive hand or arm movements’, and\n\n‘Carrying or moving heavy loads’.\n\nSeven countries have a share of employees in this sector of more than 30% (Cyprus, Greece, Spain,\n\nMalta, Bulgaria, Croatia and Latvia), and many of them are present in two or three lists of countries with\n\nthe highest number of responses regarding the indicators.\n\n© Tyler Olson/Adobe Stock", - "page_start": 42, - "page_end": 42, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "nosed with by a physician ” . Conditions are weighted\n\nand added for an overall measure of comorbidity\n\nburden. The CCI has demonstrated good test-retest re-\n\nliability (0.91) and positive but weak to modest correla-\n\ntions with medication use, hospitalizations, length of\n\nstay, total charges, and pharmacy and laboratory\n\ncharges for older adults in general medical care and\n\nsurgical care settings [ 35 ].\n\n### Assessment tools\n\n#### OSPRO Review of Systems tool (OSPRO-ROS)\n\nThe OSPRO-ROS is a review-of-systems screening tool for\n\nuse in outpatient orthopedic physical therapy settings [ 36 ].\n\nThe OSPRO-ROS has demonstrated good concurrent val-\n\nidity with depression and a comprehensive 97-item battery\n\nof non-musculoskeletal symptoms (i.e., red flags). [ 36 ]\n\nModerate to strong predictive capabilities of the\n\nOSPRO-ROS have been reported for persistence of pain,\n\nquality of life, and change in comorbidity 12 months fol-\n\nlowing physical therapy in patients with musculoskeletal\n\npain [ 20 , 21 ]. The OSPRO-ROS includes standard symp-\n\ntom descriptors to aid with identification of systemic or\n\nnon-musculoskeletal origins of musculoskeletal pain. It\n\nincludes questions related to symptoms of the cardiovascu-\n\nlar, gastrointestinal, endocrine, nervous, integumentary,\n\npulmonary, and musculoskeletal systems. The full-length\n\n23-item version of the OSPRO-ROS is capable of identify-\n\ning 100% of positive red-flag responders (i.e. indicating\n\n“ yes ” to at least one systemic symptom on a questionnaire)\n\nin outpatient orthopedic physical therapy settings. [ 36 ] A\n\nshorter, 10-item version is also available that has been", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" - }, - { - "text": "21. Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistent\n\nmusculoskeletal pain at 12 months: a secondary analysis of the Optimal\n\nScreening for Prediction of Referral and Outcome (OSPRO) validation cohort\n\nstudy. Phys Ther. 2018;98:290 - 301.\n\n22. Freburger JK, Holmes GM, Agans RP, Jackman AM, Darter JD, Wallace AS, et\n\nal. The rising prevalence of chronic low back pain. Arch Intern Med. 2009;\n\n169:251 - 8.\n\n23. Carey TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al.\n\nRace, care seeking, and utilization for chronic back and neck pain:\n\npopulation perspectives. J Pain Off J Am Pain Soc. 2010;11:343 - 50.\n\n24. Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and\n\nvalidity of chronic pain intensity measures. Pain. 1999;83:157 - 62.\n\n25. Bolton JE. Accuracy of recall of usual pain intensity in back pain patients.\n\nPain. 1999;83:533 - 9.\n\n26. Childs JD, Piva SR, Fritz JM. Responsiveness of the numeric pain rating scale\n\nin patients with low back pain. Spine. 2005;30:1331 - 4.\n\n27. Vernon H. The neck disability index: state-of-the-art, 1991-2008. J Manip\n\nPhysiol Ther. 2008;31:491 - 502.\n\n28. Vernon H, Mior S. The neck disability index: a study of reliability and validity.\n\nJ Manip Physiol Ther. 1991;14:409 - 15.\n\n29. Hudson-Cook N, Tomes-Nicholson K, Breen A. A revised Oswestry disability\n\nquestionnaire. In: Roland M, Jenner J, editors. Back pain: new approaches to\n\nrehabilitation and education. New York: Manchester University Press; 1989.\n\np. 187 - 204.\n\n30. Fritz JM, Irrgang JJ. A comparison of a modified Oswestry low back pain\n\ndisability questionnaire and the Quebec back pain disability scale. Phys\n\nTher. 2001;81:776 - 88.\n\n31. Beaton DE, Wright JG, Katz JN, Upper Extremity Collaborative Group.\n\nDevelopment of the QuickDASH: comparison of three item-reduction\n\napproaches. J Bone Joint Surg Am. 2005;87:1038 - 46.\n\n32. Irrgang JJ, Anderson AF, Boland AL, Harner CD, Kurosaka M, Neyret P, et al.\n\nDevelopment and validation of the international knee documentation\n\ncommittee subjective knee form. Am J Sports Med. 2001;29:600 - 13.\n\n33. Butera KA, Lentz TA, Beneciuk JM, George SZ. Preliminary evaluation of a\n\nmodified STarT back screening tool across different musculoskeletal pain\n\nconditions. Phys Ther. 2016;96:1251 - 61.\n\n34. Charlson ME, Pompei P, Ales KL, MacKenzie CR. A new method of classifying\n\nprognostic comorbidity in longitudinal studies: development and validation.\n\nJ Chronic Dis. 1987;40:373 - 83.\n\n35. Katz JN, Chang LC, Sangha O, Fossel AH, Bates DW. Can comorbidity be\n\nmeasured by questionnaire rather than medical record review? Med Care.\n\n1996;34:73 - 84.\n\n36. George SZ, Beneciuk JM, Bialosky JE, Lentz TA, Zeppieri G, Pei Q, et al.\n\nDevelopment of a review-of-systems screening tool for orthopaedic\n\nphysical therapists: results from the Optimal Screening for Prediction of\n\nReferral and Outcome (OSPRO) cohort. J Orthop Sports Phys Ther. 2015;45:\n\n512 - 26.\n\n37. Lentz TA, Beneciuk JM, Bialosky JE, Zeppieri G, Dai Y, Wu SS, et al.\n\nDevelopment of a yellow flag assessment tool for orthopaedic physical\n\ntherapists: results from the Optimal Screening for Prediction of Referral and\n\nOutcome (OSPRO) cohort. J Orthop Sports Phys Ther. 2016;46:327 - 43.\n\n38. Beneciuk JM, Fritz JM, George SZ. The STarT back screening tool for\n\nprediction of 6-month clinical outcomes: relevance of change patterns in\n\noutpatient physical therapy settings. J Orthop Sports Phys Ther. 2014;44:\n\n656 - 64.\n\n39. Myers RH. Classical and modern regression with applications. 2nd ed. Pacific\n\nGrove: Duxbury Press; 2000.\n\n40. Weuve J, Tchetgen Tchetgen EJ, Glymour MM, Beck TL, Aggarwal NT,\n\nWilson RS, et al. Accounting for bias due to selective attrition: the example\n\nof smoking and cognitive decline. Epidemiol Camb Mass. 2012;23:119 - 28.\n\n41. Hernán MA, Hernández-Díaz S, Robins JM. A structural approach to\n\nselection bias. Epidemiol Camb Mass. 2004;15:615 - 25.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - }, - { - "text": "routine pain-related psychological distress monitoring\n\nthroughout the early phases of rehabilitation espe-\n\ncially if the goal is to identify risk for subsequent\n\npain-related healthcare utilization. The implications of\n\nthese collective findings are that treatment pathways\n\nmay provide greater value by 1) addressing modifiable\n\nhealth-related variables like pain, disability and\n\npain-related psychological distress, 2) routine moni-\n\ntoring of these health-related variables and 3) offering\n\ntreatment alternatives that safely escalate care if\n\nneeded while minimizing risk of harm and unhelpful\n\nutilization.\n\nOpioids and diagnostic tests and imaging were the two\n\nmost common subsequent healthcare services utilized\n\nfollowing physical therapy. Of the individuals that com-\n\npleted follow up and had any subsequent healthcare\n\nutilization, approximately 42% reported opioid use and\n\n70% reported use of diagnostic tests and imaging. An\n\nimportant health-related predictor of these services was\n\nlevel of comorbidity burden. For those with high comor-\n\nbidity burden and inadequate treatment response to\n\nphysical therapy, use of additional diagnostic tests and\n\nimaging or low-dose opioids may be appropriate in some\n\ncases. But given the growing public health concern over\n\nopioid use and the desire to avoid unnecessary treat-\n\nment driven by imaging, our results suggest the import-\n\nance of considering disease burden when developing\n\ntreatment pathways and healthcare policy to mitigate\n\nrisk for avoidable use of these services. Interestingly,\n\nneither versions of the OSPRO-ROS predicted\n\nutilization outcomes even though it has been linked to\n\nmental health, comorbidity, and persistent pain state in\n\nother analyses [ 20 , 21 ]. Systemic symptom burden is a\n\nmeasure of patient complexity that is related to but dis-\n\ntinct from comorbidity burden [ 36 , 47 ]. In these ana-\n\nlyses, the chronic condition measure (i.e. the CCI) was\n\na better predictor of utilization than symptom burden\n\n(i.e. OSPRO-ROS). The reasons for this finding are un-\n\nclear but may be related to providers and patients being\n\nmore likely to pursue follow-up medical care for mus-\n\nculoskeletal pain when known co-existing conditions\n\nare present as opposed to reporting of symptoms alone.\n\nThe distinction between symptom and disease burden\n\nin defining musculoskeletal patient complexity, and its\n\ninfluence on clinical decision-making and outcomes,\n\nshould be the subject of future research particularly re-\n\nlated to aging populations [ 48 ].\n\nUtilization outcomes benchmarks have not been estab-\n\nlished to determine how the percentage of subsequent\n\nhealthcare use in this study compares to outcomes using\n\nother health services. Prior studies suggest physical ther-\n\napy is associated with reduced incidence of additional\n\nhealthcare use compared to not using physical therapy\n\nin patients with acute low back pain [ 10 , 49 ]. Some\n\nadditional healthcare use is expected following physical\n\ntherapy, especially among individuals that are on\n\nlong-term pain management pathways due to chronic or\n\npersistent symptoms. Yet with over 40% reporting subse-\n\nquent pain-related healthcare among those completing\n\nfollow-up, it is apparent that opportunities exist to im-\n\nprove pathway selection and/or the effectiveness of\n\nphysical therapy for individuals with musculoskeletal\n\npain. This finding is particularly notable given recent\n\nefforts to define physical therapy as an effective first line,\n\nnon-pharmacological treatment option against more\n\ninvasive or higher risk services, such as surgery or opioid\n\nuse, respectively. Predictive variables identified in this\n\nanalysis can be used to develop risk models that better\n\ninform pathway selection for those seeking physical ther-\n\napy for musculoskeletal pain. The precise application of\n\nthese risk models, and how they inform policy and prac-\n\ntice should be the target of future study. However, phys-", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" - }, - { - "text": "apy for musculoskeletal pain. The precise application of\n\nthese risk models, and how they inform policy and prac-\n\ntice should be the target of future study. However, phys-\n\nical therapy re-design might incorporate enhanced\n\ntreatment monitoring to assess ongoing risk for down-\n\nstream utilization, as well as physical therapist-led inter-\n\nventions to more thoroughly address important\n\nmodifiable factors such as pain intensity, disability and\n\npain-related psychological distress [ 38 ]. Improved path-\n\nway selection might entail the consideration of referral\n\nto or co-treatment with other providers to more ad-\n\nequately address non-modifiable characteristics. Collect-\n\nively, these approaches could improve the value of\n\nphysical therapy by minimizing risk for high downstream\n\nhealthcare utilization and potentially unwarranted escal-\n\nation of care.\n\nThe primary strength of the study is longitudinal\n\nfollow-up at multiple time points following an episode\n\nof physical therapy for a variety of musculoskeletal pain\n\nconditions. Anatomical location of pain was not a sig-\n\nnificant predictor of healthcare use in all but one model,\n\nsuggesting results are widely applicable across a\n\nspectrum of musculoskeletal pain conditions. Another\n\nstrength of this cohort study is the assessment of various\n\nhealthcare utilization outcomes of interest for establish-\n\ning health policy. When considered alongside more trad-\n\nitional pain- or disability-related outcomes prediction\n\nmodels, these findings will improve the ability of health-\n\ncare systems and providers to make decisions in\n\nvalue-based purchasing environments. The consideration\n\nof multiple screening tools (i.e. yellow flags and review\n\nof systems) and treatment monitoring variables is also a\n\nstrength of this study as screening and systematic treat-\n\nment monitoring are not routine in clinical practice. A\n\nfinal strength is inclusion of multiple sociodemographic,\n\nhealth-related and psychosocial factors as potential pre-\n\ndictors. Healthcare outcomes and utilization exhibit\n\nemergent properties that require the consideration of\n\nmultiple, competing factors to fully explain [ 50 ].\n\nPage 11 of 14", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" - }, - { - "text": "identifying risk for additional utilization has emerged due\n\nto the growth of cost-sharing and capitated payment\n\nmodels, particularly in the United States (US). As a result,\n\nmany US health care services organizations have begun\n\nto prioritize early identification of individuals at risk for\n\ndownstream healthcare use at the onset of treatment\n\n[ 10 , 11 ]. Early risk assessment allows systems to deliver\n\ngreater value by 1) focusing limited health care re-\n\nsources towards patients who are most in need, and 2)\n\nidentifying those who may require coordination of mul-\n\ntiple providers and services to optimize outcomes.\n\nProspective identification of risk for high subsequent\n\nhealthcare utilization is a different approach to out-\n\ncomes prediction for musculoskeletal pain [ 12 , 13 ] and\n\none that has not been evaluated in physical therapy set-\n\ntings in the US. Most existing outcomes prediction\n\nmodels focus on pain and disability endpoints [ 12 - 14 ].\n\nThey also concentrate on condition-specific and psycho-\n\nlogical predictors, with less attention to factors that could\n\ninfluence healthcare utilization more directly [ 15 - 17 ].\n\nThese factors include insurance, comorbidities, symp-\n\ntoms unrelated to the pain condition, and treatment\n\nresponse. As a result, predictors of pain-related\n\nhealthcare utilization beyond physical therapy are un-\n\nknown. A better understanding of these predictors\n\nwill have significant implications for future healthcare\n\npathway development. For instance, an influence of\n\nmodifiable factors like pain-related psychological dis-\n\ntress might imply the need to build clinical pathways\n\nthat address those factors directly through physical\n\ntherapist provided intervention. Additionally, under-\n\nstanding the relative predictive capabilities of baseline\n\nversus change estimates for modifiable factors would\n\nclarify whether prediction is improved by routinely\n\nassessing outcomes during the course of treatment\n\n(i.e. treatment monitoring) [ 18 ].\n\nThis study was undertaken in a nationwide, US cohort\n\nof patients receiving outpatient physical therapy for a\n\nprimary complaint of knee, shoulder, back or neck pain.\n\nThe primary aim of the analysis was to predict incidence\n\nof additional pain-related healthcare utilization in the\n\nyear following the episode of physical therapy for mus-\n\nculoskeletal pain. We considered factors not commonly\n\nassessed in outcomes prediction for musculoskeletal\n\npain, like insurance, comorbidities, and treatment re-\n\nsponse, as well as those more often associated with\n\npain-related outcomes (e.g. psychological distress). This\n\nproject will lead to the development of potentially novel\n\noutcome prediction models for this population in a com-\n\nmon, non-pharmacological US healthcare setting. The\n\nresults of this study will be particularly important in\n\nvalue-based payment settings where enhanced clinical\n\ndecision-making drives treatment effectiveness and sys-\n\ntem efficiency.\n\n## Methods\n\n### Dataset and patient population\n\nThis study used data from the Orthopedic Physical Ther-\n\napy - Investigative Network ’ s (OPT-IN) Optimal Screen-\n\ning for Prediction of Referral and Outcome (OSPRO)\n\nvalidation cohort study, a longitudinal prospective study\n\nof individuals with knee, shoulder, back or neck pain seek-\n\ning Physical Therapy in the US. A convenience sample\n\nwas recruited from December 2014 and December 2015\n\nby participating OPT-IN clinics. The OPT-IN clinics that\n\nparticipated in data collection represented multiple geo-\n\ngraphic regions in the US including the Mideast, South-\n\neast, Great Lakes, Rocky Mountain States and Far West,\n\nwith an attempt to balance recruitment between urban\n\nand rural settings over the entire OPT-IN network. Phys-\n\nical therapists practicing in these clinics identified eligible\n\nparticipants at initial evaluation and directed them to a se-\n\ncure study website for the informed consent process and\n\nbaseline self-report assessment. Eligibility criteria have", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed5.pdf" - }, - { - "text": "**Table 6: Physical health risks, Ergonomics - EWCS 2015**\n\nCountry colours: Cyprus aquamarine, Greece orange, Spain blue.\n\nThe exposure to **painful and tiring positions** and **hand/arm movements** are highest in southern and\n\neastern EU Member States. They also seem to be closely correlated to the sector aggregate ‘Trade,\n\ntransport, food/accommodation and recreation activities’. **Moving and carrying heavy loads** is also\n\nconnected to the sectors agriculture, manufacturing and construction — Romania, Latvia, Slovakia and\n\nSpain are part of the top seven. Looking at the countries for the share of workers who are lifting or\n\nmoving people, Romania, Sweden and Ireland are the countries with the highest shares (15%, 14% and\n\n13%).\n\nRegarding **occupations, manual workers** — craft workers, plant and machine operators, and\n\nagricultural workers — **have the highest score** of posture-related risks and ambient ergonomic risks.\n\n**Table 7: Physical health risks, Ergonomics - EWCS 2015 <sup>59</sup>**", - "page_start": 43, - "page_end": 43, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "peripheral neuropathic pain. Clin J Pain. 2015;31:273 - 9.\n\n18. Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and\n\nresponse to treatment. Phys Ther. 2011;91:712 - 21.\n\n19. George SZ, Beneciuk JM, Lentz TA, Wu SS. The Optimal Screening for\n\nPrediction of Referral and Outcome (OSPRO) in patients with\n\nmusculoskeletal pain conditions: a longitudinal validation cohort from the\n\nUSA. BMJ Open. 2017;7:e015188.\n\n20. George SZ, Beneciuk JM, Lentz TA, Wu SS, Dai Y, Bialosky JE, Zeppieri G Jr.\n\nOptimal Screening for Prediction of Referral and Outcome (OSPRO) for\n\nMusculoskeletal Pain Conditions: Results From the Validation Cohort. J\n\nOrthop Sports Phys Ther. 2018;48(6):460 - 75.\n\nPage 13 of 14", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "clients’ places. Also **ergonomic risks** — repetitive hand-arm movements, tiring and painful positions,\n\nlifting and carrying, and prolonged sitting — can pose major health risks, and the statistics show no\n\nsignificant decrease.\n\nThere is a shift of **workforce to administrative, communicative, and emotionally demanding and**\n\n**client-oriented sectors** , like the sectors ‘Education, human health and social work activities’ and ‘Trade,\n\ntransport, food/accommodation and recreation activities’ (more human- human interaction, less human-\n\nmachine interaction). Consequently, this development caused an overall **shift of risks to psychosocial**\n\n**and emotional challenges** and — mostly but by far not always — less physical activity. Some health\n\nrisks worsen in such types of work, like work with difficult clients or long working hours. Many approaches\n\nand pilot projects have been developed to mitigate these workloads, but the implementation seems to\n\nbe limited to a minority of workplaces with high awareness of work-related health issues. Also, since\n\n2005, statistics and surveys find a stagnation (practically no increase and no decrease) concerning the\n\ndevelopment of **working time** , **time pressure and high workload** for workers.\n\nWhen looking at the **overall relationship between work and some major diseases** in the adult\n\npopulation (cardiovascular diseases, cancer, musculoskeletal disorders, pulmonary diseases, hearing\n\nloss), there is a clear connection to socioeconomic status that is a major cause of low life expectancy\n\nand high morbidity. In public health morbidity and mortality studies, a more precise analysis of impact\n\nof working conditions on health, as a very important factor of socioeconomic status, is very rare. This\n\nwould require more detailed knowledge and analysis of the health impacts of occupations and work\n\ntasks and of the preventive measures at work, as well as an improvement in the detection capacities of\n\npreventive and monitoring health systems. Identification of the approximate **attributable fraction of**\n\n**work to diseases** is still the subject of intense scientific debate, with clearer results for some relations\n\nand less clear results for others.\n\nThe **level of implementation and enforcement** of compliance with legislation seems to stagnate. The\n\ncapacities of the OSH infrastructure at national levels show a mixed picture in EU Member States.\n\nAcross the EU, between 2010 and 2020, the labour inspectorates performed on average **two million**\n\n**labour inspections per year** , in approximately 22 million businesses. To enhance the level of\n\nimplementation in terms of coverage and quality, many labour inspections tried to enhance the\n\neffectiveness of common drop-in company inspections by **smart enforcement and supervision**\n\n**concepts** .\n\nThere is no measurable progress in the types of **work with eroded employer- worker relations**\n\n(subcontracts, involuntary self-employed). The reliability of statistical monitoring fades where the\n\nemployer- worker relationship is less clear (regarding aspects such as working conditions, work\n\naccidents and work-related diseases, and of compliance with legislation).\n\nMany enterprises and particularly MSEs and the self-employed very often **cannot fully comply with**\n\n**more complex risk prevention tasks** (e.g. psychosocial, chemical, biological, optical, electromagnetic\n\nrisks) due to lack of resources, expertise and awareness (ESENER data). In general, enforcement\n\nauthorities can only supervise a small percentage of enterprises, particularly not a substantial portion of\n\nMSEs, of self-employed or of non-standard types of work; some Member States included in their\n\nstrategic approaches the objective to reach these enterprises/self-employed. The reason for the\n\ncontinued levels of intensification of work from 2005 onwards might be that the related tasks were", - "page_start": 17, - "page_end": 17, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", - "query": "What is Creative Commons ?", - "target_page": 2, - "target_passage": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy.", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "[This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn](https://www.linkedin.com/in/gotisbrown/) [Otis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open](https://creativecommons.org/licenses/by/4.0/) and public domain works. View full licensing and attribution information about all works included in the [video on Flickr.](https://www.flickr.com/photos/creativecommons/52543574218/)\n\n####### **Creative Commons**\n\nPO Box 1866 Mountain View CA 94042 USA\n\n+1 415 429 6753 info@creativecommons.org", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "[In 2023, we convened hundreds via](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [roundtables, community conferences](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [(e.g. ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[MozFest](https://creativecommons.org/2023/05/04/generative-ai-opportunities-concerns-solutions-from-mozfest-2023/)** , **[Wikimania](https://creativecommons.org/2024/02/07/dispatches-from-wikimania-values-for-shaping-ai-towards-a-better-internet/)** [), and public](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [events (e.g. symposium on ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[Generative](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [AI & Creativity](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)** [)to debate copyright law,](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [the ethics of open sharing, and other](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [relevant areas that touch AI. ](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)\n\n[At our CC Global Summit, participants](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [drafted ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[community-driven principles](https://creativecommons.org/2023/10/07/making-ai-work-for-creators-and-the-commons/)** [on AI that are a valuable input and will](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [help inform the organization’s thinking](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [as we determine CC’s exact role in the AI](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) space.\n\n[“The Pillars of Creation” by ](https://openverse.org/image/8de72efd-e12b-49eb-8210-1046bcd71847?q=Pillars%20of%20Creation) [James Webb Space Telescope ](https://www.flickr.com/photos/50785054@N03) [is licensed under CC BY 2.0. ](https://creativecommons.org/licenses/by/2.0/?ref=openverse)\n\n### **Areas of Exploration**\n\n####### **Support for Creators in the Time of Artificial Intelligence**", - "page_start": 8, - "page_end": 8, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "and indicate if changes were made. The images or other third party material in this article are\n\nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line\n\nto the material. If material is not included in the article’s Creative Commons licence and your\n\nintended use is not permitted by statutory regulation or exceeds the permitted use, you will\n\nneed to obtain permission directly from the copyright holder. To view a copy of this licence,\n\n[visit http://creativecommons.org/licenses/by/4.0/.](http://creativecommons.org/licenses/by/4.0/)\n\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "### **Our Impact**\n\nCC believes that opening up knowledge is key to addressing the world’s most pressing challenges. Today, we steer campaigns, programming, and training in many areas:\n\n2023 was quite a year for the CC Open Culture Program, thanks to generous funding from **[Arcadia](https://www.arcadiafund.org.uk/)** . We grew our Open Culture team from one to two and a half staff, rolling out new initiatives like TAROC (Towards a Recommendation on Open Culture) and **[Open Culture Live:](https://creativecommons.org/tag/open-culture-live/) [A Webinar Series](https://creativecommons.org/tag/open-culture-live/)** . We invite you to read “ **[What did Creative](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [Commons do for Open Culture](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [in 2023?](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/)** ” to learn more.\n\n###### **Open Culture**\n\nWe delivered workshops and presentations on CC Licenses and Open Educational Resources at over 16 conferences and events. The CC Open Education Platform [also funded six global projects,](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) **[including work to advance the](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [UNESCO Recommendation on](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [OER](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [.](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/)**\n\n###### **Open Education**\n\nThanks to generous funding from the **[John D. and Catherine T.](https://www.macfound.org/) [MacArthur Foundation](https://www.macfound.org/)** , CC hosted its very first Open Journalism track at the CC Global Summit, including eight presentations, lightning talks, panel discussions, and workshops as well as a **[keynote](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/) [by Anya Kamenetz](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/)** .\n\nRepresentatives from 33 news outlets and digital rights-focused organizations attended the CC Summit sessions. The Open Journalism track built on **[numerous collaborations and](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/) [workshops](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/)** throughout 2023.\n\n###### **Open Journalism**\n\n[\"Follow the Color Brick Road\" by Bert Kaufmann is](https://www.flickr.com/photos/22746515@N02) [licensed under CC BY-SA 2.0.](https://creativecommons.org/licenses/by-sa/2.0/?ref=openverse)", - "page_start": 6, - "page_end": 6, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "1 Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\n\nNC 27705, USA\n\nFull list of author information is available at the end of the article\n\n© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0\n\nInternational License ( [http://creativecommons.org/licenses/by/4.0/](http://creativecommons.org/licenses/by/4.0/) ), which permits unrestricted use, distribution, and\n\nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to\n\nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver\n\n( [http://creativecommons.org/publicdomain/zero/1.0/](http://creativecommons.org/publicdomain/zero/1.0/) ) applies to the data made available in this article, unless otherwise stated.\n\nhttps://doi.org/10.1186/s12913-018-3470-6", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.\n\n**[Except where otherwise noted, “Annual Report 2023” by Creative Commons ](https://creativecommons.org/mission/) [is licensed under CC BY 4.0. ](https://creativecommons.org/licenses/by/4.0/deed.en)**\n\n[\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0.](https://creativecommons.org/publicdomain/mark/1.0/?ref=openverse)\n\n### **About Us**\n\n#### **Board of Directors**\n\nMarta Belcher Glenn Otis Brown [Delia Browne](https://creativecommons.org/person/deliabrowne/) [James Grimmelmann](https://creativecommons.org/person/jamesgrimmelmann-net/) Lawrence Lessig * *Emeritus*\n\nAngela Oduor Lungati Bilal Randeree Alek Tarkowski Jeni Tennison Luis Villa\n\n**Chief Executive Officer** Anna Tumadóttir\n\n**General Counsel** Kat Walsh", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "## Guide to using public domain tools\n\nCreative Commons makes sharing easy\n\n### What Is Creative Commons?\n\nCreative Commons is a global nonprofit organization\n\ndedicated to supporting an open and accessible Internet\n\nthat is enriched with free knowledge and creative resources\n\nfor people around the world to use, share, and cultivate.\n\nOur easy-to-use licenses provide a simple, standardized way\n\nto give the public permission to share and use your creative\n\nwork — on conditions of your choice. CC licenses let you\n\nchange your copyright terms from the default of “all rights\n\nreserved” to “some rights reserved.”\n\nMillions of people use CC licenses on some of the world’s\n\nmost popular platforms for user-generated content. When\n\nyou use a CC license to share your photos, videos, or blog,\n\nyour creation joins a globally accessible pool of resources\n\nthat includes the work of artists, educators, scientists, and\n\ngovernments.\n\nCreative Commons has waived all copyright and\n\nrelated or neighboring rights to this guide using the\n\nCC0 Public Domain Dedication.\n\n#### What is the difference between CC0 and the Public Domain Mark?\n\nCC0 (“CC Zero”) is intended for use only\n\nby authors or holders of copyright and\n\nrelated rights (including database rights), in connection\n\nwith works that are still subject to those rights in one or\n\nmore countries.\n\nWhen CC0 is applied to a work, copyright and related\n\nrights are relinquished worldwide, making the work free\n\nfrom those restrictions to the greatest extent possible.\n\nThe Public Domain Mark (PDM) is used\n\nto label works that are already free of\n\nknown copyright restrictions. Unlike CC0, PDM doesn’t\n\nchange the copyright status of a work.\n\nPDM can be used by anyone, and is intended for use\n\nwith works that are already free of known copyright\n\nrestrictions throughout the world.\n\n##### Public domain works are valuable because anyone\n\n##### can freely build upon, enhance, and reuse them for\n\n##### any purposes without restriction under copyright\n\n##### or database law.\n\nThat’s why it’s important for creators to have a clear and\n\nlegally robust way to place their works in the public domain as\n\ncompletely as possible, and it’s also important for publishers\n\nand archives to have a standardized way to identify works that\n\nare already in the public domain.\n\nCreative Commons supports two distinct public domain tools,\n\nthe CC0 Public Domain Dedication and the Public Domain\n\nMark . Creative Commons copyright licenses help authors\n\nmanage their copyright on terms they choose. Conversely, CC0\n\nenables authors and copyright owners who want to dedicate\n\ntheir works to the worldwide public domain to do so, and PDM\n\nfacilitates the labeling and discovery of works that are already\n\nfree of known copyright restrictions.\n\nWhere public domain tools fit in the copyright spectrum\n\nSome rights\n\nreserved\n\nAll rights\n\nreserved\n\nPDM\n\nNo known\n\ncopyright\n\nCC0\n\nPublic\n\ndomain\n\n### The CC0 Public Domain Dedication\n\n**Use this universal tool if you are a holder of copyright or database**\n\n**rights, and wish to waive all your rights to the work worldwide.**\n\nBy using CC0, you waive all copyright and related rights\n\ntogether with all associated claims and causes of action with\n\nrespect to this work to the extent possible under the law.\n\nApplying CC0 to your work is easy. Simply visit the CC0 chooser\n\n( http://creativecommons.org/choose/zero ) which will lead you\n\nthrough the process. When completed, you will be provided\n\nwith HTML code that you can copy and paste into your website.\n\nYou let others copy, modify, distribute, and perform the work,\n\neven for commercial purposes, all without asking permission.\n\nWorks marked with the Public Domain Mark have been\n\nidentified as being free of known restrictions under copyright\n\nlaw, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "2023 was a busy year at Creative Commons. Our **[Open Culture](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/)** program and **[Open Climate Campaign](https://creativecommons.org/2023/10/23/a-year-in-the-open-climate-campaign/?utm_source=rss&utm_medium=rss&utm_campaign=a-year-in-the-open-climate-campaign)** entered their third and second years, respectively. We hosted our first in-person CC Global Summit since 2019 in Mexico City. We held critical consultations and open panels on AI, copyright, and the CC Licenses, cultural heritage, education, and science; and we launched our **[Open](https://creativecommons.org/support-cc/open-infrastructure-circle/) [Infrastructure Circle](https://creativecommons.org/support-cc/open-infrastructure-circle/)** in an effort to ensure the CC Licenses are funded well into the future.\n\nWe also marked transitions in leadership. At the end of December, Catherine Stihler concluded her time as Chief Executive Officer (CEO) at Creative Commons, and I transitioned in as Interim. In March 2024, I was appointed CC’s permanent CEO. I look forward to working closely with our Board of Directors, staff, and larger community on **[the critical work that](https://creativecommons.org/2024/03/01/what-lies-ahead-in-2024/) [awaits us in 2024](https://creativecommons.org/2024/03/01/what-lies-ahead-in-2024/)** .\n\nCC staff photos are licensed [under CC BY 4.0. ](https://creativecommons.org/licenses/by/4.0/)\n\n### **A Note from Leadership**\n\n**Anna Tumadóttir, CEO**", - "page_start": 2, - "page_end": 2, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Author contributions** K.L. designed the framework of the article and analyzed the yield results and the maize price under future sce- narios. J.P. simulated the climate data from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. W.X. simulated the maize yields in whole world under different scenarios. W.X. simulated the market price of maize at national and global levels. T.A. helped the revision of language.\n\n**Funding** Funding was provided by the National Key Research and Development program of China (Grant Nos. 2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. 41961124007 and 41871026).\n\n**Competing interests** The authors declare no competing interests.\n\n**Additional information Correspondence** and requests for materials should be addressed to K.L.\n\n**Reprints and permissions information** is available at www.nature.com/reprints .\n\n**Publisher’s note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.\n\n**Open Access** This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit [http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/](http://creativecommons.org/licenses/by/4.0/) .\n\n© The Author(s) 2022", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs\n\nto be both responsibly managed, and useful for developers of AI models.\n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible,\n\nand thus obviates the need for each individual actor to acquire, digitize, and format their own\n\ncorpus of books for AI training. This resource could be collectively and intentionally\n\nmanaged, though we do not mean to select a particular form of governance in this paper. 4\n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a\n\nbooks data commons as defined above and key questions relevant to developers,\n\nrepositories, and other stakeholders, building on our workshop discussions. We first explain\n\nwhy books matter for AI training and how broader access could be beneficial. We then\n\nsummarize two tracks that might be considered for developing such a resource, highlighting\n\nexisting projects that help foreground both the potential and challenges. Finally, we present\n\nseveral key design choices, and next steps that could advance further development of this\n\napproach. 5\n\nIn this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this 4\n\nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work\n\nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not\n\nmeant to preclude this or other arrangements.\n\nThere are, of course, a range of other types of texts that are not on the web and/or not digital at all - 5\n\ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy\n\nof further analysis.", - "page_start": 2, - "page_end": 2, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", - "query": "When was the first CC licence created?", - "target_page": 4, - "target_passage": "The first CC License was created in 2002.", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "#### **3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are\n\nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a\n\ndataset page.\n\nBy clicking on the **licence name** (here: cc-by), the Licence Assistant tool is opened in a new window,\n\ndisplaying relevant information for this particular licence.", - "page_start": 33, - "page_end": 33, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**19 Workshops & Trainings** with institutions like ALA, Connecticut Humanities & State University of New York, Digital Research Alliance of Canada, and WikiConf North America.\n\n**[2 Week-Long CC Certificate Bootcamps ](https://creativecommons.org/2023/12/21/more-california-community-colleges-get-cc-certified/)** [for California Community Colleges.](https://creativecommons.org/2023/12/21/more-california-community-colleges-get-cc-certified/)\n\n**27 Webinars** on topics like the basics of Open Culture, the possibilties of Open Educational Resources (OER) for business-university cooperation, and the future of CC Licenses in digital and online education.\n\n**12 CC Legal Open Office Hours** hosted by our legal team, providing a personalized opportunity for the CC community to ask questions about CC Licenses, open access, and sharing.\n\n##### **In 2023, we greatly expanded our CC Licenses training and education offerings:**\n\n### **Training in how to use CC Licenses is key to their adoption.**\n\nWe offer a ten-week **[CC Certificate](https://certificates.creativecommons.org/)** program that is now tailored not only to the education and library sectors, but also galleries, archives, libraries, and museums and **[available in 10 languages](https://certificates.creativecommons.org/about/translations/)** .\n\nAs of 2023, we’ve certified:\n\n**65 Countries 1,705 Graduates**\n\n**across**", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "### Understanding Creative Commons license\n\nbefore licensing your work\n\n#### **THREE-LAYER DESIGN**\n\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court. \"Human Readable\" (commons deeds): contain the summary of the legal code and key terms. \"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.\n\nCreative Commons (CC) license has three layers:\n\n**FOUR ELEMENTS** BY (\"Attribution\"): users must credit the author of the work they are using. SA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license. NC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes. ND (\"NoDerivative\"): reusers making cannot share adaptations of the work.\n\nBY\n\nSA\n\nNC\n\nND\n\n**SIX LICENSES** CC BY (\"Attribution\") allows people to use the work for any purpose (even commercially and even in modified form) as long as they give attribution to the creator. CC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license. CC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator. CC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license. CC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for any purpose (even commercially), as long as they give attribution to the creator. CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.\n\n#### **REMIND THAT…**\n\nyou want to give others permissions to freely copy and redistribute your work, and you want to give others permission to freely transform, alter, or otherwise create derivative works based on your work.\n\nCC license only applicable to the work that is within the scope of copyright law. CC license can be used when …\n\n**CC LICENSE CAN'T BE USED FOR …** fair use, fair dealing, or some other limitation and exception to copyright applies the the work.\n\n**ALSO FOR …** the work that is already in the Public Domain. For those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\").\n\n**NOW, SHARE YOUR WORK!** https://creativecommons.org/choose/\n\nTexts are adapted from CC Certification for Educators. CC BY license. BY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies.\n\nmore open »\n\n« more restrictive\n\nyou can share, remix, & commercialize\n\nyou can share & remix only\n\nyou can share only", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "[\"The great growling engine of change - technology.](https://www.flickr.com/photos/8489692@N03/5621362129) [Alvin Toffler\" by katerha is licensed under CC BY 2.0.](https://creativecommons.org/licenses/by/2.0/?ref=openverse)\n\nOur legal and technology staff continued to make key infrastructure updates and manage daily maintenance to ensure these Licenses work for everyone.\n\n##### **In 2023, we [launched the Open](https://creativecommons.org/support-cc/open-infrastructure-circle/) [Infrastructure Circle](https://creativecommons.org/support-cc/open-infrastructure-circle/) ( [OIC](https://creativecommons.org/support-cc/open-infrastructure-circle/) ) to ensure consistent funding for this work.**\n\nWe’re grateful to the early supporters of the OIC, including the William + Flora Hewlett Foundation, Bill & Melinda Gates Foundation, Filecoin Foundation for the Decentralized Web, Robert Wood Johnson Foundation, Chan Zuckerberg Initiative, Endless, Siegel Family Endowment, Flickr, Microsoft, and Paul and Iris Brest.\n\n### **Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast **[six CC Licenses](https://creativecommons.org/share-your-work/cclicenses/)** and two public domain tools, setting a global standard for sharing.\n\n##### **We’ve estimated that over 2.5 billion pieces of content were CC Licensed by the end of 2023.**", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "## Guide to using public domain tools\n\nCreative Commons makes sharing easy\n\n### What Is Creative Commons?\n\nCreative Commons is a global nonprofit organization\n\ndedicated to supporting an open and accessible Internet\n\nthat is enriched with free knowledge and creative resources\n\nfor people around the world to use, share, and cultivate.\n\nOur easy-to-use licenses provide a simple, standardized way\n\nto give the public permission to share and use your creative\n\nwork — on conditions of your choice. CC licenses let you\n\nchange your copyright terms from the default of “all rights\n\nreserved” to “some rights reserved.”\n\nMillions of people use CC licenses on some of the world’s\n\nmost popular platforms for user-generated content. When\n\nyou use a CC license to share your photos, videos, or blog,\n\nyour creation joins a globally accessible pool of resources\n\nthat includes the work of artists, educators, scientists, and\n\ngovernments.\n\nCreative Commons has waived all copyright and\n\nrelated or neighboring rights to this guide using the\n\nCC0 Public Domain Dedication.\n\n#### What is the difference between CC0 and the Public Domain Mark?\n\nCC0 (“CC Zero”) is intended for use only\n\nby authors or holders of copyright and\n\nrelated rights (including database rights), in connection\n\nwith works that are still subject to those rights in one or\n\nmore countries.\n\nWhen CC0 is applied to a work, copyright and related\n\nrights are relinquished worldwide, making the work free\n\nfrom those restrictions to the greatest extent possible.\n\nThe Public Domain Mark (PDM) is used\n\nto label works that are already free of\n\nknown copyright restrictions. Unlike CC0, PDM doesn’t\n\nchange the copyright status of a work.\n\nPDM can be used by anyone, and is intended for use\n\nwith works that are already free of known copyright\n\nrestrictions throughout the world.\n\n##### Public domain works are valuable because anyone\n\n##### can freely build upon, enhance, and reuse them for\n\n##### any purposes without restriction under copyright\n\n##### or database law.\n\nThat’s why it’s important for creators to have a clear and\n\nlegally robust way to place their works in the public domain as\n\ncompletely as possible, and it’s also important for publishers\n\nand archives to have a standardized way to identify works that\n\nare already in the public domain.\n\nCreative Commons supports two distinct public domain tools,\n\nthe CC0 Public Domain Dedication and the Public Domain\n\nMark . Creative Commons copyright licenses help authors\n\nmanage their copyright on terms they choose. Conversely, CC0\n\nenables authors and copyright owners who want to dedicate\n\ntheir works to the worldwide public domain to do so, and PDM\n\nfacilitates the labeling and discovery of works that are already\n\nfree of known copyright restrictions.\n\nWhere public domain tools fit in the copyright spectrum\n\nSome rights\n\nreserved\n\nAll rights\n\nreserved\n\nPDM\n\nNo known\n\ncopyright\n\nCC0\n\nPublic\n\ndomain\n\n### The CC0 Public Domain Dedication\n\n**Use this universal tool if you are a holder of copyright or database**\n\n**rights, and wish to waive all your rights to the work worldwide.**\n\nBy using CC0, you waive all copyright and related rights\n\ntogether with all associated claims and causes of action with\n\nrespect to this work to the extent possible under the law.\n\nApplying CC0 to your work is easy. Simply visit the CC0 chooser\n\n( http://creativecommons.org/choose/zero ) which will lead you\n\nthrough the process. When completed, you will be provided\n\nwith HTML code that you can copy and paste into your website.\n\nYou let others copy, modify, distribute, and perform the work,\n\neven for commercial purposes, all without asking permission.\n\nWorks marked with the Public Domain Mark have been\n\nidentified as being free of known restrictions under copyright\n\nlaw, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most\n\nare not actively managed by their rightsholders. There is no official registry of copyrighted\n\nworks and their owners, and existing datasets can be incomplete or erroneous. 16\n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially\n\nthose that have or have had limited commercial value. Put differently, the barrier to using 17\n\nmost books is not simply to pay publishers; even if one had significant financial resources,\n\nlicensing would not enable access to most works.\n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as\n\nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular\n\nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their\n\nfollow-on use).\n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion\n\ndepends on whether the license’s terms can be complied with in the context of AI training.\n\nFor instance, in the context of CC licensed works, there are requirements for proper\n\nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public\n\nDomain Mark (PDM) are not licenses and do not require attribution). 18\n\nSee e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary 16\n\nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper\n\nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181 .\n\nAccessed 4 Jan. 2020, at [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181) ; Rosen,\n\nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?” *The Atlantic* , 18 Mar.\n\n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century-\n\navailable-as-ebooks/284486/ . See also “Google Book Search Settlement and Access to Out of Print\n\nBooks.” *Google Public Policy Blog* , [publicpolicy.googleblog.com/2009/06/google-book-search-](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html)\n\n[settlement-and.html](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html) . Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class-\n\naction settlement between Google, the Authors Guild, and the Association of American Publishers).\n\nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying\n\nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at [https://](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[google_final_approval_support.pdf](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf) . The Authors Guild and Association of American Publishers also\n\njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding\n\ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly\n\n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether\n\nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out-", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nCombined, these limits can enable effective foreign control of up to\n\n46.7%.\n\nThe chief executive officer and 80% of the members of the Board of\n\nDirectors of the operating licensee must be resident Canadians. There\n\nare no restrictions on the number of non-voting shares that may be\n\nheld by non-Canadians at either the holding-company or licensee-\n\ncompany level. Neither the Canadian carrier nor its parent may be\n\notherwise controlled in fact by non-Canadians. Subject to appeal to the\n\nfederal Cabinet, the CRTC has the jurisdiction to determine as a\n\nquestion of fact whether a given licensee is controlled by non-\n\nCanadians.\n\nPursuant to the Telecommunications Act and associated regulations, the\n\nsame rules also apply to Canadian telecommunications carriers such as\n\nWireless, except that there is no requirement that the chief executive\n\nofficer be a resident Canadian. We believe we are in compliance with\n\nthe foregoing foreign ownership and control requirements.\n\nOn June 29, 2012, Bill C-38 amending the Telecommunications Act\n\npassed into law. The amendments exempt telecommunications\n\ncompanies with less than 10% of total Canadian telecommunications\n\nmarket measured by revenue from foreign investment restrictions.\n\nCompanies that are successful in growing their market shares in excess\n\nof 10% of total Canadian telecommunications market revenues other\n\nthan by way of merger or acquisitions will continue to be exempt from\n\nthe restrictions.\n\nWIRELESS\n\n####### **Consultation on the Renewal of Cellular and Personal**\n\n####### **Communications Services (PCS) Spectrum Licences**\n\nIn March 2011, Industry Canada released its decisions about the\n\nrenewal process for cellular and PCS licences that began expiring at that\n\ntime. Key things to note:\n\n- At the end of the current licence term, new cellular and PCS licences\n\nwith a 20-year term will be issued to licensees that are in compliance\n\nwith all licence conditions.\n\n- The previously existing annual fee of $0.0351 per MHz per\n\npopulation of the licenced area will continue to apply to all cellular\n\nand PCS licences, including those initially assigned by auction. The\n\nMinister of Industry Canada may review and amend the fees during\n\nthe licence term after further consultation with licensees.\n\n- A determination regarding existing research and development\n\nconditions of licence was not released at that time and will be\n\nreleased separately. A decision has not been made to date, and until\n\nsuch a time, the current conditions of licence remain in effect.\n\n####### **Consultation on a Policy and Technical Framework for the**\n\n## **700Mhz and 2500-2690Mhz Band and Aspects Related to**\n\n####### **Commercial Mobile Spectrum**\n\nIn March 2012, Industry Canada released its policy and technical\n\nframework for the auction of spectrum in the 700 MHz and 2500- 2690\n\nMHz spectrum bands. Key things to note:\n\n- Industry Canada adopted an auction cap for the 700 MHZ (not a set-\n\naside like in the 2008 Advanced Wireless Services (AWS) spectrum\n\nauction). There are four blocks of spectrum that are considered\n\n“prime”. Large domestic wireless carriers are restricted to a single\n\nblock of prime spectrum each, while all other carriers are restricted to\n\ntwo blocks. Rogers, Bell and Telus are considered large carriers\n\nnationally. SaskTel is considered a large carrier in Saskatchewan, and\n\nMTS is considered a large carrier in Manitoba.\n\n- To encourage rural deployments, single carriers who win two paired\n\nblocks, or two carriers who share their two paired blocks, are\n\nrequired to use their 700 MHz spectrum to provide coverage to 90%\n\nof their HSPA+ territory within five years and 97% within seven\n\nyears. Industry Canada will use Tier 2 licence areas for the 700Mhz\n\nauction. These are 14 large service areas covering all of Canada, and\n\nare generally the same size as individual provinces.\n\nIn March 2013, Industry Canada released *Licensing Framework for*", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "and indicate if changes were made. The images or other third party material in this article are\n\nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line\n\nto the material. If material is not included in the article’s Creative Commons licence and your\n\nintended use is not permitted by statutory regulation or exceeds the permitted use, you will\n\nneed to obtain permission directly from the copyright holder. To view a copy of this licence,\n\n[visit http://creativecommons.org/licenses/by/4.0/.](http://creativecommons.org/licenses/by/4.0/)\n\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "By clicking on the “ **Data->Licensing Assistant** ” link in the main menu, the Licence Assistant is opened\n\nin a new window, displaying relevant information of all supported licences by the tool.", - "page_start": 34, - "page_end": 34, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**Author contributions** K.L. designed the framework of the article and analyzed the yield results and the maize price under future sce- narios. J.P. simulated the climate data from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. W.X. simulated the maize yields in whole world under different scenarios. W.X. simulated the market price of maize at national and global levels. T.A. helped the revision of language.\n\n**Funding** Funding was provided by the National Key Research and Development program of China (Grant Nos. 2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. 41961124007 and 41871026).\n\n**Competing interests** The authors declare no competing interests.\n\n**Additional information Correspondence** and requests for materials should be addressed to K.L.\n\n**Reprints and permissions information** is available at www.nature.com/reprints .\n\n**Publisher’s note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.\n\n**Open Access** This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit [http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/](http://creativecommons.org/licenses/by/4.0/) .\n\n© The Author(s) 2022", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - } - ] - }, - { - "references": { - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", - "query": "To what subjects Creative Commons expand its work in 2023 ?", - "target_page": 8, - "target_passage": "We expanded our work in biodiversity, climate, and life sciences focused on ensuring that science research and data are open", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "[In 2023, we convened hundreds via](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [roundtables, community conferences](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [(e.g. ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[MozFest](https://creativecommons.org/2023/05/04/generative-ai-opportunities-concerns-solutions-from-mozfest-2023/)** , **[Wikimania](https://creativecommons.org/2024/02/07/dispatches-from-wikimania-values-for-shaping-ai-towards-a-better-internet/)** [), and public](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [events (e.g. symposium on ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[Generative](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [AI & Creativity](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)** [)to debate copyright law,](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [the ethics of open sharing, and other](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [relevant areas that touch AI. ](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)\n\n[At our CC Global Summit, participants](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [drafted ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[community-driven principles](https://creativecommons.org/2023/10/07/making-ai-work-for-creators-and-the-commons/)** [on AI that are a valuable input and will](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [help inform the organization’s thinking](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [as we determine CC’s exact role in the AI](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) space.\n\n[“The Pillars of Creation” by ](https://openverse.org/image/8de72efd-e12b-49eb-8210-1046bcd71847?q=Pillars%20of%20Creation) [James Webb Space Telescope ](https://www.flickr.com/photos/50785054@N03) [is licensed under CC BY 2.0. ](https://creativecommons.org/licenses/by/2.0/?ref=openverse)\n\n### **Areas of Exploration**\n\n####### **Support for Creators in the Time of Artificial Intelligence**", - "page_start": 8, - "page_end": 8, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "### **Our Impact**\n\nCC believes that opening up knowledge is key to addressing the world’s most pressing challenges. Today, we steer campaigns, programming, and training in many areas:\n\n2023 was quite a year for the CC Open Culture Program, thanks to generous funding from **[Arcadia](https://www.arcadiafund.org.uk/)** . We grew our Open Culture team from one to two and a half staff, rolling out new initiatives like TAROC (Towards a Recommendation on Open Culture) and **[Open Culture Live:](https://creativecommons.org/tag/open-culture-live/) [A Webinar Series](https://creativecommons.org/tag/open-culture-live/)** . We invite you to read “ **[What did Creative](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [Commons do for Open Culture](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [in 2023?](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/)** ” to learn more.\n\n###### **Open Culture**\n\nWe delivered workshops and presentations on CC Licenses and Open Educational Resources at over 16 conferences and events. The CC Open Education Platform [also funded six global projects,](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) **[including work to advance the](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [UNESCO Recommendation on](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [OER](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [.](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/)**\n\n###### **Open Education**\n\nThanks to generous funding from the **[John D. and Catherine T.](https://www.macfound.org/) [MacArthur Foundation](https://www.macfound.org/)** , CC hosted its very first Open Journalism track at the CC Global Summit, including eight presentations, lightning talks, panel discussions, and workshops as well as a **[keynote](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/) [by Anya Kamenetz](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/)** .\n\nRepresentatives from 33 news outlets and digital rights-focused organizations attended the CC Summit sessions. The Open Journalism track built on **[numerous collaborations and](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/) [workshops](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/)** throughout 2023.\n\n###### **Open Journalism**\n\n[\"Follow the Color Brick Road\" by Bert Kaufmann is](https://www.flickr.com/photos/22746515@N02) [licensed under CC BY-SA 2.0.](https://creativecommons.org/licenses/by-sa/2.0/?ref=openverse)", - "page_start": 6, - "page_end": 6, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "2023 was a busy year at Creative Commons. Our **[Open Culture](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/)** program and **[Open Climate Campaign](https://creativecommons.org/2023/10/23/a-year-in-the-open-climate-campaign/?utm_source=rss&utm_medium=rss&utm_campaign=a-year-in-the-open-climate-campaign)** entered their third and second years, respectively. We hosted our first in-person CC Global Summit since 2019 in Mexico City. We held critical consultations and open panels on AI, copyright, and the CC Licenses, cultural heritage, education, and science; and we launched our **[Open](https://creativecommons.org/support-cc/open-infrastructure-circle/) [Infrastructure Circle](https://creativecommons.org/support-cc/open-infrastructure-circle/)** in an effort to ensure the CC Licenses are funded well into the future.\n\nWe also marked transitions in leadership. At the end of December, Catherine Stihler concluded her time as Chief Executive Officer (CEO) at Creative Commons, and I transitioned in as Interim. In March 2024, I was appointed CC’s permanent CEO. I look forward to working closely with our Board of Directors, staff, and larger community on **[the critical work that](https://creativecommons.org/2024/03/01/what-lies-ahead-in-2024/) [awaits us in 2024](https://creativecommons.org/2024/03/01/what-lies-ahead-in-2024/)** .\n\nCC staff photos are licensed [under CC BY 4.0. ](https://creativecommons.org/licenses/by/4.0/)\n\n### **A Note from Leadership**\n\n**Anna Tumadóttir, CEO**", - "page_start": 2, - "page_end": 2, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "[This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn](https://www.linkedin.com/in/gotisbrown/) [Otis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open](https://creativecommons.org/licenses/by/4.0/) and public domain works. View full licensing and attribution information about all works included in the [video on Flickr.](https://www.flickr.com/photos/creativecommons/52543574218/)\n\n####### **Creative Commons**\n\nPO Box 1866 Mountain View CA 94042 USA\n\n+1 415 429 6753 info@creativecommons.org", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "and indicate if changes were made. The images or other third party material in this article are\n\nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line\n\nto the material. If material is not included in the article’s Creative Commons licence and your\n\nintended use is not permitted by statutory regulation or exceeds the permitted use, you will\n\nneed to obtain permission directly from the copyright holder. To view a copy of this licence,\n\n[visit http://creativecommons.org/licenses/by/4.0/.](http://creativecommons.org/licenses/by/4.0/)\n\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Author contributions** K.L. designed the framework of the article and analyzed the yield results and the maize price under future sce- narios. J.P. simulated the climate data from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. W.X. simulated the maize yields in whole world under different scenarios. W.X. simulated the market price of maize at national and global levels. T.A. helped the revision of language.\n\n**Funding** Funding was provided by the National Key Research and Development program of China (Grant Nos. 2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. 41961124007 and 41871026).\n\n**Competing interests** The authors declare no competing interests.\n\n**Additional information Correspondence** and requests for materials should be addressed to K.L.\n\n**Reprints and permissions information** is available at www.nature.com/reprints .\n\n**Publisher’s note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.\n\n**Open Access** This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit [http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/](http://creativecommons.org/licenses/by/4.0/) .\n\n© The Author(s) 2022", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "1 Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\n\nNC 27705, USA\n\nFull list of author information is available at the end of the article\n\n© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0\n\nInternational License ( [http://creativecommons.org/licenses/by/4.0/](http://creativecommons.org/licenses/by/4.0/) ), which permits unrestricted use, distribution, and\n\nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to\n\nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver\n\n( [http://creativecommons.org/publicdomain/zero/1.0/](http://creativecommons.org/publicdomain/zero/1.0/) ) applies to the data made available in this article, unless otherwise stated.\n\nhttps://doi.org/10.1186/s12913-018-3470-6", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "## Guide to using public domain tools\n\nCreative Commons makes sharing easy\n\n### What Is Creative Commons?\n\nCreative Commons is a global nonprofit organization\n\ndedicated to supporting an open and accessible Internet\n\nthat is enriched with free knowledge and creative resources\n\nfor people around the world to use, share, and cultivate.\n\nOur easy-to-use licenses provide a simple, standardized way\n\nto give the public permission to share and use your creative\n\nwork — on conditions of your choice. CC licenses let you\n\nchange your copyright terms from the default of “all rights\n\nreserved” to “some rights reserved.”\n\nMillions of people use CC licenses on some of the world’s\n\nmost popular platforms for user-generated content. When\n\nyou use a CC license to share your photos, videos, or blog,\n\nyour creation joins a globally accessible pool of resources\n\nthat includes the work of artists, educators, scientists, and\n\ngovernments.\n\nCreative Commons has waived all copyright and\n\nrelated or neighboring rights to this guide using the\n\nCC0 Public Domain Dedication.\n\n#### What is the difference between CC0 and the Public Domain Mark?\n\nCC0 (“CC Zero”) is intended for use only\n\nby authors or holders of copyright and\n\nrelated rights (including database rights), in connection\n\nwith works that are still subject to those rights in one or\n\nmore countries.\n\nWhen CC0 is applied to a work, copyright and related\n\nrights are relinquished worldwide, making the work free\n\nfrom those restrictions to the greatest extent possible.\n\nThe Public Domain Mark (PDM) is used\n\nto label works that are already free of\n\nknown copyright restrictions. Unlike CC0, PDM doesn’t\n\nchange the copyright status of a work.\n\nPDM can be used by anyone, and is intended for use\n\nwith works that are already free of known copyright\n\nrestrictions throughout the world.\n\n##### Public domain works are valuable because anyone\n\n##### can freely build upon, enhance, and reuse them for\n\n##### any purposes without restriction under copyright\n\n##### or database law.\n\nThat’s why it’s important for creators to have a clear and\n\nlegally robust way to place their works in the public domain as\n\ncompletely as possible, and it’s also important for publishers\n\nand archives to have a standardized way to identify works that\n\nare already in the public domain.\n\nCreative Commons supports two distinct public domain tools,\n\nthe CC0 Public Domain Dedication and the Public Domain\n\nMark . Creative Commons copyright licenses help authors\n\nmanage their copyright on terms they choose. Conversely, CC0\n\nenables authors and copyright owners who want to dedicate\n\ntheir works to the worldwide public domain to do so, and PDM\n\nfacilitates the labeling and discovery of works that are already\n\nfree of known copyright restrictions.\n\nWhere public domain tools fit in the copyright spectrum\n\nSome rights\n\nreserved\n\nAll rights\n\nreserved\n\nPDM\n\nNo known\n\ncopyright\n\nCC0\n\nPublic\n\ndomain\n\n### The CC0 Public Domain Dedication\n\n**Use this universal tool if you are a holder of copyright or database**\n\n**rights, and wish to waive all your rights to the work worldwide.**\n\nBy using CC0, you waive all copyright and related rights\n\ntogether with all associated claims and causes of action with\n\nrespect to this work to the extent possible under the law.\n\nApplying CC0 to your work is easy. Simply visit the CC0 chooser\n\n( http://creativecommons.org/choose/zero ) which will lead you\n\nthrough the process. When completed, you will be provided\n\nwith HTML code that you can copy and paste into your website.\n\nYou let others copy, modify, distribute, and perform the work,\n\neven for commercial purposes, all without asking permission.\n\nWorks marked with the Public Domain Mark have been\n\nidentified as being free of known restrictions under copyright\n\nlaw, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.\n\n**[Except where otherwise noted, “Annual Report 2023” by Creative Commons ](https://creativecommons.org/mission/) [is licensed under CC BY 4.0. ](https://creativecommons.org/licenses/by/4.0/deed.en)**\n\n[\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0.](https://creativecommons.org/publicdomain/mark/1.0/?ref=openverse)\n\n### **About Us**\n\n#### **Board of Directors**\n\nMarta Belcher Glenn Otis Brown [Delia Browne](https://creativecommons.org/person/deliabrowne/) [James Grimmelmann](https://creativecommons.org/person/jamesgrimmelmann-net/) Lawrence Lessig * *Emeritus*\n\nAngela Oduor Lungati Bilal Randeree Alek Tarkowski Jeni Tennison Luis Villa\n\n**Chief Executive Officer** Anna Tumadóttir\n\n**General Counsel** Kat Walsh", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs\n\nto be both responsibly managed, and useful for developers of AI models.\n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible,\n\nand thus obviates the need for each individual actor to acquire, digitize, and format their own\n\ncorpus of books for AI training. This resource could be collectively and intentionally\n\nmanaged, though we do not mean to select a particular form of governance in this paper. 4\n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a\n\nbooks data commons as defined above and key questions relevant to developers,\n\nrepositories, and other stakeholders, building on our workshop discussions. We first explain\n\nwhy books matter for AI training and how broader access could be beneficial. We then\n\nsummarize two tracks that might be considered for developing such a resource, highlighting\n\nexisting projects that help foreground both the potential and challenges. Finally, we present\n\nseveral key design choices, and next steps that could advance further development of this\n\napproach. 5\n\nIn this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this 4\n\nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work\n\nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not\n\nmeant to preclude this or other arrangements.\n\nThere are, of course, a range of other types of texts that are not on the web and/or not digital at all - 5\n\ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy\n\nof further analysis.", - "page_start": 2, - "page_end": 2, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "TSX_KMP_2013.pdf", - "query": "From which country does Killam Properties Inc originate ?", - "target_page": 3, - "target_passage": "Killam Properties Inc. is a growth oriented Canadian real estate company.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Killam properties Inc\n\n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**PART II**\n\n**Business Overview**\n\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada’s largest residential landlords, owning, operating, managing and developing\n\nmulti‑family residential and Manufactured Home Community (“MHC”) properties. Killam’s 164 apartment properties are located in Atlantic\n\nCanada’s six largest urban centres and in Ontario. The Company’s 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam’s\n\nreal estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and\n\nincreasing FFO per share.\n\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic\n\nCanada and MHCs across Canada. Killam’s first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009,\n\nKillam’s apartment portfolio grew through the acquisition of properties in Atlantic Canada’s six largest cities, namely Halifax, Moncton, Saint\n\nJohn, Fredericton, St. John’s and Charlottetown. Killam is now Atlantic Canada’s largest residential landlord, with a 14.2% market share of the\n\nmulti‑family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the\n\nprovince, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions\n\nand developments. The apartment business is Killam’s largest business segment, accounting for 86% of the Company’s NOI from property\n\noperations and equity income in 2013. At December 31, 2013, Killam’s apartment portfolio consisted of 12,647 units.\n\nKillam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development\n\nof four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect\n\ndevelopments to exceed 5% of the total asset base in any given year.\n\nIn addition, the Company owns MHCs, also known as land‑lease communities or trailer parks. Killam owns the land and infrastructure supporting\n\neach community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities\n\nwhich accounted for 14% of Killam’s NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the\n\nCompany to crystallize the value of the properties at attractive cap‑rates and use the funds to continue to grow the apartment portfolio.\n\n**Key Performance Indicators (KPIs)**\n\nManagement measures Killam’s performance based on the following KPIs:\n\n1. FFO per Share - A standard measure of earnings for real estate entities. Management is focused on growing FFO per share on an annual\n\nbasis.\n\n2. Rental Increases - Management expects to achieve increases in average rental rates on an annual basis and measures the average rental\n\nincreases achieved.\n\n3. Occupancy - Management is focused on maximizing occupancy levels while also managing the impact of higher rents. This measure\n\nconsiders units rented as a percentage of total stabilized units at a point in time.\n\n4. Same Store NOI Growth - This measure considers the Company’s ability to increase the NOI at properties that it has owned for equivalent\n\nperiods year‑over‑year, removing the impact of acquisitions, dispositions, developments and other non same store operating adjustments.\n\n5. Weighted Average Cost of Debt - Killam monitors the weighted average cost of its mortgage debt and total debt.\n\n6. Debt to Total Assets - Killam measures its debt levels as a percentage of total assets and works to ensure that the debt to total assets\n\nremains at a range of 55% to 65%.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Killam has a diverse portfolio of both apartments and manufactured home communities. The\n\napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types,\n\nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide\n\nselection of properties and price points in each city, Killam caters to a broad tenant base.\n\nKillam’s 35 manufactured home communities represent 14% of earnings and are located\n\nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the\n\napartment business, providing stable and predictable cash flows.\n\n#### A Diversified Portfolio\n\nS2, Halifax, Nova Scotia", - "page_start": 12, - "page_end": 12, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI\n\ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service,\n\ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes.\n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property\n\ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s\n\napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on\n\nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy\n\nusage.\n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1\n\nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island.\n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed\n\nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings,\n\nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to\n\nlimit development projects to approximately 5% of the balance sheet on an annual basis.\n\n**Investment in New Properties**\n\nIn addition to developing new properties, Killam also acquires newly constructed assets. Management believes that increasing Killam’s ownership\n\nin new, high‑quality buildings will result in above‑market and long‑term demand for the Company’s assets from an aging population, reduce\n\nannual capital requirements for deferred maintenance, and transform Killam’s portfolio, over time, into one of the highest quality portfolios in\n\nCanada.\n\nDemand by renters for newly constructed rental apartments is strong, with high occupancy rates and above‑average rents. CMHC’s Fall 2013\n\nHalifax Rental Market Report reported 97.3% occupancy for properties built in 2000 or later, compared to 96.8% for all rental markets in the city.\n\nThe average rent for a two‑bedroom unit in these newer buildings was $1,320 per month, compared to a market average two‑bedroom rent of\n\n$976.\n\nThe new properties added to Killam’s portfolio are condo quality, providing tenants with features and amenities traditionally associated with\n\nownership. The Company believes that demand for this type of rental accommodation will grow given an increasing number of homeowners\n\nreaching retirement age and looking for alternatives to home ownership. Killam is also attracted to the low capital spend requirements from new\n\nassets compared to older buildings, which often include significant capital investment to address deferred maintenance. Generally, the amount\n\nof annual capital to maintain a property increases as the building ages. In addition, with energy efficient features, the NOI margins are generally\n\nhigher in newer buildings.\n\nWith strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between\n\nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a\n\nsignificant premium for quality assets.\n\n**Geographic Diversification**", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "With a home base in Halifax, Killam’s roots are in Atlantic Canada and the\n\nCompany has successfully grown by consolidating the residential real estate\n\nmarket in the region’s urban centres. In order to meet its long-term growth\n\ntargets and increase its investment in Canada’s most dynamic real estate\n\nmarkets, Killam has been actively expanding its apartment portfolio in Ontario\n\nand is exploring investment opportunities in Western Canada. Since 2010,\n\nKillam has expanded its apartment target markets to include specific cities\n\nin Ontario, and has invested approximately $200 million in real estate assets\n\nin the province. Approximately 15% of Killam’s 2014 net operating income is\n\nexpected to be earned in Ontario. The Company has set a long-term target to\n\nearn 50% of its net operating income outside Atlantic Canada.\n\n#### Increasing Geographic Diversification\n\n1033 Queen Street West, Toronto, Ontario", - "page_start": 16, - "page_end": 16, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**Killam’s NOI by Province**\n\nCombining apartment and MHC’s, the following chart highlights the percentage of Killam’s forward‑looking NOI by province based on ownership\n\ninterest at December 31, 2013:\n\n**NOI by Province**\n\nns 48%\n\nnB 23%\n\non 15% Pei\n\n7%\n\nnl\n\n8%\n\n**The Multi‑family Market Leader in Atlantic Canada**\n\nAtlantic Canada is home to 2.3 million people, approximately 43% of whom live in the six largest cities, representing Killam’s core markets in the\n\nregion. Killam has a 14.2% market share of apartment units in these six largest centres. The chart below highlights the apartment NOI generated\n\nfrom each of the key urban markets in Atlantic Canada in 2013, and Killam’s market share in each.\n\n47.1%\n\n9.8% 9.9% 7.3% 6.6% 5.6%\n\n11.9%\n\n15.3% 18.9% 22.4% 19.8%\n\n13.2%\n\nHalifax m oncton Fredericton st. John's saint John\n\n% of Killam’s noi\n\nKillam’s market share", - "page_start": 30, - "page_end": 30, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "significant premium for quality assets.\n\n**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada,\n\nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is\n\nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase\n\nsignificantly when considering assets outside Atlantic Canada.\n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building\n\na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in\n\nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on\n\nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing\n\nthe amount of NOI generated outside of Atlantic Canada to 50%.\n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive\n\ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by\n\naccretively growing its apartment portfolio in Ontario.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Killam’s growth opportunities include increasing earnings of its existing\n\nportfolio and expanding the portfolio through acquisitions and development.\n\nAcquisitions have been an important part of Killam’s growth, having completed\n\nover $1.1 billion in acquisitions since the first property was acquired in 2002.\n\nKillam began development as a complement to its acquisition program in 2010,\n\nand to-date has invested approximately $90 million in new developments.\n\n2013 was Killam’s largest year for growth since 2005, adding $191 million of\n\nproperties to the portfolio, including $121 million in acquisitions and $70\n\nmillion in new developments. Looking ahead to 2014, Killam has targeted\n\na minimum of $75 million in acquisitions, and the development of two new\n\napartment buildings totaling approximately $46 million.\n\n#### Opportunities for Growth\n\nThe Plaza, Fredericton, New Brunswick", - "page_start": 13, - "page_end": 13, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**1. Corporate Information**\n\nKillam Properties Inc (“Killam” or the “Company”) is a real estate company specializing in the acquisition, management and development of\n\nmulti‑residential apartment buildings and manufactured home communities in Canada. Killam is incorporated under the Canada Business\n\nCorporations Act. Killam’s common shares are publicly traded and listed on the Toronto Stock Exchange under the symbol “KMP”. The\n\nconsolidated financial statements comprise the financial statements of Killam and its subsidiaries as at December 31, 2013 **.** The Company’s\n\nhead office operations are located at 3700 Kempt Road, Halifax, Nova Scotia, B3K 4X8 and the Company’s registered office is located at\n\n2571 Windsor Street, Halifax, Nova Scotia, B3K 5C4.\n\nThe consolidated financial statements of the Company for the year ended December 31, 2013, were authorized for issue in accordance\n\nwith a resolution of the Board of Directors on Tuesday, February 18, 2014.\n\n**2. Significant Accounting Policies**\n\n**(A) Statement of Compliance**\n\nThese consolidated financial statements have been prepared in accordance with International Financial Reporting Standards (“IFRS”) as\n\nissued by the International Accounting Standards Board (“IASB”).\n\n**(B) Basis of Presentation**\n\nThe consolidated financial statements of the Company have been prepared on a historical cost basis, except for investment properties that\n\nhave been measured at fair value. Historical cost is generally based on the fair value of the consideration given in exchange for assets. The\n\nconsolidated financial statements have been prepared on a going concern basis and are presented in Canadian dollars, which is Killam’s\n\nfunctional currency, and all values are rounded to the nearest thousand ($000), except when otherwise noted. Standards and guidelines\n\nnot effective for the current accounting period are described in Note 4.\n\n**(C) Basis of Consolidation**\n\n*(i) Subsidiaries*\n\nThe consolidated financial statements include the accounts of Killam and its subsidiaries. Non‑controlling interests represent the portion of\n\nprofit or loss and net assets not held by Killam, and are presented separately in the Consolidated Statements of Income and Comprehensive\n\nIncome and within equity in the Consolidated Statement of Financial Position, separately from shareholders’ equity.\n\nSubsidiaries are entities controlled by Killam. The financial statements of subsidiaries are included in the consolidated financial statements\n\nfrom the date that control commences until the date that control ceases. The accounting policies of subsidiaries have been changed when\n\nnecessary to align them with the policies adopted by Killam. In certain circumstances, Killam has control over entities in which it does not\n\nown more than 50% of the voting power.\n\nThe Company’s significant investment in subsidiaries and a joint venture, all of which are incorporated in Canada, are listed in the following\n\ntable:\n\n**Subsidiary % Interest**\n\nKillam Properties Inc. 100%\n\nKillam Investments Inc. 100%\n\nKillam Investments (PEI) Inc. 100%\n\nKillam Properties Apartments Trust 100%\n\nKillam Properties M.H.C. Trust 100%\n\n661047 N.B. Inc. 100%\n\nBlackshire Court Limited 100%\n\nBlackshire Court Limited Partnership 95.92%\n\nKillam KFH (180 Mill St.) Inc. 100%\n\nKillam KFH (Kanata Lakes) Inc. 100%\n\nKillam KFH (1355 Silver Spear Road) Inc. 100%\n\nKillam KFH Sigma GP Inc. 50%\n\nKillam KFH‑Sigma Properties LP 25%", - "page_start": 69, - "page_end": 69, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "####### **Dear Shareholders,**\n\nI am pleased to review Killam’s 2013 performance with you, and outline our strategy and plans for the\n\nfuture. We are progressing nicely with our priorities to increase the quality of our portfolio and expand\n\ngeographically. In addition, we are focused on three key areas of growth for the Company: increase the\n\nvalue of our existing portfolio, acquire accretively and develop profitably.\n\nDuring the past year we expanded communication of our corporate strategy to reach the broader Killam\n\ncommunity with the introduction of Killam’s Core Values. These values have been inherent in the Company\n\nsince our first acquisition in 2002, but had not been broadly promoted until this past year. Our Core Values\n\n(Curb Appeal, Build Community, Strong Customer Relationships, Do the Right Thing and Creative Solutions)\n\nare represented in the colourful squares you will see throughout this year’s\n\nreport. Killam employees across the Company demonstrate these values in their\n\ndaily work, distinguishing Killam as a high-quality landlord. The introduction of a\n\nquarterly awards program, which recognizes employees who exemplify Killam’s\n\nCore Values, enables us to celebrate these values. I have been impressed by both the number and quality\n\nof nominations. We truly have a remarkable group of employees who go above and beyond in providing\n\nexceptional service to our tenants.\n\n####### **A Look Back at 2013**\n\nI would summarize 2013 as a mixed year for Killam. We were successful in achieving many of the objectives\n\nand targets we had set for ourselves, as summarized in the adjacent chart, but faced challenges that\n\nimpacted our financial performance. We added $191 million in new assets to our portfolio through\n\nacquisitions and the completion of four new developments. We also enhanced our leasing and marketing\n\nprograms, which allowed us to realize gains in occupancy in the second half of the year and improve our\n\nposition for 2014. We further benefited from both interest and administrative cost savings in the year. These\n\nimprovements were mitigated somewhat by large increases in natural gas costs in Atlantic Canada and a\n\nmore competitive rental market in the Maritimes, which resulted in increased year-over-year vacancy. The\n\nchallenges we faced in 2013 resulted in funds from operations (FFO) per share of $0.72, the same as Killam’s\n\n2012 FFO per share.\n\n####### **Growing the Cash Flow from our Properties**\n\nWe expect to generate, on average, between 2% and 4% in net operating income (NOI) growth through our\n\nsame store portfolio on an annual basis. Our same store portfolio represents properties we have owned for\n\nequivalent periods year-over-year. Due to commodity price volatility, we experienced an unexpected spike\n\nin natural gas prices in Nova Scotia and New Brunswick throughout the 2013 heating season that increased\n\nsame store utility and fuel expenses by 14%. We were able to partially offset this unprecedented increase\n\nby managing controllable expenses to a modest 0.3% increase in the year; however, overall same store\n\noperating costs grew by 5.0%. These higher expenses more than offset a 1.8% growth in revenue, resulting\n\nin a disappointing 0.4% decline in same store NOI for the year.\n\nWe are targeting positive same store growth in 2014 of up to 2%. Year-over-year occupancy improvements\n\nand increased rental rates are expected to generate revenue growth. Increasing our leasing staff and\n\nrefining our marketing and leasing process is proving effective, resulting in improved occupancy levels in\n\nmany of our core markets, especially in Ontario and New Brunswick. A colder than normal winter this year\n\n(2014) is translating into increased energy consumption and continued volatility in natural gas prices in\n\nAtlantic Canada, expected to result in higher than normal heating costs. We continue to invest in energy", - "page_start": 8, - "page_end": 8, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "TSX_KMP_2013.pdf", - "query": "How Killam Properties Inc does increase its geographic diversification ? ", - "target_page": 5, - "target_passage": "We are increasing our geographic diversification by expanding our apartment ownership outside Atlantic Canada. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Killam properties Inc\n\n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "significant premium for quality assets.\n\n**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada,\n\nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is\n\nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase\n\nsignificantly when considering assets outside Atlantic Canada.\n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building\n\na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in\n\nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on\n\nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing\n\nthe amount of NOI generated outside of Atlantic Canada to 50%.\n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive\n\ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by\n\naccretively growing its apartment portfolio in Ontario.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**PART II**\n\n**Business Overview**\n\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada’s largest residential landlords, owning, operating, managing and developing\n\nmulti‑family residential and Manufactured Home Community (“MHC”) properties. Killam’s 164 apartment properties are located in Atlantic\n\nCanada’s six largest urban centres and in Ontario. The Company’s 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam’s\n\nreal estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and\n\nincreasing FFO per share.\n\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic\n\nCanada and MHCs across Canada. Killam’s first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009,\n\nKillam’s apartment portfolio grew through the acquisition of properties in Atlantic Canada’s six largest cities, namely Halifax, Moncton, Saint\n\nJohn, Fredericton, St. John’s and Charlottetown. Killam is now Atlantic Canada’s largest residential landlord, with a 14.2% market share of the\n\nmulti‑family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the\n\nprovince, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions\n\nand developments. The apartment business is Killam’s largest business segment, accounting for 86% of the Company’s NOI from property\n\noperations and equity income in 2013. At December 31, 2013, Killam’s apartment portfolio consisted of 12,647 units.\n\nKillam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development\n\nof four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect\n\ndevelopments to exceed 5% of the total asset base in any given year.\n\nIn addition, the Company owns MHCs, also known as land‑lease communities or trailer parks. Killam owns the land and infrastructure supporting\n\neach community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities\n\nwhich accounted for 14% of Killam’s NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the\n\nCompany to crystallize the value of the properties at attractive cap‑rates and use the funds to continue to grow the apartment portfolio.\n\n**Key Performance Indicators (KPIs)**\n\nManagement measures Killam’s performance based on the following KPIs:\n\n1. FFO per Share - A standard measure of earnings for real estate entities. Management is focused on growing FFO per share on an annual\n\nbasis.\n\n2. Rental Increases - Management expects to achieve increases in average rental rates on an annual basis and measures the average rental\n\nincreases achieved.\n\n3. Occupancy - Management is focused on maximizing occupancy levels while also managing the impact of higher rents. This measure\n\nconsiders units rented as a percentage of total stabilized units at a point in time.\n\n4. Same Store NOI Growth - This measure considers the Company’s ability to increase the NOI at properties that it has owned for equivalent\n\nperiods year‑over‑year, removing the impact of acquisitions, dispositions, developments and other non same store operating adjustments.\n\n5. Weighted Average Cost of Debt - Killam monitors the weighted average cost of its mortgage debt and total debt.\n\n6. Debt to Total Assets - Killam measures its debt levels as a percentage of total assets and works to ensure that the debt to total assets\n\nremains at a range of 55% to 65%.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI\n\ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service,\n\ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes.\n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property\n\ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s\n\napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on\n\nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy\n\nusage.\n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1\n\nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island.\n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed\n\nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings,\n\nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to\n\nlimit development projects to approximately 5% of the balance sheet on an annual basis.\n\n**Investment in New Properties**\n\nIn addition to developing new properties, Killam also acquires newly constructed assets. Management believes that increasing Killam’s ownership\n\nin new, high‑quality buildings will result in above‑market and long‑term demand for the Company’s assets from an aging population, reduce\n\nannual capital requirements for deferred maintenance, and transform Killam’s portfolio, over time, into one of the highest quality portfolios in\n\nCanada.\n\nDemand by renters for newly constructed rental apartments is strong, with high occupancy rates and above‑average rents. CMHC’s Fall 2013\n\nHalifax Rental Market Report reported 97.3% occupancy for properties built in 2000 or later, compared to 96.8% for all rental markets in the city.\n\nThe average rent for a two‑bedroom unit in these newer buildings was $1,320 per month, compared to a market average two‑bedroom rent of\n\n$976.\n\nThe new properties added to Killam’s portfolio are condo quality, providing tenants with features and amenities traditionally associated with\n\nownership. The Company believes that demand for this type of rental accommodation will grow given an increasing number of homeowners\n\nreaching retirement age and looking for alternatives to home ownership. Killam is also attracted to the low capital spend requirements from new\n\nassets compared to older buildings, which often include significant capital investment to address deferred maintenance. Generally, the amount\n\nof annual capital to maintain a property increases as the building ages. In addition, with energy efficient features, the NOI margins are generally\n\nhigher in newer buildings.\n\nWith strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between\n\nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a\n\nsignificant premium for quality assets.\n\n**Geographic Diversification**", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "With a home base in Halifax, Killam’s roots are in Atlantic Canada and the\n\nCompany has successfully grown by consolidating the residential real estate\n\nmarket in the region’s urban centres. In order to meet its long-term growth\n\ntargets and increase its investment in Canada’s most dynamic real estate\n\nmarkets, Killam has been actively expanding its apartment portfolio in Ontario\n\nand is exploring investment opportunities in Western Canada. Since 2010,\n\nKillam has expanded its apartment target markets to include specific cities\n\nin Ontario, and has invested approximately $200 million in real estate assets\n\nin the province. Approximately 15% of Killam’s 2014 net operating income is\n\nexpected to be earned in Ontario. The Company has set a long-term target to\n\nearn 50% of its net operating income outside Atlantic Canada.\n\n#### Increasing Geographic Diversification\n\n1033 Queen Street West, Toronto, Ontario", - "page_start": 16, - "page_end": 16, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Killam’s growth opportunities include increasing earnings of its existing\n\nportfolio and expanding the portfolio through acquisitions and development.\n\nAcquisitions have been an important part of Killam’s growth, having completed\n\nover $1.1 billion in acquisitions since the first property was acquired in 2002.\n\nKillam began development as a complement to its acquisition program in 2010,\n\nand to-date has invested approximately $90 million in new developments.\n\n2013 was Killam’s largest year for growth since 2005, adding $191 million of\n\nproperties to the portfolio, including $121 million in acquisitions and $70\n\nmillion in new developments. Looking ahead to 2014, Killam has targeted\n\na minimum of $75 million in acquisitions, and the development of two new\n\napartment buildings totaling approximately $46 million.\n\n#### Opportunities for Growth\n\nThe Plaza, Fredericton, New Brunswick", - "page_start": 13, - "page_end": 13, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "####### **Dear Shareholders,**\n\nI am pleased to review Killam’s 2013 performance with you, and outline our strategy and plans for the\n\nfuture. We are progressing nicely with our priorities to increase the quality of our portfolio and expand\n\ngeographically. In addition, we are focused on three key areas of growth for the Company: increase the\n\nvalue of our existing portfolio, acquire accretively and develop profitably.\n\nDuring the past year we expanded communication of our corporate strategy to reach the broader Killam\n\ncommunity with the introduction of Killam’s Core Values. These values have been inherent in the Company\n\nsince our first acquisition in 2002, but had not been broadly promoted until this past year. Our Core Values\n\n(Curb Appeal, Build Community, Strong Customer Relationships, Do the Right Thing and Creative Solutions)\n\nare represented in the colourful squares you will see throughout this year’s\n\nreport. Killam employees across the Company demonstrate these values in their\n\ndaily work, distinguishing Killam as a high-quality landlord. The introduction of a\n\nquarterly awards program, which recognizes employees who exemplify Killam’s\n\nCore Values, enables us to celebrate these values. I have been impressed by both the number and quality\n\nof nominations. We truly have a remarkable group of employees who go above and beyond in providing\n\nexceptional service to our tenants.\n\n####### **A Look Back at 2013**\n\nI would summarize 2013 as a mixed year for Killam. We were successful in achieving many of the objectives\n\nand targets we had set for ourselves, as summarized in the adjacent chart, but faced challenges that\n\nimpacted our financial performance. We added $191 million in new assets to our portfolio through\n\nacquisitions and the completion of four new developments. We also enhanced our leasing and marketing\n\nprograms, which allowed us to realize gains in occupancy in the second half of the year and improve our\n\nposition for 2014. We further benefited from both interest and administrative cost savings in the year. These\n\nimprovements were mitigated somewhat by large increases in natural gas costs in Atlantic Canada and a\n\nmore competitive rental market in the Maritimes, which resulted in increased year-over-year vacancy. The\n\nchallenges we faced in 2013 resulted in funds from operations (FFO) per share of $0.72, the same as Killam’s\n\n2012 FFO per share.\n\n####### **Growing the Cash Flow from our Properties**\n\nWe expect to generate, on average, between 2% and 4% in net operating income (NOI) growth through our\n\nsame store portfolio on an annual basis. Our same store portfolio represents properties we have owned for\n\nequivalent periods year-over-year. Due to commodity price volatility, we experienced an unexpected spike\n\nin natural gas prices in Nova Scotia and New Brunswick throughout the 2013 heating season that increased\n\nsame store utility and fuel expenses by 14%. We were able to partially offset this unprecedented increase\n\nby managing controllable expenses to a modest 0.3% increase in the year; however, overall same store\n\noperating costs grew by 5.0%. These higher expenses more than offset a 1.8% growth in revenue, resulting\n\nin a disappointing 0.4% decline in same store NOI for the year.\n\nWe are targeting positive same store growth in 2014 of up to 2%. Year-over-year occupancy improvements\n\nand increased rental rates are expected to generate revenue growth. Increasing our leasing staff and\n\nrefining our marketing and leasing process is proving effective, resulting in improved occupancy levels in\n\nmany of our core markets, especially in Ontario and New Brunswick. A colder than normal winter this year\n\n(2014) is translating into increased energy consumption and continued volatility in natural gas prices in\n\nAtlantic Canada, expected to result in higher than normal heating costs. We continue to invest in energy", - "page_start": 8, - "page_end": 8, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Killam has a diverse portfolio of both apartments and manufactured home communities. The\n\napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types,\n\nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide\n\nselection of properties and price points in each city, Killam caters to a broad tenant base.\n\nKillam’s 35 manufactured home communities represent 14% of earnings and are located\n\nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the\n\napartment business, providing stable and predictable cash flows.\n\n#### A Diversified Portfolio\n\nS2, Halifax, Nova Scotia", - "page_start": 12, - "page_end": 12, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "in the rents charged and could adversely affect Killam’s revenues and ability to meet its obligations. To mitigate against this risk Killam has a\n\ngeographically diverse asset base. Management is expanding this diversification by increasing Killam’s investment in apartment markets outside\n\nAtlantic Canada.\n\n**Credit Risk**\n\nCredit risk arises from the possibility that tenants may experience financial difficulty and be unable to fulfill their lease term commitments. The\n\nCompany mitigates the risk of credit loss through the diversification of its existing portfolio and limiting its exposure to any one tenant. Credit\n\nassessments are conducted with respect to all new leasing and the Company also obtains a security deposit to assist in potential recovery\n\nrequirements. In addition, the receivable balances are monitored on an ongoing basis with the result that the Company’s exposure to bad debt is\n\nnot significant. The Company’s bad debt expense experience has historically been less than 0.4% of revenues. None of Killam’s tenants account\n\nfor more than 1% of tenant receivables.\n\n**Development Risk**\n\nDevelopment risk is the risk that costs of developments will exceed original estimates, unforeseen delays occur and/or units will not be leased in\n\nthe timeframe and/or at rents anticipated. Killam minimizes its exposure to development risk my limiting the amount of development underway\n\nat any one time. To reduce the Company’s exposure to price increases, Killam enters into fixed‑rate contracts when possible. To reduce the\n\nlease‑up risk, Killam does extensive market research in advance of each development to support expected rental rates, and pre‑markets its\n\nproperties early on in the process, to increase demand for the new developments.", - "page_start": 58, - "page_end": 58, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**Killam’s NOI by Province**\n\nCombining apartment and MHC’s, the following chart highlights the percentage of Killam’s forward‑looking NOI by province based on ownership\n\ninterest at December 31, 2013:\n\n**NOI by Province**\n\nns 48%\n\nnB 23%\n\non 15% Pei\n\n7%\n\nnl\n\n8%\n\n**The Multi‑family Market Leader in Atlantic Canada**\n\nAtlantic Canada is home to 2.3 million people, approximately 43% of whom live in the six largest cities, representing Killam’s core markets in the\n\nregion. Killam has a 14.2% market share of apartment units in these six largest centres. The chart below highlights the apartment NOI generated\n\nfrom each of the key urban markets in Atlantic Canada in 2013, and Killam’s market share in each.\n\n47.1%\n\n9.8% 9.9% 7.3% 6.6% 5.6%\n\n11.9%\n\n15.3% 18.9% 22.4% 19.8%\n\n13.2%\n\nHalifax m oncton Fredericton st. John's saint John\n\n% of Killam’s noi\n\nKillam’s market share", - "page_start": 30, - "page_end": 30, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "TSX_KMP_2013.pdf", - "query": "What is the Killam Properties Inc 2013 performance about the Geographic Diversification objective ?", - "target_page": 8, - "target_passage": "Target achieved. Killam acquired $55 million in Ontario real estate in 2013, representing 45% of its acquisition program in the year. Assets acquired included a 102-unit property in Ottawa, a newly built, 179-unit, mixed-used property in downtown Toronto and a 5.2 acre parcel of land for development in Cambridge, Ontario. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Killam properties Inc\n\n**2013 annual report**", - "page_start": 0, - "page_end": 0, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "significant premium for quality assets.\n\n**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada,\n\nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is\n\nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase\n\nsignificantly when considering assets outside Atlantic Canada.\n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building\n\na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in\n\nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on\n\nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing\n\nthe amount of NOI generated outside of Atlantic Canada to 50%.\n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive\n\ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by\n\naccretively growing its apartment portfolio in Ontario.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**PART II**\n\n**Business Overview**\n\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada’s largest residential landlords, owning, operating, managing and developing\n\nmulti‑family residential and Manufactured Home Community (“MHC”) properties. Killam’s 164 apartment properties are located in Atlantic\n\nCanada’s six largest urban centres and in Ontario. The Company’s 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam’s\n\nreal estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and\n\nincreasing FFO per share.\n\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic\n\nCanada and MHCs across Canada. Killam’s first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009,\n\nKillam’s apartment portfolio grew through the acquisition of properties in Atlantic Canada’s six largest cities, namely Halifax, Moncton, Saint\n\nJohn, Fredericton, St. John’s and Charlottetown. Killam is now Atlantic Canada’s largest residential landlord, with a 14.2% market share of the\n\nmulti‑family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the\n\nprovince, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions\n\nand developments. The apartment business is Killam’s largest business segment, accounting for 86% of the Company’s NOI from property\n\noperations and equity income in 2013. At December 31, 2013, Killam’s apartment portfolio consisted of 12,647 units.\n\nKillam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development\n\nof four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect\n\ndevelopments to exceed 5% of the total asset base in any given year.\n\nIn addition, the Company owns MHCs, also known as land‑lease communities or trailer parks. Killam owns the land and infrastructure supporting\n\neach community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities\n\nwhich accounted for 14% of Killam’s NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the\n\nCompany to crystallize the value of the properties at attractive cap‑rates and use the funds to continue to grow the apartment portfolio.\n\n**Key Performance Indicators (KPIs)**\n\nManagement measures Killam’s performance based on the following KPIs:\n\n1. FFO per Share - A standard measure of earnings for real estate entities. Management is focused on growing FFO per share on an annual\n\nbasis.\n\n2. Rental Increases - Management expects to achieve increases in average rental rates on an annual basis and measures the average rental\n\nincreases achieved.\n\n3. Occupancy - Management is focused on maximizing occupancy levels while also managing the impact of higher rents. This measure\n\nconsiders units rented as a percentage of total stabilized units at a point in time.\n\n4. Same Store NOI Growth - This measure considers the Company’s ability to increase the NOI at properties that it has owned for equivalent\n\nperiods year‑over‑year, removing the impact of acquisitions, dispositions, developments and other non same store operating adjustments.\n\n5. Weighted Average Cost of Debt - Killam monitors the weighted average cost of its mortgage debt and total debt.\n\n6. Debt to Total Assets - Killam measures its debt levels as a percentage of total assets and works to ensure that the debt to total assets\n\nremains at a range of 55% to 65%.", - "page_start": 22, - "page_end": 22, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "####### **Dear Shareholders,**\n\nI am pleased to review Killam’s 2013 performance with you, and outline our strategy and plans for the\n\nfuture. We are progressing nicely with our priorities to increase the quality of our portfolio and expand\n\ngeographically. In addition, we are focused on three key areas of growth for the Company: increase the\n\nvalue of our existing portfolio, acquire accretively and develop profitably.\n\nDuring the past year we expanded communication of our corporate strategy to reach the broader Killam\n\ncommunity with the introduction of Killam’s Core Values. These values have been inherent in the Company\n\nsince our first acquisition in 2002, but had not been broadly promoted until this past year. Our Core Values\n\n(Curb Appeal, Build Community, Strong Customer Relationships, Do the Right Thing and Creative Solutions)\n\nare represented in the colourful squares you will see throughout this year’s\n\nreport. Killam employees across the Company demonstrate these values in their\n\ndaily work, distinguishing Killam as a high-quality landlord. The introduction of a\n\nquarterly awards program, which recognizes employees who exemplify Killam’s\n\nCore Values, enables us to celebrate these values. I have been impressed by both the number and quality\n\nof nominations. We truly have a remarkable group of employees who go above and beyond in providing\n\nexceptional service to our tenants.\n\n####### **A Look Back at 2013**\n\nI would summarize 2013 as a mixed year for Killam. We were successful in achieving many of the objectives\n\nand targets we had set for ourselves, as summarized in the adjacent chart, but faced challenges that\n\nimpacted our financial performance. We added $191 million in new assets to our portfolio through\n\nacquisitions and the completion of four new developments. We also enhanced our leasing and marketing\n\nprograms, which allowed us to realize gains in occupancy in the second half of the year and improve our\n\nposition for 2014. We further benefited from both interest and administrative cost savings in the year. These\n\nimprovements were mitigated somewhat by large increases in natural gas costs in Atlantic Canada and a\n\nmore competitive rental market in the Maritimes, which resulted in increased year-over-year vacancy. The\n\nchallenges we faced in 2013 resulted in funds from operations (FFO) per share of $0.72, the same as Killam’s\n\n2012 FFO per share.\n\n####### **Growing the Cash Flow from our Properties**\n\nWe expect to generate, on average, between 2% and 4% in net operating income (NOI) growth through our\n\nsame store portfolio on an annual basis. Our same store portfolio represents properties we have owned for\n\nequivalent periods year-over-year. Due to commodity price volatility, we experienced an unexpected spike\n\nin natural gas prices in Nova Scotia and New Brunswick throughout the 2013 heating season that increased\n\nsame store utility and fuel expenses by 14%. We were able to partially offset this unprecedented increase\n\nby managing controllable expenses to a modest 0.3% increase in the year; however, overall same store\n\noperating costs grew by 5.0%. These higher expenses more than offset a 1.8% growth in revenue, resulting\n\nin a disappointing 0.4% decline in same store NOI for the year.\n\nWe are targeting positive same store growth in 2014 of up to 2%. Year-over-year occupancy improvements\n\nand increased rental rates are expected to generate revenue growth. Increasing our leasing staff and\n\nrefining our marketing and leasing process is proving effective, resulting in improved occupancy levels in\n\nmany of our core markets, especially in Ontario and New Brunswick. A colder than normal winter this year\n\n(2014) is translating into increased energy consumption and continued volatility in natural gas prices in\n\nAtlantic Canada, expected to result in higher than normal heating costs. We continue to invest in energy", - "page_start": 8, - "page_end": 8, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI\n\ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service,\n\ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes.\n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property\n\ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s\n\napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on\n\nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy\n\nusage.\n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1\n\nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island.\n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed\n\nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings,\n\nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to\n\nlimit development projects to approximately 5% of the balance sheet on an annual basis.\n\n**Investment in New Properties**\n\nIn addition to developing new properties, Killam also acquires newly constructed assets. Management believes that increasing Killam’s ownership\n\nin new, high‑quality buildings will result in above‑market and long‑term demand for the Company’s assets from an aging population, reduce\n\nannual capital requirements for deferred maintenance, and transform Killam’s portfolio, over time, into one of the highest quality portfolios in\n\nCanada.\n\nDemand by renters for newly constructed rental apartments is strong, with high occupancy rates and above‑average rents. CMHC’s Fall 2013\n\nHalifax Rental Market Report reported 97.3% occupancy for properties built in 2000 or later, compared to 96.8% for all rental markets in the city.\n\nThe average rent for a two‑bedroom unit in these newer buildings was $1,320 per month, compared to a market average two‑bedroom rent of\n\n$976.\n\nThe new properties added to Killam’s portfolio are condo quality, providing tenants with features and amenities traditionally associated with\n\nownership. The Company believes that demand for this type of rental accommodation will grow given an increasing number of homeowners\n\nreaching retirement age and looking for alternatives to home ownership. Killam is also attracted to the low capital spend requirements from new\n\nassets compared to older buildings, which often include significant capital investment to address deferred maintenance. Generally, the amount\n\nof annual capital to maintain a property increases as the building ages. In addition, with energy efficient features, the NOI margins are generally\n\nhigher in newer buildings.\n\nWith strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between\n\nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a\n\nsignificant premium for quality assets.\n\n**Geographic Diversification**", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Killam has a diverse portfolio of both apartments and manufactured home communities. The\n\napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types,\n\nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide\n\nselection of properties and price points in each city, Killam caters to a broad tenant base.\n\nKillam’s 35 manufactured home communities represent 14% of earnings and are located\n\nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the\n\napartment business, providing stable and predictable cash flows.\n\n#### A Diversified Portfolio\n\nS2, Halifax, Nova Scotia", - "page_start": 12, - "page_end": 12, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "With a home base in Halifax, Killam’s roots are in Atlantic Canada and the\n\nCompany has successfully grown by consolidating the residential real estate\n\nmarket in the region’s urban centres. In order to meet its long-term growth\n\ntargets and increase its investment in Canada’s most dynamic real estate\n\nmarkets, Killam has been actively expanding its apartment portfolio in Ontario\n\nand is exploring investment opportunities in Western Canada. Since 2010,\n\nKillam has expanded its apartment target markets to include specific cities\n\nin Ontario, and has invested approximately $200 million in real estate assets\n\nin the province. Approximately 15% of Killam’s 2014 net operating income is\n\nexpected to be earned in Ontario. The Company has set a long-term target to\n\nearn 50% of its net operating income outside Atlantic Canada.\n\n#### Increasing Geographic Diversification\n\n1033 Queen Street West, Toronto, Ontario", - "page_start": 16, - "page_end": 16, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Killam’s growth opportunities include increasing earnings of its existing\n\nportfolio and expanding the portfolio through acquisitions and development.\n\nAcquisitions have been an important part of Killam’s growth, having completed\n\nover $1.1 billion in acquisitions since the first property was acquired in 2002.\n\nKillam began development as a complement to its acquisition program in 2010,\n\nand to-date has invested approximately $90 million in new developments.\n\n2013 was Killam’s largest year for growth since 2005, adding $191 million of\n\nproperties to the portfolio, including $121 million in acquisitions and $70\n\nmillion in new developments. Looking ahead to 2014, Killam has targeted\n\na minimum of $75 million in acquisitions, and the development of two new\n\napartment buildings totaling approximately $46 million.\n\n#### Opportunities for Growth\n\nThe Plaza, Fredericton, New Brunswick", - "page_start": 13, - "page_end": 13, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "**1. Corporate Information**\n\nKillam Properties Inc (“Killam” or the “Company”) is a real estate company specializing in the acquisition, management and development of\n\nmulti‑residential apartment buildings and manufactured home communities in Canada. Killam is incorporated under the Canada Business\n\nCorporations Act. Killam’s common shares are publicly traded and listed on the Toronto Stock Exchange under the symbol “KMP”. The\n\nconsolidated financial statements comprise the financial statements of Killam and its subsidiaries as at December 31, 2013 **.** The Company’s\n\nhead office operations are located at 3700 Kempt Road, Halifax, Nova Scotia, B3K 4X8 and the Company’s registered office is located at\n\n2571 Windsor Street, Halifax, Nova Scotia, B3K 5C4.\n\nThe consolidated financial statements of the Company for the year ended December 31, 2013, were authorized for issue in accordance\n\nwith a resolution of the Board of Directors on Tuesday, February 18, 2014.\n\n**2. Significant Accounting Policies**\n\n**(A) Statement of Compliance**\n\nThese consolidated financial statements have been prepared in accordance with International Financial Reporting Standards (“IFRS”) as\n\nissued by the International Accounting Standards Board (“IASB”).\n\n**(B) Basis of Presentation**\n\nThe consolidated financial statements of the Company have been prepared on a historical cost basis, except for investment properties that\n\nhave been measured at fair value. Historical cost is generally based on the fair value of the consideration given in exchange for assets. The\n\nconsolidated financial statements have been prepared on a going concern basis and are presented in Canadian dollars, which is Killam’s\n\nfunctional currency, and all values are rounded to the nearest thousand ($000), except when otherwise noted. Standards and guidelines\n\nnot effective for the current accounting period are described in Note 4.\n\n**(C) Basis of Consolidation**\n\n*(i) Subsidiaries*\n\nThe consolidated financial statements include the accounts of Killam and its subsidiaries. Non‑controlling interests represent the portion of\n\nprofit or loss and net assets not held by Killam, and are presented separately in the Consolidated Statements of Income and Comprehensive\n\nIncome and within equity in the Consolidated Statement of Financial Position, separately from shareholders’ equity.\n\nSubsidiaries are entities controlled by Killam. The financial statements of subsidiaries are included in the consolidated financial statements\n\nfrom the date that control commences until the date that control ceases. The accounting policies of subsidiaries have been changed when\n\nnecessary to align them with the policies adopted by Killam. In certain circumstances, Killam has control over entities in which it does not\n\nown more than 50% of the voting power.\n\nThe Company’s significant investment in subsidiaries and a joint venture, all of which are incorporated in Canada, are listed in the following\n\ntable:\n\n**Subsidiary % Interest**\n\nKillam Properties Inc. 100%\n\nKillam Investments Inc. 100%\n\nKillam Investments (PEI) Inc. 100%\n\nKillam Properties Apartments Trust 100%\n\nKillam Properties M.H.C. Trust 100%\n\n661047 N.B. Inc. 100%\n\nBlackshire Court Limited 100%\n\nBlackshire Court Limited Partnership 95.92%\n\nKillam KFH (180 Mill St.) Inc. 100%\n\nKillam KFH (Kanata Lakes) Inc. 100%\n\nKillam KFH (1355 Silver Spear Road) Inc. 100%\n\nKillam KFH Sigma GP Inc. 50%\n\nKillam KFH‑Sigma Properties LP 25%", - "page_start": 69, - "page_end": 69, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "in the rents charged and could adversely affect Killam’s revenues and ability to meet its obligations. To mitigate against this risk Killam has a\n\ngeographically diverse asset base. Management is expanding this diversification by increasing Killam’s investment in apartment markets outside\n\nAtlantic Canada.\n\n**Credit Risk**\n\nCredit risk arises from the possibility that tenants may experience financial difficulty and be unable to fulfill their lease term commitments. The\n\nCompany mitigates the risk of credit loss through the diversification of its existing portfolio and limiting its exposure to any one tenant. Credit\n\nassessments are conducted with respect to all new leasing and the Company also obtains a security deposit to assist in potential recovery\n\nrequirements. In addition, the receivable balances are monitored on an ongoing basis with the result that the Company’s exposure to bad debt is\n\nnot significant. The Company’s bad debt expense experience has historically been less than 0.4% of revenues. None of Killam’s tenants account\n\nfor more than 1% of tenant receivables.\n\n**Development Risk**\n\nDevelopment risk is the risk that costs of developments will exceed original estimates, unforeseen delays occur and/or units will not be leased in\n\nthe timeframe and/or at rents anticipated. Killam minimizes its exposure to development risk my limiting the amount of development underway\n\nat any one time. To reduce the Company’s exposure to price increases, Killam enters into fixed‑rate contracts when possible. To reduce the\n\nlease‑up risk, Killam does extensive market research in advance of each development to support expected rental rates, and pre‑markets its\n\nproperties early on in the process, to increase demand for the new developments.", - "page_start": 58, - "page_end": 58, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv2_taclccby4_license.pdf", - "query": "What is the conventional workflow for BERT ?", - "target_page": 1, - "target_passage": "The conventional workflow for BERT consists of two stages: pre-training and fine-tuning. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Figure 5: Pre-trained weights help BERT find wider\n\noptima in fine-tuning on MRPC (right) than training\n\nfrom scratch (left) ( Hao et al. , 2019 )\n\nbeddings as input for training BERT, while Po-\n\nerner et al. ( 2019 ) adapt entity vectors to BERT\n\nrepresentations. As mentioned above, Wang et al.\n\n( 2020c ) integrate knowledge not through entity em-\n\nbeddings, but through additional pre-training ob-\n\njective of knowledge base completion. Sun et al.\n\n( 2019b , c ) modify the standard MLM task to mask\n\nnamed entities rather than random words, and Yin\n\net al. ( 2020 ) train with MLM objective over both\n\ntext and linearized table data. Wang et al. ( 2020a )\n\nenhance RoBERTa with both linguistic and factual\n\nknowledge with task-specific adapters.\n\nPre-training is the most expensive part of train-\n\ning BERT, and it would be informative to know\n\nhow much benefit it provides. On some tasks, a\n\nrandomly initialized and fine-tuned BERT obtains\n\ncompetitive or higher results than the pre-trained\n\nBERT with the task classifier and frozen weights\n\n( Kovaleva et al. , 2019 ). The consensus in the com-\n\nmunity is that pre-training does help in most situa-\n\ntions, but the degree and its exact contribution re-\n\nquires further investigation. Prasanna et al. ( 2020 )\n\nfound that *most* weights of pre-trained BERT are\n\nuseful in fine-tuning, although there are \"better\"\n\nand \"worse\" subnetworks. One explanation is that\n\npre-trained weights help the fine-tuned BERT find\n\nwider and flatter areas with smaller generalization\n\nerror, which makes the model more robust to over-\n\nfitting (see Figure 5 from Hao et al. ( 2019 )).\n\nGiven the large number and variety of proposed\n\nmodifications, one would wish to know how much\n\nimpact each of them has. However, due to the\n\noverall trend towards large model sizes, systematic\n\nablations have become expensive. Most new mod-\n\nels claim superiority on standard benchmarks, but\n\ngains are often marginal, and estimates of model\n\nstability and significance testing are very rare.\n\n### **5.4 Fine-tuning BERT**\n\nPre-training + fine-tuning workflow is a crucial\n\npart of BERT. The former is supposed to provide\n\ntask-independent knowledge, and the latter would\n\npresumably teach the model to rely more on the\n\nrepresentations useful for the task at hand.\n\nKovaleva et al. ( 2019 ) did not find that to be the case for BERT fine-tuned on GLUE tasks <sup>5</sup> : dur-\n\ning fine-tuning, the most changes for 3 epochs oc-\n\ncurred in the last two layers of the models, but those\n\nchanges caused self-attention to focus on [SEP]\n\nrather than on linguistically interpretable patterns.\n\nIt is understandable why fine-tuning would increase\n\nthe attention to [CLS] , but not [SEP] . If Clark\n\net al. ( 2019 ) are correct that [SEP] serves as \"no-\n\nop\" indicator, fine-tuning basically tells BERT what\n\nto ignore.\n\nSeveral studies explored the possibilities of im-\n\nproving the fine-tuning of BERT:\n\n- **Taking more layers into account** : learning\n\na complementary representation of the infor-\n\nmation in deep and output layers ( Yang and\n\nZhao , 2019 ), using a weighted combination\n\nof all layers instead of the final one ( Su and\n\nCheng , 2019 ; Kondratyuk and Straka , 2019 ),\n\nand layer dropout ( Kondratyuk and Straka ,\n\n2019 ).\n\n- **Two-stage fine-tuning** introduces an inter-\n\nmediate supervised training stage between\n\npre-training and fine-tuning ( Phang et al. ,\n\n2019 ; Garg et al. , 2020 ; Arase and Tsujii ,\n\n2019 ; Pruksachatkun et al. , 2020 ; Glavaš and\n\nVuli´c , 2020 ). Ben-David et al. ( 2020 ) propose\n\na pivot-based variant of MLM to fine-tune\n\nBERT for domain adaptation.\n\n- **Adversarial token perturbations** improve\n\nrobustness of the model ( Zhu et al. , 2019 ).\n\n- **Adversarial regularization** in combination\n\nwith *Bregman Proximal Point Optimization*\n\nhelps alleviate pre-trained knowledge forget-\n\nting and therefore prevents BERT from overfit-\n\nting to downstream tasks ( Jiang et al. , 2019a ).", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "## **A Primer in BERTology: What We Know About How BERT Works**\n\n### **Anna Rogers**\n\nCenter for Social Data Science\n\nUniversity of Copenhagen\n\narogers@sodas.ku.dk\n\n### **Olga Kovaleva**\n\nDept. of Computer Science\n\nUniversity of Massachusetts Lowell\n\nokovalev@cs.uml.edu\n\n### **Anna Rumshisky**\n\nDept. of Computer Science\n\nUniversity of Massachusetts Lowell\n\narum@cs.uml.edu\n\n### **Abstract**\n\nTransformer-based models have pushed state\n\nof the art in many areas of NLP, but our un-\n\nderstanding of what is behind their success\n\nis still limited. This paper is the first sur-\n\nvey of over 150 studies of the popular BERT\n\nmodel. We review the current state of knowl-\n\nedge about how BERT works, what kind\n\nof information it learns and how it is repre-\n\nsented, common modifications to its training\n\nobjectives and architecture, the overparame-\n\nterization issue and approaches to compres-\n\nsion. We then outline directions for future\n\nresearch.\n\n## **1 Introduction**\n\nSince their introduction in 2017, Transformers\n\n( Vaswani et al. , 2017 ) have taken NLP by storm,\n\noffering enhanced parallelization and better model-\n\ning of long-range dependencies. The best known\n\nTransformer-based model is BERT ( Devlin et al. ,\n\n2019 ); it obtained state-of-the-art results in numer-\n\nous benchmarks and is still a must-have baseline.\n\nWhile it is clear that BERT works remarkably\n\nwell, it is less clear *why* , which limits further\n\nhypothesis-driven improvement of the architecture.\n\nUnlike CNNs, the Transformers have little cogni-\n\ntive motivation, and the size of these models limits\n\nour ability to experiment with pre-training and per-\n\nform ablation studies. This explains a large number\n\nof studies over the past year that attempted to un-\n\nderstand the reasons behind BERT’s performance.\n\nIn this paper, we provide an overview of what\n\nhas been learned to date, highlighting the questions\n\nwhich are still unresolved. We first consider the\n\nlinguistic aspects of it, i.e., the current evidence\n\nregarding the types of linguistic and world knowl-\n\nedge learned by BERT, as well as where and how\n\nthis knowledge may be stored in the model. We\n\nthen turn to the technical aspects of the model and\n\nprovide an overview of the current proposals to\n\nimprove BERT’s architecture, pre-training and fine-\n\ntuning. We conclude by discussing the issue of\n\noverparameterization, the approaches to compress-\n\ning BERT, and the nascent area of pruning as a\n\nmodel analysis technique.\n\n## **2 Overview of BERT architecture**\n\nFundamentally, BERT is a stack of Transformer\n\nencoder layers ( Vaswani et al. , 2017 ) which consist\n\nof multiple self-attention \"heads\". For every input\n\ntoken in a sequence, each head computes key, value\n\nand query vectors, used to create a weighted repre-\n\nsentation. The outputs of all heads in the same layer\n\nare combined and run through a fully-connected\n\nlayer. Each layer is wrapped with a skip connection\n\nand followed by layer normalization.\n\nThe conventional workflow for BERT consists\n\nof two stages: pre-training and fine-tuning. Pre-\n\ntraining uses two self-supervised tasks: masked\n\nlanguage modeling (MLM, prediction of randomly\n\nmasked input tokens) and next sentence prediction\n\n(NSP, predicting if two input sentences are adjacent\n\nto each other). In fine-tuning for downstream ap-\n\nplications, one or more fully-connected layers are\n\ntypically added on top of the final encoder layer.\n\nThe input representations are computed as fol-\n\nlows: each word in the input is first tokenized into\n\nwordpieces ( Wu et al. , 2016 ), and then three em-\n\nbedding layers (token, position, and segment) are\n\ncombined to obtain a fixed-length vector. Special\n\ntoken [CLS] is used for classification predictions,\n\nand [SEP] separates input segments.\n\nGoogle <sup>1</sup> and HuggingFace ( Wolf et al. , 2020 )\n\nprovide many variants of BERT, including the orig-\n\ninal \"base\" and \"large\" versions. They vary in the\n\nnumber of heads, layers, and hidden state size.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "provide many variants of BERT, including the orig-\n\ninal \"base\" and \"large\" versions. They vary in the\n\nnumber of heads, layers, and hidden state size.\n\n1 [https://github.com/](https://github.com/google-research/bert)\n\n[google-research/bert](https://github.com/google-research/bert)\n\narXiv:2002.12327v3 [cs.CL] 9 Nov 2020", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "report that an intermediate fine-tuning step with\n\nsupervised parsing does not make much difference\n\nfor downstream task performance.\n\n### **3.2 Semantic knowledge**\n\nTo date, more studies have been devoted to BERT’s\n\nknowledge of syntactic rather than semantic phe-\n\nnomena. However, we do have evidence from an\n\nMLM probing study that **BERT has some knowl-**\n\n**edge of semantic roles** ( Ettinger , 2019 ). BERT\n\neven displays some preference for the incorrect\n\nfillers for semantic roles that are semantically re-\n\nlated to the correct ones, as opposed to those that\n\nare unrelated (e.g. \"to tip a chef\" is better than \"to\n\ntip a robin\", but worse than \"to tip a waiter\").\n\nTenney et al. ( 2019b ) showed that **BERT en-**\n\n#### **codes information about entity types, relations,**\n\n**semantic roles, and proto-roles** , since this infor-\n\nmation can be detected with probing classifiers.\n\n#### **BERT struggles with representations of num-**\n\n**bers.** Addition and number decoding tasks showed\n\nthat BERT does not form good representations for\n\nfloating point numbers and fails to generalize away\n\nfrom the training data ( Wallace et al. , 2019b ). A\n\npart of the problem is BERT’s wordpiece tokeniza-\n\ntion, since numbers of similar values can be divided\n\nup into substantially different word chunks.\n\nOut-of-the-box **BERT is surprisingly brittle to**\n\n**named entity replacements** : e.g. replacing names\n\nin the coreference task changes 85% of predictions\n\n( Balasubramanian et al. , 2020 ). This suggests that\n\nthe model does not actually form a generic idea of\n\nnamed entities, although its F1 scores on NER prob-\n\ning tasks are high ( Tenney et al. , 2019a ). Broscheit\n\n( 2019 ) find that fine-tuning BERT on Wikipedia\n\nentity linking \"teaches\" it additional entity knowl-\n\nedge, which would suggest that it did not absorb all\n\nthe relevant entity information during pre-training\n\non Wikipedia.\n\n### **3.3 World knowledge**\n\nThe bulk of evidence about commonsense knowl-\n\nedge captured in BERT comes from practitioners\n\nusing it to extract such knowledge. One direct prob-\n\ning study of BERT reports that **BERT struggles**\n\n#### **with pragmatic inference and role-based event**\n\n**knowledge** ( Ettinger , 2019 ). BERT also struggles\n\nwith abstract attributes of objects, as well as visual\n\nand perceptual properties that are likely to be as-\n\nsumed rather than mentioned ( Da and Kasai , 2019 ).\n\nThe MLM component of BERT is easy to\n\nadapt for knowledge induction by filling in the\n\n#### **Abstract**\n\nRecent progress in pretraining language mod-\n\nels on large textual corpora led to a surge\n\nof improvements for downstream NLP tasks.\n\nWhilst learning linguistic knowledge, these\n\nmodels may also be storing relational knowl-\n\nedge present in the training data, and may\n\nbe able to answer queries structured as “fill-\n\nin-the-blank” cloze statements. Language\n\nmodels have many advantages over structured\n\nknowledge bases: they require no schema en-\n\ngineering, allow practitioners to query about\n\nan open class of relations, are easy to extend to\n\nmore data, and require no human supervision\n\nto train. We present an in-depth analysis of the\n\nrelational knowledge already present (without\n\nfine-tuning) in a wide range of state-of-the-\n\nart pretrained language models. We find that\n\n(i) without fine-tuning, BERT contains rela-\n\ntional knowledge competitive with traditional\n\nNLP methods that have some access to ora-\n\ncle knowledge, (ii) BERT also does remark-\n\nably well on open-domain question answer-\n\ning against a supervised baseline, and (iii) cer-\n\ntain types of factual knowledge are learned\n\nmuch more readily than others by standard lan-\n\nguage model pretraining approaches. The sur-\n\nprisingly strong ability of these models to re-\n\ncall factual knowledge without any fine-tuning\n\ndemonstrates their potential as unsupervised\n\nopen-domain QA systems. The code to re-\n\nproduce our analysis is available at https:\n\n//github.com/facebookresearch/LAMA .", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "be successfully approximated with adapter mod-\n\nules. They achieve competitive performance on\n\n26 classification tasks at a fraction of the computa-\n\ntional cost. Adapters in BERT were also used for\n\nmulti-task learning ( Stickland and Murray , 2019 )\n\nand cross-lingual transfer ( Artetxe et al. , 2019 ). An\n\nalternative to fine-tuning is extracting features from\n\nfrozen representations, but fine-tuning works better\n\nfor BERT ( Peters et al. , 2019b ).\n\nA big methodological challenge in the current\n\nNLP is that the reported performance improve-\n\nments of new models may well be within varia-\n\ntion induced by environment factors ( Crane , 2018 ).\n\nBERT is not an exception. Dodge et al. ( 2020 )\n\nreport significant variation for BERT fine-tuned\n\non GLUE tasks due to both weight initialization\n\nand training data order. They also propose early\n\nstopping on the less-promising seeds.\n\nAlthough we hope that the above observations\n\nmay be useful for the practitioners, this section\n\ndoes not exhaust the current research on fine-tuning\n\nand its alternatives. For example, we do not cover\n\nsuch topics as Siamese architectures, policy gradi-\n\nent training, automated curriculum learning, and\n\nothers.\n\n## **6 How big should BERT be?**\n\n### **6.1 Overparameterization**\n\nTransformer-based models keep growing by or-\n\nders of magnitude: the 110M parameters of base\n\nBERT are now dwarfed by 17B parameters of\n\nTuring-NLG ( Microsoft , 2020 ), which is dwarfed\n\nby 175B of GPT-3 ( Brown et al. , 2020 ). This trend\n\nraises concerns about computational complexity\n\nof self-attention ( Wu et al. , 2019a ), environmental\n\nissues ( Strubell et al. , 2019 ; Schwartz et al. , 2019 ),\n\nfair comparison of architectures ( Aßenmacher and\n\nHeumann , 2020 ), and reproducibility.\n\nHuman language is incredibly complex, and\n\nwould perhaps take many more parameters to de-\n\nscribe fully, but the current models do not make\n\ngood use of the parameters they already have. Voita\n\net al. ( 2019b ) showed that **all but a few Trans-**\n\n#### **former heads could be pruned without signif-**\n\n**icant losses in performance** . For BERT, Clark\n\net al. ( 2019 ) observe that most heads in the same\n\nlayer show similar self-attention patterns (perhaps\n\nrelated to the fact that the output of all self-attention\n\nheads in a layer is passed through the same MLP),\n\nwhich explains why Michel et al. ( 2019 ) were able\n\nto reduce most layers to a single head.\n\nDepending on the task, some BERT heads/layers\n\nare not only redundant ( Kao et al. , 2020 ), but also\n\nharmful to the downstream task performance. **Pos-**\n\n**itive effect from head disabling** was reported for\n\nmachine translation ( Michel et al. , 2019 ), abstrac-\n\ntive summarization ( Baan et al. , 2019 ), and GLUE\n\ntasks ( Kovaleva et al. , 2019 ). Additionally, Ten-\n\nney et al. ( 2019a ) examine the cumulative gains of\n\ntheir structural probing classifier, observing that in\n\n5 out of 8 probing tasks some layers cause a drop\n\nin scores (typically in the final layers). Gordon\n\net al. ( 2020 ) find that 30- 40% of the weights can\n\nbe pruned without impact on downstream tasks.\n\nIn general, larger BERT models perform better\n\n( Liu et al. , 2019a ; Roberts et al. , 2020 ), but not\n\nalways: BERT-base outperformed BERT-large on\n\nsubject-verb agreement ( Goldberg , 2019 ) and sen-\n\ntence subject detection ( Lin et al. , 2019 ). Given\n\nthe complexity of language, and amounts of pre-\n\ntraining data, it is not clear why BERT ends up with\n\nredundant heads and layers. Clark et al. ( 2019 ) sug-\n\ngest that one possible reason is the use of attention\n\ndropouts, which causes some attention weights to\n\nbe zeroed-out during training.\n\n### **6.2 Compression techniques**\n\nGiven the above evidence of overparameteriza-\n\ntion, it does not come as a surprise that **BERT**\n\n#### **can be efficiently compressed with minimal ac-**\n\n**curacy loss** , which would be highly desirable for\n\nreal-world applications. Such efforts to date are", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "**Compression Performance Speedup Model Evaluation**\n\nBERT-base ( Devlin et al. , 2019 ) *×* 1 100% *×* 1 BERT 12 All GLUE tasks, SQuAD\n\nBERT-small *×* 3.8 91% - BERT 4 *†* All GLUE tasks\n\nDistillation\n\nDistilBERT ( Sanh et al. , 2019a ) *×* 1.5 90% *<sup>§</sup>* *×* 1.6 BERT 6 All GLUE tasks, SQuAD\n\nBERT 6 -PKD ( Sun et al. , 2019a ) *×* 1.6 98% *×* 1.9 BERT 6 No WNLI, CoLA, STS-B; RACE\n\nBERT 3 -PKD ( Sun et al. , 2019a ) *×* 2.4 92% *×* 3.7 BERT 3 No WNLI, CoLA, STS-B; RACE\n\nAguilar et al. ( 2019 ), Exp. 3 *×* 1.6 93% - BERT 6 CoLA, MRPC, QQP, RTE\n\nBERT-48 ( Zhao et al. , 2019 ) *×* 62 87% *×* 77 BERT 12 *<sup>∗†</sup>* MNLI, MRPC, SST-2\n\nBERT-192 ( Zhao et al. , 2019 ) *×* 5.7 93% *×* 22 BERT 12 *<sup>∗†</sup>* MNLI, MRPC, SST-2\n\nTinyBERT ( Jiao et al. , 2019 ) *×* 7.5 96% *×* 9.4 BERT 4 *<sup>†</sup>* No WNLI; SQuAD\n\nMobileBERT ( Sun et al. , 2020 ) *×* 4.3 100% *×* 4 BERT 24 *<sup>†</sup>* No WNLI; SQuAD\n\nPD ( Turc et al. , 2019 ) *×* 1.6 98% *×* 2.5 *<sup>‡</sup>* BERT 6 *<sup>†</sup>* No WNLI, CoLA and STS-B\n\nWaLDORf ( Tian et al. , 2019 ) *×* 4.4 93% *×* 9 BERT 8 *<sup>†∥</sup>* SQuAD\n\nMiniLM ( Wang et al. , 2020b ) *×* 1.65 99% *×* 2 BERT 6 No WNLI, STS-B, MNLI mm ; SQuAD\n\nMiniBERT( Tsai et al. , 2019 ) *×* 6 *<sup>∗∗</sup>* 98% *×* 27 *<sup>∗∗</sup>* mBERT 3 *<sup>†</sup>* CoNLL-18 POS and morphology\n\nBiLSTM-soft ( Tang et al. , 2019 ) *×* 110 91% *×* 434 *<sup>‡</sup>* BiLSTM 1 MNLI, QQP, SST-2\n\nQuanti- zation Q-BERT-MP ( Shen et al. , 2019 ) *×* 13 98% *<sup>¶</sup>* - BERT 12 MNLI, SST-2, CoNLL-03, SQuAD\n\nBERT-QAT ( Zafrir et al. , 2019 ) *×* 4 99% - BERT 12 No WNLI, MNLI; SQuAD\n\nGOBO( Zadeh and Moshovos , 2020 ) *×* 9 *.* 8 99% - BERT 12 MNLI\n\nPruning McCarley et al. ( 2020 ), ff2 *×* 2.2 *<sup>‡</sup>* 98% *<sup>‡</sup>* *×* 1.9 *<sup>‡</sup>* BERT 24 SQuAD, Natural Questions\n\nRPP ( Guo et al. , 2019 ) *×* 1.7 *<sup>‡</sup>* 99% *<sup>‡</sup>* - BERT 24 No WNLI, STS-B; SQuAD\n\nSoft MvP ( Sanh et al. , 2020 ) *×* 33 94% *<sup>¶</sup>* - BERT 12 MNLI, QQP, SQuAD\n\nIMP ( Chen et al. , 2020 ), rewind 50% *×* 1.4- 2.5 94- 100% - BERT 12 No MNLI-mm; SQuAD\n\nOther ALBERT-base ( Lan et al. , 2020b ) *×* 9 97% - BERT 12 *<sup>†</sup>* MNLI, SST-2\n\nALBERT-xxlarge ( Lan et al. , 2020b ) *×* 0.47 107% - BERT 12 *<sup>†</sup>* MNLI, SST-2\n\nBERT-of-Theseus ( Xu et al. , 2020 ) *×* 1.6 98% *×* 1.9 BERT 6 No WNLI\n\nPoWER-BERT ( Goyal et al. , 2020 ) N/A 99% *×* 2- 4.5 BERT 12 No WNLI; RACE\n\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup\n\nfigures are given with respect to BERT base , unless indicated otherwise. Performance retention is measured as\n\na ratio of average scores achieved by a given model and by BERT base . The subscript in the model description\n\nreflects the number of layers used. *<sup>∗</sup>* Smaller vocabulary used. *<sup>†</sup>* The dimensionality of the hidden layers is reduced.\n\n*∥* Convolutional layers used. *‡* Compared to BERT large . *∗∗* Compared to mBERT. *§* As reported in ( Jiao et al. , 2019 ). *¶* In\n\ncomparison to the dev set.\n\nthis strategy often requires compatible hardware.\n\nAs discussed in section 6 , individual self-\n\nattention heads and BERT layers can be disabled\n\nwithout significant drop in performance ( Michel\n\net al. , 2019 ; Kovaleva et al. , 2019 ; Baan et al. ,\n\n2019 ). **Pruning** is a compression technique that\n\ntakes advantage of that fact, typically reducing the\n\namount of computation via zeroing out of certain\n\nparts of the large model. In structured pruning,\n\narchitecture blocks are dropped, as in LayerDrop\n\n( Fan et al. , 2019 ). In unstructured, the weights in\n\nthe entire model are pruned irrespective of their lo-\n\ncation, as in magnitude pruning ( Chen et al. , 2020 )\n\nor movement pruning ( Sanh et al. , 2020 ).\n\nPrasanna et al. ( 2020 ) and Chen et al. ( 2020 )", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "cation, as in magnitude pruning ( Chen et al. , 2020 )\n\nor movement pruning ( Sanh et al. , 2020 ).\n\nPrasanna et al. ( 2020 ) and Chen et al. ( 2020 )\n\nexplore BERT from the perspective of the lottery\n\nticket hypothesis ( Frankle and Carbin , 2019 ), look-\n\ning specifically at the \"winning\" subnetworks in\n\npre-trained BERT. They independently find that\n\nsuch subnetworks do exist, and that transferability\n\nbetween subnetworks for different tasks varies.\n\nIf the ultimate goal of training BERT is compres-\n\nsion, Li et al. ( 2020 ) recommend training larger\n\nmodels and compressing them heavily rather than\n\ncompressing smaller models lightly.\n\nOther techniques include decomposing BERT’s\n\nembedding matrix into smaller matrices ( Lan et al. ,\n\n2020a ), progressive module replacing ( Xu et al. ,\n\n2020 ) and dynamic elimination of intermediate en-\n\ncoder outputs ( Goyal et al. , 2020 ). See Ganesh et al.\n\n( 2020 ) for a more detailed discussion of compres-\n\nsion methods.\n\n### **6.3 Pruning and model analysis**\n\nThere is a nascent discussion around pruning as a\n\nmodel analysis technique. The basic idea is that\n\na compressed model a priori consists of elements\n\nthat are useful for prediction; therefore by finding\n\nout what they do we may find out what the whole\n\nnetwork does. For instance, BERT has heads that\n\nseem to encode frame-semantic relations, but dis-\n\nabling them might not hurt downstream task per-\n\nformance Kovaleva et al. ( 2019 ); this suggests that\n\nthis knowledge is not actually used.\n\nFor the base Transformer, Voita et al. ( 2019b )\n\nidentify the functions of self-attention heads and", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Chapter 3. IBM Cloud Paks: Middleware anywhere **47**\n\n#### **3.3.2 Core capabilities**\n\nIntegral to the IBM Cloud Pak for Automation is a set of containerized software, both IBM and\n\nopen source, which includes the following components:\n\n� IBM Business Automation Workflow\n\nManual workflows can easily disrupt or slow operations. Lack of transparency and\n\ndependencies on employees leave businesses vulnerable to various bottlenecks that\n\ncreate inefficiencies. Automating workflows safeguards against potential barriers and\n\nempowers business professionals to directly participate in designing business solutions.\n\nWorkflow automation orchestrates multiple business processes straight-through,\n\nhuman-assisted or case management within operations and provides visibility into each\n\nstep.\n\n� IBM Operational Decision Manager\n\nA business rules management system (BRMS) enables businesses to create and manage\n\nbusiness logic independently from applications and processes. Through business rules,\n\nyour team can specify decision logic in simple terms, close to natural language. Because\n\nrules are easily integrated with other IT systems, your applications can scale and run\n\nautomated decisions across multiple channels.\n\nWhen changes to business rules are required, business users can quickly update them,\n\nwhich provides the agility and speed that is needed to meet changing business demands.\n\nDecision automation uses business rules to remove manual work from a decision process,\n\nwhich improves business agility and reducing IT reliance.\n\n� IBM Business Automation Content Analyzer\n\nTo reinvent under-performing, high-friction business processes, enterprises are investing\n\nin digital transformation. This investment requires processes and applications to access\n\nand control a wide range of content, including documents, images, and audio files.\n\nContent services are accessible in multiple ways, including mobile devices and desktops,\n\nand as discrete capabilities embedded in workflows or applications, such as Enterprise\n\nResource Planning (ERP) systems. This content analyzer enables efficient, consistent,\n\nand accurate content collaboration and decision-making across the organization. Content\n\nservices are capabilities for collecting, governing, managing, and enriching enterprise\n\ncontent to be deployed efficiently across any cloud and within any application.\n\n� Process Mapping\n\nInefficient processes cost you time and money. Bottlenecks, complexities, and a lack of\n\nunderstanding mask opportunities for process improvement. Process modeling helps you\n\nto gain better visibility into business operations, which helps you create efficiencies at\n\nscale. Process mapping is any automation strategy’s first step. It enables non-technical\n\npeople to work across departments to see a process landscape.\n\n� Data Capture\n\nEnterprises produce and receive massive volumes of new information every day to make\n\ndecisions, manage operations, and create value. Most that information is inaccessible and\n\ninvisible to the business applications that need it most, which undermines the ability of\n\ndecision makers to truly understand the opportunities and constraints that are affecting\n\ntheir organization.", - "page_start": 62, - "page_end": 62, - "source_file": "sg248459.pdf" - }, - { - "text": "with *Bregman Proximal Point Optimization*\n\nhelps alleviate pre-trained knowledge forget-\n\nting and therefore prevents BERT from overfit-\n\nting to downstream tasks ( Jiang et al. , 2019a ).\n\n- **Mixout regularization** improves the stability\n\nof BERT fine-tuning even for a small number\n\nof training examples ( Lee et al. , 2019 ).\n\nWith large models, even fine-tuning becomes ex-\n\npensive, but Houlsby et al. ( 2019 ) show that it can\n\n5 Kondratyuk and Straka ( 2019 ) suggest that fine-tuning on\n\nUniversal Dependencies does result in syntactically meaning-\n\nful attention patterns, but there was no quantitative evaluation.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Diagonal Heterogeneous Vertical Vertical + diagonal Block\n\n[CLS] [CLS] [SEP] [SEP] [SEP] [SEP] [SEP] [SEP] [CLS] [CLS] [SEP] [SEP] [SEP] [SEP] [CLS]\n\nFigure 3: Attention patterns in BERT ( Kovaleva et al. , 2019 )\n\nies) insufficient ( Warstadt et al. , 2019 ). A given\n\nmethod might also favor one model over another,\n\ne.g., RoBERTa trails BERT with one tree extraction\n\nmethod, but leads with another ( Htut et al. , 2019 ).\n\nThe choice of linguistic formalism also matters\n\n( Kuznetsov and Gurevych , 2020 ).\n\nIn view of all that, the alternative is to focus on\n\nidentifying what BERT actually relies on at infer-\n\nence time. This direction is currently pursued both\n\nat the level of architecture blocks (to be discussed\n\nin detail in subsection 6.3 ), and at the level of in-\n\nformation encoded in model weights. Amnesic\n\nprobing ( Elazar et al. , 2020 ) aims to specifically\n\nremove certain information from the model and see\n\nhow it changes performance, finding, for example,\n\nthat language modeling does rely on part-of-speech\n\ninformation.\n\nAnother direction is information-theoretic prob-\n\ning. Pimentel et al. ( 2020 ) operationalize prob-\n\ning as estimating mutual information between the\n\nlearned representation and a given linguistic prop-\n\nerty, which highlights that the focus should be not\n\non the amount of information contained in a rep-\n\nresentation, but rather on how easily it can be ex-\n\ntracted from it. Voita and Titov ( 2020 ) quantify\n\nthe amount of effort needed to extract information\n\nfrom a given representation as minimum descrip-\n\ntion length needed to communicate both the probe\n\nsize and the amount of data required for it to do\n\nwell on a task.\n\n## **4 Localizing linguistic knowledge**\n\n### **4.1 BERT embeddings**\n\nIn studies of BERT, the term \"embedding\" refers\n\nto the output of a Transformer layer (typically, the\n\nfinal one). Both conventional static embeddings\n\n( Mikolov et al. , 2013 ) and BERT-style embeddings\n\ncan be viewed in terms of mutual information max-\n\nimization ( Kong et al. , 2019 ), but the latter are\n\n**contextualized** . Every token is represented by a\n\nvector dependent on the particular context of occur-\n\nrence, and contains at least some information about\n\nthat context ( Miaschi and Dell’Orletta , 2020 ).\n\nSeveral studies reported that **distilled contex-**\n\n#### **tualized embeddings better encode lexical se-**\n\n**mantic information** (i.e. they are better at tra-\n\nditional word-level tasks such as word similarity).\n\nThe methods to distill a contextualized represen-\n\ntation into static include aggregating the informa-\n\ntion across multiple contexts ( Akbik et al. , 2019 ;\n\nBommasani et al. , 2020 ), encoding \"semantically\n\nbleached\" sentences that rely almost exclusively on\n\nthe meaning of a given word (e.g. \"This is <>\")\n\n( May et al. , 2019 ), and even using contextualized\n\nembeddings to train static embeddings ( Wang et al. ,\n\n2020d ).\n\nBut this is not to say that there is no room for\n\nimprovement. Ethayarajh ( 2019 ) measure how\n\nsimilar the embeddings for identical words are in\n\nevery layer, reporting that later BERT layers pro- duce more context-specific representations <sup>3</sup> . They\n\nalso find that BERT embeddings occupy a narrow\n\ncone in the vector space, and this effect increases\n\nfrom the earlier to later layers. That is, **two ran-**\n\n#### **dom words will on average have a much higher**\n\n#### **cosine similarity than expected if embeddings**\n\n**were directionally uniform (isotropic)** . Since\n\nisotropy was shown to be beneficial for static word\n\nembeddings ( Mu and Viswanath , 2018 ), this might\n\nbe a fruitful direction to explore for BERT.\n\nSince BERT embeddings are contextualized, an\n\ninteresting question is to what extent they cap-\n\nture phenomena like polysemy and homonymy.\n\nThere is indeed evidence that **BERT’s contextu-**\n\n#### **alized embeddings form distinct clusters corre-**\n\n**sponding to word senses** ( Wiedemann et al. , 2019 ;", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv2_taclccby4_license.pdf", - "query": "Is syntaxis encoded with Bert model ?", - "target_page": 2, - "target_passage": " As far as how syntaxis represented, it seems that syntactic structure is not directly encoded in self-attention weights.", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "Figure 5: Pre-trained weights help BERT find wider\n\noptima in fine-tuning on MRPC (right) than training\n\nfrom scratch (left) ( Hao et al. , 2019 )\n\nbeddings as input for training BERT, while Po-\n\nerner et al. ( 2019 ) adapt entity vectors to BERT\n\nrepresentations. As mentioned above, Wang et al.\n\n( 2020c ) integrate knowledge not through entity em-\n\nbeddings, but through additional pre-training ob-\n\njective of knowledge base completion. Sun et al.\n\n( 2019b , c ) modify the standard MLM task to mask\n\nnamed entities rather than random words, and Yin\n\net al. ( 2020 ) train with MLM objective over both\n\ntext and linearized table data. Wang et al. ( 2020a )\n\nenhance RoBERTa with both linguistic and factual\n\nknowledge with task-specific adapters.\n\nPre-training is the most expensive part of train-\n\ning BERT, and it would be informative to know\n\nhow much benefit it provides. On some tasks, a\n\nrandomly initialized and fine-tuned BERT obtains\n\ncompetitive or higher results than the pre-trained\n\nBERT with the task classifier and frozen weights\n\n( Kovaleva et al. , 2019 ). The consensus in the com-\n\nmunity is that pre-training does help in most situa-\n\ntions, but the degree and its exact contribution re-\n\nquires further investigation. Prasanna et al. ( 2020 )\n\nfound that *most* weights of pre-trained BERT are\n\nuseful in fine-tuning, although there are \"better\"\n\nand \"worse\" subnetworks. One explanation is that\n\npre-trained weights help the fine-tuned BERT find\n\nwider and flatter areas with smaller generalization\n\nerror, which makes the model more robust to over-\n\nfitting (see Figure 5 from Hao et al. ( 2019 )).\n\nGiven the large number and variety of proposed\n\nmodifications, one would wish to know how much\n\nimpact each of them has. However, due to the\n\noverall trend towards large model sizes, systematic\n\nablations have become expensive. Most new mod-\n\nels claim superiority on standard benchmarks, but\n\ngains are often marginal, and estimates of model\n\nstability and significance testing are very rare.\n\n### **5.4 Fine-tuning BERT**\n\nPre-training + fine-tuning workflow is a crucial\n\npart of BERT. The former is supposed to provide\n\ntask-independent knowledge, and the latter would\n\npresumably teach the model to rely more on the\n\nrepresentations useful for the task at hand.\n\nKovaleva et al. ( 2019 ) did not find that to be the case for BERT fine-tuned on GLUE tasks <sup>5</sup> : dur-\n\ning fine-tuning, the most changes for 3 epochs oc-\n\ncurred in the last two layers of the models, but those\n\nchanges caused self-attention to focus on [SEP]\n\nrather than on linguistically interpretable patterns.\n\nIt is understandable why fine-tuning would increase\n\nthe attention to [CLS] , but not [SEP] . If Clark\n\net al. ( 2019 ) are correct that [SEP] serves as \"no-\n\nop\" indicator, fine-tuning basically tells BERT what\n\nto ignore.\n\nSeveral studies explored the possibilities of im-\n\nproving the fine-tuning of BERT:\n\n- **Taking more layers into account** : learning\n\na complementary representation of the infor-\n\nmation in deep and output layers ( Yang and\n\nZhao , 2019 ), using a weighted combination\n\nof all layers instead of the final one ( Su and\n\nCheng , 2019 ; Kondratyuk and Straka , 2019 ),\n\nand layer dropout ( Kondratyuk and Straka ,\n\n2019 ).\n\n- **Two-stage fine-tuning** introduces an inter-\n\nmediate supervised training stage between\n\npre-training and fine-tuning ( Phang et al. ,\n\n2019 ; Garg et al. , 2020 ; Arase and Tsujii ,\n\n2019 ; Pruksachatkun et al. , 2020 ; Glavaš and\n\nVuli´c , 2020 ). Ben-David et al. ( 2020 ) propose\n\na pivot-based variant of MLM to fine-tune\n\nBERT for domain adaptation.\n\n- **Adversarial token perturbations** improve\n\nrobustness of the model ( Zhu et al. , 2019 ).\n\n- **Adversarial regularization** in combination\n\nwith *Bregman Proximal Point Optimization*\n\nhelps alleviate pre-trained knowledge forget-\n\nting and therefore prevents BERT from overfit-\n\nting to downstream tasks ( Jiang et al. , 2019a ).", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "layers are more transferable ( Liu et al. , 2019a ). In\n\nfine-tuning, it explains why the final layers change\n\nthe most ( Kovaleva et al. , 2019 ), and why restoring\n\nthe weights of lower layers of fine-tuned BERT to\n\ntheir original values does not dramatically hurt the\n\nmodel performance ( Hao et al. , 2019 ).\n\nTenney et al. ( 2019a ) suggest that while syntactic\n\ninformation appears early in the model and can be\n\nlocalized, **semantics is spread across the entire**\n\n**model** , which explains why certain non-trivial ex-\n\namples get solved incorrectly at first but correctly\n\nat the later layers. This is rather to be expected:\n\nsemantics permeates all language, and linguists de-\n\nbate whether meaningless structures can exist at\n\nall ( Goldberg , 2006 , p.166-182). But this raises\n\nthe question of what stacking more Transformer\n\nlayers in BERT actually achieves in terms of the\n\nspread of semantic knowledge, and whether that\n\nis beneficial. Tenney et al. compared BERT-base\n\nand BERT-large, and found that the overall pattern\n\nof cumulative score gains is the same, only more\n\nspread out in the larger model.\n\nNote that Tenney et al. ( 2019a )’s experiments\n\nconcern sentence-level semantic relations; Cui et al.\n\n( 2020 ) report that the encoding of ConceptNet se-\n\nmantic relations is the worst in the early layers and\n\nincreases towards the top. Jawahar et al. ( 2019 )\n\nplace \"surface features in lower layers, syntactic\n\nfeatures in middle layers and semantic features in\n\nhigher layers\", but their conclusion is surprising,\n\ngiven that only one semantic task in this study actu-\n\nally topped at the last layer, and three others peaked\n\naround the middle and then considerably degraded\n\nby the final layers.\n\n## **5 Training BERT**\n\nThis section reviews the proposals to optimize the\n\ntraining and architecture of the original BERT.\n\n### **5.1 Model architecture choices**\n\nTo date, the most systematic study of BERT archi-\n\ntecture was performed by Wang et al. ( 2019b ), who\n\nexperimented with the number of layers, heads, and\n\nmodel parameters, varying one option and freez-\n\ning the others. They concluded that **the number**\n\n#### **of heads was not as significant as the number**\n\n**of layers** . That is consistent with the findings\n\nof Voita et al. ( 2019b ) and Michel et al. ( 2019 )\n\n( section 6 ), and also the observation by Liu et al.\n\n( 2019a ) that the middle layers were the most trans-\n\nferable. Larger hidden representation size was con-\n\nsistently better, but the gains varied by setting.\n\nAll in all, **changes in the number of heads**\n\n#### **and layers appear to perform different func-**\n\n**tions** . The issue of model depth must be related to\n\nthe information flow from the most task-specific\n\nlayers closer to the classifier ( Liu et al. , 2019a ),\n\nto the initial layers which appear to be the most\n\ntask-invariant ( Hao et al. , 2019 ), and where the\n\ntokens resemble the input tokens the most ( Brun-\n\nner et al. , 2020 ) (see subsection 4.3 ). If that is the\n\ncase, a deeper model has more capacity to encode\n\ninformation that is not task-specific.\n\nOn the other head, many self-attention heads\n\nin vanilla BERT seem to naturally learn the same\n\npatterns ( Kovaleva et al. , 2019 ). This explains\n\nwhy pruning them does not have too much impact.\n\nThe question that arises from this is how far we\n\ncould get with intentionally encouraging diverse\n\nself-attention patterns: theoretically, this would\n\nmean increasing the amount of information in the\n\nmodel with the same number of weights. Raganato\n\net al. ( 2020 ) show for Transformer-based machine\n\ntranslation we can simply pre-set the patterns that\n\nwe already know the model would learn, instead of\n\nlearning them from scratch.\n\nVanilla BERT is symmetric and balanced in\n\nterms of self-attention and feed-forward layers, but\n\nit may not have to be. For the base Transformer,\n\nPress et al. ( 2020 ) report benefits from more self-\n\nattention sublayers at the bottom and more feedfor-", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "report that an intermediate fine-tuning step with\n\nsupervised parsing does not make much difference\n\nfor downstream task performance.\n\n### **3.2 Semantic knowledge**\n\nTo date, more studies have been devoted to BERT’s\n\nknowledge of syntactic rather than semantic phe-\n\nnomena. However, we do have evidence from an\n\nMLM probing study that **BERT has some knowl-**\n\n**edge of semantic roles** ( Ettinger , 2019 ). BERT\n\neven displays some preference for the incorrect\n\nfillers for semantic roles that are semantically re-\n\nlated to the correct ones, as opposed to those that\n\nare unrelated (e.g. \"to tip a chef\" is better than \"to\n\ntip a robin\", but worse than \"to tip a waiter\").\n\nTenney et al. ( 2019b ) showed that **BERT en-**\n\n#### **codes information about entity types, relations,**\n\n**semantic roles, and proto-roles** , since this infor-\n\nmation can be detected with probing classifiers.\n\n#### **BERT struggles with representations of num-**\n\n**bers.** Addition and number decoding tasks showed\n\nthat BERT does not form good representations for\n\nfloating point numbers and fails to generalize away\n\nfrom the training data ( Wallace et al. , 2019b ). A\n\npart of the problem is BERT’s wordpiece tokeniza-\n\ntion, since numbers of similar values can be divided\n\nup into substantially different word chunks.\n\nOut-of-the-box **BERT is surprisingly brittle to**\n\n**named entity replacements** : e.g. replacing names\n\nin the coreference task changes 85% of predictions\n\n( Balasubramanian et al. , 2020 ). This suggests that\n\nthe model does not actually form a generic idea of\n\nnamed entities, although its F1 scores on NER prob-\n\ning tasks are high ( Tenney et al. , 2019a ). Broscheit\n\n( 2019 ) find that fine-tuning BERT on Wikipedia\n\nentity linking \"teaches\" it additional entity knowl-\n\nedge, which would suggest that it did not absorb all\n\nthe relevant entity information during pre-training\n\non Wikipedia.\n\n### **3.3 World knowledge**\n\nThe bulk of evidence about commonsense knowl-\n\nedge captured in BERT comes from practitioners\n\nusing it to extract such knowledge. One direct prob-\n\ning study of BERT reports that **BERT struggles**\n\n#### **with pragmatic inference and role-based event**\n\n**knowledge** ( Ettinger , 2019 ). BERT also struggles\n\nwith abstract attributes of objects, as well as visual\n\nand perceptual properties that are likely to be as-\n\nsumed rather than mentioned ( Da and Kasai , 2019 ).\n\nThe MLM component of BERT is easy to\n\nadapt for knowledge induction by filling in the\n\n#### **Abstract**\n\nRecent progress in pretraining language mod-\n\nels on large textual corpora led to a surge\n\nof improvements for downstream NLP tasks.\n\nWhilst learning linguistic knowledge, these\n\nmodels may also be storing relational knowl-\n\nedge present in the training data, and may\n\nbe able to answer queries structured as “fill-\n\nin-the-blank” cloze statements. Language\n\nmodels have many advantages over structured\n\nknowledge bases: they require no schema en-\n\ngineering, allow practitioners to query about\n\nan open class of relations, are easy to extend to\n\nmore data, and require no human supervision\n\nto train. We present an in-depth analysis of the\n\nrelational knowledge already present (without\n\nfine-tuning) in a wide range of state-of-the-\n\nart pretrained language models. We find that\n\n(i) without fine-tuning, BERT contains rela-\n\ntional knowledge competitive with traditional\n\nNLP methods that have some access to ora-\n\ncle knowledge, (ii) BERT also does remark-\n\nably well on open-domain question answer-\n\ning against a supervised baseline, and (iii) cer-\n\ntain types of factual knowledge are learned\n\nmuch more readily than others by standard lan-\n\nguage model pretraining approaches. The sur-\n\nprisingly strong ability of these models to re-\n\ncall factual knowledge without any fine-tuning\n\ndemonstrates their potential as unsupervised\n\nopen-domain QA systems. The code to re-\n\nproduce our analysis is available at https:\n\n//github.com/facebookresearch/LAMA .", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "be successfully approximated with adapter mod-\n\nules. They achieve competitive performance on\n\n26 classification tasks at a fraction of the computa-\n\ntional cost. Adapters in BERT were also used for\n\nmulti-task learning ( Stickland and Murray , 2019 )\n\nand cross-lingual transfer ( Artetxe et al. , 2019 ). An\n\nalternative to fine-tuning is extracting features from\n\nfrozen representations, but fine-tuning works better\n\nfor BERT ( Peters et al. , 2019b ).\n\nA big methodological challenge in the current\n\nNLP is that the reported performance improve-\n\nments of new models may well be within varia-\n\ntion induced by environment factors ( Crane , 2018 ).\n\nBERT is not an exception. Dodge et al. ( 2020 )\n\nreport significant variation for BERT fine-tuned\n\non GLUE tasks due to both weight initialization\n\nand training data order. They also propose early\n\nstopping on the less-promising seeds.\n\nAlthough we hope that the above observations\n\nmay be useful for the practitioners, this section\n\ndoes not exhaust the current research on fine-tuning\n\nand its alternatives. For example, we do not cover\n\nsuch topics as Siamese architectures, policy gradi-\n\nent training, automated curriculum learning, and\n\nothers.\n\n## **6 How big should BERT be?**\n\n### **6.1 Overparameterization**\n\nTransformer-based models keep growing by or-\n\nders of magnitude: the 110M parameters of base\n\nBERT are now dwarfed by 17B parameters of\n\nTuring-NLG ( Microsoft , 2020 ), which is dwarfed\n\nby 175B of GPT-3 ( Brown et al. , 2020 ). This trend\n\nraises concerns about computational complexity\n\nof self-attention ( Wu et al. , 2019a ), environmental\n\nissues ( Strubell et al. , 2019 ; Schwartz et al. , 2019 ),\n\nfair comparison of architectures ( Aßenmacher and\n\nHeumann , 2020 ), and reproducibility.\n\nHuman language is incredibly complex, and\n\nwould perhaps take many more parameters to de-\n\nscribe fully, but the current models do not make\n\ngood use of the parameters they already have. Voita\n\net al. ( 2019b ) showed that **all but a few Trans-**\n\n#### **former heads could be pruned without signif-**\n\n**icant losses in performance** . For BERT, Clark\n\net al. ( 2019 ) observe that most heads in the same\n\nlayer show similar self-attention patterns (perhaps\n\nrelated to the fact that the output of all self-attention\n\nheads in a layer is passed through the same MLP),\n\nwhich explains why Michel et al. ( 2019 ) were able\n\nto reduce most layers to a single head.\n\nDepending on the task, some BERT heads/layers\n\nare not only redundant ( Kao et al. , 2020 ), but also\n\nharmful to the downstream task performance. **Pos-**\n\n**itive effect from head disabling** was reported for\n\nmachine translation ( Michel et al. , 2019 ), abstrac-\n\ntive summarization ( Baan et al. , 2019 ), and GLUE\n\ntasks ( Kovaleva et al. , 2019 ). Additionally, Ten-\n\nney et al. ( 2019a ) examine the cumulative gains of\n\ntheir structural probing classifier, observing that in\n\n5 out of 8 probing tasks some layers cause a drop\n\nin scores (typically in the final layers). Gordon\n\net al. ( 2020 ) find that 30- 40% of the weights can\n\nbe pruned without impact on downstream tasks.\n\nIn general, larger BERT models perform better\n\n( Liu et al. , 2019a ; Roberts et al. , 2020 ), but not\n\nalways: BERT-base outperformed BERT-large on\n\nsubject-verb agreement ( Goldberg , 2019 ) and sen-\n\ntence subject detection ( Lin et al. , 2019 ). Given\n\nthe complexity of language, and amounts of pre-\n\ntraining data, it is not clear why BERT ends up with\n\nredundant heads and layers. Clark et al. ( 2019 ) sug-\n\ngest that one possible reason is the use of attention\n\ndropouts, which causes some attention weights to\n\nbe zeroed-out during training.\n\n### **6.2 Compression techniques**\n\nGiven the above evidence of overparameteriza-\n\ntion, it does not come as a surprise that **BERT**\n\n#### **can be efficiently compressed with minimal ac-**\n\n**curacy loss** , which would be highly desirable for\n\nreal-world applications. Such efforts to date are", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "## **A Primer in BERTology: What We Know About How BERT Works**\n\n### **Anna Rogers**\n\nCenter for Social Data Science\n\nUniversity of Copenhagen\n\narogers@sodas.ku.dk\n\n### **Olga Kovaleva**\n\nDept. of Computer Science\n\nUniversity of Massachusetts Lowell\n\nokovalev@cs.uml.edu\n\n### **Anna Rumshisky**\n\nDept. of Computer Science\n\nUniversity of Massachusetts Lowell\n\narum@cs.uml.edu\n\n### **Abstract**\n\nTransformer-based models have pushed state\n\nof the art in many areas of NLP, but our un-\n\nderstanding of what is behind their success\n\nis still limited. This paper is the first sur-\n\nvey of over 150 studies of the popular BERT\n\nmodel. We review the current state of knowl-\n\nedge about how BERT works, what kind\n\nof information it learns and how it is repre-\n\nsented, common modifications to its training\n\nobjectives and architecture, the overparame-\n\nterization issue and approaches to compres-\n\nsion. We then outline directions for future\n\nresearch.\n\n## **1 Introduction**\n\nSince their introduction in 2017, Transformers\n\n( Vaswani et al. , 2017 ) have taken NLP by storm,\n\noffering enhanced parallelization and better model-\n\ning of long-range dependencies. The best known\n\nTransformer-based model is BERT ( Devlin et al. ,\n\n2019 ); it obtained state-of-the-art results in numer-\n\nous benchmarks and is still a must-have baseline.\n\nWhile it is clear that BERT works remarkably\n\nwell, it is less clear *why* , which limits further\n\nhypothesis-driven improvement of the architecture.\n\nUnlike CNNs, the Transformers have little cogni-\n\ntive motivation, and the size of these models limits\n\nour ability to experiment with pre-training and per-\n\nform ablation studies. This explains a large number\n\nof studies over the past year that attempted to un-\n\nderstand the reasons behind BERT’s performance.\n\nIn this paper, we provide an overview of what\n\nhas been learned to date, highlighting the questions\n\nwhich are still unresolved. We first consider the\n\nlinguistic aspects of it, i.e., the current evidence\n\nregarding the types of linguistic and world knowl-\n\nedge learned by BERT, as well as where and how\n\nthis knowledge may be stored in the model. We\n\nthen turn to the technical aspects of the model and\n\nprovide an overview of the current proposals to\n\nimprove BERT’s architecture, pre-training and fine-\n\ntuning. We conclude by discussing the issue of\n\noverparameterization, the approaches to compress-\n\ning BERT, and the nascent area of pruning as a\n\nmodel analysis technique.\n\n## **2 Overview of BERT architecture**\n\nFundamentally, BERT is a stack of Transformer\n\nencoder layers ( Vaswani et al. , 2017 ) which consist\n\nof multiple self-attention \"heads\". For every input\n\ntoken in a sequence, each head computes key, value\n\nand query vectors, used to create a weighted repre-\n\nsentation. The outputs of all heads in the same layer\n\nare combined and run through a fully-connected\n\nlayer. Each layer is wrapped with a skip connection\n\nand followed by layer normalization.\n\nThe conventional workflow for BERT consists\n\nof two stages: pre-training and fine-tuning. Pre-\n\ntraining uses two self-supervised tasks: masked\n\nlanguage modeling (MLM, prediction of randomly\n\nmasked input tokens) and next sentence prediction\n\n(NSP, predicting if two input sentences are adjacent\n\nto each other). In fine-tuning for downstream ap-\n\nplications, one or more fully-connected layers are\n\ntypically added on top of the final encoder layer.\n\nThe input representations are computed as fol-\n\nlows: each word in the input is first tokenized into\n\nwordpieces ( Wu et al. , 2016 ), and then three em-\n\nbedding layers (token, position, and segment) are\n\ncombined to obtain a fixed-length vector. Special\n\ntoken [CLS] is used for classification predictions,\n\nand [SEP] separates input segments.\n\nGoogle <sup>1</sup> and HuggingFace ( Wolf et al. , 2020 )\n\nprovide many variants of BERT, including the orig-\n\ninal \"base\" and \"large\" versions. They vary in the\n\nnumber of heads, layers, and hidden state size.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "## **3 What knowledge does BERT have?**\n\nA number of studies have looked at the knowledge\n\nencoded in BERT weights. The popular approaches\n\ninclude fill-in-the-gap probes of MLM, analysis of\n\nself-attention weights, and probing classifiers with\n\ndifferent BERT representations as inputs.\n\n### **3.1 Syntactic knowledge**\n\nLin et al. ( 2019 ) showed that **BERT represen-**\n\n**tations are hierarchical rather than linear** , i.e.\n\nthere is something akin to syntactic tree structure\n\nin addition to the word order information. Ten-\n\nney et al. ( 2019b ) and Liu et al. ( 2019a ) also\n\nshowed that **BERT embeddings encode informa-**\n\n#### **tion about parts of speech, syntactic chunks**\n\n**and roles** . Enough syntactic information seems\n\nto be captured in the token embeddings themselves\n\nto recover syntactic trees ( Vilares et al. , 2020 ; Kim\n\net al. , 2020 ; Rosa and Mareˇcek , 2019 ), although\n\nprobing classifiers could not recover the labels of\n\ndistant parent nodes in the syntactic tree ( Liu et al. ,\n\n2019a ). Warstadt and Bowman ( 2020 ) report evi-\n\ndence of hierarchical structure in three out of four\n\nprobing tasks.\n\nAs far as *how* syntax is represented, it seems\n\nthat **syntactic structure is not directly encoded**\n\n**in self-attention weights** . Htut et al. ( 2019 ) were\n\nunable to extract full parse trees from BERT heads\n\neven with the gold annotations for the root. Jawahar\n\net al. ( 2019 ) include a brief illustration of a depen-\n\ndency tree extracted directly from self-attention\n\nweights, but provide no quantitative evaluation.\n\nHowever, **syntactic information can be recov-**\n\n**ered from BERT token representations** . Hewitt\n\nand Manning ( 2019 ) were able to learn transfor-\n\nmation matrices that successfully recovered syn-\n\ntactic dependencies in PennTreebank data from\n\nBERT’s token embeddings (see also Manning et al. ,\n\n2020 ). Jawahar et al. ( 2019 ) experimented with\n\ntransformations of the [CLS] token using Tensor\n\nProduct Decomposition Networks ( McCoy et al. ,\n\n2019a ), concluding that dependency trees are the\n\nbest match among 5 decomposition schemes (al-\n\nthough the reported MSE differences are very\n\nsmall). Miaschi and Dell’Orletta ( 2020 ) performs\n\na range of syntactic probing experiments with con-\n\ncatenated token representations as input.\n\nNote that all these approaches look for the\n\nevidence of gold-standard linguistic structures,\n\nand add some amount of extra knowledge to the\n\nprobe. Most recently, Wu et al. ( 2020 ) proposed a 4168\n\n[CLS] For those who follow social media transitions on Capitol Hill , this will be a little different .\n\n[CLS]\n\nFor\n\nthose\n\nwho\n\nfollow\n\nsocial\n\nmedia\n\ntransitions\n\non\n\nCapitol\n\nHill\n\n,\n\nthis\n\nwill\n\nbe\n\na\n\nlittle\n\ndifferent\n\n. 0\n\n1\n\n2\n\n3\n\n4\n\n5\n\nFigure 1: Heatmap of the impact matrix for the sen-\n\ntence “For those who follow social media transitions\n\non Capitol Hill, this will be a little different.”\n\n## **3 Visualization with Impact Maps**\n\nBefore we discuss specific syntactic phenomena,\n\nlet us first analyze some example impact matri-\n\nces derived from sample sentences. We visual-\n\nize an impact matrix of a sentence by displaying\n\na heatmap. We use the term “impact map” to refer\n\nto a heatmap of an impact matrix.\n\n**Setup.** We extract impact matrices by feed-\n\ning BERT with 1,000 sentences from the English\n\nParallel Universal Dependencies (PUD) treebank\n\nof the CoNLL 2017 Shared Task ( Zeman et al. ,\n\n2017 ). We follow the setup and pre-processing\n\nsteps employed in pre-training BERT. An example\n\nimpact map is shown in Figure 1 .\n\n**Dependency.** We notice that the impact map\n\ncontains many *stripes* , which are short series of\n\nvertical/horizontal cells, typically located along\n\nthe diagonal. Take the word “ *different* ” as an ex-\n\nample (which is illustrated by the second-to-last\n\ncolumn in the impact matrix). We observe a clear\n\nvertical stripe above the main diagonal. The inter-\n\npretation is that this particular occurrence of the", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "demonstrates their potential as unsupervised\n\nopen-domain QA systems. The code to re-\n\nproduce our analysis is available at https:\n\n//github.com/facebookresearch/LAMA .\n\n## **1 Introduction**\n\nRecently, pretrained high-capacity language mod-\n\nels such as ELMo ( Peters et al. , 2018a ) and BERT\n\n( Devlin et al. , 2018a ) have become increasingly\n\nimportant in NLP. They are optimised to either\n\npredict the next word in a sequence or some\n\nmasked word anywhere in a given sequence ( *e.g.*\n\n“Dante was born in [M ask ] in the year 1265.”).\n\nThe parameters of these models appear to store\n\nSymbolic\n\nMemory Access\n\nNeural LM\n\nMemory Access\n\n( Dante , born-in , **X** )\n\n“Dante was born in [Mask] .”\n\nDante\n\nFlorence\n\nborn-in\n\nFlorence\n\nFlorence\n\n**KG**\n\n**LM**\n\n*e.g.* ELMo/BERT\n\nFigure 1: Querying knowledge bases (KB) and lan-\n\nguage models (LM) for factual knowledge.\n\nvast amounts of linguistic knowledge ( Peters et al. ,\n\n2018b ; Goldberg , 2019 ; Tenney et al. , 2019 ) use-\n\nful for downstream tasks. This knowledge is\n\nusually accessed either by conditioning on latent\n\ncontext representations produced by the original\n\nmodel or by using the original model weights to\n\ninitialize a task-specific model which is then fur-\n\nther fine-tuned. This type of knowledge transfer\n\nis crucial for current state-of-the-art results on a\n\nwide range of tasks.\n\nIn contrast, knowledge bases are e ff ective so-\n\nlutions for accessing annotated gold-standard re-\n\nlational data by enabling queries such as (D ante ,\n\nborn-in , **X** ). However, in practice we often need\n\nto *extract* relational data from text or other modal-\n\nities to populate these knowledge bases. This\n\nrequires complex NLP pipelines involving entity\n\nextraction, coreference resolution, entity linking\n\nand relation extraction ( Surdeanu and Ji , 2014 )—\n\ncomponents that often need supervised data and\n\nfixed schemas. Moreover, errors can easily prop-\n\nagate and accumulate throughout the pipeline. In-\n\nstead, we could attempt to query neural language\n\nmodels for relational data by asking them to fill in\n\nmasked tokens in sequences like “Dante was born\n\narXiv:1909.01066v2 [cs.CL] 4 Sep 2019 Figure 2: BERT world knowledge ( Petroni et al. , 2019 )\n\nblanks (e.g. \"Cats like to chase [___]\"). Petroni\n\net al. ( 2019 ) showed that, **for some relation types,**\n\n#### **vanilla BERT is competitive with methods rely-**\n\n**ing on knowledge bases** ( Figure 2 ), and Roberts\n\net al. ( 2020 ) show the same for open-domain QA\n\nusing T5 model ( Raffel et al. , 2019 ). Davison et al.\n\n( 2019 ) suggest that it generalizes better to unseen\n\ndata. In order to retrieve BERT’s knowledge, we\n\nneed good template sentences, and there is work\n\non their automatic extraction and augmentation\n\n( Bouraoui et al. , 2019 ; Jiang et al. , 2019b ).\n\nHowever, **BERT cannot reason based on its**\n\n**world knowledge** . Forbes et al. ( 2019 ) show that\n\nBERT can \"guess\" the affordances and properties of\n\nmany objects, but can not reason about the relation-\n\nship between properties and affordances. For ex-\n\nample, it “knows\" that people can walk into houses,\n\nand that houses are big, but it cannot infer that\n\nhouses are bigger than people. Zhou et al. ( 2020 )\n\nand Richardson and Sabharwal ( 2019 ) also show\n\nthat the performance drops with the number of nec-\n\nessary inference steps. Some of BERT’s world\n\nknowledge success comes from learning stereotypi-\n\ncal associations ( Poerner et al. , 2019 ), e.g., a person\n\nwith an Italian-sounding name is predicted to be\n\nItalian, even when it is incorrect.\n\n### **3.4 Limitations**\n\nMultiple probing studies in section 3 and section 4\n\nreport that BERT possesses a surprising amount of\n\nsyntactic, semantic, and world knowledge. How-\n\never, Tenney et al. ( 2019a ) remarks, “the fact that\n\na linguistic pattern is not observed by our probing\n\nclassifier does not guarantee that it is not there, and\n\nthe observation of a pattern does not tell us how it", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "Diagonal Heterogeneous Vertical Vertical + diagonal Block\n\n[CLS] [CLS] [SEP] [SEP] [SEP] [SEP] [SEP] [SEP] [CLS] [CLS] [SEP] [SEP] [SEP] [SEP] [CLS]\n\nFigure 3: Attention patterns in BERT ( Kovaleva et al. , 2019 )\n\nies) insufficient ( Warstadt et al. , 2019 ). A given\n\nmethod might also favor one model over another,\n\ne.g., RoBERTa trails BERT with one tree extraction\n\nmethod, but leads with another ( Htut et al. , 2019 ).\n\nThe choice of linguistic formalism also matters\n\n( Kuznetsov and Gurevych , 2020 ).\n\nIn view of all that, the alternative is to focus on\n\nidentifying what BERT actually relies on at infer-\n\nence time. This direction is currently pursued both\n\nat the level of architecture blocks (to be discussed\n\nin detail in subsection 6.3 ), and at the level of in-\n\nformation encoded in model weights. Amnesic\n\nprobing ( Elazar et al. , 2020 ) aims to specifically\n\nremove certain information from the model and see\n\nhow it changes performance, finding, for example,\n\nthat language modeling does rely on part-of-speech\n\ninformation.\n\nAnother direction is information-theoretic prob-\n\ning. Pimentel et al. ( 2020 ) operationalize prob-\n\ning as estimating mutual information between the\n\nlearned representation and a given linguistic prop-\n\nerty, which highlights that the focus should be not\n\non the amount of information contained in a rep-\n\nresentation, but rather on how easily it can be ex-\n\ntracted from it. Voita and Titov ( 2020 ) quantify\n\nthe amount of effort needed to extract information\n\nfrom a given representation as minimum descrip-\n\ntion length needed to communicate both the probe\n\nsize and the amount of data required for it to do\n\nwell on a task.\n\n## **4 Localizing linguistic knowledge**\n\n### **4.1 BERT embeddings**\n\nIn studies of BERT, the term \"embedding\" refers\n\nto the output of a Transformer layer (typically, the\n\nfinal one). Both conventional static embeddings\n\n( Mikolov et al. , 2013 ) and BERT-style embeddings\n\ncan be viewed in terms of mutual information max-\n\nimization ( Kong et al. , 2019 ), but the latter are\n\n**contextualized** . Every token is represented by a\n\nvector dependent on the particular context of occur-\n\nrence, and contains at least some information about\n\nthat context ( Miaschi and Dell’Orletta , 2020 ).\n\nSeveral studies reported that **distilled contex-**\n\n#### **tualized embeddings better encode lexical se-**\n\n**mantic information** (i.e. they are better at tra-\n\nditional word-level tasks such as word similarity).\n\nThe methods to distill a contextualized represen-\n\ntation into static include aggregating the informa-\n\ntion across multiple contexts ( Akbik et al. , 2019 ;\n\nBommasani et al. , 2020 ), encoding \"semantically\n\nbleached\" sentences that rely almost exclusively on\n\nthe meaning of a given word (e.g. \"This is <>\")\n\n( May et al. , 2019 ), and even using contextualized\n\nembeddings to train static embeddings ( Wang et al. ,\n\n2020d ).\n\nBut this is not to say that there is no room for\n\nimprovement. Ethayarajh ( 2019 ) measure how\n\nsimilar the embeddings for identical words are in\n\nevery layer, reporting that later BERT layers pro- duce more context-specific representations <sup>3</sup> . They\n\nalso find that BERT embeddings occupy a narrow\n\ncone in the vector space, and this effect increases\n\nfrom the earlier to later layers. That is, **two ran-**\n\n#### **dom words will on average have a much higher**\n\n#### **cosine similarity than expected if embeddings**\n\n**were directionally uniform (isotropic)** . Since\n\nisotropy was shown to be beneficial for static word\n\nembeddings ( Mu and Viswanath , 2018 ), this might\n\nbe a fruitful direction to explore for BERT.\n\nSince BERT embeddings are contextualized, an\n\ninteresting question is to what extent they cap-\n\nture phenomena like polysemy and homonymy.\n\nThere is indeed evidence that **BERT’s contextu-**\n\n#### **alized embeddings form distinct clusters corre-**\n\n**sponding to word senses** ( Wiedemann et al. , 2019 ;", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "the pretraining task.\n\n**5.2 Results and Discussion**\n\nFigure 4 presents the performance of softmax clas-\n\nsifiers trained to perform the bidirectional lan-\n\nguage modeling task, given just the CWR s as in-\n\nput. We notice that higher layers in recurrent mod-\n\nels consistently achieve lower perplexities. Inter-\n\nis the vector ori\n\nduring pretrain\n\ning performanc\n\ntations that are\n\ning are also tho\n\nperformance (F\n\nalizer layers tr\n\nand task-specif\n\nThese result\n\nlayerwise beha\n\nmoving up the\n\nspecific repres\n\nhold for transf\n\ndifferences bet\n\nan active area o\n\net al. , 2018 ), a\n\nthese observatio\n\nThese obser\n\nfreezing metho\n\nwhere the mode\n\n(starting from\n\ntuning process.\n\nlevel LSTM lay\n\ntraining task-sp\n\ntuned a bit mor\n\nately task spec\n\nthe LSTM alre\n\ntures, and may\n\n## **6 Transferr**\n\nSuccessful pre\n\nself-supervised\n\nguage modeling\n\ntence predictio\n\nable the use o\n\nHowever, cont\n\non explicitly s\n\npretrained *sent*\n\nneau et al. , 20\n\nthe choice of p\n\ntic knowledge w\n\nwe compare p\n\nexplicitly-super\n\nguage model pr\n\nFigure 4: BERT layer transferability (columns corre-\n\nspond to probing tasks, Liu et al. ( 2019a ).\n\nof hierarchical sentence structure, as detected by\n\nthe probing tasks of predicting the token index, the\n\nmain auxiliary verb and the sentence subject.\n\nThere is a wide consensus in studies with differ-\n\nent tasks, datasets and methodologies that **syntac-**\n\n**tic information is most prominent in the middle layers of BERT.** <sup>4</sup> Hewitt and Manning ( 2019 ) had\n\nthe most success reconstructing syntactic tree depth\n\nfrom the middle BERT layers (6-9 for base-BERT,\n\n14-19 for BERT-large). Goldberg ( 2019 ) reports\n\nthe best subject-verb agreement around layers 8-\n\n9, and the performance on syntactic probing tasks\n\nused by Jawahar et al. ( 2019 ) also seems to peak\n\naround the middle of the model. The prominence\n\nof syntactic information in the middle BERT layers\n\nis related to Liu et al. ( 2019a )’s observation that the\n\nmiddle layers of Transformers are best-performing\n\noverall and the most transferable across tasks (see\n\nFigure 4 ).\n\nThere is **conflicting evidence about syntactic**\n\n**chunks** . Tenney et al. ( 2019a ) conclude that \"the\n\nbasic syntactic information appears earlier in the\n\nnetwork while high-level semantic features appear\n\nat the higher layers\", drawing parallels between\n\nthis order and the order of components in a typical\n\nNLP pipeline - from POS-tagging to dependency\n\nparsing to semantic role labeling. Jawahar et al.\n\n( 2019 ) also report that the lower layers were more\n\nuseful for chunking, while middle layers were more\n\nuseful for parsing. At the same time, the probing\n\nexperiments by Liu et al. ( 2019a ) find the opposite:\n\nboth POS-tagging and chunking were performed\n\nbest at the middle layers, in both BERT-base and\n\nBERT-large. However, all three studies use differ-\n\nent suites of probing tasks.\n\n#### **The final layers of BERT are the most task-**\n\n**specific** . In pre-training, this means specificity to\n\nthe MLM task, which explains why the middle\n\n4 These BERT results are also compatible with findings by\n\nVig and Belinkov ( 2019 ), who report the highest attention to\n\ntokens in dependency relations in the middle layers of GPT-2.", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "� � # Initialize model for single subject\n\nsingle_subject_model = create_model(\n\nagent, # ActionModels agent object\n\npriors, # Dictionary with parameter priors\n\nobservations, # Vector of observations\n\nactions, # Vector of actions\n\n) � � If we have multiple subjects whose parameters we wish to estimate, we can achieve this\n\nby passing a dataframe object to the same function. Here, we specify which columns are\n\nactions and inputs, as well as which column to use for grouping the specific time series: � � # Initialize model for multiple subjects\n\nmultiple_subjects_model = create_model(\n\nagent, # ActionModels agent\n\npriors, # Dictionary with parameter priors\n\ndata; # Dataframe with data from multiple subjects\n\ngrouping_cols = [ \"ID\" ], # Column to split dataframe\n\ninput_cols = [ \"observations\" ], # Columns with observations\n\naction_cols = [ \"actions\" ], # Columns with actions\n\n) � � This model can be used as a normal Turing model object. ActionModels provides a conve-\n\nnience function for doing this with appropriate defaults: � � results = fit_model(\n\nsingle_subject_model; # Model object\n\nn_iterations = 1000 , # Number of iterations\n\nn_chains = 1 # Number of chains\n\n) � � The output of the fit_model function is an object containing the standard Turing chains,\n\nwhich we can use to access the chain statistics: � � # Extract the Chains object\n\nchains = results.chains\n\n#Rename the chains for interpretable parameter names\n\nrename_chains(chains, model) � � ActionModels provides a range of convenience functions for behavioural modelling. We can\n\nextract the posterior parameter estimates for each participant, and extract it in a convenient\n\ndata frame structure for later processing: � � # Extract quantities from the chain\n\nagent_parameters = extract_quantities(single_subject_model, chains)\n\n# Get posterior median\n\nestimates = get_estimates(agent_parameters) � � We can also sample parameter values from the prior and plot the posteriors against the priors: � � #Sample from the prior\n\nprior_chains = sample(single_subject_model, Prior(), 1000 )\n\n# Plot parameter distribution.\n\nplot_parameter_distribution(chains, prior_chains) � � See the documentation for ActionModels at [ github.com/ilabcode/ActionModels.jl](https://github.com/ilabcode/ActionModels.jl) for vari-\n\nous other functionalities, including modelling how parameters vary across a population ,", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed7_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv2_taclccby4_license.pdf", - "query": "Is BERT good with numbers representations ?", - "target_page": 3, - "target_passage": " BERTstruggles with representations of numbers. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "Figure 5: Pre-trained weights help BERT find wider\n\noptima in fine-tuning on MRPC (right) than training\n\nfrom scratch (left) ( Hao et al. , 2019 )\n\nbeddings as input for training BERT, while Po-\n\nerner et al. ( 2019 ) adapt entity vectors to BERT\n\nrepresentations. As mentioned above, Wang et al.\n\n( 2020c ) integrate knowledge not through entity em-\n\nbeddings, but through additional pre-training ob-\n\njective of knowledge base completion. Sun et al.\n\n( 2019b , c ) modify the standard MLM task to mask\n\nnamed entities rather than random words, and Yin\n\net al. ( 2020 ) train with MLM objective over both\n\ntext and linearized table data. Wang et al. ( 2020a )\n\nenhance RoBERTa with both linguistic and factual\n\nknowledge with task-specific adapters.\n\nPre-training is the most expensive part of train-\n\ning BERT, and it would be informative to know\n\nhow much benefit it provides. On some tasks, a\n\nrandomly initialized and fine-tuned BERT obtains\n\ncompetitive or higher results than the pre-trained\n\nBERT with the task classifier and frozen weights\n\n( Kovaleva et al. , 2019 ). The consensus in the com-\n\nmunity is that pre-training does help in most situa-\n\ntions, but the degree and its exact contribution re-\n\nquires further investigation. Prasanna et al. ( 2020 )\n\nfound that *most* weights of pre-trained BERT are\n\nuseful in fine-tuning, although there are \"better\"\n\nand \"worse\" subnetworks. One explanation is that\n\npre-trained weights help the fine-tuned BERT find\n\nwider and flatter areas with smaller generalization\n\nerror, which makes the model more robust to over-\n\nfitting (see Figure 5 from Hao et al. ( 2019 )).\n\nGiven the large number and variety of proposed\n\nmodifications, one would wish to know how much\n\nimpact each of them has. However, due to the\n\noverall trend towards large model sizes, systematic\n\nablations have become expensive. Most new mod-\n\nels claim superiority on standard benchmarks, but\n\ngains are often marginal, and estimates of model\n\nstability and significance testing are very rare.\n\n### **5.4 Fine-tuning BERT**\n\nPre-training + fine-tuning workflow is a crucial\n\npart of BERT. The former is supposed to provide\n\ntask-independent knowledge, and the latter would\n\npresumably teach the model to rely more on the\n\nrepresentations useful for the task at hand.\n\nKovaleva et al. ( 2019 ) did not find that to be the case for BERT fine-tuned on GLUE tasks <sup>5</sup> : dur-\n\ning fine-tuning, the most changes for 3 epochs oc-\n\ncurred in the last two layers of the models, but those\n\nchanges caused self-attention to focus on [SEP]\n\nrather than on linguistically interpretable patterns.\n\nIt is understandable why fine-tuning would increase\n\nthe attention to [CLS] , but not [SEP] . If Clark\n\net al. ( 2019 ) are correct that [SEP] serves as \"no-\n\nop\" indicator, fine-tuning basically tells BERT what\n\nto ignore.\n\nSeveral studies explored the possibilities of im-\n\nproving the fine-tuning of BERT:\n\n- **Taking more layers into account** : learning\n\na complementary representation of the infor-\n\nmation in deep and output layers ( Yang and\n\nZhao , 2019 ), using a weighted combination\n\nof all layers instead of the final one ( Su and\n\nCheng , 2019 ; Kondratyuk and Straka , 2019 ),\n\nand layer dropout ( Kondratyuk and Straka ,\n\n2019 ).\n\n- **Two-stage fine-tuning** introduces an inter-\n\nmediate supervised training stage between\n\npre-training and fine-tuning ( Phang et al. ,\n\n2019 ; Garg et al. , 2020 ; Arase and Tsujii ,\n\n2019 ; Pruksachatkun et al. , 2020 ; Glavaš and\n\nVuli´c , 2020 ). Ben-David et al. ( 2020 ) propose\n\na pivot-based variant of MLM to fine-tune\n\nBERT for domain adaptation.\n\n- **Adversarial token perturbations** improve\n\nrobustness of the model ( Zhu et al. , 2019 ).\n\n- **Adversarial regularization** in combination\n\nwith *Bregman Proximal Point Optimization*\n\nhelps alleviate pre-trained knowledge forget-\n\nting and therefore prevents BERT from overfit-\n\nting to downstream tasks ( Jiang et al. , 2019a ).", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "report that an intermediate fine-tuning step with\n\nsupervised parsing does not make much difference\n\nfor downstream task performance.\n\n### **3.2 Semantic knowledge**\n\nTo date, more studies have been devoted to BERT’s\n\nknowledge of syntactic rather than semantic phe-\n\nnomena. However, we do have evidence from an\n\nMLM probing study that **BERT has some knowl-**\n\n**edge of semantic roles** ( Ettinger , 2019 ). BERT\n\neven displays some preference for the incorrect\n\nfillers for semantic roles that are semantically re-\n\nlated to the correct ones, as opposed to those that\n\nare unrelated (e.g. \"to tip a chef\" is better than \"to\n\ntip a robin\", but worse than \"to tip a waiter\").\n\nTenney et al. ( 2019b ) showed that **BERT en-**\n\n#### **codes information about entity types, relations,**\n\n**semantic roles, and proto-roles** , since this infor-\n\nmation can be detected with probing classifiers.\n\n#### **BERT struggles with representations of num-**\n\n**bers.** Addition and number decoding tasks showed\n\nthat BERT does not form good representations for\n\nfloating point numbers and fails to generalize away\n\nfrom the training data ( Wallace et al. , 2019b ). A\n\npart of the problem is BERT’s wordpiece tokeniza-\n\ntion, since numbers of similar values can be divided\n\nup into substantially different word chunks.\n\nOut-of-the-box **BERT is surprisingly brittle to**\n\n**named entity replacements** : e.g. replacing names\n\nin the coreference task changes 85% of predictions\n\n( Balasubramanian et al. , 2020 ). This suggests that\n\nthe model does not actually form a generic idea of\n\nnamed entities, although its F1 scores on NER prob-\n\ning tasks are high ( Tenney et al. , 2019a ). Broscheit\n\n( 2019 ) find that fine-tuning BERT on Wikipedia\n\nentity linking \"teaches\" it additional entity knowl-\n\nedge, which would suggest that it did not absorb all\n\nthe relevant entity information during pre-training\n\non Wikipedia.\n\n### **3.3 World knowledge**\n\nThe bulk of evidence about commonsense knowl-\n\nedge captured in BERT comes from practitioners\n\nusing it to extract such knowledge. One direct prob-\n\ning study of BERT reports that **BERT struggles**\n\n#### **with pragmatic inference and role-based event**\n\n**knowledge** ( Ettinger , 2019 ). BERT also struggles\n\nwith abstract attributes of objects, as well as visual\n\nand perceptual properties that are likely to be as-\n\nsumed rather than mentioned ( Da and Kasai , 2019 ).\n\nThe MLM component of BERT is easy to\n\nadapt for knowledge induction by filling in the\n\n#### **Abstract**\n\nRecent progress in pretraining language mod-\n\nels on large textual corpora led to a surge\n\nof improvements for downstream NLP tasks.\n\nWhilst learning linguistic knowledge, these\n\nmodels may also be storing relational knowl-\n\nedge present in the training data, and may\n\nbe able to answer queries structured as “fill-\n\nin-the-blank” cloze statements. Language\n\nmodels have many advantages over structured\n\nknowledge bases: they require no schema en-\n\ngineering, allow practitioners to query about\n\nan open class of relations, are easy to extend to\n\nmore data, and require no human supervision\n\nto train. We present an in-depth analysis of the\n\nrelational knowledge already present (without\n\nfine-tuning) in a wide range of state-of-the-\n\nart pretrained language models. We find that\n\n(i) without fine-tuning, BERT contains rela-\n\ntional knowledge competitive with traditional\n\nNLP methods that have some access to ora-\n\ncle knowledge, (ii) BERT also does remark-\n\nably well on open-domain question answer-\n\ning against a supervised baseline, and (iii) cer-\n\ntain types of factual knowledge are learned\n\nmuch more readily than others by standard lan-\n\nguage model pretraining approaches. The sur-\n\nprisingly strong ability of these models to re-\n\ncall factual knowledge without any fine-tuning\n\ndemonstrates their potential as unsupervised\n\nopen-domain QA systems. The code to re-\n\nproduce our analysis is available at https:\n\n//github.com/facebookresearch/LAMA .", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "## **A Primer in BERTology: What We Know About How BERT Works**\n\n### **Anna Rogers**\n\nCenter for Social Data Science\n\nUniversity of Copenhagen\n\narogers@sodas.ku.dk\n\n### **Olga Kovaleva**\n\nDept. of Computer Science\n\nUniversity of Massachusetts Lowell\n\nokovalev@cs.uml.edu\n\n### **Anna Rumshisky**\n\nDept. of Computer Science\n\nUniversity of Massachusetts Lowell\n\narum@cs.uml.edu\n\n### **Abstract**\n\nTransformer-based models have pushed state\n\nof the art in many areas of NLP, but our un-\n\nderstanding of what is behind their success\n\nis still limited. This paper is the first sur-\n\nvey of over 150 studies of the popular BERT\n\nmodel. We review the current state of knowl-\n\nedge about how BERT works, what kind\n\nof information it learns and how it is repre-\n\nsented, common modifications to its training\n\nobjectives and architecture, the overparame-\n\nterization issue and approaches to compres-\n\nsion. We then outline directions for future\n\nresearch.\n\n## **1 Introduction**\n\nSince their introduction in 2017, Transformers\n\n( Vaswani et al. , 2017 ) have taken NLP by storm,\n\noffering enhanced parallelization and better model-\n\ning of long-range dependencies. The best known\n\nTransformer-based model is BERT ( Devlin et al. ,\n\n2019 ); it obtained state-of-the-art results in numer-\n\nous benchmarks and is still a must-have baseline.\n\nWhile it is clear that BERT works remarkably\n\nwell, it is less clear *why* , which limits further\n\nhypothesis-driven improvement of the architecture.\n\nUnlike CNNs, the Transformers have little cogni-\n\ntive motivation, and the size of these models limits\n\nour ability to experiment with pre-training and per-\n\nform ablation studies. This explains a large number\n\nof studies over the past year that attempted to un-\n\nderstand the reasons behind BERT’s performance.\n\nIn this paper, we provide an overview of what\n\nhas been learned to date, highlighting the questions\n\nwhich are still unresolved. We first consider the\n\nlinguistic aspects of it, i.e., the current evidence\n\nregarding the types of linguistic and world knowl-\n\nedge learned by BERT, as well as where and how\n\nthis knowledge may be stored in the model. We\n\nthen turn to the technical aspects of the model and\n\nprovide an overview of the current proposals to\n\nimprove BERT’s architecture, pre-training and fine-\n\ntuning. We conclude by discussing the issue of\n\noverparameterization, the approaches to compress-\n\ning BERT, and the nascent area of pruning as a\n\nmodel analysis technique.\n\n## **2 Overview of BERT architecture**\n\nFundamentally, BERT is a stack of Transformer\n\nencoder layers ( Vaswani et al. , 2017 ) which consist\n\nof multiple self-attention \"heads\". For every input\n\ntoken in a sequence, each head computes key, value\n\nand query vectors, used to create a weighted repre-\n\nsentation. The outputs of all heads in the same layer\n\nare combined and run through a fully-connected\n\nlayer. Each layer is wrapped with a skip connection\n\nand followed by layer normalization.\n\nThe conventional workflow for BERT consists\n\nof two stages: pre-training and fine-tuning. Pre-\n\ntraining uses two self-supervised tasks: masked\n\nlanguage modeling (MLM, prediction of randomly\n\nmasked input tokens) and next sentence prediction\n\n(NSP, predicting if two input sentences are adjacent\n\nto each other). In fine-tuning for downstream ap-\n\nplications, one or more fully-connected layers are\n\ntypically added on top of the final encoder layer.\n\nThe input representations are computed as fol-\n\nlows: each word in the input is first tokenized into\n\nwordpieces ( Wu et al. , 2016 ), and then three em-\n\nbedding layers (token, position, and segment) are\n\ncombined to obtain a fixed-length vector. Special\n\ntoken [CLS] is used for classification predictions,\n\nand [SEP] separates input segments.\n\nGoogle <sup>1</sup> and HuggingFace ( Wolf et al. , 2020 )\n\nprovide many variants of BERT, including the orig-\n\ninal \"base\" and \"large\" versions. They vary in the\n\nnumber of heads, layers, and hidden state size.", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "provide many variants of BERT, including the orig-\n\ninal \"base\" and \"large\" versions. They vary in the\n\nnumber of heads, layers, and hidden state size.\n\n1 [https://github.com/](https://github.com/google-research/bert)\n\n[google-research/bert](https://github.com/google-research/bert)\n\narXiv:2002.12327v3 [cs.CL] 9 Nov 2020", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "be successfully approximated with adapter mod-\n\nules. They achieve competitive performance on\n\n26 classification tasks at a fraction of the computa-\n\ntional cost. Adapters in BERT were also used for\n\nmulti-task learning ( Stickland and Murray , 2019 )\n\nand cross-lingual transfer ( Artetxe et al. , 2019 ). An\n\nalternative to fine-tuning is extracting features from\n\nfrozen representations, but fine-tuning works better\n\nfor BERT ( Peters et al. , 2019b ).\n\nA big methodological challenge in the current\n\nNLP is that the reported performance improve-\n\nments of new models may well be within varia-\n\ntion induced by environment factors ( Crane , 2018 ).\n\nBERT is not an exception. Dodge et al. ( 2020 )\n\nreport significant variation for BERT fine-tuned\n\non GLUE tasks due to both weight initialization\n\nand training data order. They also propose early\n\nstopping on the less-promising seeds.\n\nAlthough we hope that the above observations\n\nmay be useful for the practitioners, this section\n\ndoes not exhaust the current research on fine-tuning\n\nand its alternatives. For example, we do not cover\n\nsuch topics as Siamese architectures, policy gradi-\n\nent training, automated curriculum learning, and\n\nothers.\n\n## **6 How big should BERT be?**\n\n### **6.1 Overparameterization**\n\nTransformer-based models keep growing by or-\n\nders of magnitude: the 110M parameters of base\n\nBERT are now dwarfed by 17B parameters of\n\nTuring-NLG ( Microsoft , 2020 ), which is dwarfed\n\nby 175B of GPT-3 ( Brown et al. , 2020 ). This trend\n\nraises concerns about computational complexity\n\nof self-attention ( Wu et al. , 2019a ), environmental\n\nissues ( Strubell et al. , 2019 ; Schwartz et al. , 2019 ),\n\nfair comparison of architectures ( Aßenmacher and\n\nHeumann , 2020 ), and reproducibility.\n\nHuman language is incredibly complex, and\n\nwould perhaps take many more parameters to de-\n\nscribe fully, but the current models do not make\n\ngood use of the parameters they already have. Voita\n\net al. ( 2019b ) showed that **all but a few Trans-**\n\n#### **former heads could be pruned without signif-**\n\n**icant losses in performance** . For BERT, Clark\n\net al. ( 2019 ) observe that most heads in the same\n\nlayer show similar self-attention patterns (perhaps\n\nrelated to the fact that the output of all self-attention\n\nheads in a layer is passed through the same MLP),\n\nwhich explains why Michel et al. ( 2019 ) were able\n\nto reduce most layers to a single head.\n\nDepending on the task, some BERT heads/layers\n\nare not only redundant ( Kao et al. , 2020 ), but also\n\nharmful to the downstream task performance. **Pos-**\n\n**itive effect from head disabling** was reported for\n\nmachine translation ( Michel et al. , 2019 ), abstrac-\n\ntive summarization ( Baan et al. , 2019 ), and GLUE\n\ntasks ( Kovaleva et al. , 2019 ). Additionally, Ten-\n\nney et al. ( 2019a ) examine the cumulative gains of\n\ntheir structural probing classifier, observing that in\n\n5 out of 8 probing tasks some layers cause a drop\n\nin scores (typically in the final layers). Gordon\n\net al. ( 2020 ) find that 30- 40% of the weights can\n\nbe pruned without impact on downstream tasks.\n\nIn general, larger BERT models perform better\n\n( Liu et al. , 2019a ; Roberts et al. , 2020 ), but not\n\nalways: BERT-base outperformed BERT-large on\n\nsubject-verb agreement ( Goldberg , 2019 ) and sen-\n\ntence subject detection ( Lin et al. , 2019 ). Given\n\nthe complexity of language, and amounts of pre-\n\ntraining data, it is not clear why BERT ends up with\n\nredundant heads and layers. Clark et al. ( 2019 ) sug-\n\ngest that one possible reason is the use of attention\n\ndropouts, which causes some attention weights to\n\nbe zeroed-out during training.\n\n### **6.2 Compression techniques**\n\nGiven the above evidence of overparameteriza-\n\ntion, it does not come as a surprise that **BERT**\n\n#### **can be efficiently compressed with minimal ac-**\n\n**curacy loss** , which would be highly desirable for\n\nreal-world applications. Such efforts to date are", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "layers are more transferable ( Liu et al. , 2019a ). In\n\nfine-tuning, it explains why the final layers change\n\nthe most ( Kovaleva et al. , 2019 ), and why restoring\n\nthe weights of lower layers of fine-tuned BERT to\n\ntheir original values does not dramatically hurt the\n\nmodel performance ( Hao et al. , 2019 ).\n\nTenney et al. ( 2019a ) suggest that while syntactic\n\ninformation appears early in the model and can be\n\nlocalized, **semantics is spread across the entire**\n\n**model** , which explains why certain non-trivial ex-\n\namples get solved incorrectly at first but correctly\n\nat the later layers. This is rather to be expected:\n\nsemantics permeates all language, and linguists de-\n\nbate whether meaningless structures can exist at\n\nall ( Goldberg , 2006 , p.166-182). But this raises\n\nthe question of what stacking more Transformer\n\nlayers in BERT actually achieves in terms of the\n\nspread of semantic knowledge, and whether that\n\nis beneficial. Tenney et al. compared BERT-base\n\nand BERT-large, and found that the overall pattern\n\nof cumulative score gains is the same, only more\n\nspread out in the larger model.\n\nNote that Tenney et al. ( 2019a )’s experiments\n\nconcern sentence-level semantic relations; Cui et al.\n\n( 2020 ) report that the encoding of ConceptNet se-\n\nmantic relations is the worst in the early layers and\n\nincreases towards the top. Jawahar et al. ( 2019 )\n\nplace \"surface features in lower layers, syntactic\n\nfeatures in middle layers and semantic features in\n\nhigher layers\", but their conclusion is surprising,\n\ngiven that only one semantic task in this study actu-\n\nally topped at the last layer, and three others peaked\n\naround the middle and then considerably degraded\n\nby the final layers.\n\n## **5 Training BERT**\n\nThis section reviews the proposals to optimize the\n\ntraining and architecture of the original BERT.\n\n### **5.1 Model architecture choices**\n\nTo date, the most systematic study of BERT archi-\n\ntecture was performed by Wang et al. ( 2019b ), who\n\nexperimented with the number of layers, heads, and\n\nmodel parameters, varying one option and freez-\n\ning the others. They concluded that **the number**\n\n#### **of heads was not as significant as the number**\n\n**of layers** . That is consistent with the findings\n\nof Voita et al. ( 2019b ) and Michel et al. ( 2019 )\n\n( section 6 ), and also the observation by Liu et al.\n\n( 2019a ) that the middle layers were the most trans-\n\nferable. Larger hidden representation size was con-\n\nsistently better, but the gains varied by setting.\n\nAll in all, **changes in the number of heads**\n\n#### **and layers appear to perform different func-**\n\n**tions** . The issue of model depth must be related to\n\nthe information flow from the most task-specific\n\nlayers closer to the classifier ( Liu et al. , 2019a ),\n\nto the initial layers which appear to be the most\n\ntask-invariant ( Hao et al. , 2019 ), and where the\n\ntokens resemble the input tokens the most ( Brun-\n\nner et al. , 2020 ) (see subsection 4.3 ). If that is the\n\ncase, a deeper model has more capacity to encode\n\ninformation that is not task-specific.\n\nOn the other head, many self-attention heads\n\nin vanilla BERT seem to naturally learn the same\n\npatterns ( Kovaleva et al. , 2019 ). This explains\n\nwhy pruning them does not have too much impact.\n\nThe question that arises from this is how far we\n\ncould get with intentionally encouraging diverse\n\nself-attention patterns: theoretically, this would\n\nmean increasing the amount of information in the\n\nmodel with the same number of weights. Raganato\n\net al. ( 2020 ) show for Transformer-based machine\n\ntranslation we can simply pre-set the patterns that\n\nwe already know the model would learn, instead of\n\nlearning them from scratch.\n\nVanilla BERT is symmetric and balanced in\n\nterms of self-attention and feed-forward layers, but\n\nit may not have to be. For the base Transformer,\n\nPress et al. ( 2020 ) report benefits from more self-\n\nattention sublayers at the bottom and more feedfor-", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "with *Bregman Proximal Point Optimization*\n\nhelps alleviate pre-trained knowledge forget-\n\nting and therefore prevents BERT from overfit-\n\nting to downstream tasks ( Jiang et al. , 2019a ).\n\n- **Mixout regularization** improves the stability\n\nof BERT fine-tuning even for a small number\n\nof training examples ( Lee et al. , 2019 ).\n\nWith large models, even fine-tuning becomes ex-\n\npensive, but Houlsby et al. ( 2019 ) show that it can\n\n5 Kondratyuk and Straka ( 2019 ) suggest that fine-tuning on\n\nUniversal Dependencies does result in syntactically meaning-\n\nful attention patterns, but there was no quantitative evaluation.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "**Compression Performance Speedup Model Evaluation**\n\nBERT-base ( Devlin et al. , 2019 ) *×* 1 100% *×* 1 BERT 12 All GLUE tasks, SQuAD\n\nBERT-small *×* 3.8 91% - BERT 4 *†* All GLUE tasks\n\nDistillation\n\nDistilBERT ( Sanh et al. , 2019a ) *×* 1.5 90% *<sup>§</sup>* *×* 1.6 BERT 6 All GLUE tasks, SQuAD\n\nBERT 6 -PKD ( Sun et al. , 2019a ) *×* 1.6 98% *×* 1.9 BERT 6 No WNLI, CoLA, STS-B; RACE\n\nBERT 3 -PKD ( Sun et al. , 2019a ) *×* 2.4 92% *×* 3.7 BERT 3 No WNLI, CoLA, STS-B; RACE\n\nAguilar et al. ( 2019 ), Exp. 3 *×* 1.6 93% - BERT 6 CoLA, MRPC, QQP, RTE\n\nBERT-48 ( Zhao et al. , 2019 ) *×* 62 87% *×* 77 BERT 12 *<sup>∗†</sup>* MNLI, MRPC, SST-2\n\nBERT-192 ( Zhao et al. , 2019 ) *×* 5.7 93% *×* 22 BERT 12 *<sup>∗†</sup>* MNLI, MRPC, SST-2\n\nTinyBERT ( Jiao et al. , 2019 ) *×* 7.5 96% *×* 9.4 BERT 4 *<sup>†</sup>* No WNLI; SQuAD\n\nMobileBERT ( Sun et al. , 2020 ) *×* 4.3 100% *×* 4 BERT 24 *<sup>†</sup>* No WNLI; SQuAD\n\nPD ( Turc et al. , 2019 ) *×* 1.6 98% *×* 2.5 *<sup>‡</sup>* BERT 6 *<sup>†</sup>* No WNLI, CoLA and STS-B\n\nWaLDORf ( Tian et al. , 2019 ) *×* 4.4 93% *×* 9 BERT 8 *<sup>†∥</sup>* SQuAD\n\nMiniLM ( Wang et al. , 2020b ) *×* 1.65 99% *×* 2 BERT 6 No WNLI, STS-B, MNLI mm ; SQuAD\n\nMiniBERT( Tsai et al. , 2019 ) *×* 6 *<sup>∗∗</sup>* 98% *×* 27 *<sup>∗∗</sup>* mBERT 3 *<sup>†</sup>* CoNLL-18 POS and morphology\n\nBiLSTM-soft ( Tang et al. , 2019 ) *×* 110 91% *×* 434 *<sup>‡</sup>* BiLSTM 1 MNLI, QQP, SST-2\n\nQuanti- zation Q-BERT-MP ( Shen et al. , 2019 ) *×* 13 98% *<sup>¶</sup>* - BERT 12 MNLI, SST-2, CoNLL-03, SQuAD\n\nBERT-QAT ( Zafrir et al. , 2019 ) *×* 4 99% - BERT 12 No WNLI, MNLI; SQuAD\n\nGOBO( Zadeh and Moshovos , 2020 ) *×* 9 *.* 8 99% - BERT 12 MNLI\n\nPruning McCarley et al. ( 2020 ), ff2 *×* 2.2 *<sup>‡</sup>* 98% *<sup>‡</sup>* *×* 1.9 *<sup>‡</sup>* BERT 24 SQuAD, Natural Questions\n\nRPP ( Guo et al. , 2019 ) *×* 1.7 *<sup>‡</sup>* 99% *<sup>‡</sup>* - BERT 24 No WNLI, STS-B; SQuAD\n\nSoft MvP ( Sanh et al. , 2020 ) *×* 33 94% *<sup>¶</sup>* - BERT 12 MNLI, QQP, SQuAD\n\nIMP ( Chen et al. , 2020 ), rewind 50% *×* 1.4- 2.5 94- 100% - BERT 12 No MNLI-mm; SQuAD\n\nOther ALBERT-base ( Lan et al. , 2020b ) *×* 9 97% - BERT 12 *<sup>†</sup>* MNLI, SST-2\n\nALBERT-xxlarge ( Lan et al. , 2020b ) *×* 0.47 107% - BERT 12 *<sup>†</sup>* MNLI, SST-2\n\nBERT-of-Theseus ( Xu et al. , 2020 ) *×* 1.6 98% *×* 1.9 BERT 6 No WNLI\n\nPoWER-BERT ( Goyal et al. , 2020 ) N/A 99% *×* 2- 4.5 BERT 12 No WNLI; RACE\n\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup\n\nfigures are given with respect to BERT base , unless indicated otherwise. Performance retention is measured as\n\na ratio of average scores achieved by a given model and by BERT base . The subscript in the model description\n\nreflects the number of layers used. *<sup>∗</sup>* Smaller vocabulary used. *<sup>†</sup>* The dimensionality of the hidden layers is reduced.\n\n*∥* Convolutional layers used. *‡* Compared to BERT large . *∗∗* Compared to mBERT. *§* As reported in ( Jiao et al. , 2019 ). *¶* In\n\ncomparison to the dev set.\n\nthis strategy often requires compatible hardware.\n\nAs discussed in section 6 , individual self-\n\nattention heads and BERT layers can be disabled\n\nwithout significant drop in performance ( Michel\n\net al. , 2019 ; Kovaleva et al. , 2019 ; Baan et al. ,\n\n2019 ). **Pruning** is a compression technique that\n\ntakes advantage of that fact, typically reducing the\n\namount of computation via zeroing out of certain\n\nparts of the large model. In structured pruning,\n\narchitecture blocks are dropped, as in LayerDrop\n\n( Fan et al. , 2019 ). In unstructured, the weights in\n\nthe entire model are pruned irrespective of their lo-\n\ncation, as in magnitude pruning ( Chen et al. , 2020 )\n\nor movement pruning ( Sanh et al. , 2020 ).\n\nPrasanna et al. ( 2020 ) and Chen et al. ( 2020 )", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "cation, as in magnitude pruning ( Chen et al. , 2020 )\n\nor movement pruning ( Sanh et al. , 2020 ).\n\nPrasanna et al. ( 2020 ) and Chen et al. ( 2020 )\n\nexplore BERT from the perspective of the lottery\n\nticket hypothesis ( Frankle and Carbin , 2019 ), look-\n\ning specifically at the \"winning\" subnetworks in\n\npre-trained BERT. They independently find that\n\nsuch subnetworks do exist, and that transferability\n\nbetween subnetworks for different tasks varies.\n\nIf the ultimate goal of training BERT is compres-\n\nsion, Li et al. ( 2020 ) recommend training larger\n\nmodels and compressing them heavily rather than\n\ncompressing smaller models lightly.\n\nOther techniques include decomposing BERT’s\n\nembedding matrix into smaller matrices ( Lan et al. ,\n\n2020a ), progressive module replacing ( Xu et al. ,\n\n2020 ) and dynamic elimination of intermediate en-\n\ncoder outputs ( Goyal et al. , 2020 ). See Ganesh et al.\n\n( 2020 ) for a more detailed discussion of compres-\n\nsion methods.\n\n### **6.3 Pruning and model analysis**\n\nThere is a nascent discussion around pruning as a\n\nmodel analysis technique. The basic idea is that\n\na compressed model a priori consists of elements\n\nthat are useful for prediction; therefore by finding\n\nout what they do we may find out what the whole\n\nnetwork does. For instance, BERT has heads that\n\nseem to encode frame-semantic relations, but dis-\n\nabling them might not hurt downstream task per-\n\nformance Kovaleva et al. ( 2019 ); this suggests that\n\nthis knowledge is not actually used.\n\nFor the base Transformer, Voita et al. ( 2019b )\n\nidentify the functions of self-attention heads and", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" - }, - { - "text": "## **3 What knowledge does BERT have?**\n\nA number of studies have looked at the knowledge\n\nencoded in BERT weights. The popular approaches\n\ninclude fill-in-the-gap probes of MLM, analysis of\n\nself-attention weights, and probing classifiers with\n\ndifferent BERT representations as inputs.\n\n### **3.1 Syntactic knowledge**\n\nLin et al. ( 2019 ) showed that **BERT represen-**\n\n**tations are hierarchical rather than linear** , i.e.\n\nthere is something akin to syntactic tree structure\n\nin addition to the word order information. Ten-\n\nney et al. ( 2019b ) and Liu et al. ( 2019a ) also\n\nshowed that **BERT embeddings encode informa-**\n\n#### **tion about parts of speech, syntactic chunks**\n\n**and roles** . Enough syntactic information seems\n\nto be captured in the token embeddings themselves\n\nto recover syntactic trees ( Vilares et al. , 2020 ; Kim\n\net al. , 2020 ; Rosa and Mareˇcek , 2019 ), although\n\nprobing classifiers could not recover the labels of\n\ndistant parent nodes in the syntactic tree ( Liu et al. ,\n\n2019a ). Warstadt and Bowman ( 2020 ) report evi-\n\ndence of hierarchical structure in three out of four\n\nprobing tasks.\n\nAs far as *how* syntax is represented, it seems\n\nthat **syntactic structure is not directly encoded**\n\n**in self-attention weights** . Htut et al. ( 2019 ) were\n\nunable to extract full parse trees from BERT heads\n\neven with the gold annotations for the root. Jawahar\n\net al. ( 2019 ) include a brief illustration of a depen-\n\ndency tree extracted directly from self-attention\n\nweights, but provide no quantitative evaluation.\n\nHowever, **syntactic information can be recov-**\n\n**ered from BERT token representations** . Hewitt\n\nand Manning ( 2019 ) were able to learn transfor-\n\nmation matrices that successfully recovered syn-\n\ntactic dependencies in PennTreebank data from\n\nBERT’s token embeddings (see also Manning et al. ,\n\n2020 ). Jawahar et al. ( 2019 ) experimented with\n\ntransformations of the [CLS] token using Tensor\n\nProduct Decomposition Networks ( McCoy et al. ,\n\n2019a ), concluding that dependency trees are the\n\nbest match among 5 decomposition schemes (al-\n\nthough the reported MSE differences are very\n\nsmall). Miaschi and Dell’Orletta ( 2020 ) performs\n\na range of syntactic probing experiments with con-\n\ncatenated token representations as input.\n\nNote that all these approaches look for the\n\nevidence of gold-standard linguistic structures,\n\nand add some amount of extra knowledge to the\n\nprobe. Most recently, Wu et al. ( 2020 ) proposed a 4168\n\n[CLS] For those who follow social media transitions on Capitol Hill , this will be a little different .\n\n[CLS]\n\nFor\n\nthose\n\nwho\n\nfollow\n\nsocial\n\nmedia\n\ntransitions\n\non\n\nCapitol\n\nHill\n\n,\n\nthis\n\nwill\n\nbe\n\na\n\nlittle\n\ndifferent\n\n. 0\n\n1\n\n2\n\n3\n\n4\n\n5\n\nFigure 1: Heatmap of the impact matrix for the sen-\n\ntence “For those who follow social media transitions\n\non Capitol Hill, this will be a little different.”\n\n## **3 Visualization with Impact Maps**\n\nBefore we discuss specific syntactic phenomena,\n\nlet us first analyze some example impact matri-\n\nces derived from sample sentences. We visual-\n\nize an impact matrix of a sentence by displaying\n\na heatmap. We use the term “impact map” to refer\n\nto a heatmap of an impact matrix.\n\n**Setup.** We extract impact matrices by feed-\n\ning BERT with 1,000 sentences from the English\n\nParallel Universal Dependencies (PUD) treebank\n\nof the CoNLL 2017 Shared Task ( Zeman et al. ,\n\n2017 ). We follow the setup and pre-processing\n\nsteps employed in pre-training BERT. An example\n\nimpact map is shown in Figure 1 .\n\n**Dependency.** We notice that the impact map\n\ncontains many *stripes* , which are short series of\n\nvertical/horizontal cells, typically located along\n\nthe diagonal. Take the word “ *different* ” as an ex-\n\nample (which is illustrated by the second-to-last\n\ncolumn in the impact matrix). We observe a clear\n\nvertical stripe above the main diagonal. The inter-\n\npretation is that this particular occurrence of the", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_FFIN_2002.pdf", - "query": "How many affiliate banks has First Financial Bankshares ?", - "target_page": 4, - "target_passage": "The corporation has 10 affiliate banks, which provide services from 28 full-service locations in the Central, West and High Plains regions of Texas. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n\nNotes to Consolidated Financial Statements\n\nDecember 31, 2002, 2001 and 2000\n\nF-9\n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES:\n\nNature of Operations\n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns\n\n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of\n\nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First\n\nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne;\n\nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank,\n\nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of\n\nrevenue is providing loans and banking services to consumers and commercial customers in the market area in\n\nwhich the subsidiary is located.\n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied\n\nin the preparation of the accompanying consolidated financial statements follows. The accounting principles\n\nfollowed by the Company and the methods of applying them are in conformity with both accounting principles\n\ngenerally accepted in the United States of America and prevailing practices of the banking industry.\n\nUse of Estimates in Preparation of Financial Statements\n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United\n\nStates of America requires management to make estimates and assumptions that affect the reported amounts of\n\nassets and liabilities and disclosure of contingent assets and liabilities at the date of the financial statements and\n\nreported amounts of revenues and expenses during the reporting period. Actual results could differ from those\n\nestimates. Material estimates that are particularly susceptible to significant change in the near term relate to the\n\ndetermination of the allowance for loan losses, the valuations of foreclosed real estate, deferred income tax assets,\n\nand the fair value of financial instruments.\n\nConsolidation\n\nThe accompanying consolidated financial statements include the accounts of Bankshares and its subsidiaries, all of\n\nwhich are wholly-owned. All significant intercompany accounts and transactions have been eliminated.\n\nInvestment Securities\n\nManagement classifies debt and equity securities as held-to-maturity, available-for-sale, or trading based on its\n\nintent. Debt securities that management has the positive intent and ability to hold to maturity are classified as held-\n\nto-maturity and recorded at cost, adjusted for amortization of premiums and accretion of discounts, which are\n\nrecognized as adjustments to interest income using the interest method. Securities not classified as held-to-maturity\n\nor trading are classified as available-for-sale and recorded at estimated fair value, with unrealized gains and losses,\n\nnet of deferred income taxes, excluded from earnings and reported in a separate component of shareholders’ equity.\n\nSecurities classified as trading are recorded at estimated fair value, with unrealized gains and losses included in\n\nearnings. The Company had no trading securities at December 31, 2002, 2001, or 2000.\n\nLoans and Allowance for Loan Losses\n\nLoans are stated at the amount of unpaid principal, reduced by unearned income and an allowance for loan losses.\n\nUnearned income on installment loans is recognized in income over the terms of the loans in decreasing amounts\n\nusing a method which approximates the interest method. Interest on other loans is calculated by using the simple\n\ninterest method on daily balances of the principal amounts outstanding. The Company expenses its net loan\n\norigination costs, a method which does not materially differ from deferring and amortizing such amounts as an", - "page_start": 72, - "page_end": 72, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "First Financial Bankshares, Inc. is a financial holding company\n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion\n\nas of December 31, 2002. The corporation has 10 affiliate banks,\n\nwhich provide services from 28 full-service locations in the Central, West\n\nand High Plains regions of Texas. The common stock of First Financial\n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed\n\non The NASDAQ Stock Market <sup>®</sup> under the symbol FFIN.\n\n“Our 10 affiliate banks provide services from 28 full-service locations in the Central, West and High Plains regions of Texas.”\n\n2", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "3\n\nrange of services to individuals, associations, and corporations. These services include administering estates,\n\ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene,\n\nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association,\n\nSouthlake, Texas provide securities brokerage services through arrangements with various third parties.\n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose\n\nnational bank under which we will consolidate the management of our current trust departments. The new entity\n\nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We\n\nbelieve that with this structure we can more effectively manage our current trust operations and provide trust\n\nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust\n\ncompany will begin operations in the latter part of 2003.\n\n####### **Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits,\n\nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our\n\nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services\n\noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas\n\nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions,\n\nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and\n\nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel.\n\nOur business does not depend on any single customer or any few customers, the loss of any one of which would\n\nhave a materially adverse effect upon our business. Although we have a broad base of customers that are not related\n\nto us, our customers also occasionally include our officers and directors, as well as other entities with which we are\n\naffiliated. With our subsidiary banks we may make loans to officers and directors, and entities with which we are\n\naffiliated, in the ordinary course of business. We make these loans on substantially the same terms, including\n\ninterest rates and collateral, as those prevailing at the time for comparable transactions with other persons. Loans to\n\ndirectors, officers and their affiliates are also subject to numerous restrictions under federal and state banking laws\n\nwhich we describe in greater detail below.\n\n####### **Employees**\n\nWith our subsidiary banks we employed approximately 750 full-time equivalent employees at February 1, 2003.\n\nOur management believes that our employee relations have been and will continue to be good.\n\n####### **Supervision and Regulation**\n\nBoth federal and state laws extensively regulate bank holding companies, financial holding companies and\n\nbanks. These laws (and the regulations promulgated thereunder) are primarily intended to protect depositors and the\n\ndeposit insurance fund of the Federal Deposit Insurance Corporation, or FDIC, although shareholders may also\n\nbenefit. The following information describes particular laws and regulatory provisions relating to financial holding\n\ncompanies and banks. This discussion is qualified in its entirety by reference to the particular laws and regulatory\n\nprovisions. A change in any of these laws or regulations may have a material effect on our business and the\n\nbusiness of our subsidiary banks.\n\n*Bank Holding Companies and Financial Holding Companies*\n\nTraditionally, the activities of bank holding companies were limited to the business of banking and activities", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "8\n\nthe parent’s general unsecured creditors. If a depository institution fails to submit an acceptable capital restoration\n\nplan, it shall be treated as if it is significantly undercapitalized. “Significantly undercapitalized” depository\n\ninstitutions may be subject to a number of requirements and restrictions, including orders to sell sufficient voting\n\nstock to become “adequately capitalized,” requirements to reduce total assets, and cessation of receipt of deposits\n\nfrom correspondent banks. “Critically undercapitalized” institutions are subject to the appointment of a receiver or\n\nconservator. Finally, FDICIA requires the various regulatory agencies to set forth certain standards that do not relate\n\nto capital. Such standards relate to the safety and soundness of operations and management and to asset quality and\n\nexecutive compensation, and permit regulatory action against a financial institution that does not meet such\n\nstandards.\n\nIf an insured bank fails to meet its capital guidelines, it may be subject to a variety of other enforcement\n\nremedies, including a prohibition on the taking of brokered deposits and the termination of deposit insurance by the\n\nFDIC. Bank regulators continue to indicate their desire to raise capital requirements beyond their current levels.\n\nIn addition to FDICIA capital standards, Texas-chartered banks must also comply with the capital requirements\n\nimposed by the Texas Banking Department. Neither the Texas Finance Code nor its regulations specify any\n\nminimum capital-to-assets ratio that must be maintained by a Texas-chartered bank. Instead, the Texas Banking\n\nDepartment determines the appropriate ratio on a bank by bank basis, considering factors such as the nature of a\n\nbank’s business, its total revenue, and the bank’s total assets. As of December 31, 2002, all of our Texas-chartered\n\nbanks exceeded the minimum ratios applied to them.\n\n*Our Support of Our Subsidiary Banks*\n\nUnder Federal Reserve Board policy, we are expected to commit resources to act as a source of strength to\n\nsupport each of our subsidiary banks. This support may be required at times when, absent such Federal Reserve\n\nBoard policy, we would not otherwise be required to provide it. In addition, any loans we make to our subsidiary\n\nbanks would be subordinate in right of payment to deposits and to other indebtedness of our banks. In the event of a\n\nbank holding company’s bankruptcy, any commitment by the bank holding company to a federal bank regulatory\n\nagency to maintain the capital of a subsidiary bank will be assumed by the bankruptcy trustee and be subject to a\n\npriority of payment.\n\nUnder the National Bank Act, if the capital stock of a national bank is impaired by losses or otherwise, the OCC\n\nis authorized to require the bank’s shareholders to pay the deficiency on a pro-rata basis. If any shareholder refuses\n\nto pay the pro-rata assessment after three months notice, then the bank’s board of directors must sell an appropriate\n\namount of the shareholder’s stock at a public auction to make up the deficiency. To the extent necessary, if a\n\ndeficiency in capital still exists and the bank refuses to go into liquidation, then a receiver may be appointed to wind\n\nup the bank’s affairs. Additionally, under the Federal Deposit Insurance Act, in the event of a loss suffered or\n\nanticipated by the FDIC (either as a result of the default of a banking subsidiary or related to FDIC assistance\n\nprovided to a subsidiary in danger of default) our other banking subsidiaries may be assessed for the FDIC’s loss.\n\n*Interstate Banking and Branching Act*\n\nPursuant to the Riegle-Neal Interstate Banking and Branching Efficiency Act of 1994, or Riegle-Neal Act, a\n\nbank holding company or financial holding company is able to acquire banks in states other than its home state. The\n\nRiegle-Neal Act also authorized banks to merge across state lines, thereby creating interstate branches, beginning", - "page_start": 35, - "page_end": 35, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Regulation O promulgated thereunder. These statutes and regulations impose specific limits on the amount of loans\n\nour subsidiary banks may make to directors and other insiders, and specified approval procedures must be followed\n\nin making loans that exceed certain amounts. In addition, all loans our subsidiary banks make to directors and other\n\ninsiders must satisfy the following requirements:\n\n- The loans must be made on substantially the same terms, including interest rates and collateral, as\n\nprevailing at the time for comparable transactions with persons not affiliated with us or the subsidiary\n\nbanks;\n\n- The subsidiary banks must follow credit underwriting procedures at least as stringent as those applicable to\n\ncomparable transactions with persons who are not affiliated with us or the subsidiary banks; and\n\n- The loans must not involve a greater than normal risk of repayment or other unfavorable features.", - "page_start": 33, - "page_end": 33, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "on loans, the amount of dividends declared, and required capitalization ratios.\n\n*National Banking Associations* . Banks that are organized as national banking associations under the National\n\nBank Act are subject to regulation and examination by the Office of the Comptroller of the Currency, or OCC. The\n\nOCC supervises, regulates and regularly examines the First National Bank of Abilene, First National Bank,\n\nSweetwater, First Financial Bank, National Association, Cleburne, Eastland National Bank, San Angelo National\n\nBank, Weatherford National Bank, First Financial Bank, National Association, Southlake and City National Bank,\n\nMineral Wells. The OCC’s supervision and regulation of banks is primarily intended to protect the interests of\n\ndepositors. The National Bank Act:\n\n- requires each national banking association to maintain reserves against deposits,\n\n- restricts the nature and amount of loans that may be made and the interest that may be charged, and\n\n- restricts investments and other activities.", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "*Bank Holding Companies and Financial Holding Companies*\n\nTraditionally, the activities of bank holding companies were limited to the business of banking and activities\n\nclosely related or incidental to banking. Bank holding companies were generally prohibited from acquiring control\n\nof any company which was not a bank and from engaging in any business other than the business of banking or\n\nmanaging and controlling banks. The Gramm-Leach-Bliley Act, which took effect on March 12, 2000, dismantled\n\nmany Depression-era restrictions against affiliation between banking, securities and insurance firms by permitting\n\nbank holding companies to engage in a broader range of financial activities, so long as certain safeguards are\n\nobserved. Specifically, bank holding companies may elect to become “financial holding companies” that may\n\naffiliate with securities firms and insurance companies and engage in other activities that are financial in nature or", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "6\n\nOur subsidiary banks paid aggregate dividends of approximately $26.6 million in 2002 and approximately $25.5\n\nmillion in 2001. Under the dividend restrictions discussed above, as of December 31, 2002, our subsidiary banks,\n\nwithout obtaining governmental approvals, could have declared in the aggregate additional dividends of\n\napproximately $20.7 million from retained net profits.\n\nTo pay dividends, we and our subsidiary banks must maintain adequate capital above regulatory guidelines. In\n\naddition, if the applicable regulatory authority believes that a bank under its jurisdiction is engaged in or is about to\n\nengage in an unsafe or unsound practice (which, depending on the financial condition of the bank, could include the\n\npayment of dividends), the authority may require, after notice and hearing, that such bank cease and desist from the\n\nunsafe practice. The Federal Reserve Board and the OCC have each indicated that paying dividends that deplete a\n\nbank’s capital base to an inadequate level would be an unsafe and unsound banking practice. The Federal Reserve\n\nBoard, the OCC and the FDIC have issued policy statements that recommend that bank holding companies and\n\ninsured banks should generally only pay dividends to the extent that net income is sufficient to cover both cash\n\ndividends and rate of earnings retention consistent with capital needs, asset quality and overall financial condition.\n\nNo undercapitalized institution may pay a dividend.\n\n*Affiliate Transactions*\n\nThe Federal Reserve Act, the FDIA and the rules adopted under these statutes restrict the extent to which we\n\ncan borrow or otherwise obtain credit from, or engage in certain other transactions with, our depository subsidiaries.\n\nThese laws regulate “covered transactions” between insured depository institutions and their subsidiaries, on the one\n\nhand, and their nondepository affiliates, on the other hand. “Covered transactions” include a loan or extension of\n\ncredit to a nondepository affiliate, a purchase of securities issued by such an affiliate, a purchase of assets from such\n\nan affiliate (unless otherwise exempted by the Federal Reserve Board), an acceptance of securities issued by such an\n\naffiliate as collateral for a loan, and an issuance of a guarantee, acceptance, or letter of credit for the benefit of such\n\nan affiliate. The “covered transactions” that an insured depository institution and its subsidiaries are permitted to\n\nengage in with their nondepository affiliates are limited to the following amounts: (1) in the case of any one such\n\naffiliate, the aggregate amount of “covered transactions” cannot exceed ten percent of the capital stock and the\n\nsurplus of the insured depository institution; and (2) in the case of all affiliates, the aggregate amount of “covered\n\ntransactions” cannot exceed twenty percent of the capital stock and surplus of the insured depository institution. In\n\naddition, extensions of credit that constitute “covered transactions” must be collateralized in prescribed amounts.\n\nFurther, a bank holding company and its subsidiaries are prohibited from engaging in certain tie-in arrangements in\n\nconnection with any extension of credit, lease or sale of property or furnishing of services. Finally, when we and\n\nour subsidiary banks conduct transactions internally among us, we are required to do so at arm’s length.\n\n*Loans to Directors, Executive Officers and Principal Shareholders*\n\nThe authority of our subsidiary banks to extend credit to our directors, executive officers and principal\n\nshareholders, including their immediate family members and corporations and other entities that they control, is\n\nsubject to substantial restrictions and requirements under Sections 22(g) and 22(h) of the Federal Reserve Act and\n\nRegulation O promulgated thereunder. These statutes and regulations impose specific limits on the amount of loans", - "page_start": 33, - "page_end": 33, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "4\n\nincidental to a financial activity. Thus, with the enactment of the Gramm-Leach-Bliley Act, banks, securities firms\n\nand insurance companies find it easier to acquire or affiliate with each other and cross-sell financial products. The\n\nact permits a single financial services organization to offer a more complete array of financial products and services\n\nthan historically was permitted.\n\nA financial holding company is essentially a bank holding company with significantly expanded powers. Under\n\nthe Gramm-Leach-Bliley Act, among the activities that will be deemed “financial in nature” for financial holding\n\ncompanies are, in addition to traditional lending activities, securities underwriting, dealing in or making a market in\n\nsecurities, sponsoring mutual funds and investment companies, insurance underwriting and agency activities,\n\nactivities which the Federal Reserve Board determines to be closely related to banking, and certain merchant\n\nbanking activities. The Federal Reserve Board has proposed permitting a number of additional financial activities,\n\nbut we cannot predict whether any of these additional proposals will be adopted or the form any final rule will take.\n\nWe elected to become a financial holding company in September 2001. As a financial holding company, we\n\nhave very broad discretion to affiliate with securities firms and insurance companies, make merchant banking\n\ninvestments, and engage in other activities that the Federal Reserve Board has deemed financial in nature. In order\n\nto continue as a financial holding company, we must continue to be well-capitalized, well-managed and maintain\n\ncompliance with the Community Reinvestment Act. Depending on the types of financial activities that we may\n\nengage in in the future, under Gramm-Leach-Bliley’s fractional regulation principles, we may become subject to\n\nsupervision by additional government agencies. The election to be treated as a financial holding company increases\n\nour ability to offer financial products and services that historically we were either unable to provide or were only\n\nable to provide on a limited basis. As a result, we will face increased competition in the markets for any new\n\nfinancial products and services that we may offer. Likewise, an increased amount of consolidation among banks and\n\nsecurities firms or banks and insurance firms could result in a growing number of large financial institutions that\n\ncould compete aggressively with us.\n\n*Mergers and Acquisitions*\n\nWe generally must obtain approval from the banking regulators before we can acquire other financial\n\ninstitutions. We must not engage in certain acquisitions if we are undercapitalized. Furthermore, the BHCA\n\nprovides that the Federal Reserve Board cannot approve any acquisition, merger or consolidation that may\n\nsubstantially lessen competition in the banking industry, create a monopoly in any section of the country, or be a\n\nrestraint of trade. However, the Federal Reserve Board may approve such a transaction if the convenience and\n\nneeds of the community clearly outweigh any anti-competitive effects. Specifically, the Federal Reserve Board\n\nwould consider, among other factors, the expected benefits to the public (greater convenience, increased\n\ncompetition, greater efficiency, etc.) against the risks of possible adverse effects (undue concentration of resources,\n\ndecreased or unfair competition, conflicts of interest, unsound banking practices, etc.).\n\n*Banks*\n\nFederal and state laws and regulations that govern banks have the effect of, among other things, regulating the\n\nscope of business, investments, cash reserves, the purpose and nature of loans, the maximum interest rate chargeable\n\non loans, the amount of dividends declared, and required capitalization ratios.\n\n*National Banking Associations* . Banks that are organized as national banking associations under the National", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "5\n\n*State Banks* . Banks that are organized as state banks under Texas law are subject to regulation and examination\n\nby the Banking Commissioner of the State of Texas. The Commissioner regulates and supervises, and the Texas\n\nBanking Department regularly examines, Hereford State Bank and Stephenville Bank and Trust Co. The\n\nCommissioner’s supervision and regulation of banks is primarily designed to protect the interests of depositors.\n\nTexas law\n\n- requires each state bank to maintain reserves against deposits,\n\n- restricts the nature and amount of loans that may be made and the interest that may be charged, and\n\n- restricts investments and other activities.\n\nBecause our Texas-chartered banks are members of the FDIC, they are also subject to regulation at the federal\n\nlevel by the FDIC, and are subject to most of the federal laws described below.\n\n*Deposit Insurance*\n\nEach of our subsidiary banks is a member of the FDIC. The FDIC provides deposit insurance protection that\n\ncovers all deposit accounts in FDIC-insured depository institutions and generally does not exceed $100,000 per\n\ndepositor. Our subsidiary banks must pay assessments to the FDIC under a risk-based assessment system for federal\n\ndeposit insurance protection. FDIC-insured depository institutions that are members of the Bank Insurance Fund pay\n\ninsurance premiums at rates based on their risk classification. Institutions assigned to higher risk classifications (i.e.,\n\ninstitutions that pose a greater risk of loss to their respective deposit insurance funds) pay assessments at higher rates\n\nthan institutions that pose a lower risk. An institution’s risk classification is assigned based on its capital levels and\n\nthe level of supervisory concern the institution poses to bank regulators. In addition, the FDIC can impose special\n\nassessments to cover the costs of borrowings from the U.S. Treasury, the Federal Financing Bank and the Bank\n\nInsurance Fund member banks. As of December 31, 2002, the assessment rate for each of our subsidiary banks is at\n\nthe lowest level risk-based premium available.\n\nUnder the Financial Institutions Reform, Recovery, and Enforcement Act of 1989, or FIRREA, an FDIC-\n\ninsured depository institution can be held liable for any losses incurred by the FDIC in connection with (1) the\n\n“default” of one of its FDIC-insured subsidiaries or (2) any assistance provided by the FDIC to one of its FDIC-\n\ninsured subsidiaries “in danger of default.” “Default” is defined generally as the appointment of a conservator or\n\nreceiver, and “in danger of default” is defined generally as the existence of certain conditions indicating that a\n\ndefault is likely to occur in the absence of regulatory assistance.\n\nThe Federal Deposit Insurance Act, or FDIA requires that the FDIC review (1) any merger or consolidation by\n\nor with an insured bank, or (2) any establishment of branches by an insured bank. The FDIC is also empowered to\n\nregulate interest rates paid by insured banks. Approval of the FDIC is also required before an insured bank retires\n\nany part of its common or preferred stock, or any capital notes or debentures. Insured banks that are also members of\n\nthe Federal Reserve System, however, are regulated with respect to the foregoing matters by the Federal Reserve\n\nSystem.\n\n*Payment of Dividends*\n\nWe are a legal entity separate and distinct from our banking and other subsidiaries. We receive most of our\n\nrevenue from dividends paid to us by our Delaware holding company subsidiary. Similarly, the Delaware holding\n\ncompany subsidiary receives dividends from our bank subsidiaries. Described below are some of the laws and\n\nregulations that apply when either we or our subsidiary banks pay dividends.\n\nEach state bank that is a member of the Federal Reserve System and each national banking association is\n\nrequired by federal law to obtain the prior approval of the Federal Reserve Board and the OCC, respectively, to", - "page_start": 32, - "page_end": 32, - "source_file": "NASDAQ_FFIN_2002.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_FFIN_2002.pdf", - "query": "What was the net income of First Financial Bankshares in 1995 ?", - "target_page": 14, - "target_passage": " 16,355", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n\nNotes to Consolidated Financial Statements\n\nDecember 31, 2002, 2001 and 2000\n\nF-9\n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES:\n\nNature of Operations\n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns\n\n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of\n\nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First\n\nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne;\n\nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank,\n\nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of\n\nrevenue is providing loans and banking services to consumers and commercial customers in the market area in\n\nwhich the subsidiary is located.\n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied\n\nin the preparation of the accompanying consolidated financial statements follows. The accounting principles\n\nfollowed by the Company and the methods of applying them are in conformity with both accounting principles\n\ngenerally accepted in the United States of America and prevailing practices of the banking industry.\n\nUse of Estimates in Preparation of Financial Statements\n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United\n\nStates of America requires management to make estimates and assumptions that affect the reported amounts of\n\nassets and liabilities and disclosure of contingent assets and liabilities at the date of the financial statements and\n\nreported amounts of revenues and expenses during the reporting period. Actual results could differ from those\n\nestimates. Material estimates that are particularly susceptible to significant change in the near term relate to the\n\ndetermination of the allowance for loan losses, the valuations of foreclosed real estate, deferred income tax assets,\n\nand the fair value of financial instruments.\n\nConsolidation\n\nThe accompanying consolidated financial statements include the accounts of Bankshares and its subsidiaries, all of\n\nwhich are wholly-owned. All significant intercompany accounts and transactions have been eliminated.\n\nInvestment Securities\n\nManagement classifies debt and equity securities as held-to-maturity, available-for-sale, or trading based on its\n\nintent. Debt securities that management has the positive intent and ability to hold to maturity are classified as held-\n\nto-maturity and recorded at cost, adjusted for amortization of premiums and accretion of discounts, which are\n\nrecognized as adjustments to interest income using the interest method. Securities not classified as held-to-maturity\n\nor trading are classified as available-for-sale and recorded at estimated fair value, with unrealized gains and losses,\n\nnet of deferred income taxes, excluded from earnings and reported in a separate component of shareholders’ equity.\n\nSecurities classified as trading are recorded at estimated fair value, with unrealized gains and losses included in\n\nearnings. The Company had no trading securities at December 31, 2002, 2001, or 2000.\n\nLoans and Allowance for Loan Losses\n\nLoans are stated at the amount of unpaid principal, reduced by unearned income and an allowance for loan losses.\n\nUnearned income on installment loans is recognized in income over the terms of the loans in decreasing amounts\n\nusing a method which approximates the interest method. Interest on other loans is calculated by using the simple\n\ninterest method on daily balances of the principal amounts outstanding. The Company expenses its net loan\n\norigination costs, a method which does not materially differ from deferring and amortizing such amounts as an", - "page_start": 72, - "page_end": 72, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "F-1\n\n####### **REPORT OF INDEPENDENT AUDITORS**\n\nTo the Board of Directors and Shareholders of\n\nFirst Financial Bankshares, Inc.\n\nWe have audited the accompanying consolidated balance sheet of First Financial Bankshares, Inc. (a Texas\n\ncorporation) and subsidiaries as of December 31, 2002, and the related consolidated statements of earnings,\n\ncomprehensive earnings, shareholders’ equity, and cash flows for the year then ended. These financial statements\n\nare the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial\n\nstatements based on our audit. The consolidated financial statements of First Financial Bankshares, Inc. and\n\nsubsidiaries as of December 31, 2001 and for each of the two years then ended, were audited by other auditors who\n\nhave ceased operations and whose report dated January 11, 2002, expressed an unqualified opinion on those\n\nstatements.\n\nWe conducted our audit in accordance with auditing standards generally accepted in the United States. Those\n\nstandards require that we plan and perform the audit to obtain reasonable assurance about whether the financial\n\nstatements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the\n\namounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used\n\nand significant estimates made by management, as well as evaluating the overall financial statement presentation.\n\nWe believe that our audit provides a reasonable basis for our opinion.\n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position\n\nof First Financial Bankshares, Inc. and subsidiaries at December 31, 2002, and the consolidated results of their\n\noperations and their cash flows for the year then ended in conformity with accounting principles generally accepted\n\nin the United States.\n\nAs discussed above, the financial statements of First Financial Bankshares, Inc. as of December 31, 2001 and the\n\ntwo years then ended were audited by other auditors who have ceased operations. As described in Note 1, these\n\nfinancial statements have been revised to include the transitional disclosures required by Statement of Financial\n\nAccounting Standards No. 142, *Goodwill and Other Intangible Assets* , which was adopted by the Company as of\n\nJanuary 1, 2002. Our audit procedures with respect to the disclosures in Note 1 with respect to 2001 and 2000\n\nincluded (a) agreeing the previously reported net income to the previously issued financial statements and the\n\nadjustments to reported net income representing amortization expense including related tax effects recognized in\n\nthose periods related to goodwill to the Company’s underlying records obtained from management, and (b) testing\n\nthe mathematical accuracy of the reconciliation of adjusted net income to reported net income, and the related\n\nearnings per share amounts. In our opinion, the disclosures for 2001 and 2000 are appropriate. However, we were\n\nnot engaged to audit, review, or apply any procedures to the 2001 and 2000 financial statements of the Company\n\nother than with respect to such disclosures and, accordingly, we do not express an opinion or any other form of\n\nassurance on the 2001 and 2000 financial statements taken as a whole.\n\nErnst & Young LLP\n\nDallas, Texas\n\nJanuary 14, 2003", - "page_start": 64, - "page_end": 64, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n\nNotes to Consolidated Financial Statements\n\nDecember 31, 2002, 2001 and 2000\n\nF-11\n\nOn January 1, 2002, goodwill amounting to $23,765,896 was not subject to further amortization as a result of SFAS\n\nNo. 142. The Company conducted its initial impairment test in 2002, with no reduction of recorded goodwill\n\nresulting from the test. A reconciliation adjusting comparative net earnings and earnings per share for the years\n\nended December 31, 2001 and 2000, to show the effect of no longer amortizing the Company’s goodwill, follows:\n\n2001 2000\n\nReported net earnings $ 29,354,505 $ 28,316,047\n\nAdd back: goodwill amortization\n\nGoodwill amortization, before income tax 1,641,367 1,641,367\n\nIncome tax benefit (420,000) (420,000)\n\nAdjusted net earnings $ 30,575,872 $ 29,537,414\n\nBasic earnings per share:\n\nReported net earnings $ 2.38 $ 2.28\n\nGoodwill amortization, net of income tax benefit .10 .10\n\nAdjusted net earnings $ 2.48 $ 2.38\n\nEarnings per share, assuming dilution:\n\nReported net earnings $ 2.37 $ 2.27\n\nGoodwill amortization, net of income tax benefit .10 .10\n\nAdjusted net earnings $ 2.47 $ 2.37\n\nGoodwill arising from acquisitions of assets and liabilities, rather than acquisitions of stock, amounting to\n\n$13,000,000, is deductible for federal income tax purposes.\n\nOther identifiable intangible assets recorded by the Company represent the future benefit associated with the\n\nacquisition of the core deposits of City Bancshares, Inc. (Note 17) and is being amortized over seven years utilizing\n\na method that approximates the expected attrition of the deposits.\n\nSecurities Sold Under Agreements To Repurchase\n\nSecurities sold under agreements to repurchase, which are classified as secured borrowings, generally mature within\n\none to four days from the transaction date. Securities sold under agreements to repurchase are reflected at the\n\namount of the cash received in connection with the transaction. The Company may be required to provide additional\n\ncollateral based on the estimated fair value of the underlying securities.\n\nSegment Reporting\n\nThe Company has determined that it operates one line of business (community banking) located in a single\n\ngeographic area (Texas).\n\nStatements of Cash Flows\n\nFor purposes of reporting cash flows, cash and cash equivalents include cash on hand, amounts due from banks, and\n\nfederal funds sold.\n\nAccounting for Income Taxes\n\nThe Company’s provision for income taxes is based on income before income taxes adjusted for permanent\n\ndifferences between financial reporting and taxable income. Deferred tax assets and liabilities are determined using\n\nthe liability (or balance sheet) method. Under this method, the net deferred tax asset or liability is determined based\n\non the tax effects of the temporary differences between the book and tax bases of the various balance sheet assets\n\nand liabilities and gives current recognition to changes in tax rates and laws.", - "page_start": 74, - "page_end": 74, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n\nConsolidated Statements of Comprehensive Earnings\n\nDecember 31, 2002, 2001 and 2000\n\nThe accompanying notes are an integral part of these consolidated financial statements.\n\nF-6\n\n2002 2001 2000\n\nNET EARNINGS $ 33,952,550 $ 29,354,505 $ 28,316,047\n\nOTHER ITEMS OF COMPREHENSIVE EARNINGS:\n\nChange in unrealized gain on investment securities\n\navailable-for-sale, before income tax 13,414,265 3,916,477 9,319,576\n\nReclassification adjustment for realized gains on investment\n\nsecurities included in net earnings, before income tax (16,373) (67,789) (530,097)\n\nMinimum liability pension adjustment, before income tax (2,215,820) - -\n\nTotal other items of comprehensive earnings 11,182,072 3,848,688 8,789,479\n\nIncome tax expense related to other items of\n\ncomprehensive earnings (3,913,725) (1,347,041) (3,076,320)\n\nCOMPREHENSIVE EARNINGS $ 41,220,897 $ 31,856,152 $ 34,029,206 FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES Consolidated Statements of Shareholders’ Equity December 31, 2002, 2001 and 2000 The accompanying notes are an integral part of these consolidated financial statements. F-7", - "page_start": 69, - "page_end": 69, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "28\n\namounted to 49.1%, 48.9% and 45.2% of net earnings, respectively, in 2002, 2001 and 2000. Given our current\n\nstrong capital position and projected earnings and asset growth rates, we do not anticipate any change in our current\n\ndividend policy.\n\nEach state bank that is a member of the Federal Reserve System and each national banking association is\n\nrequired by federal law to obtain the prior approval of the Federal Reserve Board and the OCC, respectively, to\n\ndeclare and pay dividends if the total of all dividends declared in any calendar year would exceed the total of (1)\n\nsuch bank’s net profits (as defined and interpreted by regulation) for that year plus (2) its retained net profits (as\n\ndefined and interpreted by regulation) for the preceding two calendar years, less any required transfers to surplus. In\n\naddition, these banks may only pay dividends to the extent that retained net profits (including the portion transferred\n\nto surplus) exceed bad debts (as defined by regulation).\n\nTo pay dividends, we and our subsidiary banks must maintain adequate capital above regulatory guidelines. In\n\naddition, if the applicable regulatory authority believes that a bank under its jurisdiction is engaged in or is about to\n\nengage in an unsafe or unsound practice (which, depending on the financial condition of the bank, could include the\n\npayment of dividends), the authority may require, after notice and hearing, that such bank cease and desist from the\n\nunsafe practice. The Federal Reserve Board and the OCC have each indicated that paying dividends that deplete a\n\nbank’s capital base to an inadequate level would be an unsafe and unsound banking practice. The Federal Reserve\n\nBoard, the OCC and the FDIC have issued policy statements that recommend that bank holding companies and\n\ninsured banks should generally only pay dividends out of current operating earnings.\n\n####### **ITEM 7A. QUANTITATIVE AND QUALITATIVE DISCLOSURES ABOUT MARKET RISK**\n\nOur management considers interest rate risk to be a significant market risk for us. See “Item 7—Management’s\n\nDiscussion and Analysis of Financial Condition and Results of Operations—Balance Sheet Review—Interest Rate\n\nRisk” for disclosure regarding this market risk.", - "page_start": 55, - "page_end": 55, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "First Financial Bankshares, Inc. is a financial holding company\n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion\n\nas of December 31, 2002. The corporation has 10 affiliate banks,\n\nwhich provide services from 28 full-service locations in the Central, West\n\nand High Plains regions of Texas. The common stock of First Financial\n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed\n\non The NASDAQ Stock Market <sup>®</sup> under the symbol FFIN.\n\n“Our 10 affiliate banks provide services from 28 full-service locations in the Central, West and High Plains regions of Texas.”\n\n2", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "3\n\nrange of services to individuals, associations, and corporations. These services include administering estates,\n\ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene,\n\nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association,\n\nSouthlake, Texas provide securities brokerage services through arrangements with various third parties.\n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose\n\nnational bank under which we will consolidate the management of our current trust departments. The new entity\n\nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We\n\nbelieve that with this structure we can more effectively manage our current trust operations and provide trust\n\nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust\n\ncompany will begin operations in the latter part of 2003.\n\n####### **Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits,\n\nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our\n\nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services\n\noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas\n\nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions,\n\nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and\n\nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel.\n\nOur business does not depend on any single customer or any few customers, the loss of any one of which would\n\nhave a materially adverse effect upon our business. Although we have a broad base of customers that are not related\n\nto us, our customers also occasionally include our officers and directors, as well as other entities with which we are\n\naffiliated. With our subsidiary banks we may make loans to officers and directors, and entities with which we are\n\naffiliated, in the ordinary course of business. We make these loans on substantially the same terms, including\n\ninterest rates and collateral, as those prevailing at the time for comparable transactions with other persons. Loans to\n\ndirectors, officers and their affiliates are also subject to numerous restrictions under federal and state banking laws\n\nwhich we describe in greater detail below.\n\n####### **Employees**\n\nWith our subsidiary banks we employed approximately 750 full-time equivalent employees at February 1, 2003.\n\nOur management believes that our employee relations have been and will continue to be good.\n\n####### **Supervision and Regulation**\n\nBoth federal and state laws extensively regulate bank holding companies, financial holding companies and\n\nbanks. These laws (and the regulations promulgated thereunder) are primarily intended to protect depositors and the\n\ndeposit insurance fund of the Federal Deposit Insurance Corporation, or FDIC, although shareholders may also\n\nbenefit. The following information describes particular laws and regulatory provisions relating to financial holding\n\ncompanies and banks. This discussion is qualified in its entirety by reference to the particular laws and regulatory\n\nprovisions. A change in any of these laws or regulations may have a material effect on our business and the\n\nbusiness of our subsidiary banks.\n\n*Bank Holding Companies and Financial Holding Companies*\n\nTraditionally, the activities of bank holding companies were limited to the business of banking and activities", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n####### **NOTE 33 - FINANCIAL RISK MANAGEMENT continued**\n\n####### **b) Net Fair Value of Financial Assets and Liabilities**\n\nThe net fair value of cash and cash equivalent and non-interest bearing monetary financial assets and financial\n\nliabilities of the consolidated entity approximate their carrying value.\n\nThe net fair value of other monetary financial assets and financial liabilities is based on discounting future cash\n\nflows by the current interest rates for assets and liabilities with similar risk profiles. Other than the Junior Credit\n\nFacility, the balances are not materially different from those disclosed in the consolidated statement of financial\n\nposition of the Group.\n\n####### **c) Credit Risk**\n\nCredit risk for the Group arises from investments in cash and cash equivalents, derivative financial instruments\n\nand deposits with banks and financial institutions, as well as credit exposures to customers including\n\noutstanding receivables and committed transactions, and represents the potential financial loss if\n\ncounterparties fail to perform as contracted. The Group trades only with recognised, creditworthy third parties.\n\nThe maximum exposure to credit risk, excluding the value of any collateral or other security, at balance date to\n\nrecognise the financial assets, is the carrying amount, net of any impairment of those assets, as disclosed in the\n\nbalance sheet and notes to the financial statements. Receivable balances are monitored on an ongoing basis at\n\nthe individual customer level.\n\nAt 31 December 2014, the Group had three customers that owed the Group more than $1.0 million each and\n\naccounted for approximately 75% of total accrued revenue receivables. There was one customer with balances\n\ngreater than $5.0 million accounting for approximately 56% of total accrued revenue receivables. For joint\n\ninterest billing receivables, if payment is not made, the Group can withhold future payments of revenue, as\n\nsuch, there is minimal to no credit risk associated with these receivables.\n\n####### **d) Liquidity Risk**\n\nLiquidity risk is the risk that the Group will not be able to meet its financial obligations as they fall due. The\n\nGroup’s approach to managing liquidity is to ensure that it will have sufficient liquidity to meet its liabilities as\n\nthey become due, without incurring unacceptable losses or risking damage to the Group’s reputation. The Group\n\nmanages liquidity risk by maintaining adequate reserves and banking facilities by continuously monitoring\n\nforecast and actual cash flows, and by matching the maturity profiles of financial assets and liabilities.\n\nAs at 31 December 2014, based on the current borrowing based, the Group had $15.0 million of undrawn\n\nborrowing facilities.", - "page_start": 100, - "page_end": 100, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "####### **Comprehensive Net Earnings**\n\nComprehensive net earnings consist of net earnings and other gains and losses affecting equity that are excluded from net earnings. These\n\nconsist of postretirement plan adjustments, net of related income tax effects and foreign currency translation adjustments.\n\n####### **Cash Equivalents**\n\nCash equivalents are short-term investments with a maturity of three months or less from the date of purchase and are carried at amortized\n\ncost, which approximates fair value. Our cash management system provides for the reimbursement of all major bank disbursement accounts\n\non a daily basis. Accounts payable at the end of 2014 and 2013 included $129 and $133 of checks not yet presented for payment drawn in\n\nexcess of our bank deposit balances.", - "page_start": 54, - "page_end": 54, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**101**\n\nNotes to the Financial Statements\n\ncontinued\n\nA 10% increase / (decrease) of the share price for the equity securities at 30 June 2013 would have increased / (decreased) equity by the amounts\n\nshown as follows:\n\n+10% -10%\n\nProfit\n\n$’000\n\nEquity\n\n$’000\n\nLoss\n\n$’000\n\nEquity\n\n$’000\n\nAvailable-for-sale financial asset - 2013 - 77 (77) -\n\nAvailable-for-sale financial asset - 2012 - 120 - (120)\n\nInterest rate risk\n\nThe Group’s exposure to interest rate risk for classes of financial assets and financial liabilities, at 30 June 2013 and 30 June 2012 are set out as follows:\n\nFloating\n\ninterest rate\n\n$’000\n\nFixed interest\n\nmaturing in\n\n1 year or less\n\n$’000\n\nNon-interest\n\nbearing\n\n$’000\n\nTotal\n\n$’000\n\n2013\n\nFinancial assets\n\nCash and cash equivalents 32,969 - 18 32,987\n\nReceivables - - 9,431 9,431\n\nRestricted cash 5,474 - - 5,474\n\nAvailable-for-sale financial assets - - 767 767\n\nOther financial assets 7,271 - 537 7,808\n\nTotal financial assets 45,714 - 10,753 56,467\n\nFinancial liabilities\n\nPayables - - (47,106) (47,106)\n\nBorrowings (191,995) (10,570) - (202,565)\n\nDerivatives held for trading - - (1,271) (1,271)\n\nTotal financial liabilities (191,995) (10,570) (48,377) (250,942)\n\nNet financial (liabilities) / assets (146,281) (10,570) (37,624) (194,475)\n\n2012\n\nFinancial assets\n\nCash and cash equivalents 73,005 16,582 1,036 90,623\n\nReceivables - - 12,226 12,226\n\nOther financial assets 1,490 - 3,180 4,670\n\nAvailable-for-sale financial assets - - 1,751 1,751\n\nTotal financial assets 74,495 16,582 18,193 109,270\n\nFinancial liabilities\n\nPayables - - (49,278) (49,278)\n\nBorrowings (148,625) (8,919) - (157,544)\n\nDerivatives held for trading - - (2,685) (2,685)\n\nTotal financial liabilities (148,625) (8,919) (51,963) (209,507)\n\nNet financial (liabilities) / assets (74,130) 7,663 (33,770) (100,237)\n\nThe weighted average rate on floating rate borrowings was 5.87% for the year ended 30 June 2013 (2012: 6.36%).", - "page_start": 102, - "page_end": 102, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_FFIN_2002.pdf", - "query": "What is the address of the San Angelo National Bank main office ?", - "target_page": 21, - "target_passage": "Main Office 301 W. Beauregard San Angelo, Texas 76903 Chartered 1997 ", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "on loans, the amount of dividends declared, and required capitalization ratios.\n\n*National Banking Associations* . Banks that are organized as national banking associations under the National\n\nBank Act are subject to regulation and examination by the Office of the Comptroller of the Currency, or OCC. The\n\nOCC supervises, regulates and regularly examines the First National Bank of Abilene, First National Bank,\n\nSweetwater, First Financial Bank, National Association, Cleburne, Eastland National Bank, San Angelo National\n\nBank, Weatherford National Bank, First Financial Bank, National Association, Southlake and City National Bank,\n\nMineral Wells. The OCC’s supervision and regulation of banks is primarily intended to protect the interests of\n\ndepositors. The National Bank Act:\n\n- requires each national banking association to maintain reserves against deposits,\n\n- restricts the nature and amount of loans that may be made and the interest that may be charged, and\n\n- restricts investments and other activities.", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "2\n\n- Eastland National Bank, Eastland, Texas;\n\n- First Financial Bank, National Association, Cleburne, Texas;\n\n- Stephenville Bank and Trust Co., Stephenville, Texas;\n\n- San Angelo National Bank, San Angelo, Texas;\n\n- Weatherford National Bank, Weatherford, Texas;\n\n- First Financial Bank, National Association, Southlake, Texas; and\n\n- City National Bank, Mineral Wells, Texas.\n\nAs described in more detail below, we elected to be treated as a financial holding company in September 2001.\n\nOur service centers are located primarily in North Central and West Texas. Considering the branches and\n\nlocations of all our subsidiary banks, as of December 31, 2002, we had 28 financial centers across Texas, with seven\n\nlocations in Abilene, two locations in Cleburne, two locations in Stephenville, two locations in San Angelo, three\n\nlocations in Weatherford, and one location each in Mineral Wells, Hereford, Sweetwater, Eastland, Southlake,\n\nAledo, Alvarado, Burleson, Keller, Trophy Club, Roby, and Trent.\n\nInformation on our revenues, profits and losses and total assets appears in the discussion of our Results of\n\nOperations contained in Item 7 hereof.\n\n####### **First Financial Bankshares, Inc.**\n\nWe provide management and technical resources and policy direction to our subsidiary banks, which enables\n\nthem to improve or expand their banking services while continuing their local activity and identity. Each of our\n\nsubsidiary banks operates under the day-to-day management of its own board of directors and officers, with\n\nsubstantial authority in making decisions concerning their own investments, loan policies, interest rates, and service\n\ncharges. We provide resources and policy direction in, among other things, the following areas:\n\n- asset and liability management;\n\n- accounting, budgeting, planning and insurance;\n\n- capitalization; and\n\n- regulatory compliance.\n\nIn particular, we assist our subsidiary banks with, among other things, decisions concerning major capital\n\nexpenditures, employee fringe benefits, including pension plans and group insurance, dividend policies, and\n\nappointment of officers and directors and their compensation. We also perform, through corporate staff groups or\n\nby outsourcing to third parties, internal audits and loan reviews of our subsidiary banks. Through First National\n\nBank of Abilene, we provide advice and specialized services for our banks related to lending, investing, purchasing,\n\nadvertising, public relations, and computer services.\n\nWhile we have no specific acquisition agreements in place or commitments to expand our branch network, we\n\nperiodically evaluate various potential financial institution acquisition opportunities and also periodically evaluate\n\npotential locations for new branch offices. We anticipate that funding for any acquisitions or expansions would be\n\nprovided from our existing cash balances, available dividends from subsidiary banks, utilization of available lines of\n\ncredit and future debt or equity offerings.\n\n####### **Services Offered by Our Subsidiary Banks**\n\nEach of our subsidiary banks is a separate legal entity that operates under the day-to-day management of its own\n\nboard of directors and officers. Each of our subsidiary banks provides general commercial banking services, which\n\ninclude accepting and holding checking, savings and time deposits, making loans, automated teller machines, drive-\n\nin and night deposit services, safe deposit facilities, transmitting funds, and performing other customary commercial\n\nbanking services. Certain of our subsidiary banks also administer pension plans, profit sharing plans and other\n\nemployee benefit plans. First National Bank of Abilene, First National Bank, Sweetwater, Stephenville Bank and\n\nTrust Co. and San Angelo National Bank have active trust departments. The trust departments offer a complete", - "page_start": 29, - "page_end": 29, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "Bob Housley appreciates loyalty.\n\nHis company, Housley Communications, is a thriv-\n\ning business with a staff of 225 and contracting\n\nrelationships with over 700 firms. The company\n\nprovides engineering and implementation of\n\nadvanced telecommunications systems. “We pro-\n\nvide everything a company needs to go from zero\n\nto 100 percent.”\n\nSuccess hasn’t necessarily been easy. “We had\n\nsome difficult times when we were starting out in\n\nthe ’80s,” says Housley. “San Angelo National\n\nBank worked very diligently to help me get where\n\nI am today. They stuck with me and were always\n\nteam players.”\n\nHousley is a demanding customer - a trait to\n\nwhich he credits much of his success. “I am very\n\ncustomer service-oriented. It’s how I built my busi-\n\nness. I appreciate that I can get that same type of\n\ndedication from San Angelo National Bank, and I\n\nsee it reflected throughout the First Financial\n\nBankshares organization.”\n\nHousley the shareholder is no less demanding, but\n\nhe’s had good reason to be pleased with his\n\nreturns from First Financial Bankshares. “First\n\nFinancial’s expansion strategy is excellent - they\n\ndo their research and find banks with good oppor-\n\ntunity. Their operations are sound, and their growth\n\nis well-managed. I believe they are one of the\n\nbest mid-size banking organizations around.”\n\nBob Housley\n\nPresident Housley Communications San Angelo, Texas 9\n\n#### “They stuck with me and were always team players.”", - "page_start": 10, - "page_end": 10, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "8\n\nthe parent’s general unsecured creditors. If a depository institution fails to submit an acceptable capital restoration\n\nplan, it shall be treated as if it is significantly undercapitalized. “Significantly undercapitalized” depository\n\ninstitutions may be subject to a number of requirements and restrictions, including orders to sell sufficient voting\n\nstock to become “adequately capitalized,” requirements to reduce total assets, and cessation of receipt of deposits\n\nfrom correspondent banks. “Critically undercapitalized” institutions are subject to the appointment of a receiver or\n\nconservator. Finally, FDICIA requires the various regulatory agencies to set forth certain standards that do not relate\n\nto capital. Such standards relate to the safety and soundness of operations and management and to asset quality and\n\nexecutive compensation, and permit regulatory action against a financial institution that does not meet such\n\nstandards.\n\nIf an insured bank fails to meet its capital guidelines, it may be subject to a variety of other enforcement\n\nremedies, including a prohibition on the taking of brokered deposits and the termination of deposit insurance by the\n\nFDIC. Bank regulators continue to indicate their desire to raise capital requirements beyond their current levels.\n\nIn addition to FDICIA capital standards, Texas-chartered banks must also comply with the capital requirements\n\nimposed by the Texas Banking Department. Neither the Texas Finance Code nor its regulations specify any\n\nminimum capital-to-assets ratio that must be maintained by a Texas-chartered bank. Instead, the Texas Banking\n\nDepartment determines the appropriate ratio on a bank by bank basis, considering factors such as the nature of a\n\nbank’s business, its total revenue, and the bank’s total assets. As of December 31, 2002, all of our Texas-chartered\n\nbanks exceeded the minimum ratios applied to them.\n\n*Our Support of Our Subsidiary Banks*\n\nUnder Federal Reserve Board policy, we are expected to commit resources to act as a source of strength to\n\nsupport each of our subsidiary banks. This support may be required at times when, absent such Federal Reserve\n\nBoard policy, we would not otherwise be required to provide it. In addition, any loans we make to our subsidiary\n\nbanks would be subordinate in right of payment to deposits and to other indebtedness of our banks. In the event of a\n\nbank holding company’s bankruptcy, any commitment by the bank holding company to a federal bank regulatory\n\nagency to maintain the capital of a subsidiary bank will be assumed by the bankruptcy trustee and be subject to a\n\npriority of payment.\n\nUnder the National Bank Act, if the capital stock of a national bank is impaired by losses or otherwise, the OCC\n\nis authorized to require the bank’s shareholders to pay the deficiency on a pro-rata basis. If any shareholder refuses\n\nto pay the pro-rata assessment after three months notice, then the bank’s board of directors must sell an appropriate\n\namount of the shareholder’s stock at a public auction to make up the deficiency. To the extent necessary, if a\n\ndeficiency in capital still exists and the bank refuses to go into liquidation, then a receiver may be appointed to wind\n\nup the bank’s affairs. Additionally, under the Federal Deposit Insurance Act, in the event of a loss suffered or\n\nanticipated by the FDIC (either as a result of the default of a banking subsidiary or related to FDIC assistance\n\nprovided to a subsidiary in danger of default) our other banking subsidiaries may be assessed for the FDIC’s loss.\n\n*Interstate Banking and Branching Act*\n\nPursuant to the Riegle-Neal Interstate Banking and Branching Efficiency Act of 1994, or Riegle-Neal Act, a\n\nbank holding company or financial holding company is able to acquire banks in states other than its home state. The\n\nRiegle-Neal Act also authorized banks to merge across state lines, thereby creating interstate branches, beginning", - "page_start": 35, - "page_end": 35, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "3\n\nrange of services to individuals, associations, and corporations. These services include administering estates,\n\ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene,\n\nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association,\n\nSouthlake, Texas provide securities brokerage services through arrangements with various third parties.\n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose\n\nnational bank under which we will consolidate the management of our current trust departments. The new entity\n\nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We\n\nbelieve that with this structure we can more effectively manage our current trust operations and provide trust\n\nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust\n\ncompany will begin operations in the latter part of 2003.\n\n####### **Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits,\n\nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our\n\nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services\n\noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas\n\nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions,\n\nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and\n\nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel.\n\nOur business does not depend on any single customer or any few customers, the loss of any one of which would\n\nhave a materially adverse effect upon our business. Although we have a broad base of customers that are not related\n\nto us, our customers also occasionally include our officers and directors, as well as other entities with which we are\n\naffiliated. With our subsidiary banks we may make loans to officers and directors, and entities with which we are\n\naffiliated, in the ordinary course of business. We make these loans on substantially the same terms, including\n\ninterest rates and collateral, as those prevailing at the time for comparable transactions with other persons. Loans to\n\ndirectors, officers and their affiliates are also subject to numerous restrictions under federal and state banking laws\n\nwhich we describe in greater detail below.\n\n####### **Employees**\n\nWith our subsidiary banks we employed approximately 750 full-time equivalent employees at February 1, 2003.\n\nOur management believes that our employee relations have been and will continue to be good.\n\n####### **Supervision and Regulation**\n\nBoth federal and state laws extensively regulate bank holding companies, financial holding companies and\n\nbanks. These laws (and the regulations promulgated thereunder) are primarily intended to protect depositors and the\n\ndeposit insurance fund of the Federal Deposit Insurance Corporation, or FDIC, although shareholders may also\n\nbenefit. The following information describes particular laws and regulatory provisions relating to financial holding\n\ncompanies and banks. This discussion is qualified in its entirety by reference to the particular laws and regulatory\n\nprovisions. A change in any of these laws or regulations may have a material effect on our business and the\n\nbusiness of our subsidiary banks.\n\n*Bank Holding Companies and Financial Holding Companies*\n\nTraditionally, the activities of bank holding companies were limited to the business of banking and activities", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n\nNotes to Consolidated Financial Statements\n\nDecember 31, 2002, 2001 and 2000\n\nF-9\n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES:\n\nNature of Operations\n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns\n\n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of\n\nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First\n\nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne;\n\nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank,\n\nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of\n\nrevenue is providing loans and banking services to consumers and commercial customers in the market area in\n\nwhich the subsidiary is located.\n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied\n\nin the preparation of the accompanying consolidated financial statements follows. The accounting principles\n\nfollowed by the Company and the methods of applying them are in conformity with both accounting principles\n\ngenerally accepted in the United States of America and prevailing practices of the banking industry.\n\nUse of Estimates in Preparation of Financial Statements\n\nThe preparation of financial statements in conformity with accounting principles generally accepted in the United\n\nStates of America requires management to make estimates and assumptions that affect the reported amounts of\n\nassets and liabilities and disclosure of contingent assets and liabilities at the date of the financial statements and\n\nreported amounts of revenues and expenses during the reporting period. Actual results could differ from those\n\nestimates. Material estimates that are particularly susceptible to significant change in the near term relate to the\n\ndetermination of the allowance for loan losses, the valuations of foreclosed real estate, deferred income tax assets,\n\nand the fair value of financial instruments.\n\nConsolidation\n\nThe accompanying consolidated financial statements include the accounts of Bankshares and its subsidiaries, all of\n\nwhich are wholly-owned. All significant intercompany accounts and transactions have been eliminated.\n\nInvestment Securities\n\nManagement classifies debt and equity securities as held-to-maturity, available-for-sale, or trading based on its\n\nintent. Debt securities that management has the positive intent and ability to hold to maturity are classified as held-\n\nto-maturity and recorded at cost, adjusted for amortization of premiums and accretion of discounts, which are\n\nrecognized as adjustments to interest income using the interest method. Securities not classified as held-to-maturity\n\nor trading are classified as available-for-sale and recorded at estimated fair value, with unrealized gains and losses,\n\nnet of deferred income taxes, excluded from earnings and reported in a separate component of shareholders’ equity.\n\nSecurities classified as trading are recorded at estimated fair value, with unrealized gains and losses included in\n\nearnings. The Company had no trading securities at December 31, 2002, 2001, or 2000.\n\nLoans and Allowance for Loan Losses\n\nLoans are stated at the amount of unpaid principal, reduced by unearned income and an allowance for loan losses.\n\nUnearned income on installment loans is recognized in income over the terms of the loans in decreasing amounts\n\nusing a method which approximates the interest method. Interest on other loans is calculated by using the simple\n\ninterest method on daily balances of the principal amounts outstanding. The Company expenses its net loan\n\norigination costs, a method which does not materially differ from deferring and amortizing such amounts as an", - "page_start": 72, - "page_end": 72, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "11\n\n*Pending and Proposed Legislation*\n\nNew regulations and statutes are regularly proposed containing wide-ranging proposals for altering the\n\nstructures, regulations and competitive relationships of financial institutions operating in the United States. We\n\ncannot predict whether or in what form any proposed regulation or statute will be adopted or the extent to which our\n\nbusiness may be affected by any new regulation or statute.\n\n*Enforcement Powers of Federal Banking Agencies*\n\nThe Federal Reserve and other state and federal banking agencies and regulators have broad enforcement\n\npowers, including the power to terminate deposit insurance, issue cease-and-desist orders, impose substantial fees\n\nand other civil and criminal penalties and appoint a conservator or receiver. Our failure to comply with applicable\n\nlaws, regulations and other regulatory pronouncements could subject us, as well as our officers and directors, to\n\nadministrative sanctions and potentially substantial civil penalties.\n\n*Available Information*\n\nWe file annual, quarterly and special reports, proxy statements and other information with the Securities and\n\nExchange Commission. You may read and copy any document we file at the Securities and Exchange\n\nCommission’s Public Reference Room at 450 Fifth Street, N.W., Washington, D.C. 20549. Please call the\n\nSecurities and Exchange Commission at 1-800-SEC-0330 for further information on the public reference room. Our\n\nSEC filings are also available to the public at the Securities and Exchange Commission’s web site at\n\nhttp://www.sec.gov. No information from this web page is incorporated by reference herein. Our web site is\n\nhttp://www.ffin.com. You may also obtain copies of our annual, quarterly and special reports, proxy statements and\n\ncertain other information filed with the SEC, as well as amendments thereto, free of charge from our web site.\n\nThese documents are posted to our web site as soon as reasonably practicable after we have filed them with the SEC.\n\n####### **ITEM 2. PROPERTIES**\n\nOur principal office is located in the First National Bank Building at 400 Pine Street in downtown Abilene,\n\nTexas. We lease two spaces in a building owned by First National Bank of Abilene. The lease for approximately\n\n2,300 square feet of space expires December 31, 2004. The lease for approximately 1,100 square feet of space\n\nexpires May 31, 2006. Our subsidiary banks collectively own 22 banking facilities, some of which are detached\n\ndrive-ins, and they also lease six banking facilities. Our management considers all of our existing locations to be\n\nwell-suited for conducting the business of banking. We believe that our existing facilities are adequate to meet our\n\nrequirements and our subsidiary banks’ requirements for the foreseeable future.\n\n####### **ITEM 3. LEGAL PROCEEDINGS**\n\nFrom time to time we and our subsidiary banks are parties to lawsuits arising in the ordinary course of our\n\nbanking business. However, there are no material pending legal proceedings to which we, our subsidiary banks or\n\nour other direct and indirect subsidiaries, or any of their properties, are currently subject. Other than regular, routine\n\nexaminations by state and federal banking authorities, there are no proceedings pending or known to be\n\ncontemplated by any governmental authorities.\n\n####### **ITEM 4. SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS**\n\nNo matters were submitted to a vote of our security holders during the fourth quarter of our fiscal year ended\n\nDecember 31, 2002.", - "page_start": 38, - "page_end": 38, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "## San Angelo\n\nMain Office\n\n301 W. Beauregard San Angelo, Texas 76903 *Chartered 1997*\n\nBranch\n\n3471 Knickerbocker San Angelo, Texas 76904\n\nSenior Officers\n\nMichael L. Boyd\n\n*President and Chief Executive Officer*\n\nDavid Byrd\n\n*Executive Vice President and Trust Officer*\n\nRobert Pate\n\n*Executive Vice President*\n\nKatherine Reeves\n\n*Executive Vice President and Cashier*\n\nDirectors\n\nDal DeWees\n\n*Chairman of the Board*\n\nGeorge Alexander\n\n*Partner, Alexander Construction Company*\n\nMichael L. Boyd\n\n*President and Chief Executive Officer*\n\nW. Dan Cravy, M.D.\n\n*Physician*\n\nDavid B. Drake\n\n*Investment Advisor*\n\nF. Scott Dueser\n\n*First Financial Bankshares, Inc.*\n\nDoug Eakman\n\n*Owner, Pecos Street Pharmacy*\n\nJoe Henderson\n\n*President, Porter Henderson Implement* *Company, Inc.*\n\nRobert D. Housley\n\n*President and Owner,* *Housley Communications*\n\nJim Johnson\n\n*Shannon, Porter, Johnson, Pfluger,* *Davis & Joynton, LLP*\n\nDavid F. Lupton\n\n*President, Angelo Glass & Mirror* *Company, Inc.*\n\nKenneth T. Murphy\n\n*First Financial Bankshares, Inc.*\n\nBill Pfluger\n\n*Rancher*\n\nRichard W. Salmon\n\n*Investments*\n\nJohn E. Schwartz, Sr.\n\n*Farmer/Rancher*\n\nF.L. (Steve) Stephens\n\n*Retired Chairman and Chief Executive Officer,* *Town & Country Food Stores, Inc.*\n\nAssets $303,124 $299,808\n\nLoans 115,450 110,685\n\nDeposits 251,931 257,212\n\nEquity 30,634 27,986\n\nNet Income 4,917 4,167\n\nTrust Assets 144,047 129,471\n\nReturn on Average Assets 1.70% 1.46%\n\nReturn on Average Equity 16.48 15.13\n\nIN THOUSANDS December 31, 2002 December 31, 2001\n\n###### San Angelo National Bank\n\n**24 <sup>%</sup>** Tom Green County Deposit Market Share\n\n19\n\nMichael L. Boyd\n\n*President and* *Chief Executive Officer*", - "page_start": 20, - "page_end": 20, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "9\n\n*Community Reinvestment Act of 1977*\n\nThe Community Reinvestment Act of 1977, or CRA subjects a bank to regulatory assessment to determine if\n\nthe institution meets the credit needs of its entire community, including low- and moderate-income neighborhoods\n\nserved by the bank, and to take that determination into account in its evaluation of any application made by such\n\nbank for, among other things, approval of the acquisition or establishment of a branch or other deposit facility, an\n\noffice relocation, a merger, or the acquisition of shares of capital stock of another financial institution. The\n\nregulatory authority prepares a written evaluation of an institution’s record of meeting the credit needs of its entire\n\ncommunity and assigns a rating. We believe our subsidiary banks have taken significant actions to comply with the\n\nCRA, and each has received at least a “satisfactory” commendation in its most recent review by federal regulators\n\nwith respect to its compliance with the CRA.\n\n*Monitoring and Reporting Suspicious Activity*\n\nUnder the Bank Secrecy Act, IRS rules and other regulations, we are required to monitor and report unusual or\n\nsuspicious account activity as well as transactions involving the transfer or withdrawal of amounts in excess of\n\nprescribed limits. In the wake of the tragic events of September 11th, on October 26, 2001, the President signed the\n\nUniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism,\n\nor USA PATRIOT Act, of 2001. Under the USA PATRIOT Act, financial institutions are subject to prohibitions\n\nagainst specified financial transactions and account relationships as well as enhanced due diligence and “know your\n\ncustomer” standards in their dealings with foreign financial institutions and foreign customers. For example, the\n\nenhanced due diligence policies, procedures, and controls generally require financial institutions to take reasonable\n\nsteps to:\n\n- to conduct enhanced scrutiny of account relationships to guard against money laundering and report any\n\nsuspicious transaction;\n\n- to ascertain the identity of the nominal and beneficial owners of, and the source of funds deposited into,\n\neach account as needed to guard against money laundering and report any suspicious transactions;\n\n- to ascertain for any foreign bank, the shares of which are not publicly traded, the identity of the owners of\n\nthe foreign bank, and the nature and extent of the ownership interest of each such owner; and\n\n- to ascertain whether any foreign bank provides correspondent accounts to other foreign banks and, if so, the\n\nidentity of those foreign banks and related due diligence information.\n\nUnder the USA PATRIOT Act, financial institutions are also required to establish anti-money laundering\n\nprograms. The USA PATRIOT Act sets forth minimum standards for these programs, including:\n\n- the development of internal policies, procedures, and controls;\n\n- the designation of a compliance officer;\n\n- an ongoing employee training program; and\n\n- an independent audit function to test the programs.\n\nIn addition, the USA PATRIOT Act also requires the Secretary of the Treasury to adopt rules addressing a\n\nnumber of related issues, including increasing the cooperation and information sharing between financial\n\ninstitutions, regulators, and law enforcement authorities regarding individuals, entities and organizations engaged in,\n\nor reasonably suspected based on credible evidence of engaging in, terrorist acts or money laundering activities. Any\n\nfinancial institution complying with these rules will not be deemed to violate the privacy provisions of the Gramm-\n\nLeach-Bliley Act that are discussed below. Finally, under the regulations of the Office of Foreign Asset Control, we\n\nare required to monitor and block transactions with certain “specially designated nationals” who OFAC has\n\ndetermined pose a risk to U.S. national security.", - "page_start": 36, - "page_end": 36, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "citizenship in force at that time, shall be regarded as a citizen by descent. **34. Tenure of office of President** (1) The President shall, subject to the provisions of this section, hold office for an aggregate period not exceeding 10 years beginning from the date of his or her first assumption of office of President after the commencement of this Act. (2) The President shall cease to hold the office of President if at any time during his or her tenure of office any circumstances arise that would, if he or she were not a member of the National Assembly, cause him or her to be disqualified for election thereto. (3) The President shall cease to hold office of President at the expiry of the period prescribed under subsection (1) of this section, or when the person elected at the next election of President following a dissolution of Parliament assumes office. **35. Vacancy in office of President** (1) Whenever the President dies, resigns or ceases to hold office, the Vice- President shall assume office as President with effect from the date of the death, resignation or ceasing to be President. (2) If the office of President- ( *a* ) becomes vacant in circumstances in which there is no Vice-President; or ( *b* ) is vacant whilst the Vice-President is absent from Botswana or is, by reason of physical or mental infirmity unable to perform the functions of his or her office, the functions of the office of President shall, until such time as a new President assumes office in accordance with this section or section 32 of this Constitution, be performed by such Minister as the Cabinet shall appoint. For the purposes of this subsection, a certificate of the Chief Justice that the Vice-President is by reason of physical or mental infirmity unable to discharge the functions of his or her office, shall, in respect of any period for which it is in force, be conclusive and shall not be questioned in any court. (3) Any person performing the functions of the office of President by virtue of subsection (1) or (2) of this section shall not exercise the power of the President to revoke the appointment of Vice-President or to dissolve Parliament. (4) If the office of President becomes vacant, the National Assembly shall, unless Parliament is dissolved, and notwithstanding that it may be prorogued, meet on the seventh day after the office of President becomes vacant, or on such earlier day as may be appointed by the Speaker, and shall elect a person to the office in such manner as is prescribed by the next following subsection and, subject thereto, by or under an Act of Parliament. (5) In an election of a President under this section- ( *a* ) the Speaker shall preside at the meeting and conduct the election; ( *b* ) a person may be a candidate if and shall not be a candidate unless he or she has been nominated as a candidate with his or her consent prior to the sitting of the National Assembly at which the election takes place, by not less than 10 Members of the National Assembly entitled to vote in that election; ( *c* ) at the election every Member of the Assembly except the Speaker shall be entitled to vote; ( *d* ) the votes of the Members of the Assembly who are entitled to vote shall be given by ballot in such manner as not to disclose how any particular Member voted, and any person who receives the votes of more than one half of the total number of persons entitled to vote shall be declared elected as President; ( *e* ) a person elected as President under this section shall assume the office of President on the day upon which he or she is declared to be elected; ( *f* ) not more than three ballots shall be taken unless in the opinion of the Speaker the holding of further ballots is likely to result in the election of a President, in", - "page_start": 18, - "page_end": 18, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "news3.pdf", - "query": "What kind of scholarship programs are available to start a financial career?", - "target_page": 1, - "target_passage": "Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Money](https://about.newsusa.com/taxonomy/term/19) / 3 Great Resources to Kick-Start Your Financial Planning Career\n\n## 3 Great Resources to Kick-Start Your Financial Planning Career\n\n[(NewsUSA)](https://www.newsusa.com/) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of\n\nhelping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should\n\nbe a top contender, whether you are just starting out or looking to make a career change. But once you have\n\ndecided that financial planning is the field for you, how do you get started? Here are three resources that can help\n\nyou launch a successful financial planning career.\n\n1. [Guide to Careers in Financial Planning](https://www.cfp.net/knowledge/reports-and-statistics/guide-to-careers-in-financial-planning) . Based on interviews with leading financial services firms, this guide\n\nintroduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry\n\npoints and career tracks, explores the types of companies that hire financial planners and provides information on\n\nhow to find financial planning career opportunities. It also includes resources such as a list of recommended\n\nquestions to ask in a job interview.\n\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional\n\njourney. Some are offered directly through colleges and universities that have financial planning degree and\n\ncertificate programs. Others are available through nonprofits and organizations like the CFP Board Center for\n\nFinancial Planning, which administers [16 scholarship programs](https://www.cfp.net/get-certified/tools-and-resources/apply-for-a-scholarship) that help pay for the education and exam\n\nrequirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer\n\nscholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and\n\ncredentials such as CFP® certification -- some of which may be required to advance within the company.\n\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective\n\nemployers. CFP Board’s spring and fall career fairs are some of the most popular hiring events in the profession,\n\nwith dozens of firms participating in these online exhibitions. Job seekers can visit employers’ virtual exhibit booths\n\nand view open jobs and internships, apply for open positions and interact with employers through one-on-one video\n\nmeetings and messaging. You can also visit the [CFP Board Career Center](https://careers.cfp.net/) to browse current job and internship\n\nopportunities in financial planning, as well as a collection of articles providing career guidance.\n\nOther top resources include career offices at your college or university, financial services companies’ career\n\nwebsites and professional organizations that may have a local chapter near you.\n\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth\n\n[and development as a future financial planning professional. To learn more about CFP® certification, visit the ](https://www.cfp.net/why-cfp-certification/the-standard-of-excellence) CFP\n\nBoard website .\n\nArticle Link\n\n[https://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni…](https://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planning-career)\n\n[MONEY](https://about.newsusa.com/taxonomy/term/19)\n\n11/23/2022\n\nRELATED ARTICLES\n\n", - "page_start": 0, - "page_end": 0, - "source_file": "news3.pdf" - }, - { - "text": "to selected students pursuing careers in finance, economics, accounting,\n\nmarketing, business administration, computer science and information\n\ntechnology. In addition, scholars will take part in a Chesapeake Presiden­\n\ntial Leadership Course facilitated by faculty members in coordination with\n\ndesignated Chesapeake leadership coaches, including a Chesapeake senior\n\nvice president and OCU alumni.\n\nIn 2007 Chesapeake launched a scholarship program in Texas with an\n\ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal­\n\nlas to match its gift within a year. The cities responded and matched the gift,\n\nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the\n\ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the\n\ncost of higher education for 48 minority students. The fund provides each\n\nstudent $20,000 a year for up to four years at the school of their choice. To\n\ndate more than $1.0 million has been distributed to deserving local students.\n\nTo help ensure the training of qualified geologists, engineers, land­\n\nmen and energy lawyers in the next generation, we award scholarships\n\nto students pursuing energy-related degrees. We also help mentor them\n\nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship\n\nrecipients are paired with Chesapeake employee mentors who help devel­\n\nop students’ knowledge and provide career advice. There are currently 25\n\nmentors and 40 scholarship recipients participating in the Peak Program.\n\nOur recruiting team also initiated a strategic military recruitment\n\neffort during the past two years to hire former military personnel to\n\nwork in a variety of leadership and crew positions. This effort earned\n\nChesapeake an honor from G.I. JOBS magazine when we were named a\n\n2011 Top 100 Military-Friendly Employer. Chesapeake currently employs\n\n37 men and women who formerly served as junior military officers and\n\nmore than 100 former servicemen and servicewomen who joined the\n\ncompany through a program called Troops 2 Roughnecks.\n\nIn addition to our specific scholarship programs, one-time educational\n\ndonations and recruitment efforts, in 2010 we gave more than $1.8 million\n\nto fund higher education for nearly 400 other students in 12 states through\n\nour Chesapeake Scholars program. Chesapeake’s scholarships help recruit\n\nthe best and brightest students and provide educational opportunities in\n\ncommunities where we operate. In Oklahoma City, more than 400 em­\n\nployees volunteer for up to an hour a week on company time at four local\n\npublic schools. Chesapeake’s program has grown to become the largest\n\ncorporate mentoring program in Oklahoma.\n\n**Community Impact**\n\nChesapeake employees have been enriching their hometowns as volun­\n\nteers for many years. We formalized those efforts in 2009 by establishing\n\nan official employee volunteer program, the H.E.L.P. (Helping Energize\n\nLocal Progress) Initiative, wherein employees are invited to volunteer\n\neach month for a variety of organizations from food pantries to animal\n\nshelters. Through that program, employees donated more than 26,000\n\nhours to their communities in 2009.\n\nIn the summer of 2010, Chesapeake took the H.E.L.P. Initiative to a\n\nhigher level through the launch of Operation Blue. From Memorial Day\n\nthrough Labor Day, each employee was given four hours of company time\n\nto complete the volunteer project of their choice. Our employees eagerly\n\naccepted the challenge, and in three months more than 4,900 employ­\n\nees donated 30,900 hours of service to 519 organizations in more than\n\n96 communities across the country. Operation Blue is now an annual\n\nvolunteer program in which employees roll up their sleeves in the com­\n\nmunities they call home.\n\nChesapeake’s contributions take many forms: financial and equipment\n\ndonations, volunteerism and scholarships. Last year, we made numerous\n\nin-kind donations of laptops, reconditioned Chesapeake fleet vehicles and", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "economic growth” loan program. The bank economic growth” loan program. The bank\n\nresponds proactively to funding demand responds proactively to funding demand\n\nfrom from local companies wishing to expand local companies wishing to expand\n\ninto into areas such as medical and nursing care, areas such as medical and nursing care,\n\nenvironment and energy environment and energy technologies, and technologies, and\n\nAsia-related businesses, on a priority basis. Asia-related businesses, on a priority basis.\n\nAs of June 30, 2011, loans totaling ¥8.8 billion As of June 30, 2011, loans totaling ¥8.8 billion\n\nhad been made from the Kansai Genki Fund had been made from the Kansai Genki Fund\n\nfor 38 projects, of which 76.3% fell into the for 38 projects, of which 76.3% fell into the\n\nabove three priority categories. The Kansai above three priority categories. The Kansai\n\nGenki Fund is used to help customers develop Genki Fund is used to help customers develop\n\na wide range of businesses. The bank will a wide range of businesses. The bank will\n\ncontinue to play its role as a regional financial continue to play its role as a regional financial\n\ninstitution dedicated to supporting customers institution dedicated to supporting customers\n\nthat show originality and energy in helping that show originality and energy in helping\n\ndevelop the Kansai economy. develop the Kansai economy.\n\n**Financial education**\n\n**through teaching of**\n\n**investment skills**\n\nSMBC Friend Securities runs an online SMBC Friend Securities runs an online\n\neducation program, “You education program, “You ・ You Toshi” You Toshi”\n\n(Self-composed Investment), for (Self-composed Investment), for inexperi inexperi-\n\nenced investors. enced investors.\n\nThe service is free and includes a training The service is free and includes a training\n\nprogram that can be used as a tool for program that can be used as a tool for\n\nlifelong study of investment skills. lifelong study of investment skills.\n\nEnvironmental and\n\nenergy businesses:\n\n34.2%\n\nOthers:\n\n23.7%\n\nMedical, nursing and healthcare businesses:\n\n31.6%\n\nInvestment and business expansion in Asia, etc.: 10.5%\n\nKansai Genki Fund Financing by sector\n\n(June 30, 2011)\n\nWe provide financing support We provide financing support\n\nto local care businesses to local care businesses\n\n“You “You ・ You Toshi” website You Toshi” website\n\n(SMBC Friend Securities) (SMBC Friend Securities)\n\n#### **Together with Our Customers**\n\nFiscal 2011 is the 20th anniversary of the Fiscal 2011 is the 20th anniversary of the\n\n“Chikyuni Yasashii Card,” a social contribution “Chikyuni Yasashii Card,” a social contribution\n\nand donation-type credit card launched by and donation-type credit card launched by\n\nCedyna in 1991. Donations made through Cedyna in 1991. Donations made through\n\nthe card totaled over ¥500 million by 2006, the card totaled over ¥500 million by 2006,\n\nand are expected to surpass ¥600 million and are expected to surpass ¥600 million\n\nin the coming fiscal year—a tribute to the in the coming fiscal year—a tribute to the\n\ngenerosity of cardholders. generosity of cardholders.\n\n“Chikyuni Yasashii Cards” fall into 14 “Chikyuni Yasashii Cards” fall into 14\n\ncategories, based on a global environmental categories, based on a global environmental\n\nprotection theme. These range from major protection theme. These range from major\n\nissues affecting the entire planet, such as issues affecting the entire planet, such as\n\nglobal warming and ozone layer protection, global warming and ozone layer protection,\n\nto specific campaigns for designated to specific campaigns for designated\n\nenvironments and ecosystems (turtle and environments and ecosystems (turtle and\n\ndragonfly sanctuary protection programs). dragonfly sanctuary protection programs).\n\nCardholders choose categories of interest Cardholders choose categories of interest\n\nto them when to them when\n\nthey subscribe. they subscribe.\n\nMerely by using Merely by using", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "ⓒ UNICEF\n\nMozambique/Arild Drivdal\n\n**International cooperation begins at home**\n\nThe SMFG Group is engaged in a range of activities The SMFG Group is engaged in a range of activities\n\nthat contribute to development at both the regional that contribute to development at both the regional\n\nand international level. In addition to overseas units’ and international level. In addition to overseas units’\n\nindependent initiatives, which are geared to host independent initiatives, which are geared to host\n\ncountry issues and characteristics, the Group supports country issues and characteristics, the Group supports\n\nprojects that have contributed to achievement of the projects that have contributed to achievement of the\n\nUnited Nations’ global Millennium Development Goals, United Nations’ global Millennium Development Goals,\n\nsuch as poverty eradication, health improvement and such as poverty eradication, health improvement and\n\nstatus improvement for education and women in status improvement for education and women in\n\ndeveloping countries. Our support takes the form of developing countries. Our support takes the form of\n\ndonations to non-profit and non-governmental donations to non-profit and non-governmental\n\norganizations, through the employee volunteer fund. organizations, through the employee volunteer fund.\n\n(The map shows areas where fund money is used, (The map shows areas where fund money is used,\n\nmarked with a marked with a ★ symbol). Please see our website for symbol). Please see our website for\n\nmore details. more details.\n\nEurope & Africa Middle East & Asia North America\n\n**Scholarships at major universities 2**\n\n**2**\n\n**China**\n\nSumitomo Mitsui Banking Corporation (China) Limited Sumitomo Mitsui Banking Corporation (China) Limited\n\nestablished a scholarship program for students of Zhejiang established a scholarship program for students of Zhejiang\n\nUniversity, Shanghai Inter University, Shanghai Inter-\n\nnational Studies University, national Studies University,\n\nSun Yat-sen University, Sun Yat-sen University,\n\nand other universities. and other universities.\n\nSMBC Hong Kong Branch makes donations to the Asian SMBC Hong Kong Branch makes donations to the Asian\n\nYouth Orchestra (AYO), Youth Orchestra (AYO),\n\ncomprising young Asian comprising young Asian\n\nmusicians selected musicians selected\n\nthrough auditioning who through auditioning who\n\nperform all over Asia. perform all over Asia.\n\nAs a way of increasing understanding of Japanese culture, As a way of increasing understanding of Japanese culture,\n\nSMBC SMBC’s Seoul Branch donates funds to make possible the s Seoul Branch donates funds to make possible the\n\nholding of a competition holding of a competition\n\ninvolving theatrical perfor involving theatrical perfor-\n\nmances in the Japanese mances in the Japanese\n\nlanguage by South Korean language by South Korean\n\nstudents of Japanese. students of Japanese.\n\n**Donations to charity groups**\n\n**Europe**\n\nEmployees of Sumitomo Mitsui Banking Corporation Europe Employees of Sumitomo Mitsui Banking Corporation Europe\n\n(SMBCE) conducted volunteer activities in their time off. (SMBCE) conducted volunteer activities in their time off.\n\nSMBCE contributes to charitable organizations through an SMBCE contributes to charitable organizations through an\n\nin-house fund and also uses a matching gifts program under in-house fund and also uses a matching gifts program under\n\nwhich it donates a which it donates a\n\ncertain amount for certain amount for\n\nevery donation made every donation made\n\nby its employees. by its employees.\n\n**Support for a South Korean students’**\n\n**Japanese-language theater competition**\n\n**1**\n\n**1**\n\n**South Korea**\n\n**Supporting performances**\n\n**by young Asian musicians**\n\n**3 Hong Kong**\n\nThe European office of the Japan Research Institute (JRI) The European office of the Japan Research Institute (JRI)", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "## Financial Information", - "page_start": 55, - "page_end": 55, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "## FINANCIAL SECTION\n\nFINANCIAL SECTION", - "page_start": 69, - "page_end": 69, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Group to raise additional finance for normal business expansion or to pay dividends consistent with past practice is not expected to be impacted.\n\nThe differences between current Australian GAAP and A-IFRS which are more likely to have a significant effect on the Santos Group’s financial\n\nperformance and financial position are summarised below:\n\nAll financial instruments including derivatives will be recognised in the statement of financial position and all\n\nderivatives will be carried at fair value.\n\nChanges in the fair value of certain financial instruments will be recorded in the statement of financial performance.\n\nWhere financial instruments satisfy strict hedge criteria, changes in the fair value will be recognised in equity, or\n\nwill offset the hedged exposure in the statement of financial performance.\n\nThe A-IFRS relating to financial instruments applies from 1 January 2005. Unlike the majority of other A-IFRS\n\nstandards which require retrospective application as at 1 January 2004, this accounting standard does not require\n\nretrospective application. The effect of the first time application of this standard on the opening statement of\n\nfinancial position at 1 January 2005 will be to recognise additional financial assets and liabilities.\n\nSantos intends to continue to align its hedging transactions to underlying exposures to achieve accounting\n\neligibility and thereby reduce profit and loss volatility.\n\n**Financial instruments**", - "page_start": 87, - "page_end": 87, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "4\n\nincidental to a financial activity. Thus, with the enactment of the Gramm-Leach-Bliley Act, banks, securities firms\n\nand insurance companies find it easier to acquire or affiliate with each other and cross-sell financial products. The\n\nact permits a single financial services organization to offer a more complete array of financial products and services\n\nthan historically was permitted.\n\nA financial holding company is essentially a bank holding company with significantly expanded powers. Under\n\nthe Gramm-Leach-Bliley Act, among the activities that will be deemed “financial in nature” for financial holding\n\ncompanies are, in addition to traditional lending activities, securities underwriting, dealing in or making a market in\n\nsecurities, sponsoring mutual funds and investment companies, insurance underwriting and agency activities,\n\nactivities which the Federal Reserve Board determines to be closely related to banking, and certain merchant\n\nbanking activities. The Federal Reserve Board has proposed permitting a number of additional financial activities,\n\nbut we cannot predict whether any of these additional proposals will be adopted or the form any final rule will take.\n\nWe elected to become a financial holding company in September 2001. As a financial holding company, we\n\nhave very broad discretion to affiliate with securities firms and insurance companies, make merchant banking\n\ninvestments, and engage in other activities that the Federal Reserve Board has deemed financial in nature. In order\n\nto continue as a financial holding company, we must continue to be well-capitalized, well-managed and maintain\n\ncompliance with the Community Reinvestment Act. Depending on the types of financial activities that we may\n\nengage in in the future, under Gramm-Leach-Bliley’s fractional regulation principles, we may become subject to\n\nsupervision by additional government agencies. The election to be treated as a financial holding company increases\n\nour ability to offer financial products and services that historically we were either unable to provide or were only\n\nable to provide on a limited basis. As a result, we will face increased competition in the markets for any new\n\nfinancial products and services that we may offer. Likewise, an increased amount of consolidation among banks and\n\nsecurities firms or banks and insurance firms could result in a growing number of large financial institutions that\n\ncould compete aggressively with us.\n\n*Mergers and Acquisitions*\n\nWe generally must obtain approval from the banking regulators before we can acquire other financial\n\ninstitutions. We must not engage in certain acquisitions if we are undercapitalized. Furthermore, the BHCA\n\nprovides that the Federal Reserve Board cannot approve any acquisition, merger or consolidation that may\n\nsubstantially lessen competition in the banking industry, create a monopoly in any section of the country, or be a\n\nrestraint of trade. However, the Federal Reserve Board may approve such a transaction if the convenience and\n\nneeds of the community clearly outweigh any anti-competitive effects. Specifically, the Federal Reserve Board\n\nwould consider, among other factors, the expected benefits to the public (greater convenience, increased\n\ncompetition, greater efficiency, etc.) against the risks of possible adverse effects (undue concentration of resources,\n\ndecreased or unfair competition, conflicts of interest, unsound banking practices, etc.).\n\n*Banks*\n\nFederal and state laws and regulations that govern banks have the effect of, among other things, regulating the\n\nscope of business, investments, cash reserves, the purpose and nature of loans, the maximum interest rate chargeable\n\non loans, the amount of dividends declared, and required capitalization ratios.\n\n*National Banking Associations* . Banks that are organized as national banking associations under the National", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "assumptions used in making our initial determinations. A downturn in the economy and employment could result in\n\nincreased levels of non-performing assets and charge-offs, increased loan loss provisions and reductions in income.\n\nAdditionally, as an integral part of their examination process, bank regulatory agencies periodically review our\n\nallowance for loan losses. The banking agencies could require the recognition of additions to the loan loss allowance\n\nbased on their judgment of information available to them at the time of their examination.\n\nAccrual of interest is discontinued on a loan when management believes, after considering economic and\n\nbusiness conditions and collection efforts, that the borrower’s financial condition is such that collection of interest is\n\ndoubtful.", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "**or us, it is a measure of responsible corporate citizenship.**\n\n**The MGM MIRAGE Corporate Charitable Giving**\n\n**Program is the principal source of financial donations**\n\n**to community and social initiatives. Funded by a percentage**\n\n**of the company’s net profits, the Corporate Charitable Giving**\n\n**Program supports various community efforts impacting four**\n\n**critical areas:**\n\n**Through various education partnerships with institutions**\n\n**such as the University of Nevada, we award scholarships to help**\n\n**students achieve their educational goals and to encourage their**\n\n**interest in our business. Additionally, scholarship programs assist**\n\n**the children of our employees with their higher education aspirations**\n\nD E V O T I O N T O S E RV I C E Giving back to the\n\ncommunities in which\n\nMGM MIRAGE\n\noperates its businesses\n\nand where our\n\nemployees live, work,\n\nand care for their\n\nfamilies is a serious\n\nand dedicated\n\ncommitment.\n\n**MGM GRAND DETROIT**\n\nPresident George Boyer epitomizes\n\nthe company’s commitment to cor-\n\nporate social responsibility. Boyer\n\nreads to a child at the Northwest\n\nCommunity Center in Detroit during\n\nan after-school mentoring program\n\nfunded by the Voice Foundation.\n\n**MGM MIRAGE** employee Christina\n\nFuentes embraces a child during an\n\nevent to benefit the Variety Day Home’s\n\nEmergency Childcare Assistance Program\n\nin Las Vegas, one of the many programs\n\nsupported by MGM MIRAGE to support\n\nthe well-being of children. The program\n\nhelps underwrite childcare assistance for\n\nlow-income working parents.\n\n**MGM MIRAGE** supports a variety of pro-\n\ngrams to further educational aspirations of\n\nboth students and employees, including\n\ntuition reimbursement for employees,\n\nscholarships for children of employees, and\n\non-site GED, naturalization and English-as-\n\na-second-language (ESL) classes.\n\n**In 2004, MGM MIRAGE**\n\nemployees raised nearly\n\n$3 million for the Voice\n\nFoundation. Companywide, Aid\n\nfor AIDS of Nevada (AFAN) was\n\namong one of the leading non-\n\nprofit agencies to receive the\n\nmost funding support from the\n\nVoice Foundation.\n\nF\n\n**CHILDHOOD DEVELOPMENT Community-based programs that focus**\n\n**on the overall development and well-being of children.**\n\n**COMMUNITY DEVELOPMENT Programs that focus on low-income or**\n\n**socio-economically disadvantaged communities .**\n\n**DIVERSITY Programs which are inclusive receive priority in funding.**\n\n**This includes efforts that encourage economic development and enhance**\n\n**individual and community resources.**\n\n**EDUCATION Programs and efforts to strengthen public education from**\n\n**kindergarten through higher education.**", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "news3.pdf", - "query": "what are career fairs for?", - "target_page": 1, - "target_passage": " In-person and virtual career fairs provide valuable opportunities to connect with prospective employers.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "corporate debt securities are classified within Level II of the fair value hierarchy and the market approach was used to\n\ndetermine fair value of these investments.\n\n15", - "page_start": 19, - "page_end": 19, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Money](https://about.newsusa.com/taxonomy/term/19) / 3 Great Resources to Kick-Start Your Financial Planning Career\n\n## 3 Great Resources to Kick-Start Your Financial Planning Career\n\n[(NewsUSA)](https://www.newsusa.com/) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of\n\nhelping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should\n\nbe a top contender, whether you are just starting out or looking to make a career change. But once you have\n\ndecided that financial planning is the field for you, how do you get started? Here are three resources that can help\n\nyou launch a successful financial planning career.\n\n1. [Guide to Careers in Financial Planning](https://www.cfp.net/knowledge/reports-and-statistics/guide-to-careers-in-financial-planning) . Based on interviews with leading financial services firms, this guide\n\nintroduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry\n\npoints and career tracks, explores the types of companies that hire financial planners and provides information on\n\nhow to find financial planning career opportunities. It also includes resources such as a list of recommended\n\nquestions to ask in a job interview.\n\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional\n\njourney. Some are offered directly through colleges and universities that have financial planning degree and\n\ncertificate programs. Others are available through nonprofits and organizations like the CFP Board Center for\n\nFinancial Planning, which administers [16 scholarship programs](https://www.cfp.net/get-certified/tools-and-resources/apply-for-a-scholarship) that help pay for the education and exam\n\nrequirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer\n\nscholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and\n\ncredentials such as CFP® certification -- some of which may be required to advance within the company.\n\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective\n\nemployers. CFP Board’s spring and fall career fairs are some of the most popular hiring events in the profession,\n\nwith dozens of firms participating in these online exhibitions. Job seekers can visit employers’ virtual exhibit booths\n\nand view open jobs and internships, apply for open positions and interact with employers through one-on-one video\n\nmeetings and messaging. You can also visit the [CFP Board Career Center](https://careers.cfp.net/) to browse current job and internship\n\nopportunities in financial planning, as well as a collection of articles providing career guidance.\n\nOther top resources include career offices at your college or university, financial services companies’ career\n\nwebsites and professional organizations that may have a local chapter near you.\n\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth\n\n[and development as a future financial planning professional. To learn more about CFP® certification, visit the ](https://www.cfp.net/why-cfp-certification/the-standard-of-excellence) CFP\n\nBoard website .\n\nArticle Link\n\n[https://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni…](https://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planning-career)\n\n[MONEY](https://about.newsusa.com/taxonomy/term/19)\n\n11/23/2022\n\nRELATED ARTICLES\n\n", - "page_start": 0, - "page_end": 0, - "source_file": "news3.pdf" - }, - { - "text": "**Nordstrom, Inc.**\n\n**Notes to Consolidated Financial Statements**\n\nDollar and share amounts in millions except per share, per option and per unit amounts\n\n54\n\n####### **NOTE 9: FAIR VALUE MEASUREMENTS**\n\nWe disclose our financial assets and liabilities that are measured at fair value in our Consolidated Balance Sheets by level within the fair\n\nvalue hierarchy as defined by applicable accounting standards:\n\nLevel 1: Quoted market prices in active markets for identical assets or liabilities\n\nLevel 2: Other observable market-based inputs or unobservable inputs that are corroborated by market data\n\nLevel 3: Unobservable inputs that cannot be corroborated by market data that reflect the reporting entity’s own\n\nassumptions\n\nWe did not have any financial assets or liabilities that were measured at fair value on a recurring basis as of January 31, 2015 or February 1,\n\n2014.\n\nFinancial instruments not measured at fair value on a recurring basis include cash and cash equivalents, accounts receivable and accounts\n\npayable and approximate fair value due to their short-term nature. We estimate the fair value of long-term debt using quoted market prices of\n\nthe same or similar issues and, as such, this is considered a Level 2 fair value measurement. The following table summarizes the carrying\n\nvalue and fair value estimate of our long-term debt, including current maturities:\n\n**January 31, 2015 February 1, 2014**\n\nCarrying value of long-term debt <sup>1</sup> **$3,131** $3,113\n\nFair value of long-term debt **3,693** 3,511\n\n1 The carrying value of long-term debt includes the remaining unamortized adjustment from our previous effective fair value hedge.\n\nWe also measure certain non-financial assets at fair value on a nonrecurring basis, primarily goodwill and long-lived tangible and intangible\n\nassets, in connection with periodic evaluations for potential impairment. See Note 1: Nature of Operations and Summary of Significant\n\nAccounting Policies for additional information related to goodwill, intangible assets and long-lived assets. We recorded no material\n\nimpairment charges for these assets in 2014, 2013 and 2012. We estimate the fair value of goodwill and long-lived tangible and intangible\n\nassets using primarily unobservable inputs and, as such, these are considered Level 3 fair value measurements.\n\n####### **NOTE 10: LEASES**\n\nWe lease the land or the land and buildings at many of our stores. Additionally, we lease office facilities, warehouses and equipment. Most of\n\nthese leases are classified as operating leases and they expire at various dates through 2080. The majority of our fixed, non-cancelable\n\nlease terms are 15 to 30 years for Nordstrom full-line stores and 10 to 15 years for Nordstrom Rack stores. Many of our leases include\n\noptions that allow us to extend the lease term beyond the initial commitment period, subject to terms agreed to at lease inception. Most of our\n\nleases also provide for payment of operating expenses, such as common area charges, real estate taxes and other executory costs, and\n\nsome leases require additional payments based on sales, referred to as “percentage rent.”\n\nFuture minimum lease payments as of January 31, 2015 are as follows:\n\n**Fiscal year Capital leases Operating leases**\n\n2015 $2 $210\n\n2016 2 231\n\n2017 1 229\n\n2018 1 227\n\n2019 — 219\n\nThereafter — 1,202\n\nTotal minimum lease payments $6 $2,318\n\nLess: amount representing interest (1)\n\n**Present value of net minimum lease payments** $5", - "page_start": 65, - "page_end": 65, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n####### **NOTE 14 - FAIR VALUE MEASUREMENT**\n\nThe following table presents financial assets and liabilities measured at fair value in the consolidated statement of\n\nfinancial position in accordance with the fair value hierarchy. This hierarchy groups financial assets and liabilities\n\ninto three levels based on the significance of inputs used in measuring the fair value of the financial assets and\n\nliabilities. The fair value hierarchy has the following levels:\n\nLevel 1: quoted prices (unadjusted) in active markets for identical assets or liabilities ;\n\nLevel 2: inputs other than quoted prices included within Level 1 that are observable for the asset or\n\nliability, either directly (i.e. as prices) or indirectly (i.e. derived from prices); and\n\nLevel 3: inputs for the asset or liability that are not based on observable market data (unobservable inputs).\n\nThe Level within which the financial asset or liability is classified is determined based on the lowest level of significant\n\ninput to the fair value measurement. The financial assets and liabilities measured at fair value in the statement of\n\nfinancial position are grouped into the fair value hierarchy as follows:\n\n####### **Consolidated 31 December 2014**\n\n####### **(US$’000)**\n\n####### **Level 1**\n\n####### **Level 2**\n\n####### **Level 3**\n\n####### **Total**\n\nAssets measured at fair value\n\nDerivative commodity contracts - 9,476 - 9,476\n\nInterest rate swap contracts - 107 - 107\n\nDevelopment and production\n\nassets (1)\n\n- - 455,084 455,084\n\nLiabilities measured at fair value\n\nInterest rate swap contracts - (130) - (130)\n\nNet fair value - 9,453 455,084 464,537\n\n(1) Excludes work-in-progress and restoration provision assets totaling $63.9 million.\n\n####### **Consolidated 31 December 2013**\n\n####### **(US$’000)**\n\n####### **Level 1**\n\n####### **Level 2**\n\n####### **Level 3**\n\n####### **Total**\n\nAssets measured at fair value\n\nInterest rate swap contract - 176 - 176\n\nLiabilities measured at fair value\n\nDerivative commodity contracts - (219) - (219)\n\nInterest rate swap contracts - (147) - (147)\n\nNet fair value - (190) - (190)\n\nDuring the years ended 31 December 2014 and 2013, respectively, there were no transfers between level 1 and level\n\n2 fair value measurements, and no transfer into or out of level 3 fair value measurements.", - "page_start": 82, - "page_end": 82, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "[meta-midjourney-other-ai-cos](http://chatgptiseatingtheworld.com/2023/12/27/master-list-of-lawsuits-v-ai-chatgpt-openai-microsoft-meta-midjourney-other-ai-cos) [. See also “Fair Use Week 2024: Day Two with Guest Expert Brandon ](http://chatgptiseatingtheworld.com/2023/12/27/master-list-of-lawsuits-v-ai-chatgpt-openai-microsoft-meta-midjourney-other-ai-cos)\n\nButler.” *Fair Use Week* , [sites.harvard.edu/fair-use-week/2024/02/26/fair-use-week-2024-day-two-with-](http://sites.harvard.edu/fair-use-week/2024/02/26/fair-use-week-2024-day-two-with-guest-expert-brandon-butler/)\n\n[guest-expert-brandon-butler/](http://sites.harvard.edu/fair-use-week/2024/02/26/fair-use-week-2024-day-two-with-guest-expert-brandon-butler/) [. Accessed 20 Mar. 2024 (arguing that use of this dataset is not ](http://sites.harvard.edu/fair-use-week/2024/02/26/fair-use-week-2024-day-two-with-guest-expert-brandon-butler/)\n\nconsequential for the fair use analysis).", - "page_start": 1, - "page_end": 1, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "accounting and re p o rting standards for derivative instruments, including certain derivative instruments embedded in other contracts (collectively\n\nre f e rred to as derivatives).\n\nIn accordance with SFAS No. 133, entities are re q u i red to carry all derivative instruments on the balance sheet at fair value. The accounting for\n\nmovements in fair value of derivatives depends upon whether it has been designated and qualifies as part of a hedging relationship and, if so, the\n\nreason for holding it. If certain conditions are met, the Company may elect to designate a derivative instrument as a hedge of exposures. If the\n\nhedged exposure is a fair value exposure, movements in fair value are recognized in earnings with the offsetting gain or loss on the hedged item\n\nattributable to the hedged risk. If the hedged exposure is a cash flow exposure, the effective portion of the movement in fair value of the derivative\n\ni n s t rument is initially re p o rted as a component of other comprehensive income and subsequently reclassified into earnings at the time the\n\nf o recasted transaction impacts earnings. Amounts excluded from the assessment of hedge effectiveness as well as the ineffective portion of\n\nmovements in fair value of the derivative instrument are re p o rted in earnings in the current period. Accounting for foreign currency hedges is\n\nsimilar to the accounting for fair value and cash flow hedges. If a derivative instrument is not designated as a hedge, movements in the fair value\n\nof derivative instruments are recognized in earnings.\n\nUnder the provisions of SFAS No. 133, the method that the Company will use to assess effectiveness of a hedge, as well as the measure m e n t\n\na p p roach for determining the ineffectiveness of a hedge, must be established at the inception of a hedge. The Company formally documents all\n\nrelationships between hedging instruments and hedged items as well as its risk management objective and strategy for entering into the\n\ntransaction. This process includes linking derivatives designated as fair value or cash flow hedges to specific assets, liabilities or firm commitments\n\non forecasted transactions. This process is repeated on a periodic basis. If at any time the Company determines a hedge is no longer eff e c t i v e ,\n\nhedge accounting is immediately discontinued and the derivative is marked to market with any gain or loss re c o rded in earnings.\n\nThe Company adopted the provisions of SFAS No. 133 on 1 January 2001 and this had no impact on the Company’s consolidated financial\n\nstatements as the Company does not have any derivative financial instruments. Future changes in the fair value for any remaining trading\n\nsecurities will be re c o rded through earnings. Changes in fair value of available for sale securities will be re c o rded in other comprehensive income.\n\n2 1", - "page_start": 22, - "page_end": 22, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "### NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS\n\n### FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n\n## **29. FINANCIAL INSTRUMENTS (continued)**\n\n##### **(c) Net fair values**\n\nThe aggregrate net fair values of financial assets and liabilities are identical to the carrying amount\n\nin the balance sheet.\n\nThe following methods and assumptions are used to determine the net fair values of financial assets\n\nand liabilities:\n\n##### **Cash and cash equivalents**\n\nThe carrying amount approximates fair value because of their short term to maturity.\n\n##### **Trade debtors, other debtors and loans**\n\nThe carrying amount approximates fair value.\n\n##### **Investments**\n\nFor investments where there is no quoted market price, a reasonable estimate of the fair value is\n\ncalculated based on the underlying net asset base of the investment.\n\n##### **Trade creditors, other creditors and accruals**\n\nThe carrying amount approximates fair value.\n\n##### **(d) Credit risk exposures**\n\nThe economic entity’s maximum exposure to credit risk at balance date in relation to each class of\n\nrecognised financial assets is the carrying amount of those assets as indicated in the balance sheet.\n\n##### **Company**\n\n## **2000 1999**\n\n##### **$ $**\n\n## **30. CONTINGENT LIABILITIES**\n\nAs detailed in Note 11, the company has entered\n\ninto a deed of cross-guarantee with certain wholly-\n\nowned controlled entities. The total liabilities of\n\nthese wholly-owned controlled entities (excluding\n\namounts owed to the parent entity) for which\n\nthe Company is potentially liable are: 18,447,843 15,578,523\n\n61", - "page_start": 64, - "page_end": 64, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\nIPUC is also valued at fair value, except if such values cannot be reliably determined. In the case when a fair value cannot be reliably determined,\n\nsuch property is recorded at cost. The fair value of IPUC is determined using the capitalization of net income method.\n\nThe determination of the fair value of investment property requires the use of estimates such as future cash flows from assets and cap‑rates\n\napplicable to those assets. In addition, development risks (such as construction and leasing risks) are also taken into consideration when\n\ndetermining the fair value of IPUC. These estimates are based on local market conditions existing at the reporting date. In arriving at their\n\nestimates of market values, the external valuator uses their market knowledge and professional judgment and does not rely solely on historical\n\ntransaction comparables. The critical estimates and assumptions underlying the valuation of investment properties and developments are set\n\nout in Note 5.\n\n*Fair Value of Financial Instruments*\n\nWhere the fair value of financial assets and financial liabilities recorded in the Notes to the Consolidated Financial Statements cannot be derived\n\nfrom active markets, they are determined using valuation techniques, including the discounted cash flow model. Inputs to these models are\n\ntaken from observable markets where possible, but where this is not feasible a degree of judgment is required in establishing fair values. The\n\njudgments include considerations of inputs such as liquidity risk, credit risk and volatility. Changes in assumptions about these factors could affect\n\nthe reported fair value of financial instruments.\n\n**Changes in Accounting Policies**\n\nThe accounting policies applied during the year ended December 31, 2013, are consistent with those used in the audited consolidated financial\n\nstatements for the year ended December 31, 2012, except for the following new and amended IFRS and International Financial Reporting\n\nInterpretations Committee (“IFRIC”) interpretations which were effective for periods beginning on or after July 1, 2012, and January 1, 2013:\n\nIAS 1 ‑ Financial Statement Presentation (“IAS 1”) — Presentation of Items of Other Comprehensive Income (“OCI”)\n\nThe amendments to IAS 1 change the grouping of items presented in OCI. Items that could be reclassified (or recycled) to profit or loss at a future\n\npoint in time (for example, upon derecognition or settlement) would be presented separately from items that will never be reclassified. The\n\nadoption of this standard did not have an impact on the Company’s financial position or performance.\n\nIFRS 10 ‑ Consolidated Financial Statements (“IFRS 10”)\n\nIFRS 10 replaces the portion of IAS 27 ‑ Consolidated and Separate Financial Statements (“IAS 27”) that addresses the accounting for consolidated\n\nfinancial statements. IFRS 10 establishes a single control model that applies to all entities including special purpose entities. The changes\n\nintroduced by IFRS 10 require Management to exercise significant judgment to determine which entities are controlled, and therefore, are\n\nrequired to be consolidated by a parent, compared with the requirements that were in IAS 27. The adoption of this standard did not have an\n\nimpact on the Company’s financial position or performance.\n\nIFRS 11 ‑ Joint Arrangements (“IFRS 11”)\n\nIFRS 11 replaces IAS 31 ‑ Interests in Joint Ventures and SIC 13 ‑ Jointly controlled Entities — Non monetary Contributions by Venturers. IFRS\n\n11 removes the option to account for jointly controlled entities using proportionate consolidation. Instead, joint arrangements that meet the\n\ndefinition of a joint venture must be accounted for using the equity method. Otherwise joint arrangements are classified as joint operations and", - "page_start": 61, - "page_end": 61, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "####### **REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n####### **NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n\n####### **(All tables in millions, except per share data) Ì (Continued)**\n\n**Accumulated Amortization**\n\n**Goodwill Other Total**\n\nBalance, December 31, 2003 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $(143.4) $(18.2) $(161.6)\n\nAmortization expense ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ Ì (5.8) (5.8)\n\nBalance, December 31, 2004 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $(143.4) $(24.0) $(167.4)\n\nIn general, goodwill is tested for impairment on an annual basis. In testing for impairment, the Company\n\nestimates the fair value of each operating segment and compares the fair values with the carrying values. If the\n\nfair value of an operating segment is greater than its carrying value, then no impairment results. If the fair\n\nvalue is less than its carrying value, then the Company would determine the fair value of the goodwill. The fair\n\nvalue of goodwill is determined by deducting the fair value of an operating segment's identiÑable assets and\n\nliabilities from the fair value of the operating segment as a whole, as if that operating segment had just been\n\nacquired and the purchase price were being initially allocated. If the fair value of the goodwill were less than\n\nits carrying value for a segment, an impairment charge would be recorded to earnings in the Company's\n\nConsolidated Statement of Income.\n\nIn addition, the Company would evaluate an operating segment for impairment if events or circumstances\n\nchange between annual tests indicating a possible impairment. Examples of such events or circumstances\n\ninclude:\n\n‚ A signiÑcant adverse change in legal factors or in the business climate,\n\n‚ An adverse action or assessment by a regulator,\n\n‚ A more likely than not expectation that a segment or a signiÑcant portion thereof will be sold, or\n\n‚ The testing for recoverability under Statement of Financial Accounting Standards No. 144, \"\"Account-\n\ning for the Impairment of Long-Lived Assets,'' of a signiÑcant asset group within the segment.\n\nThe Company incurred no impairment of goodwill as a result of its goodwill impairment test in 2004.\n\nHowever, there can be no assurance that goodwill will not be impaired at any time in the future.\n\n####### **Accrued Liabilities**\n\nA summary of accrued liabilities is as follows:\n\n**December 31,**\n\n**2004 2003**\n\nAccrued payroll and beneÑts ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $ 51.3 $ 43.2\n\nAccrued fees and taxes ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 31.4 29.6\n\nAccrued interestÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 18.4 18.7\n\nAccrued dividends ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 18.1 9.5\n\nOther ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ 16.1 17.6\n\n$135.3 $118.6\n\n62", - "page_start": 69, - "page_end": 69, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n####### **NOTE 1 - STATEMENT OF SIGNIFICANT ACCOUNTING POLICIES continued**\n\nFinance leases are capitalised by recording an asset and a liability at the lower of the amounts equal to the fair value\n\nof the leased property or the present value of the minimum lease payments, including any guaranteed residual\n\nvalues. Lease payments are allocated between the reduction of the lease liability and the lease interest expense for\n\nthe period.\n\nAssets under financing leases are depreciated on a straight-line basis over the shorter of their estimated useful lives\n\nor the lease term. Lease payments for operating leases, where substantially all the risks and benefits remain with\n\nthe lessor, are charged as expenses in the periods in which they are incurred.\n\nLease incentives under operating leases are recognised as a liability and amortised on a straight-line basis over the\n\nlife of the lease term.\n\n####### **e) Financial Instruments**\n\n####### **Recognition and Initial Measurement**\n\nFinancial instruments, incorporating financial assets and financial liabilities, are recognised when the entity becomes\n\na party to the contractual provisions of the instrument. Trade date accounting is adopted for financial assets that\n\nare delivered within timeframes established by marketplace convention.\n\nFinancial instruments are initially measured at fair value plus transactions costs where the instrument is not classified\n\nat fair value through profit or loss. Transaction costs related to instruments classified at fair value through profit or\n\nloss are expensed to profit or loss immediately. Financial instruments are classified and measured as set out below.\n\n####### **Derivative Financial Instruments**\n\nThe Group uses derivative financial instruments to economically hedge its exposure to changes in commodity prices\n\narising in the normal course of business. The principal derivatives that may be used are commodity crude oil price\n\nswap, option and costless collar contracts and interest rate swaps. Their use is subject to policies and procedures as\n\napproved by the Board of Directors. The Group does not trade in derivative financial instruments for speculative\n\npurposes.\n\nDerivative financial instruments are recognised at fair value. Subsequent to initial recognition, derivative financial\n\ninstruments are recognised at fair value. The fair value of these derivative financial instruments is the estimated\n\namount that the Group would receive or pay to terminate the contracts at the reporting date, taking into account\n\ncurrent market prices and the current creditworthiness of the contract counterparties. The derivatives are valued\n\non a mark to market valuation and the gain or loss on re-measurement to fair value is recognised through the\n\nstatement of profit or loss and other comprehensive income.\n\ni) Financial assets at fair value through profit or loss\n\nFinancial assets are classified at fair value through profit or loss when they are held for trading for the purpose of\n\nshort term profit taking, when they are derivatives not held for hedging purposes, or designated as such to avoid an\n\naccounting mismatch or to enable performance evaluation where a group of financial assets is managed by key\n\nmanagement personnel on a fair value basis in accordance with a documented risk management or investment\n\nstrategy. Realised and unrealised gains and losses arising from changes in fair value are included in profit or loss in\n\nthe period in which they arise.", - "page_start": 64, - "page_end": 64, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "news3.pdf", - "query": "What are the priorities for job seekers ?", - "target_page": 1, - "target_passage": " Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Money](https://about.newsusa.com/taxonomy/term/19) / 3 Great Resources to Kick-Start Your Financial Planning Career\n\n## 3 Great Resources to Kick-Start Your Financial Planning Career\n\n[(NewsUSA)](https://www.newsusa.com/) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of\n\nhelping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should\n\nbe a top contender, whether you are just starting out or looking to make a career change. But once you have\n\ndecided that financial planning is the field for you, how do you get started? Here are three resources that can help\n\nyou launch a successful financial planning career.\n\n1. [Guide to Careers in Financial Planning](https://www.cfp.net/knowledge/reports-and-statistics/guide-to-careers-in-financial-planning) . Based on interviews with leading financial services firms, this guide\n\nintroduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry\n\npoints and career tracks, explores the types of companies that hire financial planners and provides information on\n\nhow to find financial planning career opportunities. It also includes resources such as a list of recommended\n\nquestions to ask in a job interview.\n\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional\n\njourney. Some are offered directly through colleges and universities that have financial planning degree and\n\ncertificate programs. Others are available through nonprofits and organizations like the CFP Board Center for\n\nFinancial Planning, which administers [16 scholarship programs](https://www.cfp.net/get-certified/tools-and-resources/apply-for-a-scholarship) that help pay for the education and exam\n\nrequirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer\n\nscholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and\n\ncredentials such as CFP® certification -- some of which may be required to advance within the company.\n\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective\n\nemployers. CFP Board’s spring and fall career fairs are some of the most popular hiring events in the profession,\n\nwith dozens of firms participating in these online exhibitions. Job seekers can visit employers’ virtual exhibit booths\n\nand view open jobs and internships, apply for open positions and interact with employers through one-on-one video\n\nmeetings and messaging. You can also visit the [CFP Board Career Center](https://careers.cfp.net/) to browse current job and internship\n\nopportunities in financial planning, as well as a collection of articles providing career guidance.\n\nOther top resources include career offices at your college or university, financial services companies’ career\n\nwebsites and professional organizations that may have a local chapter near you.\n\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth\n\n[and development as a future financial planning professional. To learn more about CFP® certification, visit the ](https://www.cfp.net/why-cfp-certification/the-standard-of-excellence) CFP\n\nBoard website .\n\nArticle Link\n\n[https://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni…](https://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planning-career)\n\n[MONEY](https://about.newsusa.com/taxonomy/term/19)\n\n11/23/2022\n\nRELATED ARTICLES\n\n", - "page_start": 0, - "page_end": 0, - "source_file": "news3.pdf" - }, - { - "text": "and making it work on behalf of the and making it work on behalf of the\n\ncommunity? How do you harness that community? How do you harness that\n\npower? In that regard, I would like our power? In that regard, I would like our\n\ngroup to be one in which employees group to be one in which employees\n\nbelieve that they have their own distinct believe that they have their own distinct\n\nrole in such endeavors and through that role in such endeavors and through that\n\nfind their work rewarding. find their work rewarding.\n\n**Kunibe** : I wish the same for SMBC. I want : I wish the same for SMBC. I want\n\nour bank to be a vibrant place where our bank to be a vibrant place where\n\nemployees work with a light in their eyes. employees work with a light in their eyes.\n\nI would be grateful for any guidance in I would be grateful for any guidance in\n\nthis respect from Mr. Ando and experts this respect from Mr. Ando and experts\n\nfrom other fields. from other fields.\n\nPresiding over the discussion was Presiding over the discussion was\n\nMr. Eiichiro Adachi, Research Chief, Mr. Eiichiro Adachi, Research Chief,\n\nThe Japan Research Institute, Limited The Japan Research Institute, Limited\n\n**Financial services:**\n\n**A strong helping hand for**\n\n**environmental businesses**\n\n**leads to sustainable**\n\n**development based**\n\n**on Japanese technologies**\n\nIn addition to the many ideas sent in under In addition to the many ideas sent in under\n\nthe “SPN” campaign with regard to supporting the “SPN” campaign with regard to supporting\n\nreconstruction in the disaster-hit areas, some reconstruction in the disaster-hit areas, some\n\nemployees said they wanted to go to the employees said they wanted to go to the\n\nTohoku region to work as volunteers. To Tohoku region to work as volunteers. To\n\nsupport those wishing to do “what can be support those wishing to do “what can be\n\ndone now” as a first step, SMBC set up a done now” as a first step, SMBC set up a\n\nframework to enable employees to take framework to enable employees to take\n\nspecial leave for volunteer activities in the special leave for volunteer activities in the\n\nearthquake and tsunami area. This system earthquake and tsunami area. This system\n\nbecame operational in May 2011. became operational in May 2011.\n\nTo date, volunteers have been recruited not To date, volunteers have been recruited not\n\nonly from the bank but also from other SMFG only from the bank but also from other SMFG\n\nGroup companies. Based on needs identified Group companies. Based on needs identified\n\nby local government and volunteer centers by local government and volunteer centers\n\nin the areas concerned, SMFG staff have in the areas concerned, SMFG staff have\n\nbeen involved in voluntary activities such been involved in voluntary activities such\n\nas clearing mud from residential areas and as clearing mud from residential areas and\n\nconcrete water runoff troughs alongside concrete water runoff troughs alongside\n\nroads, clearing up debris, and cleaning and roads, clearing up debris, and cleaning and\n\nrestoring photographs and other personal restoring photographs and other personal\n\nitems with memorabilia value. items with memorabilia value.\n\nIn July 2011, over 400 employees of SMBC In July 2011, over 400 employees of SMBC\n\nNikko Securities — mainly 350 new hires — Nikko Securities — mainly 350 new hires —\n\nwere divided into three teams, each of which were divided into three teams, each of which\n\nspent one to three weeks on volunteer spent one to three weeks on volunteer\n\nactivities in the disaster zone. activities in the disaster zone.\n\nMany respondents in the “SPN” campaign Many respondents in the “SPN” campaign\n\nsuggested that there should be more oppor suggested that there should be more oppor-\n\ntunities to make donations directly and tunities to make donations directly and\n\ncontinuously to the affected areas. Just after continuously to the affected areas. Just after", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "#### **PEOPLE OF SHENTEL**\n\nVolunteerism is in Patty Pomeroy’s blood. Her grandfather was a dispatcher for the rescue squad in Middletown, VA for 25 years and her grandmother was in the ladies auxiliary. Her father was a charter member of the Middletown Rescue Squad. In 1997, Patty, a customer service representative at Shentel for four years, continued the family tradition by earning her Emergency Medical Technician certification and going to “work” for the Strasburg Rescue Squad. Patty is the administrator of membership recruitment and retention for the squad and is the liaison coordinator for junior squad members under 18. It is her job to make sure that new members are brought in to the squad and current members stay active.\n\n**“There is a great satisfaction that comes from knowing that what you can do will help people.”** * **Patty Pomeroy** *\n\n##### * **Jeff Beard** *\n\n##### * **John Gardner** *\n\n##### * **George Brinkley** *\n\nJeff Beard has been an installer repairman with Shentel for almost five years. Two years ago, Jeff helped start Project Isaiah 58, a faith-based recovery ministry that reaches out to people who are struggling with addiction. Project Isaiah 58 has weekly group meetings in Winchester, Woodstock and Warrenton, VA. Jeff, who lives in Winchester, participates in the group meetings and also makes time to meet one-on-one with people who need personal attention.\n\n##### **“I feel the need to reach out to people who are suffering.”**\n\nJohn Gardner has been with Shentel for two years as a PCS technician in Central Pennsylvania, but for almost a year of that time he was on Naval Reserve duty in Sasebo, Japan. John joined the Reserves after serving 10 years of active duty. In October 2002, he was activated under Noble Eagle-Enduring Freedom as part of the increase in security at bases around the world. John worked on Motorola radios and repeater systems while stationed in Japan. It was tough for the serviceman to be away from his wife and children, but John believes very strongly in serving his country.\n\n##### **“Being in the Reserves is a way for me to be a civilian and still serve my country.”**\n\nAt Shentel, George Brinkley, the store manager in Front Royal, VA, is known for being one of the biggest fund-raisers for the Shenandoah County American Cancer Society Relay for Life event. In his six years at the Company, George has raised nearly $20,000. In 2003, he raised $4,246 and was recognized as the top individual fund-raiser for the entire event.\n\nIn 2002, George was chairman of the parade committee for the Woodstock, VA 250th anniversary celebration. Under George’s leadership, the 26-member committee worked for a year preparing for the parade, which was the largest in the town’s history.\n\n##### **“I just have a knack for volunteering. I want to make my community better any way I can.”**\n\nF or over 100 years Shenandoah Telecommunications Company has been committed to providing outstanding service to our customers. Our employees take that same dedication after hours to make a difference in their community.\n\nWe take this opportunity to share with you, our shareholders, the stories of just a few of your dedicated employees.\n\n3 ■ 2003 ANNUAL REPORT", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**37**\n\nCorporate Governance Statement\n\nCorporate Governance Statement\n\nDiversity\n\nThe Company has a policy to improve the diver-\n\nsity of its workforce over time by identifying\n\nwomen and individuals from under-represented\n\nbackgrounds for recruitment, and by rewarding\n\nand promoting employees on the basis of\n\nperformance.\n\nHowever, at this stage of its development, the\n\nCompany has a small Board of Directors, and a\n\nsmall management team which is geographically\n\ndispersed and because of the industry in which\n\nthe Company operates, the Board does not\n\nconsider it to be practicable to set measurable\n\nobjectives to achieve greater gender diversity at\n\nthis time.\n\nIn addition, the Board acknowledges the bene-\n\nfits of seeking to improve gender diversity at all\n\nlevels in the Company over time and will keep\n\nthis issue under review.\n\nThe Company aims to foster continuous improve-\n\nment in the area of diversity; building on achieve-\n\nment realised through the implementation of\n\nhistorical diversity initiatives, by applying princi-\n\nples successfully used at our leading operation in\n\nthis area, to other parts of the business.\n\nOur flagship ‘Chatree’ Mine in Thailand boasts\n\nthe enviable statistic of having equal representa-\n\ntion by women on the senior management team.\n\nRecruitment, training and promotion principles\n\nemployed at Chatree are currently being applied\n\nto our ‘Challenger’ Mine in Australia, where we\n\ncurrently have 14% representation of women\n\nacross the senior management and professional\n\ncategories and to other parts of the business.\n\nThere is currently no representation by women\n\non our Board of Directors. Whilst this is in part\n\nreflective of the relatively small size of the Board\n\nand stage of development of key elements of\n\nthe business, it forms part of an overall business\n\nreview process to consider the issue of gender\n\ndiversity at this level and will be the subject of\n\nongoing review.\n\nThe Company considers that it will benefit from\n\nits ongoing commitment to promote a diverse\n\nworkforce with treatment of employees and\n\nfuture employees on the basis of merit, abilities\n\nand potential, regardless of gender, colour,\n\nethnic or national origin, race, disability, age,\n\nsexual orientation, gender reassignment, socio-\n\neconomic background, religious or political\n\nbelief, non / trade union membership, family\n\ncircumstances or other irrelevant distinction.\n\nThe Company has set various criteria and proce-\n\ndures in order to support equality and diversity\n\nin the workforce and applies these principles to:\n\n〉 〉 Provide fair access to workplace opportuni-\n\nties and benefits, including internal promo-\n\ntion, leadership development, flexible work\n\npractices and fair and comparable wages;\n\n〉 〉 Attracting and retaining a skilled and diverse\n\nworkforce;\n\n〉 〉 Creating an inclusive workplace culture where\n\ndiscriminatory behaviour is unacceptable; and\n\n〉 〉 Providing an effective grievance mechanism\n\nfor employees.\n\nCurrent Proportion of\n\nWomen Employees\n\nBoard 0.0%\n\nSenior Executives 0.0%\n\nSenior Managers 1.8%\n\nManagers 1.0%\n\nProfessionals 8.6%\n\nNon-professionals 6.4%\n\nTotal Workforce 17.8%\n\nShare Trading Policy\n\nIn the interests of shareholder confidence\n\nand compliance with insider trading laws, the\n\nCompany has formal policies governing the\n\ntrading of the Company’s securities by Directors,\n\nofficers and employees. Details of Directors’\n\nshareholdings are disclosed in the Directors’\n\nReport.\n\nThe policy prohibits Directors and employees\n\nfrom engaging in short-term trading of any of\n\nthe Company’s securities and buying or selling\n\nthe Company’s securities if they possess unpub-\n\nlished, price-sensitive information.\n\nDirectors and senior management may buy or\n\nsell Company securities in the four week period\n\nfollowing significant announcements by the\n\nCompany, including the release of the quarterly\n\nreport, half-yearly results, the preliminary annual\n\nresults and the lodgement of the Company’s", - "page_start": 38, - "page_end": 38, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "### C H A I R M A N ’ S R E P O R T\n\n6\n\nLabour hire is heavily dependent upon the quality of the personnel database and our intention\n\nhas been announced to offer training at Dampier, Broome and Darwin for those who live in the\n\nNorth West and wish to work in the offshore industry there. Planning for this new initiative is\n\nwell advanced and we expect to be running courses for prospective offshore employees in coming\n\nmonths. Although the training program is not directed to any particular community group, it has\n\nbeen encouraging to have active support from Aboriginal leaders in the Kimberley region.\n\nWorld prospects for energy, the need for Australia to add value to its resources, Government\n\ninitiatives for the support of these activities and environmental imperatives, heavily favour gas,\n\ngiving every indication that Mermaid Marine’s development push has been extremely timely.\n\nIt is also important to draw attention to increased efforts in terms of health, safety and\n\nenvironmental protection. Our workplace is largely at sea, where operations involve natural\n\ndangers and the safety of our people is paramount. We also work in a setting where the tasks in\n\nwhich we are involved cast us in the role of environmental caretakers of the sea and coastline.\n\nOver the past twelve months, we have worked even more closely with producers to take this side\n\nof our business to the highest possible standard. We are proud of the achievement and at the time\n\nof this report, despite the inherent dangers involved in the work, our employees have accrued a\n\nrecord 348 days free of Lost Time Injuries, a tremendous effort.\n\nAverage turnover for the last two years was $20 million, our target in the near term is to achieve\n\nearnings of at least $100million, with appropriate levels of accompanying profit. That will be\n\naddressed through our policy of strategic positioning and development in the North West of\n\nAustralia, and also by acquisition where merger or purchase will add to our earnings and\n\nstrengths. Mermaid Marine Australia Limited is in excellent shape, with confidence that we are\n\nwell able to pursue and secure our ambitious program.\n\nAlan Birchmore\n\nChairman", - "page_start": 9, - "page_end": 9, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Maximising the value of the exploration program, building\n\na better and more balanced portfolio and pursuing new\n\nopportunities.\n\nAnnual Report 2004 1\n\n…TO DELIVER ON THE STRATEGY\n\nSantos continues to tap into the spirit and commitment of the\n\nentrepreneurs and explorers who laid the Company’s foundations\n\nas we deliver on our growth strategy.\n\nToday, Santos is a major Australian oil and gas exploration and\n\nproduction company growing a global energy business through:\n\nLEVERAGING BASE BUSINESS\n\nCreating value from the base business through environment,\n\nhealth, safety and operational excellence, optimisation\n\nprograms and cost leadership.\n\nCAPTURING AND DELIVERING GROWTH\n\nCommencing new production, advancing key projects,\n\nextracting value from our infrastructure position and\n\nseeking innovative commercial arrangements.\n\nMANAGING OPTIONS\n\nDelivering improved returns, strong cash flow and reserve\n\nreplacement through disciplined portfolio management,\n\nstrategic acquisitions and divestments, and making\n\nsustainable progress.", - "page_start": 2, - "page_end": 2, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**5**\n\nManaging Director and CEO’s Report\n\nExploration\n\nWith the approvals of the Special Prospecting\n\nLicence (“SPL”) applications in Thailand still\n\nawaiting the Minister of Industry’s consent,\n\nexploration attention over the past 12 months\n\nhas focused on new exploration opportunities\n\nand Mineral Resource enhancement targets\n\nwithin the Mining Leases. This exploration\n\nformed part of a strategic exploration program\n\nwithin the mining leases at Chatree that\n\ncommenced in late 2012. The program has\n\nsuccessfully defined several new areas of miner-\n\nalisation within the Mining Lease, most notably\n\nat Q and A North Prospects, and has also\n\nupgraded several larger areas of Inferred\n\nResources to the Measured and Indicated\n\nMineral Resource category.\n\nLooking Ahead\n\nOver the current financial year and beyond,\n\nKingsgate remains focused on optimising\n\nproduction within an uncertain metal price\n\nenvironment, continuing to build resources\n\nand reserves and advancing the development\n\nproject pipeline of Nueva Esperanza and\n\nBowdens. These initiatives are designed to\n\ngrow earnings per share for the benefit of all\n\nshareholders.\n\nIn late September, Kingsgate’s Thai subsidiary,\n\nAkara Resources Public Company Limited\n\n(“Akara”) has submitted its listing application\n\nand draft Prospectus to the Thai Securities\n\nExchange Commission (SEC) and the Stock\n\nExchange of Thailand (SET) for an initial public\n\noffering of its shares on the SET.\n\nThe SEC and SET will review the draft Prospectus\n\nin the coming months in order to approve the\n\nlisting of Akara. The decision to list Akara will\n\ndepend on market conditions and other factors\n\nat the time of approval.\n\nGroup gold production for the full year to\n\n30 June 2014 is expected to be in the range\n\nof 190,000 to 210,000 ounces. This includes\n\n120,000 to 130,000 ounces from Chatree and\n\n70,000 to 80,000 ounces from Challenger.\n\nMD and CEO’s Report", - "page_start": 6, - "page_end": 6, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "*and illnesses;*\n\n- *OSH professionals, institutions and networks;*\n\n- *OSH indicators and implementation of effective methodologies for OSH data collection; and*\n\n- *demand for the safety and health of workers and workplaces.*\n\nThe **International Social Security Association** (ISSA) developed the **Vision Zero initiative** . <sup>330</sup> ISSA\n\npromotes together with enterprises and many global OSH organisations this concept, aiming at the\n\ncomplete elimination of work accidents and occupational diseases.\n\nThe **UN** has developed a set of targets and indicators, **the Social Development Goals** (SDG). <sup>331</sup> Target\n\n8 is dedicated to *‘Promote sustained, inclusive and sustainable economic growth, full and productive*\n\n*employment and decent work for all’.* Sub targets are:\n\n*8.5 By 2030, achieve full and productive employment and decent work for all women and men,*\n\n*including for young people and persons with disabilities, and equal pay for work of equal value*", - "page_start": 115, - "page_end": 115, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "legislation and guidance on **green public procurement** , the Commission will integrate criteria and monitoring to boost nature-based solutions.\n\n#### *3.3.3.* *Measuring and integrating the value of nature*\n\nBiodiversity considerations need to be better integrated into public and business decision- making at all levels. Building on existing work <sup>74</sup> , the Commission will develop in 2021 methods, criteria and standards to describe the essential features of biodiversity, its services, values, and sustainable use.\n\nThese will include **measuring the environmental footprint of products and organisations on the environment** , including through life-cycle approaches and natural capital accounting. In this context, the Commission will support the establishment of an international natural capital accounting initiative.\n\n#### *3.3.4.* *Improving knowledge, education and skills*\n\nThe fight against biodiversity loss must be underpinned by sound science. Investing in research, innovation and knowledge exchange will be key to gathering the best data and developing the best nature-based solutions. Research and innovation can test and develop\n\nhow to prioritise ‘green’ over ‘grey’ solutions and help the Commission to support investments in nature-based solutions, such as in old-industrialised, low-income or disaster- hit areas.\n\nThe new Skills Agenda will play a key role in the transition to a green economy and the fight against biodiversity loss, focusing on training and reskilling of the workforce across a wide range of sectors.\n\nThe future Horizon Europe programme will include a **long-term strategic research agenda for biodiversity,** including a science policy mechanism for research-based options for ratcheting up the implementation of biodiversity commitments **,** with increased funding. Horizon Europe’s Missions <sup>75</sup> will significantly contribute to filling knowledge gaps and finding solutions to improve the health of ecosystems and their contribution to human health.\n\nIn parallel, the Commission will promote and facilitate partnerships, including a dedicated Biodiversity Partnership, to make the bridge between science, policy and practice and make nature-based solutions a reality on the ground. The Commission will also establish in 2020 **a new Knowledge Centre for Biodiversity** in close cooperation with the European Environment Agency. The Centre will: (i) track and assess progress by the EU and its partners including in relation to implementation of biodiversity related international instruments; (ii) foster cooperation and partnership, including between climate and biodiversity scientists; and (iii) underpin policy development. Moreover, the Commission will increase its support to the Intergovernmental science-policy Platform on Biodiversity and Ecosystem Services.\n\nTo help integrate biodiversity and ecosystems into school, higher education and professional training, the Commission will propose a Council Recommendation on", - "page_start": 18, - "page_end": 18, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "Gold Ridge Mine in the Solomon Islands and\n\nlater Group Exploration Manager for Ross Mining\n\nNL. Ron is familiar with the technical and oper-\n\nating requirements for emerging projects in a\n\nvariety of terrains and environments and has a\n\nstrong focus on maximising returns from ore\n\nbodies through optimum waste and ore classifi-\n\ncation as well as increasing reserves from near-\n\nmine resource development.\n\n**Senior Management**\n\ncontinued", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", - "query": "What does ShareAlike mean in terms of licencing ?", - "target_page": 1, - "target_passage": "adaptations based on this work must be licensed under the same license.", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "‘ :\n\n-.-\n\n* ,-. . :,,.\n\n_,: .-,A*", - "page_start": 373, - "page_end": 373, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Income taxes payable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **4,991** —\n\nCurrent portion of long-term debt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **14** 9,008\n\nAccrued interest on long-term debt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **116,997** 87,711\n\nOther accrued liabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **607,925** 559,445\n\nLiabilities related to assets held for sale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **—** 23,456\n\nTotal current liabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **927,977** 866,618\n\n**Deferred income taxes** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **1,802,008** 1,765,426\n\n**Long-term debt** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **5,458,848** 5,521,890\n\n**Other long-term obligations** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **154,492** 123,547\n\n**Commitments and contingencies (Note 10)**\n\n**Stockholders’ equity**\n\nCommon stock, $.01 par value: authorized 300,000,000 shares,\n\nissued 173,573,934 and 168,268,213 shares; outstanding\n\n140,369,934 and 143,096,213 shares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **1,736** 1,683\n\nCapital in excess of par value. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **2,346,329** 2,171,625\n\nDeferred compensation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **(10,878)** (19,174)\n\nTreasury stock, at cost (33,204,000 and 25,172,000 shares). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **(1,110,551)** (760,594)\n\nRetained earnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **1,546,235** 1,133,903", - "page_start": 51, - "page_end": 51, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "The Charting Process ....................................................................................................................................................... 40\n\nChoosing The Right Chart ............................................................................................................................... 41\n\nUsing A Recommended Chart ......................................................................................................................... 42\n\nCreating A New Chart From Scratch ............................................................................................................... 43\n\nWorking With An Embedded Chart .................................................................................................................. 44\n\nResizing A Chart .............................................................................................................................................. 45\n\nRepositioning A Chart ...................................................................................................................................... 46\n\nPrinting An Embedded Chart ........................................................................................................................... 47\n\nCreating A Chart Sheet.................................................................................................................................... 48\n\nChanging The Chart Type ............................................................................................................................... 49\n\nChanging The Chart Layout ............................................................................................................................ 50\n\nChanging The Chart Style ............................................................................................................................... 51\n\nPrinting A Chart Sheet ..................................................................................................................................... 52\n\nEmbedding A Chart Into A Worksheet ............................................................................................................. 53\n\nDeleting A Chart .............................................................................................................................................. 54\n\n**P RACTICE E XERCISE** .......................................................................................................................................... 55\n\n**P RACTICE E XERCISE S AMPLE** ............................................................................................................................ 56", - "page_start": 2, - "page_end": 2, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "CLI setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756\n\nBasic setup on a Windows host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756\n\nBasic setup on an UNIX or Linux host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766\n\n**Appendix C. Terminology** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769\n\nCommonly encountered terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 770\n\n**Related publications** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789\n\nIBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 789\n\nOther resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 790\n\nReferenced websites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 790\n\nHelp from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791\n\n**Index** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793", - "page_start": 13, - "page_end": 13, - "source_file": "sg247938.pdf" - }, - { - "text": "PRO~‘ELLER EFFICIENCY\n\nENVELOPE OF MAXIMUM EFFICIENCY\n\nNAVWEPS 00-801-80 AIRPLANE PERFORMANCE\n\nPROPELLER EFFICIENCY\n\n-lP\n\n-I PROPELLER ADVANCE RATIO, J . . . . . . . . . . . . . . . . .\n\n. . . . ...... . . -.-................::::::::: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..~.~~.................................... . . . . . .._.........._................ ::::::::::::::::::::::::::::::::::::::::::::~~:~~~~~~~~~~~~~~~~~~~~::::::::~::::::: liiiiiii!lililliiiiiiiliiiii8iiliili::::::::::::::::::::::::::::~~~~~~~~~~~ ::::::::::: ::::::::::::::~~::::::::::::: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .,............._............................................. I..\n\n--. POWER AVAILABLE\n\n\\ \\ BHP ---\n\nPOWER AVAILABLE HP\n\nVELOCITY, KNOTS :::::::::::::::::::::::::::::::::::::::~:::::::::::::::::::::::::::::~::::::::::::::::::::::::::::::::.::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::~~~~~~~~~~.~: ::::::::::::::::::::::::::::::::::::::::::::::::::::::~::::::::::::::::::::::::::::::::::::::::::::::l::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::............~...,..~..~\n\nPROPELLER DRAG CONTRIBUTION\n\nCHANGE IN EQUIVALENT PARASITE AREA Af\n\n-\n\nFEATHEREO POSITION\n\n0 I5 30 45 60 90\n\nPROPELLER BLADE ANGLE,P\n\n### Figure 2.79. Propeller Operation\n\n149", - "page_start": 166, - "page_end": 166, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**P RACTICE E XERCISE** .......................................................................................................................................... 24\n\n**P RACTICE E XERCISE** .......................................................................................................................................... 25\n\nUnderstanding Functions .................................................................................................................................................. 26\n\nUsing The SUM Function To Add .................................................................................................................... 27\n\nCalculating An Average ................................................................................................................................... 28\n\nFinding A Minimum Value ................................................................................................................................ 29\n\nCommon Error Messages ................................................................................................................................ 30\n\n**P RACTICE E XERCISE** .......................................................................................................................................... 31\n\nUnderstanding Quick Analysis .......................................................................................................................................... 32\n\nQuick Formatting ............................................................................................................................................. 33\n\nQuick Charting ................................................................................................................................................. 34\n\nQuick Totals ..................................................................................................................................................... 35\n\nQuick Sparklines .............................................................................................................................................. 36\n\nQuick Tables .................................................................................................................................................... 37\n\nPractice Exercise ............................................................................................................................................. 38\n\nPrinting A Worksheet ........................................................................................................................................................ 39", - "page_start": 1, - "page_end": 1, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "© Copyright IBM Corp. 2003, 2015. All rights reserved. **iii**\n\n## **Contents**\n\n**Notices** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi\n\nTrademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii\n\n**IBM Redbooks promotions** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii\n\n**Preface** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv\n\nAuthors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv\n\nAcknowledgment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi\n\nNow you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii\n\nComments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii\n\nStay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii\n\n**Summary of changes** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi\n\nOctober 2015, Fifth Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi\n\n**Part 1. Basic system concepts and design** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1\n\n**Chapter 1. Overview and concepts** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3\n\n1.1 Overview of Content Manager OnDemand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4\n\n1.2 Content Manager OnDemand concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6\n\n1.2.1 Background information of an example company. . . . . . . . . . . . . . . . . . . . . . . . . . 6\n\n1.2.2 Reports and documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6\n\n1.2.3 Application, application group, folder, and cabinet . . . . . . . . . . . . . . . . . . . . . . . . . 8\n\n1.2.4 Indexing methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9\n\n1.3 Content Manager OnDemand server and its components . . . . . . . . . . . . . . . . . . . . . . 10\n\n1.3.1 Library server and object server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10\n\n1.3.2 Content Manager OnDemand server components . . . . . . . . . . . . . . . . . . . . . . . . 11\n\n**enChoice** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13\n\n**Chapter 2. Setting up a Content Manager OnDemand instance** . . . . . . . . . . . . . . . . . . 15\n\n2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16\n\n2.2 Architecture and platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16\n\n2.2.1 Configuration consideration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17\n\n2.2.2 Library server and object server functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17\n\n2.2.3 Choosing a platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18\n\n2.3 Implementing a Content Manager OnDemand instance on a multiplatform UNIX\n\nenvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19", - "page_start": 4, - "page_end": 4, - "source_file": "sg246915.pdf" - }, - { - "text": "### Understanding Creative Commons license\n\nbefore licensing your work\n\n#### **THREE-LAYER DESIGN**\n\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court. \"Human Readable\" (commons deeds): contain the summary of the legal code and key terms. \"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.\n\nCreative Commons (CC) license has three layers:\n\n**FOUR ELEMENTS** BY (\"Attribution\"): users must credit the author of the work they are using. SA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license. NC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes. ND (\"NoDerivative\"): reusers making cannot share adaptations of the work.\n\nBY\n\nSA\n\nNC\n\nND\n\n**SIX LICENSES** CC BY (\"Attribution\") allows people to use the work for any purpose (even commercially and even in modified form) as long as they give attribution to the creator. CC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license. CC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator. CC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license. CC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for any purpose (even commercially), as long as they give attribution to the creator. CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.\n\n#### **REMIND THAT…**\n\nyou want to give others permissions to freely copy and redistribute your work, and you want to give others permission to freely transform, alter, or otherwise create derivative works based on your work.\n\nCC license only applicable to the work that is within the scope of copyright law. CC license can be used when …\n\n**CC LICENSE CAN'T BE USED FOR …** fair use, fair dealing, or some other limitation and exception to copyright applies the the work.\n\n**ALSO FOR …** the work that is already in the Public Domain. For those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\").\n\n**NOW, SHARE YOUR WORK!** https://creativecommons.org/choose/\n\nTexts are adapted from CC Certification for Educators. CC BY license. BY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies.\n\nmore open »\n\n« more restrictive\n\nyou can share, remix, & commercialize\n\nyou can share & remix only\n\nyou can share only", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "© Copyright IBM Corp. 2011, 2018, 2019. All rights reserved. **iii**\n\n## **Contents**\n\n**Notices** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii\n\nTrademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv\n\n**Preface** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv\n\nAuthors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv\n\nNow you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii\n\nComments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii\n\nStay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii\n\n**Summary of changes** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix\n\nMay 2019, Eighth Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix\n\n**Chapter 1. Introduction to storage virtualization** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1\n\n1.1 Storage virtualization terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2\n\n1.2 Benefits of using IBM Spectrum Virtualize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5\n\n1.3 Latest changes and enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6\n\n1.4 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7\n\n**Chapter 2. System overview** . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9\n\n2.1 IBM Spectrum Virtualize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10\n\n2.2 Storage virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10\n\n2.3 IBM Storwize V7000 overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12\n\n2.3.1 IBM Storwize V7000 models. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13\n\n2.3.2 IBM Storage Utility offerings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14\n\n2.3.3 IBM Storwize V7000 functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16\n\n2.3.4 IBM Storwize V7000 licensing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18\n\n2.4 IBM Storwize V7000 hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19\n\n2.5 IBM Storwize V7000 components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19\n\n2.5.1 Hosts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20\n\n2.5.2 Host cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20\n\n2.5.3 Nodes or canisters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20\n\n2.5.4 I/O groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20\n\n2.5.5 Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21\n\n2.5.6 Clustered system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23", - "page_start": 4, - "page_end": 4, - "source_file": "sg247938.pdf" - }, - { - "text": "Even in the **short period between 2013 and 2018** (the period covered by these pilot statistics) the data\n\nshow an overall decline and a decline of several relevant occupational diseases. The strongest decrease\n\n— practically a halving — can be seen for hearing impairments (diseases of the inner ear).\n\nPneumoconiosis, mesothelioma and selected occupational cancers went down between 7% and 14%.\n\n**Asthma and some recognised MSDs** are more or less stagnating, probably due to unchanged\n\nexposure to biological or chemical substances and no change regarding the health outcomes of\n\nergonomic working conditions.\n\nIf work is **one of some** causative factors, a clear assignment of work to a health outcome is complex.\n\nMoreover, in many cases a quite **long observation period** is necessary simply due to the **latency time**\n\n**between exposure at work, outbreak and detection of a disease** , which is obviously very different\n\nfrom the clear and immediate consequence of an accident at work.\n\nThe detection of a disease and the correlation between work and this disease depends highly on the\n\n**monitoring capacities of the health system and its ability, tradition and standards to connect**\n\n**diseases and work-related causes** . In a study on ‘Asbestos ‐ related occupational diseases in Central\n\nand East European Countries’ the authors refer to different policies for identifying workers formerly\n\nexposed to asbestos and conclude:\n\n*‘Consequently, large differences are observed from one country to another regarding the number of*\n\n*recognised asbestos-related cases. In Slovenia, for example, the annual asbestosis rate (cases of*\n\n*asbestosis/population) amounts to 14.9, in Croatia 5.3, and in Poland 2.1. Moreover, in Estonia, the*\n\n*incidence of asbestosis is unknown as there is no systematic collection of data.’* <sup>181</sup>\n\nFor example, until now very few occupational diseases have been recognised as outcomes of\n\npsychosocial risks at work. The ILO proposes in its ‘List of Occupational Diseases Recommendation’ a\n\nlarge number of very specific and ‘classic’ occupational diseases — a very broad definition of *‘Mental*\n\n*and behavioural disorders’* but leaving the responsibility to science and to ‘national conditions’. <sup>182</sup>\n\nSimilarly, the development of the European Schedule of Occupational Diseases (ESOD) aims to\n\nimprove knowledge, step up prevention and provide assistance in linking occupational activities and\n\ndiseases.\n\n© Bernard Maurin/Adobe Stock", - "page_start": 74, - "page_end": 74, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", - "query": "What is the most restricive Creative Common licence ?", - "target_page": 1, - "target_passage": "CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "and indicate if changes were made. The images or other third party material in this article are\n\nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line\n\nto the material. If material is not included in the article’s Creative Commons licence and your\n\nintended use is not permitted by statutory regulation or exceeds the permitted use, you will\n\nneed to obtain permission directly from the copyright holder. To view a copy of this licence,\n\n[visit http://creativecommons.org/licenses/by/4.0/.](http://creativecommons.org/licenses/by/4.0/)\n\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "1 Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\n\nNC 27705, USA\n\nFull list of author information is available at the end of the article\n\n© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0\n\nInternational License ( [http://creativecommons.org/licenses/by/4.0/](http://creativecommons.org/licenses/by/4.0/) ), which permits unrestricted use, distribution, and\n\nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to\n\nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver\n\n( [http://creativecommons.org/publicdomain/zero/1.0/](http://creativecommons.org/publicdomain/zero/1.0/) ) applies to the data made available in this article, unless otherwise stated.\n\nhttps://doi.org/10.1186/s12913-018-3470-6", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "#### **3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are\n\nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a\n\ndataset page.\n\nBy clicking on the **licence name** (here: cc-by), the Licence Assistant tool is opened in a new window,\n\ndisplaying relevant information for this particular licence.", - "page_start": 33, - "page_end": 33, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "**Author contributions** K.L. designed the framework of the article and analyzed the yield results and the maize price under future sce- narios. J.P. simulated the climate data from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. W.X. simulated the maize yields in whole world under different scenarios. W.X. simulated the market price of maize at national and global levels. T.A. helped the revision of language.\n\n**Funding** Funding was provided by the National Key Research and Development program of China (Grant Nos. 2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. 41961124007 and 41871026).\n\n**Competing interests** The authors declare no competing interests.\n\n**Additional information Correspondence** and requests for materials should be addressed to K.L.\n\n**Reprints and permissions information** is available at www.nature.com/reprints .\n\n**Publisher’s note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.\n\n**Open Access** This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit [http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/](http://creativecommons.org/licenses/by/4.0/) .\n\n© The Author(s) 2022", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "[This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn](https://www.linkedin.com/in/gotisbrown/) [Otis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open](https://creativecommons.org/licenses/by/4.0/) and public domain works. View full licensing and attribution information about all works included in the [video on Flickr.](https://www.flickr.com/photos/creativecommons/52543574218/)\n\n####### **Creative Commons**\n\nPO Box 1866 Mountain View CA 94042 USA\n\n+1 415 429 6753 info@creativecommons.org", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "## Guide to using public domain tools\n\nCreative Commons makes sharing easy\n\n### What Is Creative Commons?\n\nCreative Commons is a global nonprofit organization\n\ndedicated to supporting an open and accessible Internet\n\nthat is enriched with free knowledge and creative resources\n\nfor people around the world to use, share, and cultivate.\n\nOur easy-to-use licenses provide a simple, standardized way\n\nto give the public permission to share and use your creative\n\nwork — on conditions of your choice. CC licenses let you\n\nchange your copyright terms from the default of “all rights\n\nreserved” to “some rights reserved.”\n\nMillions of people use CC licenses on some of the world’s\n\nmost popular platforms for user-generated content. When\n\nyou use a CC license to share your photos, videos, or blog,\n\nyour creation joins a globally accessible pool of resources\n\nthat includes the work of artists, educators, scientists, and\n\ngovernments.\n\nCreative Commons has waived all copyright and\n\nrelated or neighboring rights to this guide using the\n\nCC0 Public Domain Dedication.\n\n#### What is the difference between CC0 and the Public Domain Mark?\n\nCC0 (“CC Zero”) is intended for use only\n\nby authors or holders of copyright and\n\nrelated rights (including database rights), in connection\n\nwith works that are still subject to those rights in one or\n\nmore countries.\n\nWhen CC0 is applied to a work, copyright and related\n\nrights are relinquished worldwide, making the work free\n\nfrom those restrictions to the greatest extent possible.\n\nThe Public Domain Mark (PDM) is used\n\nto label works that are already free of\n\nknown copyright restrictions. Unlike CC0, PDM doesn’t\n\nchange the copyright status of a work.\n\nPDM can be used by anyone, and is intended for use\n\nwith works that are already free of known copyright\n\nrestrictions throughout the world.\n\n##### Public domain works are valuable because anyone\n\n##### can freely build upon, enhance, and reuse them for\n\n##### any purposes without restriction under copyright\n\n##### or database law.\n\nThat’s why it’s important for creators to have a clear and\n\nlegally robust way to place their works in the public domain as\n\ncompletely as possible, and it’s also important for publishers\n\nand archives to have a standardized way to identify works that\n\nare already in the public domain.\n\nCreative Commons supports two distinct public domain tools,\n\nthe CC0 Public Domain Dedication and the Public Domain\n\nMark . Creative Commons copyright licenses help authors\n\nmanage their copyright on terms they choose. Conversely, CC0\n\nenables authors and copyright owners who want to dedicate\n\ntheir works to the worldwide public domain to do so, and PDM\n\nfacilitates the labeling and discovery of works that are already\n\nfree of known copyright restrictions.\n\nWhere public domain tools fit in the copyright spectrum\n\nSome rights\n\nreserved\n\nAll rights\n\nreserved\n\nPDM\n\nNo known\n\ncopyright\n\nCC0\n\nPublic\n\ndomain\n\n### The CC0 Public Domain Dedication\n\n**Use this universal tool if you are a holder of copyright or database**\n\n**rights, and wish to waive all your rights to the work worldwide.**\n\nBy using CC0, you waive all copyright and related rights\n\ntogether with all associated claims and causes of action with\n\nrespect to this work to the extent possible under the law.\n\nApplying CC0 to your work is easy. Simply visit the CC0 chooser\n\n( http://creativecommons.org/choose/zero ) which will lead you\n\nthrough the process. When completed, you will be provided\n\nwith HTML code that you can copy and paste into your website.\n\nYou let others copy, modify, distribute, and perform the work,\n\neven for commercial purposes, all without asking permission.\n\nWorks marked with the Public Domain Mark have been\n\nidentified as being free of known restrictions under copyright\n\nlaw, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.\n\n**[Except where otherwise noted, “Annual Report 2023” by Creative Commons ](https://creativecommons.org/mission/) [is licensed under CC BY 4.0. ](https://creativecommons.org/licenses/by/4.0/deed.en)**\n\n[\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0.](https://creativecommons.org/publicdomain/mark/1.0/?ref=openverse)\n\n### **About Us**\n\n#### **Board of Directors**\n\nMarta Belcher Glenn Otis Brown [Delia Browne](https://creativecommons.org/person/deliabrowne/) [James Grimmelmann](https://creativecommons.org/person/jamesgrimmelmann-net/) Lawrence Lessig * *Emeritus*\n\nAngela Oduor Lungati Bilal Randeree Alek Tarkowski Jeni Tennison Luis Villa\n\n**Chief Executive Officer** Anna Tumadóttir\n\n**General Counsel** Kat Walsh", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nCombined, these limits can enable effective foreign control of up to\n\n46.7%.\n\nThe chief executive officer and 80% of the members of the Board of\n\nDirectors of the operating licensee must be resident Canadians. There\n\nare no restrictions on the number of non-voting shares that may be\n\nheld by non-Canadians at either the holding-company or licensee-\n\ncompany level. Neither the Canadian carrier nor its parent may be\n\notherwise controlled in fact by non-Canadians. Subject to appeal to the\n\nfederal Cabinet, the CRTC has the jurisdiction to determine as a\n\nquestion of fact whether a given licensee is controlled by non-\n\nCanadians.\n\nPursuant to the Telecommunications Act and associated regulations, the\n\nsame rules also apply to Canadian telecommunications carriers such as\n\nWireless, except that there is no requirement that the chief executive\n\nofficer be a resident Canadian. We believe we are in compliance with\n\nthe foregoing foreign ownership and control requirements.\n\nOn June 29, 2012, Bill C-38 amending the Telecommunications Act\n\npassed into law. The amendments exempt telecommunications\n\ncompanies with less than 10% of total Canadian telecommunications\n\nmarket measured by revenue from foreign investment restrictions.\n\nCompanies that are successful in growing their market shares in excess\n\nof 10% of total Canadian telecommunications market revenues other\n\nthan by way of merger or acquisitions will continue to be exempt from\n\nthe restrictions.\n\nWIRELESS\n\n####### **Consultation on the Renewal of Cellular and Personal**\n\n####### **Communications Services (PCS) Spectrum Licences**\n\nIn March 2011, Industry Canada released its decisions about the\n\nrenewal process for cellular and PCS licences that began expiring at that\n\ntime. Key things to note:\n\n- At the end of the current licence term, new cellular and PCS licences\n\nwith a 20-year term will be issued to licensees that are in compliance\n\nwith all licence conditions.\n\n- The previously existing annual fee of $0.0351 per MHz per\n\npopulation of the licenced area will continue to apply to all cellular\n\nand PCS licences, including those initially assigned by auction. The\n\nMinister of Industry Canada may review and amend the fees during\n\nthe licence term after further consultation with licensees.\n\n- A determination regarding existing research and development\n\nconditions of licence was not released at that time and will be\n\nreleased separately. A decision has not been made to date, and until\n\nsuch a time, the current conditions of licence remain in effect.\n\n####### **Consultation on a Policy and Technical Framework for the**\n\n## **700Mhz and 2500-2690Mhz Band and Aspects Related to**\n\n####### **Commercial Mobile Spectrum**\n\nIn March 2012, Industry Canada released its policy and technical\n\nframework for the auction of spectrum in the 700 MHz and 2500- 2690\n\nMHz spectrum bands. Key things to note:\n\n- Industry Canada adopted an auction cap for the 700 MHZ (not a set-\n\naside like in the 2008 Advanced Wireless Services (AWS) spectrum\n\nauction). There are four blocks of spectrum that are considered\n\n“prime”. Large domestic wireless carriers are restricted to a single\n\nblock of prime spectrum each, while all other carriers are restricted to\n\ntwo blocks. Rogers, Bell and Telus are considered large carriers\n\nnationally. SaskTel is considered a large carrier in Saskatchewan, and\n\nMTS is considered a large carrier in Manitoba.\n\n- To encourage rural deployments, single carriers who win two paired\n\nblocks, or two carriers who share their two paired blocks, are\n\nrequired to use their 700 MHz spectrum to provide coverage to 90%\n\nof their HSPA+ territory within five years and 97% within seven\n\nyears. Industry Canada will use Tier 2 licence areas for the 700Mhz\n\nauction. These are 14 large service areas covering all of Canada, and\n\nare generally the same size as individual provinces.\n\nIn March 2013, Industry Canada released *Licensing Framework for*", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most\n\nare not actively managed by their rightsholders. There is no official registry of copyrighted\n\nworks and their owners, and existing datasets can be incomplete or erroneous. 16\n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially\n\nthose that have or have had limited commercial value. Put differently, the barrier to using 17\n\nmost books is not simply to pay publishers; even if one had significant financial resources,\n\nlicensing would not enable access to most works.\n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as\n\nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular\n\nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their\n\nfollow-on use).\n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion\n\ndepends on whether the license’s terms can be complied with in the context of AI training.\n\nFor instance, in the context of CC licensed works, there are requirements for proper\n\nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public\n\nDomain Mark (PDM) are not licenses and do not require attribution). 18\n\nSee e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary 16\n\nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper\n\nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181 .\n\nAccessed 4 Jan. 2020, at [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181) ; Rosen,\n\nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?” *The Atlantic* , 18 Mar.\n\n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century-\n\navailable-as-ebooks/284486/ . See also “Google Book Search Settlement and Access to Out of Print\n\nBooks.” *Google Public Policy Blog* , [publicpolicy.googleblog.com/2009/06/google-book-search-](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html)\n\n[settlement-and.html](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html) . Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class-\n\naction settlement between Google, the Authors Guild, and the Association of American Publishers).\n\nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying\n\nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at [https://](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[google_final_approval_support.pdf](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf) . The Authors Guild and Association of American Publishers also\n\njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding\n\ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly\n\n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether\n\nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out-", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "[In 2023, we convened hundreds via](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [roundtables, community conferences](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [(e.g. ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[MozFest](https://creativecommons.org/2023/05/04/generative-ai-opportunities-concerns-solutions-from-mozfest-2023/)** , **[Wikimania](https://creativecommons.org/2024/02/07/dispatches-from-wikimania-values-for-shaping-ai-towards-a-better-internet/)** [), and public](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [events (e.g. symposium on ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[Generative](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [AI & Creativity](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)** [)to debate copyright law,](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [the ethics of open sharing, and other](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [relevant areas that touch AI. ](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)\n\n[At our CC Global Summit, participants](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [drafted ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[community-driven principles](https://creativecommons.org/2023/10/07/making-ai-work-for-creators-and-the-commons/)** [on AI that are a valuable input and will](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [help inform the organization’s thinking](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [as we determine CC’s exact role in the AI](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) space.\n\n[“The Pillars of Creation” by ](https://openverse.org/image/8de72efd-e12b-49eb-8210-1046bcd71847?q=Pillars%20of%20Creation) [James Webb Space Telescope ](https://www.flickr.com/photos/50785054@N03) [is licensed under CC BY 2.0. ](https://creativecommons.org/licenses/by/2.0/?ref=openverse)\n\n### **Areas of Exploration**\n\n####### **Support for Creators in the Time of Artificial Intelligence**", - "page_start": 8, - "page_end": 8, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - } - ] - }, - { - "references": { - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", - "query": "In which case CC licence can't be used ?", - "target_page": 1, - "target_passage": "fair use, fair dealing, or some other limitation and exception to copyright applies the the work.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "### Understanding Creative Commons license\n\nbefore licensing your work\n\n#### **THREE-LAYER DESIGN**\n\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court. \"Human Readable\" (commons deeds): contain the summary of the legal code and key terms. \"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.\n\nCreative Commons (CC) license has three layers:\n\n**FOUR ELEMENTS** BY (\"Attribution\"): users must credit the author of the work they are using. SA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license. NC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes. ND (\"NoDerivative\"): reusers making cannot share adaptations of the work.\n\nBY\n\nSA\n\nNC\n\nND\n\n**SIX LICENSES** CC BY (\"Attribution\") allows people to use the work for any purpose (even commercially and even in modified form) as long as they give attribution to the creator. CC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license. CC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator. CC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license. CC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for any purpose (even commercially), as long as they give attribution to the creator. CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.\n\n#### **REMIND THAT…**\n\nyou want to give others permissions to freely copy and redistribute your work, and you want to give others permission to freely transform, alter, or otherwise create derivative works based on your work.\n\nCC license only applicable to the work that is within the scope of copyright law. CC license can be used when …\n\n**CC LICENSE CAN'T BE USED FOR …** fair use, fair dealing, or some other limitation and exception to copyright applies the the work.\n\n**ALSO FOR …** the work that is already in the Public Domain. For those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\").\n\n**NOW, SHARE YOUR WORK!** https://creativecommons.org/choose/\n\nTexts are adapted from CC Certification for Educators. CC BY license. BY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies.\n\nmore open »\n\n« more restrictive\n\nyou can share, remix, & commercialize\n\nyou can share & remix only\n\nyou can share only", - "page_start": 0, - "page_end": 0, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" - }, - { - "text": "#### **3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are\n\nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a\n\ndataset page.\n\nBy clicking on the **licence name** (here: cc-by), the Licence Assistant tool is opened in a new window,\n\ndisplaying relevant information for this particular licence.", - "page_start": 33, - "page_end": 33, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "## Guide to using public domain tools\n\nCreative Commons makes sharing easy\n\n### What Is Creative Commons?\n\nCreative Commons is a global nonprofit organization\n\ndedicated to supporting an open and accessible Internet\n\nthat is enriched with free knowledge and creative resources\n\nfor people around the world to use, share, and cultivate.\n\nOur easy-to-use licenses provide a simple, standardized way\n\nto give the public permission to share and use your creative\n\nwork — on conditions of your choice. CC licenses let you\n\nchange your copyright terms from the default of “all rights\n\nreserved” to “some rights reserved.”\n\nMillions of people use CC licenses on some of the world’s\n\nmost popular platforms for user-generated content. When\n\nyou use a CC license to share your photos, videos, or blog,\n\nyour creation joins a globally accessible pool of resources\n\nthat includes the work of artists, educators, scientists, and\n\ngovernments.\n\nCreative Commons has waived all copyright and\n\nrelated or neighboring rights to this guide using the\n\nCC0 Public Domain Dedication.\n\n#### What is the difference between CC0 and the Public Domain Mark?\n\nCC0 (“CC Zero”) is intended for use only\n\nby authors or holders of copyright and\n\nrelated rights (including database rights), in connection\n\nwith works that are still subject to those rights in one or\n\nmore countries.\n\nWhen CC0 is applied to a work, copyright and related\n\nrights are relinquished worldwide, making the work free\n\nfrom those restrictions to the greatest extent possible.\n\nThe Public Domain Mark (PDM) is used\n\nto label works that are already free of\n\nknown copyright restrictions. Unlike CC0, PDM doesn’t\n\nchange the copyright status of a work.\n\nPDM can be used by anyone, and is intended for use\n\nwith works that are already free of known copyright\n\nrestrictions throughout the world.\n\n##### Public domain works are valuable because anyone\n\n##### can freely build upon, enhance, and reuse them for\n\n##### any purposes without restriction under copyright\n\n##### or database law.\n\nThat’s why it’s important for creators to have a clear and\n\nlegally robust way to place their works in the public domain as\n\ncompletely as possible, and it’s also important for publishers\n\nand archives to have a standardized way to identify works that\n\nare already in the public domain.\n\nCreative Commons supports two distinct public domain tools,\n\nthe CC0 Public Domain Dedication and the Public Domain\n\nMark . Creative Commons copyright licenses help authors\n\nmanage their copyright on terms they choose. Conversely, CC0\n\nenables authors and copyright owners who want to dedicate\n\ntheir works to the worldwide public domain to do so, and PDM\n\nfacilitates the labeling and discovery of works that are already\n\nfree of known copyright restrictions.\n\nWhere public domain tools fit in the copyright spectrum\n\nSome rights\n\nreserved\n\nAll rights\n\nreserved\n\nPDM\n\nNo known\n\ncopyright\n\nCC0\n\nPublic\n\ndomain\n\n### The CC0 Public Domain Dedication\n\n**Use this universal tool if you are a holder of copyright or database**\n\n**rights, and wish to waive all your rights to the work worldwide.**\n\nBy using CC0, you waive all copyright and related rights\n\ntogether with all associated claims and causes of action with\n\nrespect to this work to the extent possible under the law.\n\nApplying CC0 to your work is easy. Simply visit the CC0 chooser\n\n( http://creativecommons.org/choose/zero ) which will lead you\n\nthrough the process. When completed, you will be provided\n\nwith HTML code that you can copy and paste into your website.\n\nYou let others copy, modify, distribute, and perform the work,\n\neven for commercial purposes, all without asking permission.\n\nWorks marked with the Public Domain Mark have been\n\nidentified as being free of known restrictions under copyright\n\nlaw, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "and indicate if changes were made. The images or other third party material in this article are\n\nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line\n\nto the material. If material is not included in the article’s Creative Commons licence and your\n\nintended use is not permitted by statutory regulation or exceeds the permitted use, you will\n\nneed to obtain permission directly from the copyright holder. To view a copy of this licence,\n\n[visit http://creativecommons.org/licenses/by/4.0/.](http://creativecommons.org/licenses/by/4.0/)\n\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most\n\nare not actively managed by their rightsholders. There is no official registry of copyrighted\n\nworks and their owners, and existing datasets can be incomplete or erroneous. 16\n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially\n\nthose that have or have had limited commercial value. Put differently, the barrier to using 17\n\nmost books is not simply to pay publishers; even if one had significant financial resources,\n\nlicensing would not enable access to most works.\n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as\n\nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular\n\nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their\n\nfollow-on use).\n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion\n\ndepends on whether the license’s terms can be complied with in the context of AI training.\n\nFor instance, in the context of CC licensed works, there are requirements for proper\n\nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public\n\nDomain Mark (PDM) are not licenses and do not require attribution). 18\n\nSee e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary 16\n\nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper\n\nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181 .\n\nAccessed 4 Jan. 2020, at [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181) ; Rosen,\n\nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?” *The Atlantic* , 18 Mar.\n\n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century-\n\navailable-as-ebooks/284486/ . See also “Google Book Search Settlement and Access to Out of Print\n\nBooks.” *Google Public Policy Blog* , [publicpolicy.googleblog.com/2009/06/google-book-search-](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html)\n\n[settlement-and.html](http://publicpolicy.googleblog.com/2009/06/google-book-search-settlement-and.html) . Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class-\n\naction settlement between Google, the Authors Guild, and the Association of American Publishers).\n\nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying\n\nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at [https://](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf)\n\n[google_final_approval_support.pdf](https://web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/google_final_approval_support.pdf) . The Authors Guild and Association of American Publishers also\n\njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding\n\ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly\n\n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether\n\nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out-", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nCombined, these limits can enable effective foreign control of up to\n\n46.7%.\n\nThe chief executive officer and 80% of the members of the Board of\n\nDirectors of the operating licensee must be resident Canadians. There\n\nare no restrictions on the number of non-voting shares that may be\n\nheld by non-Canadians at either the holding-company or licensee-\n\ncompany level. Neither the Canadian carrier nor its parent may be\n\notherwise controlled in fact by non-Canadians. Subject to appeal to the\n\nfederal Cabinet, the CRTC has the jurisdiction to determine as a\n\nquestion of fact whether a given licensee is controlled by non-\n\nCanadians.\n\nPursuant to the Telecommunications Act and associated regulations, the\n\nsame rules also apply to Canadian telecommunications carriers such as\n\nWireless, except that there is no requirement that the chief executive\n\nofficer be a resident Canadian. We believe we are in compliance with\n\nthe foregoing foreign ownership and control requirements.\n\nOn June 29, 2012, Bill C-38 amending the Telecommunications Act\n\npassed into law. The amendments exempt telecommunications\n\ncompanies with less than 10% of total Canadian telecommunications\n\nmarket measured by revenue from foreign investment restrictions.\n\nCompanies that are successful in growing their market shares in excess\n\nof 10% of total Canadian telecommunications market revenues other\n\nthan by way of merger or acquisitions will continue to be exempt from\n\nthe restrictions.\n\nWIRELESS\n\n####### **Consultation on the Renewal of Cellular and Personal**\n\n####### **Communications Services (PCS) Spectrum Licences**\n\nIn March 2011, Industry Canada released its decisions about the\n\nrenewal process for cellular and PCS licences that began expiring at that\n\ntime. Key things to note:\n\n- At the end of the current licence term, new cellular and PCS licences\n\nwith a 20-year term will be issued to licensees that are in compliance\n\nwith all licence conditions.\n\n- The previously existing annual fee of $0.0351 per MHz per\n\npopulation of the licenced area will continue to apply to all cellular\n\nand PCS licences, including those initially assigned by auction. The\n\nMinister of Industry Canada may review and amend the fees during\n\nthe licence term after further consultation with licensees.\n\n- A determination regarding existing research and development\n\nconditions of licence was not released at that time and will be\n\nreleased separately. A decision has not been made to date, and until\n\nsuch a time, the current conditions of licence remain in effect.\n\n####### **Consultation on a Policy and Technical Framework for the**\n\n## **700Mhz and 2500-2690Mhz Band and Aspects Related to**\n\n####### **Commercial Mobile Spectrum**\n\nIn March 2012, Industry Canada released its policy and technical\n\nframework for the auction of spectrum in the 700 MHz and 2500- 2690\n\nMHz spectrum bands. Key things to note:\n\n- Industry Canada adopted an auction cap for the 700 MHZ (not a set-\n\naside like in the 2008 Advanced Wireless Services (AWS) spectrum\n\nauction). There are four blocks of spectrum that are considered\n\n“prime”. Large domestic wireless carriers are restricted to a single\n\nblock of prime spectrum each, while all other carriers are restricted to\n\ntwo blocks. Rogers, Bell and Telus are considered large carriers\n\nnationally. SaskTel is considered a large carrier in Saskatchewan, and\n\nMTS is considered a large carrier in Manitoba.\n\n- To encourage rural deployments, single carriers who win two paired\n\nblocks, or two carriers who share their two paired blocks, are\n\nrequired to use their 700 MHz spectrum to provide coverage to 90%\n\nof their HSPA+ territory within five years and 97% within seven\n\nyears. Industry Canada will use Tier 2 licence areas for the 700Mhz\n\nauction. These are 14 large service areas covering all of Canada, and\n\nare generally the same size as individual provinces.\n\nIn March 2013, Industry Canada released *Licensing Framework for*", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**19 Workshops & Trainings** with institutions like ALA, Connecticut Humanities & State University of New York, Digital Research Alliance of Canada, and WikiConf North America.\n\n**[2 Week-Long CC Certificate Bootcamps ](https://creativecommons.org/2023/12/21/more-california-community-colleges-get-cc-certified/)** [for California Community Colleges.](https://creativecommons.org/2023/12/21/more-california-community-colleges-get-cc-certified/)\n\n**27 Webinars** on topics like the basics of Open Culture, the possibilties of Open Educational Resources (OER) for business-university cooperation, and the future of CC Licenses in digital and online education.\n\n**12 CC Legal Open Office Hours** hosted by our legal team, providing a personalized opportunity for the CC community to ask questions about CC Licenses, open access, and sharing.\n\n##### **In 2023, we greatly expanded our CC Licenses training and education offerings:**\n\n### **Training in how to use CC Licenses is key to their adoption.**\n\nWe offer a ten-week **[CC Certificate](https://certificates.creativecommons.org/)** program that is now tailored not only to the education and library sectors, but also galleries, archives, libraries, and museums and **[available in 10 languages](https://certificates.creativecommons.org/about/translations/)** .\n\nAs of 2023, we’ve certified:\n\n**65 Countries 1,705 Graduates**\n\n**across**", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Author contributions** K.L. designed the framework of the article and analyzed the yield results and the maize price under future sce- narios. J.P. simulated the climate data from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. W.X. simulated the maize yields in whole world under different scenarios. W.X. simulated the market price of maize at national and global levels. T.A. helped the revision of language.\n\n**Funding** Funding was provided by the National Key Research and Development program of China (Grant Nos. 2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. 41961124007 and 41871026).\n\n**Competing interests** The authors declare no competing interests.\n\n**Additional information Correspondence** and requests for materials should be addressed to K.L.\n\n**Reprints and permissions information** is available at www.nature.com/reprints .\n\n**Publisher’s note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.\n\n**Open Access** This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit [http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/](http://creativecommons.org/licenses/by/4.0/) .\n\n© The Author(s) 2022", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "**MANAGEMENT’S DISCUSSION AND ANALYSIS** Regulation in Our Industry\n\nOur business, except for the non-broadcasting operations of Media, is\n\nregulated by two groups:\n\n- the Canadian Federal Department of Industry on behalf of the\n\nMinister of Industry (Canada) (together, Industry Canada)\n\n- the CRTC, under the *Telecommunications* *Act* *(Canada)*\n\n(Telecommunications Act) and the *Broadcasting* *Act* *(Canada)*\n\n(Broadcasting Act).\n\nRegulation relates to the following, among other things:\n\n- wireless spectrum and broadcasting licensing\n\n- competition\n\n- the cable television programming services we must, and can,\n\ndistribute\n\n- wireless and wireline interconnection agreements\n\n- rates we can charge third parties for access to our network\n\n- the resale of our networks\n\n- roaming on our networks\n\n- ownership and operation of our communications systems\n\n- our ability to acquire an interest in other communications systems.\n\nRegulatory changes or decisions can adversely affect our consolidated\n\nresults of operations.\n\nOur costs of providing services may increase from time to time as we\n\ncomply with industry or legislative initiatives to address consumer\n\nprotection concerns or Internet-related issues like copyright\n\ninfringement, unsolicited commercial e-mail, cybercrime and lawful\n\naccess.\n\nGenerally, our spectrum and broadcast licences are granted for a\n\nspecified term and are subject to conditions for maintaining these\n\nlicences. The regulators can modify these licensing conditions at any\n\ntime, and they can decide not to renew a licence when it expires. If we\n\ndo not comply with the conditions, a licence may be forfeited or\n\nrevoked, or we may be fined.\n\nThe licences have conditions that require us, amongst other things, to\n\ncomply with Canadian ownership restrictions of the applicable\n\nlegislation, and we are currently in compliance with them. If we violate\n\nthe requirements, we would be subject to various penalties and it could\n\ninclude losing a licence in extreme cases.\n\nCable, wireless and broadcasting licences generally cannot be\n\ntransferred without regulatory approval.\n\n####### **Canadian Broadcasting Operations**\n\nOur Canadian broadcasting operations - including our cable television\n\nsystems, radio and television stations, and specialty services - are\n\nlicenced (or operated under an exemption order) and regulated by the\n\nCRTC under the Broadcasting Act.\n\nThe CRTC is responsible for regulating and supervising all aspects of the\n\nCanadian broadcasting system. It is also responsible under the\n\nTelecommunications Act for the regulation of telecommunications\n\ncarriers, including:\n\n- Wireless’ mobile voice and data operations\n\n- Cable’s Internet and telephone services.\n\nOur cable and telecommunications retail services are not subject to\n\nprice regulation, because the CRTC believes there is enough\n\ncompetition for these services provided by other carriers to protect the\n\ninterests of users, so has forborne from regulating them. Regulations\n\ncan and do, however, affect the terms and conditions under which we\n\noffer these services.\n\n####### **Spectrum Licences**\n\nIndustry Canada sets technical standards for telecommunications under\n\nthe *Radiocommunication Act (Canada)* (Radiocommunication Act) and\n\nthe Telecommunications Act. It licences and oversees:\n\n- the technical aspects of the operation of radio and television stations\n\n- the frequency-related operations of cable television networks\n\n- awarding and supervising spectrum for wireless communications\n\nsystems in Canada.\n\n####### **Royalties**\n\nThe Copyright Board of Canada (Copyright Board) oversees the\n\nadministration of copyright royalties in Canada and establishes the\n\nroyalties to be paid for the use of certain copyrighted works. It sets the\n\ncopyright tariff royalties that Canadian broadcasting undertakings,\n\nincluding cable, radio, television and specialty services, pay to copyright\n\ncollectives.\n\n####### **Billing and Contracts**", - "page_start": 70, - "page_end": 70, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "(2) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) that is reasonably required in the interests of defence, public safety, public order, public morality, public health, town and country planning, the development and utilization of mineral resources, for the purpose of any census or in order to secure the development or utilization of any property for a purpose beneficial to the community; ( *b* ) that is reasonably required for the purpose of protecting the rights or freedoms of other persons; ( *c* ) that authorizes an officer or agent of the Government of Botswana, a local government authority or a body corporate established by law for a public purpose to enter on the premises of any person in order to inspect those premises or anything thereon for the purpose of any tax, rate or duty or in order to carry out work connected with any property that is lawfully on those premises and that belongs to that Government, authority or body corporate, as the case may be; or ( *d* ) that authorizes, for the purpose of enforcing the judgment or order of a court in any civil proceedings, the search of any person or property by order of a court or entry upon any premises by such order, and except so far as that provision or, as the case may be, anything done under the authority thereof is shown not to be reasonably justifiable in a democratic society. **10. Provisions to secure protection of law** (1) If any person is charged with a criminal offence, then, unless the charge is withdrawn, the case shall be afforded a fair hearing within a reasonable time by an independent and impartial court established or recognized by law. (2) Every person who is charged with a criminal offence- ( *a* ) shall be presumed to be innocent until he or she is proved or has pleaded guilty; ( *b* ) shall be informed as soon as reasonably practicable, in a language that he or she understands and in detail, of the nature of the offence charged; ( *c* ) shall be given adequate time and facilities for the preparation of his or her defence; ( *d* ) shall be permitted to defend himself or herself before the court in person or, at his or her own expense, by a legal representative of his or her own choice; ( *e* ) shall be afforded facilities to examine in person or by his or her legal representative the witnesses called by the prosecution before the court, and to obtain the attendance and carry out the examination of witnesses to testify on his or her behalf before the court on the same conditions as those applying to witnesses called by the prosecution; and ( *f* ) shall be permitted to have without payment the assistance of an interpreter if he or she cannot understand the language used at the trial of the charge, and except with his or her own consent the trial shall not take place in his or her absence unless he or she so conducts himself or herself as to render the continuance of the proceedings in his or her presence impracticable and the court has ordered him or her to be removed and the trial to proceed in his or her absence. (3) When a person is tried for any criminal offence, the accused person or any person authorized by him or her in that behalf shall, if he or she so requires and subject to payment of such reasonable fee as may be prescribed by law, be given within a reasonable time after judgment a copy for the use of the accused person of any record of the proceedings made by or on behalf of the court.", - "page_start": 8, - "page_end": 8, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RSG_2004.pdf", - "query": "In how many regions the Republic Services operations are organized ?", - "target_page": 9, - "target_passage": "As of December 31, 2004, our operations were organized into five regions whose boundaries may change from time to time: Eastern, Central, Southern, Southwestern and Western.", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "**(19) Business Segment Information**\n\nE u ronet and its subsidiaries operate in two business segments: (1) a segment that provides an independent shared ATM network and other\n\ne l e c t ronic payment network services to banks, retail and financial institutions (the “Network Services Segment”); and (2) a segment that\n\np roduces application software and solutions for payment and transaction delivery systems (the “Software Solutions Segment”). These\n\nbusiness segments are supported by a corporate service segment which provides corporate and other administrative services which are not\n\nd i rectly identifiable with the two business segments, (the “Corporate Services Segment”). The accounting policies of each segment are the\n\nsame as those described in the summary of significant accounting policies. The Company evaluates perf o rmance based on profit or loss fro m\n\noperations before income taxes not including nonre c u rring gains and net loss. Prior period segment information has been restated to conform\n\nto the current period’s presentation.\n\nAs the Network Services Segment continued to grow throughout 1999, the Company’s management began to divide the internal org a n i z a t i o n\n\nof the segment into Sub-segments. Accord i n g l y, beginning in January 2000, the Company divided the Network Services Segment into thre e\n\nSub-segments: “Central European Sub-segment” (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), “We s t e rn\n\nE u ropean Sub-segment” (including Germ a n y, France, and the United Kingdom) and “Other Operations Sub-segment” (including the United\n\nStates and unallocated processing center costs). Where practical, certain amounts have been reclassified to reflect the change in intern a l\n\nre p o rting. The Company is unable to present Network Services Segment assets by Sub-segment as of December 31, 1999. Prior to January 1,\n\n2000, certain assets that were used to provide support services to the Company as a whole were included in the assets in the balance sheet of\n\nthe Company’s wholly owned Hungarian subsidiary, Bank Tech. In order to segregate corporate assets from those of the Hungarian\n\noperations, these assets were transferred as of December 31, 1999, from Bank Tech to an existing Hungarian shell company, Administrative\n\nS e rvices. Those assets are now shown under the Other Operations Sub-segment.\n\nThe following tables present the segment results of the Company’s operations for the years ended December 31, 2000, 1999 and 1998.\n\nYear Ended December 31, 2000\n\nNetwork Serv i c e s\n\nN e t w o r k\n\nCentral We s t e rn S e rvices S o f t w a re C o r p o r a t e\n\nE u rope E u rope O t h e r To t a l Solutions S e rvices To t a l\n\n*(in thousands)*\n\nTotal Revenues $ 1 8 , 5 9 9 . $ 1 6 , 6 1 5 . $ 1 , 7 0 0 . $ 3 6 , 9 1 4 . $ 1 6 , 0 0 6 . $ — . $ 5 2 , 9 2 0 .\n\nTotal operating expenses ( 2 1 , 6 6 9 ) ( 1 8 , 9 0 1 ) ( 2 , 4 0 9 ) ( 4 2 , 9 7 9 ) ( 3 7 , 4 7 5 ) ( 7 , 8 6 2 ) ( 8 8 , 3 1 6 )\n\nOperating loss . ( 3 , 0 7 0 ) ( 2 , 2 8 6 ) ( 7 0 9 ) ( 6 , 0 6 5 ) ( 2 1 , 4 6 9 ) ( 7 , 8 6 2 ) ( 3 5 , 3 9 6 )\n\nI n t e rest income 2 8 9 . 6 5 . 1 9 0 . 5 4 4 . 1 0 3 . 4 4 2 . 1 , 0 8 9 .\n\nI n t e rest expense ( 1 , 0 1 6 ) ( 1 6 8 ) ( 1 5 0 ) ( 1 , 3 3 4 ) — . ( 9 , 4 9 5 ) ( 1 0 , 8 2 9 )\n\nF o reign exchange (loss)/gain, net ( 6 1 6 ) ( 4 9 4 ) ( 1 5 5 ) ( 1 , 2 6 5 ) 1 . . ( 1 , 9 6 3 ) ( 3 , 2 2 7 )\n\nNet loss before income taxes $ ( 4 , 4 1 3 ) $ ( 2 , 8 8 3 ) $ ( 8 2 4 ) $ ( 8 , 1 2 0 ) $( 2 1 , 3 6 5 ) $( 1 8 , 8 7 8 ) $ ( 4 8 , 3 6 3 )\n\nSegment assets $ 2 5 , 6 9 7 . $ 1 6 , 7 5 5 $ 3 , 6 5 2 . $ 4 6 , 1 0 4 . $ 9 , 4 3 3 . $ 5 , 3 5 3 . $ 6 0 , 8 9 0 .\n\nFixed assets 1 7 , 1 4 5 . 1 1 , 7 0 7 . 1 , 6 8 2 . 3 0 , 5 3 4 . 9 6 8 . 1 5 5 . 3 1 , 6 5 7 .\n\nD e p reciation and amort i z a t i o n 3 , 9 7 7 . 2 , 8 8 4 . 1 , 1 0 0 . 7 , 9 6 1 . 2 , 2 1 5 . 2 0 8 . 1 0 , 3 8 4 .\n\nAsset write down 6 6 8 . 1 1 0 . — 7 7 8 . 1 1 , 1 9 0 — . 1 1 , 9 6 8 .\n\nYear Ended December 31, 2000", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "The other corporate oÇcers with responsibility for our operations have an average of over 23 years of\n\nmanagement experience in the solid waste industry. Our Ñve regional vice presidents and our 23 area\n\npresidents have an average of 24 years of experience in the industry.\n\nIn addition, Harris W. Hudson, who has served as our Vice Chairman since our initial public\n\noÅering, has over 40 years of experience in the solid waste industry, including 11 years with Waste\n\nManagement and 19 years with private waste collection companies.\n\n‚ * **Decentralized Management Structure.** * We maintain a relatively small corporate headquarters staÅ,\n\nrelying on a decentralized management structure to minimize administrative overhead costs and to\n\nmanage our day-to-day operations more eÇciently. Our local management has extensive industry\n\nexperience in growing, operating and managing solid waste companies and has substantial experience\n\nin their local geographic markets. In early 2001, we added a sales, maintenance and operations\n\nmanager to each of our regional management teams, which previously consisted of a regional vice\n\npresident and a regional controller. We believe that strengthening our regional management teams\n\nallows us to more eÅectively and eÇciently drive our company's initiatives and helps ensure\n\nconsistency throughout our organization. Our regional management teams and our area presidents have\n\nextensive authority, responsibility and autonomy for operations within their respective geographic\n\nmarkets. Compensation for regional and area management teams is primarily based on the improve-\n\nment in operating income produced and the free cash Öow and return on invested capital generated in\n\neach manager's geographic area of responsibility. In addition, through long-term incentive programs,\n\nincluding stock options, we believe we have one of the lowest turnover levels in the industry for our\n\nlocal management teams. As a result of retaining experienced managers with extensive knowledge of\n\nand involvement in their local communities, we are proactive in anticipating our customers' needs and\n\nadjusting to changes in our markets. We also seek to implement the best practices of our various\n\nregions and areas throughout our operations to improve operating margins.\n\n‚ * **Integrated Operations.** * We seek to achieve a high rate of internalization by controlling waste streams\n\nfrom the point of collection through disposal. We expect that our fully integrated markets generally will\n\nhave a lower cost of operations and more favorable cash Öows than our non-integrated markets.\n\nThrough acquisitions and other market development activities, we create market-speciÑc, integrated\n\noperations typically consisting of one or more collection companies, transfer stations and landÑlls. We\n\nconsider acquiring companies that own or operate landÑlls with signiÑcant permitted disposal capacity\n\nand appropriate levels of waste volume. We also seek to acquire solid waste collection companies in\n\nmarkets in which we own or operate landÑlls. In addition, we generate internal growth in our disposal\n\noperations by developing new landÑlls and expanding our existing landÑlls from time to time in markets\n\nin which we have signiÑcant collection operations or in markets that we determine lack suÇcient\n\ndisposal capacity. During the three months ended December 31, 2004, approximately 54% of the total\n\nvolume of waste that we collected was disposed of at landÑlls we own or operate. In a number of our\n\nlarger markets, we and our competitors are required to take waste to government-controlled disposal\n\nfacilities. This provides us with an opportunity to eÅectively compete in these markets without\n\ninvesting in landÑll capacity. Because we do not have landÑll facilities or government-controlled\n\ndisposal facilities for all markets in which we provide collection services, we believe that through", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "####### **EXHIBIT 23.1**\n\n####### **CONSENT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n\nWe consent to the incorporation by reference in the Registration Statements (Form S-8 Nos. 333-81801,\n\n333-78125, 333-45542 and 333-104048) pertaining to the Republic Services 401(k) Plan, 1998 Stock\n\nIncentive Plan, Republic Services, Inc. Amended and Restated Employee Stock Purchase Plan, and Republic\n\nServices, Inc. Amended and Restated 1998 Stock Incentive Plan, respectively, of our reports dated\n\nFebruary 24, 2005, with respect to the consolidated Ñnancial statements and schedule of Republic Services,\n\nInc., Republic Services, Inc. management's assessment of the eÅectiveness of internal control over Ñnancial\n\nreporting, and the eÅectiveness of internal control over Ñnancial reporting of Republic Services, Inc., included\n\nin this Annual Report (Form 10-K) for the year ended December 31, 2004.\n\n/s/ E RNST & Y OUNG LLP\n\nCertiÑed Public Accountants\n\nFort Lauderdale, Florida\n\nFebruary 24, 2005\n\n95", - "page_start": 102, - "page_end": 102, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**M A N A G E M E N T ’ S D I S C U S S I O N A N D A N A LY S I S O F F I N A N C I A L C O N D I T I O N A N D R E S U LT S O F O P E R AT I O N S**\n\n**General Overv i e w**\n\nE u ronet Worldwide is a leading provider of secure electronic financial transaction solutions. The Company provides financial payment\n\nm i d d l e w a re, financial network gateways, outsourcing, and consulting services to financial institutions, retailers and mobile operators. The\n\nCompany operates an independent automated teller machine (“ATM”) network of over 2,600 ATMs in Europe and the United States, and\n\nt h rough its software subsidiary, Euronet USA Inc. (form e r l y, Arkansas Systems, Inc.)(“Euronet USA”), offers a suite of integrated software\n\nsolutions for electronic payment and transaction delivery systems. Euronet Worldwide thus offers comprehensive electronic payment solutions\n\nconsisting of ATM network participation, outsourced ATM management solutions and software solutions. Its principal customers are banks and\n\nother companies such as retail outlets that re q u i re transaction processing services. With eleven offices in Europe and three in the United States, the\n\nCompany offers its solutions in more than 60 countries around the world.\n\nE u ronet Worldwide and its subsidiaries operate in two business segments: (1) a segment providing secure processing of financial transactions (the\n\n“Network Services Segment”); and (2) a segment producing application software for the processing of secure electronic financial transaction (the\n\n“ S o f t w a re Solutions Segment”). In addition, the Company’s management divides the Network Services Segment into three sub-segments: “Central\n\nE u ropean Sub-segment” (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), “We s t e rn European Sub-segment”\n\n(including Germ a n y, France and the United Kingdom) and “Other Operations Sub-segment” (including the United States and unallocated\n\np rocessing center costs). These business segments, and their sub-segments, are supported by a corporate service segment, which pro v i d e s\n\ncorporate and other administrative services that are not directly identifiable with the two business segments (the “Corporate Services Segment”).\n\nThe accounting policies of each segment are the same as those described in the summary of significant accounting policies. The Company\n\nevaluates perf o rmance based on profit or loss from operations before income taxes not including nonre c u rring gains and net loss. Prior period\n\nsegment information has been restated to conform to the current period’s presentation. (See Note 19 to the Consolidated Financial Statements -\n\nBusiness segment information.)\n\n**Comparison of Results of Operations for the Years Ended December 31, 2000, 1999 and 1998**\n\n**Revenues** The Company’s total revenues increased to $52.7 million for the year ended December\n\n31, 2000 from $41.5 million for the year ended December 31, 1999 and $11.9 million for the year\n\nended December 31, 1998. The increase in revenues from 1999 to 2000 is primarily due to two\n\nfactors: (1) a $10.4 million increase in Network Services Segment revenues resulting from the\n\ni n c rease in transaction volumes in the Company owned ATMs and an increase in the number of AT M s\n\noperated by the Company during this period; and (2) an increase of $800,000 in Software Solutions\n\nSegment revenues. The increase in revenues from 1998 to 1999 is primarily due to two factors: (1) a\n\n$15.0 million increase in Network Services Segment revenues resulting from the increase in\n\ntransaction volume attributable to an increase in the number of ATMs operated by the Company\n\nduring this period; and (2) the addition of $14.6 million of Software Solutions Segment re v e n u e s .\n\nRevenues for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment\n\nResults of Operations sections below.", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "First Financial Bankshares, Inc. is a financial holding company\n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion\n\nas of December 31, 2002. The corporation has 10 affiliate banks,\n\nwhich provide services from 28 full-service locations in the Central, West\n\nand High Plains regions of Texas. The common stock of First Financial\n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed\n\non The NASDAQ Stock Market <sup>®</sup> under the symbol FFIN.\n\n“Our 10 affiliate banks provide services from 28 full-service locations in the Central, West and High Plains regions of Texas.”\n\n2", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "arn:partition:service:region:account-id:resource-id\n\narn:partition:service:region:account-id:resource-type/resource-id\n\narn:partition:service:region:account-id:resource-type:resource-id\n\n- arn: literally, the string \"arn\"\n\n- partition is one of the three partitions: AWS Regions, AWS China Regions, or AWS GovCloud\n\n(US) Regions\n\n- service is the specific service such as Amazon EC2 or DynamoDB\n\n- region is the AWS region like us-east-1 (North Virginia)\n\n- account-id is the AWS account ID\n\n- resource-id is the unique resource ID. Other forms for resource IDs like resource-type/\n\nresource-id , are used by services like IAM where IAM users have resource-type of user and\n\nresource-id a username like MyUsername,\n\nTry to identify the service, region, and resource for the following example ARNs:\n\narn:aws::dynamodb:us-west-2:123456789012:table/myDynamoDBTable\n\narn:aws::lambda:us-east-2:123456789012:function: *my-function:1*\n\nIf you are interested in learning more, check out a [map of Regions and Availability Zones](https://aws.amazon.com/about-aws/global-infrastructure/regions_az/) , a view of\n\nour [data centers](https://aws.amazon.com/compliance/data-center/data-centers/) , and the complete list of [regional service endpoints](https://docs.aws.amazon.com/general/latest/gr/rande.html#ddb_region) .\n\n### **Security model**\n\nSecurity is a top priority for AWS. Before you start building serverless solutions, you need to know\n\nhow security factors into AWS solutions.\n\nAmazon Web Services has a *shared responsibility model:*\n\nSecurity model", - "page_start": 18, - "page_end": 18, - "source_file": "serverless-core.pdf" - }, - { - "text": "####### **PART I**\n\n####### **ITEM 1. BUSINESS**\n\n####### **Company Overview**\n\nWe are a leading provider of services in the domestic non-hazardous solid waste industry. We provide\n\nnon-hazardous solid waste collection services for commercial, industrial, municipal and residential customers\n\nthrough 140 collection companies in 22 states. We also own or operate 96 transfer stations, 58 solid waste\n\nlandÑlls and 35 recycling facilities.\n\nAs of December 31, 2004, our operations were organized into Ñve regions whose boundaries may change\n\nfrom time to time: Eastern, Central, Southern, Southwestern and Western. Each region is organized into\n\nseveral operating areas and each area contains a group of operating locations. Each of our regions and\n\nsubstantially all our areas provide collection, transfer, recycling and disposal services. We believe that this\n\norganizational structure facilitates the integration of our operations within each region, which is a critical\n\ncomponent of our operating strategy. See Note 10 of the Notes to Consolidated Financial Statements for\n\nfurther discussion of operating segments.\n\nWe had revenue of $2,708.1 million and $2,517.8 million and operating income of $452.3 million and\n\n$412.7 million for the years ended December 31, 2004 and 2003, respectively. The $190.3 million, or 7.6%,\n\nincrease in revenue from 2003 to 2004 is primarily attributable to the successful execution of our operating and\n\ngrowth strategies described below. The $39.6 million, or 9.6%, increase in operating income from 2003 to 2004\n\nis partially due to higher self-insurance expense during 2003 related to existing claims and was attributable to\n\nthe expansion of our operations and various changes in estimates as a result of continued negative trends\n\nthrough the 2003 policy year. The remaining increase in operating income is due to the successful execution of\n\nour operating and growth strategies described below.\n\nOur presence in high growth markets throughout the Sunbelt, including California, Florida, Georgia,\n\nNevada, North Carolina, South Carolina and Texas, and in other domestic markets that have experienced\n\nhigher than average population growth during the past several years, supports our internal growth strategy. We\n\nbelieve that our presence in these markets positions our company to experience growth at rates that are\n\ngenerally higher than the industry's overall growth rate.\n\nWe continue to focus on enhancing stockholder value by implementing our Ñnancial, operating and\n\ngrowth strategies as described below.\n\n####### **Industry Overview**\n\nBased on analysts' reports and industry trade publications, we believe that the United States non-\n\nhazardous solid waste services industry generates annual revenue of approximately $44.0 billion, of which\n\napproximately 50% is generated by publicly-owned waste companies, 21% is generated by privately-held waste\n\ncompanies, and 29% is generated by municipal and other local governmental authorities. Three companies\n\ngenerate the substantial majority of the publicly-owned companies' total revenue. However, according to\n\nindustry data, the domestic non-hazardous waste industry remains highly fragmented as privately-held\n\ncompanies and municipal and other local governmental authorities generate approximately 50% of total\n\nindustry revenue. In general, growth in the solid waste industry is linked to growth in the overall economy,\n\nincluding the level of new household and business formation.\n\nThe solid waste industry experienced a period of rapid consolidation in the late 1990's. During that time\n\nwe were able to grow signiÑcantly through acquisitions. However, acquisitions in the industry have slowed\n\nconsiderably since late 1999. Despite this, we believe that the opportunity to grow through acquisitions still\n\nexists, albeit at a slower pace than experienced in previous years, as a result of the following factors:", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n####### **NOTE 28 - CONTINGENT ASSETS AND LIABILITIES**\n\nAt the date of signing this report, the Group is not aware of any contingent assets or liabilities that should be\n\nrecognised or disclosed in accordance with AASB 137/IFRS 37 - *Provisions, Contingent Liabilities and Contingent*\n\n*Assets.*\n\n####### **NOTE 29 - OPERATING SEGMENTS**\n\nThe Company’s strategic focus is the exploration, development and production of large, repeatable onshore resource\n\nplays in North America, which is the Company’s only major line of business and only major geographic area of\n\noperations. All of the basins and/or formations in which the Company operates have common operational\n\ncharacteristics, challenges and economic characteristics. As such, Management has determined, based upon the\n\nreports reviewed and used to make strategic decisions by the Chief Operating Decision Maker (“CODM”), whom is\n\nthe Company’s Managing Director and Chief Executive Officer, that the Company has one reportable segment being\n\noil and natural gas exploration and production in North America.\n\nThe CODM reviews internal management reports on a monthly basis that are consistent with the information\n\nprovided in the statement of profit or loss and other comprehensive income, statement of financial position and\n\nstatement of cash flows. As a result no reconciliation is required, because the information as presented is used by\n\nthe CODM to make strategic decisions.\n\n####### **Geographic Information**\n\nThe operations of the Group are located in only one geographic location, North America. All revenue is generated\n\nfrom sales to customers located in North America.\n\nRevenue from one major customer exceeded 10 percent of Group consolidated revenue for the year ended 31\n\nDecember 2014 and accounted for 65 percent (2013: four major customers accounted for 47 percent, 15 percent,\n\n10 percent and 10 percent) of our consolidated oil, natural gas and NGL revenues.\n\n- 93 -", - "page_start": 94, - "page_end": 94, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "operations as a percentage of revenue, and consolidate duplicative facilities and functions to maximize\n\ncost eÇciencies and economies of scale.\n\n*Acquire Well-Managed Companies.* We also seek to acquire businesses that have experienced\n\nmanagement teams that are willing to join the management of our company. We generally seek to\n\nmaintain continuity in management of larger acquired companies in order to capitalize on their local\n\n6", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "The subsidiaries of Euronet Services Inc., all of which are, directly or indire c t l y, wholly owned are:\n\n- EFT Services Holding B.V., incorporated in the Netherlands\n\n- Euronet Banktechnikai Szolgaltato Kft. (“Bank Tech”), incorporated in Hungary\n\n- Euronet Adminisztracios Szolgaltato Kft. (“Administrative Services”) (formerly SatComNet), incorporated in Hungary\n\n- Bankomat 24/Euronet Sp. z o.o. (“Bankomat”), incorporated in Poland\n\n- EFT-Usluge d o.o., incorporated in Croatia\n\n- Euronet Services GmbH, incorporated in Germany\n\n- EFT Services France SAS, incorporated in France\n\n- Euronet Services spol. s.r.o., incorporated in the Czech Republic\n\n- Euronet Services SRL, incorporated in Romania\n\n- Euronet Services (UK) Limited, incorporated in the United Kingdom\n\n- Euronet USA Inc. (formerly Arkansas Systems, Inc.) (“Euronet USA”) incorporated in Arkansas, United States of America\n\n- EFT Network Services LLC (“Dash”), incorporated in Arkansas, United States of America\n\n- Euronet Holding N.V., incorporated in the Netherlands Antilles (in liquidation)\n\n- Euronet Eft Services Hellas, incorporated in Greece\n\n**( 2 ) Financial Position and Basis of Preparation**\n\nThe Company generated an operating loss of $35.4 million and negative cash flows from operations of $16.4 million for the year ended\n\nDecember 31, 2000, primarily due to the significant costs associated with its investment in delivery, support, re s e a rch and development in its\n\ns o f t w a re subsidiary which was acquired in December 1998. Based on the Company’s current business plan and financial projections, the\n\nCompany expects to reduce operating losses and net cash used in operating activities in 2001. In the Network Services Segment, the\n\nCompany anticipates that increased transaction levels in its ATM network will result in additional revenues without a corresponding incre a s e\n\nin expenses. In addition, the Company expects to further expand its ATM outsourcing services and offer new value-added services, which will\n\np rovide continued revenue growth without significantly increasing direct operating expenses or capital investments. In the Software Solutions\n\nSegment, the Company expects reduced operating expenses and improved operating perf o rmance due to a cost re s t ructuring pro g r a m\n\ni n t roduced in the first quarter of 2001. The Company believes that the credit facility (see note 13), certain asset sales and cash and cash\n\nequivalents at December 31, 2000 will provide the Company with sufficient cash re s o u rces until it achieves positive cash flow.\n\nBased on the above, management is confident that the Company will be able to continue as a going concern. Accord i n g l y, these consolidated\n\nfinancial statements have been pre p a red on a going concern basis which contemplates the continuation and expansion of trading activities as\n\nwell as the realization of assets and liquidation of liabilities in the ord i n a ry course of business.\n\n**( 3 ) S u m m a ry of Significant Accounting Policies and Practices**\n\n(a) Basis of presentation\n\nThe accompanying consolidated financial statements have been pre p a red in accordance with generally accepted accounting principles in\n\nthe United States of America.\n\nAll significant intercompany balances and transactions have been eliminated.\n\n(b) Foreign currencies\n\nF o reign currency transactions are re c o rded at the exchange rate prevailing on the date of the transactions. Assets and\n\nliabilitiesdenominated in foreign currencies are re m e a s u red at rates of exchange on the balance sheet date. Resulting gains and losses on\n\nf o reign currency transactions are included in the consolidated statement of operations and comprehensive loss.\n\nThe financial statements of foreign subsidiaries where the local currency is the functional currency are translated to U.S. dollars using", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_EEFT_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_MGM_2004.pdf", - "query": "What was one of the seminal moment of 2004 for MGM MIRAGE ?", - "target_page": 12, - "target_passage": "The announcement of the merger between MGM MIRAGE and Mandalay Resort Group was one of the seminal moments of 2004", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "defining momentum MGM MIRAGE 2004 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "The announcement of\n\nthe merger between\n\nMGM MIRAGE and\n\nMandalay Resort Group\n\nwas one of the seminal\n\nmoments of 2004.\n\nU S I N G O U R S T R E N G T H...", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Recently, we opened the SKYLOFTS, a new level of luxury\n\nfor guests atop MGM Grand Las Vegas.\n\nWe’ll follow the success of these new resort features\n\nwith a category-defining new nightclub at The Mirage, two\n\nfabulous restaurants by Joël Robuchon at MGM Grand Las\n\nVegas and gaming upgrades company-wide. Second, we are\n\ndoubling down on Las Vegas by merging with Mandalay,\n\na company we have long admired. The Mandalay merger\n\nrepresents a tremendous opportunity to build on the mo-\n\nmentum established by Mike Ensign and his team. And\n\nthird, we are dreaming of a not-so-distant future, when\n\nProject CityCenter will literally redefine the Las Vegas Strip\n\nand change the face of Las Vegas forever.\n\nMandalay in Motion\n\nWe are incredibly excited to begin our journey with the\n\ntalented people of Mandalay, as we work to maximize the\n\nvalue of Mandalay’s instantly recognized brands and world-\n\nclass resorts. Long a fixture in Las Vegas, Mandalay’s resorts\n\nwill add to our premium portfolio and allow us to accelerate\n\nthe pace of our growth. Our hotel people will be able to mar-\n\nket a wider range of rooms and benefit from a world-class\n\nconvention center. Our casino marketing people will be able\n\nto offer their customers wonderful new amenities to expand\n\nour market reach. And our development people will be able\n\nto maximize the potential of priceless Las Vegas Strip land.\n\nThe Mandalay merger represents another defining\n\nmoment for MGM MIRAGE, much like the Mirage Resorts\n\ntransaction in 2000, at a time when Las Vegas is in a state of\n\nastounding metamorphosis. No company is better positioned\n\nto help shape the future of Las Vegas than MGM MIRAGE.\n\nWe employ more people, invest more money and hold more\n\nprime real estate than any other company in Las Vegas. The\n\n**AL FACCINTO** President, MGM MIRAGE\n\nInternational Marketing\n\n**ALAN FELDMAN** Senior VP Public Affairs,\n\nMGM MIRAGE\n\n**BRUCE GEBHARDT** Senior VP,\n\nMGM MIRAGE Global Security\n\n**WILLIAM J. HORNBUCKLE** President &\n\nCOO, MGM MIRAGE Europe\n\n**PHYLLIS JAMES** Senior VP & Senior\n\nCounsel, MGM MIRAGE\n\n2 0 0 4 O P E R A T I N G M A R G I N S **C Z R**\n\n**H E T**\n\n**M B G**\n\n25.0%\n\n14.8%\n\n17.4%\n\n21.8%\n\n**M G G** 22.4%\n\n20.0% 15.0% 10.0%\n\n15", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "A C H I E V I N G M O M E N T O U S R E S U LT S\n\no some, momentum is intangible - a product of fortune, a power that cannot be harnessed, and typically\n\na short-lived sensation. Others wonder how they lost their momentum. At MGM MIRAGE, we are con-\n\nstantly thinking of better ways to maximize it. We believe momentum is a product of effort and excellence,\n\na force which can be observed and measured, and something that can be a lasting and defining quality of a great\n\ncompany. Our 2004 results are a clear reminder of the power of moving forward. Our financial policies have long\n\nbeen designed to create and maintain momentum. By investing in our best assets and thinking of new ways to add\n\nvalue to our shareholders, we are able to redefine our Company’s place in history every year - and 2004 was a defin-\n\ning time even by our exacting standards.\n\nSo how did we get here? Last year, we discussed the importance of focus, and the laser-like precision with which\n\nwe operated our resorts in 2004 affirms the power of our single-minded dedication to excellence. The hard work of\n\nour 40,000 employees resulted in a record year in almost every regard. Net revenues increased 10% over 2003 to a\n\nrecord $4.2 billion, with 12% REVPAR growth at our Las Vegas resorts; property-level EBITDA was an all-time\n\nrecord, nearly $1.5 billion, and 23% higher than the prior year. We exceeded the expectations of every market\n\nobserver, and significantly beat our forecasts. And 2004 will not be a zenith year for your company - rather, we\n\nexpect to continue our excellent operating performance, re-invest the resulting cash flow to stimulate future growth\n\nand move forward to new defining moments.\n\nHow do we re-define a company that is already at the top of its industry? First, we continue to execute on our\n\nvision for our existing resorts - to continually evolve and increase the “Wow!” factor for our guests. This strategy\n\nrequires investment, and we will ensure that our resorts are not only world-class, but best-in-class. Examples include\n\nthe beautiful Spa Tower at Bellagio and *KÀ* , the latest spectacular creation in collaboration with Cirque du Soleil.\n\n**GAMAL AZIZ** President, MGM Grand\n\n**JAMES J. MURREN** President, CFO & Treasurer\n\n**GLENN BONNER** Senior VP & CIO,\n\nMGM MIRAGE Information Systems\n\n**GEORGE R. BOYER III** President,\n\nMGM Grand Detroit\n\n**JOSEPH BRUNINI** President,\n\nMGM Grand Resorts National Marketing\n\n**JEFF DAHL** President, Beau Rivage\n\nT\n\n## FINANCIAL OVERVIEW\n\n14", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "E X P A N D I N G W I T H E X C E L L E N C E TO OUR SHAREHOLDERS\n\nThese investments in your company’s future paid\n\ndividends even before the year was out. We established a\n\nnew record for net revenues posting $4.2 billion, a 10%\n\nincrease over 2003.\n\nYour company’s resorts produced record EBITDA of\n\n$1.46 billion, an increase of 23% over 2003, while operating\n\nincome was $951 million, an increase of 36%, with record\n\nresults at Bellagio, MGM Grand Las Vegas and Beau Rivage.\n\nDefining Momentum in the Community\n\nI’ve spent 27 years in this profession and the\n\nincredible generosity of our employees never\n\nceases to amaze me. Shortly after the merger\n\nwith Mirage Resorts in 2000, we established\n\nthe Voice Foundation. This allows employees to\n\nexpress themselves in the communities we serve by\n\nproviding them a mechanism to raise monies for\n\nworthy causes. It’s their money and they decide\n\nwhere it goes. Your company provides the marketing\n\nand administrative support.\n\nIn each year since we established the program,\n\nemployees have given record amounts to support a\n\n**BELLAGIO** underwent a significant expansion during 2004 result-\n\ning in the opening of the Spa Tower and several important new\n\namenities at this AAA Five Diamond property. Bellagio remains\n\nLas Vegas’ first and only hotel-casino to receive this prestigious\n\nrecognition. These new additions add dimension and depth to the\n\nworld-famous experience awaiting guests at Bellagio.\n\n**MGM GRAND LAS VEGAS** completed a transformation, begun\n\nin 2003, of its food and beverage and entertainment offerings.\n\nMGM Grand is one of the must-see attractions of\n\nLas Vegas, with Cirque du Soleil’s newest pro-\n\nduction, *KA* *<sup>`</sup>* <sup>TM</sup> , and several of the Strip’s\n\nfinest restaurants and hottest nightspots.\n\n**TI** ’s transformation was no less extensive,\n\nas the property’s management team\n\nconceived and implemented a program to\n\nenliven the property with new restaurants\n\nand nightlife.\n\n**THE MIRAGE** was the site of a revolution in\n\nLas Vegas’ history as the venerable buffet was given\n\nnew life as a top dining establishment, Cravings.\n\nOthers may follow this lead, but The Mirage was\n\nthe first property to breathe new life into what\n\nremained of the last bastion of “old” Las Vegas.\n\n**47.6%**\n\n**14.9% 18.0%**\n\n**19.5%**\n\n**47.6%**\n\n**14.9% 18.0%**\n\n**19.5%**\n\n2004 Revenue Mix\n\nCasino\n\nRooms\n\nFood & Beverage\n\nEntertainment, Retail,\n\n& Other\n\n**SKYLOFTS** MGM Grand\n\nA private sanctuary of sleek,\n\nelegant two-story accommo-\n\ndations, offering discerning\n\nguests the quintessential loft\n\nenvironment - harmonizing\n\ndesign, décor, ambiance and\n\nunparalleled vistas.\n\n**BELLAGIO SPA** Unique\n\ndesign elements, combined\n\nwith an international array of\n\ninnovative treatments and\n\nspecially trained therapists,\n\nprovide the ultimate indul-\n\ngent experience.\n\n**TEATRO** MGM Grand A new\n\ngenre of Las Vegas nightlife\n\nwhere European club influ-\n\nences permeate. DJs spin jazz/\n\nhouse throughout the evening,\n\ngiving way to an energetic\n\nafter-hours vibe with live cat-\n\nwalk entertainment.\n\n**KÀ** The most spectacular production ever, by a troupe renowned for its\n\npageantry. Cirque du Soleil’s *KÀ* debuted at a new theatre at MGM Grand\n\nin the fourth quarter of 2004.\n\nWhat exactly is a defining\n\nmoment? Try a multi-billion\n\ndollar project centered in the\n\nheart of Las Vegas.\n\n04", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "**CYNTHIA KISER MURPHEY** Senior\n\nVP, MGM MIRAGE Human Resources\n\n**PUNAM MATHUR** Senior VP,\n\nMGM MIRAGE Diversity/Community\n\nRelations\n\n**WILLIAM M C BEATH** President,\n\nThe Mirage\n\n**ROBERT V. MOON** Chairman,\n\nMGM MIRAGE Marketing\n\n**FELIX D. RAPPAPORT** President,\n\nNew York-New York\n\n**SCOTT SIBELLA** President, TI\n\ncombination of Mandalay’s assets with our financial strength\n\nand industry-leading financial discipline will yield significant\n\nreturns for all of our stakeholders.\n\nWe are currently planning the integration of the two\n\ncompanies, and over time, we expect to realize the full poten-\n\ntial of cost and revenue synergies. We will report on our\n\nprogress throughout the coming year.\n\nThe Next Moment - A City is Born\n\nWhat makes a great city? Las Vegas has long been\n\nrecognized as the leisure capital of the world. The resorts in\n\nour valley have been the innovative leaders in the hospitality\n\nindustry and have driven the tremendous growth in visitor\n\nvolume, high occupancy rates and surging food, beverage,\n\nentertainment and gaming volumes. But there is another\n\nLas Vegas - a community of two million residents on its\n\nway to three million by the end of the decade. Las Vegas is\n\nleading the U.S. migration to the Southwest. Our newcom-\n\ners are attracted by the lifestyle, weather, cost of living and\n\neconomic opportunity. Many have come from cities in the\n\nEast, West and Midwest and take elements of established\n\ncommunities for granted, such as medical, educational and\n\ncultural excellence and diversity.\n\nThe people of Las Vegas today have great aspirations and\n\nexpect and demand more of our community. We are a city\n\nwithout a proper city, and that is about to change. Ambitious\n\nplans are underway to revitalize Downtown Las Vegas, centered\n\naround a beautiful performing arts center and an academic\n\nmedical center; UNLV is in the midst of a major capital cam-\n\npaign to enhance the Midtown section of Las Vegas; and your\n\ncompany has embarked on the most comprehensive project to\n\ndate - Project CityCenter, at the heart of the Las Vegas Strip.\n\nThe Las Vegas Strip has no sense of city now - but we\n\nbelieve it can. The future of Las Vegas is centered around our\n\ngreat resorts and our future development. There are many\n\nreasons we believe Project CityCenter is the right project for\n\nour Las Vegas Strip development. We believe there is a social\n\nimperative that Las Vegas mature as a city, not just a con-\n\nglomeration of suburbs. A city deserves a center - a center\n\nfor living, working and playing. We want to be an integral\n\npart in defining the Las Vegas of the future.\n\nAnd there is a business motivation. Companies in the\n\ngaming industry have historically not been valued on par with\n\nother hospitality companies and mixed-use real estate compa-\n\nnies. We plan to break out of the gaming mold, and define a\n\ncompany based on extensive holdings in multiple businesses.\n\nProject CityCenter will include major residential, retail and\n\nentertainment components. We will partner with boutique\n\n(from left to right) **ROBERT C. SELWOOD** Senior Vice President—\n\nAccounting; **JAMES J. MURREN** President, CFO & Treasurer;\n\n**BRYAN L. WRIGHT** Senior Vice President — Assistant General\n\nCounsel & Assistant Secretary; **DANIEL J. D'ARRIGO** Senior Vice\n\nPresident—Finance\n\nNo company is better\n\npositioned to help shape\n\nthe future of Las Vegas\n\nthan MGM MIRAGE.\n\n16", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Management’s Discussion and Analysis of Financial Condition and Results of Operations 21\n\n**Overall Outlook**\n\nWe have invested heavily in our existing operations in 2003 and 2004, and expect\n\nto continue to do so on a targeted basis in 2005. Our Las Vegas Strip resorts require\n\nongoing capital investment to maintain their competitive advantages. We believe\n\nthe investments in additional non-gaming amenities we made in 2003 and 2004\n\nhave enhanced our ability to generate increased visitor volume and allowed us to\n\ncharge premium prices for our amenities.\n\nThe most likely significant factors affecting operating results at our existing resorts\n\nin 2005 will be the expected continued strength of the leisure and convention travel\n\nsegments, the expansion of Bellagio and the opening of *KÀ* and other amenities at\n\nMGM Grand Las Vegas, and new competition from Wynn Las Vegas on the Las\n\nVegas Strip. Various lodging market observers, such as PricewaterhouseCoopers\n\nand Smith Travel Research, are forecasting mid-single digit percentage growth in\n\nREVPAR in 2005, with greater REVPAR gains in full service hotels. Our REVPAR\n\ngrowth, and REVPAR growth in Las Vegas in general, has outpaced that of the\n\nnational market, and we expect that trend to continue.\n\nThe Bellagio expansion opened in late 2004 and added over 30% to the resort’s\n\nroom base. In addition, we added new meeting, retail and dining space and signifi-\n\ncantly expanded the spa and salon. *KÀ* opened in late November 2004 at MGM\n\nGrand Las Vegas, which had been without a featured production show for almost\n\ntwo years. Along with the numerous restaurant and other entertainment additions\n\nat MGM Grand Las Vegas, *KÀ* will enhance our ability to generate visitor traffic\n\nand capture a greater share of our guests’ spending.\n\nWynn Las Vegas will add room capacity to the Las Vegas market, with its 2,700\n\nrooms representing a 2% increase in Las Vegas room supply. Wynn Las Vegas will\n\nalso feature numerous upscale restaurants and generally target customers who might\n\notherwise choose Bellagio, MGM Grand Las Vegas or The Mirage. We believe there\n\nwill be some impact on these resorts from Wynn Las Vegas, but also believe that the\n\nbreadth of amenities in our portfolio of resorts and our loyalty and other marketing\n\nprograms will help minimize these competitive pressures. The proximity of Wynn\n\nLas Vegas to TI and The Mirage, along with pedestrian bridges linking TI with the\n\nFashion Show Mall and Venetian, will also benefit these resorts.\n\n**Mandalay Merger**\n\nOn June 16, 2004, we announced that we had entered into a definitive merger\n\nagreement with Mandalay Resort Group (“Mandalay”), a publicly traded company,\n\nunder which we will acquire Mandalay for $71.00 in cash for each share of\n\ncommon stock of Mandalay. Mandalay owns and operates eleven properties in\n\nNevada, including Mandalay Bay, Luxor, Excalibur, Circus Circus, and Slots-A-Fun\n\nin Las Vegas, Circus Circus-Reno in Reno, Colorado Belle and Edgewater in\n\nLaughlin, Gold Strike and Nevada Landing in Jean, and Railroad Pass in\n\nHenderson. Mandalay also owns and operates Gold Strike, a hotel/casino in Tunica\n\nCounty, Mississippi. In addition, Mandalay owns a 50% interest in Silver Legacy in\n\nReno, a 50% interest in Monte Carlo in Las Vegas, a 50% interest in Grand\n\nVictoria, a riverboat in Elgin, Illinois, and a 53.5% interest in MotorCity in\n\nDetroit, Michigan. The total consideration is approximately $8.1 billion, including\n\nequity value of approximately $4.8 billion, convertible debentures with a redemp-\n\ntion value of approximately $574 million, the assumption or repayment of other\n\noutstanding Mandalay debt with a fair value of approximately $2.6 billion as of\n\nDecember 31, 2004, and $100 million of estimated transaction costs. The transac-\n\ntion is structured as a merger of one of our wholly-owned subsidiaries with and into\n\nMandalay. The transaction will be accounted for as a purchase and is anticipated to", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "## Notes to Consolidated Financial Statements 46\n\n**NOTE 1 — ORGANIZATION**\n\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware\n\ncorporation, incorporated on January 29, 1986. As of December 31, 2004\n\napproximately 58% of the outstanding shares of the Company's common stock\n\nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk\n\nKerkorian. MGM MIRAGE acts largely as a holding company and, through\n\nwholly-owned subsidiaries, owns and/or operates casino resorts.\n\nThe Company owns and operates the following casino resorts on the Las Vegas\n\nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure\n\nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The\n\nCompany owns a 50% interest in the joint venture that owns and operates the\n\nMonte Carlo Resort & Casino, also located on the Las Vegas Strip.\n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state\n\nline - Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort - as well as two\n\nchampionship golf courses located near the resorts. The Company also owns\n\nShadow Creek, an exclusive world-class golf course located approximately ten miles\n\nnorth of its Las Vegas Strip resorts.\n\nThe Company, through its wholly owned subsidiary, MGM Grand Detroit, Inc.,\n\nand its local partners formed MGM Grand Detroit, LLC, to develop a hotel, casino\n\nand entertainment complex in Detroit, Michigan. MGM Grand Detroit, LLC\n\noperates a casino in an interim facility in downtown Detroit. See Note 10 for\n\ndiscussion of the revised development agreement with the City of Detroit and\n\nplans for a permanent casino resort.\n\nThe Company owns and operates Beau Rivage, a beachfront resort located in Biloxi,\n\nMississippi. The Company also owns a 50% interest in a limited liability company\n\nthat owns Borgata, a casino resort at Renaissance Pointe, located in the Marina area\n\nof Atlantic City, New Jersey. Boyd Gaming Corporation owns the other 50% of\n\nBorgata and also operates the resort. Borgata opened in July 2003. The Company\n\nowns approximately 95 developable acres adjacent to Borgata, a portion of which\n\nconsists of common roads, landscaping and master plan improvements which the\n\nCompany designed and developed as required under the agreement with Boyd.\n\nUntil July 2004, the Company owned and operated MGM Grand Australia and\n\nuntil January 2004, the Company owned and operated the Golden Nugget Las\n\nVegas in downtown Las Vegas and the Golden Nugget Laughlin in Laughlin,\n\nNevada (the “Golden Nugget Subsidiaries”). Until June 2003, the Company\n\noperated PLAYMGMMIRAGE.com, the Company’s online gaming website based\n\nin the Isle of Man. See Note 3 for further information regarding these discontinued\n\noperations. In the second quarter of 2002, the Company received proceeds of $11\n\nmillion upon termination of management agreements covering four casinos in the\n\nRepublic of South Africa. Prior to the termination, the Company managed three\n\npermanent casinos and one interim casino and received management fees from its\n\npartner, Tsogo Sun Gaming & Entertainment. The termination fee was recorded as\n\npart of other revenues in the accompanying consolidated statements of income.\n\nThe Company is actively seeking future development opportunities in the United\n\nKingdom. In May 2003, the Company acquired a 25% interest in Metro Casinos\n\nLimited, a United Kingdom gaming company which operates a casino in Bristol.\n\nSee Note 10 for discussion of other potential developments in the United Kingdom.\n\nIn June 2004, the Company entered into a joint venture agreement to develop,\n\nbuild and operate a hotel-casino resort in Macau S.A.R. The agreement is subject\n\nto, among other things, the approval of the government of Macau S.A.R., and other\n\nregulatory approvals, as well as the entry into a subconcession agreement with the\n\nholder of one of the existing concessions.", - "page_start": 55, - "page_end": 55, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "of an item, as well as potential interest associated with those items.\n\nA portion of our tax reserves was assumed in the Mirage Acquisition. The IRS audit\n\nof the tax returns of Mirage through the merger date was settled in August 2003,\n\nresulting in a payment to the IRS of $45 million, including interest. These matters\n\nhad been previously reserved for, so the settlement had no impact on our income\n\ntax provision or our results of operations. Any future adjustments to the acquired\n\nMirage tax reserves will be recorded as an adjustment to goodwill.", - "page_start": 44, - "page_end": 44, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "## Management’s Discussion and Analysis of Financial Condition and Results of Operations 20\n\n**RESULTS OF OPERATIONS**\n\nAt December 31, 2004, our operations consisted of 11 wholly-owned casino resorts\n\nand 50% investments in two other casino resorts, including:\n\n**Las Vegas, Nevada:** Bellagio, MGM Grand Las Vegas, The Mirage, TI, New York-\n\nNew York, Boardwalk, and Monte Carlo (50% owned).\n\n**Other:** The Primm Valley Resorts (Buffalo Bill’s, Primm Valley\n\nResort and Whiskey Pete’s) in Primm, Nevada; Beau Rivage\n\nin Biloxi, Mississippi; MGM Grand Detroit; Borgata (50%\n\nowned) in Atlantic City, New Jersey.\n\nWe operate in one segment, the operation of casino resorts, which includes offering\n\ngaming, hotel, dining, entertainment, retail and other resort amenities. Slightly over\n\nhalf of our net revenues are derived from gaming activities, a lower percentage than\n\nmany of our competitors, as our operating philosophy is to provide a complete\n\nresort experience for our guests, including non-gaming amenities which command\n\npremium prices based on their quality.\n\nWe generate a majority of our net revenues and operating income from our Las\n\nVegas Strip resorts. In 2004, over 75% of our net revenues and operating income\n\nwas generated by wholly-owned Las Vegas Strip resorts. We believe that we own the\n\npremier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to\n\ncontinually reinvest in these resorts to maintain that competitive advantage. Our\n\nconcentration on the Las Vegas Strip exposes us to certain risks outside of our\n\ncontrol, such as competition from other Las Vegas Strip resorts as well as new or\n\nexpanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005,\n\nand the impact from potential expansion of gaming in California. This concentra-\n\ntion also exposes us to risks related to tourism and the general economy, including\n\nnational and global economic conditions and terrorist attacks or other global events.\n\n**Key Performance Indicators**\n\nAs a resort-based company, our operating results are highly dependent on the\n\nvolume of customers at our resorts, which in turn impacts the price we can charge\n\nfor our hotel rooms and other amenities. We also generate a significant portion of\n\nour operating income from the high-end gaming segment, which can cause\n\nvariability in our results. Key performance indicators related to revenue are:\n\n- Gaming revenue indicators - table games drop and slot handle (volume\n\nindicators); “win” or “hold” percentage, which is not fully controllable by us. Our\n\nnormal table games win percentage is in the range of 18% to 22% of table games\n\ndrop and our normal slot win percentage is in the range of 6% to 7% of slot\n\nhandle;\n\n- Hotel revenue indicators - hotel occupancy (volume indicator); average daily rate\n\n(“ADR”, price indicator); revenue per available room (“REVPAR”), a summary\n\nmeasure of hotel results, combining ADR and occupancy rate.\n\nMost of our revenue is essentially cash-based, through customers wagering with cash\n\nor paying for non-gaming services with cash or credit cards. Our resorts, like many\n\nin the industry, generate significant operating cash flow. Our industry is capital\n\nintensive and we rely heavily on the ability of our resorts to generate\n\noperating cash flow to repay debt financing, fund maintenance capital\n\nexpenditures and provide excess cash for future development.\n\nOur results of operations do not tend to be seasonal in nature, though a variety of\n\nfactors can affect the results of any interim period, including the timing of major\n\nLas Vegas conventions, the amount and timing of marketing and special events for\n\nour high-end customers, and the level of play during major holidays, including New\n\nYear and Chinese New Year.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_MGM_2004.pdf", - "query": " What are the most significant piece of undeveloped land remaining on the Las Vegas Strip ?", - "target_page": 21, - "target_passage": "W RESIDENTIAL In lofts, brown stones and high-rise buildings, residential options abound to populate the new city and ener gize the surrounding areas. e have been working for some time on con ceiving the best use of the 66 acres between Monte Carlo and Bellagio, the most significant piece of undeveloped land remaining on the Las Vegas Strip.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Management’s Discussion and Analysis of Financial Condition and Results of Operations 21\n\n**Overall Outlook**\n\nWe have invested heavily in our existing operations in 2003 and 2004, and expect\n\nto continue to do so on a targeted basis in 2005. Our Las Vegas Strip resorts require\n\nongoing capital investment to maintain their competitive advantages. We believe\n\nthe investments in additional non-gaming amenities we made in 2003 and 2004\n\nhave enhanced our ability to generate increased visitor volume and allowed us to\n\ncharge premium prices for our amenities.\n\nThe most likely significant factors affecting operating results at our existing resorts\n\nin 2005 will be the expected continued strength of the leisure and convention travel\n\nsegments, the expansion of Bellagio and the opening of *KÀ* and other amenities at\n\nMGM Grand Las Vegas, and new competition from Wynn Las Vegas on the Las\n\nVegas Strip. Various lodging market observers, such as PricewaterhouseCoopers\n\nand Smith Travel Research, are forecasting mid-single digit percentage growth in\n\nREVPAR in 2005, with greater REVPAR gains in full service hotels. Our REVPAR\n\ngrowth, and REVPAR growth in Las Vegas in general, has outpaced that of the\n\nnational market, and we expect that trend to continue.\n\nThe Bellagio expansion opened in late 2004 and added over 30% to the resort’s\n\nroom base. In addition, we added new meeting, retail and dining space and signifi-\n\ncantly expanded the spa and salon. *KÀ* opened in late November 2004 at MGM\n\nGrand Las Vegas, which had been without a featured production show for almost\n\ntwo years. Along with the numerous restaurant and other entertainment additions\n\nat MGM Grand Las Vegas, *KÀ* will enhance our ability to generate visitor traffic\n\nand capture a greater share of our guests’ spending.\n\nWynn Las Vegas will add room capacity to the Las Vegas market, with its 2,700\n\nrooms representing a 2% increase in Las Vegas room supply. Wynn Las Vegas will\n\nalso feature numerous upscale restaurants and generally target customers who might\n\notherwise choose Bellagio, MGM Grand Las Vegas or The Mirage. We believe there\n\nwill be some impact on these resorts from Wynn Las Vegas, but also believe that the\n\nbreadth of amenities in our portfolio of resorts and our loyalty and other marketing\n\nprograms will help minimize these competitive pressures. The proximity of Wynn\n\nLas Vegas to TI and The Mirage, along with pedestrian bridges linking TI with the\n\nFashion Show Mall and Venetian, will also benefit these resorts.\n\n**Mandalay Merger**\n\nOn June 16, 2004, we announced that we had entered into a definitive merger\n\nagreement with Mandalay Resort Group (“Mandalay”), a publicly traded company,\n\nunder which we will acquire Mandalay for $71.00 in cash for each share of\n\ncommon stock of Mandalay. Mandalay owns and operates eleven properties in\n\nNevada, including Mandalay Bay, Luxor, Excalibur, Circus Circus, and Slots-A-Fun\n\nin Las Vegas, Circus Circus-Reno in Reno, Colorado Belle and Edgewater in\n\nLaughlin, Gold Strike and Nevada Landing in Jean, and Railroad Pass in\n\nHenderson. Mandalay also owns and operates Gold Strike, a hotel/casino in Tunica\n\nCounty, Mississippi. In addition, Mandalay owns a 50% interest in Silver Legacy in\n\nReno, a 50% interest in Monte Carlo in Las Vegas, a 50% interest in Grand\n\nVictoria, a riverboat in Elgin, Illinois, and a 53.5% interest in MotorCity in\n\nDetroit, Michigan. The total consideration is approximately $8.1 billion, including\n\nequity value of approximately $4.8 billion, convertible debentures with a redemp-\n\ntion value of approximately $574 million, the assumption or repayment of other\n\noutstanding Mandalay debt with a fair value of approximately $2.6 billion as of\n\nDecember 31, 2004, and $100 million of estimated transaction costs. The transac-\n\ntion is structured as a merger of one of our wholly-owned subsidiaries with and into\n\nMandalay. The transaction will be accounted for as a purchase and is anticipated to", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "**CYNTHIA KISER MURPHEY** Senior\n\nVP, MGM MIRAGE Human Resources\n\n**PUNAM MATHUR** Senior VP,\n\nMGM MIRAGE Diversity/Community\n\nRelations\n\n**WILLIAM M C BEATH** President,\n\nThe Mirage\n\n**ROBERT V. MOON** Chairman,\n\nMGM MIRAGE Marketing\n\n**FELIX D. RAPPAPORT** President,\n\nNew York-New York\n\n**SCOTT SIBELLA** President, TI\n\ncombination of Mandalay’s assets with our financial strength\n\nand industry-leading financial discipline will yield significant\n\nreturns for all of our stakeholders.\n\nWe are currently planning the integration of the two\n\ncompanies, and over time, we expect to realize the full poten-\n\ntial of cost and revenue synergies. We will report on our\n\nprogress throughout the coming year.\n\nThe Next Moment - A City is Born\n\nWhat makes a great city? Las Vegas has long been\n\nrecognized as the leisure capital of the world. The resorts in\n\nour valley have been the innovative leaders in the hospitality\n\nindustry and have driven the tremendous growth in visitor\n\nvolume, high occupancy rates and surging food, beverage,\n\nentertainment and gaming volumes. But there is another\n\nLas Vegas - a community of two million residents on its\n\nway to three million by the end of the decade. Las Vegas is\n\nleading the U.S. migration to the Southwest. Our newcom-\n\ners are attracted by the lifestyle, weather, cost of living and\n\neconomic opportunity. Many have come from cities in the\n\nEast, West and Midwest and take elements of established\n\ncommunities for granted, such as medical, educational and\n\ncultural excellence and diversity.\n\nThe people of Las Vegas today have great aspirations and\n\nexpect and demand more of our community. We are a city\n\nwithout a proper city, and that is about to change. Ambitious\n\nplans are underway to revitalize Downtown Las Vegas, centered\n\naround a beautiful performing arts center and an academic\n\nmedical center; UNLV is in the midst of a major capital cam-\n\npaign to enhance the Midtown section of Las Vegas; and your\n\ncompany has embarked on the most comprehensive project to\n\ndate - Project CityCenter, at the heart of the Las Vegas Strip.\n\nThe Las Vegas Strip has no sense of city now - but we\n\nbelieve it can. The future of Las Vegas is centered around our\n\ngreat resorts and our future development. There are many\n\nreasons we believe Project CityCenter is the right project for\n\nour Las Vegas Strip development. We believe there is a social\n\nimperative that Las Vegas mature as a city, not just a con-\n\nglomeration of suburbs. A city deserves a center - a center\n\nfor living, working and playing. We want to be an integral\n\npart in defining the Las Vegas of the future.\n\nAnd there is a business motivation. Companies in the\n\ngaming industry have historically not been valued on par with\n\nother hospitality companies and mixed-use real estate compa-\n\nnies. We plan to break out of the gaming mold, and define a\n\ncompany based on extensive holdings in multiple businesses.\n\nProject CityCenter will include major residential, retail and\n\nentertainment components. We will partner with boutique\n\n(from left to right) **ROBERT C. SELWOOD** Senior Vice President—\n\nAccounting; **JAMES J. MURREN** President, CFO & Treasurer;\n\n**BRYAN L. WRIGHT** Senior Vice President — Assistant General\n\nCounsel & Assistant Secretary; **DANIEL J. D'ARRIGO** Senior Vice\n\nPresident—Finance\n\nNo company is better\n\npositioned to help shape\n\nthe future of Las Vegas\n\nthan MGM MIRAGE.\n\n16", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "## Management’s Discussion and Analysis of Financial Condition and Results of Operations 20\n\n**RESULTS OF OPERATIONS**\n\nAt December 31, 2004, our operations consisted of 11 wholly-owned casino resorts\n\nand 50% investments in two other casino resorts, including:\n\n**Las Vegas, Nevada:** Bellagio, MGM Grand Las Vegas, The Mirage, TI, New York-\n\nNew York, Boardwalk, and Monte Carlo (50% owned).\n\n**Other:** The Primm Valley Resorts (Buffalo Bill’s, Primm Valley\n\nResort and Whiskey Pete’s) in Primm, Nevada; Beau Rivage\n\nin Biloxi, Mississippi; MGM Grand Detroit; Borgata (50%\n\nowned) in Atlantic City, New Jersey.\n\nWe operate in one segment, the operation of casino resorts, which includes offering\n\ngaming, hotel, dining, entertainment, retail and other resort amenities. Slightly over\n\nhalf of our net revenues are derived from gaming activities, a lower percentage than\n\nmany of our competitors, as our operating philosophy is to provide a complete\n\nresort experience for our guests, including non-gaming amenities which command\n\npremium prices based on their quality.\n\nWe generate a majority of our net revenues and operating income from our Las\n\nVegas Strip resorts. In 2004, over 75% of our net revenues and operating income\n\nwas generated by wholly-owned Las Vegas Strip resorts. We believe that we own the\n\npremier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to\n\ncontinually reinvest in these resorts to maintain that competitive advantage. Our\n\nconcentration on the Las Vegas Strip exposes us to certain risks outside of our\n\ncontrol, such as competition from other Las Vegas Strip resorts as well as new or\n\nexpanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005,\n\nand the impact from potential expansion of gaming in California. This concentra-\n\ntion also exposes us to risks related to tourism and the general economy, including\n\nnational and global economic conditions and terrorist attacks or other global events.\n\n**Key Performance Indicators**\n\nAs a resort-based company, our operating results are highly dependent on the\n\nvolume of customers at our resorts, which in turn impacts the price we can charge\n\nfor our hotel rooms and other amenities. We also generate a significant portion of\n\nour operating income from the high-end gaming segment, which can cause\n\nvariability in our results. Key performance indicators related to revenue are:\n\n- Gaming revenue indicators - table games drop and slot handle (volume\n\nindicators); “win” or “hold” percentage, which is not fully controllable by us. Our\n\nnormal table games win percentage is in the range of 18% to 22% of table games\n\ndrop and our normal slot win percentage is in the range of 6% to 7% of slot\n\nhandle;\n\n- Hotel revenue indicators - hotel occupancy (volume indicator); average daily rate\n\n(“ADR”, price indicator); revenue per available room (“REVPAR”), a summary\n\nmeasure of hotel results, combining ADR and occupancy rate.\n\nMost of our revenue is essentially cash-based, through customers wagering with cash\n\nor paying for non-gaming services with cash or credit cards. Our resorts, like many\n\nin the industry, generate significant operating cash flow. Our industry is capital\n\nintensive and we rely heavily on the ability of our resorts to generate\n\noperating cash flow to repay debt financing, fund maintenance capital\n\nexpenditures and provide excess cash for future development.\n\nOur results of operations do not tend to be seasonal in nature, though a variety of\n\nfactors can affect the results of any interim period, including the timing of major\n\nLas Vegas conventions, the amount and timing of marketing and special events for\n\nour high-end customers, and the level of play during major holidays, including New\n\nYear and Chinese New Year.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Recently, we opened the SKYLOFTS, a new level of luxury\n\nfor guests atop MGM Grand Las Vegas.\n\nWe’ll follow the success of these new resort features\n\nwith a category-defining new nightclub at The Mirage, two\n\nfabulous restaurants by Joël Robuchon at MGM Grand Las\n\nVegas and gaming upgrades company-wide. Second, we are\n\ndoubling down on Las Vegas by merging with Mandalay,\n\na company we have long admired. The Mandalay merger\n\nrepresents a tremendous opportunity to build on the mo-\n\nmentum established by Mike Ensign and his team. And\n\nthird, we are dreaming of a not-so-distant future, when\n\nProject CityCenter will literally redefine the Las Vegas Strip\n\nand change the face of Las Vegas forever.\n\nMandalay in Motion\n\nWe are incredibly excited to begin our journey with the\n\ntalented people of Mandalay, as we work to maximize the\n\nvalue of Mandalay’s instantly recognized brands and world-\n\nclass resorts. Long a fixture in Las Vegas, Mandalay’s resorts\n\nwill add to our premium portfolio and allow us to accelerate\n\nthe pace of our growth. Our hotel people will be able to mar-\n\nket a wider range of rooms and benefit from a world-class\n\nconvention center. Our casino marketing people will be able\n\nto offer their customers wonderful new amenities to expand\n\nour market reach. And our development people will be able\n\nto maximize the potential of priceless Las Vegas Strip land.\n\nThe Mandalay merger represents another defining\n\nmoment for MGM MIRAGE, much like the Mirage Resorts\n\ntransaction in 2000, at a time when Las Vegas is in a state of\n\nastounding metamorphosis. No company is better positioned\n\nto help shape the future of Las Vegas than MGM MIRAGE.\n\nWe employ more people, invest more money and hold more\n\nprime real estate than any other company in Las Vegas. The\n\n**AL FACCINTO** President, MGM MIRAGE\n\nInternational Marketing\n\n**ALAN FELDMAN** Senior VP Public Affairs,\n\nMGM MIRAGE\n\n**BRUCE GEBHARDT** Senior VP,\n\nMGM MIRAGE Global Security\n\n**WILLIAM J. HORNBUCKLE** President &\n\nCOO, MGM MIRAGE Europe\n\n**PHYLLIS JAMES** Senior VP & Senior\n\nCounsel, MGM MIRAGE\n\n2 0 0 4 O P E R A T I N G M A R G I N S **C Z R**\n\n**H E T**\n\n**M B G**\n\n25.0%\n\n14.8%\n\n17.4%\n\n21.8%\n\n**M G G** 22.4%\n\n20.0% 15.0% 10.0%\n\n15", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "## Notes to Consolidated Financial Statements 46\n\n**NOTE 1 — ORGANIZATION**\n\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware\n\ncorporation, incorporated on January 29, 1986. As of December 31, 2004\n\napproximately 58% of the outstanding shares of the Company's common stock\n\nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk\n\nKerkorian. MGM MIRAGE acts largely as a holding company and, through\n\nwholly-owned subsidiaries, owns and/or operates casino resorts.\n\nThe Company owns and operates the following casino resorts on the Las Vegas\n\nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure\n\nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The\n\nCompany owns a 50% interest in the joint venture that owns and operates the\n\nMonte Carlo Resort & Casino, also located on the Las Vegas Strip.\n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state\n\nline - Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort - as well as two\n\nchampionship golf courses located near the resorts. The Company also owns\n\nShadow Creek, an exclusive world-class golf course located approximately ten miles\n\nnorth of its Las Vegas Strip resorts.\n\nThe Company, through its wholly owned subsidiary, MGM Grand Detroit, Inc.,\n\nand its local partners formed MGM Grand Detroit, LLC, to develop a hotel, casino\n\nand entertainment complex in Detroit, Michigan. MGM Grand Detroit, LLC\n\noperates a casino in an interim facility in downtown Detroit. See Note 10 for\n\ndiscussion of the revised development agreement with the City of Detroit and\n\nplans for a permanent casino resort.\n\nThe Company owns and operates Beau Rivage, a beachfront resort located in Biloxi,\n\nMississippi. The Company also owns a 50% interest in a limited liability company\n\nthat owns Borgata, a casino resort at Renaissance Pointe, located in the Marina area\n\nof Atlantic City, New Jersey. Boyd Gaming Corporation owns the other 50% of\n\nBorgata and also operates the resort. Borgata opened in July 2003. The Company\n\nowns approximately 95 developable acres adjacent to Borgata, a portion of which\n\nconsists of common roads, landscaping and master plan improvements which the\n\nCompany designed and developed as required under the agreement with Boyd.\n\nUntil July 2004, the Company owned and operated MGM Grand Australia and\n\nuntil January 2004, the Company owned and operated the Golden Nugget Las\n\nVegas in downtown Las Vegas and the Golden Nugget Laughlin in Laughlin,\n\nNevada (the “Golden Nugget Subsidiaries”). Until June 2003, the Company\n\noperated PLAYMGMMIRAGE.com, the Company’s online gaming website based\n\nin the Isle of Man. See Note 3 for further information regarding these discontinued\n\noperations. In the second quarter of 2002, the Company received proceeds of $11\n\nmillion upon termination of management agreements covering four casinos in the\n\nRepublic of South Africa. Prior to the termination, the Company managed three\n\npermanent casinos and one interim casino and received management fees from its\n\npartner, Tsogo Sun Gaming & Entertainment. The termination fee was recorded as\n\npart of other revenues in the accompanying consolidated statements of income.\n\nThe Company is actively seeking future development opportunities in the United\n\nKingdom. In May 2003, the Company acquired a 25% interest in Metro Casinos\n\nLimited, a United Kingdom gaming company which operates a casino in Bristol.\n\nSee Note 10 for discussion of other potential developments in the United Kingdom.\n\nIn June 2004, the Company entered into a joint venture agreement to develop,\n\nbuild and operate a hotel-casino resort in Macau S.A.R. The agreement is subject\n\nto, among other things, the approval of the government of Macau S.A.R., and other\n\nregulatory approvals, as well as the entry into a subconcession agreement with the\n\nholder of one of the existing concessions.", - "page_start": 55, - "page_end": 55, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "E X P A N D I N G W I T H E X C E L L E N C E TO OUR SHAREHOLDERS\n\nThese investments in your company’s future paid\n\ndividends even before the year was out. We established a\n\nnew record for net revenues posting $4.2 billion, a 10%\n\nincrease over 2003.\n\nYour company’s resorts produced record EBITDA of\n\n$1.46 billion, an increase of 23% over 2003, while operating\n\nincome was $951 million, an increase of 36%, with record\n\nresults at Bellagio, MGM Grand Las Vegas and Beau Rivage.\n\nDefining Momentum in the Community\n\nI’ve spent 27 years in this profession and the\n\nincredible generosity of our employees never\n\nceases to amaze me. Shortly after the merger\n\nwith Mirage Resorts in 2000, we established\n\nthe Voice Foundation. This allows employees to\n\nexpress themselves in the communities we serve by\n\nproviding them a mechanism to raise monies for\n\nworthy causes. It’s their money and they decide\n\nwhere it goes. Your company provides the marketing\n\nand administrative support.\n\nIn each year since we established the program,\n\nemployees have given record amounts to support a\n\n**BELLAGIO** underwent a significant expansion during 2004 result-\n\ning in the opening of the Spa Tower and several important new\n\namenities at this AAA Five Diamond property. Bellagio remains\n\nLas Vegas’ first and only hotel-casino to receive this prestigious\n\nrecognition. These new additions add dimension and depth to the\n\nworld-famous experience awaiting guests at Bellagio.\n\n**MGM GRAND LAS VEGAS** completed a transformation, begun\n\nin 2003, of its food and beverage and entertainment offerings.\n\nMGM Grand is one of the must-see attractions of\n\nLas Vegas, with Cirque du Soleil’s newest pro-\n\nduction, *KA* *<sup>`</sup>* <sup>TM</sup> , and several of the Strip’s\n\nfinest restaurants and hottest nightspots.\n\n**TI** ’s transformation was no less extensive,\n\nas the property’s management team\n\nconceived and implemented a program to\n\nenliven the property with new restaurants\n\nand nightlife.\n\n**THE MIRAGE** was the site of a revolution in\n\nLas Vegas’ history as the venerable buffet was given\n\nnew life as a top dining establishment, Cravings.\n\nOthers may follow this lead, but The Mirage was\n\nthe first property to breathe new life into what\n\nremained of the last bastion of “old” Las Vegas.\n\n**47.6%**\n\n**14.9% 18.0%**\n\n**19.5%**\n\n**47.6%**\n\n**14.9% 18.0%**\n\n**19.5%**\n\n2004 Revenue Mix\n\nCasino\n\nRooms\n\nFood & Beverage\n\nEntertainment, Retail,\n\n& Other\n\n**SKYLOFTS** MGM Grand\n\nA private sanctuary of sleek,\n\nelegant two-story accommo-\n\ndations, offering discerning\n\nguests the quintessential loft\n\nenvironment - harmonizing\n\ndesign, décor, ambiance and\n\nunparalleled vistas.\n\n**BELLAGIO SPA** Unique\n\ndesign elements, combined\n\nwith an international array of\n\ninnovative treatments and\n\nspecially trained therapists,\n\nprovide the ultimate indul-\n\ngent experience.\n\n**TEATRO** MGM Grand A new\n\ngenre of Las Vegas nightlife\n\nwhere European club influ-\n\nences permeate. DJs spin jazz/\n\nhouse throughout the evening,\n\ngiving way to an energetic\n\nafter-hours vibe with live cat-\n\nwalk entertainment.\n\n**KÀ** The most spectacular production ever, by a troupe renowned for its\n\npageantry. Cirque du Soleil’s *KÀ* debuted at a new theatre at MGM Grand\n\nin the fourth quarter of 2004.\n\nWhat exactly is a defining\n\nmoment? Try a multi-billion\n\ndollar project centered in the\n\nheart of Las Vegas.\n\n04", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "M G M M I R A G E D E F I N E S M O M E N T U M\n\n**BELLAGIO SPA TOWER**\n\nThe quintessential luxury\n\nhotel is now even more\n\nopulent. This expansion\n\nincludes 928 rooms and\n\nsuites, 80,000 square feet\n\nof convention space, retail\n\noutlets, and restaurants.\n\n## TO OUR SHAREHOLDERS\n\nrom its roots some 35 years ago with the opening\n\nof the International Hotel, we have played a\n\nleading role in continuously redefining the Las\n\nVegas experience.\n\nWe announced two significant initiatives in 2004 that,\n\ntaken together, give your company unrivaled momentum\n\nto set industry standards for creativity, performance and\n\nresponsibility for decades to come.\n\nDefining Momentum for Las Vegas\n\nOur merger agreement with Mandalay Resort Group\n\nand our plans to develop Project CityCenter on the Las\n\nVegas Strip are among the most significant announcements\n\nin Las Vegas history. As this fabled city begins its second\n\nhundred years, MGM MIRAGE is positioned like no other\n\ncompany to take advantage of unsurpassed growth oppor-\n\ntunities in the most dynamic gaming and entertainment\n\nmarket in the world.\n\nProject CityCenter will uniquely re-position Las Vegas\n\nlike no other project before it. Far more than simply\n\nanother casino-hotel, Project CityCenter encompasses a\n\nmyriad of elements that will propel Las Vegas into a new\n\ngeneration of urban sophistication.\n\nWhile additional details of this extraordinary develop-\n\nment will come in the months ahead, I am pleased to tell\n\nyou that we have secured the services of the internationally\n\nacclaimed architect Cesar Pelli to design our anchor resort\n\nat the heart of Project CityCenter.\n\nCesar Pelli & Associates has worked with corporate,\n\ngovernment and private clients to design major public\n\nspaces, museums, airports, research centers, performing arts\n\ncenters, academic buildings, hotels, office and residential\n\ntowers and mixed-use projects.\n\nThe work of Cesar Pelli is not constrained by a personal\n\nstyle or a signature that would limit his architecture; instead,\n\nit celebrates the unique characteristics of each project. Using\n\nthis approach, he has designed several exceptional buildings\n\nin the United States and abroad.\n\nWe are very excited about our partnership with Mr.\n\nPelli and his colleagues and believe they will deliver for\n\nMGM MIRAGE and the residents of Southern Nevada\n\na building of iconic stature around the world.\n\nF\n\n“Your company has undergone several defining moments throughout its history.”\n\n**J. TERRENCE LANNI** Chairman & Chief Executive Officer\n\n**SHIBUYA** MGM GRAND\n\nDesigned by superstar team\n\nYabu Pushelberg, Shibuya\n\nfeatures stellar sushi and the\n\nwidest sake selection this\n\nside of the Pacific, all served\n\nin a sleek, airy ambiance.\n\n**CRAVINGS** THE MIRAGE\n\nThe zenith of all-you-can-eat.\n\nDesigned by Adam Tihany, Cravings\n\nboasts 11 cooking stations, a\n\nstreet of unique restaurants,\n\nand an array of temptations in\n\nwhat’s unquestionably the ultimate\n\nbuffet dining experience.\n\n02", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Management’s Discussion and Analysis of Financial Condition and Results of Operations 24\n\nSlot revenues increased substantially in both 2003 and 2004. Improvements were\n\nthe result of strong customer visitation, enhanced marketing programs, the impact\n\nof our Players Club rewards program, and the implementation of cashless gaming\n\ntechnology in 2003. Slot win percentages were consistent among all three periods.\n\nNon-casino revenue increased in 2004 primarily due to the enhanced amenities at\n\nour resorts. In addition, we were able to increase the pricing for our rooms and\n\nother non-gaming amenities. Our hotel results began to improve notably in the\n\nlatter half of 2003, particularly at our Las Vegas Strip resorts. For the year ended\n\nDecember 31, 2004 REVPAR at our Las Vegas Strip resorts was $141 compared to\n\n$126 in 2003, an increase of 12%. Company-wide REVPAR was $121, an increase\n\nof 10% over 2003. This increase was largely rate driven, as occupancy increased\n\nfrom 91% to 92% and ADR increased from $121 to $132. In 2003, company-wide\n\nREVPAR increased 6% from $104 to $110, with most of the gains coming in the\n\nsecond half of the year.\n\n**Operating Results - Details of Certain Charges**\n\nPre-opening and start-up expenses consisted of the following:\n\nYear Ended December 31 (In thousands)\n\nBellagio expansion . . . . . . . . . . . . . . . . . . . . . . . . . **$ 3,805** $ — $ —\n\n*KÀ* . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **3,655** — —\n\nBorgata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **—** 19,326 7,757\n\nNew York-New York ( *Zumanity,* Nine Fine Irishmen) **—** 4,310 —\n\nPlayers Club . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **—** 3,051 5,117\n\nOther . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **2,816** 2,579 1,267\n\n**$ 10,276** $ 29,266 $ 14,141\n\nPre-opening and start-up expenses related to Borgata represent our share of the\n\noperating results of Borgata prior to its July 2003 opening.\n\nRestructuring costs (credit) consisted of the following:\n\nYear Ended December 31 (In thousands)\n\nContract termination costs . . . . . . . . . . . . . . . . . . . . **$ 3,693** $ 4,049 $ 3,257\n\nReversal of certain September 11 charges . . . . . . . . **—** — (10,421)\n\n*Siegfried & Roy* show closure - The Mirage . . . . . . . **—** 1,623 —\n\nReversal of 2000 contract termination costs . . . . . . **—** — (9,857)\n\nOther . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **1,932** 925 —\n\n**$ 5,625** $ 6,597 $ (17,021)\n\nIn 2004, restructuring costs include $3 million for contract termination costs\n\nrelated to the Aqua restaurant at Bellagio and $2 million of workforce reduction\n\ncosts at MGM Grand Detroit as a result of our efforts to minimize the impact of a\n\ngaming tax increase in Michigan.\n\nIn 2003, our primary restructuring activities included closing two marketing offices\n\nand terminating the related leases, terminating a lease agreement with a restaurant\n\ntenant at MGM Grand Las Vegas, and closing the Siegfried & Roy show, which\n\nresulted in a charge for employee severance costs.\n\nIn December 2002, we recorded a restructuring credit of $10 million related to a\n\nlease contract termination accrual originally recorded in June 2000 as we deter-\n\nmined that payment under this obligation was not probable. We recorded\n\n$3 million of restructuring charges in December 2002 related to contract termina-\n\ntion costs for a restaurant lease and the EFX! show at MGM Grand Las Vegas. In\n\n2001, management responded to a decline in business volumes caused by the\n\nSeptember 11 attacks by implementing cost containment strategies which included\n\na significant reduction in payroll and a refocusing of several of our marketing\n\nprograms. This resulted in a $22 million charge against earnings. As a result of\n\nimproving business levels and our success at re-hiring a substantial number of", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements 65\n\n**NOTE 14 — PROPERTY TRANSACTIONS, NET**\n\nProperty transactions, net consisted of the following:\n\nYear Ended December 31 (In thousands)\n\nGain on sale of North Las Vegas land . . . . . . . . . . . . . $ **—** $ (36,776) $ —\n\nSiegfried & Roy theatre write-down - The Mirage . . . . **—** 1,408 —\n\nStorm damage - Beau Rivage . . . . . . . . . . . . . . . . . . **—** — 7,824\n\nWrite-off of Detroit development costs. . . . . . . . . . . . . **—** — 4,754\n\nImpairment of assets to be disposed of. . . . . . . . . . . . **473** 5,764 2,134\n\nDemolition costs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . **7,057** 6,614 —\n\nOther net losses on asset sales or disposals . . . . . . . . **1,135** 4,049 —\n\n**$ 8,665** $ (18,941) $ 14,712\n\nIn 2004, there were no material unusual property transactions. In 2003 the\n\nCompany sold 315 acres of land in North Las Vegas, Nevada near Shadow Creek\n\nfor approximately $55 million, which resulted in a pretax gain of approximately\n\n$37 million. Also in 2003, the Company recorded write-downs and impairments of\n\nassets abandoned or replaced with new construction, primarily at MGM Grand Las\n\nVegas in preparation for new restaurants and the new theatre. Prior to 2003, the\n\nCompany classified gains and losses on routine asset sales or disposals as a\n\nnon-operating item at some resorts and as an operating item at other resorts.\n\nManagement believes the preferable presentation of these items is as an element of\n\noperating income. Prior period statements have not been reclassified as such\n\ntransactions were not material in the prior periods. Until 2003, demolition costs\n\nwere typically capitalized as part of new construction. The Company began\n\nexpensing demolition costs on major construction projects as incurred on January 1,\n\n2003, and is accounting for this change in policy prospectively. Demolition costs\n\nwere not material in prior periods. Demolition costs in 2004 and 2003 relate\n\nprimarily to preparation for the Bellagio standard room remodel, Bellagio expansion\n\nand new theatre at MGM Grand Las Vegas.\n\nIn 2002, Tropical Storm Isidore caused property damage at Beau Rivage totaling $8\n\nmillion, including clean-up costs. The amount of the write-down for damaged assets\n\nwas determined based on the net book value of the assets and engineering estimates.\n\nIn connection with the revised development agreement in Detroit, the Company\n\nwrote off $5 million, which was the net book value of previously incurred develop-\n\nment costs associated with the riverfront permanent casino site ($9 million), offset by\n\npreviously accrued obligations no longer required under the revised development\n\nagreement ($4 million). Also in 2002, the Company recorded write-downs and\n\nimpairments of assets abandoned or replaced with new construction.\n\n**NOTE 15 — RELATED PARTY TRANSACTIONS**\n\nThe Company’s related party transactions consisted of the following revenues (expenses):\n\nYear Ended December 31 (In thousands)\n\nHotel and other revenue from related parties . . . . . . . **$ 416** $ 871 $ 764\n\nLicense fees to entities under common ownership . . . **(1,000)** (1,000) (1,000)\n\nProfessional fees to directors or firms\n\naffiliated with directors. . . . . . . . . . . . . . . . . . . . . . **(4,084)** (1,551) (1,815)\n\nOther related party expenses . . . . . . . . . . . . . . . . . . . **(62)** (468) (224)\n\n**$ (4,730)** $ (2,148) $ (2,275)\n\nAt December 31, 2004, the Company owed $2 million for legal fees to a firm\n\naffiliated with one of the Company’s directors. The Company also engaged in\n\ntransactions with its unconsolidated affiliates. In each of 2004 and 2003, the\n\nCompany paid Monte Carlo $4 million as a result of closing the tram between\n\nBellagio and Monte Carlo in preparation for the Bellagio expansion. The Company\n\nleases two acres of land to Borgata and received $1 million in each of 2004, 2003", - "page_start": 74, - "page_end": 74, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Management’s Discussion and Analysis of Financial Condition and Results of Operations 29\n\n**Other Factors Affecting Liquidity**\n\nIn November 2004, in anticipation of the Mandalay merger, we entered into an\n\namended and restated bank credit facility with a group of lenders led by Bank of\n\nAmerica, N.A. The revised bank credit facility will be effective upon the closing of\n\nthe Mandalay merger, will mature five years later, and will provide a total of $7.0\n\nbillion of borrowing capacity, consisting of a $5.5 billion senior revolving credit\n\nfacility and $1.5 billion senior term loan facility. The remaining terms are\n\nsubstantially similar to our existing bank credit facility.\n\n**Future Developments**\n\n**Project CityCenter.** In November 2004, we announced a plan to develop a multi-\n\nbillion dollar urban metropolis, initially called Project CityCenter, on 66 acres of\n\nland on the Las Vegas Strip, between Bellagio and Monte Carlo. We anticipate that\n\nthe first phase of Project CityCenter will include a 4,000-room casino resort, three\n\n400-room boutique hotels, approximately 550,000 square feet of retail shops,\n\ndining and entertainment venues, and 1,650 units of luxury condominium,\n\nhotel/condominium and private residence clubs.\n\nWe expect that the complete design work for Project CityCenter will take 18\n\nmonths and that the first phase will open in 2009. The design, budget and schedule\n\nof Project CityCenter are still preliminary however, and the ultimate timing, cost\n\nand scope of Project CityCenter are subject to risks attendant to large-scale projects.\n\n**Atlantic City, New Jersey.** We own approximately 130 acres on Renaissance Pointe\n\nin Atlantic City, New Jersey. In addition, Borgata occupies 29 acres at Renaissance\n\nPointe, including 27 acres it owns and two acres we lease to Borgata. Of the\n\nremaining land, approximately 95 acres are suitable for development, and a portion\n\nof these acres consists of common roads, landscaping and master plan improve-\n\nments which we designed and developed as required by our agreement with Boyd.\n\nBorgata is currently expanding its gaming and non-gaming amenities, adding 36\n\ncasino table games and 600 slot machines, along with additional restaurant,\n\nentertainment and other amenities. This project is expected to be completed in 2006.\n\nAdditionally, Borgata has plans to add another hotel tower featuring 800 guest rooms,\n\nsuites and resort condominiums, along with a new spa, parking garage and meeting\n\nrooms. This project is expected to be completed in 2007. Neither project is expected to\n\nrequire contributions from us, as existing operating cash flow and Borgata’s recently\n\nrenegotiated bank credit facility is anticipated to provide for the cost of the expansions.\n\nIn October 2002, we announced the suspension of our development activities on our\n\nwholly-owned project on the Renaissance Pointe land in Atlantic City. We must\n\napply for and receive numerous governmental permits and satisfy other conditions\n\nbefore construction of a new resort on the Renaissance Pointe site could begin. No\n\nassurance can be given that we will develop a casino resort in New Jersey, or its\n\nultimate schedule, size, configuration or cost if we do develop a casino resort.\n\n**Detroit, Michigan.** MGM Grand Detroit, LLC, in which we hold a controlling\n\ninterest, has operated an interim casino facility in Detroit, Michigan since July 1999.\n\nIn August 2002, the Detroit City Council approved revised development agreements\n\nwith us and two other developers. The revised development agreement released us and\n\nthe City from certain of the obligations under the original agreement and significantly\n\nchanged other provisions of the original agreement. We are currently in the process of\n\nobtaining land and developing plans for the permanent facility. The design, budget\n\nand schedule of the permanent facility are not finalized, and the ultimate timing, cost", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_MGM_2004.pdf", - "query": "Which events negatively impacted leisure travel and MCM Mirage high-end gaming business in late 2002 and early 2003 ?", - "target_page": 32, - "target_passage": "The war with Iraq and the outbreak of SARS in Asia, both of which negatively impacted leisure travel and our high-end gaming business in late 2002 and early 2003", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "defining momentum MGM MIRAGE 2004 ANNUAL REPORT", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "## Management’s Discussion and Analysis of Financial Condition and Results of Operations 20\n\n**RESULTS OF OPERATIONS**\n\nAt December 31, 2004, our operations consisted of 11 wholly-owned casino resorts\n\nand 50% investments in two other casino resorts, including:\n\n**Las Vegas, Nevada:** Bellagio, MGM Grand Las Vegas, The Mirage, TI, New York-\n\nNew York, Boardwalk, and Monte Carlo (50% owned).\n\n**Other:** The Primm Valley Resorts (Buffalo Bill’s, Primm Valley\n\nResort and Whiskey Pete’s) in Primm, Nevada; Beau Rivage\n\nin Biloxi, Mississippi; MGM Grand Detroit; Borgata (50%\n\nowned) in Atlantic City, New Jersey.\n\nWe operate in one segment, the operation of casino resorts, which includes offering\n\ngaming, hotel, dining, entertainment, retail and other resort amenities. Slightly over\n\nhalf of our net revenues are derived from gaming activities, a lower percentage than\n\nmany of our competitors, as our operating philosophy is to provide a complete\n\nresort experience for our guests, including non-gaming amenities which command\n\npremium prices based on their quality.\n\nWe generate a majority of our net revenues and operating income from our Las\n\nVegas Strip resorts. In 2004, over 75% of our net revenues and operating income\n\nwas generated by wholly-owned Las Vegas Strip resorts. We believe that we own the\n\npremier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to\n\ncontinually reinvest in these resorts to maintain that competitive advantage. Our\n\nconcentration on the Las Vegas Strip exposes us to certain risks outside of our\n\ncontrol, such as competition from other Las Vegas Strip resorts as well as new or\n\nexpanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005,\n\nand the impact from potential expansion of gaming in California. This concentra-\n\ntion also exposes us to risks related to tourism and the general economy, including\n\nnational and global economic conditions and terrorist attacks or other global events.\n\n**Key Performance Indicators**\n\nAs a resort-based company, our operating results are highly dependent on the\n\nvolume of customers at our resorts, which in turn impacts the price we can charge\n\nfor our hotel rooms and other amenities. We also generate a significant portion of\n\nour operating income from the high-end gaming segment, which can cause\n\nvariability in our results. Key performance indicators related to revenue are:\n\n- Gaming revenue indicators - table games drop and slot handle (volume\n\nindicators); “win” or “hold” percentage, which is not fully controllable by us. Our\n\nnormal table games win percentage is in the range of 18% to 22% of table games\n\ndrop and our normal slot win percentage is in the range of 6% to 7% of slot\n\nhandle;\n\n- Hotel revenue indicators - hotel occupancy (volume indicator); average daily rate\n\n(“ADR”, price indicator); revenue per available room (“REVPAR”), a summary\n\nmeasure of hotel results, combining ADR and occupancy rate.\n\nMost of our revenue is essentially cash-based, through customers wagering with cash\n\nor paying for non-gaming services with cash or credit cards. Our resorts, like many\n\nin the industry, generate significant operating cash flow. Our industry is capital\n\nintensive and we rely heavily on the ability of our resorts to generate\n\noperating cash flow to repay debt financing, fund maintenance capital\n\nexpenditures and provide excess cash for future development.\n\nOur results of operations do not tend to be seasonal in nature, though a variety of\n\nfactors can affect the results of any interim period, including the timing of major\n\nLas Vegas conventions, the amount and timing of marketing and special events for\n\nour high-end customers, and the level of play during major holidays, including New\n\nYear and Chinese New Year.", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Recently, we opened the SKYLOFTS, a new level of luxury\n\nfor guests atop MGM Grand Las Vegas.\n\nWe’ll follow the success of these new resort features\n\nwith a category-defining new nightclub at The Mirage, two\n\nfabulous restaurants by Joël Robuchon at MGM Grand Las\n\nVegas and gaming upgrades company-wide. Second, we are\n\ndoubling down on Las Vegas by merging with Mandalay,\n\na company we have long admired. The Mandalay merger\n\nrepresents a tremendous opportunity to build on the mo-\n\nmentum established by Mike Ensign and his team. And\n\nthird, we are dreaming of a not-so-distant future, when\n\nProject CityCenter will literally redefine the Las Vegas Strip\n\nand change the face of Las Vegas forever.\n\nMandalay in Motion\n\nWe are incredibly excited to begin our journey with the\n\ntalented people of Mandalay, as we work to maximize the\n\nvalue of Mandalay’s instantly recognized brands and world-\n\nclass resorts. Long a fixture in Las Vegas, Mandalay’s resorts\n\nwill add to our premium portfolio and allow us to accelerate\n\nthe pace of our growth. Our hotel people will be able to mar-\n\nket a wider range of rooms and benefit from a world-class\n\nconvention center. Our casino marketing people will be able\n\nto offer their customers wonderful new amenities to expand\n\nour market reach. And our development people will be able\n\nto maximize the potential of priceless Las Vegas Strip land.\n\nThe Mandalay merger represents another defining\n\nmoment for MGM MIRAGE, much like the Mirage Resorts\n\ntransaction in 2000, at a time when Las Vegas is in a state of\n\nastounding metamorphosis. No company is better positioned\n\nto help shape the future of Las Vegas than MGM MIRAGE.\n\nWe employ more people, invest more money and hold more\n\nprime real estate than any other company in Las Vegas. The\n\n**AL FACCINTO** President, MGM MIRAGE\n\nInternational Marketing\n\n**ALAN FELDMAN** Senior VP Public Affairs,\n\nMGM MIRAGE\n\n**BRUCE GEBHARDT** Senior VP,\n\nMGM MIRAGE Global Security\n\n**WILLIAM J. HORNBUCKLE** President &\n\nCOO, MGM MIRAGE Europe\n\n**PHYLLIS JAMES** Senior VP & Senior\n\nCounsel, MGM MIRAGE\n\n2 0 0 4 O P E R A T I N G M A R G I N S **C Z R**\n\n**H E T**\n\n**M B G**\n\n25.0%\n\n14.8%\n\n17.4%\n\n21.8%\n\n**M G G** 22.4%\n\n20.0% 15.0% 10.0%\n\n15", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Management’s Discussion and Analysis of Financial Condition and Results of Operations 23\n\n- The ongoing capital investments in upscale amenities at our resorts, which we\n\nbelieve is allowing us to market more effectively to visitors, capture a greater share\n\nof these visitors’ increased travel budgets, and generate premium pricing for our\n\nresorts’ rooms and other amenities.\n\nAs a result of the above trends, our net revenues increased 10% in 2004, while\n\nincreasing only 3% in 2003. Net revenues at MGM Grand Las Vegas increased\n\n14% in 2004, due to the addition of several new restaurants, bars and other\n\namenities, and in spite of fewer rooms in service due to room remodel activity.\n\nNet revenues at New York-New York increased 26% as the resort continues to\n\nbenefit from *Zumanity* and Nine Fine Irishmen, both of which opened in summer\n\n2003. Net revenues at The Mirage decreased 2% as the resort was without the\n\nSiegfried & Roy show and the buffet was closed for a portion of the year while\n\nCravings was constructed.\n\nOur operating income in 2004 increased 36%, due primarily to the strong revenue\n\ntrends and a full year of Borgata’s results. The increase in income from unconsoli-\n\ndated affiliates is responsible for approximately one-third of the increase in\n\noperating income, while improvements at our operating resorts, particularly\n\nBellagio, MGM Grand Las Vegas and New York-New York, make up the rest of the\n\nincrease. Operating income at MGM Grand Detroit was essentially flat year-over-\n\nyear, despite an increase in the gaming tax rate from 18% to 24% effective\n\nSeptember 2004. Several other factors largely offset: Higher corporate expense due\n\nto increased development costs; lower bad debt expense due to improved collec-\n\ntions; lower preopening expenses due to Borgata preopening expenses in 2003; and\n\nhigher property transactions, net due to a $37 million gain on sale of land in 2003.\n\nIn 2003, our operating income decreased by 6%. While revenues grew especially in\n\nthe second half of 2003, expense growth, particularly in payroll, outpaced revenues.\n\n**Operating Results - Detailed Revenue Information**\n\nThe following table presents details of our net revenues:\n\n(In thousands)\n\nCasino revenues, net:\n\nTable games . . . . . . . . . . **$ 943,343 9%** $ 866,096 (3%) $ 893,836\n\nSlots . . . . . . . . . . . . . . . . **1,218,589 9%** 1,115,029 5% 1,064,491\n\nOther . . . . . . . . . . . . . . . . **62,033 10%** 56,389 3% 54,513\n\nCasino revenues, net . . **2,223,965 9%** 2,037,514 1% 2,012,840\n\nNon-casino revenue:\n\nRooms . . . . . . . . . . . . . . **911,259 9%** 833,272 5% 796,861\n\nFood and beverage . . . . . **841,147 11%** 757,278 7% 706,153\n\nEntertainment, retail\n\nand other . . . . . . . . . . **696,117 7%** 647,702 2% 637,625\n\nNon-casino revenues . . . . **2,448,523 9%** 2,238,252 5% 2,140,639\n\n**4,672,488 9%** 4,275,766 3% 4,153,479\n\nLess: Promotional allowances . **(434,384) 5%** (413,023) 4% (396,551)\n\n**$ 4,238,104 10%** $ 3,862,743 3% $ 3,756,928\n\nTable games revenues increased as a result of the improvements in the U.S. econo-\n\nmy and the general economy worldwide, as well as increased attendance at targeted\n\nmarketing events, including the New Years period. Total table games volume for the\n\nyear was up 9%, with particular strength in baccarat volume, up 18%. These are the\n\nmost significant increases in table games volumes since 2000. Table games revenues\n\ndecreased in 2003, as a slightly lower hold percentage and the impact of the Iraq\n\nwar and SARS outbreak in early 2003 were not fully offset by strong volume levels\n\nover the latter half of 2003. Table games win percentages were within our normal\n\nrange for all periods presented.", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Management’s Discussion and Analysis of Financial Condition and Results of Operations 21\n\n**Overall Outlook**\n\nWe have invested heavily in our existing operations in 2003 and 2004, and expect\n\nto continue to do so on a targeted basis in 2005. Our Las Vegas Strip resorts require\n\nongoing capital investment to maintain their competitive advantages. We believe\n\nthe investments in additional non-gaming amenities we made in 2003 and 2004\n\nhave enhanced our ability to generate increased visitor volume and allowed us to\n\ncharge premium prices for our amenities.\n\nThe most likely significant factors affecting operating results at our existing resorts\n\nin 2005 will be the expected continued strength of the leisure and convention travel\n\nsegments, the expansion of Bellagio and the opening of *KÀ* and other amenities at\n\nMGM Grand Las Vegas, and new competition from Wynn Las Vegas on the Las\n\nVegas Strip. Various lodging market observers, such as PricewaterhouseCoopers\n\nand Smith Travel Research, are forecasting mid-single digit percentage growth in\n\nREVPAR in 2005, with greater REVPAR gains in full service hotels. Our REVPAR\n\ngrowth, and REVPAR growth in Las Vegas in general, has outpaced that of the\n\nnational market, and we expect that trend to continue.\n\nThe Bellagio expansion opened in late 2004 and added over 30% to the resort’s\n\nroom base. In addition, we added new meeting, retail and dining space and signifi-\n\ncantly expanded the spa and salon. *KÀ* opened in late November 2004 at MGM\n\nGrand Las Vegas, which had been without a featured production show for almost\n\ntwo years. Along with the numerous restaurant and other entertainment additions\n\nat MGM Grand Las Vegas, *KÀ* will enhance our ability to generate visitor traffic\n\nand capture a greater share of our guests’ spending.\n\nWynn Las Vegas will add room capacity to the Las Vegas market, with its 2,700\n\nrooms representing a 2% increase in Las Vegas room supply. Wynn Las Vegas will\n\nalso feature numerous upscale restaurants and generally target customers who might\n\notherwise choose Bellagio, MGM Grand Las Vegas or The Mirage. We believe there\n\nwill be some impact on these resorts from Wynn Las Vegas, but also believe that the\n\nbreadth of amenities in our portfolio of resorts and our loyalty and other marketing\n\nprograms will help minimize these competitive pressures. The proximity of Wynn\n\nLas Vegas to TI and The Mirage, along with pedestrian bridges linking TI with the\n\nFashion Show Mall and Venetian, will also benefit these resorts.\n\n**Mandalay Merger**\n\nOn June 16, 2004, we announced that we had entered into a definitive merger\n\nagreement with Mandalay Resort Group (“Mandalay”), a publicly traded company,\n\nunder which we will acquire Mandalay for $71.00 in cash for each share of\n\ncommon stock of Mandalay. Mandalay owns and operates eleven properties in\n\nNevada, including Mandalay Bay, Luxor, Excalibur, Circus Circus, and Slots-A-Fun\n\nin Las Vegas, Circus Circus-Reno in Reno, Colorado Belle and Edgewater in\n\nLaughlin, Gold Strike and Nevada Landing in Jean, and Railroad Pass in\n\nHenderson. Mandalay also owns and operates Gold Strike, a hotel/casino in Tunica\n\nCounty, Mississippi. In addition, Mandalay owns a 50% interest in Silver Legacy in\n\nReno, a 50% interest in Monte Carlo in Las Vegas, a 50% interest in Grand\n\nVictoria, a riverboat in Elgin, Illinois, and a 53.5% interest in MotorCity in\n\nDetroit, Michigan. The total consideration is approximately $8.1 billion, including\n\nequity value of approximately $4.8 billion, convertible debentures with a redemp-\n\ntion value of approximately $574 million, the assumption or repayment of other\n\noutstanding Mandalay debt with a fair value of approximately $2.6 billion as of\n\nDecember 31, 2004, and $100 million of estimated transaction costs. The transac-\n\ntion is structured as a merger of one of our wholly-owned subsidiaries with and into\n\nMandalay. The transaction will be accounted for as a purchase and is anticipated to", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "The increase in aggregate dollars in all periods presented is primarily a result of the expansion of our\n\noperations through internal growth and acquisitions.\n\nThe increase in cost of operations as a percentage of revenue from 2002 to 2003 and the decrease in cost\n\nof operations as a percentage of revenue from 2003 to 2004 is primarily attributable to higher self-insurance\n\nexpense in 2003. Self-insurance expense was $165.3 million, $189.5 million and $138.1 million for the years\n\nended December 31, 2004, 2003 and 2002, respectively. The increase in self-insurance expense in 2003 related\n\nto existing claims and was attributable to the expansion of our operations and various changes in estimates as a\n\nresult of continued negative trends through the 2003 policy year.\n\nExcluding self-insurance expense, cost of operations as a percentage of revenue increased during the year\n\nended December 31, 2004 versus the comparable 2003 period. This increase is primarily attributable to\n\nincreased fuel prices, labor costs and subcontracting costs associated with the long-haul transport of waste by\n\nthird-party vendors. Excluding self-insurance expense, cost of operations as a percentage of revenue decreased\n\nin 2003 versus the comparable 2002 period due to the elimination of closure and post-closure expense as a\n\ncomponent of cost of operations in accordance with SFAS 143 in 2003 and the termination of our operating\n\nlease facility in July 2002. This decrease was partially oÅset by increased fuel prices, an increase in waste taxes\n\nlevied on landÑll volumes in certain states, an increase in revenue generated by lines of business that produce\n\nlower operating margins and an increase in the long-haul transport of waste by third-party vendors.\n\nTo date in 2005, we have experienced a signiÑcant increase in fuel prices. We believe that cost of\n\noperations as a percentage of revenue may continue to remain high depending upon the cost of fuel, health\n\ninsurance, risk insurance and other key components of our cost structure and general economic conditions.\n\n*Depreciation, Amortization and Depletion of Property and Equipment.* Depreciation, amortization and\n\ndepletion expenses for property and equipment were $252.4 million, $233.8 million and $193.5 million, or, as a\n\npercentage of revenue, 9.3%, 9.3% and 8.2%, for the years ended December 31, 2004, 2003 and 2002,\n\nrespectively. The increase in aggregate dollars from 2003 to 2004 is primarily due to the expansion of our\n\noperations through internal growth and acquisitions. The increase in aggregate dollars and as a percentage of\n\nrevenue from 2002 to 2003 is primarily due to an increase in landÑll amortization associated with the adoption\n\nof SFAS 143. The remaining increase from 2002 to 2003 is due to increased depreciation expense resulting\n\nfrom capital expenditures, acquisitions and the purchase of equipment originally placed into service pursuant\n\nto an operating lease.\n\n*Amortization of Intangible Assets.* Intangible assets consist primarily of cost in excess of fair value of\n\nnet assets acquired, but also includes values assigned to long-term contracts, covenants not to compete and\n\ncustomer relationships. Expenses for amortization of intangible assets were $7.0 million, $5.3 million and\n\n$6.1 million, or, as a percentage of revenue, .3%, .2% and .2%, for the years ended December 31, 2004, 2003\n\nand 2002, respectively. The increase in such expenses in aggregate dollars and as a percentage of revenue from\n\n2003 to 2004 is primarily due to amortization expense on amounts that were recorded in other intangible assets\n\nduring the three months ended September 30, 2004 resulting from an extensive internal review of all recent\n\nacquisitions. The increase in amortization of intangible assets in aggregate dollars is also due to the\n\namortization of intangible assets associated with businesses acquired during 2004.", - "page_start": 43, - "page_end": 43, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Defining Momentum for Our Industry\n\nThe gaming industry in America is maturing, and\n\ninternational expansion, while exciting in select markets,\n\nremains challenging. As a result, your company has\n\npursued a growth strategy that calls for maximizing the\n\nassets we currently own and seeking prudent development\n\nopportunities and strategic acquisitions.\n\nUpon completion of our merger with Mandalay,\n\nMGM MIRAGE will be the world’s leading gaming and\n\nleisure company. The combination will result in a well-\n\ncapitalized company uniquely situated to invest in its\n\ncurrent portfolio in addition to creating new projects\n\nin the United States and around the world.\n\nWe believe this is an outstanding\n\ntransaction for the shareholders of\n\nboth companies. With this\n\nacquisition, we will own,\n\noperate and have investments\n\nin 28 properties throughout Nevada, Mississippi,\n\nIllinois, Michigan, and New Jersey.\n\nThe combined company will have an asset portfolio\n\nwhich includes some of the most widely recognized brand\n\nnames in the world. These properties cater to a broad\n\ncustomer base, ranging from value-oriented to the ultra-\n\nhigh end. Each resort provides a unique customer experience\n\nthrough its specific personality and combination of amenities.\n\nWe also will have at Mandalay Bay the fifth largest\n\nconvention center in the United States, providing the com-\n\npany with a great resource to further develop the business\n\ntravel and convention market.\n\nBut the bricks and mortar tell only part of the story\n\nof this transaction. At the heart of Mandalay is its people.\n\nMandalay employees at all levels are energetic and talented\n\nand will be a tremendous asset to us. Together, we will become\n\na family in excess of 70,000 people committed to delivering\n\nthe best possible experiences for our guests. The transaction\n\nalso will create unparalleled opportunities for our entire family\n\nof employees.\n\nIn short, this groundbreaking transaction creates\n\nunstoppable momentum for all stakeholders in the\n\nMGM MIRAGE family.\n\nDefining Momentum in our Properties\n\nIn 2004, your company invested over $690 million of\n\ncapital in the creation of new restaurants, clubs, shows and\n\nnightspots as well as the development of strategic enhance-\n\nments to existing amenities. These investments generated\n\nexceptional returns in a time when competition for the\n\nentertainment dollar has never been higher.\n\nE A R N I N G S P E R S H A R E **2 0 0 2**\n\n**2 0 0 3**\n\n**2 0 0 4**\n\n$3.00\n\n$1.83\n\n$1.61\n\n$2.85\n\n$2.50 $2.00 $1.50 $1.00 $0.50 $0.00\n\n**FIX** BELLAGIO Classic\n\nAmerican fare using the\n\nfreshest fish, meat, and\n\npoultry cooked to order on\n\na wood-burning grill. Costa\n\nRican Padouk wood inspires\n\na warm environment in a\n\nunique, vibrant design.\n\n03\n\n*Mystère* ® by Cirque du Soleil ®", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "Management’s Discussion and Analysis of Financial Condition and Results of Operations 25\n\npreviously laid off or terminated employees, management determined in 2002 that\n\na portion of the remaining accrual was no longer necessary. This resulted in a\n\nrestructuring credit of $10 million in 2002.\n\nProperty transactions, net consisted of the following:\n\nYear Ended December 31 (In thousands)\n\nGain on sale of North Las Vegas land . . . . . . . . . . . $ **—** $ (36,776) $ —\n\nSiegfried & Roy theatre write-down - The Mirage . . . **—** 1,408 —\n\nStorm damage - Beau Rivage . . . . . . . . . . . . . . . . . **—** — 7,824\n\nWrite-off of Detroit development costs . . . . . . . . . . . **—** — 4,754\n\nImpairment of assets to be disposed of . . . . . . . . . . **473** 5,764 2,134\n\nDemolition costs . . . . . . . . . . . . . . . . . . . . . . . . . . . **7,057** 6,614 —\n\nOther net losses on asset sales or disposals . . . . . . . **1,135** 4,049 —\n\n**$ 8,665** $ (18,941) $ 14,712\n\nIn 2004, there were no material unusual property transactions. In 2003, we sold 315\n\nacres of land in North Las Vegas, Nevada near Shadow Creek for approximately\n\n$55 million, resulting in the $37 million gain reflected above. Prior to 2003, we\n\nclassified gains and losses on routine assets sales or disposals as a non-operating item at\n\nsome resorts and as an operating item at other resorts. We believe the preferable pres-\n\nentation of these items is as an element of operating income. Prior period statements\n\nhave not been reclassified as such transactions were not material in periods prior to\n\n2003. Until 2003, demolition costs were typically capitalized as part of new construc-\n\ntion. We began expensing demolition costs on major construction projects as incurred\n\non January 1, 2003, and are accounting for this change in policy prospectively.\n\nDemolition costs were not material in periods prior to 2003. Demolition costs in\n\n2004 and 2003 related primarily to preparation for the Bellagio standard room\n\nremodel, Bellagio expansion and new theatre at MGM Grand Las Vegas. Impairments\n\nof assets to be disposed of in 2003 consisted primarily of assets related to the former\n\nEFX! show and restaurants closed during 2003 at MGM Grand Las Vegas.\n\nIn 2002, Tropical Storm Isidore caused property damage at Beau Rivage totaling\n\n$8 million, including clean-up costs. The amount of the write-down for damaged assets\n\nwas determined based on the net book value of the assets and engineering estimates. In\n\nconnection with the revised development agreement in Detroit, we wrote off $5 million,\n\nwhich was the net book value of previously incurred development costs associated with\n\nthe riverfront permanent casino site ($9 million), offset by previously accrued obliga-\n\ntions no longer required under the revised development agreement ($4 million).\n\n**Non-operating Results**\n\nThe following table summarizes information related to interest on our long-term debt:\n\nYear Ended December 31 (In thousands)\n\nInterest cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . **$ 401,391** $ 352,820 $ 345,448\n\nLess: Capitalized interest . . . . . . . . . . . . . . . . . . . . . . **(23,005)** (15,234) (61,712)\n\nInterest expense, net . . . . . . . . . . . . . . . . . . . . . . . . . **$ 378,386** $ 337,586 $ 283,736\n\nCash paid for interest, net of amounts capitalized . . . **$ 321,008** $ 308,198 $ 266,071\n\nAverage total debt balance . . . . . . . . . . . . . . . . . . . . **$ 5.5 billion** $ 5.2 billion $ 5.2 billion\n\nWeighted average interest rate . . . . . . . . . . . . . . . . . **7.2%** 6.9% 6.8%\n\nInterest cost was higher in 2004 as we had a higher average borrowing rate due to\n\nincreases in variable interest rates and the issuance of significant fixed rate debt in\n\nthe second half of 2004 in anticipation of the Mandalay merger.\n\nCapitalized interest increased in 2004 due to the ongoing Bellagio expansion and", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "E X P A N D I N G W I T H E X C E L L E N C E TO OUR SHAREHOLDERS\n\nThese investments in your company’s future paid\n\ndividends even before the year was out. We established a\n\nnew record for net revenues posting $4.2 billion, a 10%\n\nincrease over 2003.\n\nYour company’s resorts produced record EBITDA of\n\n$1.46 billion, an increase of 23% over 2003, while operating\n\nincome was $951 million, an increase of 36%, with record\n\nresults at Bellagio, MGM Grand Las Vegas and Beau Rivage.\n\nDefining Momentum in the Community\n\nI’ve spent 27 years in this profession and the\n\nincredible generosity of our employees never\n\nceases to amaze me. Shortly after the merger\n\nwith Mirage Resorts in 2000, we established\n\nthe Voice Foundation. This allows employees to\n\nexpress themselves in the communities we serve by\n\nproviding them a mechanism to raise monies for\n\nworthy causes. It’s their money and they decide\n\nwhere it goes. Your company provides the marketing\n\nand administrative support.\n\nIn each year since we established the program,\n\nemployees have given record amounts to support a\n\n**BELLAGIO** underwent a significant expansion during 2004 result-\n\ning in the opening of the Spa Tower and several important new\n\namenities at this AAA Five Diamond property. Bellagio remains\n\nLas Vegas’ first and only hotel-casino to receive this prestigious\n\nrecognition. These new additions add dimension and depth to the\n\nworld-famous experience awaiting guests at Bellagio.\n\n**MGM GRAND LAS VEGAS** completed a transformation, begun\n\nin 2003, of its food and beverage and entertainment offerings.\n\nMGM Grand is one of the must-see attractions of\n\nLas Vegas, with Cirque du Soleil’s newest pro-\n\nduction, *KA* *<sup>`</sup>* <sup>TM</sup> , and several of the Strip’s\n\nfinest restaurants and hottest nightspots.\n\n**TI** ’s transformation was no less extensive,\n\nas the property’s management team\n\nconceived and implemented a program to\n\nenliven the property with new restaurants\n\nand nightlife.\n\n**THE MIRAGE** was the site of a revolution in\n\nLas Vegas’ history as the venerable buffet was given\n\nnew life as a top dining establishment, Cravings.\n\nOthers may follow this lead, but The Mirage was\n\nthe first property to breathe new life into what\n\nremained of the last bastion of “old” Las Vegas.\n\n**47.6%**\n\n**14.9% 18.0%**\n\n**19.5%**\n\n**47.6%**\n\n**14.9% 18.0%**\n\n**19.5%**\n\n2004 Revenue Mix\n\nCasino\n\nRooms\n\nFood & Beverage\n\nEntertainment, Retail,\n\n& Other\n\n**SKYLOFTS** MGM Grand\n\nA private sanctuary of sleek,\n\nelegant two-story accommo-\n\ndations, offering discerning\n\nguests the quintessential loft\n\nenvironment - harmonizing\n\ndesign, décor, ambiance and\n\nunparalleled vistas.\n\n**BELLAGIO SPA** Unique\n\ndesign elements, combined\n\nwith an international array of\n\ninnovative treatments and\n\nspecially trained therapists,\n\nprovide the ultimate indul-\n\ngent experience.\n\n**TEATRO** MGM Grand A new\n\ngenre of Las Vegas nightlife\n\nwhere European club influ-\n\nences permeate. DJs spin jazz/\n\nhouse throughout the evening,\n\ngiving way to an energetic\n\nafter-hours vibe with live cat-\n\nwalk entertainment.\n\n**KÀ** The most spectacular production ever, by a troupe renowned for its\n\npageantry. Cirque du Soleil’s *KÀ* debuted at a new theatre at MGM Grand\n\nin the fourth quarter of 2004.\n\nWhat exactly is a defining\n\nmoment? Try a multi-billion\n\ndollar project centered in the\n\nheart of Las Vegas.\n\n04", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "## Notes to Consolidated Financial Statements 46\n\n**NOTE 1 — ORGANIZATION**\n\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware\n\ncorporation, incorporated on January 29, 1986. As of December 31, 2004\n\napproximately 58% of the outstanding shares of the Company's common stock\n\nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk\n\nKerkorian. MGM MIRAGE acts largely as a holding company and, through\n\nwholly-owned subsidiaries, owns and/or operates casino resorts.\n\nThe Company owns and operates the following casino resorts on the Las Vegas\n\nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure\n\nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The\n\nCompany owns a 50% interest in the joint venture that owns and operates the\n\nMonte Carlo Resort & Casino, also located on the Las Vegas Strip.\n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state\n\nline - Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort - as well as two\n\nchampionship golf courses located near the resorts. The Company also owns\n\nShadow Creek, an exclusive world-class golf course located approximately ten miles\n\nnorth of its Las Vegas Strip resorts.\n\nThe Company, through its wholly owned subsidiary, MGM Grand Detroit, Inc.,\n\nand its local partners formed MGM Grand Detroit, LLC, to develop a hotel, casino\n\nand entertainment complex in Detroit, Michigan. MGM Grand Detroit, LLC\n\noperates a casino in an interim facility in downtown Detroit. See Note 10 for\n\ndiscussion of the revised development agreement with the City of Detroit and\n\nplans for a permanent casino resort.\n\nThe Company owns and operates Beau Rivage, a beachfront resort located in Biloxi,\n\nMississippi. The Company also owns a 50% interest in a limited liability company\n\nthat owns Borgata, a casino resort at Renaissance Pointe, located in the Marina area\n\nof Atlantic City, New Jersey. Boyd Gaming Corporation owns the other 50% of\n\nBorgata and also operates the resort. Borgata opened in July 2003. The Company\n\nowns approximately 95 developable acres adjacent to Borgata, a portion of which\n\nconsists of common roads, landscaping and master plan improvements which the\n\nCompany designed and developed as required under the agreement with Boyd.\n\nUntil July 2004, the Company owned and operated MGM Grand Australia and\n\nuntil January 2004, the Company owned and operated the Golden Nugget Las\n\nVegas in downtown Las Vegas and the Golden Nugget Laughlin in Laughlin,\n\nNevada (the “Golden Nugget Subsidiaries”). Until June 2003, the Company\n\noperated PLAYMGMMIRAGE.com, the Company’s online gaming website based\n\nin the Isle of Man. See Note 3 for further information regarding these discontinued\n\noperations. In the second quarter of 2002, the Company received proceeds of $11\n\nmillion upon termination of management agreements covering four casinos in the\n\nRepublic of South Africa. Prior to the termination, the Company managed three\n\npermanent casinos and one interim casino and received management fees from its\n\npartner, Tsogo Sun Gaming & Entertainment. The termination fee was recorded as\n\npart of other revenues in the accompanying consolidated statements of income.\n\nThe Company is actively seeking future development opportunities in the United\n\nKingdom. In May 2003, the Company acquired a 25% interest in Metro Casinos\n\nLimited, a United Kingdom gaming company which operates a casino in Bristol.\n\nSee Note 10 for discussion of other potential developments in the United Kingdom.\n\nIn June 2004, the Company entered into a joint venture agreement to develop,\n\nbuild and operate a hotel-casino resort in Macau S.A.R. The agreement is subject\n\nto, among other things, the approval of the government of Macau S.A.R., and other\n\nregulatory approvals, as well as the entry into a subconcession agreement with the\n\nholder of one of the existing concessions.", - "page_start": 55, - "page_end": 55, - "source_file": "NYSE_MGM_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "00-80T-80.pdf", - "query": "What possess all naval aviators ?", - "target_page": 5, - "target_passage": "All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## PREFACE\n\nThe purpose of this textbook is to present the elements of applied aerodynamics and aeronautical engineering which relate directly to the problems of flying operations. All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. Due .to the increasing complexity of modern aircraft, this natural interest must be applied to develop a sound understanding of basic engineering principles and an appreciation of some of the more advanced problems of aerodynamics and engineering. The safety and effectiveness of flying operations will depend greatly on the under- standing and appreciation of how and why an airplane flies. The principles of aerodynamics will provide the foundations for developing exacting and precise flying techniques and operational procedures. The content of this textbook has been arranged to provide as com- plete as possible a reference for all phases of flying in Naval Aviation. Hence, the text material is applicable to the problems of flight train- ing, transition training, and general flying operations. The manner of presentation throughout the text has been designed to provide the elements of both theory and application and will allow either directed or unassisted study. As a result, the text material’will be applicable to supplement formal class Iectures and briefings and provide reading material as a background for training and flying operations. Much of the specialized mathematical detail of aerodynamics has been omitted wherever it was considered unnecessary in the field of flying operations. Also, many of the basic assumptions and limita- tions of certain parts of aerodynamic theory have been omitted for the sake of simplicity and clarity of presentation. In order to contend with these specific shortcomings, the Naval Aviator should rely on the assistance of certain specially qualified individuals within Naval Avia- tion. For example, graduate aeronautical engineers, graduates of the Test Pilot Training School at the Naval Air Test Center, graduates of the Naval Aviation Safety Officers Course, and technical representatives of the manufacturers are qualified to assist in interpreting and applying the more difficult parts of aerodynamics and aeronautical engineering. To be sure, the specialized qualifications of these individuals should be utilized wherever possible.\n\niii", - "page_start": 4, - "page_end": 4, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-8OT-80 AIRPLANE PERFORMANCE\n\nThe performance of an aircraft is. the most operating limitations and insight to obtain important feature which defines its suitability the design performance of his aircraft. The for specific missions. The principal items of performance section of the flight handbook airplane performance deserve detailed consid- provides the specific information regarding the eration in order to better understand and capabilities and limitations of each airplane. appreciate the capabilities of each airplane. Knowledge of the various items of airplane Every Naval Aviator must rely upon these handbook data as the guide to safe and effec- performance will provide the Naval Aviator rive operation of his aircraft. with a more complete appreciation of the\n\n95", - "page_start": 112, - "page_end": 112, - "source_file": "00-80T-80.pdf" - }, - { - "text": "## NAVWEPS OD-8OT-80 APPLICATION OF AERODYNAMICS TO SPECIFIC PROBLEMS OF FLYING\n\nChapter 6\n\nAPPLICATION OF AERODYNAMICS TO SPECIFBC PROW OF FLYING\n\nWhile the previous chapters have presented the detailed parts of the general field of aero- dynamics, there remain various problems of flying which require the application of princi- ples from many parts of aerodynamics. The application of aerodynamics to these various problems of flying will assist the Naval Aviator in understanding these problems and develop- ing good flying techniques.\n\nPRIMARY CONTROL OF AIRSPEED AND ALTITUDE For the conditions of steady flight, the air- plane must be in equilibrium. Equilibrium will be achieved when there is no unbalance of force’or moment acting on the airplane. If it is assumed that the airplane is trimmed so that no unbalance of pitching, yawing, or rolling moments exists, the principal concern is for\n\n349", - "page_start": 366, - "page_end": 366, - "source_file": "00-80T-80.pdf" - }, - { - "text": "**NA VAIR 00·801·80 AERODYNAMICS FOR NAVAL AVIATORS BY**\n\n**H. H. HURT, JR.**\n\n**UNIVERSITY OF SOUTHERN CALIFORNIA**\n\nDISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DESTRUCTION NOTICE - For unclassified, limited documents, destroy by any method that will prevent disclosure of contents or reconstruction of the document.\n\n**PUBLISHED BY DIRECTION OF COMMANDER, NAVAL AIR SYSTEMS COMMAND**\n\n**REVISED JANUARY 1965** �������������", - "page_start": 0, - "page_end": 0, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-BOT-BO BASIC AERODYNAMICS\n\nChapter 1\n\nBASIC AERODYNAMKS\n\nIn order to understand the characteristics of his aircraft and develop precision flying tech- niques, the Naval Aviator must be familiar with the fundamentals of aerodynamics. There are certain physical laws which describe the behavior of airflow and define the various aerodynamic forces and moments acting on a surface. These principles of aerodynamics pro- vide the foundations for good, precise flying techniques.\n\nWING AND AIRFOIL FORCES\n\nPROPERTIES OF THE ATMOSPHERE\n\nThe aerodynamic forces and moments acting on a surface are due in great part to the prop- erties of the air mass in which the surface is operating.~ The composition, of the earth’s atmosphere by volume is approximately 78 percent. nitrogen, 21 percent oxygen, and 1", - "page_start": 18, - "page_end": 18, - "source_file": "00-80T-80.pdf" - }, - { - "text": "loo. ................. l.lm 1.30 20.00 110 .................. ,826 1.24 15.P 17.0 .................. ,694 1.04 12.7’ lY) .................. .444 .61 8.20 200 .................. 230 .38 4.6’ MO. ................. ,111 .I7 2.10 4&l. ................. .c453 .o!J 1.10 30.7. ................. ,040 .06 .T=\n\n600 .................. .028 .04 .5O\n\nNote that for the conditions of steady flight, each airspeed requites a specific angle of attack and lift coefficient. This fact provides a fun- damental concept of flying technique: Angle of attack is tbs primary Control of airspeed in steady flight. Of course, the control stick or wheel allows the pilot to control the angle of attack and, thus, control the airspeed in steady flight. In the same sense, the throttle controls the output of the powerplant and allows the pilot to control rate of climb and descent at various airspeeds. The teal believers of these concepts ate pro- fessional instrument pilots, LSO’s, and glider pilots.. The glider pilot (or flameout enthusi- ast) has no recourse but to control airspeed by angle of attack and accept whatever rate of descent is incurred at the various airspeeds. The LSO must become quite proficient at judg- ing the flight path and angle of attack of the airplane in the pattern. The more complete visual reference field available to the LSO allows him to judge the angle of attack of the airplane mote accurately than the pilot. When the airplane approaches the LSO, the precise judgment of airspeed is by the angle of attack rather than the rate of closure. If the LSO sees the airplane on the desired flight path but with too low an angle of attack, the airspeed is too high; if the angle of attack is too high, the airspeed is too low and the ait- plane is approaching the stall. The mirror landing system coupled with an angle of attack indicator is an obvious refinement. The mit- tot indicates the desired flight path and the\n\nNAVWEPS WOT-BO BASIC AERODYNAMICS", - "page_start": 44, - "page_end": 44, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801-80 OPERATING STRENGTH LIMITATIONS\n\nChapter 5\n\n## OPERATING STRENGTH LIMITATIONS\n\nThe weight of the structural components of an aircraft is an extremely important factor in the development of an efficient aircraft con- figuration. In no other field of mechanical design is there such necessary importance assigned to structural weight. The efficient aircraft and powerplant structure is the zenith\n\norder to obtain the required service life from\n\nhis aircraft, the Naval Aviator must undet-\n\nstand, appreciate, and observe the operating\n\nstrength limitations. Failure to do so will\n\nincur excessive maintenance costs and a high\n\nincidence of failure during the service life of of highly reined rknimum weight design. in an aircraft.\n\n325", - "page_start": 342, - "page_end": 342, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801-80 PREFACE\n\nThe majority of aircraft accidents are due to some type of error of the pilot. This fact has been true in the past and, unfortunately, most probably will be true in the future. Each Naval Aviator should strive to arm himself with knowledge, training, and exacting, professional attitudes and techniques. The fundamentals of aerodynamics as pre- sented in this text will provide the knowledge and background for safe and effective flying operations. The flight handbooks for the air- craft will provide the particular techniques, procedures, and operating data which are necessary for each aircraft. Diligent study and continu- ous training are necessary to develop the professional skills and tech- niques for successful flying operations. The author takes this opportunity to express appreciation to those who have assisted in the preparation of the manuscript. In particular, thanks are due to Mr. J. E. Fairchild for his assistance with the por- tions dealing with helicopter aerodynamics and roll coupling phenom- ena. Also, thanks are due to Mr. J. F. Detwiler and Mr. E. Dimitruk for their review of the text material. HUGH HARRISON HURT, Jr. August 1959 University of Southern California Los Angelesj Cnlif.\n\niv", - "page_start": 5, - "page_end": 5, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Another important form of direct inter- ference is common when the two airplanes are in a trail position and stepped down. As shown in figure 6.10, the single airplane in flight de- velops upwash ahead of the wing and down- wash behind and any restriction accorded the flow can alter the distribution and magnitude of the upwash and downwash. When the trailing airplane is in close proximity aft and below the leading airplane a mutual interference takes place betweetrthe two airplanes. The leading airplane above will experience an effect which would be somewhat similar to encountermg ground effect, i.e., a reduction in induced drag, a reduction in downwash at the tail, and a change in pitching moment nose down. The trailing airplane below will experience an effect which is generally the opposite of the airplane above. In other words, the airplane below will experience an increase in induced drag, an increase in downwash at the tail, and a change in pitching moment nose up. Thus, when the airplanes are in close proximity, a definite collision possibility exists because of the trim change experienced by each airplane. The magnitude of the trim change is greatest when the airplanes are operating at high lift coefficients, e.g., low speed flight, and when the airplanes are in close proximity. In formation flying, this sort of interference must be appreciated and anticipated. In cross- ing under another airplane, care must be taken to anticipate the trim change and adequate clearance must be maintained, other- wise a collision may result. The pilot of the leading aircraft will know of the presence of the trailing airplane by the trim change experienced. Obviously, some anticipation is necessary and adequate separation is necessary to prevent a disturbing magnitude of the trim change. In a close diamond formation the leader will be able to “feel” the presence of the slot man even though the airplane is not within view. Obviously, the slot man will have a difficult job during formation maneuvers because of the unstable trim changes\n\nNAVWEPS OO-ROT-80 APPLICATION OF AERODYNAMICS TO SPECIFIC PROBLEMS OF FLYING", - "page_start": 402, - "page_end": 402, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801-80 HIGH SPEED AERODYNAMICS\n\nChapter 3\n\n## HIGH SPEED AERODYNAMICS\n\nDevelopments in aircraft and powerplants have produced high performance airplanes with capabilities for very high speed flight. The study of aerodynamics at these very high flight speeds has many significant differences from the study of classical low speed aero- dynamics. Therefore, it is quite necessary that the Naval Aviator be familiar with the nature of high speed airflow and the charac- teristics of high performance airplane configurations.\n\nGENERAL CONCEPTS AND SUPERSONIC\n\nFLOW PATTERNS\n\nNATURE OF COMPRESSIBILITY\n\nAt low flight speeds the study of aero- dynamics is greatly simplified by the fact that air may experience relatively small changes in pressure with only negligible changes in density. This airflow is termed incompressible since the air may undergo changes\n\n201", - "page_start": 218, - "page_end": 218, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "00-80T-80.pdf", - "query": "What is the static pressure of the aire at standard sea level ?", - "target_page": 20, - "target_passage": "At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "NAVWEe3 OO-BOT-80 BASIC AERODYNAMICS\n\npercent water vapor, <sup>argon, carbon dioxide,</sup> etc. For the majority of all aerodynamic con- siderations air is considered as a uniform mixture of these gases. The usual quantities used to define the properties of an air mass are as follows: STATIC PRESSURE. The absolute static pressure of the air is a property of primary importance. The static pressure of the air at any altitude results from the mass of air supported above that level. At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) and at 40,000 feet altitude this static pressure decreases to approximately 19 percent of the sea level value. The shorthand notation for the ambient static pressure is “p” and the standard sea level static pressure is given the subscript “a” for zero altitude, pa. A more usual reference in aerodynamics and perform- ance is the proportion of the ambient sta~tic pressure and the standard sea level static pressure. This static pressure ratio is assigned the shorthand notation of 8 (delta).\n\nAltitude pressure ratio\n\nAmbient static pressure =Standard sea level static pressure\n\n6 = PIP0\n\nMany items of gas turbine engine perform- ance are directly related to some parameter involving the altitude pressure ratio. TEMPERATURE. The absolute tempera- cure of the air is another important property. The ordinary temperature measurement by the Centigrade scale has a/datum at the freezing point of water but absolute zero temperature is obtained at a temperature of -273“ Centi- grade. Thus, the standard sea level tcmpera- ture of 15” C. is an absolute temperature of 288”. This scale of absolute temperature using the Centigrade increments is the Kelvin scale, e.g., o K. The shorthand notation for the ambient air temperature is “T” and the stand- ard sea level air temperature of 288’ K. is signified by Ta. The more usual reference is,\n\nthe proportion of the ambient air temperature and the standard sea level air temperature. This temperature ratio is assigned the short- hand notation of 0 (theta). Temperature ratio\n\nAmbient air temperature =Standard sea level air temperature @=TITtl ,+273 288\n\nMany items of compressibility effects and jet engine performance involve consideration of the temperature ratio. DENSITY. The density of the air is a prop- erty of greatest importance in the study of aerodynamics. The density of air is simply the mass of air per~cubic foot of volume and is a direct measure of the quantity of matter in each cubic foot of air. Air at standard sea lcvcl conditions weighs 0.0765 pounds per cubic foot and has a density of 0.002378 slugs per cubic foot. At an altitude of 40,000 feet the air density is approximately 25 percent of the sea level value. The shorthand notation used for air density is p (rho) and the standard sea level air density is then pO. In many parts of aerodynamics it is very convenient to consider the proportion of the ambient air density and standard sea level air density. This density ratio is assigned the shorthand notation of c (sigma).\n\ndensity ratio= ambient air density standard sea level air density\n\na = PIP0\n\nA general gas law defines the relationship of pressure temperature, and density when there is no change of state or heat transfer. Simply stated this would be “density varies directly with pressure, inversely with temperature.” Using the properties previously defined,\n\ndensity ratio= Pressure rat’o. temperature rat10\n\n2", - "page_start": 19, - "page_end": 19, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS OO-EOT-80 BASIC AERODYNAMICS\n\nFORWARD STAGNATION AFT STAGNATION POINT POINT\n\nAIRSTREAM AHEAD STAGNATION PRESSURE HAS AMBIENT STATIC IS AIRSTREAM TOTAL PRESSURE AND DYNAMIC PRESSURE PRESSURE P+q\n\n### Ftgure 1.4. Flow Pattern on a Symmetrical Object\n\nsurface anflow continues to the aft stagnation point where the local velocity is again zero. The important point of this example of aero- dynamic flow is existence of the stagnation point. The change in airflow static pressure which takes place at the stagnation point IS equal to the free stream dynamic pressure, q. The measurement of free stream dynamic pressure is fundamental to the indication of airspeed. In fact, airspeed indicators are sim- ply pressure gauges which measure dynamic pressure related to various airspeeds. Typical airspeed measuring systems are illustrated in figure 1.5. The pitot head has no internal flow velocity and the pressure in the pitot tube is equal to the total pressure of the airstream. The purpose of the static-ports is to sense the true static pressure of the free airstream. The total pressure and static pressure lines are attached to a differential pressure gauge and the net pressure indicated is the dynamic\n\npressure, q. The pressure gauge is then cali- brated to indicate flight speed in the standard sea level air mass. For example, a dynamic pressure of 305 psf would be realized at a sea level flight ,speed of 300 knots. Actually there can be many conditions of flight where the airspeed indicator does not truly reflect the actual velocity through the air mass. The corrections that must be applied are many and lisred in sequence below: (1) The indicated airspeed (IAS) is the actual instrument indication for some given flight condition. Factors such as an altitude other than standard sea level, errors of the instrument and errors due to the installation, compressibility, etc. may create great vari- ance between this instrument indication and\n\nthe actual flight speed. (2) The calibrated airspeed (CM) is the result of correcting IAS for errors of the\n\n10", - "page_start": 27, - "page_end": 27, - "source_file": "00-80T-80.pdf" - }, - { - "text": "If the potential energy is represented by the static pressure, p, the sum of the potential and kinetic energy is the total pressure of the air-\n\nstream.\n\nH=p+% P V’ where H=total pressure, psf (sometimes re- ferred to as “head ’ pressure)\n\np=static pressure, psf. p=density, siugs per cu. ft. V= velocity, ft./set.\n\nThis equation is the Bernoulli equation for ‘incompressible flow. It is important to ap- preciate that the term >$pV2 has the units of pressure, psf. This term is one of the most important in all aerodynamics and appears so frequently t&it is given the name “dynamic pressure” and the shorthand notation “4”.\n\nq= dynamic pressure, psf = jgpv2\n\nWith this definition it could be said that the sum of static and dynamic pressure in the flow tube remains constant. Figure 1.3 illustrates the variation of static, dynamic, and total pressure of air flowing through a closed tube. Note that the total pressure is con,stant throughout the length and any change in dynamic pressure produces the same magnitude change in static pressure. The dynamic pressure of a free airstream is the one ‘common denominator of all aero- dynamic forces and moments. Dynamic pres- sure represents the kinetic energy of the free airstream and is a factor relating the capability for producing changes in static pressure on a surface. As defined, the dynamic, pressure varies directly as the density and the square of the velocity. Typical values of dynamic pres- sure, 4, are shown in table l-1 for various true airspeeds in the standard atmosphere. Notice that the dynamic pressure at some fixed veloc- ity varies directly with the density ratio at any altitude. Also, appreciate the fact that at an altitude of 40,oM) feet (where the density ratio, b, is 0.2462) it is necessary to have a true air velocity twice that at sea level in order to product the same dynamic pressure.\n\nNAVWEPS 00-801-80 BASIC AERODYNAMICS\n\nTABLE l-l. Effect of Speed and Altitvde on Dwzmnic Prerrure\n\nTrue air speed (fr./scc.)\n\nm=\n\n169 338 507 616 845 I, 013\n\n-\n\n,I I\n\nc _-\n\nAIRSPEED MEASUREMENT. If a sym- metrically shaped object were placed in a moving airstream, the flow pattern typical of figure 1.4 would result. The airstream at the very nose of the object would stagnate and the relative flow velocity at this point would be zero. The airflow ahead of the object pos- sesses some certain dynamic pressure and ambient static pressure. At the very nose of the object the local velocity will drop to zero and the airstream dynamic pressure will be converted into an increase in static pressure at the stagnation point. In other words, there will exist a static pressure at the stagnation point which is equal to the airstream total pressure-ambient static pressure plus dynamic pressure.\n\nAround the surface of the object the airflow will divide and the local velocity will increase from zero at the stagnation point to some maximum on the sides of the object. If fric- tion and viscosity effects are neglected, the\n\n9", - "page_start": 26, - "page_end": 26, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-807-80 BASIC AERODYNAMICS\n\nPITOT-STATIC SYSTEM\n\nw <sup>/ :%</sup> . I. q\n\nPITOT WITH SEPARATE\n\nSTATIC SOURCE\n\nPRESSURE INDICATED BY GAUGE IS DIFFERENCE BETWEEN TOTAL AND STATIC PRESSURE, H-p= q\n\n### Figure. 1.5. Airspeed Measurement\n\ninstrument and errors due to position or lo- cation of the installation. The instrument error must be small by design of the equip- ment and is usually negligible in equjpment which is properly maintained and cared for. The position error of the installation must be small in the range of airspeeds involving critical performance conditions. Position errors are most usually confine,d to the static source in that the actual static pressure sensed at the static port may be different from the free airstream static pressure. When the .,aircraft is operated through a large range’ of angles of attack, the static pressure distribution varies ‘quite greatly and it becomes quite difficult to’minimize the static source error. In most instances a compensating group of static sources may be combined to reduce the position error. In order to appreciate the magnitude of this problem, at flight speed near 100 knots a\n\n11\n\n0.05 psi position error is an airspeed error of 10 knots. A typical variation of air- speed system position error is illustrated in figure 1.6. (3) The equivalent airspeed (PAS) is the result of correcting the (CAS) for compressi- bility effects. At high flight speeds the stagnation pressure recovered in the pitot tube is not representative of the airstream dynamic pressure due to a magnification by compressibility. Compressibility of the airflow produces a stagnation pressure in the pitot which is greater than if the flow were incompressible. As a result, the air- speed indication is given an erroneous mag- nihcation. The standard airspeed indicator is calibrated to read correct when at standard sea level conditions and thus has a com- pressibility correction appropriate for these conditions. However, when the aircraft is operating above standard sea level altitude,\n\nRevised January 1965", - "page_start": 28, - "page_end": 28, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-SOT-80 BASIC AERODYNAMICS\n\nthe inherent compensation is inadequate and additional correction must be applied. The subtractive corrections that must be applied to CA$ depend on pressure altitude and CAS and are shown on figure 1.6 for the subsonic flight range. The equivalent airspeed (EAS) is the flight speed in the standard sea level air mass which would produce the same free stream dynamic pressure as the actual flight condition. (4) The true airspeed (TAS) results when the &4X is corrected for density altitude. Since the airspeed indicator is calibrated for the dynamic pressures corresponding to airspeeds at standard sea level conditions, variations in air density must be accounted for. To relate EAS and TAX requires con- sideration that the EAS coupled with stand- .ard sea level density produces the same dy- namic pressure as the TAX Soupled with the ^^_._^ 1 .:.. 2---:... ,.f *L., bl:A.* rnrJ;r;m.. dCLUd, ‘all UcIIJIcy “I L11L “‘6°C C”IIUACI”L‘. From this reasoning, it can be shown that:\n\n(TAS)2p=(EAS)2 po\n\nd\n\n- or, TAS=EAS 62 P\n\nTAS= EAS 2 4\n\nwhere TAX= true airspeed EAS=equivalent airspeed p=actual air density PO= standard sea level air density n=altitude density ratio, p/pa\n\nThe result shows that the TAX is a function of EAS and density altitude. Figure 1.6 shows a chart of density altitude as a function of pressure altitude and temperature. Each par- ticular density altitude fixes the proportion between TAX and EAS. The use of a naviga- tion computer requires setting appropriate values of pressure altitude and temperature on the scales which then fixes rhe proportion be- tween the scales of TAS and EAS (or TAS and CAS when compressibiliry corrections are applicable).\n\nRevlted Jmuoy 1965\n\n14\n\nThus, the airspeed indicator system measures dynamic pressure and will relate true flight velocity when instrument, position, compress- ibility, and density corrections are applied. These corrections are quite necessary for ac- curate determination of true airspeed and accurate navigation. Bernoulli’s principle and the concepts of static, dynamic, and total pressure are the basis of aerodynamic fundamentals. The pressure distribution caused by the variation of local stack and dynamic pressures on a surface is the source of the major aerodynamic forces and moment.\n\nDEVELOPMENT OF AERODYNAMIC FORCES\n\nThe typical airflow patterns exemplify the relationship of static pressure and velocity defined by Bernoulli. Any object placed in an airstream will have the a& to impact or stag- nate at some point near the leading edge. The pressure at this point of stagnation will be an absolute static pressure equal to the total pres- sure of the airstream. In other words, the static pressure at the stagnation point will be greater than the atmospheric pressure by the amount of the dynamic pressure of the air- stream. As the flow divides and proceeds around. the object, the increases in local ve- locity produce decreases in static pressure. This procedure of flow is best illustrated by the flow patterns and pressure distributions of figure 1.7. STREAMLINE PATTERN AND PRES- SURE DISTRIBUTION. The flow pattern of the cylinder of figure 1.7 is characterized by the streamlines which denote the local flow direction. Velocity distribution is noted by the streamline pattern since the streamlines effect a boundary of flow, and the airflow between the streamlines is similar to flow in a closed tube. When the streamlines contract and are close together, high local velocities exist; when the streamlines expand and are far apart, low local velocities exist. At the", - "page_start": 31, - "page_end": 31, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS OO-801-8O TABLE OF CONTENTS\n\n## TABLE OF CONTENTS\n\nPREFACE.. ,., . iii\n\nCHAPTER I: BASIC AERODYNAMICS\n\nWING AND AIRFOIL FORCES\n\nPROPERTIES OF THE ATMOSPHERE. 1\n\nStatic pressure Temperature Density Viscosity Standard atmosphere Pressure altitude Density altitude\n\nBERNOULLI’S PRINCIPLE AND SUBSONIC AIRFLOW.. 4\n\nBernoulli’s equation,\n\nIncompressible tlow\n\n6\n\nVariation of static pressure and velocity Kinetic and porcntial energy of flow Static and dynamic prcssurc, 4 Factors affecting dynamic pressure\n\nAirspeed measurement.. . .\n\nStagnation prcssurc\n\n9\n\nMeasurement of dynamic pressure Pitot and static sources Indicated airspeed\n\nDEVELOPMENT OF AERODYNAMIC FORCES..\n\nStreamline pattern and pressure distribution. Generatioaoflift..........................................\n\nCirculation Pressure distribution\n\n....... 14\n\n....... 14 ....... 16\n\nAirfoil terminology. Aerodynamic force coefficient . . ‘,:\n\nBasic lift equation 2 3\n\nLift coefficient Dynamic prcssurc and surface area\n\n”", - "page_start": 6, - "page_end": 6, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00401-80 BASIC AERODYNAMICS\n\nthe pressure forces created on an aerodynamic surface can be studied in a simple form which at first neglects the effect of friction and vis- cosity of the airflow. The most appropriate means of visualizing the effect of airflow and the resulting aerodynamic pressures is to study the fluid flow within a closed tube.\n\nSuppose a stream of air is flowing through the tube shown in figure 1.2. The airflow at station 1 in the tube has a certain velocity, static pressure, and density. As the airstream approaches the constriction at station 2 certain changes must take place. Since the airflow is enclosed within the tube, the mass flow at any point along the tube must be the same and the velocity, pressure, or density must change to accommodate this continuity of flow.\n\nBERNOULLI’S EQUATION. A distin- guishing feature of submnic airflow is that changes in pressure and velocity take place with sniall and negligible changes in density. For this reason the study of subsonic airflow can be simplified by neglecting the variation of density in the flow and assuming the flow to be incomprmiblc. Of course, at high flow speeds whjch approach the speed of sound, the flow must be considered as compressible and “compressibility effects” taken into account. However, if the flow through the tube of figure 1.2 is considered subsonic, the density of the airstream is essentially constant at all sta- tions along the length.\n\nIf the density of the flow remains constant, static pressure and velocity are the variable quantities. As the flow approaches the con- striction of station 2 the velocity must increase to maintain the same mass flow. As the velocity increases the static pressure will de- crease and the decrease in static pressure which accompanies the increase in velocity can be verified in two ways:\n\n(I) Newton’s laws of motion state the requirement of an unbalanced force to pro- duce an acceleration (velocity change). If the airstream experiences an increase in veloc- ity approaching the constriction, there must\n\nbe an unbalance of force to provide the ac- celeration. Since there is only air within the tube, the unbalance of force is provided by the static pressure at station 1 being greater than the static pressure at the constriction, station 2. (2) The total energy of the air stream in the tube is unchanged. However, the air- .’ stream energy may be in two forms. The airstream may have a potential energy which is related by the static pressure and a kimtic energy by virtue of mass and motion. As the total energy is unchanged, an increase in velocity (kinetic energy) will be accompa- nied by a decrease in static pressure (poten- tial energy). This situation is analagous to a ball rolling along-a smooth surface. As the ball rolls downhill, the potential energy due to position is exchanged for kinetic energy of motion. If .friction- were negli- gibie, the change of potential energy would equal the change in ki,netic energy. This- is also the case for the airflow within the tube.\n\nThe relationship of static pressure and veloc- ity is maintained throughout the length of the tube. As the flow moves past the constriction toward station 3, the velocity decreases and the static pressure increases. The Bernoulli equation for incompressible flow is most readily explained ,by accounting for the energy of the~airflow within the tube. As the airstream has no energy added or sub- tracted at any point, the sum of the potential +id kinetic energy must be constant. The kinetic energy of an object is found by:\n\n“KE. =%MV=\n\nwhere K;E. = kinetic energy, ft.-lbs.\n\nM = mass, slugs V’=velocity, ft./set. The kinetic energy of a cubic foot of air is: K&x,,\n\nwhere g= kinetic energy per cu. ft., psf\n\np=air density, slugs per cu. ft. V=ait velocity, ft./set.\n\n6", - "page_start": 23, - "page_end": 23, - "source_file": "00-80T-80.pdf" - }, - { - "text": "PlAVWEPS 00-8OT-80 BASIC AERODYNAMICS\n\nThis relationship has great application in aerodynamics and is quite fundamental and necessary in certain parts of airplane perform- ance. VISCOSITY. The viscosity of the air is important in scale and friction effects. The coefficient of absolute viscosity is the propor- tion between the shearing stress and velocity gradient for a fluid flow. The viscosity of gases is unusual in that the viscosity is gen- erally a function of temperature alone and an increase in temperature increases the viscosity. The coefficient of absolute viscosity is assigned the shorthand notation I, (mu). Since many parts of aerodynamics involve consideration of viscosity and density, a more usual form of viscosity measure is the proportion of the co- efficient of absolute viscosity and density. This combination is termed the “kinematic viscosity” and is noted by Y (nu).\n\nkinematic viscosity\n\ncc <sup>coefficient of absolute viscosity</sup> density\n\nv=PlP\n\nThe kinematic viscosity of air at standard sea level conditions is 0.0001576 square feet per second. At an altitude of 40,000 feet the kinematic viscosity is increased to 0.0005059 square foot per second. In order to provide a common denominator for comparison of various aircraft, a standard atmosphere has been adopted. The standard atmosphere actually represents the mean or average properties of the atmosphere. Figure 1.1 illustrates the variation of the most im- portant properties of the air throughout the standard atmosphere. Notice that the lapse rate is constant in the troposphere and the stratosphere begins with the isothermal region. Since all aircraft performance is compared and,evaluated in the environment of the stand- ard atmosphere, all of the aircraft instrumenta- tion is calibrated for the standard atmosphere.\n\nThus, certain corrections must apply to the instrumentation as well as the aircraft per- formance if the operating conditions do not fit the standard atmosphere. In order to prop- erly account for the nonstandard atmosphere certain terms must be defined. Pressure .&itudc is the altitude in the standard atmosphere corresponditrg to a particular pressure. The aircraft altimeter is essentially a sensitive barometer calibrated to indicate altitude in the staotlard atmosphere. If the altimeter is set for 29.92 in. Hg the altitude indicated is the pressure altitude-the altitude in the stand- ard atmosphere corresponding to the sensed pressure. Of course, this indicated pressure altitude may not be the actual height above sea level due to variations in remperature, lapse rate; atniospheric pressure, and possible errors in the sensed pressure. The more appropriate term for correlating aerodynamic performance in the nonstandard atmosphere is density &it&-the altitude in the standard atmosphere corresponding to a particular value of air density. The computa- tion of density altitude must certainly involve consideration of pressure (pressure altitude) and temperature. Figure 1.6 illustrates the manner in which pressure altitude and tem- perature combine to produce a certain density altitude. This chart is quite standard in use and is usually included in the performance section of the flight handbook. Many subject areas of aerodynamics and aircraft performance will emphasize density altitude and temperature as the most important factors requiring con- sideration.\n\nBERNOULLI’S PRINCIPLE AND SUBSONIC AIRFLOW\n\nAll of the external aerodynamic forces on a surface are the result of air pressure or air fric- tion. Friction effects are generally confined to a thin layer of air in the immediate vicinity of the surface and friction forces are not the pre- dominating aerodynamic forces. Therefore,\n\n4", - "page_start": 21, - "page_end": 21, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-601-60 HIGH SPEED AERODYNAMICS\n\nin pressure without apparent changes in den- sity. Such a condition of airflow is analogous to the flow of water, hydraulic fluid, or any other incompressible fluid. However, at high flight speeds the pressure changes that take place are quite large and significant changes in air density occur. The study of airflow at high speeds must account for these changes 1 in air density and must consider that the 1 air is compressible and that there will be “compressibility effects.” A factor of great importance in the study of high speed airflow is the speed of sound. The speed of sound is the rate at which small pressure disturbances will be propagated through the air and this propagation speed is solely a function of air temperature. The accompanying table illustrates the variation of the speed of sound in the standard atmosphere.\n\nTABLE 3-I. V.r;afIm < Altitude in ,I T< the -\n\n--\n\n-\n\nD F. - c. K?uI, 59.0 15.0 661.7 41.1 5.1 650.3 23.3 -4.8 6%. 6 5.5 -14.7 6X6.7 --12., --24.6 614.6 --30.2 -34.5 602.2 -48.0 -44.4 589.6 -65.8 --w.3 516.6 -69.7 -56.5 573:s -69.1 -56.5 573.8 -69.7 -56.5 573.8\n\nAs an object moves through the air mass, velocity and pressure changes occur which create pressure disturbances in the airflow sur- rounding the object. Of course, these pressure disturbances are propagated through the air at the speed of sound. If the object is travel- ling at low speed the pressure disturbances are propagated ahead of the object and the airflow immediately ahead of the object is influenced by the pressure field on the object. Actually, these pressure disturbances are transmitted in all directions and extend indefinitely in all\n\ndirections. Evidence of this “pressure warn- ing’ ’ is seeii in the typical subsonic flow pattern of figure 3.1 where there is upwash and flow direction change well ahead of the leading edge. If the object is travelling at some ,speed above the speed of sound the air- flow ahead of the object will not be influenced by the pressure field on the object since pres- -sure disturbances cannot. be propagated ahead of the object. Thus, as the flight speed nears the speed of sound a compression wave will form at the leading edge and all changes in velocity and pressure will take place quite sharply and suddenly. The airflow, ahead of the object is not influenced until the air par- ticles are suddenly forced out .of the way by the concentrated pressure wave set up by the object. Evidence of this phenomenon is seen in the typical supersonic flow pattern of figure 3.1. The analogy of surface waves on the water may help clarify these phenomena. Since a surface wave is simply the propagation of a pressure disturbance, a ship moving at a speed much less than the wave speed will not form a “bow wave.” As the. ship’s speed nears the wave pro$agation speed the bow wave will form and become stronger as speed is increased beyond the wave speed. At this point it should become apparent that all compressibility effects depend upon the relationship of airspeed to the speed of sound. The term used to describe this rela- tionship is the Mach number, M, and this term is the ratio of the true airspeed to the speed of sound. ,-I M=;\n\nwhere M=Mach number V= true airspeed, knots d= speed of sound, knots =a& aO=speed of sound at standard sea level conditions, 661 knots e= temperature ratio = T/T,\n\nRevised January 1965", - "page_start": 219, - "page_end": 219, - "source_file": "00-80T-80.pdf" - }, - { - "text": "by the local flow changes at these surfaces. Of course, the strength of the shock waves and the pressure jump through the wave decreases rapidly with distance away from the airplane. While the pressure jump through the shock wave decreases with distance away from the surface, it does not disappear com- pletely and a measurable-but very small- pressure will exist at a considerable distance from the airplane. Sound is transmitted through the air as a series of very weak pressure waves. In the ordinary range of audible frequencies, the threshold of audibility for intensity of sound is for pressure waves with an approximate R.M.S. value of pressure as low as 0.0000002 psf. Within this same range of frequencies, the threshold of feeling for intensity of sound is for pressure values with an approximate R.M.S. value of pressure of 0.2 to 0.5 psf. Continuous sound at the threshold of feeling is of the intensity to cause painful hearing. Thus, the shock waves generated by an air- plane in supersonic flight are capable of creat- ing audible sound and, in the extreme case, can be of a magnitude to cause considerable dis- turbance. Pressure jumps of 0.02 to 0.3 psf have been recorded during the passage of an airplane in supersonic flight. As a result, the sonic “booms” are the pressure waves generated by the shock waves formed on the airplane in supersonic flight. The source of sonic booms is illustrated by figure 6.14. When the airplane is in level supersonic flight, a pattern of shock waves is developed which is much dependent on the configuration and flight Mach number of the airplane. At a considerable distance from the airplane, these shock waves tend to combine along two common fronts and extend away from the airplane in a sort of conical surface. The waves decrease in strength with distance away from the airplane but the pressure jump remains of an audible intensity for a consider- able distance from the airplane. If the wave extends to the ground or water surface, it will\n\nNAVWEPS OD-8OT-RO APP,LICATlON OF AERODYNAMICS TO SPECIFIC PROBLEMS OF FLYING", - "page_start": 414, - "page_end": 414, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "00-80T-80.pdf", - "query": "What is the phenomenon associated with the production of lift by an airfoil ?", - "target_page": 34, - "target_passage": "An important phenomenon associated with the production of lift by an airfoil is the “circulation” parted to the airstream. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "NAVWEPS 00-801-80 BASIC AERODYNAMICS\n\nrotation will be quite a “curve ball artist” the golfer that cannot control the lateral mo- tion of the club face striking the golf ball will impart an uncontrollable spin and have trouble with a “hook” or “slice.” While a rotating cylinder can produce a net lift from the circulatory flow, the method is relatively inefficient and only serves to point out the relationship between lift and circula-, tion. An airfoil is capable of producing lift with relatively high efficiency and the process is illustrated in figure 1.8. If a symmetrical airfoil is placed at zero angle of attack to the airstream, the streamline pattern and pressure distribution give evidence of zero lift. HOW- ever, if the airfoil is given a positive angle of attack, changes occur in the streamline pattern and pressure distribution similar to changes caused by the addition of circulation to the cylinder. The positive angle of attack causes increased velocity on the upper surface with an increase in upper surface suction while the decreased velocity on the lower surface causes a decrease in lower surface suction. Also, upwash is generated ahead of the airfoil, the forward stagnation point moves under the leading edge, and a downwash is evident aft of the airfoil. The pressure distribution 0” the airfoil now provides a net force perpendicu- lar to the airstream-lift. The generation of lift by an airfoil is depend- ent upon the airfoil being able to create circu- lation in the airstream and develop the lifting, pressure distribution on the surface. In all cases, the generated lift will be the net force caused by the distribution of pressure over the upper and lower surfaces of the airfoil. At low angles of attack, suction pressures usually will exist on both upper and lower surfaces. but the upper surface suction must be greater for positive lift. At high angles of attack near that for maximum lift, a positive pressure will exist on the lower surface but this will account for approximately one-third the net lift.", - "page_start": 37, - "page_end": 37, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS DD-BOT-80 BASIC AERODYNAMICS\n\nCAMBERED AIRFOIL UPPER DEVELOPING POSITIVE LIFT\n\nNET LIFT\n\nLOWER SURFACE LIFT\n\nSYMMETRICAL AIRFOIL AT ZERO LIFT CAMBERED AIRFOIL AT ZERO LIFT\n\nUPPER SURFACE\n\nLOWER SURFACE LIFT\n\nSYMMETRICAL AIRFOIL AT POSITIVE LIFT\n\nUPPER SURFACE LIFT\n\nLOWER SURFACE LIFT\n\nt\n\nCHANGE IN LIFT\n\n+\n\nO.C.\n\nA- UPPER SURFACE\n\nFLOWER SURFACE LIFT\n\nCAMBERED AIRFOIL AT POSITIVE LIFT A- UPPER SURFACE LIFT\n\nLOWER SURFACE LIFT\n\nk-\n\nCHANGE IN LIFT\n\nc + PITCHING MOMENT\n\n0.e.\n\n### Figure 1.27. Development of Pitching Moments\n\n48", - "page_start": 65, - "page_end": 65, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00-801~0 BASIC AERODYNAMICS\n\nnet lift produced by the airfoil is difference between the lifts on the upper and lower sur- faces. The point along the chord where the distributed lift is effectively concentrated is termed the “center of pressure, c.p.“ The center of pressure is essentially the “center of gravity” of the distributed lift pressure and the location of the c.p. is a function of camber and section lift coe&cient Another aerodynamic reference point is the “aerodynamic center, d.e.” The aerodynamic center is defmed as the point along the chord where all changes in lift effectively take place. To visualize the existence of such a point, notice the change in pressure distribution with angle of attack for the symmetrical airfoil of figure 1.21. When at zero lift, the upper and lower surface lifts are equal and located at the same point. With an increase in angle of attack, the upper surface lift increases while the lower surface lift decreases. The change ,of lift has taken place with no change in the center of pressure-a characteristic of sym- metrical airfoils. Next, consider the cambered airfoil of figure 1.21 at zero lift. To produce zero lift, the upper and lower surface lifts must be equal. One difference noted from the symmetrical air- foil is that the upper and lower surface lifts are not opposite one another. While no net lift exists on the airfoil, the couple produced by the upper and lower surface lifts creates a nose down moment. As the angle of attack is in- creased, the upper surface lift increases while the lower surface lift decreases. While a change in lift has taken place, no change in moment takes place about the point where the lift change occurs. Since the moment about the aerodynamic center is the product of a force (lift at the c.P.) and a lever arm (distance from c.9. to a.~.), an increase in lift moves the center of pressure toward the aero- dynamic center. It should be noted that the symmetrical air- foil at zero lift has no pitching moment about the aerodynamic center because the upper and\n\n47", - "page_start": 64, - "page_end": 64, - "source_file": "00-80T-80.pdf" - }, - { - "text": "The effect of free stream density and velocity is a necessary consideration when studying the development of the various aerodynamic forces. Suppose that a particular shape of airfoil is fixed at a particular angle to the airstream. The relative velocity and pressure distribution will be determined by the shape of the airfoil and the angle to the airstream. The effect of varying the airfoil size, air density and air- speed is shown in figure 1.9. If the same air- foil shape is placed at the same angle to an airstream with twice as great a dynamic pres- sure the magnitude of the pressure distribution will be twice as great but the r&rive shape of the pressure distribution will be the same. With twice as great a pressure existing over the surface, all aerodynamic forces and mo- ments will ~double. If a half-size airfoil ib placed at the same angle to the original air- stream, the magnitude of the pressure distri- bution is the same as the origina! airfoi! and again the relative shape of the pressure dis- tribution is identical. The same pressure act- ing on the half-size surface would reduce all aerodynamic forces to one-half that of the original. This similarity of flow patterns means that the stagnation point occurs at the same place, the peak suction pressure occurs at the same place, and the actual magnitude of the aerodynamic forces and moments depends upon the airstream dynamic pressure and the surface area. This concept is extremely im- portant when attempting to separate and ana- lyze the most important factors affecting the development of aerodynamic forces. AIRFOIL TERMINOLOGY. Since the shape of an airfoil and the inclination to the airstream are so important in determining the pressure distribution, it is necessary to properly define the airfoil terminology. Figure 1.10 shows a typical airfoil and illustrates the various items of airfoil terminology (1) The chord line is a straight line connect- ing the leading and trailing edges of the airfoil.\n\n20", - "page_start": 37, - "page_end": 37, - "source_file": "00-80T-80.pdf" - }, - { - "text": "and high power, the dynamic pressure in the shaded area can be much greater than the free stream and this causes considerably greater lift than at zero thrust. At high power con- ditions the induced flow also causes an effect similar to boundary layer control and increases the maximum lift angle of attack. The typical four-engine propeller driven airplane may have 60 to 80 percent of the wing area affected by the induced flow and power effects on stall speeds may be considerable. Also, the lift of the airplane at a given angle of attack and air- speed will be greatly affected. Suppose the airplane shown is in the process of landing flare from a power-on approach. If there is a sharp, sudden reduction of power, the air- plane may drop suddenly because of the reduced lift. The typical jet aircraft does not experience the induced flow velocities encountered in propeller driven airplanes, thus the only sig- nificant factor is the vertical component of thrust. Since this vertical component con- tributes to supporting the airplane, less aero- dynamic lift is required to hold the airplane in flight. If the thrust is small and the thrust inclination is slight at maximum lift angle, only negligible changes in stall speed will re- sult. On the other hand, if the thrust is very great and is given a large inclination at maxi- mum lift angle, the effect on stall speed can be very large. One important relationship remains-since there is very little induced flow from the jet, the angle of attack at stall is essentially the same power-on or power-off.\n\nDEVELOPMENT OF AERODYNAMIC PITCHING MOMENTS\n\nThe distribution of pressure over a surface is the ,source of the aerodynamic moments as well as the aerodynamic forces. A typical example of this fact is the pressure distribution acting on the cambered airfoil of figure 1.21. The upper surface has pressures distributed which produce the upper surface lift; the lower surface has pressures distributed which pro- duce the lower surface lift. Of course, the\n\nNAVWEPS 00-801~0 BASIC AERODYNAMICS", - "page_start": 64, - "page_end": 64, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS WOT-BO BASIC AERODYNAMICS\n\nangle of attack indicator allows precision con- trol of the airspeed. The accomplished insttu- ment pilot is the devotee of “attitude” flying technique-his creed being “attitude plus power equals performance.” During a GCA approach, the professional instrument pilot controls airspeed with stick (angle of attack) and rate of descent with power adjustment. Maneuvering flight and certain transient conditions of flight tend to complicate the relationship of angle of attack and airspeed. However, the majority of flight and, certainly, the most critical regime of flight (takeoff, ap- proach, and landing), is conducted in essen- tially steady flight condition. AIRFOIL LIFT CHARACTERISTICS. Air- foil section properties differ from wing or airplane properties because of the effect of the planform. Actually, the wing may have vati- ous airfoil sections from root to tip with taper, twist, sweepback and local flow components in a spanwise direction. The resulting aeto- dynamic properties of the wing are determined by the action of each section along the span and the three-dimensional flow. Airfoil sec- tion properties are derived from the basic shape or profile in two-dimensional flow and the force coefficients are given a notation of lower case letters. For example, a wing or airplane lift coefficient is C, while an airfoil section lift coefficient is termed cr. Also, wing angle of attack is Q while section angle of attack is differentiated by the use of 01~. The study of section properties allows an objective consider- ation of the effects of camber, thickness, etc. The lift characteristics of five illustrative airfoil sections are shown in figure 1.12. The section lift coe&icient, c,, is plotted versus section angle of attack, olO, for five standard NACA airfoil profiles. One characteristic fea- ture of all airfoil sections is that the slope of the various lift curves is essentially the same. At low lift coefhcients, the section lift coeffi- cient increases approximately 0.1 for each degree increase in angle of attack. For each of the airfoils shown, a S’ change in angle of\n\n27", - "page_start": 44, - "page_end": 44, - "source_file": "00-80T-80.pdf" - }, - { - "text": "basic section. The effect of a fixed slot on the lift characteristics is shown in figure 1.18.\n\n.UO~J ana’ &Z~J can produce significant in- creases in cl, but the increased angle of attack for maximum lift can be a disadvantage. If slots were the only high lift device on the wing, the high take off and landing angles of attack may complicate the design of the landing gear. For this reason slots or slats are usually used in conjunction with flaps since the flaps provide reduction in the maxi- mum lift angle of attack. The use of a slot has two important advantages: there is only a negligible change in the pitching moment due to the slot and no significant change in section drag at low angles of attack. In fact, the slotted section will have less drag than the basic section near the maximum lift angle for the basic section.\n\nThe slot-slat device finds great application in modern airplane configurations. The tail- less airplane configuration can utilize only the high lift devices which have negligible effect on the pitching moments. The slot and slat are often used to increase the cl- in high speed flight when compressibility effects are con- siderable. The small change in twisting mo- ment is a favorable feature for any high lift device to be used at high speed. Leading edge high lift devices are more effective on the highiy swept wing than trailing edge flaps since slats are quite powerful in controlling the flow pattern. Small amounts of local camber added to the leading edge as a high lift device is most effective on wings of very low thick- ness and sharp leading edges. Most usually the slope of the leading edge high lift device is used to control the spanwise lift distribution on the wing.\n\n‘Boundary larcr control devices are additional means of increasing the maximum lift coe&- cient of a section. The thin layer of airflow adjacent to the surface of an airfoil shows re- duced local velocities from the effect of skin friction. When at high angles of attack this boundary layer on the upper surface tends to\n\nNAVWEPS OO-BOT-RO BASIC AERODYNAMICS", - "page_start": 60, - "page_end": 60, - "source_file": "00-80T-80.pdf" - }, - { - "text": "However, if high speed flight is the primary consideration, the airfoil must be chosen to have. the highest practical critical Mach number. Critical Mach number has been defined as the flight Mach number which produces first evidence of local sonic flow. Thus, the air- foil shape and lift coe&ient-which determine the pressure and velocity distribution-will have a profound effect on critical Mach number. Conventional, low speed airfoil shapes have relatively poor compressibility characteristics because of the high local velocities near the leading edge. These high local velocities are inevitable if both the maximum thickness and camber are well forward on the chord. An improvement of the compressibility character- istics can be obtained by moving the points of maximum camber and thickness aft on the chord. This would distribute the pressure and velocity more evenly along the chord and produce a lower peak velocity for the same lift coefficient. Fortunately, the airfoil shape to provide extensive lamiaar flow and low profile drag in low speed, subsonic flight will provide a pressure distribution which is favor- able for high speed flight. Figure 3.12 illustrates the pressure distributions and variation of critical Mach number with lift coefficient for a conventional low speed airfoil and a high speed section. In order to obtain a high critical Mach number from an airfoil at some low lift coefficient the section must have: (u) Low thickness ratio. The point of maximum thickness should be aft to smooth the pressure distribution. (6) Low camber. The mean camber line should be shaped to help minimize the local velocity peaks. In addition, the higher the required lift coefficient the lower the critical Mach number and more camber is required of the airfoil. If supersonic flight is a possibility the thick- ness ratio and leading edge radius must be small to decrease wave drag.\n\nNAVWEPS 00-801-80 HIGH SPEED AERODYNAMICS\n\nFigure 3.13 shows the flow patterns for two basic supersonic airfoil sections and pro- vides the approximate equations for lift,drag, and lift curve slope. Since the wave drag is the only factor of difference between -the two airfoil sections, notice the configuration fac- tors which affect the wave drag. For the same thickness ratio, the circular arc airfoil would have a larger wedge angle formed between the upper and lower surfaces at the leading edge. At the same flight Mach num- ber the larger angle at the leading edge would form the stronger shock wave at the nose and cause a greater pressure change on the circular arc airfoil. This same principle applies when investigating the effect of airfoil thickness. Notice that the wave drag coefficients for both airfoils vary as the SQUARE of the thickness ratio, e.g., if the thickness ratio were doubled, the wave drag coefhcient would he four times as great. If the thickness were increased, the airflow at the leading edge will experience a greater change in direction and a stronger shock wave will be formed. This powerful variation of wave drag with thick- ness ratio necessitates the use of very thin air- foils with sharp leading edges for supersonic flight. An additional consideration is that thin airfoil sections favor the use of low aspect ratios and high taper to obtain lightweight structures and preserve stiffness and rigidity.", - "page_start": 240, - "page_end": 240, - "source_file": "00-80T-80.pdf" - }, - { - "text": "NAVWEPS 00.401-80 BASIC AERODYNAMICS\n\nThus, a sea level airspeed (or EAS) of 100 knots would provide the dynamic pressure necessary at maximum lift to produce 14,250 Ibs. of lift. If the airplane were operated at a higher weight, a higher dynamic pressure would be required to furnish the greater lift and a higher stall speed would result. If the airplane were placed in a steep turn, the greater lift required in the turn would increase the stall speed. If the airplane were flown at a higher density altitude the TAX at stall would increase. However, one factor common to each of these conditions is that the angle of attack at C,,,, is the same. It is important to\n\nrealize that stall warning devices must sense angle of attack (a) or pressure distribution (related to CL). Another important fact related by the basic lift equation and lift curve is variation of angle of attack and lift coefficient with airspeed. Suppose that the example airplane is flown in steady, wing 1eveJ flight at various airspeeds with lift equal to the weight. It is obvious that an increase in airspeed above the stall speed will require a corresponding decrease in lift coeflicient and angle of attack to maintain steady, lift-equal-weight flight. The exact relationship of lift coefficient and airspeed is evolved from the basic lift equation assuming constant lift (equal to weight) and equivaIent airspeeds.\n\nderived from study of the basic lift equation and the typical wing lift curve. One impor- tant fact to be appreciated is that the airplane shown in figure 1.11 stalls at the same angle of attack regardless of weight, dynamic pres- sure, bank angle, etc. Of course, the stall speed of the aircraft will be affected by weight, bank angle, and other factors since the product of dynamic pressure, wing area, and lift co- efficient must produce the required lift. A rearrangement of the basic lift equation de- fines this relationship.\n\nL = c&Y\n\nusing q =$ (I’ in knots, TAX)\n\nsolving for V, -\n\nV=17.2 & J L,J\n\nSince the stall speed is the minimum flying speed necessary to sustain flight, the lift co- efficient must be the maximum (CL,,,,). Suppose that the airplane shown in’ figure 1.11 has the following properties:\n\nWeight = 14,250 lbs\n\nWing area=280 sq. ft.\n\nC &=1.5\n\nIf the airplane is flown in steady, level flight at sea level with lift equal to weight the stall speed would be: ,-\n\nV.= 17.24&$\n\nwhere V.= stall speed, knots TAS\n\nW= weight, lbs. (lift = weight)\n\nva= 17.2 J (I.&4E;280)\n\n= 100 knots\n\nC‘ v, p -= - C %n.* 0 V\n\nThe example airplane was specified to have:\n\nWeight = 14,250 lbs. C L,,,=lS V,= 100 knots EAS\n\nThe following table depicts the lift coefficients and angles of attack at various airspeeds in steady flight.\n\n25", - "page_start": 42, - "page_end": 42, - "source_file": "00-80T-80.pdf" - }, - { - "text": "attack would produce an approximate 0.5 change in lift coefficient. Evidently, lift,~curve slope is not a factor important in the selection of an airfoil. An important lift property affected by the airfoil shape is the section maximum lift co- efficient, ci-. The effect of airfoil shape on ci- can be appreciated by comparison of the lift curves for the five airfoils of figure 1.12. The NACA airfoils 63X06,63-009, and 63i-012 ate symmetrical sections of a basic thickness distribution but maximum thicknesses of 6, 9, and 12 percent respectively. The effect of thickness on ~1% is obvious from an inspec- tion of these curves :\n\nNACA 63-005 .~. :. Cl.82 9.0° NACA 6Mo9. 1.10 10.5~ NACA 63‘-01?,. 1.40 13.80\n\nThe 12-percent section has a cr- approxi- mately 70 percent greater than the 6-percent thick section. In addition, the thicker airfoils have greater benefit from the use of various high lift devices. The effect of camber is illustrated by the lift curves of the NACA 4412 and 631-412 sections. The NACA 4412 section is a 12 percent thick airfoil which has 4 percent maximum camber located at 40 percent of the chord. The NACA 63i-412 airfoil has the same thickness and thickness distribution as the 631-012 but camber added to give a “design”’ lift coefficient (c, for minimum section drag) of 0.4. The lift curves for these two airfoils show that camber has a beneficial e&t on cl-.\n\nScCdO” %.I a0 for “&*\n\nNACA 6h-312 (symmctricd) :. 1.40 13.e NACA 631-412 Whmd). 1.73 IS. z”\n\nAn additional effect of camber is the change in zero lift angle. While the symmetrical\n\nNAVWEPS OO-BOT-BO BASIC AE,RODYMAMlCS\n\nsections have zero lift at zero angle of attack, the sections with positive camber have nega- tive angles for zero lift. The importance of maximum lift coefficient is obvious. If the maximum lift coefficient is high, the stall speed will be low. However, the high thickness and camber necessary for high section maximum lift coefficients may produce low critical Mach numbers and large twisting moments at high speed. In other words, a high maximum lift coefficient is just one of the many features desired of an airfoil section. DRAG CHARACTERISTICS. Drag is the net aerodynamic force parallel to the relative wind and its source is the pressure distribution and skin friction on the surface. Large, thick bluff bodies in an airstream show a predomi- nance of form drag due to the unbalanced pres- sure distribution. However, streamlined bodies with smooth contours show a ptedomi- nance of drag due to skin friction. In a fashion similar to other aerodynamic forces, drag forces may be considered in the form of a coefficient which is independent of dynamic pressure and surface area. The basic drag equation is as follows: D=GqS where D=drag, lbs. C,= drag coefficient q= dynamic pressure, psf UP =z (V in knots, TAS)\n\nS= wing surface area, sq. ft. The force of drag is shown as the product of dynamic pressure, surface area, and drag co- efficient, C,. The drag coefficient in this equation is similar to any other aerodynamic force coefficient-it is the ratio of drag pres- sure to dynamic pressure. If the drag co- efficient of a conventional airplane were plotted versus angle of attack, the result would be typical of the graph shown in figure 1.13. At low angles of attack the drag coefficient is low and small changes in angle of attack create only slight changes in drag coefficient. At\n\n29", - "page_start": 46, - "page_end": 46, - "source_file": "00-80T-80.pdf" - } - ] - }, - { - "references": { - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", - "query": "What are the recyclable waste ?", - "target_page": 3, - "target_passage": "All types of paper and cardboard, Metal packaging, even the smallest ones, Plastic bottles and flasks, All other packaging", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "*Transfer and Disposal Services.* We own or operate 96 transfer stations. We deposit waste at these\n\nstations, as do other private haulers and municipal haulers, for compaction and transfer to trailers for transport\n\nto disposal sites or recycling facilities. As of December 31, 2004, we owned or operated 58 landÑlls, which had\n\napproximately 8,904 permitted acres and total available permitted and probable expansion disposal capacity of\n\napproximately 1.7 billion in-place cubic yards. The in-place capacity of our landÑlls is subject to change based\n\non engineering factors, requirements of regulatory authorities and the ability to expand our sites successfully.\n\nSome of our landÑlls accept non-hazardous special waste, including utility ash, asbestos and contaminated\n\nsoils. See \"\"Ì Properties.''\n\nMost of our existing landÑll sites have the potential for expanded disposal capacity beyond the currently\n\npermitted acreage. We monitor the availability of permitted disposal capacity at each of our landÑlls and\n\nevaluate whether to pursue expansion at a given landÑll based on estimated future waste volumes and prices,\n\nmarket needs, remaining capacity and likelihood of obtaining an expansion. To satisfy future disposal demand,\n\nwe are currently seeking to expand permitted capacity at certain of our landÑlls, although no assurances can be\n\nmade that all future expansions will be permitted as designed.\n\n*Other Services.* We have 35 materials recovery facilities and other recycling operations, which are\n\ngenerally required to fulÑll our obligations under long-term municipal contracts for residential collection\n\nservices. These facilities sort recyclable paper, aluminum, glass and other materials. Most of these recyclable\n\nmaterials are internally collected by our residential collection operations. In some areas, we receive\n\ncommercial and industrial solid waste that is sorted at our facilities into recyclable materials and non-\n\nrecyclable waste. The recyclable materials are salvaged, repackaged and sold to third parties and the non-\n\nrecyclable waste is disposed of at landÑlls or incinerators. Wherever possible, our strategy is to reduce our\n\nexposure to Öuctuations in recyclable commodity prices by utilizing third party recycling facilities, thereby\n\nminimizing our recycling investment.\n\nWe provide remediation and other heavy construction services primarily through our subsidiary located in\n\nMissouri.\n\nWe also have a Texas-based compost, mulch and soil business at which yard, mill and other waste is\n\nprocessed, packaged and sold as various products.\n\n####### **Sales and Marketing**\n\nWe seek to provide quality services that will enable our company to maintain high levels of customer\n\nsatisfaction. We derive our business from a broad customer base which we believe will enable our company to\n\nexperience stable growth. We focus our marketing eÅorts on continuing and expanding business with existing\n\ncustomers, as well as attracting new customers.\n\nWe employ approximately 500 sales and marketing employees. Our sales and marketing strategy is to\n\nprovide high-quality, comprehensive solid waste collection, recycling, transfer and disposal services to our\n\ncustomers at competitive prices. We target potential customers of all sizes, from small quantity generators to\n\nlarge \"\"Fortune 500'' companies and municipalities.\n\nMost of our marketing activity is local in nature. However, in 2000 we initiated a national accounts\n\nprogram in response to our customers' needs.\n\nWe generally do not change the tradenames of the local businesses we acquire, and therefore we do not\n\noperate nationally under any one mark or tradename. Rather, we rely on the goodwill associated with the\n\nacquired companies' local tradenames as used in each geographic market in which we operate.\n\n####### **Customers**\n\nWe provide services to commercial, industrial, municipal and residential customers. No one customer has", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "##### Compost Questions and Answers\n\n####### **What is compost?**\n\nCompost is a natural humus-like soil amendment that results from\n\nthe controlled aerobic (with oxygen) decomposition of organic\n\nmaterials. Compost is not soil - it should be mixed with soil. It is\n\nnot fertilizer, although it contains many slowly released nutrients.\n\n####### **What materials (“feedstocks”) are used to make compost?**\n\nCompost facilities in Washington recycle a variety of organic\n\nmaterials, including yard debris, food scraps, manure, biosolids,\n\nforest residuals like sawdust and bark, construction wood, and\n\nagricultural residues. All of these materials can be used to produce\n\nhigh quality compost. Your supplier can tell you which materials\n\nthey compost.\n\n####### **How do I know I’m getting safe, quality compost?**\n\nFortunately, in Washington we have strict permitting and production\n\nstandards for compost facilities, that include both time and\n\ntemperature requirements and contaminant limits.\n\n####### **What about weed seeds, plant diseases or pesticide residues?**\n\nThe controlled time, aeration, and temperature process required in\n\nWashington has been shown to kill weed seeds and plant diseases.\n\nThat same process breaks down most pesticide residues. There are\n\na few agricultural pesticides that are not easily broken down, and\n\npermitted Washington compost manufacturers carefully watch their\n\nfeedstocks to keep those materials out of the composting process.\n\n##### Compost Beginnings\n\nThe yard debris or food scraps* that you\n\nplace into your home compost bin, take to\n\na drop-off site, or set out for curbside\n\ncollection could become the compost that\n\nyou later use on your garden, lawn, and\n\nflowerbeds.\n\nIt is essential to place only quality organic\n\nmaterial into the composting process. Here\n\nare some tips:\n\nl The products you use or spray in your\n\nyard can end up in the compost process.\n\nCarefully read the labels of pesticide and\n\nherbicide products you use. (See page 9.)\n\nl Please keep yard debris free of :\n\nx Garbage\n\nx Plastic of any sort\n\n- Plastic plant pots\n\n- Plastic plant tabs\n\n- Plastic bags (if you want to bag\n\nyour yard debris, use paper\n\ngarden bags - available at most\n\ngarden centers)\n\nx Rock, brick, or masonry\n\nx Glass or metal\n\nx Pet waste.\n\n* Many localities now collect food scraps and\n\nfood-soiled paper along with yard debris for\n\ncomposting. Call your local collection service\n\nto find out what is collected in your area.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "transportation, treatment, storage and disposal of hazardous and non-hazardous solid waste, and require\n\nstates to develop programs to ensure the safe disposal of solid waste in sanitary landÑlls.\n\nSubtitle D of RCRA establishes a framework for regulating the disposal of municipal solid waste.\n\nRegulations under Subtitle D currently include minimum comprehensive solid waste management\n\ncriteria and guidelines, including location restrictions, facility design and operating criteria, closure and\n\npost-closure requirements, Ñnancial assurance standards, groundwater monitoring requirements and\n\ncorrective action standards, many of which had not commonly been in eÅect or enforced in the past in\n\nconnection with municipal solid waste landÑlls. Each state was required to submit to the U.S. EPA a\n\npermit program designed to implement Subtitle D regulations by April 9, 1993. All of the states in which\n\nwe operate have implemented permit programs pursuant to RCRA and Subtitle D. These state permit\n\nprograms may include landÑll requirements which are more stringent than those of Subtitle D.\n\nAll of our planned landÑll expansions or new landÑll development projects have been engineered to\n\nmeet or exceed Subtitle D requirements. Operating and design criteria for existing operations have been\n\nmodiÑed to comply with these new regulations. Compliance with Subtitle D regulations has resulted in\n\nincreased costs and may in the future require substantial additional expenditures in addition to other costs\n\nnormally associated with our waste management activities.\n\n(2) *The Comprehensive Environmental Response, Compensation and Liability Act of 1980, as*\n\n*amended.* CERCLA, among other things, provides for the cleanup of sites from which there is a release\n\nor threatened release of a hazardous substance into the environment. CERCLA may impose strict joint\n\nand several liability for the costs of cleanup and for damages to natural resources upon current owners and\n\noperators of the site, parties who were owners or operators of the site at the time the hazardous substances\n\nwere disposed of, parties who transported the hazardous substances to the site and parties who arranged\n\nfor the disposal of the hazardous substances at the site. Under the authority of CERCLA and its\n\nimplementing regulations, detailed requirements apply to the manner and degree of investigation and\n\nremediation of facilities and sites where hazardous substances have been or are threatened to be released\n\ninto the environment. Liability under CERCLA is not dependent upon the existence or disposal of only\n\n\"\"hazardous wastes'' but can also be based upon the existence of small quantities of more than 700\n\n\"\"substances'' characterized by the U.S. EPA as \"\"hazardous,'' many of which may be found in common\n\nhousehold waste.\n\nAmong other things, CERCLA authorizes the federal government to investigate and remediate sites\n\nat which hazardous substances have been or are threatened to be released into the environment or to\n\norder (or oÅer an opportunity to) persons potentially liable for the cleanup of the hazardous substances to\n\ndo so. In addition, the U.S. EPA has established a National Priorities List of sites at which hazardous\n\nsubstances have been or are threatened to be released and which require investigation or cleanup.\n\nLiability under CERCLA is not dependent upon the intentional disposal of hazardous waste or\n\nhazardous substances. It can be founded upon the release or threatened release, even as a result of\n\nunintentional, non-negligent or lawful action, of thousands of hazardous substances, including very small\n\nquantities of such substances. Thus, even if our landÑlls have never knowingly received hazardous waste\n\nas such, it is possible that one or more hazardous substances may have been deposited or \"\"released'' at\n\nour landÑlls or at other properties which we currently own or operate or may have owned or operated.", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**//50% green materials : all fruit and vegetable peelings, leftover meat, egg shells, tea and coffee…**\n\n**//50% brown materials : dead leaves, twigs, kitchen rolls, shavings, possibly paper, newspaper and cardboard …**\n\n**RECYCLABLE WASTE**\n\n**ORGANIC WASTE**\n\n##### **INSTRUCTIONS**\n\n###### in the Pays de Lauzun district\n\n**Plastic bottles and flasks**\n\n**All types of paper and cardboard Metal packaging, even the smallest ones**\n\n**All other packaging**\n\n**NEW**\n\n####### **SORTING ERROR IN YELLOW BIN = YELLOW BIN NOT COLLECTED**\n\n**GOOD SORTING HABITS: EMPTY THEM WELL, NO NEED WASH THEM, PUT IN THE**\n\n**CONTAINER SEPARATE FROM EACH OTHER AND WITHOUT BAG**\n\n**RECYCLING CENTRE**\n\nWood\n\nReusable objects Ink cartridges Light bulbs Textiles Drain oils Batteries Rubbles\n\nMetals Dangerous waste Plants Buried waste Furniture Cardboard Electrical devices\n\n**Bocaux et bouteilles //Sans les couvercles !**\n\n**ALL GLASS BOTTLES**\n\n**HOUSEHOLD GARBAGE**\n\n**Masks, nappies, Broken dishes, toothbrush, Disposable wipes, Vacuum bags...**\n\n**YELLOW BIN OR YELLOW COLUMN**\n\n**COMPOSTER**\n\n**BLACK BIN OR BLACK COLUMN**", - "page_start": 2, - "page_end": 2, - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" - }, - { - "text": "nordstrom.com/companyreview | Connect with us: #NORDSTROM\n\nThis annual report is printed on FSC <sup>®</sup> certified paper.\n\nThe recycled content of our paper is 30% post-consumer waste.\n\n©2015 Nordstrom, Inc. All rights reserved. Printed in the USA.\n\n374047840 PLEASE RECYCLE.", - "page_start": 95, - "page_end": 95, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "####### **Competition**\n\nWe operate in a highly competitive industry. Entry into our business and the ability to operate proÑtably\n\nin the industry requires substantial amounts of capital and managerial experience.\n\nCompetition in the non-hazardous solid waste industry comes from a few large, national publicly-owned\n\ncompanies, including Waste Management and Allied Waste Industries, several regional publicly- and\n\nprivately-owned solid waste companies, and thousands of small privately-owned companies. Some of our\n\ncompetitors have signiÑcantly larger operations, and may have signiÑcantly greater Ñnancial resources, than\n\nwe do. In addition to national and regional Ñrms and numerous local companies, we compete with\n\nmunicipalities that maintain waste collection or disposal operations. These municipalities may have Ñnancial\n\nadvantages due to the availability of tax revenues and tax-exempt Ñnancing.\n\nWe compete for collection accounts primarily on the basis of price and the quality of our services. From\n\ntime to time, our competitors may reduce the price of their services in an eÅort to expand market share or to\n\nwin a competitively bid municipal contract. This may have an impact on our future revenue and proÑtability.\n\nIn each market in which we own or operate a landÑll, we compete for landÑll business on the basis of\n\ndisposal costs, geographical location and quality of operations. Our ability to obtain landÑll business may be\n\nlimited by the fact that some major collection companies also own or operate landÑlls to which they send their\n\nwaste. There also has been an increasing trend at the state and local levels to mandate waste reduction at the\n\nsource and to prohibit the disposal of certain types of waste, such as yard waste, at landÑlls. This may result in\n\nthe volume of waste going to landÑlls being reduced in certain areas, which may aÅect our ability to operate\n\nour landÑlls at their full capacity and/or aÅect the prices that we can charge for landÑll disposal services. In\n\naddition, most of the states in which we operate landÑlls have adopted plans or requirements that set goals for\n\nspeciÑed percentages of certain solid waste items to be recycled.\n\n####### **Regulation**\n\nOur facilities and operations are subject to a variety of federal, state and local requirements that regulate\n\nthe environment, public health, safety, zoning and land use. Operating and other permits, licenses and other\n\napprovals are generally required for landÑlls and transfer stations, certain solid waste collection vehicles, fuel\n\nstorage tanks and other facilities that we own or operate, and these permits are subject to revocation,\n\nmodiÑcation and renewal in certain circumstances. Federal, state and local laws and regulations vary, but\n\ngenerally govern wastewater or stormwater discharges, air emissions, the handling, transportation, treatment,\n\nstorage and disposal of hazardous and non-hazardous waste, and the remediation of contamination associated\n\nwith the release or threatened release of hazardous substances. These laws and regulations provide\n\ngovernmental authorities with strict powers of enforcement, which include the ability to obtain injunctions\n\nand/or impose Ñnes or penalties in the case of violations, including criminal penalties. The\n\nU.S. Environmental Protection Agency and various other federal, state and local environmental, public and\n\noccupational health and safety agencies and authorities administer these regulations, including the Occupa-\n\ntional Safety and Health Administration of the U.S. Department of Labor.\n\nWe strive to conduct our operations in compliance with applicable laws and regulations. However, in the\n\nexisting climate of heightened environmental concerns, from time to time, we have been issued citations or\n\nnotices from governmental authorities that have resulted in the need to expend funds for remedial work and", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Recycling yields approximately 0.1mg of rare Recycling yields approximately 0.1mg of rare\n\nearth product per expired card. earth product per expired card.\n\nRare earths are special metals, unobtainable Rare earths are special metals, unobtainable\n\nin Japan, which are essential to in Japan, which are essential to PCs and s and\n\ncellphones, electric vehicles and solar power cellphones, electric vehicles and solar power\n\ngenerators. Given that Japan is dependent on generators. Given that Japan is dependent on\n\nimports for nearly its entire supply, we believe imports for nearly its entire supply, we believe\n\nrecycling rare earths is a worthwhile endeavor recycling rare earths is a worthwhile endeavor\n\nin terms of national energy policy. in terms of national energy policy.\n\nCard microcircuits that have become unusable Card microcircuits that have become unusable\n\ndue to changes in card design are collected due to changes in card design are collected\n\nfrom cards with IC chips, which are separated from cards with IC chips, which are separated\n\nfrom cards without IC chips. Both types are from cards without IC chips. Both types are\n\npulverized at the company pulverized at the company’s Shimura Center s Shimura Center\n\nin Tokyo and sealed separately in recycling in Tokyo and sealed separately in recycling\n\nbags, under supervision of a company official. bags, under supervision of a company official.\n\nThe bags are then sent off for processing by The bags are then sent off for processing by\n\nan outside company, which analyzes and an outside company, which analyzes and\n\npurifies the contents and then extracts the purifies the contents and then extracts the\n\nrare earths. rare earths.\n\nExpired\n\ncredit cards\n\nwith IC chips\n\nRecovery\n\nAnalysis\n\nand\n\npurification\n\nRare earth\n\nproduct\n\nBase metals, alloys,\n\nchemical products, etc. ( )\n\nRecycling and reuse of old equipment and machinery\n\nEnvironment-friendly model branches Environmental business matching\n\nEco-Products is one of Japan’s largest comprehensive environmental exhibitions\n\nload through measures such as “carbon load through measures such as “carbon\n\nneutral leases” (with carbon credits allocated neutral leases” (with carbon credits allocated\n\nin proportion to emission volumes of leased in proportion to emission volumes of leased\n\nassets) and leasing of environment-friendly assets) and leasing of environment-friendly\n\nand energy-saving equipment. and energy-saving equipment.\n\nLikewise, by trading used machinery and Likewise, by trading used machinery and\n\nsemiconductor- manufacturing equipment, semiconductor- manufacturing equipment,\n\nSumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is\n\nsupporting more efficient capital investment supporting more efficient capital investment\n\nby its customers, while itself evolving into a by its customers, while itself evolving into a\n\nrecycling-oriented, environment-friendly recycling-oriented, environment-friendly\n\ncompany. company.\n\n**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report\n\n**A new venue for confabs:**\n\n**SMFG Environmental**\n\n**Business Forum**\n\n**at Eco-Products**\n\n**The eco japan cup:**\n\n**“A Contest for Unearthing**\n\n**and Growing Seeds of**\n\n**New Businesses”**\n\n**Sumitomo Mitsui**\n\n**Finance & Leasing:**\n\n**Promoting recycling**\n\n**and reuse**\n\n**Recycling of rare earths**\n\n**used in smart cards**\n\n#### **Environmental**\n\n#### **Activities**\n\n**Committed to supporting environmental businesses, a CSR priority,**\n\n**through our core businesses**", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "notices from governmental authorities that have resulted in the need to expend funds for remedial work and\n\nrelated activities at various landÑlls and other facilities. There is no assurance that citations and notices will\n\nnot be issued in the future despite our regulatory compliance eÅorts. We have established remediation reserves\n\nthat we believe, based on currently available information, will be adequate to cover our current estimates of\n\nregulatory costs. However, we cannot assure you that actual costs will not exceed our reserves.\n\n*Federal Regulation.* The following summarizes the primary environmental, public and occupational\n\nhealth and safety-related statutes of the United States that aÅect our facilities and operations:\n\n(1) *The Solid Waste Disposal Act, as amended, including the Resource Conservation and Recovery*\n\n*Act.* RCRA and its implementing regulations establish a framework for regulating the handling,\n\n9", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "market knowledge, community relations and name recognition, and to instill their entrepreneurial drive\n\nat all levels of our operations. By furnishing the local management of such acquired companies with our\n\nÑnancial and marketing resources and technical expertise, we believe that the acquired companies are\n\nbetter able to secure additional municipal franchises and other contracts.\n\n*Privatize Municipal Operations and Acquire Divested Operations.* We also seek to acquire solid\n\nwaste collection operations, transfer stations and landÑlls that municipalities and other governmental\n\nauthorities are privatizing. Many municipalities are seeking to outsource or sell these types of solid\n\nwaste operations, as they lack the capital, technical expertise and/or operational resources necessary to\n\ncomply with increasingly stringent regulatory standards and/or to compete eÅectively with private-\n\nsector companies. In addition, we have acquired, and will continue to seek to acquire, operations and\n\nfacilities that may be divested by other publicly-owned waste companies.\n\n####### **Operations**\n\nOur operations primarily consist of the collection, transfer and disposal of non-hazardous solid waste.\n\n*Collection Services.* We provide solid waste collection services to commercial, industrial, municipal and\n\nresidential customers in 22 states through 140 collection companies. In 2004, 74.3% of our revenue was\n\nderived from collection services consisting of approximately 32.5% from services provided to municipal and\n\nresidential customers, 36.6% from services provided to commercial customers, and 30.9% from services\n\nprovided to industrial and other customers.\n\nOur residential collection operations involve the curbside collection of refuse from small containers into\n\ncollection vehicles for transport to transfer stations or directly to landÑlls. Residential solid waste collection\n\nservices are typically performed under contracts with municipalities, which we generally secure by competitive\n\nbid and which give our company exclusive rights to service all or a portion of the homes in their respective\n\njurisdictions. These contracts or franchises usually range in duration from one to Ñve years, although some of\n\nour exclusive franchises are for signiÑcantly longer periods. Residential solid waste collection services may also\n\nbe performed on a subscription basis, in which individual households contract directly with our company. The\n\nfees received for subscription residential collection are based primarily on market factors, frequency and type\n\nof service, the distance to the disposal facility and cost of disposal. In general, subscription residential\n\ncollection fees are paid quarterly in advance by the residential customers receiving the service.\n\nIn our commercial and industrial collection operations, we supply our customers with waste containers of\n\nvarying sizes. We also rent compactors to large waste generators. Commercial collection services are generally\n\nperformed under one- to three-year service agreements, and fees are determined by such considerations as:\n\n‚ market factors,\n\n‚ collection frequency,\n\n‚ type of equipment furnished,\n\n‚ the type and volume or weight of the waste collected,\n\n‚ the distance to the disposal facility and\n\n‚ the cost of disposal.\n\nWe rent waste containers to construction sites and also provide waste collection services to industrial and\n\nconstruction facilities on a contractual basis with terms generally ranging from a single pickup to one year or\n\nlonger. We collect the containers or compacted waste and transport the waste either to a landÑll or a transfer\n\nstation for disposal.\n\nAlso, we currently provide recycling services in certain markets primarily to comply with local laws or\n\nobligations under our franchise agreements. These services include the curbside collection of residential\n\nrecyclable waste and the provision of a variety of recycling services to commercial and industrial customers.\n\n7", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "##### Resources\n\n**Compost Organizations**\n\n####### **Washington Organic Recycling Council**\n\nFind a compost producer in your area\n\nwww.compostwashington.org\n\n####### **US Composting Council**\n\nSeal of Testing Assurance (STA) program\n\nwww.compostingcouncil.org/programs/sta/\n\n**Restoring the Soil to Protect our Waterways**\n\nwww.soilsforsalmon.org\n\nCompost amendment and erosion control\n\nduring construction: information for builders\n\nwww.buildingsoil.org\n\n**Natural Lawn & Garden Care, Soils, and Home**\n\n**Composting**\n\n####### **City of Seattle**\n\nwww.seattle.gov/util/services/yard\n\n####### **King County**\n\nwww.kingcounty.gov/soils\n\n####### **Washington State University**\n\nwww.puyallup.wsu.edu/soilmgmt/\n\n###### The Beauty of Your Lawn and Garden Blossoms from the Soil\n\nThank you for your interest in compost.\n\nCompost is a versatile product with many benefits. It enhances\n\nsoil quality, helps save water, and supports your community’s\n\nefforts to recycle organic debris. All this helps to conserve our\n\nnatural resources and reduces the amount of material sent to the\n\nlandfill.\n\nCompost-amended soil also helps break down pollutants and\n\nabsorb stormwater runoff. By making nutrients slowly available\n\nto plants and enhancing plant health, compost can reduce the\n\nneed for chemical fertilizers and pesticides. All these benefits\n\nhelp protect our lakes, rivers, and marine waters from pollution\n\nand excessive runoff.\n\nCompost is a natural amendment for your lawn or garden, and\n\ncan be used regularly to enrich your soil. This guide is designed\n\nto help you get the most from the compost that you buy.", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" - } - ] - }, - { - "references": { - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", - "query": "What is the day of the black container in Lachapelle ?", - "target_page": 4, - "target_passage": "LACHAPELLE MONDAY green weeks", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Table 8 and Table 9 show the results for the white-box and black-box settings, respectively. (Here, percentage numbers are not averaged and there is no standard error since we used a single gadget per query.) The white-box results are nearly perfect; the black-box results are often better but sometimes somewhat worse than those for query-independent gadgets. We conjecture that this is due to some level of overfitting.\n\n11", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv1.pdf" - }, - { - "text": "Figure 11.3 Gruff Visualization of the EmployeeShape\n\nFigure 11.4 Gruff Visualization of the CustomerShape", - "page_start": 81, - "page_end": 81, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Chapter 2. Introduction to containers and orchestration with Kubernetes **23**\n\nThe Docker architecture includes the following components:\n\n� Docker Server Daemon\n\nDaemon is the Docker process that runs as background process and listen for API\n\nrequests. It also manages Dockers objects, such as images, containers, networks, and\n\nvolumes.\n\n� Docker Registry\n\nA Docker registry stores Docker images. Docker Hub is a public registry that anyone can\n\nuse. Docker is configured to look for images on Docker Hub by default.\n\n� Docker Objects:\n\n- Images: This template is read-only with instruction to build a Docker container. An\n\nimage can be layer on another image with specific changes. An images library is\n\navailable from the Docker registry.\n\nA Dockerfile contains the configuration information that is needed to build and run an\n\nimage. Based on instructions that are defined in the Dockerfile, layers are created for\n\nan image. During the build process, only the changed layer is rebuilt; therefore, Docker\n\nremains lightweight, which makes it small and fast.\n\n- Container: A container is an executable instance that is built from the image, which can\n\nbe started, stopped, moved, or deleted by using Docker API or CLI. Containers can be\n\nconnected to one or many networks. Storage can be added and a new container can\n\nbe built by using a container.\n\n- Services: Services allow you to scale containers across multiple Docker daemons,\n\nwhich all work together as a swarm with multiple managers and workers. Each member\n\nof a swarm is a Docker daemon, and the daemons all communicate by using the\n\nDocker API.\n\n- NameSpace: In context of Docker, NameSpace is the technology that provides isolated\n\nworkspaces for a container (see Table 2-1). Each container encapsulates all its\n\nfeatures within the namespace that is associated with that specific container.\n\n*Table 2-1 NameSpace*\n\n- Control groups: A control group (cgroup) is the technology that limits an application to a\n\nspecific set of resources. This feature allows Docker Engine to share available\n\nhardware resources to containers and optionally enforce limits and constraints.\n\n- Union file system: Union file systems (UnionFS) are file systems that operate by\n\ncreating layers, which makes them lightweight and fast. Docker Engine uses UnionFS\n\nto provide the building blocks for containers.\n\n- Container format: Container format is the wrapper around NameSpaces, control\n\ngroups, and UnionFS. The default container format is libcontainer.\n\n| Namespace | Description |\n|:---|:---|\n| PID | Process isolation (PID: Process ID) |\n| NET | Managing network interfaces (NET: Networking) |\n| IPC | Managing access to IPC resources (IPC: InterProcess Communication) |\n| MNT | Managing file system mount points (MNT: Mount) |\n| UTS | Isolating kernel and version identifiers. (UTS: UNIX Timesharing System) |", - "page_start": 38, - "page_end": 38, - "source_file": "sg248459.pdf" - }, - { - "text": "**26** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\n#### **2.4.3 Kubernetes operating environment, objects, and basic operations**\n\nThis section describes the Kubernetes operating environment, including its objects and basic\n\noperations.\n\n**Master node**\n\nThis node runs multiple controllers that are responsible for the health of the cluster,\n\nreplication, scheduling, endpoints (linking Services and Pods), Kubernetes API. It interacts\n\nwith the underlying cloud providers and others. Generally, it ensures that everything is\n\nrunning and monitors worker nodes.\n\n**Worker node**\n\nThis node runs the Kubernetes agent that is responsible for running Pod containers by way of\n\nDocker or rkt, requests secrets or configurations, mounts required Pod volumes, performs\n\nhealth checks, and reports the status of Pods and the node to the rest of the system.\n\n**Pod**\n\nWithin a cluster, a pod encapsulates an application that is composed of one or more\n\nprocesses from one and at time multiple containers. Every pod includes dedicated I/O\n\nresources, such as storage, a unique IP, and a set of configuration properties for the runtime\n\nenvironment. These features make pod the smallest unit of deployment and basic unit of\n\nexecution.\n\nDocker is the most popular container run time that is used for Kubernetes Pod <sup>1</sup> . Depending\n\non associated containers, pods are available in the following types:\n\n� Pod with a single container: This configuration is the most common.\n\n� Pod with multiple containers: Must be colocated containers to serve a functional\n\nrequirement.\n\n� Networking: Each pod shares its namespace, IP, and port. However, for optimal\n\nperformance, containers in same Pod communicates with the localhost identity.\n\n� Storage: A pod specifies shared storage volume. All containers in a pod can share\n\npersistent data through this volume.\n\nAfter a pod is created and is scheduled to run on a node, it persists until one of the following\n\nactions occurs:\n\n� The process is ended.\n\n� The pod objected is deleted.\n\n� The pod is evicted for lack of resources.\n\n� The node fails.\n\nA pod alone is not self-healing, which means that during any failure, a pod does not attempt to\n\nrestart. A pod is the encapsulation of containers, which primarily are executable entities.\n\nTherefore, to “run a pod” means running an application and service through containers.\n\n1 [https://www.sumologic.com/blog/kubernetes-vs-docker/](https://www.sumologic.com/blog/kubernetes-vs-docker/)", - "page_start": 41, - "page_end": 41, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 5. Red Hat OpenShift installation planning and considerations **97**\n\n**Registry**\n\nOpenShift can build container images from source code, deploy them, and manage their\n\nlifecycle. To enable this process, OpenShift provides an internal, integrated registry that can\n\nbe deployed in the OpenShift environment to manage images.\n\nThe registry stores images and metadata. For production environments, persistent storage\n\nmust be used for the registry; otherwise, any images that were built or pushed into the registry\n\ndisappear if the pod restarts.\n\n**Aggregated logging**\n\nOne of the Red Hat OpenShift Container Platform optional components is named Red Hat\n\nOpenShift Container Platform aggregated logging. This component collects and aggregates\n\nlogs from the pods that are running in the Red Hat OpenShift Container Platform cluster and\n\n/var/log/messages on nodes. This configuration enables Red Hat OpenShift Container\n\nPlatform users to view the logs of projects that they can view by using a web interface.\n\nRed Hat OpenShift Container Platform aggregated logging component is a modified version\n\nof the ELK stack, which is composed of a few pods that are running on the Red Hat OpenShift\n\nContainer Platform environment:\n\n� Elasticsearch: An object store where all logs are stored.\n\n� Kibana: A web UI for Elasticsearch.\n\n� Curator: Elasticsearch maintenance operations that are performed automatically on a\n\nper-project basis.\n\n� Fluentd: Gathers logs from nodes and containers and feeds them to Elasticsearch.\n\nConsider the following basic concepts for aggregated logging:\n\n� Cluster: A set of Elasticsearch nodes that distribute the workload.\n\n� Node: A container that is running an instance of Elasticsearch, which is part of the cluster.\n\n� Index: Collection of documents (container logs).\n\n� Shards and Replicas: Indexes can be divided into sets of data that contain the primary\n\ncopy of the documents that are stored (primary shards) or backups of that primary copies\n\n(replica shards). Sharding allows the application to horizontally scale the information and\n\ndistributed/paralellized operations. Replication instead provides HA and also better search\n\nthroughput because searches are also run on replicas.\n\nRed Hat OpenShift Container Platform can gather metrics from kubelet and store the values\n\nin Heapster. Red Hat OpenShift Container Platform Metrics provide the ability to view CPU,\n\nmemory, and network-based metrics and display the values in the user interface. These\n\nmetrics can allow for the horizontal autoscaling of pods based on parameters that are\n\nprovided by a Red Hat OpenShift Container Platform user. It is important to understand\n\ncapacity planning when metrics are deployed into an Red Hat OpenShift Container Platform\n\nenvironment.\n\nRed Hat OpenShift Container Platform metrics is composed by the following pods that are\n\nrunning on the Red Hat OpenShift Container Platform environment:\n\n� Heapster: Heapster scrapes the metrics for CPU, memory, and network usage on every\n\nPod. Then, it exports them into Hawkular Metrics.\n\n**Note:** Using NFS storage as a volume or a persistent volume (or by way of an NAS such\n\nas Gluster) is not supported for Elasticsearch storage because Lucene relies on file\n\nsystem behavior that NFS does not supply. Data corruption and other problems can occur.", - "page_start": 112, - "page_end": 112, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 4. Red Hat OpenShift components and architecture **69**\n\n### **4.4 OpenShift registry**\n\nOpenShift Container Platform can use any server that implements the container image\n\nregistry API as a source of images, including the Docker Hub, private registries that are run by\n\nthird parties, and the integrated OpenShift Container Platform registry.\n\n#### **4.4.1 Integrated OpenShift Container Registry**\n\nOpenShift Container Platform provides an integrated container image registry called\n\nOpenShift Container Registry (OCR). This registry that adds the ability to automatically\n\nprovision new image repositories on demand. This feature provides users with a built-in\n\nlocation for their application builds to push the resulting images.\n\nWhenever a new image is pushed to OCR, the registry notifies OpenShift Container Platform\n\nabout the new image, passing along all the information about it, such as the namespace,\n\nname, and image metadata. Different components of OpenShift Container Platform react to\n\nnew images, creating builds and deployments.\n\nOCR can also be deployed as a stand-alone component that acts solely as a container image\n\nregistry, without the build and deployment integration.\n\n#### **4.4.2 Third-party registries**\n\nOpenShift Container Platform can create containers by using images from third-party\n\nregistries. However, these registries do *not* offer the same image notification support as the\n\nintegrated OpenShift Container Platform registry. In this situation, OpenShift Container\n\nPlatform fetches tags from the remote registry upon imagestream creation. Refreshing the\n\nfetched tags is as simple as running the **oc import-image <stream>** command. When new\n\nimages are detected, the build that was described in 4.4.1, “Integrated OpenShift Container\n\nRegistry” and deployment reactions occur.\n\n### **4.5 Managing OpenShift resources**\n\nAll OpenShift resources, images, containers, pods, services, builders, templates, and so on,\n\nare stored on etcd and can be managed by the OpenShift CLI, web console, or REST API.\n\nThese resources also are defined in text files in JSON or YAML format and can be changed\n\nby editing those files and shared on an SCM system, such as GIT.\n\nOpenShift can even retrieve these resource definitions directly from an external SCM.", - "page_start": 84, - "page_end": 84, - "source_file": "sg248459.pdf" - }, - { - "text": "Ice on the Saône, 2012\n\nPanorama of the inner city of Lyon, taken from the basilica of Notre-Dame de Fourvière's roof\n\n[Lyon has a humid subtropical climate (Köppen: ](https://en.wikipedia.org/wiki/K%C3%B6ppen_climate_classification) *Cfa* [), bordering an oceanic climate](https://en.wikipedia.org/wiki/Oceanic_climate)\n\n( *Köppen* : *Cfb* [, Trewartha: ](https://en.wikipedia.org/wiki/Trewartha_climate_classification) *Do* ). <sup>[38]</sup> The mean temperature in Lyon in the coldest month\n\nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F).\n\nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter\n\nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13\n\nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22\n\nDecember 1938. <sup>[39]</sup>\n\n#### **Climate**", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia4.pdf" - }, - { - "text": "**Chapter 2. Introduction to containers and**\n\n**orchestration with Kubernetes**\n\nThis chapter presents the conceptual foundations of containers and the open source\n\ncontainer orchestration Kubernetes. It also introduces the Red Hat Enterprise Kubernetes\n\nproduct that is called Red Hat OpenShift.\n\nThis chapter includes the following topics:\n\n� 2.1, “A new computing paradigm in cloud transformation” on page 8\n\n� 2.2, “Virtual machines meet containers” on page 12\n\n� 2.3, “Containers” on page 19\n\n� 2.4, “Kubernetes: An open source container orchestration” on page 24\n\n� 2.5, “Enterprise Kubernetes: Red Hat OpenShift” on page 31\n\n**2**", - "page_start": 22, - "page_end": 22, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 2. Introduction to containers and orchestration with Kubernetes **13**\n\n*Figure 2-2 IBM PowerVC*\n\nAround 2011, Container technology started to be a strong player in the cloud arena, which is\n\na method to package an application in a box so it can be run with its dependencies, isolated\n\nfrom other applications. For more information, see 2.3, “Containers” on page 19.\n\nA year later, Docker Containers exploded in popularity, but one thing was missing: the\n\nthorough view and management of the entire environment.", - "page_start": 28, - "page_end": 28, - "source_file": "sg248459.pdf" - }, - { - "text": "**60** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\n### **4.1 OpenShift cluster components**\n\nFigure 4-1 shows an overview of the OpenShift container platform components.\n\n*Figure 4-1 Red Hat OpenShift cluster platform components*\n\n#### **4.1.1 Docker service and Kubernetes**\n\nThe Docker service that runs in every OpenShift cluster node provides the container image\n\nadministration. The Kubernetes cluster provides cluster management and orchestrates\n\ncontainers on multiple nodes in the OpenShift cluster.\n\n#### **4.1.2 etcd store**\n\nThe etcd store is a distributed key value store that is used by Kubernetes to store\n\nconfiguration and state information about the containers and resources that are inside the\n\nOpenShift cluster.\n\n#### **4.1.3 OpenShift-Kubernetes extensions**\n\nOpenShift-Kubernetes extensions are more resources that are used to save the OpenShift\n\nconfiguration and cluster internal state. These resource extensions are stored in etcd with\n\napplication resources that are managed by Kubernetes.", - "page_start": 75, - "page_end": 75, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", - "query": "What to do if my container is stolen ?", - "target_page": 4, - "target_passage": "Container stolen: What to do? In case of theft, your container will be replaced on presentation of a theft report effected at your local police station.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Chapter 5. Red Hat OpenShift installation planning and considerations **97**\n\n**Registry**\n\nOpenShift can build container images from source code, deploy them, and manage their\n\nlifecycle. To enable this process, OpenShift provides an internal, integrated registry that can\n\nbe deployed in the OpenShift environment to manage images.\n\nThe registry stores images and metadata. For production environments, persistent storage\n\nmust be used for the registry; otherwise, any images that were built or pushed into the registry\n\ndisappear if the pod restarts.\n\n**Aggregated logging**\n\nOne of the Red Hat OpenShift Container Platform optional components is named Red Hat\n\nOpenShift Container Platform aggregated logging. This component collects and aggregates\n\nlogs from the pods that are running in the Red Hat OpenShift Container Platform cluster and\n\n/var/log/messages on nodes. This configuration enables Red Hat OpenShift Container\n\nPlatform users to view the logs of projects that they can view by using a web interface.\n\nRed Hat OpenShift Container Platform aggregated logging component is a modified version\n\nof the ELK stack, which is composed of a few pods that are running on the Red Hat OpenShift\n\nContainer Platform environment:\n\n� Elasticsearch: An object store where all logs are stored.\n\n� Kibana: A web UI for Elasticsearch.\n\n� Curator: Elasticsearch maintenance operations that are performed automatically on a\n\nper-project basis.\n\n� Fluentd: Gathers logs from nodes and containers and feeds them to Elasticsearch.\n\nConsider the following basic concepts for aggregated logging:\n\n� Cluster: A set of Elasticsearch nodes that distribute the workload.\n\n� Node: A container that is running an instance of Elasticsearch, which is part of the cluster.\n\n� Index: Collection of documents (container logs).\n\n� Shards and Replicas: Indexes can be divided into sets of data that contain the primary\n\ncopy of the documents that are stored (primary shards) or backups of that primary copies\n\n(replica shards). Sharding allows the application to horizontally scale the information and\n\ndistributed/paralellized operations. Replication instead provides HA and also better search\n\nthroughput because searches are also run on replicas.\n\nRed Hat OpenShift Container Platform can gather metrics from kubelet and store the values\n\nin Heapster. Red Hat OpenShift Container Platform Metrics provide the ability to view CPU,\n\nmemory, and network-based metrics and display the values in the user interface. These\n\nmetrics can allow for the horizontal autoscaling of pods based on parameters that are\n\nprovided by a Red Hat OpenShift Container Platform user. It is important to understand\n\ncapacity planning when metrics are deployed into an Red Hat OpenShift Container Platform\n\nenvironment.\n\nRed Hat OpenShift Container Platform metrics is composed by the following pods that are\n\nrunning on the Red Hat OpenShift Container Platform environment:\n\n� Heapster: Heapster scrapes the metrics for CPU, memory, and network usage on every\n\nPod. Then, it exports them into Hawkular Metrics.\n\n**Note:** Using NFS storage as a volume or a persistent volume (or by way of an NAS such\n\nas Gluster) is not supported for Elasticsearch storage because Lucene relies on file\n\nsystem behavior that NFS does not supply. Data corruption and other problems can occur.", - "page_start": 112, - "page_end": 112, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 4. Red Hat OpenShift components and architecture **69**\n\n### **4.4 OpenShift registry**\n\nOpenShift Container Platform can use any server that implements the container image\n\nregistry API as a source of images, including the Docker Hub, private registries that are run by\n\nthird parties, and the integrated OpenShift Container Platform registry.\n\n#### **4.4.1 Integrated OpenShift Container Registry**\n\nOpenShift Container Platform provides an integrated container image registry called\n\nOpenShift Container Registry (OCR). This registry that adds the ability to automatically\n\nprovision new image repositories on demand. This feature provides users with a built-in\n\nlocation for their application builds to push the resulting images.\n\nWhenever a new image is pushed to OCR, the registry notifies OpenShift Container Platform\n\nabout the new image, passing along all the information about it, such as the namespace,\n\nname, and image metadata. Different components of OpenShift Container Platform react to\n\nnew images, creating builds and deployments.\n\nOCR can also be deployed as a stand-alone component that acts solely as a container image\n\nregistry, without the build and deployment integration.\n\n#### **4.4.2 Third-party registries**\n\nOpenShift Container Platform can create containers by using images from third-party\n\nregistries. However, these registries do *not* offer the same image notification support as the\n\nintegrated OpenShift Container Platform registry. In this situation, OpenShift Container\n\nPlatform fetches tags from the remote registry upon imagestream creation. Refreshing the\n\nfetched tags is as simple as running the **oc import-image <stream>** command. When new\n\nimages are detected, the build that was described in 4.4.1, “Integrated OpenShift Container\n\nRegistry” and deployment reactions occur.\n\n### **4.5 Managing OpenShift resources**\n\nAll OpenShift resources, images, containers, pods, services, builders, templates, and so on,\n\nare stored on etcd and can be managed by the OpenShift CLI, web console, or REST API.\n\nThese resources also are defined in text files in JSON or YAML format and can be changed\n\nby editing those files and shared on an SCM system, such as GIT.\n\nOpenShift can even retrieve these resource definitions directly from an external SCM.", - "page_start": 84, - "page_end": 84, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 2. Introduction to containers and orchestration with Kubernetes **13**\n\n*Figure 2-2 IBM PowerVC*\n\nAround 2011, Container technology started to be a strong player in the cloud arena, which is\n\na method to package an application in a box so it can be run with its dependencies, isolated\n\nfrom other applications. For more information, see 2.3, “Containers” on page 19.\n\nA year later, Docker Containers exploded in popularity, but one thing was missing: the\n\nthorough view and management of the entire environment.", - "page_start": 28, - "page_end": 28, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 2. Introduction to containers and orchestration with Kubernetes **21**\n\nThe following timeline highlights the major shifts in the development of container to date (see\n\nFigure 2-9):\n\n� 2000 FreeBSD Jails: FreeBSD Jails enabled Computer systems to be partitioned into\n\nmultiple servers that were independent subsystems named Jail with unique IP address.\n\n� 2001 Linux Vserver: Similar to FreeBSD Jails, Linux also developed a feature for operating\n\nsystem virtualization where a file system, memory, and network can be shared among\n\nindependent systems.\n\n� 2004 Solaris Containers: Solaris Containers combined system resource controls and\n\nboundary separation that was provided by zones to take advantage of features, such as\n\nsnapshots and cloning from ZFS.\n\n� 2006 Google process containers: Process Containers was designed for limiting,\n\naccounting, and isolating resource usage (CPU, memory, disk I/O, and network) of a\n\ncollection of processes. Later, this was renamed as Control Groups (cgroups) and merged\n\nto Linux kernel 2.6.24.\n\n� 2008 LXC evolved (Linux Container Group): Linux Containers (LXC) was the first, most\n\ncomplete implementation of Linux container manager. It was implemented in 2008 by\n\nusing cgroups and Linux namespaces.\n\n� 2013 Let Me Contain That For You (LMCTFY): Let Me Contain That For You (LMCTFY)\n\nstarted in 2013 as an open source version of Google’s container stack. Applications can\n\nbe made container aware, which creates and manages their own subcontainers.\n\n� 2013 Docker: Docker emerged, which made container service even more popular. Docker\n\nand container grew together.\n\n� 2016 Security and DevOps: Container security enhanced and DevOps method evolved as\n\nmost preferred Container Application process.\n\n� 2017 Container becomes more matured with CNCF and Kubernetes.\n\n*Figure 2-9 Containers timeline*", - "page_start": 36, - "page_end": 36, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 2. Introduction to containers and orchestration with Kubernetes **23**\n\nThe Docker architecture includes the following components:\n\n� Docker Server Daemon\n\nDaemon is the Docker process that runs as background process and listen for API\n\nrequests. It also manages Dockers objects, such as images, containers, networks, and\n\nvolumes.\n\n� Docker Registry\n\nA Docker registry stores Docker images. Docker Hub is a public registry that anyone can\n\nuse. Docker is configured to look for images on Docker Hub by default.\n\n� Docker Objects:\n\n- Images: This template is read-only with instruction to build a Docker container. An\n\nimage can be layer on another image with specific changes. An images library is\n\navailable from the Docker registry.\n\nA Dockerfile contains the configuration information that is needed to build and run an\n\nimage. Based on instructions that are defined in the Dockerfile, layers are created for\n\nan image. During the build process, only the changed layer is rebuilt; therefore, Docker\n\nremains lightweight, which makes it small and fast.\n\n- Container: A container is an executable instance that is built from the image, which can\n\nbe started, stopped, moved, or deleted by using Docker API or CLI. Containers can be\n\nconnected to one or many networks. Storage can be added and a new container can\n\nbe built by using a container.\n\n- Services: Services allow you to scale containers across multiple Docker daemons,\n\nwhich all work together as a swarm with multiple managers and workers. Each member\n\nof a swarm is a Docker daemon, and the daemons all communicate by using the\n\nDocker API.\n\n- NameSpace: In context of Docker, NameSpace is the technology that provides isolated\n\nworkspaces for a container (see Table 2-1). Each container encapsulates all its\n\nfeatures within the namespace that is associated with that specific container.\n\n*Table 2-1 NameSpace*\n\n- Control groups: A control group (cgroup) is the technology that limits an application to a\n\nspecific set of resources. This feature allows Docker Engine to share available\n\nhardware resources to containers and optionally enforce limits and constraints.\n\n- Union file system: Union file systems (UnionFS) are file systems that operate by\n\ncreating layers, which makes them lightweight and fast. Docker Engine uses UnionFS\n\nto provide the building blocks for containers.\n\n- Container format: Container format is the wrapper around NameSpaces, control\n\ngroups, and UnionFS. The default container format is libcontainer.\n\n| Namespace | Description |\n|:---|:---|\n| PID | Process isolation (PID: Process ID) |\n| NET | Managing network interfaces (NET: Networking) |\n| IPC | Managing access to IPC resources (IPC: InterProcess Communication) |\n| MNT | Managing file system mount points (MNT: Mount) |\n| UTS | Isolating kernel and version identifiers. (UTS: UNIX Timesharing System) |", - "page_start": 38, - "page_end": 38, - "source_file": "sg248459.pdf" - }, - { - "text": "**96** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\n* **Ephemeral storage** *\n\nContainer images are stored locally on the nodes running Red Hat OpenShift Container\n\nPlatform pods.\n\nWhen Docker run time is used, the /var/lib/docker mount point is used by active containers\n\nand pods. This local storage is where the node maintains a copy of container images that are\n\npulled from a container registry. This mount point is managed by docker-storage and it uses\n\nthe following naming format: /var/lib/docker/overlay2/<layer-id> and\n\n/var/lib/docker/containers/<container-id> .\n\n* **Persistent storage** *\n\nPersistent Volume Claims (PVC) are used to store the application data. These claims can be\n\nadded to the environment manually or provisioned dynamically by using a StorageClass\n\nobject.\n\n* **Storage classes** *\n\nThe StorageClass resource object describes and classifies different types of storage that can\n\nbe requested. It also provides a means for passing parameters to the backend for dynamically\n\nprovisioned storage on demand.\n\nStorageClass objects can also serve as a management mechanism for controlling different\n\nlevels of storage and access to the storage. Cluster Administrators (cluster-admin) or Storage\n\nAdministrators (storage-admin) define and create the StorageClass objects that users can\n\nuse without needing any intimate knowledge about the underlying storage volume sources.\n\nTherefore, the naming of the storage class that is defined in the StorageClass object must be\n\nuseful in understanding the type of storage it maps, whether that is storage from PowerVC\n\nCinder or from other storage provider.\n\n* **Persistent Volumes** *\n\nPersistentVolumes (PV) objects provide pods with non-ephemeral storage by configuring and\n\nencapsulating underlying storage sources. A PersistentVolumeClaim (PVC) abstracts an\n\nunderlying PV to provide provider-independent storage to OpenShift resources. When\n\nsuccessfully fulfilled by the system, a PVC mounts the persistent storage to a specific\n\ndirectory (mountPath) within one or more pods. From the container perspective, the\n\nmountPath is connected to the underlying storage mount points by a regular bind mount.\n\n* **FlexVolumes** *\n\nFlexVolume is known as an *out-of-tree plug-in interface* because it is developed outside the\n\nmain Kubernetes source code. The FlexVolume interface enables users to write their own\n\ndrivers. These drivers can be written in any programming or scripting language.\n\nWhen an application that is running on OpenShift needs a persistent volume, it submits a\n\npersistent volume claim to the PowerVC FlexVolume driver. The PowerVC FlexVolume call is\n\ntranslated into a Cinder API call to create a volume. When the volume is ready, it is presented\n\nback to OpenShift and attached to the requesting pod.\n\nThe persistent volume claim needs to include only the volume size and access mode. The\n\nbackend implementation information about how and where the volume is created are handled\n\nby PowerVC. The OpenShift API abstracts them from the user that is making the resource\n\nclaim.\n\n**Note:** For more information about the PowerVC FlexVolume, see [this web page](https://github.com/IBM/power-openstack-k8s-volume-driver) .", - "page_start": 111, - "page_end": 111, - "source_file": "sg248459.pdf" - }, - { - "text": "**24** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\n� Docker Client\n\nA Docker client is primary interface with which the user can use Docker features, as shown\n\nin Figure 2-11. Docker client starts APIs in this process. Developers build applications by\n\nusing Docker APIs.\n\n*Figure 2-11 Docker orchestration*\n\n### **2.4 Kubernetes: An open source container orchestration**\n\nThis section describes Kubernetes open source container orchestration.\n\n#### **2.4.1 What is container orchestration?**\n\n*Container orchestration* is the process of organizing properly to achieve the wanted\n\nperformance. Cloud-based applications are intended to be hosted on several commodity\n\nhardware on several hardware environments. These loosely coupled containerized objects\n\nmust be organized and coordinated to meet functional requirement, such as starting and\n\nstopping an application, and grouping and coordinating applications in a cluster. Some of the\n\nmost popular orchestration services are Apache Mesos, Google Kubernetes, and Docker\n\nSwarm.\n\nA container platform that is lead by Docker is used to package applications that were divided\n\ninto micro services. Such discrete services can be hosted on separate containers that are\n\nhelpful during the continues integration and continues delivery process. Container\n\norchestration is primarily focused on managing the lifecycle of containers for automated\n\ndeployment, management of nodes, scalability and availability of services based on work\n\nload, and networking among distributed containers in large systems.\n\nContainer orchestration configuration is created in YAML or JSON files. Based on the\n\ndeclarative configuration, container tools perform one or more of the following tasks:\n\n� Fetch required configuration image from repository by way of Docker Hub\n\n� Establish networks across container\n\n� Allocate storage and space", - "page_start": 39, - "page_end": 39, - "source_file": "sg248459.pdf" - }, - { - "text": "**148** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\nIf the RESOURCE_NAME parameter is omitted, all resources of the specified RESOURCE_TYPE are\n\nsummarized, as shown in Example 6-12.\n\n*Example 6-12 oc get pod*\n\n**# oc get pod**\n\nNAME READY STATUS RESTARTS AGE\n\ndocker-registry-3-4flql 1/1 Running 2 1d\n\nrouter-2-4gnmj 1/1 Running 3 1d\n\nrouter-2-cp5sf 1/1 Running 3 1d\n\nrouter-2-slkjf 1/1 Running 3 1d\n\nUse the **oc types** command for a quick refresher on the concepts of the available\n\nRESOURCE_TYPES, as shown in Example 6-13.\n\n*Example 6-13 oc types*\n\n**# oc types**\n\nCommand \"types\" is deprecated, refer to official documentation instead\n\nConcepts and Types\n\nKubernetes and OpenShift help developers and operators build, test, and deploy applications\n\nin a containerized cloud\n\nenvironment. Applications may be composed of all of the components below, although most\n\ndevelopers will be concerned\n\nwith Services, Deployments, and Builds for delivering changes.\n\nConcepts:\n\n* Containers:\n\nA definition of how to run one or more processes inside of a portable Linux\n\nenvironment. Containers are started from an Image and are usually isolated\n\nfrom other containers on the same machine.\n\n* Image:\n\nA layered Linux filesystem that contains application code, dependencies,\n\nand any supporting operating system libraries. An image is identified by\n\na name that can be local to the current cluster or point to a remote Docker\n\nregistry (a storage server for images).\n\n* Pods [pod]:\n\nA set of one or more containers that are deployed onto a Node together and\n\nshare a unique IP and Volumes (persistent storage). Pods also define the\n\nsecurity and runtime policy for each container.\n\n* Labels:\n\nLabels are key value pairs that can be assigned to any resource in the\n\nsystem for grouping and selection. Many resources use labels to identify\n\nsets of other resources.\n\n* Volumes:\n\nContainers are not persistent by default - on restart their contents are\n\ncleared. Volumes are mounted filesystems available to Pods and their\n\ncontainers which may be backed by a number of host-local or network\n\nattached storage endpoints. The simplest volume type is EmptyDir, which\n\nis a temporary directory on a single machine. Administrators may also\n\nallow you to request a Persistent Volume that is automatically attached\n\nto your pods.\n\n* Nodes [node]:", - "page_start": 163, - "page_end": 163, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 6. Installing Red Hat OpenShift 3.11 on IBM PowerVC **153**\n\nYou can get a list of events in a project by using the **oc events** command as follows:\n\nThe **oc logs RESOURCE_NAME** command retrieves the log output for a specific build,\n\ndeployment, or pod. This command works for builds, build configurations, deployment\n\nconfigurations, and pods.\n\nTo view the logs for the registry Pod use the **oc logs** :\n\nThe **oc rsync** command copies the contents to or from a directory in a running pod. If a pod\n\nhas multiple containers, you can specify the container ID by using the -c option. Otherwise, it\n\ndefaults to the first container in the pod. This is useful for transferring log files and\n\nconfiguration files from the container.\n\nTo copy contents from a directory in a pod to a local directory, run the following command:\n\noc rsync <pod>:<pod_dir> <local_dir> [-c <container>]\n\nTo copy contents from a local directory to a directory in a pod, run the following command:\n\noc rsync <local_dir> <pod>:<pod_dir> -c [<container>]\n\nUse the **oc port-forward** command to forward one or more local ports to a pod. This allows\n\nto listen on a specific or random port locally, and have data forwarded to and from specific\n\nports in the pod. This command features the following format:\n\noc port-forward <pod> [<local_port>:]<remote_port>\n\n**oc get events -n default**\n\nLAST SEEN FIRST SEEN COUNT NAME KIND\n\nSUBOBJECT TYPE REASON SOURCE MESSAGE\n\n7m 4d 704 template-service-broker.15d413288a764433\n\nClusterServiceBroker Normal FetchedCatalog\n\nservice-catalog-controller-manager Successfully fetched catalog entries from broker.\n\n2m 4d 1403 ansible-service-broker.15d41326aef38cda\n\nClusterServiceBroker Normal FetchedCatalog\n\nservice-catalog-controller-manager Successfully fetched catalog entries from broker.\n\n**Note:** For more information about events in OpenShift Container Platform 3.11, see [this ](https://docs.openshift.com/container-platform/3.11/dev_guide/events.html)\n\n[web page](https://docs.openshift.com/container-platform/3.11/dev_guide/events.html) .\n\n**oc logs docker-registry-3-4flql**\n\ntime=\"2019-11-09T19:08:13.824438413Z\" level=info msg=response go.version=go1.9.7\n\nhttp.request.host=\"10.130.0.48:5000\"\n\nhttp.request.id=274b894e-93b8-4186-9757-f4736ba792a9 http.request.method=GET\n\nhttp.request.remoteaddr=\"10.130.0.1:48328\" http.request.uri=/healthz\n\nhttp.request.useragent=kube-probe/1.11+\n\nhttp.response.duration=\"53.286μs\" http.response.status=200 http.response.written=0\n\ninstance.id=29752895-706b-4169-951c-351af53ad214\n\n**Note:** The OpenShift Container Platform 3.11 CLI Reference is available at [this web page](https://red.ht/2XZGBmz) .", - "page_start": 168, - "page_end": 168, - "source_file": "sg248459.pdf" - }, - { - "text": "**20** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\nContainers include the following key features and benefits:\n\n� Portability:\n\n- Single executable package with all code, configuration files, dependencies, and\n\nrequired libraries\n\n- Bundle must not include operating system-related files\n\n- Open runtime engine is a prerequisite\n\n- Common bins and libraries can be shared across multiple containers\n\n� Agility:\n\n- Container system is managed by Open Container Initiative\n\n- DevOps tools and process are used for rapid code deployment by using continuous\n\nintegration and continuous deployment (CI/CD)\n\n- Open Source Docker engine works for Linux and Windows platforms\n\n� Performance:\n\n- Multiple containers share operating system kernel for lightweight execution mode\n\n- Improves service usage, which results in reduced software license costs\n\n- Container start time is much faster than VM start time\n\n� Fault isolation:\n\n- During concurrent execution, each container runs independently. A fault in one\n\ncontainer does not affect other container’s execution.\n\n- Container engine takes advantage of operating system security isolation technique.\n\n� Ease of management:\n\n- Container orchestration manages installation, scalability, availability as defined\n\n- Application version upgrade, monitoring, and debugging managed centrally through\n\ncontainer orchestration system\n\n� Security:\n\n- Encapsulation and isolation is the first level of security for any containerized\n\napplication. A rogue application does not affect other applications of the hosting\n\nenvironment\n\n- Container engine inherits default security features from hosting platform\n\n- Namespace provides an isolated view; for example, file system, mount point, network,\n\nprocess ID, and User ID\n\n#### **2.3.2 History of containers**\n\nContainer seems a latest buzzword with cloud technology. However, a similar concept was\n\nused for the first time as early as 1970 where application code was decoupled from UNIX\n\nnative system calls.\n\nOvertime, a few more enhancements were made, from stand-alone computer systems to\n\nintegrated environments. Then, virtualization features evolved with LPAR and workload\n\npartition (WPAR) concepts. Although these virtualization features added flexibility, application\n\nportability always was a challenge. With containerization, new age software developers\n\nreceived all of the flexibility, portability, and security that they needed.", - "page_start": 35, - "page_end": 35, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed6_cc4.pdf", - "query": "How many people include the Dyspnea study ?", - "target_page": 1, - "target_passage": "This population-based study included 2,857 adults who were experiencing respiratory symptoms.", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "Approximately 65% of the variability in dyspnea\n\nremained unexplained by the factors examined in our\n\nstudy. Most individuals in our study showed normal\n\nspirometry results but still carried a substantial\n\nburden of dyspnea, an inconsistency that needs\n\nexplanation. Several factors not included in our\n\nanalysis may have contributed to the unexplained\n\nvariation. Environmental factors (eg, air pollution,\n\nallergen exposure, seasonal variations in symptoms)\n\nare potential contributors to this unexplained variability. <sup>22</sup> Genetic predispositions could also play a\n\nsigni fi cant role, as suggested by a study that revealed\n\nthat parents with dyspnea were 1.8 times more likely to have offspring with dyspnea. <sup>23</sup> Additionally, fi tness\n\ncould be a contributing factor, especially in\n\nindividuals with undiagnosed PRISm, asthma, or\n\nCOPD who may restrict their activities to avoid\n\ndyspnea, and hence become deconditioned. <sup>6</sup>\n\nThere were signi fi cant but modest differences in mean\n\ndyspnea levels across the 17 study sites (data not\n\nshown), which are not explained by the risk factors we\n\naccounted for in our study. This fi nding is not surprising\n\nbecause some of the potential contributing factors\n\npreviously mentioned and other site-speci fi c factors\n\n(eg, climate, air quality/industrialization, socioeconomic\n\nstatus) of the catchment population tend to vary across\n\nstudy sites.\n\nDyspnea is a complex, subjective symptom that is\n\nmodi fi ed by nonrespiratory factors including\n\npsychosocial, social, and environmental in fl uences. <sup>5</sup>\n\nInterindividual variability in the perception of dyspnea,\n\nin fl uenced by these nonrespiratory factors, may play an\n\nimportant role. A study conducted by Ziegler et al <sup>24</sup>\n\nassessed the perception of dyspnea in 42 healthy\n\nindividuals using a standardized inspiratory resistive\n\nloading stimulus. The study used the modi fi ed Borg\n\nscale to measure dyspnea perception levels. Among the\n\nparticipants subjected to the same inspiratory resistive\n\nload, 31%, 45%, and 24% of participants classi fi ed their\n\nlevel of dyspnea as low, intermediate, and high,\n\nrespectively. The study revealed that differences between\n\nindividuals contribute considerable variability to the\n\nperception of dyspnea, even among healthy participants.\n\nThe affective dimension of dyspnea can be captured\n\nusing additional questionnaires (eg, Multidimensional\n\nDyspnea Pro fi le, Dyspnea-12). Studies have explored the\n\nuse of the Multidimensional Dyspnea Pro fi le in\n\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment\n\nDisease Group Overall P Value\n\n| Reversibility of FEV 1 , % | Post-BD FEV 1 /FVC Ratio | Post-BD FEV 1 % predicted |\n|:---|:---|:---|\n| � 0.163 ( P ¼ .47) 0.186 ( P ¼ .16) 0.545 (P [ .01) 0.392 (P [ .002) � 0.290 ( P ¼ .39) | � 0.274 (P [ .05) 0.240 (P [ .005) 0.107 ( P ¼ .58) � 0.307 (P [ .05) 0.854 (P [ .002) | � 0.090 ( P ¼ .17) � 0.131 (P < .001) � 0.158 ( P ¼ .08) � 0.075 ( P ¼ .37) � 0.650 (P [ .004) |\n\nControl .096\n\nNormal spirometry < .001\n\nAsthma .009\n\nCOPD < .001\n\nPRISm < .001\n\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-speci fi c factors and spirometry\n\ndisease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical signi fi cance. BD ¼ bronchodilator; PRISm ¼ preserved ratio impaired spirometry.\n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea Coef fi cient (95% CI) P Value Dyspnea Coef fi cient (95% CI) P Value", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "Dyspnea refers to a subjective sensation of breathing discomfort. <sup>1</sup> In a study involving a community-based\n\npopulation aged > 70 years, the prevalence of dyspnea was found to be 32%. <sup>2</sup> Dyspnea can lead to limitations in\n\ndaily activities, reduced exercise tolerance, and\n\nheightened mortality risks. <sup>3</sup>\n\nDyspnea not only affects individuals with diagnosed\n\nrespiratory conditions but also poses a signi fi cant\n\nburden on those with undiagnosed conditions. In a systematic review by Müller et al, <sup>4</sup> the combined\n\nprevalence of dyspnea in the adult general population\n\nacross 11 studies was estimated to be 10%. Dyspnea can\n\narise from a broad spectrum of underlying factors,\n\nincluding both respiratory and nonrespiratory\n\nconditions. Studies have revealed that dyspnea is not\n\nsolely attributable to respiratory conditions but is also\n\nheavily in fl uenced by cardiovascular deconditioning and\n\nby nonrespiratory factors, including psychosocial, social,\n\nand environmental determinants. <sup>5</sup> <sup>,</sup> <sup>6</sup>\n\nDyspnea is a prevalent symptom with consequences that\n\nextend beyond its physiologic implications. A study in\n\nEuropean patients with COPD explored the burden of\n\ndyspnea and identi fi ed potential correlates. The study\n\nrevealed that higher dyspnea impact correlated with\n\nlower health-related quality of life, increased work\n\nimpairment, and a higher frequency of emergency\n\ndepartment visits. <sup>7</sup>\n\nThe three objectives of our study were as follows: (1) to\n\nevaluate the impact of dyspnea in adults from the\n\ngeneral population who had no prior diagnosis of\n\nrespiratory disease but who reported having signi fi cant\n\nrespiratory symptoms in the past 6 months; (2) to\n\nidentify associated risk factors for dyspnea and estimate\n\ntheir in fl uence on the symptom; and (3) to explore the\n\nrelationship between dyspnea and health care utilization,\n\nquality of life, and work productivity in adults with\n\nundiagnosed respiratory symptoms.\n\n### Study Design and Methods\n\n#### Recruitment of Undiagnosed Cases and Healthy\n\nControl Patients\n\nBetween June 2017 and January 2023, adults aged $ 18\n\nyears were recruited through a two-step process into the\n\nUndiagnosed COPD and Asthma Population (UCAP) study, a multicenter case fi nding study. Approval for\n\nthe study was obtained from the research ethics boards\n\nof the 17 participating study sites across Canada.\n\nInformed, written consent was provided by all study\n\nparticipants.\n\nBoth landlines and cellphones within a 90-minute radius\n\nof any of the 17 study sites were dialed randomly. A\n\nTake-home Points\n\nStudy Question: How profoundly are adults with\n\nundiagnosed respiratory symptoms affected by\n\ndyspnea?\n\nResults: In community-based adults with undiag-\n\nnosed respiratory symptoms, those identi fi ed with\n\npreserved ratio impaired spirometry experienced the\n\ngreatest impact of dyspnea, followed by those with\n\nundiagnosed asthma or COPD. Greater dyspnea\n\nimpact was associated with increased health care\n\nutilization, lower quality of life, and reduced work\n\nproductivity.\n\nInterpretation: Dyspnea imposes burdens on the\n\nhealth care system and is associated with impaired\n\nquality of life and work productivity.\n\nABBREVIATIONS: ASQ = Asthma Screening Questionnaire; BD =\n\nbronchodilator; CAT = COPD Assessment Test; PCA = principal\n\ncomponent analysis; PRISm = preserved ratio impaired spirometry;\n\nSGRQ = St. George ’ s Respiratory Questionnaire\n\nAFFILIATIONS: From The Ottawa Hospital Research Institute (J. B., E.\n\nG., K. L. V., G. G. A., S. M., and S. D. A.), University of Ottawa,\n\nOttawa, ON; the Desautels Faculty of Management (G. A. W.), McGill\n\nUniversity, Montreal, QC; the Department of Medicine (C. B.), The\n\nUniversity of British Columbia, Vancouver, BC; the Centre de\n\nrecherche (L.-P. B. and A. C.), Institut de cardiologie et de pneumo-\n\nlogie de Québec, Université Laval, Quebec, QC; the Cumming School", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "outpatients with cardiorespiratory disease <sup>25</sup> and the Dyspnea-12 in patients with asthma <sup>26</sup> and found that\n\nthe affective aspect of dyspnea can signi fi cantly in fl uence\n\nthe impact of dyspnea on health status, irrespective of\n\nthe intensity of breathlessness.\n\nIn those with PRISm, there was a strong, positive\n\nassociation between higher values for the FEV 1 /FVC\n\nratio and dyspnea. For the PRISm group, a higher\n\nFEV 1 /FVC ratio may re fl ect diminished lung\n\ncompliance due to interstitial lung disease and/or\n\nrespiratory system restriction due to obesity, which\n\ncould contribute to worse dyspnea. Conversely, the\n\nassociation of dyspnea with the FEV 1 /FVC ratio was in\n\nthe opposite direction for those with asthma or COPD,\n\nand a lower FEV 1 /FVC ratio correlated with worse\n\ndyspnea, as expected.\n\nOur study complements the literature by focusing on\n\nadults with undiagnosed respiratory symptoms who\n\nwere randomly selected and recruited through active\n\ncase fi nding in the community. This increases the\n\ngeneralizability of our results to a broader population.\n\nOur dyspnea questions were derived from widely used\n\nand validated respiratory health questionnaires, and\n\nour dyspnea assessment measure is a weighted average\n\nof responses to these validated questions.\n\nConsequently, the measure has an immediate\n\ninterpretation in terms of the lived day-to-day\n\nexperience of individuals.\n\nOur study has limitations. We did not undertake\n\nreliability/reproducibility testing of our questionnaire.\n\nThe dyspnea impact assessment score was statistically\n\nassociated with increased health care utilization, lower\n\nquality of life, and reduced work productivity; therefore,\n\nby virtue of this analysis, our questionnaire has\n\nconstruct validity. However, further attempts at external\n\nvalidation of the questionnaire using an independent\n\ndata set would be important. Health care utilization\n\nduring the preceding 12 months was assessed on entry\n\ninto the study, and there is potential for impaired recall\n\nof events. Our study may have missed asthma in some\n\nparticipants because bronchial challenge testing was not\n\nconducted on those who tested negative for air fl ow\n\nobstruction or BD responsiveness. A previous study\n\nshowed that an additional diagnostic step incorporating\n\nTABLE 8 ] Unadjusted and Adjusted Dyspnea Associations With Health Care Use\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea OR (95% CI) P Value Dyspnea OR (95% CI) P Value\n\nIn the past 12 mo, did you visit your general\n\npractitioner or a nurse practitioner or another\n\nphysician at a walk-in clinic for any breathing\n\nproblems?\n\n1.011 (1.007-1.014) < .001 1.011 (1.007-1.014) < .001\n\nIn the past 12 mo, did you visit an emergency\n\ndepartment for any breathing problems?\n\n1.015 (1.009-1.021) < .001 1.015 (1.009-1.022) < .001\n\nIn the past 12 mo, were you hospitalized for any\n\nbreathing problems or respiratory illness?\n\n1.021 (1.006-1.037) .006 1.023 (1.007-1.039) .005\n\nData are presented as OR (95% CI) with P values. Adjusted values are adjusted for age, sex, and BMI.\n\nTABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea OR (95% CI) P Value Dyspnea OR (95% CI) P Value\n\nAre you currently employed\n\n(working for pay)?\n\n0.995 (0.992-0.998) .002 0.993 (0.990-0.997) < .001\n\nMeasure <sup>a</sup> Dyspnea Coef fi cient\n\n(95% CI) P Value\n\nDyspnea Coef fi cient\n\n(95% CI) P Value\n\nAbsenteeism 0.061 (0.040-0.083) < .001 0.066 (0.044-0.089) < .001\n\nPresenteeism 0.334 (0.293-0.375) < .001 0.349 (0.306-0.392) < .001\n\nWork productivity loss 0.368 (0.323-0.413) < .001 0.383 (0.336-0.430) < .001\n\nActivity impairment 0.503 (0.463-0.544) < .001 0.501 (0.458-0.544) < .001\n\nORs and regression coef fi cients are presented with 95% CIs and P values. Adjusted coef fi cients are adjusted for age, sex, and BMI. WPAI ¼ Work Pro- ductivity and Activity Impairment questionnaire.\n\na Measures calculated from WPAI questions. 21", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "spirometry.\n\n#### Assessment of the Impact of Participants ’ Dyspnea\n\nAlthough neither the CAT nor the SGRQ are dyspnea-\n\nspeci fi c tools, both are recommended by the Global Initia-\n\ntive for Chronic Obstructive Lung Disease to evaluate symptoms, including dyspnea, <sup>20</sup> and both yield a richer\n\nassessment of dyspnea than the modi fi ed Medical Research Council breathlessness scale. <sup>20</sup> Fifteen questions\n\nwere taken from the CAT and SGRQ questionnaires that\n\nreferred to individuals ’ experiences with dyspnea, and a\n\ncomposite measure of dyspnea impact using a weighted\n\nsum of the responses to the 15 questions was constructed.\n\nQuestions were coded so that larger values indicate more\n\nimpactful dyspnea. Weights used for question responses\n\nin calculating the dyspnea impact assessment measure\n\nwere those of the fi rst component of a principal compo-\n\nnent analysis (PCA) based on the covariance matrix of\n\nquestion responses. Questions with multiple responses\n\nand ordinal structure are individually more informative\n\nand thus were accorded higher weight than individual\n\ntrue-false questions. No additional PCA component was\n\nanticipated a priori to be material for our investigation,\n\nand an eigenvalue analysis of the PCA was conducted to\n\nverify this assumption.\n\nThe composite dyspnea impact measure was scaled so its\n\nminimum value was 0 if the response to each of the 15\n\nquestions was 0, and the maximum value was scaled to\n\n100 if the individual responses for all 15 questions rep-\n\nresented the most severe dyspnea response.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "1.011; P < .001 for general practitioner visits; OR, 1.015;\n\nP < .001 for emergency department visits; and OR,\n\n1.023, P ¼ .005 for hospitalization for respiratory illness) ( Table 8 ).\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nassociated with a reduced likelihood of current\n\nemployment (OR, 0.993; P < .001), increased\n\nabsenteeism (coef fi cient, 0.066; P < .001), increased\n\npresenteeism (coef fi cient, 0.349; P < .001), higher work\n\nproductivity loss (coef fi cient, 0.383; P < .001), and\n\ngreater activity impairment (coef fi cient, 0.501; P < .001),\n\nas measured by the Work Productivity and Activity Impairment questionnaire <sup>21</sup> ( Table 9 ).\n\n### Discussion\n\nOur study explored dyspnea in community-based adults\n\nwith undiagnosed respiratory symptoms identi fi ed via\n\ncase fi nding. Surprisingly, we found that the dyspnea\n\nexperienced by those with PRISm had a greater impact\n\non their activities and health status than those with\n\nnewly diagnosed COPD or asthma.\n\nThe prevalence of individuals who were obese and\n\nmorbidly obese in the PRISm group partially explains\n\nthe between-group difference in dyspnea. The excess\n\ndyspnea seen in the PRISm group when compared with\n\nthe normal spirometry group is partly explained by\n\npatient-speci fi c risk factors, including BMI, which\n\nshrink the mean dyspnea differential between the groups\n\nfrom 11.2 to 5.5 points ( Tables 3-6 ). The remaining 5.5-\n\npoint difference indicates that PRISm patients have\n\nexcess dyspnea relative to symptomatic individuals with\n\nnormal spirometry for additional reasons other than\n\nobesity.\n\nTABLE 4 ] Sequential Regression Analyses of Risk Factors Contributing to Variability in Dyspnea: Dyspnea\n\nRegressed on Patient-Speci fi c Risk Factors (20.6% of Variability Explained)\n\nRisk Factor P Value\n\n| Regression Coef fi cient |\n|:---|\n| � 0.0909 8.217 0.899 1.420 � 2.149 0.144 5.123 0.00975 10.119 4.813 6.892 1.627 3.433 1.738 0.952 4.663 1.081 2.073 8.463 |\n\nAge .005\n\nFemale < .001\n\nBMI < .001\n\nHousehold income < CAD $30,000 .40\n\nHousehold income $ CAD $30,000 .07\n\nSmoking history, pack-y < .001\n\nSmoking exposure < .001\n\nOccupational exposure < .001\n\nCongestive heart failure .004\n\nCoronary artery disease .001\n\nDepression/anxiety < .001\n\nDiabetes mellitus .22\n\nHypertension < .001\n\nAnemia .15\n\nCancer .49\n\nGERD < .001\n\nLiver disease .61\n\nRenal disease .32\n\nStroke < .001\n\nBoldface indicates statitistical signi fi cance. GERD ¼ gastroesophageal re fl ux disease.\n\nTABLE 5 ] Dyspnea Regressed on Spirometry Disease\n\nGroup\n\nDisease Group P Value\n\n| Regression Coef fi cient |\n|:---|\n| � 31.2 NA 4.6 3.8 5.5 51.9 |\n\nControl < .001\n\nNormal spirometry <sup>a</sup> NA\n\nAsthma .001\n\nCOPD .003\n\nPRISm .001\n\nConstant NA\n\nDyspnea regressed on spirometry disease group, after removing contri-\n\nbutions from subject-speci fi c factors in Table 4 (12.4% of variability\n\nexplained). Boldface indicates statitistical signi fi cance. NA ¼ not appli- cable; PRISm ¼ preserved ratio impaired spirometry. a Normal spirometry group is the reference category.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "exposure in an array of risky occupations. These risk\n\nfactors, taken as a whole, accounted for 21% of the\n\nvariability in dyspnea.\n\nAfter adjustment for patient-speci fi c risk factors in the\n\nfi rst stage analysis, we adjusted for spirometry-de fi ned\n\ndisease (PRISm, asthma, COPD, or normal\n\nspirometry) in Table 5 . Adjustment for disease\n\nclassi fi cation accounted for 12% of the total variability\n\nof dyspnea.\n\nTable 6 presents the contribution of lung function\n\nmeasures of physiologic impairment after accounting for\n\npatient-related risk factors and disease classi fi cation. For\n\nthe PRISm disease group, a higher post-BD FEV 1 /FVC\n\nratio and a lower post-BD FEV 1 % predicted value were\n\nassociated with greater dyspnea impact. For the COPD\n\ndisease group, a lower post-BD FEV 1 /FVC ratio was\n\nassociated with greater dyspnea impact. Reversibility of\n\nFEV 1 was associated with higher dyspnea impact only in\n\npatients with asthma or COPD. Lung function measures\n\nof disease severity accounted for 2% of the variability in\n\ndyspnea.\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nnegatively associated with all domains of quality of life,\n\nincluding physical functioning (coef fi cient, � 0.655; P < .001), role limitations due to physical health\n\n(coef fi cient, � 0.628; P < .001), general health (coef fi cient, � 0.382; P < .001), and total score (coef fi cient, � 0.473; P < .001) ( Table 7 ).\n\nAfter adjusting for age, sex, and BMI, dyspnea was\n\nassociated with an increased likelihood of annual visits\n\nto health care providers for respiratory complaints (OR,\n\nTABLE 3 ] Intergroup Comparisons of Dyspnea Impact\n\nPairwise Comparison P Value\n\n| Mean Dyspnea Score (95% CI) | Mean Difference (95% CI) |\n|:---|:---|\n| 13.8 (11.8-15.7) 51.8 (50.7-52.8) 13.8 (11.8-15.7) 57.5 (55.1-59.9) 13.8 (11.8-15.7) 56.6 (53.9-59.3) 13.8 (11.8-15.7) 63.0 (59.5-66.4) 51.8 (50.7-52.8) 57.5 (55.1-59.9) 51.8 (50.7-52.8) 56.6 (53.9-59.3) 51.8 (50.7-52.8) 63.0 (59.5-66.4) 63.0 (59.5-66.4) 57.5 (55.1-59.9) 63.0 (59.5-66.4) 56.6 (53.9-59.3) 56.6 (53.9-59.3) 57.5 (55.1-59.9) | � 38.0 ( � 41.1 to � 34.9) � 43.7 ( � 47.6 to � 39.8) � 42.8 ( � 46.9 to � 38.7) � 49.2 ( � 53.7 to � 44.6) 5.7 (3.0 to 8.4) 4.8 (1.8, 7.8) 11.2 (7.5 to 14.8) 5.5 (1.1 to 9.8) 6.4 (1.9 to 10.9) 0.9 ( � 2.8 to 4.7) |\n\nControl < .001\n\nNormal spirometry\n\nControl < .001\n\nCOPD\n\nControl < .001\n\nAsthma\n\nControl < .001\n\nPRISm\n\nNormal spirometry < .001\n\nCOPD\n\nNormal spirometry .002\n\nAsthma\n\nNormal spirometry < .001\n\nPRISm\n\nPRISm .014\n\nCOPD\n\nPRISm .005\n\nAsthma\n\nAsthma .63\n\nCOPD\n\nPRISm ¼ preserved ratio impaired spirometry.\n\n**Dyspnea assessment**\n\n100\n\n80\n\n60\n\n40\n\n20\n\nNormal\n\nspirometry\n\nAsthma COPD PRISm Healthy\n\ncontrol\n\nparticipants\n\n0\n\nFigure 2 - Box plot demonstrating dyspnea impact according to\n\nspirometry disease classi fi cation. The center line marks the median. The\n\nboxes span the interquartile range (IQR). The outer fences are set at\n\ndistances 1.5 � IQR from the box. Outliers appear as plotted dots.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "bronchial challenge testing into a case fi nding strategy\n\nidenti fi ed asthma in 26% of symptomatic individuals\n\nwho had normal spirometry and no response to BD. <sup>27</sup>\n\nIndividuals with undiagnosed respiratory symptoms,\n\ndetermined to have asthma or COPD through spirometry, experience poor health status. <sup>28</sup> Therefore,\n\nthe implementation of known treatment approaches for\n\nasthma or COPD is important to improve their conditions. <sup>29</sup> In contrast, those with normal spirometry\n\nor PRISm face unclear treatment approaches. Long-\n\nacting BD therapy in symptomatic individuals with\n\ntobacco exposure with normal spirometry is not effective. <sup>30</sup> Weight management programs may be useful\n\nfor individuals who are obese with PRISm-related\n\ndyspnea; however, this awaits de fi nitive clinical trials. <sup>31</sup>\n\nDyspnea was severe and prevalent within our study\n\ngroup; however, it remained undiagnosed. A study conducted by Stefan et al <sup>32</sup> revealed that physicians\n\nunderestimated their patients ’ dyspnea 37.9% of the\n\ntime, whereas nurses underestimated it 3.5% of the time.\n\nMoreover, many patients limit their physical activities,\n\nwhich lead them to downplay the extent of their dyspnea. <sup>19</sup> Patient underreporting of symptoms, coupled\n\nwith inadequate physician-led investigations of\n\nsymptoms, may explain why dyspnea often goes\n\nundiagnosed in the population. <sup>33</sup>\n\nIn conclusion, our study measured dyspnea impact in\n\nindividuals with no preexisting diagnosis of lung disease\n\nwho reported respiratory symptoms as part of a\n\npurposeful case fi nding strategy. Individuals with PRISm\n\nexhibited the greatest impact of dyspnea, even higher\n\nthan those newly diagnosed with asthma or COPD.\n\nAfter adjusting for patient factors, comorbidities,\n\npulmonary diseases, and severity of lung physiologic\n\nimpairment, most of the variability in dyspnea remained\n\nunexplained. We also showed that dyspnea was\n\nassociated with increased health care utilization,\n\nimpaired quality of life, and work productivity.\n\n### Funding/Support\n\nThis study is supported by the Canadian Institutes of\n\nHealth Research [FDN Grant 154322].\n\n### Financial/Non fi nancial Disclosures\n\nNone declared.\n\n### Acknowledgments\n\nAuthor contributions: S. D. A. and G. A. W.\n\ncontributed to conception and design. J. B., E.\n\nG., G. A. W., K. L. V., and S. D. A.\n\ncontributed to analysis and interpretation. J.\n\nB., E. G., G. A. W., K. L. V., S. D. A., C. B., C.\n\nL., L.-P. B., A. C., E. P., S. K. F., S. G., R. A.\n\nM., I. M., M. B., P. H., M. D. L., M. A., C. J. L.,\n\nT. A., N. E., G. G. A., and S. M. contributed to\n\ndrafting the manuscript for important\n\nintellectual content. All authors had access to\n\nand participated in the interpretation of the\n\ndata and provided input into the preparation\n\nand submission of the manuscript. The\n\nauthors vouch for the accuracy and\n\ncompleteness of the data.\n\nRole of sponsors: The sponsor had no role in\n\nthe design of the study, the collection and\n\nanalysis of the data, or the preparation of the\n\nmanuscript.\n\nOther contributions: We thank the\n\nfollowing individuals from the Canadian\n\nstudy sites: Ottawa Hospital Research\n\nInstitute, Ottawa, Ontario: Taylor Poulin;\n\nSusan Deveau, RRT; Victoria Thompson;\n\nMeredith McCleery; Angelina Tohme; Vicky\n\nPanteleakos, RRT; Geneviève Longtin, RRT;\n\nJoanne Cassidy, RRT; Amanda Bergeron,\n\nMSc; Jennifer Biggs, RN; Jessica Bergeron;\n\nand Elisabet White; Vancouver General\n\nHospital, Vancouver, British Columbia:\n\nShelley Abercromby, BSc; Jana Caine; David\n\nSavage; Natasha Verzosa; Ravneet Mahal; and\n\nMary Justine Angeles; Queen Elizabeth II\n\nHealth Sciences Centre, Halifax, NS: Scott\n\nFulton, RRT; Hôpital du Sacré Coeur de\n\nMontréal, Montréal, QC: Simone Chaboillez,\n\nMT; and Meliza Benabdallah; St. Joseph ’ s\n\nHamilton, Hamilton, ON: Liz Johnson; St.\n\nBoniface Hospital, Winnipeg, MB: Cheryl\n\nNoble, RN; Institut Universitaire de", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "#### Risk Factors Associated With Dyspnea\n\nPatient-related risk factors were considered fi rst, and re-\n\nsults of spirometry considered afterward. The spirom-\n\netry risk factors chosen for the second stage analysis\n\nincluded the spirometry-based diagnosis of the patient\n\n(asthma, COPD, PRISm, or normal) and lung function\n\nresults indicative of the severity of physiologic impair-\n\nment. Severity was gauged by assessing three principal\n\nlung function measures: (1) post-BD FEV 1 % predicted,\n\n(2) post-BD FEV 1 /FVC ratio, and (3) percentage\n\nreversal of FEV 1 with BD.\n\n#### Dyspnea Impact and Health Care Use, Quality of\n\nLife, and Work Productivity\n\nThe impact of dyspnea and its associations with health\n\ncare use, quality of life, and work productivity were exam-\n\nined. Health care utilization was assessed through self-\n\nreported data. Quality of life was assessed using the 36-\n\nItem Short Form Health Survey questionnaire, where\n\nhigher scores indicate better health status. Work produc-\n\ntivity was assessed using the Work Productivity and Activ-\n\nity Impairment questionnaire, where higher scores\n\nindicate greater impairment in work productivity and\n\ndaily activities.\n\n#### Statistical Analysis\n\nBox plots were used to compare distribution patterns of\n\ndyspnea impact assessments among the disease groups.\n\nPairwise comparison tests were conducted to evaluate\n\nmean dyspnea differences between groups. Multiple\n\nlinear regression analysis was used to measure contribu-\n\ntions to variability of dyspnea by selected patient-speci fi c\n\nrisk factors, spirometry disease classi fi cation, and key\n\nlung function measures. The selected sets of risk factors\n\nwere evaluated using successive regression analyses.\n\nAnalysis of variance sums of squares from the successive\n\nregression analyses provided the cumulative percentage\n\ncontributions to variability of dyspnea. Simple, multiple,\n\nand logistic regression analyses were used to study asso-\n\nciations between dyspnea and health care utilization,\n\nquality of life, and work productivity outcomes. All sta-\n\ntistical analyses were done using STATA 16 statistical\n\nsoftware (StataCorp).\n\n### Results\n\nFigure 1 illustrates the results of the case fi nding\n\napproach, including the enrollment of the control group.\n\nAmong 5,631 potentially eligible participants, 1,359\n\nparticipants (24%) did not meet the threshold of $ 6\n\npoints on the ASQ or $ 20 points on the COPD-\n\nDiagnostic Questionnaire and were thus excluded,\n\nleaving 4,272 individuals deemed eligible for spirometry.\n\n38,353 individuals indicated that they had respiratory\n\nsymptoms and were phoned back by study personnel\n\n26,905 were symptomatic\n\n11,448 had no respiratory symptoms\n\n5,631 potentially eligible for the\n\ncase finding study\n\n1,359 did not score ≥ 6\n\npoints on ASQ or ≥ 20\n\npoints on the COPD-DQ\n\n2,090 (73.2%) had normal\n\nspirometry\n\n265 (9.3%) had\n\nundiagnosed asthma\n\n330 (11.5%) had\n\nundiagnosed COPD 172 (6.0%) had PRISM\n\n21,274 excluded\n\n8,273 Previous diagnosis of asthma\n\n5,363 Previous diagnosis of COPD\n\n190 Age < 18 years\n\n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary\n\nfibrosis, or lung cancer\n\n1,331 History of MI, heart problems, stroke, aortic or cerebral\n\naneurysm, eye surgery, or detached retina in past 3 mos.\n\n19 Pregnant, in the third trimester\n\n3,715 Under care of respirologist or using an inhaled respiratory\n\n1,415 did not complete spirometry\n\n1,337 refused to travel to study site\n\n67 participants unable to complete acceptable\n\nspirometry\n\n11 participants deemed ineligible after consent\n\n4,272 potentially eligible for the\n\ncase finding study\n\n2,857 completed pre and post\n\nbronchodilator spirometry and\n\ncould be evaluated for a\n\ndiagnosis of asthma or COPD\n\n231 healthy controls with\n\nno respiratory symptoms\n\nwho scored 0 points on the\n\nASQ were selected and\n\ncompleted pre and post\n\nbronchodilator spirometry", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "complete adequate spirometry. Ultimately, 2,857 (67%)\n\nof those eligible underwent both pre- and post-BD\n\nspirometry.\n\nOf these 2,857 participants, 2,090 (73.2%) had normal\n\nspirometry, 265 (9.3%) had undiagnosed asthma, 330\n\n(11.5%) had undiagnosed COPD, and 172 (6.0%) had\n\nPRISm based on post-BD spirometry. Of the 595\n\nindividuals with spirometric evidence of asthma or\n\nCOPD, 253 were independently assessed by a\n\npulmonologist. In 245 of these 253 cases (97%), the\n\nindependent physician diagnosis agreed with the study\n\ndiagnosis of asthma or COPD.\n\nIndividuals in the COPD group were generally older\n\nand more likely to be male compared with all other\n\nstudy groups ( Table 1 ). All groups, including healthy\n\ncontrol participants, had mean BMIs in the overweight\n\nor obese ranges. The PRISm group was heaviest with an\n\naverage BMI of 34.7, and 22% of PRISm patients met\n\nBMI criteria for morbid obesity. Compared with all\n\nother groups, those with COPD were the most likely to\n\nhave active or previous tobacco use, with the highest\n\naverage total pack-years of 32.7. The control group had\n\nthe lowest number of people with active or previous\n\ntobacco use.\n\nTable 2 shows mean responses to the 15 dyspnea\n\nquestions for each disease classi fi cation and presents\n\nquestion weights (PCA scoring coef fi cients) used for\n\ncalculating the dyspnea impact assessment.\n\nIndividuals with PRISm reported the highest dyspnea\n\nimpact, with a signi fi cantly greater mean score (63.0;\n\n95% CI, 59.5-66.4) than those with undiagnosed\n\nasthma or COPD ( Table 3 ). Those with undiagnosed\n\nasthma or COPD had similar mean scores (56.6;\n\n95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9,\n\nrespectively), followed by those with normal\n\nspirometry (51.8; 95% CI, 50.7-52.8). All four groups\n\nreported signi fi cantly more impactful dyspnea than\n\nthe control group (mean score, 13.8; 95% CI, 11.8-\n\n15.7). Table 3 shows between-group differences in\n\nmean dyspnea impact assessments for each pair of\n\ndisease outcomes. Figure 2 compares box plots of the\n\ndyspnea impact assessment values across disease\n\nclassi fi cations.\n\nTable 4 presents the association of dyspnea with\n\npatient-speci fi c risk factors. Dyspnea impact increased\n\nwith younger age, being female, higher BMI, higher\n\nsmoking and smoke exposure history, and total work TABLE 2\n\n]\n\n(Continued)\n\nQuestions About Dyspnea From CAT and SGRQ\n\nControl Group (n\n\n¼\n\n231)\n\nNormal Spirometry Group (n\n\n¼\n\n2,090)\n\nAsthma Group (n\n\n¼\n\n265)\n\nCOPD Group (n\n\n¼\n\n330)\n\nPRISm Group (n\n\n¼\n\n172)\n\nQ13 (weight\n\n¼\n\n0.132)\n\nMy breathing makes it dif\n\nfi\n\ncult to do things such as climbing up hills, carrying things up stairs, light gardening such as weeding, dancing, bowling, or gol fi ng, %\n\n8\n\n54\n\n59\n\n69\n\n74\n\nQ14 (weight\n\n¼\n\n0.123)\n\nMy breathing makes it dif\n\nfi\n\ncult to do things such as carrying heavy loads, digging the garden or shoveling snow, jogging, or walking at 5 km/h, playing tennis or swimming, %\n\n13\n\n65\n\n71\n\n78\n\n81\n\nQ15 (weight\n\n¼\n\n0.108)\n\nMy breathing makes it dif\n\nfi\n\ncult to do things such as very heavy manual work, running, cycling, swimming fast, or playing competitive sports, %\n\n17\n\n74\n\n79\n\n85\n\n88 Data are presented as mean (SD) for Q1, Q2, and Q3 (total), and Q3 to Q15 were presented to participants as yes or no questions, where percentages of participants who answered yes are shown. Question weights (principal component analysis scoring coef\n\nfi cients) used for calculating the dyspnea assessment are shown below individual questions. CAT\n\n¼\n\nCOPD Assessment Test; PRISm\n\n¼\n\npreserved ratio impaired spirometry;\n\nQ\n\n¼\n\nquestion; SGRQ\n\n¼\n\nSt. George\n\n’\n\ns Respiratory Questionnaire.", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed6_cc4.pdf" - }, - { - "text": "## Impact of Dyspnea on Adults With Respiratory Symptoms Without a De fi ned Diagnosis\n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD;\n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD;\n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD;\n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD;\n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD\n\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health\n\ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory\n\nsymptoms.\n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory\n\nsymptoms?\n\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were\n\nexperiencing respiratory symptoms. These individuals had not been previously diagnosed\n\nwith any lung conditions and were recruited from 17 Canadian centers using random digit\n\ndialing. Each participant underwent spirometry testing both before and after using a bron-\n\nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved\n\nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age-\n\nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A dyspnea impact assessment score from 0 to 100 was produced using questions from the\n\nCOPD Assessment Test and St. George ’ s Respiratory questionnaire.\n\nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, 63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; 95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All groups reported signi fi cantly more impactful dyspnea than the control group (mean score,\n\n13.8; 95% CI, 11.8-15.7). Patient-speci fi c risk factors including age, sex, BMI, smoking, and\n\ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the\n\nvariation was explained by disease classi fi cation and another 1.7% by the severity of lung\n\nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater\n\ndyspnea impact was associated with increased health care utilization, lower quality of life, and\n\nreduced work productivity.\n\nINTERPRETATION: Our fi ndings showed that in community-based adults with undiagnosed\n\nrespiratory symptoms, those identi fi ed with PRISm experienced the greatest impact of dys-\n\npnea. Dyspnea imposes burdens on the health care system and is associated with impaired\n\nquality of life and work productivity. CHEST 2024; 166(6):1296-1308\n\nKEY WORDS: asthma; case fi nding; COPD; dyspnea\n\nFOR EDITORIAL COMMENT, SEE PAGE 1259\n\n[ Asthma Original Research ]", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "CompostGuide.pdf", - "query": "Can I put my plants directly on my compost ?", - "target_page": 2, - "target_passage": "Don’t\tput\tplants\tinto\t100%\tcompost.\t\tMix\t\t\t\t\t\t\t\t\t compost\tthoroughly\tinto\texisting\tsoil\tbefore\t\t\t planting.", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "##### Compost Questions and Answers\n\n####### **What is compost?**\n\nCompost is a natural humus-like soil amendment that results from\n\nthe controlled aerobic (with oxygen) decomposition of organic\n\nmaterials. Compost is not soil - it should be mixed with soil. It is\n\nnot fertilizer, although it contains many slowly released nutrients.\n\n####### **What materials (“feedstocks”) are used to make compost?**\n\nCompost facilities in Washington recycle a variety of organic\n\nmaterials, including yard debris, food scraps, manure, biosolids,\n\nforest residuals like sawdust and bark, construction wood, and\n\nagricultural residues. All of these materials can be used to produce\n\nhigh quality compost. Your supplier can tell you which materials\n\nthey compost.\n\n####### **How do I know I’m getting safe, quality compost?**\n\nFortunately, in Washington we have strict permitting and production\n\nstandards for compost facilities, that include both time and\n\ntemperature requirements and contaminant limits.\n\n####### **What about weed seeds, plant diseases or pesticide residues?**\n\nThe controlled time, aeration, and temperature process required in\n\nWashington has been shown to kill weed seeds and plant diseases.\n\nThat same process breaks down most pesticide residues. There are\n\na few agricultural pesticides that are not easily broken down, and\n\npermitted Washington compost manufacturers carefully watch their\n\nfeedstocks to keep those materials out of the composting process.\n\n##### Compost Beginnings\n\nThe yard debris or food scraps* that you\n\nplace into your home compost bin, take to\n\na drop-off site, or set out for curbside\n\ncollection could become the compost that\n\nyou later use on your garden, lawn, and\n\nflowerbeds.\n\nIt is essential to place only quality organic\n\nmaterial into the composting process. Here\n\nare some tips:\n\nl The products you use or spray in your\n\nyard can end up in the compost process.\n\nCarefully read the labels of pesticide and\n\nherbicide products you use. (See page 9.)\n\nl Please keep yard debris free of :\n\nx Garbage\n\nx Plastic of any sort\n\n- Plastic plant pots\n\n- Plastic plant tabs\n\n- Plastic bags (if you want to bag\n\nyour yard debris, use paper\n\ngarden bags - available at most\n\ngarden centers)\n\nx Rock, brick, or masonry\n\nx Glass or metal\n\nx Pet waste.\n\n* Many localities now collect food scraps and\n\nfood-soiled paper along with yard debris for\n\ncomposting. Call your local collection service\n\nto find out what is collected in your area.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### Building Rich and Healthy Soil With Compost\n\nTo grow healthy plants you need healthy soil.\n\n**Healthy Soil:**\n\nl Is teeming with life! Healthy soil is a miniature ecosystem.\n\nA teaspoon of healthy soil will have upwards of four billion\n\ntiny organisms which recycle nutrients, suppress disease, and\n\ndiscourage pests.\n\nl Retains moisture but allows drainage. Healthy soil has\n\nstructure that allows water to drain through, retains moisture,\n\nand promotes strong root growth.\n\nl Is full of organic nutrients. Plants depend on the micro-\n\norganisms found in healthy organic-rich soil to provide\n\nnutrients to their roots, and help them thrive.\n\nA healthy garden and landscape is naturally resistant to pests,\n\ndrought, weeds, and diseases. Maintaining healthy soil may allow\n\nyou to reduce use of chemical fertilizers and pesticides.\n\n####### **Soil is a planting medium. Compost is a soil amendment.**\n\n####### **Do not place plants directly into 100% compost.**\n\n####### **Ask your supplier or see next page for mixes for different uses.**\n\n**Washington State Encourages the Use of Compost,**\n\n**to Protect Our Water Quality**\n\nThe Washington State Department of Ecology recommends that soils\n\non construction sites be restored with compost before planting, and also\n\nencourages the use of compost for construction site erosion control, to reduce\n\nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean.\n\nLearn more at **www.SoilsforSalmon.org** or **www.BuildingSoil.org.**\n\n##### Selecting Quality Compost\n\nCompost is available in many product types and blends that may be\n\nused for different gardening applications. The type of feedstock,\n\nthe composting process, and any supplementary additives determine\n\nthe end product.\n\nMany facilities offer a variety of blends based on compost, such as\n\ngarden mix, potting soil, planting mix, mulches, turf top-dressing\n\nand soil blends.\n\n**What to Look for in Compost**\n\nFor most compost applications you will want a finished product that\n\nhas matured and stabilized. Look for material\n\nl with a dark, crumbly texture\n\nl with a mild odor\n\nFor most compost applications you will not want compost that is\n\nextremely dry or wet, or extremely hot. (Note that it is okay for\n\ncompost to be warm and to give off some steam and mild odor.)\n\n**Quality Testing at Composting Facilities**\n\nFeel free to ask your compost provider if they have a quality control\n\nprogram, and ask for test results. Compost facilities in Washington\n\nare permitted by the Department of Ecology and must meet\n\nstandards for both the composting process and contaminants,\n\nensuring a quality product. Some facilities also participate in the\n\n“Seal of Testing Assurance” (STA) testing program. See\n\n“Resources” on page 11 to learn more.\n\n####### **Remember:**\n\n####### **Your compost provider can help you pick the best compost mix**\n\n####### **for your needs.**", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### The Composting Process\n\nEven though there are a variety of composting methods, most\n\ncomposting follows a similar process:\n\n**1. Grinding Organic Materials:**\n\nDepending on the facility, the feedstock (material) available, and\n\nthe desired compost product, different combinations of materials\n\nare added together and ground into small pieces:\n\n- Nitrogen-rich materials (such as grass, fresh plant\n\ncuttings, biosolids, and manures)\n\n- Carbon-rich materials (such as dried leaves, woody\n\nmaterials, and straw).\n\n**2. Heating Up:**\n\nThe material is placed into piles where it begins to heat up from\n\nthe biological activity of the compost microbes. Typically, com-\n\npost temperatures are required to reach at least 131 degrees F in a\n\nspecified time period in order to destroy weed seeds and patho-\n\ngens. The compost is turned or aerated, allowing the composting\n\nmicrobes to breathe. After a period of time, the nitrogen-rich\n\nmaterial is depleted, the biological process slows, and the hot\n\ncompost begins to cool.\n\n**3. Finishing:**\n\nTypically “finished” compost has undergone a series of steps to\n\nensure maturity and stability. The cooling compost is aged, which\n\nallows the decomposition process to slow down and the finished\n\ncompost to stabilize.\n\nThe end products you purchase may be entirely compost, or a\n\ncombination of compost blended with uncomposted additives\n\n(such as peat, bark, minerals, or soil).\n\n##### Applications for Compost\n\n####### **Planting New Garden Beds or Lawns**\n\nSpread a 2-4 inch layer of compost and mix into the upper 6-12\n\ninches of existing soil: use more in sandy soils, and less in heavy clay.\n\nReapply ½-1 inch annually on garden beds.\n\n####### **Mulch (surface applications on landscape beds)**\n\nSpread a 1-2 inch layer of coarse, woody compost. To allow proper\n\nairflow, it is best not to pile mulch around the stems of trees and\n\nshrubs. Pull mulch 1-2 inches away from stems.\n\n####### **Top Dressing for Lawns**\n\nSpread a ¼ to ½ inch layer of fine screened compost, and rake it into\n\nthe lawn. For best results, plug-aerate the lawn before top-dressing.\n\nOverseeding at the same time will thicken thin patches in lawns.\n\n####### **Blended (Manufactured) Topsoils**\n\nGood quality “topsoil” products usually include 10-40% compost by\n\nvolume, mixed with a sandy loam soil that allows good drainage.\n\nThese compost-soil blends help establish healthy lawns and gardens.\n\n**When to Use Compost?**\n\n- Any time you’re preparing soil for planting\n\n- Mulching beds and gardens in spring, summer, or fall\n\n- Top-dressing lawns in spring or fall.", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### Compost: A Natural Cycle\n\nComposting is a natural process in which micro-\n\norganisms and macro-organisms break down organic\n\nmaterial (leaves, twigs, grass, etc.) into a dark crum-\n\nbly soil amendment. Modern compost facilities use\n\nthe same natural biological composting process.\n\nTheir controlled-temperature process works faster,\n\nbreaks down pesticide residues, and also kills weed\n\nseeds and plant diseases.\n\nCompost improves soil structure and plant\n\ngrowth by\n\n- Replenishing soil organic matter, and storing\n\nnutrients in plant-available forms\n\n- Supporting beneficial soil life\n\n- Reducing erosion and water run-off\n\n- Loosening clay soils for better root\n\ndevelopment (increasing soil pore space)\n\n- Retaining moisture in sandy soils so\n\nplants need less watering.\n\n##### Comparing Landscape Products\n\nA variety of soil and landscape products are sold. Here’s a\n\ncomparison:\n\n**Compost** is stable, decomposed organic matter, excellent for\n\nimproving soil structure, fertility, moisture holding capacity, and\n\nplant growth.\n\n**Mulch** is any material applied to the soil surface. Woody mulches\n\n(high in carbon, low in nitrogen) like wood chips, bark and woody\n\ncomposts are great for woody plants. Annual plants should be\n\nmulched with nutrient-balanced mulches like compost, grass\n\nclippings, or leaves.\n\n**Peat Moss** is partially decayed sphagnum moss from peat bogs. It\n\nprovides soil porosity, but not the nutrients or biological diversity for\n\nhealthy soil that compost provides.\n\n**Fertilizers** are concentrated sources of plant nutrients, used in small\n\namounts to supplement natural soil fertility.\n\n**Topsoil** that is sold is usually not native topsoil. Quality\n\nmanufactured topsoils are a blend of native sandy sub-soils with\n\ncomposted organic matter to support soil life.\n\nAsk Your Compost Supplier\n\n**Whether you’re buying direct from the composting facility, or from a local**\n\n**vendor, here are some good questions to ask:**\n\n**- What ingredients go into your compost?**\n\n**- What compost products or blends do you sell?**\n\n**- Are there quality control or testing results available for these**\n\n**products? (These may be on the manufacturer’s website.)**\n\n**- Which product is best for my intended use?**\n\n**- What application rate do you recommend?**\n\n**- How much do I need for my area? (Or see pages 4-6.)**", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### Resources\n\n**Compost Organizations**\n\n####### **Washington Organic Recycling Council**\n\nFind a compost producer in your area\n\nwww.compostwashington.org\n\n####### **US Composting Council**\n\nSeal of Testing Assurance (STA) program\n\nwww.compostingcouncil.org/programs/sta/\n\n**Restoring the Soil to Protect our Waterways**\n\nwww.soilsforsalmon.org\n\nCompost amendment and erosion control\n\nduring construction: information for builders\n\nwww.buildingsoil.org\n\n**Natural Lawn & Garden Care, Soils, and Home**\n\n**Composting**\n\n####### **City of Seattle**\n\nwww.seattle.gov/util/services/yard\n\n####### **King County**\n\nwww.kingcounty.gov/soils\n\n####### **Washington State University**\n\nwww.puyallup.wsu.edu/soilmgmt/\n\n###### The Beauty of Your Lawn and Garden Blossoms from the Soil\n\nThank you for your interest in compost.\n\nCompost is a versatile product with many benefits. It enhances\n\nsoil quality, helps save water, and supports your community’s\n\nefforts to recycle organic debris. All this helps to conserve our\n\nnatural resources and reduces the amount of material sent to the\n\nlandfill.\n\nCompost-amended soil also helps break down pollutants and\n\nabsorb stormwater runoff. By making nutrients slowly available\n\nto plants and enhancing plant health, compost can reduce the\n\nneed for chemical fertilizers and pesticides. All these benefits\n\nhelp protect our lakes, rivers, and marine waters from pollution\n\nand excessive runoff.\n\nCompost is a natural amendment for your lawn or garden, and\n\ncan be used regularly to enrich your soil. This guide is designed\n\nto help you get the most from the compost that you buy.", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" - }, - { - "text": "A project of the Washington Organic Recycling Council, with\n\nsupport from the Washington State Department of Ecology’s\n\nPublic Participation Grant program.\n\nThis product was partly funded through a grant from the\n\nWashington Department of Ecology. While these materials\n\nwere reviewed for grant consistency, this does not necessarily\n\nconstitute endorsement by the department.\n\n**Special thanks:** the original version of this brochure in 2003\n\nwas created by the Washington County, Oregon Solid Waste and\n\nRecycling Program in cooperation with the Washington Organic\n\nRecycling Council and the Composting Council of Oregon.\n\n##### Tips to Remember:\n\n*-* *Don’t put plants into 100% compost. Mix*\n\n*compost thoroughly into existing soil before*\n\n*planting.*\n\n*-* *When transplanting, it’s better to amend the*\n\n*whole bed, not just planting holes, to promote*\n\n*root growth.*\n\n*-* *Ask your compost supplier which compost*\n\n*product is best for your intended use.*\n\n*-* *Use compost at the recommended application*\n\n*rate.*\n\n*-* *To maintain healthy soil, reapply compost or*\n\n*mulch every 1-2 years.*\n\n*-* *Many composts are rich in plant nutrients, so*\n\n*you may be able to reduce fertilizer use after*\n\n*applying compost.*\n\n*-* *Compost can also reduce your lawn and garden’s*\n\n*summer irrigation needs.*\n\n*-* *Compost-amended soil and mulching slow run*\n\n*off, reduce erosion, and break down pollutants.*\n\n*When you use compost, you’re helping to*\n\n*protect our precious streams, rivers, lakes, and*\n\n*marine waters.*\n\n**original artwork provided by:**\n\nwww.compostwashington.org www.ecy.wa.gov www.soilsforsalmon.org", - "page_start": 1, - "page_end": 1, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### How Much Compost to Use\n\nl Estimate the planting area (Math Hint: Square feet = length x width)\n\nl Decide upon the appropriate application depth of the compost (page 4)\n\nl Use the charts below to estimate your compost needs. (Abbreviations: ft = foot; yd = yard; sq = square; cu = cubic.)\n\nl Conversions: 9 square feet = 1 square yard; 27 cubic feet = 1 cubic yard.\n\nPlot Size # of Sq Feet 1/2” Deep - Mulching 2” Deep - Amending new\n\nor Top-dressing lawns or gardens\n\n5' x 10' plot 50 sq ft 2.08 cu ft of compost 8.33 cu ft of compost (0.31 cu yd)\n\n10' x 10' plot 100 sq ft 4.17 cu ft of compost 16.66 cu ft of compost (0.62 cu yd)\n\n20 x 50' plot 1000 sq ft 41.7 cu ft of compost 166.7 cu ft of compost (6.2 cu yd)\n\n1 acre 43,600 sq ft 1,815 cu ft of compost (67 cu yd) 7,257 cu ft of compost (268 cu yd)\n\n##### **Question:** * **I have a plot about this big, how much compost do I buy?** *\n\nCompost Quantity 1/2” Deep - Mulching 2” Deep - Amending new\n\nor Top-dressing lawns or gardens\n\n1 cu ft bag of compost 24 sq foot area 6 sq foot area\n\n1.5 cu ft bag of compost 36 sq foot area 9 sq foot area\n\n2.2 cu ft bag of compost 53 sq foot area 13 sq foot area\n\n2.5 cu ft bag of compost 60 sq foot area 15 sq foot area\n\n1 cubic yard of compost 648 sq foot area 162 sq foot area\n\n*Compost Works! Soil blending trials conducted in 2008 by the Washington Organic Recycling Council, with funding from the Washington Department of Ecology,*\n\n*demonstrated that compost improves soil structure (lowers bulk density), nutrient availability (increases cation exchange capacity), moisture holding*\n\n*capacity, and supplies both nutrients that plants need and organic matter that supports soil life. See the 2008 Soil Blending Trial report at*\n\n**www.compostwashington.org.**\n\n##### **Question:** * **If I buy this much compost, how many square feet will it cover?** *", - "page_start": 7, - "page_end": 7, - "source_file": "CompostGuide.pdf" - }, - { - "text": "THE PURPOSE OF A RESIGNATION LETTER:\n\nThe purpose of a resignation letter is to give your employer official no­\n\ntice that you will be leaving the organisation. However, it is usually ap­\n\npropriate to inform your manager of your intention to resign in person,\n\nand then to follow up your conversation with the formal resignation\n\nletter.\n\nWhat to include:\n\nYour resignation letter should be short and to the point. Keep it positive\n\nand professional - this is not the place to voice your dissatisfaction with\n\nyour job.\n\nIn your letter, you should make sure that you include the following:\n\n1.\n\nA clear statement of your intention to resign.\n\nExample:\n\n“Please accept this letter as formal notice of my resignation from my\n\npost as Assistant IT Manager at XYZ.”\n\n2.\n\nReference to your notice period (where applicable), as well as your last\n\nworking day with the organisation.\n\nExample:\n\n“My last working day will be in two weeks’ time, on 31 August 2015.”\n\n3.\n\nYour reason for leaving.\n\nYou don’t need to elaborate on this if you don’t want to. Remember\n\nto keep it positive, and not to make any rude, offensive or insulting\n\nremarks about the organisation or your co- workers, no matter how\n\ntempting it might be.", - "page_start": 48, - "page_end": 48, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "#### A USER'S GUIDE TO COMPOST **The Beauty of Your Lawn & Garden Blossoms from the Soil**\n\n####### **Compost adds organic material and nutrients to the soil,**\n\n####### **increases water-holding capacity and biological activity,**\n\n####### **and improves plant growth and health.**\n\n####### **Revised 2009**", - "page_start": 0, - "page_end": 0, - "source_file": "CompostGuide.pdf" - }, - { - "text": "If you have any questions about your course work, you are always\n\nwelcome to approach your tutors for help. Just remember that your\n\ntutors cannot guess what your needs are: you will have to make\n\ncontact with your tutors and communicate your questions clearly if\n\nyou want to get the assistance that you need.\n\nWhen it comes to contacting your tutors, your best option will\n\nusually be to send an e-mail.\n\nHere are some important tips to keep in mind when\n\nrequesting help from a tutor via e-mail:\n\n**Use a relevant and descriptive subject line.**\n\nThis way, your tutor will immediately know what your e-mail is\n\nabout, and he or she will be more likely to open it. A good subject\n\nline might read as follows: “Enquiry regarding Assignment 1 for\n\nSafety Management 101”\n\n####### **Be polite, and use an appropriate form of address.**\n\nAlways start your e-mail with an appropriate form of address,\n\nsuch as “Hello Mr/Ms …” and sign it off with your full name and\n\nstudent number. This will help to give your message a friendly, yet\n\nprofessional tone.\n\n####### **Be clear and concise.**\n\nMake sure that your tutor will be able to understand what it is that\n\nyou are asking.", - "page_start": 33, - "page_end": 33, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "CompostGuide.pdf", - "query": "What are fertilizers ?", - "target_page": 4, - "target_passage": " Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. ", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "##### Resources\n\n**Compost Organizations**\n\n####### **Washington Organic Recycling Council**\n\nFind a compost producer in your area\n\nwww.compostwashington.org\n\n####### **US Composting Council**\n\nSeal of Testing Assurance (STA) program\n\nwww.compostingcouncil.org/programs/sta/\n\n**Restoring the Soil to Protect our Waterways**\n\nwww.soilsforsalmon.org\n\nCompost amendment and erosion control\n\nduring construction: information for builders\n\nwww.buildingsoil.org\n\n**Natural Lawn & Garden Care, Soils, and Home**\n\n**Composting**\n\n####### **City of Seattle**\n\nwww.seattle.gov/util/services/yard\n\n####### **King County**\n\nwww.kingcounty.gov/soils\n\n####### **Washington State University**\n\nwww.puyallup.wsu.edu/soilmgmt/\n\n###### The Beauty of Your Lawn and Garden Blossoms from the Soil\n\nThank you for your interest in compost.\n\nCompost is a versatile product with many benefits. It enhances\n\nsoil quality, helps save water, and supports your community’s\n\nefforts to recycle organic debris. All this helps to conserve our\n\nnatural resources and reduces the amount of material sent to the\n\nlandfill.\n\nCompost-amended soil also helps break down pollutants and\n\nabsorb stormwater runoff. By making nutrients slowly available\n\nto plants and enhancing plant health, compost can reduce the\n\nneed for chemical fertilizers and pesticides. All these benefits\n\nhelp protect our lakes, rivers, and marine waters from pollution\n\nand excessive runoff.\n\nCompost is a natural amendment for your lawn or garden, and\n\ncan be used regularly to enrich your soil. This guide is designed\n\nto help you get the most from the compost that you buy.", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### Compost: A Natural Cycle\n\nComposting is a natural process in which micro-\n\norganisms and macro-organisms break down organic\n\nmaterial (leaves, twigs, grass, etc.) into a dark crum-\n\nbly soil amendment. Modern compost facilities use\n\nthe same natural biological composting process.\n\nTheir controlled-temperature process works faster,\n\nbreaks down pesticide residues, and also kills weed\n\nseeds and plant diseases.\n\nCompost improves soil structure and plant\n\ngrowth by\n\n- Replenishing soil organic matter, and storing\n\nnutrients in plant-available forms\n\n- Supporting beneficial soil life\n\n- Reducing erosion and water run-off\n\n- Loosening clay soils for better root\n\ndevelopment (increasing soil pore space)\n\n- Retaining moisture in sandy soils so\n\nplants need less watering.\n\n##### Comparing Landscape Products\n\nA variety of soil and landscape products are sold. Here’s a\n\ncomparison:\n\n**Compost** is stable, decomposed organic matter, excellent for\n\nimproving soil structure, fertility, moisture holding capacity, and\n\nplant growth.\n\n**Mulch** is any material applied to the soil surface. Woody mulches\n\n(high in carbon, low in nitrogen) like wood chips, bark and woody\n\ncomposts are great for woody plants. Annual plants should be\n\nmulched with nutrient-balanced mulches like compost, grass\n\nclippings, or leaves.\n\n**Peat Moss** is partially decayed sphagnum moss from peat bogs. It\n\nprovides soil porosity, but not the nutrients or biological diversity for\n\nhealthy soil that compost provides.\n\n**Fertilizers** are concentrated sources of plant nutrients, used in small\n\namounts to supplement natural soil fertility.\n\n**Topsoil** that is sold is usually not native topsoil. Quality\n\nmanufactured topsoils are a blend of native sandy sub-soils with\n\ncomposted organic matter to support soil life.\n\nAsk Your Compost Supplier\n\n**Whether you’re buying direct from the composting facility, or from a local**\n\n**vendor, here are some good questions to ask:**\n\n**- What ingredients go into your compost?**\n\n**- What compost products or blends do you sell?**\n\n**- Are there quality control or testing results available for these**\n\n**products? (These may be on the manufacturer’s website.)**\n\n**- Which product is best for my intended use?**\n\n**- What application rate do you recommend?**\n\n**- How much do I need for my area? (Or see pages 4-6.)**", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### Building Rich and Healthy Soil With Compost\n\nTo grow healthy plants you need healthy soil.\n\n**Healthy Soil:**\n\nl Is teeming with life! Healthy soil is a miniature ecosystem.\n\nA teaspoon of healthy soil will have upwards of four billion\n\ntiny organisms which recycle nutrients, suppress disease, and\n\ndiscourage pests.\n\nl Retains moisture but allows drainage. Healthy soil has\n\nstructure that allows water to drain through, retains moisture,\n\nand promotes strong root growth.\n\nl Is full of organic nutrients. Plants depend on the micro-\n\norganisms found in healthy organic-rich soil to provide\n\nnutrients to their roots, and help them thrive.\n\nA healthy garden and landscape is naturally resistant to pests,\n\ndrought, weeds, and diseases. Maintaining healthy soil may allow\n\nyou to reduce use of chemical fertilizers and pesticides.\n\n####### **Soil is a planting medium. Compost is a soil amendment.**\n\n####### **Do not place plants directly into 100% compost.**\n\n####### **Ask your supplier or see next page for mixes for different uses.**\n\n**Washington State Encourages the Use of Compost,**\n\n**to Protect Our Water Quality**\n\nThe Washington State Department of Ecology recommends that soils\n\non construction sites be restored with compost before planting, and also\n\nencourages the use of compost for construction site erosion control, to reduce\n\nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean.\n\nLearn more at **www.SoilsforSalmon.org** or **www.BuildingSoil.org.**\n\n##### Selecting Quality Compost\n\nCompost is available in many product types and blends that may be\n\nused for different gardening applications. The type of feedstock,\n\nthe composting process, and any supplementary additives determine\n\nthe end product.\n\nMany facilities offer a variety of blends based on compost, such as\n\ngarden mix, potting soil, planting mix, mulches, turf top-dressing\n\nand soil blends.\n\n**What to Look for in Compost**\n\nFor most compost applications you will want a finished product that\n\nhas matured and stabilized. Look for material\n\nl with a dark, crumbly texture\n\nl with a mild odor\n\nFor most compost applications you will not want compost that is\n\nextremely dry or wet, or extremely hot. (Note that it is okay for\n\ncompost to be warm and to give off some steam and mild odor.)\n\n**Quality Testing at Composting Facilities**\n\nFeel free to ask your compost provider if they have a quality control\n\nprogram, and ask for test results. Compost facilities in Washington\n\nare permitted by the Department of Ecology and must meet\n\nstandards for both the composting process and contaminants,\n\nensuring a quality product. Some facilities also participate in the\n\n“Seal of Testing Assurance” (STA) testing program. See\n\n“Resources” on page 11 to learn more.\n\n####### **Remember:**\n\n####### **Your compost provider can help you pick the best compost mix**\n\n####### **for your needs.**", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### Compost Questions and Answers\n\n####### **What is compost?**\n\nCompost is a natural humus-like soil amendment that results from\n\nthe controlled aerobic (with oxygen) decomposition of organic\n\nmaterials. Compost is not soil - it should be mixed with soil. It is\n\nnot fertilizer, although it contains many slowly released nutrients.\n\n####### **What materials (“feedstocks”) are used to make compost?**\n\nCompost facilities in Washington recycle a variety of organic\n\nmaterials, including yard debris, food scraps, manure, biosolids,\n\nforest residuals like sawdust and bark, construction wood, and\n\nagricultural residues. All of these materials can be used to produce\n\nhigh quality compost. Your supplier can tell you which materials\n\nthey compost.\n\n####### **How do I know I’m getting safe, quality compost?**\n\nFortunately, in Washington we have strict permitting and production\n\nstandards for compost facilities, that include both time and\n\ntemperature requirements and contaminant limits.\n\n####### **What about weed seeds, plant diseases or pesticide residues?**\n\nThe controlled time, aeration, and temperature process required in\n\nWashington has been shown to kill weed seeds and plant diseases.\n\nThat same process breaks down most pesticide residues. There are\n\na few agricultural pesticides that are not easily broken down, and\n\npermitted Washington compost manufacturers carefully watch their\n\nfeedstocks to keep those materials out of the composting process.\n\n##### Compost Beginnings\n\nThe yard debris or food scraps* that you\n\nplace into your home compost bin, take to\n\na drop-off site, or set out for curbside\n\ncollection could become the compost that\n\nyou later use on your garden, lawn, and\n\nflowerbeds.\n\nIt is essential to place only quality organic\n\nmaterial into the composting process. Here\n\nare some tips:\n\nl The products you use or spray in your\n\nyard can end up in the compost process.\n\nCarefully read the labels of pesticide and\n\nherbicide products you use. (See page 9.)\n\nl Please keep yard debris free of :\n\nx Garbage\n\nx Plastic of any sort\n\n- Plastic plant pots\n\n- Plastic plant tabs\n\n- Plastic bags (if you want to bag\n\nyour yard debris, use paper\n\ngarden bags - available at most\n\ngarden centers)\n\nx Rock, brick, or masonry\n\nx Glass or metal\n\nx Pet waste.\n\n* Many localities now collect food scraps and\n\nfood-soiled paper along with yard debris for\n\ncomposting. Call your local collection service\n\nto find out what is collected in your area.", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### The Composting Process\n\nEven though there are a variety of composting methods, most\n\ncomposting follows a similar process:\n\n**1. Grinding Organic Materials:**\n\nDepending on the facility, the feedstock (material) available, and\n\nthe desired compost product, different combinations of materials\n\nare added together and ground into small pieces:\n\n- Nitrogen-rich materials (such as grass, fresh plant\n\ncuttings, biosolids, and manures)\n\n- Carbon-rich materials (such as dried leaves, woody\n\nmaterials, and straw).\n\n**2. Heating Up:**\n\nThe material is placed into piles where it begins to heat up from\n\nthe biological activity of the compost microbes. Typically, com-\n\npost temperatures are required to reach at least 131 degrees F in a\n\nspecified time period in order to destroy weed seeds and patho-\n\ngens. The compost is turned or aerated, allowing the composting\n\nmicrobes to breathe. After a period of time, the nitrogen-rich\n\nmaterial is depleted, the biological process slows, and the hot\n\ncompost begins to cool.\n\n**3. Finishing:**\n\nTypically “finished” compost has undergone a series of steps to\n\nensure maturity and stability. The cooling compost is aged, which\n\nallows the decomposition process to slow down and the finished\n\ncompost to stabilize.\n\nThe end products you purchase may be entirely compost, or a\n\ncombination of compost blended with uncomposted additives\n\n(such as peat, bark, minerals, or soil).\n\n##### Applications for Compost\n\n####### **Planting New Garden Beds or Lawns**\n\nSpread a 2-4 inch layer of compost and mix into the upper 6-12\n\ninches of existing soil: use more in sandy soils, and less in heavy clay.\n\nReapply ½-1 inch annually on garden beds.\n\n####### **Mulch (surface applications on landscape beds)**\n\nSpread a 1-2 inch layer of coarse, woody compost. To allow proper\n\nairflow, it is best not to pile mulch around the stems of trees and\n\nshrubs. Pull mulch 1-2 inches away from stems.\n\n####### **Top Dressing for Lawns**\n\nSpread a ¼ to ½ inch layer of fine screened compost, and rake it into\n\nthe lawn. For best results, plug-aerate the lawn before top-dressing.\n\nOverseeding at the same time will thicken thin patches in lawns.\n\n####### **Blended (Manufactured) Topsoils**\n\nGood quality “topsoil” products usually include 10-40% compost by\n\nvolume, mixed with a sandy loam soil that allows good drainage.\n\nThese compost-soil blends help establish healthy lawns and gardens.\n\n**When to Use Compost?**\n\n- Any time you’re preparing soil for planting\n\n- Mulching beds and gardens in spring, summer, or fall\n\n- Top-dressing lawns in spring or fall.", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" - }, - { - "text": "A project of the Washington Organic Recycling Council, with\n\nsupport from the Washington State Department of Ecology’s\n\nPublic Participation Grant program.\n\nThis product was partly funded through a grant from the\n\nWashington Department of Ecology. While these materials\n\nwere reviewed for grant consistency, this does not necessarily\n\nconstitute endorsement by the department.\n\n**Special thanks:** the original version of this brochure in 2003\n\nwas created by the Washington County, Oregon Solid Waste and\n\nRecycling Program in cooperation with the Washington Organic\n\nRecycling Council and the Composting Council of Oregon.\n\n##### Tips to Remember:\n\n*-* *Don’t put plants into 100% compost. Mix*\n\n*compost thoroughly into existing soil before*\n\n*planting.*\n\n*-* *When transplanting, it’s better to amend the*\n\n*whole bed, not just planting holes, to promote*\n\n*root growth.*\n\n*-* *Ask your compost supplier which compost*\n\n*product is best for your intended use.*\n\n*-* *Use compost at the recommended application*\n\n*rate.*\n\n*-* *To maintain healthy soil, reapply compost or*\n\n*mulch every 1-2 years.*\n\n*-* *Many composts are rich in plant nutrients, so*\n\n*you may be able to reduce fertilizer use after*\n\n*applying compost.*\n\n*-* *Compost can also reduce your lawn and garden’s*\n\n*summer irrigation needs.*\n\n*-* *Compost-amended soil and mulching slow run*\n\n*off, reduce erosion, and break down pollutants.*\n\n*When you use compost, you’re helping to*\n\n*protect our precious streams, rivers, lakes, and*\n\n*marine waters.*\n\n**original artwork provided by:**\n\nwww.compostwashington.org www.ecy.wa.gov www.soilsforsalmon.org", - "page_start": 1, - "page_end": 1, - "source_file": "CompostGuide.pdf" - }, - { - "text": "green spaces has increased <sup>52</sup> , green spaces often lose out in the competition for land as the share of the population living in urban areas continues to rise.\n\nThis strategy aims to reverse these trends and stop the loss of green urban ecosystems. The promotion of healthy ecosystems, green infrastructure and **nature-based solutions** should be systematically integrated into urban planning, including in public spaces, infrastructure, and the design of buildings and their surroundings.\n\nTo bring nature back to cities and reward community action, the Commission calls on European cities of at least 20,000 inhabitants to develop ambitious **Urban Greening Plans** by the end of 2021. These should include measures to create biodiverse and accessible urban forests, parks and gardens; urban farms; green roofs and walls; tree- lined streets; urban meadows; and urban hedges. They should also help improve connections between green spaces, eliminate the use of pesticides, limit excessive mowing of urban green spaces and other biodiversity harmful practices. Such plans could mobilise policy, regulatory and financial tools.\n\nTo facilitate this work, the Commission will in 2021 set up an **EU Urban Greening Platform** , under a new ‘Green City Accord’ <sup>53</sup> with cities and mayors. This will be done in close coordination with the European Covenant of Mayors. The Urban Greening Plans will have a central role in choosing the European Green Capital 2023 and European Green Leaf 2022.\n\nThe Commission will support Member States and local and regional authorities through technical guidance and help to mobilise funding and capacity building. It will also reflect these objectives in the **European Climate Pact** .\n\n#### *2.2.9.* *Reducing pollution*\n\nPollution is a key driver of biodiversity loss and has a harmful impact on our health and environment. While the EU has a solid legal framework in place to reduce pollution, greater efforts are still required. Biodiversity is suffering from the release of nutrients, chemical pesticides, pharmaceuticals, hazardous chemicals, urban and industrial wastewater, and other waste including litter and plastics. All of these pressures must be reduced.\n\nAs part of the Commission’s Zero Pollution Ambition for a toxic-free environment, a new EU Chemicals Strategy for Sustainability will be put forward along with a **Zero Pollution Action Plan for Air, Water and Soil** .\n\nThe Commission will also promote the goal of zero pollution from nitrogen and phosphorus flows from fertilisers through reducing nutrient losses by at least 50%, while ensuring that there is no deterioration in soil fertility. This will result in the **reduction of use of fertilisers by at least 20%** . This will be achieved by implementing and enforcing the relevant environmental and climate legislation in full, identifying with Member States the nutrient load reductions needed to achieve these goals, applying balanced fertilisation and sustainable nutrient management, and by managing nitrogen and phosphorus better throughout their lifecycle. To this end, the Commission will work with Member States to\n\nThere are 11,000 Natura 2000 sites within, or partly within, cities, representing 15% of the total area of the Natura 2000 network. [The Green City Accord.](http://www.eurocities.eu/eurocities/calendar/events_list/CITIES-Forum-2020-Working-corner-The-EU-Green-City-Accord-Cities-becoming-leaders-for-the-environment-WSPO-BL4E22)", - "page_start": 13, - "page_end": 13, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "#### A USER'S GUIDE TO COMPOST **The Beauty of Your Lawn & Garden Blossoms from the Soil**\n\n####### **Compost adds organic material and nutrients to the soil,**\n\n####### **increases water-holding capacity and biological activity,**\n\n####### **and improves plant growth and health.**\n\n####### **Revised 2009**", - "page_start": 0, - "page_end": 0, - "source_file": "CompostGuide.pdf" - }, - { - "text": "progress towards the target will be under constant review, and adjustment if needed, to\n\nmitigate against undue impact on biodiversity, food security and farmers’ competitiveness.\n\nAgroecology can provide healthy food while maintaining productivity, increase soil fertility and biodiversity, and reduce the footprint of food production. Organic farming in particular holds great potential for farmers and consumers alike. The sector creates jobs and attracts young farmers. Organic farming also provides 10-20 % more jobs per hectare than conventional farms, and creates added value for agricultural products <sup>32</sup> . To make the most of this potential, at least **25% of the EU’s agricultural land must be organically farmed by 2030** . In addition to CAP measures, the Commission will put forward an Action Plan on organic farming, helping Member States stimulate both supply and demand of organic products. It will also ensure consumer’s trust through promotion campaigns and green public procurement. In the implementation of the EU-wide agro- ecological targets set out in this strategy and in the Farm to Fork Strategy, the different starting points and differences in progress already made in Member States will be taken into account.\n\nThe uptake of agroforestry support measures under rural development should be increased as it has great potential to provide multiple benefits for biodiversity, people and climate.\n\nThe decline of **genetic diversity** must also be reversed, including by facilitating the use of traditional varieties of crops and breeds. This would also bring health benefits through more varied and nutritious diets. The Commission is considering the revision of marketing rules for traditional crop varieties in order to contribute to their conservation and sustainable use. The Commission will also take measures to facilitate the registration of seed varieties, including for organic farming, and to ensure easier market access for traditional and locally adapted varieties.\n\n#### *2.2.3.* *Addressing land take and restoring soil ecosystems*\n\nSoil is one of the most complex of all ecosystems. It is a habitat in its own right, and home to an incredible diversity of organisms that regulate and control key ecosystem services such as soil fertility, nutrient cycling and climate regulation. **Soil is a hugely important non-renewable resource** , vital for human and economic health, as well as the production of food and new medications.\n\nIn the EU, the degradation of soil is having considerable environmental and economic consequences. Poor land management, such as deforestation, overgrazing, unsustainable farming and forestry practices, construction activities and land sealing are among the main causes of this situation <sup>33</sup> . Despite recent reductions in the pace of soil sealing, fertile soils continue to be lost to land take and urban sprawl <sup>34</sup> . When compounded by\n\n32 OECD (2016), [Farm Management Practices to Foster Green Growth](https://www.oecd.org/publications/farm-management-practices-to-foster-green-growth-9789264238657-en.htm) . European Environment Agency (2019), [EEA Signals 2019: Land and Soil in Europe](https://www.eea.europa.eu/publications/eea-signals-2019-land) . European Environment Agency and Swiss Federal Office for the Environment (FOEN) (2016), [Urban ](https://www.eea.europa.eu/publications/urban-sprawl-in-europe) [sprawl in Europe](https://www.eea.europa.eu/publications/urban-sprawl-in-europe) .", - "page_start": 8, - "page_end": 8, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "##### How Much Compost to Use\n\nl Estimate the planting area (Math Hint: Square feet = length x width)\n\nl Decide upon the appropriate application depth of the compost (page 4)\n\nl Use the charts below to estimate your compost needs. (Abbreviations: ft = foot; yd = yard; sq = square; cu = cubic.)\n\nl Conversions: 9 square feet = 1 square yard; 27 cubic feet = 1 cubic yard.\n\nPlot Size # of Sq Feet 1/2” Deep - Mulching 2” Deep - Amending new\n\nor Top-dressing lawns or gardens\n\n5' x 10' plot 50 sq ft 2.08 cu ft of compost 8.33 cu ft of compost (0.31 cu yd)\n\n10' x 10' plot 100 sq ft 4.17 cu ft of compost 16.66 cu ft of compost (0.62 cu yd)\n\n20 x 50' plot 1000 sq ft 41.7 cu ft of compost 166.7 cu ft of compost (6.2 cu yd)\n\n1 acre 43,600 sq ft 1,815 cu ft of compost (67 cu yd) 7,257 cu ft of compost (268 cu yd)\n\n##### **Question:** * **I have a plot about this big, how much compost do I buy?** *\n\nCompost Quantity 1/2” Deep - Mulching 2” Deep - Amending new\n\nor Top-dressing lawns or gardens\n\n1 cu ft bag of compost 24 sq foot area 6 sq foot area\n\n1.5 cu ft bag of compost 36 sq foot area 9 sq foot area\n\n2.2 cu ft bag of compost 53 sq foot area 13 sq foot area\n\n2.5 cu ft bag of compost 60 sq foot area 15 sq foot area\n\n1 cubic yard of compost 648 sq foot area 162 sq foot area\n\n*Compost Works! Soil blending trials conducted in 2008 by the Washington Organic Recycling Council, with funding from the Washington Department of Ecology,*\n\n*demonstrated that compost improves soil structure (lowers bulk density), nutrient availability (increases cation exchange capacity), moisture holding*\n\n*capacity, and supplies both nutrients that plants need and organic matter that supports soil life. See the 2008 Soil Blending Trial report at*\n\n**www.compostwashington.org.**\n\n##### **Question:** * **If I buy this much compost, how many square feet will it cover?** *", - "page_start": 7, - "page_end": 7, - "source_file": "CompostGuide.pdf" - } - ] - }, - { - "references": { - "source_file": "CompostGuide.pdf", - "query": "Explain to me what is peat moss ?", - "target_page": 4, - "target_passage": "Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "##### Compost: A Natural Cycle\n\nComposting is a natural process in which micro-\n\norganisms and macro-organisms break down organic\n\nmaterial (leaves, twigs, grass, etc.) into a dark crum-\n\nbly soil amendment. Modern compost facilities use\n\nthe same natural biological composting process.\n\nTheir controlled-temperature process works faster,\n\nbreaks down pesticide residues, and also kills weed\n\nseeds and plant diseases.\n\nCompost improves soil structure and plant\n\ngrowth by\n\n- Replenishing soil organic matter, and storing\n\nnutrients in plant-available forms\n\n- Supporting beneficial soil life\n\n- Reducing erosion and water run-off\n\n- Loosening clay soils for better root\n\ndevelopment (increasing soil pore space)\n\n- Retaining moisture in sandy soils so\n\nplants need less watering.\n\n##### Comparing Landscape Products\n\nA variety of soil and landscape products are sold. Here’s a\n\ncomparison:\n\n**Compost** is stable, decomposed organic matter, excellent for\n\nimproving soil structure, fertility, moisture holding capacity, and\n\nplant growth.\n\n**Mulch** is any material applied to the soil surface. Woody mulches\n\n(high in carbon, low in nitrogen) like wood chips, bark and woody\n\ncomposts are great for woody plants. Annual plants should be\n\nmulched with nutrient-balanced mulches like compost, grass\n\nclippings, or leaves.\n\n**Peat Moss** is partially decayed sphagnum moss from peat bogs. It\n\nprovides soil porosity, but not the nutrients or biological diversity for\n\nhealthy soil that compost provides.\n\n**Fertilizers** are concentrated sources of plant nutrients, used in small\n\namounts to supplement natural soil fertility.\n\n**Topsoil** that is sold is usually not native topsoil. Quality\n\nmanufactured topsoils are a blend of native sandy sub-soils with\n\ncomposted organic matter to support soil life.\n\nAsk Your Compost Supplier\n\n**Whether you’re buying direct from the composting facility, or from a local**\n\n**vendor, here are some good questions to ask:**\n\n**- What ingredients go into your compost?**\n\n**- What compost products or blends do you sell?**\n\n**- Are there quality control or testing results available for these**\n\n**products? (These may be on the manufacturer’s website.)**\n\n**- Which product is best for my intended use?**\n\n**- What application rate do you recommend?**\n\n**- How much do I need for my area? (Or see pages 4-6.)**", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" - }, - { - "text": "##### The Composting Process\n\nEven though there are a variety of composting methods, most\n\ncomposting follows a similar process:\n\n**1. Grinding Organic Materials:**\n\nDepending on the facility, the feedstock (material) available, and\n\nthe desired compost product, different combinations of materials\n\nare added together and ground into small pieces:\n\n- Nitrogen-rich materials (such as grass, fresh plant\n\ncuttings, biosolids, and manures)\n\n- Carbon-rich materials (such as dried leaves, woody\n\nmaterials, and straw).\n\n**2. Heating Up:**\n\nThe material is placed into piles where it begins to heat up from\n\nthe biological activity of the compost microbes. Typically, com-\n\npost temperatures are required to reach at least 131 degrees F in a\n\nspecified time period in order to destroy weed seeds and patho-\n\ngens. The compost is turned or aerated, allowing the composting\n\nmicrobes to breathe. After a period of time, the nitrogen-rich\n\nmaterial is depleted, the biological process slows, and the hot\n\ncompost begins to cool.\n\n**3. Finishing:**\n\nTypically “finished” compost has undergone a series of steps to\n\nensure maturity and stability. The cooling compost is aged, which\n\nallows the decomposition process to slow down and the finished\n\ncompost to stabilize.\n\nThe end products you purchase may be entirely compost, or a\n\ncombination of compost blended with uncomposted additives\n\n(such as peat, bark, minerals, or soil).\n\n##### Applications for Compost\n\n####### **Planting New Garden Beds or Lawns**\n\nSpread a 2-4 inch layer of compost and mix into the upper 6-12\n\ninches of existing soil: use more in sandy soils, and less in heavy clay.\n\nReapply ½-1 inch annually on garden beds.\n\n####### **Mulch (surface applications on landscape beds)**\n\nSpread a 1-2 inch layer of coarse, woody compost. To allow proper\n\nairflow, it is best not to pile mulch around the stems of trees and\n\nshrubs. Pull mulch 1-2 inches away from stems.\n\n####### **Top Dressing for Lawns**\n\nSpread a ¼ to ½ inch layer of fine screened compost, and rake it into\n\nthe lawn. For best results, plug-aerate the lawn before top-dressing.\n\nOverseeding at the same time will thicken thin patches in lawns.\n\n####### **Blended (Manufactured) Topsoils**\n\nGood quality “topsoil” products usually include 10-40% compost by\n\nvolume, mixed with a sandy loam soil that allows good drainage.\n\nThese compost-soil blends help establish healthy lawns and gardens.\n\n**When to Use Compost?**\n\n- Any time you’re preparing soil for planting\n\n- Mulching beds and gardens in spring, summer, or fall\n\n- Top-dressing lawns in spring or fall.", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" - }, - { - "text": "strength (n) [ME < OE *strengou.* ] 5. Firm will or character: moral courage or power. engt (n) [ME < O *ou.* ] 5. Firm will or c mora", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain\n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally\n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding\n\nexcess thiol one can also vary the properties of the solvent [40].\n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin-\n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the\n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds\n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo-\n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For\n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin-\n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing\n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by\n\nthe solvent. This allows for a better control of the process and enables the use of contrast-enhanced\n\nmicroscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the\n\nregion of the receding contact line of toluene, silicon and air. With both techniques one may find\n\nmono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched\n\npatterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a\n\nmore controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the\n\ninteraction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold\n\ncores. For short chains (C 5 and C 8 ) no formation of branched structures is observed. At similar\n\nconcentrations, well-developed branched structures are formed for longer chains (C 10 and C 12 ).\n\nFor even longer chains (C 14 ), however, one again finds less branching. It also depends on the\n\namount of excess thiol in the solvent (for details see Ref. [40]).\n\nWhen following the evolution of the branched patterns in situ (see the complementary video\n\nmaterial of Ref. [40]), one clearly observes that different processes occur on different lenght\n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate.\n\nThe macroscopic front can be transversely unstable resulting in large-scale ( *>* 100 *µ* m) strongly\n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc-\n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be-\n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this\n\nstage it is possible to appreciate that the seemingly dry region left behind by the front is not at all\n\ndry, but covered by an ultrathin ‘postcursor’ film that is itself unstable. The thickness of this film\n\n6", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2669.pdf" - }, - { - "text": "Afforestation, reforestation and tree planting to support biodiversity and ecosystem restoration will be promoted through the CAP Strategic Plans, and the Cohesion Policy funds. The new **European Urban Greening Platform** <sup>38</sup> will also facilitate urban tree planting, including under the LIFE programme.\n\nThe share of forest areas covered by management plans should cover all managed public forests and an increased number of private forests, and biodiversity-friendly practices such as closer-to-nature-forestry should continue and be further developed. To support this, the Commission will develop guidelines on biodiversity-friendly afforestation and reforestation and closer-to-nature-forestry practices. This will be done in parallel with the new EU Forest Strategy.\n\nTo gain a better picture of the health of European forests, the Commission will work with other data providers to further develop the **Forest Information System for Europe** . This will help produce up-to-date assessments of the condition of European forests and link all EU forest-data web-platforms. This will also be presented as part of the EU Forest Strategy.\n\n#### *2.2.5.* *Win-win solutions for energy generation*\n\nDecarbonising the energy system is critical for climate neutrality, as well as for the EU’s recovery from the COVID-19 crisis and long-term prosperity. More sustainably sourced renewable energy will be essential to fight climate change and biodiversity loss. The EU will prioritise solutions such as ocean energy, offshore wind, which also allows for fish stock regeneration, solar-panel farms that provide biodiversity-friendly soil cover, and sustainable bioenergy.\n\nTo mitigate climate and environmental risks created by the increasing use of certain sources for bioenergy, the revised Renewable Energy Directive <sup>39</sup> includes strengthened sustainability criteria. It also promotes the shift to advanced biofuels based on residues and non-reusable and non-recyclable waste. This approach should continue for all forms of bioenergy. The use of whole trees and food and feed crops for energy production - whether produced in the EU or imported - should be minimised.\n\nTo better understand and monitor the potential climate and biodiversity risks, the Commission is assessing the **EU and global biomass supply and demand** and related sustainability <sup>40</sup> . As part of its increased ambition to protect and restore forest ecosystems, the Commission will publish the results of this work on the use of forest biomass for energy production by the end of 2020. This will inform the Commission’s policy- making, including the review and revision, where necessary, of the level of ambition of the Renewable Energy Directive, the Emissions Trading Scheme, and the Regulation on land use, land use change and forestry (LULUCF) set for 2021.\n\nIn line with the Renewable Energy Directive, the Commission will also develop operational guidance in 2021 on the **new sustainability criteria on forest biomass for**\n\nSee Section 2.2.8. [Directive (EU) 2018/2001 on the promotion of the use of energy from renewable sources](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2018.328.01.0082.01.ENG&toc=OJ:L:2018:328:TOC) . [JRC Biomass Assessment Study](https://ec.europa.eu/knowledge4policy/projects-activities/jrc-biomass-assessment-study_en) .", - "page_start": 10, - "page_end": 10, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "Figure 9.1 The DL Query Tab\n\n9.2 SPARQL Queries SPARQL is a powerful language, and one could write a whole book about it. In fact, there are books written about it. The best one I have seen is the O’Reilly book Learning SPARQL by Bob DuCharme. This is an excellent book that not only goes into SPARQL but into topics such as RDF/RDFS and how triples are used to represent all information in OWL. I will only touch on those issues here, there is much more to say about them and DuCharme’s book is a great place to learn more. If some of the following is a\n\nbit hard to understand don’t be discouraged. This is just an attempt to give a very high level introduction\n\nto something that requires significant study to really understand.\n\nEssentially SPARQL is to the Semantic Web and Knowledge Graphs as SQL is to relational databases. Just as SQL can do more than just query, it can also assert new information into a database, so SPARQL can as well. The current SPARQL plugins for Protégé are somewhat limited and don’t support the statements such as INSERT for entering new data so we will just cover the basics of using SPARQL as a query language but keep in mind there is a lot more to it than what we briefly cover here.\n\n9.21 Some SPARQL Pizza Queries To start with go to the SPARQL Query tab. If it isn’t already there you can as always add it using Window>Tabs>SPARQL Query. This tab consists of two views, the top which holds the query and the bottom which holds the results. There should be some text already there. It may look confusing, but we’ll explain it. Just to start with hit the Execute button at the bottom of the tab. You should see a bunch of classes and class expressions returned.", - "page_start": 67, - "page_end": 67, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "George Marti\n\nFounder Marti Enterprises Cleburne, Texas 6\n\nFirst Financial Bankshares customers and shareholders also know a thing or two about Value and Values - and we learn from them every day. We’re proud to share in their success. Here are just a few of their stories.\n\nGeorge Marti believes in doing things. Good things.\n\nBorn to humble roots on his parents’ farm in 1920, Marti has accomplished much, including found-\n\ning three radio stations (and investing in 10 more) and developing a remote pickup device that\n\nbecame standard equipment in 80 percent of all radio stations worldwide. He still has part own-\n\nership of KCLE in Cleburne, Texas (the town where he was once mayor for 12 years).\n\nMarti’s dedication to his hometown is part of the reason why he bought Cleburne State Bank in\n\n1992. His business skills (and success in the broadcasting industry) gave him the resources to\n\nturn the bank into yet another winning venture. Five years later, he sold it to First Financial, which\n\nmerged it with their existing First Financial Bank, Cleburne.\n\nThe proceeds from the sale helped Marti complete the funding for his proudest achievement: the\n\nMarti Foundation, which he created in the 1970s to help send students from Johnson County to\n\ncollege. “We help over 100 students a year … most are the first from their family ever to attend\n\ncollege,” says Marti. “I know what education did for me, so it’s a great thing to help these young\n\npeople.” Marti says that when he dies, the Foundation will live on, $20 million strong.\n\nMarti still serves on the board of First Financial Bank, Cleburne. “First Financial’s merger of the\n\nbanks was positive for the community. They have a good customer base. They are friendly, help-\n\nful and creative. They are growing, and the branches in Alvarado and Burleson are both doing well.\n\nThose are all good things.”\n\n#### “They are friendly, helpful and creative. Those are all good things.”", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "##### Building Rich and Healthy Soil With Compost\n\nTo grow healthy plants you need healthy soil.\n\n**Healthy Soil:**\n\nl Is teeming with life! Healthy soil is a miniature ecosystem.\n\nA teaspoon of healthy soil will have upwards of four billion\n\ntiny organisms which recycle nutrients, suppress disease, and\n\ndiscourage pests.\n\nl Retains moisture but allows drainage. Healthy soil has\n\nstructure that allows water to drain through, retains moisture,\n\nand promotes strong root growth.\n\nl Is full of organic nutrients. Plants depend on the micro-\n\norganisms found in healthy organic-rich soil to provide\n\nnutrients to their roots, and help them thrive.\n\nA healthy garden and landscape is naturally resistant to pests,\n\ndrought, weeds, and diseases. Maintaining healthy soil may allow\n\nyou to reduce use of chemical fertilizers and pesticides.\n\n####### **Soil is a planting medium. Compost is a soil amendment.**\n\n####### **Do not place plants directly into 100% compost.**\n\n####### **Ask your supplier or see next page for mixes for different uses.**\n\n**Washington State Encourages the Use of Compost,**\n\n**to Protect Our Water Quality**\n\nThe Washington State Department of Ecology recommends that soils\n\non construction sites be restored with compost before planting, and also\n\nencourages the use of compost for construction site erosion control, to reduce\n\nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean.\n\nLearn more at **www.SoilsforSalmon.org** or **www.BuildingSoil.org.**\n\n##### Selecting Quality Compost\n\nCompost is available in many product types and blends that may be\n\nused for different gardening applications. The type of feedstock,\n\nthe composting process, and any supplementary additives determine\n\nthe end product.\n\nMany facilities offer a variety of blends based on compost, such as\n\ngarden mix, potting soil, planting mix, mulches, turf top-dressing\n\nand soil blends.\n\n**What to Look for in Compost**\n\nFor most compost applications you will want a finished product that\n\nhas matured and stabilized. Look for material\n\nl with a dark, crumbly texture\n\nl with a mild odor\n\nFor most compost applications you will not want compost that is\n\nextremely dry or wet, or extremely hot. (Note that it is okay for\n\ncompost to be warm and to give off some steam and mild odor.)\n\n**Quality Testing at Composting Facilities**\n\nFeel free to ask your compost provider if they have a quality control\n\nprogram, and ask for test results. Compost facilities in Washington\n\nare permitted by the Department of Ecology and must meet\n\nstandards for both the composting process and contaminants,\n\nensuring a quality product. Some facilities also participate in the\n\n“Seal of Testing Assurance” (STA) testing program. See\n\n“Resources” on page 11 to learn more.\n\n####### **Remember:**\n\n####### **Your compost provider can help you pick the best compost mix**\n\n####### **for your needs.**", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" - }, - { - "text": "4\n\nincidental to a financial activity. Thus, with the enactment of the Gramm-Leach-Bliley Act, banks, securities firms\n\nand insurance companies find it easier to acquire or affiliate with each other and cross-sell financial products. The\n\nact permits a single financial services organization to offer a more complete array of financial products and services\n\nthan historically was permitted.\n\nA financial holding company is essentially a bank holding company with significantly expanded powers. Under\n\nthe Gramm-Leach-Bliley Act, among the activities that will be deemed “financial in nature” for financial holding\n\ncompanies are, in addition to traditional lending activities, securities underwriting, dealing in or making a market in\n\nsecurities, sponsoring mutual funds and investment companies, insurance underwriting and agency activities,\n\nactivities which the Federal Reserve Board determines to be closely related to banking, and certain merchant\n\nbanking activities. The Federal Reserve Board has proposed permitting a number of additional financial activities,\n\nbut we cannot predict whether any of these additional proposals will be adopted or the form any final rule will take.\n\nWe elected to become a financial holding company in September 2001. As a financial holding company, we\n\nhave very broad discretion to affiliate with securities firms and insurance companies, make merchant banking\n\ninvestments, and engage in other activities that the Federal Reserve Board has deemed financial in nature. In order\n\nto continue as a financial holding company, we must continue to be well-capitalized, well-managed and maintain\n\ncompliance with the Community Reinvestment Act. Depending on the types of financial activities that we may\n\nengage in in the future, under Gramm-Leach-Bliley’s fractional regulation principles, we may become subject to\n\nsupervision by additional government agencies. The election to be treated as a financial holding company increases\n\nour ability to offer financial products and services that historically we were either unable to provide or were only\n\nable to provide on a limited basis. As a result, we will face increased competition in the markets for any new\n\nfinancial products and services that we may offer. Likewise, an increased amount of consolidation among banks and\n\nsecurities firms or banks and insurance firms could result in a growing number of large financial institutions that\n\ncould compete aggressively with us.\n\n*Mergers and Acquisitions*\n\nWe generally must obtain approval from the banking regulators before we can acquire other financial\n\ninstitutions. We must not engage in certain acquisitions if we are undercapitalized. Furthermore, the BHCA\n\nprovides that the Federal Reserve Board cannot approve any acquisition, merger or consolidation that may\n\nsubstantially lessen competition in the banking industry, create a monopoly in any section of the country, or be a\n\nrestraint of trade. However, the Federal Reserve Board may approve such a transaction if the convenience and\n\nneeds of the community clearly outweigh any anti-competitive effects. Specifically, the Federal Reserve Board\n\nwould consider, among other factors, the expected benefits to the public (greater convenience, increased\n\ncompetition, greater efficiency, etc.) against the risks of possible adverse effects (undue concentration of resources,\n\ndecreased or unfair competition, conflicts of interest, unsound banking practices, etc.).\n\n*Banks*\n\nFederal and state laws and regulations that govern banks have the effect of, among other things, regulating the\n\nscope of business, investments, cash reserves, the purpose and nature of loans, the maximum interest rate chargeable\n\non loans, the amount of dividends declared, and required capitalization ratios.\n\n*National Banking Associations* . Banks that are organized as national banking associations under the National", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "currently in favourable status are in that category or show a strong positive trend. The Commission and the European Environmental Agency will provide guidance to Member States in 2020 on how to select and prioritise species and habitats.\n\n#### *2.2.2.* *Bringing nature back to agricultural land*\n\nAs guardians of our land, farmers play a vital role in preserving biodiversity. They are among the first to feel the consequences when biodiversity is lost but also among the first to reap the benefits when it is restored. Biodiversity enables them to provide us with **safe, sustainable, nutritious and affordable food** and provides them with the income they need to thrive and develop. European farmers are an essential part of the EU’s future and must continue to be the social and economic hub of many communities across our Union.\n\nAt the same time, certain agricultural practices are a key driver of biodiversity decline. This is why it is important to work with farmers to **support and incentivise the transition to fully sustainable practices** . Improving the condition and diversity of agroecosystems will increase the sector’s resilience to climate change, environmental risks and socioeconomic shocks, while creating new jobs, for example in organic farming, rural tourism or recreation.\n\nTo support the long-term sustainability of both nature and farming, this strategy will work in tandem with the new **Farm to Fork Strategy** and the **new Common Agricultural Policy (CAP)** , including by promoting eco-schemes and result-based payment schemes. In implementing the Biodiversity and the Farm to Fork Strategies, the Commission will closely monitor progress and improvements in terms of food security and farmers income. The Commission will ensure that the CAP Strategic plans are assessed against robust climate and environmental criteria, and that Member States set explicit national values for the relevant targets set in this strategy, as well as in the Farm to Fork Strategy. These plans should lead to sustainable practices such as precision agriculture, organic farming, agro-ecology, agro-forestry, low-intensive permanent grassland, and stricter animal welfare standards.\n\nFarmland birds and insects, particularly pollinators, are key indicators of the health of agroecosystems and are vital for agricultural production and food security. Their alarming decline must be reversed. As set out in the Farm to Fork Strategy, the Commission will take action to reduce by **50% the overall use of - and risk from - chemical pesticides by 2030** and reduce by 50% the use of more hazardous pesticides by 2030. This must be supported by the full implementation of the EU Pollinators initiative <sup>31</sup> . By the end of 2020, the Commission will review the initiative and propose additional measures if necessary. To provide space for wild animals, plants, pollinators and natural pest regulators, there is an urgent need to bring back **at least 10% of agricultural area under high-diversity landscape features** . These include, *inter alia* , buffer strips, rotational or non-rotational fallow land, hedges, non-productive trees, terrace walls, and ponds. These help enhance carbon sequestration, prevent soil erosion and depletion, filter air and water, and support climate adaptation. In addition, more biodiversity often helps lead to more agricultural production. Member States will need to translate the 10% EU target to a lower geographical scale to ensure connectivity among habitats, especially through the CAP instruments and CAP Strategic Plans, in line with the Farm to Fork Strategy, and through the implementation of the Habitats Directive. The\n\n[EU Pollinators initiative](https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1528213737113&uri=CELEX:52018DC0395) (COM(2018) 395).", - "page_start": 7, - "page_end": 7, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv3.pdf", - "query": "How encourage temporally adjacent representations to be predictive of each other ?", - "target_page": 2, - "target_passage": "One way to encourage temporally adjacent representations to be predictive of each other is to ensure that they vary slowly over time. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "To that end, we pretrain a family of V-JEPA models\n\non a dataset of 2 million videos collected from pub-\n\nlicly available datasets by combining a masked modeling\n\nprediction task with a joint-embedding predictive ar-\n\nchitecture (see Figure 2 ). We measure performance on\n\nseveral downstream image and video tasks, using both\n\nfrozen evaluation and end-to-end fine-tuning. Our find-\n\nings suggest that feature prediction can indeed serve as\n\nan effective stand-alone objective for unsupervised learn-\n\ning from video, while using significantly shorter training\n\nschedules than pixel prediction methods. Specifically:\n\n- Feature prediction leads to versatile visual repre-\n\nsentations that perform well across downstream\n\nimage and video tasks without adaption of the\n\nmodel’s weights; i.e., using a frozen backbone.\n\nV-JEPA achieves the best performance among\n\nmethods we consider (+6% accuracy) on the\n\nSomethingSomething-v2 task, which requires fine-\n\ngrained temporal understanding. V-JEPA is\n\nalso competitive on tasks like Kinetics400, where\n\nappearance-based features are sufficient and hence\n\nstate-of-the-art image models such as DINOv2 excel\n\n(Figure 1 and Table 6 ).\n\n- Models trained with feature prediction are supe-\n\nrior to pixel prediction approaches under a frozen\n\nevaluation protocol (attentive probing) and are com-\n\npetitive with pixel prediction under full fine-tuning,\n\nwhile using significantly shorter training schedules\n\n(Tables 5 and 6 ).\n\n- Models trained with feature prediction are more\n\nlabel-efficient than pixel prediction approaches. De-\n\ncreasing the available number of labeled examples re-\n\nsults in an increase in the performance gap between\n\nV-JEPA and pixel-reconstruction models (Table 7 ).\n\n## **2 Related Works**\n\n**Slow Features.** One way to encourage temporally\n\nadjacent representations to be predictive of each other\n\nis to ensure that they vary slowly over time. Early\n\nworks targeting predictive features encouraged represen-\n\ntations of individual video frames to be locally tempo-\n\nrally invariant, while preventing representation collapse\n\nby using spectral methods, as in SFA ( Wiskott and Se-\n\njnowski , 2002 ), SSA ( Kayser et al. , 2001 ), and Simulated\n\nFixations ( Zou et al. , 2012 ). More recently, Goroshin\n\net al. ( 2015 ); Wang et al. ( 2010 ) train a siamese con-\n\nvolutional network to map the representations of two\n\nsubsequent frames to the same point, while encouraging\n\ndistant frames to have diverse representations via a pair-\n\nwise margin loss and a triplet loss, respectively. Other\n\nworks ( Oord et al. , 2018 ; Surís et al. , 2021 ; Feichtenhofer\n\net al. , 2021 ) implement temporal invariance using noise-\n\ncontrastive estimation ( Gutmann and Hyvärinen , 2012 ).\n\nOur exploration in this paper goes beyond temporal in-\n\nvariance and explores feature prediction using masked\n\nmodeling.\n\n**Predictive Features.** Going beyond local invariance,\n\na family of works trains a predictor network to map the\n\nrepresentation of a frame or clip at one time-step to a\n\ndistinct representation at another time-step. Srivastava\n\net al. ( 2015 ); Vondrick et al. ( 2016 ); Wang et al. ( 2023b )\n\ntrain such a video feature predictor network on top of\n\na frozen pretrained image or video encoder. Unfreezing\n\nthe target feature extractor, several methods train the\n\nvideo encoder and the predictor network simultaneously,\n\nwhile preventing collapse by using a supervised action\n\nforecasting loss ( Girdhar and Grauman , 2021 ), or by\n\nusing the representations of distant clips as negative\n\nsamples in a contrastive loss ( Han et al. , 2019 , 2020 ;\n\nTan et al. , 2023 ), often focusing on small convolutional\n\nencoders ( Han et al. , 2019 , 2020 ). The idea of learning a\n\nrepresentation by predicting missing information in fea-\n\nture space is also core to the joint-embedding predictive\n\narchitecture (JEPA) ( LeCun , 2022 ), which combines a\n\nsiamese encoder with a predictor network. JEPAs have", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv3.pdf" - }, - { - "text": "**Feature Prediction versus Pixel Reconstruction.**\n\nApproaches that predict in pixel space must dedicate\n\nsignificant model capacity and compute to capture all\n\nthe low-level detail in the visual input. By contrast, ap-\n\nproaches that predict in latent space have the flexibility\n\nto eliminate irrelevant or unpredictable pixel-level details\n\nfrom the target representation ( Vondrick et al. , 2016 ).\n\nPredicting in representation space has been shown to\n\nlead to versatile representations that perform well across\n\nmany downstream tasks through linear probing or low-\n\nshot adaptation ( Assran et al. , 2023 ; Oquab et al. , 2023 ;\n\nAssran et al. , 2022 ), while demonstrating an efficiency\n\ngain during pretraining compared to pixel level recon-\n\nstruction ( Assran et al. , 2023 ; Baevski et al. , 2022b , a ).\n\nThe works of Baevski et al. ( 2022a , b ) additionally show\n\nthat predicting in representation space results in compet-\n\nitive end-to-end fine-tuning performance in the image,\n\naudio and text domains. In this work, we extend these\n\nfindings to the video modality.\n\n## **3 Methodology: Video-JEPA**\n\nx\n\nx-encoder\n\npredictor z\n\ny\n\ny-encoder\n\nD( ˆ s y , s y ) ˆ s y s y\n\n**Figure 2** Joint-Embedding Predictive Architectures are\n\ntrained to predict the representation of an input *y* from\n\nthe representation of another input *x* . The additional vari-\n\nable *z* provides the predictor with information about the\n\ntransformation that computes *y* from *x* .\n\nOur goal is to explore the effectiveness of feature pre-\n\ndiction as a stand-alone objective for learning visual\n\nrepresentations from video. To that end, we use a\n\njoint-embedding predictive architecture (JEPA) ( LeCun ,\n\n2022 ); see Figure 2 . The main idea behind a JEPA is\n\nto learn by predicting the representation of an input *y*\n\nfrom the representation of another input *x* . The basic\n\narchitecture is made up of an encoder, *E* *θ* ( *·* ) , which com- putes the representation of the inputs, and a predictor,\n\n*P* *ϕ* ( *·* ) , which predicts the representation of *y* from the representation of *x* , conditioned on a variable *z* indicat-\n\ning the transformation (or corruption) between *x* and\n\n*y* . Conditioning on *z* enables the generation of distinct\n\npredictions for various transformations of *x* .\n\n### **3.1 Training Objective**\n\nWe train our visual encoder *E* *θ* ( *·* ) to satisfy the con- straint that representations computed from one part of\n\nthe video, *y* , should be predictable from representations\n\ncomputed from another part of the video, *x* . The pre-\n\ndictor network *P* *ϕ* ( *·* ) , which maps the representation of *x* to the representation of *y* , is trained simultaneously\n\nwith the encoder, and is provided specification of the\n\nspatio-temporal positions of *y* through the conditioning\n\nvariable *z* *←* ∆ *y* .\n\nNaively implementing the objective using the regression\n\nminimize *θ,ϕ* *∥* *P* *ϕ* ( *E* *θ* ( *x* ) *,* ∆ *y* ) *−* *E* *θ* ( *y* ) *∥* 1 *,*\n\nwould admit a trivial solution, where the encoder out-\n\nputs a constant representation, regardless of its input.\n\nIn practice, we use the following modified objective to\n\nprevent representation collapse,\n\nminimize *θ,ϕ* *∥* *P* *ϕ* ( *E* *θ* ( *x* ) *,* ∆ *y* ) *−* sg ( *E* *θ* ( *y* )) *∥* 1 *,* (1)\n\nwhere sg ( *·* ) denotes a stop-gradient operation, which does not backpropagate through its argument, and *E* *θ* ( *·* ) is an exponential moving average of the network *E* *θ* ( *·* ) . The use of an exponential-moving average feature ex-\n\ntractor along with a stop-gradient and a predictor has\n\nbeen used as a collapse prevention strategy for image pre-\n\ntraining ( Grill et al. , 2020 ), and studied empirically ( Xie\n\net al. , 2021 ) and theoretically ( Tian et al. , 2021 ). In\n\nfact, the objective in equation ( 1 ) is similar to the loss\n\nof Assran et al. ( 2023 ) used for image pretraining, but", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv3.pdf" - }, - { - "text": "*Modeling and controlling the body in maladaptive ways* 5\n\nFigure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive)\n\nsensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with\n\ntemporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding ( Rao and\n\nBallard 1999 , Friston 2005 ), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are\n\nreciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally,\n\nthe pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on\n\nunits encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in\n\ncortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need\n\nto map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower\n\nand intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for\n\nexteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks that process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al.\n\n(2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their\n\nputative neuronal underpinnings. See online article for colored version of this figure.\n\nare reciprocally linked through top-down connections that convey\n\npredictions (black edges) and bottom-up connections that convey\n\nprediction errors (red edges), within and across levels. This predic-\n\ntive coding architecture permits inferring (in the Bayesian sense)\n\nthe most likely causes of sensations, across multiple modalities\n\nand multiple hierarchical levels, by minimizing prediction errors\n\nat all levels. The rationale is that predictions at all levels are con-\n\ntinuously adjusted (and synaptic weights adjusted at a slower time\n\nscale) until they match with incoming multimodal stimuli suf-\n\nficiently well, and, consequently, the prediction errors across all\n\nlevels are minimized. This process entails that even if a predictive\n\ncoding agent starts with an incorrect prediction (e.g. about what\n\nobject it is looking at) the prediction errors that measure a discrep-\n\nancy between the predicted sensations and the actual sensations can help revise the initial predictions. See Parr et al. (2022) for a\n\nmore detailed explanation of how to interpret these schematics.\n\nAnother critical aspect of Fig. 1 is that it illustrates two path-\n\nways in which prediction errors at the proprioceptive and inte-\n\nroceptive levels are used to steer physical actions (reflex arcs)\n\nand autonomic actions (autonomic reflexes). Endowing predictive\n\ncoding with these reflexes—hence realizing an “active inference”\n\narchitecture—permits minimizing prediction errors by changing\n\nthe state of the world (by physically acting) or the internal milieu\n\n(by engaging in autonomic actions) rather than only by changing\n\npredictions, as described later. Equipped with a generative model like the one shown in Fig. 1 ,\n\nan active inference agent can continuously infer (and act upon)\n\nthe state of the world and of the body, including the internal", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed1.pdf" - }, - { - "text": "that this simple schematic is not supposed to recapitulate brain\n\nanatomy but to illustrate the basic principles of hierarchical gen-\n\nerative models and predictive coding; (for a discussion of the\n\nmapping between predictive coding networks and brain anatomy, see Parr et al. 2022 ). Each network includes cells encoding predic-\n\ntions (black nodes) and prediction errors (red nodes). These units", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "by 19.1% to 41.4% top-1, and MVD drops by 18.1% to\n\n42.9% top-1.\n\n## **6 Evaluating the Predictor**\n\nNext, we seek to qualitatively inspect the V-JEPA mod-\n\nels. Recall that the predictor network in V-JEPA predicts\n\nthe representations of a masked spatio-temporal region *y*\n\nfrom a visible region *x* , given the positional information\n\nof the masked regions (see Section 3 ). To qualitatively in-\n\nvestigate the grounding of the feature-space predictions,\n\nwe freeze the pretrained encoder and predictor networks\n\nand train a conditional diffusion decoder to map the\n\nV-JEPA predictions to interpretable pixels. Notably, the\n\ndecoder is only fed the representations predicted for the\n\nmissing regions of the video, and does not have access\n\nto the unmasked regions of the video (see Figure 6a ).\n\nGiven a masked video, we use the V-JEPA pretrained\n\nmodels to predict the representations of the missing\n\nregions, and then use the decoder to project the rep-\n\nresentations to pixel space. Figure 6b shows decoder\n\noutputs for various random seeds. Qualities that are\n\ncommon across samples represent information that is\n\ncontained in the predictor representation.\n\nFigure 6b shows that the V-JEPA feature predictions\n\nare indeed grounded, and exhibit spatio-temporal con-\n\nsistency with the unmasked regions of the video. Specif-\n\nically, the samples in Figure 6b show that the V-JEPA\n\npredictor correctly captures positional uncertainty and\n\nproduces a variety of visual objects at various locations\n\nwith consistent motion. Some of the samples also demon-\n\nstrate an understanding of object-permanence, as the\n\nvisual objects remain consistent after partial occlusion.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv3.pdf" - }, - { - "text": "on unsupervised video learning. Towards leveraging temporal information as supervision, some approaches train a\n\nvisual encoder by predicting the temporal ordering of frames ( Xu et al. , 2019 ; Lee et al. , 2017 ). Other approaches\n\nseek to predict low-level motion vectors computed from optical flow ( Pintea et al. , 2014 ), or to predict mixing pixels\n\nin video frames, using either a frame-interpolation objective ( Kalluri et al. , 2023 ) or a denoising autoencoder ( Tong\n\net al. , 2022 ; Feichtenhofer et al. , 2022 ; Wang et al. , 2023a ).", - "page_start": 14, - "page_end": 14, - "source_file": "arxiv3.pdf" - }, - { - "text": "#### Summary of expected outputs\n\nTable 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.\n\n* Data also available for whole UK, administrative regions, devolved administrations and river basin regions.\n\n†Additional information on variability and observations available at Class A tide gauges (see **[http://www.ntslf.org/](http://www.ntslf.org/data/uk-network-real-time)**\n\n**[data/uk-network-real-time](http://www.ntslf.org/data/uk-network-real-time)** ).\n\n‡An ensemble of regional climate model results over Europe (see **[ http://www.euro-cordex.net](http://www.euro-cordex.net)** ).\n\n+Now included due to user request and Peer Review Panel advice.\n\n++This is not an exhaustive list and further user-requested variables will be made available subject to evaluation of\n\nmodels.\n\n| | Observations (UK State of the Climate) | Marine and coastal projections | Global projections | Probabilistic projections | High resolution projections | High resolution projections |\n|:---|:---|:---|:---|:---|:---|:---|\n| Characteristics | Observed trends; long-term climatologies; weather events for the preceding year | Updated sea level rise and surge projections based on operational storm surge model (CS3) using CMIP5, EURO-CORDEX‡ | Ensemble of ~20 spatially coherent time series of the Met Office Hadley Centre model and a similar number of CMIP5 models | Updated probability density functions presented as 30- year and monthly time series based on Met Office models (HadCM3, ESPPE) and CMIP5 | Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events | Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events |\n| Scale | UK | UK | Global | UK | UK | UK |\n| Spatial resolution* | To match land projections | UK Coastline † | 60km | 25km | 12km + | 2.2km |\n| Highest temporal resolution | Daily / monthly | Annual | Daily | Monthly | Daily | Sub-daily |\n| Period of data | bulk of 20th century to present day | 1950-2100 | 1900-2100 | 1961-2100 | 1981-2080 | 1981-2000 2021-2040 2061-2080 |\n| Emissions scenarios | N/A | RCP2.6, RCP4.5, RCP8.5 H ++ | RCP8.5; additional lower scenario (for Met Office Hadley Centre model only) | SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5 | RCP8.5 | RCP8.5 |\n| Variables available ++ | Temperature, precipitation (including snow), sunshine, wind | Sea level rise, storm surge | Temperature, precipitation, humidity, wind speed, wind direction, solar radiation | Temperature, precipitation, humidity, wind speed, solar radiation | Temperature, precipitation, humidity, wind speed, wind direction, solar radiation | Temperature, precipitation, humidity, wind speed, wind direction, solar radiation |\n\n####### **Land**\n\n#### How can I get the information and when?\n\nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available\n\nthrough a dedicated website.\n\nA dedicated user interface will provide users with a means to download the data and produce customised\n\nvisualisations. The exact nature of these outputs is still the subject of consultation with users.\n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the\n\nlatest information visit:\n\n####### **[http://ukclimateprojections.metoffice.gov.uk/24125](http://ukclimateprojections.metoffice.gov.uk/24125)**\n\n*UKCP Project Team*\n\n*July 2017*", - "page_start": 3, - "page_end": 3, - "source_file": "legal1_opengouvernementlicense.pdf" - }, - { - "text": "**Frozen**\n\nx-encoder predictor decoder\n\n**(a) Visualization Methodology.** We train a conditional diffusion model to decode the V-JEPA feature-space predictions to\n\ninterpretable pixels; the pretrained V-JEPA encoder and predictor networks are kept frozen in this process. The decoder is\n\nonly fed the representations predicted for the missing regions of the video, and does not have access to the unmasked regions\n\nof the video.\n\n**(b) Visualizations.** *First Row:* Masked videos used as input to the V-JEPA models (a pretrained ViT-H/16 encoder and its\n\ncorresponding predictor network). *Other rows:* Bounding boxes contain various samples from the decoder overlayed on the\n\noriginal video. V-JEPA is not a generative model and the decoder does not have access to the context (first row), so we do\n\nnot expect samples to exactly match the input. This experiment qualitatively illustrates what information is encoded and\n\npredicted by V-JEPA. In particular, characteristics that are common across samples represent information that is encoded in\n\nthe V-JEPA predictions. V-JEPA generates predictions that are spatially and temporally coherent with unmask region of the\n\nvideo. The predictions also capture consistent motion through time.\n\n**Figure 6** *Qualitative Analysis.* Offline visualizations of the V-JEPA feature-space predictions.\n\n## **7 Conclusion**\n\nIn this work, we explored the effectiveness of feature\n\nprediction as a stand-alone objective for unsupervised\n\nlearning from video and introduced V-JEPA , a collection\n\nof vision models trained solely using a self-supervised\n\nfeature prediction objective. The V-JEPA models demon-\n\nstrate the ability to solve various downstream image and\n\nvideo tasks without adaption of the model parameters,\n\nand outperform previous video representation learning\n\napproaches in frozen evaluation on action recognition,\n\nspatio-temporal action detection, and image classifica-\n\ntion tasks. Additionally, we show that pretraining V-\n\nJEPA on videos is particularly effective for solving down-\n\nstream tasks requiring fine-grained motion understand-\n\ning, while large-scale image models trained on internet\n\nscale datasets fall short on such tasks. Finally, we em-\n\npirically observed that V-JEPA models are label-efficient\n\nlearners, and exhibit good performance on downstream\n\ntasks, even when only few labeled examples are available.\n\n**References**\n\nHassan Akbari, Liangzhe Yuan, Rui Qian, Wei-Hong Chuang,\n\nShih-Fu Chang, Yin Cui, and Boqing Gong. Vatt: Trans-\n\nformers for multimodal self-supervised learning from raw\n\nvideo, audio and text. *Advances in Neural Information*\n\n*Processing Systems* , 34:24206- 24221, 2021.", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv3.pdf" - }, - { - "text": "ing the temporal dynamics of belief changes in experimental participants. Dynamic belief\n\ntrajectories can then be related to other (for example, physiological) measures, as is usual\n\nin model-based neuroscience [ 65 ]. This method can also, in principle, be used for fitting\n\nmodels to other types of experimentally observable systems, like animals, organoids [ 66 ],\n\nand simulated or emergent systems [ 67 ]. The package can also be used for agent-based\n\nmodelling in general, for repeating earlier analyses with sampling based model-fitting\n\nand for comparing POMDP-based AIF models directly to other types of models.\n\nSince they implement full approximate Bayesian inferences, AIF models are compu-\n\ntationally more demanding than many approaches traditionally used in cognitive and\n\nagent-based modelling, in particular when the dimensionality of the generative model is\n\nlarge. This means that models with highly multidimensional or complex behaviour and\n\nlarge numbers of agents can be computationally infeasible to implement, especially given\n\nthe additional computational demands introduced by fitting these models to empirical\n\ndata. Avenues for addressing this implicit scaling problem were proposed in the context of\n\nmachine learning applications [ 68 , 69 ], and with the use of simplifying assumptions—the\n\nuse of which are ubiquitous in computational modelling—AIF has been used to model\n\nmulti-agent phenomena, such as opinion dynamics [ 15 , 70 ], coordinated foraging [ 71 ] and\n\nfish school movements [ 12 ]. It remains to be explored how AIF models can be applied to\n\nhighly complex natural phenomena, such as a concrete election, which underscores the\n\nneed for efficient but flexible and accessible software tools in the field.\n\nThere are many ways in which ActiveInference can be improved. It would be useful\n\nto extend the set of dynamic belief states to include prediction errors since they are often\n\nused for model-based neuroscience. This would entail departing from discrete state-space\n\n(i.e., POMDP) models to consider continuous state-space models apt for Bayesian filtering\n\nor predictive coding (see below). An alternative would be to generate prediction errors\n\nfrom belief updating under discrete models, where prediction errors can be read as the\n\n(KL) divergence between posterior and prior beliefs (i.e., complexity or information gain).\n\nA simple interface could be added for creating custom parametrisations of the requisite\n\nparameters that could be parametrised with Boltzmann or Gibbs distributions, as opposed\n\nto Dirichlet distributions. Parameter learning could be extended to all generative model\n\nparameters, as well as in parametrised forms (e.g., so that the Boltzmann parameter or\n\ntemperature of the parameters that are learned); similarly for the precision over expected\n\nfree energies *γ* . Preference priors should also be implementable for environmental states,\n\nin addition to observations, and **A** can be made action dependent.\n\nA library of pre-made canonical POMDP models could be created so that users can eas-\n\nily implement them directly. Alternatives to the fixed-point iteration method for updating\n\nposteriors over environmental states could be included, like the marginal message passing\n\nalgorithm. There are various ways in which the package can be made more computationally\n\nefficient, and it could be compared with other software implementations. There are plenty\n\nof utility and plotting functions that could be added to the package to make it easier to\n\nuse and to facilitate integration with the model-fitting packages it relies on; for example,\n\nto allow for combining the models with linear regressions to compare parameters values\n\nof different populations in a single model. More complex types of POMDP models can\n\nalso be added, like hierarchical and temporally deep POMDPs. Model structure learning\n\ncould be considered, where different model structures are compared and chosen between", - "page_start": 28, - "page_end": 28, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "it was correctly specified with regards 6o 1) the choice of basis dimension (k) and 2) the distribution of the model residuals\n\n(see mgcv documentation; Wood, 2017). The general pattern of results held after toggling model parameters; however, we\n\nnote the risk of overinterpreting complex models with small sample sizes (see Sullivan et al., 2015). To address overfitting and\n\ncross-validate our basis type selection, we also fit the data using nonpenalized general linear models (GLM) with both linear\n\nand polynomial terms for gestation week. We compared the performance of each GLM (i.e., models using only a linear term\n\nvs. models with polynomial terms) via the Akaike information criterion (AIC), which revealed that cubic models consistently\n\noutperformed both linear and quadratic models (AICdiff > 3), providing additional evidence for non-linear changes in\n\nstructural brain variables over time.\n\nGray Matter Volume & Cortical Thickness:\n\nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy\n\nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a\n\nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were\n\nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non-\n\ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We\n\nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week\n\n(FDR-corrected at q < 0.05).\n\nT2-weighted MTL scans:\n\nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n =\n\n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual\n\nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "arxiv3.pdf", - "query": "What does mean the JEPA acronym ?", - "target_page": 3, - "target_passage": " joint-embedding predictive architecture (JEPA)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "10 <sup>2.4</sup> 10 <sup>2.6</sup> 10 <sup>2.8</sup> 10 <sup>3</sup> 10 <sup>3.2</sup> 10 <sup>3.4</sup> 74\n\n74.5\n\n75\n\n**V-JEPA**\n\n**ViT-L/ 16**\n\n**VideoMAE**\n\n**ViT-L/ 16**\n\n**Hiera**\n\n**Hiera-L**\n\n**OmniMAE**\n\n**ViT-L/ 16**\n\n**Samples Seen (M) Something-Something-v 2** End-to-End Fine-Tuning\n\nVideo Feature Pred.\n\nVideo Pixel Pred.\n\n**Figure 4** *SSv2 fine-tuning performance vs. Samples Seen.* We\n\nreport SSv2 fine-tuning for V-JEPA and pixel-reconstruction\n\nbaselines using a ViT-L/16 or Hiera-L architecture. V-JEPA\n\noutperforms all pixel-reconstruction methods using a ViT-\n\nL/16 and matches the Hiera-L performance while seeing\n\nsignificantly less samples during pretraining.\n\nageNet; hence, V-JEPA achieves comparable ImageNet\n\nperformance despite only pretraining on video.\n\nUnder the fine-tuning protocol, V-JEPA also achieves the\n\nbest performance of any model trained with a ViT-L/16,\n\nand matches the performance of the Hiera-L on SSv2,\n\nwhich benefits from a hierachical prior ( Ryali et al. , 2023 ).\n\nThe V-JEPA models achieve this result while processing\n\nsignificantly fewer samples during pretraining (Figure 4 ),\n\ndemonstrating the efficiency of feature prediction as a\n\nlearning principle.\n\n### **5.2 Comparison with State-of-the-Art**\n\nNext, in Table 6 , we inspect how the V-JEPA models\n\npretrained on video stack up next to the largest state-\n\nof-the-art self-supervised image and video models when\n\nfreezing the backbone encoder and training an attentive\n\nprobe on top. Our image pretrained baselines include\n\nOpenCLIP ( Cherti et al. , 2023 ), DINOv2 ( Oquab et al. ,\n\n2023 ), and I-JEPA ( Assran et al. , 2023 ). The Open-\n\nCLIP model is trained with a contrastive image-text\n\nalignment objective, DINOv2 and I-JEPA are trained\n\nwith self-supervision. These models are known to excel\n\nin their frozen-evaluation performance ( Oquab et al. ,\n\n2023 ); i.e., their ability to produce visual features that\n\ncan be applied to many downstream tasks simultane-\n\nously, without end-to-end fine-tuning, and thus pro-\n\nvide highly competitive baselines. Our video pretrained\n\nbaselines include VideoMAE ( Tong et al. , 2022 ), Omni-\n\nMAE ( Girdhar et al. , 2023 ), Hiera ( Ryali et al. , 2023 ),\n\nVideoMAEv2 ( Wang et al. , 2023a ), and MVD ( Wang\n\net al. , 2023b ). The OpenCLIP, DINOv2 and Video-\n\nMAEv2 models are parameterized as Giant/Gigantic\n\nvision transformer architectures containing over 1B pa-\n\nrameters trained on large-scale image or video datasets.\n\n**Comparison with video models.** Compared to\n\nlarge-scale video baselines, the V-JEPA models outper-\n\nform all previous models on every downstream video\n\n50 100 150 200 250 300 350\n\n60\n\n65\n\n70\n\n75 **V-JEPA**\n\n**ViT-H/ 16** 384\n\n**VideoMAE**\n\n**ViT-H/ 16**\n\n**VideoMAEv 2**\n\n**ViT-g/ 14**\n\n**Pretraining Time (Hrs.) Something-Something-v 2** Frozen Evaluation\n\nVideo Feature Pred.\n\nVideo Pixel Pred.\n\n**Figure 5** *SSv2 frozen-evaluation performance vs. Pretraining*\n\n*Time.* Wallclock times for all methods are measured on a\n\nsingle GPU with a batch size of 10 clips, using the official\n\ncodebases for VideoMAE and VideoMAEv2, and linearly\n\nextrapolated assuming a global batch size of 2400 samples.\n\nHowever, note that the SSv2 accuracies of video pixel pre-\n\ndiction methods are actually obtained with small batch sizes\n\nand significantly longer training schedules. V-JEPA out-\n\nperforms pixel-reconstruction methods while training signifi-\n\ncantly faster.\n\nand image task with notable margin (see Table 6 ). Our\n\nH/16 model outperforms the largest publicly available\n\nVideoMAE, VideoMAEv2, OmniMAE, MVD, and Hiera\n\nmodels by at least +5 points in motion understanding\n\n(Something-Something-v2), +2 points in action recogni-\n\ntion (Kinetics-400), +5 points on action detection (AVA),\n\n+1 point on object recognition (ImageNet-1K), +2 points\n\nin scene recognition (Places205), and +0 *.* 2 points on fine-\n\ngrained recognition (iNaturalist). Moreover, when com-", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv3.pdf" - }, - { - "text": "+1 point on object recognition (ImageNet-1K), +2 points\n\nin scene recognition (Places205), and +0 *.* 2 points on fine-\n\ngrained recognition (iNaturalist). Moreover, when com-\n\nparing pretraining wallclock time in Figure 5 , we see that\n\nV-JEPA achieves this performance with a roughly 2 *×* speedup compared to the large pixel prediction models.\n\n**Comparison with image models.** On tasks that re-\n\nquire a fine-grained understanding of motion (Something-\n\nSomething-v2), the V-JEPA models provide a major im-\n\nprovement (over +21 points) compared to large-scale\n\nimage baselines, such as DINOv2, OpenCLIP, and I-\n\nJEPA. Self-supervised pretraining from videos allows to\n\nmodel dynamic concepts that are not easily learned from\n\nstatic image datasets. Similarly, we observe that the\n\nV-JEPA models outperform image-based pretraining on\n\naction localization.\n\nOn Kinetics-400, we find image models to perform well;\n\ne.g., while DINOv2 ( Oquab et al. , 2023 ) previously re-\n\nported 78 *.* 4% on K400 with a linear probe, we improve\n\nthe frozen evaluation of the g/14 model to 83 *.* 4% by\n\nusing an attentive probe. In this case, our H/16 model\n\nachieves 82 *.* 0% top-1 accuracy. It is worth noting that\n\nthe label for many Kinetics videos can be inferred using\n\nappearance-based cues, without requiring an understand-\n\ning of motion ( Sevilla-Lara et al. , 2021 ).\n\nThe V-JEPA models narrow the gap with image models\n\non image classification tasks. In particular, V-JEPA\n\nachieves a score of 77 *.* 4% on ImageNet using a one-", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv3.pdf" - }, - { - "text": "**Frozen**\n\nx-encoder predictor decoder\n\n**(a) Visualization Methodology.** We train a conditional diffusion model to decode the V-JEPA feature-space predictions to\n\ninterpretable pixels; the pretrained V-JEPA encoder and predictor networks are kept frozen in this process. The decoder is\n\nonly fed the representations predicted for the missing regions of the video, and does not have access to the unmasked regions\n\nof the video.\n\n**(b) Visualizations.** *First Row:* Masked videos used as input to the V-JEPA models (a pretrained ViT-H/16 encoder and its\n\ncorresponding predictor network). *Other rows:* Bounding boxes contain various samples from the decoder overlayed on the\n\noriginal video. V-JEPA is not a generative model and the decoder does not have access to the context (first row), so we do\n\nnot expect samples to exactly match the input. This experiment qualitatively illustrates what information is encoded and\n\npredicted by V-JEPA. In particular, characteristics that are common across samples represent information that is encoded in\n\nthe V-JEPA predictions. V-JEPA generates predictions that are spatially and temporally coherent with unmask region of the\n\nvideo. The predictions also capture consistent motion through time.\n\n**Figure 6** *Qualitative Analysis.* Offline visualizations of the V-JEPA feature-space predictions.\n\n## **7 Conclusion**\n\nIn this work, we explored the effectiveness of feature\n\nprediction as a stand-alone objective for unsupervised\n\nlearning from video and introduced V-JEPA , a collection\n\nof vision models trained solely using a self-supervised\n\nfeature prediction objective. The V-JEPA models demon-\n\nstrate the ability to solve various downstream image and\n\nvideo tasks without adaption of the model parameters,\n\nand outperform previous video representation learning\n\napproaches in frozen evaluation on action recognition,\n\nspatio-temporal action detection, and image classifica-\n\ntion tasks. Additionally, we show that pretraining V-\n\nJEPA on videos is particularly effective for solving down-\n\nstream tasks requiring fine-grained motion understand-\n\ning, while large-scale image models trained on internet\n\nscale datasets fall short on such tasks. Finally, we em-\n\npirically observed that V-JEPA models are label-efficient\n\nlearners, and exhibit good performance on downstream\n\ntasks, even when only few labeled examples are available.\n\n**References**\n\nHassan Akbari, Liangzhe Yuan, Rui Qian, Wei-Hong Chuang,\n\nShih-Fu Chang, Yin Cui, and Boqing Gong. Vatt: Trans-\n\nformers for multimodal self-supervised learning from raw\n\nvideo, audio and text. *Advances in Neural Information*\n\n*Processing Systems* , 34:24206- 24221, 2021.", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv3.pdf" - }, - { - "text": "by 19.1% to 41.4% top-1, and MVD drops by 18.1% to\n\n42.9% top-1.\n\n## **6 Evaluating the Predictor**\n\nNext, we seek to qualitatively inspect the V-JEPA mod-\n\nels. Recall that the predictor network in V-JEPA predicts\n\nthe representations of a masked spatio-temporal region *y*\n\nfrom a visible region *x* , given the positional information\n\nof the masked regions (see Section 3 ). To qualitatively in-\n\nvestigate the grounding of the feature-space predictions,\n\nwe freeze the pretrained encoder and predictor networks\n\nand train a conditional diffusion decoder to map the\n\nV-JEPA predictions to interpretable pixels. Notably, the\n\ndecoder is only fed the representations predicted for the\n\nmissing regions of the video, and does not have access\n\nto the unmasked regions of the video (see Figure 6a ).\n\nGiven a masked video, we use the V-JEPA pretrained\n\nmodels to predict the representations of the missing\n\nregions, and then use the decoder to project the rep-\n\nresentations to pixel space. Figure 6b shows decoder\n\noutputs for various random seeds. Qualities that are\n\ncommon across samples represent information that is\n\ncontained in the predictor representation.\n\nFigure 6b shows that the V-JEPA feature predictions\n\nare indeed grounded, and exhibit spatio-temporal con-\n\nsistency with the unmasked regions of the video. Specif-\n\nically, the samples in Figure 6b show that the V-JEPA\n\npredictor correctly captures positional uncertainty and\n\nproduces a variety of visual objects at various locations\n\nwith consistent motion. Some of the samples also demon-\n\nstrate an understanding of object-permanence, as the\n\nvisual objects remain consistent after partial occlusion.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv3.pdf" - }, - { - "text": "Plug in the expressions (4) and (6) into (7), the Hamil- tonian reads explicitly as\n\nH = � j\n\n( J cluster / 2)( S j 1 + S j 2 + S j 3 + S j 4 ) <sup>2</sup> − � z − links <jk>\n\nJ z (16 / 9)[ S j 2 · ( S j 3 × S j 4 )][ S k 2 · ( S k 3 × S k 4 )]\n\n− � x − links <jk>\n\nJ x (2 S j 1 · S j 2 + 1 / 2)(2 S k 1 · S k 2 + 1 / 2) − � y − links <jk>\n\nJ y (4 / 3)[ S j 1 · ( S j 3 − S j 4 )][ S k 1 · ( S k 3 − S k 4 )]\n\n(8)\n\nWhile by the represenation (4) and (5), the Hamilto- nian becomes\n\nH = � j\n\n( J cluster / 2)( S j 1 + S j 2 + S j 3 + S j 4 ) <sup>2</sup>\n\n− � x − links <jk>\n\nJ x (2 S j 1 · S j 2 + 1 / 2)(2 S k 1 · S k 2 + 1 / 2) − � y − links <jk>\n\nJ y (4 / 3)[ S j 1 · ( S j 3 − S j 4 )][ S k 1 · ( S k 3 − S k 4 )]\n\n− � z − links <jk>\n\nJ z ( − 4 / 3)(2 S j 3 · S j 4 + 1 / 2)[ S j 1 · ( S j 3 − S j 4 )](2 S k 3 · S k 4 + 1 / 2)[ S k 1 · ( S k 3 − S k 4 )]\n\n(9)\n\nThis model, in terms of physical spins S , has full\n\nspin rotation symmetry and time-reversal symmetry. A\n\npseudo-magnetic field term <sup>�</sup> j <sup>⃗h</sup> <sup>·</sup> <sup>⃗τ</sup> <sup>j</sup> <sup>term can also be</sup> included under this mapping, however the resulting Ki-\n\ntaev model with magnetic field is not exactly solvable.\n\nIt is quite curious that such a formidably looking Hamil-\n\ntonian (8), with biquadratic and six-spin(or eight-spin)\n\nterms, has an exactly solvable low energy sector.\n\nWe emphasize that because the first intra-cluster term\n\n� cluster <sup>H</sup> <sup>cluster</sup> <sup>commutes with the latter Kitaev terms</sup> independent of the representation used, the Kitaev model is realized as the exact low energy Hamiltonian of this\n\nmodel without truncation errors of perturbation theories,\n\nnamely no ( | J x,y,z | /J cluster ) <sup>2</sup> or higher order terms will\n\nbe generated under the projection to low energy clus-\n\nter singlet space. This is unlike, for example, the t/U\n\nexpansion of the half-filled Hubbard model <sup>22,23</sup> , where\n\nat lowest t <sup>2</sup> /U order the effective Hamiltonian is the\n\nHeisenberg model, but higher order terms ( t <sup>4</sup> /U <sup>3</sup> etc.)\n\nshould in principle still be included in the low energy ef-\n\nfective Hamiltonian for any finite t/U . Similar compari-\n\nson can be made to the perturbative expansion studies of\n\nthe Kitaev-type models by Vidal et al. <sup>9</sup> , where the low\n\nenergy effective Hamiltonians were obtained in certian\n\nanisotropic (strong bond/triangle) limits. Although the\n\nspirit of this work, namely projection to low energy sec-\n\ntor, is the same as all previous perturbative approaches\n\nto effective Hamiltonians.\n\nNote that the original Kitaev model (1) has three-\n\nfold rotation symmetry around a honeycomb lattice site,\n\ncombined with a three-fold rotation in pseudo-spin space\n\n(cyclic permutation of τ <sup>x</sup> , τ <sup>y</sup> , τ <sup>z</sup> ). This is not apparent\n\nin our model (8) in terms of physical spins, under the\n\ncurrent representation of τ <sup>x,y,z</sup> . We can remedy this by using a different set of pseudo-spin Pauli matrices τ <sup>′</sup> <sup>x,y,z</sup>\n\nin (7),\n\nτ <sup>′</sup> <sup>x</sup> = � 1 / 3 τ <sup>z</sup> + � 2 / 3 τ <sup>x</sup> ,\n\nτ <sup>′</sup> <sup>y</sup> = � 1 / 3 τ <sup>z</sup> − � 1 / 6 τ <sup>x</sup> + � 1 / 2 τ <sup>y</sup> ,\n\nτ <sup>′</sup> <sup>z</sup> = � 1 / 3 τ <sup>z</sup> − � 1 / 6 τ <sup>x</sup> − � 1 / 2 τ <sup>y</sup>\n\nWith proper representation choice, they have a symmet-\n\nric form in terms of physical spins,\n\nτ <sup>′</sup> <sup>x</sup> = − (4 / 3) S 2 · ( S 3 × S 4 ) + � 2 / 3(2 S 1 · S 2 + 1 / 2)\n\nτ <sup>′</sup> <sup>y</sup> = − (4 / 3) S 3 · ( S 4 × S 2 ) + � 2 / 3(2 S 1 · S 3 + 1 / 2)\n\nτ <sup>′</sup> <sup>z</sup> = − (4 / 3) S 4 · ( S 2 × S 3 ) + � 2 / 3(2 S 1 · S 4 + 1 / 2)\n\n(10)\n\nSo the symmetry mentioned above can be realized by a\n\nthree-fold rotation of the honeycomb lattice, with a cyclic\n\npermutation of S 2 , S 3 and S 4 in each cluster. This is in", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0266.pdf" - }, - { - "text": "2012 levels.\n\n####### **FREE CASH FLOW**\n\n####### **GENERATION**\n\n**WHAT WE SAID:** Deliver another\n\nyear of significant consolidated\n\npre-tax free cash flow.\n\n**WHAT WE DID:** Generated\n\n$2.0 billion of pre-tax free cash\n\nflow in 2013, supporting the\n\nsignificant investments and cash\n\nwe returned to shareholders\n\nduring the year.\n\n**AT A GLANCE**\n\n**Ro Ro ge gers rs C om mu mu ni nica ca ti on s In c. .** i s s s a a di di ve rs ified Canadi an tel ecommu nica tion s an an and me m dia co co mp mp mp an a n y. y.\n\nRo Ro Ro ge ge ge rs rs rs Wi re e le le ss ss i s s Ca C na da a ’s ’s s l a r ar ge g st wir eless vo ice and da ta telecom munica ti on s se e rv rv rv ic ic ic es es e p rovi de de r r r\n\nan an and th t e co coun un n trtr tr y’ y’ s on ly y nat at atio io i nal carr ier operat ing on the combined wo rld stan dard GSM M /H /H /H SP SP S A+ A /L L TE TE\n\nte te te ch c no o lo ogy gy gy p la latf or ms ms ms . R o Roge rs Ca bl e i s a le ading Ca nadian cable ser vices prov ider, of feri ng g hig ig ig h- h- sp ee e d\n\nIn I te rn n et et t a cc cc es s, cab ab ab le le l tel evisio n, a nd t elep hony products, and together wi th Rog ers Bu sine ss S ol ol ut ions ,\n\npr ov ov id id d es e s b us in n es es es s te t le co m, n etwo rk ing, hosting, managed services and IP solu ti on s to s ma ll, me di di di um um um\n\nan an d la la l rg r e en n te te te r p rp ri se , go ve rnme nt and carrier customers. Rogers Media is Canada ’s pre mi er g ro up\n\nof of f c at at eg or ry- y- y-le l e ad in g br oa dc as t, specialty, print and online media ass ets, with businesses i n ra di o an d\n\nte te tele levi si on n b road ca st in g, t el evised shopping, sports entertainment, magaz ine and trade jo ur na l pu bl is hi ng ng g\n\nan an a d di gi gi gi ta ta ta l l me di a. We ar e publicly traded on both the TSX and NYSE stock exchanges and a re inc lu de d\n\nin i t he e S &P & /T SX 6 0 In de x of the largest publicly traded companies in Canada.", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "10\n\nthis term becomes\n\n− λ <sup>2</sup>\n\n6 J cluster · (3 / 4)[3 / 16 + ( τ <sup>x</sup> / 2 − 1 / 4) <sup>2</sup> ]\n\n= − ( λ <sup>2</sup> ) / (32 J cluster ) · (2 − τ <sup>x</sup> k <sup>)</sup> <sup>.</sup>\n\nAnother second order perturbation term r <sup>2</sup> λ <sup>2</sup> P jk S k 2 · ( S j 3 × S j 4 )(1 −P jk )[0 − H cluster j − H cluster k ] <sup>−</sup> <sup>1</sup> (1 − P jk ) S k 2 · ( S j 3 × S j 4 ) P jk can be computed in the similar way and gives the result − ( r <sup>2</sup> λ <sup>2</sup> ) / (32 J cluster ) · (2 − τ <sup>x</sup> j <sup>).</sup> For one of the cross term\n\nr λ <sup>2</sup> P jk S j 2 · ( S k 3 × S k 4 )(1 −P jk )\n\n× [0 − H cluster j − H cluster k ] <sup>−</sup> <sup>1</sup>\n\n× (1 −P jk ) S k 2 · ( S j 3 × S j 4 ) P jk\n\nWe can use the previous argument for both cluster j and\n\nk , so (1 −P AB )[0 − H cluster j − H cluster k ] <sup>−</sup> <sup>1</sup> (1 −P jk ) can be\n\nreplace by c -number ( − 2 J cluster ) <sup>−</sup> <sup>1</sup> . This term becomes\n\n− r λ <sup>2</sup>\n\n2 J cluster P jk [ S j 2 · ( S k 3 × S k 4 )][ S k 2 · ( S j 3 × S j 3 )] P jk .\n\nSpin rotation symmetry again helps to separate the terms\n\nfor cluster j and k , and we get − ( r λ <sup>2</sup> ) / (32 J cluster ) · τ <sup>z</sup> j <sup>τ</sup> <sup>z</sup> k <sup>.</sup> The other cross term r λ <sup>2</sup> P jk S k 2 · ( S j 3 × S j 4 )(1 − P jk )[0 − H cluster j − H cluster k ] <sup>−</sup> <sup>1</sup> (1 −P jk ) S j 2 · ( S k 3 × S k 4 ) P jk gives the same result.\n\nIn summary the second order perturbation from λ [ S j 2 · ( S j 3 × S j 4 ) + r S k 2 · ( S j 3 × S j 4 )] is\n\n− r λ <sup>2</sup>\n\n16 J cluster · τ <sup>z</sup> j <sup>τ</sup> <sup>z</sup> k <sup>+</sup> λ <sup>2</sup>\n\n32 J cluster\n\n( τ <sup>x</sup> k <sup>+</sup> <sup>r</sup> <sup>2</sup> <sup>τ</sup> <sup>x</sup> j <sup>−</sup> <sup>2</sup> <sup>r</sup> <sup>2</sup> <sup>−</sup> <sup>2)</sup> <sup>.</sup>\n\nUsing this result we can choose the following pertur-\n\nbation on z -links,\n\nλ z H perturbation , z\n\n= λ z [ S j 2 · ( S k 3 × S k 4 ) + sgn( J z ) · S k 2 · ( S j 3 × S j 4 )]\n\n−| J z | ( S j 3 · S j 4 + S k 3 · S k 4 )\n\nwith λ z = 4 � | J z | J cluster , r = sgn( J z ) is the sign of J z .\n\nThe last term on the right-hand-side is to cancel the non- trivial terms ( r <sup>2</sup> τ <sup>x</sup> j <sup>+</sup> <sup>τ</sup> <sup>x</sup> k <sup>)</sup> <sup>λ</sup> <sup>2</sup> z <sup>/</sup> <sup>(32</sup> <sup>J</sup> <sup>cluster</sup> <sup>) from the second</sup>\n\norder perturbation of the first term. Up to second order\n\nperturbation this will produce − J z τ <sup>z</sup> j <sup>τ</sup> <sup>z</sup> k <sup>interactions.</sup>\n\nFinally we have been able to reduce the high order\n\ninteractions to at most three spin terms, the Hamiltonian\n\nH magnetic is\n\nH magnetic = � j\n\nH cluster j + � x − links <jk>\n\nλ x H perturbation x\n\n+ � y − links <jk>\n\nλ y H perturbation y\n\n+ � z − links <jk>\n\nλ z H perturbation z\n\nwhere H cluster j are given by (2), λ x,y,z H perturbation x,y,z\n\nare given above. Plug in relevant equations we get (16)\n\nin Subsection IV B.\n\n1 Alexei Kitaev, Ann. Phys. (N.Y.) 321 , 2 (2006). 2 Xiao-Yong Feng, Guang-Ming Zhang, Tao Xiang, Phys.\n\nRev. Lett. 98 , 087204 (2007). 3 Han-Dong Chen, Zohar Nussinov, J. Phys. A: Math.\n\nTheor. 41 , 075001 (2008). 4 Dung-Hai Lee, Guang-Ming Zhang, Tao Xiang, Phys. Rev.\n\nLett. 99 , 196805 (2007). 5 Yue Yu, Nucl. Phys. B 799 , 345 (2008). 6 Yue Yu, Ziqiang Wang, Europhys. Lett. 84 , 57002 (2008). 7 G. Kells, J. K. Slingerland, J. Vala, Phys. Rev. B 80 ,\n\n125415 (2009). 8 [ Han-Dong Chen, B. Wang, S. Das Sarma, arXiv:0906.0017](http://arxiv.org/abs/0906.0017)\n\n(2009). 9 K.P. Schmidt, S. Dusuel, and J. Vidal, Phys. Rev. Lett.\n\n100 , 057208 (2008); J. Vidal, K.P. Schmidt, and S. Dusuel,\n\nPhys. Rev. B 78 , 245121 (2008); S. Dusuel, K.P. Schmidt,\n\nJ. Vidal, and R.L. Zaffino, Phys. Rev. B 78 , 125102 (2008). 10 Hong Yao, Steven A. Kivelson, Phys. Rev. Lett. 99 , 247203", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0266.pdf" - }, - { - "text": "To that end, we pretrain a family of V-JEPA models\n\non a dataset of 2 million videos collected from pub-\n\nlicly available datasets by combining a masked modeling\n\nprediction task with a joint-embedding predictive ar-\n\nchitecture (see Figure 2 ). We measure performance on\n\nseveral downstream image and video tasks, using both\n\nfrozen evaluation and end-to-end fine-tuning. Our find-\n\nings suggest that feature prediction can indeed serve as\n\nan effective stand-alone objective for unsupervised learn-\n\ning from video, while using significantly shorter training\n\nschedules than pixel prediction methods. Specifically:\n\n- Feature prediction leads to versatile visual repre-\n\nsentations that perform well across downstream\n\nimage and video tasks without adaption of the\n\nmodel’s weights; i.e., using a frozen backbone.\n\nV-JEPA achieves the best performance among\n\nmethods we consider (+6% accuracy) on the\n\nSomethingSomething-v2 task, which requires fine-\n\ngrained temporal understanding. V-JEPA is\n\nalso competitive on tasks like Kinetics400, where\n\nappearance-based features are sufficient and hence\n\nstate-of-the-art image models such as DINOv2 excel\n\n(Figure 1 and Table 6 ).\n\n- Models trained with feature prediction are supe-\n\nrior to pixel prediction approaches under a frozen\n\nevaluation protocol (attentive probing) and are com-\n\npetitive with pixel prediction under full fine-tuning,\n\nwhile using significantly shorter training schedules\n\n(Tables 5 and 6 ).\n\n- Models trained with feature prediction are more\n\nlabel-efficient than pixel prediction approaches. De-\n\ncreasing the available number of labeled examples re-\n\nsults in an increase in the performance gap between\n\nV-JEPA and pixel-reconstruction models (Table 7 ).\n\n## **2 Related Works**\n\n**Slow Features.** One way to encourage temporally\n\nadjacent representations to be predictive of each other\n\nis to ensure that they vary slowly over time. Early\n\nworks targeting predictive features encouraged represen-\n\ntations of individual video frames to be locally tempo-\n\nrally invariant, while preventing representation collapse\n\nby using spectral methods, as in SFA ( Wiskott and Se-\n\njnowski , 2002 ), SSA ( Kayser et al. , 2001 ), and Simulated\n\nFixations ( Zou et al. , 2012 ). More recently, Goroshin\n\net al. ( 2015 ); Wang et al. ( 2010 ) train a siamese con-\n\nvolutional network to map the representations of two\n\nsubsequent frames to the same point, while encouraging\n\ndistant frames to have diverse representations via a pair-\n\nwise margin loss and a triplet loss, respectively. Other\n\nworks ( Oord et al. , 2018 ; Surís et al. , 2021 ; Feichtenhofer\n\net al. , 2021 ) implement temporal invariance using noise-\n\ncontrastive estimation ( Gutmann and Hyvärinen , 2012 ).\n\nOur exploration in this paper goes beyond temporal in-\n\nvariance and explores feature prediction using masked\n\nmodeling.\n\n**Predictive Features.** Going beyond local invariance,\n\na family of works trains a predictor network to map the\n\nrepresentation of a frame or clip at one time-step to a\n\ndistinct representation at another time-step. Srivastava\n\net al. ( 2015 ); Vondrick et al. ( 2016 ); Wang et al. ( 2023b )\n\ntrain such a video feature predictor network on top of\n\na frozen pretrained image or video encoder. Unfreezing\n\nthe target feature extractor, several methods train the\n\nvideo encoder and the predictor network simultaneously,\n\nwhile preventing collapse by using a supervised action\n\nforecasting loss ( Girdhar and Grauman , 2021 ), or by\n\nusing the representations of distant clips as negative\n\nsamples in a contrastive loss ( Han et al. , 2019 , 2020 ;\n\nTan et al. , 2023 ), often focusing on small convolutional\n\nencoders ( Han et al. , 2019 , 2020 ). The idea of learning a\n\nrepresentation by predicting missing information in fea-\n\nture space is also core to the joint-embedding predictive\n\narchitecture (JEPA) ( LeCun , 2022 ), which combines a\n\nsiamese encoder with a predictor network. JEPAs have", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv3.pdf" - }, - { - "text": "best performance across architectures for self-supervised\n\nvideo and image pretraining approaches. Finally, we ex-\n\nplore the label-efficiency of V-JEPA relative to other self-\n\nsupervised video pretraining approaches in Section 5.3 .\n\nWe further detail the evaluation setup in Appendix D .\n\n### **5.1 Comparison with Pixel Prediction**\n\nTo investigate the effectiveness of feature prediction pre-\n\ntraining, we first compare V-JEPA to video masked mod-\n\neling models relying on a pixel prediction loss. We control\n\nfor the possible confounding factor of model architec-\n\nture by evaluating all models using either a ViT-L/16\n\nencoder, or a Hiera-L encoder, which has a similar num-\n\nber of parameters. For the pixel prediction baselines\n\nwe consider VideoMAE ( Tong et al. , 2022 ; Wang et al. ,\n\n2023a ), which trains vision transformer autoencoders\n\nexclusively on video, Hiera ( Ryali et al. , 2023 ), which\n\ntrains a hierarchical transformer autoencoder on video,\n\nand OmniMAE ( Girdhar et al. , 2023 ), which trains a\n\nvision transformer autoencoder on static images and\n\nvideo simultaneously.\n\nTable 5 examines both frozen evaluation with an atten-\n\ntive probe on downstream video and image tasks, as well\n\nas end-to-end fine-tuning. In frozen evaluation, V-JEPA\n\noutperforms the baselines on all downstream tasks, ex-\n\ncept ImageNet, where we achieve 74 *.* 8% compared to\n\n75 *.* 1% of an OmniMAE model trained directly on Im-", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "**Stationary/Stationery**\n\n“Stationary” means not moving.\n\nE.g. The stationary truck held up the traffic.\n\n“Stationery” refers to writing materials.\n\nE.g. She needed new stationery for school.\n\n**There/Their/They’re**\n\n“There” is a preposition that refers to a place.\n\nE.g. He will be there in ten minutes.\n\n“Their” is a possessive pronoun. It indicates that something\n\nbelongs to them.\n\nE.g. Due to unforeseen circumstances, their meeting was cancelled.\n\n“They’re” is a contraction of “they are”.\n\nE.g. They’re not going to be pleased when they find out that he lost\n\nthe report.\n\n**To/Too/Two**\n\n“To” is a preposition, and indicates the relationship between one\n\nthing and another.\n\nE.g. I gave the letter to him.\n\n“Too” means “also”, “additional” or “more than what is necessary\n\nor desirable”.\n\nE.g. He is going on holiday too. As a result, there are too few people\n\navailable to work over December.\n\n“Two” is a number.\n\nE.g. There are only two staff members in the office.", - "page_start": 18, - "page_end": 18, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "arxiv3.pdf", - "query": "What is the average performance of the ViT-L/16 architecture on the K710 dataset with 700k samples ?", - "target_page": 5, - "target_passage": "70.9", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Table 1** *Pixels vs. Featurized Targets.* We ablate the effect of computing the prediction loss in feature space vs pixel space. All\n\nmodels are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We\n\nexamine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single\n\ncenter view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide\n\na consistent improvement over pixel space prediction.\n\n*Frozen Evaluation* *Fine-Tuning*\n\n**K400 SSv2 IN1K K400-ft Target Arch.** (16 *×* 1 *×* 1) (16 *×* 1 *×* 1) (16 *×* 5 *×* 3)\n\nPixels ViT-L/16 68.6 66.0 73.3 85.4 Features ViT-L/16 **73.7 66.2 74.8 85.6**\n\n**Table 2** *Pretraining Data Distribution.* We pretrain all models for 90K iterations using a batch size of 3072, and evaluate\n\ndownstream performance of the frozen backbones with an attentive probe using a single center view. Average performance\n\nacross tasks increases with the pretraining dataset size.\n\n*Frozen Evaluation*\n\n**K400 SSv2 IN1K Avg. Arch. Data #Samples** (16 *×* 1 *×* 1) (16 *×* 1 *×* 1)\n\nViT-L/16\n\nK710 700K **75.8** 63.2 73.7 70.9 K710+SSv2 900K 72.9 **67.4** 72.8 71.0 K710+HT 1900K 74.5 64.2 **74.8** 71.1 VideoMix2M 2000K 73.7 66.2 **74.8 71.5**\n\nViT-H/16 K710+SSv2 900K **75.7** 66.8 73.7 72.0 VideoMix2M 2000K 74.0 **68.5 75.9 72.8**\n\n**Evaluations.** Pretrained models are evaluated on\n\ndownstream video and image tasks. On video tasks,\n\nwe use a subset of the VideoGLUE benchmark ( Yuan\n\net al. , 2023 ) to test for various capabilities; specif-\n\nically, we investigate action recognition on Kinetics-\n\n400 (K400) ( Kay et al. , 2017 ), motion classification on\n\nSomething-Something-v2 (SSv2) ( Goyal et al. , 2017 ),\n\nand action localization on AVA ( Gu et al. , 2018 ). Action\n\nclassification on Kinetics evaluates the appearance-based\n\nunderstanding of the model, as many action classes in\n\nthe dataset can be inferred from the presence of specific\n\nobjects in the video ( Sevilla-Lara et al. , 2021 ). Motion\n\nclassification on Something-Something-v2 evaluates the\n\ntemporal understanding of the model, as action classes\n\nin the dataset are decoupled from the appearance/pres-\n\nence of specific objects in the video ( Goyal et al. , 2017 ).\n\nFinally, action localization on AVA evaluates the ability\n\nof the model to understand and localize motions in the\n\nvideo. We follow standard practice and report accu-\n\nracy on K400 and SSv2 by sampling several spatial and\n\ntemporal views. For static image tasks, we explore ob-\n\nject recognition on ImageNet ( Russakovsky et al. , 2015 ),\n\nscene classification on Places205 ( Zhou et al. , 2014 ), and\n\nfine-grained recognition on iNaturalist 2021 ( Van Horn\n\net al. , 2018 ).\n\n## **4 What Matters for Learning Represen-**\n\n**tations from Video?**\n\nIn this section we isolate the contributions of several de-\n\nsign choices, including: a) the use of a feature prediction\n\nversus pixel prediction objective, b) the construction of\n\nthe pretraining data distribution, c) the feature pooling\n\nstrategy for leveraging the model’s representations in\n\ndownstream tasks, and d) the masking strategy, towards\n\nidentifying: what to predict from what?\n\n### **4.1 Predicting Representations versus Pixels**\n\nWe first ablate the effect of computing the prediction\n\nloss in representation space. We train a pair of ViT-L/16\n\nmodels using either a V-JEPA feature prediction loss,\n\nor a mean-squared error loss with the normalized pixel\n\nvalues, as in masked autoencoders ( He et al. , 2021 ), and\n\nperform a sweep over the learning rate and weight decay\n\nschedules for both approaches. All models are pretrained\n\non VideoMix2M for 90K iterations with a batch size of\n\n3072 using multi-block masking. We examine perfor-\n\nmance on Kinetics-400 (K400), Something-Something-v2\n\n(SSv2), and ImageNet-1K (IN1K), using a frozen back-", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" - }, - { - "text": "**Table 5** *Comparison with Pixel Prediction Methods.* We compare V-JEPA with OmniMAE ( Girdhar et al. , 2023 ), Video-\n\nMAE ( Tong et al. , 2022 ), and Hiera ( Ryali et al. , 2023 ), which leverage a pixel-reconstruction loss. All models are trained using\n\na ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205,\n\niNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning.\n\nAll models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from\n\nseveral spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream\n\ntasks, except ImageNet, where the model achieves 74 *.* 8% compared to 75 *.* 1% of an OmniMAE model trained directly on\n\nImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on\n\nSSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\n\n*Frozen Evaluation w/ Att. Pooling* *Fine-Tuning*\n\n**#Samples K400 SSv2 AVA IN1K Places205 iNat21 K400-ft SSv2-ft Method Arch. Seen Iter.** (16 *×* 8 *×* 3) (16 *×* 2 *×* 3) (16 *×* 5 *×* 3) (16 *×* 2 *×* 3)\n\n*Methods pretrained using pixel prediction*\n\nOmniMAE ViT-L/16 2400M 1170K 65.6 60.6 14.4 **75.1** 59.8 66.1 84.0 74.2 VideoMAE ViT-L/16 410M 400K 77.8 65.5 21.6 71.1 59.3 64.6 85.4 74.3 Hiera Hiera-L 770M 1500K 75.5 64.2 15.8 68.9 58.5 56.9 **87.3 75.1**\n\nV-JEPA ViT-L/16 270M 90K **80.8 69.5 25.6** 74.8 **60.3 67.8** 85.6 **75.1**\n\n**Table 6** *Comparison with State-of-the-Art Models.* We compare V-JEPA with state-of-the-art baselines in frozen evaluation\n\nwith an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models\n\nare evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and\n\n384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views\n\nfrom the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks.\n\nCompared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on\n\ntasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks\n\nrequiring static appearance-based features.\n\n*Video Tasks* *Image Tasks*\n\n**K400 SSv2 AVA IN1K Places205 iNat21 Method Arch. Params. Data** (16 *×* 8 *×* 3) (16 *×* 2 *×* 3)\n\n*Methods pretrained on Images*\n\nI-JEPA ViT-H/16 512 630M IN22K 79.7 50.0 19.8 84.4 66.5 85.7 OpenCLIP ViT-G/14 1800M LAION 81.8 34.8 23.2 85.3 **70.2** 83.6 DINOv2 ViT-g/14 1100M LVD-142M **83.4** 50.6 24.3 **86.2** 68.4 **88.8**\n\n*Methods pretrained on Videos*\n\nMVD ViT-L/16 200M IN1K+K400 79.4 66.5 19.7 73.3 59.4 65.7 OmniMAE ViT-H/16 630M IN1K+SSv2 71.4 65.4 16.0 76.3 60.6 72.4 VideoMAE ViT-H/16 630M K400 79.8 66.2 20.7 72.3 59.1 65.5 VideoMAEv2 ViT-g/14 1100M Un.Hybrid 71.2 61.2 12.9 71.4 60.6 68.3 Hiera Hiera-H 670M K400 77.0 64.7 17.5 71.4 59.5 61.7\n\nV-JEPA ViT-L/16 200M VideoMix2M 80.8 69.5 25.6 74.8 60.3 67.8 ViT-H/16 630M **82.0** 71.4 **25.8** 75.9 61.7 67.9 ViT-H/16 384 630M 81.9 **72.2** 25.0 **77.4 62.8 72.6**\n\n## **5 Comparison with Prior Work**\n\nIn Section 5.1 , we investigate the impact of feature pre-\n\ndiction by comparing V-JEPA with video approaches\n\nthat rely on pixel prediction, while using a similar ar-\n\nchitecture for all baselines. Subsequently, in Section 5.2 ,\n\nwe remove the architectural constraint and report the\n\nbest performance across architectures for self-supervised\n\nvideo and image pretraining approaches. Finally, we ex-\n\nplore the label-efficiency of V-JEPA relative to other self-", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" - }, - { - "text": "**Table 3** *Average Pooling vs. Adaptive Pooling.* We pool the\n\nfeature map output by the frozen V-JEPA encoder using\n\nan attentive probe, which is then fed into a linear classifier\n\nfor downstream supervised tasks (K400 and SSv2). We\n\nevaluate two pooling strategies: 1) average pooling (Avg.),\n\nand attentive pooling (Att.). Results are reported using\n\na single center view. Using adaptive pooling with a cross-\n\nattention layer leads to improvements of +17 *.* 3 points on\n\nK400 and +16 *.* 1 points on SSv2.\n\n*Frozen Evaluation*\n\n**K400 SSv2**\n\n(16 *×* 1 *×* 1) (16 *×* 1 *×* 1) **Method Arch.** Avg. Att. Avg. Att.\n\nV-JEPA ViT-L/16 56.7 **73.7** 50.1 **66.2**\n\nhas been critical for enabling the surge of advancements\n\nin other modalities, such as text and images ( Kaplan\n\net al. , 2020 ; Cherti et al. , 2023 ). We investigate whether\n\na similar trend holds for video data. To control for the\n\npossible confounding variable of compute budget, we\n\npretrain all models in Table 2 for 90K iterations using\n\na batch-size of 3072. We report downstream results on\n\nK400, SSv2, and IN1K using a frozen backbone with an\n\nattentive probe, and report top-1 accuracy using a single\n\ncenter view.\n\nTable 2 shows that average performance across tasks\n\nmonotonically increases as we increase the size of the\n\npretraining dataset, but the best task-specific perfor-\n\nmance is obtained by independently selecting the pre-\n\ntraining data for each specific downstream task. For\n\ninstance, the L/16 obtains its best SSv2 performance\n\nwhen pretrained on K710+SSv2, its best K400 perfor-\n\nmance when pretrained only on K710, and its best IN1K\n\nperformance when pretrained only on K710+HT. The\n\nbest average performance across all tasks is achieved by\n\npretraining VideoMix2M, which combines all the data\n\nsources. Similarly, the H/16 pretrained on K710+SSv2\n\nachieves a greater K400 score than the H/16 pretrained\n\non VideoMix2M, however, the top performing H/16 on\n\naverage is pretrained on VideoMix2M.\n\n### **4.3 Evaluation: Attentive Probing**\n\nNext we explore the feature pooling strategy for apply-\n\ning the model’s representations in downstream tasks.\n\nSince the prediction objective in equation ( 1 ) is unnor-\n\nmalized, there is no a priori reason for the encoder to\n\nyield a linearly separable subspace ( Chen et al. , 2020 ).\n\nThus, rather than using a linear operation (averaging)\n\nto pool the features output of the frozen backbone, we\n\nexplore a learnable non-linear pooling strategy. Specifi-\n\ncally, when evaluating the frozen pretrained backbone\n\non downstream tasks, we learn a cross-attention layer\n\nwith a learnable query token. The output of the cross-\n\nattention layer is then added back to the query token\n\n(residual connection), and then fed into two-layer MLP\n\n**Table 4** *Ablating Prediction Task.* Models are ViT-L/16\n\nnetworks pretrained on K710 and SSv2 and evaluated with\n\nan attentive probe using a single center view. The region *x* is\n\nsampled by masking spatio-temporal regions in the video; *y* is\n\nthe mask complement. **1) random-tube[r]:** *x* is obtained by\n\nmasking a fraction *r* of tubes (spatial patches extended across\n\nthe entire temporal duration) from the video, **2) causal**\n\n**multi-block[p]:** *x* is restricted to the first *p* frames of the\n\n16-frame video, which are then masked with a random set\n\nof spatio-temporal blocks, **3) multi-block** : *x* is obtained\n\nby masking a random set of spatio-temporal blocks from the\n\nentire video. Best performance obtained by using multiblock\n\nmasking.\n\n*Frozen Evaluation*\n\n**K400 SSv2 IN1K Masking** (16 *×* 1 *×* 1) (16 *×* 1 *×* 1)\n\nrandom-tube[0.9] 51.5 46.4 55.6 causal multi-block[6] 61.3 49.8 66.9 causal multi-block[12] 71.9 63.6 72.2 multi-block **72.9 67.4 72.8**\n\nwith a single GeLU activation, followed by a LayerNorm,\n\nand finally a linear classifier.\n\nIn Table 3 we see that using adaptive pooling with", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv3.pdf" - }, - { - "text": "the spatio-temporal positions of the *y* tokens. The out-\n\nput of the predictor is an embedding vector for each\n\nmask token; see Figure 3 and refer to Appendix B for\n\nmore details.\n\n### **3.4 Pretraining Data and Evaluation Setup**\n\n**Pretraining.** We combine several public datasets to\n\nconstruct an unsupervised video pretraining dataset,\n\nwhich we refer to as VideoMix2M. Specifically, we com-\n\nbine the videos from HowTo100M (HT) ( Miech et al. ,\n\n2019 ), Kinetics-400/600/700 (K710) ( Kay et al. , 2017 ),\n\nand Something-Something-v2 (SSv2) ( Goyal et al. , 2017 ),\n\nand remove any overlap with the validation sets of\n\nKinetics-400/600/700 and Something-Something-v2, re-\n\nsulting in approximately 2 million videos. We train a\n\nViT-L/16, a ViT-H/16, and a ViT-H/16 384 transformer model on VideoMix2M. We use a batch size of 3072 for\n\nthe ViT-L/16 and ViT-H/16 models, and a batch size\n\nof 2400 for the ViT-H/16 384 model. Each model takes as input a video clip of 16 frames sampled with a frame-\n\nskip of 4, corresponding to roughly 3 second clips on\n\naverage. The ViT-L/16 and ViT-H/16 process the video\n\nat a spatial resolution of 224, while the ViT-H/16 384\n\nuses an input resolution of 384; cf. Appendix C .\n\n4", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv3.pdf" - }, - { - "text": "prediction, without using pretrained image encoders,\n\ntext, negative examples, human annotations, or pixel-\n\n70 72 74 76 78 80 82 84 86 88 90 92\n\n40\n\n50\n\n60\n\n70\n\n| | ecific n SSv | pecific n SSv | pecific 2 (M | ecific VD) | fic | | V-J ViT | EPA -H/ 16 | | | | |\n|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|\n| | | Omni ViT-H/ | MAE 16 | Hiera Hiera-H | Video ViT-H | V MAE / 16 | iT-L/ 16 | S task on K | -tuned c model 400 (Un | -tuned model ormer) | ed el r) | |\n| Vi | oMAEv ViT-g/ | Ev 2 14 | | I-J | EPA | DINOv ViT-g/ | 2 14 | | | | | |\n| | | | | ViT-H | / 16 | | | | | e Pred. | red. | ed. |\n| | | | | | OpenC ViT-G | LIP / 14 | | | | l Pred. Models | red. dels | ed. ls |\n\n**Kinetics 400**\n\n**Something-Something-v 2**\n\nFrozen Evaluation\n\n**Figure 1** V-JEPA models pretrained on video learn versatile\n\nvisual representations. It performs well on motion-based\n\ntasks (Something-Something-v2) and appearance-based tasks\n\n(Kinetics 400) without adaptation of the model’s parameters,\n\ni.e., using the same frozen backbone for both tasks.\n\nlevel reconstruction.\n\nWe seek to answer the simple question:\n\n*How effective is feature prediction as a stand-*\n\n*alone objective for unsupervised learning from*\n\n*video with modern tools?*\n\narXiv:2404.08471v1 [cs.CV] 15 Feb 2024", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv3.pdf" - }, - { - "text": "**Dataset Syntec HAL SummEvalFr**\n\nSamples 100 queries\n\n90 documents\n\n26233 samples\n\n10 classes\n\n100 texts\n\n1100 human summaries\n\n1600 machine summaries\n\nCreation process Scraping of Syntec col-\n\nlective bargaining agree-\n\nment with articles as doc-\n\numents. Writing queries\n\ncorresponding to articles.\n\nScraping of HAL arti-\n\ncles with *id* , *title* and *do-*\n\n*main* . Further cleaning\n\nwith deduplication, lan-\n\nguage filtering and class\n\nsubsampling.\n\nTranslation from English\n\nto French with Deepl of\n\nthe SummEval dataset.\n\nAnnotation process 4 annotators divided into\n\n2 groups. Each group was\n\ngiven half of the articles\n\nand asked to choose an ar-\n\nticle and ask a question\n\nabout it. Each annotator\n\nwrote 25 questions.\n\nAnnotations provided by\n\nauthors when submitting\n\ntheir paper. They choose\n\nthe *domain* between exist-\n\ning academic fields.\n\nDetailed annotation pro-\n\ncess provided in Fabbri\n\net al. ( 2021 ).\n\nQuality checks Human verification of an-\n\nnotations.\n\nBaseline models for clas-\n\nsification and topic model-\n\ning.\n\nCorrelation between\n\nBLEU and ROUGE\n\nscores of the French\n\nand the original English\n\ndatasets. LLM as-a-judge\n\ntranslation rating and\n\nhuman verification.\n\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the\n\nquality checks. All datasets are test splits.\n\n- Samples belonging to *domain* classes with\n\nless than 500 samples were removed, which\n\nleads us to keep only 10 classes.\n\n- Subsampling was performed on 2 classes con-\n\ntaining more than 10k samples each to lower\n\nthe number of samples and mitigate the unbal-\n\nance of the dataset.\n\nMore details about this process are provided in the\n\nappendix A.2 along with some extracts in Figure\n\n6 . We make the dataset publicly available in both\n\ntheir raw and clean versions. We use this dataset in\n\na clustering setup to cluster publications by their\n\ntitle and use the domain as ground truth. To ensure\n\nthe quality of this dataset, we run 3 baseline mod-\n\nels for classification: *TF-IDF + SVM* , a fine-tuned\n\n*Camembert* ( Martin et al. , 2019 ) and *GPT-4* lever-\n\naging In-Context Learning (ICL). Furthermore, we\n\nrun one baseline model for topic modeling: Latent\n\nDirichlet Allocation (LDA) ( Blei et al. , 2003 ) and\n\nreport scores in the appendix A.2 .\n\n#### **3.1.3 SummEvalFr (Summarization)**\n\nThe original SummEval dataset ( Fabbri et al. , 2021 )\n\nconsists of 100 news articles from the CNN/Dai-\n\nlyMail dataset. Each article has 11 human-written\n\nsummaries and 16 machine-generated summaries\n\nannotated by 8 people with a score for coherence,\n\nconsistency, fluency, and relevance. We trans- lated it from English to French using DeepL API <sup>6</sup> .\n\nSince MTEB evaluation is based on the embedding\n\nsimilarity between machine-generated and human-\n\ngenerated summaries, we propose to compute the\n\nROUGE ( Lin , 2004 ) and BLEU ( Papineni et al. ,\n\n2002 ) metrics between machine and human sum-\n\nmaries for both French and English version. In Ta-\n\nble 2 , we report the average of the scores as well as\n\ntheir correlations between the two languages. The\n\ncorrelation is high (above 0.7), showing that the\n\nword and n-gram overlap between human and ma-\n\nchine summaries is highly preserved in the French\n\nversion. One may argue that computing the met-\n\nric on fully translated texts (human and machine\n\nsummaries are both translated from English) may\n\nintroduce biases and not assess the quality of the\n\ntranslations. For this purpose, we ensure the French\n\nhuman summaries are correctly translated from En-\n\nglish. We use an LLM as-a-judge ( Zheng et al. ,\n\n6 [https://www.deepl.com](https://www.deepl.com)\n\n3", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" - }, - { - "text": "**Table 14 Temporal Coverage on Kinetics-400.** We evaluate the effect of temporal coverage on K400. We train an attentive\n\nprobe on K400 using either 1 clip ( *≈* 2 seconds of a video) or 8 clips ( *≈* 16 seconds of a video). To sample *N* clips, we first divide a video in *N* equal-length temporal segments and sample one clip at random per segment. The video encoder processes\n\neach clip in parallel and all the encoder output tokens are concatenated at the input of the attentive probe. Increasing the\n\ntemporal coverage from 1 clip per video to 8 clips significantly improves the performance for both our VideoMAE baseline\n\nand V-JEPA.\n\n**Method Arch.** 1 Clip 8 Clips\n\nVideoMAE ViT-L/16 69.4 77.8\n\nV-JEPA ViT-L/16 73.7 80.9\n\n**Table 15 Finetuning results.** We evaluate a V-JEPA model with the finetuning protocol on the K400 and SSv2 datasets\n\nusing 16 frames per clip and multi-view fusion (5 *×* 3 or 2 × 3 ) for inference. The **#Samples Seen** entry corresponds to the number of video clips processed during pretraining, which is larger than the size of the pretraining dataset for multi-epoch\n\ntraining. We compare V-JEPA with different video self-supervised learning approaches. We report the VideoMAEv2 results\n\nwithout instruction-turning for consistency with the other approaches. V-JEPA obtains competitive performance using the\n\nfinetuning protocol.\n\n**Method Arch. Pretraining Data #Samples Seen K400 SSv2**\n\n(16 *×* 5 *×* 3) (16 *×* 2 *×* 3)\n\nVideoMAEv1 ViT-L/16 K400 *|* SSv2 380M *|* 410M 85.4 74.3 ViT-H/16 K400 *|* SSv2 380M *|* 410M 86.6 74.8 VideoMAEv2 ViT-H/16 Un.Hybrid 1600M 86.9 76.8\n\nMVD ViT-L/16 K400+IN1K 2400M 86.4 76.7 ViT-H/16 K400+IN1K 2400M **87.2 77.3**\n\nV-JEPA ViT-L/16 VideoMix2M 270M 85.6 75.1 ViT-H/16 VideoMix2M 270M 86.6 77.0\n\nexamine our multi-masking strategy and find that sampling two masks for each clip (long-range and short-range) to\n\nbe more effective than sampling just a single mask for each clip.\n\nIn Figure 8c , we explore different average spatial and temporal masking ratio, i.e. the spatial/temporal ratio of\n\nthe area that is covered by a mask on average for a clip. Recall that each mask is constructed by sampling several\n\n(possibly overlapping) blocks and taking their union. We change the average spatial or temporal masking ratio by\n\nchanging a block spatial or temporal size, as well as the overall number of blocks. We found that low spatial or\n\ntemporal coverage results in a trivial prediction task, which degrades downstream performance. Based on those\n\nresults, we sample masks that remove roughly 90% of the frame and extend along the entire temporal dimension of\n\nthe clip by default.\n\nIn Figure 8b , we explore different block size given an effective spatial masking ratio of 90% and temporal ratio of\n\n100%. We keep the masking ratio approximately constant by changing the block size and the number of block at the\n\nsame time. We find that sampling several blocks to perform better than sampling a single large block. Figure 9\n\nvisually illustrates the effect of sampling several smaller blocks to construct a mask.\n\nIn Figure 8a , we explore the effect of sampling various number of masks per samples. We find that sampling two\n\nmasks for each clip, with different spatial block sizes for each, to be more effective than sampling just a single mask.\n\nWe hypothesize that this masking strategy induces complementary tasks. In our experiment, we use this as our\n\ndefault masks sampling.", - "page_start": 21, - "page_end": 21, - "source_file": "arxiv3.pdf" - }, - { - "text": "3072 using multi-block masking. We examine perfor-\n\nmance on Kinetics-400 (K400), Something-Something-v2\n\n(SSv2), and ImageNet-1K (IN1K), using a frozen back-\n\nbone with an attentive probe, and report top-1 accuracy\n\nusing a single center view. We also examine end-to-end\n\nfine-tuning performance of the models on Kinetics-400.\n\nResults of this comparison are reported in Table 1 and\n\nindicate that predicting in feature space provides a con-\n\nsistent performance improvement over pixel space pre-\n\ndiction in both frozen evaluation of the video backbone,\n\nas well as end-to-end fine-tuning.\n\n### **4.2 Pretraining Data Distribution**\n\nNext we study the impact of the pretraining data dis-\n\ntribution in Table 2 . Leveraging large scale datasets", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" - }, - { - "text": "## **A Supplementary materials for datasets**\n\n### **A.1 All datasets**\n\nTable 3 displays the size of each dataset along with\n\nthe average number of tokens per sample and their\n\nreferences. The dataset’s content was tokenized\n\nusing *cl100k_base* encoding. For Retrieval, the\n\ntwo numbers refer to the queries and the docu-\n\nments. For Reranking, the three numbers refer to\n\nthe queries, the pairs of queries with relevant docu-\n\nments and the pairs of queries with irrelevant ones,\n\nrespectively. The pairs of queries and documents\n\nare obtained from the 90 documents extracted. For\n\n*SummEvalFr* , the three numbers refer to the texts,\n\nhuman and machine summaries, respectively.\n\nFigure 3 represents the semantic similarity be-\n\ntween each dataset. The methodology was as fol-\n\nlows: 90 random samples per dataset are embedded\n\nusing the *multilingual-e5-large* model. The embed-\n\ndings of each dataset’s samples are averaged. The\n\nsimilarity between each dataset is then calculated\n\nusing cosine similarity as in ( Muennighoff et al. ,\n\n2022 ).\n\nWe complement this analysis by observing the\n\ndataset’s clouds of embedding in a 2D plane using\n\nPCA in Figure 4 .\n\n### **A.2 Created datasets**\n\n**Syntec** Figure 5 shows an extract from the Syntec\n\ndataset with a document and a query relative to this\n\ndocument.\n\n**HAL** Figure 6 is an extract from the HAL\n\ndataset. Table 4 lists the distribution of classes\n\n( *domain* field) for the HAL dataset on *raw*\n\nsubset and *mteb_eval* subset, which is used\n\nfor MTEB evaluation. Labels descriptions\n\ncan be found at this URL: [ https://api.archives-](https://api.archives-ouvertes.fr/ref/domain/?q=*:*&rows=393)\n\n[ouvertes.fr/ref/domain/?q=*:*&rows=393](https://api.archives-ouvertes.fr/ref/domain/?q=*:*&rows=393) or in Ta-\n\nble 4 . After pre-processing, *mteb_eval* covers titles\n\nfrom 10 domains as classes with less than 500 sam-\n\nples were removed. In the MTEB evaluation subset\n\nof the dataset, titles composed of 2 words or less\n\nhave been removed (371 samples), resulting in an\n\naverage word count of 13 *.* 4 . Figure 7 shows the\n\nword count distribution per title. Furthermore, the\n\ndataset has been cleaned up by manually remov-\n\ning all non-French titles. Additionally, it can be\n\nobserved in Table 4 that in the original *raw* dataset,\n\nthe *shs* and *sdv* classes represent by far the majority\n\nof the dataset samples with respectively 58706 sam-\n\nples (73%) and 11049 samples (13%). In order to\n\nmitigate the class imbalance while preserving the\n\nmajority of those classes, they have been randomly\n\nsubsampled to 6701 and 4803 samples. Further-\n\nmore, baseline models have been trained and tested\n\nto assess the usability of this dataset in other tasks,\n\nsuch as classification and topic modeling. Table 5\n\nshows the results obtained.\n\n**SummEvalFr** Extracts of humans and machine\n\nsummaries translated in French from SummEvalFr\n\nand the original ones in English from SummEval\n\n( Fabbri et al. , 2021 ) are shown in Figure 9 . As ex-\n\nplained in section 3.1.3 , we use a LLM to evaluate\n\nthe quality of translations for human summaries,\n\nwe provide the prompt used with *GPT-4* for this\n\nevaluation in Figure 8 .\n\nTable 6 shows the distribution of ratings given\n\nby the LLM. With the scale being 10, we man-\n\nually verify random samples rated above 9. We\n\nverify all samples with ratings under 9 and those\n\nwith no provided rating (N/A) due to the triggering\n\nof the OpenAI content management policy. The\n\nLLM suggests that 60 samples are not correctly\n\ntranslated. These were verified manually, and after\n\nchecking, less than 10 samples only needed to be\n\ncorrected.\n\n## **B Supplementary materials for correlation analysis**\n\nThis section presents various correlations computed\n\nbased on the model results on the proposed bench-\n\nmark.\n\nFigure 10 represents cross-correlations between\n\nmodels’ performances and their studied character-\n\nistics as a heatmap.\n\nFigure 11 represents the Spearman correlations", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv4.pdf" - }, - { - "text": "10 <sup>2.4</sup> 10 <sup>2.6</sup> 10 <sup>2.8</sup> 10 <sup>3</sup> 10 <sup>3.2</sup> 10 <sup>3.4</sup> 74\n\n74.5\n\n75\n\n**V-JEPA**\n\n**ViT-L/ 16**\n\n**VideoMAE**\n\n**ViT-L/ 16**\n\n**Hiera**\n\n**Hiera-L**\n\n**OmniMAE**\n\n**ViT-L/ 16**\n\n**Samples Seen (M) Something-Something-v 2** End-to-End Fine-Tuning\n\nVideo Feature Pred.\n\nVideo Pixel Pred.\n\n**Figure 4** *SSv2 fine-tuning performance vs. Samples Seen.* We\n\nreport SSv2 fine-tuning for V-JEPA and pixel-reconstruction\n\nbaselines using a ViT-L/16 or Hiera-L architecture. V-JEPA\n\noutperforms all pixel-reconstruction methods using a ViT-\n\nL/16 and matches the Hiera-L performance while seeing\n\nsignificantly less samples during pretraining.\n\nageNet; hence, V-JEPA achieves comparable ImageNet\n\nperformance despite only pretraining on video.\n\nUnder the fine-tuning protocol, V-JEPA also achieves the\n\nbest performance of any model trained with a ViT-L/16,\n\nand matches the performance of the Hiera-L on SSv2,\n\nwhich benefits from a hierachical prior ( Ryali et al. , 2023 ).\n\nThe V-JEPA models achieve this result while processing\n\nsignificantly fewer samples during pretraining (Figure 4 ),\n\ndemonstrating the efficiency of feature prediction as a\n\nlearning principle.\n\n### **5.2 Comparison with State-of-the-Art**\n\nNext, in Table 6 , we inspect how the V-JEPA models\n\npretrained on video stack up next to the largest state-\n\nof-the-art self-supervised image and video models when\n\nfreezing the backbone encoder and training an attentive\n\nprobe on top. Our image pretrained baselines include\n\nOpenCLIP ( Cherti et al. , 2023 ), DINOv2 ( Oquab et al. ,\n\n2023 ), and I-JEPA ( Assran et al. , 2023 ). The Open-\n\nCLIP model is trained with a contrastive image-text\n\nalignment objective, DINOv2 and I-JEPA are trained\n\nwith self-supervision. These models are known to excel\n\nin their frozen-evaluation performance ( Oquab et al. ,\n\n2023 ); i.e., their ability to produce visual features that\n\ncan be applied to many downstream tasks simultane-\n\nously, without end-to-end fine-tuning, and thus pro-\n\nvide highly competitive baselines. Our video pretrained\n\nbaselines include VideoMAE ( Tong et al. , 2022 ), Omni-\n\nMAE ( Girdhar et al. , 2023 ), Hiera ( Ryali et al. , 2023 ),\n\nVideoMAEv2 ( Wang et al. , 2023a ), and MVD ( Wang\n\net al. , 2023b ). The OpenCLIP, DINOv2 and Video-\n\nMAEv2 models are parameterized as Giant/Gigantic\n\nvision transformer architectures containing over 1B pa-\n\nrameters trained on large-scale image or video datasets.\n\n**Comparison with video models.** Compared to\n\nlarge-scale video baselines, the V-JEPA models outper-\n\nform all previous models on every downstream video\n\n50 100 150 200 250 300 350\n\n60\n\n65\n\n70\n\n75 **V-JEPA**\n\n**ViT-H/ 16** 384\n\n**VideoMAE**\n\n**ViT-H/ 16**\n\n**VideoMAEv 2**\n\n**ViT-g/ 14**\n\n**Pretraining Time (Hrs.) Something-Something-v 2** Frozen Evaluation\n\nVideo Feature Pred.\n\nVideo Pixel Pred.\n\n**Figure 5** *SSv2 frozen-evaluation performance vs. Pretraining*\n\n*Time.* Wallclock times for all methods are measured on a\n\nsingle GPU with a batch size of 10 clips, using the official\n\ncodebases for VideoMAE and VideoMAEv2, and linearly\n\nextrapolated assuming a global batch size of 2400 samples.\n\nHowever, note that the SSv2 accuracies of video pixel pre-\n\ndiction methods are actually obtained with small batch sizes\n\nand significantly longer training schedules. V-JEPA out-\n\nperforms pixel-reconstruction methods while training signifi-\n\ncantly faster.\n\nand image task with notable margin (see Table 6 ). Our\n\nH/16 model outperforms the largest publicly available\n\nVideoMAE, VideoMAEv2, OmniMAE, MVD, and Hiera\n\nmodels by at least +5 points in motion understanding\n\n(Something-Something-v2), +2 points in action recogni-\n\ntion (Kinetics-400), +5 points on action detection (AVA),\n\n+1 point on object recognition (ImageNet-1K), +2 points\n\nin scene recognition (Places205), and +0 *.* 2 points on fine-\n\ngrained recognition (iNaturalist). Moreover, when com-", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "PLAW-116publ30.pdf", - "query": "What is appropriate authority ?", - "target_page": 1, - "target_passage": "APPROPRIATE AUTHORITY.—The term ‘appropriate authority’ means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**66** IBM Content Manager OnDemand Guide\n\n*Figure 3-22 Completion window*\n\n### **3.2 User and group administration**\n\nWhen you design a Content Manager OnDemand system, you must determine the best way\n\nto implement the many authority structures that are available for users and administrators of\n\nyour system. The span of control for the administration of the system must be considered with\n\nthe level of user access to the data that is stored in the system. How many different\n\nadministrators are required? Will all administrators have system administrator authority or will\n\ndifferent administrators have different levels of authority? What is the most effective way to\n\nrestrict a user’s access to only the data that is necessary to do that user’s job?\n\nThe answers to these questions depend on the size of the system, the degree of\n\ncentralization to be exercised over system administration, and the nature of the data and the\n\nbusiness needs of the users.\n\n**Centralized or decentralized**\n\nIn a system design that exercises centralized control, one or a few administrators are granted\n\nsystem administrator authority. A centralized system typically is used when the number of\n\nreports and users to be added to the system is small. Centralized administration is also\n\nappropriate where resources are limited and only one person might have the skills and\n\nknowledge to perform the system administration tasks, or where one user group performs all\n\nof the administration tasks.\n\nIn a system design with decentralized control, different users are granted different levels of\n\nadministrative authority. For example, you might have users that have the authority to create\n\nusers and groups. Other users might have the authority to create application groups and\n\nfolders, and others might be given full system administration authority.", - "page_start": 89, - "page_end": 89, - "source_file": "sg246915.pdf" - }, - { - "text": "(2) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) that is reasonably required in the interests of defence, public safety, public order, public morality, public health, town and country planning, the development and utilization of mineral resources, for the purpose of any census or in order to secure the development or utilization of any property for a purpose beneficial to the community; ( *b* ) that is reasonably required for the purpose of protecting the rights or freedoms of other persons; ( *c* ) that authorizes an officer or agent of the Government of Botswana, a local government authority or a body corporate established by law for a public purpose to enter on the premises of any person in order to inspect those premises or anything thereon for the purpose of any tax, rate or duty or in order to carry out work connected with any property that is lawfully on those premises and that belongs to that Government, authority or body corporate, as the case may be; or ( *d* ) that authorizes, for the purpose of enforcing the judgment or order of a court in any civil proceedings, the search of any person or property by order of a court or entry upon any premises by such order, and except so far as that provision or, as the case may be, anything done under the authority thereof is shown not to be reasonably justifiable in a democratic society. **10. Provisions to secure protection of law** (1) If any person is charged with a criminal offence, then, unless the charge is withdrawn, the case shall be afforded a fair hearing within a reasonable time by an independent and impartial court established or recognized by law. (2) Every person who is charged with a criminal offence- ( *a* ) shall be presumed to be innocent until he or she is proved or has pleaded guilty; ( *b* ) shall be informed as soon as reasonably practicable, in a language that he or she understands and in detail, of the nature of the offence charged; ( *c* ) shall be given adequate time and facilities for the preparation of his or her defence; ( *d* ) shall be permitted to defend himself or herself before the court in person or, at his or her own expense, by a legal representative of his or her own choice; ( *e* ) shall be afforded facilities to examine in person or by his or her legal representative the witnesses called by the prosecution before the court, and to obtain the attendance and carry out the examination of witnesses to testify on his or her behalf before the court on the same conditions as those applying to witnesses called by the prosecution; and ( *f* ) shall be permitted to have without payment the assistance of an interpreter if he or she cannot understand the language used at the trial of the charge, and except with his or her own consent the trial shall not take place in his or her absence unless he or she so conducts himself or herself as to render the continuance of the proceedings in his or her presence impracticable and the court has ordered him or her to be removed and the trial to proceed in his or her absence. (3) When a person is tried for any criminal offence, the accused person or any person authorized by him or her in that behalf shall, if he or she so requires and subject to payment of such reasonable fee as may be prescribed by law, be given within a reasonable time after judgment a copy for the use of the accused person of any record of the proceedings made by or on behalf of the court.", - "page_start": 8, - "page_end": 8, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "communication be to the public generally or to any person or class of persons) and freedom from interference with his or her correspondence. (2) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) that is reasonably required in the interests of defence, public safety, public order, public morality or public health; or ( *b* ) that is reasonably required for the purpose of protecting the reputations, rights and freedoms of other persons or the private lives of persons concerned in legal proceedings, preventing the disclosure of information received in confidence, maintaining the authority and independence of the courts, regulating educational institutions in the interests of persons receiving instruction therein, or regulating the technical administration or the technical operation of telephony, telegraphy, posts, wireless, broadcasting or television; or ( *c* ) that imposes restrictions upon public officers, employees of local government bodies, or teachers, and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be reasonably justifiable in a democratic society. **13. Protection of freedom of assembly and association** (1) Except with his or her own consent, no person shall be hindered in the enjoyment of his or her freedom of assembly and association, that is to say, his or her right to assemble freely and associate with other persons and in particular to form or belong to trade unions or other associations for the protection of his or her interests. (2) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision- ( *a* ) that is reasonably required in the interests of defence, public safety, public order, public morality or public health; ( *b* ) that is reasonably required for the purpose of protecting the rights or freedoms of other persons; ( *c* ) that imposes restrictions upon public officers, employees of local government bodies, or teachers; or ( *d* ) for the registration of trade unions and associations of trade unions in a register established by or under any law, and for imposing reasonable conditions relating to the requirements for entry on such a register (including conditions as to the minimum number of persons necessary to constitute a trade union qualified for registration, or of members necessary to constitute an association of trade unions qualified for registration) and conditions whereby registration may be refused on the grounds that any other trade union already registered, or association of trade unions already registered, as the case may be, is sufficiently representative of the whole or of a substantial proportion of the interests in respect of which registration of a trade union or association of trade unions is sought, and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be reasonably justifiable in a democratic society. **14. Protection of freedom of movement** (1) No person shall be deprived of his or her freedom of movement, and for the purposes of this section the said freedom means the right to move freely throughout Botswana, the right to reside in any part of Botswana, the right to enter Botswana and immunity from expulsion from Botswana. (2) Any restriction on a person's freedom of movement that is involved in his or", - "page_start": 11, - "page_end": 11, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "entities working for it or cooperating with it, including contractors and subcontractors,\n\nwhether legal or natural persons, but only for the purpose of their mission for the\n\ncontracting authority;\n\n(b) if the *result* is a \"document\" such as a report or a study, and it is meant to be published,\n\nthe existence of *pre-existing materials* in the *result* may not prevent the publication of the\n\ndocument, its translation or its \"reuse\", it being understood however that the \"reuse\" may\n\nonly be made of the *result* as a whole and not of the *pre-existing materials* taken separately\n\nfrom the *result* ; for the sake of this provision, \"reuse\" and \"document\" have the meaning\n\ngiven by the Commission Decision of 12 December 2011 on the reuse of Commission\n\ndocuments (2011/833/EU).\n\nAll *pre-existing rights* are licensed to the contracting authority from the moment the *results*\n\nare delivered and approved by the contracting authority.\n\nThe licensing of *pre-existing rights* to the contracting authority under this FWC covers all\n\nterritories worldwide and is valid for the duration of intellectual property rights protection.\n\nThe payment of the price as set out in the specific contracts is deemed to also include any\n\nfees payable to the contractor in relation to the licensing of *pre-existing rights* to the\n\ncontracting authority, including for all forms of exploitation and of use of the *results* .\n\nWhere *implementation of the FWC* requires that the contractor uses *pre-existing materials*\n\nbelonging to the contracting authority, the contracting authority may request that the\n\ncontractor signs an adequate licence agreement. Such use by the contractor will not entail\n\nany transfer of rights to the contractor and is limited to the needs of this FWC.\n\n**II.13.3. Exclusive rights**\n\nThe Contracting Authority acquires the following exclusive rights:\n\n(a) reproduction: the right to authorise or prohibit direct or indirect, temporary or permanent reproduction of the *results* by any means (mechanical, digital or other) and\n\nin any form, in whole or in part;\n\n(b) communication to the public: the exclusive right to authorise or prohibit any display,\n\nperformance or communication to the public, by wire or wireless means, including the\n\nmaking available to the public of the *results* in such a way that members of the public\n\nmay access them from a place and at a time individually chosen by them; this also\n\nincludes the communication on Internet and broadcasting by cable or by satellite;\n\n(c) distribution: the exclusive right to authorise or prohibit any form of distribution of *results* or copies of the *results* to the public, by sale or otherwise;\n\n(d) rental: the exclusive right to authorise or prohibit rental or lending of the *results* or of\n\ncopies of the *results* ;\n\n(e) adaptation: the exclusive right to authorise or prohibit any modification of the *results* ; (f) translation: the exclusive right to authorise or prohibit any translation, adaptation, arrangement, creation of derivative works based on the *results* , and any other\n\nalteration of the *results* , subject to the respect of moral rights of authors, where\n\napplicable;\n\n(g) where the *results* are or include a database: the exclusive right to authorise or prohibit\n\nthe extraction of all or a substantial part of the contents of the database to another\n\nmedium by any means or in any form; and the exclusive right to authorise or prohibit\n\nthe re-utilization of all or a substantial part of the contents of the database by the\n\ndistribution of copies, by renting, by on-line or other forms of transmission;\n\n(h) where the *results* are or include a patentable subject-matter: the right to register them as a patent and to further exploit such patent to the fullest extent;", - "page_start": 23, - "page_end": 23, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "Responsibilities of management include -\n\n- Implement the corporate strategy set by the Board;\n\n- Achieve the performance targets set by the Board;\n\n- Develop, implement and manage risk management and internal control frameworks;\n\n- Develop, implement and update policies and procedures;\n\n- Provide sufficient, relevant and timely information to the Board to enable the Board to effectively discharge its\n\nresponsibilities; and\n\n- Manage human, physical and financial resources to achieve the Company’s objectives - in other words to run the day\n\nto day business in an effective way.\n\n**1.2 Management Performance**\n\nSundance’s Chairman, with Non-Executive Director input, is responsible for providing feedback to the MD on his performance\n\nassessed against the responsibilities mentioned above. The MD, with Chairman and Non-Executive Directors input, is responsible\n\nfor providing feedback to senior executives and assessing their performance against the responsibilities mentioned above.\n\nDuring fiscal year 2014, an annual performance evaluation of senior executives was completed in line with the Company’s\n\nincentive compensation policy as well as periodic one on one discussions carried out by the MD. Appropriate induction\n\nprocedures are in place to allow new senior executives to participate fully and actively in management decision making at the\n\nearliest opportunity.\n\n### **Principle 2: Structure the Board to Add Value**\n\n**2.1 Board Composition and Independence**\n\n### The composition and operation of the Board is determined in accordance with the following requirements:\n\n### - The constitution of Sundance specifies that there must be a minimum of three directors and a maximum of ten. The\n\nBoard may determine the size of the Board within those limits;\n\n- It is the intention of the Board that its membership consists of a majority of independent directors who satisfy the\n\ncriteria recommended by the ASX best practice corporate governance requirements, though it is recognized that this\n\nintention may be impractical to implement given the size and scope of the Company’s business;\n\n- The Chairman of the Board should be an independent director who satisfies the criteria for independence\n\nrecommended by the ASX best practice corporate governance requirements; and\n\n- The Board should, collectively, have the appropriate level of personal qualities, skills, experience, and time\n\ncommitment to properly fulfil its responsibilities or have ready access to such skills where they are not available.\n\nSundance’s Board of Directors currently consists of one Managing Director based in the US, three Non-Executive Directors based\n\nin Australia, and one Non-Executive Director based in the US. All of the Directors are shareholders of the Company. At all times\n\nduring the fiscal year 2014, all four of the Non-Executive Directors were independent. Sundance considers an independent\n\ndirector to be a non-executive director who is not a member of management and who is free of any business or other relationship\n\nthat could materially interfere with, or could reasonably be perceived to materially interfere with, the independent exercise of\n\ntheir judgement. Sundance believes that its current Board composition is appropriate at this time in the Company’s evolution.\n\nSundance will continue to address the appropriate structure and composition of the Board over time.\n\nThe composition of the Board at the date of this report is:\n\nM D Hannell Chairman, Independent Non-Executive Director\n\nE McCrady Managing Director and Chief Executive Officer\n\nN Martin Independent Non-Executive Director\n\nD Hannes Independent Non-Executive Director\n\nW Holcombe Independent Non-Executive Director\n\nDirectors can have access, in appropriate circumstances, to independent professional advice at the Company’s expense. It is the\n\ncontinuing practice for the four Non-Executive Directors to confer from time to time without the Executive Director being\n\npresent.", - "page_start": 49, - "page_end": 49, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**II.13.7. Moral rights of creators**\n\nBy delivering the *results* , the contractor warrants that the *creators* will not object to the\n\nfollowing on the basis of their moral rights under copyright:\n\n(a) that their names be mentioned or not mentioned when the *results* are presented to the public;\n\n(b) that the *results* be divulged or not after they have been delivered in their final version to the contracting authority;\n\n(c) that the *results* be adapted, provided that this is done in a manner which is not prejudicial to the *creator* ’s honour or reputation.\n\nIf moral rights on parts of the *results* protected by copyright may exist, the contractor\n\nmust obtain the consent of *creators* regarding the granting or waiver of the relevant moral\n\nrights in accordance with the applicable legal provisions and be ready to provide\n\ndocumentary evidence upon request.\n\n**II.13.8. Image rights and sound recordings**\n\nIf natural persons appear in a *result* or their voice or any other private element is recorded\n\nin a recognisable manner, the contractor must obtain a statement by these persons (or, in\n\nthe case of minors, by the persons exercising parental authority) giving their permission\n\nfor the described use of their image, voice or private element and, on request, submit a\n\ncopy of the permission to the contracting authority. The contractor must take the necessary\n\nmeasures to obtain such consent in accordance with the applicable legal provisions.\n\n**II.13.9. Copyright notice for pre-existing rights**\n\nWhen the contractor retains *pre-existing rights* on parts of the *results* , reference must be\n\ninserted to that effect when the *result* is used as set out in Article I.10.1, with the following\n\ndisclaimer: ‘© — year — European Union. All rights reserved. Certain parts are licensed\n\nunder conditions to the EU’, or with any other equivalent disclaimer as the contracting\n\nauthority may consider best appropriate, or as the parties may agree on a case-by-case\n\nbasis. This does not apply where inserting such reference would be impossible, notably for\n\npractical reasons.\n\n**II.13.10. Visibility of ECHA funding and disclaimer**\n\nWhen making use of the *results* , the contractor must declare that they have been produced\n\nunder a contract with the contracting authority and that the opinions expressed are those\n\nof the contractor only and do not represent the contracting authority’s official position. The\n\ncontracting authority may waive this obligation in writing or provide the text of the\n\ndisclaimer.\n\n## **II.14. Force majeure**\n\n**II.14.1** If a party is affected by *force majeure* , it must immediately *notify* the other party,\n\nstating the nature of the circumstances, their likely duration and foreseeable\n\neffects.\n\n**II.14.2** A party is not liable for any delay or failure to perform its obligations under the\n\nFWC if that delay or failure is a *result* of *force majeure* . If the contractor is unable\n\nto fulfil its contractual obligations owing to *force majeure* , it has the right to\n\nremuneration only for the services actually provided.", - "page_start": 26, - "page_end": 26, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "( *d* ) any labour required during any period of public emergency or in the event of any other emergency or calamity that threatens the life and well-being of the community, to the extent that the requiring of such labour is reasonably justifiable in the circumstances of any situation arising or existing during that period or as a result of that other emergency or calamity, for the purpose of dealing with that situation; or ( *e* ) any labour reasonably required as part of reasonable and normal communal or other civic obligations. **7. Protection from inhuman treatment** (1) No person shall be subjected to torture or to inhuman or degrading punishment or other treatment. (2) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question authorizes the infliction of any description of punishment that was lawful in the country immediately before the coming into operation of this Constitution. **8. Protection from deprivation of property** (1) No property of any description shall be compulsorily taken possession of, and no interest in or right over property of any description shall be compulsorily acquired, except where the following conditions are satisfied, that is to say- ( *a* ) the taking of possession or acquisition is necessary or expedient- (i) in the interests of defence, public safety, public order, public morality, public health, town and country planning or land settlement; (ii) in order to secure the development or utilization of that, or other, property for a purpose beneficial to the community; or (iii) in order to secure the development or utilization of the mineral resources of Botswana; and ( *b* ) provision is made by a law applicable to that taking of possession or acquisition- (i) for the prompt payment of adequate compensation; and (ii) securing to any person having an interest in or right over the property a right of access to the High Court, either direct or on appeal from any other authority, for the determination of his or her interest or right, the legality of the taking of possession or acquisition of the property, interest or right, and the amount of any compensation to which he or she is entitled, and for the purpose of obtaining prompt payment of that compensation. (2) No person who is entitled to compensation under this section shall be prevented from remitting, within a reasonable time after he or she has received any amount of that compensation, the whole of that amount (free from any deduction, charge or tax made or levied in respect of its remission) to any country of his or her choice outside Botswana. (3) Subsection (1)( *b* )(i) of this section shall be deemed to be satisfied in relation to any Law applicable to the taking of possession of minerals or the acquisition of rights to minerals if that law makes provision for the payment at reasonable intervals of adequate royalties. (4) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of subsection (2) of this section to the extent that the law in question authorizes- ( *a* ) the attachment, by order of a court, of any amount of compensation to which a person is entitled in satisfaction of the judgment of a court or pending the determination of civil proceedings to which he or she is a party; or ( *b* ) the imposition of reasonable restrictions on the manner in which any amount of", - "page_start": 6, - "page_end": 6, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "Chapter 3. Administration **67**\n\nThe skill level of the users might be a determining factor in the degree of authority that is\n\ngranted. It takes a more skilled user to define indexes and report parameters than to set up\n\nusers and groups. A decentralized system is typically used when data from different sources\n\nis stored on the same Content Manager OnDemand system but must be maintained\n\nindependently of other data. Decentralization also makes sense when report loading and\n\nprocessing needs are limited to a specific group of users for security purposes or when\n\nadministrators that add users and groups must be prevented from accessing report data.\n\nThe decision about whether to use a centralized or a decentralized administration model is\n\nbest made *before* any data is set up in the system. Even though the type of administration that\n\nis chosen can be changed later, the amount of work that is involved in that change is greater\n\nthan the amount of work that is necessary to study the requirements of the system and\n\nimplement the appropriate administration policies from the beginning.\n\nIn this section, we describe different types of users, followed by a description of a\n\ndecentralized administrative plan. We also introduce a new administrative tool, Content\n\nManager OnDemand XML Batch Administration, which is a command-line program that is run\n\non the Content Manager OnDemand server.\n\n#### **3.2.1 User types, authorities, and functions**\n\nFour types of users are available in a Content Manager OnDemand system. Each type has a\n\ndifferent level of access, authority, and responsibility in the system:\n\n� User: Logs in and queries the system to retrieve documents and reports for viewing.\n\n� User administrator: Adds users or other user administrators to the system.\n\n� Report administrator: Defines the application groups, applications, folders, and cabinets to\n\nbe part of the system. The report administrator is responsible for understanding the report\n\nand document data and for defining the indexes to be extracted from the data and stored.\n\nA report administrator is also responsible for designing the user interface to the reports\n\nthrough the folder definition process and for controlling access authority to the reports that\n\nthe report administrator designs, indexes, and loads.\n\n� System administrator: Has the highest level of authority in a Content Manager OnDemand\n\nsystem. The system administrator has authority for all system functions and can grant\n\nother users the authority to perform various tasks. The system administrator is the only\n\nlevel of authority that can create storage sets and define system printers.\n\nWhen the administrative tasks and levels of authorities are understood, you must decide the\n\nspan of control in the system. Is it better to have one user control all access and functions in\n\nthe Content Manager OnDemand system, or is it better to spread the administrative tasks\n\namong several users to smooth the workload based on system requirements? The answer to\n\nthis question depends on whether your environment uses centralized or decentralized\n\nadministrative control.\n\nA centralized administrative plan is best suited for a Content Manager OnDemand system\n\nwith a few users and relatively few reports to define. In the next section, we focus on the\n\ndecentralized system and describe the different aspects of a decentralized administrative\n\nplan.", - "page_start": 90, - "page_end": 90, - "source_file": "sg246915.pdf" - }, - { - "text": "(i) where the *results* are or include logos or subject-matter which could be registered as a trademark: the right to register such logo or subject-matter as a trademark and to\n\nfurther exploit and use it;\n\n(j) where the *results* are or include know-how: the right to use such know-how as is necessary to make use of the *results* to the full extent provided for by this FWC, and\n\nthe right to make it available to contractors or subcontractors acting on behalf of the\n\ncontracting authority, subject to their signing of adequate confidentiality undertakings\n\nwhere necessary;\n\n(k) where the *results* are documents:\n\n(i) the right to authorise the reuse of the documents in conformity with the Commission Decision of 12 December 2011 on the reuse of Commission\n\ndocuments (2011/833/EU), to the extent it is applicable and the documents fall\n\nwithin its scope and are not excluded by any of its provisions; for the sake of this\n\nprovision, \"reuse\" and \"document\" have the meaning given to them by this\n\nDecision;\n\n(ii) the right to store and archive the *results* in line with the document management rules applicable to the contracting authority, including digitisation or converting\n\nthe format for preservation or new use purposes;\n\n(l) where the *results* are or incorporate software, including source code, object code and, where relevant, documentation, preparatory materials and manuals, in addition to the\n\nother rights mentioned in this Article:\n\n(i) end-user rights, for all uses by the contracting authority or by subcontractors which result from this FWC and from the intention of the parties;\n\n(ii) the rights to receive both the source code and the object code;\n\n(m) the right to license to third parties any of the exclusive rights or of the modes of exploitation set out in this FWC; however, for *pre-existing materials* which are only\n\nlicensed to the contracting authority, the right to sub-license does not apply, except\n\nin the two cases foreseen by Article II.13.2.;\n\n(n) to the extent that the contractor may invoke moral rights, the right for the contracting\n\nauthority, except where otherwise provided in this FWC, to publish the *results* with or\n\nwithout mentioning the *creator* (s)’ name(s), and the right to decide when and whether\n\nthe *results* may be disclosed and published.\n\nThe contractor warrants that the exclusive rights and the modes of exploitation may be\n\nexercised by the contracting authority on all parts of the *results* , be it via a transfer of\n\nownership of the rights, on those parts which were specifically created by the contractor,\n\nor via a licence of the pre-existing rights, on those parts consisting of *pre-existing*\n\n*materials* .\n\nWhere *pre-existing materials* are inserted in the *results* , the contracting authority may\n\naccept reasonable restrictions impacting on the above list, provided that the said materials\n\nare easily identifiable and separable from the rest, that they do not correspond to\n\nsubstantial elements of the *results* , and that, should the need arise, satisfactory\n\nreplacement solutions exist, at no additional costs to the contracting authority. In such\n\ncase, the contractor will have to clearly inform the contracting authority before making\n\nsuch choice and the contracting authority has the right to refuse it.\n\n**II.13.4. Identification of pre-existing rights**\n\nWhen delivering the *results* , the contractor must warrant that, for any use that the\n\ncontracting authority may envisage within the limits set in this FWC, the newly created\n\nparts and the *pre-existing material* incorporated in the *results* are free of claims from", - "page_start": 24, - "page_end": 24, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "General unless he or she is qualified to be appointed to the Office of a Judge of the High Court. (3) The Attorney-General shall be the principal legal adviser to the Government. (4) A person holding the Office of Attorney-General shall vacate his or her office when he or she attains the age of 60 years or such other age as may be prescribed by Parliament. **51A. Director of Public Prosecutions** (1) There shall be a Director of Public Prosecutions appointed by the President whose office shall be a public office and who shall be subject to the administrative supervision of the Attorney-General. (2) A person shall not be qualified to be appointed to the Office of Director of Public Prosecutions unless he or she is qualified to be appointed to the Office of a Judge of the High Court. (3) The Director of Public Prosecutions shall have power in any case in which he or she considers it desirable to do so- ( *a* ) to institute and undertake criminal proceedings against any person before any court (other than a court martial) in respect of any offence alleged to have been committed by that person; ( *b* ) to take over and continue any such criminal proceedings that have been instituted or undertaken by any other person or authority; and ( *c* ) to discontinue, at any stage before judgment is delivered, any such criminal proceedings instituted or undertaken by himself or herself or any other person or authority. (4) The powers of the Director of Public Prosecutions under subsection (3) may be exercised by him or her in person or by officers subordinate to him or her acting in accordance with his or her general or special authority. (5) For the purposes of this section any appeal from any judgment in any criminal proceedings before any court, or any case stated or question of law reserved for the purpose of any such proceedings, to any other court shall be deemed to be part of those proceedings: Provided that the power conferred on the Director of Public Prosecutions by subsection (3)( *c* ) of this section shall not be exercised in relation to any appeal by a person convicted in any criminal proceedings or to any case stated or question of law reserved at the instance of such person. (6) In the exercise of the functions vested in him or her by subsection (3) of this section the Director of Public Prosecutions shall not be subject to the direction or control of any other person or authority: Provided that- ( *a* ) where any other person or authority has instituted criminal proceedings, nothing in this subsection shall prevent the withdrawal of those proceedings by or at the instance of that person or authority, and with the leave of the court; and ( *b* ) before exercising his or her powers in relation to cases considered by the Attorney-General to be of national importance, the Director of Public Prosecutions shall consult the Attorney-General. **52. Permanent Secretaries** Where any Minister has been charged with responsibility for any department of Government, he or she shall exercise general direction and control over that department and, subject to such direction and control, the department shall be under the supervision of a Permanent Secretary whose office shall be a public office. **53. Prerogative of Mercy** The President may-", - "page_start": 24, - "page_end": 24, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "PLAW-116publ30.pdf", - "query": "What criteria must a lactation room meet?", - "target_page": 1, - "target_passage": "LACTATION ROOM.—The term ‘lactation room’ means a hygienic place, other than a bathroom, that— ‘‘(A) is shielded from view; ‘‘(B) is free from intrusion; and ‘‘(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## 133 STAT. 1032 PUBLIC LAW 116- 30—JULY 25, 2019\n\n### Public Law 116- 30 116th Congress\n\n### An Act\n\nTo provide a lactation room in public buildings.\n\n*Be it enacted by the Senate and House of Representatives of* *the United States of America in Congress assembled,*\n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding Mothers Act of 2019’’.\n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) L ACTATION R OOM IN P UBLIC B UILDINGS .—Chapter 33 of title 40, United States Code, is amended by adding at the end the following new section:\n\n##### **‘‘§ 3318. Lactation room in public buildings**\n\n‘‘(a) D EFINITIONS .—In this section: ‘‘(1) A PPROPRIATE AUTHORITY .—The term ‘appropriate authority’ means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building. ‘‘(2) C OVERED PUBLIC BUILDING .—The term ‘covered public building’ means a public building (as defined in section 3301) that is open to the public and contains a public restroom, and includes a building listed in section 6301 or 5101. ‘‘(3) L ACTATION ROOM .—The term ‘lactation room’ means a hygienic place, other than a bathroom, that— ‘‘(A) is shielded from view; ‘‘(B) is free from intrusion; and ‘‘(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet. ‘‘(b) L ACTATION R OOM R EQUIRED .—Except as provided in sub- section (c), the appropriate authority of a covered public building shall ensure that the building contains a lactation room that is made available for use by members of the public to express breast milk. ‘‘(c) E XCEPTIONS .—A covered public building may be excluded from the requirement in subsection (b) at the discretion of the appropriate authority if— ‘‘(1) the public building— ‘‘(A) does not contain a lactation room for employees who work in the building; and ‘‘(B) does not have a room that could be repurposed as a lactation room or a space that could be made private using portable materials, at a reasonable cost; or\n\n40 USC 3318.\n\nFairness For Breastfeeding Mothers Act of 2019. 40 USC 101 note.\n\nJuly 25, 2019\n\n[H.R. 866]\n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00001 Fmt 6580 Sfmt 6581 E:\\PUBLAW\\PUBL030.116 PUBL030 dkrause on DSKBC28HB2PROD with PUBLAWS", - "page_start": 0, - "page_end": 0, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**10.** In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”.\n\n**11.** After regulation 18 (circumstances in which a local authority must review an EHC plan)\n\ninsert—\n\n“ **Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.** —(1) It is not necessary for a local authority to review an EHC plan in accordance\n\nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the\n\nincidence or transmission of coronavirus.\n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as\n\nsoon as reasonably practicable.”.\n\n**12.** In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert—\n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3)\n\nand (4) if it is impractical to do so because of a reason relating to the incidence or\n\ntransmission of coronavirus.”.\n\n**13.** In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)—\n\n(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**14.** In regulation 45 (unopposed appeals), after paragraph (7) insert—\n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e)\n\napply.”.\n\n### **Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.** The Special Educational Needs (Personal Budgets) Regulations 2014( **a** ) are amended as\n\nfollows.\n\n**16.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**17.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time period due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, the requirement for the local authority\n\nto review the making and use of direct payments within the first three months of them being\n\nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read\n\ninstead as a requirement for such action to be taken as soon as reasonably practicable.\n\n) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(d) to visit a person (“D”) whom P reasonably believes is dying, and where P is a member of\n\nD’s household or a close family member or friend of D;\n\n(e) to attend the funeral of a member of P’s household or a close family member;\n\n(f) in other exceptional circumstances such as—\n\n(i) to seek medical assistance where this is required urgently or on the advice of a\n\nregistered medical practitioner including to access services from dentists, opticians,\n\naudiologists, chiropodists, chiropractors, osteopaths and other medical and health\n\npractitioners, including services relating to mental health,\n\n(ii) to access critical public services including social services or services provided to\n\nvictims (such as victims of crime),\n\n(iii) to avoid injury or illness or to escape risk of harm,\n\n(iv) to access veterinary services where this is required urgently or on the advice of a\n\nveterinary surgeon.\n\n(2) P may only leave or be outside of the place where P is self-isolating in reliance on the\n\ngrounds mentioned in sub-paragraph (1)(c), (d) or (e)—\n\n(a) if P has been given prior permission by a person authorised by the Secretary of State for\n\nthis purpose;\n\n(b) if P complies with any reasonable requirements imposed by the person so authorised in\n\nrelation to the exercise, the visit to the person or attendance at the funeral.\n\n###### **Meaning of “place”**\n\n**14.** For the purposes of this Schedule the place referred to in paragraphs 8 to 13 means the room\n\nin the designated accommodation where P is staying and, if connected to the room where P is\n\nstaying, the room of any person referred to in paragraph 11(a) (travelling companion), including\n\nany balcony, and does not include the communal areas or any garden, yard, passage, stair, garage,\n\nouthouse or appurtenance of the accommodation in which the place is situated.\n\n###### **Designations**\n\n**15.** The Secretary of State must designate for the purposes of this Schedule—\n\n(a) accommodation;\n\n(b) transportation to the designated accommodation,\n\nand must publish details of the designations in such manner as appears to the Secretary of State to\n\nbe appropriate.\n\n###### **Duties where P is a child**\n\n**16.** If P is a child—\n\n(a) any person who has custody or charge of P when P is travelling to England must ensure,\n\nso far as is reasonably practicable, that P complies with the obligations in paragraphs 5\n\nand 6;\n\n(b) any person who has custody or charge of P during P’s period of self-isolation must\n\nensure, so far as is reasonably practicable, that P self-isolates in accordance with this\n\nSchedule.\n\n###### **Person caring for P**\n\n**17.** A person may reside in the place where P is residing pursuant to this Schedule to provide\n\nassistance P reasonably requires by reason of—\n\n(a) P being a child; or\n\n(b) any disability of P’s,", - "page_start": 77, - "page_end": 77, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15\n\nworking days), (4), (5), (7) (in relation to the second reference to 15 working days)\n\nand (8);\n\n(b) regulation 16(2) and (3) (change of responsible commissioning body);\n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school\n\nor other institution);\n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person\n\ndoes not attend a school or other institution);\n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess\n\neducational, health care and social care provision);\n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment);\n\n(g) regulation 33 (requirement to consider mediation);\n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails\n\nto pursue mediation);\n\n(i) regulation 35(2), (3) and (4) (mediation - health care issues);\n\n(j) regulation 36(2) (mediation - no health care issues);\n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5));\n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority);\n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier\n\nTribunal);\n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals);\n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and\n\n(p) regulation 56(3) (publication of comments on the local offer).”.\n\n**6.** In regulation 4 (determination whether or not special educational provision may be\n\nnecessary), after paragraph (2) insert—\n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if\n\nit is impractical to do so because of a reason relating to the incidence or transmission of\n\ncoronavirus.”.\n\n**7.** In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)—\n\n(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**8.** In regulation 8(2) (duty to co-operate in EHC needs assessments)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“; or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n**9.** In regulation 10(4) (decision not to secure an EHC plan)—", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(iv) in the goods vehicle or a hotel, hostel or bed and breakfast accommodation while not\n\nundertaking the work described in that paragraph if P is travelling with another\n\nperson in a goods vehicle with a sleeper cab.\n\n(4) The address specified by P in the Passenger Locator Form pursuant to paragraph 2(a) of\n\nSchedule 6 must be—\n\n(a) their home;\n\n(b) the home of a friend or family member;\n\n(c) a hotel, hostel, bed and breakfast accommodation, holiday apartment or home, campsite,\n\ncaravan park or boarding house, canal boat or any other vessel;\n\n(d) a military site or establishment;\n\n(e) accommodation facilitated by the Secretary of State for the purposes of P’s self-isolation;\n\n(f) where P is an asylum seeker, accommodation provided or arranged under section 4, 95 or\n\n98 of the Immigration and Asylum Act 1999; or\n\n(g) where P is a person described in paragraph 9(1) of Schedule 10 to the Immigration Act\n\n2016 (powers of Secretary of State to enable person to meet bail conditions),\n\naccommodation provided or arranged under that paragraph.\n\n(5) More than one address may be specified as the place at which P intends to self-isolate in the\n\nPassenger Locator Form where—\n\n(a) a legal obligation requires P to change addresses; or\n\n(b) it is necessary for P to stay overnight at an address on their arrival in England before\n\ntravelling directly to another address at which they will be self-isolating.\n\n(6) In paragraph (3)(a)(ii) “a place at which they intend to self-isolate while in England”\n\nmeans—\n\n(a) where the person has completed a Passenger Locator Form, at an intended place of self-\n\nisolation specified in that form;\n\n(b) where the person has completed a form equivalent to a Passenger Locator Form pursuant\n\nto an enactment in Scotland, Wales or Northern Ireland, at an intended place of self-\n\nisolation specified in that form;\n\n(c) in any other case at a place described in paragraph (4)(a) to (c).\n\n(7) P must, on their arrival in England, travel directly to the place at which they are to self-\n\nisolate, and must then self-isolate until whichever is the earlier of—\n\n(a) the end of the 10th day after the day on which they arrived in England or, if later, the end\n\nof any period that applies by virtue of paragraph 2 or 3 of Schedule 8;\n\n(b) their departure from England; or\n\n(c) the beginning of P’s period of self-isolation, where P or R, where P is a child, is notified\n\nunder regulation 2A or 2B of the Self-Isolation Regulations( **a** ).\n\n(8) In paragraph (7)(c), “period of self-isolation” and “R” have the meanings given for the\n\npurposes of Part 1 of the Self-Isolation Regulations (see regulations 3 and 5 of those Regulations).\n\n(9) Paragraph (2) does not require P to remain in isolation—\n\n(a) from any person with whom they were travelling when they arrived in England and who\n\nis also self-isolating in the place where P is self-isolating;\n\n(b) where P is self-isolating in their home, from any member of their household;\n\n(c) where P is self-isolating in the home of a friend or family member, from any member of\n\nthe household of that friend or family member;\n\n( **a** ) A person notified, or a child in respect of whom a notification is given, under regulation 2A or 2B will be required to self-\n\nisolate in accordance with those Regulations from the moment the notification is given. Regulations 2A and 2B were\n\ninserted by S.I. 2021/364.", - "page_start": 13, - "page_end": 13, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(ii) to access critical public services, including—\n\n(aa) social services,\n\n(bb) services provided to victims (such as victims of crime),\n\n(iii) to move to a different place for self-isolation where it becomes impracticable to\n\nremain at the address at which they are self-isolating;\n\n(j) for the purposes of, or connected with, undertaking a test in accordance with Schedule 8\n\nor Schedule 10;\n\n(k) if self-isolating in a goods vehicle by virtue of paragraph (3)(d)—\n\n(i) for sanitary reasons,\n\n(ii) to take exercise outside,\n\n(iii) where required or permitted by that paragraph, to move to a different place for self-\n\nisolation,\n\n(iv) to inspect the vehicle or its load or to carry out any other task required for the safe\n\nand continued operation of the vehicle, including refuelling, and\n\n(v) for any other reason or purpose specified in this paragraph.\n\n(12) For the purposes of this regulation, the place referred to in paragraph (3) includes the\n\npremises where P is self-isolating together with any garden, yard, passage, stair, garage, outhouse,\n\nor other appurtenance of such premises.\n\n(13) If P is a child, any person who has custody or charge of P during P’s period of self-isolation\n\nmust ensure, so far as reasonably practicable, that P self-isolates in accordance with this\n\nregulation.\n\n(14) If P has arrived from Wales or Scotland and is in England, temporarily, for a reason which\n\nwould constitute an exception under paragraph (11), P is not required to comply with this\n\nregulation.\n\n(15) If P is a person described—\n\n(a) in paragraph 1(1) of Schedule 4—\n\n(i) where P is a person described in paragraph 1(1)(a) to (k) of, and meets the conditions\n\nset out in paragraph 1(3) of, that Schedule, P is not required to comply with this\n\nregulation,\n\n(ii) in any other case, paragraph (3)(b) and (c) does not apply to P;\n\n(b) in paragraph 1(2) of Schedule 4 (essential work for foreign country etc), P is not required\n\nto comply with this regulation;\n\n(c) in paragraph 33 of Schedule 4 (healthcare), paragraph (2) does not require P to remain in\n\nisolation in the circumstances set out in paragraph 33 of that Schedule;\n\n(d) in paragraph 43 of Schedule 4 (horticultural work)—\n\n(i) paragraph (2) does not require P to remain in isolation from any other person who is\n\nliving or working on the specified farm,\n\n(ii) paragraph (3)(a)(i) applies with the modification that the address specified by P as\n\nthe address at which they intend to self-isolate must be the specified farm, where\n\n“specified farm” has the meaning given in paragraph 43 of Schedule 4;\n\n(e) either—\n\n(i) in paragraph 44 of Schedule 4 (elite sports),\n\n(ii) in sub-paragraphs (1)(h) to (l) of paragraph 2 of Schedule 11 (exemptions from\n\nadditional measures applicable to arrivals from category 3 countries and territories),\n\nP satisfies the requirements of paragraph (2) if P complies with the relevant conditions\n\nspecified in paragraph 44(4) of Schedule 4;", - "page_start": 15, - "page_end": 15, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local\n\nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the\n\nincidence or transmission of coronavirus.”.\n\n### **Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n\n## **2015**\n\n**18.** The Special Educational Needs and Disability (Detained Persons) Regulations 2015( **a** ) are\n\namended as follows.\n\n**19.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**20.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n\n(d) regulation 19 (requirement to consider mediation);\n\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to\n\npursue mediation);\n\n(f) regulation 21 (mediation);\n\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n\n(h) regulation 27(3) (steps to be taken by a home authority);\n\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n\n(j) regulation 30(3) and (6) (unopposed appeals).”.\n\n**21.** In regulation 4 (determination whether or not special educational provision may be\n\nnecessary), after paragraph (2) insert—\n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if\n\nit is impractical to do so because of a reason relating to the incidence or transmission of\n\ncoronavirus.”.\n\n**22.** In regulation 5(4) (decision whether or not to conduct a detained person’s EHC needs\n\nassessment)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“, or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n) S.I. 2015/62.", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "transportation, treatment, storage and disposal of hazardous and non-hazardous solid waste, and require\n\nstates to develop programs to ensure the safe disposal of solid waste in sanitary landÑlls.\n\nSubtitle D of RCRA establishes a framework for regulating the disposal of municipal solid waste.\n\nRegulations under Subtitle D currently include minimum comprehensive solid waste management\n\ncriteria and guidelines, including location restrictions, facility design and operating criteria, closure and\n\npost-closure requirements, Ñnancial assurance standards, groundwater monitoring requirements and\n\ncorrective action standards, many of which had not commonly been in eÅect or enforced in the past in\n\nconnection with municipal solid waste landÑlls. Each state was required to submit to the U.S. EPA a\n\npermit program designed to implement Subtitle D regulations by April 9, 1993. All of the states in which\n\nwe operate have implemented permit programs pursuant to RCRA and Subtitle D. These state permit\n\nprograms may include landÑll requirements which are more stringent than those of Subtitle D.\n\nAll of our planned landÑll expansions or new landÑll development projects have been engineered to\n\nmeet or exceed Subtitle D requirements. Operating and design criteria for existing operations have been\n\nmodiÑed to comply with these new regulations. Compliance with Subtitle D regulations has resulted in\n\nincreased costs and may in the future require substantial additional expenditures in addition to other costs\n\nnormally associated with our waste management activities.\n\n(2) *The Comprehensive Environmental Response, Compensation and Liability Act of 1980, as*\n\n*amended.* CERCLA, among other things, provides for the cleanup of sites from which there is a release\n\nor threatened release of a hazardous substance into the environment. CERCLA may impose strict joint\n\nand several liability for the costs of cleanup and for damages to natural resources upon current owners and\n\noperators of the site, parties who were owners or operators of the site at the time the hazardous substances\n\nwere disposed of, parties who transported the hazardous substances to the site and parties who arranged\n\nfor the disposal of the hazardous substances at the site. Under the authority of CERCLA and its\n\nimplementing regulations, detailed requirements apply to the manner and degree of investigation and\n\nremediation of facilities and sites where hazardous substances have been or are threatened to be released\n\ninto the environment. Liability under CERCLA is not dependent upon the existence or disposal of only\n\n\"\"hazardous wastes'' but can also be based upon the existence of small quantities of more than 700\n\n\"\"substances'' characterized by the U.S. EPA as \"\"hazardous,'' many of which may be found in common\n\nhousehold waste.\n\nAmong other things, CERCLA authorizes the federal government to investigate and remediate sites\n\nat which hazardous substances have been or are threatened to be released into the environment or to\n\norder (or oÅer an opportunity to) persons potentially liable for the cleanup of the hazardous substances to\n\ndo so. In addition, the U.S. EPA has established a National Priorities List of sites at which hazardous\n\nsubstances have been or are threatened to be released and which require investigation or cleanup.\n\nLiability under CERCLA is not dependent upon the intentional disposal of hazardous waste or\n\nhazardous substances. It can be founded upon the release or threatened release, even as a result of\n\nunintentional, non-negligent or lawful action, of thousands of hazardous substances, including very small\n\nquantities of such substances. Thus, even if our landÑlls have never knowingly received hazardous waste\n\nas such, it is possible that one or more hazardous substances may have been deposited or \"\"released'' at\n\nour landÑlls or at other properties which we currently own or operate or may have owned or operated.", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**23.** In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the\n\nend of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**24.** In regulation 10(4) (decision not to secure an EHC plan)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“; or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n**25.** In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”.\n\n**26.** In regulation 29 (compliance with the orders of the First-tier Tribunal)—\n\n(a) after paragraph (6) insert—\n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d)\n\napply.”.\n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”.\n\n**27.** In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”.\n\n### **Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n\n### **Recommendations Power) Regulations 2017**\n\n**28.** The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power)\n\nRegulations 2017( **a** ) are amended as follows.\n\n**29.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**30.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.\n\n*Vicky Ford*\n\nParliamentary Under Secretary of State\n\n28th April 2020 Department for Education\n\n) S.I. 2017/1306.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "###### **Test providers**\n\n**3.** —(1) A test provider complies with this paragraph where—\n\n(a) they provide appropriate tests in a single end-to-end testing service (whether or not they\n\narrange with another person (“X”) for X to provide one or more elements of the service\n\non their behalf);\n\n(b) they have made a declaration to the Department of Health and Social Care that they meet\n\nthe minimum standards for private sector-provided testing at https://support-covid-19-\n\ntesting.dhsc.gov.uk/PrivateSectorSelfDeclaration;\n\n(c) in relation to a test which requires laboratory processing—\n\n(i) the person responsible for the taking of samples meets the relevant requirements for\n\naccreditation to ISO standard 15189 or ISO/IEC standard 17025, in respect of the\n\ntaking of samples, and\n\n(ii) the laboratory used by the test provider for the processing of samples meets the\n\nrelevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard\n\n17025, in respect of the processing of samples;\n\n(d) in relation to a point of care test, they meet the relevant requirements for accreditation to\n\nISO standard 15189 and ISO standard 22870( **a** );\n\n(e) a registered medical practitioner has oversight and approval of medical practices\n\nundertaken by the test provider, and responsibility for reporting medical issues;\n\n(f) they have an effective system of clinical governance in place which includes appropriate\n\nstandard operating procedures in relation to the carrying out of appropriate tests;\n\n(g) a registered clinical scientist has oversight of clinical practices undertaken by the test\n\nprovider, and responsibility for reporting clinical issues;\n\n(h) they have systems in place to identify any adverse incidents or quality control issues in\n\nrelation to appropriate tests and be able to report them as soon as reasonably practicable\n\nto the Secretary of State;\n\n(i) they administer or provide an appropriate test to P, on or after the fifth day after the day\n\non which P arrived in England having received the information required by paragraph\n\n4(b) and (c) (as appropriate); and\n\n(j) if they arrange with another person (“X”) for X to carry out any element of the single\n\nend-to-end testing service on their behalf, the test provider ensures that X complies with\n\nany of paragraphs (c) to (i) and 5(2), (3) and (5) as is relevant to the carrying out of that\n\nelement.\n\n(2) For the purposes of sub-paragraph (1)—\n\n(a) “point of care test” means a test processed outside a laboratory environment;\n\n(b) “registered clinical scientist” means a person registered as a clinical scientist with the\n\nHealth and Care Professions Council pursuant to article 5 of the Health Professions Order\n\n2001( **b** );\n\n(c) “single end-to-end testing service” means a service which comprises accepting the\n\nbooking from the person to be tested, collecting and processing the sample to be tested,\n\ncarrying out genomic sequencing and providing the test result to P.\n\n(3) For the purposes of sub-paragraph (1)(c) and (d), a person or laboratory (as the case may be)\n\nmeets the relevant requirements for accreditation to a standard where that person, or in the case of\n\na laboratory where the person who is the operator of the laboratory—\n\n(a) has made a valid application for accreditation to UKAS (“stage one”); and\n\n( **a** ) ISO 22870 Point-of-care testing (POCT) requirements for quality and competence was published in November 2016.\n\n( **b** ) S.I. 2002/254.", - "page_start": 69, - "page_end": 69, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "PLAW-116publ30.pdf", - "query": "When take effect the Fairness For Breastfeeding Mothers Act ?", - "target_page": 2, - "target_passage": "The amendments made by this section shall take effect 1 year after the date of the enactment of this Act. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "regulations or implement responsible business, social, environmental and supply chain practices, we could be subject to damage to our\n\nreputation, class action lawsuits, legal and settlement costs, civil and criminal liability, increased cost of regulatory compliance, restatements\n\nof our financial statements, disruption of our business and loss of customers. Any required changes to our employment practices could result\n\nin the loss of employees, reduced sales, increased employment costs, low employee morale and harm to our business and results of\n\noperations. In addition, political and economic factors could lead to unfavorable changes in federal, state and foreign tax laws, which may\n\nincrease our tax liabilities. An increase in our tax liabilities could adversely affect our results of operations. We are also regularly involved in\n\nvarious litigation matters that arise in the ordinary course of business. Litigation or regulatory developments could adversely affect our\n\nbusiness and financial condition.\n\n**We continue to face uncertainties due to financial services industry regulation and supervision that could have an adverse affect**\n\n####### **on our operations.**\n\nFederal and state regulation and supervision of the financial industry has increased in recent years due to implementation of consumer\n\nprotection and financial reform legislation such as the Credit Card Accountability Responsibility and Disclosure Act of 2009 (“CARD Act”) and\n\nthe Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (“Financial Reform Act”). The Financial Reform Act significantly\n\nrestructured regulatory oversight and other aspects of the financial industry, created the Consumer Financial Protection Bureau (“CFPB”) to\n\nsupervise and enforce consumer lending laws and regulations, and expanded state authority over consumer lending. The CARD Act included\n\nnew and revised rules and restrictions on credit card pricing, finance charges and fees, customer billing practices and payment application.\n\nWe anticipate more regulation and interpretations of the new rules to continue, and, depending on the nature and extent of these new\n\nregulations and interpretations, we may be required to make changes to our credit card practices and systems, which could adversely impact\n\nthe revenues and profitability of our Credit segment. In addition, we operate in a regulated environment where financial supervisory agencies\n\nprovide oversight over our activities. Compliance with applicable laws and regulations could limit or restrict our activities and the conduct of\n\nour business and enforcement actions by those agencies for failure to comply could have an adverse impact on us.", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "## 133 STAT. 1032 PUBLIC LAW 116- 30—JULY 25, 2019\n\n### Public Law 116- 30 116th Congress\n\n### An Act\n\nTo provide a lactation room in public buildings.\n\n*Be it enacted by the Senate and House of Representatives of* *the United States of America in Congress assembled,*\n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding Mothers Act of 2019’’.\n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) L ACTATION R OOM IN P UBLIC B UILDINGS .—Chapter 33 of title 40, United States Code, is amended by adding at the end the following new section:\n\n##### **‘‘§ 3318. Lactation room in public buildings**\n\n‘‘(a) D EFINITIONS .—In this section: ‘‘(1) A PPROPRIATE AUTHORITY .—The term ‘appropriate authority’ means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building. ‘‘(2) C OVERED PUBLIC BUILDING .—The term ‘covered public building’ means a public building (as defined in section 3301) that is open to the public and contains a public restroom, and includes a building listed in section 6301 or 5101. ‘‘(3) L ACTATION ROOM .—The term ‘lactation room’ means a hygienic place, other than a bathroom, that— ‘‘(A) is shielded from view; ‘‘(B) is free from intrusion; and ‘‘(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet. ‘‘(b) L ACTATION R OOM R EQUIRED .—Except as provided in sub- section (c), the appropriate authority of a covered public building shall ensure that the building contains a lactation room that is made available for use by members of the public to express breast milk. ‘‘(c) E XCEPTIONS .—A covered public building may be excluded from the requirement in subsection (b) at the discretion of the appropriate authority if— ‘‘(1) the public building— ‘‘(A) does not contain a lactation room for employees who work in the building; and ‘‘(B) does not have a room that could be repurposed as a lactation room or a space that could be made private using portable materials, at a reasonable cost; or\n\n40 USC 3318.\n\nFairness For Breastfeeding Mothers Act of 2019. 40 USC 101 note.\n\nJuly 25, 2019\n\n[H.R. 866]\n\nVerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00001 Fmt 6580 Sfmt 6581 E:\\PUBLAW\\PUBL030.116 PUBL030 dkrause on DSKBC28HB2PROD with PUBLAWS", - "page_start": 0, - "page_end": 0, - "source_file": "PLAW-116publ30.pdf" - }, - { - "text": "**2257**\n\noutstanding questions. This study and corresponding open-access\n\ndataset offer neuroscientists a detailed map of the human brain across\n\ngestation, a resource for which a wide range of previously unattainable\n\nneurobiological questions can now be explored.\n\nOur findings from this precision imaging study show that preg-\n\nnancy is characterized by reductions in GMV, cortical thinning and\n\nenhanced white matter microstructural integrity that unfold week by\n\nweek. These changes were also tied to the significant rise in steroid hor-\n\nmone concentrations over pregnancy. Some of these changes persist\n\nat 2 years postpartum (for example, global reductions in GMV and CT),\n\nwhile others, including markers of white matter integrity, appear to be\n\ntransient. Ventricular expansion and contraction parallel these cortical\n\nchanges. These widespread patterns, and the notable increase in CSF\n\nvolume across gestation, could reflect increased water retention and\n\nsubsequent compression of cortical tissue. However, the persistence\n\nof these changes at 2 years postpartum and regional variation in GMV,\n\nCT and QA, hint at cellular underpinnings, such as alterations in glia\n\nor neuron number, synaptic density and myelination (for review on\n\nthe latter, see ref. 4 ). Future studies of the relationship between fluid\n\ndynamics and volumetric changes will help clarify the factors that drive\n\nglobal neural changes during pregnancy; such insights will have broad\n\nimplications for maternal health (for example, neurological effects tied\n\nto pre-eclampsia or edema).\n\nCritically, dynamic neural changes occurred within the pregnancy\n\nwindow itself, a nuance not captured by studies limited to comparisons\n\nbetween prepregnancy and postpregnancy. For example, we observed\n\nlarge increases in white matter microstructural integrity (QA) through-\n\nout the first and second trimesters of pregnancy, but these measures\n\nfully returned to baseline values by the first postpartum scan. This\n\npattern may explain why previous studies report no pregnancy-related\n\ndifferences in white matter tractography <sup>14</sup> . Other measures, such as\n\nGMV and CT, decreased throughout gestation and displayed only a\n\nmodest rebound postpartum. These nonlinear patterns suggest that\n\nonly quantifying prepregnancy and postpartum brain structure may\n\nWhole-brain subcortical volumes\n\nGestation + postpartum Gestation\n\nWeek Stage\n\nAvg GMV (mm 3\n\n)\n\n0 10 20 30 Pre 1st 2nd 3rd Post\n\n4,000\n\n3,900\n\n3,800\n\n3,700\n\n3,600\n\n3,500\n\n4,000\n\n3,800\n\n3,600\n\nRight ventral diencephalon\n\nBrain stem\n\n**a**\n\nCA1\n\nWeek\n\n0 10 20 30\n\nStage\n\n1,900\n\n1,800\n\n1,700\n\n1,900\n\n1,800\n\n1,700 Avg GMV (mm\n\n3\n\n)\n\nGestation + postpartum Gestation\n\nPHC CA2/CA3\n\nMedial temporal lobe subregion volumes **b**\n\nGestation + postpartum\n\nWeek Stage\n\n200\n\n180\n\n160\n\n200\n\n180\n\n160 Avg GMV (mm\n\n3 )\n\nGestation Gestation + postpartum\n\nWeek\n\n0 10 20 30\n\nStage\n\nPre Post\n\n540\n\n500\n\n460\n\n540\n\n500\n\n460\n\nAvg GMV (mm\n\n3\n\n)\n\n*R* *<sup>2</sup>* adj <sup>= 0.36,</sup> *<sup>q</sup>* <sup>= 0.031</sup> *R* *<sup>2</sup>* adj <sup>= 0.41,</sup> *<sup>q</sup>* <sup>= 0.027</sup> *R* *<sup>2</sup>* adj <sup>= 0.58,</sup> *<sup>q</sup>* <sup>= 0.001</sup>\n\nGestation\n\nVentral DC\n\n*T* stat\n\nHippocampus\n\nPutamen\n\nThalamus\n\nCaudate\n\nLateral ventricle\n\n- 6\n\n2\n\nPre 1st 2nd 3rd Post Pre Post 0 10 20 30 1st 2nd 3rd 1st 2nd 3rd\n\n### **Fig. 3 | Subcortical GMV changed throughout gestation. a** , Multivariate\n\nregression analyses revealed largely negative relationships between gestation\n\nweek and subcortical GMV regions over pregnancy, including bilateral thalamus,\n\ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus,\n\nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral\n\nventricles displayed the only positive relationships with gestation week\n\n(also depicted in Fig. 1d ). The whole-brain subcortical GMV estimates shown\n\nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR-", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed4.pdf" - }, - { - "text": "[stereotypes or render certain groups invisible. Procedural fairness focuses on the decision process rather](https://en.wikipedia.org/wiki/Stereotype)\n\nthan the outcome. The most relevant notions of fairness may depend on the context, notably the type of\n\nAI application and the stakeholders. The subjectivity in the notions of bias and fairness makes it difficult\n\nfor companies to operationalize them. Having access to sensitive attributes such as race or gender is also\n\nconsidered by many AI ethicists to be necessary in order to compensate for biases, but it may conflict\n\n[with anti-discrimination laws.](https://en.wikipedia.org/wiki/Anti-discrimination_law) <sup>[219]</sup>", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia3.pdf" - }, - { - "text": "exceptional result.\n\n**CONTINUOUS IMPROVEMENT**\n\n**IMPORTANT**\n\nOur primary goal is to produce\n\nhigher returns for our shareholders\n\nand, in our drive to do so, it is\n\nimportant to identify ways in\n\nwhich we might achieve more\n\nefficient and cost-effective\n\noutcomes.\n\nAs a result, an important initiative\n\nhas been the introduction of a\n\ncontinuous improvement program.\n\nThe organisational restructure\n\nimplemented during 2004 yielded\n\ndividends with savings recorded\n\nin the past year of $38 million for\n\nprogram outlays of $22 million.\n\nThese programs will continue to\n\ncontribute at even higher levels\n\ngoing forward for even less cost.\n\n**A PART OF OUR COMMUNITY**\n\nSantos engages with many\n\nstakeholders and we believe it\n\nis important to have rewarding\n\nrelationships with the communities\n\nto which we belong.\n\nWe sponsor a wide range\n\nof educational, cultural and\n\ncommunity events and programs.\n\nAnnual Report 2004 6\n\n**PERFORMANCE AGAINST TARGETS**\n\nLong-term 2004 Comments\n\ntarget performance\n\nProduction growth 6-8% -13.1% Moomba incident impact\n\nReserve replacement ratio >140% 121% Excludes Jeruk\n\nexploration success\n\nReserve replacement cost per boe <US$5.50 US$12.37 Impacted by development focus\n\nin 2004\n\nNetback >A$22 A$21 On target\n\nEBITDA growth per share >10% 8.8% Improving trend\n\nReturn on capital employed >10% 9.4% Improving trend\n\nManaging Director’s Review continued", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "10\n\n*Consumer Laws and Regulations*\n\nWe are also subject to certain consumer laws and regulations that are designed to protect consumers in\n\ntransactions with banks. While the following list is not exhaustive, these laws and regulations include the Truth in\n\nLending Act, the Truth in Savings Act, the Electronic Funds Transfer Act, the Expedited Funds Availability Act, the\n\nEqual Credit Opportunity Act, and the Fair Housing Act, among others. These laws and regulations among other\n\nthings prohibit discrimination on the basis of race, gender or other designated characteristics and mandate various\n\ndisclosure requirements and regulate the manner in which financial institutions must deal with customers when\n\ntaking deposits or making loans to such customers. These and other laws also limit finance charges or other fees or\n\ncharges earned in our activities. We must comply with the applicable provisions of these consumer protection laws\n\nand regulations as part of our ongoing customer relations.\n\n*Technology Risk Management and Consumer Privacy*\n\nState and federal banking regulators have issued various policy statements emphasizing the importance of\n\ntechnology risk management and supervision in evaluating the safety and soundness of depository institutions with\n\nrespect to banks that contract with outside vendors to provide data processing and core banking functions. The use\n\nof technology-related products, services, delivery channels and processes expose a bank to various risks, particularly\n\noperational, privacy, security, strategic, reputation and compliance risk. Banks are generally expected to prudently\n\nmanage technology-related risks as part of their comprehensive risk management policies by identifying, measuring,\n\nmonitoring and controlling risks associated with the use of technology.\n\nUnder Section 501 of the Gramm-Leach-Bliley Act, the federal banking agencies have established appropriate\n\nstandards for financial institutions regarding the implementation of safeguards to ensure the security and\n\nconfidentiality of customer records and information, protection against any anticipated threats or hazards to the\n\nsecurity or integrity of such records and protection against unauthorized access to or use of such records or\n\ninformation in a way that could result in substantial harm or inconvenience to a customer. Among other matters, the\n\nrules require each bank to implement a comprehensive written information security program that includes\n\nadministrative, technical and physical safeguards relating to customer information.\n\nUnder the Gramm-Leach-Bliley Act, a financial institution must also provide its customers with a notice of\n\nprivacy policies and practices. Section 502 prohibits a financial institution from disclosing nonpublic personal\n\ninformation about a consumer to nonaffiliated third parties unless the institution satisfies various notice and opt-out\n\nrequirements and the customer has not elected to opt out of the disclosure. Under Section 504, the agencies are\n\nauthorized to issue regulations as necessary to implement notice requirements and restrictions on a financial\n\ninstitution’s ability to disclose nonpublic personal information about consumers to nonaffiliated third parties.\n\nUnder the final rule the regulators adopted, all banks must develop initial and annual privacy notices which describe\n\nin general terms the bank’s information sharing practices. Banks that share nonpublic personal information about\n\ncustomers with nonaffiliated third parties must also provide customers with an opt-out notice and a reasonable\n\nperiod of time for the customer to opt out of any such disclosure (with certain exceptions). Limitations are placed on\n\nthe extent to which a bank can disclose an account number or access code for credit card, deposit, or transaction\n\naccounts to any nonaffiliated third party for use in marketing.\n\n*Monetary Policy*", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "10\n\n**Market price of maize in main countries.** In this study, we elaborate on the endogenous response of our economic models. This response can be theoretically elaborated as: due to the effect of climate change on yield reduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and raising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive (cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond by changing farm-level management practices and increasing (decreasing) the amount of acreage under these crops. At a global scale, the reallocation of production and consumption through international trade further alters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ region due to climate change. In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among different countries and regions under both climate change scenarios (Fig. 7 ). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C scenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed due to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa would decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the domestic production, the climate change will also induce changes in international trade of maize, resulting in changing levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically produced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, the countries that face positive effects on yields and/or are relatively less dependent on imports, are positively (less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would improve under both scenarios (Fig. 8 ). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh and Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline.\n\n**Discussion and conclusion Discussion.** Our analysis highlights the effects of climate change on global- and regional-specific maize yields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the reduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- ing by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. Although the precipitation is also increasing, the evapotranspiration would become more intense. The limitation of water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by 1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought and heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the\n\n**Figure 6.** Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed9.pdf" - }, - { - "text": "the extent to which a bank can disclose an account number or access code for credit card, deposit, or transaction\n\naccounts to any nonaffiliated third party for use in marketing.\n\n*Monetary Policy*\n\nBanks are affected by the credit policies of other monetary authorities, including the Federal Reserve Board,\n\nthat affect the national supply of credit. The Federal Reserve Board regulates the supply of credit in order to\n\ninfluence general economic conditions, primarily through open market operations in United States government\n\nobligations, varying the discount rate on financial institution borrowings, varying reserve requirements against\n\nfinancial institution deposits, and restricting certain borrowings by financial institutions and their subsidiaries. The\n\nmonetary policies of the Federal Reserve Board have had a significant effect on the operating results of banks in the\n\npast and are expected to continue to do so in the future.", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "**37**\n\nCorporate Governance Statement\n\nCorporate Governance Statement\n\nDiversity\n\nThe Company has a policy to improve the diver-\n\nsity of its workforce over time by identifying\n\nwomen and individuals from under-represented\n\nbackgrounds for recruitment, and by rewarding\n\nand promoting employees on the basis of\n\nperformance.\n\nHowever, at this stage of its development, the\n\nCompany has a small Board of Directors, and a\n\nsmall management team which is geographically\n\ndispersed and because of the industry in which\n\nthe Company operates, the Board does not\n\nconsider it to be practicable to set measurable\n\nobjectives to achieve greater gender diversity at\n\nthis time.\n\nIn addition, the Board acknowledges the bene-\n\nfits of seeking to improve gender diversity at all\n\nlevels in the Company over time and will keep\n\nthis issue under review.\n\nThe Company aims to foster continuous improve-\n\nment in the area of diversity; building on achieve-\n\nment realised through the implementation of\n\nhistorical diversity initiatives, by applying princi-\n\nples successfully used at our leading operation in\n\nthis area, to other parts of the business.\n\nOur flagship ‘Chatree’ Mine in Thailand boasts\n\nthe enviable statistic of having equal representa-\n\ntion by women on the senior management team.\n\nRecruitment, training and promotion principles\n\nemployed at Chatree are currently being applied\n\nto our ‘Challenger’ Mine in Australia, where we\n\ncurrently have 14% representation of women\n\nacross the senior management and professional\n\ncategories and to other parts of the business.\n\nThere is currently no representation by women\n\non our Board of Directors. Whilst this is in part\n\nreflective of the relatively small size of the Board\n\nand stage of development of key elements of\n\nthe business, it forms part of an overall business\n\nreview process to consider the issue of gender\n\ndiversity at this level and will be the subject of\n\nongoing review.\n\nThe Company considers that it will benefit from\n\nits ongoing commitment to promote a diverse\n\nworkforce with treatment of employees and\n\nfuture employees on the basis of merit, abilities\n\nand potential, regardless of gender, colour,\n\nethnic or national origin, race, disability, age,\n\nsexual orientation, gender reassignment, socio-\n\neconomic background, religious or political\n\nbelief, non / trade union membership, family\n\ncircumstances or other irrelevant distinction.\n\nThe Company has set various criteria and proce-\n\ndures in order to support equality and diversity\n\nin the workforce and applies these principles to:\n\n〉 〉 Provide fair access to workplace opportuni-\n\nties and benefits, including internal promo-\n\ntion, leadership development, flexible work\n\npractices and fair and comparable wages;\n\n〉 〉 Attracting and retaining a skilled and diverse\n\nworkforce;\n\n〉 〉 Creating an inclusive workplace culture where\n\ndiscriminatory behaviour is unacceptable; and\n\n〉 〉 Providing an effective grievance mechanism\n\nfor employees.\n\nCurrent Proportion of\n\nWomen Employees\n\nBoard 0.0%\n\nSenior Executives 0.0%\n\nSenior Managers 1.8%\n\nManagers 1.0%\n\nProfessionals 8.6%\n\nNon-professionals 6.4%\n\nTotal Workforce 17.8%\n\nShare Trading Policy\n\nIn the interests of shareholder confidence\n\nand compliance with insider trading laws, the\n\nCompany has formal policies governing the\n\ntrading of the Company’s securities by Directors,\n\nofficers and employees. Details of Directors’\n\nshareholdings are disclosed in the Directors’\n\nReport.\n\nThe policy prohibits Directors and employees\n\nfrom engaging in short-term trading of any of\n\nthe Company’s securities and buying or selling\n\nthe Company’s securities if they possess unpub-\n\nlished, price-sensitive information.\n\nDirectors and senior management may buy or\n\nsell Company securities in the four week period\n\nfollowing significant announcements by the\n\nCompany, including the release of the quarterly\n\nreport, half-yearly results, the preliminary annual\n\nresults and the lodgement of the Company’s", - "page_start": 38, - "page_end": 38, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "copyright tariff royalties that Canadian broadcasting undertakings,\n\nincluding cable, radio, television and specialty services, pay to copyright\n\ncollectives.\n\n####### **Billing and Contracts**\n\nThe Quebec Consumer Protection Act amendments, effective June\n\n2010, introduced new provisions applicable to wireless, wireline and\n\nInternet service contracts. These amendments include new rules on the\n\ncontent of such contracts, the determination of the early cancellation\n\nfees that can be charged to customers, the use of security deposits and\n\nthe cancellation and renewal rights of the consumers. The amendments\n\nalso established new provisions on the sale of prepaid cards and the\n\ndisclosure of related costs.\n\nAmendments to the Manitoba Consumer Protection Act took effect in\n\nSeptember 2012 and parallel the changes to the Quebec Consumer\n\nProtection Act. Similar legislation also came into effect in September\n\n2012 in Newfoundland and Labrador and has been tabled in Nova\n\nScotia. A private member’s bill proposing similar legislation has been\n\nintroduced in New Brunswick.\n\nIn April 2012, the Ontario government announced that it would be\n\nintroducing legislation addressing wireless bills and contracts. The\n\nlegislation seeks to ensure that contracts are written in plain language\n\nand spell out which services come with the basic fee and which would\n\nresult in a higher bill. It requires providers to obtain consent in writing\n\nbefore they renew or amend a contract. The legislation also seeks a cap\n\non the cost of cancelling a fixed-term contract that would vary\n\ndepending on the circumstances of the contract. The proposed\n\nlegislation, which would affect new contracts, would take effect six\n\nmonths after being passed and would also cover existing agreements\n\nthat are amended, renewed or extended after that date. The legislation\n\nwas passed into law in October 2013.\n\nSee also “CRTC Wireless Code” section under Wireless Regulation.\n\n####### **Foreign Ownership and Control**\n\nNon-Canadians can own and control directly or indirectly:\n\n- up to 33.3% of the voting shares and the related votes of a holding\n\ncompany that has a subsidiary operating company licenced under the\n\nBroadcasting Act, and\n\n- up to 20% of the voting shares and the related votes of the\n\noperating licensee company may be owned and controlled directly or\n\nindirectly by non-Canadians.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 67", - "page_start": 70, - "page_end": 70, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200471_en.pdf", - "query": "When is it not necessary to review an EHC plan ?", - "target_page": 3, - "target_passage": " It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**10.** In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”.\n\n**11.** After regulation 18 (circumstances in which a local authority must review an EHC plan)\n\ninsert—\n\n“ **Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.** —(1) It is not necessary for a local authority to review an EHC plan in accordance\n\nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the\n\nincidence or transmission of coronavirus.\n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as\n\nsoon as reasonably practicable.”.\n\n**12.** In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert—\n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3)\n\nand (4) if it is impractical to do so because of a reason relating to the incidence or\n\ntransmission of coronavirus.”.\n\n**13.** In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)—\n\n(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**14.** In regulation 45 (unopposed appeals), after paragraph (7) insert—\n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e)\n\napply.”.\n\n### **Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.** The Special Educational Needs (Personal Budgets) Regulations 2014( **a** ) are amended as\n\nfollows.\n\n**16.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**17.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time period due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, the requirement for the local authority\n\nto review the making and use of direct payments within the first three months of them being\n\nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read\n\ninstead as a requirement for such action to be taken as soon as reasonably practicable.\n\n) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15\n\nworking days), (4), (5), (7) (in relation to the second reference to 15 working days)\n\nand (8);\n\n(b) regulation 16(2) and (3) (change of responsible commissioning body);\n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school\n\nor other institution);\n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person\n\ndoes not attend a school or other institution);\n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess\n\neducational, health care and social care provision);\n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment);\n\n(g) regulation 33 (requirement to consider mediation);\n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails\n\nto pursue mediation);\n\n(i) regulation 35(2), (3) and (4) (mediation - health care issues);\n\n(j) regulation 36(2) (mediation - no health care issues);\n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5));\n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority);\n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier\n\nTribunal);\n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals);\n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and\n\n(p) regulation 56(3) (publication of comments on the local offer).”.\n\n**6.** In regulation 4 (determination whether or not special educational provision may be\n\nnecessary), after paragraph (2) insert—\n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if\n\nit is impractical to do so because of a reason relating to the incidence or transmission of\n\ncoronavirus.”.\n\n**7.** In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)—\n\n(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**8.** In regulation 8(2) (duty to co-operate in EHC needs assessments)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“; or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n**9.** In regulation 10(4) (decision not to secure an EHC plan)—", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "11\n\nN O T E S T O C O N S O L I D A T E D F I N A N C I A L S T A T E M E N T S ( C O N T I N U E D )\n\nE M P L O Y E E R E T I R E M E N T A N D B E N E F I T P L A N S\n\nA noncontributory defined benefit retirement plan is maintained for all regular employees of the Company except those of Quest Medical. This plan was\n\namended effective January 1, 1998 to become a cash balance pension plan. The Company’s funding policy is to make the annual contributions required by\n\napplicable regulations and recommended by its actuary. The Company uses a December 31 measurement date for the plan.\n\nThe changes in the plan’s projected benefit obligation (“PBO”) as of December 31, 2003 and 2002 are as follows (in thousands):\n\n2003 2002\n\n**C H A N G E I N B E N E F I T O B L I G AT I O N :**\n\nBenefit obligation, January 1 $ 4,170\n\n| $ 4,599 320 307 (616) (93) (347) |\n|:---|\n| $ 4,170 |\n\nService cost 214\n\nInterest cost 298\n\nAmendments —-\n\nActuarial (gain)/loss 529\n\nBenefits paid (333)\n\nBenefit obligation, December 31 $ 4,878\n\nIn December 2002, the plan was amended to reduce benefit accruals for future service by plan participants by approximately 50 percent. This amendment\n\ncaused a reduction in the PBO of approximately $616,000, and is reflected as a reduction in pension expense over the estimated employee service lives.\n\nThe changes in the fair value of plan assets, funded status of the plan and the status of the prepaid pension benefit recognized, which is included in the\n\nCompany’s balance sheets as of December 31, 2003 and 2002 are as follows (in thousands):\n\n2003 2002\n\n**C H A N G E I N P L A N A S S E T S :**\n\nFair value of plan assets, January 1 $ 4,383\n\n| $ 4,550 (750) 930 (347) |\n|:---|\n| $ 4,383 |\n| $ 213 2,154 (539) (132) |\n| $ 1,696 |\n\nActual return on plan assets 963\n\nEmployer contributions 400\n\nBenefits paid (333)\n\nFair value of plan assets, December 31 $ 5,413\n\nFunded status of plan $ 535\n\nUnrecognized actuarial loss 1,941\n\nUnrecognized prior service cost (502)\n\nUnrecognized net transition obligation (88)\n\nNet amount recognized as other assets $ 1,886", - "page_start": 21, - "page_end": 21, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "regulations: an overarching review, Literature review; Chapter 3: Societal norms, social reporting, corporate social\n\nresponsibility and support for securing compliance, [https://osha.europa.eu/en/publications/literature-review-](https://osha.europa.eu/en/publications/literature-review-improving-compliance-occupational-safety-and-health-regulations-0)\n\n[improving-compliance-occupational-safety-and-health-regulations-0](https://osha.europa.eu/en/publications/literature-review-improving-compliance-occupational-safety-and-health-regulations-0)\n\nPodgorski, D., 2015: Measuring operational performance of OSH management systems - A demonstration of\n\n[AHP-based selection of leading key performance indicators, in Safety Science, ](https://www.sciencedirect.com/science/journal/09257535) Vol. 73 , March 2015, p146-166,\n\n[https://doi.org/10.1016/j.ssci.2014.11.018 ](https://doi.org/10.1016/j.ssci.2014.11.018)", - "page_start": 155, - "page_end": 155, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "9. There is a 50% reduction in the number of Red List species threatened by invasive alien species. 10. The losses of nutrients from fertilisers are reduced by 50%, resulting in the reduction ofthe use of fertilisers by at least 20%. 11. Cities with at least 20,000 inhabitants have an ambitious Urban Greening Plan. 12. No chemical pesticides are used in sensitive areas such as EU urban green areas. 13. The negative impacts on sensitive species and habitats, including on the seabed through fishing and extraction activities, are substantially reduced to achieve good environmental status. 14. The by-catch of species is eliminated or reduced to a level that allows species recovery and conservation.\n\n## **3. E NABLING TRANSFORMATIVE CHANGE**\n\n### **3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place **a new European biodiversity governance framework** . This will help map obligations and commitments and set out a roadmap to guide their implementation.\n\nAs part of this new framework, the Commission will put in place a monitoring and review mechanism. This will include a **clear set of agreed indicators** and will enable regular progress assessment and set out corrective action if necessary. This mechanism will feed the Environmental Implementation Review and contribute to the European Semester.\n\nThe new governance framework will ensure co-responsibility and co-ownership by all\n\nrelevant actors in meeting the EU’s biodiversity commitments. It will support administrative capacity building, transparency, stakeholder dialogue, and participatory governance at different levels.\n\nThe Commission will assess the progress and suitability of this approach in 2023, and consider whether a legally binding approach to governance is needed.\n\n### **3.2. Stepping up implementation and enforcement of EU environmental legislation**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the last 30 years, the EU has put in place a solid legislative framework to protect and restore its natural capital. However, recent evaluations show that although legislation is fit for purpose, implementation on the ground is lagging behind <sup>60</sup> . This is having dramatic consequences on biodiversity and comes with a substantial economic cost <sup>61</sup> . **The full implementation and enforcement of EU environmental legislation is therefore at the heart of this strategy** , for which political support and financial and human resources will need to be prioritised.\n\nSee 2015 [State of Nature in the EU report](http://ec.europa.eu/environment/nature/pdf/state_of_nature_en.pdf) (COM (2015)219). [The costs of non-implementation are estimated at EUR 50 billion per year.](http://ec.europa.eu/environment/enveco/economics_policy/pdf/report_sept2011.pdf)", - "page_start": 15, - "page_end": 15, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "into an ATM services agreement whereby the Company will provide ATM management and other related services to RBA for an initial term\n\nof 15 years.\n\n**(27) Employee Benefit Plans**\n\nE u ronet has established a Profit Sharing and 401(k) plan for all employees who have completed six months of service and are not otherw i s e\n\nc o v e red by a re t i rement benefit plan (national or private) outside of the US. Each plan participant can contribute up to the maximum\n\namount allowed by the Internal Revenue Service to the Plan through payroll deductions. Euro n e t ’s matching contribution to the plan is\n\nd i s c re t i o n a ry and is determined each year by the Board of Directors. The employee’s vested percentage re g a rding the employer’s contribution\n\nvaries according to years of service. Euro n e t ’s contribution accrual to the Plan for the years ended December 31, 2000, 1999 and 1998 was\n\n$213,000, $159,000 and $26,000 re s p e c t i v e l y.\n\nE u ronet maintains both a fully funded and self-funded health insurance programs, which cover all full-time employees and their families at\n\nno charge to the employees. In order to administer the self-funded program, Euronet has entered into a contractual agreement with a third\n\np a rty administrator by which Euronet pays a monthly service fee to the administrator based upon employee enrollment participating in the\n\nself-funded plan. Euronet has also purchased a stop/loss insurance policy to limit Euro n e t ’s self-funded liability to $25,000 per employee per\n\nyear and a total loss on all claims to approximately $31,000 per month.\n\n4 4", - "page_start": 45, - "page_end": 45, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "367 ETUC, 2021: [Huge fall in labour inspections raises Covid risk](https://www.etuc.org/en/pressrelease/huge-fall-labour-inspections-raises-covid-risk)\n\nETUC observed in the same period a fall of 0.5 million inspections. Quote: *‘New ETUC research reveals that*\n\n*safety inspections have been cut by a fifth since 2010, falling from 2.2 million annual visits to 1.7 million.’*\n\n368 Eurostat: Annual enterprise statistics by size class for special aggregates of activities (NACE Rev. 2), [here](https://ec.europa.eu/eurostat/databrowser/view/sbs_sc_sca_r2/default/table?lang=en)\n\n21.2 million businesses have between 0 and 9 employees.\n\n369 EPSU, 2012: [A mapping report on Labour Inspection Services in 15 European countries](https://www.epsu.org/sites/default/files/article/files/EPSU_Final_report_on_Labour_Inspection_Services.pdf) (p. 15ff).\n\n370 ETUC, 2021: [Huge fall in labour inspections raises Covid risk](https://www.etuc.org/en/pressrelease/huge-fall-labour-inspections-raises-covid-risk)\n\n371 European Agency for Safety and Health at Work, ESENER 2019, Question: Whether establishments have\n\nbeen visited by inspectorates in the last three years (% establishments by country ESENER 2019 and 2014, [here](https://visualisation.osha.europa.eu/esener/en/survey/overview/2019)\n\n372 SLIC, 2018: Labour inspectors’ guide for assessing the quality of risk assessments and risk management\n\nmeasures with regard to prevention of psychosocial risks, No-Binding Publication for EU Labour Inspectors, [here](https://circabc.europa.eu/ui/group/fea534f4-2590-4490-bca6-504782b47c79/library/22e5a918-47d6-4646-93f3-ebd341f6c571)\n\n373 EU-OSHA: [E-guide to managing stress and psychosocial risks](https://osha.europa.eu/en/tools-and-resources/e-guides/e-guide-managing-stress-and-psychosocial-risks)\n\nEU-OSHA, 2018: [“Healthy workers, thriving companies - a practical guide to wellbeing at work”](https://osha.europa.eu/en/publications/healthy-workers-thriving-companies-practical-guide-wellbeing-work)\n\nISO, 2021: ISO 45003 Occupational health and safety management - Psychological health and safety at work -\n\nGuidelines for managing psychosocial risks, [here](https://www.iso.org/standard/64283.html)\n\n374 European Commission, 2018: [Promoting mental health in the workplace. Guidance to implementing a ](https://ec.europa.eu/social/main.jsp?catId=738&langId=en&pubId=8098&furtherPubs=yes)\n\n[comprehensive approach](https://ec.europa.eu/social/main.jsp?catId=738&langId=en&pubId=8098&furtherPubs=yes)\n\n375 ILO, 2012: [Stress Prevention at Work Checkpoints. Practical improvements for stress prevention in the ](https://www.ilo.org/global/publications/books/WCMS_168053/lang--en/index.htm)\n\n[workplace](https://www.ilo.org/global/publications/books/WCMS_168053/lang--en/index.htm)\n\nILO, 2021: [Violence and harassment in the world of work: A guide on Convention No. 190 and Recommendation ](https://www.ilo.org/global/topics/violence-harassment/resources/WCMS_814507/lang--en/index.htm)\n\n[No. 206](https://www.ilo.org/global/topics/violence-harassment/resources/WCMS_814507/lang--en/index.htm)\n\n376 WHO, 2008: [PRIMA-EF : guidance on the European framework for psychosocial risk management : a ](https://apps.who.int/iris/handle/10665/43966)\n\n[resource for employer and worker representatives](https://apps.who.int/iris/handle/10665/43966)\n\n377 OSH Barometer, section Steering of OSH, National strategies, Activities, [here](https://visualisation.osha.europa.eu/osh-barometer/osh-steering/national-strategies)\n\n378 Arbetsmiljöverket, 2015: [Organisatorisk och social arbetsmiljö (AFS 2015:4), föreskrifter](https://www.av.se/arbetsmiljoarbete-och-inspektioner/publikationer/foreskrifter/organisatorisk-och-social-arbetsmiljo-afs-20154/) (Organisational and\n\nsocial work environment, Ordinance).\n\n379 The European Commission (2002) defined stress as the pattern of emotional, cognitive, behavioural and", - "page_start": 154, - "page_end": 154, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "amending Regulations (EC) No 2111/2005, (EC) No 1008/2008, (EU) No 996/2010, (EU) No 376/2014 and Directives\n\n2014/30/EU and 2014/53/EU of the European Parliament and of the Council, and repealing Regulations (EC) No 552/2004\n\nand (EC) No 216/2008 of the European Parliament and of the Council and Council Regulation (EEC) No 3922/91.", - "page_start": 41, - "page_end": 41, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "69 See [Common framework and guidance documents for biodiversity proofing of the EU budget](https://ec.europa.eu/environment/nature/biodiversity/comm2006/proofing.htm) . 70 The cost estimate is based on the 2018 [Impact Assessment of the LIFE Regulation](https://ec.europa.eu/commission/sites/beta-political/files/budget-may2018-life-swd_en.pdf) (SWD(2018) 292), a [Study on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020](https://ieep.eu/uploads/articles/attachments/e597a01d-e34e-4a2e-84ec-68be1222c5fd/Financing_Target_2_Final_Report_without_Annexes_-_FINAL_APPROVED.pdf?v=63664509816) and data submitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will update the estimate, notably based on Member States’ Prioritised Action Frameworks under the Habitats Directive. Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European Maritime and Fisheries Fund, LIFE and external action funds. See [EU taxonomy for sustainable activities](https://ec.europa.eu/info/publications/sustainable-finance-teg-taxonomy_en) . World Wildlife Fund (2019), [The Nature of Risk - A Framework for Understanding Nature-Related ](https://c402277.ssl.cf1.rackcdn.com/publications/1255/files/original/WWF_Nature_of_Risk.FINAL2.pdf?1568216828) [Risk to Business](https://c402277.ssl.cf1.rackcdn.com/publications/1255/files/original/WWF_Nature_of_Risk.FINAL2.pdf?1568216828) .", - "page_start": 17, - "page_end": 17, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "build on the headline ambition to ensure that by 2050 **all of the world’s ecosystems are restored, resilient, and adequately protected.** The world should commit to the net-gain principle to give nature back more than it takes. As part of this, the world should commit to no human-induced extinction of species, at minimum where avoidable.\n\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to ensure that **Europe's biodiversity will be on the path to recovery by 2030** for the benefit of people, the planet, the climate and our economy, in line with the 2030 Agenda for Sustainable Development and with the objectives of the Paris Agreement on Climate Change. It addresses the five main drivers of biodiversity loss, sets out an enhanced governance framework to fill remaining gaps, ensures the full implementation of EU legislation, and pulls together all existing efforts. This strategy is enterprising and incentivising in spirit and action. It reflects the fact that **protecting and restoring nature will need more than regulation alone** . It will require action by citizens, businesses, social partners and the research and knowledge community, as well as strong partnerships between local, regional, national and European level. This strategy is in line with the ambitions and commitment set out in President von der Leyen’s Political Guidelines and in the European Green Deal.\n\nAdopted in the heart of the COVID-19 pandemic, this strategy will also be a central\n\nelement of the EU’s recovery plan. It will be crucial to prevent and build resilience to future zoonosis outbreaks and to provide immediate business and investment opportunities for restoring the EU’s economy.\n\nAll new initiatives and proposals will be underpinned by the Commission’s better regulation tools. Based on public consultations and on the identification of the environmental, social and economic impacts, impact assessments will contribute to ensuring that all initiatives achieve their objectives in the most effective and least burdensome way and live up to a green oath to “do no harm”.\n\n## **2. P ROTECTING AND RESTORING NATURE IN THE E UROPEAN U NION**\n\nThe EU has legal frameworks, strategies and action plans to protect nature and restore habitats and species. But protection has been incomplete, restoration has been small- scale, and the implementation and enforcement of legislation has been insufficient <sup>17</sup> .\n\nTo put biodiversity on the path to recovery by 2030, we need to step up the protection and restoration of nature. This should be done by improving and **widening our network of protected areas** and by developing an ambitious **EU Nature Restoration Plan** .\n\n### **2.1. A coherent network of protected areas**\n\nBiodiversity fares better in protected areas. However, the current network of legally protected areas, including those under strict protection, is not sufficiently large to safeguard biodiversity. Evidence shows that the targets defined under the Convention on Biological Diversity are insufficient to adequately protect and restore nature <sup>18</sup> . Global", - "page_start": 3, - "page_end": 3, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "Excel Training Manual 1.pdf", - "query": "Give me some info about the scroll bars in excel", - "target_page": 6, - "target_passage": "Appear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "*Page 2*\n\n###### **N AVIGATING IN A F ILE**\n\n| Arrow Keys | Move one cell to the right, left, up or down |\n|:---|:---|\n| Tab | Move once cell to the right |\n| Ctrl+Home | To beginning file |\n| Ctrl+End | To end of typed information |\n| Home | Beginning of a line |\n| End | End of a line |\n| Page Down | Down one screen |\n| Page Up | Up one screen |\n| F5 | To a specific page |\n| Scroll bars | Appear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document. |", - "page_start": 5, - "page_end": 5, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Page 1*\n\n###### **U NDERSTANDING W ORKBOOKS**\n\nIn Microsoft Excel the data you enter, whether it consists of numbers, text, or formulas, is stored in a file known as a * **workbook** * . Workbooks are just like huge electronic books with pages (or\n\n* **sheets** * ) that have been ruled into columns and rows. Before using Excel it is helpful to know what the various parts and elements that make up a workbook are.\n\n A worksheet (or page) in a workbook contains 16,384 * **columns** * that are labelled using letters of the alphabet. The first column in a worksheet is labelled column * **A** * , while the last is labelled * **XFD** *\n\n A worksheet (or page) in a workbook contains 1,048,576 * **rows** * that are labelled using numbers from 1 to 1,048,576\n\n Where a column and row intersect we get what is known as a * **cell** * . You enter your data into these cells. Each cell in a worksheet can hold up to 32,767 characters - although it would be unrealistic to ever push it this far. Cells are referred to by their column and row labels. For example, in the screen above the cell we are pointing to is * **C11** * - this reference is known as the * **cell address** * and is most important as it is frequently used in commands and formulas\n\n When you start typing something, you want it to appear somewhere in the worksheet. As a consequence when the Status Bar shows * **Ready** * mode, at least one cell in the worksheet will be highlighted - this is known as the * **active cell** * . In the screen above, the active cell is cell * **A1** * - notice that the column label and the row label also appears coloured to indicate the active cell. You can have more than one active cell - when this occurs you have what is known as a * **range** *\n\n A workbook (as you would expect) is made up of pages known as * **worksheets** * . You can have as many sheets in a workbook as your computer resources can accommodate. As a default, a new blank workbook normally has 3 worksheets labelled *Sheet1* , *Sheet2* , and *Sheet3* . Of course these labels are pretty boring and meaningless and can be changed to something more relevant\n\n The * **Insert Worksheet** * button here will insert another worksheet into the current workbook should you need it\n\n## **1**\n\n## **2**\n\n## **5**\n\n## **3**\n\n## **4**\n\n## **6**", - "page_start": 4, - "page_end": 4, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "| Type of content Tags |\n|:---|\n| Picture with Alt Text in Cell <TD> <Figure> Alt= alt text |\n| Hyperlink on Cell <TD> <P> <Link> Link - OBJR <Span> text content |\n| Hyperlink on Object tag for object <Link> Link - OBJR |\n\nThe following types of content are marked as <Artifact> in the PDF Content Tree and\n\nhave no PDF/UA tags:\n\nSlicer scrollbar\n\nGrid lines\n\nCell borders\n\nCell shading\n\nDecorative graphical objects\n\nText in SmartArt objects\n\nThe information in this article is applicable to the following versions of Excel.\n\nExcel for Windows Version 2408 and later.\n\nExcel for Mac Version 16.89 and later.\n\nExcel for iOS Version 2.89 and later.\n\nExcel for Android Build 16.0.18025.XXXXX or later.\n\n**Artifacts**\n\n**Availability**", - "page_start": 47, - "page_end": 47, - "source_file": "office-pdf.pdf" - }, - { - "text": "###### **OMMON E RROR M ESSAGES**\n\nMicrosoft Excel has some in-built messages that can assist you when something goes wrong with a formula. These messages appear in the cell that contains the formula, and sometimes also\n\nother formula cells that depend upon it. The messages are always prefixed with a hash sign (#) and appear with a code. The more common error messages are listed below.\n\n**A Line of Hash (#) Signs**\n\nSometimes referred to as “tramlines”, a line of hash signs usually occurs because a column is not wide enough to display the numbers in the cell or formula. Widening the column will correct this problem - you can drag the column heading until the value in the cell appears as it should.\n\n**#DIV/0!**\n\nThis message means you are trying to divide a value by zero - this is mathematically impossible. In the example at the left we are trying to find the average number of persons per household. All is fine as long as there is a value greater than zero in cell B3 (Houses). As soon as we change this to a zero an error message appears in the formula cell (B5).\n\nTo prevent the error you will need to enter a value greater than zero into cell B3, the *divisor* cell.\n\n**#VALUE!**\n\nIn this message Excel is advising that something in the formula is not a value and therefore a calculation can’t be made.\n\nA close examination of the example at the left shows cell\n\nB3 contains the word “three”. Therefore the formula in cell B5 is trying to divide 192,664 (in cell B2) with a word, which doesn’t make sense.\n\nTo fix the error, a value (a number) will need to be entered in cell B3.\n\n**#NAME?**\n\nThis message appears when text is found in a\n\nformula that can’t be matched to either a legitimate function or range name.\n\nIn the example to the left, the formula has been entered as *=SOME(B3:B7)* - there is no such function as * **SOME** * , and presumably the author should have typed *=SUM(B3:B7)* .", - "page_start": 33, - "page_end": 33, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "### Make your meaning more visual by\n\n### formatting text\n\nTo format text, select it, and then select a button in the **Font** or **Paragraph** area on the Home\n\ntab.\n\n**Try it:** Select text in the lines below and choose formatting options so that the text is an\n\nexample of the formatting it’s describing:\n\nBold (keyboard shortcut: Ctrl+B)\n\nItalic (keyboard shortcut: Ctrl+I)\n\nHighlight\n\nFont color\n\nBullets\n\nNumbering\n\n**Pro tip:** If you selected whole words for this exercise, did you notice that Word popped up a\n\nlittle toolbar, with the font formatting options?\n\nBetween that and keyboard shortcuts like Ctrl+B\n\nand Ctrl+I, you save time by not having to go up to\n\nthe Home tab all the time.", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest\n\nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on\n\nor off audio Bluetooth for calls.\n\n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and\n\nscroll up and down to find the corresponding function.\n\n5) Long press the watch face interface and swipe to right or left to switch the watch face, select\n\none of them and set it with one-click.\n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the\n\nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of\n\n10 messages can be saved. The messages received after 10 messages will be overwritten one by\n\none.\n\n2) Swipe to the bottom to click the delete icon to clear all message records.\n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu\n\ninterface.\n\n1) Bluetooth connection status; time; power left;\n\n2) About, where you can check the firmware version of watch and the address of the Bluetooth\n\n3) Setting, where you can enter it to set part of the functions;\n\n4) Brightness adjustment; where you can adjust the brightness of the screen;\n\n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize\n\noffline payment.\n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off\n\nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling\n\nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the\n\nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when\n\nthey are successfully bound.\n\n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50\n\ncall records, and it will be automatically overwritten when 128 records are full. Click any call\n\nrecord to call back)\n\n3. Dial the keyboard, you can enter the phone number to make a call.\n\n**1.5 message**\n\nWhen the watch is successfully bound to the app, and you approve notifications of corresponding\n\napps in your mobile phone system, and switch on these apps or callings notifications functions on\n\nyour watch, the notifications on your mobile phone can synchronize to your watch.\n\n1.5.1. Incoming call notification:\n\nTurn on the incoming call reminder in the app. When the phone has a incoming call, the watch\n\nwill light up or vibrate.\n\n1.5.2. SMS notification:", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the\n\nmobile phone, the watch will receive one or more SMS reminders at the same time.\n\n1.5.3. Other application message notifications:\n\nTurn on the corresponding application message notification in the app, such as WeChat, QQ,\n\nOutlook, Facebook and other applications. When the mobile phone receives one/multiple\n\napplication message notifications, the watch will receive one/multiple corresponding message\n\nreminders at the same time.\n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile\n\nphone, then you can synchronize you contacts of your mobile phone to the smartwatch.\n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the\n\nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will\n\nbe wiped out at 00:00 every day in the morning.\n\n**1.8 Sports modes** (walking, running, cycling, rope skipping, badminton,\n\nbasketball, football)\n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the\n\nexercise; click the “Start” button again to pause the recording of the exercise; click the “End”\n\nbutton to end the recording, and save to the data.\n\n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the\n\nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be\n\nsaved.\n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the\n\nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly\n\nfor the measurement.\n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the\n\nECG interface in the app, you can have single measurement at a time. The data of ECG will be\n\nsaved in the mobile phone. This function should be used with the app.\n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other\n\n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to\n\noperate the function).\n\n**2.1 Remote control music**", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "#### **T HE C HARTING P ROCESS**\n\n* **Charts** * provide a way of seeing trends in the data in your worksheet. The charting feature in Excel is extremely flexible and powerful and allows you to create a wide range of charts from\n\nany of the * **Insert** * commands in the * **Charts** * group on the\n\n**Inserting Charts**\n\nThe first step when creating a chart is to select the data from the worksheet that you want to chart. It is important to remember that the selected range (which can be either contiguous or non-contiguous), should include *headings* (e.g. names of months, countries, departments, etc). These become *labels* on the chart. Secondly, the selected range should not (normally) include totals as these are inserted automatically when a chart is created.\n\nThe second step is to create a chart using the * **INSERT** * tab on the ribbon. You can choose a * **Recommended** * * **Chart** * where Excel analyses the selected data and suggests several possible chart layouts.\n\nAlternatively you can create the chart yourself from scratch by choosing one of the * **Insert** * commands in the * **Charts** * group. Charts that you create in Excel can be either *embedded* into a worksheet, or they can exist on their own sheets, known as * **chart sheets** * .\n\n**Chart Sheets**\n\nIf you want to keep your chart separate from the data you can move the chart to its own sheet. Chart sheets make it easier and more convenient to work with your\n\nchart because you’ll see more of it on the screen - since the data is not there!\n\n**Embedded Charts**\n\nCharts that appear within a worksheet are known as embedded charts. A chart is really an object that sits on top of the worksheet - unlike numbers and letters, charts are not actually placed into worksheet cells.", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "Quick Start Guide\n\n## New to Word? Use this guide to learn the basics.\n\n**Save your progress**\n\nSave your work on OneDrive\n\nor SharePoint automatically.\n\n**Find whatever you need**\n\nLook up commands from the ribbon,\n\nget Help, or search the web.\n\n**Discover contextual commands**\n\nSelect tables, pictures, or other objects\n\nin a document to reveal additional\n\noptions.\n\n**Share your work with others**\n\nInvite other people to view and edit\n\ncloud-based documents stored in\n\nOneDrive or on SharePoint sites.\n\n**Navigate with ease**\n\nUse the sidebar to manage long or\n\ncomplex documents. **Show or hide the ribbon**\n\nSelect the arrow icon to show\n\nor hide the Quick Access\n\nToolbar, and change ribbon\n\nsettings.\n\n**Format with the mini toolbar**\n\nSelect or right-click text and objects to\n\nquickly format them in place.\n\n**Status bar shortcuts**\n\nSelect any status bar indicator to\n\nnavigate your document, view word\n\ncount statistics, or check your spelling.\n\n**Change your view**\n\nSelect the status bar buttons to\n\nswitch between views, or use the\n\nslider to magnify the page to\n\nyour liking.", - "page_start": 0, - "page_end": 0, - "source_file": "Word QS.pdf" - }, - { - "text": "###### **W RAPPING A ND M ERGING T EXT**\n\nMicrosoft Excel will allow long cell entries to spill across to other adjacent cells to the right as long as those cells are empty. If those cells contain data the spill-over will be chopped off. If you need\n\nto place long text entries in a cell you can arrange for Microsoft Excel to wrap the text within the cell and also merge that cell with others to accommodate the longer text entry.\n\n**Try This Yourself:**\n\n* **Open** * * **File** *\n\n*Before starting this exercise* *you MUST open the file E723* *Cell Alignment_9.xlsx...*\n\n Click in cell * **A5** *\n\n*This cell contains a long text* *entry that spills across several* *columns…*  Click on the * **Expand Formula** * * **Bar** * tool to the right of the\n\nformula bar to see all of the text  Click on the * **Wrap Text** *\n\ncommand in the\n\n* **Alignment** * group on the * **Home** * tab to wrap the text in cell * **A5** *\n\n*Notice how the row height has* *now increased…*  Hold down the key and click in cell * **E5** * to select the range * **A5:E5** *  Click on the drop arrow\n\nfor * **Merge & Centre** * in the\n\n* **Alignment** * group and select **Merge Cells** to merge the cells in the range  Move the mouse pointer to the bottom of the row * **5** * heading border and drag the row height up until you reach * **30** * points\n\n**For Your Reference…**\n\n- To wrap text - click in the cell to merge and\n\nclick on the * **Wrap Text** * command in the\n\n* **Alignment** * group on the * **Home** * tab\n\n- To merge text - click on the drop arrow\n\nfor * **Merge & Centre** * in the * **Alignment** *\n\ngroup and select **Merge Cells**\n\n**Handy to Know…**\n\n- In the example above, wrapping forced the text into one cell and Excel expanded the row height so that all of the text was accommodated. We then merged the text across several horizontal cells in the exercise above so that we could reduce the row height to a more acceptable level.\n\n-\n\n## **1**\n\n## **3**\n\n## **5**", - "page_start": 25, - "page_end": 25, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "Excel Training Manual 1.pdf", - "query": "How to rename a worksheet in Excel ?", - "target_page": 12, - "target_passage": "To rename a worksheet: 1. Double click on the current name on the worksheet tab 2. Type the new name and press ", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "###### **G ROUPING W ORKSHEETS**\n\nWorksheet * **grouping** * enables you to make the same change at once to all selected worksheets. This feature is useful in situations where your worksheets have identical layouts or text. For\n\nexample, if you want to format the heading for multiple worksheets, you simply * **group** * the worksheets, make a change to one worksheet and the other worksheets will reflect the change also.\n\n**1 Try This Yourself:**\n\n* **Same File** *\n\n*Continue using the previous* *file with this exercise, or* *open the file E1324* *Worksheet* *Techniques_8.xlsx...*\n\n Click on the * **Admin** * worksheet tab, hold down , then click on the * **Shop** * worksheet tab to select the first three worksheets  Click in cell * **A1** * to select the cell  Click on the * **HOME** * tab, then click on * **Italics** * in the * **Font** * group\n\n*This will italicise the text in* *cell A1 on this and all other* *worksheets in the group…*  Click on the * **Maintenance** * worksheet tab, then the * **Shop** * worksheet tab to see that the changes have been applied here  Click on the * **IT** * worksheet tab to see that the changes have *not* been applied to this worksheet\n\n*Since this was not part of* *the grouped sheets the* *changes have not been* *applied here. Notice too that* *clicking on a tab deselects* *the previous grouping*\n\n## **2**\n\n## **3**\n\n## **4**\n\n## **5**\n\n**For Your Reference…**\n\nTo * **group** * * **worksheet** * * **tabs** * :\n\n1. Click on the first worksheet tab\n\n2. Hold down , then click on the last worksheet tab\n\n**Handy to Know…**\n\n- To deselect a group, either click on the tab of a worksheet that is not in the group, or right- click on a tab and select **Ungroup Sheets** .\n\n- Most formatting and text changes done on a worksheet in a group will be applied to other sheets in that grouping.", - "page_start": 14, - "page_end": 14, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "After clicking on the “Open Visualization” button, the user should execute the following steps:\n\n**Step 1: Select a Sheet Name**\n\nThe Portal is parsing the XLS file and lists all available worksheets. Select one of the sheets contained\n\nin the XLS file.\n\n**Step 2: The Grid View**\n\nThe grid appears once the user has clicked on a file name (and a sheet name in case of an Excel file).", - "page_start": 43, - "page_end": 43, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "*Page 1*\n\n###### **U NDERSTANDING W ORKBOOKS**\n\nIn Microsoft Excel the data you enter, whether it consists of numbers, text, or formulas, is stored in a file known as a * **workbook** * . Workbooks are just like huge electronic books with pages (or\n\n* **sheets** * ) that have been ruled into columns and rows. Before using Excel it is helpful to know what the various parts and elements that make up a workbook are.\n\n A worksheet (or page) in a workbook contains 16,384 * **columns** * that are labelled using letters of the alphabet. The first column in a worksheet is labelled column * **A** * , while the last is labelled * **XFD** *\n\n A worksheet (or page) in a workbook contains 1,048,576 * **rows** * that are labelled using numbers from 1 to 1,048,576\n\n Where a column and row intersect we get what is known as a * **cell** * . You enter your data into these cells. Each cell in a worksheet can hold up to 32,767 characters - although it would be unrealistic to ever push it this far. Cells are referred to by their column and row labels. For example, in the screen above the cell we are pointing to is * **C11** * - this reference is known as the * **cell address** * and is most important as it is frequently used in commands and formulas\n\n When you start typing something, you want it to appear somewhere in the worksheet. As a consequence when the Status Bar shows * **Ready** * mode, at least one cell in the worksheet will be highlighted - this is known as the * **active cell** * . In the screen above, the active cell is cell * **A1** * - notice that the column label and the row label also appears coloured to indicate the active cell. You can have more than one active cell - when this occurs you have what is known as a * **range** *\n\n A workbook (as you would expect) is made up of pages known as * **worksheets** * . You can have as many sheets in a workbook as your computer resources can accommodate. As a default, a new blank workbook normally has 3 worksheets labelled *Sheet1* , *Sheet2* , and *Sheet3* . Of course these labels are pretty boring and meaningless and can be changed to something more relevant\n\n The * **Insert Worksheet** * button here will insert another worksheet into the current workbook should you need it\n\n## **1**\n\n## **2**\n\n## **5**\n\n## **3**\n\n## **4**\n\n## **6**", - "page_start": 4, - "page_end": 4, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Page 8*\n\n###### **ENAMING A W ORKSHEET**\n\nBy default, Excel names worksheets as * **Sheet1** * , * **Sheet2** * , * **Sheet3** * , etc. These names are fine if you are not planning to share the workbook, but changing these to something more relevant\n\nmakes it much easier to understand the purpose of a worksheet. You can also adjust the horizontal scroll bar to make room for longer, more meaningful worksheet names.\n\n**Try This Yourself:**\n\n* **Same** * * **File** *\n\n*Continue using the previous* *file with this exercise, or open* *the file E1324 Worksheet* *Techniques_2.xlsx...*\n\n Point to the vertical dots between the sheet names and the horizontal scroll bar, as shown\n\n*The pointer will change to a* *double-headed arrow...*  Click and drag the bar across to the right, to the end of column * **L** * , then release the mouse button  Double-click on * **Sheet1 (5)** * to select the worksheet tab name\n\n*This will also place it into edit* *mode…*  Type **Comms** , then press\n\n Repeat steps * **3** * and * **4** * to rename the other worksheets:\n\n* **Sheet1 (4)** * **Admin** * **Sheet1 (3)** * **Shop** * **Sheet1 (2)** * **IT** * **Sheet1** * **Maintenance**\n\n## **1**\n\n## **3**\n\n## **4**\n\n## **5**\n\n**For Your Reference…**\n\nTo * **rename** * a * **worksheet** * :\n\n1. Double click on the current name on the worksheet tab\n\n2. Type the new name and press\n\n**Handy to Know…**\n\n- You can rename a worksheet by right-clicking on the worksheet tab to display the shortcut menu and clicking on * **Rename** * .\n\n- A worksheet tab name can contain up to 31 characters including spaces, but it is better to keep it short and succinct.", - "page_start": 11, - "page_end": 11, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Page 6*\n\n###### **I NSERTING A ND D ELETING W ORKSHEETS**\n\nOnce you’ve decided on a structure for your workbook, you may find that there are some worksheets that can be * **deleted** * . Alternatively, you may find that you need additional blank\n\nworksheets * **inserted** * . However, remember that\n\ndeletion of worksheets is permanent and can’t be undone using * **Undo** * , so always save your workbook before making these changes.\n\n**Try This Yourself:**\n\n* **Open** * * **File** *\n\n*Before starting this exercise* *you MUST open the file* *E1324 Worksheet* *Techniques_1.xlsx…*\n\n Examine the workbook - it currently contains one worksheet named * **Sheet1** *  Click on the * **New Sheet** * icon at the end of the worksheet tabs\n\n*A new worksheet named* *Sheet2 will be inserted. You* *can also use the keyboard* *shortcut...*  Press + to insert another new worksheet\n\n*This sheet is named Sheet3* *and is inserted before the* *currently selected sheet.* *Now let’s delete a sheet...*  Right-click on the * **Sheet3** * worksheet tab to display the shortcut menu  Select **Delete** to remove the worksheet\n\n*As the worksheet contains no* *data, the sheet will be* *deleted immediately. If a* *worksheet contains data,* *Excel will ask you to confirm* *your actions...*  Repeat steps * **4** * and * **5** * to delete * **Sheet2** *\n\n## **1**\n\n## **2**\n\n## **3**\n\n## **4**\n\n**For Your Reference…**\n\nTo * **insert** * a * **new** * * **worksheet** * into a * **workbook** * :\n\n- Click on the * **New Sheet** * icon to the right of the worksheet tabs\n\nTo * **delete** * a * **worksheet** * from a * **workbook** * :\n\n- Right click on the worksheet tab, then select **Delete**\n\n**Handy to Know…**\n\n- To insert a worksheet between existing worksheets, right-click on the worksheet tab before which you want to insert a new sheet, then click on * **Insert** * to display the * **Insert** * dialog box. Select * **Worksheet** * and click on **[OK]** .\n\n## **5**", - "page_start": 9, - "page_end": 9, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "#### **T HE C HARTING P ROCESS**\n\n* **Charts** * provide a way of seeing trends in the data in your worksheet. The charting feature in Excel is extremely flexible and powerful and allows you to create a wide range of charts from\n\nany of the * **Insert** * commands in the * **Charts** * group on the\n\n**Inserting Charts**\n\nThe first step when creating a chart is to select the data from the worksheet that you want to chart. It is important to remember that the selected range (which can be either contiguous or non-contiguous), should include *headings* (e.g. names of months, countries, departments, etc). These become *labels* on the chart. Secondly, the selected range should not (normally) include totals as these are inserted automatically when a chart is created.\n\nThe second step is to create a chart using the * **INSERT** * tab on the ribbon. You can choose a * **Recommended** * * **Chart** * where Excel analyses the selected data and suggests several possible chart layouts.\n\nAlternatively you can create the chart yourself from scratch by choosing one of the * **Insert** * commands in the * **Charts** * group. Charts that you create in Excel can be either *embedded* into a worksheet, or they can exist on their own sheets, known as * **chart sheets** * .\n\n**Chart Sheets**\n\nIf you want to keep your chart separate from the data you can move the chart to its own sheet. Chart sheets make it easier and more convenient to work with your\n\nchart because you’ll see more of it on the screen - since the data is not there!\n\n**Embedded Charts**\n\nCharts that appear within a worksheet are known as embedded charts. A chart is really an object that sits on top of the worksheet - unlike numbers and letters, charts are not actually placed into worksheet cells.", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Page 9*\n\n###### **M OVING OR C OPYING A S HEET T O A NOTHER W ORKBOOK**\n\nYou can * **copy** * worksheets to other workbooks as required. For example, you might need to keep records for six different divisions - rather than send each division the entire set of records, you\n\ncan copy their worksheet to another workbook and send them their data only. If worksheets exist in the other workbook, you will need to determine the order in which to place the copied worksheet.\n\n**Try This Yourself:**\n\n* **Same File** *\n\n*Continue using the* *previous file with this* *exercise, or open the file* *E1324 Worksheet* *Techniques_6.xlsx...*\n\n Click on the * **Maintenance** * worksheet tab\n\n*We’ll copy this completed* *data to another workbook...*  Right-click on the worksheet tab to display the shortcut menu, then click on * **Move or Copy** * to display the * **Move or Copy** * dialog box  Click on the drop arrow for * **To book** * , then select **(new book)**  Click on * **Create a copy** * so it appears ticked\n\n*This will create a new* *workbook as well as* *making a copy of the* *worksheet...*  Click on **[OK]**\n\n*A new workbook will be* *created and Maintenance* *will be the only worksheet* *in the workbook…*  Save the new workbook as * **Maintenance.xlsx** * , then close it\n\n## **1**\n\n## **2 4**\n\n**For Your Reference…**\n\nTo * **copy** * a * **sheet** * to * **another** * * **workbook** * :\n\n1. Right click on the worksheet tab, then click on * **Move or Copy** *\n\n2. Select either * **(new book)** * or the name of another workbook in * **To book** *\n\n3. Tick * **Create a copy** * , then click on **[OK]**\n\n**Handy to Know…**\n\n- To copy a worksheet into an existing workbook, make sure that you open the destination workbook first to ensure that it is listed in * **To book** * in the * **Move or Copy** * dialog box.\n\n## **5**", - "page_start": 12, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Page 7*\n\n###### **OPYING A W ORKSHEET**\n\nJust as you can copy the contents of cells and ranges within a worksheet, you can * **duplicate** * worksheets within a workbook. This technique is ideal for replicating layouts. For example, if you\n\nhave a budget workbook that contains data for several departments, you can create a worksheet for the first department and then copy it to create identical worksheets for other departments.\n\n**Try This Yourself:**\n\n* **Same** * * **File** *\n\n*Continue using the previous* *file with this exercise, or open* *the file E1324 Worksheet* *Techniques_1.xlsx...*\n\n Right-click on * **Sheet1** * to display the worksheet shortcut menu  Select **Move or Copy** to display the * **Move or Copy** * dialog box  Click on * **Create a copy** * so it appears ticked, then click on **[OK]**\n\n*The new worksheet is named*\n\n*Sheet1 (2). Let’s create a* *“template” from this worksheet* *by deleting unwanted data...*  Select the range * **B7:E9** * , then press to clear it  Repeat step * **4** * to clear the ranges * **B14:E23** * , * **G7:J9** * and * **G14:J23** * , then press + to return to cell * **A1** *\n\n*Now we can copy this* *“template” to create additional* *worksheets...*  Repeat steps * **1** * to * **3** * three times to create three copies of the *template* worksheet - this time without data\n\n*The final worksheet should be* *named Sheet1 (5)*\n\n## **1**\n\n## **2**\n\n**For Your Reference…**\n\nTo * **copy** * a * **worksheet** * :\n\n1. Right-click on the worksheet to copy, then select * **Move or Copy** *\n\n2. Click on * **Create a copy** * so it appears ticked\n\n3. Click on **[OK]**\n\n**Handy to Know…**\n\n- You can copy the current worksheet using the * **HOME** * tab by clicking on * **Format** * in the * **Cells** * group, then clicking on * **Move or Copy** * * **Sheet** * .\n\n- The * **Before sheet** * options in the * **Move or** * * **Copy** * dialog box allow you to position the copied worksheet where you want.\n\n## **3**\n\n## **6**", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "###### **ELETING A C HART**\n\n**Try This Yourself:**\n\n* **Same File** *\n\n*Continue using the* *previous file with this* *exercise, or open the* *file E1317* *Charting_12.xlsx...*\n\n Click on * **Sheet 2** * to see the chart in the worksheet, then click on the chart to select it  Press to delete the chart\n\n## **1**\n\n**For Your Reference…**\n\nTo * **delete** * a * **chart** * :\n\n1. Click on the worksheet to see the chart, then click on the chart to select it\n\n2. Press\n\nIf you no longer require a chart you can easily delete it. With embedded charts you must first select the chart in the worksheet and then press the key to delete the chart. With charts in\n\nchart sheets you can delete the sheet by right clicking on the chart sheet tab and choosing the deletion option.\n\n## **2**\n\n**Handy to Know…**\n\n- Because it is so easy to delete a chart object it is also easy to delete it by accident! Remember, you can use the * **Undo** * feature in Excel to restore accidental deletions.", - "page_start": 57, - "page_end": 57, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "###### **HANGING W ORKSHEET T AB C OLOURS**\n\nTo make it easier for you to distinguish between worksheets, Excel enables you to change the colours of worksheet tabs. This allows you, for example, to quickly distinguish between different\n\nfinancial years, departments or months. The * **active** * * **sheet** * appears as underlined in a gradient version of the selected colour, while inactive tabs will display a solid colour background.\n\n**2 Try This Yourself:**\n\n* **Same** * * **File** *\n\n*Continue using the previous* *file with this exercise, or open* *the file E1324 Worksheet* *Techniques_7.xlsx...*\n\n Click on the * **Admin** * worksheet tab to select the worksheet  Right-click on the worksheet tab to display the shortcut menu, then point to * **Tab** * * **colour** *\n\n*This will display a palette of* *colour options…*  Click on * **Red** * under * **Standard colours** * to apply the colour to the tab  Right-click on the * **Maintenance** * worksheet tab to display the shortcut menu, click on * **Tab colour** * , then click on * **Blue** * under * **Standard colours** *\n\n*Notice how the Admin* *worksheet tab colour is now* *a solid rather than a* *gradient…*  Repeat either technique to apply the following colours:\n\n* **Shop** * * **Yellow** * * **IT** * * **Green** *  Click on the * **Admin** * worksheet tab to view the results\n\n## **3**\n\n## **4**\n\n## **5**\n\n## **6**\n\n**For Your Reference…**\n\nTo * **change the colour** * of a * **worksheet** * * **tab** * :\n\n1. Right-click on the worksheet tab to display the shortcut menu\n\n2. Point to * **Tab colour** * to display a palette of colour options\n\n3. Click on the desired colour\n\n**Handy to Know…**\n\n- To apply the same colour to two or more sheets at once, select them first. Hold down to select consecutive worksheets or hold down to select non-consecutive worksheets.", - "page_start": 13, - "page_end": 13, - "source_file": "Excel Training Manual 1.pdf" - } - ] - }, - { - "references": { - "source_file": "Excel Training Manual 1.pdf", - "query": "I want to freeze a pane in my Excel worksheet ", - "target_page": 16, - "target_passage": "To freeze panes in a worksheet: 1. Click in the cell below and to the right of the area you want to freeze/unfreeze 2. Click on the VIEW tab 3. Click on Freeze Panes in the Window group, then select Freeze Panes ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "*Page 1*\n\n###### **U NDERSTANDING W ORKBOOKS**\n\nIn Microsoft Excel the data you enter, whether it consists of numbers, text, or formulas, is stored in a file known as a * **workbook** * . Workbooks are just like huge electronic books with pages (or\n\n* **sheets** * ) that have been ruled into columns and rows. Before using Excel it is helpful to know what the various parts and elements that make up a workbook are.\n\n A worksheet (or page) in a workbook contains 16,384 * **columns** * that are labelled using letters of the alphabet. The first column in a worksheet is labelled column * **A** * , while the last is labelled * **XFD** *\n\n A worksheet (or page) in a workbook contains 1,048,576 * **rows** * that are labelled using numbers from 1 to 1,048,576\n\n Where a column and row intersect we get what is known as a * **cell** * . You enter your data into these cells. Each cell in a worksheet can hold up to 32,767 characters - although it would be unrealistic to ever push it this far. Cells are referred to by their column and row labels. For example, in the screen above the cell we are pointing to is * **C11** * - this reference is known as the * **cell address** * and is most important as it is frequently used in commands and formulas\n\n When you start typing something, you want it to appear somewhere in the worksheet. As a consequence when the Status Bar shows * **Ready** * mode, at least one cell in the worksheet will be highlighted - this is known as the * **active cell** * . In the screen above, the active cell is cell * **A1** * - notice that the column label and the row label also appears coloured to indicate the active cell. You can have more than one active cell - when this occurs you have what is known as a * **range** *\n\n A workbook (as you would expect) is made up of pages known as * **worksheets** * . You can have as many sheets in a workbook as your computer resources can accommodate. As a default, a new blank workbook normally has 3 worksheets labelled *Sheet1* , *Sheet2* , and *Sheet3* . Of course these labels are pretty boring and meaningless and can be changed to something more relevant\n\n The * **Insert Worksheet** * button here will insert another worksheet into the current workbook should you need it\n\n## **1**\n\n## **2**\n\n## **5**\n\n## **3**\n\n## **4**\n\n## **6**", - "page_start": 4, - "page_end": 4, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "After clicking on the “Open Visualization” button, the user should execute the following steps:\n\n**Step 1: Select a Sheet Name**\n\nThe Portal is parsing the XLS file and lists all available worksheets. Select one of the sheets contained\n\nin the XLS file.\n\n**Step 2: The Grid View**\n\nThe grid appears once the user has clicked on a file name (and a sheet name in case of an Excel file).", - "page_start": 43, - "page_end": 43, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - }, - { - "text": "#### **T HE C HARTING P ROCESS**\n\n* **Charts** * provide a way of seeing trends in the data in your worksheet. The charting feature in Excel is extremely flexible and powerful and allows you to create a wide range of charts from\n\nany of the * **Insert** * commands in the * **Charts** * group on the\n\n**Inserting Charts**\n\nThe first step when creating a chart is to select the data from the worksheet that you want to chart. It is important to remember that the selected range (which can be either contiguous or non-contiguous), should include *headings* (e.g. names of months, countries, departments, etc). These become *labels* on the chart. Secondly, the selected range should not (normally) include totals as these are inserted automatically when a chart is created.\n\nThe second step is to create a chart using the * **INSERT** * tab on the ribbon. You can choose a * **Recommended** * * **Chart** * where Excel analyses the selected data and suggests several possible chart layouts.\n\nAlternatively you can create the chart yourself from scratch by choosing one of the * **Insert** * commands in the * **Charts** * group. Charts that you create in Excel can be either *embedded* into a worksheet, or they can exist on their own sheets, known as * **chart sheets** * .\n\n**Chart Sheets**\n\nIf you want to keep your chart separate from the data you can move the chart to its own sheet. Chart sheets make it easier and more convenient to work with your\n\nchart because you’ll see more of it on the screen - since the data is not there!\n\n**Embedded Charts**\n\nCharts that appear within a worksheet are known as embedded charts. A chart is really an object that sits on top of the worksheet - unlike numbers and letters, charts are not actually placed into worksheet cells.", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "###### **G ROUPING W ORKSHEETS**\n\nWorksheet * **grouping** * enables you to make the same change at once to all selected worksheets. This feature is useful in situations where your worksheets have identical layouts or text. For\n\nexample, if you want to format the heading for multiple worksheets, you simply * **group** * the worksheets, make a change to one worksheet and the other worksheets will reflect the change also.\n\n**1 Try This Yourself:**\n\n* **Same File** *\n\n*Continue using the previous* *file with this exercise, or* *open the file E1324* *Worksheet* *Techniques_8.xlsx...*\n\n Click on the * **Admin** * worksheet tab, hold down , then click on the * **Shop** * worksheet tab to select the first three worksheets  Click in cell * **A1** * to select the cell  Click on the * **HOME** * tab, then click on * **Italics** * in the * **Font** * group\n\n*This will italicise the text in* *cell A1 on this and all other* *worksheets in the group…*  Click on the * **Maintenance** * worksheet tab, then the * **Shop** * worksheet tab to see that the changes have been applied here  Click on the * **IT** * worksheet tab to see that the changes have *not* been applied to this worksheet\n\n*Since this was not part of* *the grouped sheets the* *changes have not been* *applied here. Notice too that* *clicking on a tab deselects* *the previous grouping*\n\n## **2**\n\n## **3**\n\n## **4**\n\n## **5**\n\n**For Your Reference…**\n\nTo * **group** * * **worksheet** * * **tabs** * :\n\n1. Click on the first worksheet tab\n\n2. Hold down , then click on the last worksheet tab\n\n**Handy to Know…**\n\n- To deselect a group, either click on the tab of a worksheet that is not in the group, or right- click on a tab and select **Ungroup Sheets** .\n\n- Most formatting and text changes done on a worksheet in a group will be applied to other sheets in that grouping.", - "page_start": 14, - "page_end": 14, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Page 6*\n\n###### **I NSERTING A ND D ELETING W ORKSHEETS**\n\nOnce you’ve decided on a structure for your workbook, you may find that there are some worksheets that can be * **deleted** * . Alternatively, you may find that you need additional blank\n\nworksheets * **inserted** * . However, remember that\n\ndeletion of worksheets is permanent and can’t be undone using * **Undo** * , so always save your workbook before making these changes.\n\n**Try This Yourself:**\n\n* **Open** * * **File** *\n\n*Before starting this exercise* *you MUST open the file* *E1324 Worksheet* *Techniques_1.xlsx…*\n\n Examine the workbook - it currently contains one worksheet named * **Sheet1** *  Click on the * **New Sheet** * icon at the end of the worksheet tabs\n\n*A new worksheet named* *Sheet2 will be inserted. You* *can also use the keyboard* *shortcut...*  Press + to insert another new worksheet\n\n*This sheet is named Sheet3* *and is inserted before the* *currently selected sheet.* *Now let’s delete a sheet...*  Right-click on the * **Sheet3** * worksheet tab to display the shortcut menu  Select **Delete** to remove the worksheet\n\n*As the worksheet contains no* *data, the sheet will be* *deleted immediately. If a* *worksheet contains data,* *Excel will ask you to confirm* *your actions...*  Repeat steps * **4** * and * **5** * to delete * **Sheet2** *\n\n## **1**\n\n## **2**\n\n## **3**\n\n## **4**\n\n**For Your Reference…**\n\nTo * **insert** * a * **new** * * **worksheet** * into a * **workbook** * :\n\n- Click on the * **New Sheet** * icon to the right of the worksheet tabs\n\nTo * **delete** * a * **worksheet** * from a * **workbook** * :\n\n- Right click on the worksheet tab, then select **Delete**\n\n**Handy to Know…**\n\n- To insert a worksheet between existing worksheets, right-click on the worksheet tab before which you want to insert a new sheet, then click on * **Insert** * to display the * **Insert** * dialog box. Select * **Worksheet** * and click on **[OK]** .\n\n## **5**", - "page_start": 9, - "page_end": 9, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "###### **ELETING A C HART**\n\n**Try This Yourself:**\n\n* **Same File** *\n\n*Continue using the* *previous file with this* *exercise, or open the* *file E1317* *Charting_12.xlsx...*\n\n Click on * **Sheet 2** * to see the chart in the worksheet, then click on the chart to select it  Press to delete the chart\n\n## **1**\n\n**For Your Reference…**\n\nTo * **delete** * a * **chart** * :\n\n1. Click on the worksheet to see the chart, then click on the chart to select it\n\n2. Press\n\nIf you no longer require a chart you can easily delete it. With embedded charts you must first select the chart in the worksheet and then press the key to delete the chart. With charts in\n\nchart sheets you can delete the sheet by right clicking on the chart sheet tab and choosing the deletion option.\n\n## **2**\n\n**Handy to Know…**\n\n- Because it is so easy to delete a chart object it is also easy to delete it by accident! Remember, you can use the * **Undo** * feature in Excel to restore accidental deletions.", - "page_start": 57, - "page_end": 57, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "| Number Improvement Word Excel PowerPoint |\n|:---|\n| Hyperlink to Sheet within the Workbook |\n| 103 Added bookmarks for sections and slides Yes |\n| 104 Added the Presentation.ExportAsFixedFormat3 method to the Object Model in PowerPoint to export as PDF with all of the accessibility improvements listed here enabled Yes |", - "page_start": 43, - "page_end": 43, - "source_file": "office-pdf.pdf" - }, - { - "text": "*Page 9*\n\n###### **M OVING OR C OPYING A S HEET T O A NOTHER W ORKBOOK**\n\nYou can * **copy** * worksheets to other workbooks as required. For example, you might need to keep records for six different divisions - rather than send each division the entire set of records, you\n\ncan copy their worksheet to another workbook and send them their data only. If worksheets exist in the other workbook, you will need to determine the order in which to place the copied worksheet.\n\n**Try This Yourself:**\n\n* **Same File** *\n\n*Continue using the* *previous file with this* *exercise, or open the file* *E1324 Worksheet* *Techniques_6.xlsx...*\n\n Click on the * **Maintenance** * worksheet tab\n\n*We’ll copy this completed* *data to another workbook...*  Right-click on the worksheet tab to display the shortcut menu, then click on * **Move or Copy** * to display the * **Move or Copy** * dialog box  Click on the drop arrow for * **To book** * , then select **(new book)**  Click on * **Create a copy** * so it appears ticked\n\n*This will create a new* *workbook as well as* *making a copy of the* *worksheet...*  Click on **[OK]**\n\n*A new workbook will be* *created and Maintenance* *will be the only worksheet* *in the workbook…*  Save the new workbook as * **Maintenance.xlsx** * , then close it\n\n## **1**\n\n## **2 4**\n\n**For Your Reference…**\n\nTo * **copy** * a * **sheet** * to * **another** * * **workbook** * :\n\n1. Right click on the worksheet tab, then click on * **Move or Copy** *\n\n2. Select either * **(new book)** * or the name of another workbook in * **To book** *\n\n3. Tick * **Create a copy** * , then click on **[OK]**\n\n**Handy to Know…**\n\n- To copy a worksheet into an existing workbook, make sure that you open the destination workbook first to ensure that it is listed in * **To book** * in the * **Move or Copy** * dialog box.\n\n## **5**", - "page_start": 12, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "*Page 7*\n\n###### **OPYING A W ORKSHEET**\n\nJust as you can copy the contents of cells and ranges within a worksheet, you can * **duplicate** * worksheets within a workbook. This technique is ideal for replicating layouts. For example, if you\n\nhave a budget workbook that contains data for several departments, you can create a worksheet for the first department and then copy it to create identical worksheets for other departments.\n\n**Try This Yourself:**\n\n* **Same** * * **File** *\n\n*Continue using the previous* *file with this exercise, or open* *the file E1324 Worksheet* *Techniques_1.xlsx...*\n\n Right-click on * **Sheet1** * to display the worksheet shortcut menu  Select **Move or Copy** to display the * **Move or Copy** * dialog box  Click on * **Create a copy** * so it appears ticked, then click on **[OK]**\n\n*The new worksheet is named*\n\n*Sheet1 (2). Let’s create a* *“template” from this worksheet* *by deleting unwanted data...*  Select the range * **B7:E9** * , then press to clear it  Repeat step * **4** * to clear the ranges * **B14:E23** * , * **G7:J9** * and * **G14:J23** * , then press + to return to cell * **A1** *\n\n*Now we can copy this* *“template” to create additional* *worksheets...*  Repeat steps * **1** * to * **3** * three times to create three copies of the *template* worksheet - this time without data\n\n*The final worksheet should be* *named Sheet1 (5)*\n\n## **1**\n\n## **2**\n\n**For Your Reference…**\n\nTo * **copy** * a * **worksheet** * :\n\n1. Right-click on the worksheet to copy, then select * **Move or Copy** *\n\n2. Click on * **Create a copy** * so it appears ticked\n\n3. Click on **[OK]**\n\n**Handy to Know…**\n\n- You can copy the current worksheet using the * **HOME** * tab by clicking on * **Format** * in the * **Cells** * group, then clicking on * **Move or Copy** * * **Sheet** * .\n\n- The * **Before sheet** * options in the * **Move or** * * **Copy** * dialog box allow you to position the copied worksheet where you want.\n\n## **3**\n\n## **6**", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "### Make your meaning more visual by\n\n### formatting text\n\nTo format text, select it, and then select a button in the **Font** or **Paragraph** area on the Home\n\ntab.\n\n**Try it:** Select text in the lines below and choose formatting options so that the text is an\n\nexample of the formatting it’s describing:\n\nBold (keyboard shortcut: Ctrl+B)\n\nItalic (keyboard shortcut: Ctrl+I)\n\nHighlight\n\nFont color\n\nBullets\n\nNumbering\n\n**Pro tip:** If you selected whole words for this exercise, did you notice that Word popped up a\n\nlittle toolbar, with the font formatting options?\n\nBetween that and keyboard shortcuts like Ctrl+B\n\nand Ctrl+I, you save time by not having to go up to\n\nthe Home tab all the time.", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" - } - ] - }, - { - "references": { - "source_file": "office-pdf.pdf", - "query": "What is the msodocexStructTypeArticle type value ?", - "target_page": 21, - "target_passage": "A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "| Type Value Description |\n|:---|\n| msodocexStructTypeTOC A table of contents. |\n| msodocexStructTypeTOCI An item in a table of contents. |\n| msodocexStructTypeExtLink A link to an external resource. |\n| msodocexStructTypeIntLink A link to an internal resource. |\n| msodocexStructTypeFootnote A footnote. |\n| msodocexStructTypeEndnote An endnote. |\n| msodocexStructTypeTextbox A text box. |\n| msodocexStructTypeHeader A block of text forming a header. |\n| msodocexStructTypeFooter A footer. |\n| msodocexStructInlineShape An inline shape. |\n| msodocexStructAnnotation An annotation. |\n| msodocexStructTypeSpanBlock A block of text. |\n| msodocexStructTypeWorkbook A workbook. |\n| msodocexStructTypeWorksheet A worksheet. |\n| msodocexStructTypeMacrosheet A macrosheet. |\n| msodocexStructTypeChartsheet A chartsheet. |\n| msodocexStructTypeDialogsheet A dialogsheet. |\n| msodocexStructTypeSlide A slide. |\n| msodocexStructTypeChart A chart. |\n| msodocexStructTypeDiagram A SmartArt diagram. |\n| msodocexStructTypeBulletText Buller text. |\n| msodocexStructTypeTextLine A line of text. |\n| msodocexStructTypeDropCap A drop cap. |\n| msodocexStructTypeSection A section. |\n| msodocexStructTypeAnnotationBegin The beginning of an annotation. |\n| msodocexStructTypeAnnotationEnd The end of an annotation. |", - "page_start": 21, - "page_end": 21, - "source_file": "office-pdf.pdf" - }, - { - "text": "The **idNode** member specifies the ID of the node. This member may not have a value of\n\n**0** . A value of **-1** indicates that child nodes do not use the **idNodeParent** member to\n\nspecify this node as their parent. Instead, this node can be a parent only by enclosing\n\nchild nodes in the EMF. Multiple nodes can have a ID of **-1** . If the ID is not **-1** , the value is\n\nunique across the document.\n\nThe **nodetype** specifies the type of structure node. This member is equal to one of the\n\nvalues from the **MSODOCEXSTRUCTTYPE** enumeration type. The following table lists\n\nexamples of document structure node types.\n\nTable 7. Document structure node types\n\n| Type Value Description |\n|:---|\n| msodocexStructTypePara A block of text within an article. Its parent node must be an article. |\n| msodocexStructTypeFigure A graphical element (for example, an image or collection of shapes) that has a textual representation. The textual representation is the alternate text used for reading or searching the document. |\n| msodocexStructTypeArticle A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles. |\n| msodocexStructTypeHeading A heading in the text. |\n| msodocexStructTypeTable A block of text forming a table. |\n| msodocexStructTypeTR A block of text forming a single row of a table. |\n| msodocexStructTypeTD A block of text forming a single cell in a table row. |\n| msodocexStructTypeTH A block of text forming a single header cell in a table row. |\n| msodocexStructTypeList A block of text forming a list. |\n| msodocexStructTypeListItem A block of text forming a list item. |\n| msodocexStructTypeListBody A block of text forming the body of a list item. |\n| msodocexStructTypeDocument A document. |\n| msodocexStructTypePage A page in the document. |\n\nノ **Expand table**", - "page_start": 20, - "page_end": 20, - "source_file": "office-pdf.pdf" - }, - { - "text": "**shapeProperty** is for a msodocexStructTypeFigure where the content is a shape,\n\ntext box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY\n\nenumeration.\n\n**tableAttr** is the table cell attributes for a msodocexStructTypeTH or\n\nmsodocexStructTypeTD.\n\n**idTableHeader** is the unique id for an msodocexStructTypeTH or\n\nmsodocexStructTypeTD.\n\n**iTargetParentId** is the id of the node to reparent an msodocexStructTypeDiagram\n\nto.\n\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE\n\n| Value Description |\n|:---|\n| msodocexLineBreakTypeNormal Normal line break. |\n| msodocexLineBreakTypeManual Manual line break. |\n| msodocexLineBreakTypeEOP End of paragraph. |\n\nTable 4. Enumerated values of MSODOCEXLISTTYPE\n\n| Value Description |\n|:---|\n| msodocexListTypeNone No bullets or numbering. |\n| msodocexListTypeBulletDisc Disc-shaped bullets. |\n| msodocexListTypeBulletCircle Circle-shaped bullets. |\n| msodocexListTypeBulletSquare Square-shaped bullets. |\n| msodocexListTypeBulletDecimal Decimal numbering. |\n| msodocexListTypeUpperRoman Uppercase Roman numeral numbering. |\n| msodocexListTypeLowerRoman Lowercase Roman numberal numbering. |\n| msodocexListTypeUpperAlpha Uppercase alphabetic numbering. |\n| msodocexListTypeLowerAlpha Lowercase alphabetic numbering. |\n\nTable 5. Enumerated values of MSODOCEXSHAPEPROPERTY bit fields\n\nノ **Expand table**\n\nノ **Expand table**", - "page_start": 9, - "page_end": 9, - "source_file": "office-pdf.pdf" - }, - { - "text": "The **idNode** member specifies the ID of the node being passed in the call to\n\n**HrBeginStructNode** . This member may not have a value of **0** . A value of **-1** indicates that\n\nchild nodes do not use the *idNodeParent* parameter to specify this node as their parent.\n\nInstead, this node can be a parent only by enclosing child nodes in the EMF. Multiple\n\nnodes can have an ID of **-1** . If the ID is not **-1** , the value is unique across the document.\n\nThe embedded union at the end of the MSODOCEXSTRUCTNODE is interpreted\n\ndifferently depending on the type of node:\n\n**iHeadingLevel** is the heading level for an msodocexStructTypeHeading.\n\n**idPara** is the paragraph id for a P, TOCI, or ListBody.\n\n**idDropCap** is the id of an msodocexStructTypeDropCap.\n\n**iPage** is the page number for an msodocexStructTypePage.\n\n**bt** is the line break type for an msodocexStructTypeTextLine.\n\n**iListLevel** is the list level for an msodocexStructTypeList or\n\nmsodocexStructTypeListItem.\n\n**listType** is the list type for an msodocexStructTypeListItem.\n\n**idAtn** is the id of an msodocexStructTypeAnnotationBegin or\n\nmsodocexStructTypeAnnotationEnd.\n\n**cpLim** is used to determine the nesting order of tables within tables for an\n\nmsodocexStructTypeTable, msodocexStructTypeTOC, or\n\nmsodocexStructTypeListBody.\n\ntypedef struct _ MsoDocexStructNode\n\n{\n\nint idNode;\n\nMSODOCEXSTRUCTTYPE nodetype;\n\nWCHAR* pwchAltText;\n\nunion\n\n{\n\nint iHeadingLevel;\n\nULONG idPara;\n\nULONG idDropCap;\n\nint iPage;\n\nWCHAR* pwchActualText;\n\nMSODOCEXLINEBREAKTYPE bt;\n\nint iListLevel;\n\nMSODOCEXLISTTYPE listType;\n\nULONG idAtn;\n\nlong cpLim;\n\nint shapeProperty;\n\nMsoDocexTableAttr tableAttr;\n\nWCHAR* idTableHeader;\n\nint iTargetParentId;\n\n};\n\n} MSODOCEXSTRUCTNODE;", - "page_start": 8, - "page_end": 8, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Type Value Description |\n|:---|\n| msodocexStructTypeParaRTLAttr A block of text within an article with right-to-left layout. |\n| msodocexStructTypeTableRTLAttr A block of text forming a table with right-to-left layout. |\n| msodocexStructTypeHeadingRTLAttr A heading in the text with right-to-left layout. |\n| msodocexStructTypeListItemRTLAttr A block of text forming a list item with right-to-left layout. |\n| msodocexStructTypeParaUnannotatableAttr A block of text within an article that is not annotatable. |\n| msodocexStructTypeTHead The header row area in a table. |\n| msodocexStructTypeTBody The body area in a table, i.e. the portion between the THead and TFoot. |\n| msodocexStructTypeLabel A label. |\n| msodocexStructTypeEquation An equation. |\n| msodocexStructTypeIntLinkNoteRef A footnote or endnote reference mark link. |\n| msodocexStructTypeTFoot The footer row area in a table. |\n\n**fContentNode** Specifies whether a **DocExComment_EndStructNode** structure marks\n\nthe end of this structure node. If **fContentNode** is **true** , a\n\n**DocExComment_EndStructNode** structure closes off the content bounded by the node.\n\nIf this **fContentNode** has a **false** value, then the node does not bound any content.\n\nThe **fContentNode** member affects the interpretation of the parent ID value of\n\nsubsequent nodes. If **fContentNode** is **true** , nodes that are inserted between this\n\n**DocExComment_BeginStructNode** and a subsequent **DocExComment_EndStructNode** ,\n\nand that have a parent ID of **-1** , are children of this node. However, if **fContentNode** is\n\n**true** , nodes inserted after this **DocExComment_BeginStructNode** , and that have a\n\nparent ID of **-1** , are not children of this node. They are children of the next-most-recently\n\nspecified node that has **fContentNode** equal to **false** .\n\nYou can nest document structure nodes to arbitrary depth.\n\n**cwchAltText** Specifies the number of Unicode characters in the block of alternate text\n\nthat follows the structure. This Unicode string specifies alternate text for the node (for\n\nexample, alternate text for an image).", - "page_start": 22, - "page_end": 22, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Value Numeric Value Description |\n|:---|\n| msodocexShape 0x00000001 The object is a shape or text box. |\n| msodocexShapeText 0x00000002 The object has non-whitespace text. |\n| msodocexShapePath 0x00000004 The object has a fill and/or outline. |\n| msodocexShapeAltText 0x00000008 The object has Alt Text. |\n| msodocexShapeEquation 0x00000010 The object has text that contains an equation. |\n| msodocexShapeTabelCell 0x00000020 The object is a cell in a table. |\n\nThe **MsoDocexTableAttr** structure fits in 32 bits and includes the row and column span\n\nand header scope information for a table cell.\n\nC++\n\nThe members of **MsoDocexTableAttr** structure are as follows:\n\n**MaxSpanBits** Specifies the number of bits available for the rowSpan and colSpan\n\nvalues, which is 15.\n\n**MaxSpanValue** Specifies the maximum value that can be specified for the\n\nrowSpan and colSpan.\n\n**rowSpan** Specifies the number of rows that a table cell spans.\n\n**fRowScope** Specifies whether the header is Row/Both or Column.\n\n**colSpan** Specifies the number of columns that a table cell spans.\n\nノ **Expand table**\n\n**MsoDocexTableAttr**\n\nstruct MsoDocexTableAttr\n\n{\n\nstatic constexpr unsigned int MaxSpanBits = sizeof ( unsigned int ) * 8 / 2\n\n- 1;\n\nstatic constexpr unsigned int MaxSpanValue = (1u << MaxSpanBits) - 1;\n\nunsigned int rowSpan : MaxSpanBits;\n\nunsigned int fRowScope : 1;\n\nunsigned int colSpan : MaxSpanBits;\n\nunsigned int fColScope : 1;\n\n};", - "page_start": 10, - "page_end": 10, - "source_file": "office-pdf.pdf" - }, - { - "text": "The *metadatatype* parameter specifies the type of metadata represented by the string.\n\nThe *metadatatype* parameter must be one of the following values from the\n\nMSODOCEXMETADATA enumeration type.\n\nTable 8. Enumerated values of MSODOCEXMETADATA\n\n| Value Description |\n|:---|\n| msodocexMetadataTitle The title of the document. |\n| msodocexMetadataAuthor The author of the document |\n| msodocexMetadataSubject String that describes the subject matter of the document (for example, business or science). |\n| msodocexMetadataKeywords Keyword relevant to the document content. |\n| msodocexMetadataCreator The creator of the document, possibly distinct from the author. |\n| msodocexMetadataProducer The producer of the document, possibly distinct from the author or creator. |\n| msodocexMetadataCategory String that describes the type of document (for example, memo, article, or book). |\n| msodocexMetadataStatus Status of the document. This field can reflect where the document is in the publication process (for example, draft or final). |\n| msodocexMetadataComments Miscellaneous comments relevant to the document. |\n\nFor a given document, each metadata type can have only one string associated with it.\n\nSo, for example, if the document has multiple keywords, they are passed to the add-in\n\nas one concatenated string.\n\nThe *pwchValue* parameter specifies a Unicode string that contains the metadata itself.\n\nHow the add-in incorporates the text-string metadata into the exported document\n\ndepends on the implementation details of the export code and the type of fixed-format\n\nused in the exported document.\n\nPublisher calls the **HrAddDocumentMetadataDate** method to specify document\n\nmetadata in the form of a FILETIME structure.\n\nノ **Expand table**\n\n**HrAddDocumentMetadataDate**", - "page_start": 34, - "page_end": 34, - "source_file": "office-pdf.pdf" - }, - { - "text": "Table 6. Semantic record types supported by fixed-format export\n\n| Comment Value Structure Type |\n|:---|\n| msodocexcommentExternalHyperlink DocExComment_ExternalHyperlink |\n| msodocexcommentExternalHyperlinkRctfv DocExComment_ExternalHyperlink |\n| msodocexcommentInternalHyperlink DocExComment_InternalHyperlink |\n| msodocexcommentInternalHyperlinkRctfv DocExComment_InternalHyperlink |\n| msodocexcommentColorInfo DocExComment_ColorInfo |\n| msodocexcommentColorMapEnable DocExComment_ColorEnable |\n| msodocexcommentBeginTextRun DocExComment_BeginTextRun |\n| msodocexcommentBeginTextRunRTL DocExComment_BeginTextRun |\n| msodocexcommentEndTextRun DocExComment_EndTextRun |\n| msodocexcommentBeginStructNode DocExComment_BeginStructNode |\n| msodocexcommentEndStructNode DocExComment_EndStructNode |\n| msodocexcommentUnicodeForNextTextOut DocExComment_UnicodeForNextTextOut |\n| msodocexcommentUnicodeForNextTextOutRTL DocExComment_UnicodeForNextTextOut |\n| msodocexcommentEPSColor DocExComment_EPSColor |\n| msodocexcommentEPSCMYKJPEG DocExComment_EPSColorCMYKJPEG |\n| msodocexcommentEPSSpotImage DocExComment_EPSColorSpotImage |\n| msodocexcommentEPSStart DocExComment_EPSStart |\n| msodocexcommentPageName DocExComment_PageName |\n| msodocexcommentTransparent DocExComment_Transparent |\n\nThe **DocExComment_ExternalHyperlink(Rctfv)** structure describes a hyperlink that links\n\nto outside of the document, for example to a Web site on the Internet.\n\nC++\n\nノ **Expand table**\n\n**DocExComment_ExternalHyperlink(Rctfv)**", - "page_start": 14, - "page_end": 14, - "source_file": "office-pdf.pdf" - }, - { - "text": "C++\n\nThe *metadatatype* parameter specifies the type of metadata represented by the\n\n**FILETIME** structure. The *metadatatype* parameter must be one of the following values\n\nfrom the MSODOCEXMETADATA enumeration type.\n\nTable 9. Enumerated values of MSODOCEXMETADATA\n\n| Value Description |\n|:---|\n| msodocexMetadataCreationDate The creation date for the document. |\n| msodocexMetadataModDate The last-modified date for the document. |\n\nThe *pftLocalTime* parameter specifies a pointer to a FILETIME structure that contains the\n\ndate and time information for the metadata. The following code snippet demonstrates\n\nhow to extract this information from the structure.\n\nC++\n\nHow the add-in incorporates the date and time metadata into the exported document\n\ndepends on the implementation details of the export code and the type of fixed-format\n\nused in the exported document.\n\nPublisher calls the **HrFinalize** method at the end of the document-export process.\n\nC++\n\nHRESULT HrAddDocumentMetadataDate (\n\nMSODOCEXMETADATA metadataType,\n\nconst FILETIME* pftLocalTime\n\n);\n\nノ **Expand table**\n\nSYSTEMTIME st = { 0 };\n\nWCHAR s[100];\n\nFileTimeToSystemTime(pfiletime, &st);\n\nswprintf(s, 99, L\" %04d-%02d-%02dT%02d:%02d:%02dZ\" , st.wYear % 10000,\n\nst.wMonth % 100, st.wDay % 100, st.wHour % 100, st.wMinute % 100,\n\nst.wSecond % 100);\n\n**HrFinalize**", - "page_start": 35, - "page_end": 35, - "source_file": "office-pdf.pdf" - }, - { - "text": "The collection of structure nodes within the document forms a tree; each node has a\n\nparent node and may also have sibling nodes. The **idNodeParent** and **iSortOrder**\n\nmembers describe the structure of this tree. Note that a child node may or may not\n\nappear between the **DocExComment_BeginStructNode** and\n\n**DocExComment_EndStructNode** structures of the parent node in the EMF.\n\nC++\n\nThe members of the **DocExComment_BeginStructNode** structure are as follows:\n\n**ident** Specifies the constant value, msodocexsignature, which identifies this EMF\n\ncomment as containing semantic information.\n\n**iComment** Specifies the MSODOCEXCOMMENT value,\n\nmsodocexcommentBeginStructNode.\n\n**idNodeParent** Specifies the ID of the parent node. A value of **0** specifies the root\n\nnode. A value of **-1** specifies the currently open structure node, that is, the\n\n*enclosing* structure node.\n\n**iSortOrder** Specifies the sort order of the structure node among its sibling nodes.\n\nThe sort order enables the add-in to order the content correctly in the exported\n\ndocument.\n\nNo two nodes can have the same sort order. However, the set of integers that\n\nconstitute the sort order do not need to be contiguous.\n\nA value of **-1** indicates that the sibling order is the same order in which the nodes\n\nappear in the EMF comments. Note that the order in which the content appears in\n\nthe EMF is not necessarily the order in which the content is consumed by a user of\n\nthe document.\n\n**desn** Specifies a **MSODOCEXSTRUCTTYPE** structure, which is defined earlier in\n\nthe document.\n\nstruct DocExComment_BeginStructNode\n\n{\n\nDWORD ident {};\n\nDWORD iComment {};\n\nint idNodeParent {};\n\nint iSortOrder {};\n\nMSODOCEXSTRUCTNODE desn;\n\nBOOL fContentNode {};\n\nint cwchAltText {};\n\n};", - "page_start": 19, - "page_end": 19, - "source_file": "office-pdf.pdf" - } - ] - }, - { - "references": { - "source_file": "office-pdf.pdf", - "query": "What are vector colors ?", - "target_page": 29, - "target_passage": "Vector colors are any COLORREF values that the add-in receives from Publisher.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "same type that is used for RGB color. For information about the COLORREF structure,\n\nsee COLORREF.\n\nTo resolve color IDs in the EMF back to the extend color space, the add-in calls back to\n\nPublisher through the **HrResolveColor** method of the **IMsoDocExporterSite** interface.\n\nThe add-in passes Publisher an interface pointer to an **IDOCEXCOLOR** interface as one\n\nof the parameters to **HrResolveColor** . Publisher takes the color IDs, also specified in the\n\ncall to **HrResolveColor** , converts them to extended color (RGB, CMYK, or spot color), and\n\npasses them back to the add-in through the methods in the **IDOCEXCOLOR** interface.\n\nVector colors are any **COLORREF** values that the add-in receives from Publisher. For\n\nexample, text color, line stroke color, and color for metafile recolor. When color\n\nmapping is enabled, Publisher uses a color ID for **COLORREF** rather than a real RGB\n\ncolor value. If Publisher provides the add-in an **IMsoDocExporterSite** interface pointer\n\nby calling the **SetDocExporterSite** method of the **IMsoDocExporter** interface, the add-in\n\nshould always call the **IMsoDocExporterSite::HrResolveColor** method to convert the\n\n**COLORREF** to an extended color, which the add-in receives through the methods in the\n\n**IDOCEXCOLOR** interface.\n\nTo support vector color mapping, the add-in needs to do the following:\n\nImplement class support for an **IDOCEXCOLOR** interface. The methods in this\n\ninterface enable Publisher to pass extended color back to the add-in.\n\nCache the following color state values from the semantic records in the EMF.\n\nSet foreground color for recoloring. This is set through the\n\n**DocExComment_ColorInfo** structure.\n\nSet background color for recoloring. This is set through the\n\n**DocExComment_ColorInfo** structure.\n\nDetermine when color mapping is enabled. This is set through the\n\n**DocExComment_ColorEnable** structure.\n\nFor a vector color, create an **IDOCEXCOLOR** interface with the color ID, so that\n\n**IDOCEXCOLOR::GetUnresolvedRGB** returns the color ID. The add-in should call the\n\n**IMsoDocExporterSite::HrResolveColor** method with the **IDOCEXCOLOR** interface\n\nand cached color states. Publisher calls the **IDOCEXCOLOR** interface methods with\n\nthe final color, which can be RGB, CMYK, spot, or registration tint.\n\n**Vector Color and Recolored Images**", - "page_start": 28, - "page_end": 28, - "source_file": "office-pdf.pdf" - }, - { - "text": "The **DocExComment_EPSColorSpotImage** structure provides spot color information for\n\nthe subsequent RGB image. For more information about this structure, see the section\n\nExtended Color Support.\n\nC++\n\nThe members of the **DocExComment_EPSColorSpotImage** structure are as follows:\n\n**ident** Specifies the constant value, msodocexsignature, which identifies this EMF\n\ncomment as containing semantic information.\n\n**iComment** Specifies the MSODOCEXCOMMENT value,\n\nmsodocexcommentEPSSpotImage.\n\n**cmykAlt** Specifies a CMYK color ID.\n\n**rgbAlt** Specifies an RGB color ID.\n\n**flTintMin** Specifies the minimum tint.\n\n**flTintMax** Specifies the maximum tint.\n\n**szSpotName[1]** Specifies a variable length, zero-terminated string that contains\n\nthe spot name.\n\nTo support extended color spaces in Publisher, additional EMF semantic records and\n\ninterfaces are needed because EMF only supports RGB (red-green-black) colors.\n\nExtended color spaces include CMYK (cyan-magenta-yellow-black) and spot color space,\n\nwhich are commonly used in commercial printing.\n\nPublisher uses color mapping to represent extended colors in the document EMF.\n\nPublisher builds a color table for all colors used in the document and replaces actual\n\ncolors with color IDs in the EMF. The type for the color ID is **COLORREF** , which is the\n\ntypedef struct\n\n{\n\nDWORD ident {};\n\nDWORD iComment {};\n\nCOLORREF cmykAlt { 0 };\n\nCOLORREF rgbAlt { 0 };\n\nfloat flTintMin {};\n\nfloat flTintMax {};\n\nchar szSpotName[1];\n\n} DocExComment_EPSColorSpotImage;\n\n**Extended Color Support**", - "page_start": 27, - "page_end": 27, - "source_file": "office-pdf.pdf" - }, - { - "text": "� � # Create AIF object\n\naif = init_aif(\n\nA:: Vector { Array {T, N}}, # A-matrices\n\nB:: Vector { Array {T, N}}; # B-matrices\n\nC:: Vector { Array { Real }}, # C-matrices (optional)\n\nD:: Vector { Vector { Real }}, # D-matrices (optional)\n\nE:: Vector {T}, # E-vector (optional)\n\npA:: Union { Vector { Array {T, N}}, Nothing }, # Dirichlet priors for A-matrices (optional)\n\npB:: Union { Vector { Array {T, N}}, Nothing }, # Dirichlet priors for B-matrices (optional)\n\npD:: Union { Vector { Array { Real }}, Nothing }, # Dirichlet priors for D-vectors (optional)\n\nparameters:: Dict { String , Real }, # Dictionary containing other parameters (optional)\n\nsettings:: Dict { String , Any } # Dictionary containing settings (optional)\n\n) � � **A** and **B** are the only mandatory arguments to the init_aif function—the other arguments\n\nare keyword arguments that default to uniform priors. **A** , **B** , **C** , **D** and **E** and their corre-\n\nsponding Dirichlet priors, in the cases of **A** , **B** and **D** , should be formatted as standard\n\narray objects. All but **E** can have multiple modalities/factors (see Section 4 ), so they should\n\nbe formatted as vectors of arrays with one array per modality/factor. These arrays can be\n\nhand-specified by the user, or be generated with some of the helper functions supplied by\n\nActiveInference . Here, we create an AIF agent equipped with a generative model with\n\nsix environmental states, five possible observations and two possible actions. Here, we use\n\nhelper functions to create matrices and vectors with the correct dimensions; in Section 4 , we\n\ncreate them manually. First, we define the number of states, observations, controls and the\n\nlength of policies: � � # Information about number of states , observations , actions and policy length\n\nstates = [ 6 ] # Six states , single factor\n\nobservations = [ 5 ] # Five observations , single modality\n\ncontrols = [ 2 ] # Two actions , single factor\n\npolicy_length = 1 # Length of policies\n\n# Generate uniform templates for matrices and vectors of the generative model\n\nA, B, C, D, E = create_matrix_templates(states, observations, controls, policy_length) � � The **A** object generated here is a one-dimensional vector containing a uniform 5 *×* 6 matrix (six states and five observations). The **B** object is a one-dimensional vector containing\n\na uniform 6 *×* 6 *×* 2 array (six states and two actions). The **C** , **D** and **E** objects are one- dimensional vectors, each containing uniform vectors with their corresponding sizes. We\n\ncan now modify these to supply the agent with more informative priors over observations,\n\ninitial states and policies. Here, we performed this using the onehot function: � � # We make C take the following form: [0, 0, 0, 0, 1]\n\nC[ 1 ] = onehot( 5 , 5 ) # Initialize the single element of the C object with a one -hot vector\n\n# D will be: [1, 0, 0, 0, 0, 0]\n\nD[ 1 ] = onehot( 1 , 6 ) # Initialize the single element of the D object with a one -hot vector\n\n# To make the agent prefer policy 2\n\nE = onehot( 2 , 2 ) # Initialize as a one -hot encoded vector: [0,1] � � We now create the Dirichlet priors for **A** , **B** and **D** . When we use parameter learning, these\n\nare used to define **A** , **B** and **D** defined above, and are updated at every time step. One\n\nway to construct Dirichlet priors is to simply multiply the matrices below with a scaling\n\nfactor; a higher scaling leads to more precise priors that require stronger evidence to update.\n\nHere, we use a scaling parameter of 2. In the current version, parameter learning is only\n\nimplemented for the **A** , **B** and **D** :", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "When either foreground color or background color for recoloring is specified from\n\nan EMF semantic record, the add-in should recolor images in the add-in (for\n\nexample, metafiles or raster pictures).\n\nEMF supports CMYK *images* using GDI+. Therefore, images in the EMF may be either\n\nRGB or CMYK. If the image is a CMYK image, the add-in needs to convert the image to\n\nthe target color space.\n\nPublisher maintains a target color space for the document. The add-in can use this\n\ntarget color space by calling the **IMsoDocExporterSite::HrConvertImageColorSpace**\n\nmethod with the image's color space.\n\nEncapsulated Postscript (EPS) is a metafile type that supports extended color spaces.\n\nUser who embed EPS images in a Publisher document expect the color information to\n\nbe used in the fixed-format output. Inside Publisher, the EPS is converted to an EMF with\n\nEPS-related semantic records. This EMF is then embedded in the page EMF file that the\n\napplication passes to the add-in.\n\nTo support color in EPS files, the add-in needs to do the following:\n\nCall the **IMsoDocExporterSite::SetEPSInfo** method for **DocExComment_EPSColor**\n\nrecords encountered in the EMF.\n\nExtract the CMYK image from the **DocExComment_EPSColorCMYKJPEG** record in\n\nthe EMF. This record contains a binary object that is the actual CMYK JPEG file\n\nstream. Use it to replace the RGB image specified in the subsequent call to the\n\n**StretchDIBits** function.\n\nThe **DocExComment_EPSColorSpotImage** record provides spot color information\n\nfor the subsequent RGB image, which is always an index image. The add-in needs\n\nto convert the spot image to the target color space.\n\nThe add-in can optionally call the **IMsoDocExporterSite:: HrGetSpotRecolorInfo**\n\nmethod to obtain the document's target color from Publisher. Then the add-in can\n\nrecolor the subsequent RGB image by mapping colors from the palette of the RGB\n\nimage to **flTintMin** and **flTintMax** tints specified in the\n\n**DoxExComment_EPSColorSpotImage** record. The luminosity for each color of the\n\npalette is used for the mapping.\n\n**Non-Recolored Images**\n\n**Color from EPS Files**", - "page_start": 29, - "page_end": 29, - "source_file": "office-pdf.pdf" - }, - { - "text": "**Figure 6.** Chain traces. Each color signifies an individual chain.\n\n**Figure 7.** Posterior estimates of the *α* parameter plotted against the prior for two synthetic subjects,\n\none from each group. � � # Sample from the model prior\n\nprior_chains = sample(model, Prior(), 1000 )\n\n# Rename parameters from the prior chains to match the posterior chains\n\nrenamed_prior_chains = rename_chains(prior_chains, model)\n\n# Plot the posterior and prior for the first subject\n\nplot_parameters(renamed_prior_chains[:, 1 : 1 ,:], renamed_posterior_chains[:, 1 : 1 ,:])\n\n# Visualize the true alpha value\n\nvline!([data[ 1 ,:Alpha]], line=:dash, color = :darkorange2, label = \"Generative Alpha\" )\n\n# Plot the posterior and prior for the last subject\n\nplot_parameters(renamed_prior_chains[:, 10 : 10 ,:], renamed_posterior_chains[:, 10 : 10 ,:])\n\n# Visualize the true alpha value\n\nvline!([data[ 3000 ,:Alpha]], line=:dash, color = :darkorange2, label = \"Generative Alpha\" ) � � We then, as is often the case in computational psychiatry, wanted to compare the\n\ndistributions of parameter values between the two groups. We extracted the median of the\n\nestimated posteriors for each subject and plotted them against the value used to generate", - "page_start": 26, - "page_end": 26, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "y x z z z\n\nz z z z\n\nz z\n\ny y\n\ny\n\nx\n\nx x\n\nx x x\n\ny y y\n\ny\n\nx\n\ny\n\nx\n\nz\n\nz\n\ny y\n\nx x x\n\ny\n\nz x\n\nx\n\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled\n\nand open circles indicate two sublattices. x, y, z label the links\n\nalong three different directions used in (1).\n\nderived as well. There have been several proposals to\n\nopen the fermion gap for the non-Abelian phase without\n\nspoiling exact solvability <sup>4,6</sup> . And many generalizations\n\nto other(even 3D) lattices have been developed in the\n\nlast few years <sup>10- 16</sup> . All these efforts have significantly\n\nenriched our knowledge of exactly solvable models and\n\nquantum phases of matter.\n\nHowever, in the original Kitaev model and its later\n\ngeneralizations in the form of spin models, spin rotation\n\nsymmetry is explicitly broken. This makes them harder\n\nto realize in solid state systems. There are many pro-\n\nposals to realized the Kitaev model in more controllable\n\nsituations, e.g. in cold atom optical lattices <sup>17,18</sup> , or in\n\nsuperconducting circuits <sup>19</sup> . But it is still desirable for\n\ntheoretical curiosity and practical purposes to realize the\n\nKitaev-type models in spin rotation invariant systems.\n\nIn this paper we realize the Kitaev honeycomb lattice\n\nmodel as the low energy Hamiltonian for a spin rotation\n\ninvariant system. The trick is not to use the physical spin\n\nas the spin in the Kitaev model, instead the spin-1/2 in\n\nKitaev model is from some emergent two-fold degener-\n\nate low energy states in the elementary unit of physical\n\nsystem. This type of idea has been explored recently by\n\nJackeli and Khaliullin <sup>20</sup> , in which the spin-1/2 in the Ki-\n\ntaev model is the low energy Kramers doublet created by\n\nstrong spin-orbit coupling of t 2 g orbitals. In the model\n\npresented below, the Hilbert space of spin-1/2 in the Ki-\n\ntaev model is actually the two dimensional spin singlet\n\nsector of four antiferromagnetically coupled spin-1/2 mo-\n\nments, and the role of spin-1/2 operators(Pauli matrices)\n\nin the Kitaev model is replaced by certain combinations\n\nof S j · S k [or the spin-chirality S j · ( S k × S ℓ )] between the\n\nfour spins.\n\nOne major drawback of the model to be presented is\n\nthat it contains high order spin interactions(involves up\n\nto six or eight spins), thus is still unnatural. However it\n\nopens the possibility to realize exotic (exactly solvable)\n\nmodels from spin-1/2 Hamiltonian with spin rotation in-\n\nvariant interactions. We will discuss two possible routes\n\nto reduce this artificialness through controlled perturba-\n\ntive expansions, by coupling to optical phonons or by\n\nmagnetic couplings between the elementary units.\n\nThe outline of this paper is as follows. In Section II\n\nwe will lay out the pseudo-spin-1/2 construction. In Sec-\n\n4\n\n2 3\n\n1\n\n*z* *z*\n\n*x*\n\n*x*\n\n*y*\n\n*y*\n\n2 3\n\n4\n\n1\n\nFIG. 2: Left: the physical spin lattice for the model (8). The\n\ndash circles are honeycomb lattice sites, each of which is ac-\n\ntually a cluster of four physical spins. The dash straight lines\n\nare honeycomb lattice bonds, with their type x, y, z labeled.\n\nThe interaction between clusters connected by x, y, z bonds\n\nare the J x,y,z terms in (8) or (9) respectively. Note this is not the 3-12 lattice used in Ref. <sup>9,10</sup> . Right: enlarged picture of\n\nthe clusters with the four physical spins labeled as 1 , . . . , 4.\n\nThick solid bonds within one cluster have large antiferromag-\n\nnetic Heisenberg coupling J cluster .\n\ntion III the Kitaev model will be explicitly constructed\n\nusing this formalism, and some properties of this con-\n\nstruction will be discussed. In Section IV we will discuss\n\ntwo possible ways to generate the high order spin in-\n\nteractions involved in the construction of Section III by\n\nperturbative expansions. Conclusions and outlook will\n\nbe summarized in Section V.\n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2\n\nFROM FOUR-SPIN CLUSTER.\n\nIn this Section we will construct the pseudo-spin-1/2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "by 19.1% to 41.4% top-1, and MVD drops by 18.1% to\n\n42.9% top-1.\n\n## **6 Evaluating the Predictor**\n\nNext, we seek to qualitatively inspect the V-JEPA mod-\n\nels. Recall that the predictor network in V-JEPA predicts\n\nthe representations of a masked spatio-temporal region *y*\n\nfrom a visible region *x* , given the positional information\n\nof the masked regions (see Section 3 ). To qualitatively in-\n\nvestigate the grounding of the feature-space predictions,\n\nwe freeze the pretrained encoder and predictor networks\n\nand train a conditional diffusion decoder to map the\n\nV-JEPA predictions to interpretable pixels. Notably, the\n\ndecoder is only fed the representations predicted for the\n\nmissing regions of the video, and does not have access\n\nto the unmasked regions of the video (see Figure 6a ).\n\nGiven a masked video, we use the V-JEPA pretrained\n\nmodels to predict the representations of the missing\n\nregions, and then use the decoder to project the rep-\n\nresentations to pixel space. Figure 6b shows decoder\n\noutputs for various random seeds. Qualities that are\n\ncommon across samples represent information that is\n\ncontained in the predictor representation.\n\nFigure 6b shows that the V-JEPA feature predictions\n\nare indeed grounded, and exhibit spatio-temporal con-\n\nsistency with the unmasked regions of the video. Specif-\n\nically, the samples in Figure 6b show that the V-JEPA\n\npredictor correctly captures positional uncertainty and\n\nproduces a variety of visual objects at various locations\n\nwith consistent motion. Some of the samples also demon-\n\nstrate an understanding of object-permanence, as the\n\nvisual objects remain consistent after partial occlusion.", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv3.pdf" - }, - { - "text": "space, so no transformation is needed.\n\n**iTargetPage** Specifies the page number of the destination page within the\n\ndocument.\n\n**xtfvTarget** Specifies the x-coordinate of the target location on the destination\n\npage. The unit of measure for this value is points.\n\n**ytfvTarget** Specifies the y-coordinate of the target location on the destination\n\npage. The unit of measure for this value is points.\n\n**dytfTargetPage** The height of the destination page in points. The offset specified\n\nby the **ytfvTarget** member is relative to the upper-left corner of the page.\n\nHowever, some fixed-format types use a coordinate system that is relative to the\n\nbottom-left corner of the page. For these types of documents, the page height is\n\nrequired to convert the offset.\n\nThe **DocExComment_ColorInfo** structure specifies color-state information for the EMF.\n\nFor more information about this structure, see the section Extended Color Support.\n\nC++\n\nThe members of the **DocExComment_ColorInfo** structure are as follows:\n\n**ident** Specifies the constant value, msodocexsignature, which identifies this EMF\n\ncomment as containing semantic information.\n\n**iComment** Specifies the MSODOCEXCOMMENT value,\n\nmsodocexcommentColorInfo.\n\n**clr** Specifies a color ID that represents a current color state in the EMF.\n\n**fForeColor** Specifies whether the color ID in the **clr** member represents a\n\nforeground color or a background color. If this member has a value of **true** , the\n\n**DocExComment_ColorInfo**\n\nstruct DocExComment_ColorInfo\n\n{\n\nDWORD ident {};\n\nDWORD iComment {};\n\nCOLORREF clr { 0 };\n\nBOOL fForeColor {};\n\n};", - "page_start": 17, - "page_end": 17, - "source_file": "office-pdf.pdf" - }, - { - "text": "Chunhui Gu, Chen Sun, David A Ross, Carl Vondrick, Caro-\n\nline Pantofaru, Yeqing Li, Sudheendra Vijayanarasimhan,\n\nGeorge Toderici, Susanna Ricco, Rahul Sukthankar, et al.\n\nAva: A video dataset of spatio-temporally localized atomic\n\nvisual actions. In *Proceedings of the IEEE conference on*\n\n*computer vision and pattern recognition* , pages 6047- 6056,\n\n2018.\n\nAgrim Gupta, Jiajun Wu, Jia Deng, and Li Fei-Fei. Siamese\n\nmasked autoencoders. *arXiv preprint arXiv:2305.14344* ,\n\n2023.\n\nMichael U Gutmann and Aapo Hyvärinen. Noise-contrastive\n\nestimation of unnormalized statistical models, with appli-\n\ncations to natural image statistics. *Journal of machine*\n\n*learning research* , 13(2), 2012.\n\nTengda Han, Weidi Xie, and Andrew Zisserman. Video\n\nrepresentation learning by dense predictive coding. In\n\n*Proceedings of the IEEE/CVF International Conference*\n\n*on Computer Vision Workshops* , pages 0- 0, 2019.\n\nTengda Han, Weidi Xie, and Andrew Zisserman. Memory-\n\naugmented dense predictive coding for video representation\n\nlearning. In *European conference on computer vision* , pages\n\n312- 329. Springer, 2020.\n\nKaiming He, Xinlei Chen, Saining Xie, Yanghao Li, Piotr Dol-\n\nlár, and Ross Girshick. Masked autoencoders are scalable\n\nvision learners. *arXiv preprint arXiv:2111.06377* , 2021.\n\nGeoffrey E Hinton. Connectionist learning procedures. In\n\n*Machine learning* , pages 555- 610. Elsevier, 1989.\n\nTarun Kalluri, Deepak Pathak, Manmohan Chandraker, and\n\nDu Tran. Flavr: Flow-agnostic video representations for\n\nfast frame interpolation. In *Proceedings of the IEEE/CVF*\n\n*Winter Conference on Applications of Computer Vision* ,\n\npages 2071- 2082, 2023.\n\nJared Kaplan, Sam McCandlish, Tom Henighan, Tom B\n\nBrown, Benjamin Chess, Rewon Child, Scott Gray, Alec\n\nRadford, Jeffrey Wu, and Dario Amodei. Scaling laws for\n\nneural language models. *arXiv preprint arXiv:2001.08361* ,\n\n2020.\n\nWill Kay, Joao Carreira, Karen Simonyan, Brian Zhang,\n\nChloe Hillier, Sudheendra Vijayanarasimhan, Fabio Vi-\n\nola, Tim Green, Trevor Back, Paul Natsev, et al. The\n\nkinetics human action video dataset. *arXiv preprint*\n\n*arXiv:1705.06950* , 2017.\n\nChristoph Kayser, Wolfgang Einhäuser, Olaf Dümmer, Peter\n\nKönig, and Konrad Körding. Extracting slow subspaces\n\nfrom natural videos leads to complex cells. In *Artificial*\n\n*Neural Networks—ICANN 2001: International Conference*\n\n*Vienna, Austria, August 21- 25, 2001 Proceedings 11* , pages\n\n1075- 1080. Springer, 2001.\n\nGustav Larsson, Michael Maire, and Gregory Shakhnarovich.\n\nLearning representations for automatic colorization. 2016.\n\nGustav Larsson, Michael Maire, and Gregory Shakhnarovich.\n\nColorization as a proxy task for visual understanding. 2017.\n\nYann LeCun. A path towards autonomous machine intelli-\n\ngence version 0.9. 2, 2022-06-27. 2022.\n\nHsin-Ying Lee, Jia-Bin Huang, Maneesh Singh, and Ming-\n\nHsuan Yang. Unsupervised representation learning by\n\nsorting sequences. In *Proceedings of the IEEE international*\n\n*conference on computer vision* , pages 667- 676, 2017.\n\nKunchang Li, Yali Wang, Peng Gao, Guanglu Song, Yu Liu,\n\nHongsheng Li, and Yu Qiao. Uniformer: Unified trans-\n\nformer for efficient spatiotemporal representation learning.\n\n*arXiv preprint arXiv:2201.04676* , 2022.\n\nIlya Loshchilov and Frank Hutter. Decoupled weight decay\n\nregularization. *arXiv preprint arXiv:1711.05101* , 2017.\n\nAntoine Miech, Dimitri Zhukov, Jean-Baptiste Alayrac,\n\nMakarand Tapaswi, Ivan Laptev, and Josef Sivic.\n\nHowto100m: Learning a text-video embedding by watch-\n\ning hundred million narrated video clips. In *Proceedings*\n\n*of the IEEE/CVF international conference on computer*\n\n*vision* , pages 2630- 2640, 2019.\n\nMehdi Noroozi and Paolo Favaro. Unsupervised learning of\n\nvisual representations by solving jigsaw puzzles. In *Euro-*\n\n*pean conference on computer vision* , pages 69- 84. Springer,\n\n2016.\n\nAaron van den Oord, Yazhe Li, and Oriol Vinyals. Represen-", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv3.pdf" - }, - { - "text": "Table I VERITAS AGN Detections. The only non-blazar\n\nobject is the radio galaxy M 87. The blazars discovered\n\nat VHE by VERITAS are marked with a dagger.\n\nObject Class Redshift\n\nM 87 FR I 0.004\n\nMkn 421 HBL 0.030\n\nMkn 501 HBL 0.034\n\n1ES 2344+514 HBL 0.044\n\n1ES 1959+650 HBL 0.047\n\nW Comae <sup>†</sup> IBL 0.102\n\nRGB J0710+591 <sup>†</sup> HBL 0.125\n\nH 1426+428 HBL 0.129\n\n1ES 0806+524 <sup>†</sup> HBL 0.138\n\n1ES 0229+200 HBL 0.139\n\n1ES 1218+304 HBL 0.182\n\nRBS 0413 <sup>†</sup> HBL 0.190\n\n1ES 0502+675 <sup>†</sup> HBL 0.341\n\n3C 66A <sup>†</sup> IBL 0.444?\n\nPKS 1424+240 <sup>†</sup> IBL ?\n\nVER J0521+211 <sup>†</sup> ? ?\n\n( ∼ 5.5 σ ; 3% Crab flux above 300 GeV; Γ VHE ∼ 2 . 7)\n\nduring VERITAS observations from December 2008\n\nto March 2009. The initial announcement of the VHE\n\ndiscovery [19] led to its discovery above 1 GeV in the\n\nFermi-LAT data using a special analysis. RBS 0413,\n\na relatively distant HBL (z=0.19), was observed for 16 h good-quality live time in 2008-09 <sup>2</sup> . These data\n\nresulted in the discovery of VHE gamma-rays ( > 270 γ ,\n\n∼ 6 σ ) at a flux ( > 200 GeV) of ∼ 2% of the Crab Neb-\n\nula flux. The discovery [20] was announced simultane-\n\nously with the LAT MeV-GeV detection. The VHE\n\nand other MWL observations, including Fermi-LAT\n\ndata, for each of these three sources will be the sub-\n\nject of a joint publication involving both the VERI-\n\nTAS and LAT collaborations.\n\n### **5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by\n\nVERITAS of three blazars was motivated primarily\n\nby results from the first year of LAT data taking. In\n\nparticular, the VHE detections of PKS 1424+240 [21]\n\nand 1ES 0502+675 [22] were the result of VERITAS\n\nobservations triggered by the inclusion of these objects\n\nin the Fermi-LAT Bright AGN List [13]. The former\n\nis only the third IBL known to emit VHE gamma-\n\nrays, and the latter is the most distant BL Lac object\n\n2 RBS 0413 was observed further by VERITAS in Fall 2009.\n\n( z = 0 . 341) detected in the VHE band. In addition,\n\nVER J0521+211, likely associated with the radio-loud\n\nAGN RGB J0521.8+2112, was detected by VERTAS\n\nin ∼ 4 h of observations in October 2009 [23]. These\n\nobservations were motivated by its identification as a\n\n> 30 GeV γ -ray source in the public Fermi-LAT data.\n\nIts VHE flux is 5% of the Crab Nebula flux, placing it\n\namong the brightest VHE blazars detected in recent\n\nyears. VERITAS later observed even brighter VHE\n\nflaring from VER J0521+211 in November 2009 [24],\n\nleading to deeper VHE observations.\n\n## **6. Blazars Upper Limits**\n\nMore than 50 VHE blazar candidates were observed\n\nby VERITAS between September 2007 and June 2009.\n\nThe total exposure on the 49 non-detected candi-\n\ndates is ∼ 305 h live time (average of 6.2 h per can-\n\ndidate). Approximately 55% of the total exposure is\n\nsplit amongst the 27 observed HBL. The remainder is\n\ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9\n\nFSRQ (13%). There are no clear indications of signifi-\n\ncant VHE γ -ray emission from any of these 49 blazars\n\n[25]. However, the observed significance distribution is\n\nclearly skewed towards positive values (see Figure 1).\n\nA stacking analysis performed on the entire data sam-\n\nple shows an overall excess of 430 γ -rays, correspond-\n\ning to a statistical significance of 4.8 σ , observed from\n\nthe directions of the candidate blazars. The IBL and\n\nHBL targets make up 96% of the observed excess. Ob-\n\nservations of these objects also comprise ∼ 80% of the\n\ntotal exposure. An identical stacked analysis of all\n\nthe extragalactic non-blazar targets observed, but not\n\nclearly detected ( > 5 σ ), by VERITAS does not show\n\na significant excess ( ∼ 120 h exposure). The stacked\n\nexcess persists using alternate methods for estimating\n\nthe background at each blazar location, and with dif-\n\nferent event selection criteria (e.g. soft cuts optimized\n\nfor sources with Γ VHE > 4). The distribution of VHE\n\nflux upper limits is shown in Figure 1. These 49 VHE", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "office-pdf.pdf", - "query": "What are msodocexMetadataComments ?", - "target_page": 35, - "target_passage": "Miscellaneous comments relevant to the document.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The *metadatatype* parameter specifies the type of metadata represented by the string.\n\nThe *metadatatype* parameter must be one of the following values from the\n\nMSODOCEXMETADATA enumeration type.\n\nTable 8. Enumerated values of MSODOCEXMETADATA\n\n| Value Description |\n|:---|\n| msodocexMetadataTitle The title of the document. |\n| msodocexMetadataAuthor The author of the document |\n| msodocexMetadataSubject String that describes the subject matter of the document (for example, business or science). |\n| msodocexMetadataKeywords Keyword relevant to the document content. |\n| msodocexMetadataCreator The creator of the document, possibly distinct from the author. |\n| msodocexMetadataProducer The producer of the document, possibly distinct from the author or creator. |\n| msodocexMetadataCategory String that describes the type of document (for example, memo, article, or book). |\n| msodocexMetadataStatus Status of the document. This field can reflect where the document is in the publication process (for example, draft or final). |\n| msodocexMetadataComments Miscellaneous comments relevant to the document. |\n\nFor a given document, each metadata type can have only one string associated with it.\n\nSo, for example, if the document has multiple keywords, they are passed to the add-in\n\nas one concatenated string.\n\nThe *pwchValue* parameter specifies a Unicode string that contains the metadata itself.\n\nHow the add-in incorporates the text-string metadata into the exported document\n\ndepends on the implementation details of the export code and the type of fixed-format\n\nused in the exported document.\n\nPublisher calls the **HrAddDocumentMetadataDate** method to specify document\n\nmetadata in the form of a FILETIME structure.\n\nノ **Expand table**\n\n**HrAddDocumentMetadataDate**", - "page_start": 34, - "page_end": 34, - "source_file": "office-pdf.pdf" - }, - { - "text": "Table 6. Semantic record types supported by fixed-format export\n\n| Comment Value Structure Type |\n|:---|\n| msodocexcommentExternalHyperlink DocExComment_ExternalHyperlink |\n| msodocexcommentExternalHyperlinkRctfv DocExComment_ExternalHyperlink |\n| msodocexcommentInternalHyperlink DocExComment_InternalHyperlink |\n| msodocexcommentInternalHyperlinkRctfv DocExComment_InternalHyperlink |\n| msodocexcommentColorInfo DocExComment_ColorInfo |\n| msodocexcommentColorMapEnable DocExComment_ColorEnable |\n| msodocexcommentBeginTextRun DocExComment_BeginTextRun |\n| msodocexcommentBeginTextRunRTL DocExComment_BeginTextRun |\n| msodocexcommentEndTextRun DocExComment_EndTextRun |\n| msodocexcommentBeginStructNode DocExComment_BeginStructNode |\n| msodocexcommentEndStructNode DocExComment_EndStructNode |\n| msodocexcommentUnicodeForNextTextOut DocExComment_UnicodeForNextTextOut |\n| msodocexcommentUnicodeForNextTextOutRTL DocExComment_UnicodeForNextTextOut |\n| msodocexcommentEPSColor DocExComment_EPSColor |\n| msodocexcommentEPSCMYKJPEG DocExComment_EPSColorCMYKJPEG |\n| msodocexcommentEPSSpotImage DocExComment_EPSColorSpotImage |\n| msodocexcommentEPSStart DocExComment_EPSStart |\n| msodocexcommentPageName DocExComment_PageName |\n| msodocexcommentTransparent DocExComment_Transparent |\n\nThe **DocExComment_ExternalHyperlink(Rctfv)** structure describes a hyperlink that links\n\nto outside of the document, for example to a Web site on the Internet.\n\nC++\n\nノ **Expand table**\n\n**DocExComment_ExternalHyperlink(Rctfv)**", - "page_start": 14, - "page_end": 14, - "source_file": "office-pdf.pdf" - }, - { - "text": "**shapeProperty** is for a msodocexStructTypeFigure where the content is a shape,\n\ntext box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY\n\nenumeration.\n\n**tableAttr** is the table cell attributes for a msodocexStructTypeTH or\n\nmsodocexStructTypeTD.\n\n**idTableHeader** is the unique id for an msodocexStructTypeTH or\n\nmsodocexStructTypeTD.\n\n**iTargetParentId** is the id of the node to reparent an msodocexStructTypeDiagram\n\nto.\n\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE\n\n| Value Description |\n|:---|\n| msodocexLineBreakTypeNormal Normal line break. |\n| msodocexLineBreakTypeManual Manual line break. |\n| msodocexLineBreakTypeEOP End of paragraph. |\n\nTable 4. Enumerated values of MSODOCEXLISTTYPE\n\n| Value Description |\n|:---|\n| msodocexListTypeNone No bullets or numbering. |\n| msodocexListTypeBulletDisc Disc-shaped bullets. |\n| msodocexListTypeBulletCircle Circle-shaped bullets. |\n| msodocexListTypeBulletSquare Square-shaped bullets. |\n| msodocexListTypeBulletDecimal Decimal numbering. |\n| msodocexListTypeUpperRoman Uppercase Roman numeral numbering. |\n| msodocexListTypeLowerRoman Lowercase Roman numberal numbering. |\n| msodocexListTypeUpperAlpha Uppercase alphabetic numbering. |\n| msodocexListTypeLowerAlpha Lowercase alphabetic numbering. |\n\nTable 5. Enumerated values of MSODOCEXSHAPEPROPERTY bit fields\n\nノ **Expand table**\n\nノ **Expand table**", - "page_start": 9, - "page_end": 9, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Type Value Description |\n|:---|\n| msodocexStructTypeTOC A table of contents. |\n| msodocexStructTypeTOCI An item in a table of contents. |\n| msodocexStructTypeExtLink A link to an external resource. |\n| msodocexStructTypeIntLink A link to an internal resource. |\n| msodocexStructTypeFootnote A footnote. |\n| msodocexStructTypeEndnote An endnote. |\n| msodocexStructTypeTextbox A text box. |\n| msodocexStructTypeHeader A block of text forming a header. |\n| msodocexStructTypeFooter A footer. |\n| msodocexStructInlineShape An inline shape. |\n| msodocexStructAnnotation An annotation. |\n| msodocexStructTypeSpanBlock A block of text. |\n| msodocexStructTypeWorkbook A workbook. |\n| msodocexStructTypeWorksheet A worksheet. |\n| msodocexStructTypeMacrosheet A macrosheet. |\n| msodocexStructTypeChartsheet A chartsheet. |\n| msodocexStructTypeDialogsheet A dialogsheet. |\n| msodocexStructTypeSlide A slide. |\n| msodocexStructTypeChart A chart. |\n| msodocexStructTypeDiagram A SmartArt diagram. |\n| msodocexStructTypeBulletText Buller text. |\n| msodocexStructTypeTextLine A line of text. |\n| msodocexStructTypeDropCap A drop cap. |\n| msodocexStructTypeSection A section. |\n| msodocexStructTypeAnnotationBegin The beginning of an annotation. |\n| msodocexStructTypeAnnotationEnd The end of an annotation. |", - "page_start": 21, - "page_end": 21, - "source_file": "office-pdf.pdf" - }, - { - "text": "C++\n\nThe *metadatatype* parameter specifies the type of metadata represented by the\n\n**FILETIME** structure. The *metadatatype* parameter must be one of the following values\n\nfrom the MSODOCEXMETADATA enumeration type.\n\nTable 9. Enumerated values of MSODOCEXMETADATA\n\n| Value Description |\n|:---|\n| msodocexMetadataCreationDate The creation date for the document. |\n| msodocexMetadataModDate The last-modified date for the document. |\n\nThe *pftLocalTime* parameter specifies a pointer to a FILETIME structure that contains the\n\ndate and time information for the metadata. The following code snippet demonstrates\n\nhow to extract this information from the structure.\n\nC++\n\nHow the add-in incorporates the date and time metadata into the exported document\n\ndepends on the implementation details of the export code and the type of fixed-format\n\nused in the exported document.\n\nPublisher calls the **HrFinalize** method at the end of the document-export process.\n\nC++\n\nHRESULT HrAddDocumentMetadataDate (\n\nMSODOCEXMETADATA metadataType,\n\nconst FILETIME* pftLocalTime\n\n);\n\nノ **Expand table**\n\nSYSTEMTIME st = { 0 };\n\nWCHAR s[100];\n\nFileTimeToSystemTime(pfiletime, &st);\n\nswprintf(s, 99, L\" %04d-%02d-%02dT%02d:%02d:%02dZ\" , st.wYear % 10000,\n\nst.wMonth % 100, st.wDay % 100, st.wHour % 100, st.wMinute % 100,\n\nst.wSecond % 100);\n\n**HrFinalize**", - "page_start": 35, - "page_end": 35, - "source_file": "office-pdf.pdf" - }, - { - "text": "The **idNode** member specifies the ID of the node being passed in the call to\n\n**HrBeginStructNode** . This member may not have a value of **0** . A value of **-1** indicates that\n\nchild nodes do not use the *idNodeParent* parameter to specify this node as their parent.\n\nInstead, this node can be a parent only by enclosing child nodes in the EMF. Multiple\n\nnodes can have an ID of **-1** . If the ID is not **-1** , the value is unique across the document.\n\nThe embedded union at the end of the MSODOCEXSTRUCTNODE is interpreted\n\ndifferently depending on the type of node:\n\n**iHeadingLevel** is the heading level for an msodocexStructTypeHeading.\n\n**idPara** is the paragraph id for a P, TOCI, or ListBody.\n\n**idDropCap** is the id of an msodocexStructTypeDropCap.\n\n**iPage** is the page number for an msodocexStructTypePage.\n\n**bt** is the line break type for an msodocexStructTypeTextLine.\n\n**iListLevel** is the list level for an msodocexStructTypeList or\n\nmsodocexStructTypeListItem.\n\n**listType** is the list type for an msodocexStructTypeListItem.\n\n**idAtn** is the id of an msodocexStructTypeAnnotationBegin or\n\nmsodocexStructTypeAnnotationEnd.\n\n**cpLim** is used to determine the nesting order of tables within tables for an\n\nmsodocexStructTypeTable, msodocexStructTypeTOC, or\n\nmsodocexStructTypeListBody.\n\ntypedef struct _ MsoDocexStructNode\n\n{\n\nint idNode;\n\nMSODOCEXSTRUCTTYPE nodetype;\n\nWCHAR* pwchAltText;\n\nunion\n\n{\n\nint iHeadingLevel;\n\nULONG idPara;\n\nULONG idDropCap;\n\nint iPage;\n\nWCHAR* pwchActualText;\n\nMSODOCEXLINEBREAKTYPE bt;\n\nint iListLevel;\n\nMSODOCEXLISTTYPE listType;\n\nULONG idAtn;\n\nlong cpLim;\n\nint shapeProperty;\n\nMsoDocexTableAttr tableAttr;\n\nWCHAR* idTableHeader;\n\nint iTargetParentId;\n\n};\n\n} MSODOCEXSTRUCTNODE;", - "page_start": 8, - "page_end": 8, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Type Value Description |\n|:---|\n| msodocexStructTypeParaRTLAttr A block of text within an article with right-to-left layout. |\n| msodocexStructTypeTableRTLAttr A block of text forming a table with right-to-left layout. |\n| msodocexStructTypeHeadingRTLAttr A heading in the text with right-to-left layout. |\n| msodocexStructTypeListItemRTLAttr A block of text forming a list item with right-to-left layout. |\n| msodocexStructTypeParaUnannotatableAttr A block of text within an article that is not annotatable. |\n| msodocexStructTypeTHead The header row area in a table. |\n| msodocexStructTypeTBody The body area in a table, i.e. the portion between the THead and TFoot. |\n| msodocexStructTypeLabel A label. |\n| msodocexStructTypeEquation An equation. |\n| msodocexStructTypeIntLinkNoteRef A footnote or endnote reference mark link. |\n| msodocexStructTypeTFoot The footer row area in a table. |\n\n**fContentNode** Specifies whether a **DocExComment_EndStructNode** structure marks\n\nthe end of this structure node. If **fContentNode** is **true** , a\n\n**DocExComment_EndStructNode** structure closes off the content bounded by the node.\n\nIf this **fContentNode** has a **false** value, then the node does not bound any content.\n\nThe **fContentNode** member affects the interpretation of the parent ID value of\n\nsubsequent nodes. If **fContentNode** is **true** , nodes that are inserted between this\n\n**DocExComment_BeginStructNode** and a subsequent **DocExComment_EndStructNode** ,\n\nand that have a parent ID of **-1** , are children of this node. However, if **fContentNode** is\n\n**true** , nodes inserted after this **DocExComment_BeginStructNode** , and that have a\n\nparent ID of **-1** , are not children of this node. They are children of the next-most-recently\n\nspecified node that has **fContentNode** equal to **false** .\n\nYou can nest document structure nodes to arbitrary depth.\n\n**cwchAltText** Specifies the number of Unicode characters in the block of alternate text\n\nthat follows the structure. This Unicode string specifies alternate text for the node (for\n\nexample, alternate text for an image).", - "page_start": 22, - "page_end": 22, - "source_file": "office-pdf.pdf" - }, - { - "text": "see the section Extended Color Support.\n\nC++\n\nThe members of the **DocExComment_EPSColor** structure are as follows:\n\n**ident** Specifies the constant value, msodocexsignature, which identifies this EMF\n\ncomment as containing semantic information.\n\n**iComment** Specifies the MSODOCEXCOMMENT value,\n\nmsodocexcommentEPSColor.\n\n**colorInfo[]** Specifies the color information for the EPS file. The add-in should pass\n\nthis information to Publisher using the **IMsoDocExporterSite::SetEPSInfo** method.\n\nThe **DocExComment_EPSColorCMYKJPEG** structure specifies the start, in the EMF, of a\n\nbinary object that is a CMYKJPEG file stream. For more information about this structure,\n\nsee the section Extended Color Support.\n\nC++\n\nThe members of the **DocExComment_EPSColorCMYKJPEG** structure are as follows:\n\n**ident** Specifies the constant value, msodocexsignature, which identifies this EMF\n\ncomment as containing semantic information.\n\n**iComment** Specifies the MSODOCEXCOMMENT value,\n\nmsodocexcommentEPSCMYKJPEG;\n\ntypedef struct\n\n{\n\nDWORD ident {};\n\nDWORD iComment {};\n\nBYTE colorInfo[];\n\n} DocExComment_EPSColor;\n\n**DocExComment_EPSColorCMYKJPEG**\n\ntypedef struct\n\n{\n\nDWORD ident {};\n\nDWORD iComment {};\n\n} DocExComment_EPSColorCMYKJPEG;\n\n**DocExComment_EPSColorSpotImage**", - "page_start": 26, - "page_end": 26, - "source_file": "office-pdf.pdf" - }, - { - "text": "The **idNode** member specifies the ID of the node. This member may not have a value of\n\n**0** . A value of **-1** indicates that child nodes do not use the **idNodeParent** member to\n\nspecify this node as their parent. Instead, this node can be a parent only by enclosing\n\nchild nodes in the EMF. Multiple nodes can have a ID of **-1** . If the ID is not **-1** , the value is\n\nunique across the document.\n\nThe **nodetype** specifies the type of structure node. This member is equal to one of the\n\nvalues from the **MSODOCEXSTRUCTTYPE** enumeration type. The following table lists\n\nexamples of document structure node types.\n\nTable 7. Document structure node types\n\n| Type Value Description |\n|:---|\n| msodocexStructTypePara A block of text within an article. Its parent node must be an article. |\n| msodocexStructTypeFigure A graphical element (for example, an image or collection of shapes) that has a textual representation. The textual representation is the alternate text used for reading or searching the document. |\n| msodocexStructTypeArticle A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles. |\n| msodocexStructTypeHeading A heading in the text. |\n| msodocexStructTypeTable A block of text forming a table. |\n| msodocexStructTypeTR A block of text forming a single row of a table. |\n| msodocexStructTypeTD A block of text forming a single cell in a table row. |\n| msodocexStructTypeTH A block of text forming a single header cell in a table row. |\n| msodocexStructTypeList A block of text forming a list. |\n| msodocexStructTypeListItem A block of text forming a list item. |\n| msodocexStructTypeListBody A block of text forming the body of a list item. |\n| msodocexStructTypeDocument A document. |\n| msodocexStructTypePage A page in the document. |\n\nノ **Expand table**", - "page_start": 20, - "page_end": 20, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Value Numeric Value Description |\n|:---|\n| msodocexShape 0x00000001 The object is a shape or text box. |\n| msodocexShapeText 0x00000002 The object has non-whitespace text. |\n| msodocexShapePath 0x00000004 The object has a fill and/or outline. |\n| msodocexShapeAltText 0x00000008 The object has Alt Text. |\n| msodocexShapeEquation 0x00000010 The object has text that contains an equation. |\n| msodocexShapeTabelCell 0x00000020 The object is a cell in a table. |\n\nThe **MsoDocexTableAttr** structure fits in 32 bits and includes the row and column span\n\nand header scope information for a table cell.\n\nC++\n\nThe members of **MsoDocexTableAttr** structure are as follows:\n\n**MaxSpanBits** Specifies the number of bits available for the rowSpan and colSpan\n\nvalues, which is 15.\n\n**MaxSpanValue** Specifies the maximum value that can be specified for the\n\nrowSpan and colSpan.\n\n**rowSpan** Specifies the number of rows that a table cell spans.\n\n**fRowScope** Specifies whether the header is Row/Both or Column.\n\n**colSpan** Specifies the number of columns that a table cell spans.\n\nノ **Expand table**\n\n**MsoDocexTableAttr**\n\nstruct MsoDocexTableAttr\n\n{\n\nstatic constexpr unsigned int MaxSpanBits = sizeof ( unsigned int ) * 8 / 2\n\n- 1;\n\nstatic constexpr unsigned int MaxSpanValue = (1u << MaxSpanBits) - 1;\n\nunsigned int rowSpan : MaxSpanBits;\n\nunsigned int fRowScope : 1;\n\nunsigned int colSpan : MaxSpanBits;\n\nunsigned int fColScope : 1;\n\n};", - "page_start": 10, - "page_end": 10, - "source_file": "office-pdf.pdf" - } - ] - }, - { - "references": { - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", - "query": "What are the total operating expenses of Wikimedia foundation in 2024 ?", - "target_page": 6, - "target_passage": "178,471,109", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**WIKIMEDIA FOUNDATION, INC.**\n\nNotes to Consolidated Financial Statements\n\nJune 30, 2024 and 2023\n\n18\n\nThe Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers additional Foundation donations to the Endowment monthly. Donations that are donor-specified for the Wikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not donor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards and grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and $624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of June 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred to the Wikimedia Endowment for the month of June 2024.\n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with grants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and $500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers and contributors. The grants are recorded as contributions with donor restrictions and within net assets with donor restrictions as of June 30, 2024.\n\n**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of management, the outcome of the pending lawsuits will not materially affect operations or the financial position of the Foundation.\n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the consolidated financial statements were available to be issued, and determined there are no items to disclose.", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(9) Liquidity and Availability of Financial Assets**\n\nThe Foundation’s financial assets available for general expenditure within one year of the balance sheet date, June 30, 2024 and 2023, are as follows:\n\n**2024 2023**\n\nCash and cash equivalents $ 82,845,159 75,808,401\n\nCurrent contributions receivable 856,657 —\n\nShort-term investments 116,074,763 132,216,667\n\nTotal financial assets 199,776,579 208,025,068\n\nLess:\n\nRestricted by donors for programs 5,696,323 5,882,673\n\nDonations payable to Wikimedia Endowment 525,607 5,274,448\n\nFinancial assets available to meet cash needs for\n\ngeneral expenditures within one year $ 193,554,649 196,867,947\n\nThe Foundation’s liquidity management includes a policy of structuring its financial assets to be available to meet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and cash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the primary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the short-term and long-term investments can be liquidated at any time as needed.\n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on September 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the operations and activities of current and future Wikimedia projects, which are projects that are approved by and advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The Foundation does not have control or controlling financial interest in the Wikimedia Endowment and the Wikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a related party to the Foundation because Wikimedia Endowment management is also management at the Foundation.\n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to services provided to the Wikimedia Endowment, primarily for fundraising and general and administrative support under the terms of a cost sharing agreement. These costs are included within the Foundation's expenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the costs is recorded within other income, net.", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**WIKIMEDIA FOUNDATION, INC.**\n\nConsolidated Financial Statements\n\nJune 30, 2024 and 2023\n\n(With Independent Auditors’ Report Thereon)", - "page_start": 0, - "page_end": 0, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "For example (unaudited):\n\n- Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews per month, making them one of the most popular Web properties worldwide. Wikipedia is available in more than 332 languages and contains more than 63 million articles contributed by a global volunteer community.\n\n- For the year ended June 30, 2024, the educational content of the Foundation’s largest project, Wikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles.\n\n- For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and sound files to the Foundation’s multimedia repository, making the total 106.7 million files.\n\n- Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software developers add new functionality to the code base, and volunteer language specialists add to the code base by translating the wiki interface into different languages. During the year ended June 30, 2024, there were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of which 8,161 commits were through the efforts of approximately 244 volunteers.\n\n**(7) Operating Leases**\n\nOur operating lease relates to the Foundation’s headquarters in San Francisco and has a non-cancelable remaining term of 3 months as of June 30, 2024. The discount rate is 2.9%, the risk-free rate based on daily U.S. Treasury with a term comparable to the lease term. The lease provides the Foundation the option to extend the lease term for one additional period of five years. The Foundation determined during the year ended June 30, 2024 not to renew the lease. Operating lease expense was $1,859,383 and $1,489,134 for the year ended June 30, 2024 and 2023, respectively.\n\nUndiscounted lease payments as of June 30, 2024 were as follows:\n\n**Lease**\n\n**payments**\n\nYear ending June 30:\n\n2025 419,791\n\nTotal minimum lease payments $ 419,791\n\n**(8) Retirement Plan**\n\nThe Foundation offers a 401(k) plan (the Plan) to all of its employees residing in the United States. Employees are eligible to participate in the Plan upon employment. The Foundation matches employee contributions on a dollar-for-dollar basis up to 4% of the employee’s compensation. The Foundation contributed $1,859,839 and $1,859,012 to the Plan for the years ended June 30, 2024 and 2023, respectively.", - "page_start": 17, - "page_end": 17, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(4) Property and Equipment, Net**\n\nProperty and equipment at June 30, 2024 and 2023 consist of the following:\n\n**2024 2023**\n\nFurniture $ 72,042 737,143 Leasehold improvements — 2,074,581 Computer equipment 22,821,120 21,941,684 Internal use software 2,507,701 5,198,574\n\nTotal 25,400,863 29,951,982\n\nLess accumulated depreciation and amortization (13,574,727) (15,906,843)\n\nProperty and equipment, net $ 11,826,136 14,045,139\n\n**(5) Net Assets**\n\nNet assets with donor restrictions at June 30, 2024 and 2023 are available for the following purposes:\n\n**2024 2023**\n\nRestricted to future periods: $ 50,000 100,000 Restricted by purpose: Abstract Wikipedia 861,008 1,249,004 Artificial intelligence 239,878 — Endowment support — 1,297,620 Future Audiences 500,000 — Knowledge equity 965,910 2,228,134 Machine learning 24,528 860,620 Media Wiki 1,500,000 — Other 125,000 147,295 Restricted to future periods and by purpose: Artificial intelligence 1,430,000 —\n\nNet assets with donor restrictions $ 5,696,324 5,782,673\n\n**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. Programs comprise various initiatives that focus on (1) building the technological and operating platform that enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, growing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in key geographic areas, mobile application development, and bottom-up innovation, all of which support Wikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for which the Foundation is reimbursed. The allocation between programs, general and administrative, and fundraising expenses is based on personnel and related costs and other operating expenses such as rent and office expenses using estimates of time spent or percentage of utilization by headcounts, as well as", - "page_start": 15, - "page_end": 15, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n* **(a) Organization and Purpose** *\n\nThe accompanying consolidated financial statements present the financial position, change in net assets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC.\n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. Based in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily through donations and contributions.\n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the Foundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for charitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue Code and is a disregarded entity for tax purposes.\n\n* **(b) Risks and Uncertainties** *\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts from foundations and corporations. External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds. As of the date of this report, the Foundation has not experienced an adverse impact on its business operations.\n\n* **(c) Income Taxes** *\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue Code and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of Revenue and Taxation Code of the State of California. The Internal Revenue Service has determined that the Foundation is not a private foundation and contributions to it qualify as charitable contributions.\n\nThe Foundation has evaluated the financial statement impact of positions taken or expected to be taken in its tax returns. The Foundation is subject to income taxes on any net income that is derived from a trade or business, regularly carried on, and not in furtherance of the purposes for which it was granted exemption. Net income from any unrelated trade or business, in the opinion of management, is not material to the consolidated financial statements taken as a whole.\n\n* **(d) Financial Statement Presentation** *\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or absence of donor-imposed restrictions in accordance with Accounting Standards Codification (ASC) Topic 958, *Not-for-Profit Entities* .\n\nNet assets without donor restrictions represent unrestricted resources available to support operations and also include previously temporarily restricted resources, which have become available for use by the Foundation in accordance with the intentions of donors.\n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in accordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied and removed by the actions of the Foundation according to the terms of the contribution by the donor.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "The Foundation enters into contracts with its customers that may include promises to transfer multiple performance obligations such as API software subscription, professional service hours, and service level agreement (SLA) and support. The Foundation generally considers these to be one single performance obligation. Determining whether products and services are distinct performance obligations that should be accounted for separately or combined as one unit of accounting may require judgment.\n\nThe transaction price is determined based on consideration to which the Foundation will be entitled in exchange for transferring services to the customer, as stated in the contract. The Foundation has determined that the contracts do not contain a significant financing component.\n\nRevenue is generally recognized ratably over the contract term as the performance obligation is satisfied. The Foundation’s contracts typically are non-cancelable and do not contain refund-type provisions. The Foundation typically invoices its customers annually and its payment terms provide that customers pay within 30 days of invoice. Amounts that have been invoiced are recorded in accounts\n\nreceivable and in deferred revenue (within “Other Liabilities”) or revenue, depending on whether transfer of control to customers has occurred.\n\nRevenue derived from API software subscriptions and professional services is reported within other income, net in the statement of activities. Deferred revenue, revenue, and billings for the years ended June 30, 2024 and 2023 are as follows. Deferred revenue is reported within other liabilities in the statement of financial position.\n\n**2024 2023**\n\nDeferred revenue - beginning balance $ 1,660,000 1,560,000\n\nBillings 3,820,000 3,320,000\n\nLess revenue recognized (3,351,250) (3,220,000)\n\nDeferred revenue - ending balance $ 2,128,750 1,660,000\n\n* **(n) Leases** *\n\nLeases consist of a lease liability for the Foundation’s headquarters in San Francisco. The liability is equal to the present value of lease payments, which are fixed. The present value is calculated using a risk-free discount rate, determined using a period comparable with that of the lease term. The lease term in accordance with ASC 842 does not include options to extend as it is not reasonably certain that the option will be exercised. The Foundation determined during the year ended June 30, 2024 not to renew the lease.\n\n* **(o) Collaborative Arrangement** *\n\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the Wikibase software to support the Wikidata project, which acts as central storage for the structured data of its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. Both the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation also grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the Wikibase software. Since the project is part of the Foundation's mission to make knowledge accessible", - "page_start": 11, - "page_end": 11, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "9\n\nGifts of cash and other assets are reported as contributions with donor restrictions if they are received with donor stipulations that limit the use of the donated assets or are restricted as to time. When a donor restriction expires, that is, when a stipulated time restriction ends or purpose restriction is accomplished, net assets with donor restrictions are reclassified to net assets without donor restrictions and reported in the consolidated statement of activities as net assets released from restrictions.\n\n* **(l) Contributions of Nonfinancial Assets and Services** *\n\nContributions of nonfinancial assets and services include contributed services, as described below.\n\nContributed services are reported at fair value in the consolidated financial statements for voluntary donations of services when those services (1) create or enhance nonfinancial assets, (2) require specialized skills provided by individuals possessing those skills and are services that would be typically purchased if not provided by the donation, and (3) are professional in nature, and have been explicitly agreed to in advance. Contributed services are reported as contributions of nonfinancial assets and services revenue and in-kind service expenses in the consolidated statements of activities. Fair value is estimated based on current local rates for similar services.\n\nA substantial number of volunteers make significant contributions of their time in the furtherance of the Foundation’s projects. The value of this contributed time is not reflected in the accompanying consolidated financial statements, as the criteria above are not met.\n\nContributed service revenue and expenses recorded in the consolidated statements of activities consist of contributed legal services, engineering services, subscription services, and internet hosting services and bandwidth. The amounts of specialized contributed legal services as revenue and expenses are $82,638 and $493,315 for the years ended June 30, 2024 and 2023, respectively. The value of specialized engineering services as revenue and expenses are $0 and $498,800 for the years ended June 30, 2024 and 2023, respectively. The value of donated subscription services as revenue and expenses was $124,738 and $0 for the years ended June 30, 2024 and 2023, respectively. The amounts of contributed internet hosting services and bandwidth for the years ended June 30, 2024 and 2023 is $56,100 and $48,338, respectively. Included in the 2024 and 2023 amounts are donated hosting services and bandwidth from the following companies: (1) FiberRing, (2) Tele2, (3) Datahop, (4) LibertyGlobal, (5) Init7, and (6) Arelion.\n\n* **(m) Revenue Recognition - Contracts With Customers** *\n\nThe Foundation recognizes revenue from contracts with customers related to Wikimedia, LLC under Accounting Standards Codification Topic 606, Revenue from Contracts with Customers, which establishes a principle that revenue is recognized upon transfer of control of promised products and services to customers in an amount that reflects the consideration the Foundation expects to receive in exchange for those products or services.\n\nThe Foundation determines the amount of revenue to be recognized through the application of the following 5-step process: 1) identification of the contract, or contracts, with a customer; 2) identification of the performance obligations in the contract; 3) determination of the transaction price; 4) allocation of the transaction price to the performance obligations in the contract; and 5) recognition of revenue when or as the Foundation satisfies the performance obligations.", - "page_start": 10, - "page_end": 10, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "[ml) from the original on 5 October 2024. Retrieved 5 October 2024.](https://web.archive.org/web/20241005170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/html)\n\n[301. \"AI Safety Institute releases new AI safety evaluations platform\" (https://www.gov.uk/govern](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[ment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform). UK Government.](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[10 May 2024. Archived (https://web.archive.org/web/20241005170207/https://www.gov.uk/g](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[overnment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform) from the](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\noriginal on 5 October 2024. Retrieved 14 May 2024.\n\n302. Regulation of AI to mitigate risks: Berryhill et al. (2019), Barfield & Pagallo (2018), Iphofen &\n\nKritikos (2019), Wirtz, Weyerer & Geyer (2018), Buiten (2019)\n\n303. Law Library of Congress (U.S.). Global Legal Research Directorate (2019).\n\n304. Vincent (2023).\n\n305. Stanford University (2023).\n\n306. UNESCO (2021).\n\n307. Kissinger (2021).\n\n308. Altman, Brockman & Sutskever (2023).\n\n[309. VOA News (25 October 2023). \"UN Announces Advisory Body on Artificial Intelligence\" (http](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[s://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.htm](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[l). Archived (https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-a](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[nnounces-advisory-body-on-artificial-intelligence-/7328732.html) from the original on 18](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\nSeptember 2024. Retrieved 5 October 2024.\n\n[310. \"Council of Europe opens first ever global treaty on AI for signature\" (https://www.coe.int/en/](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature). ](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature) *Council of*\n\n*Europe* [. 5 September 2024. Archived (https://web.archive.org/web/20240917001330/https://](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signat](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[ure) from the original on 17 September 2024. Retrieved 17 September 2024.](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n311. Edwards (2023).\n\n312. Kasperowicz (2023).\n\n313. Fox News (2023).", - "page_start": 46, - "page_end": 46, - "source_file": "wikipedia3.pdf" - }, - { - "text": "and free to everyone in the world, the Foundation's cost related to this collaborative arrangement is included within awards and grants in the statement of activities. The amount included within awards and grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively.\n\n* **(p) Use of Estimates** *\n\nThe preparation of financial statements in conformity with U.S. generally accepted accounting principles requires management to make estimates and assumptions that affect the amounts reported in the consolidated financial statements and accompanying notes. Items subject to such estimates and assumptions include the investment valuations, useful lives of fixed assets, and the valuation of contributed services. Accordingly, actual results could differ from those estimates.\n\n* **(q) Reclassifications** *\n\nCertain reclassifications have been made in the financial statements to conform 2023 information to the 2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and losses on investments separately from investment income, net. This resulted in a reclassification of $3,547,510 from investment income, net to unrealized gains on investments within the statement of activities. The Foundation also had a change in accounting policy to no longer present the Wikimania event as special event expense, net in the statement of activities. Revenue from registration sales is now reported within other income, net, and expenses are reported within travel and conference expenses. This resulted in a reclassification of $698,141 from special event expenses to travel and conference expenses in the statement of activities.\n\n**(2) Contributions Receivable**\n\nAs of June 30, 2024 and 2023, contributions receivable is $1,571,657 and $0, respectively, and represents contributions receivable from two grants, as well as contributions receivable from payment processors.", - "page_start": 12, - "page_end": 12, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - } - ] - }, - { - "references": { - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", - "query": "What external events can affect Wikimedia Fundation in raising funds ?", - "target_page": 8, - "target_passage": "External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "**WIKIMEDIA FOUNDATION, INC.**\n\nNotes to Consolidated Financial Statements\n\nJune 30, 2024 and 2023\n\n18\n\nThe Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers additional Foundation donations to the Endowment monthly. Donations that are donor-specified for the Wikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not donor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards and grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and $624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of June 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred to the Wikimedia Endowment for the month of June 2024.\n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with grants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and $500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers and contributors. The grants are recorded as contributions with donor restrictions and within net assets with donor restrictions as of June 30, 2024.\n\n**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of management, the outcome of the pending lawsuits will not materially affect operations or the financial position of the Foundation.\n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the consolidated financial statements were available to be issued, and determined there are no items to disclose.", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(9) Liquidity and Availability of Financial Assets**\n\nThe Foundation’s financial assets available for general expenditure within one year of the balance sheet date, June 30, 2024 and 2023, are as follows:\n\n**2024 2023**\n\nCash and cash equivalents $ 82,845,159 75,808,401\n\nCurrent contributions receivable 856,657 —\n\nShort-term investments 116,074,763 132,216,667\n\nTotal financial assets 199,776,579 208,025,068\n\nLess:\n\nRestricted by donors for programs 5,696,323 5,882,673\n\nDonations payable to Wikimedia Endowment 525,607 5,274,448\n\nFinancial assets available to meet cash needs for\n\ngeneral expenditures within one year $ 193,554,649 196,867,947\n\nThe Foundation’s liquidity management includes a policy of structuring its financial assets to be available to meet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and cash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the primary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the short-term and long-term investments can be liquidated at any time as needed.\n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on September 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the operations and activities of current and future Wikimedia projects, which are projects that are approved by and advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The Foundation does not have control or controlling financial interest in the Wikimedia Endowment and the Wikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a related party to the Foundation because Wikimedia Endowment management is also management at the Foundation.\n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to services provided to the Wikimedia Endowment, primarily for fundraising and general and administrative support under the terms of a cost sharing agreement. These costs are included within the Foundation's expenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the costs is recorded within other income, net.", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n* **(a) Organization and Purpose** *\n\nThe accompanying consolidated financial statements present the financial position, change in net assets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC.\n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. Based in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily through donations and contributions.\n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the Foundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for charitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue Code and is a disregarded entity for tax purposes.\n\n* **(b) Risks and Uncertainties** *\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts from foundations and corporations. External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds. As of the date of this report, the Foundation has not experienced an adverse impact on its business operations.\n\n* **(c) Income Taxes** *\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue Code and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of Revenue and Taxation Code of the State of California. The Internal Revenue Service has determined that the Foundation is not a private foundation and contributions to it qualify as charitable contributions.\n\nThe Foundation has evaluated the financial statement impact of positions taken or expected to be taken in its tax returns. The Foundation is subject to income taxes on any net income that is derived from a trade or business, regularly carried on, and not in furtherance of the purposes for which it was granted exemption. Net income from any unrelated trade or business, in the opinion of management, is not material to the consolidated financial statements taken as a whole.\n\n* **(d) Financial Statement Presentation** *\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or absence of donor-imposed restrictions in accordance with Accounting Standards Codification (ASC) Topic 958, *Not-for-Profit Entities* .\n\nNet assets without donor restrictions represent unrestricted resources available to support operations and also include previously temporarily restricted resources, which have become available for use by the Foundation in accordance with the intentions of donors.\n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in accordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied and removed by the actions of the Foundation according to the terms of the contribution by the donor.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Cardholders choose categories of interest Cardholders choose categories of interest\n\nto them when to them when\n\nthey subscribe. they subscribe.\n\nMerely by using Merely by using\n\nt h i s c a r d f o r t h i s c a r d f o r\n\nactivities like activities like\n\ndaily shopping daily shopping\n\nand dining out, and dining out,\n\ncardholders can contribute to a range of cardholders can contribute to a range of\n\nenvironment preservation organizations environment preservation organizations\n\nthrough The Defense of Green Earth through The Defense of Green Earth\n\nFoundation, in a program under which they Foundation, in a program under which they\n\ndonate 0.5% of sums spent using the card. donate 0.5% of sums spent using the card.\n\nKansai Genki Fund:\n\nA helping hand for the regional economy\n\nKansai Genki Fund Kansai Genki Fund\n\n¥50 billion ¥50 billion\n\n####### **Name**\n\n####### **Size of fund**\n\n####### **Outline**\n\nIn the past, SMBC also worked to provide In the past, SMBC also worked to provide\n\nfunding to the support creation of platforms funding to the support creation of platforms\n\nfor growth in Japan. Now, working through for growth in Japan. Now, working through\n\nthe Bank of Japan’s “Fund-supply measure the Bank of Japan’s “Fund-supply measure\n\nto support strengthening the foundations to support strengthening the foundations\n\nfor economic growth” loan program, it for economic growth” loan program, it\n\nhas established the Environmentally has established the Environmentally\n\nResponsible Company Support Fund and Responsible Company Support Fund and\n\nthe Environmental Facilities Support the Environmental Facilities Support\n\nFund, in support of companies with Fund, in support of companies with\n\nenvironmentally-conscious managements, environmentally-conscious managements,\n\nand which invest in environmental facilities. and which invest in environmental facilities.\n\nGiven the wave of Japanese companies Given the wave of Japanese companies\n\nsetting up operations in China setting up operations in China’s fast-growing s fast-growing\n\nmarket, the bank has also established a China market, the bank has also established a China\n\nBusiness Support Fund to meet the funding Business Support Fund to meet the funding\n\nneeds of companies that plan to make new needs of companies that plan to make new\n\ninvestments in subsidiaries in China. investments in subsidiaries in China.\n\nPromoting environmentally-aware\n\nmanagement and supporting business\n\nventures in China through the fund\n\n**We believe it is important to contribute to maintenance and protection of**\n\n**the natural environment and the sustainable development of regional society**\n\n**through our core business, hand in hand with the customer.**\n\n**For further details, please see our website.**\n\nSupport for companies creating Support for companies creating\n\ngrowth platforms in fields such growth platforms in fields such\n\nas medical and nursing care, as medical and nursing care,\n\nenvironmental and energy tech environmental and energy tech-\n\nnologies, and businesses in Asia nologies, and businesses in Asia\n\nEnvironmentally Responsible Environmentally Responsible\n\nCompany Support Fund Company Support Fund\n\nEnvironmental Facilities Environmental Facilities\n\nSupport Fund Support Fund\n\n¥50 billion ¥50 billion\n\n####### **Name**\n\n####### **Size of fund**\n\n**Outline** <sup>The fund supports companies</sup> The fund supports companies\n\nwith environmentally-aware with environmentally-aware\n\nmanagements or involvement in managements or involvement in\n\nenvironmental businesses environmental businesses\n\nChina Business Support Fund China Business Support Fund\n\n¥50 billion ¥50 billion\n\n####### **Name**\n\n####### **Size of fund**\n\n**Outline** <sup>The fund supports for companies</sup> The fund supports for companies\n\nconsidering moving into China, or considering moving into China, or\n\nexpanding their business there expanding their business there\n\n16", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**WIKIMEDIA FOUNDATION, INC.**\n\nConsolidated Financial Statements\n\nJune 30, 2024 and 2023\n\n(With Independent Auditors’ Report Thereon)", - "page_start": 0, - "page_end": 0, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "7\n\nOnce such stipulations are satisfied, the associated net assets are released from net assets with donor restrictions and recognized as net assets without donor restrictions.\n\nContributions received are recorded as net assets without donor restriction or net assets with donor restrictions depending on the existence and/or nature of any donor restrictions.\n\n* **(e) Cash and Cash Equivalents** *\n\nThe Foundation manages its cash through major financial institutions. At June 30, 2024 and 2023, the carrying amount of the Foundation’s general ledger cash held primarily in nationally recognized financial institutions is $60.0 million and $63.9 million, respectively. Cash balances are insured by the Federal Deposit Insurance Corporation (FDIC) up to the applicable limits. Cash balances held in these financial institutions at June 30, 2024 and 2023 exceed the applicable FDIC insurance limits. The Foundation’s current practice is to maintain at least four months of cash and cash equivalents to support a combination of operating cash and a current reserve fund. The Foundation considers all highly liquid investments with an original maturity of three months or less when purchased to be cash equivalents. Cash equivalents of $22.8 million and $12.0 million as of June 30, 2024 and 2023, respectively, are considered Level 1 under ASC Topic 820, *Fair Value Measurement* .\n\n* **(f) Restricted Cash** *\n\nRestricted cash includes standby letters of credit for (1) the Foundation’s headquarters office lease and (2) one of the Foundation’s Employer of Record responsible for administering compensation and benefits for non-US personnel. As of June 30, 2024, neither letter of credit has been used.\n\n* **(g) Contributions Receivable** *\n\nContributions receivable represent gift amounts due from various entities, which are occasionally directed at specific activities. Contributions receivable due more than one year from the contribution date are discounted to present value using a fair value rate based on the U.S. Treasury bond rate and reflect the risks inherent in these cash flows. Contributions receivable are subject to review and adjustment by management should amounts be deemed uncollectible.\n\n* **(h) Investments** *\n\nThe Foundation’s policy regarding investments is to invest cash in short-term, intermediate-term, and long-term fixed income, and equity instruments without assuming material undue risk to principal. Preservation of principal and maintenance of liquidity are priorities over yield. Investments are reported at fair value with realized and unrealized gains and losses, and accrued interest included as a component of the change in net assets. Additionally, the Foundation holds no shares of donated stock as of June 30, 2024 or 2023, consistent with its policy to sell stock received through donations as soon as possible.\n\nThe Foundation presents its investment portfolios as short-term and long-term based on expectations of the holding period of the investment in line with the investment guidelines stipulated in the investment policy.\n\nASC Topic 820 establishes a fair value hierarchy that prioritizes observable inputs to valuation techniques used to measure fair value. The hierarchy gives the highest priority to unadjusted quoted", - "page_start": 8, - "page_end": 8, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "[several unintended consequences and harms in the present and raised concerns about the risks of AI and](https://en.wikipedia.org/wiki/AI_risk)\n\n[its long-term effects in the future, prompting discussions about regulatory policies to ensure the safety](https://en.wikipedia.org/wiki/AI_safety)\n\n[and benefits of the technology.](https://en.wikipedia.org/wiki/AI_safety)\n\n### **Goals**", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "acquisitions, integrate them effectively, and realize their\n\nanticipated benefits; the variability and timing of new business\n\nopportunities including acquisitions, alliances, customer\n\nrelationships, and supplier authorizations; the incurrence of debt\n\nand contingent liabilities in connection with acquisitions; our\n\nability to access capital markets as needed on reasonable terms;\n\ndisruption of operations at our headquarters or distribution\n\ncenters; risks and uncertainties associated with our foreign\n\noperations, including volatile economic conditions, political\n\ninstability, cultural and legal differences, and currency exchange\n\nfluctuations; the potential for goodwill and intangible asset\n\nimpairment; changes in accounting policies and practices;\n\norganizational changes within the Company; the volatility of our\n\nstock price and the resulting impact on our consolidated financial\n\nstatements; risks related to legal proceedings to which we are a\n\nparty; adverse regulation and legislation, including potential\n\nchanges in tax regulations (e.g., those affecting the use of the\n\nLIFO inventory accounting method and the taxation of foreign-\n\nsourced income); and the occurrence of extraordinary events\n\n(including prolonged labor disputes, natural events and acts of\n\nGod, terrorist acts, fires, floods, and accidents). Other factors\n\nand unanticipated events could also adversely affect our business,\n\nfinancial condition or results of operations. We discuss certain of\n\nthese matters more fully throughout our “Management’s\n\nDiscussion and Analysis” as well as other of our filings with the\n\nSecurities and Exchange Commission, including our Annual\n\nReport on Form 10-K for the year ended June 30, 2012.\n\n12\n\n#### MANAGEMENT’S DISCUSSION AND ANALYSIS\n\n#### OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS (Continued)", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "and free to everyone in the world, the Foundation's cost related to this collaborative arrangement is included within awards and grants in the statement of activities. The amount included within awards and grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively.\n\n* **(p) Use of Estimates** *\n\nThe preparation of financial statements in conformity with U.S. generally accepted accounting principles requires management to make estimates and assumptions that affect the amounts reported in the consolidated financial statements and accompanying notes. Items subject to such estimates and assumptions include the investment valuations, useful lives of fixed assets, and the valuation of contributed services. Accordingly, actual results could differ from those estimates.\n\n* **(q) Reclassifications** *\n\nCertain reclassifications have been made in the financial statements to conform 2023 information to the 2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and losses on investments separately from investment income, net. This resulted in a reclassification of $3,547,510 from investment income, net to unrealized gains on investments within the statement of activities. The Foundation also had a change in accounting policy to no longer present the Wikimania event as special event expense, net in the statement of activities. Revenue from registration sales is now reported within other income, net, and expenses are reported within travel and conference expenses. This resulted in a reclassification of $698,141 from special event expenses to travel and conference expenses in the statement of activities.\n\n**(2) Contributions Receivable**\n\nAs of June 30, 2024 and 2023, contributions receivable is $1,571,657 and $0, respectively, and represents contributions receivable from two grants, as well as contributions receivable from payment processors.", - "page_start": 12, - "page_end": 12, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "meta-problem will solve or dissolve the hard problem. A weaker line holds that it will not\n\nremove the hard problem, but it will constrain the form of a solution.\n\nIn other words, the 'strong line' holds that the solution to the meta-problem would provide an explanation\n\nof our beliefs about consciousness that is independent of consciousness. That would debunk our beliefs\n\nabout consciousness, in the same way that explaining beliefs about god in evolutionary terms may\n\nprovide arguments against theism itself. <sup>[144]</sup>\n\n[Tom Stoppard's play ](https://en.wikipedia.org/wiki/Tom_Stoppard) *[The Hard Problem](https://en.wikipedia.org/wiki/The_Hard_Problem)* , first produced in 2015, is named after the hard problem of\n\nconsciousness, which Stoppard defines as having \"subjective First Person experiences\". <sup>[145]</sup>\n\n* **[Philosophy portal](https://en.wikipedia.org/wiki/Portal:Philosophy)** *\n\n[Animal consciousness](https://en.wikipedia.org/wiki/Animal_consciousness)\n\n[Artificial consciousness](https://en.wikipedia.org/wiki/Artificial_consciousness)\n\n[Binding problem](https://en.wikipedia.org/wiki/Binding_problem)\n\n[Blindsight](https://en.wikipedia.org/wiki/Blindsight)\n\n[Chinese room](https://en.wikipedia.org/wiki/Chinese_room)\n\n*[Cogito, ergo sum](https://en.wikipedia.org/wiki/Cogito,_ergo_sum)*\n\n[Cryonics](https://en.wikipedia.org/wiki/Cryonics)\n\n[Free will](https://en.wikipedia.org/wiki/Free_will)\n\n[Ideasthesia](https://en.wikipedia.org/wiki/Ideasthesia)\n\n[Introspection](https://en.wikipedia.org/wiki/Introspection)\n\n[Knowledge by acquaintance](https://en.wikipedia.org/wiki/Knowledge_by_acquaintance)\n\n[List of unsolved problems in biology](https://en.wikipedia.org/wiki/List_of_unsolved_problems_in_biology)\n\n[Mind- body problem](https://en.wikipedia.org/wiki/Mind%E2%80%93body_problem)\n\n[Phenomenalism](https://en.wikipedia.org/wiki/Phenomenalism)\n\n[Philosophy of self](https://en.wikipedia.org/wiki/Philosophy_of_self)\n\n[Primary- secondary quality distinction](https://en.wikipedia.org/wiki/Primary%E2%80%93secondary_quality_distinction)\n\n[Problem of mental causation](https://en.wikipedia.org/wiki/Problem_of_mental_causation)\n\n[Problem of other minds](https://en.wikipedia.org/wiki/Problem_of_other_minds)\n\n[Vertiginous question](https://en.wikipedia.org/wiki/Vertiginous_question)\n\n[Von Neumann- Wigner interpretation](https://en.wikipedia.org/wiki/Von_Neumann%E2%80%93Wigner_interpretation)\n\n1. \"But, without any delusive representations of images or phantasms, I am most certain that I\n\nam, and that I know and delight in this. In respect to these truths I am not at all afraid of the\n\narguments of the Academians, who say, What if you are deceived? For if I am deceived, I\n\nam. For he who is not, cannot be deceived...\"\n\n2. There has been debate over how best to characterize James' position. The *Stanford*\n\n*Encyclopedia of Philosophy* states: \"James’s commitment to panpsychism remains\n\nsomewhat controversial, since he also advanced a cogent set of objections against a\n\nversion of the view, which he labelled the 'mind dust' theory, in chapter six of The Principles\n\nof Psychology ([1890] 1981). These objections are the inspiration for the so-called\n\n'combination problem', around which much of the twenty first century literature on\n\npanpsychism focuses.\"\n\n### **In popular culture**\n\n### **See also**\n\n### **Notes**\n\n### **References**", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia2.pdf" - } - ] - }, - { - "references": { - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", - "query": "What include Wikimedia Fundation restricted cash ?", - "target_page": 9, - "target_passage": "Restricted cash includes standby letters of credit for (1) the Foundation’s headquarters office lease and (2) one of the Foundation’s Employer of Record responsible for administering compensation and benefits for non-US personnel.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**(9) Liquidity and Availability of Financial Assets**\n\nThe Foundation’s financial assets available for general expenditure within one year of the balance sheet date, June 30, 2024 and 2023, are as follows:\n\n**2024 2023**\n\nCash and cash equivalents $ 82,845,159 75,808,401\n\nCurrent contributions receivable 856,657 —\n\nShort-term investments 116,074,763 132,216,667\n\nTotal financial assets 199,776,579 208,025,068\n\nLess:\n\nRestricted by donors for programs 5,696,323 5,882,673\n\nDonations payable to Wikimedia Endowment 525,607 5,274,448\n\nFinancial assets available to meet cash needs for\n\ngeneral expenditures within one year $ 193,554,649 196,867,947\n\nThe Foundation’s liquidity management includes a policy of structuring its financial assets to be available to meet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and cash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the primary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the short-term and long-term investments can be liquidated at any time as needed.\n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on September 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the operations and activities of current and future Wikimedia projects, which are projects that are approved by and advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The Foundation does not have control or controlling financial interest in the Wikimedia Endowment and the Wikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a related party to the Foundation because Wikimedia Endowment management is also management at the Foundation.\n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to services provided to the Wikimedia Endowment, primarily for fundraising and general and administrative support under the terms of a cost sharing agreement. These costs are included within the Foundation's expenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the costs is recorded within other income, net.", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "7\n\nOnce such stipulations are satisfied, the associated net assets are released from net assets with donor restrictions and recognized as net assets without donor restrictions.\n\nContributions received are recorded as net assets without donor restriction or net assets with donor restrictions depending on the existence and/or nature of any donor restrictions.\n\n* **(e) Cash and Cash Equivalents** *\n\nThe Foundation manages its cash through major financial institutions. At June 30, 2024 and 2023, the carrying amount of the Foundation’s general ledger cash held primarily in nationally recognized financial institutions is $60.0 million and $63.9 million, respectively. Cash balances are insured by the Federal Deposit Insurance Corporation (FDIC) up to the applicable limits. Cash balances held in these financial institutions at June 30, 2024 and 2023 exceed the applicable FDIC insurance limits. The Foundation’s current practice is to maintain at least four months of cash and cash equivalents to support a combination of operating cash and a current reserve fund. The Foundation considers all highly liquid investments with an original maturity of three months or less when purchased to be cash equivalents. Cash equivalents of $22.8 million and $12.0 million as of June 30, 2024 and 2023, respectively, are considered Level 1 under ASC Topic 820, *Fair Value Measurement* .\n\n* **(f) Restricted Cash** *\n\nRestricted cash includes standby letters of credit for (1) the Foundation’s headquarters office lease and (2) one of the Foundation’s Employer of Record responsible for administering compensation and benefits for non-US personnel. As of June 30, 2024, neither letter of credit has been used.\n\n* **(g) Contributions Receivable** *\n\nContributions receivable represent gift amounts due from various entities, which are occasionally directed at specific activities. Contributions receivable due more than one year from the contribution date are discounted to present value using a fair value rate based on the U.S. Treasury bond rate and reflect the risks inherent in these cash flows. Contributions receivable are subject to review and adjustment by management should amounts be deemed uncollectible.\n\n* **(h) Investments** *\n\nThe Foundation’s policy regarding investments is to invest cash in short-term, intermediate-term, and long-term fixed income, and equity instruments without assuming material undue risk to principal. Preservation of principal and maintenance of liquidity are priorities over yield. Investments are reported at fair value with realized and unrealized gains and losses, and accrued interest included as a component of the change in net assets. Additionally, the Foundation holds no shares of donated stock as of June 30, 2024 or 2023, consistent with its policy to sell stock received through donations as soon as possible.\n\nThe Foundation presents its investment portfolios as short-term and long-term based on expectations of the holding period of the investment in line with the investment guidelines stipulated in the investment policy.\n\nASC Topic 820 establishes a fair value hierarchy that prioritizes observable inputs to valuation techniques used to measure fair value. The hierarchy gives the highest priority to unadjusted quoted", - "page_start": 8, - "page_end": 8, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "the Consolidated Statements of Cash Flows.)\n\n**Restricted Cash** Restricted cash decreased to $2.1 million at December 31, 2000 from $10.9 million at December 31, 1999. The majority of\n\nrestricted cash was held as security with respect to cash provided in Hungary by banks participating in Euro n e t ’s ATM network, to cover\n\n2 0", - "page_start": 21, - "page_end": 21, - "source_file": "NASDAQ_EEFT_2000.pdf" - }, - { - "text": "**WIKIMEDIA FOUNDATION, INC.**\n\nNotes to Consolidated Financial Statements\n\nJune 30, 2024 and 2023\n\n18\n\nThe Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers additional Foundation donations to the Endowment monthly. Donations that are donor-specified for the Wikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not donor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards and grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and $624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of June 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred to the Wikimedia Endowment for the month of June 2024.\n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with grants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and $500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers and contributors. The grants are recorded as contributions with donor restrictions and within net assets with donor restrictions as of June 30, 2024.\n\n**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of management, the outcome of the pending lawsuits will not materially affect operations or the financial position of the Foundation.\n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the consolidated financial statements were available to be issued, and determined there are no items to disclose.", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n* **(a) Organization and Purpose** *\n\nThe accompanying consolidated financial statements present the financial position, change in net assets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC.\n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. Based in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily through donations and contributions.\n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the Foundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for charitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue Code and is a disregarded entity for tax purposes.\n\n* **(b) Risks and Uncertainties** *\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts from foundations and corporations. External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds. As of the date of this report, the Foundation has not experienced an adverse impact on its business operations.\n\n* **(c) Income Taxes** *\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue Code and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of Revenue and Taxation Code of the State of California. The Internal Revenue Service has determined that the Foundation is not a private foundation and contributions to it qualify as charitable contributions.\n\nThe Foundation has evaluated the financial statement impact of positions taken or expected to be taken in its tax returns. The Foundation is subject to income taxes on any net income that is derived from a trade or business, regularly carried on, and not in furtherance of the purposes for which it was granted exemption. Net income from any unrelated trade or business, in the opinion of management, is not material to the consolidated financial statements taken as a whole.\n\n* **(d) Financial Statement Presentation** *\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or absence of donor-imposed restrictions in accordance with Accounting Standards Codification (ASC) Topic 958, *Not-for-Profit Entities* .\n\nNet assets without donor restrictions represent unrestricted resources available to support operations and also include previously temporarily restricted resources, which have become available for use by the Foundation in accordance with the intentions of donors.\n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in accordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied and removed by the actions of the Foundation according to the terms of the contribution by the donor.", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 27\n\n####### **LIQUIDITY AND CAPITAL RESOURCES**\n\nWe strive to maintain a level of liquidity sufficient to allow us to cover our seasonal cash needs and to maintain appropriate levels of short-\n\nterm borrowings. We believe that our operating cash flows, available credit facilities and potential future borrowings are sufficient to finance\n\nour cash requirements for the next 12 months and beyond.\n\nOver the long term, we manage our cash and capital structure to maximize shareholder return, maintain our financial position, manage\n\nrefinancing risk and allow flexibility for strategic initiatives. We regularly assess our debt and leverage levels, capital expenditure\n\nrequirements, debt service payments, dividend payouts, potential share repurchases and other future investments. We believe that as of\n\nJanuary 31, 2015, our existing cash and cash equivalents on-hand of $827, available credit facilities of $800 and potential future operating\n\ncash flows and borrowings will be sufficient to fund these scheduled future payments and potential long-term initiatives. Additionally, if an\n\nagreement is reached and a transaction is consummated in regards to our credit card receivables, it could result in additional cash flows to\n\nfurther support our capital requirements and strategic initiatives.\n\n####### **Operating Activities**\n\nNet cash provided by operating activities was $1,220 in 2014, $1,320 in 2013 and $1,110 in 2012. The majority of our operating cash inflows\n\nare derived from sales. We also receive cash payments for property incentives from developers. Our operating cash outflows generally\n\nconsist of payments to our merchandise vendors (net of vendor allowances), payments to our employees for wages, salaries and other\n\nemployee benefits and payments to our landlords for rent. Operating cash outflows also include payments for income taxes and interest\n\npayments on our short-term and long-term borrowings.\n\nCash provided by operating activities decreased in 2014 compared with 2013, which was primarily due to higher state tax payments made in\n\n2014 compared with 2013, as well as changes in working capital in 2014.\n\nCash provided by operating activities increased in 2013 compared with 2012, resulting from less state tax payments made in 2013 due to\n\nadditional payments made in 2012 as a result of the 53rd week, along with increased property incentives received from developers and\n\nchanges in working capital.\n\n####### **Investing Activities**\n\nNet cash used in investing activities was $889 in 2014, $822 in 2013 and $369 in 2012. Our investing cash flows primarily consist of capital\n\nexpenditures, changes in restricted cash accumulated for debt maturities and changes in credit card receivables associated with cardholder\n\npurchases outside of Nordstrom using our Nordstrom Visa credit cards.\n\nCapital Expenditures\n\nOur capital expenditures over the last three years totaled $2,177, with $861 in 2014, $803 in 2013 and $513 in 2012. Capital expenditures\n\nincreased in 2014 compared with 2013 primarily due to ongoing store expansion and increased technology investments.\n\nCapital expenditures increased in 2013 compared with 2012 as we continued to make progress executing our customer strategy through\n\nincreased investments in technology, ecommerce, remodels and new stores, including Nordstrom Rack and our Manhattan full-line store.\n\nThe following table summarizes our store count and square footage activity:\n\n**Store count Square footage**\n\n**Fiscal year 2014 2013 2012 2014 2013 2012**\n\nTotal, beginning of year **260** 240 225 **26.0** 25.3 24.7\n\nStore openings:\n\nNordstrom full-line stores - U.S. **2** — 1 **0.3** — 0.1\n\nNordstrom Rack and other stores <sup>1</sup> **29** 22 15 **1.2** 0.7 0.6\n\nStores acquired **4** — — **—** —\n\nStores closed **(3)** (2) (1) **(0.4)** — (0.1)\n\n**Total, end of year 292** 260 240 **27.1** 26.0 25.3", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Financial Statements\n\n**67**\n\nFinancial Statements\n\nNote\n\n2013\n\n$’000\n\n2012\n\n$’000\n\nCash flows from operating activities\n\nReceipts from customers (net of goods and services tax) 332,624 361,754\n\nPayments to suppliers and employees (net of goods and services tax) (224,500) (182,759)\n\nInterest received 2,587 1,394\n\nFinance costs paid (10,120) (8,431)\n\nIncome tax paid (15,571) (6,711)\n\nNet cash inflow from operating activities 25 85,020 165,247\n\nCash flows from investing activities\n\nPayments for property, plant and equipment (7,035) (92,343)\n\nPayments for exploration, evaluation and development (122,722) (75,054)\n\nPayments for acquisition of Bowdens Silver Project - (41,000)\n\nCash acquired on acquisition of subsidiaries, net of cash paid - 136\n\nInterest capitalised to expansion and development projects (3,948) (6,939)\n\nDeposits and debt service reserve account (8,612) (2,470)\n\nPayments for other assets (108) (3,526)\n\nNet cash outflow from investing activities (142,425) (221,196)\n\nCash flows from financing activities\n\nProceeds from borrowings, net of transaction costs 133,968 96,627\n\nRepayment of borrowings (116,250) (26,622)\n\nProceeds from the issue of shares - 70,792\n\nPayments for acquisition of non-controlling interests - (11,359)\n\nDividends paid (19,409) (18,933)\n\nNet cash (outflow) / inflow from financing activities (1,691) 110,505\n\nNet (decrease) / increase in cash held (59,096) 54,556\n\nCash at the beginning of the year 90,623 35,864\n\nEffects of exchange rates on cash and cash equivalents 1,460 203\n\nCash at the end of the year 7 32,987 90,623\n\nThe above Statement of Cash Flows should be read in conjunction with the accompanying notes.\n\n## **Statement of Cash Flows**\n\nfor the year ended 30 June 2013", - "page_start": 68, - "page_end": 68, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "##### **Tesla, Inc.**\n\n##### **Consolidated Statements of Cash Flows**\n\n##### **(in millions)**\n\n##### **(unaudited)**\n\n**Nine Months Ended September 30,**\n\n**2024 2023**\n\n**Cash Flows from Operating Activities**\n\nNet income $ 4,821 $ 7,031\n\nAdjustments to reconcile net income to net cash provided by operating activities:\n\nDepreciation, amortization and impairment 3,872 3,435\n\nStock-based compensation 1,420 1,328\n\nInventory and purchase commitments write-downs 247 361\n\nForeign currency transaction net unrealized loss (gain) 197 (317)\n\nDeferred income taxes 418 (316)\n\nNon-cash interest and other operating activities 83 94\n\nChanges in operating assets and liabilities:\n\nAccounts receivable 144 377\n\nInventory (1,107) (1,953)\n\nOperating lease vehicles (82) (1,858)\n\nPrepaid expenses and other assets (2,639) (1,992)\n\nAccounts payable, accrued and other liabilities 2,504 1,922\n\nDeferred revenue 231 774\n\nNet cash provided by operating activities 10,109 8,886\n\n**Cash Flows from Investing Activities**\n\nPurchases of property and equipment excluding finance leases, net of sales (8,556) (6,592)\n\nPurchases of solar energy systems, net of sales (6) —\n\nPurchases of investments (20,797) (13,221)\n\nProceeds from maturities of investments 17,975 8,959\n\nProceeds from sales of investments 200 138\n\nBusiness combinations, net of cash acquired — (64)\n\nNet cash used in investing activities (11,184) (10,780)\n\n**Cash Flows from Financing Activities**\n\nProceeds from issuances of debt 4,360 2,526\n\nRepayments of debt (1,783) (887)\n\nProceeds from exercises of stock options and other stock issuances 788 548\n\nPrincipal payments on finance leases (291) (340)\n\nDebt issuance costs (6) (23)\n\nDistributions paid to noncontrolling interests in subsidiaries (76) (105)\n\nPayments for buy-outs of noncontrolling interests in subsidiaries (124) (17)\n\nNet cash provided by financing activities 2,868 1,702\n\nEffect of exchange rate changes on cash and cash equivalents and restricted cash (8) (142)\n\nNet increase (decrease) in cash and cash equivalents and restricted cash 1,785 (334)\n\nCash and cash equivalents and restricted cash, beginning of period 17,189 16,924\n\nCash and cash equivalents and restricted cash, end of period $ 18,974 $ 16,590\n\n**Supplemental Non-Cash Investing and Financing Activities**\n\nAcquisitions of property and equipment included in liabilities $ 2,727 $ 1,717\n\nLeased assets obtained in exchange for finance lease liabilities $ 32 $ 1\n\nLeased assets obtained in exchange for operating lease liabilities $ 1,232 $ 1,548\n\nThe accompanying notes are an integral part of these consolidated financial statements.\n\n9", - "page_start": 11, - "page_end": 11, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**84**\n\n2013\n\n$’000\n\n2012\n\n$’000\n\n### 7. Cash and cash equivalents and restricted cash\n\nCurrent\n\nCash on hand 18 17\n\nDeposits at call 30,476 87,014\n\nCash and other bank balances 30,494 87,031\n\nOther deposits 2,493 3,592\n\nTotal cash and cash equivalents - current 32,987 90,623\n\nNon-current\n\nRestricted cash 5,474 -\n\nTotal restricted cash - non-current 5,474 -\n\nCash on hand\n\nThese are petty cash balances held by subsidiaries.\n\nDeposits at call\n\nThe deposits at call are bearing floating interest rates and they may be accessed daily.\n\nOther deposits\n\nThis represents restricted cash held on deposit with financial institutions.\n\nRestricted cash\n\nUnder the terms of the loan facilities (see Note 16), the Group is required to maintain a minimum cash balance of US$5 million in respect of Akara.\n\nRisk exposure\n\nThe Group’s exposure to interest rate risk and a sensitivity analysis for financial assets and liabilities are disclosed in Note 28.\n\n### 8. Receivables\n\nTrade receivables - 3,201\n\nOther debtors 9,431 9,025\n\nTotal receivables 9,431 12,226\n\nTrade receivables\n\nTrade receivables represent gold sales at the end of the financial year, where payment was yet to be received. No trade receivables were past due or impaired as at 30 June\n\n2013 (2012: nil).\n\nOther debtors\n\nOther debtors mainly relate to GST / VAT receivables, advances made for land acquisition and diesel fuel tax credits.\n\nRisk exposure\n\nThe Group’s exposure to credit and currency is disclosed in Note 28.", - "page_start": 85, - "page_end": 85, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "**WIKIMEDIA FOUNDATION, INC.**\n\nConsolidated Statements of Cash Flows\n\nYears ended June 30, 2024 and 2023\n\n**2024 2023**\n\nCash flows from operating activities:\n\nIncrease in net assets $ 16,584,053 15,619,804\n\nAdjustments to reconcile increase in net assets to net cash\n\nprovided by operating activities:\n\nDepreciation and amortization 4,216,271 4,602,064\n\nLoss on disposal of equipment 203,233 64,518\n\nUnrealized and realized gains on investments, net (8,356,376) (2,276,210)\n\nRight of use asset - operating lease, net 1,821,432 1,404,875\n\nChanges in operating assets and liabilities:\n\nContributions receivable (1,571,657) 700,000\n\nPrepaid expenses and other current assets (152,972) (469,201)\n\nAccounts payable 1,225,678 (483,402)\n\nAccrued expenses 1,037,299 1,224,690\n\nLease liability (1,666,935) (1,618,384)\n\nDonations payable to Wikimedia Endowment (4,748,841) 5,254,730\n\nOther liabilities 205,056 (65,560)\n\nNet cash provided by operating activities 8,796,241 23,957,924\n\nCash flows from investing activities:\n\nPurchase of computer equipment and office furniture (4,435,982) (4,006,566)\n\nDevelopment of internal use software 2,235,481 (3,076,098)\n\nPurchase of investments (92,176,499) (49,998,612)\n\nProceeds from sales and maturities of investments 92,649,341 58,016,155\n\nNet cash provided by (used in) investing activities (1,727,659) 934,879\n\nNet increase in cash, cash equivalents, and\n\nrestricted cash 7,068,582 24,892,803\n\nCash, cash equivalents, and restricted cash at beginning of year 77,205,118 52,312,315\n\nCash, cash equivalents, and restricted cash at end of year $ 84,273,700 77,205,118\n\nSupplemental cash flow disclosure:\n\nNoncash changes in exchange rate $ 290,621 (96,027)\n\nInitial recognition of right of use asset - operating lease — (3,226,048)\n\nInitial recognition of lease liability — 3,580,607\n\nSee accompanying notes to consolidated financial statements.\n\n5 6", - "page_start": 6, - "page_end": 6, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200471_en.pdf", - "query": "What is the price of the The Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", - "target_page": 8, - "target_passage": "£6.90", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**18.** Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the\n\n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these\n\nRegulations.\n\n###### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus,\n\nPublic Health Information for International Passengers) (England) Regulations 2020 and the\n\nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England)\n\n(Amendment) Regulations 2021.\n\nThey impose requirements on certain categories of person to provide information upon arrival in\n\nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the\n\nspread of infection or contamination from coronavirus or coronavirus disease. They also impose\n\nobligations on operators to ensure that passengers receive information and comply with the\n\nrequirements.\n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum\n\nhas been published alongside this instrument at www.legislation.gov.uk.\n\n© Crown copyright 2021\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(3) In regulation 4ZA—\n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel\n\nand Operator Liability) (England) Regulations 2021”;\n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus,\n\nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute\n\n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator\n\nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability\n\nRegulations”)”;\n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations”\n\nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator\n\nLiability Regulations”;\n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph\n\n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”.\n\n**2.** —(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations\n\n2020( **a** ) are amended as follows.\n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International\n\nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection\n\n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”.\n\n(3) In regulation 6(1)—\n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating\n\nworker”, for “regulation 4” substitute “regulation 9”;\n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health\n\nProtection (Coronavirus, International Travel and Operator Liability) (England)\n\nRegulations 2021”.\n\nSCHEDULE 16 Regulation 26(3)\n\n#### Transitional provision\n\n**1.** Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to\n\nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations\n\n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information\n\nprovided for the purposes of these Regulations where the person arrives in England on or after that\n\ndate.\n\n**2.** Confirmation given by the Foreign, Commonwealth and Development Office that a person is\n\nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that\n\nthe person is not required to comply with regulation 6 of these Regulations where the person\n\narrives in England on or after 4.00 a.m. on 17th May 2021.\n\n**3.** A designation by the Secretary of State of a person as an authorised person under regulation\n\n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person\n\nunder of regulation 11(11)(c) of these Regulations.\n\n**4.** Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who\n\nexercises the powers in that regulation in relation to a person who arrived in England before 4.00\n\na.m. on 17th May 2021.\n\n( **a** ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local\n\nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the\n\nincidence or transmission of coronavirus.”.\n\n### **Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n\n## **2015**\n\n**18.** The Special Educational Needs and Disability (Detained Persons) Regulations 2015( **a** ) are\n\namended as follows.\n\n**19.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**20.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n\n(d) regulation 19 (requirement to consider mediation);\n\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to\n\npursue mediation);\n\n(f) regulation 21 (mediation);\n\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n\n(h) regulation 27(3) (steps to be taken by a home authority);\n\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n\n(j) regulation 30(3) and (6) (unopposed appeals).”.\n\n**21.** In regulation 4 (determination whether or not special educational provision may be\n\nnecessary), after paragraph (2) insert—\n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if\n\nit is impractical to do so because of a reason relating to the incidence or transmission of\n\ncoronavirus.”.\n\n**22.** In regulation 5(4) (decision whether or not to conduct a detained person’s EHC needs\n\nassessment)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“, or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n) S.I. 2015/62.", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S\n\n## **2020 No. 471**\n\n## **EDUCATION, ENGLAND**\n\n## The Special Educational Needs and Disability (Coronavirus)\n\n## (Amendment) Regulations 2020\n\n*Made* *-* *-* *-* *-* *28th April 2020*\n\n## *Laid before Parliament* *30th April* *2020*\n\n*Coming into force* *-* *-* *1st May* *2020*\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by\n\nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3)\n\nand 135(2) and (3) of the Children and Families Act 2014( **a** ) and sections 29(3) and 569(4) of the\n\nEducation Act 1996( **b** ).\n\n### **Citation and commencement**\n\n**1.** These Regulations may be cited as the Special Educational Needs and Disability\n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.\n\n### **Review and expiry**\n\n**2.** —(1) The Secretary of State must review the effectiveness of these Regulations during the\n\nperiod for which they have effect.\n\n(2) These Regulations cease to have effect on 25th September 2020.\n\n### **Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.** The Special Educational Needs and Disability Regulations 2014( **c** ) are amended as follows.\n\n**4.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**5.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\n( **a** ) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16).\n\n( **b** ) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and\n\nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education\n\n(Wales) Measure 2009.\n\n( **c** ) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "**23.** In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the\n\nend of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**24.** In regulation 10(4) (decision not to secure an EHC plan)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“; or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n**25.** In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”.\n\n**26.** In regulation 29 (compliance with the orders of the First-tier Tribunal)—\n\n(a) after paragraph (6) insert—\n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d)\n\napply.”.\n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”.\n\n**27.** In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”.\n\n### **Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n\n### **Recommendations Power) Regulations 2017**\n\n**28.** The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power)\n\nRegulations 2017( **a** ) are amended as follows.\n\n**29.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**30.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.\n\n*Vicky Ford*\n\nParliamentary Under Secretary of State\n\n28th April 2020 Department for Education\n\n) S.I. 2017/1306.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational\n\nneeds and disability in order to provide exceptions to time limits set out in that legislation where\n\nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus.\n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review\n\nthe effectiveness of the Regulations during the period in which they have effect. The Regulations\n\ncease to have effect on 25th September 2020.\n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the\n\nSEND Regulations 2014’).\n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain\n\nrequirements in those Regulations for actions to be taken within specified time limits where it is\n\nnot reasonably practicable for a person to meet those requirements for a reason relating to the\n\nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a\n\nrequirement for such action to be taken as soon as reasonably practicable.\n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits.\n\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014\n\n(‘the Personal Budgets Regulations 2014’).\n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as\n\nregulation 5 does in respect of the SEND Regulations 2014.\n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons)\n\nRegulations 2015 (‘the Detained Persons Regulations 2015’).\n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to\n\nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal\n\nBudgets Regulations 2014 respectively.\n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax\n\ntime limits.\n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal\n\nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’).\n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to\n\nthose in regulations 5, 17 and 20.\n\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency\n\nmeasure and no significant impact on business, charities or voluntary bodies is foreseen.\n\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk.\n\n© Crown copyright 2020\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**10.** In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”.\n\n**11.** After regulation 18 (circumstances in which a local authority must review an EHC plan)\n\ninsert—\n\n“ **Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.** —(1) It is not necessary for a local authority to review an EHC plan in accordance\n\nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the\n\nincidence or transmission of coronavirus.\n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as\n\nsoon as reasonably practicable.”.\n\n**12.** In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert—\n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3)\n\nand (4) if it is impractical to do so because of a reason relating to the incidence or\n\ntransmission of coronavirus.”.\n\n**13.** In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)—\n\n(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**14.** In regulation 45 (unopposed appeals), after paragraph (7) insert—\n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e)\n\napply.”.\n\n### **Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.** The Special Educational Needs (Personal Budgets) Regulations 2014( **a** ) are amended as\n\nfollows.\n\n**16.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**17.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time period due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, the requirement for the local authority\n\nto review the making and use of direct payments within the first three months of them being\n\nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read\n\ninstead as a requirement for such action to be taken as soon as reasonably practicable.\n\n) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "#### PART 6\n\n##### Final provisions\n\n###### **Review of need for requirements**\n\n**24.** The Secretary of State must review the need for the requirements imposed by these\n\nRegulations by 14th June 2021 and at least once every 28 days thereafter.\n\n###### **Expiry of Regulations**\n\n**25.** These Regulations expire at the end of 16th May 2022.\n\n###### **Revocations, transitional provision consequential amendments and savings**\n\n**26.** —(1) The following Regulations are revoked—\n\n(a) the Health Protection (Coronavirus, Public Health Information for International\n\nPassengers) (England) Regulations 2020( **a** );\n\n(b) the Health Protection (Coronavirus, International Travel) (England) Regulations 2020\n\n(“the International Travel Regulations”)( **b** ); and\n\n(c) the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability)\n\n(England) (Amendment) Regulations 2021( **c** ).\n\n(2) Schedule 15 makes consequential amendments to other instruments specified in that\n\nSchedule.\n\n(3) Schedule 16 makes transitional provisions.\n\n(4) Nothing in these Regulations applies in relation to a person who arrived in England before\n\n4.00 a.m. on 17th May 2021 (and accordingly, the regulations mentioned in paragraph (1)\n\ncontinue to have effect in relation to such a person).\n\nSigned by authority of the Secretary of State\n\n*Robert Courts*\n\nParliamentary Under Secretary of State\n\nAt 10.32 a.m. on 14th May 2021 Department for Transport\n\n( **a** ) S.I. 2020/567.\n\n( **b** ) S.I. 2020/568.\n\n( **c** ) S.I. 2021/38.", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "3\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by\n\nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984( **a** ).\n\n#### PART 1\n\n##### Introductory\n\n###### **Citation, commencement, extent and application**\n\n**1.** —(1) These Regulations may be cited as the Health Protection (Coronavirus, International\n\nTravel and Operator Liability) (England) Regulations 2021.\n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021.\n\n(3) These Regulations extend to England and Wales and apply in relation to England only.\n\n###### **Interpretation and introduction of Schedules 1 to 4**\n\n**2.** —(1) In these Regulations—\n\n“category 1 arrival” means person who has arrived in England from a category 1 country or\n\nterritory, and has not been in a category 2 country or territory or a category 3 country or\n\nterritory in the period beginning with the 10th day before the date of their arrival in England;\n\n“category 1 country or territory” means a country or territory, or part of a country or territory,\n\nspecified in Schedule 1( **b** );\n\n“category 2 country or territory” means a country or territory or part of a country or territory\n\nspecified in Schedule 2( **c** );\n\n“category 3 country or territory” means a country or territory or part of a country or territory\n\nspecified in Schedule 3( **d** );\n\n“child” means a person under the age of 18;\n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act\n\n1971( **e** );\n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be\n\ncaused by coronavirus);\n\n“designated port” means a port designated for the purposes of Schedule 11;\n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation\n\n2(1) of the Medical Devices Regulations 2002( **f** );\n\n“disability” has the meaning given in the Equality Act 2010( **g** ) (see section 6 of, and Schedule\n\n1 to, that Act);\n\n“immigration officer” means a person appointed by the Secretary of State as an immigration\n\nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971( **h** );\n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11;\n\n“operator” except in regulation 18, means an operator of a relevant service;\n\n( **a** ) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14).\n\n( **b** ) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories.\n\n( **c** ) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories.\n\n( **d** ) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories.\n\n( **e** ) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland\n\nare collectively referred to in that Act as “the common travel area”.\n\n( **f** ) S.I. 2002/618.\n\n( **g** ) 2010 c. 15.\n\n( **h** ) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I.\n\n1993/1813.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(e) where P is required to obtain a testing package or undertake a test under regulation 6 or\n\nSchedule 8—\n\n(i) information generated where P books, or attempts to book, a testing package for the\n\npurposes of regulation 6,\n\n(ii) a copy of any notice given to P which contains information about the requirement to\n\nbook a testing package or to undertake a test,\n\n(iii) information A obtained under paragraph 10(3) or (4) of Schedule 8,\n\n(iv) the results of a test undertaken by P in accordance with Schedule 8 (whether or not\n\nthat test was provided as part of a testing package),\n\n(v) information obtained by A in the course of providing a test that falls within\n\nparagraph (iv) and is undertaken, or in the course of arranging for such a test to be\n\nundertaken, by P (including confirmation that the test was undertaken, details of\n\nwhen and where it was undertaken, any reasons for a test not be being undertaken\n\nand the details of any replacement test to be undertaken);\n\n(f) information provided to an immigration officer pursuant to regulations 3(7), 4(4) or\n\n6(11);\n\n(g) where a sample taken in respect of a day 2 test under regulation 6 has been sequenced, the\n\nsorted BAM file relating to that sample containing all reads aligning to the SARS-CoV-2\n\nreference genome with unaligned and human reads removed;\n\n(h) information provided by, or on behalf of, A by way of explanation for failing to comply\n\nwith regulation 3, 4 or 6, or paragraph 3 of Schedule 8; or\n\n(i) information about any steps taken in relation to A, including details of any fixed penalty\n\nnotice issued under these Regulations.\n\n(3) A may only use relevant information where it is necessary—\n\n(a) for the purpose of carrying out a function under these Regulations;\n\n(b) for the purpose of—\n\n(i) preventing danger to public health as a result of the spread of infection or\n\ncontamination with coronavirus or coronavirus disease,\n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus\n\ndisease, or\n\n(iii) giving effect to any international agreement or arrangement relating to the spread of\n\ninfection or contamination with coronavirus or coronavirus disease; or\n\n(c) for a purpose connected with, or otherwise incidental to, a purpose described in sub-\n\nparagraph (a) or (b).\n\n(4) Subject to paragraph (7), A may only disclose relevant information to another person (the\n\n“recipient”) where it is necessary for the recipient to have the information —\n\n(a) for the purpose of carrying out a function of the recipient under—\n\n(i) these Regulations, or\n\n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of\n\nrequiring the isolation or quarantine of persons who have been outside the common\n\ntravel area, for any of the purposes described in sub-paragraph (b);\n\n(b) for the purpose of—\n\n(i) preventing danger to public health as a result of the spread of infection or\n\ncontamination with coronavirus or coronavirus disease,\n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus\n\ndisease, or\n\n(iii) giving effect to any international agreement or arrangement relating to the spread of\n\ninfection or contamination with coronavirus or coronavirus disease; or", - "page_start": 28, - "page_end": 28, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20200471_en.pdf", - "query": "When come into force the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", - "target_page": 1, - "target_passage": "These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "**18.** Guidance issued by the Secretary of State pursuant to paragraph 4(2) of Schedule 2D to the\n\n2020 Regulations has effect as guidance issued pursuant to paragraph 4(2) of Schedule 9 to these\n\nRegulations.\n\n###### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus,\n\nPublic Health Information for International Passengers) (England) Regulations 2020 and the\n\nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England)\n\n(Amendment) Regulations 2021.\n\nThey impose requirements on certain categories of person to provide information upon arrival in\n\nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the\n\nspread of infection or contamination from coronavirus or coronavirus disease. They also impose\n\nobligations on operators to ensure that passengers receive information and comply with the\n\nrequirements.\n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum\n\nhas been published alongside this instrument at www.legislation.gov.uk.\n\n© Crown copyright 2021\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 90, - "page_end": 90, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(3) In regulation 4ZA—\n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England)\n\nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel\n\nand Operator Liability) (England) Regulations 2021”;\n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus,\n\nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute\n\n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator\n\nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability\n\nRegulations”)”;\n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations”\n\nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator\n\nLiability Regulations”;\n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph\n\n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”.\n\n**2.** —(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations\n\n2020( **a** ) are amended as follows.\n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International\n\nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection\n\n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”.\n\n(3) In regulation 6(1)—\n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating\n\nworker”, for “regulation 4” substitute “regulation 9”;\n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection\n\n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health\n\nProtection (Coronavirus, International Travel and Operator Liability) (England)\n\nRegulations 2021”.\n\nSCHEDULE 16 Regulation 26(3)\n\n#### Transitional provision\n\n**1.** Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to\n\nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations\n\n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information\n\nprovided for the purposes of these Regulations where the person arrives in England on or after that\n\ndate.\n\n**2.** Confirmation given by the Foreign, Commonwealth and Development Office that a person is\n\nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that\n\nthe person is not required to comply with regulation 6 of these Regulations where the person\n\narrives in England on or after 4.00 a.m. on 17th May 2021.\n\n**3.** A designation by the Secretary of State of a person as an authorised person under regulation\n\n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person\n\nunder of regulation 11(11)(c) of these Regulations.\n\n**4.** Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who\n\nexercises the powers in that regulation in relation to a person who arrived in England before 4.00\n\na.m. on 17th May 2021.\n\n( **a** ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local\n\nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the\n\nincidence or transmission of coronavirus.”.\n\n### **Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n\n## **2015**\n\n**18.** The Special Educational Needs and Disability (Detained Persons) Regulations 2015( **a** ) are\n\namended as follows.\n\n**19.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**20.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n\n(d) regulation 19 (requirement to consider mediation);\n\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to\n\npursue mediation);\n\n(f) regulation 21 (mediation);\n\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n\n(h) regulation 27(3) (steps to be taken by a home authority);\n\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n\n(j) regulation 30(3) and (6) (unopposed appeals).”.\n\n**21.** In regulation 4 (determination whether or not special educational provision may be\n\nnecessary), after paragraph (2) insert—\n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if\n\nit is impractical to do so because of a reason relating to the incidence or transmission of\n\ncoronavirus.”.\n\n**22.** In regulation 5(4) (decision whether or not to conduct a detained person’s EHC needs\n\nassessment)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“, or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n) S.I. 2015/62.", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S\n\n## **2020 No. 471**\n\n## **EDUCATION, ENGLAND**\n\n## The Special Educational Needs and Disability (Coronavirus)\n\n## (Amendment) Regulations 2020\n\n*Made* *-* *-* *-* *-* *28th April 2020*\n\n## *Laid before Parliament* *30th April* *2020*\n\n*Coming into force* *-* *-* *1st May* *2020*\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by\n\nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3)\n\nand 135(2) and (3) of the Children and Families Act 2014( **a** ) and sections 29(3) and 569(4) of the\n\nEducation Act 1996( **b** ).\n\n### **Citation and commencement**\n\n**1.** These Regulations may be cited as the Special Educational Needs and Disability\n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.\n\n### **Review and expiry**\n\n**2.** —(1) The Secretary of State must review the effectiveness of these Regulations during the\n\nperiod for which they have effect.\n\n(2) These Regulations cease to have effect on 25th September 2020.\n\n### **Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.** The Special Educational Needs and Disability Regulations 2014( **c** ) are amended as follows.\n\n**4.** In regulation 2(1) (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**5.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\n( **a** ) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16).\n\n( **b** ) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and\n\nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education\n\n(Wales) Measure 2009.\n\n( **c** ) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "**23.** In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the\n\nend of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**24.** In regulation 10(4) (decision not to secure an EHC plan)—\n\n(a) at the end of sub-paragraph (b) omit “or”; and\n\n(b) at the end of sub-paragraph (c) insert—\n\n“; or\n\n(d) of a reason relating to the incidence or transmission of coronavirus”.\n\n**25.** In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”.\n\n**26.** In regulation 29 (compliance with the orders of the First-tier Tribunal)—\n\n(a) after paragraph (6) insert—\n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d)\n\napply.”.\n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”.\n\n**27.** In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”.\n\n### **Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n\n### **Recommendations Power) Regulations 2017**\n\n**28.** The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power)\n\nRegulations 2017( **a** ) are amended as follows.\n\n**29.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**30.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time periods due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, any requirement in any of the\n\nregulations specified in paragraph (3) for action to be taken within a specified period of\n\ntime or by a certain day is to be read instead as a requirement for such action to be taken as\n\nsoon as reasonably practicable.\n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person\n\nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or\n\ntransmission of coronavirus.\n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)—\n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and\n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”.\n\n*Vicky Ford*\n\nParliamentary Under Secretary of State\n\n28th April 2020 Department for Education\n\n) S.I. 2017/1306.", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational\n\nneeds and disability in order to provide exceptions to time limits set out in that legislation where\n\nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus.\n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review\n\nthe effectiveness of the Regulations during the period in which they have effect. The Regulations\n\ncease to have effect on 25th September 2020.\n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the\n\nSEND Regulations 2014’).\n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain\n\nrequirements in those Regulations for actions to be taken within specified time limits where it is\n\nnot reasonably practicable for a person to meet those requirements for a reason relating to the\n\nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a\n\nrequirement for such action to be taken as soon as reasonably practicable.\n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits.\n\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014\n\n(‘the Personal Budgets Regulations 2014’).\n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as\n\nregulation 5 does in respect of the SEND Regulations 2014.\n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons)\n\nRegulations 2015 (‘the Detained Persons Regulations 2015’).\n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to\n\nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal\n\nBudgets Regulations 2014 respectively.\n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax\n\ntime limits.\n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal\n\nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’).\n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to\n\nthose in regulations 5, 17 and 20.\n\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency\n\nmeasure and no significant impact on business, charities or voluntary bodies is foreseen.\n\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk.\n\n© Crown copyright 2020\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "#### PART 6\n\n##### Final provisions\n\n###### **Review of need for requirements**\n\n**24.** The Secretary of State must review the need for the requirements imposed by these\n\nRegulations by 14th June 2021 and at least once every 28 days thereafter.\n\n###### **Expiry of Regulations**\n\n**25.** These Regulations expire at the end of 16th May 2022.\n\n###### **Revocations, transitional provision consequential amendments and savings**\n\n**26.** —(1) The following Regulations are revoked—\n\n(a) the Health Protection (Coronavirus, Public Health Information for International\n\nPassengers) (England) Regulations 2020( **a** );\n\n(b) the Health Protection (Coronavirus, International Travel) (England) Regulations 2020\n\n(“the International Travel Regulations”)( **b** ); and\n\n(c) the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability)\n\n(England) (Amendment) Regulations 2021( **c** ).\n\n(2) Schedule 15 makes consequential amendments to other instruments specified in that\n\nSchedule.\n\n(3) Schedule 16 makes transitional provisions.\n\n(4) Nothing in these Regulations applies in relation to a person who arrived in England before\n\n4.00 a.m. on 17th May 2021 (and accordingly, the regulations mentioned in paragraph (1)\n\ncontinue to have effect in relation to such a person).\n\nSigned by authority of the Secretary of State\n\n*Robert Courts*\n\nParliamentary Under Secretary of State\n\nAt 10.32 a.m. on 14th May 2021 Department for Transport\n\n( **a** ) S.I. 2020/567.\n\n( **b** ) S.I. 2020/568.\n\n( **c** ) S.I. 2021/38.", - "page_start": 30, - "page_end": 30, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**10.** In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”.\n\n**11.** After regulation 18 (circumstances in which a local authority must review an EHC plan)\n\ninsert—\n\n“ **Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.** —(1) It is not necessary for a local authority to review an EHC plan in accordance\n\nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the\n\nincidence or transmission of coronavirus.\n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as\n\nsoon as reasonably practicable.”.\n\n**12.** In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert—\n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3)\n\nand (4) if it is impractical to do so because of a reason relating to the incidence or\n\ntransmission of coronavirus.”.\n\n**13.** In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)—\n\n(a) at the end of sub-paragraph (c) omit “or”; and\n\n(b) at the end of sub-paragraph (d) insert—\n\n“; or\n\n(e) of a reason relating to the incidence or transmission of coronavirus”.\n\n**14.** In regulation 45 (unopposed appeals), after paragraph (7) insert—\n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A)\n\nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e)\n\napply.”.\n\n### **Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.** The Special Educational Needs (Personal Budgets) Regulations 2014( **a** ) are amended as\n\nfollows.\n\n**16.** In regulation 2 (interpretation), at the appropriate place insert—\n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n”.\n\n**17.** After regulation 2 (interpretation) insert—\n\n“ **Relaxation of time period due to coronavirus exception**\n\n**2A.** —(1) Where the coronavirus exception applies, the requirement for the local authority\n\nto review the making and use of direct payments within the first three months of them being\n\nmade in regulation 11(2)(a) (monitoring and review of direct payments) is to be read\n\ninstead as a requirement for such action to be taken as soon as reasonably practicable.\n\n) S.I. 2014/1652, to which there are amendments not relevant to these Regulations.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" - }, - { - "text": "3\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by\n\nsections 45B, 45F(2) and 45P(2) of the Public Health (Control of Disease) Act 1984( **a** ).\n\n#### PART 1\n\n##### Introductory\n\n###### **Citation, commencement, extent and application**\n\n**1.** —(1) These Regulations may be cited as the Health Protection (Coronavirus, International\n\nTravel and Operator Liability) (England) Regulations 2021.\n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021.\n\n(3) These Regulations extend to England and Wales and apply in relation to England only.\n\n###### **Interpretation and introduction of Schedules 1 to 4**\n\n**2.** —(1) In these Regulations—\n\n“category 1 arrival” means person who has arrived in England from a category 1 country or\n\nterritory, and has not been in a category 2 country or territory or a category 3 country or\n\nterritory in the period beginning with the 10th day before the date of their arrival in England;\n\n“category 1 country or territory” means a country or territory, or part of a country or territory,\n\nspecified in Schedule 1( **b** );\n\n“category 2 country or territory” means a country or territory or part of a country or territory\n\nspecified in Schedule 2( **c** );\n\n“category 3 country or territory” means a country or territory or part of a country or territory\n\nspecified in Schedule 3( **d** );\n\n“child” means a person under the age of 18;\n\n“the common travel area” has the meaning given in section 1(3) of the Immigration Act\n\n1971( **e** );\n\n“coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n\n“coronavirus disease” means COVID-19 (the official designation of the disease which can be\n\ncaused by coronavirus);\n\n“designated port” means a port designated for the purposes of Schedule 11;\n\n“device” means an in vitro diagnostic medical device within the meaning given in regulation\n\n2(1) of the Medical Devices Regulations 2002( **f** );\n\n“disability” has the meaning given in the Equality Act 2010( **g** ) (see section 6 of, and Schedule\n\n1 to, that Act);\n\n“immigration officer” means a person appointed by the Secretary of State as an immigration\n\nofficer under paragraph 1 of Schedule 2 to the Immigration Act 1971( **h** );\n\n“managed self-isolation package” has the meaning given in paragraph 8 of Schedule 11;\n\n“operator” except in regulation 18, means an operator of a relevant service;\n\n( **a** ) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14).\n\n( **b** ) Category 1 countries and territories are referred to colloquially and in guidance as “Green List” countries and territories.\n\n( **c** ) Category 2 countries and territories are referred to colloquially and in guidance as “Amber List” countries and territories.\n\n( **d** ) Category 3 countries and territories are referred to colloquially and in guidance as “Red List” countries and territories.\n\n( **e** ) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland\n\nare collectively referred to in that Act as “the common travel area”.\n\n( **f** ) S.I. 2002/618.\n\n( **g** ) 2010 c. 15.\n\n( **h** ) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I.\n\n1993/1813.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "and the Channel Islands. The British Overseas Territories are not in the common travel area. Public\n\nhealth requirements may vary depending upon in which nation of the UK you are staying.\n\nEngland: https://www.gov.uk/uk-border-control\n\nNorthern Ireland: https://www.nidirect.gov.uk/articles/coronavirus-covid-19-international-travel-\n\nadvice\n\nScotland: https://www.gov.scot/publications/coronavirus-covid-19-international-travel-quarantine/\n\nWales: https://gov.wales/arriving-wales-overseas\n\nFailure to comply with these measures is a criminal offence and you could be fined. There are a\n\nlimited set of exemptions from these measures. Check the list of exemptions carefully. You may\n\nbe fined if you fraudulently claim an exemption.\n\n#### PART 2\n\n###### **Onboard announcement**\n\nThe following is a public health message on behalf of the UK’s public health agencies.\n\nIf you have been in or transited through an amber or red country within the previous 10 days you\n\nmust quarantine for the first 10 days after you arrive. This is to protect yourself and others.\n\nThe symptoms of coronavirus are a new continuous cough, a high temperature or a loss of, or\n\nchange in, normal sense of taste or smell. If you experience any of these symptoms, however mild,\n\nyou are advised to make yourself known to the crew.\n\nSimple measures you can take to help protect yourself and family are:\n\nwash your hands\n\navoid touching your face with your hands\n\ncatch coughs and sneezes in a tissue and dispose of it immediately.\n\n#### PART 3\n\n##### Relevant websites\n\n**1.** The following are “the relevant websites” for the purposes of regulation 14—\n\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-uk-\n\nborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules\n\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-in-\n\nengland\n\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england\n\nhttp://www.gov.uk/travel-quarantine-and-testing\n\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england", - "page_start": 82, - "page_end": 82, - "source_file": "uksi_20210582_en.pdf" - } - ] - }, - { - "references": { - "source_file": "sg248459.pdf", - "query": "Who is Daniel Casali ?", - "target_page": 12, - "target_passage": " Daniel Casali is a Thought Leader Information Technology Specialist working for 15 years at IBM with Power Systems, high-performance computing, big data, and storage. His role at IBM is to bring to reality solutions that address client’s needs by exploring new technologies for different workloads. He is also fascinated by real multicloud implementations, always trying to abstract and simplify the new challenges of the heterogeneous architectures that are intrinsic to this new consumption model, be that on-premises or in the public cloud. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Red books**\n\n## **Front cover**\n\n**Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems**\n\n**Volume 1**\n\nDino Quintero\n\nRicardo Dobelin Barros\n\nDaniel Casali\n\nLuis Ferreira\n\nAlain Fisher\n\nFederico Fros\n\nLuis Daniel Gonzalez\n\nMiguel Gomez Gonzalez\n\nMahesh Gurugunti\n\nRogelio Rivera Gutierrez\n\nNicolas Joly\n\nBoris Litichevsky\n\nIsmael Solis Moreno\n\nGabriel Padilla\n\nSudipto Pal\n\nBogdan Savu\n\nRichard Wale", - "page_start": 0, - "page_end": 0, - "source_file": "sg248459.pdf" - }, - { - "text": "27\n\nWith four brand names under the Hearth & Home Technologies\n\numbrella, we are collectively the world’s largest fireplace manu-\n\nfacturer, the country’s premier fireplace brands, the most rec-\n\nognized name in the industry, and the preferred brands among\n\nhome builders. As the leading provider of hearth and home prod-\n\nucts and services, we make houses feel more like homes.\n\nIn addition to our commanding leadership position in\n\nmanufacturing the two strongest hearth and home product\n\nbrand names — Heatilator ® and Heat-N-Glo ® — we also offer\n\ninnovative wood fuel technology, fireplaces, and stoves through\n\nQuadra-Fire TM , while Fireside Hearth & Home distributes, ser-\n\nvices, and sells fireplace systems.\n\nWhat are we up to with all our great brands? We are\n\nmeeting a broad range of customer needs, particularly by sell-\n\ning both to consumers and builders through a network of\n\nindependent and company-owned, stand-alone, or gallery-\n\nstyle design and installation centers. These Fireside Hearth &\n\nHome design centers — visually impressive and aspirational\n\nin setting — manifest our proprietary concept of elevating the\n\nhearth retail, installation, and distribution experience to a new\n\nlevel of sophistication and service. Since there is no other\n\nnationally branded hearth retailer in the industry, we are once\n\nagain changing the game by being first-to-market innovators.\n\nHEARTH & HOME TECHNOLOGIES: HOT! HOT! HOT!\n\nA CA SE ST UDY I N EXP A NDI NG MA R KET S\n\nH ON I NDUST R I ES 2 0 0 3\n\nOur newest store in Eagan, Minnesota, for example, is\n\nliving proof that we’re succeeding in growing core product\n\nshare by getting closer to consumers. One customer, a St. Paul,\n\nMinnesota veterinarian, recently had a typically dynamic retail\n\nexperience at the Eagan store. He’s among a large group of\n\npeople who own at least one of our hearth products — and\n\nwho comes back for more. He explains: “When we moved into\n\nour house, there were three fireplaces built into the family\n\nroom, living room, and kitchen. Since we used them every day\n\nand liked them so much, we decided to convert our three-\n\nseason porch into a year-round porch.”\n\n“We all went to the Eagan store to purchase our fourth\n\nHeat-N-Glo ® fireplace. Once we were walking around the store,\n\ntaking in the lifestyle environments that are set up and dreaming\n\nabout what our house could look and feel like, we realized we\n\nwanted more! We saw an amazing stone surround setting in one of\n\nthe store displays — and before you knew it, we had bought the\n\nwhole wall. Not only does our new fireplace now have a beautiful\n\naesthetic and terrific functionality, but so does our porch. Because\n\nthe surround wall installation was so surprisingly easy and clean,\n\nwe’re even considering our next purchase.”", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "P ER FECT MA T CH #4\n\nT H E H OMEOW NER\n\nA ND H EA R T H & H OME\n\nT ECH NOLOGI ES\n\nHearth & Home Technologies, you warm our\n\nhearts by making a powerful impact on our\n\nlives; you are the ones who transform our\n\nhouses into homes. First, you warmed up\n\nour living rooms and family rooms with style,\n\nelegance, and comfort. Now, you’re heating\n\nup our porches and our kitchens … and find-\n\ning creative and innovative ways to make our\n\nbedrooms, bathrooms, dens, guest rooms,\n\nand kids’ rooms all toasty with your beautiful\n\nglow. The home fires are burning brighter and\n\nhotter than ever, now that you’ve come into\n\nour lives.", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "[89] Clifford Nass, Jonathan Steuer, and Ellen R Tauber. 1994. Computers are social actors. In *Proceedings of the SIGCHI conference on Human factors in computing* *systems* . 72- 78. [90] Lisa P. Nathan, Predrag V. Klasnja, and Batya Friedman. 2007. Value Scenarios: A Technique for Envisioning Systemic Effects of New Technologies. In *CHI’07* *Extended Abstracts on Human Factors in Computing Systems* . ACM, 2585- 2590. [91] Wilhelmina Nekoto, Vukosi Marivate, Tshinondiwa Matsila, Timi Fasubaa, Taiwo Fagbohungbe, Solomon Oluwole Akinola, Shamsuddeen Muhammad, Salomon Kabongo Kabenamualu, Salomey Osei, Freshia Sackey, Rubungo Andre Niyongabo, Ricky Macharm, Perez Ogayo, Orevaoghene Ahia, Musie Meressa Berhe, Mofetoluwa Adeyemi, Masabata Mokgesi-Selinga, Lawrence Okegbemi, Laura Martinus, Kolawole Tajudeen, Kevin Degila, Kelechi Ogueji, Kathleen Siminyu, Julia Kreutzer, Jason Webster, Jamiil Toure Ali, Jade Abbott, Iroro Orife, Ignatius Ezeani, Idris Abdulkadir Dangana, Herman Kamper, Hady Elsa- har, Goodness Duru, Ghollah Kioko, Murhabazi Espoir, Elan van Biljon, Daniel Whitenack, Christopher Onyefuluchi, Chris Chinenye Emezue, Bonaventure F. P. Dossou, Blessing Sibanda, Blessing Bassey, Ayodele Olabiyi, Arshath Ramk- ilowan, Alp Öktem, Adewale Akinfaderin, and Abdallah Bashir. 2020. Partic- ipatory Research for Low-resourced Machine Translation: A Case Study in African Languages. In *Findings of the Association for Computational Linguistics:* *EMNLP 2020* . Association for Computational Linguistics, Online, 2144- 2160. [https://doi.org/10.18653/v1/2020.findings-emnlp.195](https://doi.org/10.18653/v1/2020.findings-emnlp.195) [92] Maggie Nelson. 2015. *The Argonauts* . Graywolf Press, Minneapolis. [93] Timothy Niven and Hung-Yu Kao. 2019. Probing Neural Network Comprehen- sion of Natural Language Arguments. In *Proceedings of the 57th Annual Meeting* *of the Association for Computational Linguistics* . Association for Computational [Linguistics, Florence, Italy, 4658- 4664. https://doi.org/10.18653/v1/P19-1459](https://doi.org/10.18653/v1/P19-1459) [94] Safiya Umoja Noble. 2018. *Algorithms of Oppression: How Search Engines Rein-* *force Racism* . NYU Press. [95] Debora Nozza, Federico Bianchi, and Dirk Hovy. 2020. What the [MASK]? [Making Sense of Language-Specific BERT Models. arXiv:2003.02912 [cs.CL]](https://arxiv.org/abs/2003.02912) [96] David Ortiz, Daniel Myers, Eugene Walls, and Maria-Elena Diaz. 2005. Where do we stand with newspaper data? *Mobilization: An International Quarterly* 10, 3 (2005), 397- 419. [97] Charlotte Pennington, Derek Heim, Andrew Levy, and Derek Larkin. 2016. Twenty Years of Stereotype Threat Research: A Review of Psychological Me- diators. *PloS one* [ 11 (01 2016), e0146487. https://doi.org/10.1371/journal.pone.](https://doi.org/10.1371/journal.pone.0146487) [0146487](https://doi.org/10.1371/journal.pone.0146487) [98] Jeffrey Pennington, Richard Socher, and Christopher Manning. 2014. GloVe: Global Vectors for Word Representation. In *Proceedings of the 2014 Conference* *on Empirical Methods in Natural Language Processing (EMNLP)* . Association for [Computational Linguistics, Doha, Qatar, 1532- 1543. https://doi.org/10.3115/v1/](https://doi.org/10.3115/v1/D14-1162) [D14-1162](https://doi.org/10.3115/v1/D14-1162) [99] Matthew Peters, Mark Neumann, Mohit Iyyer, Matt Gardner, Christopher Clark, Kenton Lee, and Luke Zettlemoyer. 2018. Deep Contextualized Word Represen- tations. In *Proceedings of the 2018 Conference of the North American Chapter of*", - "page_start": 12, - "page_end": 12, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "SNOIlVlIWll HlOM3US ONllVU3dO 08-108-00 Sd3MAVN", - "page_start": 346, - "page_end": 346, - "source_file": "00-80T-80.pdf" - }, - { - "text": "*Cognition* 22, 6 (1996), 1482. [24] Robin Brewer and Anne Marie Piper. 2016. “Tell It Like It Really Is” A Case of Online Content Creation and Sharing Among Older Adult Bloggers. In *Pro-* *ceedings of the 2016 CHI Conference on Human Factors in Computing Systems* . 5529- 5542. [25] Tom B. Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom Henighan, Rewon Child, Aditya Ramesh, Daniel M. Ziegler, Jeffrey Wu, Clemens Winter, Christopher Hesse, Mark Chen, Eric Sigler, Mateusz Litwin, Scott Gray, Benjamin Chess, Jack Clark, Christopher Berner, Sam McCandlish, Alec Radford, Ilya Sutskever, and Dario Amodei. 2020. Language Models are Few-Shot Learners. In *Advances in Neural Information Processing Systems 33: Annual Conference on*", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv5_ccby4license.pdf" - }, - { - "text": "Kristyna Coats\n\nChris Cobbs\n\nRobert Cockburn\n\nTimothy Cockerham II\n\nKyle Coe\n\nPaul Cogar\n\nWeston Cogburn\n\nMatt Coker\n\nSherry Coker\n\nAlex Colarusso\n\nQuincy Colbert\n\nJeremy Cole\n\nBrandon Coleman\n\nJason Coleman\n\nJeffrey Coleman\n\nAnn Coleson\n\nKari Collard\n\nSuzi Collier\n\nBill Collins\n\nBilly Collins\n\nCindy Collins\n\nCody Collins\n\nGary Collins\n\nJohn Collins\n\nLaurie Collins\n\nJack Colten\n\nDrew Columbus Jr.\n\nEdwin Combs\n\nDanielle Comer\n\nMaggie Conell\n\nDuane Confer II\n\nBen Conley\n\nChris Conner\n\nDavid Conner\n\nRobert Conner\n\nKandi Connor\n\nDenver Conrad\n\nJesse Conrad\n\nFrank Conserette III\n\nRobert Conway Jr.\n\nSeth Conway\n\nCody G. Cook\n\nCody Cook\n\nEric Cook\n\nRyvers Cook\n\nZackery Cook\n\nJohnathon Cooke\n\nShane Cooley Jr.\n\nKyle Coon\n\nKyle Cooper\n\nLarry L. Cooper\n\nKaraBeth Copenhaver\n\nWill Corbyn\n\nAllan Cormier\n\nMike Cornell\n\nCarl Corner\n\nAmy Cornforth-Long\n\nKate Cornwell\n\nEdgard Corona\n\nEvaristo Correa\n\nWesley Corrick\n\nAaron Corter\n\nNeil Cory Jr.\n\nHarold Cosner\n\nJosh Cosner\n\nFernando Cossio\n\nDan Costello\n\nClayton Costlow\n\nKirk Cotham\n\nMegan Cotton\n\nChester Cottrill\n\nMarc Coughanour\n\nVashon Coverson\n\nMargaret Covington\n\nAshley Cowan\n\nCharles Cox\n\nClayton Cox\n\nDustin Cox\n\nOrrin Cox\n\nJoe Craig\n\nKara Crain\n\nJason Crawford\n\nKenneth Creel Jr.\n\nGail Creighton\n\nMonte Creps\n\nAlex Criner\n\nDorine Crisman\n\nTaylor Crisp\n\nMark Crocker\n\nIan Cronkhite\n\nBrittany Croslin\n\nTroy Crossen\n\nMichael Crouch\n\nKari Crow\n\nOdis Crow\n\nNicole Crowl\n\nAcacia Croy\n\nPatrick Crump\n\nConner Cruson\n\nEduardo Cruz\n\nCarmen Csizmadia\n\nKeeley Cuccio\n\nJames Cudd\n\nAndrew Cullen\n\nBart Cullins Jr.\n\nKerry Culver\n\nKatie Cummings\n\nKelly Cummings\n\nShaun Cummings\n\nTim Cummings\n\nDanielle Cummins\n\nMike Cummins\n\nDavid Curtis\n\nTrevor Curtis\n\nEdward Cutright\n\nJames Cyr\n\nWalter Dahm\n\nMalori Dahmen\n\nDallas Daley\n\nClay Dallison\n\nJamal DaneshFar\n\nPaige Danford\n\nSeth Daniel\n\nAndy Darne\n\nStephen Darwent\n\nJohn Daugherty Jr.\n\nFelipe Davalos\n\nJohn Davenport\n\nKeely Davenport\n\nMark Davidovich\n\nDerek Davidson\n\nSteve Davidson\n\nWilliam Davidson\n\nBart Davis\n\nBennett Davis\n\nBeverly Davis\n\nBradley Davis\n\nBrian Davis\n\nCollette Davis\n\nDustin W. Davis\n\nFelicha Davis\n\nJason Davis\n\nJohn W. Davis\n\nKim Davis\n\nKristin Davis\n\nMegan Davis\n\nMichael Davis II\n\nScott Davis\n\nSeslie Davis\n\nTad Davis\n\nTyler Davis\n\nBryan Davison\n\nDanny Davisson II\n\nBrett Dawkins\n\nSarah Daws\n\nMonica Day\n\nRoger Day\n\nTrey Day III\n\nEric Dean\n\nGreg Dean\n\nJohn Debruin\n\nBenay Deckard\n\nJameson Deen\n\nBarry Dees\n\nDerek Dehoyos\n\nTimothy Delaney\n\nJames Delauder\n\nMike Delauder\n\nHeather Demarest\n\nAngela Dempsey\n\nJoshua Desko\n\nJoshua Deville\n\nKyle Deville\n\nJack Dewbre\n\nTimothy DeHaan\n\nTimothy DeKinder\n\nWalt DeLap II\n\nStacey DeLaune\n\nEdward DeLaO\n\nBronson DeLeeuw\n\nTom DeMann\n\nSean DePriest\n\nLance DeSpain\n\nKyle DeVoe\n\nGary De Los Santos\n\nAnthony De Los Santos\n\nNicole De Luna\n\nSandra Dias\n\nBen Dickason\n\nJeff Dietert\n\nAshlee Dieu\n\nDaniel Diffey\n\nJohn Dill\n\nEddie Dillard\n\nMichael Dinelli\n\nRobert Diosdado\n\nHilary Dittman\n\nBelinda Dixon\n\nJoel Dixon\n\nAmy DiMaria\n\nTaiz DiRienzo\n\nJason Doan\n\nBob Dobkin\n\nChristopher Dockery\n\nPeter Dodgen\n\nCharlie Dolezal\n\nJaclynn Dollins\n\nBrian Dombroski\n\nBeth Donaldson\n\nWayne Donaldson\n\nMatt Donley\n\nBrian Donovan\n\nThomas Donovan\n\nDewey Dooley II\n\nMatt Doporto\n\nJoe Doran\n\nStuart Doss\n\nJeff Dotson\n\nCord Doucet\n\nRyan Doud\n\nScott Doud\n\nCole Dougherty\n\nSarah Douthitt\n\nJohn Dowdell\n\nEric Dowell\n\nAshley Doyle\n\nKathy Doyon\n\nAaron Drabnis\n\nLuis Dragustinovis\n\nKristina Drawbridge\n\nMichael Driscoll\n\nJason Driver\n\nDana Drury\n\nMichael Dube\n\nBenjamin Duckworth\n\nRonnie Dudgeon II\n\nEric Dudley\n\nAmy Dugan\n\nDug Dugan\n\nBernard Duke\n\nDave Duke\n\nErnest Duke\n\nJames Duke\n\nJeff Dukes\n\nCameron Dullea\n\nDavid Duncan\n\nJames Duncan\n\nChelsea Dunlap\n\nLarry Dunlap\n\nCraig Dunn\n\nMichael Dunn\n\nWoody Dupre\n\nJoe Durham\n\nRobert Durham\n\nJessica Durrett\n\nAllison Dvorak\n\nCindy Dykes\n\nJude Dysart\n\nRichard Eads\n\nStephanie Eagle\n\nCody Eakle\n\nMark Earl\n\nReed Early\n\nBrian Earnest\n\nZach Eastham\n\nGarry Eastwood\n\nJoshua Eaton\n\nJose Echavarria\n\nDustin Eck\n\nJason Eddy\n\nWesley Eddy\n\nChance Edge", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Nathan Binswanger\n\nScott Bird\n\nBenjamin Bishop\n\nBlake Bixler\n\nAmy Black\n\nMelody Black\n\nNiki Black\n\nTravis Black\n\nMark Blackburn\n\nDustin Blackman\n\nRobert Blain\n\nNoelia Blair\n\nJustin Blake\n\nRoy Blanchard\n\nTed Blanchard\n\nRay Blanco Jr.\n\nJames Bland\n\nTim Blasz\n\nMarla Bleakley\n\nAlan Bledsoe\n\nAndrew Bledsoe\n\nShane Blehm\n\nCody Bleigh\n\nLaren Blevins\n\nTom Blevins\n\nJames Blewer\n\nJason Blewer\n\nCody Blosch\n\nTravis Bly\n\nJon Boardman\n\nJason Boatright\n\nJosh Boaz\n\nLori Boecking\n\nBrian Boerner\n\nRyan Bogaczyk\n\nCarrie Bogle\n\nSandra Bogle\n\nTJ Bogle\n\nKatrina Bohannan\n\nRobert Bolden\n\nWilliam Bolin\n\nCaleb Bolton\n\nDave Bolton\n\nSherry Bonawitz\n\nWilliam Bonecutter\n\nTravis Bonine\n\nChris Bono\n\nClaude Bonura\n\nBlaine Booher\n\nBobby Boone\n\nBrandon Boone\n\nStephanie Boone\n\nMatthew Booth\n\nHenry Bordelon\n\nMike Bordelon\n\nRoger Bordelon\n\nKane Borek\n\nSteve Bornsen\n\nDensiel Bottger\n\nTyler Bottger\n\nSteven Boulware\n\nSteve Bowers\n\nTimothy Bala\n\nAmanda Balcom\n\nRoel Balderas\n\nSandra Balderrama\n\nAmanda Baldwin\n\nJaryd Baldwin\n\nTim Baldwin\n\nAlex Bales\n\nBetsy E. Ball\n\nJohn Balog\n\nDiane Balogh\n\nBlake Baptist\n\nAdrienne Barber\n\nRodney Barber Jr.\n\nBen Barichivich\n\nDaniel Barker\n\nJames A. Barker\n\nJames A. Barker\n\nJeff Barksdale\n\nKody Barmore\n\nKevin Barnard\n\nJonathan Barnett\n\nJoey Barnhill II\n\nPatrick Barnum\n\nPeter Barnum\n\nJason Barr\n\nNathan Barrett\n\nMilo Barrington\n\nCorey Barrios\n\nJohn Barrios Jr.\n\nSammy Barron\n\nDave Bartgis\n\nPatton Bartholomew\n\nJustin Bartlett\n\nSam Bartley\n\nRichie Bartosh Jr.\n\nChris Bartran\n\nSonny Barve\n\nZach Basden\n\nPhil Base\n\nAdam Basquez\n\nAdam P. Basquez Jr.\n\nAdam Bates\n\nCliff Bates\n\nKyle Bates\n\nTarah Bates\n\nScott Batson\n\nDamien Batten\n\nJanet Battle\n\nJeremy Battle\n\nMitchell Batts\n\nBrittany Baucom\n\nJosh Bavari\n\nBryan Bays\n\nEric Bazan\n\nAnthony Bear\n\nRobe-Hofwolt\n\nBrandt Beasley\n\nJessse Beason\n\nBrent Beaty\n\nMira Beavers\n\nGubany Becerra\n\nTracy Becerra\n\nJeff Bechtel\n\nBrian Beck\n\nRyan Beck\n\nDon Becker\n\nJoshua Becker\n\nEllie Beckers\n\nCallie Beckham\n\nJordan Bedwell\n\nDuane Beecher\n\nRicky Beene\n\nJared Begemann\n\nNicole Bekker\n\nBlake Belanger\n\nJeremy Bell\n\nJerry Bell\n\nLouis Bell\n\nRussell Bell\n\nSam Bellinger\n\nStacee Bellows\n\nMike Belman III\n\nIsaiah Beloncik\n\nRon Belstra\n\nJohnnie Benefield\n\nNancy Benham\n\nMichael Benjamin\n\nJerome Bennett\n\nTammy Bennett\n\n**BIG WELLS, TEXAS** *In the heart of the Eagle Ford*\n\n*Shale, Chesapeake’s vertical integration strategy allows*\n\n*the company to rapidly accelerate its drilling activities.*", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "PREFIX pizza: < [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#>](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial)\n\nWe are almost ready to query the actual ontology. For our first query let’s find all the Pizzas purchased by a Customer. The SPARQL code for this is:", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "**174** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\n[root@dcocp01 daniel]# oc apply -f nfspvc.yaml\n\npersistentvolumeclaim/appmongo-ibm-mongodb-dev-datavolume created\n\n[root@dcocp01 daniel]# oc apply -f secret.yaml\n\nsecret/appmongo-ibm-mongodb-dev created\n\n[root@dcocp01 daniel]# oc apply -f service.yaml\n\nservice/appmongo-ibm-mongodb-dev created\n\n[root@dcocp01 daniel]# oc apply -f mongo_pod.yaml\n\npod/appmongo-ibm-mongodb-dev created\n\n[root@dcocp01 daniel]#\n\nExample 7-19 shows the MongoDB Pod running, and the service correctly listening to the\n\nexpected port.\n\n*Example 7-19 MongoDB Pod running and port 32767 listening for connections*\n\n[root@dcocp01 daniel]# oc get pod appmongo-ibm-mongodb-dev\n\nNAME READY STATUS RESTARTS AGE\n\nappmongo-ibm-mongodb-dev 1/1 Running 0 7m\n\n[root@dcocp01 daniel]# telnet localhost 32767\n\nTrying ::1...\n\nConnected to localhost.\n\nEscape character is '^]'.\n\n^]\n\ntelnet> quit\n\nConnection closed.\n\n[root@dcocp01 daniel]#\n\nThe first time you run the MongoDB with a clean pv, it creates the stateful files on the\n\ncontainer path /var/lib/mongodb/data .", - "page_start": 189, - "page_end": 189, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "sg248459.pdf", - "query": "When does IBM close its acquisition of Red Hat ?", - "target_page": 20, - "target_passage": " On July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and open source technology", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "## Chapter 1. Introduction to the Journey to the Cloud: Volume 1 **5**\n\nThis publication describes how Red Hat and IBM can advance your cloud journey and speed\n\ngrowth and innovation for your business by using Red Hat OpenShift on IBM Power Systems.\n\n**Note:** Red Hat joins IBM as a distinct unit, preserving the independence and neutrality of\n\nRed Hat’s open source development heritage and unique development culture. Red Hat’s\n\nunwavering commitment to open source remains unchanged and it continues to offer\n\ncustomers choice and flexibility.", - "page_start": 20, - "page_end": 20, - "source_file": "sg248459.pdf" - }, - { - "text": "**4** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\n### **1.1 Introduction**\n\nMost companies started or are contemplating their journey to cloud. Although in recent years\n\nthe adoption of cloud became much more common place, the scope of what a cloud is or can\n\nbe also increased. This broadening of possibilities unfortunately added confusion and can\n\nresult in companies being unsure of how their existing application estate can change to\n\nintegrate with the cloud model.\n\nAs such, doubts still exist around how to start and progress on this journey. It is also true that\n\nalthough people understand traditional enterprise applications and more modern\n\ncloud-hosted applications, the integration or co-existence of both can prove equally confusing\n\nand contradicting.\n\nRecent industry trends, combined with the new partnership between Red Hat and IBM, seek\n\nto bring some clarity to the landscape while providing new modernization opportunities for\n\nexisting enterprise applications and familiar environments.\n\nThe main focus of this IBM Redbooks publication relates to IBM Cloud Paks and Red Hat\n\nOpenShift, which is hosted on IBM Power Systems. Although individually much can be written\n\nabout either topic, the relationship this publication highlights is between Red Hat OpenShift\n\nand IBM Power Systems.\n\nWe show what Red Hat OpenShift brings to the IBM Power Systems platform specifically\n\ndiscuss how it can be deployed and added into existing familiar Power System environments,\n\nand the benefits that integration and co-existence can provide from an existing enterprise\n\napplication viewpoint.\n\nThis publication is a first volume in a planned multi-volume publication over the next 12 - 18\n\nmonths. Within this initial volume, we explain the fundamental perspective (which is accurate\n\nas of the time of this writing) while providing pointers to future direction that will be discussed\n\nin future volumes.\n\n### **1.2 Red Hat and IBM**\n\nOn July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and\n\nopen source technology.\n\nThis acquisition puts Red Hat and IBM in a unique position to unlock the true value of hybrid\n\ncloud for your business. By combining the power and flexibility of Red Hat’s open hybrid cloud\n\ntechnologies with the scale and depth of IBM innovation and industry expertise, you now have\n\nthe tools to accelerate your cloud journey.\n\nIBM and Red Hat worked together for more than 20 years in making open source a\n\ncompetitive advantage for businesses on x86, IBM Power Systems, and IBM z Systems®.\n\nTogether, we are both on a mission to improve open source technology and help your\n\ncompanies capture the business value of the cloud.\n\n**Note:** This initial publication relates to Red Hat OpenShift 3.11, because this release was\n\nthe current OpenShift Container Platform (OCP) release for IBM Power Systems at the\n\ntime of this writing. IBM and Red Hat intend to deliver Red Hat OpenShift 4 for IBM\n\nPOWER® to accelerate agility for enterprise clients through integrated tooling and a\n\nfeature-rich Kubernetes container platform for cloud-native development on POWER9 and\n\nIBM POWER8® processor-based servers.", - "page_start": 19, - "page_end": 19, - "source_file": "sg248459.pdf" - }, - { - "text": "© Copyright IBM Corp. 2020. All rights reserved. **249**\n\n## **Related publications**\n\nThe publications that are listed in this section are considered particularly suitable for a more\n\ndetailed discussion of the topics that are covered in this book.\n\n### **IBM Redbooks**\n\nThe IBM Redbooks publication *IBM PowerVM Best Practices* , SG24-8062 *,* provides more\n\ninformation about the topic in this document. Note that this publication might be available in\n\nsoftcopy only.\n\nYou can search for, view, download or order this documents and other Redbooks, Redpapers,\n\nWeb Docs, draft, and other materials, at the following website:\n\n**[ibm.com](http://www.redbooks.ibm.com/)** [/redbooks](http://www.redbooks.ibm.com/)\n\n### **Online resources**\n\nThe following websites are also relevant as further information sources:\n\n� Deploying Red Hat OpenShift Container Platform 3.11 on Red Hat OpenStack Platform 13\n\n[https://red.ht/2pEFNpV](https://red.ht/2pEFNpV)\n\n� OpenShift on POWER\n\n[https://red.ht/337zOIT](https://red.ht/337zOIT)\n\n� Kubernetes concepts\n\n[https://kubernetes.io/docs/concepts/services-networking/service/](https://kubernetes.io/docs/concepts/services-networking/service/)\n\n� IBM PowerVC\n\n[https://www.ibm.com/us-en/marketplace/powervc](https://www.ibm.com/us-en/marketplace/powervc)\n\n� Using PowerVC storage\n\n[https://ibm.co/34Cko06](https://ibm.co/34Cko06)\n\n� Red Hat OpenShift Container Platform 3.11 CLI Reference\n\n[https://red.ht/2XZGBmz](https://red.ht/2XZGBmz)\n\n### **Help from IBM**\n\nIBM Support and downloads\n\n**[ibm.com](http://www.ibm.com/support/)** [/support](http://www.ibm.com/support/)\n\nIBM Global Services\n\n**[ibm.com](http://www.ibm.com/services/)** [/services](http://www.ibm.com/services/)", - "page_start": 264, - "page_end": 264, - "source_file": "sg248459.pdf" - }, - { - "text": "IBM Redbooks\n\n**Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1**\n\nMarch 2020\n\nSG24-8459-00", - "page_start": 2, - "page_end": 2, - "source_file": "sg248459.pdf" - }, - { - "text": "**106** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\nc. Assign the OpenShift subscription:\n\nd. Enable only the repositories that are required by OpenShift Container Platform 3.11.\n\nFor IBM POWER9, run the commands that are shown in Example 6-2. For IBM\n\nPOWER8, run the commands that are shown in Example 6-3 on page 107.\n\n*Example 6-2 OpenShift repositories for POWER9 servers*\n\n**# subscription-manager repos --disable=\"*\"**\n\n**# subscription-manager repos \\**\n\n**--enable=\"rhel-7-for-power-9-rpms\" \\**\n\n**--enable=\"rhel-7-for-power-9-extras-rpms\" \\**\n\n**subscription-manager refresh**\n\nAll local data refreshed\n\n**subscription-manager list --available --matches '*OpenShift*'**\n\nSubscription Name: **Red Hat OpenShift Container Platform for Power, LE Business Partner**\n\n**NFR, Self-Supported**\n\nProvides: Red Hat Enterprise Linux for Power, little endian - Extended Update\n\nSupport\n\nRed Hat Enterprise Linux Fast Datapath Beta for Power, little\n\nendian\n\nRed Hat Enterprise Linux for Power, little endian\n\nRed Hat Ansible Engine\n\nRed Hat OpenShift Enterprise Application Node\n\nRed Hat Enterprise Linux for Power 9\n\nRed Hat Software Collections (for RHEL Server for IBM Power LE)\n\nRed Hat OpenShift Container Platform for Power\n\nRed Hat Software Collections Beta (for RHEL Server for IBM Power\n\nLE)\n\nRHEL for SAP HANA for Power, little endian - Extended Update\n\nSupport\n\nRed Hat Beta\n\nRed Hat OpenShift Container Platform Client Tools for Power\n\nRed Hat Enterprise Linux Fast Datapath (for RHEL Server for IBM\n\nPower LE)\n\nRHEL for SAP for Power, little endian - Extended Update Support\n\nRed Hat Enterprise Linux for Power, little endian Beta\n\nRed Hat Container Native Virtualization\n\nRed Hat CodeReady Linux Builder for Power, little endian - Extended\n\nUpdate Support\n\nSKU: 111111111\n\nContract: 111111111\n\nPool ID: <POOL_ID>\n\nProvides Management: No\n\nAvailable: Unlimited\n\nSuggested: 1\n\nService Level: Standard\n\nService Type: L1-L3\n\nSubscription Type: Stackable\n\nStarts: 05/31/2019\n\nEnds: 05/31/2020\n\nSystem Type: Virtual\n\n**subscription-manager attach --pool=<POOL_ID>**\n\nSuccessfully attached a subscription for: Red Hat OpenShift Container Platform for\n\nPower, LE Business Partner NFR, Self-Supported", - "page_start": 121, - "page_end": 121, - "source_file": "sg248459.pdf" - }, - { - "text": "**250** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1", - "page_start": 265, - "page_end": 265, - "source_file": "sg248459.pdf" - }, - { - "text": "© Copyright IBM Corp. 2011, 2018, 2019. All rights reserved.\n\n## **Related publications**\n\nThe publications that are listed in this section are considered particularly suitable for a more\n\ndetailed discussion of the topics that are covered in this book.\n\n### **IBM Redbooks**\n\nThe following IBM Redbooks publications provide more information about the topic in\n\nthis document (note that some publications referenced in this list might be available in\n\nsoftcopy only):\n\n� *IBM b-type Gen 5 16 Gbps Switches and Network Advisor* , SG24-8186\n\n� *IBM System Storage SAN Volume Controller and Storwize V7000 Best Practices and*\n\n*Performance Guidelines* , SG24-7521\n\n� *Implementing the IBM Storwize V5000 Gen2 (including the Storwize V5010, V5020, and*\n\n*V5030)* , SG24-8162\n\n� *Implementing the IBM System Storage SAN Volume Controller with IBM Spectrum*\n\n*Virtualize V7.8* , SG24-7933\n\nYou can search for, view, download, or order these documents and other Redbooks,\n\nRedpapers, Web Docs, draft and additional materials, at the following website:\n\n**[ibm.com](http://www.redbooks.ibm.com/)** [/redbooks](http://www.redbooks.ibm.com/)\n\nThe following IBM Redbooks publication web pages that are related to this book are also\n\nuseful resources:\n\n� IBM Storage Networking Redbooks:\n\n[http://www.redbooks.ibm.com/Redbooks.nsf/domains/san](http://www.redbooks.ibm.com/Redbooks.nsf/domains/san)\n\n� IBM Flash Storage Redbooks:\n\n[http://www.redbooks.ibm.com/Redbooks.nsf/domains/flash](http://www.redbooks.ibm.com/Redbooks.nsf/domains/flash)\n\n� IBM Software Defined Storage Redbooks:\n\n[http://www.redbooks.ibm.com/Redbooks.nsf/domains/sds](http://www.redbooks.ibm.com/Redbooks.nsf/domains/sds)\n\n� IBM Disk Storage Redbooks:\n\n[http://www.redbooks.ibm.com/Redbooks.nsf/domains/disk](http://www.redbooks.ibm.com/Redbooks.nsf/domains/disk)\n\n� IBM Storage Solutions Redbooks:\n\n[http://www.redbooks.ibm.com/Redbooks.nsf/domains/storagesolutions](http://www.redbooks.ibm.com/Redbooks.nsf/domains/storagesolutions)\n\n� IBM Tape storage Redbooks:\n\n[http://www.redbooks.ibm.com/Redbooks.nsf/domains/tape](http://www.redbooks.ibm.com/Redbooks.nsf/domains/tape)", - "page_start": 810, - "page_end": 810, - "source_file": "sg247938.pdf" - }, - { - "text": "© Copyright IBM Corp. 2020. All rights reserved. **ix**\n\n## **Preface**\n\nThis IBM® Redbooks® publication educates and prepares the readers to understand and\n\nenter the multicloud era.\n\nThis book describes a journey to the following aspects of multicloud and associated context of\n\napplication modernization:\n\n� Introduction to the rationale and methodology of this publication\n\n� Concepts and terminology\n\n� Why move to the cloud?\n\n� Introduction to containers and orchestration with Kubernetes\n\n� Introduction to OpenShift on Power Systems\n\n� Why IBM? Why IBM Power Systems?\n\n� Reference architecture for Red Hat OpenShift on Power Systems\n\n� Installation planning, considerations and guidelines to help provide a system configuration\n\nand implementation\n\n� Implementation details\n\n� Use case studies\n\nThe goal of this publication is to describe the journey to implement an IBM Cloud™ Solution\n\nthat uses Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems by using\n\ntheoretical knowledge to learn the concepts, hands-on exercises to practice the theory, and\n\ndocumenting these findings by way of sample scenarios.\n\nThe publication addresses topics for developers, IT architects, IT specialists, sellers, and\n\nanyone who wants to implement a Red Hat OpenShift and IBM Cloud Paks on IBM Power\n\nSystems. This book also provides technical content to transfer how-to skills to the support\n\nteams, and solution guidance to the sales team.\n\nThis book compliments the documentation that is available at IBM Knowledge Center, and\n\nalso aligns with the educational offerings that are provided by the IBM Systems Software\n\nEducation (SSE).\n\n### **Authors**\n\nThis book was produced by a team of specialists from around the world working at IBM\n\nRedbooks, Austin Center.\n\n**Dino Quintero** is an IT Management Consultant and an IBM Level 3 Senior Certified IT\n\nSpecialist with IBM Redbooks in Poughkeepsie, New York. Dino shares his technical\n\ncomputing passion and expertise by leading teams developing technical content in the areas\n\nof enterprise continuous availability, enterprise systems management, high-performance\n\ncomputing, cloud computing, artificial intelligence including machine and deep learning, and\n\ncognitive solutions. He also is a Certified Open Group Distinguished IT Specialist. Dino holds\n\na Master of Computing Information Systems degree and a Bachelor of Science degree in\n\nComputer Science from Marist College.", - "page_start": 10, - "page_end": 10, - "source_file": "sg248459.pdf" - }, - { - "text": "**56** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1 © Copyright IBM Corp. 2020. All rights reserved. **57**", - "page_start": 71, - "page_end": 71, - "source_file": "sg248459.pdf" - }, - { - "text": "**70** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1 © Copyright IBM Corp. 2020. All rights reserved. **71**", - "page_start": 85, - "page_end": 85, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "sg248459.pdf", - "query": "What does an ITMS service provide ?", - "target_page": 30, - "target_passage": "An IT Service Management (ITSM) perspective can provide automation and a global management view, and incorporate the necessary software disciplines that are required to build a solid infrastructure for an enterprise, commercial or not. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "## **Focusing on core serverless services**\n\nAWS has over 220 services.\n\nEach service is a tool in your serverless development toolbox. Commonly, you start out using some\n\nservices more frequently than others. This topic provides an overview of the core services you need\n\nto build serverless solutions.\n\nYou can read high level explanations of the core services here, and an example of how they interact\n\nwithin the context of an example microservice, or you can choose to skip ahead to the hands on\n\nworkshop that uses three common services to build a working microservice.\n\n### **Common serverless services**\n\nThe following diagram shows AWS services commonly used together to build serverless\n\napplications:\n\nCommon serverless services Common serverless services", - "page_start": 33, - "page_end": 33, - "source_file": "serverless-core.pdf" - }, - { - "text": "**Tip**\n\nAn IAM role is identical in function to an IAM user, with the important distinction that it\n\nis not uniquely associated with one entity, but assumable by many entities. Typically, IAM\n\nroles correspond to a job function.\n\nA loose analogy for IAM roles are that of professional uniforms: a surgeon's scrubs, a firefighter's\n\nhardhat, or a startup CTO's favorite hoodie. Many people can *assume the role* of a surgeon,\n\nfirefighter, and startup CTO, which identifies them with a certain job function.\n\nOne of the most useful things about IAM roles is they can be associated not only with human\n\nentities, but also with AWS services. These types of roles are known as *service roles* . This means you\n\ncan assign an IAM role directly to a service. With an IAM role assigned to the service instance, you\n\ncan then associate specific IAM policies with the instance role, so that the service instance itself can\n\naccess other AWS services. This is extremely useful for automation.\n\n##### **Authorization - PARC**\n\nSo far we've been talking about principals. Principals represent the **authentication** component. For\n\nauthorization, you will attach JSON documents called *IAM policies* to principals.\n\n**Principals**\n\nAs mentioned, *principals* are the entities that are allowed or denied access.\n\n###### **Actions**\n\n*Actions* are the type of access that is allowed or denied. Actions are commonly AWS service API\n\ncalls that represent create, read, describe, list, update, and delete semantics.\n\n###### **Resources**\n\n*Resources* are the AWS resources the action will act upon.\n\nAll AWS resources are identified by an [Amazon Resource Name (ARN)](https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html) . Because AWS services are\n\ndeployed all over the world, ARNs function like an addressing system to precisely locate a specific\n\ncomponent. ARNs have hierarchical structures:\n\narn:partition:service:region:account-id:resource-id\n\nFundamentals", - "page_start": 43, - "page_end": 43, - "source_file": "serverless-core.pdf" - }, - { - "text": "The architecture of traditional monolithic web applications tends to become more complex over\n\ntime. Complexity increases ramp-up time for new developers, makes tracking down the source of\n\nbugs more challenging, and delays the delivery of new features.\n\n### **Use services instead of custom code**\n\nServerless applications usually comprise several AWS services, integrated with custom code run\n\nin Lambda functions. While Lambda can be integrated with most AWS services, the services most\n\ncommonly used in serverless applications are:\n\n**Commonly used AWS services in serverless applications**\n\n| Category | AWS service |\n|:---|:---|\n| Compute | Lambda |\n| Data storage | Amazon S3, DynamoDB, Amazon RDS |\n| API | API Gateway |\n| Application integration | EventBridge, Amazon SNS, Amazon SQS |\n| Orchestration | Step Functions |\n| Streaming data and analytics | Amazon Data Firehose |\n\nThere are many well-established, common patterns in distributed architectures that you can build\n\nyourself or implement using AWS services. For most customers, there is little commercial value in\n\ninvesting time to develop these patterns from scratch. When your application needs one of these\n\npatterns, use the corresponding AWS service:\n\n**Common patterns and corresponding AWS services**\n\n| Pattern | AWS service |\n|:---|:---|\n| Queue | Amazon SQS |\n| Event bus | EventBridge |\n| Publish/subscribe (fan-out) | Amazon SNS |\n\nUse services instead of custom code", - "page_start": 22, - "page_end": 22, - "source_file": "serverless-core.pdf" - }, - { - "text": "people in tracking leads. It also tracks renewal periods for potential commercial, industrial and\n\nfranchise contracts.\n\n*Development Activities.* We seek to identify opportunities to further our position as an integrated\n\nservice provider in markets where we provide services for a portion of the waste stream. Where\n\nappropriate, we seek to obtain permits to build transfer stations and/or landÑlls that would provide\n\n5", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "## **Getting started with serverless applications**\n\nCore *service starters* will quickly explain the value and technical fundamentals of each service. Each\n\nstarter will also mention advanced topics, so you can start with the essentials, but be aware of\n\ncapabilities to dive into when you need them.\n\nStarters are short reads (less than 2,300 words; 10-15 min) that connect concepts and practical\n\nhands-on use.\n\n**Topics**\n\n- Get started with IAM\n\n- Get started with Lambda\n\n- Get started with API Gateway\n\n- Get started with DynamoDB\n\n- Learn using a workshop\n\n### **Get started with IAM**\n\nInteractions with AWS services and resources by developers and entities require:\n\n- **Authentication** : proof that the entity requesting access is who they claim to be\n\n- **Authorization** : actions that are allowed or denied\n\n#### **What is Identity and Access Management?**\n\nAWS provides and uses a service called [Identity and Access Management (IAM)](https://aws.amazon.com/iam/) for authentication\n\nand authorization. IAM is used to manage developer accounts and secure the interaction between\n\nservices and resources.\n\n**Warning**\n\nSecurity is an important, complex, and broad topic. Large organizations generally have\n\nspecific operational procedures that developers need to follow. This guide will explain only\n\nessential concepts necessary to get started with AWS services. If in doubt, consult your IT\n\ndepartment or the official security documentation.\n\nIAM", - "page_start": 39, - "page_end": 39, - "source_file": "serverless-core.pdf" - }, - { - "text": "market knowledge, community relations and name recognition, and to instill their entrepreneurial drive\n\nat all levels of our operations. By furnishing the local management of such acquired companies with our\n\nÑnancial and marketing resources and technical expertise, we believe that the acquired companies are\n\nbetter able to secure additional municipal franchises and other contracts.\n\n*Privatize Municipal Operations and Acquire Divested Operations.* We also seek to acquire solid\n\nwaste collection operations, transfer stations and landÑlls that municipalities and other governmental\n\nauthorities are privatizing. Many municipalities are seeking to outsource or sell these types of solid\n\nwaste operations, as they lack the capital, technical expertise and/or operational resources necessary to\n\ncomply with increasingly stringent regulatory standards and/or to compete eÅectively with private-\n\nsector companies. In addition, we have acquired, and will continue to seek to acquire, operations and\n\nfacilities that may be divested by other publicly-owned waste companies.\n\n####### **Operations**\n\nOur operations primarily consist of the collection, transfer and disposal of non-hazardous solid waste.\n\n*Collection Services.* We provide solid waste collection services to commercial, industrial, municipal and\n\nresidential customers in 22 states through 140 collection companies. In 2004, 74.3% of our revenue was\n\nderived from collection services consisting of approximately 32.5% from services provided to municipal and\n\nresidential customers, 36.6% from services provided to commercial customers, and 30.9% from services\n\nprovided to industrial and other customers.\n\nOur residential collection operations involve the curbside collection of refuse from small containers into\n\ncollection vehicles for transport to transfer stations or directly to landÑlls. Residential solid waste collection\n\nservices are typically performed under contracts with municipalities, which we generally secure by competitive\n\nbid and which give our company exclusive rights to service all or a portion of the homes in their respective\n\njurisdictions. These contracts or franchises usually range in duration from one to Ñve years, although some of\n\nour exclusive franchises are for signiÑcantly longer periods. Residential solid waste collection services may also\n\nbe performed on a subscription basis, in which individual households contract directly with our company. The\n\nfees received for subscription residential collection are based primarily on market factors, frequency and type\n\nof service, the distance to the disposal facility and cost of disposal. In general, subscription residential\n\ncollection fees are paid quarterly in advance by the residential customers receiving the service.\n\nIn our commercial and industrial collection operations, we supply our customers with waste containers of\n\nvarying sizes. We also rent compactors to large waste generators. Commercial collection services are generally\n\nperformed under one- to three-year service agreements, and fees are determined by such considerations as:\n\n‚ market factors,\n\n‚ collection frequency,\n\n‚ type of equipment furnished,\n\n‚ the type and volume or weight of the waste collected,\n\n‚ the distance to the disposal facility and\n\n‚ the cost of disposal.\n\nWe rent waste containers to construction sites and also provide waste collection services to industrial and\n\nconstruction facilities on a contractual basis with terms generally ranging from a single pickup to one year or\n\nlonger. We collect the containers or compacted waste and transport the waste either to a landÑll or a transfer\n\nstation for disposal.\n\nAlso, we currently provide recycling services in certain markets primarily to comply with local laws or\n\nobligations under our franchise agreements. These services include the curbside collection of residential\n\nrecyclable waste and the provision of a variety of recycling services to commercial and industrial customers.\n\n7", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "| Pattern | AWS service |\n|:---|:---|\n| Orchestration | Step Functions |\n| API | API Gateway |\n| Event streams | Kinesis |\n\nThese services are designed to integrate with Lambda and you can use infrastructure as code\n\n(IaC) to create and discard resources in the services. You can use any of these services via the [AWS ](https://aws.amazon.com/tools/)\n\n[SDK](https://aws.amazon.com/tools/) without needing to install applications or configure servers. Becoming proficient with using\n\nthese services via code in your Lambda functions is an important step to producing well-designed\n\nserverless applications.\n\n### **Serverless development on AWS**\n\nTo build serverless solutions, you need to shift your mindset to break up monoliths into loosely\n\nconnected services. Consider how each service will do one thing well, with as few dependencies as\n\npossible.\n\nYou may have created microservices before, but it was probably inside a traditional framework.\n\nImagine if your microservice existed, but without the framework. For that to happen, services need\n\na way to get input, communicate with other services, and send outputs or errors.\n\nThe key to serverless apps is *event-driven architecture.*\n\nEvent-driven architecture (EDA) is a modern architecture pattern built from small, decoupled\n\nservices that publish, consume, or route *events.* Events are messages sent between services. This\n\narchitecture makes it easier to scale, update, and independently deploy separate components of a\n\nsystem.\n\nThe following diagram shows an event-driven serverless microservice. A client request is converted\n\nby an API Gateway into an event that is sent to a Lambda compute service. A Lambda function\n\nretrieves info from a DynamoDB data store. That data is returned in an event to API Gateway, which\n\nsends a response to the client with all the appropriate headers, cookies, and security tokens.\n\nServerless development on AWS", - "page_start": 23, - "page_end": 23, - "source_file": "serverless-core.pdf" - }, - { - "text": "**8** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\n### **2.1 A new computing paradigm in cloud transformation**\n\nCloud computing transformed the way that IT is managed.\n\nIn the traditional method of using services or resources, the owner of the infrastructure is\n\nresponsible for managing every piece of hardware and software they use. Normally, it takes\n\nsome time for a user to access a new resource, but it can be configured exactly as needed.\n\nTraditional infrastructure is often related to aging core applications (typically integrated with\n\naging infrastructure and technologies) that cannot be easily migrated to cloud paradigms.\n\nElasticity, standardization, and other clear cloud advantages are not sufficient reasons to\n\nmigrate. In other cases, rigid security and country regulations sometimes force users to locate\n\ndata nearby and under total management control.\n\n#### **2.1.1 Cloud service model**\n\nThis section describes the different cloud service models.\n\n**Infrastructure as a service (IaaS)**\n\nThe management responsibility for the company starts with the operating system layer and\n\nthe provider ensures the availability and reliability of the infrastructure provided.\n\nSeveral use cases can benefit from this pattern. Companies that lack an owned data center\n\nlook to IaaS as a quick, cheap infrastructure for their business initiatives that can be\n\nexpanded or ended as needed. Traditional companies that need compute power to run\n\nvariable workloads with less capital expenditure are perfect examples of IaaS adoption. In\n\nboth cases, companies pay only for the services that they use.\n\n**Platform as a service (PaaS)**\n\nDevelopment companies and factories that want to implement agile methodologies are the\n\nmost suited for PaaS. PaaS providers publish many services that can be used inside\n\napplications. Those services are always available and up-to-date. PaaS provides a simple\n\nway to test and prototype new applications. It can save money when developing new services\n\nand applications. Applications can be released more quickly than usual to get user feedback.\n\nThe API economy is the new paradigm in development. The cloud provides the perfect\n\nplatform for its implementation.\n\n**Software as a service (SaaS)**\n\nAt the time of this writing, SaaS patterns are accepted by many companies that want to\n\nbenefit from application usage without the need to maintain and update infrastructure and\n\ncomponents. Mail, ERP, collaboration, and office apps are the most accepted SaaS solutions.\n\nThe flexibility and elasticity of the SaaS model are great benefits.\n\nNo “one-size-fits-all” solution exists for cloud adoption. Companies must consider their own\n\ncost and benefit equation and then decide on the best model. Each application and process\n\nthat is needed is a workload. A deep workload assessment is normally performed by\n\ncompanies that decided to move to the cloud.", - "page_start": 23, - "page_end": 23, - "source_file": "sg248459.pdf" - }, - { - "text": "- increasing the fibre to the home (FTTH) footprint by connecting to\n\nmore homes directly to fibre.\n\nIn 2012, we began transitioning customers still receiving television\n\nsignals over our analog broadcast channels to all-digital services, freeing\n\nup significant cable network capacity for additional features and\n\nservices. The analog to digital subscriber migration will continue to\n\nstrengthen the customer experience and, once complete (expected in\n\n2015), will allow us to reclaim significant amounts of network capacity\n\nand reduce network operating and maintenance costs. The migration\n\nfrom analog to digital requires additional spending because it involves\n\nfitting analog homes with digital converters and removing existing\n\nanalog filtering equipment.\n\nBroadband Internet service is provided using the DOCSIS 3.0 standard\n\nwhich combines multiple RF channels onto one access into the\n\ncustomer premise, delivering exceptional performance. The bandwidth\n\nof our internet service offerings has increased 50 fold in the last\n\n10 years as we bring new technology to market when it becomes\n\navailable. This track record of investing in our networks and\n\ndemonstrating the capability to deploy best in class service is one of our\n\nkey strategies to ensure we stay competitive with other service providers\n\nthat provide internet service into homes and business over copper\n\nfacilities.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 41", - "page_start": 44, - "page_end": 44, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Chapter 2. Introduction to containers and orchestration with Kubernetes **11**\n\nAutomating continuous delivery pipelines is a way to help operations from deploying an\n\napplication they have little knowledge of and rescue developers from complex configurations\n\nand deployments. Efficient delivery means more time for innovation, which enables the\n\nbusiness to disrupt the market and competitors.\n\nWhether they are accessing a website or a mobile app, people have high expectations of the\n\napps that they regularly use. As a result, companies must continuously deliver new features\n\nand fixes. In the past, this process was painful because an application was developed, built,\n\nand made available as a single, often monolithic, application.\n\n**Containerization or the paradigm shift towards microservices**\n\nMicroservices is an application architectural style in which an application is composed of\n\nmany discrete, network-connected components called microservices. Consider the following\n\npoints:\n\n� Large monolithic applications are broken into small services.\n\n� A single network-accessible service is the smallest deployable unit for a microservices\n\napplication.\n\n� A microservice is a small application that usually houses one function. The function is\n\nexposed through APIs and messaging. This rule, sometimes referred to as *one service per* *container* , might be a container or any other lightweight deployment mechanism,\n\n� Each microservice can feature its own DevOps pipeline, scale individually, and have its\n\nown database where it owns a data model.\n\nFigure 2-1 shows how a monolithic application architecture evolves into a\n\nmicroservices-based application architecture.\n\n*Figure 2-1 Monolithic application versus Microservices application*", - "page_start": 26, - "page_end": 26, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "Publicdomain.pdf", - "query": "What are the two distinct public domain tools support by Creative Commons ?", - "target_page": 1, - "target_passage": "Creative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## Guide to using public domain tools\n\nCreative Commons makes sharing easy\n\n### What Is Creative Commons?\n\nCreative Commons is a global nonprofit organization\n\ndedicated to supporting an open and accessible Internet\n\nthat is enriched with free knowledge and creative resources\n\nfor people around the world to use, share, and cultivate.\n\nOur easy-to-use licenses provide a simple, standardized way\n\nto give the public permission to share and use your creative\n\nwork — on conditions of your choice. CC licenses let you\n\nchange your copyright terms from the default of “all rights\n\nreserved” to “some rights reserved.”\n\nMillions of people use CC licenses on some of the world’s\n\nmost popular platforms for user-generated content. When\n\nyou use a CC license to share your photos, videos, or blog,\n\nyour creation joins a globally accessible pool of resources\n\nthat includes the work of artists, educators, scientists, and\n\ngovernments.\n\nCreative Commons has waived all copyright and\n\nrelated or neighboring rights to this guide using the\n\nCC0 Public Domain Dedication.\n\n#### What is the difference between CC0 and the Public Domain Mark?\n\nCC0 (“CC Zero”) is intended for use only\n\nby authors or holders of copyright and\n\nrelated rights (including database rights), in connection\n\nwith works that are still subject to those rights in one or\n\nmore countries.\n\nWhen CC0 is applied to a work, copyright and related\n\nrights are relinquished worldwide, making the work free\n\nfrom those restrictions to the greatest extent possible.\n\nThe Public Domain Mark (PDM) is used\n\nto label works that are already free of\n\nknown copyright restrictions. Unlike CC0, PDM doesn’t\n\nchange the copyright status of a work.\n\nPDM can be used by anyone, and is intended for use\n\nwith works that are already free of known copyright\n\nrestrictions throughout the world.\n\n##### Public domain works are valuable because anyone\n\n##### can freely build upon, enhance, and reuse them for\n\n##### any purposes without restriction under copyright\n\n##### or database law.\n\nThat’s why it’s important for creators to have a clear and\n\nlegally robust way to place their works in the public domain as\n\ncompletely as possible, and it’s also important for publishers\n\nand archives to have a standardized way to identify works that\n\nare already in the public domain.\n\nCreative Commons supports two distinct public domain tools,\n\nthe CC0 Public Domain Dedication and the Public Domain\n\nMark . Creative Commons copyright licenses help authors\n\nmanage their copyright on terms they choose. Conversely, CC0\n\nenables authors and copyright owners who want to dedicate\n\ntheir works to the worldwide public domain to do so, and PDM\n\nfacilitates the labeling and discovery of works that are already\n\nfree of known copyright restrictions.\n\nWhere public domain tools fit in the copyright spectrum\n\nSome rights\n\nreserved\n\nAll rights\n\nreserved\n\nPDM\n\nNo known\n\ncopyright\n\nCC0\n\nPublic\n\ndomain\n\n### The CC0 Public Domain Dedication\n\n**Use this universal tool if you are a holder of copyright or database**\n\n**rights, and wish to waive all your rights to the work worldwide.**\n\nBy using CC0, you waive all copyright and related rights\n\ntogether with all associated claims and causes of action with\n\nrespect to this work to the extent possible under the law.\n\nApplying CC0 to your work is easy. Simply visit the CC0 chooser\n\n( http://creativecommons.org/choose/zero ) which will lead you\n\nthrough the process. When completed, you will be provided\n\nwith HTML code that you can copy and paste into your website.\n\nYou let others copy, modify, distribute, and perform the work,\n\neven for commercial purposes, all without asking permission.\n\nWorks marked with the Public Domain Mark have been\n\nidentified as being free of known restrictions under copyright\n\nlaw, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "[This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn](https://www.linkedin.com/in/gotisbrown/) [Otis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open](https://creativecommons.org/licenses/by/4.0/) and public domain works. View full licensing and attribution information about all works included in the [video on Flickr.](https://www.flickr.com/photos/creativecommons/52543574218/)\n\n####### **Creative Commons**\n\nPO Box 1866 Mountain View CA 94042 USA\n\n+1 415 429 6753 info@creativecommons.org", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "1 Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\n\nNC 27705, USA\n\nFull list of author information is available at the end of the article\n\n© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0\n\nInternational License ( [http://creativecommons.org/licenses/by/4.0/](http://creativecommons.org/licenses/by/4.0/) ), which permits unrestricted use, distribution, and\n\nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to\n\nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver\n\n( [http://creativecommons.org/publicdomain/zero/1.0/](http://creativecommons.org/publicdomain/zero/1.0/) ) applies to the data made available in this article, unless otherwise stated.\n\nhttps://doi.org/10.1186/s12913-018-3470-6", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.\n\n**[Except where otherwise noted, “Annual Report 2023” by Creative Commons ](https://creativecommons.org/mission/) [is licensed under CC BY 4.0. ](https://creativecommons.org/licenses/by/4.0/deed.en)**\n\n[\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0.](https://creativecommons.org/publicdomain/mark/1.0/?ref=openverse)\n\n### **About Us**\n\n#### **Board of Directors**\n\nMarta Belcher Glenn Otis Brown [Delia Browne](https://creativecommons.org/person/deliabrowne/) [James Grimmelmann](https://creativecommons.org/person/jamesgrimmelmann-net/) Lawrence Lessig * *Emeritus*\n\nAngela Oduor Lungati Bilal Randeree Alek Tarkowski Jeni Tennison Luis Villa\n\n**Chief Executive Officer** Anna Tumadóttir\n\n**General Counsel** Kat Walsh", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "and indicate if changes were made. The images or other third party material in this article are\n\nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line\n\nto the material. If material is not included in the article’s Creative Commons licence and your\n\nintended use is not permitted by statutory regulation or exceeds the permitted use, you will\n\nneed to obtain permission directly from the copyright holder. To view a copy of this licence,\n\n[visit http://creativecommons.org/licenses/by/4.0/.](http://creativecommons.org/licenses/by/4.0/)\n\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs\n\nto be both responsibly managed, and useful for developers of AI models.\n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible,\n\nand thus obviates the need for each individual actor to acquire, digitize, and format their own\n\ncorpus of books for AI training. This resource could be collectively and intentionally\n\nmanaged, though we do not mean to select a particular form of governance in this paper. 4\n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a\n\nbooks data commons as defined above and key questions relevant to developers,\n\nrepositories, and other stakeholders, building on our workshop discussions. We first explain\n\nwhy books matter for AI training and how broader access could be beneficial. We then\n\nsummarize two tracks that might be considered for developing such a resource, highlighting\n\nexisting projects that help foreground both the potential and challenges. Finally, we present\n\nseveral key design choices, and next steps that could advance further development of this\n\napproach. 5\n\nIn this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this 4\n\nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work\n\nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not\n\nmeant to preclude this or other arrangements.\n\nThere are, of course, a range of other types of texts that are not on the web and/or not digital at all - 5\n\ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy\n\nof further analysis.", - "page_start": 2, - "page_end": 2, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "[\"The great growling engine of change - technology.](https://www.flickr.com/photos/8489692@N03/5621362129) [Alvin Toffler\" by katerha is licensed under CC BY 2.0.](https://creativecommons.org/licenses/by/2.0/?ref=openverse)\n\nOur legal and technology staff continued to make key infrastructure updates and manage daily maintenance to ensure these Licenses work for everyone.\n\n##### **In 2023, we [launched the Open](https://creativecommons.org/support-cc/open-infrastructure-circle/) [Infrastructure Circle](https://creativecommons.org/support-cc/open-infrastructure-circle/) ( [OIC](https://creativecommons.org/support-cc/open-infrastructure-circle/) ) to ensure consistent funding for this work.**\n\nWe’re grateful to the early supporters of the OIC, including the William + Flora Hewlett Foundation, Bill & Melinda Gates Foundation, Filecoin Foundation for the Decentralized Web, Robert Wood Johnson Foundation, Chan Zuckerberg Initiative, Endless, Siegel Family Endowment, Flickr, Microsoft, and Paul and Iris Brest.\n\n### **Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast **[six CC Licenses](https://creativecommons.org/share-your-work/cclicenses/)** and two public domain tools, setting a global standard for sharing.\n\n##### **We’ve estimated that over 2.5 billion pieces of content were CC Licensed by the end of 2023.**", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "law, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.\n\nApplying the PDM to a work is easy. Simply visit the PDM\n\nchooser ( http://creativecommons.org/choose/mark ) which\n\nwill lead you through the proces. When completed, you will be\n\nprovided with the HTML code that you can copy and paste into\n\nyour website.\n\nCreative Commons does not recommend this tool for works that\n\nare restricted by copyright laws in one or more jurisdictions.\n\nConsult with your legal advisor if you are unsure whether you\n\nshould use the PDM for a certain work.\n\n### Public Domain Mark\n\n**Use this tool if you have identified a work that is free of known**\n\n**copyright restrictions.**", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "[In 2023, we convened hundreds via](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [roundtables, community conferences](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [(e.g. ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[MozFest](https://creativecommons.org/2023/05/04/generative-ai-opportunities-concerns-solutions-from-mozfest-2023/)** , **[Wikimania](https://creativecommons.org/2024/02/07/dispatches-from-wikimania-values-for-shaping-ai-towards-a-better-internet/)** [), and public](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [events (e.g. symposium on ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[Generative](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [AI & Creativity](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)** [)to debate copyright law,](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [the ethics of open sharing, and other](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [relevant areas that touch AI. ](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)\n\n[At our CC Global Summit, participants](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [drafted ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[community-driven principles](https://creativecommons.org/2023/10/07/making-ai-work-for-creators-and-the-commons/)** [on AI that are a valuable input and will](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [help inform the organization’s thinking](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [as we determine CC’s exact role in the AI](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) space.\n\n[“The Pillars of Creation” by ](https://openverse.org/image/8de72efd-e12b-49eb-8210-1046bcd71847?q=Pillars%20of%20Creation) [James Webb Space Telescope ](https://www.flickr.com/photos/50785054@N03) [is licensed under CC BY 2.0. ](https://creativecommons.org/licenses/by/2.0/?ref=openverse)\n\n### **Areas of Exploration**\n\n####### **Support for Creators in the Time of Artificial Intelligence**", - "page_start": 8, - "page_end": 8, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "### **Our Impact**\n\nCC believes that opening up knowledge is key to addressing the world’s most pressing challenges. Today, we steer campaigns, programming, and training in many areas:\n\n2023 was quite a year for the CC Open Culture Program, thanks to generous funding from **[Arcadia](https://www.arcadiafund.org.uk/)** . We grew our Open Culture team from one to two and a half staff, rolling out new initiatives like TAROC (Towards a Recommendation on Open Culture) and **[Open Culture Live:](https://creativecommons.org/tag/open-culture-live/) [A Webinar Series](https://creativecommons.org/tag/open-culture-live/)** . We invite you to read “ **[What did Creative](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [Commons do for Open Culture](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [in 2023?](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/)** ” to learn more.\n\n###### **Open Culture**\n\nWe delivered workshops and presentations on CC Licenses and Open Educational Resources at over 16 conferences and events. The CC Open Education Platform [also funded six global projects,](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) **[including work to advance the](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [UNESCO Recommendation on](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [OER](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [.](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/)**\n\n###### **Open Education**\n\nThanks to generous funding from the **[John D. and Catherine T.](https://www.macfound.org/) [MacArthur Foundation](https://www.macfound.org/)** , CC hosted its very first Open Journalism track at the CC Global Summit, including eight presentations, lightning talks, panel discussions, and workshops as well as a **[keynote](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/) [by Anya Kamenetz](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/)** .\n\nRepresentatives from 33 news outlets and digital rights-focused organizations attended the CC Summit sessions. The Open Journalism track built on **[numerous collaborations and](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/) [workshops](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/)** throughout 2023.\n\n###### **Open Journalism**\n\n[\"Follow the Color Brick Road\" by Bert Kaufmann is](https://www.flickr.com/photos/22746515@N02) [licensed under CC BY-SA 2.0.](https://creativecommons.org/licenses/by-sa/2.0/?ref=openverse)", - "page_start": 6, - "page_end": 6, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - } - ] - }, - { - "references": { - "source_file": "Publicdomain.pdf", - "query": "What is Creative Commons ?", - "target_page": 1, - "target_passage": " Creative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "[This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn](https://www.linkedin.com/in/gotisbrown/) [Otis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open](https://creativecommons.org/licenses/by/4.0/) and public domain works. View full licensing and attribution information about all works included in the [video on Flickr.](https://www.flickr.com/photos/creativecommons/52543574218/)\n\n####### **Creative Commons**\n\nPO Box 1866 Mountain View CA 94042 USA\n\n+1 415 429 6753 info@creativecommons.org", - "page_start": 11, - "page_end": 11, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "[In 2023, we convened hundreds via](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [roundtables, community conferences](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [(e.g. ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[MozFest](https://creativecommons.org/2023/05/04/generative-ai-opportunities-concerns-solutions-from-mozfest-2023/)** , **[Wikimania](https://creativecommons.org/2024/02/07/dispatches-from-wikimania-values-for-shaping-ai-towards-a-better-internet/)** [), and public](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [events (e.g. symposium on ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[Generative](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [AI & Creativity](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)** [)to debate copyright law,](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [the ethics of open sharing, and other](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/) [relevant areas that touch AI. ](https://creativecommons.org/2023/09/15/generative-ai-and-creativity-new-considerations-emerge-at-cc-convenings/)\n\n[At our CC Global Summit, participants](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [drafted ](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) **[community-driven principles](https://creativecommons.org/2023/10/07/making-ai-work-for-creators-and-the-commons/)** [on AI that are a valuable input and will](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [help inform the organization’s thinking](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) [as we determine CC’s exact role in the AI](https://creativecommons.org/2023/01/11/2022-in-review-a-look-at-creative-commons-open-culture-program/) space.\n\n[“The Pillars of Creation” by ](https://openverse.org/image/8de72efd-e12b-49eb-8210-1046bcd71847?q=Pillars%20of%20Creation) [James Webb Space Telescope ](https://www.flickr.com/photos/50785054@N03) [is licensed under CC BY 2.0. ](https://creativecommons.org/licenses/by/2.0/?ref=openverse)\n\n### **Areas of Exploration**\n\n####### **Support for Creators in the Time of Artificial Intelligence**", - "page_start": 8, - "page_end": 8, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "and indicate if changes were made. The images or other third party material in this article are\n\nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line\n\nto the material. If material is not included in the article’s Creative Commons licence and your\n\nintended use is not permitted by statutory regulation or exceeds the permitted use, you will\n\nneed to obtain permission directly from the copyright holder. To view a copy of this licence,\n\n[visit http://creativecommons.org/licenses/by/4.0/.](http://creativecommons.org/licenses/by/4.0/)\n\n© The Author(s) 2025", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" - }, - { - "text": "### **Our Impact**\n\nCC believes that opening up knowledge is key to addressing the world’s most pressing challenges. Today, we steer campaigns, programming, and training in many areas:\n\n2023 was quite a year for the CC Open Culture Program, thanks to generous funding from **[Arcadia](https://www.arcadiafund.org.uk/)** . We grew our Open Culture team from one to two and a half staff, rolling out new initiatives like TAROC (Towards a Recommendation on Open Culture) and **[Open Culture Live:](https://creativecommons.org/tag/open-culture-live/) [A Webinar Series](https://creativecommons.org/tag/open-culture-live/)** . We invite you to read “ **[What did Creative](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [Commons do for Open Culture](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [in 2023?](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/)** ” to learn more.\n\n###### **Open Culture**\n\nWe delivered workshops and presentations on CC Licenses and Open Educational Resources at over 16 conferences and events. The CC Open Education Platform [also funded six global projects,](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) **[including work to advance the](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [UNESCO Recommendation on](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [OER](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [.](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/)**\n\n###### **Open Education**\n\nThanks to generous funding from the **[John D. and Catherine T.](https://www.macfound.org/) [MacArthur Foundation](https://www.macfound.org/)** , CC hosted its very first Open Journalism track at the CC Global Summit, including eight presentations, lightning talks, panel discussions, and workshops as well as a **[keynote](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/) [by Anya Kamenetz](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/)** .\n\nRepresentatives from 33 news outlets and digital rights-focused organizations attended the CC Summit sessions. The Open Journalism track built on **[numerous collaborations and](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/) [workshops](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/)** throughout 2023.\n\n###### **Open Journalism**\n\n[\"Follow the Color Brick Road\" by Bert Kaufmann is](https://www.flickr.com/photos/22746515@N02) [licensed under CC BY-SA 2.0.](https://creativecommons.org/licenses/by-sa/2.0/?ref=openverse)", - "page_start": 6, - "page_end": 6, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "1 Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\n\nNC 27705, USA\n\nFull list of author information is available at the end of the article\n\n© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0\n\nInternational License ( [http://creativecommons.org/licenses/by/4.0/](http://creativecommons.org/licenses/by/4.0/) ), which permits unrestricted use, distribution, and\n\nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to\n\nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver\n\n( [http://creativecommons.org/publicdomain/zero/1.0/](http://creativecommons.org/publicdomain/zero/1.0/) ) applies to the data made available in this article, unless otherwise stated.\n\nhttps://doi.org/10.1186/s12913-018-3470-6", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed5.pdf" - }, - { - "text": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.\n\n**[Except where otherwise noted, “Annual Report 2023” by Creative Commons ](https://creativecommons.org/mission/) [is licensed under CC BY 4.0. ](https://creativecommons.org/licenses/by/4.0/deed.en)**\n\n[\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0.](https://creativecommons.org/publicdomain/mark/1.0/?ref=openverse)\n\n### **About Us**\n\n#### **Board of Directors**\n\nMarta Belcher Glenn Otis Brown [Delia Browne](https://creativecommons.org/person/deliabrowne/) [James Grimmelmann](https://creativecommons.org/person/jamesgrimmelmann-net/) Lawrence Lessig * *Emeritus*\n\nAngela Oduor Lungati Bilal Randeree Alek Tarkowski Jeni Tennison Luis Villa\n\n**Chief Executive Officer** Anna Tumadóttir\n\n**General Counsel** Kat Walsh", - "page_start": 1, - "page_end": 1, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "## Guide to using public domain tools\n\nCreative Commons makes sharing easy\n\n### What Is Creative Commons?\n\nCreative Commons is a global nonprofit organization\n\ndedicated to supporting an open and accessible Internet\n\nthat is enriched with free knowledge and creative resources\n\nfor people around the world to use, share, and cultivate.\n\nOur easy-to-use licenses provide a simple, standardized way\n\nto give the public permission to share and use your creative\n\nwork — on conditions of your choice. CC licenses let you\n\nchange your copyright terms from the default of “all rights\n\nreserved” to “some rights reserved.”\n\nMillions of people use CC licenses on some of the world’s\n\nmost popular platforms for user-generated content. When\n\nyou use a CC license to share your photos, videos, or blog,\n\nyour creation joins a globally accessible pool of resources\n\nthat includes the work of artists, educators, scientists, and\n\ngovernments.\n\nCreative Commons has waived all copyright and\n\nrelated or neighboring rights to this guide using the\n\nCC0 Public Domain Dedication.\n\n#### What is the difference between CC0 and the Public Domain Mark?\n\nCC0 (“CC Zero”) is intended for use only\n\nby authors or holders of copyright and\n\nrelated rights (including database rights), in connection\n\nwith works that are still subject to those rights in one or\n\nmore countries.\n\nWhen CC0 is applied to a work, copyright and related\n\nrights are relinquished worldwide, making the work free\n\nfrom those restrictions to the greatest extent possible.\n\nThe Public Domain Mark (PDM) is used\n\nto label works that are already free of\n\nknown copyright restrictions. Unlike CC0, PDM doesn’t\n\nchange the copyright status of a work.\n\nPDM can be used by anyone, and is intended for use\n\nwith works that are already free of known copyright\n\nrestrictions throughout the world.\n\n##### Public domain works are valuable because anyone\n\n##### can freely build upon, enhance, and reuse them for\n\n##### any purposes without restriction under copyright\n\n##### or database law.\n\nThat’s why it’s important for creators to have a clear and\n\nlegally robust way to place their works in the public domain as\n\ncompletely as possible, and it’s also important for publishers\n\nand archives to have a standardized way to identify works that\n\nare already in the public domain.\n\nCreative Commons supports two distinct public domain tools,\n\nthe CC0 Public Domain Dedication and the Public Domain\n\nMark . Creative Commons copyright licenses help authors\n\nmanage their copyright on terms they choose. Conversely, CC0\n\nenables authors and copyright owners who want to dedicate\n\ntheir works to the worldwide public domain to do so, and PDM\n\nfacilitates the labeling and discovery of works that are already\n\nfree of known copyright restrictions.\n\nWhere public domain tools fit in the copyright spectrum\n\nSome rights\n\nreserved\n\nAll rights\n\nreserved\n\nPDM\n\nNo known\n\ncopyright\n\nCC0\n\nPublic\n\ndomain\n\n### The CC0 Public Domain Dedication\n\n**Use this universal tool if you are a holder of copyright or database**\n\n**rights, and wish to waive all your rights to the work worldwide.**\n\nBy using CC0, you waive all copyright and related rights\n\ntogether with all associated claims and causes of action with\n\nrespect to this work to the extent possible under the law.\n\nApplying CC0 to your work is easy. Simply visit the CC0 chooser\n\n( http://creativecommons.org/choose/zero ) which will lead you\n\nthrough the process. When completed, you will be provided\n\nwith HTML code that you can copy and paste into your website.\n\nYou let others copy, modify, distribute, and perform the work,\n\neven for commercial purposes, all without asking permission.\n\nWorks marked with the Public Domain Mark have been\n\nidentified as being free of known restrictions under copyright\n\nlaw, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "2023 was a busy year at Creative Commons. Our **[Open Culture](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/)** program and **[Open Climate Campaign](https://creativecommons.org/2023/10/23/a-year-in-the-open-climate-campaign/?utm_source=rss&utm_medium=rss&utm_campaign=a-year-in-the-open-climate-campaign)** entered their third and second years, respectively. We hosted our first in-person CC Global Summit since 2019 in Mexico City. We held critical consultations and open panels on AI, copyright, and the CC Licenses, cultural heritage, education, and science; and we launched our **[Open](https://creativecommons.org/support-cc/open-infrastructure-circle/) [Infrastructure Circle](https://creativecommons.org/support-cc/open-infrastructure-circle/)** in an effort to ensure the CC Licenses are funded well into the future.\n\nWe also marked transitions in leadership. At the end of December, Catherine Stihler concluded her time as Chief Executive Officer (CEO) at Creative Commons, and I transitioned in as Interim. In March 2024, I was appointed CC’s permanent CEO. I look forward to working closely with our Board of Directors, staff, and larger community on **[the critical work that](https://creativecommons.org/2024/03/01/what-lies-ahead-in-2024/) [awaits us in 2024](https://creativecommons.org/2024/03/01/what-lies-ahead-in-2024/)** .\n\nCC staff photos are licensed [under CC BY 4.0. ](https://creativecommons.org/licenses/by/4.0/)\n\n### **A Note from Leadership**\n\n**Anna Tumadóttir, CEO**", - "page_start": 2, - "page_end": 2, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - }, - { - "text": "**Author contributions** K.L. designed the framework of the article and analyzed the yield results and the maize price under future sce- narios. J.P. simulated the climate data from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. W.X. simulated the maize yields in whole world under different scenarios. W.X. simulated the market price of maize at national and global levels. T.A. helped the revision of language.\n\n**Funding** Funding was provided by the National Key Research and Development program of China (Grant Nos. 2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. 41961124007 and 41871026).\n\n**Competing interests** The authors declare no competing interests.\n\n**Additional information Correspondence** and requests for materials should be addressed to K.L.\n\n**Reprints and permissions information** is available at www.nature.com/reprints .\n\n**Publisher’s note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.\n\n**Open Access** This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit [http://​creat​iveco​mmons.​org/​licen​ses/​by/4.​0/](http://creativecommons.org/licenses/by/4.0/) .\n\n© The Author(s) 2022", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed9.pdf" - }, - { - "text": "content repositories, like libraries, with that of AI developers. A “books data commons” needs\n\nto be both responsibly managed, and useful for developers of AI models.\n\nWe use “commons” here in the sense of a resource that is broadly shared and accessible,\n\nand thus obviates the need for each individual actor to acquire, digitize, and format their own\n\ncorpus of books for AI training. This resource could be collectively and intentionally\n\nmanaged, though we do not mean to select a particular form of governance in this paper. 4\n\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a\n\nbooks data commons as defined above and key questions relevant to developers,\n\nrepositories, and other stakeholders, building on our workshop discussions. We first explain\n\nwhy books matter for AI training and how broader access could be beneficial. We then\n\nsummarize two tracks that might be considered for developing such a resource, highlighting\n\nexisting projects that help foreground both the potential and challenges. Finally, we present\n\nseveral key design choices, and next steps that could advance further development of this\n\napproach. 5\n\nIn this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this 4\n\nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work\n\nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not\n\nmeant to preclude this or other arrangements.\n\nThere are, of course, a range of other types of texts that are not on the web and/or not digital at all - 5\n\ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy\n\nof further analysis.", - "page_start": 2, - "page_end": 2, - "source_file": "creative_common_ai.pdf" - } - ] - }, - { - "references": { - "source_file": "Publicdomain.pdf", - "query": "How to apply the PDM to my work ?", - "target_page": 1, - "target_passage": "Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "law, including all related and neighboring rights. Anyone can\n\ncopy, modify, distribute, and perform such works, even for\n\ncommercial purposes, all without asking permission.\n\nApplying the PDM to a work is easy. Simply visit the PDM\n\nchooser ( http://creativecommons.org/choose/mark ) which\n\nwill lead you through the proces. When completed, you will be\n\nprovided with the HTML code that you can copy and paste into\n\nyour website.\n\nCreative Commons does not recommend this tool for works that\n\nare restricted by copyright laws in one or more jurisdictions.\n\nConsult with your legal advisor if you are unsure whether you\n\nshould use the PDM for a certain work.\n\n### Public Domain Mark\n\n**Use this tool if you have identified a work that is free of known**\n\n**copyright restrictions.**", - "page_start": 0, - "page_end": 0, - "source_file": "Publicdomain.pdf" - }, - { - "text": "Page 42 10/02/2013\n\n### **10.6 Submit inventory (PM)**\n\nThis section describes on how the PM submits the inventory by selecting tables for the general submission after\n\nbeing approved by the NFP (See section 10.5).\n\n#### **10.6.1 Submit select tables for preparing the general submission**\n\n1. Log in as PM.\n\n2. Click on “View Inventories Progress” under sub menu “Submission Management”.\n\n3. The “View Inventories Progress” screen appears.\n\n4. Select the appropriate inventory by clicking the box under column “Working inventory” (figure 68, a).\n\n*** Note: The selected inventory year to be submitted should be in status “approved” (figure 68, b).\n\n5. Click on “Work on Inventories” under Submission Management (figure 68, c).\n\nThis opens the Submit Inventory initial screen (figure 69).\n\n6. Click the inventory year to be submitted (figure 69, a).\n\n7. Press the “Generate Official Submission” button (figure 69, c).\n\n* **Figure 68. View Inventories Progress screen - select inventory for the preparation for the general submission** *\n\n* **Figure 69. Submit select tables for the preparation for the general submission** *", - "page_start": 41, - "page_end": 41, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "## **10 Submission management**\n\n**10.1 Workflow**\n\nCreating and preparing an inventory, generating tables for checking by the NFP and approving and/or rejecting\n\nsubmission, follows a number of steps known collectively as a workflow. This chapter describes the workflow relating\n\nto the submission of the GHG inventory/(ies), which users should follow to create, prepare, and send GHG\n\ninventories for internal checking, and approval/rejection of the submission by the NFP, within the NAIIS web\n\napplication (figure 52).\n\n* **Figure 52: Non-Annex I Inventory Software workflow** *\n\n### **10.2 Start of inventory/submission (NFP or PM)**\n\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year\n\nidentified will be made available in the new inventory/submission.\n\nThese are the steps to start a new inventory:\n\n1. Click on “View Inventories Progress” under sub menu “Submission Management” (figure 53).\n\n* **Figure 53. View Inventories Progress sub menu** *\n\n2. The “View Inventories Progress” screen appears (figure 54).\n\n3. Select the appropriate inventory by clicking the box under column “Working Inventory” (figure 54, a).\n\n*** Note: The selected appropriate inventory should be in status “created” (figure 54, b)", - "page_start": 34, - "page_end": 34, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "THE PURPOSE OF A RESIGNATION LETTER:\n\nThe purpose of a resignation letter is to give your employer official no­\n\ntice that you will be leaving the organisation. However, it is usually ap­\n\npropriate to inform your manager of your intention to resign in person,\n\nand then to follow up your conversation with the formal resignation\n\nletter.\n\nWhat to include:\n\nYour resignation letter should be short and to the point. Keep it positive\n\nand professional - this is not the place to voice your dissatisfaction with\n\nyour job.\n\nIn your letter, you should make sure that you include the following:\n\n1.\n\nA clear statement of your intention to resign.\n\nExample:\n\n“Please accept this letter as formal notice of my resignation from my\n\npost as Assistant IT Manager at XYZ.”\n\n2.\n\nReference to your notice period (where applicable), as well as your last\n\nworking day with the organisation.\n\nExample:\n\n“My last working day will be in two weeks’ time, on 31 August 2015.”\n\n3.\n\nYour reason for leaving.\n\nYou don’t need to elaborate on this if you don’t want to. Remember\n\nto keep it positive, and not to make any rude, offensive or insulting\n\nremarks about the organisation or your co- workers, no matter how\n\ntempting it might be.", - "page_start": 48, - "page_end": 48, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "##### TABLE OF CONTENTS:\n\n1. General Language Tips to Get You Started\n\n2. Parts of Speech\n\n3. Punctuation\n\n4. Commonly Confused Words and Phrases\n\n5. Tips for Filling in Your College Registration Form\n\n6. Learn How to Summarise Your Study Material\n\n7. How to Ask for Help from Your Tutor\n\n8. Tips for Completing Your Written Assignments\n\n9. Tips for Answering Exam Questions\n\n10. Language Skills at Work - How to Write a Cover Letter\n\n11. Language Skills at Work - How to Write a Resignation Letter\n\n12. Language Skills at Work - Sending E-mails to Your Colleagues", - "page_start": 2, - "page_end": 2, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "### **10.3 Send for checking (PM)**\n\nOnce the SE’s/or PM’s have prepared the national GHG inventory, by entering data into the sectoral grids and the\n\nPM of the Party has checked the complete GHG inventory for consistency and correctness, the following steps allows\n\nthe PM to send the inventory for checking:\n\n1. Log in as PM.\n\n2. Click on “View Inventories Progress” under sub menu “Submission Management”.\n\n3. The “View Inventories Progress” screen appears.\n\n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 58, a).\n\n5. Press the “Send for Checking by NFP” button to send it to the NFP for his review and approval (figure 58, b).\n\n*** Note: A notification email will be sent to the NFP email address, and the status changed to “check”\n\n(figure 59).\n\n* **Figure 58. Work on Inventories screen - Status = Started** *\n\n* **Figure 59. Work on Inventories screen - Status = check** *", - "page_start": 36, - "page_end": 36, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Designed and Produced by **APM Graphics Management** > 1800 806 930", - "page_start": 118, - "page_end": 118, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "### **10.4 Send for approval/rejection of an Inventory (PM)**\n\nThis section describes on how the PM approves or rejects an inventory after being checked by the PM.\n\n#### **10.4.1 Send for approval of an Inventory**\n\n1. Log in as PM.\n\n2. Click on “View Inventories Progress” under sub menu “Submission Management”.\n\n3. The “View Inventories Progress” screen appears.\n\n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 60, a).\n\n5. Press the “Send for Approval” button to send it to NFP for his/her review and approval of the inventory\n\n(figure 60, b).\n\n*** Note: A notification email will be sent to the PM, once the “Send for Approval” has been pressed. And the\n\nstatus changed to “Awaiting_approval” (figure 61).\n\n* **Figure 60. Work on Inventories screen - Send for Approval - Status = check** *\n\n* **Figure 61. Work on Inventories screen - Status = awaiting_approval** *\n\n#### **10.4.2 Rejection of an Inventory**\n\n1. Log in as PM.\n\n2. Click on “View Inventories Progress” under sub menu “Submission Management”.\n\n3. The “View Inventories Progress” screen appears.\n\n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 62, a).\n\n5. Press the “Reject” button (figure 62, b).\n\n*** Note: A notification email will be sent to the PM, once the “Reject” button has been pressed. And the\n\nstatus changed to “Awaiting_rejection_check” (figure 63).", - "page_start": 37, - "page_end": 37, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**94** IBM Content Manager OnDemand Guide\n\nThe file must also include valid paths for the Tivoli Storage Manager options files and all of the\n\nTivoli Storage Manager components that are used. The parameters in the file are used to\n\nreference the first Tivoli Storage Manager Server. A single object server can reference\n\nmultiple Tivoli Storage Manager servers.\n\n*Figure 5-3 ARS.CFG file for Tivoli Storage Manager configuration*\n\n######################################################\n\n# Storage Manager Parameters (Library/Object Server) #\n\n######################################################\n\n#\n\n# Storage Manager for OnDemand to use\n\n#\n\nARS_STORAGE_MANAGER=TSM\n\n#######################################\n\n# TSM Parameters (Object Server Only) #\n\n#######################################\n\nDSMSERV_DIR=/usr/tivoli/tsm/server/bin\n\nDSMSERV_CONFIG=/usr/tivoli/tsm/server/bin/dsmserv.opt\n\nDSM_DIR=/usr/tivoli/tsm/client/api/bin64\n\nDSM_CONFIG=/usr/tivoli/tsm/client/api/bin64/dsm.opt\n\nDSM_LOG=/tmp\n\nDSMG_DIR=/usr/tivoli/tsm/client/api/bin64\n\nDSMG_CONFIG=/usr/tivoli/tsm/client/api/bin64/dsm.opt\n\nDSMG_LOG=/tmp\n\nDSMI_DIR=/usr/tivoli/tsm/client/api/bin64\n\nDSMI_CONFIG=/usr/tivoli/tsm/client/api/bin64/dsm.opt\n\nDSMI_LOG=/tmp\n\n**Note:** For the Tivoli Storage Manager client that is used by Content Manager OnDemand,\n\nset COMPRESSION NO in the Tivoli Storage Manager client option file ( dsm.opt for Windows or\n\ndsm.sys for UNIX). Content Manager OnDemand objects are compressed before they are\n\nsent to Tivoli Storage Manager for archival; therefore, compression by Tivoli Storage\n\nManager is not required.", - "page_start": 117, - "page_end": 117, - "source_file": "sg246915.pdf" - }, - { - "text": "SEND YOUR REGISTRATION FORM\n\nCHOOSE YOUR COURSE **1**\n\nFILL IN THE\n\nREGISTRATION FORM\n\n## **2**\n\nThe registration form follows an easy-to-complete four step layout.\n\n## **3**\n\n## **4 5**\n\nIF YOU ARE REGISTERING\n\nFOR an ICB, or NATED\n\nCOURSE\n\nmake sure to indicate your preferred exam centre.\n\nIF YOU ARE UNDER\n\n18, OR IF YOU ARE\n\nUNEMPLOYED\n\nmake sure that your parent/guardian/guarantor signs the form.\n\nATTACH THE FOLLOWING\n\nDOCUMENTS\n\n1. Copy of your ID\n\n2. Proof of highest grade passed\n\n3. Proof of other qualifications\n\n4. Proof of payment\n\nPAY YOUR\n\nREGISTRATION FEE\n\nSend your registration form to the\n\nregistrations office at Oxbridge Academy via\n\none of the following channels:\n\nFax: 086 262 5550\n\nPost: PO Box 12723, Die Boord, 7613\n\nE-mail: registrar@oxbridgeacademy.co.za\n\n## **6**\n\nA Summary of the Registration Process at Oxbridge Academy\n\nAs soon as your details\n\nhave been captured\n\non our system you will\n\nreceive confirmation\n\nof your registration via\n\ne-mail or SMS", - "page_start": 26, - "page_end": 26, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "wikipedia4.pdf", - "query": "Which rivers flow through Lyon?", - "target_page": 1, - "target_passage": "It is located at the confluence of the rivers Rhône and Saône, ", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "| Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] |", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Lyon 3: Berges du Rhône campus\n\n[Lyon 2: Berges du Rhône campus](https://en.wikipedia.org/wiki/Lumi%C3%A8re_University_Lyon_2)\n\n[IPSA Lyon Campus](https://en.wikipedia.org/wiki/Institut_polytechnique_des_sciences_avanc%C3%A9es)\n\n[Platform I, Lyon-Part-Dieu train](https://en.wikipedia.org/wiki/Lyon-Part-Dieu)\n\nstation\n\nT1 tramway on the Raymond Barre\n\nbridge\n\nBellecour, Écoles D'Arts.\n\nThere are some international private schools in the Lyon area, including:\n\n[Cité Scolaire Internationale de Lyon or the Lycée de Gerland;](https://en.wikipedia.org/wiki/Cit%C3%A9_Scolaire_Internationale_de_Lyon)\n\nIncludes the *Section Japonaises* ( リヨン・ジェルラン補習授業校 *Riyon Jeruran Hoshū Jugyō Kō* \"Lyon Gerland Japanese\n\n[Supplementary School\"), which the Japanese Ministry of Education](https://en.wikipedia.org/wiki/Japanese_Ministry_of_Education)\n\n[(MEXT) counts as a part-time Japanese supplementary school](https://en.wikipedia.org/wiki/Hoshuko) <sup>[73]</sup>\n\nOmbrosa;\n\n[International School of Lyon in nearby Sainte-Foy-lès-Lyon;](https://en.wikipedia.org/wiki/Sainte-Foy-l%C3%A8s-Lyon)\n\nMontessori School of Lyon.\n\nOther Japanese supplementary schools:\n\nThe *Association Pour le Développement de la Langue et de la Culture* *Japonaises* (ADLCJ; リヨン補習授業校 *Riyon Hoshū Jugyō Kō* ) is held in the *Maison Berty Albrecht* in Villeurbanne, near Lyon. <sup>[73]</sup> It was formed in\n\n1987. <sup>[74]</sup> It serves Japanese expatriate children who wish to continue their\n\nJapanese education whilst abroad.\n\n[Lyon- Saint-Exupéry Airport, located east of Lyon, serves as a base for domestic and](https://en.wikipedia.org/wiki/Lyon%E2%80%93Saint-Exup%C3%A9ry_Airport)\n\ninternational flights. It is a key transport facility for the entire Rhône-Alpes region,\n\nwith coach links to other cities in the area. The in-house train station Gare de Lyon\n\n[Saint-Exupéry connects the airport to the nationwide TGV network. The Rhônexpress](https://en.wikipedia.org/wiki/Rh%C3%B4nexpress)\n\n[tram monopoly links the airport with the business quarter of La Part Dieu in less than](https://en.wikipedia.org/wiki/Rh%C3%B4nexpress)\n\n30 minutes, and offers connections with Underground A & B, Tramway T1, T3 & T4,\n\nand bus lines. Lyon public transport Sytral offers a bus service, Route 47, that links\n\nthe airport to Meyzieu <sup>[75]</sup> where passengers can change onto Tram T3. The regular\n\nprice of public transport is €1.90, as opposed to €15 one way for the Rhonexpress. In\n\n[the suburb of Bron, the smaller Lyon-Bron Airport provides an alternative for](https://en.wikipedia.org/wiki/Lyon-Bron_Airport)\n\ndomestic aviation.\n\nLyon has two major railway stations: Lyon-Part-Dieu, which was built to\n\n[accommodate the TGV, and Lyon Perrache, an older station that now provides mostly](https://en.wikipedia.org/wiki/Gare_de_Lyon-Perrache)\n\n[regional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul](https://en.wikipedia.org/wiki/Gare_de_Lyon-Saint-Paul)\n\n[and Jean Macé. Lyon was the first city to be connected to Paris by the TGV in](https://en.wikipedia.org/wiki/Gare_de_Lyon-Jean_Mac%C3%A9)\n\n1981. <sup>[76]</sup> Since that time the TGV train network has expanded and links Lyon directly\n\nto Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International\n\ntrains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt,\n\nLuxembourg, Brussels and London.\n\nThe city is at the heart of a dense road network and is located at the meeting point of\n\n[several highways: A6 to Paris, A7 Marseille, A42 to Geneva, and A43 to Grenoble.](https://en.wikipedia.org/wiki/Grenoble)\n\n[The city is now bypassed by the A46. A double motorway tunnel passes under](https://en.wikipedia.org/wiki/A46_autoroute)\n\nFourvière, connecting the A6 and the A7 autoroutes, both forming the \"Autoroute du\n\nSoleil\".\n\n#### **Primary and secondary schools**\n\n#### **Supplementary education**\n\n### **Transport**", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Foreign-born population in Lyon by\n\ncountry of birth <sup>[72]</sup>\n\n| Country of birth | Population (2020) |\n|:---|:---|\n| Algeria | 14,779 |\n| Morocco | 5,245 |\n| Tunisia | 4,879 |\n| Italy | 3,351 |\n| Portugal | 3,068 |\n| Spain | 2,064 |\n| DR Congo | 1,520 |\n| China | 1,429 |\n| Cameroon | 1,364 |\n| Senegal | 1,198 |\n\n[ENS Lyon: René Descartes](https://en.wikipedia.org/wiki/ENS_Lyon)\n\ncampus\n\n[Lyon 3: Manufacture des Tabacs](https://en.wikipedia.org/wiki/Jean_Moulin_University)\n\ncampus\n\nAll figures come from population censuses. Figures from 1911 to 1936 (incl.) are computed using the redressed figures for the\n\n[commune of Lyon calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at](https://en.wikipedia.org/wiki/INSEE)\n\nthe time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and\n\nremain the 2nd largest city of France ahead of Marseille). <sup>[68]</sup> The 1906 figure is computed using the figure for the commune of\n\nLyon published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate\n\nwas smaller than 10,000.\n\nSource: EHESS <sup>[70]</sup> and INSEE <sup>[71]</sup>\n\n[École Centrale de Lyon;](https://en.wikipedia.org/wiki/%C3%89cole_centrale_de_Lyon)\n\n[École Normale Supérieure de Lyon](https://en.wikipedia.org/wiki/%C3%89cole_Normale_Sup%C3%A9rieure_de_Lyon)\n\n[EM Lyon (École de Management de Lyon);](https://en.wikipedia.org/wiki/%C3%89cole_de_management_de_Lyon)\n\nECE Lyon (École de Commerce Européenne de Lyon);\n\n[Institut d'études politiques de Lyon (Sciences Po Lyon);](https://en.wikipedia.org/wiki/Institut_d%27%C3%A9tudes_politiques_de_Lyon)\n\n[CPE Lyon;](https://en.wikipedia.org/wiki/%C3%89cole_sup%C3%A9rieure_de_chimie_physique_%C3%A9lectronique_de_Lyon)\n\n[CNSMD (Conservatoire national supérieur de musique et de danse de](https://en.wikipedia.org/wiki/Conservatoire_national_sup%C3%A9rieur_de_musique_et_de_danse_de_Lyon)\n\nLyon)\n\n[ECAM Lyon (École Catholique d'Arts et Métiers de Lyon);](https://en.wikipedia.org/wiki/%C3%89cole_Catholique_des_Arts_et_M%C3%A9tiers)\n\n[EPITECH;](https://en.wikipedia.org/wiki/EPITECH)\n\n[EPITA;](https://en.wikipedia.org/wiki/EPITA)\n\n[ENTPE (École Nationale des Travaux Publiques de l'État);](https://en.wikipedia.org/wiki/%C3%89cole_nationale_des_travaux_publics_de_l%27%C3%89tat)\n\n[École nationale vétérinaire de Lyon (ENVL);](https://en.wikipedia.org/wiki/%C3%89cole_nationale_v%C3%A9t%C3%A9rinaire_de_Lyon)\n\n[ESME-Sudria;](https://en.wikipedia.org/wiki/ESME-Sudria)\n\n[École des Beaux-Arts;](https://en.wikipedia.org/wiki/%C3%89cole_des_Beaux-Arts)\n\n[E-Artsup;](https://en.wikipedia.org/wiki/E-Artsup)\n\n[INSA Lyon (Institut National des Sciences Appliquées de Lyon);](https://en.wikipedia.org/wiki/Institut_national_des_sciences_appliqu%C3%A9es_de_Lyon)\n\n[Polytech Lyon;](https://en.wikipedia.org/wiki/%C3%89cole_polytechnique_universitaire_de_l%27universit%C3%A9_Lyon-I)\n\n[Institut supérieur européen de gestion group;](https://en.wikipedia.org/wiki/Institut_sup%C3%A9rieur_europ%C3%A9en_de_gestion_group)\n\n[ISARA (Institut Supérieur d'Agriculture Rhône Alpes);](https://en.wikipedia.org/wiki/Institut_sup%C3%A9rieur_d%27agriculture_Rh%C3%B4ne-Alpes)\n\n[Institution des Chartreux;](https://en.wikipedia.org/wiki/Institution_des_Chartreux)\n\n[Institut polytechnique des sciences avancées;](https://en.wikipedia.org/wiki/Institut_polytechnique_des_sciences_avanc%C3%A9es)\n\n[Université Claude Bernard (Lyon 1);](https://en.wikipedia.org/wiki/Claude_Bernard_University_Lyon_1)\n\n[Université Lumière (Lyon 2);](https://en.wikipedia.org/wiki/Lumi%C3%A8re_University_Lyon_2)\n\n[Université Jean Moulin (Lyon 3);](https://en.wikipedia.org/wiki/Jean_Moulin_University_Lyon_3)\n\n[IAE (Institut d'Administration des Entreprises de Lyon);](https://en.wikipedia.org/wiki/IAE_Jean_Moulin_University_Lyon_3)", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[54. Perret, Aurelie. \"Les traboules de Lyon\" (http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les](http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les-traboules-de-lyon.html)\n\n[-traboules-de-lyon.html). ](http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les-traboules-de-lyon.html) *histoire-pour-tous.fr* . SF Webmedia. Retrieved 31 July 2015.\n\n55. Curnonsky, Marcel E. Grancher (1935). *Lyon, capitale mondiale de la gastronomie* [ (https://books.google.com/](https://books.google.com/books?id=D481HQAACAAJ&q=curnonsky+lyon)\n\n[books?id=D481HQAACAAJ&q=curnonsky+lyon). Editions Lugdunum. Retrieved 30 July 2015.](https://books.google.com/books?id=D481HQAACAAJ&q=curnonsky+lyon)\n\n[56. Buford, Bill (12 February 2011). \"Why Lyon is food capital of the world\" (https://www.theguardian.com/travel/2](https://www.theguardian.com/travel/2011/feb/13/bill-buford-lyon-food-capital)\n\n[011/feb/13/bill-buford-lyon-food-capital). ](https://www.theguardian.com/travel/2011/feb/13/bill-buford-lyon-food-capital) *The Guardian* . Retrieved 11 December 2014.\n\n[57. \"Priay Il y a 80 ans \" La mère Bourgeois \" obtenait 3 étoiles\" (http://www.leprogres.fr/ain/2013/01/09/priay-il-y-](http://www.leprogres.fr/ain/2013/01/09/priay-il-y-a-80-ans-la-mere-bourgeois-obtenait-3-etoiles)\n\n[a-80-ans-la-mere-bourgeois-obtenait-3-etoiles). ](http://www.leprogres.fr/ain/2013/01/09/priay-il-y-a-80-ans-la-mere-bourgeois-obtenait-3-etoiles) *leprogres.fr* . Le Progres. Retrieved 30 July 2015.\n\n[58. \"Histoire de la gastronomie 2/4\" (https://archive.today/20120605042553/http://www.franceculture.fr/emission-l](https://archive.today/20120605042553/http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html)\n\n[a-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html). ](https://archive.today/20120605042553/http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html) *franceculture.fr* . Radio France.\n\n[Archived from the original (http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastron](http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html)\n\n[omie-24-2010-11-23.html) on 5 June 2012. Retrieved 30 July 2015.](http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html)\n\n[59. Gaudry, François-Régis (26 September 2014). \"Paul Bocuse: derniers secrets du \"pape\" de la gastronomie](http://www.lexpress.fr/styles/saveurs/paul-bocuse-derniers-secrets_1578426.html)\n\n[française\" (http://www.lexpress.fr/styles/saveurs/paul-bocuse-derniers-secrets_1578426.html). ](http://www.lexpress.fr/styles/saveurs/paul-bocuse-derniers-secrets_1578426.html) *lexpress.fr* .\n\nGroupe Express-Roularta. Retrieved 30 July 2015.\n\n[60. \"Cuisine et boissons Lyon et ses environs\" (http://www.routard.com/guide/lyon/372/cuisine_et_boissons.htm).](http://www.routard.com/guide/lyon/372/cuisine_et_boissons.htm)\n\n*routard.com* . Cyberterre / Hachette tourisme. Retrieved 30 July 2015.\n\n[61. Bassets, Marc (20 June 2023). \"The secret of the taco: modern, multicultural France's fast food phenomenon\"](https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-phenomenon.html)\n\n[(https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-p](https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-phenomenon.html)\n\n[henomenon.html). ](https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-phenomenon.html) *El País* . Retrieved 13 August 2024.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia4.pdf" - }, - { - "text": "31. Braudel 1984 p. 327\n\n[32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde](https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[Lyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01](https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011](http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[50.htm) on 19 January 2011. Retrieved 3 April 2011.](http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli](https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1)\n\n[sh_1). ](https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) *Chrd.lyon.fr* [. 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1)](http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1)\n\non 24 January 2011. Retrieved 21 December 2017.\n\n[34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal.](http://www.digitaljournal.com/article/273644)\n\n[com/article/273644). ](http://www.digitaljournal.com/article/273644) *Digitaljournal.com* .\n\n35. (in French) Georges Duby (ed), *Histoire de la France : Dynasties et révolutions, de 1348 à 1852* (vol. 2),\n\n[Larousse, 1999 p. 53 ISBN 2-03-505047-2](https://en.wikipedia.org/wiki/Special:BookSources/2-03-505047-2)\n\n[36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g](http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/getting-around/local-transport)\n\n[etting-around/local-transport). Lonely Planet. Retrieved 2 February 2017.](https://en.wikipedia.org/wiki/Lonely_Planet)\n\n[37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/). ](https://whc.unesco.org/en/list/872/) *unesco.org* . UNESCO World Heritage Centre.\n\nRetrieved 31 July 2015.\n\n[38. Gregory, Stanley. “Climatic Classification and Climatic Change (Klimaklassifikation Und Klimaänderung) (http](https://www.jstor.org/stable/25636095)\n\n[s://www.jstor.org/stable/25636095).” ](https://www.jstor.org/stable/25636095) *Erdkunde* , vol. 8, no. 4, 1954, pp. 246- 252. *[JSTOR.](https://en.wikipedia.org/wiki/JSTOR)*\n\n[39. \"Données climatiques de la station de Lyon: Relevés de 2016 - Lyon\" (https://web.archive.org/web/20161004](https://web.archive.org/web/20161004055201/http://www.meteofrance.com/climat/france/lyon/69029001/releves)\n\n[055201/http://www.meteofrance.com/climat/france/lyon/69029001/releves) (in French). Meteo France.](https://web.archive.org/web/20161004055201/http://www.meteofrance.com/climat/france/lyon/69029001/releves)\n\n[Archived from the original (http://www.meteofrance.com/climat/france/lyon/69029001/releves) on 4 October](http://www.meteofrance.com/climat/france/lyon/69029001/releves)\n\n2016. Retrieved 2 October 2016.\n\n[40. \"Lyon-Bron (69)\" (https://donneespubliques.meteofrance.fr/FichesClim/FICHECLIM_69029001.pdf) (PDF).](https://donneespubliques.meteofrance.fr/FichesClim/FICHECLIM_69029001.pdf)\n\n*Fiche Climatologique: Statistiques 1991- 2020 et records* (in French). Meteo France. Retrieved 14 July 2022.\n\n[41. \"Température et records en Août pour Lyon\" (https://www.meteo-lyon.net/records/mois/aout). ](https://www.meteo-lyon.net/records/mois/aout) *meteo-lyon.net*\n\n(in French). Météo Villes. Retrieved 7 September 2023.\n\n[42. \"Lyon- Bron (07480) - WMO Weather Station\" (ftp://ftp.atdd.noaa.gov/pub/GCOS/WMO-Normals/TABLES/RE](ftp://ftp.atdd.noaa.gov/pub/GCOS/WMO-Normals/TABLES/REG_VI/FR/07480.TXT)", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia4.pdf" - }, - { - "text": "| Lyon Liyon (Arpitan) |\n|:---|\n| Prefecture and commune |\n| Skyline of Lyon in La Part-Dieu Basilica of Notre- Dame de Fourvière Place des Terreaux with the Fontaine Bartholdi Parc de la Tête d'or Confluence District Vieux Lyon Pont Lafayette |\n| Flag Coat of arms |\n\nMotto(s): *Avant, avant, Lion le melhor*\n\n[(old Franco-Provençal for \"Forward, forward,](https://en.wikipedia.org/wiki/Franco-Proven%C3%A7al_language)\n\nLyon the best\") <sup>[a]</sup>\n\n*Virtute duce, comite fortuna*\n\n(\"With virtue as guide and fortune as\n\ncompanion\") <sup>[b]</sup>\n\n**Location of Lyon**\n\n## **Lyon**\n\n**Lyon** <sup>[c]</sup> [ (Franco-Provençal: ](https://en.wikipedia.org/wiki/Franco-Proven%C3%A7al) *Liyon* [) is the second-largest city in France](https://en.wikipedia.org/wiki/France)\n\nby urban area and the third largest by city limits. <sup>[14]</sup> It is located at the\n\n[confluence of the rivers Rhône and Saône, to the northwest of the](https://en.wikipedia.org/wiki/Sa%C3%B4ne)\n\n[French Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north](https://en.wikipedia.org/wiki/Paris)\n\n[of Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km](https://en.wikipedia.org/wiki/Geneva)\n\n[(36 mi) northeast of Saint-Étienne.](https://en.wikipedia.org/wiki/Saint-%C3%89tienne)\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census\n\nwithin its small municipal territory of 48 km <sup>2</sup> (19 sq mi), <sup>[15]</sup> but\n\n[together with its suburbs and exurbs the Lyon metropolitan area had a](https://en.wikipedia.org/wiki/Functional_area_(France))\n\npopulation of 2,308,818 that same year, <sup>[7]</sup> the second most populated in\n\nFrance. Lyon and 58 suburban municipalities have formed since 2015\n\n[the Metropolis of Lyon, a directly elected metropolitan authority now in](https://en.wikipedia.org/wiki/Lyon_Metropolis)\n\ncharge of most urban issues, with a population of 1,424,069 in 2021. <sup>[16]</sup>\n\n[Lyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of](https://en.wikipedia.org/wiki/Regions_of_France)\n\n[the Departmental Council of Rhône (whose jurisdiction, however, no](https://en.wikipedia.org/wiki/Rh%C3%B4ne_(department))\n\nlonger extends over the Metropolis of Lyon since 2015).\n\n[The capital of the Gauls during the Roman Empire, Lyon is the seat of](https://en.wikipedia.org/wiki/Roman_Empire)\n\n[an archbishopric whose holder bears the title of Primate of the Gauls.](https://en.wikipedia.org/wiki/Roman_Catholic_Archdiocese_of_Lyon)\n\n[Lyon became a major economic hub during the Renaissance. The city is](https://en.wikipedia.org/wiki/French_Renaissance)\n\n[recognised for its cuisine and gastronomy, as well as historical and](https://en.wikipedia.org/wiki/Gastronomy)\n\n[architectural landmarks; as such, the districts of Old Lyon, the Fourvière](https://en.wikipedia.org/wiki/Fourvi%C3%A8re)\n\n[hill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on](https://en.wikipedia.org/wiki/La_Croix-Rousse)\n\n[the UNESCO World Heritage List. Lyon was historically an important](https://en.wikipedia.org/wiki/World_Heritage_Site)\n\narea for the production and weaving of silk. Lyon played a significant\n\n[role in the history of cinema since Auguste and Louis Lumière invented](https://en.wikipedia.org/wiki/Auguste_and_Louis_Lumi%C3%A8re)\n\n[the cinematograph there. The city is also known for its light festival, the](https://en.wikipedia.org/wiki/Cinematograph)\n\n[Fête des lumières, which begins every 8 December and lasts for four](https://en.wikipedia.org/wiki/Festival_of_Lights_(Lyon))\n\ndays, earning Lyon the title of \"Capital of Lights\".\n\n[Economically, Lyon is a major centre for banking, chemical,](https://en.wikipedia.org/wiki/Chemical)\n\n[pharmaceutical and biotech industries. The city contains a significant](https://en.wikipedia.org/wiki/Biotechnology)\n\nsoftware industry with a particular focus on video games; in recent years", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Passage de l'Argue\n\n[Île Barbe bakery at the Halles de](https://en.wikipedia.org/w/index.php?title=Halles_de_Lyon-Paul_Bocuse&action=edit&redlink=1)\n\n[Lyon-Paul Bocuse](https://en.wikipedia.org/w/index.php?title=Halles_de_Lyon-Paul_Bocuse&action=edit&redlink=1)\n\n[Parc Olympique Lyonnais](https://en.wikipedia.org/wiki/Parc_Olympique_Lyonnais)\n\nBoth Vieux Lyon and the slopes of Croix-Rousse are known for their narrow\n\npassageways (named *traboules* ) that pass through buildings and link streets on either\n\nside. The first examples of traboules are thought to have been built in Lyon in the 4th\n\ncentury. <sup>[54]</sup> The traboules allowed the inhabitants to get from their homes to the Saône\n\nquickly and allowed the canuts on the Croix-Rousse hill to get from their workshops\n\nto the textile merchants at the foot of the hill.\n\nLyon has a long and chronicled culinary arts tradition. The noted food critic\n\n[Curnonsky referred to the city as \"the gastronomic capital of the world\",](https://en.wikipedia.org/wiki/Curnonsky) <sup>[55]</sup> a claim\n\n[repeated by later writers such as Bill Buford.](https://en.wikipedia.org/wiki/Bill_Buford) <sup>[56]</sup> Renowned 3-star Michelin chefs\n\n[such as Marie Bourgeois](https://en.wikipedia.org/wiki/Marie_Bourgeois) <sup>[57]</sup> [ and Eugénie Brazier](https://en.wikipedia.org/wiki/Eug%C3%A9nie_Brazier) <sup>[58]</sup> developed Lyonnaise cuisine into\n\n[a national phenomenon favoured by the French elite; a tradition which Paul Bocuse](https://en.wikipedia.org/wiki/Paul_Bocuse)\n\nlater turned into a worldwide success. <sup>[59]</sup> The *[bouchon](https://en.wikipedia.org/wiki/Bouchon)* is a traditional Lyonnais\n\nrestaurant that serves local fare such as sausages, duck pâté or roast pork, along with\n\nlocal wines. Two of France's best known wine-growing regions are located near the\n\n[city: the Beaujolais region to the north and the Côtes du Rhône region to the south.](https://en.wikipedia.org/wiki/C%C3%B4tes_du_Rh%C3%B4ne_AOC)\n\n[Another Lyon tradition is a type of brunch food called \"mâchons\", made of local](https://en.wikipedia.org/wiki/Brunch)\n\n[charcuterie and usually accompanied by Beaujolais red wine. Mâchons were the](https://en.wikipedia.org/wiki/Charcuterie)\n\ncustomary meal of the canuts, the city's silk workers, who ate a late-morning meal\n\nafter they finished their shifts in the factories. <sup>[60]</sup>\n\n[Other traditional local dishes include coq au vin; quenelle; gras double; salade](https://en.wikipedia.org/w/index.php?title=Salade_lyonnaise&action=edit&redlink=1)\n\n[lyonnaise (lettuce with bacon, croûtons and a poached egg); and the sausage-based](https://en.wikipedia.org/w/index.php?title=Salade_lyonnaise&action=edit&redlink=1)\n\n[rosette lyonnaise and andouillette. Popular local confections include marron glacé and](https://en.wikipedia.org/wiki/Marron_glac%C3%A9)\n\n[coussin de Lyon. Cervelle de canut (literally, \"silk worker's brains\") is a cheese](https://en.wikipedia.org/wiki/Cervelle_de_canut)\n\n[spread/dip made of a base of fromage blanc, seasoned with chopped herbs, shallots,](https://en.wikipedia.org/wiki/Fromage_frais)\n\nsalt, pepper, olive oil and vinegar.\n\n[More recently, the french tacos was invented in Lyon suburbs (Vaulx-en-Velin) (or Grenoble according to some theories), in](https://en.wikipedia.org/wiki/Grenoble)\n\nthe early 2000s and is now famous worldwide. <sup>[61][62]</sup>\n\n[Lyon is home to the football club Olympique Lyonnais (OL), whose men's team plays](https://en.wikipedia.org/wiki/Olympique_Lyonnais)\n\n[in Ligue 1 and has won the championship of that competition seven times, all](https://en.wikipedia.org/wiki/Ligue_1)\n\nconsecutively from 2002 to 2008. <sup>[63]</sup> OL played until December 2015 at the 43,000-\n\n[seat Stade de Gerland, which also hosted matches of the 1998 FIFA World Cup. Since](https://en.wikipedia.org/wiki/1998_FIFA_World_Cup)\n\n2016, the team has played at the Parc Olympique Lyonnais, a 59,000-seat stadium", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[Official website (http://www.lyon.fr)(in French)](http://www.lyon.fr/)\n\n[Visit Lyon, the official website for tourism in France (https://en.visiterlyon.com/)](https://en.visiterlyon.com/)\n\n[Lyon’s English Language News and Information (https://thisislyon.fr/)](https://thisislyon.fr/)\n\n[Rues de Lyon (https://www.ruesdelyon.net/) Streets, Places, Monuments (in French)](https://www.ruesdelyon.net/)\n\n[Old maps of Lyon (http://historic-cities.huji.ac.il/france/lyon/lyon.html) Archived (https://web.archive.org/we](https://web.archive.org/web/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html)\n\n[b/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html) 16 January 2021 at the Wayback](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n[Machine, Historic cities site (http://historic-cities.huji.ac.il/historic_cities.html) Archived (https://web.archive.](https://web.archive.org/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html)\n\n[org/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html) 25 March 2022 at the Wayback](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n[Machine, The National Library of Israel](https://en.wikipedia.org/wiki/National_Library_of_Israel)\n\n[Retrieved from \"https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203\"](https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203)\n\n### **External links**", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia4.pdf" - }, - { - "text": "2016, the team has played at the Parc Olympique Lyonnais, a 59,000-seat stadium\n\n[located in the eastern suburb of Décines-Charpieu.](https://en.wikipedia.org/wiki/D%C3%A9cines-Charpieu) <sup>[64]</sup> OL operates a women's team,\n\n[Olympique Lyonnais Féminin, which competes in and dominates Division 1](https://en.wikipedia.org/wiki/Division_1_F%C3%A9minine)\n\n[Féminine. They won fourteen consecutive top-flight championships (2007- 2020), and](https://en.wikipedia.org/wiki/Division_1_F%C3%A9minine)\n\nadditionally claim the four titles won by the original incarnation of FC Lyon, a\n\nwomen's football club that merged into OL in 2004 (the current FC Lyon was founded in 2009). The OL women have also\n\n[won the UEFA Women's Champions League eight times, including in five consecutive editions from 2016 to 2020. Lyon](https://en.wikipedia.org/wiki/UEFA_Women%27s_Champions_League)\n\n[hosted the 2019 FIFA Women's World Cup semi-finals as well as the Final on 7 July at Stade de Lyon.](https://en.wikipedia.org/wiki/2019_FIFA_Women%27s_World_Cup_Final)\n\n[Lyon has a rugby union team, Lyon OU, in the Top 14, which moved into Stade de Gerland full-time in 2017- 18. In addition,](https://en.wikipedia.org/wiki/Top_14)\n\n[Lyon has a rugby league side called Lyon Villeurbanne that plays in the French rugby league championship. The club's home](https://en.wikipedia.org/wiki/French_rugby_league_championship)\n\n[is the Stade Georges Lyvet in Villeurbanne.](https://en.wikipedia.org/w/index.php?title=Stade_Georges_Lyvet&action=edit&redlink=1)\n\n#### **Gastronomy**\n\n#### **Sport**", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia4.pdf" - }, - { - "text": "C3 trolleybus in the third district\n\nC3 trolleybus in Old Lyon\n\nVelo'v, Ennemond Fousseret square\n\n(Old Lyon)\n\n[Lyon is served by the Eurolines intercity coach organisation. Its Lyon terminal is](https://en.wikipedia.org/wiki/Eurolines)\n\nlocated at the city's Perrache railway station, which serves as an intermodal\n\ntransportation hub for tramways, local and regional trains and buses, the terminus of\n\nMetro line A, of the Tramway T2, the bicycle service Vélo'v, and taxis. <sup>[77]</sup>\n\n[The Transports en commun lyonnais (TCL), Lyon's public transit system, consisting](https://en.wikipedia.org/wiki/Transports_en_commun_lyonnais)\n\nof metro, tramways and buses, serves 62 communes of the Lyon metropolis. <sup>[78][79]</sup>\n\n[The metro network has four lines (A, B, C and D), 42 stations, and runs with a](https://en.wikipedia.org/wiki/Lyon_Metro_Line_D)\n\n[frequency of up to a train every 2 minutes. There are eight Lyon tram lines since](https://en.wikipedia.org/wiki/Lyon_tramway)\n\nnovember 2020: T1 from *Debourg* in the south to *IUT-Feyssine* in the north, Tram T2\n\nfrom *Hôtel de région Montrochet* [ to Saint-Priest in the south-east, Tram T3 from Part-](https://en.wikipedia.org/wiki/Saint-Priest,_Rh%C3%B4ne)\n\n[Dieu to Meyzieu, Tram T4 from 'Hôptial Feyzin Venissieux' to La Doua Gaston](https://en.wikipedia.org/wiki/Meyzieu)\n\nBerger. Tram T5 from Grange Blanche, in the south-east to Eurexpo in the south-west.\n\nTram T6 from Debourg, in the south to Hôpitaux Est-Pinel in the east. Tram T7 from\n\nVaux-en-Velin la soie, in the north-east to Décines - OL Vallée in the east. <sup>[79]</sup> And\n\nRhône Express tramline from Part-Dieu to Lyon- Saint-Exupéry Airport. <sup>[80][81]</sup> The\n\n[Lyon bus network consists of the Lyon trolleybus system, motorbuses, and coaches](https://en.wikipedia.org/wiki/Motorbuses)\n\nfor areas outside the centre. There are also two funicular lines from Vieux Lyon to\n\nSaint-Just and Fourvière. The ticketing system is relatively simple as the city has only\n\none public transport operator, the SYTRAL.\n\nThe public transit system was complemented in 2005 by *[Vélo'v](https://en.wikipedia.org/wiki/V%C3%A9lo%27v)* , a bicycle network\n\nproviding a low-cost bicycle-hire service made up of 340 stations throughout the city.\n\nBorrowing a bicycle for less than 30 minutes is free. Free rental time can be extended\n\nfor another 30 minutes at any station. Lyon was the first city in France to introduce\n\n[this bicycle renting system. In 2011 the Auto'lib car rental service was introduced; it](https://en.wikipedia.org/wiki/Autolib%27)\n\nworks much the same way as the Velo'v but for cars.\n\nThe average amount of time people spend commuting with public transit in Lyon on a\n\nweekday is 45 minutes. The average amount of time people wait at a stop or station\n\nfor public transit is 11 min, while 17% of riders wait for over 20 minutes on average\n\nevery day. The average distance people usually ride in a single trip with public transit\n\nis 4.7 km, while 4% travel for over 12 km in a single direction. <sup>[82]</sup>\n\nNetwork of\n\nhighways around\n\nLyon\n\nPublic transport map\n\nLyon is a pilot city of the Council of Europe and the European Commission \"Intercultural cities\" program. <sup>[83]</sup> Lyon is\n\n[twinned with:](https://en.wikipedia.org/wiki/Twin_towns_and_sister_cities) <sup>[84]</sup>\n\n[Addis Ababa, Ethiopia](https://en.wikipedia.org/wiki/Addis_Ababa)\n\n[Bamako, Mali](https://en.wikipedia.org/wiki/Bamako)\n\n[Barcelona, Spain](https://en.wikipedia.org/wiki/Barcelona)\n\n[Beersheba, Israel](https://en.wikipedia.org/wiki/Beersheba)\n\n[Birmingham, England, United Kingdom](https://en.wikipedia.org/wiki/Birmingham)\n\n[Boston, United States](https://en.wikipedia.org/wiki/Boston)\n\n[Craiova, Romania](https://en.wikipedia.org/wiki/Craiova)\n\n[Curitiba, Brazil](https://en.wikipedia.org/wiki/Curitiba)\n\n#### **Maps**\n\n### **International relations**", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia4.pdf", - "query": "How big was Lyon's population in 2022? ", - "target_page": 2, - "target_passage": "Population (2022) 520,774", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Foreign-born population in Lyon by\n\ncountry of birth <sup>[72]</sup>\n\n| Country of birth | Population (2020) |\n|:---|:---|\n| Algeria | 14,779 |\n| Morocco | 5,245 |\n| Tunisia | 4,879 |\n| Italy | 3,351 |\n| Portugal | 3,068 |\n| Spain | 2,064 |\n| DR Congo | 1,520 |\n| China | 1,429 |\n| Cameroon | 1,364 |\n| Senegal | 1,198 |\n\n[ENS Lyon: René Descartes](https://en.wikipedia.org/wiki/ENS_Lyon)\n\ncampus\n\n[Lyon 3: Manufacture des Tabacs](https://en.wikipedia.org/wiki/Jean_Moulin_University)\n\ncampus\n\nAll figures come from population censuses. Figures from 1911 to 1936 (incl.) are computed using the redressed figures for the\n\n[commune of Lyon calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at](https://en.wikipedia.org/wiki/INSEE)\n\nthe time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and\n\nremain the 2nd largest city of France ahead of Marseille). <sup>[68]</sup> The 1906 figure is computed using the figure for the commune of\n\nLyon published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate\n\nwas smaller than 10,000.\n\nSource: EHESS <sup>[70]</sup> and INSEE <sup>[71]</sup>\n\n[École Centrale de Lyon;](https://en.wikipedia.org/wiki/%C3%89cole_centrale_de_Lyon)\n\n[École Normale Supérieure de Lyon](https://en.wikipedia.org/wiki/%C3%89cole_Normale_Sup%C3%A9rieure_de_Lyon)\n\n[EM Lyon (École de Management de Lyon);](https://en.wikipedia.org/wiki/%C3%89cole_de_management_de_Lyon)\n\nECE Lyon (École de Commerce Européenne de Lyon);\n\n[Institut d'études politiques de Lyon (Sciences Po Lyon);](https://en.wikipedia.org/wiki/Institut_d%27%C3%A9tudes_politiques_de_Lyon)\n\n[CPE Lyon;](https://en.wikipedia.org/wiki/%C3%89cole_sup%C3%A9rieure_de_chimie_physique_%C3%A9lectronique_de_Lyon)\n\n[CNSMD (Conservatoire national supérieur de musique et de danse de](https://en.wikipedia.org/wiki/Conservatoire_national_sup%C3%A9rieur_de_musique_et_de_danse_de_Lyon)\n\nLyon)\n\n[ECAM Lyon (École Catholique d'Arts et Métiers de Lyon);](https://en.wikipedia.org/wiki/%C3%89cole_Catholique_des_Arts_et_M%C3%A9tiers)\n\n[EPITECH;](https://en.wikipedia.org/wiki/EPITECH)\n\n[EPITA;](https://en.wikipedia.org/wiki/EPITA)\n\n[ENTPE (École Nationale des Travaux Publiques de l'État);](https://en.wikipedia.org/wiki/%C3%89cole_nationale_des_travaux_publics_de_l%27%C3%89tat)\n\n[École nationale vétérinaire de Lyon (ENVL);](https://en.wikipedia.org/wiki/%C3%89cole_nationale_v%C3%A9t%C3%A9rinaire_de_Lyon)\n\n[ESME-Sudria;](https://en.wikipedia.org/wiki/ESME-Sudria)\n\n[École des Beaux-Arts;](https://en.wikipedia.org/wiki/%C3%89cole_des_Beaux-Arts)\n\n[E-Artsup;](https://en.wikipedia.org/wiki/E-Artsup)\n\n[INSA Lyon (Institut National des Sciences Appliquées de Lyon);](https://en.wikipedia.org/wiki/Institut_national_des_sciences_appliqu%C3%A9es_de_Lyon)\n\n[Polytech Lyon;](https://en.wikipedia.org/wiki/%C3%89cole_polytechnique_universitaire_de_l%27universit%C3%A9_Lyon-I)\n\n[Institut supérieur européen de gestion group;](https://en.wikipedia.org/wiki/Institut_sup%C3%A9rieur_europ%C3%A9en_de_gestion_group)\n\n[ISARA (Institut Supérieur d'Agriculture Rhône Alpes);](https://en.wikipedia.org/wiki/Institut_sup%C3%A9rieur_d%27agriculture_Rh%C3%B4ne-Alpes)\n\n[Institution des Chartreux;](https://en.wikipedia.org/wiki/Institution_des_Chartreux)\n\n[Institut polytechnique des sciences avancées;](https://en.wikipedia.org/wiki/Institut_polytechnique_des_sciences_avanc%C3%A9es)\n\n[Université Claude Bernard (Lyon 1);](https://en.wikipedia.org/wiki/Claude_Bernard_University_Lyon_1)\n\n[Université Lumière (Lyon 2);](https://en.wikipedia.org/wiki/Lumi%C3%A8re_University_Lyon_2)\n\n[Université Jean Moulin (Lyon 3);](https://en.wikipedia.org/wiki/Jean_Moulin_University_Lyon_3)\n\n[IAE (Institut d'Administration des Entreprises de Lyon);](https://en.wikipedia.org/wiki/IAE_Jean_Moulin_University_Lyon_3)", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia4.pdf" - }, - { - "text": "| Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] |", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia4.pdf" - }, - { - "text": "| Coordinates: 45°46′N 4°50′E Lyon Lyon |\n|:---|\n| Country France Region Auvergne-Rhône-Alpes Metropolis Lyon Metropolis Arrondissement Lyon |\n| Subdivisions 9 arrondissements |\n| Government - Mayor (2020- 2026) Grégory Doucet [2] (EELV) |\n| Area 1 47.87 km 2 (18.48 sq mi) - Urban (2020 [3] ) 1,141.4 km 2 (440.7 sq mi) - Metro (2020 [4] ) 4,605.8 km 2 (1,778.3 sq mi) |\n\n**Population** (2022) <sup>[5]</sup> 520,774\n\n**- Rank** [3rd in France](https://en.wikipedia.org/wiki/List_of_communes_in_France_with_over_20,000_inhabitants)\n\n**- Density** 11,000/km <sup>2</sup>\n\n(28,000/sq mi)\n\n**[ - Urban](https://en.wikipedia.org/wiki/Urban_area)** (Jan.\n\n2021 <sup>[6]</sup> )\n\n1,702,921\n\n**- Urban density** 1,500/km <sup>2</sup> (3,900/sq mi)\n\n**[ - Metro](https://en.wikipedia.org/wiki/Metropolitan_area)** (Jan.\n\n2021 <sup>[7]</sup> )\n\n2,308,818\n\nThe name of the city has taken the forms *Lugdon* , *Luon* , and since the\n\n13th century, *Lyon* . The Gallic *Lugdun* or *Lugdunon* that was Latinized\n\n[in Roman as Lugdunum is composed of two words. The first may be the](https://en.wikipedia.org/wiki/Lugdunum)\n\n[name of the Celtic god Lug (in charge of order and law), or the derived](https://en.wikipedia.org/wiki/Lugh)\n\nword *lugon* , meaning \"crow\" (the crow being the messenger of Lug), but\n\nmight also be another word *lug* , meaning \"light\". The second is *dunos*\n\n[('fortress', 'hill'). The name thus may designate the hill of Fourvière, on](https://en.wikipedia.org/wiki/Fourvi%C3%A8re)\n\nwhich the ancient city of Lyon is founded, but could mean \"hill of the\n\ngod Lug\", \"hill of the crows\" or \"shining hill\". <sup>[21]</sup> <sup>[22]</sup>\n\n[Alternatively Julius Pokorny associates the first part of the word with](https://en.wikipedia.org/wiki/Julius_Pokorny)\n\nthe Indo-European radical * *lūg* ('dark, black, swamp'), the basis of the\n\n[toponyms Ludza in Latvia, Lusatia in Germany (from Sorbian ](https://en.wikipedia.org/wiki/Sorbian_language) *Łužica* ),\n\nand several places in the Czech Republic named Lužice; <sup>[23]</sup> it could then\n\n[also be compared to Luze in Franche-Comté and various hydronyms](https://en.wikipedia.org/wiki/Luze,_Haute-Sa%C3%B4ne)\n\n[such as Louge.](https://en.wikipedia.org/wiki/Louge)\n\nFurther down, in the current Saint-Vincent district, was the Gallic\n\nvillage of Condate, probably a simple hamlet of sailors or fishermen\n\nliving on the banks of the Saône. *Condate* is a Gallic word meaning\n\n\"confluence\", from which the Confluence district gets its name.\n\n[In Roman times the city was called ](https://en.wikipedia.org/wiki/History_of_Lyon#Antiquity) *Caput Galliæ* , meaning \"capital of\n\n[the Gauls\". As an homage to this title, the Archbishop of Lyon is still](https://en.wikipedia.org/wiki/Roman_Catholic_Archdiocese_of_Lyon)\n\ncalled the Primate of Gaul.\n\nDuring the revolutionary period, Lyon was renamed *Commune-*\n\n*Affranchie* [ (\"Emancipated Commune\") on 12 October 1793 by a decree](https://en.wikipedia.org/wiki/Commune_(France))\n\n[of the Convention Nationale. It resumed its name in 1794, after the end](https://en.wikipedia.org/wiki/National_Convention)\n\n[of the Terror.](https://en.wikipedia.org/wiki/Reign_of_Terror)\n\nLyon is called *Liyon* [ in Franco-Provençal.](https://en.wikipedia.org/wiki/Franco-Proven%C3%A7al) <sup>[24]</sup>\n\n[According to the historian Dio Cassius, in 43 BC, the Roman Senate](https://en.wikipedia.org/wiki/Roman_Senate)\n\nordered the creation of a settlement for Roman refugees of war with the\n\n[Allobroges. These refugees had been expelled from Vienne and were](https://en.wikipedia.org/wiki/Vienne,_Isere)\n\n[now encamped at the confluence of the Saône and Rhône rivers. The](https://en.wikipedia.org/wiki/Rh%C3%B4ne)\n\nfoundation was built on Fourvière hill and officially called *Colonia*\n\n*Copia Felix Munatia* , a name invoking prosperity and the blessing of the\n\ngods. The city became increasingly referred to as *Lugdunum* (and", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Lyon 3: Berges du Rhône campus\n\n[Lyon 2: Berges du Rhône campus](https://en.wikipedia.org/wiki/Lumi%C3%A8re_University_Lyon_2)\n\n[IPSA Lyon Campus](https://en.wikipedia.org/wiki/Institut_polytechnique_des_sciences_avanc%C3%A9es)\n\n[Platform I, Lyon-Part-Dieu train](https://en.wikipedia.org/wiki/Lyon-Part-Dieu)\n\nstation\n\nT1 tramway on the Raymond Barre\n\nbridge\n\nBellecour, Écoles D'Arts.\n\nThere are some international private schools in the Lyon area, including:\n\n[Cité Scolaire Internationale de Lyon or the Lycée de Gerland;](https://en.wikipedia.org/wiki/Cit%C3%A9_Scolaire_Internationale_de_Lyon)\n\nIncludes the *Section Japonaises* ( リヨン・ジェルラン補習授業校 *Riyon Jeruran Hoshū Jugyō Kō* \"Lyon Gerland Japanese\n\n[Supplementary School\"), which the Japanese Ministry of Education](https://en.wikipedia.org/wiki/Japanese_Ministry_of_Education)\n\n[(MEXT) counts as a part-time Japanese supplementary school](https://en.wikipedia.org/wiki/Hoshuko) <sup>[73]</sup>\n\nOmbrosa;\n\n[International School of Lyon in nearby Sainte-Foy-lès-Lyon;](https://en.wikipedia.org/wiki/Sainte-Foy-l%C3%A8s-Lyon)\n\nMontessori School of Lyon.\n\nOther Japanese supplementary schools:\n\nThe *Association Pour le Développement de la Langue et de la Culture* *Japonaises* (ADLCJ; リヨン補習授業校 *Riyon Hoshū Jugyō Kō* ) is held in the *Maison Berty Albrecht* in Villeurbanne, near Lyon. <sup>[73]</sup> It was formed in\n\n1987. <sup>[74]</sup> It serves Japanese expatriate children who wish to continue their\n\nJapanese education whilst abroad.\n\n[Lyon- Saint-Exupéry Airport, located east of Lyon, serves as a base for domestic and](https://en.wikipedia.org/wiki/Lyon%E2%80%93Saint-Exup%C3%A9ry_Airport)\n\ninternational flights. It is a key transport facility for the entire Rhône-Alpes region,\n\nwith coach links to other cities in the area. The in-house train station Gare de Lyon\n\n[Saint-Exupéry connects the airport to the nationwide TGV network. The Rhônexpress](https://en.wikipedia.org/wiki/Rh%C3%B4nexpress)\n\n[tram monopoly links the airport with the business quarter of La Part Dieu in less than](https://en.wikipedia.org/wiki/Rh%C3%B4nexpress)\n\n30 minutes, and offers connections with Underground A & B, Tramway T1, T3 & T4,\n\nand bus lines. Lyon public transport Sytral offers a bus service, Route 47, that links\n\nthe airport to Meyzieu <sup>[75]</sup> where passengers can change onto Tram T3. The regular\n\nprice of public transport is €1.90, as opposed to €15 one way for the Rhonexpress. In\n\n[the suburb of Bron, the smaller Lyon-Bron Airport provides an alternative for](https://en.wikipedia.org/wiki/Lyon-Bron_Airport)\n\ndomestic aviation.\n\nLyon has two major railway stations: Lyon-Part-Dieu, which was built to\n\n[accommodate the TGV, and Lyon Perrache, an older station that now provides mostly](https://en.wikipedia.org/wiki/Gare_de_Lyon-Perrache)\n\n[regional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul](https://en.wikipedia.org/wiki/Gare_de_Lyon-Saint-Paul)\n\n[and Jean Macé. Lyon was the first city to be connected to Paris by the TGV in](https://en.wikipedia.org/wiki/Gare_de_Lyon-Jean_Mac%C3%A9)\n\n1981. <sup>[76]</sup> Since that time the TGV train network has expanded and links Lyon directly\n\nto Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International\n\ntrains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt,\n\nLuxembourg, Brussels and London.\n\nThe city is at the heart of a dense road network and is located at the meeting point of\n\n[several highways: A6 to Paris, A7 Marseille, A42 to Geneva, and A43 to Grenoble.](https://en.wikipedia.org/wiki/Grenoble)\n\n[The city is now bypassed by the A46. A double motorway tunnel passes under](https://en.wikipedia.org/wiki/A46_autoroute)\n\nFourvière, connecting the A6 and the A7 autoroutes, both forming the \"Autoroute du\n\nSoleil\".\n\n#### **Primary and secondary schools**\n\n#### **Supplementary education**\n\n### **Transport**", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia4.pdf" - }, - { - "text": "31. Braudel 1984 p. 327\n\n[32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde](https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[Lyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01](https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011](http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[50.htm) on 19 January 2011. Retrieved 3 April 2011.](http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli](https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1)\n\n[sh_1). ](https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) *Chrd.lyon.fr* [. 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1)](http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1)\n\non 24 January 2011. Retrieved 21 December 2017.\n\n[34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal.](http://www.digitaljournal.com/article/273644)\n\n[com/article/273644). ](http://www.digitaljournal.com/article/273644) *Digitaljournal.com* .\n\n35. (in French) Georges Duby (ed), *Histoire de la France : Dynasties et révolutions, de 1348 à 1852* (vol. 2),\n\n[Larousse, 1999 p. 53 ISBN 2-03-505047-2](https://en.wikipedia.org/wiki/Special:BookSources/2-03-505047-2)\n\n[36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g](http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/getting-around/local-transport)\n\n[etting-around/local-transport). Lonely Planet. Retrieved 2 February 2017.](https://en.wikipedia.org/wiki/Lonely_Planet)\n\n[37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/). ](https://whc.unesco.org/en/list/872/) *unesco.org* . UNESCO World Heritage Centre.\n\nRetrieved 31 July 2015.\n\n[38. Gregory, Stanley. “Climatic Classification and Climatic Change (Klimaklassifikation Und Klimaänderung) (http](https://www.jstor.org/stable/25636095)\n\n[s://www.jstor.org/stable/25636095).” ](https://www.jstor.org/stable/25636095) *Erdkunde* , vol. 8, no. 4, 1954, pp. 246- 252. *[JSTOR.](https://en.wikipedia.org/wiki/JSTOR)*\n\n[39. \"Données climatiques de la station de Lyon: Relevés de 2016 - Lyon\" (https://web.archive.org/web/20161004](https://web.archive.org/web/20161004055201/http://www.meteofrance.com/climat/france/lyon/69029001/releves)\n\n[055201/http://www.meteofrance.com/climat/france/lyon/69029001/releves) (in French). Meteo France.](https://web.archive.org/web/20161004055201/http://www.meteofrance.com/climat/france/lyon/69029001/releves)\n\n[Archived from the original (http://www.meteofrance.com/climat/france/lyon/69029001/releves) on 4 October](http://www.meteofrance.com/climat/france/lyon/69029001/releves)\n\n2016. Retrieved 2 October 2016.\n\n[40. \"Lyon-Bron (69)\" (https://donneespubliques.meteofrance.fr/FichesClim/FICHECLIM_69029001.pdf) (PDF).](https://donneespubliques.meteofrance.fr/FichesClim/FICHECLIM_69029001.pdf)\n\n*Fiche Climatologique: Statistiques 1991- 2020 et records* (in French). Meteo France. Retrieved 14 July 2022.\n\n[41. \"Température et records en Août pour Lyon\" (https://www.meteo-lyon.net/records/mois/aout). ](https://www.meteo-lyon.net/records/mois/aout) *meteo-lyon.net*\n\n(in French). Météo Villes. Retrieved 7 September 2023.\n\n[42. \"Lyon- Bron (07480) - WMO Weather Station\" (ftp://ftp.atdd.noaa.gov/pub/GCOS/WMO-Normals/TABLES/RE](ftp://ftp.atdd.noaa.gov/pub/GCOS/WMO-Normals/TABLES/REG_VI/FR/07480.TXT)", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia4.pdf" - }, - { - "text": "| Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present | Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991- 2020 normals, extremes 1920- present |\n|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|\n| Month | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec | Year |\n| Record high °C (°F) | 19.1 (66.4) | 21.9 (71.4) | 26.0 (78.8) | 30.1 (86.2) | 34.2 (93.6) | 38.4 (101.1) | 40.4 (104.7) | 41.4 (106.5) | 35.8 (96.4) | 28.4 (83.1) | 23.0 (73.4) | 20.2 (68.4) | 41.4 (106.5) |\n| Mean daily maximum °C (°F) | 7.1 (44.8) | 9.0 (48.2) | 13.8 (56.8) | 17.4 (63.3) | 21.5 (70.7) | 25.6 (78.1) | 28.2 (82.8) | 28.0 (82.4) | 23.1 (73.6) | 17.7 (63.9) | 11.4 (52.5) | 7.7 (45.9) | 17.5 (63.5) |\n| Daily mean °C (°F) | 4.1 (39.4) | 5.2 (41.4) | 9.0 (48.2) | 12.3 (54.1) | 16.3 (61.3) | 20.3 (68.5) | 22.6 (72.7) | 22.3 (72.1) | 17.9 (64.2) | 13.7 (56.7) | 8.1 (46.6) | 4.8 (40.6) | 13.0 (55.4) |\n| Mean daily minimum °C (°F) | 1.1 (34.0) | 1.4 (34.5) | 4.2 (39.6) | 7.2 (45.0) | 11.2 (52.2) | 15.0 (59.0) | 17.0 (62.6) | 16.6 (61.9) | 12.8 (55.0) | 9.6 (49.3) | 4.9 (40.8) | 2.0 (35.6) | 8.6 (47.5) |\n| Record low °C (°F) | −23.0 (−9.4) | −22.5 (−8.5) | −10.5 (13.1) | −4.4 (24.1) | −3.8 (25.2) | 2.3 (36.1) | 6.1 (43.0) | 4.6 (40.3) | 0.2 (32.4) | −4.5 (23.9) | −9.4 (15.1) | −24.6 (−12.3) | −24.6 (−12.3) |\n| Average precipitation mm (inches) | 49.8 (1.96) | 41.6 (1.64) | 49.4 (1.94) | 68.9 (2.71) | 80.9 (3.19) | 74.1 (2.92) | 67.4 (2.65) | 65.5 (2.58) | 82.5 (3.25) | 99.8 (3.93) | 87.2 (3.43) | 53.7 (2.11) | 820.8 (32.31) |\n| Average precipitation days (≥ 1.0 mm) | 8.1 | 7.9 | 8.4 | 9.0 | 10.3 | 8.5 | 7.5 | 7.2 | 7.3 | 9.9 | 9.4 | 9.2 | 102.8 |\n| Mean monthly sunshine hours | 71.1 | 102.4 | 173.7 | 197.7 | 223.8 | 256.5 | 288.1 | 263.1 | 204.1 | 131.4 | 78.9 | 58.7 | 2,049.5 |\n| Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] | Source 1: Meteo France [40] |", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia4.pdf" - }, - { - "text": "| Lyon Liyon (Arpitan) |\n|:---|\n| Prefecture and commune |\n| Skyline of Lyon in La Part-Dieu Basilica of Notre- Dame de Fourvière Place des Terreaux with the Fontaine Bartholdi Parc de la Tête d'or Confluence District Vieux Lyon Pont Lafayette |\n| Flag Coat of arms |\n\nMotto(s): *Avant, avant, Lion le melhor*\n\n[(old Franco-Provençal for \"Forward, forward,](https://en.wikipedia.org/wiki/Franco-Proven%C3%A7al_language)\n\nLyon the best\") <sup>[a]</sup>\n\n*Virtute duce, comite fortuna*\n\n(\"With virtue as guide and fortune as\n\ncompanion\") <sup>[b]</sup>\n\n**Location of Lyon**\n\n## **Lyon**\n\n**Lyon** <sup>[c]</sup> [ (Franco-Provençal: ](https://en.wikipedia.org/wiki/Franco-Proven%C3%A7al) *Liyon* [) is the second-largest city in France](https://en.wikipedia.org/wiki/France)\n\nby urban area and the third largest by city limits. <sup>[14]</sup> It is located at the\n\n[confluence of the rivers Rhône and Saône, to the northwest of the](https://en.wikipedia.org/wiki/Sa%C3%B4ne)\n\n[French Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north](https://en.wikipedia.org/wiki/Paris)\n\n[of Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km](https://en.wikipedia.org/wiki/Geneva)\n\n[(36 mi) northeast of Saint-Étienne.](https://en.wikipedia.org/wiki/Saint-%C3%89tienne)\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census\n\nwithin its small municipal territory of 48 km <sup>2</sup> (19 sq mi), <sup>[15]</sup> but\n\n[together with its suburbs and exurbs the Lyon metropolitan area had a](https://en.wikipedia.org/wiki/Functional_area_(France))\n\npopulation of 2,308,818 that same year, <sup>[7]</sup> the second most populated in\n\nFrance. Lyon and 58 suburban municipalities have formed since 2015\n\n[the Metropolis of Lyon, a directly elected metropolitan authority now in](https://en.wikipedia.org/wiki/Lyon_Metropolis)\n\ncharge of most urban issues, with a population of 1,424,069 in 2021. <sup>[16]</sup>\n\n[Lyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of](https://en.wikipedia.org/wiki/Regions_of_France)\n\n[the Departmental Council of Rhône (whose jurisdiction, however, no](https://en.wikipedia.org/wiki/Rh%C3%B4ne_(department))\n\nlonger extends over the Metropolis of Lyon since 2015).\n\n[The capital of the Gauls during the Roman Empire, Lyon is the seat of](https://en.wikipedia.org/wiki/Roman_Empire)\n\n[an archbishopric whose holder bears the title of Primate of the Gauls.](https://en.wikipedia.org/wiki/Roman_Catholic_Archdiocese_of_Lyon)\n\n[Lyon became a major economic hub during the Renaissance. The city is](https://en.wikipedia.org/wiki/French_Renaissance)\n\n[recognised for its cuisine and gastronomy, as well as historical and](https://en.wikipedia.org/wiki/Gastronomy)\n\n[architectural landmarks; as such, the districts of Old Lyon, the Fourvière](https://en.wikipedia.org/wiki/Fourvi%C3%A8re)\n\n[hill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on](https://en.wikipedia.org/wiki/La_Croix-Rousse)\n\n[the UNESCO World Heritage List. Lyon was historically an important](https://en.wikipedia.org/wiki/World_Heritage_Site)\n\narea for the production and weaving of silk. Lyon played a significant\n\n[role in the history of cinema since Auguste and Louis Lumière invented](https://en.wikipedia.org/wiki/Auguste_and_Louis_Lumi%C3%A8re)\n\n[the cinematograph there. The city is also known for its light festival, the](https://en.wikipedia.org/wiki/Cinematograph)\n\n[Fête des lumières, which begins every 8 December and lasts for four](https://en.wikipedia.org/wiki/Festival_of_Lights_(Lyon))\n\ndays, earning Lyon the title of \"Capital of Lights\".\n\n[Economically, Lyon is a major centre for banking, chemical,](https://en.wikipedia.org/wiki/Chemical)\n\n[pharmaceutical and biotech industries. The city contains a significant](https://en.wikipedia.org/wiki/Biotechnology)\n\nsoftware industry with a particular focus on video games; in recent years", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[54. Perret, Aurelie. \"Les traboules de Lyon\" (http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les](http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les-traboules-de-lyon.html)\n\n[-traboules-de-lyon.html). ](http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les-traboules-de-lyon.html) *histoire-pour-tous.fr* . SF Webmedia. Retrieved 31 July 2015.\n\n55. Curnonsky, Marcel E. Grancher (1935). *Lyon, capitale mondiale de la gastronomie* [ (https://books.google.com/](https://books.google.com/books?id=D481HQAACAAJ&q=curnonsky+lyon)\n\n[books?id=D481HQAACAAJ&q=curnonsky+lyon). Editions Lugdunum. Retrieved 30 July 2015.](https://books.google.com/books?id=D481HQAACAAJ&q=curnonsky+lyon)\n\n[56. Buford, Bill (12 February 2011). \"Why Lyon is food capital of the world\" (https://www.theguardian.com/travel/2](https://www.theguardian.com/travel/2011/feb/13/bill-buford-lyon-food-capital)\n\n[011/feb/13/bill-buford-lyon-food-capital). ](https://www.theguardian.com/travel/2011/feb/13/bill-buford-lyon-food-capital) *The Guardian* . Retrieved 11 December 2014.\n\n[57. \"Priay Il y a 80 ans \" La mère Bourgeois \" obtenait 3 étoiles\" (http://www.leprogres.fr/ain/2013/01/09/priay-il-y-](http://www.leprogres.fr/ain/2013/01/09/priay-il-y-a-80-ans-la-mere-bourgeois-obtenait-3-etoiles)\n\n[a-80-ans-la-mere-bourgeois-obtenait-3-etoiles). ](http://www.leprogres.fr/ain/2013/01/09/priay-il-y-a-80-ans-la-mere-bourgeois-obtenait-3-etoiles) *leprogres.fr* . Le Progres. Retrieved 30 July 2015.\n\n[58. \"Histoire de la gastronomie 2/4\" (https://archive.today/20120605042553/http://www.franceculture.fr/emission-l](https://archive.today/20120605042553/http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html)\n\n[a-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html). ](https://archive.today/20120605042553/http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html) *franceculture.fr* . Radio France.\n\n[Archived from the original (http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastron](http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html)\n\n[omie-24-2010-11-23.html) on 5 June 2012. Retrieved 30 July 2015.](http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html)\n\n[59. Gaudry, François-Régis (26 September 2014). \"Paul Bocuse: derniers secrets du \"pape\" de la gastronomie](http://www.lexpress.fr/styles/saveurs/paul-bocuse-derniers-secrets_1578426.html)\n\n[française\" (http://www.lexpress.fr/styles/saveurs/paul-bocuse-derniers-secrets_1578426.html). ](http://www.lexpress.fr/styles/saveurs/paul-bocuse-derniers-secrets_1578426.html) *lexpress.fr* .\n\nGroupe Express-Roularta. Retrieved 30 July 2015.\n\n[60. \"Cuisine et boissons Lyon et ses environs\" (http://www.routard.com/guide/lyon/372/cuisine_et_boissons.htm).](http://www.routard.com/guide/lyon/372/cuisine_et_boissons.htm)\n\n*routard.com* . Cyberterre / Hachette tourisme. Retrieved 30 July 2015.\n\n[61. Bassets, Marc (20 June 2023). \"The secret of the taco: modern, multicultural France's fast food phenomenon\"](https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-phenomenon.html)\n\n[(https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-p](https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-phenomenon.html)\n\n[henomenon.html). ](https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-phenomenon.html) *El País* . Retrieved 13 August 2024.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia4.pdf" - }, - { - "text": "| Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes |\n|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|\n| Month | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec | Year |\n| Record high °C (°F) | 16.3 (61.3) | 21.4 (70.5) | 25.7 (78.3) | 28.0 (82.4) | 29.4 (84.9) | 34.4 (93.9) | 39.8 (103.6) | 37.1 (98.8) | 33.8 (92.8) | 28.4 (83.1) | 22.6 (72.7) | 20.2 (68.4) | 39.8 (103.6) |\n| Mean maximum °C (°F) | 10.2 (50.4) | 14.4 (57.9) | 15.9 (60.6) | 18.6 (65.5) | 23.1 (73.6) | 28.8 (83.8) | 32.8 (91.0) | 28.1 (82.6) | 27.3 (81.1) | 19.7 (67.5) | 14.1 (57.4) | 9.5 (49.1) | 32.8 (91.0) |\n| Mean daily maximum °C (°F) | 6.1 (43.0) | 8.2 (46.8) | 11.6 (52.9) | 15.2 (59.4) | 19.1 (66.4) | 22.9 (73.2) | 26.1 (79.0) | 26.0 (78.8) | 22.4 (72.3) | 17.1 (62.8) | 10.0 (50.0) | 6.4 (43.5) | 15.9 (60.7) |\n| Daily mean °C (°F) | 3.0 (37.4) | 4.9 (40.8) | 7.4 (45.3) | 10.2 (50.4) | 14.0 (57.2) | 17.6 (63.7) | 20.6 (69.1) | 20.0 (68.0) | 17.1 (62.8) | 12.7 (54.9) | 6.7 (44.1) | 3.9 (39.0) | 11.5 (52.7) |\n| Mean daily minimum °C (°F) | 0.2 (32.4) | 1.4 (34.5) | 2.9 (37.2) | 5.2 (41.4) | 9.1 (48.4) | 12.5 (54.5) | 14.8 (58.6) | 14.4 (57.9) | 11.7 (53.1) | 8.3 (46.9) | 3.5 (38.3) | 0.7 (33.3) | 7.1 (44.7) |\n| Mean minimum °C (°F) | −7.0 (19.4) | −4.7 (23.5) | −1.4 (29.5) | 3.2 (37.8) | 7.6 (45.7) | 10.9 (51.6) | 13.1 (55.6) | 12.9 (55.2) | 8.1 (46.6) | 4.5 (40.1) | 1.0 (33.8) | −4.7 (23.5) | −7.0 (19.4) |\n| Record low °C (°F) | −23.0 (−9.4) | −19.3 (−2.7) | −10.5 (13.1) | −3.2 (26.2) | −0.3 (31.5) | 3.6 (38.5) | 6.1 (43.0) | 5.2 (41.4) | 1.9 (35.4) | −3.2 (26.2) | −7.1 (19.2) | −16.0 (3.2) | −23.0 (−9.4) |\n| Average precipitation mm (inches) | 54.0 (2.13) | 53.8 (2.12) | 72.2 (2.84) | 56.1 (2.21) | 72.6 (2.86) | 73.2 (2.88) | 54.5 (2.15) | 71.6 (2.82) | 53.2 (2.09) | 56.2 (2.21) | 68.0 (2.68) | 55.8 (2.20) | 741.2 (29.19) |\n| Average precipitation days (≥ 1.0 mm) | 10.4 | 9.3 | 9.7 | 9.6 | 10.9 | 8.2 | 6.8 | 8.2 | 7.3 | 8.5 | 8.9 | 9.8 | 107.6 |\n| Average snowy days | 5.5 | 3.9 | 2.5 | 1.1 | 0.0 | 0.0 | 0.0 | 0.0 | 0.0 | 0.0 | 2.0 | 4.6 | 19.6 |\n| Average relative humidity (%) | 84 | 80 | 74 | 71 | 72 | 70 | 65 | 70 | 76 | 82 | 84 | 86 | 76 |\n| Mean monthly sunshine hours | 62.6 | 89.8 | 147.5 | 184.2 | 215.9 | 250.9 | 292.6 | 259.0 | 208.1 | 134.3 | 75.3 | 55.4 | 1,975.6 |\n| Percent possible sunshine | 23 | 31 | 41 | 46 | 47 | 54 | 62 | 60 | 56 | 40 | 27 | 21 | 42 |", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[Map of the Metropolis of](https://en.wikipedia.org/wiki/Metropolis_of_Lyon)\n\n[Lyon and its 59](https://en.wikipedia.org/wiki/Metropolis_of_Lyon)\n\ncommunes (the\n\ncommune of Lyon is in\n\nred)\n\n| Mayor | Term start | Term end | | Party |\n|:---|:---|:---|:---|:---|\n| Antoine Gailleton | 1881 | 1900 | | |\n| Victor Augagneur | 1900 | 30 October 1905 | | PRS |\n| Édouard Herriot | 30 October 1905 | 20 September 1940 | | Radical |\n| Georges Cohendy | 20 September 1940 | 1941 | | Nominated and dismissed by Vichy |\n| Georges Villiers | 1941 | 1942 | | Nominated and dismissed by Vichy |\n| Pierre-Louis-André Bertrand | 1942 | 1944 | | Nominated by Vichy |\n| Justin Godart | 1944 | 18 May 1945 | | Radical |\n| Édouard Herriot | 18 May 1945 | 26 March 1957 | | Radical |\n| Pierre Montel, ad interim | 26 March 1957 | 14 April 1957 | | Radical |\n| Louis Pradel | 14 April 1957 | 27 November 1976 | | DVD |\n| Armand Tapernoux, ad interim | 27 November 1976 | 5 December 1976 | | DVD |\n| Francisque Collomb | 5 December 1976 | 24 March 1989 | | DVD |\n| Michel Noir | 24 March 1989 | 25 June 1995 | | RPR |\n| Raymond Barre | 25 June 1995 | 25 March 2001 | | DVD |\n| Gérard Collomb | 25 March 2001 | 17 July 2017 | | PS |\n| Georges Képénékian | 17 July 2017 | 5 November 2018 | | LREM |\n| Gérard Collomb | 5 November 2018 | 4 July 2020 | | LREM |\n| Grégory Doucet | 4 July 2020 | Incumbent | | EELV |\n\nSince 2015, the commune of Lyon (48 km <sup>2</sup> (19 sq mi) in land area) and 58 suburban communes\n\nhave formed the Metropolis of Lyon (534 km <sup>2</sup> (206 sq mi) in land area), a directly elected\n\nmetropolitan authority now in charge of most urban issues. The Metropolis of Lyon is the only\n\n[metropolitan authority in France which is a territorial collectivity, on par with French communes](https://en.wikipedia.org/wiki/Territorial_collectivity)\n\n[and departments. Its metropolitan council was for the first time directly elected by universal](https://en.wikipedia.org/wiki/Universal_suffrage)\n\n[suffrage in 2020 within 14 electoral wards, the only directly elected metropolitan council in](https://en.wikipedia.org/wiki/Universal_suffrage)\n\nFrance.\n\nThe 14 electoral wards are the following (see map for location):\n\nLônes et coteaux\n\nLyon-Centre (Lyon-Centre)\n\nLyon-Est (Lyon-East)\n\nLyon-Nord (Lyon-North)\n\nLyon-Ouest\n\nLyon-Sud\n\nLyon-Sud-Est\n\nOuest\n\nPlateau Nord-Caluire\n\nPorte des Alpes\n\nPortes du Sud\n\nRhône Amont\n\nVal de Saône\n\nVilleurbanne\n\n[The six wards with names starting with \"Lyon\" are all located within the commune of Lyon. The Villeurbanne ward is](https://en.wikipedia.org/wiki/Villeurbanne)\n\ncoterminous with the namesake commune. All other seven wards each group various suburban communes.\n\n#### **Metropolis**", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia4.pdf", - "query": "What is the climate in Lyon ?", - "target_page": 5, - "target_passage": " Lyon has a humid subtropical climate ( Köppen: Cfa), bordering an oceanic climate (Köppen: Cfb, Trewartha: Do).", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "Foreign-born population in Lyon by\n\ncountry of birth <sup>[72]</sup>\n\n| Country of birth | Population (2020) |\n|:---|:---|\n| Algeria | 14,779 |\n| Morocco | 5,245 |\n| Tunisia | 4,879 |\n| Italy | 3,351 |\n| Portugal | 3,068 |\n| Spain | 2,064 |\n| DR Congo | 1,520 |\n| China | 1,429 |\n| Cameroon | 1,364 |\n| Senegal | 1,198 |\n\n[ENS Lyon: René Descartes](https://en.wikipedia.org/wiki/ENS_Lyon)\n\ncampus\n\n[Lyon 3: Manufacture des Tabacs](https://en.wikipedia.org/wiki/Jean_Moulin_University)\n\ncampus\n\nAll figures come from population censuses. Figures from 1911 to 1936 (incl.) are computed using the redressed figures for the\n\n[commune of Lyon calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at](https://en.wikipedia.org/wiki/INSEE)\n\nthe time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and\n\nremain the 2nd largest city of France ahead of Marseille). <sup>[68]</sup> The 1906 figure is computed using the figure for the commune of\n\nLyon published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate\n\nwas smaller than 10,000.\n\nSource: EHESS <sup>[70]</sup> and INSEE <sup>[71]</sup>\n\n[École Centrale de Lyon;](https://en.wikipedia.org/wiki/%C3%89cole_centrale_de_Lyon)\n\n[École Normale Supérieure de Lyon](https://en.wikipedia.org/wiki/%C3%89cole_Normale_Sup%C3%A9rieure_de_Lyon)\n\n[EM Lyon (École de Management de Lyon);](https://en.wikipedia.org/wiki/%C3%89cole_de_management_de_Lyon)\n\nECE Lyon (École de Commerce Européenne de Lyon);\n\n[Institut d'études politiques de Lyon (Sciences Po Lyon);](https://en.wikipedia.org/wiki/Institut_d%27%C3%A9tudes_politiques_de_Lyon)\n\n[CPE Lyon;](https://en.wikipedia.org/wiki/%C3%89cole_sup%C3%A9rieure_de_chimie_physique_%C3%A9lectronique_de_Lyon)\n\n[CNSMD (Conservatoire national supérieur de musique et de danse de](https://en.wikipedia.org/wiki/Conservatoire_national_sup%C3%A9rieur_de_musique_et_de_danse_de_Lyon)\n\nLyon)\n\n[ECAM Lyon (École Catholique d'Arts et Métiers de Lyon);](https://en.wikipedia.org/wiki/%C3%89cole_Catholique_des_Arts_et_M%C3%A9tiers)\n\n[EPITECH;](https://en.wikipedia.org/wiki/EPITECH)\n\n[EPITA;](https://en.wikipedia.org/wiki/EPITA)\n\n[ENTPE (École Nationale des Travaux Publiques de l'État);](https://en.wikipedia.org/wiki/%C3%89cole_nationale_des_travaux_publics_de_l%27%C3%89tat)\n\n[École nationale vétérinaire de Lyon (ENVL);](https://en.wikipedia.org/wiki/%C3%89cole_nationale_v%C3%A9t%C3%A9rinaire_de_Lyon)\n\n[ESME-Sudria;](https://en.wikipedia.org/wiki/ESME-Sudria)\n\n[École des Beaux-Arts;](https://en.wikipedia.org/wiki/%C3%89cole_des_Beaux-Arts)\n\n[E-Artsup;](https://en.wikipedia.org/wiki/E-Artsup)\n\n[INSA Lyon (Institut National des Sciences Appliquées de Lyon);](https://en.wikipedia.org/wiki/Institut_national_des_sciences_appliqu%C3%A9es_de_Lyon)\n\n[Polytech Lyon;](https://en.wikipedia.org/wiki/%C3%89cole_polytechnique_universitaire_de_l%27universit%C3%A9_Lyon-I)\n\n[Institut supérieur européen de gestion group;](https://en.wikipedia.org/wiki/Institut_sup%C3%A9rieur_europ%C3%A9en_de_gestion_group)\n\n[ISARA (Institut Supérieur d'Agriculture Rhône Alpes);](https://en.wikipedia.org/wiki/Institut_sup%C3%A9rieur_d%27agriculture_Rh%C3%B4ne-Alpes)\n\n[Institution des Chartreux;](https://en.wikipedia.org/wiki/Institution_des_Chartreux)\n\n[Institut polytechnique des sciences avancées;](https://en.wikipedia.org/wiki/Institut_polytechnique_des_sciences_avanc%C3%A9es)\n\n[Université Claude Bernard (Lyon 1);](https://en.wikipedia.org/wiki/Claude_Bernard_University_Lyon_1)\n\n[Université Lumière (Lyon 2);](https://en.wikipedia.org/wiki/Lumi%C3%A8re_University_Lyon_2)\n\n[Université Jean Moulin (Lyon 3);](https://en.wikipedia.org/wiki/Jean_Moulin_University_Lyon_3)\n\n[IAE (Institut d'Administration des Entreprises de Lyon);](https://en.wikipedia.org/wiki/IAE_Jean_Moulin_University_Lyon_3)", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia4.pdf" - }, - { - "text": "| Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] | Source 2: Meteo Lyon [41] |", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Lyon 3: Berges du Rhône campus\n\n[Lyon 2: Berges du Rhône campus](https://en.wikipedia.org/wiki/Lumi%C3%A8re_University_Lyon_2)\n\n[IPSA Lyon Campus](https://en.wikipedia.org/wiki/Institut_polytechnique_des_sciences_avanc%C3%A9es)\n\n[Platform I, Lyon-Part-Dieu train](https://en.wikipedia.org/wiki/Lyon-Part-Dieu)\n\nstation\n\nT1 tramway on the Raymond Barre\n\nbridge\n\nBellecour, Écoles D'Arts.\n\nThere are some international private schools in the Lyon area, including:\n\n[Cité Scolaire Internationale de Lyon or the Lycée de Gerland;](https://en.wikipedia.org/wiki/Cit%C3%A9_Scolaire_Internationale_de_Lyon)\n\nIncludes the *Section Japonaises* ( リヨン・ジェルラン補習授業校 *Riyon Jeruran Hoshū Jugyō Kō* \"Lyon Gerland Japanese\n\n[Supplementary School\"), which the Japanese Ministry of Education](https://en.wikipedia.org/wiki/Japanese_Ministry_of_Education)\n\n[(MEXT) counts as a part-time Japanese supplementary school](https://en.wikipedia.org/wiki/Hoshuko) <sup>[73]</sup>\n\nOmbrosa;\n\n[International School of Lyon in nearby Sainte-Foy-lès-Lyon;](https://en.wikipedia.org/wiki/Sainte-Foy-l%C3%A8s-Lyon)\n\nMontessori School of Lyon.\n\nOther Japanese supplementary schools:\n\nThe *Association Pour le Développement de la Langue et de la Culture* *Japonaises* (ADLCJ; リヨン補習授業校 *Riyon Hoshū Jugyō Kō* ) is held in the *Maison Berty Albrecht* in Villeurbanne, near Lyon. <sup>[73]</sup> It was formed in\n\n1987. <sup>[74]</sup> It serves Japanese expatriate children who wish to continue their\n\nJapanese education whilst abroad.\n\n[Lyon- Saint-Exupéry Airport, located east of Lyon, serves as a base for domestic and](https://en.wikipedia.org/wiki/Lyon%E2%80%93Saint-Exup%C3%A9ry_Airport)\n\ninternational flights. It is a key transport facility for the entire Rhône-Alpes region,\n\nwith coach links to other cities in the area. The in-house train station Gare de Lyon\n\n[Saint-Exupéry connects the airport to the nationwide TGV network. The Rhônexpress](https://en.wikipedia.org/wiki/Rh%C3%B4nexpress)\n\n[tram monopoly links the airport with the business quarter of La Part Dieu in less than](https://en.wikipedia.org/wiki/Rh%C3%B4nexpress)\n\n30 minutes, and offers connections with Underground A & B, Tramway T1, T3 & T4,\n\nand bus lines. Lyon public transport Sytral offers a bus service, Route 47, that links\n\nthe airport to Meyzieu <sup>[75]</sup> where passengers can change onto Tram T3. The regular\n\nprice of public transport is €1.90, as opposed to €15 one way for the Rhonexpress. In\n\n[the suburb of Bron, the smaller Lyon-Bron Airport provides an alternative for](https://en.wikipedia.org/wiki/Lyon-Bron_Airport)\n\ndomestic aviation.\n\nLyon has two major railway stations: Lyon-Part-Dieu, which was built to\n\n[accommodate the TGV, and Lyon Perrache, an older station that now provides mostly](https://en.wikipedia.org/wiki/Gare_de_Lyon-Perrache)\n\n[regional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul](https://en.wikipedia.org/wiki/Gare_de_Lyon-Saint-Paul)\n\n[and Jean Macé. Lyon was the first city to be connected to Paris by the TGV in](https://en.wikipedia.org/wiki/Gare_de_Lyon-Jean_Mac%C3%A9)\n\n1981. <sup>[76]</sup> Since that time the TGV train network has expanded and links Lyon directly\n\nto Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International\n\ntrains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt,\n\nLuxembourg, Brussels and London.\n\nThe city is at the heart of a dense road network and is located at the meeting point of\n\n[several highways: A6 to Paris, A7 Marseille, A42 to Geneva, and A43 to Grenoble.](https://en.wikipedia.org/wiki/Grenoble)\n\n[The city is now bypassed by the A46. A double motorway tunnel passes under](https://en.wikipedia.org/wiki/A46_autoroute)\n\nFourvière, connecting the A6 and the A7 autoroutes, both forming the \"Autoroute du\n\nSoleil\".\n\n#### **Primary and secondary schools**\n\n#### **Supplementary education**\n\n### **Transport**", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia4.pdf" - }, - { - "text": "31. Braudel 1984 p. 327\n\n[32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde](https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[Lyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01](https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011](http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[50.htm) on 19 January 2011. Retrieved 3 April 2011.](http://www.vieux-lyon.org/lyon-epoque-renaissance_f01150.htm)\n\n[33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli](https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1)\n\n[sh_1). ](https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) *Chrd.lyon.fr* [. 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1)](http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1)\n\non 24 January 2011. Retrieved 21 December 2017.\n\n[34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal.](http://www.digitaljournal.com/article/273644)\n\n[com/article/273644). ](http://www.digitaljournal.com/article/273644) *Digitaljournal.com* .\n\n35. (in French) Georges Duby (ed), *Histoire de la France : Dynasties et révolutions, de 1348 à 1852* (vol. 2),\n\n[Larousse, 1999 p. 53 ISBN 2-03-505047-2](https://en.wikipedia.org/wiki/Special:BookSources/2-03-505047-2)\n\n[36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g](http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/getting-around/local-transport)\n\n[etting-around/local-transport). Lonely Planet. Retrieved 2 February 2017.](https://en.wikipedia.org/wiki/Lonely_Planet)\n\n[37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/). ](https://whc.unesco.org/en/list/872/) *unesco.org* . UNESCO World Heritage Centre.\n\nRetrieved 31 July 2015.\n\n[38. Gregory, Stanley. “Climatic Classification and Climatic Change (Klimaklassifikation Und Klimaänderung) (http](https://www.jstor.org/stable/25636095)\n\n[s://www.jstor.org/stable/25636095).” ](https://www.jstor.org/stable/25636095) *Erdkunde* , vol. 8, no. 4, 1954, pp. 246- 252. *[JSTOR.](https://en.wikipedia.org/wiki/JSTOR)*\n\n[39. \"Données climatiques de la station de Lyon: Relevés de 2016 - Lyon\" (https://web.archive.org/web/20161004](https://web.archive.org/web/20161004055201/http://www.meteofrance.com/climat/france/lyon/69029001/releves)\n\n[055201/http://www.meteofrance.com/climat/france/lyon/69029001/releves) (in French). Meteo France.](https://web.archive.org/web/20161004055201/http://www.meteofrance.com/climat/france/lyon/69029001/releves)\n\n[Archived from the original (http://www.meteofrance.com/climat/france/lyon/69029001/releves) on 4 October](http://www.meteofrance.com/climat/france/lyon/69029001/releves)\n\n2016. Retrieved 2 October 2016.\n\n[40. \"Lyon-Bron (69)\" (https://donneespubliques.meteofrance.fr/FichesClim/FICHECLIM_69029001.pdf) (PDF).](https://donneespubliques.meteofrance.fr/FichesClim/FICHECLIM_69029001.pdf)\n\n*Fiche Climatologique: Statistiques 1991- 2020 et records* (in French). Meteo France. Retrieved 14 July 2022.\n\n[41. \"Température et records en Août pour Lyon\" (https://www.meteo-lyon.net/records/mois/aout). ](https://www.meteo-lyon.net/records/mois/aout) *meteo-lyon.net*\n\n(in French). Météo Villes. Retrieved 7 September 2023.\n\n[42. \"Lyon- Bron (07480) - WMO Weather Station\" (ftp://ftp.atdd.noaa.gov/pub/GCOS/WMO-Normals/TABLES/RE](ftp://ftp.atdd.noaa.gov/pub/GCOS/WMO-Normals/TABLES/REG_VI/FR/07480.TXT)", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Ice on the Saône, 2012\n\nPanorama of the inner city of Lyon, taken from the basilica of Notre-Dame de Fourvière's roof\n\n[Lyon has a humid subtropical climate (Köppen: ](https://en.wikipedia.org/wiki/K%C3%B6ppen_climate_classification) *Cfa* [), bordering an oceanic climate](https://en.wikipedia.org/wiki/Oceanic_climate)\n\n( *Köppen* : *Cfb* [, Trewartha: ](https://en.wikipedia.org/wiki/Trewartha_climate_classification) *Do* ). <sup>[38]</sup> The mean temperature in Lyon in the coldest month\n\nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F).\n\nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter\n\nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13\n\nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22\n\nDecember 1938. <sup>[39]</sup>\n\n#### **Climate**", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[54. Perret, Aurelie. \"Les traboules de Lyon\" (http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les](http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les-traboules-de-lyon.html)\n\n[-traboules-de-lyon.html). ](http://www.histoire-pour-tous.fr/tourisme/101-france-sud-est/5105-les-traboules-de-lyon.html) *histoire-pour-tous.fr* . SF Webmedia. Retrieved 31 July 2015.\n\n55. Curnonsky, Marcel E. Grancher (1935). *Lyon, capitale mondiale de la gastronomie* [ (https://books.google.com/](https://books.google.com/books?id=D481HQAACAAJ&q=curnonsky+lyon)\n\n[books?id=D481HQAACAAJ&q=curnonsky+lyon). Editions Lugdunum. Retrieved 30 July 2015.](https://books.google.com/books?id=D481HQAACAAJ&q=curnonsky+lyon)\n\n[56. Buford, Bill (12 February 2011). \"Why Lyon is food capital of the world\" (https://www.theguardian.com/travel/2](https://www.theguardian.com/travel/2011/feb/13/bill-buford-lyon-food-capital)\n\n[011/feb/13/bill-buford-lyon-food-capital). ](https://www.theguardian.com/travel/2011/feb/13/bill-buford-lyon-food-capital) *The Guardian* . Retrieved 11 December 2014.\n\n[57. \"Priay Il y a 80 ans \" La mère Bourgeois \" obtenait 3 étoiles\" (http://www.leprogres.fr/ain/2013/01/09/priay-il-y-](http://www.leprogres.fr/ain/2013/01/09/priay-il-y-a-80-ans-la-mere-bourgeois-obtenait-3-etoiles)\n\n[a-80-ans-la-mere-bourgeois-obtenait-3-etoiles). ](http://www.leprogres.fr/ain/2013/01/09/priay-il-y-a-80-ans-la-mere-bourgeois-obtenait-3-etoiles) *leprogres.fr* . Le Progres. Retrieved 30 July 2015.\n\n[58. \"Histoire de la gastronomie 2/4\" (https://archive.today/20120605042553/http://www.franceculture.fr/emission-l](https://archive.today/20120605042553/http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html)\n\n[a-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html). ](https://archive.today/20120605042553/http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html) *franceculture.fr* . Radio France.\n\n[Archived from the original (http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastron](http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html)\n\n[omie-24-2010-11-23.html) on 5 June 2012. Retrieved 30 July 2015.](http://www.franceculture.fr/emission-la-fabrique-de-l-histoire-histoire-de-la-gastronomie-24-2010-11-23.html)\n\n[59. Gaudry, François-Régis (26 September 2014). \"Paul Bocuse: derniers secrets du \"pape\" de la gastronomie](http://www.lexpress.fr/styles/saveurs/paul-bocuse-derniers-secrets_1578426.html)\n\n[française\" (http://www.lexpress.fr/styles/saveurs/paul-bocuse-derniers-secrets_1578426.html). ](http://www.lexpress.fr/styles/saveurs/paul-bocuse-derniers-secrets_1578426.html) *lexpress.fr* .\n\nGroupe Express-Roularta. Retrieved 30 July 2015.\n\n[60. \"Cuisine et boissons Lyon et ses environs\" (http://www.routard.com/guide/lyon/372/cuisine_et_boissons.htm).](http://www.routard.com/guide/lyon/372/cuisine_et_boissons.htm)\n\n*routard.com* . Cyberterre / Hachette tourisme. Retrieved 30 July 2015.\n\n[61. Bassets, Marc (20 June 2023). \"The secret of the taco: modern, multicultural France's fast food phenomenon\"](https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-phenomenon.html)\n\n[(https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-p](https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-phenomenon.html)\n\n[henomenon.html). ](https://english.elpais.com/culture/2023-06-20/the-secret-of-the-taco-modern-multicultural-frances-fast-food-phenomenon.html) *El País* . Retrieved 13 August 2024.", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[Official website (http://www.lyon.fr)(in French)](http://www.lyon.fr/)\n\n[Visit Lyon, the official website for tourism in France (https://en.visiterlyon.com/)](https://en.visiterlyon.com/)\n\n[Lyon’s English Language News and Information (https://thisislyon.fr/)](https://thisislyon.fr/)\n\n[Rues de Lyon (https://www.ruesdelyon.net/) Streets, Places, Monuments (in French)](https://www.ruesdelyon.net/)\n\n[Old maps of Lyon (http://historic-cities.huji.ac.il/france/lyon/lyon.html) Archived (https://web.archive.org/we](https://web.archive.org/web/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html)\n\n[b/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html) 16 January 2021 at the Wayback](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n[Machine, Historic cities site (http://historic-cities.huji.ac.il/historic_cities.html) Archived (https://web.archive.](https://web.archive.org/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html)\n\n[org/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html) 25 March 2022 at the Wayback](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n[Machine, The National Library of Israel](https://en.wikipedia.org/wiki/National_Library_of_Israel)\n\n[Retrieved from \"https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203\"](https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203)\n\n### **External links**", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia4.pdf" - }, - { - "text": "| Lyon Liyon (Arpitan) |\n|:---|\n| Prefecture and commune |\n| Skyline of Lyon in La Part-Dieu Basilica of Notre- Dame de Fourvière Place des Terreaux with the Fontaine Bartholdi Parc de la Tête d'or Confluence District Vieux Lyon Pont Lafayette |\n| Flag Coat of arms |\n\nMotto(s): *Avant, avant, Lion le melhor*\n\n[(old Franco-Provençal for \"Forward, forward,](https://en.wikipedia.org/wiki/Franco-Proven%C3%A7al_language)\n\nLyon the best\") <sup>[a]</sup>\n\n*Virtute duce, comite fortuna*\n\n(\"With virtue as guide and fortune as\n\ncompanion\") <sup>[b]</sup>\n\n**Location of Lyon**\n\n## **Lyon**\n\n**Lyon** <sup>[c]</sup> [ (Franco-Provençal: ](https://en.wikipedia.org/wiki/Franco-Proven%C3%A7al) *Liyon* [) is the second-largest city in France](https://en.wikipedia.org/wiki/France)\n\nby urban area and the third largest by city limits. <sup>[14]</sup> It is located at the\n\n[confluence of the rivers Rhône and Saône, to the northwest of the](https://en.wikipedia.org/wiki/Sa%C3%B4ne)\n\n[French Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north](https://en.wikipedia.org/wiki/Paris)\n\n[of Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km](https://en.wikipedia.org/wiki/Geneva)\n\n[(36 mi) northeast of Saint-Étienne.](https://en.wikipedia.org/wiki/Saint-%C3%89tienne)\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census\n\nwithin its small municipal territory of 48 km <sup>2</sup> (19 sq mi), <sup>[15]</sup> but\n\n[together with its suburbs and exurbs the Lyon metropolitan area had a](https://en.wikipedia.org/wiki/Functional_area_(France))\n\npopulation of 2,308,818 that same year, <sup>[7]</sup> the second most populated in\n\nFrance. Lyon and 58 suburban municipalities have formed since 2015\n\n[the Metropolis of Lyon, a directly elected metropolitan authority now in](https://en.wikipedia.org/wiki/Lyon_Metropolis)\n\ncharge of most urban issues, with a population of 1,424,069 in 2021. <sup>[16]</sup>\n\n[Lyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of](https://en.wikipedia.org/wiki/Regions_of_France)\n\n[the Departmental Council of Rhône (whose jurisdiction, however, no](https://en.wikipedia.org/wiki/Rh%C3%B4ne_(department))\n\nlonger extends over the Metropolis of Lyon since 2015).\n\n[The capital of the Gauls during the Roman Empire, Lyon is the seat of](https://en.wikipedia.org/wiki/Roman_Empire)\n\n[an archbishopric whose holder bears the title of Primate of the Gauls.](https://en.wikipedia.org/wiki/Roman_Catholic_Archdiocese_of_Lyon)\n\n[Lyon became a major economic hub during the Renaissance. The city is](https://en.wikipedia.org/wiki/French_Renaissance)\n\n[recognised for its cuisine and gastronomy, as well as historical and](https://en.wikipedia.org/wiki/Gastronomy)\n\n[architectural landmarks; as such, the districts of Old Lyon, the Fourvière](https://en.wikipedia.org/wiki/Fourvi%C3%A8re)\n\n[hill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on](https://en.wikipedia.org/wiki/La_Croix-Rousse)\n\n[the UNESCO World Heritage List. Lyon was historically an important](https://en.wikipedia.org/wiki/World_Heritage_Site)\n\narea for the production and weaving of silk. Lyon played a significant\n\n[role in the history of cinema since Auguste and Louis Lumière invented](https://en.wikipedia.org/wiki/Auguste_and_Louis_Lumi%C3%A8re)\n\n[the cinematograph there. The city is also known for its light festival, the](https://en.wikipedia.org/wiki/Cinematograph)\n\n[Fête des lumières, which begins every 8 December and lasts for four](https://en.wikipedia.org/wiki/Festival_of_Lights_(Lyon))\n\ndays, earning Lyon the title of \"Capital of Lights\".\n\n[Economically, Lyon is a major centre for banking, chemical,](https://en.wikipedia.org/wiki/Chemical)\n\n[pharmaceutical and biotech industries. The city contains a significant](https://en.wikipedia.org/wiki/Biotechnology)\n\nsoftware industry with a particular focus on video games; in recent years", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia4.pdf" - }, - { - "text": "| Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes | Climate data for Lyon (LYN), elevation: 201 m, 1961-1990 normals and extremes |\n|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|\n| Month | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec | Year |\n| Record high °C (°F) | 16.3 (61.3) | 21.4 (70.5) | 25.7 (78.3) | 28.0 (82.4) | 29.4 (84.9) | 34.4 (93.9) | 39.8 (103.6) | 37.1 (98.8) | 33.8 (92.8) | 28.4 (83.1) | 22.6 (72.7) | 20.2 (68.4) | 39.8 (103.6) |\n| Mean maximum °C (°F) | 10.2 (50.4) | 14.4 (57.9) | 15.9 (60.6) | 18.6 (65.5) | 23.1 (73.6) | 28.8 (83.8) | 32.8 (91.0) | 28.1 (82.6) | 27.3 (81.1) | 19.7 (67.5) | 14.1 (57.4) | 9.5 (49.1) | 32.8 (91.0) |\n| Mean daily maximum °C (°F) | 6.1 (43.0) | 8.2 (46.8) | 11.6 (52.9) | 15.2 (59.4) | 19.1 (66.4) | 22.9 (73.2) | 26.1 (79.0) | 26.0 (78.8) | 22.4 (72.3) | 17.1 (62.8) | 10.0 (50.0) | 6.4 (43.5) | 15.9 (60.7) |\n| Daily mean °C (°F) | 3.0 (37.4) | 4.9 (40.8) | 7.4 (45.3) | 10.2 (50.4) | 14.0 (57.2) | 17.6 (63.7) | 20.6 (69.1) | 20.0 (68.0) | 17.1 (62.8) | 12.7 (54.9) | 6.7 (44.1) | 3.9 (39.0) | 11.5 (52.7) |\n| Mean daily minimum °C (°F) | 0.2 (32.4) | 1.4 (34.5) | 2.9 (37.2) | 5.2 (41.4) | 9.1 (48.4) | 12.5 (54.5) | 14.8 (58.6) | 14.4 (57.9) | 11.7 (53.1) | 8.3 (46.9) | 3.5 (38.3) | 0.7 (33.3) | 7.1 (44.7) |\n| Mean minimum °C (°F) | −7.0 (19.4) | −4.7 (23.5) | −1.4 (29.5) | 3.2 (37.8) | 7.6 (45.7) | 10.9 (51.6) | 13.1 (55.6) | 12.9 (55.2) | 8.1 (46.6) | 4.5 (40.1) | 1.0 (33.8) | −4.7 (23.5) | −7.0 (19.4) |\n| Record low °C (°F) | −23.0 (−9.4) | −19.3 (−2.7) | −10.5 (13.1) | −3.2 (26.2) | −0.3 (31.5) | 3.6 (38.5) | 6.1 (43.0) | 5.2 (41.4) | 1.9 (35.4) | −3.2 (26.2) | −7.1 (19.2) | −16.0 (3.2) | −23.0 (−9.4) |\n| Average precipitation mm (inches) | 54.0 (2.13) | 53.8 (2.12) | 72.2 (2.84) | 56.1 (2.21) | 72.6 (2.86) | 73.2 (2.88) | 54.5 (2.15) | 71.6 (2.82) | 53.2 (2.09) | 56.2 (2.21) | 68.0 (2.68) | 55.8 (2.20) | 741.2 (29.19) |\n| Average precipitation days (≥ 1.0 mm) | 10.4 | 9.3 | 9.7 | 9.6 | 10.9 | 8.2 | 6.8 | 8.2 | 7.3 | 8.5 | 8.9 | 9.8 | 107.6 |\n| Average snowy days | 5.5 | 3.9 | 2.5 | 1.1 | 0.0 | 0.0 | 0.0 | 0.0 | 0.0 | 0.0 | 2.0 | 4.6 | 19.6 |\n| Average relative humidity (%) | 84 | 80 | 74 | 71 | 72 | 70 | 65 | 70 | 76 | 82 | 84 | 86 | 76 |\n| Mean monthly sunshine hours | 62.6 | 89.8 | 147.5 | 184.2 | 215.9 | 250.9 | 292.6 | 259.0 | 208.1 | 134.3 | 75.3 | 55.4 | 1,975.6 |\n| Percent possible sunshine | 23 | 31 | 41 | 46 | 47 | 54 | 62 | 60 | 56 | 40 | 27 | 21 | 42 |", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia4.pdf" - }, - { - "text": "C3 trolleybus in the third district\n\nC3 trolleybus in Old Lyon\n\nVelo'v, Ennemond Fousseret square\n\n(Old Lyon)\n\n[Lyon is served by the Eurolines intercity coach organisation. Its Lyon terminal is](https://en.wikipedia.org/wiki/Eurolines)\n\nlocated at the city's Perrache railway station, which serves as an intermodal\n\ntransportation hub for tramways, local and regional trains and buses, the terminus of\n\nMetro line A, of the Tramway T2, the bicycle service Vélo'v, and taxis. <sup>[77]</sup>\n\n[The Transports en commun lyonnais (TCL), Lyon's public transit system, consisting](https://en.wikipedia.org/wiki/Transports_en_commun_lyonnais)\n\nof metro, tramways and buses, serves 62 communes of the Lyon metropolis. <sup>[78][79]</sup>\n\n[The metro network has four lines (A, B, C and D), 42 stations, and runs with a](https://en.wikipedia.org/wiki/Lyon_Metro_Line_D)\n\n[frequency of up to a train every 2 minutes. There are eight Lyon tram lines since](https://en.wikipedia.org/wiki/Lyon_tramway)\n\nnovember 2020: T1 from *Debourg* in the south to *IUT-Feyssine* in the north, Tram T2\n\nfrom *Hôtel de région Montrochet* [ to Saint-Priest in the south-east, Tram T3 from Part-](https://en.wikipedia.org/wiki/Saint-Priest,_Rh%C3%B4ne)\n\n[Dieu to Meyzieu, Tram T4 from 'Hôptial Feyzin Venissieux' to La Doua Gaston](https://en.wikipedia.org/wiki/Meyzieu)\n\nBerger. Tram T5 from Grange Blanche, in the south-east to Eurexpo in the south-west.\n\nTram T6 from Debourg, in the south to Hôpitaux Est-Pinel in the east. Tram T7 from\n\nVaux-en-Velin la soie, in the north-east to Décines - OL Vallée in the east. <sup>[79]</sup> And\n\nRhône Express tramline from Part-Dieu to Lyon- Saint-Exupéry Airport. <sup>[80][81]</sup> The\n\n[Lyon bus network consists of the Lyon trolleybus system, motorbuses, and coaches](https://en.wikipedia.org/wiki/Motorbuses)\n\nfor areas outside the centre. There are also two funicular lines from Vieux Lyon to\n\nSaint-Just and Fourvière. The ticketing system is relatively simple as the city has only\n\none public transport operator, the SYTRAL.\n\nThe public transit system was complemented in 2005 by *[Vélo'v](https://en.wikipedia.org/wiki/V%C3%A9lo%27v)* , a bicycle network\n\nproviding a low-cost bicycle-hire service made up of 340 stations throughout the city.\n\nBorrowing a bicycle for less than 30 minutes is free. Free rental time can be extended\n\nfor another 30 minutes at any station. Lyon was the first city in France to introduce\n\n[this bicycle renting system. In 2011 the Auto'lib car rental service was introduced; it](https://en.wikipedia.org/wiki/Autolib%27)\n\nworks much the same way as the Velo'v but for cars.\n\nThe average amount of time people spend commuting with public transit in Lyon on a\n\nweekday is 45 minutes. The average amount of time people wait at a stop or station\n\nfor public transit is 11 min, while 17% of riders wait for over 20 minutes on average\n\nevery day. The average distance people usually ride in a single trip with public transit\n\nis 4.7 km, while 4% travel for over 12 km in a single direction. <sup>[82]</sup>\n\nNetwork of\n\nhighways around\n\nLyon\n\nPublic transport map\n\nLyon is a pilot city of the Council of Europe and the European Commission \"Intercultural cities\" program. <sup>[83]</sup> Lyon is\n\n[twinned with:](https://en.wikipedia.org/wiki/Twin_towns_and_sister_cities) <sup>[84]</sup>\n\n[Addis Ababa, Ethiopia](https://en.wikipedia.org/wiki/Addis_Ababa)\n\n[Bamako, Mali](https://en.wikipedia.org/wiki/Bamako)\n\n[Barcelona, Spain](https://en.wikipedia.org/wiki/Barcelona)\n\n[Beersheba, Israel](https://en.wikipedia.org/wiki/Beersheba)\n\n[Birmingham, England, United Kingdom](https://en.wikipedia.org/wiki/Birmingham)\n\n[Boston, United States](https://en.wikipedia.org/wiki/Boston)\n\n[Craiova, Romania](https://en.wikipedia.org/wiki/Craiova)\n\n[Curitiba, Brazil](https://en.wikipedia.org/wiki/Curitiba)\n\n#### **Maps**\n\n### **International relations**", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia4.pdf" - } - ] - }, - { - "references": { - "source_file": "uksi_20210538_en.pdf", - "query": " What should do the rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided ?", - "target_page": 2, - "target_passage": "ensure that the register is kept in that church or chapel, and (b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of\n\nregulation 3(2) in relation to the marriage, and\n\n(b) provides corresponding spaces for recording information required by each of those sub-\n\nparagraphs in relation to the marriage.\n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council\n\nbelongs to that parochial church council.\n\n### **Duty to record information about marriages solemnized according to the rites of the Church**\n\n### **of England or Church in Wales**\n\n**3.** —(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the\n\nrites of the Church of England in a church or chapel in which banns of matrimony may be\n\npublished.\n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the\n\nmarriage was solemnized must make a record of the following information in relation to that\n\nmarriage in a register of marriage services provided to the church or chapel under regulation\n\n2(1)—\n\n(a) the date and place of the marriage;\n\n(b) the name and surname of each party;\n\n(c) the date of birth of each party;\n\n(d) the occupation (if any) of each party;\n\n(e) the address of each party at the time of the marriage;\n\n(f) the names and surnames of each party’s parents, so far as those names and surnames are\n\nknown to the clergyman who solemnized the marriage;\n\n(g) the name and surname of each of the witnesses in whose presence the marriage was\n\nsolemnized;\n\n(h) the name and surname of the clergyman by whom the marriage was solemnized.\n\n(3) The clergyman must record the information required by paragraph (2) in English, and may\n\nalso record information required by that paragraph in Welsh where the church or chapel is situated\n\nin Wales.\n\n(4) After making a record under paragraph (2) the clergyman must sign it.\n\n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021.\n\n### **Requirements about the keeping of registers of marriage services**\n\n**4.** —(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage\n\nservices has been provided under regulation 2(1) must—\n\n(a) ensure that the register is kept in that church or chapel, and\n\n(b) do everything that is reasonably practicable to ensure that the register is protected against\n\ntheft, loss or damage.\n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of\n\nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in\n\nrespect of that register fall on the churchwardens of the parish in which the church or chapel is\n\nsituated.\n\nGiven under my hand on 29th April 2021\n\n*Abi Tierney*\n\nRegistrar General", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "I approve\n\n*Kevin Foster*\n\nParliamentary Under Secretary of State\n\n29th April 2021 Home Office\n\n### **EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the\n\nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage\n\nAct 1949 applies (naval, military and air force chapels).\n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage\n\nservices” to churches and chapels in their parish in which banns of matrimony may be published,\n\nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes\n\nrequirements relating to the durability and pre-printed content of these registers, and provides that\n\nthey belong to the parochial church council.\n\nRegulation 3 requires specified information to be recorded in a register of marriage services when\n\na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of\n\nEngland or Church in Wales in a church or chapel in which banns of matrimony may be\n\npublished. The record must be made and signed by the member of the clergy by whom the\n\nmarriage was solemnized.\n\nRegulation 4 imposes requirements relating to the keeping of registers of marriage services\n\nprovided under regulation 2.\n\nA full impact assessment has not been produced for this instrument because no, or no significant,\n\nimpact on the private, public or voluntary sector is foreseen.\n\n© Crown copyright 2021\n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James,\n\nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament.", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "S T A T U T O R Y I N S T R U M E N T S\n\n## **2021 No. 538**\n\n## **MARRIAGE, ENGLAND AND WALES**\n\n## The Marriage (Keeping of Records in Churches and Chapels)\n\n## Regulations 2021\n\n*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in\n\nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act\n\n1949( **a** ).\n\n### **Citation, commencement, extent and interpretation**\n\n**1.** —(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and\n\nChapels) Regulations 2021.\n\n(2) These Regulations come into force on 4th May 2021.\n\n(3) These Regulations extend to England and Wales.\n\n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act\n\n1949 (marriages in naval, military and air force chapels) applies( **b** ).\n\n### **Duty of parochial church councils to provide registers of marriage services**\n\n**2.** —(1) The parochial church council of a parish must provide books for the purpose of making\n\nrecords under regulation 3 to each church and chapel of the Church of England( **c** ) in that parish in\n\nwhich banns of matrimony may be published.\n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”.\n\n(3) A register of marriage services provided under paragraph (1) must meet the requirements of\n\nparagraphs (4) and (5).\n\n(4) The register must be made of durable material.\n\n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect\n\nof a marriage, the register must be printed in such a way that it—\n\n( **a** ) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by\n\nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently\n\nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic\n\nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act\n\n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also\n\ninserted subsection (1A).\n\n( **b** ) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to\n\nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15).\n\n( **c** ) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including\n\nreferences to the Church in Wales.", - "page_start": 0, - "page_end": 0, - "source_file": "uksi_20210538_en.pdf" - }, - { - "text": "Assistant Minister. **43. Tenure of office of Ministers and Assistant Ministers** The office of any Minister or Assistant Minister shall become vacant- ( *a* ) in the case of a Minister or Assistant Minister appointed from among the Members of the National Assembly, or in the case of a Minister or Assistant Minister appointed from among persons who are not Members of the Assembly who becomes a Member of the Assembly before the expiration of four months from the date of his or her appointment- (i) if he or she ceases to be a Member of the National Assembly otherwise than by reason of a dissolution of the National Assembly; or (ii) if, at the first sitting of the Assembly after a general election, he or she is not a Member of the Assembly; ( *b* ) in the case of a Minister or Assistant Minister appointed from among persons who are not Members of the Assembly, if before the expiration of four months from the date of his or her appointment- (i) circumstances arise (other than a dissolution of the Assembly) that, if he or she were such a Member, would cause him or her to vacate his or her seat in the Assembly; or (ii) he or she does not become a Member of the Assembly; ( *c* ) if the holder of the office is removed from office by the President; ( *d* ) upon the assumption by any person of the office of President. **44. Cabinet** (1) There shall be a Cabinet which shall consist of the President, Vice-President and the Ministers. (2) There shall preside at meetings of the Cabinet- ( *a* ) the President; ( *b* ) in the absence of the President, the Vice-President; or ( *c* ) in the absence of the President and the Vice-President, such Minister as the President may designate. (3) The Cabinet may act notwithstanding any vacancy in its membership. **45. Oaths to be taken by Ministers and Assistant Ministers** The Vice-President, a Minister or an Assistant Minister shall not enter upon the duties of his or her office unless he or she has taken and subscribed the oath of allegiance and such oath for the due execution of his or her office as may be prescribed by Parliament. **46. Secretary to the Cabinet** (1) There shall be a Secretary to the Cabinet whose office shall be a public office. (2) The Secretary to the Cabinet shall have charge of the Cabinet Office and shall be responsible, in accordance with such instructions as may be given to him or her by the President, for arranging the business for, and keeping the minutes of, the Cabinet, for conveying decisions of the Cabinet to the appropriate person or authority, and shall have such other functions as the President may from time to time direct. **PART III** * **Executive Functions** * **(ss 47-56) 47. Functions of President** (1) The executive power of Botswana shall vest in the President and, subject to the provisions of this Constitution, shall be exercised by him or her either directly or through officers subordinate to him or her. (2) In the exercise of any function conferred upon him or her by this Constitution or any other law the President shall, unless it is otherwise provided, act in his or her own deliberate judgment and shall not be obliged to follow the advice tendered by any other", - "page_start": 22, - "page_end": 22, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "from among the Members of the Assembly, to perform the functions of the office of Vice- President and any person so appointed may discharge those functions accordingly: Provided that a person appointed under this subsection shall cease to perform the functions of the office of Vice-President- (i) if his or her appointment is revoked by the Vice-President; (ii) if he or she ceases to be a Member of the Assembly otherwise than by reason of a dissolution of Parliament; or (iii) if the Vice-President ceases to perform the functions of the office of President. (6) In this section references to Members of the Assembly shall, in the event of Parliament being dissolved, be construed as references to those persons who immediately before the dissolution were Members of the Assembly. **40. Salary and allowances of President** (1) The President shall receive such salary and allowances as may be prescribed by resolution of the National Assembly, which shall be a charge on the general revenues of the Republic. (2) The salary and allowances of the President shall not be altered to his or her disadvantage during his or her period of office. (3) A person who has held the office of President shall receive such pension or, upon the expiration of his or her term of office, such gratuity as may be prescribed by resolution of the National Assembly, which shall be a charge on the Consolidated Fund. **41. Protection of President in respect of legal proceedings** (1) Whilst any person holds or performs the functions of the office of President no criminal proceedings shall be instituted or continued against him or her in respect of anything done or omitted to be done by him or her either in his or her official capacity or in his or her private capacity and no civil proceedings shall be instituted or continued in respect of which relief is claimed against him or her in respect of anything done or omitted to be done in his or her private capacity. (2) Where provision is made by law limiting the time within which proceedings of any description may be brought against any person, the term of any person in the office of President shall not be taken into account in calculating any period of time prescribed by that law which determines whether any such proceedings as are mentioned in subsection (1) of this section may be brought against that person. **PART II** * **The Cabinet** * **(ss 42-46) 42. Ministers and Assistant Ministers** (1) There shall be such offices of Minister of the Government (not exceeding six or such other number as Parliament may from time to time provide) as may be established by Parliament or, subject to the provisions of any Act of Parliament, by the President. (2) There shall be such offices of Assistant Minister (not exceeding three or such number as Parliament may from time to time provide) as may be established by Parliament or, subject to the provisions of any Act of Parliament, by the President. (3) Appointments to the office of Minister or Assistant Minister shall be made by the President from among Members of the National Assembly: Provided that- (i) not more than four persons may be appointed as Minister or Assistant Minister from amongst persons who are not Members of the Assembly but are qualified for election as such; and (ii) if occasion arises for making an appointment to the office of a Minister or an Assistant Minister while Parliament is dissolved a person who was a Member of the Assembly before the dissolution may be appointed as a Minister or an", - "page_start": 21, - "page_end": 21, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "( *d* ) the Industrial Court. (2) In this Constitution, unless the context otherwise requires, references to offices in the public service shall be construed as including references to the offices of judges of the Court of Appeal and judges of the High Court and the offices of members of all subordinate courts (being offices the emoluments attaching to which, or any part of the emoluments attaching to which, are paid directly out of moneys provided by Parliament). (3) For the purposes of this Constitution a person shall not be considered to be a public officer by reason only that he or she is in receipt of any remuneration or allowance as the President, Vice-President, a Minister or Assistant Minister, Speaker, Deputy Speaker or Member of the Assembly, a Member of the *Ntlo ya Dikgosi* or a member of any Commission established by this Constitution. (4) For the purposes of this Constitution, a person shall not be considered as holding a public office by reason only of the fact that he or she is in receipt of a pension or other like allowance in respect of service under the Government of Botswana or the former Protectorate of Bechuanaland. (5) In this Constitution, unless the context otherwise requires, a reference to the holder of an office by the term designating his or her office shall be construed as including a reference to any person for the time being lawfully acting in or performing the functions of that office: Provided that nothing in this subsection shall apply to references to the President or Vice-President in section 35, 36 or 39 of this Constitution. (6) In this Constitution, unless it is otherwise provided or required by the context, a reference to the power to make appointments to any office shall be construed as including a reference to the power to make appointments on promotion and transfer and to confirm appointments and to the power to appoint a person to act in or perform the functions of that office at any time when the office is vacant or the holder thereof is unable (whether by reason of absence or infirmity of mind or body or any other cause) to perform the functions of that office. (7) References in this Constitution to the power to remove a public officer from his or her office shall be construed as including references to any power conferred by any law to require or permit that officer to retire from the public service: Provided that nothing in this subsection shall be construed as conferring on any person or authority power to require a judge of the Court of Appeal or the High Court, the Auditor-General or the Director of Public Prosecutions to retire from the public service. (8) Any provision in this Constitution that vests in any person or authority power to remove any public officer from his or her office shall be without prejudice to the power of any person or authority to abolish any office or to any law providing for the compulsory retirement of public officers generally or in any class of public officer on attaining an age specified therein. (9) Where power is vested by this Constitution in any person or authority to appoint any person to act in or perform the functions of any office if the holder thereof is himself unable to perform those functions, no such appointment shall be called in question on the ground that the holder of the office was not unable to perform those functions. (10) No provision of this Constitution that any person or authority shall not be subject to the direction or control of any other person or authority in the exercise of any functions under this Constitution shall be construed as precluding a court of law from exercising jurisdiction in relation to any question whether that person or authority has performed those functions in accordance with this Constitution or any other law. (11) Where any power is conferred by this Constitution to make any Act, order,", - "page_start": 54, - "page_end": 54, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "(d) to visit a person (“D”) whom P reasonably believes is dying, and where P is a member of\n\nD’s household or a close family member or friend of D;\n\n(e) to attend the funeral of a member of P’s household or a close family member;\n\n(f) in other exceptional circumstances such as—\n\n(i) to seek medical assistance where this is required urgently or on the advice of a\n\nregistered medical practitioner including to access services from dentists, opticians,\n\naudiologists, chiropodists, chiropractors, osteopaths and other medical and health\n\npractitioners, including services relating to mental health,\n\n(ii) to access critical public services including social services or services provided to\n\nvictims (such as victims of crime),\n\n(iii) to avoid injury or illness or to escape risk of harm,\n\n(iv) to access veterinary services where this is required urgently or on the advice of a\n\nveterinary surgeon.\n\n(2) P may only leave or be outside of the place where P is self-isolating in reliance on the\n\ngrounds mentioned in sub-paragraph (1)(c), (d) or (e)—\n\n(a) if P has been given prior permission by a person authorised by the Secretary of State for\n\nthis purpose;\n\n(b) if P complies with any reasonable requirements imposed by the person so authorised in\n\nrelation to the exercise, the visit to the person or attendance at the funeral.\n\n###### **Meaning of “place”**\n\n**14.** For the purposes of this Schedule the place referred to in paragraphs 8 to 13 means the room\n\nin the designated accommodation where P is staying and, if connected to the room where P is\n\nstaying, the room of any person referred to in paragraph 11(a) (travelling companion), including\n\nany balcony, and does not include the communal areas or any garden, yard, passage, stair, garage,\n\nouthouse or appurtenance of the accommodation in which the place is situated.\n\n###### **Designations**\n\n**15.** The Secretary of State must designate for the purposes of this Schedule—\n\n(a) accommodation;\n\n(b) transportation to the designated accommodation,\n\nand must publish details of the designations in such manner as appears to the Secretary of State to\n\nbe appropriate.\n\n###### **Duties where P is a child**\n\n**16.** If P is a child—\n\n(a) any person who has custody or charge of P when P is travelling to England must ensure,\n\nso far as is reasonably practicable, that P complies with the obligations in paragraphs 5\n\nand 6;\n\n(b) any person who has custody or charge of P during P’s period of self-isolation must\n\nensure, so far as is reasonably practicable, that P self-isolates in accordance with this\n\nSchedule.\n\n###### **Person caring for P**\n\n**17.** A person may reside in the place where P is residing pursuant to this Schedule to provide\n\nassistance P reasonably requires by reason of—\n\n(a) P being a child; or\n\n(b) any disability of P’s,", - "page_start": 77, - "page_end": 77, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "court to try a member of a disciplined force for a criminal offence notwithstanding any trial and conviction or acquittal of that member under the disciplinary law of that force, so, however, that any court so trying such a member and convicting him or her shall in sentencing him or her to any punishment take into account any punishment awarded him or her under that disciplinary law; ( *e* ) subsection (8) of this section to the extent that the law in question authorizes a court to convict a person of a criminal offence under any customary law to which, by virtue of that law, such person is subject. (13) In the case of any person who is held in lawful detention, the provisions of subsection (1), subsection (2)( *d* ) and ( *e* ) and subsection (3) of this section shall not apply in relation to his or her trial for a criminal offence under the law regulating the discipline of persons held in such detention. (14) In this section \"criminal offence\" means a criminal offence under the law in force in Botswana. **11. Protection of freedom of conscience** (1) Except with his or her own consent, no person shall be hindered in the enjoyment of his or her freedom of conscience, and for the purposes of this section the said freedom includes freedom of thought and of religion, freedom to change his or her religion or belief, and freedom, either alone or in community with others, and both in public and in private, to manifest and propagate his or her religion or belief in worship, teaching, practice and observance. (2) Every religious community shall be entitled, at its own expense, to establish and maintain places of education and to manage any place of education which it wholly maintains; and no such community shall be prevented from providing religious instruction for persons of that community in the course of any education provided at any place of education which it wholly maintains or in the course of any education which it otherwise provides. (3) Except with his or her own consent (or, if he or she is a minor, the consent of his or her guardian) no person attending any place of education shall be required to receive religious instruction or to take part in or attend any religious ceremony or observance if that instruction, ceremony or observance relates to a religion other than his or her own. (4) No person shall be compelled to take any oath which is contrary to his or her religion or belief or to take any oath in a manner which is contrary to his or her religion or belief. (5) Nothing contained in or done under the authority of any law shall be held to be inconsistent with or in contravention of this section to the extent that the law in question makes provision which is reasonably required- ( *a* ) in the interests of defence, public safety, public order, public morality or public health; or ( *b* ) for the purpose of protecting the rights and freedoms of other persons, including the right to observe and practise any religion without the unsolicited intervention of members of any other religion, and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be reasonably justifiable in a democratic society. **12. Protection of freedom of expression** (1) Except with his or her own consent, no person shall be hindered in the enjoyment of his or her freedom of expression, that is to say, freedom to hold opinions without interference, freedom to receive ideas and information without interference, freedom to communicate ideas and information without interference (whether the", - "page_start": 10, - "page_end": 10, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "**122. Remuneration of certain officers** (1) There shall be paid to the holders of the offices to which this section applies such salaries and such allowances as may be prescribed by Parliament. (2) The salaries and any allowances payable to the holders of the offices to which this section applies shall be a charge on the Consolidated Fund. (3) The salary payable to the holder of any office to which this section applies and his or her terms of office, other than allowances, shall not be altered to his or her disadvantage after his or her appointment. (4) Where a person's salary or terms of office depend upon his or her option, the salary or terms for which he or she opts shall, for the purposes of subsection (3) of this section, be deemed to be more advantageous to him or her than any others for which he or she might have opted. (5) This section applies to the offices of judge of the Court of Appeal, judge of the High Court, member of the Public Service Commission, member of the Judicial Service Commission, member of the Delimitation Commission, Auditor-General, Director of Public Prosecutions and Attorney-General. **123. Public debt** (1) There shall be charged on the Consolidated Fund all debt charges for which Botswana is liable. (2) For the purposes of this section debt charges include interest, sinking fund charges, the repayment or amortization of debt, and all expenditure in connection with the raising of loans on the security of the revenues or the Consolidated Fund of the former Protectorate of Bechuanaland or Botswana, and the service and redemption of debt thereby created. **124. Auditor-General** (1) There shall be an Auditor-General, whose office shall be a public office. (2) The public accounts of Botswana and of all officers, courts and authorities of the Government of Botswana shall be audited and reported on by the Auditor-General and for that purpose the Auditor-General or any person authorized by him or her in that behalf shall have access to all books, records, reports and other documents relating to those accounts: Provided that, if it is so provided by Parliament in the case of any body corporate directly established by law, the accounts of that body corporate shall be audited and reported on by such person as may be specified by or under that law. (3) The Auditor-General shall submit his or her reports to the Minister responsible for finance, who shall cause them to be laid before the National Assembly. (4) The Auditor-General shall perform such other duties and exercise such other powers in relation to the accounts of the Government or the accounts of other public authorities or other bodies as may be prescribed by or under any Act of Parliament. (5) In the exercise of his or her functions the Auditor-General shall not be subject to the direction or control of any other person or authority. **CHAPTER IX** * **Miscellaneous** * **(ss 125-127) 125. Resignations** (1) Any person who is appointed or elected to any office established by this Constitution may resign from that office by writing under his or her hand addressed to the person or authority by whom he or she was appointed or elected: Provided that in the case of a person who holds office as President his or her resignation from that office shall be addressed to the Chief Justice, in the case of a person who holds office as Speaker or Deputy Speaker of the National Assembly his or her resignation from that office shall be addressed to the Assembly, in the case of an", - "page_start": 52, - "page_end": 52, - "source_file": "Botswana-constitution.pdf" - }, - { - "text": "other judges of the Court as may be prescribed by Parliament: Provided that the office of a judge of the High Court shall not be abolished while there is a substantive holder thereof. (3) The High Court shall be a superior court of record and, save as otherwise provided by Parliament, shall have all the powers of such a court. (4) The High Court shall sit in such places as the Chief Justice may appoint. (5) The High Court shall have jurisdiction to supervise any civil or criminal proceedings before any subordinate court or any court martial and may make such orders, issue such writs and give such directions as it may consider appropriate for the purpose of ensuring that justice is duly administered by any such court. (6) The Chief Justice may make rules with respect to the practice and procedure of the High Court in relation to the jurisdiction and powers conferred on it by subsection (5) of this section. (7) The Chief Justice may appoint a Rules of Court Advisory Committee to assist him or her in reviewing and overhauling the rules made under subsection (6) and to advise on proposals to update and amend such rules. **96. Appointment of judges of High Court** (1) The Chief Justice shall be appointed by the President. (2) The other judges of the High Court shall be appointed by the President, acting in accordance with the advice of the Judicial Service Commission. (3) A person shall not be qualified to be appointed as a judge of the High Court unless- ( *a* ) he or she holds, or has held office, as a judge of a court having unlimited jurisdiction in civil and criminal matters in Botswana, in a Commonwealth country or in any country outside the Commonwealth that may be prescribed by Parliament or a court having jurisdiction in appeals from such a court; or ( *b* ) he or she is qualified to practise as an advocate or attorney in such a court and has been qualified for not less than ten years to practise as an advocate or attorney in such a court; ( *c* ) he or she is qualified to practise as an advocate or attorney and he or she has had the experience in the teaching of law in a recognised university for not less than ten years; or ( *d* ) he or she is a Chief Magistrate who has held that office for not less than five years. (4) In computing, for the purposes of subsection (3) of this section, the period during which any person has been qualified to practise as an advocate or attorney any period during which he or she has held judicial office after becoming so qualified shall be included. (5) If the office of Chief Justice is vacant or if the Chief Justice is for any reason unable to perform the functions of his or her office, then, until a person has been appointed to and has assumed the functions of that office or until the Chief Justice has resumed those functions, as the case may be, those functions shall be performed by such one of the judges of the High Court or such other person qualified for appointment as a judge of the High Court as the President may appoint for that purpose: Provided that- (i) a person may be appointed under this subsection notwithstanding that he or she has attained the age of 70 years or such other age as may be prescribed for the purposes of section 97 of this Constitution; (ii) a person appointed under this subsection, who is not a judge of the High Court, may, notwithstanding the assumption or resumption of the functions of the office of Chief Justice by the holder of that office, continue to act as a judge of the", - "page_start": 40, - "page_end": 40, - "source_file": "Botswana-constitution.pdf" - } - ] - }, - { - "references": { - "source_file": "tesla_form_10q.pdf", - "query": "What are Tesla's total liabilities and equity in 2024?", - "target_page": 5, - "target_passage": "119,852", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "##### * **Legal Proceedings** *\n\n*Litigation Relating to 2018 CEO Performance Award*\n\nOn June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of\n\nChancery against Elon Musk and the members of Tesla’s board of directors as then constituted, alleging corporate waste, unjust\n\nenrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan\n\nawarded to Elon Musk in 2018 (the “2018 CEO Performance Award”). Trial was held November 14-18, 2022. On January 30,\n\n2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff’s counsel filed\n\na brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June\n\n7, 2024, and a hearing was held on July 8, 2024. At Tesla’s 2024 Annual Meeting of Stockholders, 72% of the disinterested\n\nvoting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance\n\nAward. On June 28, 2024, because Tesla’s disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr.\n\nMusk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court’s January 30, 2024 opinion,\n\nand a hearing was held on August 2, 2024.\n\n*Litigation Related to Directors’ Compensation*\n\nOn June 17, 2020, a purported Tesla stockholder filed a derivative action in the Delaware Court of Chancery,\n\npurportedly on behalf of Tesla, against certain of Tesla’s current and former directors regarding compensation awards granted\n\nto Tesla’s directors, other than Elon Musk, between 2017 and 2020. The suit asserts claims for breach of fiduciary duty and\n\nunjust enrichment and seeks declaratory and injunctive relief, unspecified damages and other relief. Defendants filed their\n\nanswer on September 17, 2020.\n\nOn July 14, 2023, the parties filed a Stipulation and Agreement of Compromise and Settlement, which does not involve\n\nan admission of any wrongdoing by any party. If the settlement is approved by the Court, this action will be fully settled and\n\ndismissed with prejudice. Pursuant to the terms of the agreement, Tesla provided notice of the proposed settlement to\n\nstockholders of record as of July 14, 2023. The Court held a hearing regarding the settlement on October 13, 2023, after which\n\nit took the settlement and plaintiff counsels’ fee request under advisement. On August 14, 2024, the parties submitted a joint\n\nletter requesting that the Court approve and enter final judgment with respect to the settlement, and decide the fee request at a\n\nlater date. The settlement is not expected to have an adverse impact on our results of operations, cash flows or financial\n\nposition.\n\n*Litigation Relating to Potential Going Private Transaction*\n\nBetween August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and\n\nElon Musk in connection with Mr. Musk’s August 7, 2018 Twitter post that he was considering taking Tesla private. On\n\nJanuary 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of\n\nCalifornia and added as defendants the members of Tesla’s board of directors. The consolidated complaint asserts claims for\n\nviolations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of\n\na class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3,\n\n2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a\n\nmatter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11,", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Deferred revenue is equivalent to the total transaction price allocated to the performance obligations that are unsatisfied,\n\nor partially unsatisfied, as of the balance sheet date. Revenue recognized from the deferred revenue balances as of\n\nDecember 31, 2023 and 2022 was $711 million and $360 million for the nine months ended September 30, 2024 and 2023,\n\nrespectively. Of the total deferred revenue balance as of September 30, 2024, we expect to recognize $821 million of revenue in\n\nthe next 12 months. The remaining balance will be recognized at the time of transfer of control of the product or over the\n\nperformance period.\n\nWe have financing receivables on our consolidated balance sheets related to loans we provide for financing our\n\nautomotive deliveries. As of September 30, 2024 and December 31, 2023, we had current net financing receivables of $245\n\nmillion and $242 million, respectively, in Accounts receivable, net, and $868 million and $1.04 billion, respectively, in Other\n\nnon-current assets for the long-term portion.\n\nWe offer resale value guarantees to our commercial banking partners in connection with certain vehicle leasing\n\nprograms. Under these programs, we originate the lease with our end customer and immediately transfer the lease and the\n\nunderlying vehicle to our commercial banking partner, with the transaction being accounted for as a sale under ASC 606,\n\n*Revenue from Contracts with Customers* . We estimate a guarantee liability in accordance with ASC 460, *Guarantees* and record\n\nit within other liabilities on our consolidated balance sheet. On a quarterly basis, we assess the estimated market value of\n\nvehicles sold under this program to determine whether there have been changes to the amount of expected resale value\n\nguarantee liabilities. The total recorded guarantee liabilities on vehicles sold under this program were immaterial as of\n\nSeptember 30, 2024 and December 31, 2023. Our maximum exposure on the guarantees we provide if they are unable to sell\n\nthe vehicle at or above the vehicle’s contractual residual value at the end of the lease term was $1.04 billion and $166 million as\n\nof September 30, 2024 and December 31, 2023, respectively.\n\nAutomotive Regulatory Credits\n\nAs of September 30, 2024, total transaction price allocated to performance obligations that were unsatisfied or partially\n\nunsatisfied for contracts with an original expected length of more than one year was $4.72 billion. Of this amount, we expect to\n\nrecognize $683 million in the next 12 months and the rest over the remaining performance obligation period. Additionally,\n\nchanges in regulations on automotive regulatory credits may significantly impact our remaining performance obligations and\n\nrevenue to be recognized under these contracts.\n\n*Automotive Leasing Revenue*\n\nDirect Sales-Type Leasing Program\n\nLease receivables relating to sales-type leases are presented on the consolidated balance sheets as follows (in millions):\n\n**September 30, 2024 December 31, 2023**\n\nGross lease receivables $ 584 $ 780\n\nUnearned interest income (48) (78)\n\nAllowance for expected credit losses (7) (6)\n\nNet investment in sales-type leases $ 529 $ 696\n\n##### **Reported as:**\n\nPrepaid expenses and other current assets $ 171 $ 189\n\nOther non-current assets 358 507\n\nNet investment in sales-type leases $ 529 $ 696\n\n11", - "page_start": 14, - "page_end": 14, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "The following is a summary of our debt and finance leases as of December 31, 2023 (in millions):\n\n**Net Carrying Value Unpaid**\n\n**Principal**\n\n**Balance**\n\n**Unused**\n\n**Committed**\n\n**Amount (1)**\n\n**Contractual**\n\n**Interest Rates**\n\n**Contractual**\n\n**Maturity Date Current Long-Term**\n\n**Recourse debt:**\n\n2024 Notes $ 37 $ — $ 37 $ — 2.00 % May 2024\n\nRCF Credit Agreement — — — 5,000 Not applicable January 2028\n\nOther — 7 7 28 4.70-5.75% March 2025-January 2031\n\nTotal recourse debt 37 7 44 5,028\n\n**Non-recourse debt:**\n\nAutomotive Asset-backed Notes 1,906 2,337 4,259 — 0.60-6.57% July 2024-May 2031\n\nCash Equity Debt 28 330 367 — 5.25-5.81% July 2033-January 2035\n\nSolar Asset-backed Notes 4 8 13 — 4.80 % December 2026\n\nTotal non-recourse debt 1,938 2,675 4,639 —\n\nTotal debt 1,975 2,682 $ 4,683 $ 5,028\n\nFinance leases 398 175\n\nTotal debt and finance leases $ 2,373 $ 2,857\n\n(1) There are no restrictions on draw-down or use for general corporate purposes with respect to any available committed\n\nfunds under our RCF Credit Agreement, except certain specified conditions prior to draw-down. Refer to the notes to the\n\nconsolidated financial statements included in our reporting on Form 10-K for the year ended December 31, 2023 for the\n\nterms of the facility.\n\n(2) The contractual maturity date of the China Working Capital Facility is April 2025, renewable until March 2026 at our\n\ndiscretion. As we have the intent and ability to refinance the loan on a long-term basis, we recorded it in Debt and\n\nfinance leases, net of current portion in the consolidated balance sheet.\n\nRecourse debt refers to debt that is recourse to our general assets. Non-recourse debt refers to debt that is recourse to\n\nonly assets of our subsidiaries. The differences between the unpaid principal balances and the net carrying values are due to\n\ndebt discounts or deferred issuance costs. As of September 30, 2024, we were in material compliance with all financial debt\n\ncovenants.\n\n## * **2024 Notes** *\n\nDuring the second quarter of 2024, the 2024 Notes reached maturity and were fully settled. Additionally, during the third\n\nquarter of 2024, we settled the warrants entered into in connection with the issuance of the 2024 Notes, resulting in the issuance\n\nof 8.5 million shares of our common stock. The remaining warrants were settled in October 2024.\n\n##### * **Automotive Asset-backed Notes** *\n\nDuring the nine months ended September 30, 2024, we transferred beneficial interests related to certain leased vehicles\n\nand financing receivables into special purpose entities and issued $1.57 billion in aggregate principal amount of Automotive\n\nAsset-backed Notes, with terms similar to our other previously issued Automotive Asset-backed Notes. The proceeds from the\n\nissuance, net of debt issuance costs, were $1.56 billion.\n\nIn October 2024, we transferred beneficial interests related to certain leased vehicles into a special purpose entity and\n\nissued $783 million in aggregate principal amount of Automotive Asset-backed Notes, with terms similar to our other\n\npreviously issued Automotive-backed Notes.\n\n##### * **China Working Capital Facility** *\n\nIn April 2024, one of our subsidiaries entered into a loan agreement (the “China Working Capital Facility”) with lenders\n\nin China for an unsecured revolving facility of up to RMB 20.00 billion to be used for certain production expenditures as well\n\nas repayment of certain finance facilities. Borrowed funds bear interest at a rate equal to the Loan Prime Rate published by the\n\nPeople’s Bank of China minus 1.18%. The China Working Capital Facility is non-recourse to our assets.\n\n19", - "page_start": 24, - "page_end": 24, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "On October 21, 2022, a lawsuit was filed in the Delaware Court of Chancery by a purported shareholder of Tesla\n\nalleging, among other things, that board members breached their fiduciary duties in connection with their oversight of the\n\nCompany’s 2018 settlement with the SEC, as amended. Among other things, the plaintiff seeks reforms to the Company’s\n\ncorporate governance and internal procedures, unspecified damages, and attorneys’ fees. The lawsuit has been stayed pending\n\nresolution of a motion to consolidate certain derivative lawsuits in the Delaware Court of Chancery referenced below.\n\nOn November 15, 2021, JPMorgan Chase Bank (“JP Morgan”) filed a lawsuit against Tesla in the Southern District of\n\nNew York alleging breach of a stock warrant agreement that was entered into as part of a convertible notes offering in 2014. In\n\n2018, JP Morgan informed Tesla that it had adjusted the strike price based upon Mr. Musk’s August 7, 2018 Twitter post that he\n\nwas considering taking Tesla private. Tesla disputed JP Morgan’s adjustment as a violation of the parties’ agreement. In 2021,\n\nTesla delivered shares to JP Morgan per the agreement, which they duly accepted. JP Morgan now alleges that it is owed\n\napproximately $162 million as the value of additional shares that it claims should have been delivered as a result of the\n\nadjustment to the strike price in 2018. On January 24, 2022, Tesla filed multiple counterclaims as part of its answer to the\n\nunderlying lawsuit, asserting among other points that JP Morgan should have terminated the stock warrant agreement in 2018\n\nrather than make an adjustment to the strike price that it should have known would lead to a commercially unreasonable result.\n\nTesla believes that the adjustments made by JP Morgan were neither proper nor commercially reasonable, as required under the\n\nstock warrant agreements. JP Morgan filed a motion for judgment on the pleadings, which Tesla opposed, and on September\n\n12, 2024, the Court denied JP Morgan’s motion.\n\n*Certain Derivative Lawsuits in Delaware*\n\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by\n\npurported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly\n\non behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly\n\nTwitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek\n\nunspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters\n\ninto a single case, and a hearing on that motion is scheduled for November 18, 2024.\n\n*Litigation and Investigations Relating to Alleged Discrimination and Harassment*\n\nOn February 9, 2022, the California Civil Rights Department (“CRD,” formerly “DFEH”) filed a civil complaint against\n\nTesla in Alameda County, California Superior Court, alleging systemic race discrimination, hostile work environment and pay\n\nequity claims, among others. CRD’s amended complaint seeks monetary damages and injunctive relief. The case is currently in\n\ndiscovery. Trial is scheduled for September 15, 2025.\n\nAdditionally, on June 1, 2022 the Equal Employment Opportunity Commission (“EEOC”) issued a cause finding against\n\nTesla that closely parallels the CRD’s allegations. On September 28, 2023, the EEOC filed a civil complaint against Tesla in the\n\nUnited States District Court for the Northern District of California asserting claims for race harassment and retaliation and\n\nseeking, among other things, monetary and injunctive relief.\n\nOn June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western\n\nDistrict of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "District of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims\n\nfor breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and\n\ngender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified\n\ndamages payable to Tesla, and attorneys’ fees. On July 22, 2022, the Court consolidated the two cases and on September 6,\n\n2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on\n\nSeptember 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2,\n\n2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the\n\ndefendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to\n\namend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr.\n\nMusk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint.\n\n22", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "matter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11,\n\n2023. On July 14, 2023, plaintiffs filed a notice of appeal. The appeal, which is pending in the United States Court of Appeals\n\nfor the Ninth Circuit, has been fully briefed by the parties, and is scheduled for oral argument on October 25, 2024.\n\nBetween October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery,\n\npurportedly on behalf of Tesla, against Mr. Musk and the members of Tesla’s board of directors, as constituted at relevant\n\ntimes, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits\n\nchallenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have\n\nbeen stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the\n\nU.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla\n\nboard of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in\n\nthe above-referenced consolidated purported stockholder class action.\n\n21", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "District of California. Several similar complaints were also filed in the same court and these cases have now all been\n\nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and\n\nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla\n\ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended\n\ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on\n\nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second\n\nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration\n\norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the\n\nConsolidated Second Amended Complaint.\n\nThe Company intends to vigorously defend itself in these matters; however, we cannot predict the outcome or impact.\n\nWe are unable to reasonably estimate the possible loss or range of loss, if any, associated with these claims, unless noted.\n\n23", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "As of September 30, 2024 and December 31, 2023, the total outstanding balance of MyPower customer notes receivable,\n\nnet of allowance for expected credit losses, was $250 million and $266 million, respectively, of which $5 million was due in the\n\nnext 12 months. As of September 30, 2024 and December 31, 2023, the allowance for expected credit losses was $36 million.\n\n*Concentration of Risk*\n\n*Credit Risk*\n\nFinancial instruments that potentially subject us to a concentration of credit risk consist of cash, cash equivalents,\n\ninvestments, restricted cash, accounts receivable and other finance receivables. Our cash and investments balances are\n\nprimarily on deposit at high credit quality financial institutions or invested in highly rated, investment-grade securities. These\n\ndeposits are typically in excess of insured limits. As of September 30, 2024 and December 31, 2023, no entity represented 10%\n\nor more of our total receivables balance.\n\n*Supply Risk*\n\nWe are dependent on our suppliers, including single source suppliers, and the inability of these suppliers to deliver\n\nnecessary components of our products in a timely manner at prices, quality levels and volumes acceptable to us, or our inability\n\nto efficiently manage these components from these suppliers, could have a material adverse effect on our business, prospects,\n\nfinancial condition and operating results.\n\n*Warranties*\n\nAccrued warranty activity consisted of the following (in millions):\n\n**Three Months Ended September 30, Nine Months Ended September 30,**\n\n**2024 2023 2024 2023**\n\nAccrued warranty - beginning of period $ 5,795 $ 4,465 $ 5,152 $ 3,505\n\nWarranty costs incurred (380) (335) (1,048) (911)\n\nNet changes in liability for pre-existing warranties,\n\nincluding expirations and foreign exchange impact 231 15 295 426\n\nProvision for warranty 717 577 1,964 1,702\n\nAccrued warranty - end of period $ 6,363 $ 4,722 $ 6,363 $ 4,722\n\n*Recent Accounting Pronouncements*\n\n*Recently issued accounting pronouncements not yet adopted*\n\nIn November 2023, the Financial Accounting Standards Board (“FASB”) issued Accounting Standards Update (“ASU”)\n\nNo. 2023-07, Improvements to Reportable Segment Disclosures (Topic 280). This ASU updates reportable segment disclosure\n\nrequirements by requiring disclosures of significant reportable segment expenses that are regularly provided to the Chief\n\nOperating Decision Maker (“CODM”) and included within each reported measure of a segment's profit or loss. This ASU also\n\nrequires disclosure of the title and position of the individual identified as the CODM and an explanation of how the CODM\n\nuses the reported measures of a segment’s profit or loss in assessing segment performance and deciding how to allocate\n\nresources. The ASU is effective for annual periods beginning after December 15, 2023, and interim periods within fiscal years\n\nbeginning after December 15, 2024. Adoption of the ASU should be applied retrospectively to all prior periods presented in the\n\nfinancial statements. Early adoption is also permitted. This ASU will likely result in us including the additional required\n\ndisclosures when adopted. We are currently evaluating the provisions of this ASU and expect to adopt them for the year ending\n\nDecember 31, 2024.\n\n14", - "page_start": 18, - "page_end": 18, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "##### **ITEM 2. MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF**\n\n##### **OPERATIONS**\n\n*The following discussion and analysis should be read in conjunction with the consolidated financial statements and the*\n\n*related notes included elsewhere in this Quarterly Report on Form 10-Q.*\n\n##### **Overview**\n\nOur mission is to accelerate the world’s transition to sustainable energy. We design, develop, manufacture, lease and sell\n\nhigh-performance fully electric vehicles, solar energy generation systems and energy storage products. We also offer\n\nmaintenance, installation, operation, charging, insurance, financial and other services related to our products. Additionally, we\n\nare increasingly focused on products and services based on AI, robotics and automation.\n\nIn 2024, we produced approximately 1,314,000 consumer vehicles and delivered approximately 1,294,000 consumer\n\nvehicles through the third quarter. We are focused on profitable growth, including by leveraging existing factories and\n\nproduction lines to introduce new and more affordable products, further improving and deploying our FSD capabilities,\n\nincluding through our planned robotaxi product, reducing costs, increasing vehicle production, utilized capacity and delivery\n\ncapabilities, improving and developing our vehicles and battery technologies, vertically integrating and localizing our supply\n\nchain, and expanding our global infrastructure, including our service and charging infrastructure.\n\nIn 2024, we deployed 20.41 GWh of energy storage products through the third quarter. We are focused on ramping the\n\nproduction and increasing the market penetration of our energy storage products.\n\nDuring the three and nine months ended September 30, 2024, we recognized total revenues of $25.18 billion and\n\n$71.98 billion, respectively, representing increases of $1.83 billion and $377 million, respectively, compared to the same\n\nperiods in the prior year. During the three and nine months ended September 30, 2024, our net income attributable to common\n\nstockholders was $2.17 billion and $4.77 billion, respectively, representing an increase of $314 million and a decrease of $2.30\n\nbillion, respectively, compared to the same periods in the prior year. We continue to ramp production and build and optimize\n\nour manufacturing capacity, expand our operations while focusing on further cost reductions and operational efficiencies to\n\nenable increased deliveries and deployments of our products, and invest in research and development to accelerate our AI,\n\nsoftware, and fleet-based profits for further revenue growth.\n\nWe ended the third quarter of 2024 with $33.65 billion in cash and cash equivalents and investments, representing an\n\nincrease of $4.55 billion from the end of 2023. Our cash flows provided by operating activities were $10.11 billion during the\n\nnine months ended September 30, 2024, compared to $8.89 billion during the same period ended September 30, 2023,\n\nrepresenting an increase of $1.22 billion. Capital expenditures amounted to $8.56 billion during the nine months ended\n\nSeptember 30, 2024, compared to $6.59 billion during the same period ended September 30, 2023, representing an increase of\n\n$1.96 billion. Overall growth has allowed our business to generally fund itself, and we will continue investing in a number of\n\ncapital-intensive projects and research and development in upcoming periods.\n\n##### **Management Opportunities, Challenges and Uncertainties and 2024 Outlook**\n\n*Automotive—Production*\n\nThe following is a summary of the status of production of each of our announced vehicle models in production and\n\nunder development, as of the date of this Quarterly Report on Form 10-Q:\n\n**Production Location Vehicle Model(s) Production Status**\n\nFremont Factory Model S / Model X Active\n\nModel 3 / Model Y Active\n\nGigafactory Shanghai Model 3 / Model Y Active\n\nGigafactory Berlin-Brandenburg Model Y Active\n\nGigafactory Texas Model Y Active", - "page_start": 31, - "page_end": 31, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "##### **PART I. FINANCIAL INFORMATION**\n\n##### **ITEM 1. FINANCIAL STATEMENTS**\n\n##### **Tesla, Inc.**\n\n##### **Consolidated Balance Sheets**\n\n##### **(in millions, except per share data)**\n\n##### **(unaudited)**\n\n**September 30,**\n\n**2024**\n\n**December 31,**\n\n**2023**\n\n**Assets**\n\nCurrent assets\n\nCash and cash equivalents $ 18,111 $ 16,398\n\nShort-term investments 15,537 12,696\n\nAccounts receivable, net 3,313 3,508\n\nInventory 14,530 13,626\n\nPrepaid expenses and other current assets 4,888 3,388\n\nTotal current assets 56,379 49,616\n\nOperating lease vehicles, net 5,380 5,989\n\nSolar energy systems, net 5,040 5,229\n\nProperty, plant and equipment, net 36,116 29,725\n\nOperating lease right-of-use assets 4,867 4,180\n\nDigital assets, net 184 184\n\nIntangible assets, net 158 178\n\nGoodwill 253 253\n\nDeferred tax assets 6,486 6,733\n\nOther non-current assets 4,989 4,531\n\n**Total assets** $ 119,852 $ 106,618\n\n**Liabilities**\n\nCurrent liabilities\n\nAccounts payable $ 14,654 $ 14,431\n\nAccrued liabilities and other 10,601 9,080\n\nDeferred revenue 3,031 2,864\n\nCurrent portion of debt and finance leases 2,291 2,373\n\nTotal current liabilities 30,577 28,748\n\nDebt and finance leases, net of current portion 5,405 2,857\n\nDeferred revenue, net of current portion 3,350 3,251\n\nOther long-term liabilities 9,810 8,153\n\n**Total liabilities** 49,142 43,009\n\nCommitments and contingencies (Note 10)\n\nRedeemable noncontrolling interests in subsidiaries 70 242\n\n**Equity**\n\nStockholders’ equity\n\nPreferred stock; $0.001 par value; 100 shares authorized; no shares issued and outstanding — —\n\nCommon stock; $0.001 par value; 6,000 shares authorized; 3,207 and 3,185 shares issued and\n\noutstanding as of September 30, 2024 and December 31, 2023, respectively 3 3\n\nAdditional paid-in capital 37,286 34,892\n\nAccumulated other comprehensive loss (14) (143)\n\nRetained earnings 32,656 27,882\n\nTotal stockholders’ equity 69,931 62,634\n\nNoncontrolling interests in subsidiaries 709 733\n\n**Total liabilities and equity** $ 119,852 $ 106,618\n\nThe accompanying notes are an integral part of these consolidated financial statements. 4\n\n5 sur 49 6 sur 49", - "page_start": 4, - "page_end": 4, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "tesla_form_10q.pdf", - "query": "Where was Tesla incorporated? ", - "target_page": 13, - "target_passage": "State of Delaware", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "##### * **Legal Proceedings** *\n\n*Litigation Relating to 2018 CEO Performance Award*\n\nOn June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of\n\nChancery against Elon Musk and the members of Tesla’s board of directors as then constituted, alleging corporate waste, unjust\n\nenrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan\n\nawarded to Elon Musk in 2018 (the “2018 CEO Performance Award”). Trial was held November 14-18, 2022. On January 30,\n\n2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff’s counsel filed\n\na brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June\n\n7, 2024, and a hearing was held on July 8, 2024. At Tesla’s 2024 Annual Meeting of Stockholders, 72% of the disinterested\n\nvoting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance\n\nAward. On June 28, 2024, because Tesla’s disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr.\n\nMusk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court’s January 30, 2024 opinion,\n\nand a hearing was held on August 2, 2024.\n\n*Litigation Related to Directors’ Compensation*\n\nOn June 17, 2020, a purported Tesla stockholder filed a derivative action in the Delaware Court of Chancery,\n\npurportedly on behalf of Tesla, against certain of Tesla’s current and former directors regarding compensation awards granted\n\nto Tesla’s directors, other than Elon Musk, between 2017 and 2020. The suit asserts claims for breach of fiduciary duty and\n\nunjust enrichment and seeks declaratory and injunctive relief, unspecified damages and other relief. Defendants filed their\n\nanswer on September 17, 2020.\n\nOn July 14, 2023, the parties filed a Stipulation and Agreement of Compromise and Settlement, which does not involve\n\nan admission of any wrongdoing by any party. If the settlement is approved by the Court, this action will be fully settled and\n\ndismissed with prejudice. Pursuant to the terms of the agreement, Tesla provided notice of the proposed settlement to\n\nstockholders of record as of July 14, 2023. The Court held a hearing regarding the settlement on October 13, 2023, after which\n\nit took the settlement and plaintiff counsels’ fee request under advisement. On August 14, 2024, the parties submitted a joint\n\nletter requesting that the Court approve and enter final judgment with respect to the settlement, and decide the fee request at a\n\nlater date. The settlement is not expected to have an adverse impact on our results of operations, cash flows or financial\n\nposition.\n\n*Litigation Relating to Potential Going Private Transaction*\n\nBetween August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and\n\nElon Musk in connection with Mr. Musk’s August 7, 2018 Twitter post that he was considering taking Tesla private. On\n\nJanuary 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of\n\nCalifornia and added as defendants the members of Tesla’s board of directors. The consolidated complaint asserts claims for\n\nviolations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of\n\na class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3,\n\n2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a\n\nmatter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11,", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "District of California. Several similar complaints were also filed in the same court and these cases have now all been\n\nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and\n\nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla\n\ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended\n\ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on\n\nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second\n\nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration\n\norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the\n\nConsolidated Second Amended Complaint.\n\nThe Company intends to vigorously defend itself in these matters; however, we cannot predict the outcome or impact.\n\nWe are unable to reasonably estimate the possible loss or range of loss, if any, associated with these claims, unless noted.\n\n23", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "On October 21, 2022, a lawsuit was filed in the Delaware Court of Chancery by a purported shareholder of Tesla\n\nalleging, among other things, that board members breached their fiduciary duties in connection with their oversight of the\n\nCompany’s 2018 settlement with the SEC, as amended. Among other things, the plaintiff seeks reforms to the Company’s\n\ncorporate governance and internal procedures, unspecified damages, and attorneys’ fees. The lawsuit has been stayed pending\n\nresolution of a motion to consolidate certain derivative lawsuits in the Delaware Court of Chancery referenced below.\n\nOn November 15, 2021, JPMorgan Chase Bank (“JP Morgan”) filed a lawsuit against Tesla in the Southern District of\n\nNew York alleging breach of a stock warrant agreement that was entered into as part of a convertible notes offering in 2014. In\n\n2018, JP Morgan informed Tesla that it had adjusted the strike price based upon Mr. Musk’s August 7, 2018 Twitter post that he\n\nwas considering taking Tesla private. Tesla disputed JP Morgan’s adjustment as a violation of the parties’ agreement. In 2021,\n\nTesla delivered shares to JP Morgan per the agreement, which they duly accepted. JP Morgan now alleges that it is owed\n\napproximately $162 million as the value of additional shares that it claims should have been delivered as a result of the\n\nadjustment to the strike price in 2018. On January 24, 2022, Tesla filed multiple counterclaims as part of its answer to the\n\nunderlying lawsuit, asserting among other points that JP Morgan should have terminated the stock warrant agreement in 2018\n\nrather than make an adjustment to the strike price that it should have known would lead to a commercially unreasonable result.\n\nTesla believes that the adjustments made by JP Morgan were neither proper nor commercially reasonable, as required under the\n\nstock warrant agreements. JP Morgan filed a motion for judgment on the pleadings, which Tesla opposed, and on September\n\n12, 2024, the Court denied JP Morgan’s motion.\n\n*Certain Derivative Lawsuits in Delaware*\n\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by\n\npurported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly\n\non behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly\n\nTwitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek\n\nunspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters\n\ninto a single case, and a hearing on that motion is scheduled for November 18, 2024.\n\n*Litigation and Investigations Relating to Alleged Discrimination and Harassment*\n\nOn February 9, 2022, the California Civil Rights Department (“CRD,” formerly “DFEH”) filed a civil complaint against\n\nTesla in Alameda County, California Superior Court, alleging systemic race discrimination, hostile work environment and pay\n\nequity claims, among others. CRD’s amended complaint seeks monetary damages and injunctive relief. The case is currently in\n\ndiscovery. Trial is scheduled for September 15, 2025.\n\nAdditionally, on June 1, 2022 the Equal Employment Opportunity Commission (“EEOC”) issued a cause finding against\n\nTesla that closely parallels the CRD’s allegations. On September 28, 2023, the EEOC filed a civil complaint against Tesla in the\n\nUnited States District Court for the Northern District of California asserting claims for race harassment and retaliation and\n\nseeking, among other things, monetary and injunctive relief.\n\nOn June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western\n\nDistrict of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "*Other Litigation Related to Our Products and Services*\n\nWe are also subject to various lawsuits that seek monetary and other injunctive relief. These lawsuits include proposed\n\nclass actions and other consumer claims that allege, among other things, purported defects and misrepresentations related to our\n\nproducts and services. For example, on September 14, 2022, a proposed class action was filed against Tesla, Inc. and related\n\nentities in the U.S. District Court for the Northern District of California, alleging various claims about the Company’s driver\n\nassistance technology systems under state and federal law. This case was later consolidated with several other proposed class\n\nactions, and a Consolidated Amended Complaint was filed on October 28, 2022, which seeks damages and other relief on\n\nbehalf of all persons who purchased or leased from Tesla between January 1, 2016, to the present. On October 5, 2022, a\n\nproposed class action complaint was filed in the U.S. District Court for the Eastern District of New York asserting similar state\n\nand federal law claims against the same defendants. On September 30, 2023, the Court dismissed this action with leave to\n\namend the complaint. On November 20, 2023, the plaintiff moved to amend the complaint, which Tesla opposed. On August 8,\n\n2024, the Court denied the plaintiff’s motion for leave to file an amended complaint and entered judgment for Tesla. On\n\nSeptember 5, 2024, the plaintiff filed a notice of appeal to United States Court of Appeals for the Second Circuit. On March 22,\n\n2023, the plaintiffs in the Northern District of California consolidated action filed a motion for a preliminary injunction to order\n\nTesla to (1) cease using the term “Full Self-Driving Capability” (FSD Capability), (2) cease the sale and activation of FSD\n\nCapability and deactivate FSD Capability on Tesla vehicles, and (3) provide certain notices to consumers about proposed court-\n\nfindings about the accuracy of the use of the terms Autopilot and FSD Capability. Tesla opposed the motion. On September 30,\n\n2023, the Court denied the request for a preliminary injunction, compelled four of five plaintiffs to arbitration, and dismissed\n\nthe claims of the fifth plaintiff with leave to amend the complaint. On October 31, 2023, the remaining plaintiff in the Northern\n\nDistrict of California action filed an amended complaint, which Tesla moved to dismiss, and on May 15, 2024, the Court\n\ngranted in part and denied in part Tesla’s motion. On October 2, 2023, a similar proposed class action was filed in San Diego\n\nCounty Superior Court in California. Tesla subsequently removed the San Diego County case to federal court and on January 8,\n\n2024, the federal court granted Tesla’s motion to transfer the case to the U.S. District Court for the Northern District of\n\nCalifornia. Tesla moved to compel arbitration, which the plaintiff did not oppose, and on June 27, 2024, the Court stayed the\n\ncase pending arbitration.\n\nOn February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California\n\nagainst Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants\n\nmade material misrepresentations and omissions about the Company’s Autopilot and FSD Capability technologies and seeks\n\nmoney damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17,\n\n2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On\n\nNovember 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla’s motion\n\nto dismiss without prejudice.\n\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern\n\nDistrict of California. Several similar complaints were also filed in the same court and these cases have now all been", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "matter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11,\n\n2023. On July 14, 2023, plaintiffs filed a notice of appeal. The appeal, which is pending in the United States Court of Appeals\n\nfor the Ninth Circuit, has been fully briefed by the parties, and is scheduled for oral argument on October 25, 2024.\n\nBetween October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery,\n\npurportedly on behalf of Tesla, against Mr. Musk and the members of Tesla’s board of directors, as constituted at relevant\n\ntimes, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits\n\nchallenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have\n\nbeen stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the\n\nU.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla\n\nboard of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in\n\nthe above-referenced consolidated purported stockholder class action.\n\n21", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Fremont Factory Model S / Model X Active\n\nModel 3 / Model Y Active\n\nGigafactory Shanghai Model 3 / Model Y Active\n\nGigafactory Berlin-Brandenburg Model Y Active\n\nGigafactory Texas Model Y Active\n\nCybertruck Active\n\nGigafactory Nevada Tesla Semi Pilot production\n\nVarious Next Generation Platform In development\n\nTBD Roadster In development\n\n26", - "page_start": 31, - "page_end": 31, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "District of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims\n\nfor breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and\n\ngender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified\n\ndamages payable to Tesla, and attorneys’ fees. On July 22, 2022, the Court consolidated the two cases and on September 6,\n\n2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on\n\nSeptember 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2,\n\n2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the\n\ndefendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to\n\namend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr.\n\nMusk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint.\n\n22", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "We are focused on growing our manufacturing capacity, which includes capacity for manufacturing newer vehicle\n\nmodels such as our Cybertruck, Tesla Semi and future vehicles utilizing aspects of our next generation platform, and ramping\n\nthe production at our Gigafactories to their installed production capacities as well as increasing production rate and efficiency\n\nat our current factories. The next phase of production growth will depend on the continued ramp at our factories and be initiated\n\nby advances in autonomy and the introduction of new products, including those built on our next generation vehicle platform,\n\nas well as our ability to add to our available sources of battery cell supply by manufacturing our own cells that we are\n\ndeveloping to have high-volume output, lower capital and production costs and longer range. Our goals are to improve vehicle\n\nperformance, decrease production costs and increase affordability and customer awareness.\n\nThese plans are subject to uncertainties inherent in establishing and ramping manufacturing operations, which may be\n\nexacerbated by new product and manufacturing technologies we introduce, the number of concurrent international projects, any\n\nindustry-wide component constraints, labor shortages and any future impact from events outside of our control. For example,\n\nduring the first quarter of 2024, we experienced a sequential decline in production volumes partially caused by the early phase\n\nof the production ramp of the updated Model 3 at our Fremont factory, and factory shutdowns at Gigafactory Berlin-\n\nBrandenburg resulting from shipping diversions caused by the Red Sea conflict and an arson attack. Moreover, we have set\n\nambitious technological targets with our plans for battery cells as well as for iterative manufacturing and design improvements\n\nfor our vehicles with each new factory.\n\n*Automotive—Demand, Sales, Deliveries and Infrastructure*\n\nOur cost reduction efforts, cost innovation strategies, and additional localized procurement and manufacturing are key to\n\nour vehicles’ affordability and have allowed us to competitively price our vehicles. We will also continue to generate demand\n\nby improving our vehicles’ performance and functionality, including through product offerings and features based on artificial\n\nintelligence such as Autopilot, FSD (Supervised), and other software, and delivering new vehicles and vehicle options. In\n\naddition, we have been increasing awareness, and expanding our vehicle financing programs, including attractive leasing terms\n\nfor our customers. Moreover, we expect to continue to benefit from ongoing electrification of the automotive sector and\n\nincreasing environmental regulations and initiatives.\n\nHowever, we operate in a cyclical industry that is sensitive to shifting consumer trends, political and regulatory\n\nuncertainty, including with respect to trade and the environment, all of which can be compounded by inflationary pressures,\n\nrising energy prices, interest rate fluctuations and the liquidity of enterprise customers. For example, as inflationary pressures\n\nincreased across the markets in which we operate, central banks in developed countries raised interest rates rapidly and\n\nsubstantially, which impacted the affordability of vehicle lease and finance arrangements. Further, sales of vehicles in the\n\nautomotive industry also tend to be cyclical in many markets, which may expose us to increased volatility as we expand and\n\nadjust our operations. Moreover, as additional competitors enter the marketplace and help bring the world closer to sustainable\n\ntransportation, we will have to adjust and continue to execute well to maintain our momentum. Additionally, our suppliers’\n\nliquidity and allocation plans may be affected by current challenges in the North American automotive industry, which could\n\nreduce our access to components or result in unfavorable changes to cost. These macroeconomic and industry trends have had,", - "page_start": 33, - "page_end": 33, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "##### **General**\n\nShenandoah Telecommunications Company is a diversified telecommunications company providing both regulated and unregulated telecommunications services through its nine wholly owned subsidiaries. These subsidiaries provide local exchange telephone services, wireless personal communications services (PCS), as well as cable television, paging, Internet access, long distance, fiber optics facilities, and leased tower facilities. The Company is the exclusive provider of wireless mobility communications network products and services under the Sprint brand from Harrisonburg, Virginia to Harrisburg, York and Altoona, Pennsylvania. The Company refers to the Hagerstown, Maryland; Martinsburg, West Virginia; and Harrisonburg and Winchester, Virginia markets as its Quad State markets. The Company refers to the Altoona, Harrisburg, and York, Pennsylvania markets as its Central Penn markets. Competitive local exchange carrier (CLEC) services were established on a limited basis during 2002. In addition, the Company sells and leases equipment, mainly related to services it provides, and also participates in emerging services and technologies by direct investment in non-affiliated companies.\n\nThe Company reports revenues as wireless, wireline and other revenues. These revenue classifications are defined as follows: Wireless revenues are made up of the Personal Communications Company (a PCS Affiliate of Sprint), and the Mobile Company. Wireline revenues include the following subsidiary revenues in the financial results: Telephone Company, Network Company, Cable Television Company, and the Long Distance Company. Other revenues are comprised of the revenues of ShenTel Service Company, the Leasing Company, ShenTel Communications Company and the Holding Company. For additional information on the Company's business segments, see Note 14 to audited consolidated financial statements appearing elsewhere in this report.\n\nThe Company participates in the telecommunications industry, which requires substantial investment in fixed assets or plant. This significant capital requirement may preclude profitability during the initial years of operation. The strategy of the Company is to grow and diversify the business by adding services and geographic areas that can leverage the existing plant, but to do so within the opportunities and constraints presented by the industry. For many years the Company focused on reducing reliance on the regulated telephone operation, which up until 1981 was the primary business within the Company. This initial diversification was concentrated in other wireline businesses, such as the cable television and regional fiber facility businesses, but in 1990 the Company made its first significant investment in the wireless sector through its former investment in the Virginia 10 RSA Limited partnership. By 1998, revenues of the regulated telephone operation had decreased to 59.2% of total revenues. In that same year more than 76.6% of the Company’s total revenue was generated by wireline operations, and initiatives were already underway to make wireless a more significant contributor to total revenues.", - "page_start": 40, - "page_end": 40, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "NISSAN 180 plan, we will support the global\n\nInfiniti expansion and other geographic growth,\n\nincluding developing financial products for the\n\nlight commercial vehicle market.”\n\nSTEVEN R. LAMBERT\n\nPresident and CEO\n\nNissan Motor\n\nAcceptance Corporation", - "page_start": 30, - "page_end": 30, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "tesla_form_10q.pdf", - "query": "What is the reason for the increase in Tesla's tax rate from 2023 to 2024?", - "target_page": 26, - "target_passage": " increase in our effective tax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in the mix of our jurisdictional earnings", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "##### * **Legal Proceedings** *\n\n*Litigation Relating to 2018 CEO Performance Award*\n\nOn June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of\n\nChancery against Elon Musk and the members of Tesla’s board of directors as then constituted, alleging corporate waste, unjust\n\nenrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan\n\nawarded to Elon Musk in 2018 (the “2018 CEO Performance Award”). Trial was held November 14-18, 2022. On January 30,\n\n2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff’s counsel filed\n\na brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June\n\n7, 2024, and a hearing was held on July 8, 2024. At Tesla’s 2024 Annual Meeting of Stockholders, 72% of the disinterested\n\nvoting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance\n\nAward. On June 28, 2024, because Tesla’s disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr.\n\nMusk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court’s January 30, 2024 opinion,\n\nand a hearing was held on August 2, 2024.\n\n*Litigation Related to Directors’ Compensation*\n\nOn June 17, 2020, a purported Tesla stockholder filed a derivative action in the Delaware Court of Chancery,\n\npurportedly on behalf of Tesla, against certain of Tesla’s current and former directors regarding compensation awards granted\n\nto Tesla’s directors, other than Elon Musk, between 2017 and 2020. The suit asserts claims for breach of fiduciary duty and\n\nunjust enrichment and seeks declaratory and injunctive relief, unspecified damages and other relief. Defendants filed their\n\nanswer on September 17, 2020.\n\nOn July 14, 2023, the parties filed a Stipulation and Agreement of Compromise and Settlement, which does not involve\n\nan admission of any wrongdoing by any party. If the settlement is approved by the Court, this action will be fully settled and\n\ndismissed with prejudice. Pursuant to the terms of the agreement, Tesla provided notice of the proposed settlement to\n\nstockholders of record as of July 14, 2023. The Court held a hearing regarding the settlement on October 13, 2023, after which\n\nit took the settlement and plaintiff counsels’ fee request under advisement. On August 14, 2024, the parties submitted a joint\n\nletter requesting that the Court approve and enter final judgment with respect to the settlement, and decide the fee request at a\n\nlater date. The settlement is not expected to have an adverse impact on our results of operations, cash flows or financial\n\nposition.\n\n*Litigation Relating to Potential Going Private Transaction*\n\nBetween August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and\n\nElon Musk in connection with Mr. Musk’s August 7, 2018 Twitter post that he was considering taking Tesla private. On\n\nJanuary 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of\n\nCalifornia and added as defendants the members of Tesla’s board of directors. The consolidated complaint asserts claims for\n\nviolations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of\n\na class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3,\n\n2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a\n\nmatter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11,", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Gross margin for total automotive increased from 18.7% to 20.1% in the three months ended September 30, 2024 as\n\ncompared to the three months ended September 30, 2023 primarily due to lower average combined cost per unit of our vehicles,\n\nan increase in FSD revenue and an increase in regulatory credits revenue, partially offset by lower average selling price on our\n\nvehicles, as discussed above.\n\nGross margin for total automotive decreased from 19.7% to 19.0% in the nine months ended September 30, 2024 as\n\ncompared to the nine months ended September 30, 2023 primarily due to lower average selling price on our vehicles and\n\ntemporary under-utilization of manufacturing capacity during production ramps, partially offset by lower average combined\n\ncost per unit of our vehicles, an increase in regulatory credits revenue and an increase in FSD revenue, as discussed above.\n\nGross margin for total automotive & services and other segment increased from 17.4% to 18.7% in the three months\n\nended September 30, 2024 as compared to the three months ended September 30, 2023. Gross margin for total automotive &\n\nservices and other segment decreased from 18.5% to 17.6% in the nine months ended September 30, 2024 as compared to the\n\nnine months ended September 30, 2023. The changes in gross margin are primarily due to the automotive gross margin factors\n\ndiscussed above.\n\n*Energy Generation and Storage Segment*\n\nCost of energy generation and storage revenue increased $473 million, or 40%, in the three months ended September 30,\n\n2024 as compared to the three months ended September 30, 2023. Cost of energy generation and storage revenue increased\n\n$1.39 billion, or 37%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30,\n\n2023. The increases in cost of revenues were primarily due to increases in Megapack and Powerwall deployments, partially\n\noffset by increases in IRA manufacturing credits recognized as compared to the prior periods.\n\nGross margin for energy generation and storage increased from 24.4% to 30.5% in the three months ended\n\nSeptember 30, 2024 as compared to the three months ended September 30, 2023. Gross margin for energy generation and\n\nstorage increased from 18.0% to 26.6% in the nine months ended September 30, 2024 as compared to the nine months ended\n\nSeptember 30, 2023. The increases were primarily due to margin improvements for our energy storage products driven by cost\n\nreductions, including benefits from IRA manufacturing credits, and a higher proportion of our storage business, which operated\n\nat a higher gross margin, within the segment as compared to the prior periods.\n\n##### * **Research and Development Expense** *\n\n**Three Months Ended**\n\n**September 30, Change**\n\n**Nine Months Ended**\n\n**September 30, Change**\n\n(Dollars in millions) **2024 2023 $ % 2024 2023 $ %**\n\nResearch and development $ 1,039 $ 1,161 $ (122) (11)% $ 3,264 $ 2,875 $ 389 14 %\n\nAs a percentage of revenues 4 % 5 % 5 % 4 %\n\nResearch and development (“R&D”) expenses decreased $122 million, or 11%, in the three months ended September 30,\n\n2024 as compared to the three months ended September 30, 2023 primarily due to a decrease in vehicle programs, partially\n\noffset by an increase in AI related costs year over year. R&D expenses as a percentage of revenue decreased from 5% to 4% in\n\nthe three months ended September 30, 2024 as compared to the three months ended September 30, 2023 primarily due to lower\n\nR&D expenses in the current period.\n\nR&D expenses increased $389 million, or 14%, in the nine months ended September 30, 2024 as compared to the nine\n\nmonths ended September 30, 2023. The overall increases were primarily driven by additional costs year over year related to AI\n\nprograms. R&D expenses as a percentage of revenue increased from 4% to 5% in the nine months ended September 30, 2024\n\nas compared to the nine months ended September 30, 2023 as we continue to expand our product roadmap and technologies.", - "page_start": 39, - "page_end": 39, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "##### **Note 8 - Equity Incentive Plans**\n\n##### **Other Performance-Based Grants**\n\nFrom time to time, the Compensation Committee of our Board of Directors grants certain employees performance-based\n\nrestricted stock units and stock options.\n\nAs of September 30, 2024, we had unrecognized stock-based compensation expense of $487 million under these grants\n\nto purchase or receive an aggregate 4.9 million shares of our common stock. For awards probable of achievement, we estimate\n\nthe unrecognized stock-based compensation expense of $457 million will be recognized over a weighted-average period of 4.3\n\nyears.\n\nFor the three and nine months ended September 30, 2024 and 2023, stock-based compensation expense related to these\n\ngrants, net of forfeitures, were immaterial.\n\n##### **Summary Stock-Based Compensation Information**\n\nThe following table summarizes our stock-based compensation expense by line item in the consolidated statements of\n\noperations (in millions):\n\n**Three Months Ended September 30, Nine Months Ended September 30,**\n\n**2024 2023 2024 2023**\n\nCost of revenues $ 184 $ 181 $ 566 $ 554\n\nResearch and development 191 189 572 491\n\nSelling, general and administrative 82 95 280 283\n\nRestructuring and other — — 2 —\n\nTotal $ 457 $ 465 $ 1,420 $ 1,328\n\n##### **Note 9 - Income Taxes**\n\nOur effective tax rate was 22% and 23% for the three and nine months ended September 30, 2024, respectively,\n\ncompared to 8% and 10% for the three and nine months ended September 30, 2023, respectively. The increase in our effective\n\ntax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter\n\nof 2023 and changes in the mix of our jurisdictional earnings.\n\nOur effective tax rates for the three and nine months of 2024 and 2023 as compared to the U.S. federal statutory rate of\n\n21% were primarily impacted by the mix of our jurisdictional earnings subject to different tax rates, valuation allowances on\n\nour deferred tax assets and benefits from our U.S. tax credits and the Inflation Reduction Act of 2022 (“IRA”) manufacturing\n\ncredits.\n\nWe are subject to tax examinations in the U.S. federal, state and foreign jurisdictions. Given the uncertainty in timing\n\nand outcome of our tax examinations, an estimate of the range of the reasonably possible change in gross unrecognized tax\n\nbenefits within twelve months cannot be made at this time.\n\n##### **Note 10 - Commitments and Contingencies**\n\n##### * **Operating Lease Arrangements in Buffalo, New York and Shanghai, China** *\n\nFor a description of our operating lease arrangements in Buffalo, New York, and Shanghai, China, refer to Note 15,\n\n*Commitments and Contingencies* , in our Annual Report on Form 10-K for the year ended December 31, 2023. As of\n\nSeptember 30, 2024, we expect to meet the requirements under these arrangements, as may be modified from time to time,\n\nbased on our current and anticipated level of operations.\n\n20", - "page_start": 25, - "page_end": 25, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "Our provision for income taxes increased by $434 million in the three months ended September 30, 2024 and increased\n\nby $652 million in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30,\n\n2023, respectively. Our effective tax rate increased from 8% to 22% in the three months ended September 30, 2024 and\n\nincreased from 10% to 23% in the nine months ended September 30, 2024 as compared to the three and nine months ended\n\nSeptember 30, 2023, respectively. These increases are primarily due to the impact of releasing the valuation allowance on our\n\nU.S. deferred tax assets in the fourth quarter of 2023 and changes in mix of jurisdictional earnings.\n\nSee Note 9, *Income Taxes* , to the consolidated financial statements included elsewhere in this Quarterly Report on Form\n\n10-Q for further details.\n\n##### **Liquidity and Capital Resources**\n\nWe expect to continue to generate net positive operating cash flow as we have done in the last five fiscal years. The cash\n\nwe generate from our core operations enables us to fund ongoing operations and production, our research and development\n\nprojects for new products and technologies including our proprietary battery cells, additional manufacturing ramps at existing\n\nmanufacturing facilities, the construction of future factories, and the continued expansion of our retail and service locations,\n\nbody shops, Mobile Service fleet, Supercharger, including to support NACS, energy product installation capabilities and\n\nautonomy and other artificial intelligence enabled products.\n\nIn addition, because a large portion of our future expenditures will be to fund our growth, we expect that if needed we\n\nwill be able to adjust our capital and operating expenditures by operating segment. For example, if our near-term manufacturing\n\noperations decrease in scale or ramp more slowly than expected, including due to global economic or business conditions, we\n\nmay choose to correspondingly slow the pace of our capital expenditures. Finally, we continually evaluate our cash needs and\n\nmay decide it is best to raise additional capital or seek alternative financing sources to fund the rapid growth of our business,\n\nincluding through drawdowns on existing or new debt facilities or financing funds. Conversely, we may also from time to time\n\ndetermine that it is in our best interests to voluntarily repay certain indebtedness early.\n\nAccordingly, we believe that our current sources of funds will provide us with adequate liquidity during the 12-month\n\nperiod following September 30, 2024, as well as in the long-term.\n\nSee the sections below for more details regarding the material requirements for cash in our business and our sources of\n\nliquidity to meet such needs.\n\n*Material Cash Requirements*\n\nFrom time to time in the ordinary course of business, we enter into agreements with vendors for the purchase of\n\ncomponents and raw materials to be used in the manufacture of our products. However, due to contractual terms, variability in\n\nthe precise growth curves of our development and production ramps, and opportunities to renegotiate pricing, we generally do\n\nnot have binding and enforceable purchase orders under such contracts beyond the short-term, and the timing and magnitude of\n\npurchase orders beyond such period is difficult to accurately project.\n\nAs discussed in and subject to the considerations referenced in Part I, Item 2, *Management's Discussion and Analysis of*\n\n*Financial Condition and Results of Operations—Management Opportunities, Challenges and Uncertainties and 2024 Outlook*\n\n*—Cash Flow and Capital Expenditure Trends* in this Quarterly Report on Form 10-Q, we currently expect our capital\n\nexpenditures to support our projects globally to exceed $11.00 billion in 2024 and be between $8.00 to $10.00 billion in each of\n\nthe following two fiscal years. We also have certain obligations in connection with our operations at Gigafactory New York and", - "page_start": 42, - "page_end": 42, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "*Energy Generation and Storage Segment*\n\nEnergy generation and storage revenue increased $817 million, or 52%, in the three months ended September 30, 2024\n\nas compared to the three months ended September 30, 2023. Energy generation and storage revenue increased $2.43 billion, or\n\n53%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases\n\nwere primarily due to increases in Megapack and Powerwall deployments compared to the prior periods.\n\n29", - "page_start": 35, - "page_end": 35, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "*Energy Generation and Storage Segment*\n\nEnergy Generation and Storage Sales\n\nWe record as deferred revenue any non-refundable amounts that are collected from customers related to prepayments,\n\nwhich is recognized as revenue ratably over the respective customer contract term. As of September 30, 2024 and\n\nDecember 31, 2023, deferred revenue related to such customer payments amounted to $1.73 billion and $1.60 billion,\n\nrespectively, mainly due to contractual payment terms. Revenue recognized from the deferred revenue balances as of\n\nDecember 31, 2023 and 2022 was $1.09 billion and $511 million for the nine months ended September 30, 2024 and 2023,\n\nrespectively. As of September 30, 2024, total transaction price allocated to performance obligations that were unsatisfied or\n\npartially unsatisfied for contracts with an original expected length of more than one year was $6.61 billion. Of this amount, we\n\nexpect to recognize $4.23 billion in the next 12 months and the rest over the remaining performance obligation period.\n\nWe have financing receivables on our consolidated balance sheets related to loans we provide for financing our energy\n\nproducts. As of September 30, 2024 and December 31, 2023, we had current net financing receivables of $32 million and $31\n\nmillion, respectively, in Accounts receivable, net, and $641 million and $578 million, respectively, in Other non-current assets\n\nfor the long-term portion.\n\n*Income Taxes*\n\nWe are subject to income taxes in the U.S. and in many foreign jurisdictions. Significant judgment is required in\n\ndetermining our provision for income taxes, our deferred tax assets and liabilities and any valuation allowance recorded against\n\nour net deferred tax assets that are not more likely than not to be realized. We monitor the realizability of our deferred tax assets\n\ntaking into account all relevant factors at each reporting period. In completing our assessment of realizability of our deferred\n\ntax assets, we consider our history of income (loss) measured at pre-tax income (loss) adjusted for permanent book-tax\n\ndifferences on a jurisdictional basis, volatility in actual earnings, excess tax benefits related to stock-based compensation in\n\nrecent prior years and impacts of the timing of reversal of existing temporary differences. We also rely on our assessment of the\n\nCompany’s projected future results of business operations, including uncertainty in future operating results relative to historical\n\nresults, volatility in the market price of our common stock and its performance over time, variable macroeconomic conditions\n\nimpacting our ability to forecast future taxable income, and changes in business that may affect the existence and magnitude of\n\nfuture taxable income. Our valuation allowance assessment is based on our best estimate of future results considering all\n\navailable information.\n\nOur provision for or benefit from income taxes for interim periods is determined using an estimate of our annual\n\neffective tax rate, adjusted for discrete items, if any, that are taken into account in the relevant period. Each quarter, we update\n\nour estimate of the annual effective tax rate, and if our estimated tax rate changes, we make a cumulative adjustment.\n\n*Net Income per Share of Common Stock Attributable to Common Stockholders*\n\nThe following table presents the reconciliation of net income attributable to common stockholders to net income used in\n\ncomputing basic and diluted net income per share of common stock (in millions):\n\n**Three Months Ended September 30, Nine Months Ended September 30,**\n\n**2024 2023 2024 2023**\n\nNet income attributable to common stockholders $ 2,167 $ 1,853 $ 4,774 $ 7,069\n\nLess: Buy-outs of noncontrolling interest — 2 (42) (3)\n\nNet income used in computing basic and diluted net\n\nincome per share of common stock $ 2,167 $ 1,851 $ 4,816 $ 7,072\n\n12", - "page_start": 15, - "page_end": 15, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "[ogy/archive/2023/05/ai-advancements-multimodal-models/674113/) from the original on 18](https://web.archive.org/web/20240918022529/https://www.theatlantic.com/technology/archive/2023/05/ai-advancements-multimodal-models/674113/)\n\nSeptember 2024, retrieved 5 October 2024", - "page_start": 65, - "page_end": 65, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Selling, general and administrative (“SG&A”) expenses decreased $67 million, or 5%, in the three months ended\n\nSeptember 30, 2024 as compared to the three months ended September 30, 2023 driven by a $40 million decrease in employee\n\nand labor costs, including professional services and a $32 million decrease in marketing expenses.\n\nSG&A expenses increased $317 million, or 9%, in the nine months ended September 30, 2024 as compared to the nine\n\nmonths ended September 30, 2023 driven by a $168 million increase in employee and labor costs, including professional\n\nservices, and a $153 million increase in facilities related expenses.\n\n##### * **Restructuring and Other** *\n\n**Three Months Ended**\n\n**September 30, Change**\n\n**Nine Months Ended**\n\n**September 30, Change**\n\n(Dollars in millions) **2024 2023 $ % 2024 2023 $ %**\n\nRestructuring and other\n\n$ 55 $ — $ 55\n\nNot\n\nmeaningful $ 677 $ — $ 677\n\nNot\n\nmeaningful\n\nIn the second quarter of 2024, we initiated and substantially completed certain restructuring actions to reduce costs and\n\nimprove efficiency. As a result, we recognized $583 million of employee termination expenses in Restructuring and other in\n\nour consolidated income statement. These expenses were substantially paid with an immaterial accrual remaining in Accrued\n\nliabilities and other in our consolidated balance sheet as of September 30, 2024.\n\n##### * **Interest Income** *\n\n**Three Months Ended**\n\n**September 30, Change**\n\n**Nine Months Ended**\n\n**September 30, Change**\n\n(Dollars in millions) **2024 2023 $ % 2024 2023 $ %**\n\nInterest income $ 429 $ 282 $ 147 52 % $ 1,127 $ 733 $ 394 54 %\n\nInterest income increased $147 million, or 52%, in the three months ended September 30, 2024 and increased $394\n\nmillion, or 54%, in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30,\n\n2023, respectively. The increases were primarily due to higher interest earned on our cash and cash equivalents and short-term\n\ninvestments compared to the prior periods due to increases in our portfolio balance and higher interest rates.\n\n##### * **Other (Expense) Income, Net** *\n\n**Three Months Ended**\n\n**September 30, Change**\n\n**Nine Months Ended**\n\n**September 30, Change**\n\n(Dollars in millions) **2024 2023 $ % 2024 2023 $ %**\n\nOther (expense) income, net $ (270) $ 37 $ (307)\n\nNot\n\nmeaningful $ (142) $ 317 $ (459)\n\nNot\n\nmeaningful\n\nOther (expense) income, net, changed unfavorably by $307 million in the three months ended September 30, 2024 as\n\ncompared to the three months ended September 30, 2023. Other (expense) income, net changed unfavorably by $459 million in\n\nthe nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The unfavorable\n\nchanges were primarily due to fluctuations in foreign currency exchange rates on our intercompany balances. As our\n\nintercompany balances are significant in nature and we do not typically hedge foreign currency risk, we can experience\n\nsignificant fluctuations in foreign currency exchange rate gains and losses from period to period.\n\n##### * **Provision for Income Taxes** *\n\n**Three Months Ended**\n\n**September 30, Change**\n\n**Nine Months Ended**\n\n**September 30, Change**\n\n(Dollars in millions) **2024 2023 $ % 2024 2023 $ %**\n\nProvision for income taxes $ 601 $ 167 $ 434 260% $ 1,403 $ 751 $ 652 87%\n\nEffective tax rate 22 % 8 % 23 % 10 %\n\n32", - "page_start": 41, - "page_end": 41, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "2019 ; Muennighoff , 2022 ) or similarity fine-tuning\n\n( Reimers and Gurevych , 2019 ) using a contrastive\n\nframework ( Gao et al. , 2021 ; Neelakantan et al. ,\n\n2022 ; Ni et al. , 2021 ; Wang et al. , 2022 ; Zhang\n\net al. , 2023 ), leveraging prompts ( Wang et al. , 2023 )\n\nor a two steps training process ( Chen et al. , 2024 ;\n\nLee et al. , 2024 ). Few French-language models\n\nhave been proposed in the literature ( Martin et al. ,\n\n1\n\narXiv:2405.20468v2 [cs.CL] 17 Jun 2024", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv4.pdf" - }, - { - "text": "##### **Results of Operations**\n\n##### * **Revenues** *\n\n**Three Months Ended**\n\n**September 30, Change**\n\n**Nine Months Ended**\n\n**September 30, Change**\n\n(Dollars in millions) **2024 2023 $ % 2024 2023 $ %**\n\nAutomotive sales $ 18,831 $ 18,582 $ 249 1 % $ 53,821 $ 57,879 $ (4,058) (7)%\n\nAutomotive regulatory credits 739 554 185 33 % 2,071 1,357 714 53 %\n\nAutomotive leasing 446 489 (43) (9)% 1,380 1,620 (240) (15)%\n\nTotal automotive revenues 20,016 19,625 391 2 % 57,272 60,856 (3,584) (6)%\n\nServices and other 2,790 2,166 624 29 % 7,686 6,153 1,533 25 %\n\nTotal automotive & services and other\n\nsegment revenue 22,806 21,791 1,015 5 % 64,958 67,009 (2,051) (3)%\n\nEnergy generation and storage segment\n\nrevenue 2,376 1,559 817 52 % 7,025 4,597 2,428 53 %\n\nTotal revenues $ 25,182 $ 23,350 $ 1,832 8 % $ 71,983 $ 71,606 $ 377 1 %\n\n*Automotive & Services and Other Segment*\n\nAutomotive sales revenue increased $249 million, or 1%, in the three months ended September 30, 2024 as compared to\n\nthe three months ended September 30, 2023, due to an increase of approximately 23,000 combined Model 3 and Model Y cash\n\ndeliveries and an increase of 8,000 deliveries of other models primarily due to our production ramp of Cybertruck.\n\nAdditionally, we recognized $326 million of FSD revenue for Cybertruck and certain features such as Actually Smart Summon\n\nin the third quarter of 2024. The increases were partially offset by lower average selling price on our vehicles driven by overall\n\nprice reductions and attractive financing options provided year over year as well as mix.\n\nAutomotive sales revenue decreased $4.06 billion, or 7%, in the nine months ended September 30, 2024 as compared to\n\nthe nine months ended September 30, 2023, primarily due to lower average selling price on our vehicles driven by overall price\n\nreductions and attractive financing options provided year over year as well as mix. Additionally, there was a decrease of\n\napproximately 17,000 combined Model 3 and Model Y cash deliveries partially due to the early phase of the production ramp\n\nof the updated Model 3 at our Fremont factory. The decreases were partially offset by an increase of approximately 19,000\n\ndeliveries of other models primarily due to our production ramp of Cybertruck and an increase in FSD revenue compared to the\n\nprior period, as discussed above.\n\nAutomotive regulatory credits revenue increased $185 million, or 33%, in the three months ended September 30, 2024\n\nas compared to the three months ended September 30, 2023. Automotive regulatory credits revenue increased $714 million, or\n\n53%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. These\n\nincreases were driven by demand for credits in North America as other automobile manufacturers scale back on their battery\n\nelectric vehicle plans.\n\nAutomotive leasing revenue decreased $43 million, or 9%, in the three months ended September 30, 2024 as compared\n\nto the three months ended September 30, 2023. Automotive leasing revenue decreased $240 million, or 15%, in the nine\n\nmonths ended September 30, 2024 as compared to the nine months ended September 30, 2023. The decreases were primarily\n\ndue to lower direct sales-type leasing deliveries and a decrease in lease buyouts.\n\nServices and other revenue increased $624 million, or 29%, in the three months ended September 30, 2024 as compared\n\nto the three months ended September 30, 2023. Services and other revenue increased $1.53 billion, or 25%, in the nine months\n\nended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases were primarily due to\n\nincreases in non-warranty maintenance services and collision revenue, used vehicle revenue, paid Supercharging revenue,\n\ninsurance services revenue and part sales revenue.\n\n*Energy Generation and Storage Segment*\n\nEnergy generation and storage revenue increased $817 million, or 52%, in the three months ended September 30, 2024", - "page_start": 35, - "page_end": 35, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0764.pdf", - "query": "Which is the first candidate for experimenting the case of electrons interacting with a single boson mode?", - "target_page": 6, - "target_passage": "The primary candidate for such mode is an optical phonon", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "## I. INTRODUCTION\n\nThe nonvanishing neutrino masses have been confirmed by various neutrino oscillation\n\nphenomena and indicate the evidence of new physics beyond the Standard Model. The most\n\nattractive idea to naturally explain the tiny neutrino masses is the seesaw mechanism [1], in\n\nwhich the right-handed (RH) neutrinos singlet under the SM gauge group are introduced.\n\nThe minimal gauged U (1) B − L model based on the gauge group SU (3) C × SU (2) L × U (1) Y × U (1) B − L [2] is an elegant and simple extension of the SM, in which the RH neutrinos of\n\nthree generations are necessarily introduced because of the gauge and gravitational anomaly\n\ncancellations. In addition, the mass of RH neutrinos arises associated with the U (1) B − L\n\ngauge symmetry breaking.\n\nAlthough the scale of the B − L gauge symmetry breaking is basically arbitrary as long as\n\nphenomenological constraints are satisfied, one interesting option is to take it to be the TeV\n\nscale [3]. It has been recently pointed out [4] that when the classical conformal invariance\n\nis imposed on the minimal U (1) B − L model, the symmetry breaking scale appears to be the TeV scale naturally. If this is the case, all new particles, the Z <sup>′</sup> gauge boson, the B − L\n\nHiggs boson H and the RH neutrinos appear at the TeV scale unless the U (1) B − L gauge\n\ncoupling is extremely small, and they can be discovered at Large Hadron Collider [5- 8].\n\nThen we may be able to understand the relation between the gauge symmetry breaking and\n\nthe origin of neutrino masses.\n\nAlthough such a TeV scale model is interesting and appealing, one might think that the\n\nabsence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino\n\nwith mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple\n\nidea to introduce the DM candidate in the minimal gauged U (1) B − L model. We introduce\n\nthe Z 2 parity into the model and impose one of three RH neutrinos to be odd, while the\n\nothers even. In this way, the Z 2 -odd RH neutrino becomes stable and the DM candidate.\n\nNote that two RH neutrinos are enough to reconcile with the observed neutrino oscillation\n\ndata, with a prediction of one massless light neutrino. Therefore, without introducing any\n\nadditional new dynamical degrees of freedom, the DM particle arises in the minimal gauged\n\nU (1) B − L model.\n\nThe paper is organized as follows. In the next section, we briefly describe our model. In\n\nsection III, we estimate the thermal relic density of the RH neutrino and identify the model\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1002.2525.pdf" - }, - { - "text": "0 0.5 1 0\n\n0.5\n\n1\n\nω in eV\n\nσ ( ω )\n\nConductivities (BCSI)\n\nNS\n\nSC\n\n2 ∆\n\n0 50 100 160\n\n180\n\n200\n\nΓ in meV\n\nW K in meV\n\nBCSI\n\nSC\n\nNS\n\nFIG. 4: Top - a conductivity plot for the BCSI case in the\n\npresence of a lattice. The parameters are ∆= 30 meV , Γ =\n\n3 . 5 meV . Bottom - the behavior of Kubo sums. Note that (a)\n\nthe spectral weight in the NS is always greater in the SCS, (b)\n\nthe spectral weight decreases with Γ, and (c) the difference\n\nbetween NS and SCS decreases as Γ increases.\n\nlittle variation of ∆ W ( ω c ) at above 0 . 1 − 0 . 3 eV what\n\nimplies that for larger ω c , ∆ W ( ω c ) ≈ ∆ W K >> ∆ f ( ω c ).\n\nTo make this more quantitative, we compare in Fig. 6\n\n∆ W ( ω c ) obtained for a constant DOS, when ∆ W ( ω c ) =\n\n∆ f ( ω c ), and for the actual lattice dispersion, when\n\n∆ W ( ω c ) = ∆ W K + ∆ f ( ω c ). In the clean limit there\n\nis obviously little cutoff dependence beyond 0 . 1 eV , i.e.,\n\n∆ f ( ω c ) is truly small, and the difference between the\n\ntwo cases is just ∆ W K . In the dirty limit, the situation\n\nis similar, but there is obviously more variation with ω c ,\n\nand ∆ f ( ω c ) becomes truly small only above 0 . 3 eV . Note\n\nalso that the position of the dip in ∆ W ( ω c ) in the clean\n\nlimit is at a larger ω c in the presence of the lattice than\n\nin a continuum.\n\nB. The Einstein boson model\n\nWe next consider the case of electrons interacting with\n\na single boson mode which by itself is not affected by su-\n\nperconductivity. The primary candidate for such mode is\n\nan optical phonon. The imaginary part of the NS self en-\n\nergy has been discussed numerous times in the literature.\n\nWe make one simplifying assumption - approximate the\n\nDOS by a constant in calculating fermionic self-energy.\n\nWe will, however, keep the full lattice dispersion in the\n\ncalculations of the optical integral. The advantage of this\n\n0 0.5 1 0\n\n0.5\n\n1\n\nω c in eV\n\nW( ω c )/W( ∞ )\n\nNormal State Optical Sum (BCSI)\n\nDirty Limit\n\nClean Limit\n\n0 0.5 1 0\n\n0.5\n\n1\n\nω c in eV\n\nW( ω c )/W( ∞ )\n\nSuperconducting State Optical Sum (BCSI)\n\nDirty Limit\n\nClean Limit\n\nFIG. 5: The evolution of optical integral in NS(top) and\n\nSCS(bottom) for BCSI case. Plots are made for clean limit\n\n(solid lines, Γ = 3 . 5 meV ) and dirty limit (dashed lines,\n\nΓ = 150 meV ) for ∆= 30 meV . Observe that (a) W (0) = 0\n\nin the NS, but has a non-zero value in the SCS because of the\n\nδ -function (this value decreases in the dirty limit), and (b)\n\nthe flat region in the SCS is due to the fact that σ <sup>′</sup> ( ω ) = 0 for\n\nΩ < 2∆. Also note that ∼ 90 − 95% of the spectral weight is recovered up to 1 eV\n\napproximation is that the self-energy can be computed\n\nanalytically. The full self-energy obtained with the lat-\n\ntice dispersion is more involved and can only be obtained\n\nnumerically, but its structure is quite similar to the one\n\nobtained with a constant DOS.\n\nThe self-energy for a constant DOS is given by\n\nΣ( iω ) = − <sup>i</sup> 2 π <sup>λ</sup> <sup>n</sup> � dǫ k d ( i Ω) χ ( i Ω) G ( ǫ k , iω + i Ω) (13)\n\nwhere\n\nχ ( i Ω) = ω <sup>2</sup> 0\n\nω <sup>2</sup> 0 <sup>−</sup> <sup>(</sup> <sup>i</sup> <sup>Ω)</sup> <sup>2</sup> (14)\n\nand λ n is a dimensionless electron-boson coupling. Inte-\n\ngrating and transforming to real frequencies, we obtain\n\nΣ <sup>′′</sup> ( ω ) = − <sup>π</sup> 2 <sup>λ</sup> <sup>n</sup> <sup>ω</sup> <sup>o</sup> <sup>Θ(</sup> <sup>|</sup> <sup>ω</sup> <sup>| −</sup> <sup>ω</sup> <sup>o</sup> <sup>)</sup>\n\nΣ <sup>′</sup> ( ω ) = − <sup>1</sup> 2 <sup>λ</sup> <sup>n</sup> <sup>ω</sup> <sup>o</sup> <sup>log</sup> ���� ω + ω o\n\nω − ω o ���� (15)\n\nIn the SCS, we obtain for ω < 0\n\nΣ <sup>′′</sup> ( ω ) = − <sup>π</sup> 2 <sup>λ</sup> <sup>n</sup> <sup>ω</sup> <sup>o</sup> <sup>Re</sup> � ω + ω o\n\n� ( ω + ω o ) <sup>2</sup> − ∆ <sup>2</sup> �", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0764.pdf" - }, - { - "text": "[arXiv:1001.0764v2 [cond-mat.str-el] 13 Jan 2010](http://arxiv.org/abs/1001.0764v2)\n\n## Optical Integral and Sum Rule Violation\n\nSaurabh Maiti, Andrey V. Chubukov\n\nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA\n\n(Dated: November 9, 2018)\n\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in\n\nthe cuprates. We compute conductivities, optical integrals W , and ∆ W between superconducting\n\nand normal states for 2-D systems with lattice dispersion typical of the cuprates for four different\n\nmodels - a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a\n\ncollective boson model with a feedback from superconductivity on a collective boson. The goal of\n\nthe paper is two-fold. First, we analyze the dependence of W on the upper cut-off ( ω c ) placed on\n\nthe optical integral because in experiments W is measured up to frequencies of order bandwidth.\n\nFor a BCS model, the Kubo sum rule is almost fully reproduced at ω c equal to the bandwidth. But\n\nfor other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for\n\n∆ W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign\n\nof ∆ W . In all models we studied ∆ W is positive at small ω c , then crosses zero and approaches a\n\nnegative value at large ω c , i.e. the optical integral in a superconductor is smaller than in a normal\n\nstate. The point of zero crossing, however, increases with the interaction strength and in a collective\n\nboson model becomes comparable to the bandwidth at strong coupling. We argue that this model\n\nexhibits the behavior consistent with that in the cuprates.\n\nI. INTRODUCTION\n\nThe analysis of sum rules for optical conductivity has a long history. Kubo, in an extensive paper <sup>1</sup> in 1957, used\n\na general formalism of a statistical theory of irreversible\n\nprocesses to investigate the behavior of the conductivity\n\nin electronic systems. For a system of interacting elec-\n\ntrons, he derived the expression for the integral of the real\n\npart of a (complex) electric conductivity σ (Ω) and found\n\nthat it is independent on the nature of the interactions\n\nand reduces to\n\n� ∞\n\n0\n\nRe σ (Ω) d Ω= <sup>π</sup> 2\n\nne <sup>2</sup>\n\nm (1)\n\nHere n is the density of the electrons in the system and\n\nm is the bare mass of the electron. This expression is\n\nexact provided that the integration extends truly up to\n\ninfinity, and its derivation uses the obvious fact that at\n\nenergies higher than the total bandwidth of a solid, elec-\n\ntrons behave as free particles.\n\nThe independence of the r.h.s. of Eq. (1) on temper-\n\nature and the state of a solid (e.g., a normal or a super-\n\nconducting state - henceforth referred to as NS and SCS\n\nrespectively) implies that, while the functional form of\n\nσ (Ω) changes with, e.g., temperature, the total spectral\n\nweight is conserved and only gets redistributed between\n\ndifferent frequencies as temperature changes. This con-\n\nservation of the total weight of σ (Ω) is generally called a\n\nsum rule.\n\nOne particular case, studied in detail for conventional\n\nsuperconductors, is the redistribution of the spectral\n\nweight between normal and superconducting states. This\n\nis known as Ferrel-Glover-Tinkham (FGT) sum rule: <sup>2,3</sup>\n\n� ∞\n\n0+\n\nRe σ NS (Ω) = � ∞\n\n0+\n\nRe σ sc (Ω) + <sup>πn</sup> <sup>s</sup> <sup>e</sup> <sup>2</sup> 2 m (2)\n\nwhere n s is the superfluid density, and πn s e <sup>2</sup> / (2 m ) is\n\nthe spectral weight under the δ -functional piece of the\n\nconductivity in the superconducting state.\n\nIn practice, the integration up to an infinite frequency\n\nis hardly possible, and more relevant issue for practical\n\napplications is whether a sum rule is satisfied, at least ap-\n\nproximately, for a situation when there is a single electron\n\nband which crosses the Fermi level and is well separated\n\nfrom other bands. Kubo considered this case in the same", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has\n\nbeen proposed <sup>38</sup> .\n\nOur model (8) is achieved at second order of the per-\n\nturbation series. Higher order terms become trunca-\n\ntion errors but may be controlled by small parameters\n\nλ x,y,z /J cluster ∼ � | J x,y,z | /J cluster .\n\nV. CONCLUSIONS.\n\nWe constructed the exactly solvable Kitaev honeycomb model <sup>1</sup> as the exact low energy effective Hamiltonian of\n\na spin-1/2 model [equations (8) or (9)] with spin-rotation\n\nand time reversal symmetry. The spin in Kitaev model is\n\nrepresented as the pseudo-spin in the two-fold degenerate\n\nspin singlet subspace of a cluster of four antiferromag-\n\nnetically coupled spin-1/2 moments. The physical spin\n\nmodel is a honeycomb lattice of such four-spin clusters,\n\nwith certain inter-cluster interactions. The machinery\n\nfor the exact mapping to pseudo-spin Hamiltonian was\n\ndeveloped (see e.g. TABLE I), which is quite general\n\nand can be used to construct other interesting (exactly\n\nsolvable) spin-1/2 models from spin rotation invariant\n\nsystems.\n\nIn this construction the pseudo-spin correlations in the\n\nKitaev model will be mapped to dimer or spin-chirality\n\ncorrelations in the physical spin system. The correspond-\n\ning picture of the fractionalized Majorana fermion exci-\n\ntations and Ising vortices still remain to be clarified.\n\nThis exact construction contains high order physical\n\nspin interactions, which is undesirable for practical im-\n\nplementation. We described two possible approaches to\n\nreduce this problem: generating the high order spin in-\n\nteractions by perturbative expansion of the coupling to\n\noptical phonon, or the magnetic coupling between clus-\n\nters. This perturbative construction will introduce trun-\n\ncation error of perturbation series, which may be con-\n\ntrolled by small expansion parameters. Whether these\n\nconstructions can be experimentally engineered is how-\n\never beyond the scope of this study. It is conceivable that\n\nother perturbative expansion can also generate these high\n\norder spin interactions, but this possibility will be left for\n\nfuture works.\n\nAcknowledgments\n\nThe author thanks Ashvin Vishwanath, Yong-Baek\n\nKim and Arun Paramekanti for inspiring discussions, and\n\nTodadri Senthil for critical comments. The author is sup-\n\nported by the MIT Pappalardo Fellowship in Physics.\n\nAppendix A: Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins\n\nIn this Appendix we reproduce from Ref. <sup>35</sup> the cou-\n\nplings of all tetrahedron distortion modes to the spin\n\nsystem. And convert them to pseudo-spin notation in\n\nthe physical spin singlet sector.\n\nConsider a general small distortion of the tetrahedron,\n\nthe spin Hamiltonian becomes\n\nH cluster , SL = ( J cluster / 2)( � ℓ\n\nS ℓ ) <sup>2</sup> + J <sup>′</sup> <sup>�</sup> ℓ<m\n\nδr ℓm ( S �� · S m )\n\n(A1)\n\nwhere δr ℓm is the change of bond length between spins ℓ and m , J <sup>′</sup> is the derivative of J cluster with respect to\n\nbond length.\n\nThere are six orthogonal distortion modes of the tetra-\n\nhedron [TABLE 1.1 in Ref. <sup>35</sup> ]. One of the modes A is the\n\ntrivial representation of the tetrahedral group T d ; two E\n\nmodes form the two dimensional irreducible representa-\n\ntion of T d ; and three T 2 modes form the three dimen-\n\nsional irreducible representation. The E modes are also\n\nillustrated in FIG. 3.\n\nThe generic couplings in (A1) [second term] can be\n\nconverted to couplings to these orthogonal modes,\n\nJ <sup>′</sup> ( Q <sup>A</sup> f <sup>A</sup> + Q <sup>E</sup> 1 <sup>f</sup> <sup>E</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>f</sup> <sup>E</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 1 <sup>f</sup> <sup>T</sup> <sup>2</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 2 <sup>f</sup> <sup>T</sup> <sup>2</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 3 <sup>f</sup> <sup>T</sup> <sup>2</sup> 3 <sup>)</sup>", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "on the model (see above). The purely two-dimensional character of the KMC was extended to\n\na ‘pseudo three-dimensional’ one by making the effective chemical potential dependent on the\n\nmean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to\n\nthe introduction of a ‘global’ thickness-dependent disjoining pressure into the evaporation term\n\nwithout an explicit consideration of a film thickness. The amended model can reproduce bimodal\n\nstructures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully three-\n\ndimensional models are also discussed in the literature [76, 77].\n\n### **B. Dynamical Density Functional theory**\n\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related\n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle.\n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid,\n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to\n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the\n\nsubstrate, as all such interactions are absorbed into the effective chemical potential.\n\nHowever, using dynamical density functional theory (DDFT) [78- 83] one can develop a model\n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit\n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to\n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes\n\nthe coupled dynamics of the density fields of the liquid *ρ* *l* and the nanoparticles *ρ* *n* . The densities\n\n*ρ* *l* and *ρ* *n* are defined as the probabilities of finding a given lattice site on the surface to be occupied\n\nby a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond\n\nto number densities as we use the lattice spacing *σ* = 1 as our unit of length.\n\nTo develop the DDFT, one must first derive the underlying free energy functional *F* [ *ρ* *l* *, ρ* *n* ] , and\n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the\n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively.\n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams)\n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution\n\nand contributions from the interactions between the different species (nanoparticles and liquid).\n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is\n\ncoupled to a reservoir with chemical potential *µ* ), whereas the nanoparticles are treated in the\n\n14", - "page_start": 13, - "page_end": 13, - "source_file": "1001.2669.pdf" - }, - { - "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion\n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid-\n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ-\n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport\n\nregime where the instability is almost completely independent of the interaction strengths and\n\na demixing regime where particles and liquid demix at the receding front thereby increasing its\n\ntransverse instability.\n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of\n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional\n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo-\n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by\n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend\n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between\n\nshort- and long-range interactions of solvent and/or solute with the substrate. We have, however,\n\nrestricted the examples given here to situations that can also be described using the KMC model.\n\nA further exploration will be presented elsewhere.\n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It\n\nresults from a long-wave approximation and consists of coupled evolution equations for the film\n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning\n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee-\n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the\n\ncombined effects of convection and evaporation.\n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques\n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica-\n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly\n\ntowards increasingly complex systems. For example, there have been investigations of the influ-\n\nence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal\n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap-\n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of\n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102],\n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding\n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather\n\n24", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" - }, - { - "text": "*x*\n\n*z*\n\n*y*\n\n## *J* *J*\n\n## *J*\n\n*1*\n\n*0*\n\n*2*\n\nFIG. 1: (colors online) (a) : body-centered tetragonal (BCT)\n\nlattice with J 0 in-plane coupling constant, and out-of-plane\n\nJ 1 , and J 2 competing interactions.\n\nbe achieved with different number of interacting layers:\n\nnotably, nearest and next-nearest layers competitive in-\n\nteractions are enough to get a helical structure with a\n\nwhatever pitch wavevector. Such observation gives us a\n\npossible way to solve the conundrum previously emerged,\n\nas we have the possibility of varying the range of inter-\n\nactions without modifying the helical pitch, thus decou-\n\npling the two relevant length scales along the film growth\n\ndirection, and making accessible a range of n of the or-\n\nder of, or smaller than, the helical pitch, but still large\n\nenough that a substantial number of layers can behave\n\nas “bulk” layers. Therefore, while in the previous papers\n\nwe have studied the properties of ultrathin magnetic films\n\nof Ho assuming a model with six interlayer exchange in-\n\nteractions, here we investigate by MC simulations the\n\nproperties of the same system by making use of the sim-\n\nplest model Hamiltonian able to describe the onset of a\n\nhelical magnetic order in Holmium, i.e. we consider only\n\ntwo inter-layer coupling constants, as previously done in\n\nRef. 11.\n\nThe paper is organized as follows: In Sec. II the model\n\nHamiltonian will be defined, and the MC techniques, and\n\nall the thermodynamic quantities relevant for this study,\n\nwill be introduced. In Sec. III the results obtained for\n\ndifferent thicknesses will be presented, both in the matter\n\nof the critical properties of the model and of the magnetic\n\nordered structures observed. Finally, in Sec. IV we shall\n\ndiscuss such results, drawing also some conclusions.\n\nII. MODEL HAMILTONIAN AND MONTE\n\nCARLO OBSERVABLES\n\nThe model Hamiltonian we use in our simulations is the\n\nminimal one able to describe helimagnetic structures:\n\nH = −   J 0 � ⟨ ij ⟩\n\n⃗S i · ⃗S j + J 1 � ⟨ ik ⟩\n\n⃗S i · ⃗S k + J 2 � ⟨ il ⟩\n\n⃗S i · ⃗S l   .\n\n(1)\n\n⃗S i are classical planar unit vectors representing the di-\n\nrection of the total angular momentum of the magnetic\n\nions, whose magnitude � j ( j + 1) ( j = 8 for Holmium\n\nions) is already encompassed within the definition of the\n\ninteraction constants J 0 , 1 , 2 . As sketched in Fig. 1, the\n\nmagnetic ions are located on the sites of a body-centered\n\ntetragonal (BCT) lattice; the first sum appearing in the\n\nHamiltonian describes the in-plane ( xy ) nearest neigh-\n\nbor (NN) interaction, which is taken ferromagnetic (FM),\n\nwith exchange strength J 0 > 0; the second sum rep-\n\nresents the coupling, of exchange strength J 1 , between\n\nspins belonging to nearest neighbor (NN) planes along\n\nthe z -direction (which we will assume to coincide with\n\nthe film growth direction); finally, the third sum takes\n\ninto account the interaction, of exchange strength J 2 , be-\n\ntween spins lying on next-nearest neighbor (NNN) planes\n\nalong z . In order to have frustration, giving rise to non-\n\ncollinear order along z in the bulk, NN interaction J 1\n\ncan be taken both ferro- or antiferromagnetic, but NNN\n\ncoupling J 2 has necessarily to be antiferromagnetic, and\n\nthe condition | J 2 | > | J 1 | / 4 must be fulfilled. Such simpli-\n\nfied Hamiltonian was already employed to simulate he- lical ordering in bulk systems by Diep <sup>1,17</sup> and Loison <sup>18</sup> .\n\nIn the bulk limit, the state of minimal energy of a sys-\n\ntem described by Eq.(1) corresponds to a helical arrange-\n\nment of spins. The ground state energy per spin is equal\n\nto e g ( Q z ) = [ − 4 J 0 − 2 J 1 (4 cos ( Q z c <sup>′</sup> ) + δ cos (2 Q z c <sup>′</sup> ))] where c <sup>′</sup> is the distance between NN layers, δ = J 2\n\nJ 1 <sup>,</sup>\n\nand Q z c <sup>′</sup> = arccos � − <sup>1</sup> δ � is the angle between spins ly-\n\ning on adjacent planes along the z -direction. The ob-\n\nserved helical arrangement in bulk holmium corresponds", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" - }, - { - "text": "[arXiv:1002.2525v2 [hep-ph] 13 Feb 2010](http://arxiv.org/abs/1002.2525v2)\n\nHGU-CAP 002\n\nHiggs portal dark matter in the minimal gauged U (1) B − L model\n\nNobuchika Okada <sup>∗</sup>\n\nDepartment of Physics and Astronomy,\n\nUniversity of Alabama, Tuscaloosa, AL 35487, USA\n\nOsamu Seto <sup>†</sup>\n\nDepartment of Architecture and Building Engineering,\n\nHokkai-Gakuen University, Sapporo 062-8605, Japan\n\nAbstract\n\nWe propose a scenario of the right-handed neutrino dark matter in the context of the minimal\n\ngauged U (1) B − L model by introducing an additional parity which ensures the stability of dark\n\nmatter particle. The annihilation of this right-handed neutrino takes place dominantly through the\n\ns -channel Higgs boson exchange, so that this model can be called Higgs portal dark matter model.\n\nWe show that the thermal relic abundance of the right-handed neutrino dark matter with help of\n\nHiggs resonance can match the observed dark matter abundance. In addition we estimate the cross\n\nsection with nucleon and show that the next generation direct dark matter search experiments can\n\nexplore this model.\n\nPACS numbers:\n\n∗ [Electronic address: okadan@ua.edu](mailto:okadan@ua.edu)\n\n† [Electronic address: seto@phyics.umn.edu](mailto:seto@phyics.umn.edu)\n\n1", - "page_start": 0, - "page_end": 0, - "source_file": "1002.2525.pdf" - }, - { - "text": "[arXiv:1001.0266v2 [cond-mat.str-el] 4 May 2010](http://arxiv.org/abs/1001.0266v2)\n\n## Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin\n\n## Rotation Invariant System\n\nFa Wang <sup>1</sup>\n\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\n\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil-\n\ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low\n\nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series\n\nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and\n\ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model\n\nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet\n\nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre-\n\nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this\n\nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2\n\nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the\n\nhigh order spin interactions from more natural couplings, which involves perturbative expansions\n\nthus breaks the exact mapping, although in a controlled manner.\n\nPACS numbers: 75.10.Jm, 75.10.Kt\n\nContents\n\nI. Introduction. 1\n\nII. Formulation of the Pseudo-spin-1/2 from\n\nFour-spin Cluster. 2\n\nIII. Realization of the Kitaev Model. 3\n\nIV. Generate the High Order Physical Spin\n\nInteractions by Perturbative Expansion. 5\n\nA. Generate the High Order Terms by Coupling\n\nto Optical Phonon. 5\n\nB. Generate the High Order Terms by Magnetic\n\nInteractions between Clusters. 7\n\nV. Conclusions. 8\n\nAcknowledgments 8\n\nA. Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins 8\n\nB. Derivation of the Terms Generated by\n\nSecond Order Perturbation of Inter-cluster\n\nMagnetic Interactions 9\n\nReferences 10\n\nI. INTRODUCTION.\n\nKitaev’s exactly solvable spin-1/2 honeycomb lattice model <sup>1</sup> (noted as the Kitaev model hereafter) has in-\n\nspired great interest since its debut, due to its exact\n\nsolvability, fractionalized excitations, and the potential\n\nto realize non-Abelian anyons. The model simply reads\n\nH Kitaev = − � x − links <jk>\n\nJ x τ <sup>x</sup> j <sup>τ</sup> <sup>x</sup> k <sup>−</sup> � y − links <jk>\n\nJ y τ <sup>y</sup> j <sup>τ</sup> <sup>y</sup> k\n\n− � z − links <jk>\n\nJ z τ <sup>z</sup> j <sup>τ</sup> <sup>z</sup> k\n\n(1)\n\nwhere τ <sup>x,y,z</sup> are Pauli matrices, and x, y, z -links are de- fined in FIG. 1. It was shown by Kitaev <sup>1</sup> that this spin-\n\n1/2 model can be mapped to a model with one Majo-\n\nrana fermion per site coupled to Ising gauge fields on the\n\nlinks. And as the Ising gauge flux has no fluctuation, the\n\nmodel can be regarded as, under each gauge flux config-\n\nuration, a free Majorana fermion problem. The ground\n\nstate is achieved in the sector of zero gauge flux through\n\neach hexagon. The Majorana fermions in this sector have\n\nDirac-like gapless dispersion resembling that of graphene,\n\nas long as | J x | , | J y | , and | J z | satisfy the triangular rela- tion, sum of any two of them is greater than the third\n\none <sup>1</sup> . It was further proposed by Kitaev <sup>1</sup> that opening of\n\nfermion gap by magnetic field can give the Ising vortices\n\nnon-Abelian anyonic statistics, because the Ising vortex\n\nwill carry a zero-energy Majorana mode, although mag-\n\nnetic field destroys the exact solvability.\n\nGreat efforts have been invested to better understand\n\nthe properties of the Kitaev model. For example, sev-\n\neral groups have pointed out that the fractionalized Ma-\n\njorana fermion excitations may be understood from the\n\nmore familiar Jordan-Wigner transformation of 1D spin", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "Abstract\n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions\n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled\n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to\n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic\n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched\n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic\n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative\n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition\n\nin the film and contact line motion is discussed.\n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ\n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is\n\nused to discuss the self-pinning and de-pinning of a contact line related to the ‘coffee-stain’ effect.\n\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as\n\npossible future developments and extensions.\n\nThe paper is published in: *J. Phys.-Cond.* *Mat.* **21** , 264016 (2009),\n\nin the Volume “Nanofluids on solid substrates” and can be obtained at\n\n[http://dx.doi.org/10.1088/0953-8984/21/26/264016](http://dx.doi.org/10.1088/0953-8984/21/26/264016)\n\n2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2669.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0764.pdf", - "query": "What was the optical integral analysis proposed by Norman and Pépin?", - "target_page": 8, - "target_passage": "a phenomenological model for the self energy which fits normal state scattering rate measure- ments by ARPES", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "sults demonstrated, above all, outstanding achievements\n\nof experimental abilities as these groups managed to de-\n\ntect the value of the optical integral with the accuracy\n\nof a fraction of a percent. The analysis of the change\n\nof the optical integral between normal and SCS is even\n\nmore complex because one has to (i) extend NS data to\n\nT < T c and (ii) measure superfluid density with the same\n\naccuracy as the optical integral itself.\n\nThe analysis of the optical integral showed that in over-\n\ndoped cuprates it definitely decreases below T c , in con-\n\nsistency with the expectations at weak coupling <sup>11</sup> . For\n\nunderdoped cuprates, all experimental groups agree that\n\na relative change of the optical integral below T c gets\n\nmuch smaller. There is no agreement yet about the sign of the change of the optical integral : Molegraaf et al. <sup>8</sup> and Santander-Syro et al. <sup>9</sup> argued that the optical inte-\n\ngral increases below T c , while Boris et al. <sup>10</sup> argued that\n\nit decreases. Theoretical analysis of these results <sup>21,22,25,28,30</sup> added\n\none more degree of complexity to the issue. It is tempt-\n\ning to analyze the temperature dependence of W K and\n\nrelate it to the observed behavior of the optical integral, and some earlier works <sup>25,28,30</sup> followed this route. In the\n\nexperiments, however, optical conductivity is integrated\n\nonly up to a certain frequency ω c , and the quantity which\n\nis actually measured is\n\nW ( ω c ) = � ω c\n\n0\n\nRe σ (Ω) d Ω= W K + f ( ω c )\n\nf ( ω c ) = − � ′ ∞ ′\n\nω c\n\nRe σ (Ω) d Ω (4)\n\nThe Kubo formula, Eq. (3) is obtained assuming that\n\nthe second part is negligible. This is not guaranteed,\n\nhowever, as typical ω c ∼ 1 − 2 eV are comparable to the\n\nbandwidth.\n\nThe differential sum rule ∆ W is also a sum of two\n\nterms\n\n∆ W ( ω c ) = ∆ W K + ∆ f ( ω c ) (5)\n\nwhere ∆ W K is the variation of the r.h.s. of Eq. 3,\n\nand ∆ f ( ω c ) is the variation of the cutoff term. Because\n\nconductivity changes with T at all frequencies, ∆ f ( ω c )\n\nalso varies with temperature. It then becomes the issue\n\nwhether the experimentally observed ∆ W ( ω c ) is predom-\n\ninantly due to “intrinsic” ∆ W K , or to ∆ f ( ω c ). [A third\n\npossibility is non-applicability of the Kubo formula be-\n\ncause of the close proximity of other bands, but we will\n\nnot dwell on this.] For the NS, previous works <sup>21,22</sup> on particular models\n\nfor the cuprates indicated that the origin of the temper-\n\nature dependence of W ( ω c ) is likely the T dependence\n\nof the cutoff term f ( ω c ). Specifically, Norman et. al. <sup>22</sup>\n\napproximated a fermionic DOS by a constant (in which", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0764.pdf" - }, - { - "text": "[arXiv:1001.0764v2 [cond-mat.str-el] 13 Jan 2010](http://arxiv.org/abs/1001.0764v2)\n\n## Optical Integral and Sum Rule Violation\n\nSaurabh Maiti, Andrey V. Chubukov\n\nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA\n\n(Dated: November 9, 2018)\n\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in\n\nthe cuprates. We compute conductivities, optical integrals W , and ∆ W between superconducting\n\nand normal states for 2-D systems with lattice dispersion typical of the cuprates for four different\n\nmodels - a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a\n\ncollective boson model with a feedback from superconductivity on a collective boson. The goal of\n\nthe paper is two-fold. First, we analyze the dependence of W on the upper cut-off ( ω c ) placed on\n\nthe optical integral because in experiments W is measured up to frequencies of order bandwidth.\n\nFor a BCS model, the Kubo sum rule is almost fully reproduced at ω c equal to the bandwidth. But\n\nfor other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for\n\n∆ W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign\n\nof ∆ W . In all models we studied ∆ W is positive at small ω c , then crosses zero and approaches a\n\nnegative value at large ω c , i.e. the optical integral in a superconductor is smaller than in a normal\n\nstate. The point of zero crossing, however, increases with the interaction strength and in a collective\n\nboson model becomes comparable to the bandwidth at strong coupling. We argue that this model\n\nexhibits the behavior consistent with that in the cuprates.\n\nI. INTRODUCTION\n\nThe analysis of sum rules for optical conductivity has a long history. Kubo, in an extensive paper <sup>1</sup> in 1957, used\n\na general formalism of a statistical theory of irreversible\n\nprocesses to investigate the behavior of the conductivity\n\nin electronic systems. For a system of interacting elec-\n\ntrons, he derived the expression for the integral of the real\n\npart of a (complex) electric conductivity σ (Ω) and found\n\nthat it is independent on the nature of the interactions\n\nand reduces to\n\n� ∞\n\n0\n\nRe σ (Ω) d Ω= <sup>π</sup> 2\n\nne <sup>2</sup>\n\nm (1)\n\nHere n is the density of the electrons in the system and\n\nm is the bare mass of the electron. This expression is\n\nexact provided that the integration extends truly up to\n\ninfinity, and its derivation uses the obvious fact that at\n\nenergies higher than the total bandwidth of a solid, elec-\n\ntrons behave as free particles.\n\nThe independence of the r.h.s. of Eq. (1) on temper-\n\nature and the state of a solid (e.g., a normal or a super-\n\nconducting state - henceforth referred to as NS and SCS\n\nrespectively) implies that, while the functional form of\n\nσ (Ω) changes with, e.g., temperature, the total spectral\n\nweight is conserved and only gets redistributed between\n\ndifferent frequencies as temperature changes. This con-\n\nservation of the total weight of σ (Ω) is generally called a\n\nsum rule.\n\nOne particular case, studied in detail for conventional\n\nsuperconductors, is the redistribution of the spectral\n\nweight between normal and superconducting states. This\n\nis known as Ferrel-Glover-Tinkham (FGT) sum rule: <sup>2,3</sup>\n\n� ∞\n\n0+\n\nRe σ NS (Ω) = � ∞\n\n0+\n\nRe σ sc (Ω) + <sup>πn</sup> <sup>s</sup> <sup>e</sup> <sup>2</sup> 2 m (2)\n\nwhere n s is the superfluid density, and πn s e <sup>2</sup> / (2 m ) is\n\nthe spectral weight under the δ -functional piece of the\n\nconductivity in the superconducting state.\n\nIn practice, the integration up to an infinite frequency\n\nis hardly possible, and more relevant issue for practical\n\napplications is whether a sum rule is satisfied, at least ap-\n\nproximately, for a situation when there is a single electron\n\nband which crosses the Fermi level and is well separated\n\nfrom other bands. Kubo considered this case in the same", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "Θ is then described by a Dirichlet distribution parametrised by a set of concentration\n\nparameters *θ* :\n\n*p* ( Θ ) = *Dir* ( Θ *|* *θ* ) (19)\n\nThe concentration parameter of a Dirichlet distribution is essentially a non-negative count\n\nof how many times the given category (be it a type of observation or state transition) has\n\noccurred. The distribution of concentration parameter counts will determine the shape\n\nof the estimated categorical probability distribution, while the scale of the concentration\n\nparameters will determine the certainty per precision of the belief. Updating beliefs about\n\nΘ (the parameters in the matrices) then corresponds to updating these concentration\n\nparameters *θ* with the following update equation:\n\n*θ* *t* + 1 = *ω* *∗* *θ* *t* + *η* *∗* *χ* *t* (20)\n\nThe updated value for the concentration parameter ( *θ* *t* + 1 ) is found by adding the previous\n\nconcentration parameter *θ* *t* multiplied by a forgetting rate *ω* to the observed data count\n\n*χ* (either the observation in the case of **A** learning, or the inferred state or state transition\n\nfor other matrices) multiplied by a learning rate *η* . With this relatively simple update\n\nequation—which, in essence, amounts to just counting the occurrences of categories—an\n\nAIF agent can update its beliefs about the various matrices it uses to make inferences about\n\nenvironmental states. For more details on parameter learning with POMDPs, see [ 23 , 33 , 52 ].\n\n## **3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to\n\noperate ActiveInference . This includes functionalities for creating POMDP agents, for sim-\n\nulating behaviour and for fitting the models to data. In the next section, we demonstrate\n\nhow to use the package on a concrete worked example. ActiveInference is under continual\n\ndevelopment, and the newest version of the package, including documentation for how to\n\nuse it, can be found at [ github.com/ilabcode/ActiveInference.jl](https://github.com/ilabcode/ActiveInference.jl) .\n\n### *3.1. Creating and Using a POMDP*\n\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [ 23 ],\n\na Python library for implementing simulations of AIF in discrete state spaces. Those\n\nalready acquainted with pymdp should find the syntax here familiar. ActiveInference\n\ncan be installed as normal from the official Julia General Registry using the Julia’s native\n\npackage manager Pkg: � � **using** Pkg\n\nPkg.add(ActiveInference) � � It can then be loaded into the current project environment: � � **using** ActiveInference � � Central to the package is the AIF object. This is a structure containing all the components of\n\nthe generative model, as well as the dynamic belief states and the various settings needed to\n\nperform AIF, and is used in conjunction with most of the high-level functions of the package.\n\nAn AIF object can be created with the init_aif function, which takes as arguments the\n\ncomponents of the generative model and a dictionary of various settings and parameters:", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "[arXiv:1001.2670v1 [quant-ph] 15 Jan 2010](http://arxiv.org/abs/1001.2670v1)\n\n.\n\n## **The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen, <sup>∗</sup> and Hong Guo <sup>†</sup> *CREAM Group, State Key Laboratory of Advanced Optical Communication*\n\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n\n*School of Electronics Engineering and Computer Science,*\n\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China* (Dated: October 29, 2018)\n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying the linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth is more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that of conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. Since any cavity related noise is reduced to cavity-pulling e ff ect in bad cavity laser, this Ramsey laser provides the possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical clock and atom interferometers.\n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r\n\n*Introduction:* Since the invention of the separated-field technique [1], it has played an important role in the field of precision spectroscopy due to its linewidth narrowing e ff ect via multiple coherent interaction. Atomic clocks based on this technique have greatly extended our ability for frequency measurement, further, almost all the atom interferometers are based on this technique [2].\n\nThough, the natural linewidth of quantum transition was regarded as the ultimate limit to high-resolution laser spec- troscopy [4], several methods of subnatural linewidth spec- troscopy have been proposed to gain subnatural linewidth [3- 10]. However, in all these e ff orts, including optical Ramsey spectroscopy, subnatural line is realized at the expense of a quick reduction in signal-to-noise (SNR) ratio due to the ex- ponential decaying of signal, thus all these schemes can only get the linewidth several times narrower than the atomic nat- ural linewidth. In the past three decades, this situation does not change in the field of the precision laser spectroscopy. On the other hand, the thermal noise of the cavity mirrors is the main obstacle for further linewidth reduction of a laser [11, 12], and it is a challenge to substantially reduce this noise further[13]. Recently, a new scheme, called active optical clock [14- 18], was proposed to substantially reduce the laser linewidth. With lattice trapped atoms, it is possible to reach mHz linewidth laser based on the mechanism of active optical clock [14, 15, 19]. The principal mechanism of active optical clock is to directly extract light emitted from the ultranarrow atomic transition with a cavity mode linewidth much wider than that of lasing. This bad cavity ensures that any frequency shift due to cavity noise reduces to cavity-pulling e ff ect [15- 17], then the thermal noise is not the major obstacle again for reducing the linewidth. This means the bad cavity can play an indispensable role in new subnatural linewidth spectroscopy.\n\nIn this Letter, we propose a new scheme called Ramsey laser with bad cavity. Distinct from any previous applications of conventional Ramsey separated oscillating fields method [1], which focuses on the absorption spectrum, we here fo-", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2670.pdf" - }, - { - "text": "When you define the optical storage group, you provide the following information:\n\n� Storage group name\n\n� Description of the storage group\n\n� Volume full reset when optical volumes are rewritable and you want to reuse the storage\n\nspace (only available with local area network (LAN)-attached optical jukeboxes)\n\n� Free space threshold percent (the percent at which Content Manager OnDemand starts\n\nstoring to rewritable volumes again if the volume full reset parameter is checked)\n\n� Storage group type, which is primary or backup\n\nAfter you define the optical storage group, use IBM Navigator for i to define the optical\n\nvolumes to the Content Manager OnDemand system (Figure 5-20).\n\n*Figure 5-20 Content Manager OnDemand for i optical volume definition*\n\nWhen you define optical volumes, provide this information:\n\n� Volume name: Your volume name.\n\n� Volume type: Primary or backup.\n\n� Capacity in megabytes: Capacity of one side of the optical media after it is initialized.\n\n� Optical media family:\n\n- Rewritable (REWT)\n\n- WORM\n\n- Universal Disk Format single-sided (UDF1) that is used by DVD RAM drives\n\n- Universal Disk Format or double-sided (UDF2)\n\n- Virtual Rewritable (VRWT)\n\n- Virtual WORM (VWRM)\n\n� Optical storage group: Your optical storage group.\n\n� Optical library: Library name, which can be provided for documentation.", - "page_start": 145, - "page_end": 145, - "source_file": "sg246915.pdf" - }, - { - "text": "[existing structure, replacing it with an Italian summer villa in the centre of Paris. Bernini's plans were eventually shelved in](https://en.wikipedia.org/wiki/Villa)\n\n[favour of the elegant Louvre Colonnade designed by three Frenchmen: Louis Le Vau, Charles Le Brun, and Claude Perrault. With](https://en.wikipedia.org/wiki/Claude_Perrault)\n\nthe relocation of the court to Versailles, the Louvre was given over to the arts and the public. <sup>[113]</sup> During his visit from Rome,\n\n[Bernini also executed a renowned portrait bust of the king.](https://en.wikipedia.org/wiki/Bust_of_Louis_XIV_(Bernini))\n\nFew rulers in world history have commemorated themselves in as grand a manner as Louis. <sup>[114]</sup> He cultivated his image as the\n\nSun King ( *le Roi Soleil* ), the centre of the universe \"without equal\". Louis used court ritual and the arts to validate and augment\n\nhis control over France. With his support, Colbert established from the beginning of Louis's personal reign a centralised and\n\ninstitutionalised system for creating and perpetuating the royal image. The King was thus portrayed largely in majesty or at war,\n\nnotably against Spain. This portrayal of the monarch was to be found in numerous media of artistic expression, such as painting,\n\nsculpture, theatre, dance, music, and the almanacs that diffused royal propaganda to the population at large.\n\nOver his lifetime, Louis commissioned numerous works of art to portray himself, among them over 300 formal portraits. The\n\nearliest portrayals of Louis already followed the pictorial conventions of the day in depicting the child king as the majestically\n\nroyal incarnation of France. This idealisation of the monarch continued in later works, which avoided depictions of the effect of\n\n[smallpox that Louis contracted in 1647. In the 1660s, Louis began to be shown as a Roman emperor, the god Apollo, or Alexander](https://en.wikipedia.org/wiki/Alexander_the_Great)\n\n[the Great, as can be seen in many works of Charles Le Brun, such as sculpture, paintings, and the decor of major monuments.](https://en.wikipedia.org/wiki/Charles_Le_Brun)\n\n### **Image and depiction**\n\n#### **Evolution of royal portraiture**", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia5.pdf" - }, - { - "text": "FIG. 8: XTEJ1752-223 light curve. Horizontal scale is in\n\nmodified Julian days.\n\n12-25 keV band, where the flux initially rose to about\n\n240 mCrab (2009 Oct 25-28), suddenly dropped to\n\nnon-detectable on 2009 October 29-30, then rose again\n\nduring the period 2009 October 31 to November 2. As\n\nof mid December 2009, the source remains in a high\n\nintensity state. The light curve is shown for the pe-\n\nriod MJD 54700-55200, again with 1-day resolution,\n\nin Fig. 8. The fluxes for XTE J1752-223 in Table 1\n\nare given are for the interval of flaring activity, TJD\n\n55130-55180.\n\n## **Acknowledgments**\n\nThis work is supported by the NASA Fermi Guest\n\nInvestigator program. At LSU, additional support is\n\nprovided by NASA/Louisiana Board of Regents Co-\n\noperative Agreement NNX07AT62A.\n\n[1] C. Meegan et al., Ap. J. **702** , 791 (2009).\n\n[2] C. Wilson-Hodge et al. (2010), these proceedings.\n\n[3] B. A. Harmon et al., Ap. J. Suppl. **138** , 149 (2002).\n\n[4] B. A. Harmon et al., Ap. J. Suppl. **154** , 585 (2004).\n\n[5] G. L. Case et al., in *The First GLAST Symposium* ,\n\nedited by S. Ritz, P. Michelson, and C. Meegan\n\n(2007), vol. 921 of *AIP Conf. Proceedings* , p. 538.\n\n[6] J. Tueller et al. (2010), ap. J. Suppl., (to be pub-\n\nlished), astro-ph/0903.3037.\n\n[7] J. C. Ling and W. A. Wheaton, Ap. J. **598** , 334\n\n(2003).\n\n[8] E. Jourdain and J. P. Roques, Ap. J. **704** , 17 (2009).\n\n[9] H. Steinle et al., Astron. and Astrophys. **330** , 97\n\n(1998).\n\n[10] M. McConnell et al., Ap. J. **523** , 928 (2000).\n\n[11] J. C. Ling and W. A. Wheaton, Chinese J. Astron.\n\nAstrophys. Suppl. **5** , 80 (2005).\n\n[12] G. L. Case et al., Chinese J. Astron. Astrophys. Suppl.\n\n**5** , 341 (2005).\n\n[13] L. Bouchet et al., Ap. J. **693** , 1871 (2009).\n\n[14] M. C. Bell et al., Ap. J. **659** , 549 (2007).\n\n[15] G. L. Case et al. (2010), to be submitted.\n\n[16] C. Wilson-Hodge et al., Astron. Telegram **2280**\n\n(2009).\n\n**eConf C091122**", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0955.pdf" - }, - { - "text": "results provided in Supplementary Tables 1- 5. Percent change at the\n\nnetwork level was computed by subtracting the final pregnancy value\n\n(36 weeks pregnant) from the first prepregnancy baseline value, then\n\ndividing that difference by said first prepregnancy baseline value. All\n\nanalyses underwent multiple comparisons testing (false discovery rate\n\n(FDR)-corrected at *q* < 0.05).\n\n*Subcortical GMV* . A similar statistical approach was taken for subcorti-\n\ncal volume estimates. We ran a multivariate regression analysis predict-\n\ning GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by\n\ngestation week (FDR-corrected at *q* < 0.05).\n\nTo evaluate the relationship between gestation week and MTL\n\nsubregion volume over pregnancy ( *n* = 7 bilateral subregions and\n\n*n* = 18 MTL scans), we used a combination of linear and nonlinear\n\nmodels based on individual subregion data patterns. Models were\n\ncompared for best fit with each subregion via AIC from the GLM output\n\n(as described in ‘Summary brain metrics’). A linear regression model\n\nwas most appropriate for PHC (AIC diff < 3), whereas a quadratic model\n\nperformed best for CA1 and CA2/CA3. As a control, we repeated the\n\nanalyses with MTL subregion volumes after proportional volume cor-\n\nrection of total GMV calculated by ASHS. Finally, we evaluated the\n\nrelationship between endogenous sex hormones (estrogen and proges-\n\nterone) and subregion volumes using linear regression. Relationships\n\nwere considered significant only if they met FDR correction at *q* < 0.05.\n\n*White matter microstructure* . DSI Studio’s correlational tractography <sup>74</sup>\n\nwas used to analyze the relationship between white matter structure\n\nand gestational week ( *n* = 16). A truncated model was run to examine the\n\nrelationship between white matter and sex steroid hormones ( *n* = 14)\n\nfor the subset of diffusion scans with paired endocrine data during ges-\n\ntation. A nonparametric Spearman’s correlation was used to derive the\n\ncorrelation between gestational week and endocrine factors and our\n\nmetrics of interest (QA and MD; see Supplementary Table 9 and Sup-\n\nplementary Fig. 10 for MD results) because the data were not normally\n\ndistributed. Statistical inference was reached using connectometry,\n\na permutation-based approach that tests the strength of coherent\n\nassociations found between the local connectome and our variables\n\nof interest. It provides higher reliability and replicability by correcting\n\nfor multiple comparisons. This technique provides a high-resolution\n\ncharacterization of local axonal orientation. The correlational trac-\n\ntography was run with the following parameters: *t* score threshold of\n\n2.5, four pruning iterations and a length threshold of 25 voxel distance.\n\nTo estimate the FDR, a total of 4,000 randomized permutations were\n\napplied to obtain the null distribution of the track length. Reported\n\nregions were selected based on FDR cutoff (FDR < 0.2, suggested by\n\nDSI Studio), and contained at least ten tracts. For visualization of global\n\nand tract QA at each gestational stage, mean QA values were extracted\n\nusing DSI Studio’s whole-brain fiber tracking algorithm and ROI-based\n\ntracking using the default HCP842 atlas <sup>78</sup> .\n\n*Day2Day dataset: measurement variability* . To establish a marker of\n\nnormative variability over half a year, we computed metrics of meas-\n\nurement variability using the Day2Day dataset <sup>23</sup> , which provided both\n\nwhole-brain T1 and high-resolution T2 MTL scans. For each region, *j* , of\n\nthe Schaefer parcellation, we assessed across-session variability, *ε* , as\n\nε *j* = 100 × mean ( || *t* *s* −̂ *t* ||\n\n̂ *t* )\n\nWhere *t* *s* is the morphometric measurement of a parcel for session *s*\n\nand <sup>̂</sup> *t* is the mean of *t* across sessions <sup>55</sup> <sup>,</sup> <sup>79</sup> . Thus, we defined variability\n\nas the mean absolute percent difference between each individual and", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - }, - { - "text": "Chapter 5. Storage management\n\nProvide the following information for disk pool definition:\n\n� A pool number that corresponds to an existing auxiliary storage pool\n\n� A description of the storage group\n\n� The type of data, which is primary or backup\n\n*Figure 5-18 Content Manager OnDemand for i disk pool definition*\n\n**Optical storage group**\n\n*Optical storage groups* are used by Content Manager OnDemand to group sets of optical\n\nvolumes for the storage of related data. Optical storage groups are used to group physical\n\noptical volumes and virtual optical volumes. Each optical storage group must contain only one\n\ntype (physical or virtual). By using a specific storage group in the migration policy, the\n\nadministrator can control the sets of reports that are stored on a particular set of optical\n\nvolumes. Use IBM Navigator for i to define the optical storage group (Figure 5-19).\n\n*Figure 5-19 Content Manager OnDemand for i optical storage group definition*", - "page_start": 144, - "page_end": 144, - "source_file": "sg246915.pdf" - }, - { - "text": "detector. Horizontal scale is in seconds centered on the\n\noccultation time. Vertical scale is in measured counts.\n\nThe shape of the individual occultation steps de-\n\npends on energy and occultation angle. Transmis-\n\nsion as a function of time is modeled as *T* ( *t* ) =\n\n*exp* [ *−* *µ* ( *E* ) *A* ( *h* )], where *µ* ( *E* ) is the mass attenuation coefficient of gamma rays at energy *E* in air and *A* ( *h* )\n\nis the air mass along the line of sight at a given alti-\n\ntude *h* ( *t* ). Account is taken of the detector response\n\nas it changes as a function of angle across the fit win-\n\ndow. For each source, occultation times are predicted.\n\nEach step is fit over a 4-minute window along with a\n\nquadratic background and using an assumed spectrum\n\nto determine the detector count rate due to the source.\n\nThe instrument response is used to convert the count\n\nrate to a flux. Up to 31 steps are possible for a given\n\nsource in a day, and these steps are summed to get a\n\nsingle daily average flux. The GBM occultation sensi-\n\ntivity exceeds that of BATSE at energies below *∼* 25 keV and above *∼* 1 *.* 5 MeV [5]. This work uses the GBM CTIME data, with its\n\n8 broad energy channels and 0.256-second resolution,\n\nrebinned to 2-second resolution. The occultation tech-\n\nnique relies on an input catalog of known sources.\n\nCurrently, we are monitoring 64 sources. Of these\n\n64 sources, 6 steady sources are detected above 100\n\nkeV with a significance of at least 5 *σ* after *∼* 490 days of observations, and one transient source.\n\n## **III. RESULTS**\n\nThe results presented here are preliminary. We\n\nhave not completed the fine tuning of our algorithms,\n\nthough the average fluxes are not expected to change\n\nmuch. Future work will include using the GBM\n\nCSPEC data, with its finer energy binning, to exam-\n\nine the detailed spectra for these sources.\n\nThe measured 20 - 50 keV GBM light curves are\n\ncompared to Swift’s 15 - 50 keV light curves for sev-\n\nFIG. 2: Crab light curve. Horizontal scale is in modified\n\nJulian days over the 490 day GBM exposure period. Ver-\n\ntical scale is in photons/cm <sup>2</sup> /sec/keV averaged over daily\n\nintervals. Horizontal lines show the average flux in each of\n\nfive energy bands increasing from top to bottom\n\neral sources over the same time intervals in ref. [2],\n\nwhere it is seen that the results measured by the two\n\ninstruments compare well. At energies above the up-\n\nper energy limit of *∼* 195 keV of the Swift 22-month catalog [6], however, the GBM observations provide\n\nthe only wide-field monitor available of the low en-\n\nergy gamma ray sky.\n\n### **A. Steady Sources**\n\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E\n\n1740-29, Cen A, and GRS 1915+105 are detected by\n\nGBM at energies above 100 keV. We show GBM light\n\ncurves generated from the Earth occultation analysis\n\nin several energy bands with one day resolution for\n\nthese six sources in Figures 2 - 7.\n\nTable I gives the fluxes and significances averaged\n\nover all the days from Aug. 12, 2008 (the beginning of\n\nscience operations) to Dec. 15, 2009, approximately\n\n490 days.\n\nThe **Crab** (Fig. 2) spectrum in the hard x-ray/low\n\nenergy gamma-ray region can be described by a bro-\n\nken power law, with the spectrum steepening at 100\n\nkeV and then hardening at 650 keV [7, 8]. While the\n\nGBM CTIME data do not have the spectral resolution\n\n**eConf C091122**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0955.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0764.pdf", - "query": "What is the Ferrel-Glover-Tinkham sum rule?", - "target_page": 1, - "target_passage": "the redistribution of the spectral weight between normal and superconducting state", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "Acknowledgements\n\nWe would like to thank M. Norman, Tom Timusk,\n\nDmitri Basov, Chris Homes, Nicole Bontemps, Andres\n\nSantander-Syro, Ricardo Lobo, Dirk van der Marel, A.\n\nBoris, E. van Heumen, A. B. Kuzmenko, L. Benfato, and\n\nF. Marsiglio for many discussions concerning the infrared\n\nconductivity and optical integrals and thank A. Boris, E.\n\nvan Heumen, J. Hirsch, and F. Marsiglio for the com-\n\nments on the manuscript. The work was supported by\n\n[nsf-dmr 0906953.](http://arxiv.org/abs/nsf-dmr/0906953)\n\n1 R. Kubo, J. Phys. Soc. Jpn 12 , 570(1957). 2 R.A. Ferrrel and R.E. Glover, Phys. Rev. 109 , 1398 (1958). 3 M. Tinkham and R.A. Ferrrel, Phys. Rev. Lett. 2 , 331\n\n(1959), M. Tinkham, Introduction to Superconductivity\n\n(McGraw-Hill, New York, 1975). 4 J. Hirsch, Physica C 199 , 305 (1992). 5 D. N. Basov and T. Timusk, Rev. Mod. Phys. 77 , 721\n\n(2005); A. V. Puchkov, D. N. Basov and T. Timusk, J.\n\nPhys. Cond. Matter 8 , 10049 (1996). 6 C. M. Varma et al , Phys. Rev. Lett. 63 , 1996 (1989). 7 D. N. Basov, S. I. Woods, A. S. Katz, E. J. Singley, R. C.\n\nDynes, M. Xu, D. G. Hinks, C. C. Homes and M. Strongin,\n\nScience 283 , 49 (1999). 8 H.J.A Molegraaf, C. Presura, D. van der Marel, P.H. Kess,\n\nM. Li, Science 295 , 2239 (2002); A. B. Kuzmenko, H. J. A.\n\nMolegraaf, F. Carbone and D. van der Marel, Phys. Rev.\n\nB 72 , 144503 (2005). 9 A. F. Santander-Syro, R. P. S. M. Lobo, N. Bontemps, Z.\n\nKonstantinovic, Z. Z. Li and H. Raffy, Europhys. Lett. 62 ,\n\n568 (2003); 10 A. V. Boris, N. N. Kovaleva, O. V. Dolgov, T. Holden,\n\nC. T. Lin, B. Keimer and C. Bernhard, Science 304 , 708\n\n(2004). 11 G. Deutscher, A. F. Santander-Syro and N. Bontemps,\n\nPhys. Rev. B 72 , 092504 (2005). 12 F. Carbone, A. B. Kuzmenko, H. J. A. Molegraaf, E. van\n\nHeumen, V. Lukovac, F. Marsiglio, D. van der Marel, K.\n\nHaule, G. Kotliar, H. Berger, S. Courjault, P. H. Kes and\n\nM. Li, Phys. Rev. B 74 , 064510 (2006). 13 C. C. Homes, S. V. Dordevic, D. A. Bonn, R. Liang and\n\nW. N. Hardy, Phys. Rev. B 69 , 024514 (2004). 14 J. Hwang et al , Phys. Rev. B 73 , 014508 (2006). 15 E. van Heumen, R. Lortz, A. B. Kuzmenko, F. Carbone,\n\nD. van der Marel, X. Zhao, G. Yu, Y. Cho, N. Barisic, M.\n\nGreven, C. C. Homes and S. V. Dordevic, Phys. Rev. B\n\n75 , 054522 (2007). 16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94 ,\n\n067002 (2005). 17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps,\n\nPhys. Rev. B 70 , 134504(2004), A. F. Santander-Syro, R.\n\nP. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li\n\nand H. Raffy, Europhys. Lett. 62 , 568 (2003). 18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim,\n\nPhys. Rev. B 58 2452 (1998). 19 J. Hirsch, Physica C, 201 , 347 (1992) and Ref 4. 20 for a review see F. Marsiglio, J. Superconductivity and\n\nNovel Magnetism 22 , 269 (2009). 21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev.\n\nB 77 144510 (2008). 22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B.\n\nKuzmenko, and D. van der Marel, Phys. Rev. B 76 , 220509\n\n(2007). 23 J. E. Hirsch and F. Marsiglio, Physica C 331 , 150 (2000)\n\nand Phys. Rev. B 62 , 15131 (2000). 24 A. Toschi, M. Capone, M. Ortolani, P. Calvani, S. Lupi\n\nand C. Castellani, Phys. Rev. Lett. 95 , 097002 (2005). 25 F. Marsiglio, F. Carbone, A. Kuzmenko and D. van der\n\nMarel, Phys. Rev. B 74 , 174516 (2006). 26 L. Benfatto, S. G. Sharapov, N. Andrenacci and H. Beck,\n\nPhys. Rev. B 71 , 104511 (2005). 27 D. van der Marel, H.J.A. Molegraaf, C. Presura, and I.\n\nSantoso, Concepts in Electron Correlations, edited by A.\n\nHewson and V. Zlatic (Kluwer, 2003) 28 L. Benfatto, J.P. Carbotte and F. Marsiglio, Phys. Rev. B\n\n74 , 155115 (2006) 29 F. Marsiglio, Phys. Rev. B 73 , 064507(2006). 30 M.R. Norman and C. P´epin, Phys. Rev. B 66 , 100506(R)\n\n(2002). 31 J. Fink et al. , Phys. Rev. B 74 , 165102(R) (2006). 32 M. Eschrig, Adv. Phys. 55 , 47-183 (2006) 33 M.R. Norman and A.V. Chubukov, Phys. Rev. B 73 ,", - "page_start": 14, - "page_end": 14, - "source_file": "1001.0764.pdf" - }, - { - "text": "11\n\n26 K. S. Raman, R. Moessner, S. L. Sondhi, Phys. Rev. B 72 ,\n\n064413 (2005). 27 D. F. Schroeter, E. Kapit, R. Thomale, and M. Greiter,\n\nPhys. Rev. Lett. 99 , 097202 (2007); R. Thomale, E. Kapit,\n\nD. F. Schroeter, and M. Greiter, Phys. Rev. B 80 , 104406\n\n(2009). 28 O. Tchernyshyov, R. Moessner, S. L. Sondhi, Phys. Rev.\n\nLett. 88 , 067203 (2002). 29 F. Becca, F. Mila, Phys. Rev. Lett. 89 , 037204 (2002). 30 K. Penc, N. Shannon, H. Shiba, Phys. Rev. Lett. 93 ,\n\n197203 (2004). 31 C. Weber, F. Becca, F. Mila, Phys. Rev. B 72 , 024449\n\n(2005). 32 G.-W. Chern, C. J. Fennie, O. Tchernyshyov, Phys. Rev.\n\nB 74 , 060405(R) (2006). 33 D. L. Bergman, R. Shindou, G. A. Fiete, L. Balents, Phys.\n\nRev. B 74 , 134409 (2006). 34 Fa Wang, Ashvin Vishwanath, Phys. Rev. Lett. 100 ,\n\n077201 (2008). 35 [ O. Tchernyshyov, G.-W. Chern, arXiv:0907.1693 (2009).](http://arxiv.org/abs/0907.1693) 36 Y. Taguchi, Y. Oohara, H. Yoshizawa, N. Nagaosa, Y.\n\nTokura, Science 291 , 2573 (2001). 37 X. G. Wen, Frank Wilczek, A. Zee, Phys. Rev. B 39, 11413\n\n(1989); X. G. Wen, Phys. Rev. B 40 , 7387 (1989). 38 Dimitris I. Tsomokos, Juan Jos´e Garc´ıa-Ripoll, Nigel R.\n\nCooper, Jiannis K. Pachos, Phys. Rev. A 77 , 012106\n\n(2008).", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0266.pdf" - }, - { - "text": "[arXiv:1001.0764v2 [cond-mat.str-el] 13 Jan 2010](http://arxiv.org/abs/1001.0764v2)\n\n## Optical Integral and Sum Rule Violation\n\nSaurabh Maiti, Andrey V. Chubukov\n\nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA\n\n(Dated: November 9, 2018)\n\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in\n\nthe cuprates. We compute conductivities, optical integrals W , and ∆ W between superconducting\n\nand normal states for 2-D systems with lattice dispersion typical of the cuprates for four different\n\nmodels - a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a\n\ncollective boson model with a feedback from superconductivity on a collective boson. The goal of\n\nthe paper is two-fold. First, we analyze the dependence of W on the upper cut-off ( ω c ) placed on\n\nthe optical integral because in experiments W is measured up to frequencies of order bandwidth.\n\nFor a BCS model, the Kubo sum rule is almost fully reproduced at ω c equal to the bandwidth. But\n\nfor other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for\n\n∆ W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign\n\nof ∆ W . In all models we studied ∆ W is positive at small ω c , then crosses zero and approaches a\n\nnegative value at large ω c , i.e. the optical integral in a superconductor is smaller than in a normal\n\nstate. The point of zero crossing, however, increases with the interaction strength and in a collective\n\nboson model becomes comparable to the bandwidth at strong coupling. We argue that this model\n\nexhibits the behavior consistent with that in the cuprates.\n\nI. INTRODUCTION\n\nThe analysis of sum rules for optical conductivity has a long history. Kubo, in an extensive paper <sup>1</sup> in 1957, used\n\na general formalism of a statistical theory of irreversible\n\nprocesses to investigate the behavior of the conductivity\n\nin electronic systems. For a system of interacting elec-\n\ntrons, he derived the expression for the integral of the real\n\npart of a (complex) electric conductivity σ (Ω) and found\n\nthat it is independent on the nature of the interactions\n\nand reduces to\n\n� ∞\n\n0\n\nRe σ (Ω) d Ω= <sup>π</sup> 2\n\nne <sup>2</sup>\n\nm (1)\n\nHere n is the density of the electrons in the system and\n\nm is the bare mass of the electron. This expression is\n\nexact provided that the integration extends truly up to\n\ninfinity, and its derivation uses the obvious fact that at\n\nenergies higher than the total bandwidth of a solid, elec-\n\ntrons behave as free particles.\n\nThe independence of the r.h.s. of Eq. (1) on temper-\n\nature and the state of a solid (e.g., a normal or a super-\n\nconducting state - henceforth referred to as NS and SCS\n\nrespectively) implies that, while the functional form of\n\nσ (Ω) changes with, e.g., temperature, the total spectral\n\nweight is conserved and only gets redistributed between\n\ndifferent frequencies as temperature changes. This con-\n\nservation of the total weight of σ (Ω) is generally called a\n\nsum rule.\n\nOne particular case, studied in detail for conventional\n\nsuperconductors, is the redistribution of the spectral\n\nweight between normal and superconducting states. This\n\nis known as Ferrel-Glover-Tinkham (FGT) sum rule: <sup>2,3</sup>\n\n� ∞\n\n0+\n\nRe σ NS (Ω) = � ∞\n\n0+\n\nRe σ sc (Ω) + <sup>πn</sup> <sup>s</sup> <sup>e</sup> <sup>2</sup> 2 m (2)\n\nwhere n s is the superfluid density, and πn s e <sup>2</sup> / (2 m ) is\n\nthe spectral weight under the δ -functional piece of the\n\nconductivity in the superconducting state.\n\nIn practice, the integration up to an infinite frequency\n\nis hardly possible, and more relevant issue for practical\n\napplications is whether a sum rule is satisfied, at least ap-\n\nproximately, for a situation when there is a single electron\n\nband which crosses the Fermi level and is well separated\n\nfrom other bands. Kubo considered this case in the same", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "2023 ) where given the original human summary\n\nin English and its translation in French, the model\n\nrates the quality of the translation from 0 to 10 ,\n\nwith 0 being of very bad quality and 10 being ex-\n\ncellent. The prompt is available in Figure 8 . Ad-\n\nditionally, we manually check random translations\n\nwith ratings between 9 and 10 to ensure the rating\n\nis relevant. We do the same for all translations with a score less than 9 and correct them <sup>7</sup> (see the rating\n\ndistribution in Table 6 ).\n\n**Dataset BLEU ROUGE-1 ROUGE-2 ROUGE-L**\n\nSummEval 0.205 0.292 0.099 0.193\n\nSummEvalFr 0.276 0.302 0.117 0.194\n\nCorrelation En-Fr 0.70 0.85 0.80 0.84\n\nTable 2: Average ROUGE and BLUE scores computed\n\nbetween machine summaries and human summaries\n\nfor the original English SummEval and its translation\n\nto French. The correlations of the individual scores\n\nbetween English and French are also reported.\n\n#### **3.1.4 Data for the Reranking task**\n\nThe reranking task, as evaluated in MTEB, requires\n\ndatasets composed of a set of queries, each as-\n\nsociated with relevant and irrelevant documents.\n\nDespite our efforts, we found no French dataset\n\nthat natively exhibits such a structure. Thus, to\n\nevaluate this task, we built data for the reranking\n\ntask based on the *Syntec* and *Alloprof* ( Lefebvre-\n\nBrossard et al. , 2023 ) datasets. These already fea-\n\nture queries and labeled relevant documents. Irrele-\n\nvant ones were added using the following process:\n\n- To avoid bias, we use the BM25 algorithm\n\n( Robertson and Jones , 1976 ) (which is a deter-\n\nministic method) to rank documents in terms\n\nof relevance regarding each query.\n\n- The top 10 documents that are not labeled as\n\nrelevant constitute the negative samples.\n\nWe recognize that this process leads to a high cor-\n\nrelation between the retrieval and reranking tasks.\n\nWe still think it is essential to make the latter avail- able, with an open door to future improvement <sup>8</sup> .\n\n7 SummEvalFr available at: [ https://huggingface.co./](https://huggingface.co./datasets/lyon-nlp/summarization-summeval-fr-p2p)\n\n[datasets/lyon-nlp/summarization-summeval-fr-p2p](https://huggingface.co./datasets/lyon-nlp/summarization-summeval-fr-p2p)\n\n8 SyntecReranking available at: [https:](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-syntec-s2p)\n\n[//huggingface.co/datasets/lyon-nlp/](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-syntec-s2p)\n\n[mteb-fr-reranking-syntec-s2p](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-syntec-s2p) and AlloprofRerank- ing available at: [https://huggingface.co./datasets/](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-alloprof-s2p)\n\n[lyon-nlp/mteb-fr-reranking-alloprof-s2p](https://huggingface.co./datasets/lyon-nlp/mteb-fr-reranking-alloprof-s2p)\n\n#### **3.1.5 Similarity analysis**\n\nWe investigate the proximity between the datasets’\n\ntopics to give insights about the benchmark con-\n\ntents. The methodology introduced by Muen-\n\nnighoff et al. ( 2022 ), i.e. computing an average\n\nembedding of samples from each dataset, is used to\n\nbuild a dataset-similarity matrix (displayed in ap-\n\npendix Figure 3 ). The distances between averaged\n\nembedding vectors of each dataset (which range\n\nfrom 0 *.* 89 to 1 in Figure 3 ) remain hard to interpret\n\ninto a dataset semantic proximity. Thus, we com-\n\nplement this by observing the dataset’s clouds of\n\nembedding in a 2D plane using PCA in Figure 4 .\n\nFigures 4 and 3 seem to correlate, showing high\n\nsimilarity between two datasets when the same\n\nunderlying data is used in different tasks. Dataset\n\ntopics are pretty close, with some exceptions, such\n\nas the Syntec dataset. As more datasets are added\n\nto the benchmark, this analysis will help select new\n\ndata that do not produce redundant results. It may\n\nalso help to understand the link between the results\n\nand the datasets’ topics.\n\n### **3.2 Models**\n\nFor comparison on our benchmark, we selected", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has\n\nbeen proposed <sup>38</sup> .\n\nOur model (8) is achieved at second order of the per-\n\nturbation series. Higher order terms become trunca-\n\ntion errors but may be controlled by small parameters\n\nλ x,y,z /J cluster ∼ � | J x,y,z | /J cluster .\n\nV. CONCLUSIONS.\n\nWe constructed the exactly solvable Kitaev honeycomb model <sup>1</sup> as the exact low energy effective Hamiltonian of\n\na spin-1/2 model [equations (8) or (9)] with spin-rotation\n\nand time reversal symmetry. The spin in Kitaev model is\n\nrepresented as the pseudo-spin in the two-fold degenerate\n\nspin singlet subspace of a cluster of four antiferromag-\n\nnetically coupled spin-1/2 moments. The physical spin\n\nmodel is a honeycomb lattice of such four-spin clusters,\n\nwith certain inter-cluster interactions. The machinery\n\nfor the exact mapping to pseudo-spin Hamiltonian was\n\ndeveloped (see e.g. TABLE I), which is quite general\n\nand can be used to construct other interesting (exactly\n\nsolvable) spin-1/2 models from spin rotation invariant\n\nsystems.\n\nIn this construction the pseudo-spin correlations in the\n\nKitaev model will be mapped to dimer or spin-chirality\n\ncorrelations in the physical spin system. The correspond-\n\ning picture of the fractionalized Majorana fermion exci-\n\ntations and Ising vortices still remain to be clarified.\n\nThis exact construction contains high order physical\n\nspin interactions, which is undesirable for practical im-\n\nplementation. We described two possible approaches to\n\nreduce this problem: generating the high order spin in-\n\nteractions by perturbative expansion of the coupling to\n\noptical phonon, or the magnetic coupling between clus-\n\nters. This perturbative construction will introduce trun-\n\ncation error of perturbation series, which may be con-\n\ntrolled by small expansion parameters. Whether these\n\nconstructions can be experimentally engineered is how-\n\never beyond the scope of this study. It is conceivable that\n\nother perturbative expansion can also generate these high\n\norder spin interactions, but this possibility will be left for\n\nfuture works.\n\nAcknowledgments\n\nThe author thanks Ashvin Vishwanath, Yong-Baek\n\nKim and Arun Paramekanti for inspiring discussions, and\n\nTodadri Senthil for critical comments. The author is sup-\n\nported by the MIT Pappalardo Fellowship in Physics.\n\nAppendix A: Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins\n\nIn this Appendix we reproduce from Ref. <sup>35</sup> the cou-\n\nplings of all tetrahedron distortion modes to the spin\n\nsystem. And convert them to pseudo-spin notation in\n\nthe physical spin singlet sector.\n\nConsider a general small distortion of the tetrahedron,\n\nthe spin Hamiltonian becomes\n\nH cluster , SL = ( J cluster / 2)( � ℓ\n\nS ℓ ) <sup>2</sup> + J <sup>′</sup> <sup>�</sup> ℓ<m\n\nδr ℓm ( S ℓ · S m )\n\n(A1)\n\nwhere δr ℓm is the change of bond length between spins ℓ and m , J <sup>′</sup> is the derivative of J cluster with respect to\n\nbond length.\n\nThere are six orthogonal distortion modes of the tetra-\n\nhedron [TABLE 1.1 in Ref. <sup>35</sup> ]. One of the modes A is the\n\ntrivial representation of the tetrahedral group T d ; two E\n\nmodes form the two dimensional irreducible representa-\n\ntion of T d ; and three T 2 modes form the three dimen-\n\nsional irreducible representation. The E modes are also\n\nillustrated in FIG. 3.\n\nThe generic couplings in (A1) [second term] can be\n\nconverted to couplings to these orthogonal modes,\n\nJ <sup>′</sup> ( Q <sup>A</sup> f <sup>A</sup> + Q <sup>E</sup> 1 <sup>f</sup> <sup>E</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>f</sup> <sup>E</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 1 <sup>f</sup> <sup>T</sup> <sup>2</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 2 <sup>f</sup> <sup>T</sup> <sup>2</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 3 <sup>f</sup> <sup>T</sup> <sup>2</sup> 3 <sup>)</sup>", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "**13**\n\nOperations Report\n\nOperations Report\n\nProduction and Costs\n\nProduction for the year was 133,681 ounces\n\nof gold and 1,000,569 ounces of silver.\n\nTotal mill throughput of 5.7 million tonnes was\n\n11.4% higher than 2012 despite the 63 days that\n\nthe new plant was shut down during the process\n\nfor the granting of its Metallurgical License. The\n\noverall plant availability was 98.1%.\n\nTotal cash costs for the year were $US767 per\n\nounce ($US620 per ounce exclusive of Thai\n\nroyalties). The average royalty paid to the Thai\n\nGovernment was $US147 per ounce of gold. Total\n\nproduction costs after depreciation and amorti-\n\nsation were $US952 per ounce of gold produced.\n\nAt year end, 9.7 million tonnes of ore was stock-\n\npiled with an average contained gold grade of\n\n0.57 grams per tonne (g/t) representing 178,086\n\nounces of gold.\n\nOperational Performance\n\nDuring the year 7.1 million tonnes of ore was\n\nmined, with a waste-to-ore strip ratio of 2.09:1.\n\nThe average grade of mined ore was 0.72 g/t\n\ngold and 8.56 g/t silver.\n\nAdditional ore was generated by revising the\n\nmining sequence in A Pit Stage 2 and accessing\n\nnear surface high grade oxide ore tonnes from\n\nQ Prospect.\n\nTotal volume of material mined at Chatree for\n\nthe year was 8.4 million Bank Cubic Metres\n\n(\"BCM\") including 2.7 million BCM of ore.\n\nAn additional 566,000 BCM of laterite and\n\nclay material was excavated and used for the\n\nconstruction of the second lift of second tailings\n\nstorage facility (TSF#2).\n\nSome 1.3 million loose cubic metres (LCM) of\n\nore was relocated from the Marginal Grade\n\nStockpiles to the primary crusher to supplement\n\nore from the mining pits.\n\nTwo areas were mined during the year:\n\n〉 〉 A Pit, where 8.3 million BCM of material was\n\nmined (2.7 million BCM of ore) at a stripping\n\nratio of 2.09:1 waste to ore; and\n\n〉 〉 Q Prospect where 298 thousand BCM of\n\nmaterial was mined (143 thousand BCM of\n\nore) at a stripping ratio of 1.1:1 waste to ore.\n\nThe mechanical reliability and hence availability\n\nof the major fleet items has been below expecta-\n\ntions over the last few years.\n\ncontinued\n\nGold Production\n\n134 1001\n\n2012/13\n\n86 291\n\n2006/07\n\n74 232\n\n2007/08\n\n93 293\n\n2008/09\n\n133 550\n\n2009/10\n\n76 550\n\n2010/11\n\n121 918\n\n2011/12\n\nSilver Production\n\n0\n\n100\n\n200\n\n300\n\nOunces (‘000) 400\n\n500\n\n600\n\n700\n\n800\n\n900\n\n1,000\n\n1,100\n\nOre Mined\n\n1,523 2,405\n\n2006/07\n\n977 2,474\n\n2007/08\n\n3,874 1,878\n\n2008/09\n\n6,583 2,705\n\n2009/10\n\n5,301 2,533\n\n2010/11\n\n4,986 5,116\n\n2011/12\n\n7,051 5,699\n\n2012/13\n\nOre Treated Ore Grade\n\n0\n\n2,000\n\n1,000\n\n3,000\n\n4,000 Tonnes (‘000) Ore Grade (grams/tonne gold) 5,000\n\n6,000\n\n7,000\n\n8,000\n\n0\n\n2.0\n\n1.0\n\n3.0\n\n4.0\n\n5.0\n\n6.0\n\n7.0\n\n8.0\n\n84\n\n440\n\n2006/07\n\n99\n\n457\n\n2007/08\n\n87\n\n401\n\n2008/09\n\n73\n\n335\n\n2009/10\n\n102\n\n479\n\n2010/11\n\n143\n\n618\n\n2011/12\n\n185\n\n767\n\n2012/13\n\n1,000\n\nCash Cost\n\n(incl. Royalties)\n\nNon Cash Cost\n\n(incl. D&A)\n\nRealised Gold Price\n\n0\n\n200\n\n400\n\nUS$/ounce\n\n600\n\n1,200\n\n1,400\n\n1,600\n\n1,800\n\n800\n\nChatree - Production\n\nChatree - Ore Mined and Treated\n\nChatree - Cash Costs and Total Costs", - "page_start": 14, - "page_end": 14, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "bearing and are initially recorded at cost. Accounts are written off when manage-\n\nment deems the account to be uncollectible. Recoveries of accounts previously\n\nwritten off are recorded when received. An estimated allowance for doubtful\n\naccounts is maintained to reduce the Company’s receivables to their carrying\n\namount, which approximates fair value. The allowance is estimated based on\n\nspecific review of customer accounts as well as historical collection experience", - "page_start": 56, - "page_end": 56, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "it was correctly specified with regards 6o 1) the choice of basis dimension (k) and 2) the distribution of the model residuals\n\n(see mgcv documentation; Wood, 2017). The general pattern of results held after toggling model parameters; however, we\n\nnote the risk of overinterpreting complex models with small sample sizes (see Sullivan et al., 2015). To address overfitting and\n\ncross-validate our basis type selection, we also fit the data using nonpenalized general linear models (GLM) with both linear\n\nand polynomial terms for gestation week. We compared the performance of each GLM (i.e., models using only a linear term\n\nvs. models with polynomial terms) via the Akaike information criterion (AIC), which revealed that cubic models consistently\n\noutperformed both linear and quadratic models (AICdiff > 3), providing additional evidence for non-linear changes in\n\nstructural brain variables over time.\n\nGray Matter Volume & Cortical Thickness:\n\nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy\n\nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a\n\nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were\n\nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non-\n\ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We\n\nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week\n\n(FDR-corrected at q < 0.05).\n\nT2-weighted MTL scans:\n\nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n =\n\n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual\n\nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" - }, - { - "text": "0 2 4 6 8 10 12 14 16 18 20 *n*\n\n0\n\n20\n\n40\n\n60\n\n80\n\n100\n\n120\n\n140\n\n*T* *N*\n\n*(n) , T* *C*\n\n*(n)*\n\n(K)\n\n*T* *N* *(n)*\n\n*T* *C* *(n)*\n\n*T* *N*\n\n*bulk*\n\nFIG. 5: Transition temperatures T N ( n ) and T C ( n ) vs. film\n\nthickness n .\n\nthe same is true for the crossing point of the Binder cu-\n\nmulant of the average magnetization M (not reported in\n\nfigure), which is located at T C (8) = 133 . 3(3)K. These\n\ndata give a first rough indication that also for n = 8 all\n\nthe planes of the sample are still ordering almost at the\n\nsame temperature; such property has been observed for\n\nall the investigated thicknesses n below 16, so that T C ( n )\n\nresults quite n -independent (see also Fig. 5) .\n\nAlthough the layer subtraction does not seem to mod-\n\nify T C ( n ), the onset of helical arrangement is observed to\n\nshift at lower temperatures as n decreases. The chirality\n\nκ defined in Eq. (4) is reported in Fig 4b for n = 8. As the\n\ntemperature decreases, around T ∼ 80 K we can identify\n\na finite-size behaviour of κ which, at variance with the\n\nprevious one, can be easily recognized as typical of an\n\neffective phase transition. Such conclusion is confirmed\n\nby the analysis of the chiral susceptibility χ κ (Fig. 4c),\n\nwhich for the largest L has a maximum at T = 85 K. As-\n\nsuming that the order parameter (4) is the relevant one\n\nto single out the onset of the fan arrangement, we can\n\nget a more accurate estimate of T N (8) by looking at the\n\nBinder cumulant u 4 ( κ ), reported in Fig. 4d. By making\n\nuse of the MH technique, we locate the crossing point at\n\nT N (8) = 92(2) K. Finally, it is worthwhile to observe as\n\nthe specific heat does not show any anomaly at T N (8),\n\nbeing the entropy substantially removed at T C (8).\n\nThe scenario just outlined for n = 8 results to be cor-\n\nrect in the thickness range 6 ≤ n ≲ 15, where a clear\n\nseparation between T N ( n ) and T C ( n ) can be easily fig-\n\nured out. In such temperature window, the strong sur-\n\nface effects produce a quasi -FM set-up of the magnetic\n\nfilm structure along the z -direction. While leaving to the\n\nnext Section a more detailed discussion of this regime, we\n\nreport in Fig. 5 a plot of T N ( n ) and T C ( n ) vs. n for all\n\nthe simulated thicknesses. The separation between the\n\ntwo critical temperatures is maximum for n = 6, where\n\nT N (6) = 38(4), that is T N (6) ∼ <sup>1</sup> 3 <sup>T</sup> <sup>C</sup> <sup>(6). For films with</sup> less than six layers no fan order is observed, i.e. for n = 5\n\nand below the chirality does not display any typical fea-\n\nture of fan ordering at any temperature below T C ( n ). As\n\na representative quantity we finally look at the rotation\n\n0 1 2 3 4 5 6 0\n\n5\n\n10\n\n15\n\n20\n\n∆ϕ *l*\n\n(deg.)\n\n*T* =10K\n\n*T* =20K\n\n*T* =30K\n\n*T* =40K\n\n*T=* 50K\n\n0 1 2 3 4 5 *l*\n\n0\n\n1\n\n2\n\n3\n\n4\n\n5\n\n**(a)** *n =* 6\n\n**(b)** *n =* 5\n\nFIG. 6: Rotation angle ∆ ϕ l between magnetic moments on\n\nNN layers ( l + 1 , l ) at some low temperatures, for thickness\n\nn = 5 and n = 6, and lateral dimension L = 64.\n\nangle of the magnetization between nearest planes:\n\n∆ ϕ l = ϕ l +1 − ϕ l = arccos � M <sup>x</sup> l <sup>M</sup> <sup>x</sup> l +1 <sup>+</sup> <sup>M</sup> <sup>y</sup> l <sup>M</sup> <sup>y</sup> l +1 � (10)\n\nwhere ( M <sup>x</sup> l <sup>, M</sup> <sup>y</sup> l <sup>) is the magnetic vector profile for each</sup> plane l . ∆ ϕ l is displayed in Fig. 6a and Fig. 6b, for\n\nn = 6 and n = 5, respectively. In Fig. 6a, a quite clear\n\nfan stabilization is observed when the temperature de-\n\ncreases, while in Fig. 6b, i.e. for n = 5, ∆ ϕ l keeps an\n\nalmost temperature independent very small value; what’s\n\nmore, ∆ ϕ l seems to loose any temperature dependence\n\nas T = 0 is approached. We attribute the absence of fan\n\narrangement for n ≤ 5 as simply due to the lack of “bulk\n\nplanes” inside the film, so that we are left with only a 2d\n\ntrend at T C ( n ), i.e. at the temperature where the order\n\nparameters defined in Eqs. (2) and (3) show a critical\n\nbehaviour.", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0510.pdf" - }, - { - "text": "son is commonly known as a spin-fermion model. This\n\nmodel yields d x 2 − y 2 superconductivity and explains in a\n\nquantitative way a number of measured electronic fea-\n\ntures of the cuprates, in particular the near-absence of\n\nthe quasiparticle peak in the NS of optimally doped and underdoped cuprates <sup>39</sup> and the peak-dip-hump structure\n\nin the ARPES profile in the SCS <sup>31,32,46,47</sup> . In our analy-\n\nsis we assume that a CB is a spin fluctuation.\n\nThe results for the conductivity within a spin-fermion\n\nmodel depend in quantitative (but not qualitative) way\n\non the assumption for the momentum dispersion of a col-\n\nlective boson. This momentum dependence comes from", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0764.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0266.pdf", - "query": "What does Kitaev show about spin- 1/2 model?", - "target_page": 1, - "target_passage": "spin- 1/2 model can be mapped to a model with one Majo- rana fermion per site coupled to Ising gauge fields on the links", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "[arXiv:1001.0266v2 [cond-mat.str-el] 4 May 2010](http://arxiv.org/abs/1001.0266v2)\n\n## Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin\n\n## Rotation Invariant System\n\nFa Wang <sup>1</sup>\n\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\n\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil-\n\ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low\n\nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series\n\nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and\n\ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model\n\nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet\n\nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre-\n\nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this\n\nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2\n\nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the\n\nhigh order spin interactions from more natural couplings, which involves perturbative expansions\n\nthus breaks the exact mapping, although in a controlled manner.\n\nPACS numbers: 75.10.Jm, 75.10.Kt\n\nContents\n\nI. Introduction. 1\n\nII. Formulation of the Pseudo-spin-1/2 from\n\nFour-spin Cluster. 2\n\nIII. Realization of the Kitaev Model. 3\n\nIV. Generate the High Order Physical Spin\n\nInteractions by Perturbative Expansion. 5\n\nA. Generate the High Order Terms by Coupling\n\nto Optical Phonon. 5\n\nB. Generate the High Order Terms by Magnetic\n\nInteractions between Clusters. 7\n\nV. Conclusions. 8\n\nAcknowledgments 8\n\nA. Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins 8\n\nB. Derivation of the Terms Generated by\n\nSecond Order Perturbation of Inter-cluster\n\nMagnetic Interactions 9\n\nReferences 10\n\nI. INTRODUCTION.\n\nKitaev’s exactly solvable spin-1/2 honeycomb lattice model <sup>1</sup> (noted as the Kitaev model hereafter) has in-\n\nspired great interest since its debut, due to its exact\n\nsolvability, fractionalized excitations, and the potential\n\nto realize non-Abelian anyons. The model simply reads\n\nH Kitaev = − � x − links <jk>\n\nJ x τ <sup>x</sup> j <sup>τ</sup> <sup>x</sup> k <sup>−</sup> � y − links <jk>\n\nJ y τ <sup>y</sup> j <sup>τ</sup> <sup>y</sup> k\n\n− � z − links <jk>\n\nJ z τ <sup>z</sup> j <sup>τ</sup> <sup>z</sup> k\n\n(1)\n\nwhere τ <sup>x,y,z</sup> are Pauli matrices, and x, y, z -links are de- fined in FIG. 1. It was shown by Kitaev <sup>1</sup> that this spin-\n\n1/2 model can be mapped to a model with one Majo-\n\nrana fermion per site coupled to Ising gauge fields on the\n\nlinks. And as the Ising gauge flux has no fluctuation, the\n\nmodel can be regarded as, under each gauge flux config-\n\nuration, a free Majorana fermion problem. The ground\n\nstate is achieved in the sector of zero gauge flux through\n\neach hexagon. The Majorana fermions in this sector have\n\nDirac-like gapless dispersion resembling that of graphene,\n\nas long as | J x | , | J y | , and | J z | satisfy the triangular rela- tion, sum of any two of them is greater than the third\n\none <sup>1</sup> . It was further proposed by Kitaev <sup>1</sup> that opening of\n\nfermion gap by magnetic field can give the Ising vortices\n\nnon-Abelian anyonic statistics, because the Ising vortex\n\nwill carry a zero-energy Majorana mode, although mag-\n\nnetic field destroys the exact solvability.\n\nGreat efforts have been invested to better understand\n\nthe properties of the Kitaev model. For example, sev-\n\neral groups have pointed out that the fractionalized Ma-\n\njorana fermion excitations may be understood from the\n\nmore familiar Jordan-Wigner transformation of 1D spin", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "y x z z z\n\nz z z z\n\nz z\n\ny y\n\ny\n\nx\n\nx x\n\nx x x\n\ny y y\n\ny\n\nx\n\ny\n\nx\n\nz\n\nz\n\ny y\n\nx x x\n\ny\n\nz x\n\nx\n\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled\n\nand open circles indicate two sublattices. x, y, z label the links\n\nalong three different directions used in (1).\n\nderived as well. There have been several proposals to\n\nopen the fermion gap for the non-Abelian phase without\n\nspoiling exact solvability <sup>4,6</sup> . And many generalizations\n\nto other(even 3D) lattices have been developed in the\n\nlast few years <sup>10- 16</sup> . All these efforts have significantly\n\nenriched our knowledge of exactly solvable models and\n\nquantum phases of matter.\n\nHowever, in the original Kitaev model and its later\n\ngeneralizations in the form of spin models, spin rotation\n\nsymmetry is explicitly broken. This makes them harder\n\nto realize in solid state systems. There are many pro-\n\nposals to realized the Kitaev model in more controllable\n\nsituations, e.g. in cold atom optical lattices <sup>17,18</sup> , or in\n\nsuperconducting circuits <sup>19</sup> . But it is still desirable for\n\ntheoretical curiosity and practical purposes to realize the\n\nKitaev-type models in spin rotation invariant systems.\n\nIn this paper we realize the Kitaev honeycomb lattice\n\nmodel as the low energy Hamiltonian for a spin rotation\n\ninvariant system. The trick is not to use the physical spin\n\nas the spin in the Kitaev model, instead the spin-1/2 in\n\nKitaev model is from some emergent two-fold degener-\n\nate low energy states in the elementary unit of physical\n\nsystem. This type of idea has been explored recently by\n\nJackeli and Khaliullin <sup>20</sup> , in which the spin-1/2 in the Ki-\n\ntaev model is the low energy Kramers doublet created by\n\nstrong spin-orbit coupling of t 2 g orbitals. In the model\n\npresented below, the Hilbert space of spin-1/2 in the Ki-\n\ntaev model is actually the two dimensional spin singlet\n\nsector of four antiferromagnetically coupled spin-1/2 mo-\n\nments, and the role of spin-1/2 operators(Pauli matrices)\n\nin the Kitaev model is replaced by certain combinations\n\nof S j · S k [or the spin-chirality S j · ( S k × S ℓ )] between the\n\nfour spins.\n\nOne major drawback of the model to be presented is\n\nthat it contains high order spin interactions(involves up\n\nto six or eight spins), thus is still unnatural. However it\n\nopens the possibility to realize exotic (exactly solvable)\n\nmodels from spin-1/2 Hamiltonian with spin rotation in-\n\nvariant interactions. We will discuss two possible routes\n\nto reduce this artificialness through controlled perturba-\n\ntive expansions, by coupling to optical phonons or by\n\nmagnetic couplings between the elementary units.\n\nThe outline of this paper is as follows. In Section II\n\nwe will lay out the pseudo-spin-1/2 construction. In Sec-\n\n4\n\n2 3\n\n1\n\n*z* *z*\n\n*x*\n\n*x*\n\n*y*\n\n*y*\n\n2 3\n\n4\n\n1\n\nFIG. 2: Left: the physical spin lattice for the model (8). The\n\ndash circles are honeycomb lattice sites, each of which is ac-\n\ntually a cluster of four physical spins. The dash straight lines\n\nare honeycomb lattice bonds, with their type x, y, z labeled.\n\nThe interaction between clusters connected by x, y, z bonds\n\nare the J x,y,z terms in (8) or (9) respectively. Note this is not the 3-12 lattice used in Ref. <sup>9,10</sup> . Right: enlarged picture of\n\nthe clusters with the four physical spins labeled as 1 , . . . , 4.\n\nThick solid bonds within one cluster have large antiferromag-\n\nnetic Heisenberg coupling J cluster .\n\ntion III the Kitaev model will be explicitly constructed\n\nusing this formalism, and some properties of this con-\n\nstruction will be discussed. In Section IV we will discuss\n\ntwo possible ways to generate the high order spin in-\n\nteractions involved in the construction of Section III by\n\nperturbative expansions. Conclusions and outlook will\n\nbe summarized in Section V.\n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2\n\nFROM FOUR-SPIN CLUSTER.\n\nIn this Section we will construct the pseudo-spin-1/2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has\n\nbeen proposed <sup>38</sup> .\n\nOur model (8) is achieved at second order of the per-\n\nturbation series. Higher order terms become trunca-\n\ntion errors but may be controlled by small parameters\n\nλ x,y,z /J cluster ∼ � | J x,y,z | /J cluster .\n\nV. CONCLUSIONS.\n\nWe constructed the exactly solvable Kitaev honeycomb model <sup>1</sup> as the exact low energy effective Hamiltonian of\n\na spin-1/2 model [equations (8) or (9)] with spin-rotation\n\nand time reversal symmetry. The spin in Kitaev model is\n\nrepresented as the pseudo-spin in the two-fold degenerate\n\nspin singlet subspace of a cluster of four antiferromag-\n\nnetically coupled spin-1/2 moments. The physical spin\n\nmodel is a honeycomb lattice of such four-spin clusters,\n\nwith certain inter-cluster interactions. The machinery\n\nfor the exact mapping to pseudo-spin Hamiltonian was\n\ndeveloped (see e.g. TABLE I), which is quite general\n\nand can be used to construct other interesting (exactly\n\nsolvable) spin-1/2 models from spin rotation invariant\n\nsystems.\n\nIn this construction the pseudo-spin correlations in the\n\nKitaev model will be mapped to dimer or spin-chirality\n\ncorrelations in the physical spin system. The correspond-\n\ning picture of the fractionalized Majorana fermion exci-\n\ntations and Ising vortices still remain to be clarified.\n\nThis exact construction contains high order physical\n\nspin interactions, which is undesirable for practical im-\n\nplementation. We described two possible approaches to\n\nreduce this problem: generating the high order spin in-\n\nteractions by perturbative expansion of the coupling to\n\noptical phonon, or the magnetic coupling between clus-\n\nters. This perturbative construction will introduce trun-\n\ncation error of perturbation series, which may be con-\n\ntrolled by small expansion parameters. Whether these\n\nconstructions can be experimentally engineered is how-\n\never beyond the scope of this study. It is conceivable that\n\nother perturbative expansion can also generate these high\n\norder spin interactions, but this possibility will be left for\n\nfuture works.\n\nAcknowledgments\n\nThe author thanks Ashvin Vishwanath, Yong-Baek\n\nKim and Arun Paramekanti for inspiring discussions, and\n\nTodadri Senthil for critical comments. The author is sup-\n\nported by the MIT Pappalardo Fellowship in Physics.\n\nAppendix A: Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins\n\nIn this Appendix we reproduce from Ref. <sup>35</sup> the cou-\n\nplings of all tetrahedron distortion modes to the spin\n\nsystem. And convert them to pseudo-spin notation in\n\nthe physical spin singlet sector.\n\nConsider a general small distortion of the tetrahedron,\n\nthe spin Hamiltonian becomes\n\nH cluster , SL = ( J cluster / 2)( � ℓ\n\nS ℓ ) <sup>2</sup> + J <sup>′</sup> <sup>�</sup> ℓ<m\n\nδr ℓm ( S ℓ · S m )\n\n(A1)\n\nwhere δr ℓm is the change of bond length between spins ℓ and m , J <sup>′</sup> is the derivative of J cluster with respect to\n\nbond length.\n\nThere are six orthogonal distortion modes of the tetra-\n\nhedron [TABLE 1.1 in Ref. <sup>35</sup> ]. One of the modes A is the\n\ntrivial representation of the tetrahedral group T d ; two E\n\nmodes form the two dimensional irreducible representa-\n\ntion of T d ; and three T 2 modes form the three dimen-\n\nsional irreducible representation. The E modes are also\n\nillustrated in FIG. 3.\n\nThe generic couplings in (A1) [second term] can be\n\nconverted to couplings to these orthogonal modes,\n\nJ <sup>′</sup> ( Q <sup>A</sup> f <sup>A</sup> + Q <sup>E</sup> 1 <sup>f</sup> <sup>E</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>f</sup> <sup>E</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 1 <sup>f</sup> <sup>T</sup> <sup>2</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 2 <sup>f</sup> <sup>T</sup> <sup>2</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 3 <sup>f</sup> <sup>T</sup> <sup>2</sup> 3 <sup>)</sup>", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "be summarized in Section V.\n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2\n\nFROM FOUR-SPIN CLUSTER.\n\nIn this Section we will construct the pseudo-spin-1/2\n\nfrom a cluster of four physical spins, and map the phys-\n\nical spin operators to pseudo-spin operators. The map-\n\nping constructed here will be used in later Sections to\n\nconstruct the effective Kitaev model. In this Section we\n\nwill work entirely within the four-spin cluster, all unspec-\n\nified physical spin subscripts take values 1 , . . . , 4.\n\nConsider a cluster of four spin-1/2 moments(called\n\nphysical spins hereafter), labeled by S 1 ,..., 4 , antiferro-\n\nmagnetically coupled to each other (see the right bot-\n\ntom part of FIG. 2). The Hamiltonian within the clus-\n\nter(up to a constant) is simply the Heisenberg antiferro-\n\nmagnetic(AFM) interactions,\n\nH cluster = ( J cluster / 2) ( S 1 + S 2 + S 3 + S 4 ) <sup>2</sup> (2)\n\nThe energy levels should be apparent from this form:\n\none group of spin-2 quintets with energy 3 J cluster , three\n\ngroups of spin-1 triplets with energy J cluster , and two spin\n\nsinglets with energy zero. We will consider large positive", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "Another note to take is that it is not necessary to have\n\nsuch a highly symmetric cluster Hamiltonian (2). The\n\nmappings to pseudo-spin-1/2 should work as long as the\n\nground states of the cluster Hamiltonian are the two-fold\n\ndegenerate singlets. One generalization, which conforms\n\nthe symmetry of the lattice in FIG. 2, is to have\n\nH cluster = ( J cluster / 2)( r · S 1 + S 2 + S 3 + S 4 ) <sup>2</sup> (11)\n\nwith J cluster > 0 and 0 < r < 3. However this is not\n\nconvenient for later discussions and will not be used.\n\nWe briefly describe some of the properties of (8). Its\n\nlow energy states are entirely in the space that each of the\n\nclusters is a physical spin singlet (called cluster singlet\n\nsubspace hereafter). Therefore physical spin correlations\n\nare strictly confined within each cluster. The excitations\n\ncarrying physical spin are gapped, and their dynamics\n\nare ‘trivial’ in the sense that they do not move from one\n\ncluster to another. But there are non-trivial low energy\n\nphysical spin singlet excitations, described by the pseudo-\n\nspins defined above. The correlations of the pseudo-spins\n\ncan be mapped to correlations of their corresponding\n\nphysical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ <sup>x,y</sup> correlations become certain dimer-dimer correlations, τ <sup>z</sup> correlation\n\nbecomes chirality-chirality correlation, or four-dimer cor-\n\nrelation. It will be interesting to see the corresponding\n\npicture of the exotic excitations in the Kitaev model, e.g.\n\nthe Majorana fermion and the Ising vortex. However this\n\nwill be deferred to future studies.\n\nIt is tempting to call this as an exactly solved spin liq-\n\nuid with spin gap ( ∼ J cluster ), an extremely short-range\n\nresonating valence bond(RVB) state, from a model with\n\nspin rotation and time reversal symmetry. However it\n\nshould be noted that the unit cell of this model contains\n\nan even number of spin-1/2 moments (so does the orig-\n\ninal Kitaev model) which does not satisfy the stringent\n\ndefinition of spin liquid requiring odd number of elec-\n\ntrons per unit cell. Several parent Hamiltonians of spin\n\nliquids have already been constructed. See for example,\n\nRef. <sup>24- 27</sup> .\n\nIV. GENERATE THE HIGH ORDER PHYSICAL\n\nSPIN INTERACTIONS BY PERTURBATIVE\n\nEXPANSION.\n\nOne major drawback of the present construction is that\n\nit involves high order interactions of physical spins[see\n\n(8) and (9)], thus is ‘unnatural’. In this Section we will\n\nmake compromises between exact solvability and natu-\n\nralness. We consider two clusters j and k and try to\n\ngenerate the J x,y,z interactions in (7) from perturbation\n\nseries expansion of more natural(lower order) physical\n\nspin interactions. Two different approaches for this pur-\n\npose will be laid out in the following two Subsections. In\n\nSubsection IV A we will consider the two clusters as two\n\ntetrahedra, and couple the spin system to certain opti-\n\ncal phonons, further coupling between the phonon modes\n\n(a) (b) (c) (d)\n\n(b) (c) (d)\n\n### Q <sup>E</sup> 2\n\n### Q <sup>E</sup> 1\n\n(a)\n\n1 1 1 1\n\n1 1 1\n\n2\n\n2\n\n2\n\n2\n\n2\n\n2 2\n\n2\n\n3\n\n3\n\n3 3 3\n\n3 3 4 4\n\n4 4\n\n3\n\n4\n\n4\n\n4\n\n4\n\n1\n\nFIG. 3: Illustration of the tetragonal to orthorhombic\n\nQ <sup>E</sup> 1 <sup>(top) and</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>(bottom) distortion modes. (a) Perspective</sup>\n\nview of the tetrahedron. 1 , . . . , 4 label the spins. Arrows in-\n\ndicate the motion of each spin under the distortion mode. (b)\n\nTop view of (a). (c)(d) Side view of (a).\n\nof the two clusters can generate at lowest order the de-\n\nsired high order spin interactions. In Subsection IV B we\n\nwill introduce certain magnetic, e.g. Heisenberg-type, in-\n\nteractions between physical spins of different clusters, at\n\nlowest order(second order) of perturbation theory the de-\n\nsired high order spin interactions can be achieved. These\n\napproaches involve truncation errors in the perturbation\n\nseries, thus the mapping to low energy effect Hamilto-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "eral groups have pointed out that the fractionalized Ma-\n\njorana fermion excitations may be understood from the\n\nmore familiar Jordan-Wigner transformation of 1D spin\n\nsystems <sup>2,3</sup> . The analogy between the non-Abelian Ising\n\nvortices and vortices in p + ip superconductors has been\n\nraised in serveral works <sup>4- 7</sup> . Exact diagonalization has\n\nbeen used to study the Kitaev model on small lattices <sup>8</sup> .\n\nAnd perturbative expansion methods have been devel-\n\noped to study the gapped phases of the Kitaev-type\n\nmodels <sup>9</sup> .\n\nMany generalizations of the Kitaev model have been", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "operators is given in TABLE I. Therefore we can choose\n\nanother representation of τ <sup>z</sup> ,\n\nτ <sup>z</sup> = − χ 234 / ( √ 3 / 4) = − (4 / √ 3) S 2 · ( S 3 × S 4 ) (6)\n\nThe above representations of τ <sup>x,y,z</sup> are all invariant under\n\nglobal spin rotation of the physical spins.\n\nWith the machinery of equations (4), (5), and (6), it\n\nwill be straightforward to construct various pseudo-spin-\n\n1/2 Hamiltonians on various lattices, of the Kitaev vari-\n\nety and beyond, as the exact low energy effective Hamil-\n\ntonian of certain spin-1/2 models with spin-rotation sym-\n\nmetry. In these constructions a pseudo-spin lattice site\n\nactually represents a cluster of four spin-1/2 moments.\n\nIII. REALIZATION OF THE KITAEV MODEL.\n\nIn this Section we will use directly the results of the\n\nprevious Section to write down a Hamiltonian whose low\n\nenergy sector is described by the Kitaev model. The\n\nHamiltonian will be constructed on the physical spin lat-\n\ntice illustrated in FIG. 2. In this Section we will use\n\nj, k to label four-spin clusters (pseudo-spin-1/2 sites), the\n\nphysical spins in cluster j are labeled as S j 1 , . . . , S j 4 .\n\nApply the mappings developed in Section II, we have\n\nthe desired Hamiltonian in short notation,\n\nH = � cluster\n\nH cluster − � x − links <jk>\n\nJ x τ <sup>x</sup> j <sup>τ</sup> <sup>x</sup> k\n\n− � y − links <jk>\n\nJ y τ <sup>y</sup> j <sup>τ</sup> <sup>y</sup> k <sup>−</sup> � z − links <jk>\n\nJ z τ <sup>z</sup> j <sup>τ</sup> <sup>z</sup> k\n\n(7)\n\nwhere j, k label the honeycomb lattice sites thus the four-\n\nspin clusters, H cluster is given by (2), τ <sup>x,y,z</sup> should be\n\nreplaced by the corresponding physical spin operators in\n\n(4) and (5) or (6), or some other equivalent representa-\n\ntions of personal preference.", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" - }, - { - "text": "(16)\n\nIn (16), we have been able to reduce the four spin in-\n\nteractions in (8) to inter-cluster Heisenberg interactions,\n\nand the six-spin interactions in (8) to inter-cluster spin-\n\nchirality interactions. The inter-cluster Heisenberg cou-\n\nplings in H perturbation x,y may be easier to arrange. The\n\ninter-cluster spin-chirality coupling in H perturbation z ex-\n\nplicitly breaks time reversal symmetry and is probably\n\nharder to implement in solid state systems. However\n\nspin-chirality order may have important consequences\n\nin frustrated magnets <sup>36,37</sup> , and a realization of spin-", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0266.pdf" - }, - { - "text": "**Q1:** Is a model outstanding on all tasks?\n\nAs we are trying to find out whether one embed-\n\nding model is statistically better than the others for\n\nFrench, the objective will also be to analyze the\n\nperformance of the models by tasks to facilitate\n\nmodel choice for specific applications.\n\n**Q2:** Are there any links between the model charac-\n\nteristics and performance?\n\nIn section 3.2 , we undertook the substantial task of\n\ngathering the characteristics of all evaluated mod-\n\nels. The goal here will be to analyze their impact\n\non performance and draw conclusions about, for\n\nexample, the relationship between embedding di-\n\nmension and model ranking on the benchmark.\n\n**Q3:** Do monolingual models have multilingual ca-\n\npabilities?\n\nWe interrogate the ability of a model trained exclu-\n\nsively in one language to perform well in another\n\nlanguage.\n\n**Q4:** Are there any correlations between datasets\n\n10 [https://huggingface.co./models](https://huggingface.co./models)\n\n5", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv4.pdf" - }, - { - "text": "Fremont Factory Model S / Model X Active\n\nModel 3 / Model Y Active\n\nGigafactory Shanghai Model 3 / Model Y Active\n\nGigafactory Berlin-Brandenburg Model Y Active\n\nGigafactory Texas Model Y Active\n\nCybertruck Active\n\nGigafactory Nevada Tesla Semi Pilot production\n\nVarious Next Generation Platform In development\n\nTBD Roadster In development\n\n26", - "page_start": 31, - "page_end": 31, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0266.pdf", - "query": "How can fractionalised Majorana fermion excitations be understood?", - "target_page": 1, - "target_passage": "from the more familiar Jordan-Wigner transformation of 1D spin systems", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "son is commonly known as a spin-fermion model. This\n\nmodel yields d x 2 − y 2 superconductivity and explains in a\n\nquantitative way a number of measured electronic fea-\n\ntures of the cuprates, in particular the near-absence of\n\nthe quasiparticle peak in the NS of optimally doped and underdoped cuprates <sup>39</sup> and the peak-dip-hump structure\n\nin the ARPES profile in the SCS <sup>31,32,46,47</sup> . In our analy-\n\nsis we assume that a CB is a spin fluctuation.\n\nThe results for the conductivity within a spin-fermion\n\nmodel depend in quantitative (but not qualitative) way\n\non the assumption for the momentum dispersion of a col-\n\nlective boson. This momentum dependence comes from", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0764.pdf" - }, - { - "text": "become negative. Rather, the increase in the frequency\n\nrange where ∆ W ( ω c ) remains positive and non-BCS be-\n\nhavior of δ KE are two indications of the same effect that\n\nfermions are incoherent in the NS but acquire coherence\n\nin the SCS.\n\nIII. CONCLUSION\n\nIn this work we analyzed the behavior of optical in-\n\ntegrals W ( ω c ) ∝ � ω c\n\no σ ( ω ) dω and Kubo sum rules in\n\nthe normal and superconducting states of interacting\n\nfermionic systems on a lattice. Our key goal was to\n\nunderstand what sets the sign of ∆ W K = ∆ W ( ∞ ) be-\n\ntween the normal and superconducting states and what\n\nis the behavior of W ( ω c ) and ∆ W ( ω c ) at finite ω c . In a\n\nweak coupling BCS superconductor, ∆ W ( ω c ) is positive\n\nat ω c < 2∆due to a contribution from superfluid den-\n\nsity, but becomes negative at larger ω c , and approach a\n\nnegative value of ∆ W K . Our study was motivated by fas-\n\ncinating optical experiments on the cuprates <sup>7- 10</sup> . In over- doped cuprates, there is clear indication <sup>11</sup> that ∆ W ( ω c )\n\nbecomes negative above a few ∆, consistent with BCS\n\nbehavior. In underdoped cuprates, two groups argued <sup>8,9</sup>\n\nthat ∆ W integrated up to the bandwidth remains posi- tive, while the other group argued <sup>10</sup> that it is negative.\n\nThe reasoning why ∆ W K may potentially change sign\n\nat strong coupling involves the correlation between − W K\n\nand the kinetic energy. In the BCS limit, kinetic en-\n\nergy obviously increases in a SCS because of gap opening,\n\nhence − W K increases, and ∆ W K is negative. At strong\n\ncoupling, there is a counter effect - fermions become more\n\nmobile in a SCS due to a smaller self-energy.\n\nWe considered four models: a BCS model with impu-\n\nrities, a model of fermions interacting with an Einstein\n\nboson, a phenomenological MFL model with impurities,\n\nand a model of fermions interacting with collective spin\n\nfluctuations. In all cases, we found that ∆ W K is neg-\n\native, but how it evolves with ω c and how much of the\n\nsum rule is recovered by integrating up to the bandwidth\n\ndepends on the model.\n\nThe result most relevant to the experiments on the\n\ncuprates is obtained for the spin fluctuation model.\n\nWe found that at strong coupling, the zero-crossing of\n\nδW ( ω c ) occurs at a frequency which increases with the\n\ncoupling strength and may become larger than the band-\n\nwidth at a truly strong coupling. Still, at even larger\n\nfrequencies, ∆ W ( ω c ) is negative.", - "page_start": 13, - "page_end": 13, - "source_file": "1001.0764.pdf" - }, - { - "text": "where g is the spin-fermion coupling, and χ ( q, ω ) is the\n\nspin susceptibility whose dynamics changes between NS\n\nand SCS.\n\nFrom our analysis we found that the introduction of\n\na finite fermionic bandwidth by means of a lattice has\n\ngenerally a notable effect on both W and ∆ W . We\n\nfound that for all models except for BCSI model, only\n\n70% − 80% of the optical spectral weight is obtained by\n\nintegrating up to the bandwidth. In these three models,\n\nthere also exists a wide range of ω c in which the behavior\n\nof ∆ W ( ω c ) is due to variation of ∆ f ( ω c ) which is domi-\n\nnant comparable to the ∆ W K term. This dominance of\n\nthe cut off term is consistent with the analysis in Refs.\n\n21,22,33.\n\nWe also found that for all models except for the origi-\n\nnal version of the MFLI model the optical weight at the\n\nhighest frequencies is greater in the NS than in the SCS\n\n(i.e., ∆ W < 0). This observation is consistent with the\n\nfindings of Abanov and Chubukov <sup>32</sup> , Benfatto et. al. <sup>28</sup> ,\n\nand Karakozov and Maksimov <sup>34</sup> . In the original ver- sion of the MFLI model <sup>30</sup> the spectral weight in SCS\n\nwas found to be greater than in the NS (∆ W > 0). We\n\nshow that the behavior of ∆ W ( ω c ) in this model cru-\n\ncially depends on how the fermionic self-energy modeled\n\nto fit ARPES data in a NS is modified when a system\n\nbecomes a superconductor and can be of either sign. We\n\nalso found, however, that ω c at which ∆ W becomes neg-\n\native rapidly increases with the coupling strength and at\n\nstrong coupling becomes comparable to the bandwidth.\n\nIn the CB model, which, we believe, is most appropriate\n\nfor the application to the cuprates, ∆ W K = ∆ W ( ∞ ) is\n\nquite small, and at strong coupling a negative ∆ W ( ω c )\n\nup to ω c ∼ 1 eV is nearly compensated by the optical\n\nintegral between ω c and “infinity”, which, in practice, is", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0764.pdf" - }, - { - "text": "high-energy fermions and is an input for the low-energy\n\ntheory. Below we follow Refs. 31,33 and assume that\n\nthe momentum dependence of a collective boson is flat\n\nnear ( π, π ). The self energy within such model has been\n\nworked out consistently in Ref. 31,33. In the normal\n\nstate\n\nΣ <sup>′′</sup> ( ω ) = − <sup>1</sup> 2 <sup>λ</sup> <sup>n</sup> <sup>ω</sup> <sup>sf</sup> <sup>log</sup> � 1 + <sup>ω</sup> <sup>2</sup> ω <sup>2</sup> sf �\n\nΣ <sup>′</sup> ( ω ) = − λ n ω sf arctan <sup>ω</sup> ω sf\n\n(19)\n\nwhere λ n is the spin-fermion coupling constant, and ω sf\n\nis a typical spin relaxation frequency of overdamped spin\n\ncollective excitations with a propagator\n\nχ ( q ∼ Q, Ω) = χ Q\n\n1 − i <sup>Ω</sup> ω sf\n\n(20)\n\nwhere χ Q is the uniform static susceptibility. If we use\n\nOrnstein-Zernike form of χ ( q ) and use either Eliashberg 45 or FLEX computational schemes 48 , we get rather sim-\n\nilar behavior of Σ as a function of frequency and rather\n\nsimilar behavior of optical integrals.\n\nThe collective nature of spin fluctuations is reflected in\n\nthe fact that the coupling λ and the bosonic frequency\n\nω sf are related: λ scales as ξ <sup>2</sup> , where ξ is the bosonic\n\nmass (the distance to a bosonic instability), and ω sf ∝ ξ <sup>−</sup> <sup>2</sup> (see Ref. 49). For a flat χ ( q ∼ Q ) the product λω sf\n\ndoes not depend on ξ and is the overall dimensional scale\n\nfor boson-mediated interactions.\n\nIn the SCS fermionic excitations acquire a gap. This\n\ngap affects fermionic self-energy in two ways: directly, via\n\nthe change of the dispersion of an intermediate boson in\n\nthe exchange process involving a CB, and indirectly, via\n\nthe change of the propagator of a CB. We remind our-\n\nselves that the dynamics of a CB comes from a particle-\n\nhole bubble which is indeed affected by ∆.\n\nThe effect of a d − wave pairing gap on a CB has been\n\ndiscussed in a number of papers, most recently in <sup>31</sup> . In\n\na SCS a gapless continuum described by Eq. (20) trans-\n\nforms into a gaped continuum, with a gap about 2∆and\n\na resonance at ω = ω 0 < 2∆, where for a d − wave gap we\n\ndefine ∆as a maximum of a d − wave gap.\n\nThe spin susceptibility near ( π, π ) in a superconductor\n\ncan generally be written up as\n\nχ ( q ∼ Q, Ω) = χ Q\n\n1 − i <sup>Π(Ω)</sup> ω sf\n\n(21)\n\nwhere Π is evaluated by adding up the bubbles made\n\nout of two normal and two anomalous Green’s functions.\n\nBelow 2∆, Π(Ω) is real ( ∼ Ω <sup>2</sup> / ∆for small Ω), and the\n\nresonance emerges at Ω= ω 0 at which Π( ω 0 ) = ω sf . At\n\nfrequencies larger than 2∆, Π(Ω) has an imaginary part,\n\nand this gives rise to a gaped continuum in χ (Ω).\n\nThe imaginary part of the spin susceptibility around\n\nthe resonance frequency ω 0 is <sup>31</sup>\n\nχ ′′ ( q, Ω) = πZ o ω 0\n\n2 δ (Ω − ω 0 ) (22)\n\nwhere Z o ∼ 2 ω sf χ 0 / <sup>∂</sup> <sup>Π</sup> ∂ω | Ω= ω 0 <sup>. The imaginary part</sup> of the spin susceptibility describing a gaped continuum\n\nexists for for Ω ≥ 2∆and is\n\nχ ′′ ( q, Ω) = Im � χ 0\n\n1 − 1\n\nω sf � 4∆ 2 Ω <sup>D</sup> <sup>(</sup> <sup>4∆</sup> <sup>2</sup> Ω <sup>2</sup> <sup>) +</sup> <sup>i</sup> <sup>Ω</sup> <sup>K</sup> <sup>2</sup> <sup>(1</sup> <sup>−</sup> <sup>4∆</sup> <sup>2</sup> Ω <sup>2</sup> <sup>)</sup> � �\n\n≈ Im � χ 0\n\n1 − 1\n\nω sf � π ∆ 2\n\nΩ + i <sup>π</sup> 2 <sup>Ω</sup> � � f or Ω >> 2∆ (23)\n\nIn Eq. (23) D ( x ) = <sup>K</sup> <sup>1</sup> <sup>(</sup> <sup>x</sup> <sup>)</sup> <sup>−</sup> <sup>K</sup> <sup>2</sup> <sup>(</sup> <sup>x</sup> <sup>)</sup> x , and K 1 ( x ) and K 2 ( x )\n\nare Elliptic integrals of first and second kind. The real\n\npart of χ is obtained by Kramers-Kr¨onig transform of the\n\nimaginary part.\n\nSubstituting Eq 6 for χ ( q, Ω) into the formula for the\n\nself-energy one obtains Σ <sup>′′</sup> ( ω ) in a SCS state as a sum of\n\ntwo terms <sup>31</sup>\n\nΣ <sup>′′</sup> ( ω ) = Σ <sup>′′</sup> A <sup>(</sup> <sup>ω</sup> <sup>) + Σ</sup> <sup>′′</sup> B <sup>(</sup> <sup>ω</sup> <sup>)</sup> (24)\n\nwhere,", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0764.pdf" - }, - { - "text": "2-D lattice with a 62x62 grid. The frequency integrals are\n\ndone analytically wherever possible, otherwise performed\n\nusing Simpson’s rule for all regular parts. Contributions\n\nfrom the poles are computed separately using Cauchy’s\n\ntheorem. For comparison, in all four cases we also calcu-\n\nlated FGT sum rule by replacing � d <sup>2</sup> k = d Ω k dǫ k ν ǫ k , Ω k\n\nand keeping ν constant. We remind that the FGT is\n\nthe result when one assumes that the integral in W ( ω c )\n\npredominantly comes from a narrow region around the\n\nFermi surface.\n\nWe will first use Eq 3 and compute W K in NS and SCS.\n\nThis will tell us about the magnitude of ∆ W ( ω c = ∞ ).\n\nWe next compute the conductivity σ ( ω ) using the equa-\n\ntions listed above, find W ( ω c ) and ∆ W ( ω c ) and compare\n\n∆ f ( ω c ) and ∆ W K .\n\nFor simplicity and also for comparisons with earlier\n\nstudies, for BCSI, EB, and MFLI models we assumed\n\nthat the gap is just a constant along the FS. For CB\n\nmodel, we used a d − wave gap and included into consid-\n\neration the fact that, if a CB is a spin fluctuation, its\n\npropagator develops a resonance when the pairing gap is\n\nd − wave.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0764.pdf" - }, - { - "text": "modified MFLI models. It is interesting that this holds\n\ndespite the fact that for large λ CB model displays the\n\nphysics one apparently needs to reverse the sign of ∆ W K\n\n- the absence of the quasiparticle peak in the NS and its\n\nemergence in the SCS accompanied by the dip and the\n\nhump at larger energies. The absence of coherent quasi-\n\nparticle in the NS at large λ is also apparent form Fig\n\n21 where we show the normal state distribution functions\n\nfor two different λ . For large λ the jump (which indicates\n\nthe presence of quasiparticles) virtually disappears.\n\nOn a more careful look, we found that indifference of\n\nδW ( ω c ) to the increase of λ is merely the consequence of\n\nthe fact that above we kept λω sf constant. Indeed, at small frequencies, fermionic self-energy in the NS is Σ <sup>′</sup> =\n\nλω , Σ” = λ <sup>2</sup> ω <sup>2</sup> / ( λω sf ), and both Σ <sup>′</sup> and Σ <sup>′′</sup> increase\n\nwith λ if we keep λω sf constant. But at frequencies larger\n\nthan ω sf , which we actually probe by ∆ W ( ω c ), the self-\n\nenergy essentially depends only on λω sf , and increasing λ\n\nbut keeping λω sf constant does not bring us closer to the\n\nphysics associated with the recovery of electron coherence\n\nin the SCS. To detect this physics, we need to see how\n\nthings evolve when we increase λω sf above the scale of\n\n∆, i.e., consider a truly strong coupling when not only\n\nλ ≫ 1 but also the normal state Σ NS ( ω ≥ ∆) >> ∆.\n\nTo address this issue, we took a larger λ for the same\n\nω sf and re-did the calculation of the conductivities and\n\noptical integrals. The results for σ ( ω ) and ∆ W ( ω c ) are\n\npresented in Fig. 22. We found the same behavior as be-\n\nfore, i.e., ∆ W K is negative. But we also found that the\n\nlarger is the overall scale for the self-energy, the larger is a\n\nfrequency of zero-crossing of ∆ W ( ω c ). In particular, for\n\nthe same λ and ω sf that were used in Ref. 33 to fit the NS\n\nconductivity data, the zero crossing is at ∼ 0 . 8 eV which\n\nis quite close to the bandwidth. This implies that at a\n\ntruly strong coupling the frequency at which ∆ W ( ω c )\n\nchanges sign can well be larger than the bandwidth of\n\n1 eV in which case ∆ W integrated up to the bandwidth\n\ndoes indeed remain positive. Such behavior would be\n\nconsistent with Refs.8,9. we also see from Fig. 22 that\n\n∆ W K becomes small at a truly strong coupling, and over\n\na wide range of frequencies the behavior of ∆ W ( ω c ) is\n\npredominantly governed by ∆ f ( ω c ), i.e. by the cut-off term. <sup>50</sup> The implication is that, to first approximation,\n\n∆ W K can be neglected and positive ∆ W ( w c ) integrated\n\nto a frequency where it is still positive is almost compen-\n\nsated by the integral over larger frequencies. This again\n\nwould be consistent with the experimental data in Refs.\n\n8,9.\n\nIt is also instructive to understand the interplay be-\n\ntween the behavior of ∆ W ( ω c ) and the behavior of the\n\ndifference of the kinetic energy between the SCS and the\n\nNS, δ KE . We computed the kinetic energy as a function\n\nof λω sf and present the results in Fig. 23 for λ = 1 and\n\n10. For a relatively weak λ = 1 the behavior is clearly\n\nBCS like- δ KE > 0 and increases with increasing λω sf .\n\nHowever, at large λ = 10, we see that the kinetic energy\n\nbegin decreasing at large λω sf and eventually changes\n\nsign. The behavior of δ KE at a truly strong coupling is\n\nconsistent with earlier calculation of the kinetic energy\n\nfor Ornstein-Zernike form of the spin susceptibility <sup>43</sup> .\n\nWe clearly see that the increase of the zero crossing\n\nfrequency of ∆ W ( ω c ) at a truly strong coupling is cor-\n\nrelated with the non-BCS behavior of δ KE . At the same\n\ntime, the behavior of δW ( ω c ) is obviously not driven by\n\nthe kinetic energy as eventually δW ( ω c ) changes sign and\n\nbecome negative. Rather, the increase in the frequency\n\nrange where ∆ W ( ω c ) remains positive and non-BCS be-\n\nhavior of δ KE are two indications of the same effect that", - "page_start": 13, - "page_end": 13, - "source_file": "1001.0764.pdf" - }, - { - "text": "0 0.5 1 0\n\n0.5\n\n1\n\nω in eV\n\nσ ( ω )\n\nConductivities (BCSI)\n\nNS\n\nSC\n\n2 ∆\n\n0 50 100 160\n\n180\n\n200\n\nΓ in meV\n\nW K in meV\n\nBCSI\n\nSC\n\nNS\n\nFIG. 4: Top - a conductivity plot for the BCSI case in the\n\npresence of a lattice. The parameters are ∆= 30 meV , Γ =\n\n3 . 5 meV . Bottom - the behavior of Kubo sums. Note that (a)\n\nthe spectral weight in the NS is always greater in the SCS, (b)\n\nthe spectral weight decreases with Γ, and (c) the difference\n\nbetween NS and SCS decreases as Γ increases.\n\nlittle variation of ∆ W ( ω c ) at above 0 . 1 − 0 . 3 eV what\n\nimplies that for larger ω c , ∆ W ( ω c ) ≈ ∆ W K >> ∆ f ( ω c ).\n\nTo make this more quantitative, we compare in Fig. 6\n\n∆ W ( ω c ) obtained for a constant DOS, when ∆ W ( ω c ) =\n\n∆ f ( ω c ), and for the actual lattice dispersion, when\n\n∆ W ( ω c ) = ∆ W K + ∆ f ( ω c ). In the clean limit there\n\nis obviously little cutoff dependence beyond 0 . 1 eV , i.e.,\n\n∆ f ( ω c ) is truly small, and the difference between the\n\ntwo cases is just ∆ W K . In the dirty limit, the situation\n\nis similar, but there is obviously more variation with ω c ,\n\nand ∆ f ( ω c ) becomes truly small only above 0 . 3 eV . Note\n\nalso that the position of the dip in ∆ W ( ω c ) in the clean\n\nlimit is at a larger ω c in the presence of the lattice than\n\nin a continuum.\n\nB. The Einstein boson model\n\nWe next consider the case of electrons interacting with\n\na single boson mode which by itself is not affected by su-\n\nperconductivity. The primary candidate for such mode is\n\nan optical phonon. The imaginary part of the NS self en-\n\nergy has been discussed numerous times in the literature.\n\nWe make one simplifying assumption - approximate the\n\nDOS by a constant in calculating fermionic self-energy.\n\nWe will, however, keep the full lattice dispersion in the\n\ncalculations of the optical integral. The advantage of this\n\n0 0.5 1 0\n\n0.5\n\n1\n\nω c in eV\n\nW( ω c )/W( ∞ )\n\nNormal State Optical Sum (BCSI)\n\nDirty Limit\n\nClean Limit\n\n0 0.5 1 0\n\n0.5\n\n1\n\nω c in eV\n\nW( ω c )/W( ∞ )\n\nSuperconducting State Optical Sum (BCSI)\n\nDirty Limit\n\nClean Limit\n\nFIG. 5: The evolution of optical integral in NS(top) and\n\nSCS(bottom) for BCSI case. Plots are made for clean limit\n\n(solid lines, Γ = 3 . 5 meV ) and dirty limit (dashed lines,\n\nΓ = 150 meV ) for ∆= 30 meV . Observe that (a) W (0) = 0\n\nin the NS, but has a non-zero value in the SCS because of the\n\nδ -function (this value decreases in the dirty limit), and (b)\n\nthe flat region in the SCS is due to the fact that σ <sup>′</sup> ( ω ) = 0 for\n\nΩ < 2∆. Also note that ∼ 90 − 95% of the spectral weight is recovered up to 1 eV\n\napproximation is that the self-energy can be computed\n\nanalytically. The full self-energy obtained with the lat-\n\ntice dispersion is more involved and can only be obtained\n\nnumerically, but its structure is quite similar to the one\n\nobtained with a constant DOS.\n\nThe self-energy for a constant DOS is given by\n\nΣ( iω ) = − <sup>i</sup> 2 π <sup>λ</sup> <sup>n</sup> � dǫ k d ( i Ω) χ ( i Ω) G ( ǫ k , iω + i Ω) (13)\n\nwhere\n\nχ ( i Ω) = ω <sup>2</sup> 0\n\nω <sup>2</sup> 0 <sup>−</sup> <sup>(</sup> <sup>i</sup> <sup>Ω)</sup> <sup>2</sup> (14)\n\nand λ n is a dimensionless electron-boson coupling. Inte-\n\ngrating and transforming to real frequencies, we obtain\n\nΣ <sup>′′</sup> ( ω ) = − <sup>π</sup> 2 <sup>λ</sup> <sup>n</sup> <sup>ω</sup> <sup>o</sup> <sup>Θ(</sup> <sup>|</sup> <sup>ω</sup> <sup>| −</sup> <sup>ω</sup> <sup>o</sup> <sup>)</sup>\n\nΣ <sup>′</sup> ( ω ) = − <sup>1</sup> 2 <sup>λ</sup> <sup>n</sup> <sup>ω</sup> <sup>o</sup> <sup>log</sup> ���� ω + ω o\n\nω − ω o ���� (15)\n\nIn the SCS, we obtain for ω < 0\n\nΣ <sup>′′</sup> ( ω ) = − <sup>π</sup> 2 <sup>λ</sup> <sup>n</sup> <sup>ω</sup> <sup>o</sup> <sup>Re</sup> � ω + ω o\n\n� ( ω + ω o ) <sup>2</sup> − ∆ <sup>2</sup> �", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0764.pdf" - }, - { - "text": "Another note to take is that it is not necessary to have\n\nsuch a highly symmetric cluster Hamiltonian (2). The\n\nmappings to pseudo-spin-1/2 should work as long as the\n\nground states of the cluster Hamiltonian are the two-fold\n\ndegenerate singlets. One generalization, which conforms\n\nthe symmetry of the lattice in FIG. 2, is to have\n\nH cluster = ( J cluster / 2)( r · S 1 + S 2 + S 3 + S 4 ) <sup>2</sup> (11)\n\nwith J cluster > 0 and 0 < r < 3. However this is not\n\nconvenient for later discussions and will not be used.\n\nWe briefly describe some of the properties of (8). Its\n\nlow energy states are entirely in the space that each of the\n\nclusters is a physical spin singlet (called cluster singlet\n\nsubspace hereafter). Therefore physical spin correlations\n\nare strictly confined within each cluster. The excitations\n\ncarrying physical spin are gapped, and their dynamics\n\nare ‘trivial’ in the sense that they do not move from one\n\ncluster to another. But there are non-trivial low energy\n\nphysical spin singlet excitations, described by the pseudo-\n\nspins defined above. The correlations of the pseudo-spins\n\ncan be mapped to correlations of their corresponding\n\nphysical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ <sup>x,y</sup> correlations become certain dimer-dimer correlations, τ <sup>z</sup> correlation\n\nbecomes chirality-chirality correlation, or four-dimer cor-\n\nrelation. It will be interesting to see the corresponding\n\npicture of the exotic excitations in the Kitaev model, e.g.\n\nthe Majorana fermion and the Ising vortex. However this\n\nwill be deferred to future studies.\n\nIt is tempting to call this as an exactly solved spin liq-\n\nuid with spin gap ( ∼ J cluster ), an extremely short-range\n\nresonating valence bond(RVB) state, from a model with\n\nspin rotation and time reversal symmetry. However it\n\nshould be noted that the unit cell of this model contains\n\nan even number of spin-1/2 moments (so does the orig-\n\ninal Kitaev model) which does not satisfy the stringent\n\ndefinition of spin liquid requiring odd number of elec-\n\ntrons per unit cell. Several parent Hamiltonians of spin\n\nliquids have already been constructed. See for example,\n\nRef. <sup>24- 27</sup> .\n\nIV. GENERATE THE HIGH ORDER PHYSICAL\n\nSPIN INTERACTIONS BY PERTURBATIVE\n\nEXPANSION.\n\nOne major drawback of the present construction is that\n\nit involves high order interactions of physical spins[see\n\n(8) and (9)], thus is ‘unnatural’. In this Section we will\n\nmake compromises between exact solvability and natu-\n\nralness. We consider two clusters j and k and try to\n\ngenerate the J x,y,z interactions in (7) from perturbation\n\nseries expansion of more natural(lower order) physical\n\nspin interactions. Two different approaches for this pur-\n\npose will be laid out in the following two Subsections. In\n\nSubsection IV A we will consider the two clusters as two\n\ntetrahedra, and couple the spin system to certain opti-\n\ncal phonons, further coupling between the phonon modes\n\n(a) (b) (c) (d)\n\n(b) (c) (d)\n\n### Q <sup>E</sup> 2\n\n### Q <sup>E</sup> 1\n\n(a)\n\n1 1 1 1\n\n1 1 1\n\n2\n\n2\n\n2\n\n2\n\n2\n\n2 2\n\n2\n\n3\n\n3\n\n3 3 3\n\n3 3 4 4\n\n4 4\n\n3\n\n4\n\n4\n\n4\n\n4\n\n1\n\nFIG. 3: Illustration of the tetragonal to orthorhombic\n\nQ <sup>E</sup> 1 <sup>(top) and</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>(bottom) distortion modes. (a) Perspective</sup>\n\nview of the tetrahedron. 1 , . . . , 4 label the spins. Arrows in-\n\ndicate the motion of each spin under the distortion mode. (b)\n\nTop view of (a). (c)(d) Side view of (a).\n\nof the two clusters can generate at lowest order the de-\n\nsired high order spin interactions. In Subsection IV B we\n\nwill introduce certain magnetic, e.g. Heisenberg-type, in-\n\nteractions between physical spins of different clusters, at\n\nlowest order(second order) of perturbation theory the de-\n\nsired high order spin interactions can be achieved. These\n\napproaches involve truncation errors in the perturbation\n\nseries, thus the mapping to low energy effect Hamilto-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "[arXiv:1001.0764v2 [cond-mat.str-el] 13 Jan 2010](http://arxiv.org/abs/1001.0764v2)\n\n## Optical Integral and Sum Rule Violation\n\nSaurabh Maiti, Andrey V. Chubukov\n\nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA\n\n(Dated: November 9, 2018)\n\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in\n\nthe cuprates. We compute conductivities, optical integrals W , and ∆ W between superconducting\n\nand normal states for 2-D systems with lattice dispersion typical of the cuprates for four different\n\nmodels - a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a\n\ncollective boson model with a feedback from superconductivity on a collective boson. The goal of\n\nthe paper is two-fold. First, we analyze the dependence of W on the upper cut-off ( ω c ) placed on\n\nthe optical integral because in experiments W is measured up to frequencies of order bandwidth.\n\nFor a BCS model, the Kubo sum rule is almost fully reproduced at ω c equal to the bandwidth. But\n\nfor other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for\n\n∆ W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign\n\nof ∆ W . In all models we studied ∆ W is positive at small ω c , then crosses zero and approaches a\n\nnegative value at large ω c , i.e. the optical integral in a superconductor is smaller than in a normal\n\nstate. The point of zero crossing, however, increases with the interaction strength and in a collective\n\nboson model becomes comparable to the bandwidth at strong coupling. We argue that this model\n\nexhibits the behavior consistent with that in the cuprates.\n\nI. INTRODUCTION\n\nThe analysis of sum rules for optical conductivity has a long history. Kubo, in an extensive paper <sup>1</sup> in 1957, used\n\na general formalism of a statistical theory of irreversible\n\nprocesses to investigate the behavior of the conductivity\n\nin electronic systems. For a system of interacting elec-\n\ntrons, he derived the expression for the integral of the real\n\npart of a (complex) electric conductivity σ (Ω) and found\n\nthat it is independent on the nature of the interactions\n\nand reduces to\n\n� ∞\n\n0\n\nRe σ (Ω) d Ω= <sup>π</sup> 2\n\nne <sup>2</sup>\n\nm (1)\n\nHere n is the density of the electrons in the system and\n\nm is the bare mass of the electron. This expression is\n\nexact provided that the integration extends truly up to\n\ninfinity, and its derivation uses the obvious fact that at\n\nenergies higher than the total bandwidth of a solid, elec-\n\ntrons behave as free particles.\n\nThe independence of the r.h.s. of Eq. (1) on temper-\n\nature and the state of a solid (e.g., a normal or a super-\n\nconducting state - henceforth referred to as NS and SCS\n\nrespectively) implies that, while the functional form of\n\nσ (Ω) changes with, e.g., temperature, the total spectral\n\nweight is conserved and only gets redistributed between\n\ndifferent frequencies as temperature changes. This con-\n\nservation of the total weight of σ (Ω) is generally called a\n\nsum rule.\n\nOne particular case, studied in detail for conventional\n\nsuperconductors, is the redistribution of the spectral\n\nweight between normal and superconducting states. This\n\nis known as Ferrel-Glover-Tinkham (FGT) sum rule: <sup>2,3</sup>\n\n� ∞\n\n0+\n\nRe σ NS (Ω) = � ∞\n\n0+\n\nRe σ sc (Ω) + <sup>πn</sup> <sup>s</sup> <sup>e</sup> <sup>2</sup> 2 m (2)\n\nwhere n s is the superfluid density, and πn s e <sup>2</sup> / (2 m ) is\n\nthe spectral weight under the δ -functional piece of the\n\nconductivity in the superconducting state.\n\nIn practice, the integration up to an infinite frequency\n\nis hardly possible, and more relevant issue for practical\n\napplications is whether a sum rule is satisfied, at least ap-\n\nproximately, for a situation when there is a single electron\n\nband which crosses the Fermi level and is well separated\n\nfrom other bands. Kubo considered this case in the same", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0764.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has\n\nbeen proposed <sup>38</sup> .\n\nOur model (8) is achieved at second order of the per-\n\nturbation series. Higher order terms become trunca-\n\ntion errors but may be controlled by small parameters\n\nλ x,y,z /J cluster ∼ � | J x,y,z | /J cluster .\n\nV. CONCLUSIONS.\n\nWe constructed the exactly solvable Kitaev honeycomb model <sup>1</sup> as the exact low energy effective Hamiltonian of\n\na spin-1/2 model [equations (8) or (9)] with spin-rotation\n\nand time reversal symmetry. The spin in Kitaev model is\n\nrepresented as the pseudo-spin in the two-fold degenerate\n\nspin singlet subspace of a cluster of four antiferromag-\n\nnetically coupled spin-1/2 moments. The physical spin\n\nmodel is a honeycomb lattice of such four-spin clusters,\n\nwith certain inter-cluster interactions. The machinery\n\nfor the exact mapping to pseudo-spin Hamiltonian was\n\ndeveloped (see e.g. TABLE I), which is quite general\n\nand can be used to construct other interesting (exactly\n\nsolvable) spin-1/2 models from spin rotation invariant\n\nsystems.\n\nIn this construction the pseudo-spin correlations in the\n\nKitaev model will be mapped to dimer or spin-chirality\n\ncorrelations in the physical spin system. The correspond-\n\ning picture of the fractionalized Majorana fermion exci-\n\ntations and Ising vortices still remain to be clarified.\n\nThis exact construction contains high order physical\n\nspin interactions, which is undesirable for practical im-\n\nplementation. We described two possible approaches to\n\nreduce this problem: generating the high order spin in-\n\nteractions by perturbative expansion of the coupling to\n\noptical phonon, or the magnetic coupling between clus-\n\nters. This perturbative construction will introduce trun-\n\ncation error of perturbation series, which may be con-\n\ntrolled by small expansion parameters. Whether these\n\nconstructions can be experimentally engineered is how-\n\never beyond the scope of this study. It is conceivable that\n\nother perturbative expansion can also generate these high\n\norder spin interactions, but this possibility will be left for\n\nfuture works.\n\nAcknowledgments\n\nThe author thanks Ashvin Vishwanath, Yong-Baek\n\nKim and Arun Paramekanti for inspiring discussions, and\n\nTodadri Senthil for critical comments. The author is sup-\n\nported by the MIT Pappalardo Fellowship in Physics.\n\nAppendix A: Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins\n\nIn this Appendix we reproduce from Ref. <sup>35</sup> the cou-\n\nplings of all tetrahedron distortion modes to the spin\n\nsystem. And convert them to pseudo-spin notation in\n\nthe physical spin singlet sector.\n\nConsider a general small distortion of the tetrahedron,\n\nthe spin Hamiltonian becomes\n\nH cluster , SL = ( J cluster / 2)( � ℓ\n\nS ℓ ) <sup>2</sup> + J <sup>′</sup> <sup>�</sup> ℓ<m\n\nδr ℓm ( S ℓ · S m )\n\n(A1)\n\nwhere δr ℓm is the change of bond length between spins ℓ and m , J <sup>′</sup> is the derivative of J cluster with respect to\n\nbond length.\n\nThere are six orthogonal distortion modes of the tetra-\n\nhedron [TABLE 1.1 in Ref. <sup>35</sup> ]. One of the modes A is the\n\ntrivial representation of the tetrahedral group T d ; two E\n\nmodes form the two dimensional irreducible representa-\n\ntion of T d ; and three T 2 modes form the three dimen-\n\nsional irreducible representation. The E modes are also\n\nillustrated in FIG. 3.\n\nThe generic couplings in (A1) [second term] can be\n\nconverted to couplings to these orthogonal modes,\n\nJ <sup>′</sup> ( Q <sup>A</sup> f <sup>A</sup> + Q <sup>E</sup> 1 <sup>f</sup> <sup>E</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>f</sup> <sup>E</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 1 <sup>f</sup> <sup>T</sup> <sup>2</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 2 <sup>f</sup> <sup>T</sup> <sup>2</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 3 <sup>f</sup> <sup>T</sup> <sup>2</sup> 3 <sup>)</sup>", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0266.pdf", - "query": "What happens when the spin-rotation symmetry is explicitly broken?", - "target_page": 2, - "target_passage": "makes them harder to realize in solid state systems", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "(10)\n\nSo the symmetry mentioned above can be realized by a\n\nthree-fold rotation of the honeycomb lattice, with a cyclic\n\npermutation of S 2 , S 3 and S 4 in each cluster. This is in\n\nfact the three-fold rotation symmetry of the physical spin\n\nlattice illustrated in FIG. 2. However this more symmet-\n\nric representation will not be used in later part of this\n\npaper.", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0266.pdf" - }, - { - "text": "(16)\n\nIn (16), we have been able to reduce the four spin in-\n\nteractions in (8) to inter-cluster Heisenberg interactions,\n\nand the six-spin interactions in (8) to inter-cluster spin-\n\nchirality interactions. The inter-cluster Heisenberg cou-\n\nplings in H perturbation x,y may be easier to arrange. The\n\ninter-cluster spin-chirality coupling in H perturbation z ex-\n\nplicitly breaks time reversal symmetry and is probably\n\nharder to implement in solid state systems. However\n\nspin-chirality order may have important consequences\n\nin frustrated magnets <sup>36,37</sup> , and a realization of spin-", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0266.pdf" - }, - { - "text": "chirality interactions in cold atom optical lattices has\n\nbeen proposed <sup>38</sup> .\n\nOur model (8) is achieved at second order of the per-\n\nturbation series. Higher order terms become trunca-\n\ntion errors but may be controlled by small parameters\n\n�� x,y,z /J cluster ∼ � | J x,y,z | /J cluster .\n\nV. CONCLUSIONS.\n\nWe constructed the exactly solvable Kitaev honeycomb model <sup>1</sup> as the exact low energy effective Hamiltonian of\n\na spin-1/2 model [equations (8) or (9)] with spin-rotation\n\nand time reversal symmetry. The spin in Kitaev model is\n\nrepresented as the pseudo-spin in the two-fold degenerate\n\nspin singlet subspace of a cluster of four antiferromag-\n\nnetically coupled spin-1/2 moments. The physical spin\n\nmodel is a honeycomb lattice of such four-spin clusters,\n\nwith certain inter-cluster interactions. The machinery\n\nfor the exact mapping to pseudo-spin Hamiltonian was\n\ndeveloped (see e.g. TABLE I), which is quite general\n\nand can be used to construct other interesting (exactly\n\nsolvable) spin-1/2 models from spin rotation invariant\n\nsystems.\n\nIn this construction the pseudo-spin correlations in the\n\nKitaev model will be mapped to dimer or spin-chirality\n\ncorrelations in the physical spin system. The correspond-\n\ning picture of the fractionalized Majorana fermion exci-\n\ntations and Ising vortices still remain to be clarified.\n\nThis exact construction contains high order physical\n\nspin interactions, which is undesirable for practical im-\n\nplementation. We described two possible approaches to\n\nreduce this problem: generating the high order spin in-\n\nteractions by perturbative expansion of the coupling to\n\noptical phonon, or the magnetic coupling between clus-\n\nters. This perturbative construction will introduce trun-\n\ncation error of perturbation series, which may be con-\n\ntrolled by small expansion parameters. Whether these\n\nconstructions can be experimentally engineered is how-\n\never beyond the scope of this study. It is conceivable that\n\nother perturbative expansion can also generate these high\n\norder spin interactions, but this possibility will be left for\n\nfuture works.\n\nAcknowledgments\n\nThe author thanks Ashvin Vishwanath, Yong-Baek\n\nKim and Arun Paramekanti for inspiring discussions, and\n\nTodadri Senthil for critical comments. The author is sup-\n\nported by the MIT Pappalardo Fellowship in Physics.\n\nAppendix A: Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins\n\nIn this Appendix we reproduce from Ref. <sup>35</sup> the cou-\n\nplings of all tetrahedron distortion modes to the spin\n\nsystem. And convert them to pseudo-spin notation in\n\nthe physical spin singlet sector.\n\nConsider a general small distortion of the tetrahedron,\n\nthe spin Hamiltonian becomes\n\nH cluster , SL = ( J cluster / 2)( � ℓ\n\nS ℓ ) <sup>2</sup> + J <sup>′</sup> <sup>�</sup> ℓ<m\n\nδr ℓm ( S ℓ · S m )\n\n(A1)\n\nwhere δr ℓm is the change of bond length between spins ℓ and m , J <sup>′</sup> is the derivative of J cluster with respect to\n\nbond length.\n\nThere are six orthogonal distortion modes of the tetra-\n\nhedron [TABLE 1.1 in Ref. <sup>35</sup> ]. One of the modes A is the\n\ntrivial representation of the tetrahedral group T d ; two E\n\nmodes form the two dimensional irreducible representa-\n\ntion of T d ; and three T 2 modes form the three dimen-\n\nsional irreducible representation. The E modes are also\n\nillustrated in FIG. 3.\n\nThe generic couplings in (A1) [second term] can be\n\nconverted to couplings to these orthogonal modes,\n\nJ <sup>′</sup> ( Q <sup>A</sup> f <sup>A</sup> + Q <sup>E</sup> 1 <sup>f</sup> <sup>E</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>f</sup> <sup>E</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 1 <sup>f</sup> <sup>T</sup> <sup>2</sup> 1 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 2 <sup>f</sup> <sup>T</sup> <sup>2</sup> 2 <sup>+</sup> <sup>Q</sup> <sup>T</sup> <sup>2</sup> 3 <sup>f</sup> <sup>T</sup> <sup>2</sup> 3 <sup>)</sup>", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" - }, - { - "text": "[arXiv:1001.0266v2 [cond-mat.str-el] 4 May 2010](http://arxiv.org/abs/1001.0266v2)\n\n## Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin\n\n## Rotation Invariant System\n\nFa Wang <sup>1</sup>\n\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\n\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil-\n\ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low\n\nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series\n\nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and\n\ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model\n\nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet\n\nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre-\n\nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this\n\nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2\n\nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the\n\nhigh order spin interactions from more natural couplings, which involves perturbative expansions\n\nthus breaks the exact mapping, although in a controlled manner.\n\nPACS numbers: 75.10.Jm, 75.10.Kt\n\nContents\n\nI. Introduction. 1\n\nII. Formulation of the Pseudo-spin-1/2 from\n\nFour-spin Cluster. 2\n\nIII. Realization of the Kitaev Model. 3\n\nIV. Generate the High Order Physical Spin\n\nInteractions by Perturbative Expansion. 5\n\nA. Generate the High Order Terms by Coupling\n\nto Optical Phonon. 5\n\nB. Generate the High Order Terms by Magnetic\n\nInteractions between Clusters. 7\n\nV. Conclusions. 8\n\nAcknowledgments 8\n\nA. Coupling between Distortions of a\n\nTetrahedron and the Pseudo-spins 8\n\nB. Derivation of the Terms Generated by\n\nSecond Order Perturbation of Inter-cluster\n\nMagnetic Interactions 9\n\nReferences 10\n\nI. INTRODUCTION.\n\nKitaev’s exactly solvable spin-1/2 honeycomb lattice model <sup>1</sup> (noted as the Kitaev model hereafter) has in-\n\nspired great interest since its debut, due to its exact\n\nsolvability, fractionalized excitations, and the potential\n\nto realize non-Abelian anyons. The model simply reads\n\nH Kitaev = − � x − links <jk>\n\nJ x τ <sup>x</sup> j <sup>τ</sup> <sup>x</sup> k <sup>−</sup> � y − links <jk>\n\nJ y τ <sup>y</sup> j <sup>τ</sup> <sup>y</sup> k\n\n− � z − links <jk>\n\nJ z τ <sup>z</sup> j <sup>τ</sup> <sup>z</sup> k\n\n(1)\n\nwhere τ <sup>x,y,z</sup> are Pauli matrices, and x, y, z -links are de- fined in FIG. 1. It was shown by Kitaev <sup>1</sup> that this spin-\n\n1/2 model can be mapped to a model with one Majo-\n\nrana fermion per site coupled to Ising gauge fields on the\n\nlinks. And as the Ising gauge flux has no fluctuation, the\n\nmodel can be regarded as, under each gauge flux config-\n\nuration, a free Majorana fermion problem. The ground\n\nstate is achieved in the sector of zero gauge flux through\n\neach hexagon. The Majorana fermions in this sector have\n\nDirac-like gapless dispersion resembling that of graphene,\n\nas long as | J x | , | J y | , and | J z | satisfy the triangular rela- tion, sum of any two of them is greater than the third\n\none <sup>1</sup> . It was further proposed by Kitaev <sup>1</sup> that opening of\n\nfermion gap by magnetic field can give the Ising vortices\n\nnon-Abelian anyonic statistics, because the Ising vortex\n\nwill carry a zero-energy Majorana mode, although mag-\n\nnetic field destroys the exact solvability.\n\nGreat efforts have been invested to better understand\n\nthe properties of the Kitaev model. For example, sev-\n\neral groups have pointed out that the fractionalized Ma-\n\njorana fermion excitations may be understood from the\n\nmore familiar Jordan-Wigner transformation of 1D spin", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0266.pdf" - }, - { - "text": "Another note to take is that it is not necessary to have\n\nsuch a highly symmetric cluster Hamiltonian (2). The\n\nmappings to pseudo-spin-1/2 should work as long as the\n\nground states of the cluster Hamiltonian are the two-fold\n\ndegenerate singlets. One generalization, which conforms\n\nthe symmetry of the lattice in FIG. 2, is to have\n\nH cluster = ( J cluster / 2)( r · S 1 + S 2 + S 3 + S 4 ) <sup>2</sup> (11)\n\nwith J cluster > 0 and 0 < r < 3. However this is not\n\nconvenient for later discussions and will not be used.\n\nWe briefly describe some of the properties of (8). Its\n\nlow energy states are entirely in the space that each of the\n\nclusters is a physical spin singlet (called cluster singlet\n\nsubspace hereafter). Therefore physical spin correlations\n\nare strictly confined within each cluster. The excitations\n\ncarrying physical spin are gapped, and their dynamics\n\nare ‘trivial’ in the sense that they do not move from one\n\ncluster to another. But there are non-trivial low energy\n\nphysical spin singlet excitations, described by the pseudo-\n\nspins defined above. The correlations of the pseudo-spins\n\ncan be mapped to correlations of their corresponding\n\nphysical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ <sup>x,y</sup> correlations become certain dimer-dimer correlations, τ <sup>z</sup> correlation\n\nbecomes chirality-chirality correlation, or four-dimer cor-\n\nrelation. It will be interesting to see the corresponding\n\npicture of the exotic excitations in the Kitaev model, e.g.\n\nthe Majorana fermion and the Ising vortex. However this\n\nwill be deferred to future studies.\n\nIt is tempting to call this as an exactly solved spin liq-\n\nuid with spin gap ( ∼ J cluster ), an extremely short-range\n\nresonating valence bond(RVB) state, from a model with\n\nspin rotation and time reversal symmetry. However it\n\nshould be noted that the unit cell of this model contains\n\nan even number of spin-1/2 moments (so does the orig-\n\ninal Kitaev model) which does not satisfy the stringent\n\ndefinition of spin liquid requiring odd number of elec-\n\ntrons per unit cell. Several parent Hamiltonians of spin\n\nliquids have already been constructed. See for example,\n\nRef. <sup>24- 27</sup> .\n\nIV. GENERATE THE HIGH ORDER PHYSICAL\n\nSPIN INTERACTIONS BY PERTURBATIVE\n\nEXPANSION.\n\nOne major drawback of the present construction is that\n\nit involves high order interactions of physical spins[see\n\n(8) and (9)], thus is ‘unnatural’. In this Section we will\n\nmake compromises between exact solvability and natu-\n\nralness. We consider two clusters j and k and try to\n\ngenerate the J x,y,z interactions in (7) from perturbation\n\nseries expansion of more natural(lower order) physical\n\nspin interactions. Two different approaches for this pur-\n\npose will be laid out in the following two Subsections. In\n\nSubsection IV A we will consider the two clusters as two\n\ntetrahedra, and couple the spin system to certain opti-\n\ncal phonons, further coupling between the phonon modes\n\n(a) (b) (c) (d)\n\n(b) (c) (d)\n\n### Q <sup>E</sup> 2\n\n### Q <sup>E</sup> 1\n\n(a)\n\n1 1 1 1\n\n1 1 1\n\n2\n\n2\n\n2\n\n2\n\n2\n\n2 2\n\n2\n\n3\n\n3\n\n3 3 3\n\n3 3 4 4\n\n4 4\n\n3\n\n4\n\n4\n\n4\n\n4\n\n1\n\nFIG. 3: Illustration of the tetragonal to orthorhombic\n\nQ <sup>E</sup> 1 <sup>(top) and</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>(bottom) distortion modes. (a) Perspective</sup>\n\nview of the tetrahedron. 1 , . . . , 4 label the spins. Arrows in-\n\ndicate the motion of each spin under the distortion mode. (b)\n\nTop view of (a). (c)(d) Side view of (a).\n\nof the two clusters can generate at lowest order the de-\n\nsired high order spin interactions. In Subsection IV B we\n\nwill introduce certain magnetic, e.g. Heisenberg-type, in-\n\nteractions between physical spins of different clusters, at\n\nlowest order(second order) of perturbation theory the de-\n\nsired high order spin interactions can be achieved. These\n\napproaches involve truncation errors in the perturbation\n\nseries, thus the mapping to low energy effect Hamilto-", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - }, - { - "text": "be summarized in Section V.\n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2\n\nFROM FOUR-SPIN CLUSTER.\n\nIn this Section we will construct the pseudo-spin-1/2\n\nfrom a cluster of four physical spins, and map the phys-\n\nical spin operators to pseudo-spin operators. The map-\n\nping constructed here will be used in later Sections to\n\nconstruct the effective Kitaev model. In this Section we\n\nwill work entirely within the four-spin cluster, all unspec-\n\nified physical spin subscripts take values 1 , . . . , 4.\n\nConsider a cluster of four spin-1/2 moments(called\n\nphysical spins hereafter), labeled by S 1 ,..., 4 , antiferro-\n\nmagnetically coupled to each other (see the right bot-\n\ntom part of FIG. 2). The Hamiltonian within the clus-\n\nter(up to a constant) is simply the Heisenberg antiferro-\n\nmagnetic(AFM) interactions,\n\nH cluster = ( J cluster / 2) ( S 1 + S 2 + S 3 + S 4 ) <sup>2</sup> (2)\n\nThe energy levels should be apparent from this form:\n\none group of spin-2 quintets with energy 3 J cluster , three\n\ngroups of spin-1 triplets with energy J cluster , and two spin\n\nsinglets with energy zero. We will consider large positive", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "NAWWEPS DO-BOT-BO STABILITY AND CONTROL\n\nattack is capable of producing pro-spin mo- ments of considerable magnitude which con- tribute to the self-sustaining nature of the spin. Also, the large distributed mass of the fuselage in rolling-yawing rotation contributes to inertia moments which flatten the spin and place the aircraft at extreme angles of attack. The spin recovery of the modern high speed airplane involves principles which are similar to those of the spin recovery of the conven- tional airplane. However, the nature of the spin for the modern configuration may involve specific differences in technique necessary to reduce the sideslip and angle of attack. The use of opposite rudder to control the sideslip and effect recovery will depend on the effective- ness of the rudder when the airplane is in the spin. At high positive angles of attack and high sideslip the rudder effectiveness may be reduced and additional anti-spin moments must be provided for rapid recovery. The deflection of ailerons into the spin reduces the autorota- tion rolling moment and can produce adverse yaw to aid the rudder yawing moment in effecting recovery. There may be many other specific differences in the technique necessary to effect spin re- covery . The effectiveness of the rudder during recovery may be altered by the position of elevators or horizontal tail. Generally, full aft stick may be necessary during the initial phase of recovery to increase the effectiveness of the rudder. The use of power during the spin recovery of a propeller powered airplane may or may not aid recovery depending on the specific airplane and the particular nature of the slipstream effects. The use of power during the spin recovery of a jet powered airplane induces no significant or helpful flow but does offer the possibility of a severe compressor stall and adverse gyroscopic moments. Since the airplane is at high angle of attack and sideslip, the flow at the inlet may be very poor and the staI1 limits considerably reduced. These items serve to point out possible dif- ferences in technique required for various con- figurations. The spin recovery specific for\n\n31.1", - "page_start": 328, - "page_end": 328, - "source_file": "00-80T-80.pdf" - }, - { - "text": "y x z z z\n\nz z z z\n\nz z\n\ny y\n\ny\n\nx\n\nx x\n\nx x x\n\ny y y\n\ny\n\nx\n\ny\n\nx\n\nz\n\nz\n\ny y\n\nx x x\n\ny\n\nz x\n\nx\n\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled\n\nand open circles indicate two sublattices. x, y, z label the links\n\nalong three different directions used in (1).\n\nderived as well. There have been several proposals to\n\nopen the fermion gap for the non-Abelian phase without\n\nspoiling exact solvability <sup>4,6</sup> . And many generalizations\n\nto other(even 3D) lattices have been developed in the\n\nlast few years <sup>10- 16</sup> . All these efforts have significantly\n\nenriched our knowledge of exactly solvable models and\n\nquantum phases of matter.\n\nHowever, in the original Kitaev model and its later\n\ngeneralizations in the form of spin models, spin rotation\n\nsymmetry is explicitly broken. This makes them harder\n\nto realize in solid state systems. There are many pro-\n\nposals to realized the Kitaev model in more controllable\n\nsituations, e.g. in cold atom optical lattices <sup>17,18</sup> , or in\n\nsuperconducting circuits <sup>19</sup> . But it is still desirable for\n\ntheoretical curiosity and practical purposes to realize the\n\nKitaev-type models in spin rotation invariant systems.\n\nIn this paper we realize the Kitaev honeycomb lattice\n\nmodel as the low energy Hamiltonian for a spin rotation\n\ninvariant system. The trick is not to use the physical spin\n\nas the spin in the Kitaev model, instead the spin-1/2 in\n\nKitaev model is from some emergent two-fold degener-\n\nate low energy states in the elementary unit of physical\n\nsystem. This type of idea has been explored recently by\n\nJackeli and Khaliullin <sup>20</sup> , in which the spin-1/2 in the Ki-\n\ntaev model is the low energy Kramers doublet created by\n\nstrong spin-orbit coupling of t 2 g orbitals. In the model\n\npresented below, the Hilbert space of spin-1/2 in the Ki-\n\ntaev model is actually the two dimensional spin singlet\n\nsector of four antiferromagnetically coupled spin-1/2 mo-\n\nments, and the role of spin-1/2 operators(Pauli matrices)\n\nin the Kitaev model is replaced by certain combinations\n\nof S j · S k [or the spin-chirality S j · ( S k × S ℓ )] between the\n\nfour spins.\n\nOne major drawback of the model to be presented is\n\nthat it contains high order spin interactions(involves up\n\nto six or eight spins), thus is still unnatural. However it\n\nopens the possibility to realize exotic (exactly solvable)\n\nmodels from spin-1/2 Hamiltonian with spin rotation in-\n\nvariant interactions. We will discuss two possible routes\n\nto reduce this artificialness through controlled perturba-\n\ntive expansions, by coupling to optical phonons or by\n\nmagnetic couplings between the elementary units.\n\nThe outline of this paper is as follows. In Section II\n\nwe will lay out the pseudo-spin-1/2 construction. In Sec-\n\n4\n\n2 3\n\n1\n\n*z* *z*\n\n*x*\n\n*x*\n\n*y*\n\n*y*\n\n2 3\n\n4\n\n1\n\nFIG. 2: Left: the physical spin lattice for the model (8). The\n\ndash circles are honeycomb lattice sites, each of which is ac-\n\ntually a cluster of four physical spins. The dash straight lines\n\nare honeycomb lattice bonds, with their type x, y, z labeled.\n\nThe interaction between clusters connected by x, y, z bonds\n\nare the J x,y,z terms in (8) or (9) respectively. Note this is not the 3-12 lattice used in Ref. <sup>9,10</sup> . Right: enlarged picture of\n\nthe clusters with the four physical spins labeled as 1 , . . . , 4.\n\nThick solid bonds within one cluster have large antiferromag-\n\nnetic Heisenberg coupling J cluster .\n\ntion III the Kitaev model will be explicitly constructed\n\nusing this formalism, and some properties of this con-\n\nstruction will be discussed. In Section IV we will discuss\n\ntwo possible ways to generate the high order spin in-\n\nteractions involved in the construction of Section III by\n\nperturbative expansions. Conclusions and outlook will\n\nbe summarized in Section V.\n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2\n\nFROM FOUR-SPIN CLUSTER.\n\nIn this Section we will construct the pseudo-spin-1/2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "NAVWEPS OO-BOY-BO STABIUTY AND CoMml\n\ndamping in roll is generally referred to as “autorotation.” When the conventional airplane is stalk4 and some rolling-yawing displacement takes place, the resulting autotiotation rolling mo- ments and yawing moments start the airplane into a self-sustaining rolling-yawing motion. The autorotation rolling and yawing tenden- cies of the airplane at high angles of attack are the principal prospin moments of the conventional airplane configuration and these tendencies accelerate the airplane into the spin until some limiting condition exists. The stabilized spin is not necessaray a simple steady vertical spiral but may involve some coupled unsteady oscillatory motion. An important characteristic of the mote conventional airplane configuration is that the spin shows a predominating contribution of the autorotation tendency. Generally, the conventional configuration has a spin motion which is primarily rolling with moderate yaw. High directional stability is favorable since it will limit or minimize the yaw displacement of the spinning airplane. The fundamental requirement of the spin is that the airplane be placed at an excessive angle of attack to produce the autorotation rolling and yawing tendencies. Generally speaking, the conventional airplane must be stalled .before a spin can take place. This relationship establishes a fundamental p&r- ciple of recovery-the airplane must be un- stalled by decreasing the wing angle of attack. The most dfective procedure for the conven- tional configuration is to use opposite rudder to stop the sideslip, then lower the angle of attack with the elevators. With sufficient rudder power this procedure will produce a positive recovery with a minimum loss of altitude. Care should be taken during pullout from the ensuing dive to prevent excessive angle of attack and entry into another spin. It should be appreciated that a spin is always a possible corollary of a stall and the self- sustaining motion of a spin will take place at", - "page_start": 326, - "page_end": 326, - "source_file": "00-80T-80.pdf" - }, - { - "text": "sired high order spin interactions can be achieved. These\n\napproaches involve truncation errors in the perturbation\n\nseries, thus the mapping to low energy effect Hamilto-\n\nnian will no longer be exact. However the error intro-\n\nduced may be controlled by small expansion parameters.\n\nIn this Section we denote the physical spins on cluster\n\nj ( k ) as j 1 , . . . , j 4 ( k 1 , . . . , k 4), and denote pseudo-spins\n\non cluster j ( k ) as ⃗τ j ( ⃗τ k ).\n\nA. Generate the High Order Terms by Coupling to\n\nOptical Phonon.\n\nIn this Subsection we regard each four-spin cluster\n\nas a tetrahedron, and consider possible optical phonon\n\nmodes(distortions) and their couplings to the spin sys-\n\ntem. The basic idea is that the intra-cluster Heisen-\n\nberg coupling J cluster can linearly depend on the dis-\n\ntance between physical spins. Therefore certain distor-\n\ntions of the tetrahedron couple to certain linear combi-\n\nnations of S ℓ · S m . Integrating out phonon modes will\n\nthen generate high order spin interactions. This idea has\n\nbeen extensively studied and applied to several magnetic\n\nmaterials <sup>28- 34</sup> . More details can be found in a recent\n\nreview by Tchernyshyov and Chern <sup>35</sup> . And we will fre-\n\nquently use their notations. In this Subsection we will\n\nuse the representation (5) for τ <sup>z</sup> .\n\nConsider first a single tetrahedron with four spins\n\n1 , . . . , 4. The general distortions of this tetrahedron can\n\nbe classified by their symmetry (see for example Ref. <sup>35</sup> ).\n\nOnly two tetragonal to orthorhombic distortion modes,\n\nQ <sup>E</sup> 1 <sup>and</sup> <sup>Q</sup> <sup>E</sup> 2 <sup>(illustrated in FIG. 3), couple to the pseudo-</sup> spins defined in Section II. A complete analysis of all\n\nmodes is given in Appendix A. The coupling is of the", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" - } - ] - }, - { - "references": { - "source_file": "basic-english-language-skills.PDF", - "query": "What is the Oxbridge Academy email?", - "target_page": 59, - "target_passage": "Email: info@oxbridgeacademy.co.za", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "###### Did you enjoy reading this book?\n\nJoin our online social community and share your opinion:\n\nwww.facebook.com/oxbridgeacademysa\n\ntwitter.com/oxbridgeEdu\n\nwww.linkedin.com/company/oxbridge-academy\n\nOxbridge Academy is an established distance learning college offer­\n\ning skills courses, national qualifications, and internationally recognised\n\ncourses to students in South Africa and abroad.\n\nWith our head office in Stellenbosch in the Western Cape, we cater to our\n\nstudents’ needs by recruiting industry-expert tutors to provide academic\n\nassistance via telephone and e-mail, as well as by designing our study\n\nmaterial in such a way that it is clear, simple, and easy for our students\n\nto understand.\n\nWith us, studying from home is easy, affordable, and convenient.\n\nCONTACT NUMBERS:\n\nTel: 021 1100 200\n\nTel:+2721 883 2454 (international)\n\nFax: 086 111 2121\n\nFax: +2721 883 2378 (international)\n\nWhatsapp: 0605671585\n\nEmail: info@oxbridgeacademy.co.za\n\nPostal Address:\n\nPO Box 12723, Die Boord, Stellenbosch, 7613\n\nWe are registered with the Department of Higher Education and Training as a Private College in terms of Section\n\n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070.\n\n*Developed for Oxbridge Academy*", - "page_start": 58, - "page_end": 58, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "###### CHAPTER 5:\n\nTIPS FOR FILLING IN YOUR COLLEGE REGISTRATION FORM\n\nApplying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a\n\ndaunting experience. Not only do you need to choose a course, but you\n\nalso need to make sure that you:\n\n- meet the entry requirements\n\n- meet the deadlines\n\n- fill in the forms correctly\n\n- send the forms to the right address\n\n- include all the necessary attachments\n\nTo make the college registration process easier for you, we’ve compiled a\n\ncomprehensive guide on how to register at Oxbridge Academy\n\n(www.oxbridgeacademy.co.za/enrol-now/) . The guide also includes general\n\ntips that will be relevant to the application and registration processes at\n\nother colleges.\n\n**There are 4 steps you need to follow when you want to register as a student at Oxbridge Academy:**\n\n**1.** Select Your Course\n\n**2.** Fill in Your Student Details\n\n**3.** Select Your Delivery Option\n\n**4.** Pay Your Registration Fee and Send in Your Form", - "page_start": 20, - "page_end": 20, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "STEP 1 - SELECT YOUR COURSE\n\nBefore you start filling in the registration form, you need to choose your\n\ncourse. Once you’ve identified the course that you would like to study,\n\nremember to check that you meet the entry requirements.\n\nYou can find the course name and course code for your chosen course on\n\nthe relevant detailed course information page on our website. Have a look\n\nat the example in the screenshot below (the course name and course code\n\nare circled in red):\n\nPlease make sure to check the accreditation status of your chosen course.\n\nSome of our courses are non-credit bearing skills development courses,\n\nwhich are neither accredited by external bodies nor registered on the NQF.\n\nPlease go to our website: *oxbridgeacademy.co.za* for more information\n\nabout our skills development courses.\n\nOxbridge Academy Short Course: Marketing Management\n\nADV101", - "page_start": 21, - "page_end": 21, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "SEND YOUR REGISTRATION FORM\n\nCHOOSE YOUR COURSE **1**\n\nFILL IN THE\n\nREGISTRATION FORM\n\n## **2**\n\nThe registration form follows an easy-to-complete four step layout.\n\n## **3**\n\n## **4 5**\n\nIF YOU ARE REGISTERING\n\nFOR an ICB, or NATED\n\nCOURSE\n\nmake sure to indicate your preferred exam centre.\n\nIF YOU ARE UNDER\n\n18, OR IF YOU ARE\n\nUNEMPLOYED\n\nmake sure that your parent/guardian/guarantor signs the form.\n\nATTACH THE FOLLOWING\n\nDOCUMENTS\n\n1. Copy of your ID\n\n2. Proof of highest grade passed\n\n3. Proof of other qualifications\n\n4. Proof of payment\n\nPAY YOUR\n\nREGISTRATION FEE\n\nSend your registration form to the\n\nregistrations office at Oxbridge Academy via\n\none of the following channels:\n\nFax: 086 262 5550\n\nPost: PO Box 12723, Die Boord, 7613\n\nE-mail: registrar@oxbridgeacademy.co.za\n\n## **6**\n\nA Summary of the Registration Process at Oxbridge Academy\n\nAs soon as your details\n\nhave been captured\n\non our system you will\n\nreceive confirmation\n\nof your registration via\n\ne-mail or SMS", - "page_start": 26, - "page_end": 26, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "IN THIS E-BOOK, WE’LL BE HELPING YOU TO:\n\n- Develop your basic English language skills.\n\n- Improve your English grammar.\n\nApply your language and communication skills in a business contexT.\n\n(www.oxbridgeacademy.co.za/find-a- course/business-administration-\n\ncourses/)\n\n*“Grammar is a litmus test. If job hopefuls can’t distinguish*\n\n*between ‘to’ and too’, their applications go into the bin”*\n\nKyle Wiens, CEO of iFixit\n\n*“Grammar often seems to be a low priority in education. Are*\n\n*school undervaluing grammar, given that employers may rule out*\n\n*applications with sloppy writing?”*\n\nThe New York Times", - "page_start": 5, - "page_end": 5, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "ASSIGNMENT\n\n1. Identify the verb in the following sentence:\n\nThe grey elephant drinks water from the largest lake in Africa.\n\n2. Identify the collective noun in the following sentence:\n\nThe board of directors voted in favour of the decision.\n\n3. Correct the punctuation in the following sentence:\n\nAnthea will you please buy bread milk and eggs when you go to the\n\nshop.\n\n4. Choose the correct word:\n\nCharles was accepted/excepted into the engineering studies course at\n\nOxbridge Academy.\n\n5. Choose the correct word:\n\nIts/It’s time to go home now.\n\n6. Choose the correct word:\n\nThey were late for work, because there/their train was delayed.\n\n7. Choose the correct word:\n\nYou’re/Your going to write your exam next week.", - "page_start": 54, - "page_end": 54, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "STEP 4 - PAY YOUR REGISTRATION FEE AND SEND IN YOUR FORM\n\nDifferent courses have different registration fees. Please check the course\n\nfees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to\n\nfind out how much you need to pay to register for your chosen course, and\n\npay this amount using the banking details provided at the bottom of the\n\nregistration form. Remember to attach your proof of payment.\n\nIf you are under the age of 18, your parent or guardian will need to sign\n\nthis section of the form to state that they are aware of your registration\n\nwith Oxbridge Academy, and that they do not have any objections. If you\n\nare unemployed, you will need a guarantor to sign this section of the\n\nform. Your parent or guarantor will be held responsible if you miss any of\n\nyour payments in relation to your course fees.", - "page_start": 25, - "page_end": 25, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "USING THE WRONG WORD CAN SOMETIMES HAVE AMUSING (AND EMBARRASSING) RESULTS.\n\nAs you can probably tell from the image above, using the wrong word\n\ncan sometimes have amusing (and embarrassing) results. In some\n\nsituations, however, the effect of using incorrect words may be more\n\nserious.\n\nIn academic or business writing, for example, the words that you\n\nchoose will influence the reader’s opinion of you.\n\nIncorrect word choice in an exam or assignment may cause you to lose\n\nmarks, while using the wrong word in a business letter may create a bad\n\nfirst impression.\n\n(www.oxbridgeacademy.co.za/find-a-course/business-administration-courses/)", - "page_start": 14, - "page_end": 14, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "###### CHAPTER 7:\n\nHOW TO ASK FOR HELP FROM YOUR TUTOR\n\nAs a student, you are going to experience times when you need help\n\nwith your studies. You might be unsure about an assignment question,\n\nyou might be confused by a particular concept, or you might be stressed\n\nabout the upcoming exams.\n\nAnd if you are studying via distance learning (www.oxbridgeacademy.co.\n\nza/distance-learning/), where you don’t have any face-to-face interac­\n\ntion with lecturers, you will need to rely on your tutors for the necessary\n\nacademic support.", - "page_start": 32, - "page_end": 32, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "###### CHAPTER 8:\n\nTIPS FOR COMPLETING YOUR WRITTEN ASSIGNMENTS\n\nDepending on which course you study, you will either be assessed\n\nby means of written assignments, or through a combination of\n\nwritten assignments and exams. Assignments not only help to\n\ndeepen your understanding of the work, but they often also count\n\ntoward your final mark.\n\nIt is therefore important that you put effort into your assignments,\n\nand that you complete them to the best of your ability.\n\nWe realise that, like many other students, you might be unsure of\n\nhow to go about completing your assignments, or that you might be\n\nafraid of failure.\n\nIf you are an Oxbridge Academy student, we’d like you to know\n\nthat we are here to help you every step of the way, and that we will\n\ngive you the opportunity to resubmit your assignments if you don’t\n\nachieve a pass mark the first time around.", - "page_start": 36, - "page_end": 36, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "sg247938.pdf", - "query": "When is it necessary to use a host multipathing driver for load balancing?", - "target_page": 340, - "target_passage": "For load balancing and access redundancy on the host side, the use of a host multipathing driver is required in the following situations: Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize system nodes Protection from a host HBA failure (if two HBAs are in use) Protection from fabric failures if the host is connected through two HBAs to two separate fabrics Provide load balancing across the host HBA", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The IBM Storwize V7000 system supports a wide range of host types (both IBM and\n\nnon-IBM). This feature makes it possible to consolidate storage in an open systems\n\nenvironment into a common pool of storage. Then, you can use and manage the storage pool\n\nmore efficiently as a single entity from a central point on the storage area network (SAN).\n\nThe ability to consolidate storage for attached open systems hosts provides the following\n\nbenefits:\n\n� Easier storage management\n\n� Increased utilization rate of the installed storage capacity\n\n� Advanced Copy Services functions offered across storage systems from separate vendors\n\n� Only one multipath driver is required for attached hosts\n\nHosts can be connected to Storwize V7000 system using any of the following protocols:\n\n� Fibre Channel (FC)\n\n� Fibre Channel over Ethernet (FCoE)\n\n� Internet Small Computer System Interface (iSCSI)\n\n� iSCSI Extensions over RDMA (iSER)\n\n� Non-Volatile Memory Express (NVMe)\n\nHosts that connect to the Storwize V7000 system by using fabric switches that use FC or\n\nFCoE protocol must be zoned correctly, as described in 3.6, “SAN configuration planning” on\n\npage 50.\n\nHosts that connect to the Storwize V7000 system with iSCSI protocol must be configured\n\ncorrectly, as described in Chapter 3, “Planning” on page 43.\n\nFor load balancing and access redundancy on the host side, the use of a host multipathing\n\ndriver is required in the following situations:\n\n� Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize\n\nsystem nodes\n\n� Protection from a host HBA failure (if two HBAs are in use)\n\n� Protection from fabric failures if the host is connected through two HBAs to two separate\n\nfabrics\n\n� Provide load balancing across the host HBAs\n\nFor more information about various host operating systems and versions that are supported\n\nby IBM Storwize V7000, see [this page ](https://www.ibm.com/systems/support/storage/ssic/interoperability.wss) of the IBM System Storage Interoperation Center\n\n(SSIC).\n\nFor more information about how to attach various supported host operating systems to IBM\n\nStorwize V7000, see [IBM Knowledge Center](https://ibm.biz/BdjKmd) .\n\nIf your host operating system is not in SSIC, you can ask an IBM representative to submit a\n\nspecial request for support by using the [Storage Customer Opportunity REquest (SCORE) ](https://www.ibm.com/systems/support/storage/scorerpq/int/logon.do)\n\n[tool](https://www.ibm.com/systems/support/storage/scorerpq/int/logon.do) for evaluation (log in required).\n\n**Note:** Certain host operating systems can be directly connected to the Storwize V7000\n\nsystem without the need for FC fabric switches. For more information, see [this page ](https://www.ibm.com/systems/support/storage/ssic/interoperability.wss) of the\n\nIBM System Storage Interoperation Center (SSIC).", - "page_start": 339, - "page_end": 339, - "source_file": "sg247938.pdf" - }, - { - "text": "**56** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\n*Figure 3-4 Overview of four-path host zoning*\n\nWhen possible, use the minimum number of paths that are necessary to achieve a sufficient\n\nlevel of redundancy. For the Storwize V7000 environment, no more than four paths per I/O\n\nGroup are required to accomplish this layout.\n\nAll paths must be managed by the multipath driver on the host side. Make sure that the\n\nmultipath driver on each server can handle the number of paths required to access all\n\nvolumes mapped to the host.\n\nFor hosts that use four HBAs/ports with eight connections to an I/O Group, use the zoning\n\nschema that is shown in Figure 3-5 on page 57. You can combine this schema with the\n\nprevious four-path zoning schema.", - "page_start": 77, - "page_end": 77, - "source_file": "sg247938.pdf" - }, - { - "text": "**94** Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n\nWhen configuring multiple masters, the cluster installation process supports the native HA\n\nmethod. This method uses the native HA master capabilities that are built into OpenShift\n\nContainer Platform and can be combined with any Load Balancing solution.\n\nIf a host is defined in the [lb] section of the inventory file, Ansible installs and configures\n\nHAProxy automatically as the load balancing solution. If no host is defined, it is assumed that\n\nyou pre-configured an external load balancing solution of your choice to balance the master\n\nAPI (port 8443) on all master hosts.\n\n**DNS**\n\nDNS service is an important component in the Red Hat OpenShift Container Platform\n\nenvironment. Regardless of the provider of DNS, an organization is required to have certain\n\nrecords in place to serve the various Red Hat OpenShift Container Platform components.\n\nConsidering the Load Balancer values for the Red Hat OpenShift Container Platform master\n\nservice and infrastructure nodes running router Pods are known beforehand, entries must be\n\nconfigured into the DNS before starting the deployment procedure.\n\n* **DNS for OpenShift applications** *\n\nApplications that are served by OpenShift are accessible by the router on ports 80/TCP and\n\n443/TCP. The router uses a wildcard record to map all host names under a specific sub\n\ndomain to the same IP address without requiring a separate record for each name. This\n\nprocess allows Red Hat OpenShift Container Platform to add applications with arbitrary\n\nnames if they are under that sub domain.\n\nFor example, a wildcard record for *.apps.example.com causes DNS name lookups for\n\napp1.apps.example.com and app2.apps.example.com to both return the same IP address:\n\n9.109.x.y . All traffic is forwarded to the OpenShift Infrastructure Nodes (Routers). The\n\nRouters examine the HTTP headers of the queries and forward them to the correct\n\ndestination.\n\nWith a load-balancer host address of 9.109.x.y , the wildcard DNS record for\n\n*.apps.example.com resolves IP address 9.109.x.y .\n\nA simple DNS round-robin resolution can be used to spread traffic across infrastructure\n\nnodes.\n\nFor production environments, it is recommended to have more advanced load balancing\n\ncapabilities to distribute the traffic among the OpenShift Routers. In those cases, an external\n\nLoad Balancer is used.\n\n**OpenShift Software Defined Networking (SDN)**\n\nRed Hat OpenShift Container Platform offers the ability to specify how pods communicate\n\nwith each other. This process can be done by using Red Hat provided Software-defined\n\nnetworks (SDN) or a third-party SDN.\n\nDeciding on the suitable internal network for an Red Hat OpenShift Container Platform step is\n\na crucial step. Unfortunately, no correct answer exists regarding the suitable pod network to\n\nchose because this choice varies based on the specific scenario requirements for how a Red\n\nHat OpenShift Container Platform environment is to be used.\n\n**Note:** The HAProxy Load Balancer is intended to demonstrate the API server’s HA mode\n\nand is not recommended for production environments. If you are deploying to a cloud\n\nprovider, Red Hat recommends deploying a cloud-native TCP-based Load Balancer or\n\ntake other steps to provide a highly available load balancer.", - "page_start": 109, - "page_end": 109, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 5. Red Hat OpenShift installation planning and considerations **81**\n\n#### **5.3.2 Design considerations**\n\nThis section discusses some design considerations.\n\n**PowerVC considerations**\n\nIBM PowerVC is an advanced virtualization and cloud management offering for IBM Power\n\nSystems. Built on OpenStack, it provides comprehensive virtualization management and\n\ncloud deployments for IBM AIX, IBM i, and Linux virtual machines (VMs). PowerVC simplifies\n\nthe lifecycle management of the virtualization for Power Systems. It includes a deep\n\nintegration with IBM PowerVM virtualization technologies.\n\n* **Availability zones (host groups)** *\n\nHost groups, also known as *host aggregates* in OpenStack’s terminology, allow you to create\n\nvirtual boundaries around a group of hosts. It is a logical group of hosts, regardless of any\n\nfeatures that they might or might not have in common. For example, the hosts feature the\n\nsame architecture, network configuration, or storage, or hosts in the same rack or data center.\n\nWhen a host group is created by using the user interface, an availability zone with the same\n\nname is created and assigned to the host group. PowerVC also supports the standard\n\nOpenStack APIs for host groups and availability zones.\n\nHost groups (availability zones) include the following features:\n\n� Every host must be in a host group\n\nAny hosts that do not belong to a user-defined host group are members of the default host\n\ngroup. The default host group cannot be deleted.\n\n� Virtual machines are kept within the host group\n\nA virtual machine can be deployed to a specific host or to a host group. After deployment,\n\nthat virtual machine must always be migrated or remote restarted within the host group.\n\n� Placement policies are associated with host groups\n\nEvery host within a host group is subject to the host group’s placement policy. The default\n\nplacement policy is striping.\n\n� Automated Remote Restart\n\nIf enabled, the PowerVC monitors hosts for failure by using the Platform Resource\n\nScheduler (PRS) HA service. If a host fails, PowerVC automatically remote restarts the\n\nVMs from the failed host to another host within a host group.\n\n� Dynamic Resource Optimizer (DRO)\n\nIf enabled, DRO continuously monitors your cloud environment’s usage. You can specify\n\nthat DRO monitors CPU usage or available memory. When a host is found to be overused,\n\nthe DRO attempts to correct the situation by performing the action that you specified. It\n\ncan migrate VMs to another host within a host group or, when applicable, work with\n\nCapacity on Demand (CoD) to activate mobile cores.\n\n**Note:** A host can belong only to one host group (availability zone).", - "page_start": 96, - "page_end": 96, - "source_file": "sg248459.pdf" - }, - { - "text": "## Chapter 8. Hosts\n\n### **8.2 Host clusters**\n\nIBM Storwize V7000 software supports host clusters starting with V7.7.1 and later. The host\n\ncluster allows a user to create a group of hosts to form a cluster. A cluster is treated as a\n\nsingle entity, which allows multiple hosts to access the same volumes.\n\nVolumes that are mapped to a host cluster are assigned to all members of the host cluster\n\nwith the same SCSI ID.\n\nA typical user case is to define a host cluster that contains all of the WWPNs belonging to the\n\nhosts participating in a host operating system-based cluster, such as IBM PowerHA®, and\n\nMicrosoft Cluster Server (MSCS).\n\nThe following new commands were added to deal with host clusters:\n\n� lshostcluster\n\n� lshostclustermember\n\n� lshostclustervolumemap\n\n� mkhost (modified to put host in a host cluster on creation)\n\n� rmhostclustermember\n\n� rmhostcluster\n\n� rmvolumehostclustermap\n\n### **8.3 N-Port Virtualization ID support**\n\nThe usage model for the Storwize V7000 is based on a two-way active/active node model.\n\nThis is a pair of distinct control modules that share active/active access for any specific\n\nvolume. These nodes each have their own Fibre Channel worldwide node name (WWNN).\n\nTherefore, ports that are presented from each node have a set of worldwide port names\n\n(WWPNs) that are presented to the fabric.\n\nTraditionally, if one node fails or is removed for some reason, the paths that are presented for\n\nvolumes from that node go offline. In this case, it is up to the native O/S multipathing software\n\nto fail over from using both sets of WWPN to only those that remain online. Although this\n\nprocess is what multipathing software is designed to do, occasionally it can be problematic,\n\nparticularly if paths are not seen as coming back online for some reason.\n\nStarting with Storwize V7000 V7.7, the system can be enabled into N_Port ID Virtualization\n\n(NPIV) mode. When NPIV mode is enabled on the Storwize V7000 system, ports do not\n\ncome online until they are ready to service I/O, which improves host behavior around node\n\nunpends. In addition, path failures because of an offline node are masked from hosts and\n\ntheir multipathing driver do not need to perform any path recovery.\n\nWhen NPIV is enabled on Storwize V7000 nodes, each physical WWPN reports up to four\n\nvirtual WWPNs, as listed in Table 8-1.\n\n*Table 8-1 IBM Spectrum Virtualize NPIV Ports*\n\n| NPIV port | Port description |\n|:---|:---|\n| Primary Port | This is the WWPN that communicates with backend storage and can be used for node to node traffic (local or remote). |\n| Primary scsi Host Attach Port | This is the WWPN that communicates with hosts. It is a target port only. This is the primary port, so it is based on this local node’s WWNN. |", - "page_start": 340, - "page_end": 340, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 5. Red Hat OpenShift installation planning and considerations **93**\n\n* **OpenShift-Ansible** *\n\nAnsible is a simple IT automation engine that automates cloud provisioning, configuration\n\nmanagement, application deployment, intra-service orchestration, and many other IT needs.\n\nAnsible uses no agents and no other custom security infrastructure, so it is easy to deploy\n\nand most importantly, it uses a simple language (YAML, in the form of Ansible Playbooks) with\n\nwhich you can describe your automation jobs in a way that approaches plain English.\n\nAnsible works by connecting to your nodes and pushing out small programs, called *Ansible* *modules* to them. These programs are written to be resource models of the wanted state of\n\nthe system. Ansible then runs these modules (over SSH by default), and removes them when\n\nfinished. Passwords are supported, but SSH keys with ssh-agent are one of the best ways to\n\nuse Ansible.\n\nOpenShift-Ansible is a set of Ansible playbooks that orchestrate complex deployment tasks,\n\nincluding the following examples:\n\n� Configuring the container runtime environment on virtual machines\n\n� Provisioning storage for an internal registry\n\n� Configuring the OpenShift SDN\n\n� Connecting to authentication systems\n\n**Load balancers**\n\nThis guide uses an external load balancer that is running HAproxy to offer a single entry point\n\nfor the many Red Hat OpenShift Container Platform components. Organizations can provide\n\ntheir own deployed load balancers if the service exists.\n\nThe Red Hat OpenShift Container Platform console, which is provided by the Red Hat\n\nOpenShift Container Platform master nodes, can be spread across multiple instances to\n\nprovide load balancing and HA properties.\n\nApplication traffic passes through the Red Hat OpenShift Container Platform Router on its\n\nway to the container processes. The Red Hat OpenShift Container Platform Router is a\n\nreverse proxy service container that multiplexes the traffic to multiple containers that make up\n\na scaled application that is running inside Red Hat OpenShift Container Platform. The load\n\nbalancer that is used by infrastructure nodes acts as the public view for the Red Hat\n\nOpenShift Container Platform applications.\n\nThe destination for the master and application traffic must be set in the load balancer\n\nconfiguration after each instance is created, the floating IP address is assigned, and before\n\nthe installation. A single HAproxy Load Balancer can forward both sets of traffic to different\n\ndestinations.\n\n**Note:** Ansible 2.6 is required for OpenShift 3.11.\n\n**Note:** Consider the following points:\n\n� OpenStack Provisioning is not supported by PowerVC. OpenShift-Ansible deploys\n\nOpenShift on OpenStack by using Heat service, but Heat is not implemented in\n\nPowerVC.\n\n� OpenShift-Ansible can also deploy OpenShift directly onto physical servers. This\n\nreference architecture deploys to virtual machines as that is the more common\n\ndeployment model.", - "page_start": 108, - "page_end": 108, - "source_file": "sg248459.pdf" - }, - { - "text": "Chapter 8. Hosts\n\n*Figure 8-6 Host type selection*\n\n6. Click **Add** to create the host object.\n\n7. Click **Close** to return to the host window. Repeat these steps for all of your Fibre Channel\n\nhosts. Figure 8-7 shows the **All Hosts** window after creating a second host.\n\n*Figure 8-7 Hosts view after creating a host*\n\nAfter you complete the adding of Fibre Channel hosts, see Chapter 7, “Volumes” on page 241\n\nto create volumes and map them to the created hosts.\n\n**Creating iSCSI hosts**\n\nWhen creating an iSCSI attached host, consider the following points:\n\n� iSCSI IP addresses can fail over to the partner node in the I/O Group if a node fails. This\n\ndesign reduces the need for multipathing support in the iSCSI host.\n\n� The IQN of the host is added to a Storwize V7000 host object in the same way that you\n\nadd FC WWPNs.\n\n� Host objects can have WWPNs and IQNs.", - "page_start": 352, - "page_end": 352, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 13. Performance\n\n� For IBM i, depending on your retrieval patterns and system hardware configuration, it\n\nmight be advantageous to *not* store a duplicate set of documents in the Content Manager\n\nOnDemand cache when you use ASM because ASM might already be using disk space. If\n\nthe application group uses ASM, caches the data, and specifies the migration of data at\n\nload time, two copies of the data are stored during the load. One copy is stored in cache,\n\nand one copy is stored in the ASMREQUEST directory.\n\nTo avoid storing a duplicate set of documents in cache for non-AFP data, change Cache\n\nData to No on the Storage Management tab of your application group definition. To avoid\n\nstoring a duplicate set of documents in cache for AFP data, you might change Document\n\nData to No Cache but leave Resource Data in cache for faster retrieval.\n\n� For IBM i, every user that loads data must have a home directory. If users do not have a\n\nhome directory, the temporary files are stored in the root directory of the integrated file\n\nsystem (IFS).\n\n� If the data source is on a remote system, you can load the data into Content Manager\n\nOnDemand on the remote system and directly store the export data to the specified\n\nContent Manager OnDemand library and object server.\n\nOr, if the data source is on a remote system, you also can upload the data to the specified\n\nContent Manager OnDemand server through FTP and then load the data on the selected\n\nContent Manager OnDemand system.\n\n� For Multiplatforms and z/OS, all file systems must be dedicated file systems that are\n\nmounted on their own mount points.\n\n� For z/OS, when you load PDF reports (by using the PDF Indexer), placing the input report\n\nin the HFS or zFS causes the load to run nearly 50 times faster that compared to the input\n\nreport that is placed in a VSAM file.\n\n#### **13.2.3 Load testing**\n\nThe goal of load testing is to verify that, under stressful system conditions, the required\n\namount of data can be loaded into the Content Manager OnDemand system within a time\n\nwindow.\n\nA general approach to load testing a system is described:\n\n� Parallel loads: Run a single load and measure the load throughput. If the throughput does\n\nnot meet the requirements, run two loads in parallel and measure the throughput. While\n\nthe loads are run, collect system statistics to determine the system resources that are\n\nbeing used and any potential bottlenecks. Tune or acquire additional system resources as\n\nneeded. Progressively increase the number of parallel loads until the required throughput\n\nis met.\n\n� Data types and exits: A different data type, and whether an exit is started during the load\n\nprocess, affects the load throughput. Test samples of the different types that represent the\n\ngeneral loads.\n\n**Note:** For most users, a single load process meets the ingestion throughput\n\nrequirements.", - "page_start": 326, - "page_end": 326, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 12. Scalability, reliability, and availability architectures\n\n*Figure 12-4 Horizontal and vertical scaling with multiple LPARs*\n\nThis scenario is in organizations with large systems, such as AIX or z/OS, that are installed\n\nand that have enough available capacity to support the required Content Manager\n\nOnDemand workload. One advantage of this configuration is that you can control the priority\n\nof work and computer resource distribution to each of the LPARs, such as the number of\n\nprocessors or the processing priority (depending on the computer system/operating system\n\narchitecture) that is allocated to each of the LPARs. So, for example, load jobs can be\n\nassigned a low priority during the day when the focus is on data retrieval and a high priority\n\nduring the night when the focus is on data loading.\n\nThis setup supports horizontal scalability by using multiple technologies as appropriate. The\n\nmain constraint is that clients must have access to all systems through TCP/IP.\n\n#### **12.2.6 Multiple server configuration rules**\n\nThe following general rules apply when you configure multiple Content Manager OnDemand\n\nservers. In all cases, for additional guidance, see the appropriate Content Manager\n\nOnDemand documentation or contact Content Manager OnDemand Lab Services.\n\n� Each Content Manager OnDemand server has its own set of configuration files.\n\n� The parameters in all configuration files must be set so that all of the servers are part of\n\nthe same instance.\n\n� The Content Manager OnDemand clients connect to the IP address listening port of the\n\nContent Manager OnDemand server (library server module).\n\n� The documents are retrieved from the various object servers based on the location\n\ninformation that is returned by the library server. This retrieval is transparent to the client\n\nsystems.\n\n� Parallel load processes must have separate temp directories.\n\nFigure 12-5 on page 292 depicts this configuration type.\n\nLPAR\n\n1\n\nLPAR\n\n2\n\nLPAR\n\nn\n\n**Syst em A**\n\nLPAR\n\n1\n\nLPAR\n\n2\n\nLPAR\n\nn\n\n**System B**\n\nLibrary\n\nServer\n\nObject\n\nServer\n\nObject\n\nServer\n\n+\n\n**OnDemand Instance**\n\nLoad\n\nProcess\n\nLoad\n\nProcess\n\n+\n\nLPAR\n\n2\n\nLPAR\n\n2", - "page_start": 314, - "page_end": 314, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 11. Advanced Copy Services\n\nIn Figure 11-155 on page 600, the amount of time in microseconds that is required to transmit\n\na packet across network links of varying bandwidth capacity is compared. The following\n\npacket sizes are used:\n\n� 64 bytes: The size of the common ping packet\n\n� 1500 bytes: The size of the standard TCP/IP packet\n\n� 2148 bytes: The size of an FC frame\n\nFinally, your path maximum transmission unit (MTU) affects the delay that is incurred to get a\n\npacket from one location to another location. An MTU might cause fragmentation or be too\n\nlarge and cause too many retransmits when a packet is lost.\n\n#### **11.11.2 1720 error**\n\nThe 1720 error (event ID 050020 ) is the other problem remote copy might encounter. The\n\namount of bandwidth that is needed for system-to-system communications varies based on\n\nthe number of nodes. It is important that it is not zero. When a partner on either side stops\n\ncommunication, a 1720 is displayed in your error log. According to the product documentation,\n\nthere are no likely field-replaceable unit breakages or other causes.\n\nThe source of this error is most often a fabric problem or a problem in the network path\n\nbetween your partners. When you receive this error, check your fabric configuration for zoning\n\nof more than one host bus adapter (HBA) port for each node per I/O Group if your fabric has\n\nmore than 64 HBA ports zoned. The suggested zoning configuration for fabrics is one port for\n\neach node per I/O Group per fabric that is associated with the host.\n\nFor those fabrics with 64 or more host ports, this suggestion becomes a rule. Therefore, you\n\nsee four paths to each volume discovered on the host because each host needs to have at\n\nleast two FC ports from separate HBA cards, each in a separate fabric. On each fabric, each\n\nhost FC port is zoned to two IBM SAN Volume Controller node ports where each node port\n\ncomes from a different IBM SAN Volume Controller node. This configuration provides four\n\npaths per volume. More than four paths per volume are supported but not recommended.\n\nImproper zoning can lead to SAN congestion, which can inhibit remote link communication\n\nintermittently. Checking the zero buffer credit timer with IBM Spectrum Control and comparing\n\nagainst your sample interval reveals potential SAN congestion. If a zero buffer credit timer is\n\nmore than 2% of the total time of the sample interval, it might cause problems.\n\nNext, always ask your network provider to check the status of the link. If the link is acceptable,\n\nwatch for repeats of this error. It is possible in a normal and functional network setup to have\n\noccasional 1720 errors, but multiple occurrences could indicate a larger problem.\n\nIf you receive multiple 1720 errors, recheck your network connection and then check the\n\nsystem partnership information to verify its status and settings. Then, perform diagnostics for\n\nevery piece of equipment in the path between the two IBM Storwize systems. It often helps to\n\nhave a diagram that shows the path of your replication from both logical and physical\n\nconfiguration viewpoints.\n\n**Note:** Unlike 1720 errors, 1920 errors are deliberately generated by the system because it\n\nevaluated that a relationship could impact the host’s response time. The system has no\n\nindication on if/when the relationship can be restarted. Therefore, the relationship cannot\n\nbe restarted automatically and it needs to be done manually.", - "page_start": 622, - "page_end": 622, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0955.pdf", - "query": "Which orbiting instrument provides near-continuous full-sky coverage in the hard X-ray/low-energy gamma-ray range?", - "target_page": 1, - "target_passage": "Gamma ray Burst Monitor", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Observations of Soft Gamma Ray Sources** *>* 100 **keV Using Earth Occultation**\n\n**with GBM**\n\nG.L. Case, M.L. Cherry, J. Rodi\n\n*Dept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA*\n\nA. Camero-Arranz\n\n*Fundaci´on Espa˜nola de Ciencia y Tecnolog´ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain*\n\nE. Beklen\n\n*Middle East Technical University (METU), 06531, Ankara, Turkey*\n\nC. A. Wilson-Hodge\n\n*NASA Marshall Space Flight Center, Huntsville, AL 35812*\n\nP. Jenke\n\n*NASA Postdoctoral Program Fellow, NASA Marshall Space Flight Center, Huntsville, AL 35812*\n\nP.N. Bhat, M.S. Briggs, V. Chaplin, V. Connaughton, R. Preece\n\n*University of Alabama in Huntsville, Huntsville, AL 35899*\n\nM.H. Finger\n\n*USRA, National Space Science and Technology Center, Huntsville, AL 35899*\n\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being\n\nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth\n\noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma\n\nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient\n\noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage\n\nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies\n\nbelow *∼* 25 keV and above *∼* 1 *.* 5 MeV. We describe the technique and present preliminary results after the first *∼* 17 months of observations at energies above 100 keV. Seven sources are detected: the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source\n\nXTE J1752-223.\n\n## **I. INTRODUCTION**\n\nThe Gamma ray Burst Monitor (GBM) on Fermi is\n\ncurrently the only instrument in orbit providing nearly\n\ncontinuous full sky coverage in the hard X-ray/low\n\nenergy gamma ray energy range. The Earth occul-\n\ntation technique, used very successfully on BATSE,\n\nhas been adapted to GBM. An initial catalog of 64\n\nsources is currently being monitored and continuously\n\naugmented. At energies above 100 keV, six steady\n\nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E\n\n1740-29, Cen A, GRS 1915+105) and one transient\n\nsource (XTE J1752-223) have been detected in the\n\nfirst year of observation. We describe the instrument,\n\noutline the technique, and present light curves for the\n\nseven sources.\n\n**II. GBM AND THE EARTH OCCULTATION**\n\n**OBSERVATIONAL TECHNIQUE**\n\nThe Gamma ray Burst Monitor is the secondary\n\ninstrument onboard the Fermi satellite [1, 2]. It con-\n\nsists of 12 NaI detectors 5 *<sup>′′</sup>* in diameter by 0.5 *<sup>′′</sup>* thick\n\nmounted on the corners of the spacecraft and oriented\n\nsuch that they view the entire sky not occulted by the Earth. GBM also contains 2 BGO detectors 5 *<sup>′′</sup>* in di- ameter by 5 *<sup>′′</sup>* thick located on opposite sides of the\n\nspacecraft. None of the GBM detectors have direct\n\nimaging capability.\n\nKnown sources of gamma ray emission can be mon-\n\nitored with non-imaging detectors using the Earth oc-\n\ncultation technique, as was successfully demonstrated\n\nwith BATSE [3, 4]. When a source of gamma rays\n\nis occulted by the Earth, the count rate measured by\n\nthe detector will drop, producing a step-like feature.\n\nWhen the source reappears from behind the Earths\n\nlimb, the count rate will increase, producing another\n\nstep. The diameter of the Earth seen from Fermi is\n\n*∼* 140 *<sup>◦</sup>* , so roughly 30% of the sky is occulted by the\n\nEarth at any one time. Coupled with the *±* 35 *<sup>◦</sup>* slew-\n\ning of the pointing direction every orbit, this means\n\nthat the entire sky is occulted every two orbits. With\n\nan altitude of 565 km, a period of 96 minutes, and\n\nan orbital inclination of 26 *.* 5 *<sup>◦</sup>* , individual occultation\n\nsteps last for *∼* 10 seconds (Fig. 1).\n\n**eConf C091122**", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "[arXiv:1001.0770v1 [astro-ph.HE] 5 Jan 2010](http://arxiv.org/abs/1001.0770v1)\n\n## **VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration *Harvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645,* *USA*\n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is\n\nused to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is\n\ncurrently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration’s Key\n\nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class\n\nof identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which\n\nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE\n\nexposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including\n\n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected\n\nresults are presented.\n\n## **1. Introduction**\n\nActive galactic nuclei are the most numerous class\n\nof identified VHE γ -ray sources. These objects emit\n\nnon-thermal radiation across ∼ 20 orders of magnitude\n\nin energy and rank among the most powerful particle\n\naccelerators in the universe. A small fraction of AGN\n\npossess strong collimated outflows (jets) powered by\n\naccretion onto a supermassive black hole (SMBH).\n\nVHE γ -ray emission can be generated in these jets,\n\nlikely in a compact region very near the SMBH event\n\nhorizon. Blazars, a class of AGN with jets pointed\n\nalong the line-of-sight to the observer, are of par-\n\nticular interest in the VHE regime. Approximately\n\n30 blazars, primarily high-frequency-peaked BL Lacs\n\n(HBL), are identified as sources of VHE γ -rays, and\n\nsome are spectacularly variable on time scales com-\n\nparable to the light crossing time of their SMBH ( ∼ 2\n\nmin; [1]). VHE blazar studies probe the environment\n\nvery near the central SMBH and address a wide range\n\nof physical phenomena, including the accretion and\n\njet-formation processes. These studies also have cos-\n\nmological implications, as VHE blazar data can be\n\nused to strongly constrain primordial radiation fields\n\n(see the extragalactic background light (EBL) con-\n\nstraints from, e.g., [2, 3]).\n\nVHE blazars have double-humped spectral energy\n\ndistributions (SEDs), with one peak at UV/X-ray en-\n\nergies and another at GeV/TeV energies. The ori-\n\ngin of the lower-energy peak is commonly explained\n\nas synchrotron emission from the relativistic electrons\n\nin the blazar jets. The origin of the higher-energy\n\npeak is controversial, but is widely believed to be the\n\nresult of inverse-Compton scattering of seed photons\n\noff the same relativistic electrons. The origin of the\n\nseed photons in these leptonic scenarios could be the\n\nsynchrotron photons themselves, or photons from an\n\nexternal source. Hadronic scenarios are also plausible\n\nexplanations for the VHE emission, but generally are\n\nnot favored.\n\nContemporaneous multi-wavelength (MWL) obser-\n\nvations of VHE blazars, can measure both SED peaks\n\nand are crucial for extracting information from the\n\nobservations of VHE blazars. They are used to con-\n\nstrain the size, magnetic field and Doppler factor of\n\nthe emission region, as well as to determine the origin\n\n(leptonic or hadronic) of the VHE γ -rays. In leptonic\n\nscenarios, such MWL observations are used to mea-\n\nsure the spectrum of high-energy electrons producing\n\nthe emission, as well as to elucidate the nature of the\n\nseed photons. Additionally, an accurate measure of\n\nthe cosmological EBL density requires accurate mod-\n\neling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified\n\nJulian days.\n\nto observe these breaks, GBM is able to see significant\n\nemission above 300 keV, consistent with the canonical\n\nhard spectrum.\n\n**Cen A** (Fig. 3) is a Sy 2 galaxy that is the brightest\n\nAGN in hard x-rays/low energy gamma rays. It has\n\na hard spectrum (Γ = 1 *.* 8) and has been observed at\n\nenergies *>* 1 MeV [9]. The GBM results are consis-\n\ntent with this hard spectrum, though GBM does not\n\nhave the sensitivity to determine if the hard spectrum\n\ncontinues beyond 300 keV or if the spectrum cuts off.\n\n**Cyg X-1** (Fig. 4) is a HMXB and one of the\n\nfirst systems determined to contain a black hole. It\n\nhas been observed to emit significant emission above\n\n100 keV including a power law tail extending out to\n\ngreater than 1 MeV [10, 11]. The GBM results show\n\nsignificant emission above 300 keV, consistent with\n\nthe power law tail observed when Cyg X-1 is in its\n\nhard state.\n\n**GRS 1915+105** (Fig. 5) is a LMXB with the com-\n\npact object being a massive black hole. Evidence for\n\nemission above 100 keV has been seen previously [12]\n\nwith BATSE. The GBM light curve integrated over\n\n490 days shows significant emission above 100 keV.\n\n**1E 1740-29** (Fig. 6) is a LMXB very near the\n\nGalactic Center. It is a microquasar, and spends most\n\nof its time in the low/hard state. Integral observa-\n\ntions indicate the presence of a power law tail above\n\n200 keV [13]. The present GBM results are consis-\n\ntent with this high energy emission. In the future, we\n\nFIG. 4: Cyg X-1 light curve. Horizontal scale is in modi-\n\nfied Julian days.\n\nFIG. 5: GRS 1915+105 light curve. Horizontal scale is in\n\nmodified Julian days.\n\n**eConf C091122**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0955.pdf" - }, - { - "text": "blazars are observed on the rising part of the syn-\n\nchrotron component (at lower energies than the peak),\n\nall of the objects have very steeply falling *γ* -ray energy\n\nspectral indexes, putting the *γ* -ray peak at lower en-\n\nergies than the observed *Fermi* band. Knowing that\n\nwe are not observing the synchrotron and *γ* -ray com-\n\nponents at analagous points in the spectrum may al-\n\nlow us to better understand the magnetic field in the\n\nparsec-scale jet region and the population of external\n\nphotons that is being upscattered to *γ* -rays.\n\nIn Figure 5, the ratio between *L* *γ* and *νL* *ν,* 1mm re-\n\nflects the division between BL Lacs and FSRQs as well\n\n**eConf C091122**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0806.pdf" - }, - { - "text": "**Submillimeter Variability and the Gamma-ray Connection in** * **Fermi** *\n\n**Blazars**\n\nA. Strom *Univ. of Arizona, AZ 85721, USA*\n\nA. Siemiginowska, M. Gurwell, B. Kelly *CfA, MA 02138, USA*\n\nWe present multi-epoch observations from the *Submillimeter Array* ( *SMA* ) for a sample of 171 bright blazars,\n\n43 of which were detected by *Fermi* during the first three months of observations. We explore the correlation\n\nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special\n\nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de-\n\ntermined using a combination of *Fermi* designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS),\n\nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate\n\nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands\n\nduring the months August- October 2008. The submillimeter light curves are modeled as first-order continuous\n\nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ-\n\nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity.\n\nAll of the the light curves are consistent with being produced by a single process that accounts for both low\n\nand high states, and there is additional evidence that objects may be transitioning between blazar class during\n\nflaring epochs.\n\n## **1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring\n\nevents occur in blazars indicate that much of the en-\n\nergy is being produced deep within the jet on small,\n\nsub-parsec scales [1, 2]. Understanding if/how emis-\n\nsion differs between blazar subclasses (i.e., BL Lacs\n\nobjects and flat-spectrum radio quasars (FSRQs))\n\nmay offer important insight into the similarity be-\n\ntween blazars and, furthermore, can provide con-\n\nstraints on the formation and acceleration of the jets\n\nthemselves.\n\nFor the synchrotron component of blazar spectra,\n\nthe low-frequency spectral break due to synchrotron\n\nself-absorption moves to higher frequencies as one\n\nmeasures closer to the base of the jet [2]. This of-\n\nten places the peak of the spectrum in the millime-\n\nter and submillimeter bands, where the emission is\n\noptically-thin and originates on parsec and sub-parsec\n\nscales [3], allowing direct observation of the most com-\n\npact regions near the central engine. The high en-\n\nergy *γ* -ray emission originates as a Compton process,\n\ntypically a combination of synchrotron-self-Compton\n\n(SSC) and external-radiation-Compton (ERC). De-\n\npending on the source properties, the synchrotron\n\nphotons or external photons are upscattered by the\n\nsame population of electrons that emit the millimeter\n\nand submillimeter spectra. Therefore the submillime-\n\nter and *γ* -ray emission are closely linked and give the\n\nfull information about the source emission.\n\nA systematic study of the submillimeter properties\n\nof the entire sample of *Fermi* blazars has yet to be con-\n\nducted and is one of the primary goals of our work. We\n\npresent here preliminary analysis of the submillimeter\n\nproperties of *Fermi* blazars detected by the *Submil-*\n\n*limeter Array* <sup>1</sup> ( *SMA* ) at 1mm and 850 *µ* m, including\n\nan investigation of variable behavior and the deter-\n\nmination of submillimeter energy spectral indices. In\n\naddition, we consider the connection to the observed\n\n*γ* -ray indices and luminosities.\n\n## **2.** * **SMA** * **BLAZARS**\n\nThe *Submillimeter Array* [4] consists of eight 6 m\n\nantennas located near the summit of Mauna Kea. The\n\n*SMA* is used in a variety of baseline configurations\n\nand typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 4: The *γ* -ray index versus submillimeter index plane. The blazars fall more steeply in the *γ* -rays than in the\n\nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full *SMA* sample,\n\nwhere the blazars are more distributed around *α* S *∼* 0.\n\nas the presence of SSC versus ERC. Here, we use sub-\n\nmillimeter luminosity as a proxy for jet power, which\n\nis correlated with the integrated luminosity of the syn-\n\nchrotron component. Elevated *γ* -ray luminosity with\n\nrespect to the synchrotron component (which is often\n\nseen in FSRQs) suggests the upscattering of external\n\nphotons off the synchrotron-emitting electrons. These\n\nobjects should occupy the upper right of the ratio/jet\n\npower plot, and BL Lacs, which generally exhibit com-\n\nponents with roughly comparable luminosities, should\n\noccupy the lower left. It is clear from the figure, how-\n\never, that many FSRQs exhibit ratios similar to those\n\nof the BL Lacs and vis versa.\n\nSikora et al. [10] report that, during its flaring\n\nepochs, 3C 454.3 transitions from its typical FSRQ\n\nstate to a more BL Lac-like state, where the syn-\n\nchrotron component emits much more strongly com-\n\npared to the *γ* -ray component than during its “low\n\nstate”. 3C 454.3, which is the highest submillime-\n\nter luminosity FSRQ in our sample, would then shift\n\ndown and to the right in Figure 5 when it enters a\n\nflaring period. For the first three months of the *Fermi*\n\nmission, 3C 454.3 was not flaring, which may explain\n\nits present location in Figure 5. The three objects for\n\nwhich there is a type discrepancy between CGRaBS\n\nand LBAS are all FSRQs (in CGRaBS) and exhibit\n\nlow luminosity ratios and high luminosity, which sug-\n\ngest they may be undergoing the same changes as 3C\n\n454.3. A possible interpretation of the elevated lumi-\n\nnosity ratios observed in some BL Lacs objects is that\n\nthere has been a dramatic increase in *γ* -ray luminos-\n\nity due to ERC, which would not be reflected in the\n\nsynchrotron component.\n\n## **5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub-\n\nmillimeter is to study behavior close to the central\n\nengine, where the jet material is presumably still be-\n\ning accelerated. The separate emission processes that\n\ncontribute to overall SED may present differently in\n\nBL Lacs and FSRQs, allowing us to understand the\n\nsimilarities and differences between blazar types. We\n\nhave investigated these differences between objects in\n\nterms of submillimeter behavior and, in conclusion,\n\nfind that\n\n*-* The *SMA* blazars exhibit submillimeter energy spectral indexes that follow the spectral se-\n\nquence interpretation of blazars.\n\n**eConf C091122**", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "eling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m\n\natmospheric-Cherenkov telescopes located in Arizona,\n\nis used to study VHE γ -rays from a variety of astro-\n\nphysical sources [4]. VERITAS began scientific obser-\n\nvations with a partial array in September 2006 and has\n\nroutinely observed with the full array since Septem-\n\nber 2007. The performance metrics of VERITAS in-\n\nclude an energy threshold of ∼ 100 GeV, an energy\n\nresolution of ∼ 15%, an angular resolution of ∼ 0.1 <sup>◦</sup> ,\n\nand a sensitivity yielding a 5 σ detection of a 1% Crab Nebula flux object in < 30 hours <sup>1</sup> . VERITAS has an\n\nactive maintenance program (e.g. frequent mirror re-\n\ncoating and alignment) to ensure its continued high\n\nperformance over time, and an upgrade improving\n\nboth the camera (higher quantum-efficiency PMTs)\n\nand the trigger system has been proposed to the fund-\n\ning agencies.\n\n1 A VERITAS telescope was relocated during Summer 2009,\n\nincreasing the array’s sensitivity by a factor ∼ 1.3.\n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "Figure 5: Ratio of *γ* -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this\n\nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower\n\nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n\n*-* BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter vari-\n\nability or characteristic timescale, but our sam-\n\nple of BL Lacs may be dominated by high-\n\npeaked BL Lacs (HBLs), which exhibit obser-\n\nvational similarities with FSRQs.\n\n*-* Blazar submillimeter light curves are consistent with being produced by a single process that ac-\n\ncounts for both high and low states, with char-\n\nacteristic timescales 10 *< τ* rest *<* 500 days.\n\n*-* The blazars detected by *Fermi* have synchrotron peaks at higher frequencies, regardless of sub-\n\nmillimeter luminosity.\n\n*-* FSRQs exhibit higher ratios of *γ* -ray to sub- millimeter luminosity than BL Lacs (Figure 5),\n\nbut all objects inhabit a region of parameter\n\nspace suggesting transitions between states dur-\n\ning flaring epochs.\n\nAs *Fermi* continues to observe fainter sources, the\n\nsample of objects for which we can perform this type of\n\nanalysis will increase and provide better limits on our\n\nresults. To understand the physical relevance of these\n\nresults, however, it is important to be able to distin-\n\nguish between the difference in variability between BL\n\nLacs and FSRQs. One avenue for exploring this dif-\n\nference is to monitor changing submillimeter energy\n\nspectral index and the ratio of *γ* -ray to submillime-\n\nter luminosity as functions of time. The full mean-\n\ning of the results of our autoregressive method is not\n\nyet clear, and will require better-sampled blazar light\n\ncurves and the comparison between *τ* rest with physical\n\ntimescales such as the synchrotron cooling timescale.\n\nThese analyses would allow us to place constraints\n\non the processes occurring near the base of the jet in\n\nblazars and further understand the intimate connec-\n\ntion between them.\n\n## **Acknowledgments**\n\nThis work was supported in part by the NSF\n\nREU and DoD ASSURE programs under Grant no.\n\n0754568 and by the Smithsonian Institution. Par-\n\ntial support was also provided by NASA contract\n\nNAS8-39073 and NASA grant NNX07AQ55G. We\n\nhave made use of the SIMBAD database, operated at\n\nCDS, Strasbourg, France, and the NASA/IPAC Ex-\n\ntragalactic Database (NED) which is operated by the\n\nJPL, Caltech, under contract with NASA.\n\n**eConf C091122**", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "gets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included\n\nthe first VHE-detected IBL, W Comae [14, 15], and\n\nthe HBL 1ES 0806+524 [16]. VERITAS has discov-\n\nered 6 VHE blazars since the launch of Fermi. Three\n\nof these were initially observed by VERITAS prior to\n\nthe release of Fermi-LAT results, due to the X-ray\n\nbrightness of the synchrotron peaks of their SEDs.\n\nVHE emission from 3C 66A was discovered by VER-\n\nITAS in September 2008 [17] during a flaring episode\n\nthat was also observed by the Fermi-LAT [18]. The\n\nobserved flux above 200 GeV was 6% of the Crab Neb-\n\nula flux and the measured VHE spectrum was very\n\nsoft (Γ VHE ∼ 4 . 1). RGB J0710+591 was detected\n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "## **3. VERITAS Blazar KSP**\n\nVERITAS observes for ∼ 750 h and ∼ 250 h each\n\nyear during periods of astronomical darkness and par-\n\ntial moonlight, respectively. The moonlight observa-\n\ntions are almost exclusively used for a blazar discovery\n\nprogram, and a large fraction of the dark time is used\n\nfor the blazar KSP, which consists of:\n\n- A VHE blazar discovery program ( ∼ 200 h / yr):\n\nEach year ∼ 10 targets are selected to receive\n\n∼ 10 h of observations each during astronomi-\n\ncal darkness. These data are supplemented by\n\ndiscovery observations during periods of partial\n\nmoonlight.\n\n- A target-of-opportunity (ToO) observation pro-\n\ngram ( ∼ 50 h / yr): VERITAS blazar obser-\n\nvations can be triggered by either a VERI-\n\nTAS blazar discovery, a VHE flaring alert ( > 2\n\nCrab) from the blazar monitoring program of\n\nthe Whipple 10-m telescope or from another\n\nVHE instrument, or a lower-energy flaring alert\n\n(optical, X-ray or Fermi-LAT). Should the guar-\n\nanteed allocation be exhausted, further time can\n\nbe requested from a pool of director’s discre-\n\ntionary time.\n\n- Multi-wavelength (MWL) studies of VHE\n\nblazars ( ∼ 50 h / yr + ToO): Each year one\n\nblazar receives a deep exposure in a pre-planned\n\ncampaign of extensive, simultaneous MWL (X-\n\nray, optical, radio) measurements. ToO observa-\n\ntion proposals for MWL measurements are also\n\nsubmitted to lower-energy observatories (e.g.\n\nSwift) and are triggered by a VERITAS discov-\n\nery or flaring alert.\n\n- Distant VHE blazar studies to constrain the ex-\n\ntragalactic background light (EBL): Here dis-\n\ntant targets are given a higher priority in the\n\nblazar discovery program, as well as for the\n\nMWL observations of known VHE blazars, par-\n\nticularly those with hard VHE spectra.\n\n## **4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are\n\nlargely high-frequency-peaked BL Lac objects. How-\n\never, the program also includes IBLs (intermediate-\n\npeaked) and LBLs (low-peaked), as well as flat spec-\n\ntrum radio quasars (FSRQs), in an attempt to in-\n\ncrease the types of blazars known to emit VHE γ -rays.\n\nThe observed targets are drawn from a target list con-\n\ntaining objects visible to the telescopes at reasonable\n\nzenith angles ( − 8 <sup>◦</sup> < δ < 72 <sup>◦</sup> ), without a previously\n\npublished VHE limit below 1.5% Crab, and with a\n\nmeasured redshift z < 0 . 3. To further the study of the\n\nEBL a few objects having a large ( z > 0 . 3) are also\n\nincluded in the target list. The target list includes:\n\n- All nearby ( z < 0 . 3) HBL and IBL recom-\n\nmended as potential VHE emitters in [5, 6, 7].\n\n- The X-ray brightest HBL ( z < 0 . 3) in the recent\n\nSedentary [8] and ROXA [9] surveys.\n\n- Four distant ( z > 0 . 3) BL Lac objects recom-\n\nmended by [5, 10].\n\n- Several FSRQ recommended as potential VHE\n\nemitters in [6, 11].\n\n- All nearby ( z < 0 . 3) blazars detected by\n\nEGRET [12].\n\n- All nearby ( z < 0 . 3) blazars contained in the\n\nFermi-LAT Bright AGN Sample [13].\n\n- All sources ( | b | > 10 <sup>◦</sup> ) detected by Fermi-LAT\n\nwhere extrapolations of their MeV-GeV γ -ray\n\nspectrum (including EBL absorption; assuming\n\nz = 0.3 if the redshift is unknown) indicates a\n\npossible VERITAS detection in less than 20 h.\n\nThis criteria is the focus of the 2009-10 VERI-\n\nTAS blazar discovery program.\n\n## **5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ -ray emission from\n\n16 AGN (15 blazars), including 8 VHE discoveries.\n\nThese AGN are shown in Table I, and each has been\n\ndetected by the Large Area Telescope (LAT) instru-\n\nment aboard the Fermi Gamma-ray Space Telescope.\n\nEvery blazar discovered by VERITAS was the sub-\n\nject of ToO MWL observations to enable modeling of\n\nits simultaneously-measured SED. The known VHE\n\nblazars detected by VERITAS were similarly the tar-\n\ngets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0955.pdf", - "query": "What is Cyg X-1?", - "target_page": 3, - "target_passage": "is a HMXB and one of the first systems determined to contain a black hole", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "pain-related psychological distress. Current risk pre-\n\ndiction paradigms in musculoskeletal pain consider\n\nonly baseline pain-related psychological distress. How-\n\never, these results underscore the importance of\n\nTable 7 Summary of consistent individual predictors for each utilization outcome <sup>*</sup>\n\nDependent variable Utilization outcome\n\nAny care Opioids Injection Surgery Diagnostic tests or imaging Emergency room\n\nAge X\n\nInsurance X\n\nComorbidities (CCI) X X\n\nBaseline disability X X X X X\n\nBaseline pain X\n\nChange in pain X X X X\n\nChange in disability X\n\nChange in 10-item OSPRO-YF X\n\nCCI Charlson comorbidity index, OSPRO-YF Pain-related psychological distress screening tool\n\n* Significant predictors ( p < .05) for each dependent variable denoted with “ X ”\n\nPage 10 of 14", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed5.pdf" - }, - { - "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified\n\nJulian days.\n\nto observe these breaks, GBM is able to see significant\n\nemission above 300 keV, consistent with the canonical\n\nhard spectrum.\n\n**Cen A** (Fig. 3) is a Sy 2 galaxy that is the brightest\n\nAGN in hard x-rays/low energy gamma rays. It has\n\na hard spectrum (Γ = 1 *.* 8) and has been observed at\n\nenergies *>* 1 MeV [9]. The GBM results are consis-\n\ntent with this hard spectrum, though GBM does not\n\nhave the sensitivity to determine if the hard spectrum\n\ncontinues beyond 300 keV or if the spectrum cuts off.\n\n**Cyg X-1** (Fig. 4) is a HMXB and one of the\n\nfirst systems determined to contain a black hole. It\n\nhas been observed to emit significant emission above\n\n100 keV including a power law tail extending out to\n\ngreater than 1 MeV [10, 11]. The GBM results show\n\nsignificant emission above 300 keV, consistent with\n\nthe power law tail observed when Cyg X-1 is in its\n\nhard state.\n\n**GRS 1915+105** (Fig. 5) is a LMXB with the com-\n\npact object being a massive black hole. Evidence for\n\nemission above 100 keV has been seen previously [12]\n\nwith BATSE. The GBM light curve integrated over\n\n490 days shows significant emission above 100 keV.\n\n**1E 1740-29** (Fig. 6) is a LMXB very near the\n\nGalactic Center. It is a microquasar, and spends most\n\nof its time in the low/hard state. Integral observa-\n\ntions indicate the presence of a power law tail above\n\n200 keV [13]. The present GBM results are consis-\n\ntent with this high energy emission. In the future, we\n\nFIG. 4: Cyg X-1 light curve. Horizontal scale is in modi-\n\nfied Julian days.\n\nFIG. 5: GRS 1915+105 light curve. Horizontal scale is in\n\nmodified Julian days.\n\n**eConf C091122**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0955.pdf" - }, - { - "text": "640 650\n\n0.9\n\n1.0\n\n(d) H = 2 kOe, T = 300K\n\n(c) H = 1 kOe, T = 2K\n\n(a) absorption\n\n(b) H = 0, T = 2K\n\nX-ray absorption (arb. units)\n\nX-ray energy (eV)\n\nXMCD (arb. units)\n\nFIG. 3. (color online) (a) Polarization-averaged Mn L 2 , 3 spec- trum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured\n\nin remanence at 2 K; (c) XMCD spectra measured under a\n\n1000 Oe applied field at 2 K; (d) XMCD spectrum measured\n\nunder a 2000 Oe applied field at 300 K. XMCD spectra are\n\nobtained using TEY (thick red lines) and FY (thin blue lines)\n\ndetection.", - "page_start": 5, - "page_end": 5, - "source_file": "1001.2449.pdf" - }, - { - "text": "y x z z z\n\nz z z z\n\nz z\n\ny y\n\ny\n\nx\n\nx x\n\nx x x\n\ny y y\n\ny\n\nx\n\ny\n\nx\n\nz\n\nz\n\ny y\n\nx x x\n\ny\n\nz x\n\nx\n\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled\n\nand open circles indicate two sublattices. x, y, z label the links\n\nalong three different directions used in (1).\n\nderived as well. There have been several proposals to\n\nopen the fermion gap for the non-Abelian phase without\n\nspoiling exact solvability <sup>4,6</sup> . And many generalizations\n\nto other(even 3D) lattices have been developed in the\n\nlast few years <sup>10- 16</sup> . All these efforts have significantly\n\nenriched our knowledge of exactly solvable models and\n\nquantum phases of matter.\n\nHowever, in the original Kitaev model and its later\n\ngeneralizations in the form of spin models, spin rotation\n\nsymmetry is explicitly broken. This makes them harder\n\nto realize in solid state systems. There are many pro-\n\nposals to realized the Kitaev model in more controllable\n\nsituations, e.g. in cold atom optical lattices <sup>17,18</sup> , or in\n\nsuperconducting circuits <sup>19</sup> . But it is still desirable for\n\ntheoretical curiosity and practical purposes to realize the\n\nKitaev-type models in spin rotation invariant systems.\n\nIn this paper we realize the Kitaev honeycomb lattice\n\nmodel as the low energy Hamiltonian for a spin rotation\n\ninvariant system. The trick is not to use the physical spin\n\nas the spin in the Kitaev model, instead the spin-1/2 in\n\nKitaev model is from some emergent two-fold degener-\n\nate low energy states in the elementary unit of physical\n\nsystem. This type of idea has been explored recently by\n\nJackeli and Khaliullin <sup>20</sup> , in which the spin-1/2 in the Ki-\n\ntaev model is the low energy Kramers doublet created by\n\nstrong spin-orbit coupling of t 2 g orbitals. In the model\n\npresented below, the Hilbert space of spin-1/2 in the Ki-\n\ntaev model is actually the two dimensional spin singlet\n\nsector of four antiferromagnetically coupled spin-1/2 mo-\n\nments, and the role of spin-1/2 operators(Pauli matrices)\n\nin the Kitaev model is replaced by certain combinations\n\nof S j · S k [or the spin-chirality S j · ( S k × S ℓ )] between the\n\nfour spins.\n\nOne major drawback of the model to be presented is\n\nthat it contains high order spin interactions(involves up\n\nto six or eight spins), thus is still unnatural. However it\n\nopens the possibility to realize exotic (exactly solvable)\n\nmodels from spin-1/2 Hamiltonian with spin rotation in-\n\nvariant interactions. We will discuss two possible routes\n\nto reduce this artificialness through controlled perturba-\n\ntive expansions, by coupling to optical phonons or by\n\nmagnetic couplings between the elementary units.\n\nThe outline of this paper is as follows. In Section II\n\nwe will lay out the pseudo-spin-1/2 construction. In Sec-\n\n4\n\n2 3\n\n1\n\n*z* *z*\n\n*x*\n\n*x*\n\n*y*\n\n*y*\n\n2 3\n\n4\n\n1\n\nFIG. 2: Left: the physical spin lattice for the model (8). The\n\ndash circles are honeycomb lattice sites, each of which is ac-\n\ntually a cluster of four physical spins. The dash straight lines\n\nare honeycomb lattice bonds, with their type x, y, z labeled.\n\nThe interaction between clusters connected by x, y, z bonds\n\nare the J x,y,z terms in (8) or (9) respectively. Note this is not the 3-12 lattice used in Ref. <sup>9,10</sup> . Right: enlarged picture of\n\nthe clusters with the four physical spins labeled as 1 , . . . , 4.\n\nThick solid bonds within one cluster have large antiferromag-\n\nnetic Heisenberg coupling J cluster .\n\ntion III the Kitaev model will be explicitly constructed\n\nusing this formalism, and some properties of this con-\n\nstruction will be discussed. In Section IV we will discuss\n\ntwo possible ways to generate the high order spin in-\n\nteractions involved in the construction of Section III by\n\nperturbative expansions. Conclusions and outlook will\n\nbe summarized in Section V.\n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2\n\nFROM FOUR-SPIN CLUSTER.\n\nIn this Section we will construct the pseudo-spin-1/2", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" - }, - { - "text": "**14** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\n#### **2.3.2 IBM Storage Utility offerings**\n\nThe IBM 2076 Model U7A is the IBM Storwize V7000 with a three-year warranty to be used in\n\nthe Storage Utility Offering space. These models are physically and functionally identical to\n\nthe Storwize V7000 model 624, except for target configurations and variable capacity billing.\n\nThe variable capacity billing uses IBM Spectrum Control™ Storage Insights to monitor the\n\nsystem usage, which allows allocated storage usage above a base subscription rate to be\n\nbilled per TB, per month.\n\n| Model | Cache | Fibre Channel (FC) / iSCSI / SAS ports | Drive slots | Power supply |\n|:---|:---|:---|:---|:---|\n| 2076-624 (with two node canisters Gen2+) | 64, 128, or 256 gigabytes (GB) | 16 x 16 Gb / 6 x 1 Gb + 8x 10 Gb / 4 x 12 Gb | 24 x 2.5-inch | Integrated dual power supplies with battery |\n| 2076-524 (with two node canisters Gen2) | 32 or 64 gigabytes (GB) | 4 x 16 Gb / 4 x 1 Gb + 4 x 10 Gb / 4 x 12 Gb | 24 x 2.5-inch | Integrated dual power supplies with battery |\n| 2076-212 (with two expansion canisters) | Not applicable (N/A) | -- / -- / 4 x 12 Gb | 12 x 3.5-inch | Integrated dual power supplies |\n| 2076-224 (with two expansion canisters) | N/A | -- / -- / 4 x 12 Gb | 24 x 2.5-inch | Integrated dual power supplies |\n| 2076-12F (with two expansion canisters Gen2) | N/A | -- / -- / 4 x 12 Gb | 12 x 3.5-inch | Integrated dual power supplies (attaches to 2076-524 and 2076-624 only) |\n| 2076-24F (with two expansion canisters Gen2) | N/A | -- / -- / 4 x 12 Gb | 24 x 2.5-inch | Integrated dual power supplies (attaches to 2076-524 and 2076-624 only) |\n| 2076-92F (with two expansion canisters Gen2) | N/A | -- / -- / 4 x 12 Gb | 92 x 3.5-inch | Integrated dual power supplies (attaches to 2076-524 and 2076-624 only) |\n\n**Note:** The first generation of control enclosures (2076 - models 112, 124, 312, and 324)\n\nwere withdrawn from marketing. However, expansion enclosures 2076-212 and 2076-224\n\ncan still be ordered (see Table 2-1) because they attach to those control enclosures only.\n\nIntermixing control enclosures with expansion enclosures of different generations is not a\n\nsupported combination, and is refused by IBM Spectrum Virtualize software.\n\nThe first generation of IBM Storwize V7000 hardware is not supported by IBM Spectrum\n\nVirtualize V8.1. Any attempt to upgrade to V8.1 is rejected by the software. The last\n\nsupported version for first-generation Storwize V7000 is V7.8.", - "page_start": 35, - "page_end": 35, - "source_file": "sg247938.pdf" - }, - { - "text": "##### **ITEM 6. EXHIBITS**\n\nSee Index to Exhibits at the end of this Quarterly Report on Form 10-Q for the information required by this Item.\n\n##### **INDEX TO EXHIBITS**\n\n**Exhibit**\n\n**Number**\n\n**Incorporated by Reference Filed**\n\n**Herewith Exhibit Description Form File No. Exhibit Filing Date**\n\n31.1 Rule 13a-14(a) / 15(d)-14(a) Certification of\n\nPrincipal Executive Officer\n\n— — — — X\n\n31.2 Rule 13a-14(a) / 15(d)-14(a) Certification of\n\nPrincipal Financial Officer\n\n— — — — X\n\n32.1* Section 1350 Certifications — — — —\n\n101.INS Inline XBRL Instance Document — — — — X\n\n101.SCH Inline XBRL Taxonomy Extension Schema\n\nDocument\n\n— — — — X\n\n101.CAL Inline XBRL Taxonomy Extension Calculation\n\nLinkbase Document.\n\n— — — — X\n\n101.DEF Inline XBRL Taxonomy Extension Definition\n\nLinkbase Document\n\n— — — — X\n\n101.LAB Inline XBRL Taxonomy Extension Label Linkbase\n\nDocument\n\n— — — — X\n\n101.PRE Inline XBRL Taxonomy Extension Presentation\n\nLinkbase Document\n\n— — — — X\n\n104 Cover Page Interactive Data File (formatted as\n\ninline XBRL with applicable taxonomy extension\n\ninformation contained in Exhibits 101)\n\n* Furnished herewith\n\n† Portions of this exhibit have been redacted in compliance with Regulation S-K Item 601(b)(10)(iv)\n\n37", - "page_start": 47, - "page_end": 47, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "**Feature Prediction versus Pixel Reconstruction.**\n\nApproaches that predict in pixel space must dedicate\n\nsignificant model capacity and compute to capture all\n\nthe low-level detail in the visual input. By contrast, ap-\n\nproaches that predict in latent space have the flexibility\n\nto eliminate irrelevant or unpredictable pixel-level details\n\nfrom the target representation ( Vondrick et al. , 2016 ).\n\nPredicting in representation space has been shown to\n\nlead to versatile representations that perform well across\n\nmany downstream tasks through linear probing or low-\n\nshot adaptation ( Assran et al. , 2023 ; Oquab et al. , 2023 ;\n\nAssran et al. , 2022 ), while demonstrating an efficiency\n\ngain during pretraining compared to pixel level recon-\n\nstruction ( Assran et al. , 2023 ; Baevski et al. , 2022b , a ).\n\nThe works of Baevski et al. ( 2022a , b ) additionally show\n\nthat predicting in representation space results in compet-\n\nitive end-to-end fine-tuning performance in the image,\n\naudio and text domains. In this work, we extend these\n\nfindings to the video modality.\n\n## **3 Methodology: Video-JEPA**\n\nx\n\nx-encoder\n\npredictor z\n\ny\n\ny-encoder\n\nD( ˆ s y , s y ) ˆ s y s y\n\n**Figure 2** Joint-Embedding Predictive Architectures are\n\ntrained to predict the representation of an input *y* from\n\nthe representation of another input *x* . The additional vari-\n\nable *z* provides the predictor with information about the\n\ntransformation that computes *y* from *x* .\n\nOur goal is to explore the effectiveness of feature pre-\n\ndiction as a stand-alone objective for learning visual\n\nrepresentations from video. To that end, we use a\n\njoint-embedding predictive architecture (JEPA) ( LeCun ,\n\n2022 ); see Figure 2 . The main idea behind a JEPA is\n\nto learn by predicting the representation of an input *y*\n\nfrom the representation of another input *x* . The basic\n\narchitecture is made up of an encoder, *E* *θ* ( *·* ) , which com- putes the representation of the inputs, and a predictor,\n\n*P* *ϕ* ( *·* ) , which predicts the representation of *y* from the representation of *x* , conditioned on a variable *z* indicat-\n\ning the transformation (or corruption) between *x* and\n\n*y* . Conditioning on *z* enables the generation of distinct\n\npredictions for various transformations of *x* .\n\n### **3.1 Training Objective**\n\nWe train our visual encoder *E* *θ* ( *·* ) to satisfy the con- straint that representations computed from one part of\n\nthe video, *y* , should be predictable from representations\n\ncomputed from another part of the video, *x* . The pre-\n\ndictor network *P* *ϕ* ( *·* ) , which maps the representation of *x* to the representation of *y* , is trained simultaneously\n\nwith the encoder, and is provided specification of the\n\nspatio-temporal positions of *y* through the conditioning\n\nvariable *z* *←* ∆ *y* .\n\nNaively implementing the objective using the regression\n\nminimize *θ,ϕ* *∥* *P* *ϕ* ( *E* *θ* ( *x* ) *,* ∆ *y* ) *−* *E* *θ* ( *y* ) *∥* 1 *,*\n\nwould admit a trivial solution, where the encoder out-\n\nputs a constant representation, regardless of its input.\n\nIn practice, we use the following modified objective to\n\nprevent representation collapse,\n\nminimize *θ,ϕ* *∥* *P* *ϕ* ( *E* *θ* ( *x* ) *,* ∆ *y* ) *−* sg ( *E* *θ* ( *y* )) *∥* 1 *,* (1)\n\nwhere sg ( *·* ) denotes a stop-gradient operation, which does not backpropagate through its argument, and *E* *θ* ( *·* ) is an exponential moving average of the network *E* *θ* ( *·* ) . The use of an exponential-moving average feature ex-\n\ntractor along with a stop-gradient and a predictor has\n\nbeen used as a collapse prevention strategy for image pre-\n\ntraining ( Grill et al. , 2020 ), and studied empirically ( Xie\n\net al. , 2021 ) and theoretically ( Tian et al. , 2021 ). In\n\nfact, the objective in equation ( 1 ) is similar to the loss\n\nof Assran et al. ( 2023 ) used for image pretraining, but", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv3.pdf" - }, - { - "text": "NAVWEPS 00-BOT-80 STABILITY AND CONTROL\n\n4 STABLE, POSITIVE CyAC\n\nCM .ICl-2A-rI\\,C C~ I IDIIETAIPI e\n\nI ai*\n\nSTABLE, NEGATIVE f&AC\n\n) =3=Ez.,. CM + CL\n\n\\ SUBSONIC -\n\n\\ SUPERSONIC\n\n### Figure 4.7. Effect of CM~~ C. G. Position and Mach Nimber\n\n255", - "page_start": 272, - "page_end": 272, - "source_file": "00-80T-80.pdf" - }, - { - "text": "Page 44 10/02/2013\n\n## **Glossary of terms and abbreviations**\n\nAD - Activity Data\n\nAWMS - Animal Waste Management System\n\nBOD - Biochemical Oxygen Demand\n\nC - Carbon\n\nC 2 F 6\n\n- Hexafluoroethane\n\nCF 4\n\n- Tetrafluoromethane\n\nCH 4\n\n- Methane\n\nCO - Carbon Monoxide\n\nCO 2\n\n- Carbon dioxide\n\nCOD - Chemical Oxygen Demand\n\ndm - dry matter\n\nGg - Gigagram\n\nha - hectare\n\nHFC - Hydrofluorocarbon\n\nhl - hectolitre\n\nk - kilo\n\nkg - kilogram\n\nkha - kilo hectare\n\nkt - kilotonne\n\nLTO - Landing/Take Off\n\nLUCF - Land-Use Change and Forestry\n\nLULUCF - Land Use, Land-Use Change and Forestry\n\nm <sup>3</sup>\n\n- cubic meter\n\nMCF - Methane Correction Factor\n\nMg - Megagram\n\nMha - Megahectare\n\nMSW - Municipal Solid Waste\n\nN - Nitrogen\n\nN 2 O - Nitrous Oxide\n\nNFP - National Focal Point\n\nNH 3\n\n- Ammonia\n\nNMVOC - Non-Methane Volatile Organic Compound\n\nNO X\n\n- Nitrogen Dioxide\n\nPFC - Perfluorocarbon\n\nRA - Reference Approach\n\nSE - Sectoral Expert\n\nSF 6\n\n- Sulphur Hexafluoride\n\nSO 2\n\n- Sulphur Dioxide\n\nSWDS - Solid Waste Disposal Site\n\nt - tonne\n\nTg - Teragram\n\nTJ - Terajoules\n\nXML - Extensible Markup Language\n\nyear t - inventory year", - "page_start": 43, - "page_end": 43, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "## **B Extended Description of V-JEPA**\n\nIn this section, we provide an in-depth description of our approach V-JEPA that is illustrated in Figure 3 .\n\n**Input.** Unless stated otherwise, during during pretraining, we always randomly sample a clip of 16 frames from\n\neach input video with a temporal stride of 4 between sampled frames. An input video clip therefore covers 64 frames\n\nin total, or roughly 2 seconds of a given video running at 30 frames per second. We then resize the video’s spatial\n\ndimensions to 224 *×* 224 , resulting in an overall shape of 16 *×* 224 *×* 224 *×* 3 for the entire clip. Since ViT networks process a 1D sequence of tokens, we must convert an input video clip into a 1D token sequence. To do so, we apply a\n\n3D convolution comprising *d* filters of size 2 *×* 16 *×* 16 with a temporal stride of 2 and a spatial stride of 16 , resulting in a tensor of shape 8 *×* 14 *×* 14 *×* *d* . Next we add absolute 3D sin-cos positional embeddings to the spatio-temporal feature map and flatten it, resulting in a 1D token sequence of shape 1568 *×* *d* . This process is demonstrated in Figure 7 .\n\n**[16 x 224 x 224 x 3]**\n\n**3D Conv**\n\n**[2 x 16 x 16 x d]**\n\n**[8 x 14 x 14 x d]**\n\n**3D sin-cos absolute position**\n\n**embeddings**\n\n**[8 x 14 x 14 x d]**\n\n**[1568 x d]**\n\n**+ 16 video frames**\n\n**resolution 224 x 224**\n\n**flatten**\n\n**Figure 7 V-JEPA** training operates on a video clip flattened into a sequence of tokens. To convert a video clip of size\n\n16 *×* 224 *×* 224 *×* 3 into a 1D token sequence, we apply a 3D convolution comprising *d* filters of size 2 *×* 16 *×* 16 with a temporal stride of 2 and a spatial stride of 16 , resulting in a tensor of shape 8 *×* 14 *×* 14 *×* *d* . Next we add absolute 3D sin-cos positional embeddings to the spatio-temporal feature map and flatten it, resulting in a 1D token sequence of shape 1568 *×* *d* .\n\n**V-JEPA .** We sample both a video clip, and a video mask in each iteration. We denote a video clip represented as\n\na 1D token sequence of length *L* = 1568 by *x* *L* = ( *x* 1 *, . . . , x* *L* ) . Similarly, given a mask of *M < L* patches, leaving\n\n*N* = *L* *−* *M* patches unmasked, we denote the indices of masked patches by ( *i* 1 *, . . . , i* *M* ) and its complement (the\n\nindices of unmasked patches) by ( *j* 1 *, . . . , j* *N* ) .\n\n*Computing the* *x* *-representations.* To compute the V-JEPA loss, we first produce the *x* -representations by masking\n\nthe video clip and feeding it into the *x* -encoder; we denote the masked video by *x* *N* = ( *x* *j* 1 *, . . . , x* *j* *N* ) . Applying the *x* -\n\nencoder *E* *θ* ( *·* ) to the masked clip gives a sequence of patch representations, denoted as *z* *N* = *E* *θ* ( *x* *N* ) = ( *z* *j* 1 *, . . . , z* *j* *N* ) *.*\n\n*Predicting the target.* Next, the V-JEPA predictor network *P* *ϕ* ( *·* *,* *·* ) takes as input the tokens produced by the *x* -encoder and predicts the missing regions in the video clip, which are specified by a set of learnable mask tokens.\n\nSpecifically, the mask tokens are parameterized as the sum of a shared learnable vector and an absolute 3D\n\nsin-cos positional embedding, denoted by *m* *M* = ( *m* *i* 1 *, . . . , m* *i* *M* ) . The output of the predictor is thus given by,\n\nˆ *s* *M* = *P* *ϕ* ( *z* *N* *, m* *M* ) = (ˆ *s* *i* 1 *, . . . ,* ˆ *s* *i* *M* ) *,* corresponding to a *d* -dimensional output for each of the *M* masked patches.\n\n*Computing the* *y* *-representations.* Finally to compute the prediction targets, the entire unmasked video clip is\n\nprocessed by the *y* -encoder to obtain a set of target representations, denoted by *s* *L* = *E* *θ* ( *x* *L* ) = ( *s* 1 *, . . . , s* *L* ) *.* The\n\nV-JEPA loss is now computed as\n\nLoss = <sup>1</sup> *M* � *k* *∈* ( *i* 1 *,...,i* *M* ) *∥* ˆ *s* *k* *−* *s* *k* *∥* 1 *,* (2)", - "page_start": 15, - "page_end": 15, - "source_file": "arxiv3.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0955.pdf", - "query": "What satellite is the Gamma Ray Burst Observatory on?", - "target_page": 1, - "target_passage": " Fermi satellite", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Observations of Soft Gamma Ray Sources** *>* 100 **keV Using Earth Occultation**\n\n**with GBM**\n\nG.L. Case, M.L. Cherry, J. Rodi\n\n*Dept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA*\n\nA. Camero-Arranz\n\n*Fundaci´on Espa˜nola de Ciencia y Tecnolog´ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain*\n\nE. Beklen\n\n*Middle East Technical University (METU), 06531, Ankara, Turkey*\n\nC. A. Wilson-Hodge\n\n*NASA Marshall Space Flight Center, Huntsville, AL 35812*\n\nP. Jenke\n\n*NASA Postdoctoral Program Fellow, NASA Marshall Space Flight Center, Huntsville, AL 35812*\n\nP.N. Bhat, M.S. Briggs, V. Chaplin, V. Connaughton, R. Preece\n\n*University of Alabama in Huntsville, Huntsville, AL 35899*\n\nM.H. Finger\n\n*USRA, National Space Science and Technology Center, Huntsville, AL 35899*\n\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being\n\nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth\n\noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma\n\nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient\n\noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage\n\nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies\n\nbelow *∼* 25 keV and above *∼* 1 *.* 5 MeV. We describe the technique and present preliminary results after the first *∼* 17 months of observations at energies above 100 keV. Seven sources are detected: the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source\n\nXTE J1752-223.\n\n## **I. INTRODUCTION**\n\nThe Gamma ray Burst Monitor (GBM) on Fermi is\n\ncurrently the only instrument in orbit providing nearly\n\ncontinuous full sky coverage in the hard X-ray/low\n\nenergy gamma ray energy range. The Earth occul-\n\ntation technique, used very successfully on BATSE,\n\nhas been adapted to GBM. An initial catalog of 64\n\nsources is currently being monitored and continuously\n\naugmented. At energies above 100 keV, six steady\n\nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E\n\n1740-29, Cen A, GRS 1915+105) and one transient\n\nsource (XTE J1752-223) have been detected in the\n\nfirst year of observation. We describe the instrument,\n\noutline the technique, and present light curves for the\n\nseven sources.\n\n**II. GBM AND THE EARTH OCCULTATION**\n\n**OBSERVATIONAL TECHNIQUE**\n\nThe Gamma ray Burst Monitor is the secondary\n\ninstrument onboard the Fermi satellite [1, 2]. It con-\n\nsists of 12 NaI detectors 5 *<sup>′′</sup>* in diameter by 0.5 *<sup>′′</sup>* thick\n\nmounted on the corners of the spacecraft and oriented\n\nsuch that they view the entire sky not occulted by the Earth. GBM also contains 2 BGO detectors 5 *<sup>′′</sup>* in di- ameter by 5 *<sup>′′</sup>* thick located on opposite sides of the\n\nspacecraft. None of the GBM detectors have direct\n\nimaging capability.\n\nKnown sources of gamma ray emission can be mon-\n\nitored with non-imaging detectors using the Earth oc-\n\ncultation technique, as was successfully demonstrated\n\nwith BATSE [3, 4]. When a source of gamma rays\n\nis occulted by the Earth, the count rate measured by\n\nthe detector will drop, producing a step-like feature.\n\nWhen the source reappears from behind the Earths\n\nlimb, the count rate will increase, producing another\n\nstep. The diameter of the Earth seen from Fermi is\n\n*∼* 140 *<sup>◦</sup>* , so roughly 30% of the sky is occulted by the\n\nEarth at any one time. Coupled with the *±* 35 *<sup>◦</sup>* slew-\n\ning of the pointing direction every orbit, this means\n\nthat the entire sky is occulted every two orbits. With\n\nan altitude of 565 km, a period of 96 minutes, and\n\nan orbital inclination of 26 *.* 5 *<sup>◦</sup>* , individual occultation\n\nsteps last for *∼* 10 seconds (Fig. 1).\n\n**eConf C091122**", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0955.pdf" - }, - { - "text": "[arXiv:1001.0770v1 [astro-ph.HE] 5 Jan 2010](http://arxiv.org/abs/1001.0770v1)\n\n## **VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration *Harvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645,* *USA*\n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is\n\nused to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is\n\ncurrently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration’s Key\n\nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class\n\nof identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which\n\nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE\n\nexposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including\n\n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected\n\nresults are presented.\n\n## **1. Introduction**\n\nActive galactic nuclei are the most numerous class\n\nof identified VHE γ -ray sources. These objects emit\n\nnon-thermal radiation across ∼ 20 orders of magnitude\n\nin energy and rank among the most powerful particle\n\naccelerators in the universe. A small fraction of AGN\n\npossess strong collimated outflows (jets) powered by\n\naccretion onto a supermassive black hole (SMBH).\n\nVHE γ -ray emission can be generated in these jets,\n\nlikely in a compact region very near the SMBH event\n\nhorizon. Blazars, a class of AGN with jets pointed\n\nalong the line-of-sight to the observer, are of par-\n\nticular interest in the VHE regime. Approximately\n\n30 blazars, primarily high-frequency-peaked BL Lacs\n\n(HBL), are identified as sources of VHE γ -rays, and\n\nsome are spectacularly variable on time scales com-\n\nparable to the light crossing time of their SMBH ( ∼ 2\n\nmin; [1]). VHE blazar studies probe the environment\n\nvery near the central SMBH and address a wide range\n\nof physical phenomena, including the accretion and\n\njet-formation processes. These studies also have cos-\n\nmological implications, as VHE blazar data can be\n\nused to strongly constrain primordial radiation fields\n\n(see the extragalactic background light (EBL) con-\n\nstraints from, e.g., [2, 3]).\n\nVHE blazars have double-humped spectral energy\n\ndistributions (SEDs), with one peak at UV/X-ray en-\n\nergies and another at GeV/TeV energies. The ori-\n\ngin of the lower-energy peak is commonly explained\n\nas synchrotron emission from the relativistic electrons\n\nin the blazar jets. The origin of the higher-energy\n\npeak is controversial, but is widely believed to be the\n\nresult of inverse-Compton scattering of seed photons\n\noff the same relativistic electrons. The origin of the\n\nseed photons in these leptonic scenarios could be the\n\nsynchrotron photons themselves, or photons from an\n\nexternal source. Hadronic scenarios are also plausible\n\nexplanations for the VHE emission, but generally are\n\nnot favored.\n\nContemporaneous multi-wavelength (MWL) obser-\n\nvations of VHE blazars, can measure both SED peaks\n\nand are crucial for extracting information from the\n\nobservations of VHE blazars. They are used to con-\n\nstrain the size, magnetic field and Doppler factor of\n\nthe emission region, as well as to determine the origin\n\n(leptonic or hadronic) of the VHE γ -rays. In leptonic\n\nscenarios, such MWL observations are used to mea-\n\nsure the spectrum of high-energy electrons producing\n\nthe emission, as well as to elucidate the nature of the\n\nseed photons. Additionally, an accurate measure of\n\nthe cosmological EBL density requires accurate mod-\n\neling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "eling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m\n\natmospheric-Cherenkov telescopes located in Arizona,\n\nis used to study VHE γ -rays from a variety of astro-\n\nphysical sources [4]. VERITAS began scientific obser-\n\nvations with a partial array in September 2006 and has\n\nroutinely observed with the full array since Septem-\n\nber 2007. The performance metrics of VERITAS in-\n\nclude an energy threshold of ∼ 100 GeV, an energy\n\nresolution of ∼ 15%, an angular resolution of ∼ 0.1 <sup>◦</sup> ,\n\nand a sensitivity yielding a 5 σ detection of a 1% Crab Nebula flux object in < 30 hours <sup>1</sup> . VERITAS has an\n\nactive maintenance program (e.g. frequent mirror re-\n\ncoating and alignment) to ensure its continued high\n\nperformance over time, and an upgrade improving\n\nboth the camera (higher quantum-efficiency PMTs)\n\nand the trigger system has been proposed to the fund-\n\ning agencies.\n\n1 A VERITAS telescope was relocated during Summer 2009,\n\nincreasing the array’s sensitivity by a factor ∼ 1.3.\n\neConf C091122", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "Figure 4: The *γ* -ray index versus submillimeter index plane. The blazars fall more steeply in the *γ* -rays than in the\n\nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full *SMA* sample,\n\nwhere the blazars are more distributed around *α* S *∼* 0.\n\nas the presence of SSC versus ERC. Here, we use sub-\n\nmillimeter luminosity as a proxy for jet power, which\n\nis correlated with the integrated luminosity of the syn-\n\nchrotron component. Elevated *γ* -ray luminosity with\n\nrespect to the synchrotron component (which is often\n\nseen in FSRQs) suggests the upscattering of external\n\nphotons off the synchrotron-emitting electrons. These\n\nobjects should occupy the upper right of the ratio/jet\n\npower plot, and BL Lacs, which generally exhibit com-\n\nponents with roughly comparable luminosities, should\n\noccupy the lower left. It is clear from the figure, how-\n\never, that many FSRQs exhibit ratios similar to those\n\nof the BL Lacs and vis versa.\n\nSikora et al. [10] report that, during its flaring\n\nepochs, 3C 454.3 transitions from its typical FSRQ\n\nstate to a more BL Lac-like state, where the syn-\n\nchrotron component emits much more strongly com-\n\npared to the *γ* -ray component than during its “low\n\nstate”. 3C 454.3, which is the highest submillime-\n\nter luminosity FSRQ in our sample, would then shift\n\ndown and to the right in Figure 5 when it enters a\n\nflaring period. For the first three months of the *Fermi*\n\nmission, 3C 454.3 was not flaring, which may explain\n\nits present location in Figure 5. The three objects for\n\nwhich there is a type discrepancy between CGRaBS\n\nand LBAS are all FSRQs (in CGRaBS) and exhibit\n\nlow luminosity ratios and high luminosity, which sug-\n\ngest they may be undergoing the same changes as 3C\n\n454.3. A possible interpretation of the elevated lumi-\n\nnosity ratios observed in some BL Lacs objects is that\n\nthere has been a dramatic increase in *γ* -ray luminos-\n\nity due to ERC, which would not be reflected in the\n\nsynchrotron component.\n\n## **5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub-\n\nmillimeter is to study behavior close to the central\n\nengine, where the jet material is presumably still be-\n\ning accelerated. The separate emission processes that\n\ncontribute to overall SED may present differently in\n\nBL Lacs and FSRQs, allowing us to understand the\n\nsimilarities and differences between blazar types. We\n\nhave investigated these differences between objects in\n\nterms of submillimeter behavior and, in conclusion,\n\nfind that\n\n*-* The *SMA* blazars exhibit submillimeter energy spectral indexes that follow the spectral se-\n\nquence interpretation of blazars.\n\n**eConf C091122**", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "and typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the\n\narray are compiled in a database known as the *SMA* Calibrator List <sup>2</sup> [5]. Essentially a collection of bright\n\nobjects (stronger than 750 mJy at 230 GHz and 1 Jy\n\nat 345 GHz), these sources are monitored regularly,\n\nboth during science observations and dedicated ob-\n\nserving tracks.\n\nTo select our sample, we identified objects in the\n\ncalibrator list that were also classified as BL Lacs or\n\nFSRQs by the Candidate Gamma-Ray Blazar Sur-\n\nvey [6, CGRaBS]. Of the 243 total objects in the\n\ncalibrator list, 171 (35 BL Lacs and 136 FSRQs)\n\nhave positive blazar class identifications, although\n\nthere are three sources (J0238+166, J0428-379, and\n\n1 The Submillimeter Array is a joint project between the\n\nSmithsonian Astrophysical Observatory and the Academia\n\nSinica Institute of Astronomy and Astrophysics and is funded\n\nby the Smithsonian Institution and the Academia Sinica.\n\n2 http://sma1.sma.hawaii.edu/callist/callist.html\n\n**eConf C091122**\n\narXiv:1001.0806v1 [astro-ph.HE] 6 Jan 2010 Figure 1: The *SMA* light curves for 3C 454.3. The open", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "blazars are observed on the rising part of the syn-\n\nchrotron component (at lower energies than the peak),\n\nall of the objects have very steeply falling *γ* -ray energy\n\nspectral indexes, putting the *γ* -ray peak at lower en-\n\nergies than the observed *Fermi* band. Knowing that\n\nwe are not observing the synchrotron and *γ* -ray com-\n\nponents at analagous points in the spectrum may al-\n\nlow us to better understand the magnetic field in the\n\nparsec-scale jet region and the population of external\n\nphotons that is being upscattered to *γ* -rays.\n\nIn Figure 5, the ratio between *L* *γ* and *νL* *ν,* 1mm re-\n\nflects the division between BL Lacs and FSRQs as well\n\n**eConf C091122**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0806.pdf" - }, - { - "text": "**Submillimeter Variability and the Gamma-ray Connection in** * **Fermi** *\n\n**Blazars**\n\nA. Strom *Univ. of Arizona, AZ 85721, USA*\n\nA. Siemiginowska, M. Gurwell, B. Kelly *CfA, MA 02138, USA*\n\nWe present multi-epoch observations from the *Submillimeter Array* ( *SMA* ) for a sample of 171 bright blazars,\n\n43 of which were detected by *Fermi* during the first three months of observations. We explore the correlation\n\nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special\n\nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de-\n\ntermined using a combination of *Fermi* designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS),\n\nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate\n\nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands\n\nduring the months August- October 2008. The submillimeter light curves are modeled as first-order continuous\n\nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ-\n\nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity.\n\nAll of the the light curves are consistent with being produced by a single process that accounts for both low\n\nand high states, and there is additional evidence that objects may be transitioning between blazar class during\n\nflaring epochs.\n\n## **1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring\n\nevents occur in blazars indicate that much of the en-\n\nergy is being produced deep within the jet on small,\n\nsub-parsec scales [1, 2]. Understanding if/how emis-\n\nsion differs between blazar subclasses (i.e., BL Lacs\n\nobjects and flat-spectrum radio quasars (FSRQs))\n\nmay offer important insight into the similarity be-\n\ntween blazars and, furthermore, can provide con-\n\nstraints on the formation and acceleration of the jets\n\nthemselves.\n\nFor the synchrotron component of blazar spectra,\n\nthe low-frequency spectral break due to synchrotron\n\nself-absorption moves to higher frequencies as one\n\nmeasures closer to the base of the jet [2]. This of-\n\nten places the peak of the spectrum in the millime-\n\nter and submillimeter bands, where the emission is\n\noptically-thin and originates on parsec and sub-parsec\n\nscales [3], allowing direct observation of the most com-\n\npact regions near the central engine. The high en-\n\nergy *γ* -ray emission originates as a Compton process,\n\ntypically a combination of synchrotron-self-Compton\n\n(SSC) and external-radiation-Compton (ERC). De-\n\npending on the source properties, the synchrotron\n\nphotons or external photons are upscattered by the\n\nsame population of electrons that emit the millimeter\n\nand submillimeter spectra. Therefore the submillime-\n\nter and *γ* -ray emission are closely linked and give the\n\nfull information about the source emission.\n\nA systematic study of the submillimeter properties\n\nof the entire sample of *Fermi* blazars has yet to be con-\n\nducted and is one of the primary goals of our work. We\n\npresent here preliminary analysis of the submillimeter\n\nproperties of *Fermi* blazars detected by the *Submil-*\n\n*limeter Array* <sup>1</sup> ( *SMA* ) at 1mm and 850 *µ* m, including\n\nan investigation of variable behavior and the deter-\n\nmination of submillimeter energy spectral indices. In\n\naddition, we consider the connection to the observed\n\n*γ* -ray indices and luminosities.\n\n## **2.** * **SMA** * **BLAZARS**\n\nThe *Submillimeter Array* [4] consists of eight 6 m\n\nantennas located near the summit of Mauna Kea. The\n\n*SMA* is used in a variety of baseline configurations\n\nand typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "gets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included\n\nthe first VHE-detected IBL, W Comae [14, 15], and\n\nthe HBL 1ES 0806+524 [16]. VERITAS has discov-\n\nered 6 VHE blazars since the launch of Fermi. Three\n\nof these were initially observed by VERITAS prior to\n\nthe release of Fermi-LAT results, due to the X-ray\n\nbrightness of the synchrotron peaks of their SEDs.\n\nVHE emission from 3C 66A was discovered by VER-\n\nITAS in September 2008 [17] during a flaring episode\n\nthat was also observed by the Fermi-LAT [18]. The\n\nobserved flux above 200 GeV was 6% of the Crab Neb-\n\nula flux and the measured VHE spectrum was very\n\nsoft (Γ VHE ∼ 4 . 1). RGB J0710+591 was detected\n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified\n\nJulian days.\n\nto observe these breaks, GBM is able to see significant\n\nemission above 300 keV, consistent with the canonical\n\nhard spectrum.\n\n**Cen A** (Fig. 3) is a Sy 2 galaxy that is the brightest\n\nAGN in hard x-rays/low energy gamma rays. It has\n\na hard spectrum (Γ = 1 *.* 8) and has been observed at\n\nenergies *>* 1 MeV [9]. The GBM results are consis-\n\ntent with this hard spectrum, though GBM does not\n\nhave the sensitivity to determine if the hard spectrum\n\ncontinues beyond 300 keV or if the spectrum cuts off.\n\n**Cyg X-1** (Fig. 4) is a HMXB and one of the\n\nfirst systems determined to contain a black hole. It\n\nhas been observed to emit significant emission above\n\n100 keV including a power law tail extending out to\n\ngreater than 1 MeV [10, 11]. The GBM results show\n\nsignificant emission above 300 keV, consistent with\n\nthe power law tail observed when Cyg X-1 is in its\n\nhard state.\n\n**GRS 1915+105** (Fig. 5) is a LMXB with the com-\n\npact object being a massive black hole. Evidence for\n\nemission above 100 keV has been seen previously [12]\n\nwith BATSE. The GBM light curve integrated over\n\n490 days shows significant emission above 100 keV.\n\n**1E 1740-29** (Fig. 6) is a LMXB very near the\n\nGalactic Center. It is a microquasar, and spends most\n\nof its time in the low/hard state. Integral observa-\n\ntions indicate the presence of a power law tail above\n\n200 keV [13]. The present GBM results are consis-\n\ntent with this high energy emission. In the future, we\n\nFIG. 4: Cyg X-1 light curve. Horizontal scale is in modi-\n\nfied Julian days.\n\nFIG. 5: GRS 1915+105 light curve. Horizontal scale is in\n\nmodified Julian days.\n\n**eConf C091122**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0955.pdf" - }, - { - "text": "Figure 5: Ratio of *γ* -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this\n\nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower\n\nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n\n*-* BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter vari-\n\nability or characteristic timescale, but our sam-\n\nple of BL Lacs may be dominated by high-\n\npeaked BL Lacs (HBLs), which exhibit obser-\n\nvational similarities with FSRQs.\n\n*-* Blazar submillimeter light curves are consistent with being produced by a single process that ac-\n\ncounts for both high and low states, with char-\n\nacteristic timescales 10 *< τ* rest *<* 500 days.\n\n*-* The blazars detected by *Fermi* have synchrotron peaks at higher frequencies, regardless of sub-\n\nmillimeter luminosity.\n\n*-* FSRQs exhibit higher ratios of *γ* -ray to sub- millimeter luminosity than BL Lacs (Figure 5),\n\nbut all objects inhabit a region of parameter\n\nspace suggesting transitions between states dur-\n\ning flaring epochs.\n\nAs *Fermi* continues to observe fainter sources, the\n\nsample of objects for which we can perform this type of\n\nanalysis will increase and provide better limits on our\n\nresults. To understand the physical relevance of these\n\nresults, however, it is important to be able to distin-\n\nguish between the difference in variability between BL\n\nLacs and FSRQs. One avenue for exploring this dif-\n\nference is to monitor changing submillimeter energy\n\nspectral index and the ratio of *γ* -ray to submillime-\n\nter luminosity as functions of time. The full mean-\n\ning of the results of our autoregressive method is not\n\nyet clear, and will require better-sampled blazar light\n\ncurves and the comparison between *τ* rest with physical\n\ntimescales such as the synchrotron cooling timescale.\n\nThese analyses would allow us to place constraints\n\non the processes occurring near the base of the jet in\n\nblazars and further understand the intimate connec-\n\ntion between them.\n\n## **Acknowledgments**\n\nThis work was supported in part by the NSF\n\nREU and DoD ASSURE programs under Grant no.\n\n0754568 and by the Smithsonian Institution. Par-\n\ntial support was also provided by NASA contract\n\nNAS8-39073 and NASA grant NNX07AQ55G. We\n\nhave made use of the SIMBAD database, operated at\n\nCDS, Strasbourg, France, and the NASA/IPAC Ex-\n\ntragalactic Database (NED) which is operated by the\n\nJPL, Caltech, under contract with NASA.\n\n**eConf C091122**", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed3.pdf", - "query": "When in present-day Poland did the first shift away from earlier ancestry occur?", - "target_page": 3, - "target_passage": "in the Middle to Late Bronze Age (1500 bce to 1000 bce), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "in this period is relatively well captured.\n\n### **Expansions of Scandinavian-like ancestry**\n\nWe assembled time transects using available aDNA data across several\n\ngeographical regions in Europe, and infer their ancestry using a model\n\nwith the EIA or Roman Iron Age sources previously defined (shown in\n\nFig. 2a). Our modelling provides direct evidence of individuals with\n\nancestry originating in northern Germany or Scandinavia appearing\n\nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup-\n\nplementary Table 3).\n\nIn the region of present-day Poland, our analysis suggests several\n\nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce\n\nto 1000 bce), we observe a clear shift away from preceding ancestry\n\noriginally associated with Corded Ware cultures <sup>55</sup> (Fig. 3a). Second,\n\nin the first to fifth century ce, individuals associated with Wielbark\n\nculture <sup>5,12</sup> show an additional strong shift away from the preceding\n\nBronze Age groups, and can only be modelled with a >75% component\n\nattributed to the EIA Scandinavian Peninsula. Multiple individuals,\n\nespecially from earlier Wielbark cemeteries, have approximately 100%", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed3.pdf" - }, - { - "text": "**122** | Nature | Vol 637 | 2 January 2025\n\nmedieval individuals ( *P* ≪ 1 × 10 <sup>−32</sup> ). Instead, the majority of individuals\n\nfrom medieval Poland can be modelled only as a mixture of ancestries\n\nrelated to Roman Iron Age Lithuania, which is similar to ancestries of\n\nindividuals from middle to late Bronze Age Poland (44%, 95% confidence\n\ninterval 36- 51%), an ancestry component related to Hungarian Scyth-\n\nians or Slovakian La Tène individuals (49%, 95% confidence interval\n\n41- 57%) and potentially a minority component of ancestry related to\n\nSarmatians from the Caucasus ( *P* = 0.13) (Fig. 2c). Four out of twelve\n\nindividuals from medieval Poland, three of whom are from the late\n\nViking Age <sup>6</sup> , carried detectable Scandinavian-related ancestry. Some\n\nof the ancestry detected in individuals from later medieval Poland may\n\nhave persisted during the late first millennium ce in the cremating\n\nportion of the population, but regardless, this points to large-scale\n\nancestry transformation in medieval Poland (Fig. 3a). Future data could\n\nshed light on the extent to which this reflects the influence of groups\n\nspeaking Slavic languages in the region.\n\nIn present-day Slovakia, individuals associated with the Iron\n\nAge La Tène period appear close to Hungarian Scythians in the two\n\ndimensions of our MDS analysis, and are modelled as a mixture of\n\ncentral and eastern European ancestry. However, a first-century ce\n\nburial of a 50- 60-year-old woman from Zohor is modelled only with\n\nScandinavian-related ancestry, providing evidence of ancestry related\n\nto the Scandinavian EIA appearing southwest of the range of the Wiel-\n\nbark archaeological complex <sup>5,57</sup> (Fig. 3b). Later early medieval individu-\n\nals from Slovakia have partial Scandinavian-related ancestry, providing\n\nevidence for the integration between expanding and local groups.\n\nNearby, in present-day Hungary, we observe Scandinavian-related\n\nancestry components in several burials dating to the sixth century\n\nce associated with Longobards (Longobard_earlyMED(I)) <sup>10</sup> (Fig. 2c).\n\nThis is consistent with the original study <sup>10</sup> , which reported affinity to\n\npresent-day groups from northwestern Europe (GBR, CEU and FIN in\n\nthe 1000 Genomes Project (1000GP)) <sup>10</sup> but which we can resolve with\n\n3000 BCE 2000 BCE 1000 BCE 1000 CE 2000 CE\n\nScandinavia\n\nSouthern Europe\n\nBritain\n\nCentral\n\nEurope\n\nEastern Europe\n\nBA\n\nItaly\n\nCentral Europe\n\n3000 BCE 2000 BCE\n\nEBA\n\n1000 BCE\n\nTime\n\n0 1000 CE 2000 CE\n\nMLBA Wielbark Middle Ages\n\nLate Roman/Ottoman\n\nEarly Medieval\n\nBaiuvarii\n\nMedieval/present day\n\nEarly Medieval/Longobard Iron Roman\n\nPresent day\n\nPresent day BA/Scythian\n\nBell Beaker/EBA\n\nZohor\n\nSoutheastern Europe\n\nPoland\n\nBritain and Ireland\n\nScandinavia\n\n**e**\n\n**f**\n\n**d**\n\n**c**\n\n**b**\n\n**a**\n\nIron Roman\n\nIron/Republic Imperial Late Antiquity (Early) Medieval\n\nEarly Medieval\n\nPresent day\n\nPresent day Medieval Iron Roman BA\n\nBA EIA Viking Age Medieval Present day\n\nDriffeld\n\nTerrace\n\nTarquinia\n\nLate Etruscan\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n2000 BCE 0\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n### **Fig. 3 | Time transects across six geographical regions in Europe.**\n\n**a** - **f** , Ancestry change visualized over a time transect spanning from the Bronze\n\nAge to the present day in Poland ( **a** ), southeastern Europe ( **b** ), central Europe\n\n( **c** ), Italy ( **d** ), Britain and Ireland ( **e** ) and Scandinavia ( **f** ). The maps show sample\n\nlocations of all available ancient genomes with at least 0.5× coverage from\n\nthese regions (Supplementary Table 1). Their ancestry is shown on the same\n\nMDS model as in Fig. 2a for each time period. For each geographic region,\n\nthe early medieval period is highlighted in orange and the area in the MDS", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" - }, - { - "text": "Nature | Vol 637 | 2 January 2025 | **123**\n\nhigher resolution using earlier genomes. Several other individuals from\n\nthese Longobard burials (Longobard_earlyMED(II)) show no detectable\n\nancestry from northern Europe and, instead, are more closely related to\n\nIron Age groups in continental central Europe, putatively representing\n\ndescendants of local people buried in a Longobard style. Our results are\n\nconsistent with attestations that the Longobards originated in the areas\n\nof present-day northern Germany or Denmark, but that by the sixth\n\ncentury ce they incorporated multiple different cultural identities, and\n\nmixed ancestries. Present-day populations of Hungary do not appear\n\nto derive detectable ancestry from early medieval individuals from\n\nLongobard contexts, and are instead more similar to Scythian-related\n\nancestry sources (Extended Data Fig. 6), consistent with the later impact\n\nof Avars, Magyars and other eastern groups <sup>58</sup> .\n\nIn southern Germany, the genetic ancestry of individuals from\n\nearly medieval Bavaria probably associated with the historical\n\nGermanic-language-speaking Baiuvarii <sup>59</sup> cannot be modelled as deriv-\n\ning ancestry solely from earlier groups in Iron Age central Germany\n\n( *P* ≪ 1 × 10 <sup>−36</sup> ). The Baiuvarii probably appeared in the region in the\n\nfifth century ce <sup>59</sup> , but their origins remain unresolved. Our current\n\nbest model indicates a mixture with ancestry derived from EIA Pen-\n\ninsular Scandinavia and central Europe, suggesting an expansion of\n\nScandinavian-related ancestry producing a regional ancestry shift\n\n(Figs. 2c and 3c).\n\nIn Italy, southward expansions of northern and central European ances-\n\ntries appear by the Late Antiquity (approximately fourth century ce),\n\nwhere a clear diversification of ancestry can be observed compared\n\nwith preceding time periods (Fig. 3d). However, no individuals with\n\nnear 100% Scandinavian ancestry can be observed in the sampling\n\ndata available so far.\n\nIn Britain, the ancestries of Iron Age and Roman individuals form a\n\ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available\n\npreceding Bronze Age individuals from Ireland and Orkney, and adja-\n\ncent to, but distinct from, available individuals in Iron Age and Roman\n\ncentral Europe. However, two first- to second-century ce burials from a\n\nRoman military fortress site in Austria (Klosterneuburg) <sup>5</sup> carry ancestry\n\nthat is currently indistinguishable from Iron Age or Roman popula-\n\ntions of Britain, to the exclusion of other groups (qpWave cladality\n\n*P* = 0.11). One option is that they had ancestry from Britain; alternatively,\n\ncurrently unsampled populations from western continental Europe\n\ncarried ancestries similar to Iron Age southern Britain.\n\nTwigstats substantially improves models of admixture between\n\nancestries from Iron Age Britain and northern Europe in early medi-\n\neval England <sup>9</sup> , halving standard errors from 9% with SNPs to 4% when\n\nusing time stratification (point estimates 80% and 79% Iron Age\n\nBritain-related ancestry, respectively). We used this improved reso-\n\nlution to demonstrate that an earlier Roman individual (6DT3) dating\n\nto approximately second to fourth century ce from the purported\n\ngladiator or military cemetery at Driffield Terrace in York (Roman\n\n*Eboracum* ), England <sup>60</sup> , who was previously identified as an ancestry\n\noutlier <sup>61,62</sup> , specifically carried approximately 25% EIA Scandinavian\n\nPeninsula-related ancestry (Fig. 2c). This documents that people with\n\nScandinavian-related ancestry already were in Britain before the fifth\n\ncentury ce, after which there was a substantial influx associated with\n\nAnglo-Saxon migrations <sup>9</sup> . Although it is uncertain whether this indi-\n\nvidual was a gladiator or soldier, individuals and groups from northern\n\nEurope are indeed recorded in Roman sources both as soldiers and as\n\nenslaved gladiators <sup>63,64</sup> .", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "**Figure 11: Number of recent (within two years) OCU initiates presenting to treatment in 2005 and 2013, by age of individual at first presentation.**\n\nThe mode age of initiation has shifted from around 18 to around 25 and there is an older age profile throughout. Rises in average age of initiation have also been reported recently in cohorts of Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible explanations.\n\n- There is a genuine shift towards new initiates being older, and for them to present to treatment much faster than in previous years.\n\n- There is a consistent, but small number of individuals who mis-report their age of onset when attending treatment i.e. who report that they have only been using opiates/crack for a short period when in fact they have been using for a far longer period, and that this is starting to really bias the numbers for recent cohorts because attendees from the original epidemic are becoming smaller.\n\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of older initiates, although mis-reporting may also explain that phenomenon. Either way though, as this analysis has made clear throughout, absolute numbers of new OCUs appear to be small - probably fewer than 10,000 per annum and the numbers of those involved with crime will be smaller still. In addition, despite a flattening in the probable trend in new users, there is currently no sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to resume, though clearly it remains important to monitor the situation.", - "page_start": 28, - "page_end": 28, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Table 5: Physical health risks, Sectors and exposures - EWCS 2015**\n\nCountry colours: Romania aquamarine, Poland orange, Hungary blue.\n\nThe figure below illustrates country differences, based on data from the EWCS 2015: the values of\n\nIreland (green), the EU28 level (blue) with numbers, and the values of Poland (orange). Poland had a\n\nrelatively high share of employment in industry of 24%, for which Ireland has a share of 12%. The impact\n\non working conditions can be seen in the share of workers reporting exposures to vibrations (Poland\n\n27%, Ireland 16%) and loud noise (Poland 35%, Ireland 25%).\n\n**Figure 17: Physical health risks compared (%) - EWCS 2015**", - "page_start": 41, - "page_end": 41, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Nature | Vol 637 | 2 January 2025 | **125**\n\n(including one with ancestry related to Britain) are part of the majority\n\nstrontium values, consistent with them having grown up locally. By\n\ncontrast, the six most clearly non-local individuals based on the sta-\n\nble isotopes all have 50% or more EIA Scandinavian Peninsula-related\n\nancestry, although three individuals with wholly EIA Scandinavian\n\nPeninsula-related ancestry also had local values. This suggests that\n\nthe presence of central European-related ancestry was not a transient\n\nphenomenon, but an ancestry shift that occurred at some point after\n\nabout 500 ce, the period to which individuals from the massacre site\n\nat Sandby Borg ringfort on Öland were dated; these individuals all have\n\nstrictly EIA Scandinavian-related ancestry. Indeed, one hypothesis is\n\nthat the massacre at Sandby Borg could represent conflict associated\n\nwith movements of people that contributed to later ancestry change,\n\nalthough other scenarios are possible and further synthesis of biomo-\n\nlecular and archaeological data is necessary to test this hypothesis.\n\n### **Viking Age mobility into Scandinavia**\n\nPrevious studies had suggested a major influx of ancestry related to\n\nBritain into Viking Age Scandinavia <sup>6,7</sup> . Although we detect this ances-\n\ntry in some individuals (7 individuals in Norway, 14 in Denmark and\n\n14 in Sweden), including some individuals whose ancestry appears to\n\nbe entirely derived from Iron Age Britain, its overall impact appears\n\nreduced compared with previous reports. Our analysis indicates a pro-\n\nportionally larger impact of ancestry from Iron Age Britain in northern\n\nNorway, with southern Scandinavia predominantly influenced by\n\ncontinental central European ancestries (Fig. 4d). We hypothesize\n\nthat our estimates of ancestry from Britain are reduced relative to\n\nprevious studies because ancestry related to Britain and continen-\n\ntal central Europe may have been indistinguishable. This could be\n\ndue to a lack of statistical power to distinguish these closely related\n\nsources with standard methods, as well as through potential biases\n\nintroduced by using modern surrogate populations that have since\n\nbeen influenced by later gene flow (such as gene flow into Britain).\n\nWe illustrate this by replicating the analyses previously described <sup>6,7</sup>\n\n(Extended Data Fig. 8).\n\nSimilarly, a previous study has suggested that individuals at sites such\n\nas Kärda in southern Sweden carried ancestry from southern Europe <sup>6</sup> .\n\nIn our models, two Kärda individuals fit with central European-related\n\nancestry, but none of the individuals has a substantial proportion of\n\nancestry related to southern European sources (Extended Data Fig. 9).\n\nInstead, we detect ancestry from southern European sources in only\n\nthree individuals from Scandinavia, and in relatively small propor-\n\ntions (Fig. 4a).\n\nInterestingly, we detect ancestry from Bronze and Iron Age sources\n\nfrom Eastern Europe (present-day Lithuania and Poland), concentrated\n\nin southeastern parts of Sweden, particularly the island of Gotland\n\n(14 individuals; Fig. 4a). This is consistent with previous genetic\n\nstudies <sup>6,7</sup> . We find that this ancestry is enriched in male individuals\n\n(Extended Data Fig. 7d), suggesting male-biased mobility and/or burial.\n\nThe closest match tends to be Roman Iron Age Lithuanian genomes\n\nassociated with Balts, which would be consistent with mobility across\n\nthe Baltic Sea, but we caution that the geographical representation of\n\navailable genomes is still limited.\n\n### **Viking Age expansion from Scandinavia**\n\nTraditionally, historical perspectives on what is now often referred\n\nto as the Viking diaspora placed an emphasis on the movements and\n\nsettlements of population groups from various parts of Scandinavia <sup>67</sup> .\n\nOur explorative MDS analysis again indicates mixed ancestries related\n\nto the Scandinavian EIA, with regional differences that point to varied", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "vidual was a gladiator or soldier, individuals and groups from northern\n\nEurope are indeed recorded in Roman sources both as soldiers and as\n\nenslaved gladiators <sup>63,64</sup> .\n\nAcross Europe, we see regional differences in the southeastern and\n\nsouthwestern expansions of Scandinavian-related ancestries. Early\n\nmedieval groups from present-day Poland and Slovakia carry spe-\n\ncific ancestry from one of the Scandinavian EIA groups—the one with\n\nindividuals primarily from the northern parts of Scandinavia in the\n\nEIA—with no evidence of ancestry related to the other primary group\n\nin more southern Scandinavia (Fig. 2d). By contrast, in southern and\n\nwestern Europe, Scandinavian-related ancestry either derives from\n\nEIA southern Scandinavia—as in the cases of the probable Baiuvarii\n\nin Germany, Longobard-associated burials in Italy and early medieval\n\nburials in southern Britain—or cannot be resolved to a specific region\n\nin Scandinavia. If these expansions are indeed linked to language, this\n\npattern is remarkably concordant with the main branches of Germanic\n\nlanguages, with the now-extinct eastern Germanic spoken by Goths in\n\nUkraine on the one hand, and western Germanic languages such as Old\n\nEnglish and Old High German recorded in the early medieval period\n\non the other hand.\n\n### **Influx into pre-Viking Age Scandinavia**\n\nIn EIA Scandinavia (<500 ce), we find evidence for broad genetic homo-\n\ngeneity. Specifically, individuals from Denmark (100 ce- 300 ce) were\n\nindistinguishable from contemporary people in the Scandinavian Pen-\n\ninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry\n\nalready in the eighth century ce (Late Iron Age/early Viking Age) on\n\nZealand (present-day Denmark) for which a 100% EIA ancestry model\n\nis rejected ( *P* = 1 × 10 <sup>−17</sup> using Twigstats; *P* = 7.5 × 10 <sup>−4</sup> without). This\n\nshift in ancestry persists among later Viking Age groups in Denmark,\n\nwhere all groups are modelled with varying proportions of ancestry\n\nrelated to Iron Age continental groups in central Europe (Figs. 3f\n\nand 4c). A non-parametric MDS of Viking Age individuals suggests\n\nthat variation between individuals forms a cline spanning from the\n\nEIA Scandinavian Peninsula individuals to ancestry characteristic of\n\ncentral Europe (Fig. 4e). The observed shift in ancestry in Denmark\n\ncannot be confounded by potentially earlier unknown gene flow into\n\nIron Age source groups in Austria, France and Germany, but such gene\n\nflow could affect the exact ancestry proportions.\n\nThese patterns are consistent with northward expansion of ancestry,\n\npotentially starting before the Viking Age, into the Jutland peninsula\n\nand Zealand island towards southern Sweden. The geographical ori-\n\ngin of this ancestry is currently difficult to discern, as the available\n\nsamples from Iron Age central Europe remain sparse. The timing\n\nof this expansion is constrained only by the samples available: this\n\nancestry is not observed in individuals from the Copenhagen area of\n\nDenmark (around 100 ce- 300 ce) <sup>6</sup> , an individual from the southern tip\n\nof Sweden (around 500 ce) <sup>16</sup> , individuals from the Sandby Borg mas-\n\nsacre site on Öland in present-day Sweden (around 500 ce) <sup>7</sup> and 31 indi-\n\nviduals from the mid-eighth century Salme ship burials in present-day\n\nEstonia (Extended Data Fig. 9), who probably originated in central\n\nSweden <sup>6</sup> . Therefore, this ancestry transformation most likely post-\n\ndated these individuals in each particular region and mostly occurred\n\nin the second half of the first millennium ce.\n\nTo assess the full extent of the impact of this ancestry influx into\n\nScandinavia, we next aimed to understand the ancestry of individu-\n\nals in Scandinavia during the Viking Age. Previous studies have sug-\n\ngested that there was a diversity of ancestries in Scandinavia during this\n\nperiod <sup>6,7,65</sup> , due to increased maritime mobility, but have not reported", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "individuals form a clade with respect to reference groups. The reason\n\nwhy this is a principled approach despite the 1000GP groups post-dating\n\nthe ancient individuals is that if a group of ancient individuals are truly\n\nhomogeneous, they will be so also with respect to later individuals.\n\nWe then define clusters by running UPGMA (unweighted pair group\n\nmethod with arithmetic mean) on −log 10 [ *P* values] obtained from\n\nqpwave between all pairs of individuals and cut the resulting dendro-\n\ngram at a height corresponding to a *P* value of 0.01. We then further\n\nsubdivide clusters by requiring all samples to be within 500 years of\n\nthe mean cluster age.\n\nTo choose the source groups shown in Fig. 2a and Extended Data\n\nFig. 1d, we run this algorithm on samples from Iron and Roman Age\n\nEurope (Supplementary Table 1). We retain groups that have at least\n\nthree individuals and, therefore, exclude clusters of size one or two.\n\nThis approach results in two clusters in the Scandinavian Penin-\n\nsula, approximately separating northern from southern Scandinavia,\n\nthree clusters in Poland and Ukraine that separate samples tempo-\n\nrally between the early and later Bronze Age, a cluster combining the\n\nHungarian Scythian and Slovakian La Tène-associated individuals,\n\nand a cluster each for Iron and Roman Age Portugal, Italy and Lithu-\n\nania. In present-day Austria, Germany and France, this approach\n\nidentifies three clusters, with each cluster spanning multiple archae-\n\nological sites in different countries, indicating genetic diversity in\n\nthis region in the first millennium ce. Encouragingly, these clusters\n\nseparate in our non-parametric MDS analysis (Fig. 2a), indicating that\n\nwe are capturing real genetic differences between groups using this\n\napproach.\n\n**Fine-scale structure in Neolithic Europe.** To quantify fine-scale struc-\n\nture in Neolithic Europe (Extended Data Fig. 5b), we aimed to select\n\nindividuals in Neolithic Europe who have not yet been affected by the\n\narrival of Steppe ancestry and do not show excess hunter-gatherer\n\nancestry. We infer distal ancestry sources using Balkan_N, Yamnaya and\n\nWestern Hunter-gatherers as source groups and reference groups\n\naccording to a previously proposed qpAdm setup <sup>46</sup> (Supplementary\n\nTable 1). For this analysis, we infer ancestry using qpAdm applied to\n\n1.2 million SNP sites of imputed genomes. We retain only Neolithic\n\nindividuals with *P* > 0.01, *z* < 2 for Yamnaya ancestry, and *z* < 2 or\n\nproportion <0.25 for Western Hunter-gatherer ancestry.\n\n**Reporting summary**\n\nFurther information on research design is available in the Nature Port-\n\nfolio Reporting Summary linked to this article.\n\n**Data availability**\n\nAll aDNA data used in this study were publicly available, and accession\n\ncodes are listed in Supplementary Table 1.\n\n**Code availability**\n\nTwigstats is freely available under an MIT licence through GitHub\n\n[(https://github.com/leospeidel/twigstats), and detailed documenta-](https://github.com/leospeidel/twigstats)\n\n[tion, as well as example data, is available at https://leospeidel.github.](https://leospeidel.github.io/twigstats/)\n\n[io/twigstats/. The code has also been deposited at Zenodo (https://](https://zenodo.org/records/13833120)\n\n[zenodo.org/records/13833120)](https://zenodo.org/records/13833120) <sup>76</sup> . All scripts to reproduce simulations,\n\nand to run Relate on imputed ancient genomes, and downstream\n\nanalyses, including computation of *f* -statistics and running qpAdm\n\n[models, are available through GitHub (https://github.com/leospeidel/ ](https://github.com/leospeidel/twigstats_paper)\n\n[twigstats_paper).](https://github.com/leospeidel/twigstats_paper)\n\n70. Maier, R., Flegontov, P., Flegontova, O., Changmai, P. & Reich, D. On the limits of fitting\n\ncomplex models of population history to *f* -statistics. *eLife* **12** , e85492 (2023).\n\n71. Kelleher, J., Etheridge, A. M. & McVean, G. Efficient coalescent simulation and", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed3.pdf" - }, - { - "text": "The analysis showed that of the 149 Drug Action Team areas in England, 72 per cent had decreases in new OCU treatment numbers in the year to September 2014 compared to the previous year. Furthermore, of the 42 areas showing an increase, only 11 also showed a rise for the 12 months to September 2010 compared with the 12 months to September 2014, and most of these involved small numbers of individuals.\n\nOverall then, the very recent data on treatment presentations do not currently suggest that the number of new OCUs is on the verge of increasing, merely that it flattened for a period.\n\nA number of factors could explain the flattening. Most importantly, if there was some sort of shock that caused a one-off reduction in the lag-time to treatment this could make it appear as if incidence was rising when in fact new users may be falling but a greater percentage may simply be turning up to treatment faster. Such a shock may have occurred given the reduction in heroin supply seen from the end of 2010 through to 2012 (see Ahmad *et al* ,. 2016). If users unable to obtain heroin used this enforced abstinence as a spur to seek treatment and hence to present to treatment services earlier than they otherwise would have done, this could cause a one-off\n\n‘concertina effect’ in which treatment numbers initially flatten or even rise but then fall again. This would also explain why the downward trend has apparently resumed: evidence suggests the reduction in supply has also ended.\n\nHowever, further analysis revealed some other possibilities based on the characteristics of those attending opiate/crack treatment for the first time in recent years. The Appendix includes a series of graphs with age-of-onset distributions for those who first attended treatment in 2013, and then 2012, and so on back to 2004. These show that the majority of those who presented to treatment in 2004 initiated use in the mid-1990s in line with the likely peak of the epidemic. But by 2012 a far greater number of individuals presenting to treatment say they started using opiates/crack only a year or two before. <sup>23</sup> In other words, there appears to be a shift towards a shorter lag between initiation and treatment. This shift looks even more dramatic when using proportions rather than absolute numbers, see the Appendix.\n\nFurthermore, these individuals (those who seem to have both initiated recently *and* presented to treatment within a year or two of initiation) show a notably different age-of-initiation profile compared to the established profile in the literature, which peaks around 18- 22 (Donmall & Jones, 2005). These individuals have a notably older age profile: see figure 11 chart, which compares recent initiates who presented to treatment in 2005 with recent initiates who presented to treatment in 2013.\n\n23 This shift does not appear to be related to the reduction in heroin supply occurring around 2010/11. As Appendix 1 demonstrates, the pattern emerges far earlier.", - "page_start": 27, - "page_end": 27, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**10** ensemble mean\n\nIPSL-CM5A-LR GFDL-ESM2M\n\n0 10 20 30 40 50 60 70\n\n% of days\n\nHadGEM2-ES\n\nIPSL-CM5A-MR MIROC-ESM-CHEM ACCESS1-0\n\n**Figure 3.** Simulated changes in the percentage of days with daily temperature above the 90th percentile for 1981- 2010 at 2 ° C\n\nglobal warming, for individual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble,\n\nand the ensemble mean. The labels above each panel identify the driving CMIP5 model (or ensemble mean).\n\nIndices based upon daily precipitation often show more spatial variability in changes\n\nthan the temperature-based indices, and greater differences between ensemble members, but,\n\nnevertheless, some consistent pictures still emerge.\n\nThe number of consecutive dry days is projected to increase over some regions and decrease\n\nin others ( figure 4 ). Southern Africa, the Mediterranean, Australia and northeast South America\n\nare projected to have increased dry spell lengths, while this is projected to decrease in central and\n\neastern Asia. The general pattern of these projections is broadly consistent across the ensemble\n\nmembers. However, the global mean changes vary in sign ( table 5 ), as a result of different\n\nmagnitudes of regional changes dominating in different ensemble members.\n\nPerhaps more surprisingly, projected changes in maximum 5 day rainfall (Rx5day) also vary\n\nin sign both geographically and between models ( figure 5 ). Extreme rainfall might simplistically\n\nbe expected to increase in a warmer climate, and indeed the global mean change is a consistent\n\nincrease in all ensemble members ( table 5 ). Regional Rx5day is projected to increase over many\n\nregions including parts of southeast Asia, southern South America, northern Australia and the\n\neast coast of the USA. However, some regions (particularly, the central Amazon and the northern\n\ncoast of South America) are projected to see a decrease in Rx5day.\n\nLarge increases in Rx5day are simulated in south and southeast Asia in all models, but\n\nwith local details varying. Southeastern South America (broadly southern Brazil and northern\n\nArgentina) also see large increases in Rx5day in all models. All models show only small changes\n\nover central and north Africa, Europe and most of Asia. In northern South America, however,\n\nsome models show increases in Rx5day but others show decreases. This suggests that the\n\nensemble-mean result of a decrease in Rx5day in this area may be subject to large uncertainty.\n\nInter-model variations in the sign of changes are seen in a few other local localized regions.\n\nThe average length of flood events (number of days in which the cumulative daily rainfall\n\nexcess is positive, compared to the 95th percentile of the baseline) generally increase over most\n\nof the land surface, although this increase was mostly by a day or less ( figure 6 ). However, some", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed3.pdf", - "query": "How many clusters has the Scandinavian peninsula been divided into thanks to Twigstats?", - "target_page": 12, - "target_passage": "This approach results in two clusters in the Scandinavian Penin- sula, approximately separating northern from southern Scandinavia", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "**124** | Nature | Vol 637 | 2 January 2025\n\ncontinuity from the EIA in Norway and northern Sweden (Fig. 4a). When\n\nconsidered collectively, the individuals who show evidence of central\n\nEuropean-related ancestry are mostly observed in regions histori-\n\ncally within the Danish sphere of influence and rule. Currently, no such\n\nindividuals, for example, are noted in eastern central Sweden, which\n\nwas a focus of regional power of the Svear (Fig. 4a). The difference in\n\ndistribution could suggest that the central European-related ancestry\n\nwas more common in regions dominated by the historical Götar and\n\ngroups inhabiting the lands on the borders of the Danish kingdom.\n\nTo test the extent to which the variation in ancestry was consistent\n\nwith mobility during the lifetime of the individuals or, alternatively,\n\nthat of established groups, we focused on the island of Öland in south-\n\neast Sweden, where 23 individuals for whom we could reconstruct\n\nancestry portraits also had associated strontium stable isotope data <sup>66</sup> .\n\nStrontium isotope data from dental enamel reflect the geology of the\n\nregion where an individual grew to maturity, and there are considerable\n\ndifferences in expectations between Öland and many other regions\n\nin northern Europe. The full range of strontium isotope ratios in 109\n\nindividuals show two modes, a majority group with low ratios and a\n\nsecond minority group with high ratios falling outside the expected\n\nrange of local fauna (Fig. 4b). Among 23 individuals with genomes in\n\nour data, all 5 individuals with 100% ancestry relating to central Europe\n\nSouthern Europe\n\nScandinavian Peninsula EIA\n\nCentral\n\nEurope\n\nEastern Europe\n\nBritain\n\nSouthern Europe\n\nScandinavian Peninsula EIA\n\nCentral\n\nEurope\n\nEastern Europe\n\nBritain\n\nSouthern Europe\n\nScandinavian Peninsula EIA\n\nCentral\n\nEurope\n\nEastern Europe\n\nBritain\n\nSouthern Europe\n\nScandinavian Peninsula EIA\n\nCentral\n\nEurope\n\nEastern Europe\n\nBritain\n\nProportion of ancestry\n\nScandinavian Peninsula\n\n70.5\n\n87 Srf/ 86 Sr\n\n0.71 0.72 0.73 0.74 0\n\n0.5\n\n1.0\n\n0\n\n0.5\n\n1.0\n\n1 2 1\n\n3.2 3.1\n\n17.0 1.7 15.7 6.1 20.8 17.5\n\n1.6\n\n2\n\n0\n\n0.25\n\n0.50\n\n0.75\n\n1.00 **b**\n\n0\n\n10\n\n20\n\n30\n\n40\n\n50 Stable isotope histogram counts Ancestry proportion Continental-related ancestry\n\n67.5\n\n64.5\n\n61.5\n\n58.5\n\n55.5\n\nCentral Europe Britain\n\nNorway_VA\n\nLatitude\n\nDenmark_VA Farfung_VA\n\nSweden_VA\n\n0 0.25 0.50 0.75 1.00\n\n1 2 1 2 1 2\n\nAll SNPs\n\nTwigstats 1,000\n\nFaroes\n\nIreland\n\nIsle of Man\n\nOrkney_VA\n\nOxford_VA\n\nZealand_VA(7) Langeland_VA(18) Jutland_VA(13) Funen_VA(12) Denmark_EVA(3)\n\n**c**\n\n**d**\n\n**e**\n\n**f**\n\n**a** Scandinavian Peninsula EIA Central Europe Iron Roman Britain Iron Roman Southern Europe Eastern Europe\n\nDorset_VA\n\nIceland\n\nGreenland\n\nSlovenia.Roman.oNorthEurope\n\nSlovenia.lronRoman\n\nSlovakia.MigrationPeriod\n\nSlovakia_Zohor_Germanic_Roman\n\nScandinavian_Peninsula_EIA(II)\n\nScandinavian_Peninsula_EIA(I)\n\nSaami\n\nRussia_Sarmatian\n\nPortugal.lronRoman\n\nPolandUkraine_MLBA(II)\n\nPolandUkraine_MLBA(I)\n\nPoland_Wielbark(III)\n\nPoland_Wielbark(II)\n\nPoland_Wielbark(I)\n\nPoland_Middle_Ages(II)\n\nPoland_BA\n\nNetherlands_Friesland_Saxon\n\nLongobard_EMED(II)\n\nMontenegro_EM\n\nLongobard_EMED(I)\n\n**Lithuania.lronRoman**\n\n**Kyrgyzstan_TianShanHun**\n\nltaly.lronRepublic\n\nltaly.lmperial(lI)\n\n**Italy.lmperial(l)**\n\nIrelandOrkney_BA\n\n**HungarySlovakia.lronRoman**\n\nHungary_EM(II)\n\nHungary_EM(I)\n\nEngland.Roman.Gladiator.Scandinavia\n\nEngland_Saxon_midCNE\n\nEngland_Saxon_lowCNE\n\nEngland_Saxon_highCNE\n\nDenmark_IA\n\nDenmark_EVA\n\nDenmark_BA\n\nCroatia.lronRoman_oNorthEurope\n\nCordedWare_EBA\n\n**CentraIEurope.IronRoman(lII)**\n\n**CentraIEurope.lronRoman(lI)**\n\n**CentraIEurope.lronRoman(l)**\n\n**Britain.lronRoman**\n\nBaiuvarii_EMED\n\nAustria_Klosterneuburg_Roman\n\nAnatolia EBA\n\nPoland_Middle_Ages(I)\n\nRussia\n\nUkraine\n\n0 0.25 0.50 0.75 1.00 0 0.25 0.50 0.75 1.00\n\n**Fig. 4 | Ancestry in the Viking world. a** , Map showing ancestry carried by\n\nScandinavian Viking Age individuals as inferred using the best-fitting qpAdm", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed3.pdf" - }, - { - "text": "individuals form a clade with respect to reference groups. The reason\n\nwhy this is a principled approach despite the 1000GP groups post-dating\n\nthe ancient individuals is that if a group of ancient individuals are truly\n\nhomogeneous, they will be so also with respect to later individuals.\n\nWe then define clusters by running UPGMA (unweighted pair group\n\nmethod with arithmetic mean) on −log 10 [ *P* values] obtained from\n\nqpwave between all pairs of individuals and cut the resulting dendro-\n\ngram at a height corresponding to a *P* value of 0.01. We then further\n\nsubdivide clusters by requiring all samples to be within 500 years of\n\nthe mean cluster age.\n\nTo choose the source groups shown in Fig. 2a and Extended Data\n\nFig. 1d, we run this algorithm on samples from Iron and Roman Age\n\nEurope (Supplementary Table 1). We retain groups that have at least\n\nthree individuals and, therefore, exclude clusters of size one or two.\n\nThis approach results in two clusters in the Scandinavian Penin-\n\nsula, approximately separating northern from southern Scandinavia,\n\nthree clusters in Poland and Ukraine that separate samples tempo-\n\nrally between the early and later Bronze Age, a cluster combining the\n\nHungarian Scythian and Slovakian La Tène-associated individuals,\n\nand a cluster each for Iron and Roman Age Portugal, Italy and Lithu-\n\nania. In present-day Austria, Germany and France, this approach\n\nidentifies three clusters, with each cluster spanning multiple archae-\n\nological sites in different countries, indicating genetic diversity in\n\nthis region in the first millennium ce. Encouragingly, these clusters\n\nseparate in our non-parametric MDS analysis (Fig. 2a), indicating that\n\nwe are capturing real genetic differences between groups using this\n\napproach.\n\n**Fine-scale structure in Neolithic Europe.** To quantify fine-scale struc-\n\nture in Neolithic Europe (Extended Data Fig. 5b), we aimed to select\n\nindividuals in Neolithic Europe who have not yet been affected by the\n\narrival of Steppe ancestry and do not show excess hunter-gatherer\n\nancestry. We infer distal ancestry sources using Balkan_N, Yamnaya and\n\nWestern Hunter-gatherers as source groups and reference groups\n\naccording to a previously proposed qpAdm setup <sup>46</sup> (Supplementary\n\nTable 1). For this analysis, we infer ancestry using qpAdm applied to\n\n1.2 million SNP sites of imputed genomes. We retain only Neolithic\n\nindividuals with *P* > 0.01, *z* < 2 for Yamnaya ancestry, and *z* < 2 or\n\nproportion <0.25 for Western Hunter-gatherer ancestry.\n\n**Reporting summary**\n\nFurther information on research design is available in the Nature Port-\n\nfolio Reporting Summary linked to this article.\n\n**Data availability**\n\nAll aDNA data used in this study were publicly available, and accession\n\ncodes are listed in Supplementary Table 1.\n\n**Code availability**\n\nTwigstats is freely available under an MIT licence through GitHub\n\n[(https://github.com/leospeidel/twigstats), and detailed documenta-](https://github.com/leospeidel/twigstats)\n\n[tion, as well as example data, is available at https://leospeidel.github.](https://leospeidel.github.io/twigstats/)\n\n[io/twigstats/. The code has also been deposited at Zenodo (https://](https://zenodo.org/records/13833120)\n\n[zenodo.org/records/13833120)](https://zenodo.org/records/13833120) <sup>76</sup> . All scripts to reproduce simulations,\n\nand to run Relate on imputed ancient genomes, and downstream\n\nanalyses, including computation of *f* -statistics and running qpAdm\n\n[models, are available through GitHub (https://github.com/leospeidel/ ](https://github.com/leospeidel/twigstats_paper)\n\n[twigstats_paper).](https://github.com/leospeidel/twigstats_paper)\n\n70. Maier, R., Flegontov, P., Flegontova, O., Changmai, P. & Reich, D. On the limits of fitting\n\ncomplex models of population history to *f* -statistics. *eLife* **12** , e85492 (2023).\n\n71. Kelleher, J., Etheridge, A. M. & McVean, G. Efficient coalescent simulation and", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed3.pdf" - }, - { - "text": "### **Extended Data Fig. 7 | Ancestry estimates stratified by genetic sex. a** , Map\n\nshowing ancestry carried by each Scandinavian Viking age individual. **b** , Ancestry\n\nproportions across individuals grouped by Latitude and genetic sex. **c** , Odds\n\nratio and p-values calculated using a two-sided Fisher’s exact test on the number\n\nof males and females carrying each ancestry in Viking Age Denmark, Sweden,\n\nNorway, Iceland, and Gotland. **d** , *F* *4* values of the form *f* 4 (Scandinavian_Peninsula_\n\nEIA(I), alternative source group, males in Viking group, females in Viking group)\n\ncomputed using all SNPs and Twigstats. A significantly positive value is\n\nevidence of attraction of females with pop2 or males with Scandinavian_\n\nPeninsula_EIA(I). Number of males and females is shown in each facet title and\n\nwe restrict to groups with at least four males and females. We plot one standard\n\nerror. **e** , Map showing ‘farflung’ Viking individuals grouped by ancestry and\n\ngenetic sex. In contrast to Fig. 4a and d where we showed results for the ‘best’\n\nqpAdm model, here in panels **a** , **b, c,** and **e** , an individual is assigned an ancestry\n\ngroup, if it has **any** accepted model (p > 0.01) where that ancestry features.", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed3.pdf" - }, - { - "text": "vidual was a gladiator or soldier, individuals and groups from northern\n\nEurope are indeed recorded in Roman sources both as soldiers and as\n\nenslaved gladiators <sup>63,64</sup> .\n\nAcross Europe, we see regional differences in the southeastern and\n\nsouthwestern expansions of Scandinavian-related ancestries. Early\n\nmedieval groups from present-day Poland and Slovakia carry spe-\n\ncific ancestry from one of the Scandinavian EIA groups—the one with\n\nindividuals primarily from the northern parts of Scandinavia in the\n\nEIA—with no evidence of ancestry related to the other primary group\n\nin more southern Scandinavia (Fig. 2d). By contrast, in southern and\n\nwestern Europe, Scandinavian-related ancestry either derives from\n\nEIA southern Scandinavia—as in the cases of the probable Baiuvarii\n\nin Germany, Longobard-associated burials in Italy and early medieval\n\nburials in southern Britain—or cannot be resolved to a specific region\n\nin Scandinavia. If these expansions are indeed linked to language, this\n\npattern is remarkably concordant with the main branches of Germanic\n\nlanguages, with the now-extinct eastern Germanic spoken by Goths in\n\nUkraine on the one hand, and western Germanic languages such as Old\n\nEnglish and Old High German recorded in the early medieval period\n\non the other hand.\n\n### **Influx into pre-Viking Age Scandinavia**\n\nIn EIA Scandinavia (<500 ce), we find evidence for broad genetic homo-\n\ngeneity. Specifically, individuals from Denmark (100 ce- 300 ce) were\n\nindistinguishable from contemporary people in the Scandinavian Pen-\n\ninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry\n\nalready in the eighth century ce (Late Iron Age/early Viking Age) on\n\nZealand (present-day Denmark) for which a 100% EIA ancestry model\n\nis rejected ( *P* = 1 × 10 <sup>−17</sup> using Twigstats; *P* = 7.5 × 10 <sup>−4</sup> without). This\n\nshift in ancestry persists among later Viking Age groups in Denmark,\n\nwhere all groups are modelled with varying proportions of ancestry\n\nrelated to Iron Age continental groups in central Europe (Figs. 3f\n\nand 4c). A non-parametric MDS of Viking Age individuals suggests\n\nthat variation between individuals forms a cline spanning from the\n\nEIA Scandinavian Peninsula individuals to ancestry characteristic of\n\ncentral Europe (Fig. 4e). The observed shift in ancestry in Denmark\n\ncannot be confounded by potentially earlier unknown gene flow into\n\nIron Age source groups in Austria, France and Germany, but such gene\n\nflow could affect the exact ancestry proportions.\n\nThese patterns are consistent with northward expansion of ancestry,\n\npotentially starting before the Viking Age, into the Jutland peninsula\n\nand Zealand island towards southern Sweden. The geographical ori-\n\ngin of this ancestry is currently difficult to discern, as the available\n\nsamples from Iron Age central Europe remain sparse. The timing\n\nof this expansion is constrained only by the samples available: this\n\nancestry is not observed in individuals from the Copenhagen area of\n\nDenmark (around 100 ce- 300 ce) <sup>6</sup> , an individual from the southern tip\n\nof Sweden (around 500 ce) <sup>16</sup> , individuals from the Sandby Borg mas-\n\nsacre site on Öland in present-day Sweden (around 500 ce) <sup>7</sup> and 31 indi-\n\nviduals from the mid-eighth century Salme ship burials in present-day\n\nEstonia (Extended Data Fig. 9), who probably originated in central\n\nSweden <sup>6</sup> . Therefore, this ancestry transformation most likely post-\n\ndated these individuals in each particular region and mostly occurred\n\nin the second half of the first millennium ce.\n\nTo assess the full extent of the impact of this ancestry influx into\n\nScandinavia, we next aimed to understand the ancestry of individu-\n\nals in Scandinavia during the Viking Age. Previous studies have sug-\n\ngested that there was a diversity of ancestries in Scandinavia during this\n\nperiod <sup>6,7,65</sup> , due to increased maritime mobility, but have not reported", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "Our explorative MDS analysis again indicates mixed ancestries related\n\nto the Scandinavian EIA, with regional differences that point to varied\n\nlocal admixture (Fig. 4e and Extended Data Fig. 10).\n\nIn Britain, most of the individuals recovered from the two late Viking\n\nAge mass graves identified at Ridgeway Hill, Dorset, and St John’s\n\nCollege, Oxford <sup>6</sup> , show ancestries typical of those seen in Viking Age\n\nsouthern Scandinavia (Fig. 4f). Further west, North Atlantic Viking Age\n\nindividuals in the Faroe Islands, Iceland and Greenland carry ancestry\n\nfrom the Scandinavian Peninsula, with several individuals showing the\n\ncontinental central Europe-related ancestry signal found in south-\n\nern Scandinavia (Fig. 4f) and others who share substantial ancestry\n\nwith Iron Age Britain. In contrast to previous hypotheses <sup>68</sup> , we found\n\na marginal enrichment of ancestry related to Britain and Ireland in\n\nmen (15 out of 17 men and 3 out of 6 women with at least one accepted\n\nmodel involving Iron or Roman Age Britain as source; Fisher’s exact\n\ntest *P* = 0.089) (Extended Data Fig. 7c,e). However, sampling of addi-\n\ntional individuals to improve distinction between early English- and\n\nNorse-related ancestries would be required to fully test this hypothesis.\n\nIn eastern Europe, we observe EIA Scandinavian ancestries in a Viking\n\nAge burial from Ukraine, and these ancestries are overrepresented\n\nin Viking Age burials from present-day Russia. At Staraya Ladoga in\n\nwestern Russia, we observe several individuals with EIA Scandinavian\n\nPeninsula-related ancestry and at least one individual dated to the\n\neleventh century with apparent ancestry related to Iron Age Britain.\n\nThe relative absence of Iron Age central European ancestry, which was\n\nlargely restricted to southern Scandinavia during the Viking Age, is thus\n\nindicative that these individuals may have originated in the central/\n\nnorthern parts of Sweden or Norway, where Viking Age individuals\n\nshow the most similar ancestry profiles to them.\n\n### **Conclusions**\n\nOur approach, Twigstats, transfers the power advantage of haplotype-\n\nbased approaches to a fully temporal framework, which is applica-\n\nble to *f* -statistics and enables previously unavailable unbiased and\n\ntime-stratified analyses of admixture. We demonstrated that Twigstats\n\nenables fine-scale quantitative modelling of ancestry proportions,\n\nrevealing wide-ranging ancestry changes that affect northern and\n\ncentral Europe during the Iron, Roman and Viking ages. We reveal evi-\n\ndence of the southward and/or eastward expansion of individuals who\n\nprobably spoke Germanic languages and who had Scandinavian-related\n\nancestry in the first half of the first millennium ce. We note that\n\n‘Scandinavian-related’ in this context relates to the ancient genomes\n\navailable, and so it is entirely possible that these processes were driven,\n\nfor example, from regions in northern-central Europe. This could be\n\nconsistent with the attraction of the greater wealth, which tended to\n\nbuild up among Rome’s immediate neighbours and may have played\n\na major role in vectors of migration internal to communities in Europe\n\nwho lived beyond the Roman frontier <sup>52</sup> . Later, patterns of gene flow\n\nseem to have turned northwards, with the spread of Iron Age Central\n\nEurope-related ancestry into Scandinavia. Overall, our approach can\n\nbe used for the reconstruction of new high-resolution genetic histories\n\naround the world.\n\n### **Online content**\n\nAny methods, additional references, Nature Portfolio reporting summa-\n\nries, source data, extended data, supplementary information, acknowl-\n\nedgements, peer review information; details of author contributions\n\nand competing interests; and statements of data and code availability\n\n[are available at https://doi.org/10.1038/s41586-024-08275-2.](https://doi.org/10.1038/s41586-024-08275-2)\n\n1. Lawson, D. J., Hellenthal, G., Myers, S. & Falush, D. Inference of population structure using", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "gested that there was a diversity of ancestries in Scandinavia during this\n\nperiod <sup>6,7,65</sup> , due to increased maritime mobility, but have not reported\n\nper-individual ancestry estimates based on preceding ancestry. We\n\nanalysed each individual’s ancestry using a rotational qpAdm scheme\n\n(Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which\n\nshowed increased power in distinguishing models when restricted\n\nto recent coalescences with Twigstats (more than 80% of accepted\n\none-source models in Twigstats were also accepted one-source models\n\nusing all SNPs, compared with less than 17% for the inverse).\n\nWe investigated regional differences in non-local ancestry across\n\nScandinavia. In Denmark, 25 out of 53 Viking Age individuals had detect-\n\nable ( *z-* score > 1) central European-related ancestry (CentralEurope.\n\nIronRoman or Portugal.IronRoman) in their best accepted qpAdm\n\nmodels. In Sweden 20 out of 62 individuals had detectable central\n\nEuropean-related ancestry, concentrated almost entirely in southern\n\nregions (Fig. 4a,d). By contrast, in Norway, this ancestry was observed\n\nin only 2 out of 24 individuals, indicating a wide-ranging impact of\n\nincoming ancestry in southern Scandinavia and suggesting more", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "in Fig. 2 but only showing qpAdm source groups of Fig. 2a and modern groups\n\nin the Simons Genome Diversity Project (labelled) computed using genotypes\n\n(top) or Twigstats (bottom). **b** , MDS computed using genotypes showing one\n\nearly medieval or Viking age group per facet. **c** , MDS computed using Twigstats\n\nshowing one early medieval or Viking age group per facet.", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed3.pdf" - }, - { - "text": "Nature | Vol 637 | 2 January 2025 | **121**\n\nancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark\n\narchaeological complex has been linked to the later Chernyakhov cul-\n\nture to the southeast and to early Goths, an historical Germanic group\n\nthat flourished in the second to fifth centuries ce <sup>56</sup> . Our modelling\n\nsupports the idea that some groups that probably spoke Germanic\n\nlanguages from Scandinavia expanded south across the Baltic into\n\nthe area between the Oder and Vistula rivers in the early centuries ce,\n\nalthough whether these expansions can be linked specifically with\n\nhistorical Goths is still debatable. Moreover, since a considerable\n\nproportion of Wielbark burials during this period were cremations,\n\nthe possible presence of individuals with other ancestries cannot be\n\nstrictly rejected if they were exclusively cremated (and are therefore\n\ninvisible in the aDNA record).\n\nA previous study could not reject continuity in ancestry from the\n\nWielbark-associated individuals to later medieval individuals from\n\na similar region <sup>12</sup> . With the improved power of Twigstats, models of\n\ncontinuity are strongly rejected, with no one-source model of any pre-\n\nceding Iron Age or Bronze Age group providing a reasonable fit for the\n\n**a**\n\nScandinavian Peninsula EIA\n\nBritain\n\nCentral Europe\n\nPortugal\n\nHungary and Slovakia\n\nEastern Europe\n\nItaly\n\n0.002\n\n0\n\n- 0.002\n\nDimension 1\n\n- 0.004\n\n- 0.002 - 0.001 0 0.001\n\nDimension 2 0.002 0.003 0.004\n\nTwigstats *f* 3 -statistics\n\nScandinavian Peninsula EIA\n\nDenmark IA\n\nEarly medieval,\n\nincluding Wielbark,\n\nBaiuvarii,\n\nLongobards,\n\nEngland earlyMED,\n\nSlovakia earlyMED\n\nEngland Diffeld Terrace\n\nRegular *f* 3 -statistics\n\nDriffeld Terrace\n\nRoman outlier (second to\n\nfourth century CE )\n\n1\n\nAnatolia_EBA\n\nAustria_Klosterneuburg_Roman\n\nBaiuvari_earlyMED\n\n**Britain.lronRoman**\n\n**CentraIEurope.IronRoman(l)**\n\n**CentraIEurope.IronRoman(Il)**\n\n**CentraIEurope.IronRoman(IIl)**\n\nCordedWare_EBA\n\nCroatia.IronRoman_oNorthEurope\n\nDenmark_BA IrelandOrkney_BA\n\n**HungarySlovakia.lronRoman**\n\nHungary_earlyMED(II)\n\nHungary_earlyMED(I)\n\nEngland.Driffeld.Terrace.Scandinavia\n\nEngland_earlyMED_midCNE\n\nEngland_earlyMED_lowCNE\n\nEngland_earlyMED_highCNE\n\nDenmark_IA\n\nDenmark_EVA\n\nDimension 2\n\n0.002 0.003\n\nTwigstats *f* 3 -statistics\n\n0.004\n\nPoland_BA Saami\n\n**Russia_Sarmatian**\n\n**Portugal.lronRoman**\n\n**PolandUkraine_MLBA(II)**\n\n**PolandUkraine_MLBA(I)**\n\nPoland_Wielbark(III)\n\nPoland_Wielbark(II)\n\nPoland_Wielbark(I)\n\nPoland_Middle_Ages(II)\n\nPoland_Middle_Ages(I) **Scandinavian_Peninsula_EIA(I)**\n\n**Scandinavian_Peninsula_EIA(II)**\n\nSlovakia_Zohor_Germanic_Roman\n\nSlovakia_earlyMED\n\nSlovenia.lronRoman\n\nSlovenia.Roman.oNorthEurope\n\nNetherlands_Friesland_earlyMED\n\nMontenegro_earlyMED\n\nLongobard_earlyMED(II)\n\nLongobard_earlyMED(I)\n\n**Lithuania.lronRoman**\n\n**Kyrgyzstan_TianShanHun**\n\nltaly.lronRepublic\n\nltaly.lmperial(ll)\n\n**Italy.lmperial(l)**\n\n0.001 0 - 0.001 - 0.002\n\n- 0.004\n\n- 0.002\n\n0\n\nItaly\n\n0.002\n\nDimension 1\n\nPortugal\n\nCentral\n\nEurope\n\nBritain\n\nHungary and Slovakia\n\nEastern Europe\n\n28\n\n2\n\n3 13\n\n3.3\n\nI II III 6\n\nWielbark, Poland\n\n(frst to third century CE )\n\nMedieval Poland (tenth\n\nto eleventh century CE )\n\n2\n\nIron Age, Denmark\n\n(frst to third century CE )\n\nFriesland, the Netherlands\n\n(ffth to sixth century CE )\n\nBaiuvarii\n\n(ffth century CE )\n\nLongobard\n\n(sixth century CE )\n\nEarly medieval\n\nSlovakia\n\n(third to ffth century CE )\n\nZohor, Slovakia\n\n(frst to second\n\ncentury CE )\n\nLa Tène, Slovakia\n\n(frst century BCE\n\nto frst century CE )\n\n2.1\n\nLow CNE Mid CNE High CNE\n\nEarly medieval England\n\n(ffth to eighth century CE )\n\n9\n\nI II 7\n\n4.7\n\n1\n\n3\n\n**b c**\n\n**d**\n\nIron Age, Denmark Early Viking, Salme\n\nDriffeld Terrace\n\nRoman outlier\n\nEarly\n\nmedieval England\n\nWielbark, Poland\n\nEarly medieval Zohor\n\nLongobard Baiuvarii Friesland, the\n\nNetherlands Mid CNE Low CNE\n\nI II\n\n### **Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "Nature | Vol 637 | 2 January 2025 | **125**\n\n(including one with ancestry related to Britain) are part of the majority\n\nstrontium values, consistent with them having grown up locally. By\n\ncontrast, the six most clearly non-local individuals based on the sta-\n\nble isotopes all have 50% or more EIA Scandinavian Peninsula-related\n\nancestry, although three individuals with wholly EIA Scandinavian\n\nPeninsula-related ancestry also had local values. This suggests that\n\nthe presence of central European-related ancestry was not a transient\n\nphenomenon, but an ancestry shift that occurred at some point after\n\nabout 500 ce, the period to which individuals from the massacre site\n\nat Sandby Borg ringfort on Öland were dated; these individuals all have\n\nstrictly EIA Scandinavian-related ancestry. Indeed, one hypothesis is\n\nthat the massacre at Sandby Borg could represent conflict associated\n\nwith movements of people that contributed to later ancestry change,\n\nalthough other scenarios are possible and further synthesis of biomo-\n\nlecular and archaeological data is necessary to test this hypothesis.\n\n### **Viking Age mobility into Scandinavia**\n\nPrevious studies had suggested a major influx of ancestry related to\n\nBritain into Viking Age Scandinavia <sup>6,7</sup> . Although we detect this ances-\n\ntry in some individuals (7 individuals in Norway, 14 in Denmark and\n\n14 in Sweden), including some individuals whose ancestry appears to\n\nbe entirely derived from Iron Age Britain, its overall impact appears\n\nreduced compared with previous reports. Our analysis indicates a pro-\n\nportionally larger impact of ancestry from Iron Age Britain in northern\n\nNorway, with southern Scandinavia predominantly influenced by\n\ncontinental central European ancestries (Fig. 4d). We hypothesize\n\nthat our estimates of ancestry from Britain are reduced relative to\n\nprevious studies because ancestry related to Britain and continen-\n\ntal central Europe may have been indistinguishable. This could be\n\ndue to a lack of statistical power to distinguish these closely related\n\nsources with standard methods, as well as through potential biases\n\nintroduced by using modern surrogate populations that have since\n\nbeen influenced by later gene flow (such as gene flow into Britain).\n\nWe illustrate this by replicating the analyses previously described <sup>6,7</sup>\n\n(Extended Data Fig. 8).\n\nSimilarly, a previous study has suggested that individuals at sites such\n\nas Kärda in southern Sweden carried ancestry from southern Europe <sup>6</sup> .\n\nIn our models, two Kärda individuals fit with central European-related\n\nancestry, but none of the individuals has a substantial proportion of\n\nancestry related to southern European sources (Extended Data Fig. 9).\n\nInstead, we detect ancestry from southern European sources in only\n\nthree individuals from Scandinavia, and in relatively small propor-\n\ntions (Fig. 4a).\n\nInterestingly, we detect ancestry from Bronze and Iron Age sources\n\nfrom Eastern Europe (present-day Lithuania and Poland), concentrated\n\nin southeastern parts of Sweden, particularly the island of Gotland\n\n(14 individuals; Fig. 4a). This is consistent with previous genetic\n\nstudies <sup>6,7</sup> . We find that this ancestry is enriched in male individuals\n\n(Extended Data Fig. 7d), suggesting male-biased mobility and/or burial.\n\nThe closest match tends to be Roman Iron Age Lithuanian genomes\n\nassociated with Balts, which would be consistent with mobility across\n\nthe Baltic Sea, but we caution that the geographical representation of\n\navailable genomes is still limited.\n\n### **Viking Age expansion from Scandinavia**\n\nTraditionally, historical perspectives on what is now often referred\n\nto as the Viking diaspora placed an emphasis on the movements and\n\nsettlements of population groups from various parts of Scandinavia <sup>67</sup> .\n\nOur explorative MDS analysis again indicates mixed ancestries related\n\nto the Scandinavian EIA, with regional differences that point to varied", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" - }, - { - "text": "### **Extended Data Fig. 10 | Ancestry models of farflung Viking individuals.**\n\n**a** , MDS of each farflung Viking group plotted on top of preceding Iron age and\n\nRoman individuals. **b** , All accepted qpAdm models using Twigstats-1000 for\n\nevery non-Scandinavian Viking individual computed in a rotational qpAdm\n\nwith source groups identical to Fig. 4. We plot one standard error.", - "page_start": 21, - "page_end": 21, - "source_file": "pubmed3.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed3.pdf", - "query": "What are the cultures with which the Wielbark culture is associated?", - "target_page": 4, - "target_passage": "linked to the later Chernyakhov cul- ture to the southeast and to early Goths", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "in this period is relatively well captured.\n\n### **Expansions of Scandinavian-like ancestry**\n\nWe assembled time transects using available aDNA data across several\n\ngeographical regions in Europe, and infer their ancestry using a model\n\nwith the EIA or Roman Iron Age sources previously defined (shown in\n\nFig. 2a). Our modelling provides direct evidence of individuals with\n\nancestry originating in northern Germany or Scandinavia appearing\n\nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup-\n\nplementary Table 3).\n\nIn the region of present-day Poland, our analysis suggests several\n\nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce\n\nto 1000 bce), we observe a clear shift away from preceding ancestry\n\noriginally associated with Corded Ware cultures <sup>55</sup> (Fig. 3a). Second,\n\nin the first to fifth century ce, individuals associated with Wielbark\n\nculture <sup>5,12</sup> show an additional strong shift away from the preceding\n\nBronze Age groups, and can only be modelled with a >75% component\n\nattributed to the EIA Scandinavian Peninsula. Multiple individuals,\n\nespecially from earlier Wielbark cemeteries, have approximately 100%", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed3.pdf" - }, - { - "text": "Nature | Vol 637 | 2 January 2025 | **121**\n\nancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark\n\narchaeological complex has been linked to the later Chernyakhov cul-\n\nture to the southeast and to early Goths, an historical Germanic group\n\nthat flourished in the second to fifth centuries ce <sup>56</sup> . Our modelling\n\nsupports the idea that some groups that probably spoke Germanic\n\nlanguages from Scandinavia expanded south across the Baltic into\n\nthe area between the Oder and Vistula rivers in the early centuries ce,\n\nalthough whether these expansions can be linked specifically with\n\nhistorical Goths is still debatable. Moreover, since a considerable\n\nproportion of Wielbark burials during this period were cremations,\n\nthe possible presence of individuals with other ancestries cannot be\n\nstrictly rejected if they were exclusively cremated (and are therefore\n\ninvisible in the aDNA record).\n\nA previous study could not reject continuity in ancestry from the\n\nWielbark-associated individuals to later medieval individuals from\n\na similar region <sup>12</sup> . With the improved power of Twigstats, models of\n\ncontinuity are strongly rejected, with no one-source model of any pre-\n\nceding Iron Age or Bronze Age group providing a reasonable fit for the\n\n**a**\n\nScandinavian Peninsula EIA\n\nBritain\n\nCentral Europe\n\nPortugal\n\nHungary and Slovakia\n\nEastern Europe\n\nItaly\n\n0.002\n\n0\n\n- 0.002\n\nDimension 1\n\n- 0.004\n\n- 0.002 - 0.001 0 0.001\n\nDimension 2 0.002 0.003 0.004\n\nTwigstats *f* 3 -statistics\n\nScandinavian Peninsula EIA\n\nDenmark IA\n\nEarly medieval,\n\nincluding Wielbark,\n\nBaiuvarii,\n\nLongobards,\n\nEngland earlyMED,\n\nSlovakia earlyMED\n\nEngland Diffeld Terrace\n\nRegular *f* 3 -statistics\n\nDriffeld Terrace\n\nRoman outlier (second to\n\nfourth century CE )\n\n1\n\nAnatolia_EBA\n\nAustria_Klosterneuburg_Roman\n\nBaiuvari_earlyMED\n\n**Britain.lronRoman**\n\n**CentraIEurope.IronRoman(l)**\n\n**CentraIEurope.IronRoman(Il)**\n\n**CentraIEurope.IronRoman(IIl)**\n\nCordedWare_EBA\n\nCroatia.IronRoman_oNorthEurope\n\nDenmark_BA IrelandOrkney_BA\n\n**HungarySlovakia.lronRoman**\n\nHungary_earlyMED(II)\n\nHungary_earlyMED(I)\n\nEngland.Driffeld.Terrace.Scandinavia\n\nEngland_earlyMED_midCNE\n\nEngland_earlyMED_lowCNE\n\nEngland_earlyMED_highCNE\n\nDenmark_IA\n\nDenmark_EVA\n\nDimension 2\n\n0.002 0.003\n\nTwigstats *f* 3 -statistics\n\n0.004\n\nPoland_BA Saami\n\n**Russia_Sarmatian**\n\n**Portugal.lronRoman**\n\n**PolandUkraine_MLBA(II)**\n\n**PolandUkraine_MLBA(I)**\n\nPoland_Wielbark(III)\n\nPoland_Wielbark(II)\n\nPoland_Wielbark(I)\n\nPoland_Middle_Ages(II)\n\nPoland_Middle_Ages(I) **Scandinavian_Peninsula_EIA(I)**\n\n**Scandinavian_Peninsula_EIA(II)**\n\nSlovakia_Zohor_Germanic_Roman\n\nSlovakia_earlyMED\n\nSlovenia.lronRoman\n\nSlovenia.Roman.oNorthEurope\n\nNetherlands_Friesland_earlyMED\n\nMontenegro_earlyMED\n\nLongobard_earlyMED(II)\n\nLongobard_earlyMED(I)\n\n**Lithuania.lronRoman**\n\n**Kyrgyzstan_TianShanHun**\n\nltaly.lronRepublic\n\nltaly.lmperial(ll)\n\n**Italy.lmperial(l)**\n\n0.001 0 - 0.001 - 0.002\n\n- 0.004\n\n- 0.002\n\n0\n\nItaly\n\n0.002\n\nDimension 1\n\nPortugal\n\nCentral\n\nEurope\n\nBritain\n\nHungary and Slovakia\n\nEastern Europe\n\n28\n\n2\n\n3 13\n\n3.3\n\nI II III 6\n\nWielbark, Poland\n\n(frst to third century CE )\n\nMedieval Poland (tenth\n\nto eleventh century CE )\n\n2\n\nIron Age, Denmark\n\n(frst to third century CE )\n\nFriesland, the Netherlands\n\n(ffth to sixth century CE )\n\nBaiuvarii\n\n(ffth century CE )\n\nLongobard\n\n(sixth century CE )\n\nEarly medieval\n\nSlovakia\n\n(third to ffth century CE )\n\nZohor, Slovakia\n\n(frst to second\n\ncentury CE )\n\nLa Tène, Slovakia\n\n(frst century BCE\n\nto frst century CE )\n\n2.1\n\nLow CNE Mid CNE High CNE\n\nEarly medieval England\n\n(ffth to eighth century CE )\n\n9\n\nI II 7\n\n4.7\n\n1\n\n3\n\n**b c**\n\n**d**\n\nIron Age, Denmark Early Viking, Salme\n\nDriffeld Terrace\n\nRoman outlier\n\nEarly\n\nmedieval England\n\nWielbark, Poland\n\nEarly medieval Zohor\n\nLongobard Baiuvarii Friesland, the\n\nNetherlands Mid CNE Low CNE\n\nI II\n\n### **Fig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.**", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" - }, - { - "text": "French resistance and many members were shot in Place Bellecour in the town centre. The exhibition is\n\nlargely a series of , mini-biographies of those involved.\n\n[Lyon is a pilot city of the Council of Europe and the European Commission Intercultural cities program.](https://en.wikipedia.org/w/index.php?title=Intercultural_cities&action=edit&redlink=1)\n\n[The historic site of Lyon was designated a UNESCO World Heritage Site in 1998. In its designation, UNESCO cited the](https://en.wikipedia.org/wiki/World_Heritage_Site)\n\n\"exceptional testimony to the continuity of urban settlement over more than two millennia on a site of great commercial and\n\nstrategic significance.\" <sup>[37]</sup> The specific regions comprising the historic site include the Roman district and Fourvière, the\n\n[Renaissance district (Vieux Lyon), the silk district (slopes of Croix-Rousse), and the Presqu'île, which features architecture](https://en.wikipedia.org/wiki/Renaissance_architecture)\n\nfrom the 12th century to modern times. <sup>[53]</sup>\n\n### **Culture**\n\n#### **UNESCO World Heritage Site**", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia4.pdf" - }, - { - "text": "Nature | Vol 637 | 2 January 2025 | **123**\n\nhigher resolution using earlier genomes. Several other individuals from\n\nthese Longobard burials (Longobard_earlyMED(II)) show no detectable\n\nancestry from northern Europe and, instead, are more closely related to\n\nIron Age groups in continental central Europe, putatively representing\n\ndescendants of local people buried in a Longobard style. Our results are\n\nconsistent with attestations that the Longobards originated in the areas\n\nof present-day northern Germany or Denmark, but that by the sixth\n\ncentury ce they incorporated multiple different cultural identities, and\n\nmixed ancestries. Present-day populations of Hungary do not appear\n\nto derive detectable ancestry from early medieval individuals from\n\nLongobard contexts, and are instead more similar to Scythian-related\n\nancestry sources (Extended Data Fig. 6), consistent with the later impact\n\nof Avars, Magyars and other eastern groups <sup>58</sup> .\n\nIn southern Germany, the genetic ancestry of individuals from\n\nearly medieval Bavaria probably associated with the historical\n\nGermanic-language-speaking Baiuvarii <sup>59</sup> cannot be modelled as deriv-\n\ning ancestry solely from earlier groups in Iron Age central Germany\n\n( *P* ≪ 1 × 10 <sup>−36</sup> ). The Baiuvarii probably appeared in the region in the\n\nfifth century ce <sup>59</sup> , but their origins remain unresolved. Our current\n\nbest model indicates a mixture with ancestry derived from EIA Pen-\n\ninsular Scandinavia and central Europe, suggesting an expansion of\n\nScandinavian-related ancestry producing a regional ancestry shift\n\n(Figs. 2c and 3c).\n\nIn Italy, southward expansions of northern and central European ances-\n\ntries appear by the Late Antiquity (approximately fourth century ce),\n\nwhere a clear diversification of ancestry can be observed compared\n\nwith preceding time periods (Fig. 3d). However, no individuals with\n\nnear 100% Scandinavian ancestry can be observed in the sampling\n\ndata available so far.\n\nIn Britain, the ancestries of Iron Age and Roman individuals form a\n\ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available\n\npreceding Bronze Age individuals from Ireland and Orkney, and adja-\n\ncent to, but distinct from, available individuals in Iron Age and Roman\n\ncentral Europe. However, two first- to second-century ce burials from a\n\nRoman military fortress site in Austria (Klosterneuburg) <sup>5</sup> carry ancestry\n\nthat is currently indistinguishable from Iron Age or Roman popula-\n\ntions of Britain, to the exclusion of other groups (qpWave cladality\n\n*P* = 0.11). One option is that they had ancestry from Britain; alternatively,\n\ncurrently unsampled populations from western continental Europe\n\ncarried ancestries similar to Iron Age southern Britain.\n\nTwigstats substantially improves models of admixture between\n\nancestries from Iron Age Britain and northern Europe in early medi-\n\neval England <sup>9</sup> , halving standard errors from 9% with SNPs to 4% when\n\nusing time stratification (point estimates 80% and 79% Iron Age\n\nBritain-related ancestry, respectively). We used this improved reso-\n\nlution to demonstrate that an earlier Roman individual (6DT3) dating\n\nto approximately second to fourth century ce from the purported\n\ngladiator or military cemetery at Driffield Terrace in York (Roman\n\n*Eboracum* ), England <sup>60</sup> , who was previously identified as an ancestry\n\noutlier <sup>61,62</sup> , specifically carried approximately 25% EIA Scandinavian\n\nPeninsula-related ancestry (Fig. 2c). This documents that people with\n\nScandinavian-related ancestry already were in Britain before the fifth\n\ncentury ce, after which there was a substantial influx associated with\n\nAnglo-Saxon migrations <sup>9</sup> . Although it is uncertain whether this indi-\n\nvidual was a gladiator or soldier, individuals and groups from northern\n\nEurope are indeed recorded in Roman sources both as soldiers and as\n\nenslaved gladiators <sup>63,64</sup> .", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "**122** | Nature | Vol 637 | 2 January 2025\n\nmedieval individuals ( *P* ≪ 1 × 10 <sup>−32</sup> ). Instead, the majority of individuals\n\nfrom medieval Poland can be modelled only as a mixture of ancestries\n\nrelated to Roman Iron Age Lithuania, which is similar to ancestries of\n\nindividuals from middle to late Bronze Age Poland (44%, 95% confidence\n\ninterval 36- 51%), an ancestry component related to Hungarian Scyth-\n\nians or Slovakian La Tène individuals (49%, 95% confidence interval\n\n41- 57%) and potentially a minority component of ancestry related to\n\nSarmatians from the Caucasus ( *P* = 0.13) (Fig. 2c). Four out of twelve\n\nindividuals from medieval Poland, three of whom are from the late\n\nViking Age <sup>6</sup> , carried detectable Scandinavian-related ancestry. Some\n\nof the ancestry detected in individuals from later medieval Poland may\n\nhave persisted during the late first millennium ce in the cremating\n\nportion of the population, but regardless, this points to large-scale\n\nancestry transformation in medieval Poland (Fig. 3a). Future data could\n\nshed light on the extent to which this reflects the influence of groups\n\nspeaking Slavic languages in the region.\n\nIn present-day Slovakia, individuals associated with the Iron\n\nAge La Tène period appear close to Hungarian Scythians in the two\n\ndimensions of our MDS analysis, and are modelled as a mixture of\n\ncentral and eastern European ancestry. However, a first-century ce\n\nburial of a 50- 60-year-old woman from Zohor is modelled only with\n\nScandinavian-related ancestry, providing evidence of ancestry related\n\nto the Scandinavian EIA appearing southwest of the range of the Wiel-\n\nbark archaeological complex <sup>5,57</sup> (Fig. 3b). Later early medieval individu-\n\nals from Slovakia have partial Scandinavian-related ancestry, providing\n\nevidence for the integration between expanding and local groups.\n\nNearby, in present-day Hungary, we observe Scandinavian-related\n\nancestry components in several burials dating to the sixth century\n\nce associated with Longobards (Longobard_earlyMED(I)) <sup>10</sup> (Fig. 2c).\n\nThis is consistent with the original study <sup>10</sup> , which reported affinity to\n\npresent-day groups from northwestern Europe (GBR, CEU and FIN in\n\nthe 1000 Genomes Project (1000GP)) <sup>10</sup> but which we can resolve with\n\n3000 BCE 2000 BCE 1000 BCE 1000 CE 2000 CE\n\nScandinavia\n\nSouthern Europe\n\nBritain\n\nCentral\n\nEurope\n\nEastern Europe\n\nBA\n\nItaly\n\nCentral Europe\n\n3000 BCE 2000 BCE\n\nEBA\n\n1000 BCE\n\nTime\n\n0 1000 CE 2000 CE\n\nMLBA Wielbark Middle Ages\n\nLate Roman/Ottoman\n\nEarly Medieval\n\nBaiuvarii\n\nMedieval/present day\n\nEarly Medieval/Longobard Iron Roman\n\nPresent day\n\nPresent day BA/Scythian\n\nBell Beaker/EBA\n\nZohor\n\nSoutheastern Europe\n\nPoland\n\nBritain and Ireland\n\nScandinavia\n\n**e**\n\n**f**\n\n**d**\n\n**c**\n\n**b**\n\n**a**\n\nIron Roman\n\nIron/Republic Imperial Late Antiquity (Early) Medieval\n\nEarly Medieval\n\nPresent day\n\nPresent day Medieval Iron Roman BA\n\nBA EIA Viking Age Medieval Present day\n\nDriffeld\n\nTerrace\n\nTarquinia\n\nLate Etruscan\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n2000 BCE 0\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n3000 BCE 2000 BCE 1000 BCE 0 1000 CE 2000 CE\n\n### **Fig. 3 | Time transects across six geographical regions in Europe.**\n\n**a** - **f** , Ancestry change visualized over a time transect spanning from the Bronze\n\nAge to the present day in Poland ( **a** ), southeastern Europe ( **b** ), central Europe\n\n( **c** ), Italy ( **d** ), Britain and Ireland ( **e** ) and Scandinavia ( **f** ). The maps show sample\n\nlocations of all available ancient genomes with at least 0.5× coverage from\n\nthese regions (Supplementary Table 1). Their ancestry is shown on the same\n\nMDS model as in Fig. 2a for each time period. For each geographic region,\n\nthe early medieval period is highlighted in orange and the area in the MDS", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" - }, - { - "text": "[Notable researchers who hold this view include Anna Wierzbicka,](https://en.wikipedia.org/wiki/Anna_Wierzbicka) <sup>[96]</sup> Hakwan Lau and Matthias\n\nMichel. <sup>[97]</sup>\n\nWierzbicka (who is a linguist) argues that the vocabulary used by consciousness researchers (including\n\nwords like *experience* and *consciousness* [) are not universally translatable, and are \"parochially](https://en.wikipedia.org/wiki/Parochialism)\n\nEnglish.\" <sup>[96]</sup> Weirzbicka calls David Chalmers out by name for using these words, arguing that if\n\n##### **The \"hard-wired view\"**\n\n##### **The \"soft-wired view\"**", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia2.pdf" - }, - { - "text": "vidual was a gladiator or soldier, individuals and groups from northern\n\nEurope are indeed recorded in Roman sources both as soldiers and as\n\nenslaved gladiators <sup>63,64</sup> .\n\nAcross Europe, we see regional differences in the southeastern and\n\nsouthwestern expansions of Scandinavian-related ancestries. Early\n\nmedieval groups from present-day Poland and Slovakia carry spe-\n\ncific ancestry from one of the Scandinavian EIA groups—the one with\n\nindividuals primarily from the northern parts of Scandinavia in the\n\nEIA—with no evidence of ancestry related to the other primary group\n\nin more southern Scandinavia (Fig. 2d). By contrast, in southern and\n\nwestern Europe, Scandinavian-related ancestry either derives from\n\nEIA southern Scandinavia—as in the cases of the probable Baiuvarii\n\nin Germany, Longobard-associated burials in Italy and early medieval\n\nburials in southern Britain—or cannot be resolved to a specific region\n\nin Scandinavia. If these expansions are indeed linked to language, this\n\npattern is remarkably concordant with the main branches of Germanic\n\nlanguages, with the now-extinct eastern Germanic spoken by Goths in\n\nUkraine on the one hand, and western Germanic languages such as Old\n\nEnglish and Old High German recorded in the early medieval period\n\non the other hand.\n\n### **Influx into pre-Viking Age Scandinavia**\n\nIn EIA Scandinavia (<500 ce), we find evidence for broad genetic homo-\n\ngeneity. Specifically, individuals from Denmark (100 ce- 300 ce) were\n\nindistinguishable from contemporary people in the Scandinavian Pen-\n\ninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry\n\nalready in the eighth century ce (Late Iron Age/early Viking Age) on\n\nZealand (present-day Denmark) for which a 100% EIA ancestry model\n\nis rejected ( *P* = 1 × 10 <sup>−17</sup> using Twigstats; *P* = 7.5 × 10 <sup>−4</sup> without). This\n\nshift in ancestry persists among later Viking Age groups in Denmark,\n\nwhere all groups are modelled with varying proportions of ancestry\n\nrelated to Iron Age continental groups in central Europe (Figs. 3f\n\nand 4c). A non-parametric MDS of Viking Age individuals suggests\n\nthat variation between individuals forms a cline spanning from the\n\nEIA Scandinavian Peninsula individuals to ancestry characteristic of\n\ncentral Europe (Fig. 4e). The observed shift in ancestry in Denmark\n\ncannot be confounded by potentially earlier unknown gene flow into\n\nIron Age source groups in Austria, France and Germany, but such gene\n\nflow could affect the exact ancestry proportions.\n\nThese patterns are consistent with northward expansion of ancestry,\n\npotentially starting before the Viking Age, into the Jutland peninsula\n\nand Zealand island towards southern Sweden. The geographical ori-\n\ngin of this ancestry is currently difficult to discern, as the available\n\nsamples from Iron Age central Europe remain sparse. The timing\n\nof this expansion is constrained only by the samples available: this\n\nancestry is not observed in individuals from the Copenhagen area of\n\nDenmark (around 100 ce- 300 ce) <sup>6</sup> , an individual from the southern tip\n\nof Sweden (around 500 ce) <sup>16</sup> , individuals from the Sandby Borg mas-\n\nsacre site on Öland in present-day Sweden (around 500 ce) <sup>7</sup> and 31 indi-\n\nviduals from the mid-eighth century Salme ship burials in present-day\n\nEstonia (Extended Data Fig. 9), who probably originated in central\n\nSweden <sup>6</sup> . Therefore, this ancestry transformation most likely post-\n\ndated these individuals in each particular region and mostly occurred\n\nin the second half of the first millennium ce.\n\nTo assess the full extent of the impact of this ancestry influx into\n\nScandinavia, we next aimed to understand the ancestry of individu-\n\nals in Scandinavia during the Viking Age. Previous studies have sug-\n\ngested that there was a diversity of ancestries in Scandinavia during this\n\nperiod <sup>6,7,65</sup> , due to increased maritime mobility, but have not reported", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" - }, - { - "text": "501 European Agency for Safety and Health at Work, 2019: [The value of occupational safety and health and the ](https://osha.europa.eu/en/publications/value-occupational-safety-and-health-and-societal-costs-work-related-injuries-and)\n\n[societal costs of work-related injuries and diseases,](https://osha.europa.eu/en/publications/value-occupational-safety-and-health-and-societal-costs-work-related-injuries-and) Publications Office of the European Union, Luxembourg,\n\ndoi:10.2802/251128\n\n502 A hint in this direction gives the EWCS 1995 evaluating per occupation the responses to the question: ‘Is your\n\njob more difficult because of a chronic or permanent health problem by occupation?”. Between 72% and 81% of\n\nthe manually dominated occupations (agriculture, crafts, machine operators, elementary occupations) respond:\n\n‘No, never’, that is, between 19% and 28% of these occupations see such problems. Compared to this, between\n\n86% and 90% of the high-level clerk workers respond: ‘No, never’, that is, comparatively less, only between 10%\n\nand 14% see these problems.\n\n503 WHO: Cultural context of health and well-being, Policy brief No 1, Culture matters: using a cultural contexts of\n\nhealth approach to enhance policy-making, [Cultural context of health and well-being ](https://www.euro.who.int/en/health-topics/health-determinants/behavioural-and-cultural-insights-for-health/cultural-contexts-of-health-and-well-being)\n\n.", - "page_start": 160, - "page_end": 160, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "individuals form a clade with respect to reference groups. The reason\n\nwhy this is a principled approach despite the 1000GP groups post-dating\n\nthe ancient individuals is that if a group of ancient individuals are truly\n\nhomogeneous, they will be so also with respect to later individuals.\n\nWe then define clusters by running UPGMA (unweighted pair group\n\nmethod with arithmetic mean) on −log 10 [ *P* values] obtained from\n\nqpwave between all pairs of individuals and cut the resulting dendro-\n\ngram at a height corresponding to a *P* value of 0.01. We then further\n\nsubdivide clusters by requiring all samples to be within 500 years of\n\nthe mean cluster age.\n\nTo choose the source groups shown in Fig. 2a and Extended Data\n\nFig. 1d, we run this algorithm on samples from Iron and Roman Age\n\nEurope (Supplementary Table 1). We retain groups that have at least\n\nthree individuals and, therefore, exclude clusters of size one or two.\n\nThis approach results in two clusters in the Scandinavian Penin-\n\nsula, approximately separating northern from southern Scandinavia,\n\nthree clusters in Poland and Ukraine that separate samples tempo-\n\nrally between the early and later Bronze Age, a cluster combining the\n\nHungarian Scythian and Slovakian La Tène-associated individuals,\n\nand a cluster each for Iron and Roman Age Portugal, Italy and Lithu-\n\nania. In present-day Austria, Germany and France, this approach\n\nidentifies three clusters, with each cluster spanning multiple archae-\n\nological sites in different countries, indicating genetic diversity in\n\nthis region in the first millennium ce. Encouragingly, these clusters\n\nseparate in our non-parametric MDS analysis (Fig. 2a), indicating that\n\nwe are capturing real genetic differences between groups using this\n\napproach.\n\n**Fine-scale structure in Neolithic Europe.** To quantify fine-scale struc-\n\nture in Neolithic Europe (Extended Data Fig. 5b), we aimed to select\n\nindividuals in Neolithic Europe who have not yet been affected by the\n\narrival of Steppe ancestry and do not show excess hunter-gatherer\n\nancestry. We infer distal ancestry sources using Balkan_N, Yamnaya and\n\nWestern Hunter-gatherers as source groups and reference groups\n\naccording to a previously proposed qpAdm setup <sup>46</sup> (Supplementary\n\nTable 1). For this analysis, we infer ancestry using qpAdm applied to\n\n1.2 million SNP sites of imputed genomes. We retain only Neolithic\n\nindividuals with *P* > 0.01, *z* < 2 for Yamnaya ancestry, and *z* < 2 or\n\nproportion <0.25 for Western Hunter-gatherer ancestry.\n\n**Reporting summary**\n\nFurther information on research design is available in the Nature Port-\n\nfolio Reporting Summary linked to this article.\n\n**Data availability**\n\nAll aDNA data used in this study were publicly available, and accession\n\ncodes are listed in Supplementary Table 1.\n\n**Code availability**\n\nTwigstats is freely available under an MIT licence through GitHub\n\n[(https://github.com/leospeidel/twigstats), and detailed documenta-](https://github.com/leospeidel/twigstats)\n\n[tion, as well as example data, is available at https://leospeidel.github.](https://leospeidel.github.io/twigstats/)\n\n[io/twigstats/. The code has also been deposited at Zenodo (https://](https://zenodo.org/records/13833120)\n\n[zenodo.org/records/13833120)](https://zenodo.org/records/13833120) <sup>76</sup> . All scripts to reproduce simulations,\n\nand to run Relate on imputed ancient genomes, and downstream\n\nanalyses, including computation of *f* -statistics and running qpAdm\n\n[models, are available through GitHub (https://github.com/leospeidel/ ](https://github.com/leospeidel/twigstats_paper)\n\n[twigstats_paper).](https://github.com/leospeidel/twigstats_paper)\n\n70. Maier, R., Flegontov, P., Flegontova, O., Changmai, P. & Reich, D. On the limits of fitting\n\ncomplex models of population history to *f* -statistics. *eLife* **12** , e85492 (2023).\n\n71. Kelleher, J., Etheridge, A. M. & McVean, G. Efficient coalescent simulation and", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed3.pdf" - }, - { - "text": "### **Our Impact**\n\nCC believes that opening up knowledge is key to addressing the world’s most pressing challenges. Today, we steer campaigns, programming, and training in many areas:\n\n2023 was quite a year for the CC Open Culture Program, thanks to generous funding from **[Arcadia](https://www.arcadiafund.org.uk/)** . We grew our Open Culture team from one to two and a half staff, rolling out new initiatives like TAROC (Towards a Recommendation on Open Culture) and **[Open Culture Live:](https://creativecommons.org/tag/open-culture-live/) [A Webinar Series](https://creativecommons.org/tag/open-culture-live/)** . We invite you to read “ **[What did Creative](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [Commons do for Open Culture](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/) [in 2023?](https://creativecommons.org/2024/01/24/what-did-creative-commons-do-for-open-culture-in-2023/)** ” to learn more.\n\n###### **Open Culture**\n\nWe delivered workshops and presentations on CC Licenses and Open Educational Resources at over 16 conferences and events. The CC Open Education Platform [also funded six global projects,](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) **[including work to advance the](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [UNESCO Recommendation on](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [OER](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/) [.](https://creativecommons.org/2023/08/02/cc-open-education-platform-activities-2023/)**\n\n###### **Open Education**\n\nThanks to generous funding from the **[John D. and Catherine T.](https://www.macfound.org/) [MacArthur Foundation](https://www.macfound.org/)** , CC hosted its very first Open Journalism track at the CC Global Summit, including eight presentations, lightning talks, panel discussions, and workshops as well as a **[keynote](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/) [by Anya Kamenetz](https://creativecommons.org/2023/09/06/anya-kamenetz-to-keynote-cc-global-summit-2023/)** .\n\nRepresentatives from 33 news outlets and digital rights-focused organizations attended the CC Summit sessions. The Open Journalism track built on **[numerous collaborations and](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/) [workshops](https://creativecommons.org/2023/06/05/a-journalists-guide-to-creative-commons-2023/)** throughout 2023.\n\n###### **Open Journalism**\n\n[\"Follow the Color Brick Road\" by Bert Kaufmann is](https://www.flickr.com/photos/22746515@N02) [licensed under CC BY-SA 2.0.](https://creativecommons.org/licenses/by-sa/2.0/?ref=openverse)", - "page_start": 6, - "page_end": 6, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0806.pdf", - "query": "What do the timescales during which high-amplitude flaring events occur in blazars indicate?", - "target_page": 1, - "target_passage": "that much of the en- ergy is being produced deep within the jet on small, sub-parsec scales", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "## **3. VERITAS Blazar KSP**\n\nVERITAS observes for ∼ 750 h and ∼ 250 h each\n\nyear during periods of astronomical darkness and par-\n\ntial moonlight, respectively. The moonlight observa-\n\ntions are almost exclusively used for a blazar discovery\n\nprogram, and a large fraction of the dark time is used\n\nfor the blazar KSP, which consists of:\n\n- A VHE blazar discovery program ( ∼ 200 h / yr):\n\nEach year ∼ 10 targets are selected to receive\n\n∼ 10 h of observations each during astronomi-\n\ncal darkness. These data are supplemented by\n\ndiscovery observations during periods of partial\n\nmoonlight.\n\n- A target-of-opportunity (ToO) observation pro-\n\ngram ( ∼ 50 h / yr): VERITAS blazar obser-\n\nvations can be triggered by either a VERI-\n\nTAS blazar discovery, a VHE flaring alert ( > 2\n\nCrab) from the blazar monitoring program of\n\nthe Whipple 10-m telescope or from another\n\nVHE instrument, or a lower-energy flaring alert\n\n(optical, X-ray or Fermi-LAT). Should the guar-\n\nanteed allocation be exhausted, further time can\n\nbe requested from a pool of director’s discre-\n\ntionary time.\n\n- Multi-wavelength (MWL) studies of VHE\n\nblazars ( ∼ 50 h / yr + ToO): Each year one\n\nblazar receives a deep exposure in a pre-planned\n\ncampaign of extensive, simultaneous MWL (X-\n\nray, optical, radio) measurements. ToO observa-\n\ntion proposals for MWL measurements are also\n\nsubmitted to lower-energy observatories (e.g.\n\nSwift) and are triggered by a VERITAS discov-\n\nery or flaring alert.\n\n- Distant VHE blazar studies to constrain the ex-\n\ntragalactic background light (EBL): Here dis-\n\ntant targets are given a higher priority in the\n\nblazar discovery program, as well as for the\n\nMWL observations of known VHE blazars, par-\n\nticularly those with hard VHE spectra.\n\n## **4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are\n\nlargely high-frequency-peaked BL Lac objects. How-\n\never, the program also includes IBLs (intermediate-\n\npeaked) and LBLs (low-peaked), as well as flat spec-\n\ntrum radio quasars (FSRQs), in an attempt to in-\n\ncrease the types of blazars known to emit VHE γ -rays.\n\nThe observed targets are drawn from a target list con-\n\ntaining objects visible to the telescopes at reasonable\n\nzenith angles ( − 8 <sup>◦</sup> < δ < 72 <sup>◦</sup> ), without a previously\n\npublished VHE limit below 1.5% Crab, and with a\n\nmeasured redshift z < 0 . 3. To further the study of the\n\nEBL a few objects having a large ( z > 0 . 3) are also\n\nincluded in the target list. The target list includes:\n\n- All nearby ( z < 0 . 3) HBL and IBL recom-\n\nmended as potential VHE emitters in [5, 6, 7].\n\n- The X-ray brightest HBL ( z < 0 . 3) in the recent\n\nSedentary [8] and ROXA [9] surveys.\n\n- Four distant ( z > 0 . 3) BL Lac objects recom-\n\nmended by [5, 10].\n\n- Several FSRQ recommended as potential VHE\n\nemitters in [6, 11].\n\n- All nearby ( z < 0 . 3) blazars detected by\n\nEGRET [12].\n\n- All nearby ( z < 0 . 3) blazars contained in the\n\nFermi-LAT Bright AGN Sample [13].\n\n- All sources ( | b | > 10 <sup>◦</sup> ) detected by Fermi-LAT\n\nwhere extrapolations of their MeV-GeV γ -ray\n\nspectrum (including EBL absorption; assuming\n\nz = 0.3 if the redshift is unknown) indicates a\n\npossible VERITAS detection in less than 20 h.\n\nThis criteria is the focus of the 2009-10 VERI-\n\nTAS blazar discovery program.\n\n## **5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ -ray emission from\n\n16 AGN (15 blazars), including 8 VHE discoveries.\n\nThese AGN are shown in Table I, and each has been\n\ndetected by the Large Area Telescope (LAT) instru-\n\nment aboard the Fermi Gamma-ray Space Telescope.\n\nEvery blazar discovered by VERITAS was the sub-\n\nject of ToO MWL observations to enable modeling of\n\nits simultaneously-measured SED. The known VHE\n\nblazars detected by VERITAS were similarly the tar-\n\ngets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "**Submillimeter Variability and the Gamma-ray Connection in** * **Fermi** *\n\n**Blazars**\n\nA. Strom *Univ. of Arizona, AZ 85721, USA*\n\nA. Siemiginowska, M. Gurwell, B. Kelly *CfA, MA 02138, USA*\n\nWe present multi-epoch observations from the *Submillimeter Array* ( *SMA* ) for a sample of 171 bright blazars,\n\n43 of which were detected by *Fermi* during the first three months of observations. We explore the correlation\n\nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special\n\nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de-\n\ntermined using a combination of *Fermi* designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS),\n\nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate\n\nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands\n\nduring the months August- October 2008. The submillimeter light curves are modeled as first-order continuous\n\nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ-\n\nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity.\n\nAll of the the light curves are consistent with being produced by a single process that accounts for both low\n\nand high states, and there is additional evidence that objects may be transitioning between blazar class during\n\nflaring epochs.\n\n## **1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring\n\nevents occur in blazars indicate that much of the en-\n\nergy is being produced deep within the jet on small,\n\nsub-parsec scales [1, 2]. Understanding if/how emis-\n\nsion differs between blazar subclasses (i.e., BL Lacs\n\nobjects and flat-spectrum radio quasars (FSRQs))\n\nmay offer important insight into the similarity be-\n\ntween blazars and, furthermore, can provide con-\n\nstraints on the formation and acceleration of the jets\n\nthemselves.\n\nFor the synchrotron component of blazar spectra,\n\nthe low-frequency spectral break due to synchrotron\n\nself-absorption moves to higher frequencies as one\n\nmeasures closer to the base of the jet [2]. This of-\n\nten places the peak of the spectrum in the millime-\n\nter and submillimeter bands, where the emission is\n\noptically-thin and originates on parsec and sub-parsec\n\nscales [3], allowing direct observation of the most com-\n\npact regions near the central engine. The high en-\n\nergy *γ* -ray emission originates as a Compton process,\n\ntypically a combination of synchrotron-self-Compton\n\n(SSC) and external-radiation-Compton (ERC). De-\n\npending on the source properties, the synchrotron\n\nphotons or external photons are upscattered by the\n\nsame population of electrons that emit the millimeter\n\nand submillimeter spectra. Therefore the submillime-\n\nter and *γ* -ray emission are closely linked and give the\n\nfull information about the source emission.\n\nA systematic study of the submillimeter properties\n\nof the entire sample of *Fermi* blazars has yet to be con-\n\nducted and is one of the primary goals of our work. We\n\npresent here preliminary analysis of the submillimeter\n\nproperties of *Fermi* blazars detected by the *Submil-*\n\n*limeter Array* <sup>1</sup> ( *SMA* ) at 1mm and 850 *µ* m, including\n\nan investigation of variable behavior and the deter-\n\nmination of submillimeter energy spectral indices. In\n\naddition, we consider the connection to the observed\n\n*γ* -ray indices and luminosities.\n\n## **2.** * **SMA** * **BLAZARS**\n\nThe *Submillimeter Array* [4] consists of eight 6 m\n\nantennas located near the summit of Mauna Kea. The\n\n*SMA* is used in a variety of baseline configurations\n\nand typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as\n\nwell as correlated spectral hardening in both the VHE\n\nand X-ray bands. The VHE MWL observations were\n\nperformed in both ”quiescent” and flaring states for\n\nsome of the observed blazars. For the observed HBL\n\nobjects, the SEDs can be well described by a simple\n\nSSC model in both high and low states. However, an\n\nadditional external Compton component is necessary\n\nto adequately fit the SEDs of the IBL objects.\n\nThe Fermi-LAT is already having a significant im-\n\npact on the blazar KSP. In future seasons, the VER-\n\nITAS blazar discovery program will focus its dis-\n\ncovery program on hard-spectrum blazars detected\n\nby Fermi-LAT, and will likely have a greater focus\n\non high-risk/high-reward objects at larger redshifts\n\n(0 . 3 < z < 0 . 7). In addition, the number of VHE\n\nblazars studied in pre-planned MWL campaigns will\n\nincrease as data from the Fermi-LAT will be publicly\n\navailable. In particular, the extensive pre-planned\n\nMWL campaigns will focus on objects that are note-\n\nworthy for the impact their data may have on under-\n\nstanding the EBL. The simultaneous observations of\n\nblazars by VERITAS and Fermi-LAT will completely\n\nresolve the higher-energy SED peak, often for the first\n\ntime, enabling unprecedented constraints on the un-\n\nderlying blazar phenomena to be derived.\n\n### **Acknowledgments**\n\nThis research is supported by grants from the US\n\nDepartment of Energy, the US National Science Foun-\n\ndation, and the Smithsonian Institution, by NSERC in\n\nCanada, by Science Foundation Ireland, and by STFC\n\nin the UK. We acknowledge the excellent work of the\n\ntechnical support staff at the FLWO and the collab-\n\norating institutions in the construction and operation\n\nof the instrument.\n\n### **References**\n\n[1] F. Aharonian et al. 2007, ApJ , 664 , L71\n\n[2] F. Aharonian et al. 2006, Nature , 440 , 1018\n\n[3] F. Aharonian et al. 2007, A&A , 475 , L9\n\n[4] J. Holder, et al. 2008, AIPC , 1085 , 657\n\n[5] L. Costamante & G. Ghisellini 2002, A&A , 384 ,\n\n56\n\n[6] E.S. Perlman 2000, AIPC , 515 , 53\n\n[7] F.W. Stecker et al. 1996, ApJ , 473 , L75\n\n[8] P. Giommi et al. 2005, A&A , 434 , 385\n\n[9] S. Turriziani et al. 2007, A&A , 472 , 699\n\n[10] L. Costamante 2006, arXiv:0612709\n\n[11] P. Padovani et al. 2002, ApJ , 581 , 895\n\n[12] R. Muhkerjee et al. 2001, AIPC , 558 , 324\n\n[13] A.A. Abdo et al. 2009, ApJ , 700 , 597\n\n[14] V.A. Acciari et al. 2008, ApJ , 684 , L73\n\n[15] V.A. Acciari et al. 2009, ApJ , 707 , 612\n\n[16] V.A. Acciari et al. 2009, ApJ , 690 , L126\n\n[17] V.A. Acciari et al. 2009, ApJ , 693 , L104\n\n[[18] L.C. Reyes 2009, arXiv:0907.5175](http://arxiv.org/abs/0907.5175)\n\n[19] R.A. Ong 2009, ATel , 1941\n\n[20] R.A. Ong et al. 2009, ATel , 2272\n\n[21] V.A. Acciari et al. 2009, ApJ , 708 , L100\n\n[22] R.A. Ong et al. 2009, ATel , 2301\n\n[23] R.A. Ong et al. 2009, ATel , 2260\n\n[24] R.A. Ong et al. 2009, ATel , 2309\n\n[[25] W. Benbow 2009, arXiv:0908.1412](http://arxiv.org/abs/0908.1412)\n\n[26] V.A. Acciari et al. 2009, ApJ , submitted\n\n[27] V.A. Acciari et al. 2009, ApJ , 695 , 1370\n\n[28] V.A. Acciari et al. 2009, ApJ , in press\n\n[[29] J. Grube 2009, arXiv:0907.4862](http://arxiv.org/abs/0907.4862)\n\neConf C091122", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "Figure 5: Ratio of *γ* -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this\n\nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower\n\nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n\n*-* BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter vari-\n\nability or characteristic timescale, but our sam-\n\nple of BL Lacs may be dominated by high-\n\npeaked BL Lacs (HBLs), which exhibit obser-\n\nvational similarities with FSRQs.\n\n*-* Blazar submillimeter light curves are consistent with being produced by a single process that ac-\n\ncounts for both high and low states, with char-\n\nacteristic timescales 10 *< τ* rest *<* 500 days.\n\n*-* The blazars detected by *Fermi* have synchrotron peaks at higher frequencies, regardless of sub-\n\nmillimeter luminosity.\n\n*-* FSRQs exhibit higher ratios of *γ* -ray to sub- millimeter luminosity than BL Lacs (Figure 5),\n\nbut all objects inhabit a region of parameter\n\nspace suggesting transitions between states dur-\n\ning flaring epochs.\n\nAs *Fermi* continues to observe fainter sources, the\n\nsample of objects for which we can perform this type of\n\nanalysis will increase and provide better limits on our\n\nresults. To understand the physical relevance of these\n\nresults, however, it is important to be able to distin-\n\nguish between the difference in variability between BL\n\nLacs and FSRQs. One avenue for exploring this dif-\n\nference is to monitor changing submillimeter energy\n\nspectral index and the ratio of *γ* -ray to submillime-\n\nter luminosity as functions of time. The full mean-\n\ning of the results of our autoregressive method is not\n\nyet clear, and will require better-sampled blazar light\n\ncurves and the comparison between *τ* rest with physical\n\ntimescales such as the synchrotron cooling timescale.\n\nThese analyses would allow us to place constraints\n\non the processes occurring near the base of the jet in\n\nblazars and further understand the intimate connec-\n\ntion between them.\n\n## **Acknowledgments**\n\nThis work was supported in part by the NSF\n\nREU and DoD ASSURE programs under Grant no.\n\n0754568 and by the Smithsonian Institution. Par-\n\ntial support was also provided by NASA contract\n\nNAS8-39073 and NASA grant NNX07AQ55G. We\n\nhave made use of the SIMBAD database, operated at\n\nCDS, Strasbourg, France, and the NASA/IPAC Ex-\n\ntragalactic Database (NED) which is operated by the\n\nJPL, Caltech, under contract with NASA.\n\n**eConf C091122**", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 4: The *γ* -ray index versus submillimeter index plane. The blazars fall more steeply in the *γ* -rays than in the\n\nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full *SMA* sample,\n\nwhere the blazars are more distributed around *α* S *∼* 0.\n\nas the presence of SSC versus ERC. Here, we use sub-\n\nmillimeter luminosity as a proxy for jet power, which\n\nis correlated with the integrated luminosity of the syn-\n\nchrotron component. Elevated *γ* -ray luminosity with\n\nrespect to the synchrotron component (which is often\n\nseen in FSRQs) suggests the upscattering of external\n\nphotons off the synchrotron-emitting electrons. These\n\nobjects should occupy the upper right of the ratio/jet\n\npower plot, and BL Lacs, which generally exhibit com-\n\nponents with roughly comparable luminosities, should\n\noccupy the lower left. It is clear from the figure, how-\n\never, that many FSRQs exhibit ratios similar to those\n\nof the BL Lacs and vis versa.\n\nSikora et al. [10] report that, during its flaring\n\nepochs, 3C 454.3 transitions from its typical FSRQ\n\nstate to a more BL Lac-like state, where the syn-\n\nchrotron component emits much more strongly com-\n\npared to the *γ* -ray component than during its “low\n\nstate”. 3C 454.3, which is the highest submillime-\n\nter luminosity FSRQ in our sample, would then shift\n\ndown and to the right in Figure 5 when it enters a\n\nflaring period. For the first three months of the *Fermi*\n\nmission, 3C 454.3 was not flaring, which may explain\n\nits present location in Figure 5. The three objects for\n\nwhich there is a type discrepancy between CGRaBS\n\nand LBAS are all FSRQs (in CGRaBS) and exhibit\n\nlow luminosity ratios and high luminosity, which sug-\n\ngest they may be undergoing the same changes as 3C\n\n454.3. A possible interpretation of the elevated lumi-\n\nnosity ratios observed in some BL Lacs objects is that\n\nthere has been a dramatic increase in *γ* -ray luminos-\n\nity due to ERC, which would not be reflected in the\n\nsynchrotron component.\n\n## **5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub-\n\nmillimeter is to study behavior close to the central\n\nengine, where the jet material is presumably still be-\n\ning accelerated. The separate emission processes that\n\ncontribute to overall SED may present differently in\n\nBL Lacs and FSRQs, allowing us to understand the\n\nsimilarities and differences between blazar types. We\n\nhave investigated these differences between objects in\n\nterms of submillimeter behavior and, in conclusion,\n\nfind that\n\n*-* The *SMA* blazars exhibit submillimeter energy spectral indexes that follow the spectral se-\n\nquence interpretation of blazars.\n\n**eConf C091122**", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "[arXiv:1001.0770v1 [astro-ph.HE] 5 Jan 2010](http://arxiv.org/abs/1001.0770v1)\n\n## **VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration *Harvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645,* *USA*\n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is\n\nused to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is\n\ncurrently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration’s Key\n\nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class\n\nof identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which\n\nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE\n\nexposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including\n\n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected\n\nresults are presented.\n\n## **1. Introduction**\n\nActive galactic nuclei are the most numerous class\n\nof identified VHE γ -ray sources. These objects emit\n\nnon-thermal radiation across ∼ 20 orders of magnitude\n\nin energy and rank among the most powerful particle\n\naccelerators in the universe. A small fraction of AGN\n\npossess strong collimated outflows (jets) powered by\n\naccretion onto a supermassive black hole (SMBH).\n\nVHE γ -ray emission can be generated in these jets,\n\nlikely in a compact region very near the SMBH event\n\nhorizon. Blazars, a class of AGN with jets pointed\n\nalong the line-of-sight to the observer, are of par-\n\nticular interest in the VHE regime. Approximately\n\n30 blazars, primarily high-frequency-peaked BL Lacs\n\n(HBL), are identified as sources of VHE γ -rays, and\n\nsome are spectacularly variable on time scales com-\n\nparable to the light crossing time of their SMBH ( ∼ 2\n\nmin; [1]). VHE blazar studies probe the environment\n\nvery near the central SMBH and address a wide range\n\nof physical phenomena, including the accretion and\n\njet-formation processes. These studies also have cos-\n\nmological implications, as VHE blazar data can be\n\nused to strongly constrain primordial radiation fields\n\n(see the extragalactic background light (EBL) con-\n\nstraints from, e.g., [2, 3]).\n\nVHE blazars have double-humped spectral energy\n\ndistributions (SEDs), with one peak at UV/X-ray en-\n\nergies and another at GeV/TeV energies. The ori-\n\ngin of the lower-energy peak is commonly explained\n\nas synchrotron emission from the relativistic electrons\n\nin the blazar jets. The origin of the higher-energy\n\npeak is controversial, but is widely believed to be the\n\nresult of inverse-Compton scattering of seed photons\n\noff the same relativistic electrons. The origin of the\n\nseed photons in these leptonic scenarios could be the\n\nsynchrotron photons themselves, or photons from an\n\nexternal source. Hadronic scenarios are also plausible\n\nexplanations for the VHE emission, but generally are\n\nnot favored.\n\nContemporaneous multi-wavelength (MWL) obser-\n\nvations of VHE blazars, can measure both SED peaks\n\nand are crucial for extracting information from the\n\nobservations of VHE blazars. They are used to con-\n\nstrain the size, magnetic field and Doppler factor of\n\nthe emission region, as well as to determine the origin\n\n(leptonic or hadronic) of the VHE γ -rays. In leptonic\n\nscenarios, such MWL observations are used to mea-\n\nsure the spectrum of high-energy electrons producing\n\nthe emission, as well as to elucidate the nature of the\n\nseed photons. Additionally, an accurate measure of\n\nthe cosmological EBL density requires accurate mod-\n\neling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "future of the VERITAS blazar discovery program is\n\nclearly very bright.\n\nThe MWL aspect of the VERITAS blazar KSP has\n\nalso been highly successful. Every VERITAS obser-\n\nvation of a known, or newly discovered, VHE blazar\n\nhas been accompanied by contemporaneous MWL ob-\n\nservations. These data have resulted in the identifica-\n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "gets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included\n\nthe first VHE-detected IBL, W Comae [14, 15], and\n\nthe HBL 1ES 0806+524 [16]. VERITAS has discov-\n\nered 6 VHE blazars since the launch of Fermi. Three\n\nof these were initially observed by VERITAS prior to\n\nthe release of Fermi-LAT results, due to the X-ray\n\nbrightness of the synchrotron peaks of their SEDs.\n\nVHE emission from 3C 66A was discovered by VER-\n\nITAS in September 2008 [17] during a flaring episode\n\nthat was also observed by the Fermi-LAT [18]. The\n\nobserved flux above 200 GeV was 6% of the Crab Neb-\n\nula flux and the measured VHE spectrum was very\n\nsoft (Γ VHE ∼ 4 . 1). RGB J0710+591 was detected\n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "ferent event selection criteria (e.g. soft cuts optimized\n\nfor sources with Γ VHE > 4). The distribution of VHE\n\nflux upper limits is shown in Figure 1. These 49 VHE\n\nflux upper limits are generally the most-constraining\n\never reported for these objects.\n\n## **7. Multi-wavelength Studies of VHE Blazars**\n\nDuring the first three seasons of VERITAS obser-\n\nvations, pre-planned extensive MWL campaigns were\n\norganized for three blazars 1ES 2344+514 (2007-08),\n\n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009-\n\n10 - ongoing). In addition, numerous ToO MWL-\n\nobservation campaigns were performed. These include\n\ncampaigns for every blazar/AGN discovered by VER-\n\nITAS, and all include Swift (XRT and UVOT) data.\n\nAll MWL campaigns on the VHE blazars discovered\n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "circles represent the 850 *µ* m observations, and the open\n\ntriangles represent the 1mm observations.\n\nJ1751+096) which have conflicting classifications be-\n\ntween *Fermi* and CGRaBS. Some blazars found in the\n\ncalibrator list have been studied extensively (e.g., 3C\n\n279 and 3C 454.3) but the *SMA* blazars have not been\n\nstudied collectively.\n\nForty-four of the objects in our total blazar sample\n\nwere detected by *Fermi* and can be found in the cata-\n\nlog of LAT Bright AGN Sources (LBAS) from Abdo et\n\nal. [7]. J0050-094 has no redshift in either the LBAS\n\ncatalog or CGRaBS and is not included in our study.\n\nOf the 43 remaining sources, 14 are BL Lac objects\n\nand 29 are FSRQs, with 0 *.* 03 *≤* *z* *≤* 2 *.* 19. We examined submillimeter light curves for all of\n\nthe *SMA* blazars, with observations beginning in ap-\n\nproximately 2003 (see Figure 1). Typically, the 1mm\n\nband is much more well-sampled in comparison to the\n\n850m band, but visual inspection reveals that the reg-\n\nularity and quality of observations vary greatly from\n\nsource to source. Many of the objects exhibit non-\n\nperiodic variability, either in the form of persistent,\n\nlow-amplitude fluctuations or higher amplitude flar-\n\ning behavior.\n\n### **2.1. Submillimeter Properties**\n\n**Submillimeter Luminosities.** Since we are pri-\n\nmarily concerned with comparisons to *Fermi* observa-\n\ntions, we note that only 129 of the *SMA* blazars (23 BL\n\nLacs and 106 FSRQs) were observed by the *SMA* in\n\neither band during the three months August-October\n\n2008. For these objects, submillimeter luminosities\n\nare calculated in the standard way:\n\n*ν* *e* *L* *ν* *e* = 4 *πD* <sup>2</sup> L\n\n*ν* obs *F* obs\n\n1 + *z* *,* (1)\n\nwhere *D* L is the luminosity distance, *ν* obs is the fre-\n\nquency of the observed band, and *F* obs is the average\n\nFigure 2: Variability index for our sample (top: 1mm,\n\nbottom: 850 *µ* m), with FSRQs as the hatched\n\ndistribution and BL Lacs as the solid distribution. There\n\nis no signicant difference in the class distributions in\n\neither band; the “tail” to the left is populated by objects\n\nwith errors larger than the intrinsic variability.\n\nflux (in erg cm *<sup>−</sup>* <sup>2</sup> s *<sup>−</sup>* <sup>1</sup> Hz *<sup>−</sup>* <sup>1</sup> ) over the three month pe-\n\nriod. We adopt a lambda cold dark matter cosmology\n\nwith values of *H* 0 = 71 km s *<sup>−</sup>* <sup>1</sup> Mpc *<sup>−</sup>* <sup>1</sup> , Ω M = 0 *.* 27,\n\nand Λ = 0 *.* 73.\n\n**Energy Spectral Indices.** We derive submillime-\n\nter spectral energy indices from observations quasi-\n\nsimultaneous with the *Fermi* observations. To be con-\n\nsistent with the use of *α* *γ* , we define spectral energy in-\n\ndex as *νF* *ν* = *ν* *<sup>−</sup>* *<sup>α</sup>* <sup>S</sup> and calculate *α* S from the average\n\nof the energy spectral indices over the corresponding\n\nthree months. We only calculate *α* S for the 16 objects\n\n(8 BL Lacs and 35 FSRQs) with observations at both\n\n1mm and 850 *µ* m during this time frame.\n\n## **3. VARIABILITY ANALYSIS**\n\n### **3.1. Variability Index**\n\nWe roughly characterize the level of variability of\n\neach source using the variability index from Hovatta\n\net al. [8]:\n\n*V* = <sup>(</sup> *<sup>F</sup>* <sup>max</sup> *<sup>−</sup>* *<sup>σ</sup>* *<sup>F</sup>* <sup>max</sup> <sup>)</sup> *<sup>−</sup>* <sup>(</sup> *<sup>F</sup>* <sup>min</sup> <sup>+</sup> *<sup>σ</sup>* *<sup>F</sup>* <sup>min</sup> <sup>)</sup> ( *F* max *−* *σ* *F* max ) + ( *F* min + *σ* *F* min ) (2)\n\nFigure 2 shows the distribution for the *SMA* blazars.\n\nObjects with *V* *≤* 0 are typically unsuitable for more\n\n**eConf C091122**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0806.pdf", - "query": "Where is the Submillimeter Array?", - "target_page": 1, - "target_passage": "near the summit of Mauna Ke", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**Submillimeter Variability and the Gamma-ray Connection in** * **Fermi** *\n\n**Blazars**\n\nA. Strom *Univ. of Arizona, AZ 85721, USA*\n\nA. Siemiginowska, M. Gurwell, B. Kelly *CfA, MA 02138, USA*\n\nWe present multi-epoch observations from the *Submillimeter Array* ( *SMA* ) for a sample of 171 bright blazars,\n\n43 of which were detected by *Fermi* during the first three months of observations. We explore the correlation\n\nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special\n\nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de-\n\ntermined using a combination of *Fermi* designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS),\n\nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate\n\nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands\n\nduring the months August- October 2008. The submillimeter light curves are modeled as first-order continuous\n\nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ-\n\nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity.\n\nAll of the the light curves are consistent with being produced by a single process that accounts for both low\n\nand high states, and there is additional evidence that objects may be transitioning between blazar class during\n\nflaring epochs.\n\n## **1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring\n\nevents occur in blazars indicate that much of the en-\n\nergy is being produced deep within the jet on small,\n\nsub-parsec scales [1, 2]. Understanding if/how emis-\n\nsion differs between blazar subclasses (i.e., BL Lacs\n\nobjects and flat-spectrum radio quasars (FSRQs))\n\nmay offer important insight into the similarity be-\n\ntween blazars and, furthermore, can provide con-\n\nstraints on the formation and acceleration of the jets\n\nthemselves.\n\nFor the synchrotron component of blazar spectra,\n\nthe low-frequency spectral break due to synchrotron\n\nself-absorption moves to higher frequencies as one\n\nmeasures closer to the base of the jet [2]. This of-\n\nten places the peak of the spectrum in the millime-\n\nter and submillimeter bands, where the emission is\n\noptically-thin and originates on parsec and sub-parsec\n\nscales [3], allowing direct observation of the most com-\n\npact regions near the central engine. The high en-\n\nergy *γ* -ray emission originates as a Compton process,\n\ntypically a combination of synchrotron-self-Compton\n\n(SSC) and external-radiation-Compton (ERC). De-\n\npending on the source properties, the synchrotron\n\nphotons or external photons are upscattered by the\n\nsame population of electrons that emit the millimeter\n\nand submillimeter spectra. Therefore the submillime-\n\nter and *γ* -ray emission are closely linked and give the\n\nfull information about the source emission.\n\nA systematic study of the submillimeter properties\n\nof the entire sample of *Fermi* blazars has yet to be con-\n\nducted and is one of the primary goals of our work. We\n\npresent here preliminary analysis of the submillimeter\n\nproperties of *Fermi* blazars detected by the *Submil-*\n\n*limeter Array* <sup>1</sup> ( *SMA* ) at 1mm and 850 *µ* m, including\n\nan investigation of variable behavior and the deter-\n\nmination of submillimeter energy spectral indices. In\n\naddition, we consider the connection to the observed\n\n*γ* -ray indices and luminosities.\n\n## **2.** * **SMA** * **BLAZARS**\n\nThe *Submillimeter Array* [4] consists of eight 6 m\n\nantennas located near the summit of Mauna Kea. The\n\n*SMA* is used in a variety of baseline configurations\n\nand typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 5: Ratio of *γ* -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this\n\nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower\n\nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n\n*-* BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter vari-\n\nability or characteristic timescale, but our sam-\n\nple of BL Lacs may be dominated by high-\n\npeaked BL Lacs (HBLs), which exhibit obser-\n\nvational similarities with FSRQs.\n\n*-* Blazar submillimeter light curves are consistent with being produced by a single process that ac-\n\ncounts for both high and low states, with char-\n\nacteristic timescales 10 *< τ* rest *<* 500 days.\n\n*-* The blazars detected by *Fermi* have synchrotron peaks at higher frequencies, regardless of sub-\n\nmillimeter luminosity.\n\n*-* FSRQs exhibit higher ratios of *γ* -ray to sub- millimeter luminosity than BL Lacs (Figure 5),\n\nbut all objects inhabit a region of parameter\n\nspace suggesting transitions between states dur-\n\ning flaring epochs.\n\nAs *Fermi* continues to observe fainter sources, the\n\nsample of objects for which we can perform this type of\n\nanalysis will increase and provide better limits on our\n\nresults. To understand the physical relevance of these\n\nresults, however, it is important to be able to distin-\n\nguish between the difference in variability between BL\n\nLacs and FSRQs. One avenue for exploring this dif-\n\nference is to monitor changing submillimeter energy\n\nspectral index and the ratio of *γ* -ray to submillime-\n\nter luminosity as functions of time. The full mean-\n\ning of the results of our autoregressive method is not\n\nyet clear, and will require better-sampled blazar light\n\ncurves and the comparison between *τ* rest with physical\n\ntimescales such as the synchrotron cooling timescale.\n\nThese analyses would allow us to place constraints\n\non the processes occurring near the base of the jet in\n\nblazars and further understand the intimate connec-\n\ntion between them.\n\n## **Acknowledgments**\n\nThis work was supported in part by the NSF\n\nREU and DoD ASSURE programs under Grant no.\n\n0754568 and by the Smithsonian Institution. Par-\n\ntial support was also provided by NASA contract\n\nNAS8-39073 and NASA grant NNX07AQ55G. We\n\nhave made use of the SIMBAD database, operated at\n\nCDS, Strasbourg, France, and the NASA/IPAC Ex-\n\ntragalactic Database (NED) which is operated by the\n\nJPL, Caltech, under contract with NASA.\n\n**eConf C091122**", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" - }, - { - "text": "circles represent the 850 *µ* m observations, and the open\n\ntriangles represent the 1mm observations.\n\nJ1751+096) which have conflicting classifications be-\n\ntween *Fermi* and CGRaBS. Some blazars found in the\n\ncalibrator list have been studied extensively (e.g., 3C\n\n279 and 3C 454.3) but the *SMA* blazars have not been\n\nstudied collectively.\n\nForty-four of the objects in our total blazar sample\n\nwere detected by *Fermi* and can be found in the cata-\n\nlog of LAT Bright AGN Sources (LBAS) from Abdo et\n\nal. [7]. J0050-094 has no redshift in either the LBAS\n\ncatalog or CGRaBS and is not included in our study.\n\nOf the 43 remaining sources, 14 are BL Lac objects\n\nand 29 are FSRQs, with 0 *.* 03 *≤* *z* *≤* 2 *.* 19. We examined submillimeter light curves for all of\n\nthe *SMA* blazars, with observations beginning in ap-\n\nproximately 2003 (see Figure 1). Typically, the 1mm\n\nband is much more well-sampled in comparison to the\n\n850m band, but visual inspection reveals that the reg-\n\nularity and quality of observations vary greatly from\n\nsource to source. Many of the objects exhibit non-\n\nperiodic variability, either in the form of persistent,\n\nlow-amplitude fluctuations or higher amplitude flar-\n\ning behavior.\n\n### **2.1. Submillimeter Properties**\n\n**Submillimeter Luminosities.** Since we are pri-\n\nmarily concerned with comparisons to *Fermi* observa-\n\ntions, we note that only 129 of the *SMA* blazars (23 BL\n\nLacs and 106 FSRQs) were observed by the *SMA* in\n\neither band during the three months August-October\n\n2008. For these objects, submillimeter luminosities\n\nare calculated in the standard way:\n\n*ν* *e* *L* *ν* *e* = 4 *πD* <sup>2</sup> L\n\n*ν* obs *F* obs\n\n1 + *z* *,* (1)\n\nwhere *D* L is the luminosity distance, *ν* obs is the fre-\n\nquency of the observed band, and *F* obs is the average\n\nFigure 2: Variability index for our sample (top: 1mm,\n\nbottom: 850 *µ* m), with FSRQs as the hatched\n\ndistribution and BL Lacs as the solid distribution. There\n\nis no signicant difference in the class distributions in\n\neither band; the “tail” to the left is populated by objects\n\nwith errors larger than the intrinsic variability.\n\nflux (in erg cm *<sup>−</sup>* <sup>2</sup> s *<sup>−</sup>* <sup>1</sup> Hz *<sup>−</sup>* <sup>1</sup> ) over the three month pe-\n\nriod. We adopt a lambda cold dark matter cosmology\n\nwith values of *H* 0 = 71 km s *<sup>−</sup>* <sup>1</sup> Mpc *<sup>−</sup>* <sup>1</sup> , Ω M = 0 *.* 27,\n\nand Λ = 0 *.* 73.\n\n**Energy Spectral Indices.** We derive submillime-\n\nter spectral energy indices from observations quasi-\n\nsimultaneous with the *Fermi* observations. To be con-\n\nsistent with the use of *α* *γ* , we define spectral energy in-\n\ndex as *νF* *ν* = *ν* *<sup>−</sup>* *<sup>α</sup>* <sup>S</sup> and calculate *α* S from the average\n\nof the energy spectral indices over the corresponding\n\nthree months. We only calculate *α* S for the 16 objects\n\n(8 BL Lacs and 35 FSRQs) with observations at both\n\n1mm and 850 *µ* m during this time frame.\n\n## **3. VARIABILITY ANALYSIS**\n\n### **3.1. Variability Index**\n\nWe roughly characterize the level of variability of\n\neach source using the variability index from Hovatta\n\net al. [8]:\n\n*V* = <sup>(</sup> *<sup>F</sup>* <sup>max</sup> *<sup>−</sup>* *<sup>σ</sup>* *<sup>F</sup>* <sup>max</sup> <sup>)</sup> *<sup>−</sup>* <sup>(</sup> *<sup>F</sup>* <sup>min</sup> <sup>+</sup> *<sup>σ</sup>* *<sup>F</sup>* <sup>min</sup> <sup>)</sup> ( *F* max *−* *σ* *F* max ) + ( *F* min + *σ* *F* min ) (2)\n\nFigure 2 shows the distribution for the *SMA* blazars.\n\nObjects with *V* *≤* 0 are typically unsuitable for more\n\n**eConf C091122**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "and typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the\n\narray are compiled in a database known as the *SMA* Calibrator List <sup>2</sup> [5]. Essentially a collection of bright\n\nobjects (stronger than 750 mJy at 230 GHz and 1 Jy\n\nat 345 GHz), these sources are monitored regularly,\n\nboth during science observations and dedicated ob-\n\nserving tracks.\n\nTo select our sample, we identified objects in the\n\ncalibrator list that were also classified as BL Lacs or\n\nFSRQs by the Candidate Gamma-Ray Blazar Sur-\n\nvey [6, CGRaBS]. Of the 243 total objects in the\n\ncalibrator list, 171 (35 BL Lacs and 136 FSRQs)\n\nhave positive blazar class identifications, although\n\nthere are three sources (J0238+166, J0428-379, and\n\n1 The Submillimeter Array is a joint project between the\n\nSmithsonian Astrophysical Observatory and the Academia\n\nSinica Institute of Astronomy and Astrophysics and is funded\n\nby the Smithsonian Institution and the Academia Sinica.\n\n2 http://sma1.sma.hawaii.edu/callist/callist.html\n\n**eConf C091122**\n\narXiv:1001.0806v1 [astro-ph.HE] 6 Jan 2010 Figure 1: The *SMA* light curves for 3C 454.3. The open", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "Figure 4: The *γ* -ray index versus submillimeter index plane. The blazars fall more steeply in the *γ* -rays than in the\n\nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full *SMA* sample,\n\nwhere the blazars are more distributed around *α* S *∼* 0.\n\nas the presence of SSC versus ERC. Here, we use sub-\n\nmillimeter luminosity as a proxy for jet power, which\n\nis correlated with the integrated luminosity of the syn-\n\nchrotron component. Elevated *γ* -ray luminosity with\n\nrespect to the synchrotron component (which is often\n\nseen in FSRQs) suggests the upscattering of external\n\nphotons off the synchrotron-emitting electrons. These\n\nobjects should occupy the upper right of the ratio/jet\n\npower plot, and BL Lacs, which generally exhibit com-\n\nponents with roughly comparable luminosities, should\n\noccupy the lower left. It is clear from the figure, how-\n\never, that many FSRQs exhibit ratios similar to those\n\nof the BL Lacs and vis versa.\n\nSikora et al. [10] report that, during its flaring\n\nepochs, 3C 454.3 transitions from its typical FSRQ\n\nstate to a more BL Lac-like state, where the syn-\n\nchrotron component emits much more strongly com-\n\npared to the *γ* -ray component than during its “low\n\nstate”. 3C 454.3, which is the highest submillime-\n\nter luminosity FSRQ in our sample, would then shift\n\ndown and to the right in Figure 5 when it enters a\n\nflaring period. For the first three months of the *Fermi*\n\nmission, 3C 454.3 was not flaring, which may explain\n\nits present location in Figure 5. The three objects for\n\nwhich there is a type discrepancy between CGRaBS\n\nand LBAS are all FSRQs (in CGRaBS) and exhibit\n\nlow luminosity ratios and high luminosity, which sug-\n\ngest they may be undergoing the same changes as 3C\n\n454.3. A possible interpretation of the elevated lumi-\n\nnosity ratios observed in some BL Lacs objects is that\n\nthere has been a dramatic increase in *γ* -ray luminos-\n\nity due to ERC, which would not be reflected in the\n\nsynchrotron component.\n\n## **5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub-\n\nmillimeter is to study behavior close to the central\n\nengine, where the jet material is presumably still be-\n\ning accelerated. The separate emission processes that\n\ncontribute to overall SED may present differently in\n\nBL Lacs and FSRQs, allowing us to understand the\n\nsimilarities and differences between blazar types. We\n\nhave investigated these differences between objects in\n\nterms of submillimeter behavior and, in conclusion,\n\nfind that\n\n*-* The *SMA* blazars exhibit submillimeter energy spectral indexes that follow the spectral se-\n\nquence interpretation of blazars.\n\n**eConf C091122**", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - }, - { - "text": "gin of the interface magnetism then had to be inferred by\n\ncomparison to a series of reference samples <sup>7</sup> . Demonstra- tion of coupling between the bulk of the layers, i.e. , an\n\nexchange bias effect, would provide direct evidence of the\n\ninterface magnetic order. Moreover, such coupling would\n\noffer new means of manipulating the FM semiconductor\n\nspin state and utilizing the proximity polarization effect\n\nin a spintronic device.\n\nHere, we demonstrate an antiferromagnetic coupling\n\nand exchange bias in Fe/(Ga,Mn)As bilayer films, by\n\ncombining element-specific XMCD measurements and\n\nbulk-sensitive superconducting quantum interference de-\n\nvice (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers <sup>4,5</sup> (and in con-\n\ntrast to AFM coupled FM metal/FM metal exchange bias\n\nstructures <sup>10,11</sup> ) the layers are in direct contact without\n\na non-magnetic spacer in between. We distinguish in-\n\nterface and bulk (Ga,Mn)As layers that are respectively\n\nstrongly and weakly antiferromagnetically coupled to the\n\nFe overlayer. In agreement with Ref. <sup>7</sup> , the interface layer\n\nremains polarized at room temperature.\n\nThe Fe and (Ga,Mn)As layers of the present study\n\nwere both grown by molecular beam epitaxy in the same\n\nultra-high vacuum system, in order to ensure a clean in-\n\nterface between them. The (Ga,Mn)As layer of thickness\n\n10 to 50 nm was deposited on a GaAs(001) substrate\n\nat a temperature of 260 <sup>◦</sup> C, using previously established\n\nmethods <sup>3,8</sup> . A low Mn concentration of x ≈ 0 . 03 was\n\nchosen in order to avoid the formation of compensating\n\nMn interstitials. The substrate temperature was then\n\nreduced to ∼ 0 <sup>◦</sup> C, before depositing a 2 nm Fe layer,\n\nplus a 2 nm Al capping layer. In-situ reflection high\n\nenergy electron diffraction and ex-situ x-ray reflectivity\n\nand diffraction measurements confirmed that the layers\n\nare single-crystalline with sub-nm interface roughness.\n\nSQUID magnetometry measurements were performed us-\n\ning a Quantum Design Magnetic Property Measurement\n\nSystem. Mn and Fe L 2 , 3 x-ray absorption and XMCD", - "page_start": 0, - "page_end": 0, - "source_file": "1001.2449.pdf" - }, - { - "text": "Chapter 6. Storage pools\n\n*Figure 6-47 List of drives in an array*\n\nYou can use the CLI command **[lsarraymember](https://www.ibm.com/support/knowledgecenter/ST3FR7_8.2.0/com.ibm.storwize.v7000.820.doc/svc_lsarraymember.html?sc=ST3FR7_latest)** to get the same information with the CLI.\n\nProvide an array name or ID as the parameter to filter output by the array. If run without\n\narguments, the command lists all members of all configured arrays.\n\n**Properties**\n\nThis section shows all available array MDisk parameters: its state, capacity, RAID level, and\n\nothers.\n\nUse the CLI command **[lsarray](https://www.ibm.com/support/knowledgecenter/ST3FR7_8.2.0/com.ibm.storwize.v7000.820.doc/svc_lsarray.html?sc=ST3FR7_latest)** to get a list of all configured arrays. Use **lsarray** with array\n\nname or ID as the parameter to get extended information about the selected one, as shown in\n\nExample 6-21.\n\n*Example 6-21 lsarray output (truncated)*\n\nIBM_Storwize:ITSOV7K:superuser>lsarray\n\nmdisk_id mdisk_name status mdisk_grp_id mdisk_grp_name capacity\n\n0 mdisk0 online 0 mdiskgrp0 1.3TB\n\n16 Distributed_array online 1 mdiskgrp1 2.2TB\n\nIBM_Storwize:ITSOV7K:superuser>lsarray 16\n\nmdisk_id 16\n\nmdisk_name Distributed_array\n\nstatus online\n\nmode array\n\nmdisk_grp_id 1\n\nmdisk_grp_name mdiskgrp1\n\ncapacity 2.2TB\n\n<...>\n\n### **6.3 Working with external controllers and MDisks**\n\nIn IBM Spectrum Virtualize terminology, *Controllers* are external storage systems that\n\nprovide resources to be used as MDisks. Storwize V7000 supports external storage\n\ncontrollers that are attached through iSCSI and through Fibre Channel.", - "page_start": 248, - "page_end": 248, - "source_file": "sg247938.pdf" - }, - { - "text": "## **15**\n\n### **SPECIFICATIONS**\n\n1. Length of mechanical tube: 160mm\n\n2. Conjugate distance between object and image: 195mm\n\n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion)\n\n4. Illumination: Input 110V or 200V; Output: 20W\n\n5. Fine adjustment range: .002mm\n\n6. Coarse Adjustment Range: 20mm\n\n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm\n\n8. Condenser Elevation Range: 15mm\n\n9. Iris diaphragm aperture: 2mm-30mm\n\n##### **Objective Specifications**\n\n**Classification Working**\n\n**Distance Magnification Optical**\n\n**System Numerical**\n\n**Aperture**\n\n| Dry | 4x Adjustable Focus | 0.1 |\n|:---|:---|---:|\n| Dry | 10x | 0.25 |\n| Dry | 40x Spring Adjustable Focus | 0.65 |\n\n37.42mm\n\n0.57mm\n\nOil\n\nImmer-\n\nsion\n\n1.25 0.18mm 100x Spring\n\nAdjustable\n\nFocus\n\n7.14mm\n\nAchromatic\n\nObjective\n\nNote: For oil immersion, please use the index of refraction 1.515 oil\n\nPlain Field\n\nEyepiece 10x 18mm\n\n##### **Eyepiece Specifications**\n\n**Classification Magnification Field of View (FOV)**\n\n**Diameter**\n\n10x\n\n40x\n\n100x\n\n400x\n\n4x\n\n10x\n\n40x (s)\n\n1000x 100x (oil,s)\n\n##### **Total Magnification**\n\n**Objective**\n\n**Magnification Eyepiece**\n\n## **16**\n\n### **PARTS LIST**\n\n### **OPERATION**\n\n1. Remove all components from package. Identify all parts before\n\nassembling instrument.\n\n2. Attach 4x, 10x and 40x objectives by screwing into revolving\n\nturret. Tighten and secure to maximum finger pressure only.\n\n3. Place the specimen on the stage and secure with spring clips.\n\nNOTE: The cover glass must face upward (the thinner glass is\n\nthe cover glass), otherwise when the 40x objective is used the\n\nspecimen cannot be observed. Observation is best when the\n\nthickness of the cover glass is 0.1-1.1mm and the cover glass\n\nis 0.17mm.\n\n4. Plug power cord into an electrical outlet. Turn microscope\n\nlamp ON.\n\n5. Observe the specimen using the lowest magnification objective\n\nfirst. The 10x objective provides a larger field of view making it\n\neasier to search the specimen.\n\n**Name Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x (parfocal distance adjustable) |\n|:---|\n| 10x |\n| 40x (s) (parfocal distance adjustable) |\n| 100x (oil,s) (parfocal distance adjustable) |\n\n1\n\n1\n\n2\n\n1\n\n1\n\n1\n\n1\n\n1\n\n10x Wide Field Eyepiece w/Pointer\n\nAbbe Condenser NA1.25\n\nPlastic Dust Cover\n\nLens Cleaning Tissue\n\n1 Cedar Oil\n\n1 1A Fuse (spare)\n\nSpare 6V20W Halogen Bulb\n\nSpecification\n\nInspection Certificate\n\nPacking List\n\n1\n\n1\n\n1\n\n1\n\n1", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "*Figure 5-14 Relationship between OAM and Content Manager OnDemand*\n\n**Object naming conventions**\n\nThe *object name* identifies the object within a collection. The object name is unique within a\n\ncollection and it is provided by the Content Manager OnDemand application. Currently, no\n\ninstallation exits allow any customization of these names. The object name is composed of\n\nthe application group name and the load identifier within the application group portion of the\n\nload ID. The load identifier within the application group is composed of a numeric sequence\n\nnumber followed by a character string, such as FAAA. This string is then converted into two\n\nqualifiers of the object name:\n\n� L indicates that the object contains document data.\n\n� R indicates that the object contains resource data.\n\nThe application group name is added, and an object name looks like the following syntax:\n\nA BDA.L1.FAAA\n\nThe maximum size of an object is specified through the Content Manager OnDemand\n\nAdministrator Client when you define an application group. The default value is 10 MB.\n\nCurrently, the maximum size for an OAM object is 256 MB. The Content Manager OnDemand\n\nadministrator must be careful not to specify a value that exceeds this limit.\n\nFigure 5-15 on page 117 shows the window in which you can set up the index expiration for\n\nStorage Management when you define or update an application group.\n\n**Important:** In the current implementation, Content Manager OnDemand is not aware that\n\nan object was deleted by OAM based on the management class criteria that are set by the\n\nStorage Management component. A user can search for data that is no longer available.\n\nNo synchronization occurs between OAM object expiration and index expiration. Ensure\n\nthat you define the index expiration correctly when you define the application group.\n\nNeeded\n\nStorageGroup ACS Routine\n\nICF Catalog\n\nOAMAE.CLLCT001\n\nIf &ACSENVIR = Store\n\nSelect\n\nIf &DSN = ‘OAMAE.CLLCT001’\n\nSet &Storegroup = ‘GROUP001’\n\nOAMDATA\n\nDIRECTORYTOKEN-----GROUP001\n\nSMSDATA\n\nSTORAGECLASS---------SCDASD\n\nMANAGEMENTCLASS-------MCDASD\n\nGROUP001\n\nICF Catalog\n\nOAMAE.CLLCT001", - "page_start": 139, - "page_end": 139, - "source_file": "sg246915.pdf" - }, - { - "text": "30°\n\n35°\n\n140°\n\n135°\n\n130°\n\nV I C\n\nQ L D\n\nN S W\n\nN T\n\nWA\n\nAdelaide\n\n**20**\n\n**Challenger Gold Mine**\n\nSouth Australia\n\nSummary\n\nThe Challenger Mine produced 66,216 ounces\n\nof gold for the year with an average milled grade\n\nof 3.91 grams per tonne (g/t), and a total cash\n\ncost of $1,107 per ounce. The grade was low due\n\nto a shortfall in ore supply from the mine that was\n\nsupplemented by low grade ore from stockpiles.\n\nHigher dilution in stopes at the base of the mine\n\nand depletion on those levels due to the addi-\n\ntional displacement of the ore horizons following\n\nthe identification of the ‘215 Shear’, contributed\n\nto the lower than expected production from the\n\nlower levels. A shortfall in underground develop-\n\nment also limited access to ore sources.\n\nDevelopment and mining commenced at the\n\nhigher grade Challenger West orebody during\n\nthe year but was insufficient to offset the short-\n\nfall from the base of the mine.\n\nBecause of the poor ore recovery from the\n\nbottom of the mine and the drop in the gold\n\nprice, a strategic review of the mine operation\n\nwas carried out. This resulted in a new plan that\n\nfocuses on the higher grade Challenger West as\n\nthe main ore supply.\n\nOngoing improvements in site communications\n\ncontinued with the installation of a dedicated\n\nmicrowave link to the site. This greatly improves\n\nu\n\nOperations Report", - "page_start": 21, - "page_end": 21, - "source_file": "ASX_KCN_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "1001.0806.pdf", - "query": "How many blazars were observed by the SMA in either band during the three months August-October 2008?", - "target_page": 2, - "target_passage": "only 129 of the SMA blazars", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "## **3. VERITAS Blazar KSP**\n\nVERITAS observes for ∼ 750 h and ∼ 250 h each\n\nyear during periods of astronomical darkness and par-\n\ntial moonlight, respectively. The moonlight observa-\n\ntions are almost exclusively used for a blazar discovery\n\nprogram, and a large fraction of the dark time is used\n\nfor the blazar KSP, which consists of:\n\n- A VHE blazar discovery program ( ∼ 200 h / yr):\n\nEach year ∼ 10 targets are selected to receive\n\n∼ 10 h of observations each during astronomi-\n\ncal darkness. These data are supplemented by\n\ndiscovery observations during periods of partial\n\nmoonlight.\n\n- A target-of-opportunity (ToO) observation pro-\n\ngram ( ∼ 50 h / yr): VERITAS blazar obser-\n\nvations can be triggered by either a VERI-\n\nTAS blazar discovery, a VHE flaring alert ( > 2\n\nCrab) from the blazar monitoring program of\n\nthe Whipple 10-m telescope or from another\n\nVHE instrument, or a lower-energy flaring alert\n\n(optical, X-ray or Fermi-LAT). Should the guar-\n\nanteed allocation be exhausted, further time can\n\nbe requested from a pool of director’s discre-\n\ntionary time.\n\n- Multi-wavelength (MWL) studies of VHE\n\nblazars ( ∼ 50 h / yr + ToO): Each year one\n\nblazar receives a deep exposure in a pre-planned\n\ncampaign of extensive, simultaneous MWL (X-\n\nray, optical, radio) measurements. ToO observa-\n\ntion proposals for MWL measurements are also\n\nsubmitted to lower-energy observatories (e.g.\n\nSwift) and are triggered by a VERITAS discov-\n\nery or flaring alert.\n\n- Distant VHE blazar studies to constrain the ex-\n\ntragalactic background light (EBL): Here dis-\n\ntant targets are given a higher priority in the\n\nblazar discovery program, as well as for the\n\nMWL observations of known VHE blazars, par-\n\nticularly those with hard VHE spectra.\n\n## **4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are\n\nlargely high-frequency-peaked BL Lac objects. How-\n\never, the program also includes IBLs (intermediate-\n\npeaked) and LBLs (low-peaked), as well as flat spec-\n\ntrum radio quasars (FSRQs), in an attempt to in-\n\ncrease the types of blazars known to emit VHE γ -rays.\n\nThe observed targets are drawn from a target list con-\n\ntaining objects visible to the telescopes at reasonable\n\nzenith angles ( − 8 <sup>◦</sup> < δ < 72 <sup>◦</sup> ), without a previously\n\npublished VHE limit below 1.5% Crab, and with a\n\nmeasured redshift z < 0 . 3. To further the study of the\n\nEBL a few objects having a large ( z > 0 . 3) are also\n\nincluded in the target list. The target list includes:\n\n- All nearby ( z < 0 . 3) HBL and IBL recom-\n\nmended as potential VHE emitters in [5, 6, 7].\n\n- The X-ray brightest HBL ( z < 0 . 3) in the recent\n\nSedentary [8] and ROXA [9] surveys.\n\n- Four distant ( z > 0 . 3) BL Lac objects recom-\n\nmended by [5, 10].\n\n- Several FSRQ recommended as potential VHE\n\nemitters in [6, 11].\n\n- All nearby ( z < 0 . 3) blazars detected by\n\nEGRET [12].\n\n- All nearby ( z < 0 . 3) blazars contained in the\n\nFermi-LAT Bright AGN Sample [13].\n\n- All sources ( | b | > 10 <sup>◦</sup> ) detected by Fermi-LAT\n\nwhere extrapolations of their MeV-GeV γ -ray\n\nspectrum (including EBL absorption; assuming\n\nz = 0.3 if the redshift is unknown) indicates a\n\npossible VERITAS detection in less than 20 h.\n\nThis criteria is the focus of the 2009-10 VERI-\n\nTAS blazar discovery program.\n\n## **5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ -ray emission from\n\n16 AGN (15 blazars), including 8 VHE discoveries.\n\nThese AGN are shown in Table I, and each has been\n\ndetected by the Large Area Telescope (LAT) instru-\n\nment aboard the Fermi Gamma-ray Space Telescope.\n\nEvery blazar discovered by VERITAS was the sub-\n\nject of ToO MWL observations to enable modeling of\n\nits simultaneously-measured SED. The known VHE\n\nblazars detected by VERITAS were similarly the tar-\n\ngets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "**Submillimeter Variability and the Gamma-ray Connection in** * **Fermi** *\n\n**Blazars**\n\nA. Strom *Univ. of Arizona, AZ 85721, USA*\n\nA. Siemiginowska, M. Gurwell, B. Kelly *CfA, MA 02138, USA*\n\nWe present multi-epoch observations from the *Submillimeter Array* ( *SMA* ) for a sample of 171 bright blazars,\n\n43 of which were detected by *Fermi* during the first three months of observations. We explore the correlation\n\nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special\n\nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de-\n\ntermined using a combination of *Fermi* designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS),\n\nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate\n\nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands\n\nduring the months August- October 2008. The submillimeter light curves are modeled as first-order continuous\n\nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ-\n\nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity.\n\nAll of the the light curves are consistent with being produced by a single process that accounts for both low\n\nand high states, and there is additional evidence that objects may be transitioning between blazar class during\n\nflaring epochs.\n\n## **1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring\n\nevents occur in blazars indicate that much of the en-\n\nergy is being produced deep within the jet on small,\n\nsub-parsec scales [1, 2]. Understanding if/how emis-\n\nsion differs between blazar subclasses (i.e., BL Lacs\n\nobjects and flat-spectrum radio quasars (FSRQs))\n\nmay offer important insight into the similarity be-\n\ntween blazars and, furthermore, can provide con-\n\nstraints on the formation and acceleration of the jets\n\nthemselves.\n\nFor the synchrotron component of blazar spectra,\n\nthe low-frequency spectral break due to synchrotron\n\nself-absorption moves to higher frequencies as one\n\nmeasures closer to the base of the jet [2]. This of-\n\nten places the peak of the spectrum in the millime-\n\nter and submillimeter bands, where the emission is\n\noptically-thin and originates on parsec and sub-parsec\n\nscales [3], allowing direct observation of the most com-\n\npact regions near the central engine. The high en-\n\nergy *γ* -ray emission originates as a Compton process,\n\ntypically a combination of synchrotron-self-Compton\n\n(SSC) and external-radiation-Compton (ERC). De-\n\npending on the source properties, the synchrotron\n\nphotons or external photons are upscattered by the\n\nsame population of electrons that emit the millimeter\n\nand submillimeter spectra. Therefore the submillime-\n\nter and *γ* -ray emission are closely linked and give the\n\nfull information about the source emission.\n\nA systematic study of the submillimeter properties\n\nof the entire sample of *Fermi* blazars has yet to be con-\n\nducted and is one of the primary goals of our work. We\n\npresent here preliminary analysis of the submillimeter\n\nproperties of *Fermi* blazars detected by the *Submil-*\n\n*limeter Array* <sup>1</sup> ( *SMA* ) at 1mm and 850 *µ* m, including\n\nan investigation of variable behavior and the deter-\n\nmination of submillimeter energy spectral indices. In\n\naddition, we consider the connection to the observed\n\n*γ* -ray indices and luminosities.\n\n## **2.** * **SMA** * **BLAZARS**\n\nThe *Submillimeter Array* [4] consists of eight 6 m\n\nantennas located near the summit of Mauna Kea. The\n\n*SMA* is used in a variety of baseline configurations\n\nand typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "tion of correlated VHE and X-ray flux variability, as\n\nwell as correlated spectral hardening in both the VHE\n\nand X-ray bands. The VHE MWL observations were\n\nperformed in both ”quiescent” and flaring states for\n\nsome of the observed blazars. For the observed HBL\n\nobjects, the SEDs can be well described by a simple\n\nSSC model in both high and low states. However, an\n\nadditional external Compton component is necessary\n\nto adequately fit the SEDs of the IBL objects.\n\nThe Fermi-LAT is already having a significant im-\n\npact on the blazar KSP. In future seasons, the VER-\n\nITAS blazar discovery program will focus its dis-\n\ncovery program on hard-spectrum blazars detected\n\nby Fermi-LAT, and will likely have a greater focus\n\non high-risk/high-reward objects at larger redshifts\n\n(0 . 3 < z < 0 . 7). In addition, the number of VHE\n\nblazars studied in pre-planned MWL campaigns will\n\nincrease as data from the Fermi-LAT will be publicly\n\navailable. In particular, the extensive pre-planned\n\nMWL campaigns will focus on objects that are note-\n\nworthy for the impact their data may have on under-\n\nstanding the EBL. The simultaneous observations of\n\nblazars by VERITAS and Fermi-LAT will completely\n\nresolve the higher-energy SED peak, often for the first\n\ntime, enabling unprecedented constraints on the un-\n\nderlying blazar phenomena to be derived.\n\n### **Acknowledgments**\n\nThis research is supported by grants from the US\n\nDepartment of Energy, the US National Science Foun-\n\ndation, and the Smithsonian Institution, by NSERC in\n\nCanada, by Science Foundation Ireland, and by STFC\n\nin the UK. We acknowledge the excellent work of the\n\ntechnical support staff at the FLWO and the collab-\n\norating institutions in the construction and operation\n\nof the instrument.\n\n### **References**\n\n[1] F. Aharonian et al. 2007, ApJ , 664 , L71\n\n[2] F. Aharonian et al. 2006, Nature , 440 , 1018\n\n[3] F. Aharonian et al. 2007, A&A , 475 , L9\n\n[4] J. Holder, et al. 2008, AIPC , 1085 , 657\n\n[5] L. Costamante & G. Ghisellini 2002, A&A , 384 ,\n\n56\n\n[6] E.S. Perlman 2000, AIPC , 515 , 53\n\n[7] F.W. Stecker et al. 1996, ApJ , 473 , L75\n\n[8] P. Giommi et al. 2005, A&A , 434 , 385\n\n[9] S. Turriziani et al. 2007, A&A , 472 , 699\n\n[10] L. Costamante 2006, arXiv:0612709\n\n[11] P. Padovani et al. 2002, ApJ , 581 , 895\n\n[12] R. Muhkerjee et al. 2001, AIPC , 558 , 324\n\n[13] A.A. Abdo et al. 2009, ApJ , 700 , 597\n\n[14] V.A. Acciari et al. 2008, ApJ , 684 , L73\n\n[15] V.A. Acciari et al. 2009, ApJ , 707 , 612\n\n[16] V.A. Acciari et al. 2009, ApJ , 690 , L126\n\n[17] V.A. Acciari et al. 2009, ApJ , 693 , L104\n\n[[18] L.C. Reyes 2009, arXiv:0907.5175](http://arxiv.org/abs/0907.5175)\n\n[19] R.A. Ong 2009, ATel , 1941\n\n[20] R.A. Ong et al. 2009, ATel , 2272\n\n[21] V.A. Acciari et al. 2009, ApJ , 708 , L100\n\n[22] R.A. Ong et al. 2009, ATel , 2301\n\n[23] R.A. Ong et al. 2009, ATel , 2260\n\n[24] R.A. Ong et al. 2009, ATel , 2309\n\n[[25] W. Benbow 2009, arXiv:0908.1412](http://arxiv.org/abs/0908.1412)\n\n[26] V.A. Acciari et al. 2009, ApJ , submitted\n\n[27] V.A. Acciari et al. 2009, ApJ , 695 , 1370\n\n[28] V.A. Acciari et al. 2009, ApJ , in press\n\n[[29] J. Grube 2009, arXiv:0907.4862](http://arxiv.org/abs/0907.4862)\n\neConf C091122", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" - }, - { - "text": "future of the VERITAS blazar discovery program is\n\nclearly very bright.\n\nThe MWL aspect of the VERITAS blazar KSP has\n\nalso been highly successful. Every VERITAS obser-\n\nvation of a known, or newly discovered, VHE blazar\n\nhas been accompanied by contemporaneous MWL ob-\n\nservations. These data have resulted in the identifica-\n\neConf C091122", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" - }, - { - "text": "circles represent the 850 *µ* m observations, and the open\n\ntriangles represent the 1mm observations.\n\nJ1751+096) which have conflicting classifications be-\n\ntween *Fermi* and CGRaBS. Some blazars found in the\n\ncalibrator list have been studied extensively (e.g., 3C\n\n279 and 3C 454.3) but the *SMA* blazars have not been\n\nstudied collectively.\n\nForty-four of the objects in our total blazar sample\n\nwere detected by *Fermi* and can be found in the cata-\n\nlog of LAT Bright AGN Sources (LBAS) from Abdo et\n\nal. [7]. J0050-094 has no redshift in either the LBAS\n\ncatalog or CGRaBS and is not included in our study.\n\nOf the 43 remaining sources, 14 are BL Lac objects\n\nand 29 are FSRQs, with 0 *.* 03 *≤* *z* *≤* 2 *.* 19. We examined submillimeter light curves for all of\n\nthe *SMA* blazars, with observations beginning in ap-\n\nproximately 2003 (see Figure 1). Typically, the 1mm\n\nband is much more well-sampled in comparison to the\n\n850m band, but visual inspection reveals that the reg-\n\nularity and quality of observations vary greatly from\n\nsource to source. Many of the objects exhibit non-\n\nperiodic variability, either in the form of persistent,\n\nlow-amplitude fluctuations or higher amplitude flar-\n\ning behavior.\n\n### **2.1. Submillimeter Properties**\n\n**Submillimeter Luminosities.** Since we are pri-\n\nmarily concerned with comparisons to *Fermi* observa-\n\ntions, we note that only 129 of the *SMA* blazars (23 BL\n\nLacs and 106 FSRQs) were observed by the *SMA* in\n\neither band during the three months August-October\n\n2008. For these objects, submillimeter luminosities\n\nare calculated in the standard way:\n\n*ν* *e* *L* *ν* *e* = 4 *πD* <sup>2</sup> L\n\n*ν* obs *F* obs\n\n1 + *z* *,* (1)\n\nwhere *D* L is the luminosity distance, *ν* obs is the fre-\n\nquency of the observed band, and *F* obs is the average\n\nFigure 2: Variability index for our sample (top: 1mm,\n\nbottom: 850 *µ* m), with FSRQs as the hatched\n\ndistribution and BL Lacs as the solid distribution. There\n\nis no signicant difference in the class distributions in\n\neither band; the “tail” to the left is populated by objects\n\nwith errors larger than the intrinsic variability.\n\nflux (in erg cm *<sup>−</sup>* <sup>2</sup> s *<sup>−</sup>* <sup>1</sup> Hz *<sup>−</sup>* <sup>1</sup> ) over the three month pe-\n\nriod. We adopt a lambda cold dark matter cosmology\n\nwith values of *H* 0 = 71 km s *<sup>−</sup>* <sup>1</sup> Mpc *<sup>−</sup>* <sup>1</sup> , Ω M = 0 *.* 27,\n\nand Λ = 0 *.* 73.\n\n**Energy Spectral Indices.** We derive submillime-\n\nter spectral energy indices from observations quasi-\n\nsimultaneous with the *Fermi* observations. To be con-\n\nsistent with the use of *α* *γ* , we define spectral energy in-\n\ndex as *νF* *ν* = *ν* *<sup>−</sup>* *<sup>α</sup>* <sup>S</sup> and calculate *α* S from the average\n\nof the energy spectral indices over the corresponding\n\nthree months. We only calculate *α* S for the 16 objects\n\n(8 BL Lacs and 35 FSRQs) with observations at both\n\n1mm and 850 *µ* m during this time frame.\n\n## **3. VARIABILITY ANALYSIS**\n\n### **3.1. Variability Index**\n\nWe roughly characterize the level of variability of\n\neach source using the variability index from Hovatta\n\net al. [8]:\n\n*V* = <sup>(</sup> *<sup>F</sup>* <sup>max</sup> *<sup>−</sup>* *<sup>σ</sup>* *<sup>F</sup>* <sup>max</sup> <sup>)</sup> *<sup>−</sup>* <sup>(</sup> *<sup>F</sup>* <sup>min</sup> <sup>+</sup> *<sup>σ</sup>* *<sup>F</sup>* <sup>min</sup> <sup>)</sup> ( *F* max *−* *σ* *F* max ) + ( *F* min + *σ* *F* min ) (2)\n\nFigure 2 shows the distribution for the *SMA* blazars.\n\nObjects with *V* *≤* 0 are typically unsuitable for more\n\n**eConf C091122**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" - }, - { - "text": "ferent event selection criteria (e.g. soft cuts optimized\n\nfor sources with Γ VHE > 4). The distribution of VHE\n\nflux upper limits is shown in Figure 1. These 49 VHE\n\nflux upper limits are generally the most-constraining\n\never reported for these objects.\n\n## **7. Multi-wavelength Studies of VHE Blazars**\n\nDuring the first three seasons of VERITAS obser-\n\nvations, pre-planned extensive MWL campaigns were\n\norganized for three blazars 1ES 2344+514 (2007-08),\n\n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009-\n\n10 - ongoing). In addition, numerous ToO MWL-\n\nobservation campaigns were performed. These include\n\ncampaigns for every blazar/AGN discovered by VER-\n\nITAS, and all include Swift (XRT and UVOT) data.\n\nAll MWL campaigns on the VHE blazars discovered\n\neConf C091122", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" - }, - { - "text": "[arXiv:1001.0770v1 [astro-ph.HE] 5 Jan 2010](http://arxiv.org/abs/1001.0770v1)\n\n## **VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration *Harvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645,* *USA*\n\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is\n\nused to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is\n\ncurrently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration’s Key\n\nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class\n\nof identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which\n\nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE\n\nexposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including\n\n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected\n\nresults are presented.\n\n## **1. Introduction**\n\nActive galactic nuclei are the most numerous class\n\nof identified VHE γ -ray sources. These objects emit\n\nnon-thermal radiation across ∼ 20 orders of magnitude\n\nin energy and rank among the most powerful particle\n\naccelerators in the universe. A small fraction of AGN\n\npossess strong collimated outflows (jets) powered by\n\naccretion onto a supermassive black hole (SMBH).\n\nVHE γ -ray emission can be generated in these jets,\n\nlikely in a compact region very near the SMBH event\n\nhorizon. Blazars, a class of AGN with jets pointed\n\nalong the line-of-sight to the observer, are of par-\n\nticular interest in the VHE regime. Approximately\n\n30 blazars, primarily high-frequency-peaked BL Lacs\n\n(HBL), are identified as sources of VHE γ -rays, and\n\nsome are spectacularly variable on time scales com-\n\nparable to the light crossing time of their SMBH ( ∼ 2\n\nmin; [1]). VHE blazar studies probe the environment\n\nvery near the central SMBH and address a wide range\n\nof physical phenomena, including the accretion and\n\njet-formation processes. These studies also have cos-\n\nmological implications, as VHE blazar data can be\n\nused to strongly constrain primordial radiation fields\n\n(see the extragalactic background light (EBL) con-\n\nstraints from, e.g., [2, 3]).\n\nVHE blazars have double-humped spectral energy\n\ndistributions (SEDs), with one peak at UV/X-ray en-\n\nergies and another at GeV/TeV energies. The ori-\n\ngin of the lower-energy peak is commonly explained\n\nas synchrotron emission from the relativistic electrons\n\nin the blazar jets. The origin of the higher-energy\n\npeak is controversial, but is widely believed to be the\n\nresult of inverse-Compton scattering of seed photons\n\noff the same relativistic electrons. The origin of the\n\nseed photons in these leptonic scenarios could be the\n\nsynchrotron photons themselves, or photons from an\n\nexternal source. Hadronic scenarios are also plausible\n\nexplanations for the VHE emission, but generally are\n\nnot favored.\n\nContemporaneous multi-wavelength (MWL) obser-\n\nvations of VHE blazars, can measure both SED peaks\n\nand are crucial for extracting information from the\n\nobservations of VHE blazars. They are used to con-\n\nstrain the size, magnetic field and Doppler factor of\n\nthe emission region, as well as to determine the origin\n\n(leptonic or hadronic) of the VHE γ -rays. In leptonic\n\nscenarios, such MWL observations are used to mea-\n\nsure the spectrum of high-energy electrons producing\n\nthe emission, as well as to elucidate the nature of the\n\nseed photons. Additionally, an accurate measure of\n\nthe cosmological EBL density requires accurate mod-\n\neling of the blazar’s intrinsic VHE emission that can\n\nonly be performed with contemporaneous MWL ob-\n\nservations.\n\n## **2. VERITAS**\n\nVERITAS, a stereoscopic array of four 12-m", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0770.pdf" - }, - { - "text": "and typically operates in the 1mm and 850 *µ* m win-\n\ndows, achieving spatial resolution as fine as 0.25” at\n\n850 *µ* m. The sources used as phase calibrators for the\n\narray are compiled in a database known as the *SMA* Calibrator List <sup>2</sup> [5]. Essentially a collection of bright\n\nobjects (stronger than 750 mJy at 230 GHz and 1 Jy\n\nat 345 GHz), these sources are monitored regularly,\n\nboth during science observations and dedicated ob-\n\nserving tracks.\n\nTo select our sample, we identified objects in the\n\ncalibrator list that were also classified as BL Lacs or\n\nFSRQs by the Candidate Gamma-Ray Blazar Sur-\n\nvey [6, CGRaBS]. Of the 243 total objects in the\n\ncalibrator list, 171 (35 BL Lacs and 136 FSRQs)\n\nhave positive blazar class identifications, although\n\nthere are three sources (J0238+166, J0428-379, and\n\n1 The Submillimeter Array is a joint project between the\n\nSmithsonian Astrophysical Observatory and the Academia\n\nSinica Institute of Astronomy and Astrophysics and is funded\n\nby the Smithsonian Institution and the Academia Sinica.\n\n2 http://sma1.sma.hawaii.edu/callist/callist.html\n\n**eConf C091122**\n\narXiv:1001.0806v1 [astro-ph.HE] 6 Jan 2010 Figure 1: The *SMA* light curves for 3C 454.3. The open", - "page_start": 0, - "page_end": 0, - "source_file": "1001.0806.pdf" - }, - { - "text": "gets of MWL observations.\n\n### **5.1. Recent VERITAS Blazar Discoveries**\n\nPrior to the launch of Fermi VERITAS had discov-\n\nered VHE emission from 2 blazars. These included\n\nthe first VHE-detected IBL, W Comae [14, 15], and\n\nthe HBL 1ES 0806+524 [16]. VERITAS has discov-\n\nered 6 VHE blazars since the launch of Fermi. Three\n\nof these were initially observed by VERITAS prior to\n\nthe release of Fermi-LAT results, due to the X-ray\n\nbrightness of the synchrotron peaks of their SEDs.\n\nVHE emission from 3C 66A was discovered by VER-\n\nITAS in September 2008 [17] during a flaring episode\n\nthat was also observed by the Fermi-LAT [18]. The\n\nobserved flux above 200 GeV was 6% of the Crab Neb-\n\nula flux and the measured VHE spectrum was very\n\nsoft (Γ VHE ∼ 4 . 1). RGB J0710+591 was detected\n\neConf C091122", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" - }, - { - "text": "Figure 4: The *γ* -ray index versus submillimeter index plane. The blazars fall more steeply in the *γ* -rays than in the\n\nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full *SMA* sample,\n\nwhere the blazars are more distributed around *α* S *∼* 0.\n\nas the presence of SSC versus ERC. Here, we use sub-\n\nmillimeter luminosity as a proxy for jet power, which\n\nis correlated with the integrated luminosity of the syn-\n\nchrotron component. Elevated *γ* -ray luminosity with\n\nrespect to the synchrotron component (which is often\n\nseen in FSRQs) suggests the upscattering of external\n\nphotons off the synchrotron-emitting electrons. These\n\nobjects should occupy the upper right of the ratio/jet\n\npower plot, and BL Lacs, which generally exhibit com-\n\nponents with roughly comparable luminosities, should\n\noccupy the lower left. It is clear from the figure, how-\n\never, that many FSRQs exhibit ratios similar to those\n\nof the BL Lacs and vis versa.\n\nSikora et al. [10] report that, during its flaring\n\nepochs, 3C 454.3 transitions from its typical FSRQ\n\nstate to a more BL Lac-like state, where the syn-\n\nchrotron component emits much more strongly com-\n\npared to the *γ* -ray component than during its “low\n\nstate”. 3C 454.3, which is the highest submillime-\n\nter luminosity FSRQ in our sample, would then shift\n\ndown and to the right in Figure 5 when it enters a\n\nflaring period. For the first three months of the *Fermi*\n\nmission, 3C 454.3 was not flaring, which may explain\n\nits present location in Figure 5. The three objects for\n\nwhich there is a type discrepancy between CGRaBS\n\nand LBAS are all FSRQs (in CGRaBS) and exhibit\n\nlow luminosity ratios and high luminosity, which sug-\n\ngest they may be undergoing the same changes as 3C\n\n454.3. A possible interpretation of the elevated lumi-\n\nnosity ratios observed in some BL Lacs objects is that\n\nthere has been a dramatic increase in *γ* -ray luminos-\n\nity due to ERC, which would not be reflected in the\n\nsynchrotron component.\n\n## **5. CONCLUSIONS**\n\nThe motivation for observing blazars in the sub-\n\nmillimeter is to study behavior close to the central\n\nengine, where the jet material is presumably still be-\n\ning accelerated. The separate emission processes that\n\ncontribute to overall SED may present differently in\n\nBL Lacs and FSRQs, allowing us to understand the\n\nsimilarities and differences between blazar types. We\n\nhave investigated these differences between objects in\n\nterms of submillimeter behavior and, in conclusion,\n\nfind that\n\n*-* The *SMA* blazars exhibit submillimeter energy spectral indexes that follow the spectral se-\n\nquence interpretation of blazars.\n\n**eConf C091122**", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_MRM_2000.pdf", - "query": "How big is the Mermaid fleet?", - "target_page": 12, - "target_passage": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "### O P E R AT I O N S R E V I E W\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this\n\ntechnique by the cyclone season in 2001.\n\nAs more vessels seek protection, additional breakwaters can be constructed and sea room\n\ndredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four\n\nvessel specific mooring lines secured to special attachment points on the vessel.\n\nMany smaller vessels including Mermaid’s will be lifted from the water and tied down on purpose\n\nbuilt cradles for cyclones.\n\n##### **F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or\n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is\n\nsuitable for development in its present state.\n\nThe spoil produced from dredging will allow Mermaid to achieve full utilization of the site at a\n\nfraction of the cost of importing fill from elsewhere.\n\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services\n\nsuch as traffic flows, land allocation and security, as well as fulfilling the many and complex\n\nregulatory requirements related to health, safety, quarantine, environmental management, dust,\n\ndangerous goods and hazchem materials have been the subject of considerable study prior to this\n\nimplementation stage. 13\n\n* **The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.** *\n\nMERMAID MARINE\n\nAUSTRALIA LIMITED", - "page_start": 16, - "page_end": 16, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n7\n\nTrading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine\n\nAustralia Ltd (“Company”) and its controlled entities, experienced a 43% turnover reduction\n\nfrom last year. The result was almost entirely due to a heavy fall in oil prices, which reached their\n\nlow of US$10 in February 1999, leading to the lowest level of offshore activity for many years.\n\nIn September 1999 Mermaid exercised its option to acquire the utility vessel “Mermaid\n\nAchiever” for $3,250,000. Previously the Achiever operated under a bare boat charter.\n\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister\n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier\n\nBase). Since that time a detailed environmental management system has been produced for final\n\napproval and as a guide to daily environmental management and compliance. Refinements to\n\nthe design have proceeded, together with the preparation of bid packages and negotiations with\n\nBanks for project finance.\n\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough\n\nEngineering will see an extremely robust balance sheet, with cash on hand approaching $10 million.\n\nAs construction commences at Dampier, a level of project finance will be arranged providing a\n\ncomfortable mix of debt and equity and allowing the retention of a significant cash balance.\n\nThe year saw considerable progress with Base activities at Dampier, Broome and Darwin. They\n\nare dealt with in detail under following headings.\n\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax\n\nprofit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease\n\nof 43% over the previous period. Fixed cost reductions enabled the Company to ride out the\n\nmarket reversal with a minimal loss and positive operating cash before capex of $1.6m. This\n\nresult, achieved against a major drop in turnover, was possible through a vigorous attack on\n\noverheads, which included more beneficial ownership costs, insurance savings, management\n\nsalary savings, including voluntary sacrifice from certain senior executives in recognition of the\n\ntighter conditions. In all the changes contributed approximately $1.5million to the bottom line.\n\nBare boat charters, although useful for the busy times encountered in 1998 exposed the\n\nCompany to a high level of fixed costs. The vessels were valuable earners and the transfer of the\n\nMermaid Achiever, Mermaid Eagle and Mermaid Reunion to Company ownership has proved\n\nto be the right decision for all market conditions. Although there have been no contracts yet let\n\nfor work of any significance by producers on the North West Shelf, underlying day to day activity\n\nhas returned. Expressions of interest for major project work have been issued and as an indication\n\nof better trading conditions, an unaudited profit of $496,721 has been recorded for the two\n\nmonths to 31st August 2000. The trend has continued in September.\n\nO V E RV I E W\n\nF I N A N C I A L", - "page_start": 10, - "page_end": 10, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n20\n\nDuring 2000 Mermaid Marine formed a\n\nnew business unit Mermaid Labour and Management Limited. The focus of this unit will be\n\nlabour supply and industrial relations management to the marine, offshore construction industry\n\nand onshore resources projects in the NW of Australia. The Directors and Management of the\n\nnew entity are very experienced, well known and regarded by the industry in general. The\n\ncompany has high expectations for Mermaid Labour and Management Limited.\n\nMermaid remains dedicated to ensuring a safe environment in all areas where we operate or have\n\nresponsibility.\n\nIn April 2000, following the regular six monthly Quality Assurance audit, the Company’s\n\naccreditation under AS/NZS/ISO 9002 was reconfirmed. Mermaid’s quality assurance and\n\ncompliance team continues with a continuous day to day effort to improve our health, safety and\n\nenvironmental performance. Stringent charterer requirements, which are a pre requisite of\n\nincreased vessel usage, must be met to the letter and are the subject of regular and demanding\n\naudits. Although time consuming and expensive, we are grateful to certain of the large\n\nproducers, who while demanding the highest levels of compliance, have also been prepared to\n\ngive their time, sharing their safety expertise with us and in that way assisting in the very major\n\nadvances our company has made in this all important area.\n\nAt the time of writing this report, Mermaid had accumulated 348 days without a Lost Time\n\nInjury. A fine achievement and a continuing record.\n\nM E R M A I D L A B O U R A N D M A N A G E M E N T L I M I T E D\n\nS A F E T Y", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n19\n\nDarwin is serviced by three marine infrastructure elements.\n\na. A public port adjacent to the main business centre, which is destined to be redeveloped\n\nas a cruise ship and tourism precinct .\n\nb. A group of freehold water front properties on Frances Bay near to the main business\n\ncenter.\n\nc. A recently commissioned public port and industrial estate at East Arm some 25 km from\n\nthe main business district.\n\nDarwin already has an abundance of shore based logistics service providers who operate from\n\nonshore industrial estates through publicly owned facilities.\n\nThe Northern Territory Government has sponsored a study to determine the marine\n\ninfrastructure deficits of the Darwin area. Mermaid has contributed to the study and is\n\nmonitoring the subsequent planning processes.\n\nRegardless of industry trends, Mermaid has a need for a Darwin Base to service and care for\n\nMermaid vessels working in the area. Too often vessels have been demobilised to Dampier at the\n\nconclusion of a contract then being required to return to Darwin within days or weeks for\n\nanother assignment.\n\nMermaid has decided that needs and opportunities in the north of Australia can be best served by\n\nentering a co-operative arrangement with an established Darwin Company. Agreement has therefore\n\nbeen reached with Perkins Shipping Group, who are one of the freehold land owners on Frances Bay.\n\nPerkins Shipping, established in the 1950s is the major coastal shipping service provider in\n\nAustralia’s north, linking Darwin to mining and aboriginal committees from the Kimberly to\n\nGulf of Carpenteria. Additionally Perkins operate services to East Timor, mining operations in\n\nIndonesia, as well as Singapore and East Malaysia. The Perkins and Mermaid businesses are\n\ndifferent, but complementary, offering benefits to both. The arrangement with Perkins will give\n\nMermaid well placed office facilities, open storage and waterfront access.\n\nOur intention is that Darwin become the third and final mainland entreport to service the\n\nNorthwestern offshore oil and gas industry together with our other strategically placed facilities\n\nat Dampier and Broome.", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "ANNUAL REPORT 2000\n\nANNUAL REPORT 2000 MERMAID MARINE AUSTRALIA LIMITED\n\nACN 083 185 693", - "page_start": 0, - "page_end": 0, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n17\n\n##### **G. SLIPWAY.**\n\nAustralia, and particularly the north west is impoverished in terms of infrastructure to service\n\nour marine industries. Some of this has been due to a historical link with our recent industrial\n\npast. This is now behind us, and Australia has now become a centre of excellence with respect\n\nto both new building and ship repair, particularly for high tech and specialty vessels.\n\nThe Mermaid slipway will be the third such facility on the western half of the continent , with\n\nothers located at Fremantle and Darwin.\n\nThe slipway will be a repair only facility, no new building is contemplated. Its capacity is\n\nstructured to meet the regional steel mono-hulled fleet requirements of some 60 vessels between\n\n200 and 4000 tonne displacement. Fishing industry, marine tourist industry, large private\n\npleasure craft , naval, scientific and law enforcement vessels are a secondary target.\n\nThe slipway is designed to initially accept vessels up to 2,700 tonnes, a restriction which is set\n\nby our current inventory of cradles used to support vessel on the slip. The cradles will be\n\nprogressively upgraded to ultimately handle 4000 tonne. A later expansion will allow 500 tonne\n\nvessels to be side slipped, thereby increasing capacity.\n\nThe slipway location and orientation on the Base has been chosen to maximize the cost and load\n\nbearing benefits of having a very high strength granite bedrock as the best possible foundation.\n\nThe Mermaid slipway will rank second in terms of capacity on the western half of the continent.\n\nTenix, Fremantle 8,000 tonne, Mermaid Dampier 2,700 tonne rising to 4,000 tonne, Darwin Ship\n\nRepair 2,500 tonne. The nearest other facilities are Singapore, Adelaide, Port Moresby or Cairns.\n\nMermaid has purchased a very large cyclone rated industrial building\n\nframe which will be sited beside the slipway and tenanted by Mermaid\n\nengineering and companies which will provide ancillary services\n\nrelated to ship repair.\n\n* **The Northwest Shelf is a** *\n\n* **world scale offshore oil and** *\n\n* **gas exploration province.** *", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### C H A I R M A N ’ S R E P O R T\n\n5\n\nDirector of the Clough Group and a highly experienced and talented executive. Richard has\n\nappointed an alternate director, Mr Chris Sutherland, a senior Clough Executive, with\n\nengineering qualifications and associated business skills to assist him.\n\nCaptain Jim Carver, Mermaid’s founder continues to play a significant role in Mermaid’s operations,\n\npaying particular attention to our business at sea. Under 20 years of Jim’s leadership, Mermaid\n\ndeveloped an enviable reputation as a “can do” company, and in our drive for new engineering\n\nexpertise and professionalism, we have no intention of allowing that attitude to be lost.\n\nLast year we identified Broome as our next strategic position. No oil and gas work had been\n\nsupported out of Broome for seventeen years and with the valuable cooperation and assistance\n\nof the Broome Port Authority, we secured Inpex, the large Japanese resource company as our first\n\nclient. The base was then established early this year.\n\nA new focus has developed in the Browse Basin and it is pleasing to report that after only seven\n\nmonths operation, our Base is profitable, housing Inpex, BHP, Woodside and Sedco in support\n\nof their current drilling programs. All the holes drilled from the Broome Base have been\n\ndesignated as commercial finds by the explorers and the very major increase in the reserves at\n\nBrecknock, Woodside’s permit 500 kilometres north of Broome creates optimism for future\n\nproduction based in the Broome area.\n\nDarwin was next on our list, enabling involvement in Timor Sea oil and gas activity. The Bayu\n\nUndan project operated by Phillips, is well advanced and will impact Darwin’s offshore activity\n\nquite soon. Pursuing the formula for a strategic sea/land interface, we reached agreement with\n\nPerkins Shipping in Darwin, to set up an office at their Frances Drive facility. Perkins Shipping\n\nis synonymous with Darwin’s history. Set up by V.B. Perkins in the late 40’s, it has grown to\n\nsignificant size, operating its ships across the top of Australia and into South East Asia. There\n\nare many synergies which Mermaid shares with Perkins and we look forward to developing our\n\nDarwin business in close association with that fine old Company.\n\nOur ambitions for the support of the oil and gas industry now go beyond bases and vessels. Early\n\nin the current financial year, Mermaid acquired 50% of the OIS MOC Joint Venture Pty Ltd, to\n\nbe paid for by the issue of 800,000 Mermaid shares. OIS MOC owns the highly successful labour\n\nhire business operated by Kevin Ponga and Rick De Franck. Kevin Ponga is now General\n\nManager of Mermaid Labour & Management Pty Limited and Mr De Franck becomes a Director.\n\nWith their reputation and talent added to Mermaid’s experienced team, this labour hire\n\ncompany has become a significant force and can be expected to be in the final when major\n\nlabour hire contracts are let.", - "page_start": 8, - "page_end": 8, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### NOTES TO AND FORMING PART OF THE FINANCIAL STATEMENTS\n\n### FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\n\n46\n\n##### **Note Consolidated Company**\n\n## **2000 1999 2000 1999**\n\n##### **$ $ $ $**\n\n## **11. INVESTMENTS**\n\nAt cost:\n\nUnlisted investment - shares\n\ncontrolled in entities - - 2,444,611 2,444,611\n\n##### **Country of Ownership Ownership**\n\n##### **Incorporation Interest 2000 Interest 1999**\n\n##### **% %**\n\n##### **Parent Entity**\n\nMermaid Marine Australia Limited Australia\n\n##### **Controlled Entities**\n\nMermaid Marine Group Pty Ltd* Australia 100 100\n\nMermaid Marine Vessel Operations Pty Ltd* Australia 100 100\n\nMermaid Marine Pty Ltd* Australia 100 100\n\nMermaid Marine Offshore Pty Ltd* Australia 100 100\n\nMermaid Marine Charters Pty Ltd* Australia 100 100\n\nMermaid Supply Base Pty Ltd* Australia 100 100\n\nDampier Stevedoring Pty Ltd* Australia 100 100\n\nMermaid Manning and Management Pty Ltd* Australia 100 100\n\n* Pursuant to ASIC Class Order 98/1418, relief has been granted to these wholly owned controlled\n\nentities from the Corporations Law requirements for preparation, audit and lodgement of the financial\n\nreport. As a condition of the Class Order, Mermaid Marine Australia Limited and the controlled\n\nentities entered into a Deed of Cross Guarantee on 24 June 1999.\n\n##### **Note Consolidated Company**\n\n## **2000 1999 2000 1999**\n\n##### **$ $ $ $**\n\n## **12. OTHER NON CURRENT ASSETS**\n\nFuture income tax benefit\n\n- timing differences 664,722 318,202 - -\n\n## **13. INTANGIBLES**\n\nGoodwill arising on consolidation - 95,105 - -\n\nWrite off of goodwill - (95,105) - -\n\n- - - -\n\n## **14. ACCOUNTS PAYABLE**\n\nTrade payables 1,844,206 1,079,327 - 55,590\n\nOther payables and accruals 519,300 534,897 - 42,785\n\n2,363,506 1,614,224 - 98,375", - "page_start": 49, - "page_end": 49, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n11\n\nvessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which\n\nmeans there will be very few occasions when the largest vessels in the industry have to make a\n\ntide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will\n\nnot suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby\n\nDamper Public Wharf in terms of entry and departure draft restrictions.\n\nThe function and purpose of Berth 1 will be:\n\n- To service the larger offshore supply boat market on a fast turnaround basis.\n\n- To receive and offload very heavy ro/ro cargoes up to 1500 tonne delivered by ocean going\n\nheavy lift ships and barges.\n\n- To handle inbound and outbound cargoes related to major offshore pipe lay projects.\n\n- To receive and efficiently load reel ships used for deep water small diameter pipelay.\n\nThe wharf will be an earth filled structure with steel sheet pile faces and concrete capping beam\n\nsurround. Most of the construction will be performed using land based equipment working from\n\nthe core of the earth filled system.\n\nMuch effort has gone into a design concept which allows very large cranes (>100 tonne\n\ncapacity) to operate without restriction on the wharf.\n\nThe separation between Berth 1 and Berth 2 is such to allow Road Train Triples (the max\n\nallowable) to turn unassisted on the wharf.\n\n##### **C. QUAY WALL (BERTH 2)**\n\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted\n\noperation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas\n\nindustry and mineral ports. This berth will offer excellent weather protection for small and\n\nmedium size vessels.\n\n##### **D. BREAKWATER.**\n\nThe rubble mount type breakwater will be an extension of the wharf, constructed using core and\n\narmor rock largely won from excavations on the Base. The excavations created will become\n\ndepositories for dredge spoil.\n\nBecause the storm surge associated with major cyclones can be up to 7 m above chart datum (low\n\ntide), before imposing the wave height, a fully protective breakwater is not practical. The", - "page_start": 14, - "page_end": 14, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "MERMAID MARINE AUSTRALIA LIMITED\n\nA.C .N. 083 185 693\n\nCORPORATE DIRECTORY\n\n##### * **Directors** *\n\nAlan Birchmore, Chairman\n\nMark Bradley, Director, CEO\n\nJames Carver, Executive Director\n\nDerrice Dillon, Executive Director\n\nJeff Mews, Non-Executive Director\n\nRichard Reid, Non-Executive Director\n\n##### * **Company Secretary** *\n\nBrendan Gore\n\nNeil Roberts\n\nREGISTERED OFFICE\n\nEagle Jetty,\n\n20 Mews Road,\n\nFremantle,\n\nWestern Australia 6160.\n\nTelephone: 61 8 9431 7431\n\nFacsimile: 61 8 9431 7432\n\nEmail: corporate@mermaidmarine.com.au\n\nInternet Site: www.mermaidmarine.com.au", - "page_start": 1, - "page_end": 1, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_MRM_2000.pdf", - "query": "What was the budget for the expansion of Dampier Base?", - "target_page": 14, - "target_passage": "a capital budget of $13m", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges,\n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing\n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance.\n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the\n\nwork increased productivity through enhanced bollard pull and consequent earnings.\n\nSafety was given the highest priority through new monitoring systems and awareness programs.\n\nFormalised on the job instruction and training courses have also lifted levels of experience and\n\nproficiency across the workforce.\n\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all\n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup\n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and\n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by\n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there\n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced\n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000.\n\nSince receiving approval in principle for development of the Dampier Base from the Western\n\nAustralian Minister for the Environment in February 2000, engineering and general design work\n\nin connection with the base proceeded at an accelerated pace.\n\nThis work, assisted by technical studies and a re-assessment of an increased demand for services\n\narising out of greater expectations for growth in the sector, has led to improvements and\n\nexpansion of capacity over earlier plans.\n\nThe Dampier Base will now comprise:-\n\nAn “all tides” approach channel to a minimum depth of 6 metres\n\nA wharf offering 7.5 metres depth at low tide, featuring a heavy loadout section to\n\naccommodate modules of up to 1500 tonnes to onshore projects on the Burrup Peninsular\n\nand adjacent mining centres. A subsea pipe reel loading facility will encourage the use of\n\nspool ships in the region for deepwater pipelay. On a project by project basis, pipeline\n\nprotection rock dumping, specialist vessel rig up activities and the like will be facilitated,\n\nas will dry and bulk cargo handling, refuelling, watering and all categories of waste\n\nreception. The joint Commonwealth and WA State Government initiative to establish\n\nan integrated industrial estate at Jervoise Bay (south of Perth) serviced by high wide load\n\ncorridors from Perth’s industrial areas will see the heavy capacity wharf playing a strategic\n\nrole in major capital works in the Pilbara, leading to significant cost savings.\n\n### O P E R AT I O N S R E V I E W\n\n8\n\nS E A G O I N G O P E R AT I O N S\n\nDA M P I E R B A S E\n\n## **-**\n\n## **-**", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n9\n\nA slipway initially capable of receiving vessels up to 2,700 tonnes capacity will handle\n\nmost of the 60 vessels currently working in the region, a considerable number, but one\n\nwhich will rise over coming years. First class engineering facilities have been planned\n\nand highly experienced management recruited. Alternative slipways offering\n\ncomparable capacity are only to be found in Darwin or Fremantle, a sea journey of\n\napproximately 1000 miles from this operational region. Australia has emerged as a\n\ncentre of excellence with respect to vessel repair work, the Dampier facility will both\n\nbenefit from and protect that valuable reputation.\n\nRehabilitated land for buildings and storage will finally extend over 17 hectares. The\n\nmajor oilfield services company Halliburton, have been attracted to the base as a\n\ntenant and a $1.1m purpose built building is being constructed for their use.\n\nNegotiations are also proceeding with other groups who recognise the unique\n\nadvantages of operating from this strategically positioned Base. Rental income and\n\nassociated revenues such as plant and labour hire will contribute significantly to the\n\noverall economics of the facility.\n\nProtected moorings for cyclone shelter will be established inside the breakwater for\n\nlong term lease to local tug operators. The demand arises from serious vessel and crew\n\nsafety considerations. The Dampier Port Authority are reluctant to see the continued\n\nuse of cyclone moorings in the Harbour, not only for safety reasons, but for\n\nenvironmental concerns as well. Oil spills are not acceptable under any circumstances\n\nand will be avoided whatever the cost. Tug owners share similar concerns, but in\n\naddition they need to remain in a position of readiness for crews and equipment to\n\nresume their important functions immediately following a cyclonic event. The number\n\nof specific purpose spread moorings, detailed on the adjacent plan will total 10 in the\n\nfirst phase of construction, a limit which will be assisted by an ability to remove vessels\n\nup to 100 tonnes from the water by wharf crane for tie down on cradles.\n\nConstruction of the Dampier Base commenced on the 9th\n\nOctober this year, with an expectation that all major elements\n\nof the project will be largely completed within 12 months.\n\n* **The “Clough Challenge” Barge -** *\n\n* **Shallow Water Construction Support Barge** *\n\n* **in the East Spar Field** *\n\n## **-**\n\n## **-**\n\n## **-**", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n7\n\nTrading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine\n\nAustralia Ltd (“Company”) and its controlled entities, experienced a 43% turnover reduction\n\nfrom last year. The result was almost entirely due to a heavy fall in oil prices, which reached their\n\nlow of US$10 in February 1999, leading to the lowest level of offshore activity for many years.\n\nIn September 1999 Mermaid exercised its option to acquire the utility vessel “Mermaid\n\nAchiever” for $3,250,000. Previously the Achiever operated under a bare boat charter.\n\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister\n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier\n\nBase). Since that time a detailed environmental management system has been produced for final\n\napproval and as a guide to daily environmental management and compliance. Refinements to\n\nthe design have proceeded, together with the preparation of bid packages and negotiations with\n\nBanks for project finance.\n\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough\n\nEngineering will see an extremely robust balance sheet, with cash on hand approaching $10 million.\n\nAs construction commences at Dampier, a level of project finance will be arranged providing a\n\ncomfortable mix of debt and equity and allowing the retention of a significant cash balance.\n\nThe year saw considerable progress with Base activities at Dampier, Broome and Darwin. They\n\nare dealt with in detail under following headings.\n\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax\n\nprofit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease\n\nof 43% over the previous period. Fixed cost reductions enabled the Company to ride out the\n\nmarket reversal with a minimal loss and positive operating cash before capex of $1.6m. This\n\nresult, achieved against a major drop in turnover, was possible through a vigorous attack on\n\noverheads, which included more beneficial ownership costs, insurance savings, management\n\nsalary savings, including voluntary sacrifice from certain senior executives in recognition of the\n\ntighter conditions. In all the changes contributed approximately $1.5million to the bottom line.\n\nBare boat charters, although useful for the busy times encountered in 1998 exposed the\n\nCompany to a high level of fixed costs. The vessels were valuable earners and the transfer of the\n\nMermaid Achiever, Mermaid Eagle and Mermaid Reunion to Company ownership has proved\n\nto be the right decision for all market conditions. Although there have been no contracts yet let\n\nfor work of any significance by producers on the North West Shelf, underlying day to day activity\n\nhas returned. Expressions of interest for major project work have been issued and as an indication\n\nof better trading conditions, an unaudited profit of $496,721 has been recorded for the two\n\nmonths to 31st August 2000. The trend has continued in September.\n\nO V E RV I E W\n\nF I N A N C I A L", - "page_start": 10, - "page_end": 10, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n10\n\nWork on Dampier\n\nBase expansion commenced on 9 October and will be largely complete by June 2001, involving\n\na capital budget of $13m.\n\nThe principle activities and facility developments involved in the expansion are:\n\n##### **A. DREDGING**\n\nApproximately 700,000 m3 of material is to be dredged in King Bay to form an entrance\n\nchannel, vessel berths, cyclone moorings and to provide access to the slipway.\n\nThe experience of Woodside constructing their nearby base in 1981 indicates that two types of\n\ndredges will be required, a Cutter Suction to remove the soft unconsolidated material (approx.70%)\n\nand a Dipper Dredge (barge mounted back-hoe) to remove harder consolidated material.\n\nThe Cutter Suction dredge size will be deliberately modest due to onshore spoil management\n\nrequirement and environmental considerations.\n\nThe Dipper Dredge will be the largest of its type in the world, and will be an ideal remedial\n\ndredging tool using the experience gained from the earlier Woodside project.\n\nThe layout of the Base has been very much driven by the desire to avoid or minimize blasting\n\nwhile fulfilling functional objectives.\n\nThe entrance channel into the Mermaid Base will be 30 m wide and dredged to 6 m below chart\n\ndatum. The dredge spoil will be pumped ashore and used as fill around the Base.\n\nDredges are expected to be onsite for approximately 7 months commencing mid November.\n\n##### **B. QUAY WALL ( BERTH 1)**\n\nMarket research and customer needs have caused Mermaid to relocate and redesign the main\n\nberth to accommodate a wider range of vessels than originally contemplated. The berth is now\n\nlocated in deeper water with better vessel access.\n\nThe regional offshore fleet characteristics have been changing in terms of vessel size. There are\n\nnow four vessels operating in the region with 12,000 to 18,000 hp. When design commenced\n\nthere were none of this size.\n\nThe depth alongside Berth 1 will be 7.5m. King Bay has a statistical average extreme low tide\n\n(MLWS) of 0.9 m, the occurrence of which can be expressed in hours per month. The largest\n\nB A S E E X PA N S I O N W O R K S A N D E N V I RO N M E N TA L M A N A G E M E N T", - "page_start": 13, - "page_end": 13, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n18\n\nMermaid Marine services base at the Port of Broome (Broome Base)\n\ncommenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex\n\nBrowse Ltd arrived from Japan.\n\nAs a result of Mermaid’s efforts in establishing the Broome Base, Inpex Browse Ltd., BHP Petroleum\n\nand Woodside have used Broome as their base for drilling a total of four (4) offshore wells.\n\nIt is presently expected that at least six\n\n(6) exploration wells will be drilled in the\n\narea during 2001. The Base now employs\n\nas many as ten (10) staff up from the\n\nthree (3) who commenced in February\n\n2000. Excellent management and staff\n\ncompetence are the prime factors, which\n\nhave delivered the smooth start up and\n\ncontinued success at Broome.\n\nThe base is currently secured on a come and go lease arrangement, located on Port premises\n\nadjacent to the wharf gates. Although convenient, with an excellent cyclone proof building, the\n\nsite has limitations in terms of size and slope. An area more suitable for our long term needs has\n\nbeen optioned from Port authorities and discussions will proceed with our clients this year to\n\ndetermine their precise needs.\n\nThe success of Browse Basin wells drilled this year, strong developments in the energy sector and\n\nthe intention of operators to base their 2001 operations in Broome, have encouraged the Board\n\nto consider further investment to ensure that capability keeps pace with demand and that we\n\nleave no reason for competitors to offer more or better.\n\nThe offshore waters of the Northern Territory, the Zone of Co-Operation (ZOCA) between Australia\n\nand Timor, and the Commonwealth Territory of Ashmore and Cartier host approximately 35% of the\n\nexploration and development budgets of Australian offshore oil and gas industry.\n\nTwo large projects are under study or implementation in these waters; the Phillips Petroleum\n\nBayu-Undang Project and the Woodside Sunrise Troubador Project.\n\nTwo large petrochemical projects are under study for the Darwin area based upon pipelines from\n\nthe Timor Sea gas resources of the projects above.\n\nDarwin will within 3 years be the northern terminus of the Australian national rail system with the\n\ncompletion of the Alice Springs Darwin rail link, further expanding its role in Australia’s economy.\n\nB RO O M E S U P P LY B A S E\n\nDA RW I N B A S E\n\n* **The Mermaid Broome Supply Base certified Impex, Woodside** *\n\n* **and BHP Petroleum exploration program during 2000.** *", - "page_start": 21, - "page_end": 21, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "443 Europeans and Health and Safety at Work, June 1992, [https://europa.eu/eurobarometer/surveys/detail/113](https://europa.eu/eurobarometer/surveys/detail/113) ;\n\nEuropeans and Health and Safety at Work, August 1996 [https://europa.eu/eurobarometer/surveys/detail/158](https://europa.eu/eurobarometer/surveys/detail/158)\n\n444 Eurobarometer: Working Conditions in Europe, June 1997, [https://europa.eu/eurobarometer/surveys/detail/151](https://europa.eu/eurobarometer/surveys/detail/151)\n\nEurobarometer: Working Conditions, April 2014, [https://europa.eu/eurobarometer/surveys/detail/2044](https://europa.eu/eurobarometer/surveys/detail/2044)\n\n445 Eurobarometer: Work-Life Balance, October 2018, [https://europa.eu/eurobarometer/surveys/detail/2185](https://europa.eu/eurobarometer/surveys/detail/2185)\n\n446 Eurobarometer: Undeclared work in the European Union, February 2020\n\n[https://europa.eu/eurobarometer/surveys/detail/2250](https://europa.eu/eurobarometer/surveys/detail/2250)\n\n447 The Horizon-project INGRID2 offers links to searchable databases on surveys related to working conditions.\n\n[https://www.ingridportal.eu/en](https://www.ingridportal.eu/en) Supporting expertise in inclusive growth, e-portal ‘Dataset on Working conditions’,\n\n448 e.g.: International Benchmarking on Occupational Safety and Health (OSH) Regulation, revised version 2018,\n\n[http://www.iali-aiit.org/](http://www.iali-aiit.org/) ,\n\n449 The Horizon-project INGRID2 also provides an overview on these types of databases\n\n( [https://www.ingridportal.eu/en](https://www.ingridportal.eu/en) )\n\n450 European Centre for the Development of Vocational Training CEDEFOP ( [https://www.cedefop.europa.eu/](https://www.cedefop.europa.eu/) )\n\nSkills Panorama: https://skillspanorama.cedefop.europa.eu/en\n\n451 European Institute for Gender Equality EIGE ( [https://eige.europa.eu/](https://eige.europa.eu/) ) Gender Statistics Database, Work and\n\nLabour market, [https://eige.europa.eu/gender-statistics/dgs](https://eige.europa.eu/gender-statistics/dgs) , [Gender Equality Index](https://eige.europa.eu/gender-equality-index/thematic-focus/digitalisation/country/EE) , e.g. index of digitalisation in\n\nthe world of work (2020)\n\n452 European Chemical Agency ECHA ( [https://echa.europa.eu/home](https://echa.europa.eu/home) ) [Exposure scenario examples](https://echa.europa.eu/support/practical-examples-of-exposure-scenarios)\n\n*453* *European Centre for Disease Prevention and Control,* *[https://www.ecdc.europa.eu/en](https://www.ecdc.europa.eu/en)*\n\n454 European Maritime Safety Agency EMSA ( [http://www.emsa.europa.eu/](http://www.emsa.europa.eu/) ), Section on Safety and Security\n\n[http://www.emsa.europa.eu/we-do/safety.html](http://www.emsa.europa.eu/we-do/safety.html)\n\n455 Fundamental Rights Agency FRA, [https://fra.europa.eu/en](https://fra.europa.eu/en) , Section on ‘Trafficking and labour exploitation, e.g\n\nthe report from June 2021 titled: Protecting migrants in an irregular situation from labour exploitation - Role of the\n\nEmployers Sanctions Directive\n\n456 European Monitoring Centre for Drugs and Drug Addiction EMCDDA ( [https://www.emcdda.europa.eu/](https://www.emcdda.europa.eu/) ),\n\nSection ‘Best practice’, Policy and practice briefings: Work places, [https://www.emcdda.europa.eu/best-](https://www.emcdda.europa.eu/best-practice/briefings/workplace_en)\n\n[practice/briefings/workplace_en](https://www.emcdda.europa.eu/best-practice/briefings/workplace_en)\n\nQuite unknown and difficult to estimate: between one and nine percent of the employees take so-called neuro", - "page_start": 157, - "page_end": 157, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "6\n\nI.4.2. Period of provision of the services\n\nThe period for the provision of the services starts to run from the date on which the specific\n\ncontract is signed by the last party.\n\nI.4.3. Implementation of FWC in cascade\n\nThe FWC is implemented as follows: the contracting authority orders services by sending\n\na request for offer for a specific contract to the contractor who is ranked first in the cascade.\n\nWithin 5 working days (unless otherwise stated in the request for offer), the contractor\n\nmust either:\n\n(a) send the specific tender back to the contracting authority; or (b) send an explanation of why it cannot accept the order.\n\nIf the contractor does not accept the order or fails to observe the deadline or to submit an\n\nacceptable offer for the Agency, or if it is in a situation of conflicting interests that may\n\nnegatively affect the *performance of the specific contract* (see Article II.7), the contracting\n\nauthority may place the order with the next contractor on the cascade.\n\nIf the contractor repeatedly refuses to accept requests for offer or repeatedly fails to send\n\nthem back on time, the contractor may be considered in breach of its obligations under\n\nthis FWC as set out in Article II.18.1 (c).\n\nWithin a maximum of 5 working days of a specific contract or order form being sent by the\n\nAgency to the contractor, the Agency shall receive it back, duly signed and dated. The\n\nperiod allowed for the execution of the tasks shall start to run on the date of signature of\n\nthe specific contract or order form by both parties.\n\n## **I.5. Prices**\n\n**I.5.1. Maximum amount of the FWC and maximum prices**\n\nThe maximum amount covering all purchases under this FWC, including all renewals and\n\nreimbursement of expenses is **EUR 1 000 000** (one million). However, this does not bind\n\nthe contracting authority to purchase for the maximum amount.\n\nThe maximum unit prices of the services are:\n\nSenior experts: [ ] EUR per man-day\n\nExperts: [ ] EUR per man-day\n\n**I.5.2. Price revision index**\n\nPrice revision is determined by the formula set out in Article II.20 and using the trend in\n\nthe harmonised indices of consumer prices (HICP) ‘Euro area (19 countries)’ published at\n\n[http://ec.europa.eu/eurostat/web/hicp/data/database](http://ec.europa.eu/eurostat/web/hicp/data/database) under HICP (2015 = 100) - monthly\n\ndata (index) (prc_hicp_midx).]\n\n**I.5.3. Reimbursement of expenses**\n\nIn addition to the maximum price specified in each specific contract, if applicable, the\n\ncontracting authority shall reimburse the following in accordance with Article II.22:", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" - }, - { - "text": "can be assumed to take place with negligible changes in velocity. The second mode consists of a pitching oscillation during which the air- plane is being restored to equilibrium by the static stability and the amplitude of oscillation decreased by pitch damping. The typical mo- tion is of relatively high frequency with a period of oscillation on the order of 6.5 to 5 seconds. For the conventional subsonic airplane, the second mode stick-fixed is characterized by heavy damping with a time to damp to half amplitude of approximately 0.5 seconds. IJsu- ally, if the airplane has static stability stick- fixed, the pitch damping contributed by the horizontal tail will assume sufficient dynamic stability for the short period oscillation. How- ever, the second mode stick-free has the possi- bility of weak damping or unstable oscilla- tions. This is the case where static stability does not automatically imply adequate dy- namic stability. The second mode stick-free is essentially a coupling of motion between the airplane short period pitching motion and ele- vator in rotation about the hinge line. Ex- treme care must be taken in the design of the control surfaces to ensure dynamic stability for this mode. The elevators must be statically balanced about the hinge line and aerodynamic balance must be within certain limits. Control system friction must be minimized as it con- tributes to the oscillatory tendency. If insta- bility were to exist in the second mode, “por- poising” of the airplane would result with possibility of structural damage. An oscilla- tion at high dynamic pressures with large changes in angle of attack could produce severe flight loads. The second mode has relatively short periods that correspond closely with the normal pilot response lag time, e.g., 1 or 2 seconds or less. There is the possibility that an attempt to forceably damp an oscillation may actually re- inforce the oscillation and produce instability. This is particularly true in the case of powered controls where a small input energy into the\n\nNAVWEPS 00-BOT-80 STABILITY AND CONTROL\n\ncontrol system is greatly magnified. In addi- tion, response lag of the controls may add to the problem of attempting to forceably damp the oscillation. In this case, should an oscilla- tion appear, the best rule is to release the con- trols as the airplane stick-free will demonstrate the necessary damping, Even an attempt to fix the controls when the airplane is oscillating may result in a small unstable input into the control system which can reinforce the oscilla- tion to produce failing flight loads. Because of the very short period of the oscillation, the amplitude of an unstable oscillation can reach dangerous proportions in an extremely short period of time. The third mode occurs in the elevator free case and is usually a very short period oscillation. The motion is essentially one of the elevator flapping about the hinge line and, in most cases, the oscillation has very heavy damping. A typical flapping mode may have a period of 0.3 to 1.5 seconds and a time to damp to half- amplitude of approximately 0.1 second. Of all the modes of longitudinal dynamic stability, the second mode or porpoising oscil- lation is of greatest importance. The por- poising oscillation has the possibility of damaging flight loads and can be adversely affected by pilot response lag. It should be remembered that when stick-free the airplane will demonstrate the necessary damping. The problems of dynamic stability are acute under certain conditions of flight. Low static stability generally increases the period (de- creases frequency) of the short period oscil- lations and increases the time to damp to half- amplitude. High altitude-and consequently low density-reduces the aerodynamic damp- ing. Also, high Mach numbers of supersonic flight produce a decay of aerodynamic damping.\n\nMODERN CONTROL SYSTEMS", - "page_start": 298, - "page_end": 298, - "source_file": "00-80T-80.pdf" - }, - { - "text": "MERMAID MARINE\n\nAUSTRALIA LIMITED\n\n### O P E R AT I O N S R E V I E W\n\nbreakwater will be an over capping type, which interrupts the waves progress, but does not\n\ntotally protect from wave penetration. These events are manageable and estimated as a once in\n\n50 years possibility.\n\nThe breakwater core will be used as a construction causeway allowing land based equipment to\n\nperform the work. The greater part of the breakwater work involves winning the material as\n\nopposed to actual construction.\n\n##### **E. CYCLONE MOORINGS.**\n\nThe extent of the cyclone problem in Australia’s north and north west was emphasised when\n\nCyclone Tracey struck Darwin in 1974. The most powerful cyclone to cross the Australian coast\n\nwas Cyclone Vance in 1999, which passed near Dampier, destroying large parts of the towns of\n\nOnslow and Exmouth further to the south.\n\nThe problem is acute, particularly in the area between Exmouth and Port Hedland, which suffers\n\ncyclones of an intensity and frequency as high as anywhere in the world. The Mermaid Base is\n\ntypically on cyclone alert three times per season. The season is November to April.\n\nTo date there have been three options available to vessel owners when a cyclone approaches:.\n\n- Run to sea\n\n- Take refuge with crew onboard, on a mooring in the most sheltered location available such\n\nas the Dampier Archipelago or the Monte Bello Islands.\n\n- Construct a cyclone shelter.\n\nThere are serious personal safety and environmental considerations related to Options 1 and 2\n\nand it is obvious that best practice universally adopted by large responsible Companies can be\n\nsatisfied in this way.\n\nOnly Woodside at Dampier and BHP at Port Hedand have taken the step of building shelters\n\nwhich provides protection to 12 of the region’s 60 vessels and this at very considerable cost.\n\nMermaid has undertaken significant engineering work on the placing of vessels on partially\n\nsheltered spread moorings, allowing the vessels to be secured near to shore and the crews\n\ndemobilized to take care of their families and attend to household cyclone preparation.\n\nMermaid is taking a leadership role with a technical solution which will lead to wider adoption\n\nas vessel owners and the insurance industry fully value the arrangements. Mermaid will provide 12", - "page_start": 15, - "page_end": 15, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "11 SRESA1B: IPCC future scenario based on rapid economic growth and a balance of energy sources\n\n12 30-year means can be created using the UKCP18 PDF data\n\n13 http://www.euro-cordex.net/\n\n## **60KM GLOBAL PROJECTIONS**\n\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the\n\ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of\n\nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated\n\nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These\n\nprojections will be selected to represent a wide range of possible future climate states\n\nto reflect key uncertainties, informing a risk-based approach to planning. They will be\n\ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for\n\ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of\n\nCMIP5 models to provide additional information on uncertainties in the projections relative\n\nto other climate models.\n\n## **25KM PROBABILISTIC PROJECTIONS**\n\n**Captures natural variability and climate change . Updated models and**\n\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for\n\nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be\n\nupdated using an up-to-date collection of Met Office climate simulations and the latest\n\nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest\n\nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for\n\nthe UK at monthly intervals for several emission scenarios, including one used in UKCP09 <sup>11</sup> .\n\nThe new probabilistic projections will indicate the range of uncertainty in our knowledge\n\nof the climate system and natural variability through the 21st century, using probability\n\ndensity functions to provide information on how climate varies from month to month. This\n\ncontrasts with UKCP09 for which only 30-year means were provided <sup>12</sup> .\n\n##### **DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n\n**Downscaled versions of the global model for the UK. For the most spatially**\n\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance\n\nto adaptation at two different resolutions. The 12 km model provides a downscaled\n\nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global\n\nmodel and at a higher resolution. This may be especially useful for those interested in\n\nwater availability and some aspects of agriculture. A key reason for providing this data is\n\nthat users will be able to compare it directly with EURO-CORDEX <sup>13</sup> .\n\nThe global projections will also be downscaled to 2.2 km using a process of nesting\n\nmodels at finer resolution that maintains the integrity of the representation of evolving\n\natmospheric processes. Key benefits of simulations at this resolution will be the\n\ninformation provided on high impact events such as localised heavy rainfall in summer and\n\npotential improvements in the diurnal cycle.\n\nThe output will be available at a time resolution of 3-hourly, possibly higher for some\n\noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time\n\nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be\n\nconfirmed.\n\n### **PROJECTIONS OVER LAND**\n\nThe land projections comprise three components:", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_MRM_2000.pdf", - "query": "When did Mermaid Marine Service Base in the Port of Broome start?", - "target_page": 22, - "target_passage": "1 February 2000", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "### O P E R AT I O N S R E V I E W\n\n19\n\nDarwin is serviced by three marine infrastructure elements.\n\na. A public port adjacent to the main business centre, which is destined to be redeveloped\n\nas a cruise ship and tourism precinct .\n\nb. A group of freehold water front properties on Frances Bay near to the main business\n\ncenter.\n\nc. A recently commissioned public port and industrial estate at East Arm some 25 km from\n\nthe main business district.\n\nDarwin already has an abundance of shore based logistics service providers who operate from\n\nonshore industrial estates through publicly owned facilities.\n\nThe Northern Territory Government has sponsored a study to determine the marine\n\ninfrastructure deficits of the Darwin area. Mermaid has contributed to the study and is\n\nmonitoring the subsequent planning processes.\n\nRegardless of industry trends, Mermaid has a need for a Darwin Base to service and care for\n\nMermaid vessels working in the area. Too often vessels have been demobilised to Dampier at the\n\nconclusion of a contract then being required to return to Darwin within days or weeks for\n\nanother assignment.\n\nMermaid has decided that needs and opportunities in the north of Australia can be best served by\n\nentering a co-operative arrangement with an established Darwin Company. Agreement has therefore\n\nbeen reached with Perkins Shipping Group, who are one of the freehold land owners on Frances Bay.\n\nPerkins Shipping, established in the 1950s is the major coastal shipping service provider in\n\nAustralia’s north, linking Darwin to mining and aboriginal committees from the Kimberly to\n\nGulf of Carpenteria. Additionally Perkins operate services to East Timor, mining operations in\n\nIndonesia, as well as Singapore and East Malaysia. The Perkins and Mermaid businesses are\n\ndifferent, but complementary, offering benefits to both. The arrangement with Perkins will give\n\nMermaid well placed office facilities, open storage and waterfront access.\n\nOur intention is that Darwin become the third and final mainland entreport to service the\n\nNorthwestern offshore oil and gas industry together with our other strategically placed facilities\n\nat Dampier and Broome.", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this\n\ntechnique by the cyclone season in 2001.\n\nAs more vessels seek protection, additional breakwaters can be constructed and sea room\n\ndredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four\n\nvessel specific mooring lines secured to special attachment points on the vessel.\n\nMany smaller vessels including Mermaid’s will be lifted from the water and tied down on purpose\n\nbuilt cradles for cyclones.\n\n##### **F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or\n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is\n\nsuitable for development in its present state.\n\nThe spoil produced from dredging will allow Mermaid to achieve full utilization of the site at a\n\nfraction of the cost of importing fill from elsewhere.\n\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services\n\nsuch as traffic flows, land allocation and security, as well as fulfilling the many and complex\n\nregulatory requirements related to health, safety, quarantine, environmental management, dust,\n\ndangerous goods and hazchem materials have been the subject of considerable study prior to this\n\nimplementation stage. 13\n\n* **The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.** *\n\nMERMAID MARINE\n\nAUSTRALIA LIMITED", - "page_start": 16, - "page_end": 16, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### C H A I R M A N ’ S R E P O R T\n\n5\n\nDirector of the Clough Group and a highly experienced and talented executive. Richard has\n\nappointed an alternate director, Mr Chris Sutherland, a senior Clough Executive, with\n\nengineering qualifications and associated business skills to assist him.\n\nCaptain Jim Carver, Mermaid’s founder continues to play a significant role in Mermaid’s operations,\n\npaying particular attention to our business at sea. Under 20 years of Jim’s leadership, Mermaid\n\ndeveloped an enviable reputation as a “can do” company, and in our drive for new engineering\n\nexpertise and professionalism, we have no intention of allowing that attitude to be lost.\n\nLast year we identified Broome as our next strategic position. No oil and gas work had been\n\nsupported out of Broome for seventeen years and with the valuable cooperation and assistance\n\nof the Broome Port Authority, we secured Inpex, the large Japanese resource company as our first\n\nclient. The base was then established early this year.\n\nA new focus has developed in the Browse Basin and it is pleasing to report that after only seven\n\nmonths operation, our Base is profitable, housing Inpex, BHP, Woodside and Sedco in support\n\nof their current drilling programs. All the holes drilled from the Broome Base have been\n\ndesignated as commercial finds by the explorers and the very major increase in the reserves at\n\nBrecknock, Woodside’s permit 500 kilometres north of Broome creates optimism for future\n\nproduction based in the Broome area.\n\nDarwin was next on our list, enabling involvement in Timor Sea oil and gas activity. The Bayu\n\nUndan project operated by Phillips, is well advanced and will impact Darwin’s offshore activity\n\nquite soon. Pursuing the formula for a strategic sea/land interface, we reached agreement with\n\nPerkins Shipping in Darwin, to set up an office at their Frances Drive facility. Perkins Shipping\n\nis synonymous with Darwin’s history. Set up by V.B. Perkins in the late 40’s, it has grown to\n\nsignificant size, operating its ships across the top of Australia and into South East Asia. There\n\nare many synergies which Mermaid shares with Perkins and we look forward to developing our\n\nDarwin business in close association with that fine old Company.\n\nOur ambitions for the support of the oil and gas industry now go beyond bases and vessels. Early\n\nin the current financial year, Mermaid acquired 50% of the OIS MOC Joint Venture Pty Ltd, to\n\nbe paid for by the issue of 800,000 Mermaid shares. OIS MOC owns the highly successful labour\n\nhire business operated by Kevin Ponga and Rick De Franck. Kevin Ponga is now General\n\nManager of Mermaid Labour & Management Pty Limited and Mr De Franck becomes a Director.\n\nWith their reputation and talent added to Mermaid’s experienced team, this labour hire\n\ncompany has become a significant force and can be expected to be in the final when major\n\nlabour hire contracts are let.", - "page_start": 8, - "page_end": 8, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n18\n\nMermaid Marine services base at the Port of Broome (Broome Base)\n\ncommenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex\n\nBrowse Ltd arrived from Japan.\n\nAs a result of Mermaid’s efforts in establishing the Broome Base, Inpex Browse Ltd., BHP Petroleum\n\nand Woodside have used Broome as their base for drilling a total of four (4) offshore wells.\n\nIt is presently expected that at least six\n\n(6) exploration wells will be drilled in the\n\narea during 2001. The Base now employs\n\nas many as ten (10) staff up from the\n\nthree (3) who commenced in February\n\n2000. Excellent management and staff\n\ncompetence are the prime factors, which\n\nhave delivered the smooth start up and\n\ncontinued success at Broome.\n\nThe base is currently secured on a come and go lease arrangement, located on Port premises\n\nadjacent to the wharf gates. Although convenient, with an excellent cyclone proof building, the\n\nsite has limitations in terms of size and slope. An area more suitable for our long term needs has\n\nbeen optioned from Port authorities and discussions will proceed with our clients this year to\n\ndetermine their precise needs.\n\nThe success of Browse Basin wells drilled this year, strong developments in the energy sector and\n\nthe intention of operators to base their 2001 operations in Broome, have encouraged the Board\n\nto consider further investment to ensure that capability keeps pace with demand and that we\n\nleave no reason for competitors to offer more or better.\n\nThe offshore waters of the Northern Territory, the Zone of Co-Operation (ZOCA) between Australia\n\nand Timor, and the Commonwealth Territory of Ashmore and Cartier host approximately 35% of the\n\nexploration and development budgets of Australian offshore oil and gas industry.\n\nTwo large projects are under study or implementation in these waters; the Phillips Petroleum\n\nBayu-Undang Project and the Woodside Sunrise Troubador Project.\n\nTwo large petrochemical projects are under study for the Darwin area based upon pipelines from\n\nthe Timor Sea gas resources of the projects above.\n\nDarwin will within 3 years be the northern terminus of the Australian national rail system with the\n\ncompletion of the Alice Springs Darwin rail link, further expanding its role in Australia’s economy.\n\nB RO O M E S U P P LY B A S E\n\nDA RW I N B A S E\n\n* **The Mermaid Broome Supply Base certified Impex, Woodside** *\n\n* **and BHP Petroleum exploration program during 2000.** *", - "page_start": 21, - "page_end": 21, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges,\n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing\n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance.\n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the\n\nwork increased productivity through enhanced bollard pull and consequent earnings.\n\nSafety was given the highest priority through new monitoring systems and awareness programs.\n\nFormalised on the job instruction and training courses have also lifted levels of experience and\n\nproficiency across the workforce.\n\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all\n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup\n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and\n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by\n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there\n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced\n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000.\n\nSince receiving approval in principle for development of the Dampier Base from the Western\n\nAustralian Minister for the Environment in February 2000, engineering and general design work\n\nin connection with the base proceeded at an accelerated pace.\n\nThis work, assisted by technical studies and a re-assessment of an increased demand for services\n\narising out of greater expectations for growth in the sector, has led to improvements and\n\nexpansion of capacity over earlier plans.\n\nThe Dampier Base will now comprise:-\n\nAn “all tides” approach channel to a minimum depth of 6 metres\n\nA wharf offering 7.5 metres depth at low tide, featuring a heavy loadout section to\n\naccommodate modules of up to 1500 tonnes to onshore projects on the Burrup Peninsular\n\nand adjacent mining centres. A subsea pipe reel loading facility will encourage the use of\n\nspool ships in the region for deepwater pipelay. On a project by project basis, pipeline\n\nprotection rock dumping, specialist vessel rig up activities and the like will be facilitated,\n\nas will dry and bulk cargo handling, refuelling, watering and all categories of waste\n\nreception. The joint Commonwealth and WA State Government initiative to establish\n\nan integrated industrial estate at Jervoise Bay (south of Perth) serviced by high wide load\n\ncorridors from Perth’s industrial areas will see the heavy capacity wharf playing a strategic\n\nrole in major capital works in the Pilbara, leading to significant cost savings.\n\n### O P E R AT I O N S R E V I E W\n\n8\n\nS E A G O I N G O P E R AT I O N S\n\nDA M P I E R B A S E\n\n## **-**\n\n## **-**", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "MERMAID MARINE\n\nAUSTRALIA LIMITED\n\n### O P E R AT I O N S R E V I E W\n\nbreakwater will be an over capping type, which interrupts the waves progress, but does not\n\ntotally protect from wave penetration. These events are manageable and estimated as a once in\n\n50 years possibility.\n\nThe breakwater core will be used as a construction causeway allowing land based equipment to\n\nperform the work. The greater part of the breakwater work involves winning the material as\n\nopposed to actual construction.\n\n##### **E. CYCLONE MOORINGS.**\n\nThe extent of the cyclone problem in Australia’s north and north west was emphasised when\n\nCyclone Tracey struck Darwin in 1974. The most powerful cyclone to cross the Australian coast\n\nwas Cyclone Vance in 1999, which passed near Dampier, destroying large parts of the towns of\n\nOnslow and Exmouth further to the south.\n\nThe problem is acute, particularly in the area between Exmouth and Port Hedland, which suffers\n\ncyclones of an intensity and frequency as high as anywhere in the world. The Mermaid Base is\n\ntypically on cyclone alert three times per season. The season is November to April.\n\nTo date there have been three options available to vessel owners when a cyclone approaches:.\n\n- Run to sea\n\n- Take refuge with crew onboard, on a mooring in the most sheltered location available such\n\nas the Dampier Archipelago or the Monte Bello Islands.\n\n- Construct a cyclone shelter.\n\nThere are serious personal safety and environmental considerations related to Options 1 and 2\n\nand it is obvious that best practice universally adopted by large responsible Companies can be\n\nsatisfied in this way.\n\nOnly Woodside at Dampier and BHP at Port Hedand have taken the step of building shelters\n\nwhich provides protection to 12 of the region’s 60 vessels and this at very considerable cost.\n\nMermaid has undertaken significant engineering work on the placing of vessels on partially\n\nsheltered spread moorings, allowing the vessels to be secured near to shore and the crews\n\ndemobilized to take care of their families and attend to household cyclone preparation.\n\nMermaid is taking a leadership role with a technical solution which will lead to wider adoption\n\nas vessel owners and the insurance industry fully value the arrangements. Mermaid will provide 12", - "page_start": 15, - "page_end": 15, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n11\n\nvessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which\n\nmeans there will be very few occasions when the largest vessels in the industry have to make a\n\ntide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will\n\nnot suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby\n\nDamper Public Wharf in terms of entry and departure draft restrictions.\n\nThe function and purpose of Berth 1 will be:\n\n- To service the larger offshore supply boat market on a fast turnaround basis.\n\n- To receive and offload very heavy ro/ro cargoes up to 1500 tonne delivered by ocean going\n\nheavy lift ships and barges.\n\n- To handle inbound and outbound cargoes related to major offshore pipe lay projects.\n\n- To receive and efficiently load reel ships used for deep water small diameter pipelay.\n\nThe wharf will be an earth filled structure with steel sheet pile faces and concrete capping beam\n\nsurround. Most of the construction will be performed using land based equipment working from\n\nthe core of the earth filled system.\n\nMuch effort has gone into a design concept which allows very large cranes (>100 tonne\n\ncapacity) to operate without restriction on the wharf.\n\nThe separation between Berth 1 and Berth 2 is such to allow Road Train Triples (the max\n\nallowable) to turn unassisted on the wharf.\n\n##### **C. QUAY WALL (BERTH 2)**\n\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted\n\noperation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas\n\nindustry and mineral ports. This berth will offer excellent weather protection for small and\n\nmedium size vessels.\n\n##### **D. BREAKWATER.**\n\nThe rubble mount type breakwater will be an extension of the wharf, constructed using core and\n\narmor rock largely won from excavations on the Base. The excavations created will become\n\ndepositories for dredge spoil.\n\nBecause the storm surge associated with major cyclones can be up to 7 m above chart datum (low\n\ntide), before imposing the wave height, a fully protective breakwater is not practical. The", - "page_start": 14, - "page_end": 14, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "ANNUAL REPORT 2000\n\nANNUAL REPORT 2000 MERMAID MARINE AUSTRALIA LIMITED\n\nACN 083 185 693", - "page_start": 0, - "page_end": 0, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n17\n\n##### **G. SLIPWAY.**\n\nAustralia, and particularly the north west is impoverished in terms of infrastructure to service\n\nour marine industries. Some of this has been due to a historical link with our recent industrial\n\npast. This is now behind us, and Australia has now become a centre of excellence with respect\n\nto both new building and ship repair, particularly for high tech and specialty vessels.\n\nThe Mermaid slipway will be the third such facility on the western half of the continent , with\n\nothers located at Fremantle and Darwin.\n\nThe slipway will be a repair only facility, no new building is contemplated. Its capacity is\n\nstructured to meet the regional steel mono-hulled fleet requirements of some 60 vessels between\n\n200 and 4000 tonne displacement. Fishing industry, marine tourist industry, large private\n\npleasure craft , naval, scientific and law enforcement vessels are a secondary target.\n\nThe slipway is designed to initially accept vessels up to 2,700 tonnes, a restriction which is set\n\nby our current inventory of cradles used to support vessel on the slip. The cradles will be\n\nprogressively upgraded to ultimately handle 4000 tonne. A later expansion will allow 500 tonne\n\nvessels to be side slipped, thereby increasing capacity.\n\nThe slipway location and orientation on the Base has been chosen to maximize the cost and load\n\nbearing benefits of having a very high strength granite bedrock as the best possible foundation.\n\nThe Mermaid slipway will rank second in terms of capacity on the western half of the continent.\n\nTenix, Fremantle 8,000 tonne, Mermaid Dampier 2,700 tonne rising to 4,000 tonne, Darwin Ship\n\nRepair 2,500 tonne. The nearest other facilities are Singapore, Adelaide, Port Moresby or Cairns.\n\nMermaid has purchased a very large cyclone rated industrial building\n\nframe which will be sited beside the slipway and tenanted by Mermaid\n\nengineering and companies which will provide ancillary services\n\nrelated to ship repair.\n\n* **The Northwest Shelf is a** *\n\n* **world scale offshore oil and** *\n\n* **gas exploration province.** *", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "### O P E R AT I O N S R E V I E W\n\n7\n\nTrading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine\n\nAustralia Ltd (“Company”) and its controlled entities, experienced a 43% turnover reduction\n\nfrom last year. The result was almost entirely due to a heavy fall in oil prices, which reached their\n\nlow of US$10 in February 1999, leading to the lowest level of offshore activity for many years.\n\nIn September 1999 Mermaid exercised its option to acquire the utility vessel “Mermaid\n\nAchiever” for $3,250,000. Previously the Achiever operated under a bare boat charter.\n\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister\n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier\n\nBase). Since that time a detailed environmental management system has been produced for final\n\napproval and as a guide to daily environmental management and compliance. Refinements to\n\nthe design have proceeded, together with the preparation of bid packages and negotiations with\n\nBanks for project finance.\n\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough\n\nEngineering will see an extremely robust balance sheet, with cash on hand approaching $10 million.\n\nAs construction commences at Dampier, a level of project finance will be arranged providing a\n\ncomfortable mix of debt and equity and allowing the retention of a significant cash balance.\n\nThe year saw considerable progress with Base activities at Dampier, Broome and Darwin. They\n\nare dealt with in detail under following headings.\n\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax\n\nprofit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease\n\nof 43% over the previous period. Fixed cost reductions enabled the Company to ride out the\n\nmarket reversal with a minimal loss and positive operating cash before capex of $1.6m. This\n\nresult, achieved against a major drop in turnover, was possible through a vigorous attack on\n\noverheads, which included more beneficial ownership costs, insurance savings, management\n\nsalary savings, including voluntary sacrifice from certain senior executives in recognition of the\n\ntighter conditions. In all the changes contributed approximately $1.5million to the bottom line.\n\nBare boat charters, although useful for the busy times encountered in 1998 exposed the\n\nCompany to a high level of fixed costs. The vessels were valuable earners and the transfer of the\n\nMermaid Achiever, Mermaid Eagle and Mermaid Reunion to Company ownership has proved\n\nto be the right decision for all market conditions. Although there have been no contracts yet let\n\nfor work of any significance by producers on the North West Shelf, underlying day to day activity\n\nhas returned. Expressions of interest for major project work have been issued and as an indication\n\nof better trading conditions, an unaudited profit of $496,721 has been recorded for the two\n\nmonths to 31st August 2000. The trend has continued in September.\n\nO V E RV I E W\n\nF I N A N C I A L", - "page_start": 10, - "page_end": 10, - "source_file": "ASX_MRM_2000.pdf" - } - ] - }, - { - "references": { - "source_file": "Word QS.pdf", - "query": "How do I create a new document in Word?", - "target_page": 2, - "target_passage": "Just select File > New", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Get writing suggestions\n\nWith **Editor** , bring out your best writing. Editor helps you bring out your best writing by giving you intelligent writing suggestions. It also calculates an Editor Score based on the number and types of suggestions you have yet to address. Select an underlined word or phrase to accept or ignore a suggestion.\n\nReview and track changes\n\nWhether you just want to check spelling, keep your word count in check, or fully collaborate with other people, the **Review** tab has essential commands to track, discuss, and manage all of the changes made to your documents.\n\nView who else is typing\n\nCo-authoring Word documents that are shared on OneDrive or on a SharePoint site happens in real-time, which means you can easily view where other authors are making changes in the same document that you’re currently working in.\n\nFormat with styles\n\n**Styles** lets you create, apply, and review the formatting styles in your current document. To open it, select the **Home** tab, and then select the small arrow in the lower right corner of the Styles gallery.", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" - }, - { - "text": "### Count on Word to count your words\n\n**Try it:** Hit return after this line and type some words.\n\nThe status bar at the bottom of the window keeps a running count of the number of words in\n\nthe document.\n\n### Save this for later, access it anywhere\n\nWhen you save this document in OneDrive, you’ll be able to open it anywhere: on your\n\ncomputer, tablet, or phone. Your changes will be saved automatically.\n\n**Try it:** Select **File** > **Save As** , and then select OneDrive and give this document a name.\n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files.\n\nYou can pick up where you left off… even if you left the document open on the computer you’re\n\nusing now.", - "page_start": 1, - "page_end": 1, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "## Welcome to Word\n\n#### Instructions you can edit, share, and print\n\nUnlike old-school user guides, this doc is yours to tailor exactly for your needs. Reading it will\n\nteach you some basics about Word, but this document isn’t just for reading. It’s for editing too,\n\nso you can learn by doing.\n\nFor practice using Word features, watch for **Try it** text in red throughout this document.\n\n**Time saver:** If you’ve only got a minute\n\nand you want to see how this works,\n\nwatch this Video: Welcome to Word .\n\n### Write eloquently, with a little help\n\nWord automatically checks spelling and grammar, and marks misspelled words with a red\n\nsquiggly underline. Grammatical glitches get a blue double underline.\n\n**Try it:** Put your cursor at the end of this paragraph, and hit Enter to start a new paragraph. Write\n\na sentence with some spelling or grammatical mistakes, and press Enter to finish the paragraph.\n\nRight-click the text that’s marked with underlines, or Press F7. Choose a suggestion to correct\n\nthe mistakes.", - "page_start": 0, - "page_end": 0, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "### Share and collaborate\n\nWith this document saved in OneDrive, you can share it with others. They don’t even need Word\n\nto open it.\n\n**Try it:** Select **Share** , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\n\nYou can send the link by typing someone’s email address or by copying the link and pasting it\n\ninto a message or chat. If you want them to read the document but not edit it, set their\n\npermission to view-only.\n\nIf they don’t have Word, the document will open in their web browser, in Word Online.\n\n### Add visuals with pictures from the web\n\nWord works with Bing to give you access to thousands of pictures you can use in your\n\ndocuments.\n\n**Try it:** Hit enter after this line to make a blank line:\n\n**1.** With your cursor in the blank space above, go to the Insert tab, select **Online Pictures** ,\n\nand then search for something, like *puppy clip art* .\n\n**2.** Select the picture you want, and select **Insert** .", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Find whatever you need\n\nType a keyword or phrase into the **Search** box to quickly find the Word features and ribbon commands you’re looking for, to discover **Help** content, or to get more information online .\n\nGet other Quick Start guides\n\nTo download our free Quick Start Guides for your other favorite apps, go to **https://go.microsoft.com/fwlink/?linkid=2008317.**\n\nShare your work with others\n\nTo invite others to view or edit your documents, select the **Share** button in the top right corner of the app window. Then, you can choose to share a link to your document or send invitations directly to specific people. If someone doesn't have Word, they can use the free Word for the Web app to edit and comment.\n\nNext steps with Word\n\n**See what’s new in Office** Explore the new and improved features in Word and the other Office apps. Visit **https://go.microsoft.com/fwlink/?linkid=871117** for more information.\n\n**Get free training, tutorials, and videos for Office** Ready to dig deeper into the capabilities that Word has to offer? Visit **https://go.microsoft.com/fwlink/?linkid=871123** to explore our free training options.\n\n**Send us your feedback** Love Word? Got an idea for improvement to share with us? On the **File** menu, select **Feedback** and then follow the prompts to send your suggestions directly to the Word product team. Thank you!", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "## **Word PDF Accessibility**\n\nArticle - 11/26/2024\n\nAuthors can ensure that their Word documents are accessible to people with disabilities\n\neven when distributing them in PDF format using the following approach:\n\n1. First, they should follow the practices in [Make your Word documents accessible to](https://support.microsoft.com/office/d9bf3683-87ac-47ea-b91a-78dcacb3c66d)\n\n[people with disabilities](https://support.microsoft.com/office/d9bf3683-87ac-47ea-b91a-78dcacb3c66d) .\n\n2. Next, they should follow the steps in [Create accessible PDFs](https://support.microsoft.com/office/064625e0-56ea-4e16-ad71-3aa33bb4b7ed) to preserve the\n\naccessibility of the document in PDF format.\n\nThis article provides details about the information Word includes in the PDF to make it\n\naccessible.\n\n1. [PDF/UA](https://www.iso.org/standard/64599.html) tags are included to provide semantic information about the content in\n\nthe document.\n\n2. Decorative content does not need to be read, so it is marked as <Artifact> in the\n\nContent Tree in the PDF and no PDF/UA tags are included.\n\n3. Bookmarks for each section and slide are included to make it easier to navigate the\n\ncontent.\n\n| Type of content Tags |\n|:---|\n| Document <Document> |\n| Title <Title> |\n| H1, H2, etc. <H1>, <H2>, etc. |\n\n**Summary**\n\n**PDF/UA Tags**\n\nノ **Expand table**", - "page_start": 55, - "page_end": 55, - "source_file": "office-pdf.pdf" - }, - { - "text": "Chapter 3. Administration **55**\n\n**Display Document Hold**\n\nThe Display Document Hold setting (Figure 3-7 on page 54) determines whether the client\n\nshows a column that indicates whether a hold is placed on the document. For more\n\ninformation, see Chapter 16, “Enhanced Retention Management” on page 353.\n\n**Note Search**\n\nIf the annotation parameter (annotation flags in the document database table) in the\n\napplication group is set to “No”, the Note Search parameter (Figure 3-7 on page 54)\n\ndetermines when Content Manager OnDemand searches the database for annotations and\n\nnotifies the user of the annotations. The following options are possible:\n\n� Hit list: When a folder query is run, Content Manager OnDemand searches for\n\nannotations, and a note icon, which contains an annotation, is displayed next to each\n\ndocument in the resulting hit list. The hit list option has a direct performance impact on the\n\ngeneration of the document list.\n\n� Retrieve: Content Manager OnDemand searches for annotations when the user selects a\n\ndocument for display. This option is the default and preferred option.\n\n� Note: Content Manager OnDemand searches for annotations when the user selects the\n\n**note** command when the user views a displayed document.\n\nAs a preferred practice, set the annotation parameter in the application group advanced\n\nsettings to “ Yes ”. In this case, an annotation flag is set in the database when a user adds an\n\nannotation to a document. When the document hit list is displayed, a note icon is displayed\n\nnext to the documents for which an annotation exists.\n\n**Full Report Browse**\n\nIn the Permissions tab of the folder definition window (Figure 3-8 on page 56), the Full Report\n\nBrowse option allows a user of the Content Manager OnDemand Windows Client to select a\n\ndocument, retrieve that document, and view the entire report to which the document belongs.\n\n**Important:** Use care when you enable this feature. The Display Document Location\n\nfunction can result in degraded search performance because the storage location\n\ninformation for every document that is returned must be retrieved from the Content\n\nManager OnDemand object server.", - "page_start": 78, - "page_end": 78, - "source_file": "sg246915.pdf" - }, - { - "text": "Quick Start Guide\n\n## New to Word? Use this guide to learn the basics.\n\n**Save your progress**\n\nSave your work on OneDrive\n\nor SharePoint automatically.\n\n**Find whatever you need**\n\nLook up commands from the ribbon,\n\nget Help, or search the web.\n\n**Discover contextual commands**\n\nSelect tables, pictures, or other objects\n\nin a document to reveal additional\n\noptions.\n\n**Share your work with others**\n\nInvite other people to view and edit\n\ncloud-based documents stored in\n\nOneDrive or on SharePoint sites.\n\n**Navigate with ease**\n\nUse the sidebar to manage long or\n\ncomplex documents. **Show or hide the ribbon**\n\nSelect the arrow icon to show\n\nor hide the Quick Access\n\nToolbar, and change ribbon\n\nsettings.\n\n**Format with the mini toolbar**\n\nSelect or right-click text and objects to\n\nquickly format them in place.\n\n**Status bar shortcuts**\n\nSelect any status bar indicator to\n\nnavigate your document, view word\n\ncount statistics, or check your spelling.\n\n**Change your view**\n\nSelect the status bar buttons to\n\nswitch between views, or use the\n\nslider to magnify the page to\n\nyour liking.", - "page_start": 0, - "page_end": 0, - "source_file": "Word QS.pdf" - }, - { - "text": "#### **13.4.1 PDF data**\n\nPortable Document Format (PDF) data is an increasingly common data type that can be\n\narchived within Content Manager OnDemand. The following key advantages are available by\n\nusing this data type as a document format:\n\n� It is a read-only format that does not require any external resources, such as images or\n\nfonts. It is self-contained.\n\n� The viewer for PDF can be downloaded at no charge from the Adobe website and the\n\nbrowser plug-ins for PDF are also available at no charge.\n\nDuring PDF document creation, resources, such as images and custom fonts, are placed in\n\nthe data stream once and then referenced many times from within the PDF file. If a large\n\nreport is produced from many small documents, that report requires only one copy of the\n\nresources.\n\nHowever, when the PDF is indexed, the PDF Indexer creates many PDF documents from the\n\ninput file. Each of these documents requires a certain number of PDF structures, which define\n\na document. These documents are concatenated together in the .out file, and then loaded\n\ninto Content Manager OnDemand as separate documents. Because the resources are\n\nextracted and placed into a separate resource file, they are not included in each document.\n\nFor an illustration of the process, see Figure 13-3.\n\n*Figure 13-3 PDF indexing*\n\nIf no resources are collected, the size of the .out file, which contains all of the individual\n\ndocuments, might be larger than the original file. For tips about how to reduce the size of the\n\noutput file, see 7.3.5, “PDF indexing: Using internal indexes (Page Piece Dictionary)” on\n\npage 173.\n\nConverted to\n\nDocument Resources\n\nOne PDF file with documents and resources\n\nMany separate PDF documents with resources removed in the .out file", - "page_start": 331, - "page_end": 331, - "source_file": "sg246915.pdf" - }, - { - "text": "Chapter 16. Enhanced Retention Management\n\n*Figure 16-3 Configuring the application group Lockdown field*\n\nThe Lockdown field is used to maintain a count of the number of holds on the document. If no\n\nholds exist, its value is 0. If an implied hold exists for the document, the value is 16384. Any\n\nadditional holds that are applied or released increase or decrease this number by 1.\n\n#### **16.2.4 Enabling hold permission for the application group**\n\nTo apply a hold to a document or to release a document, you must have the appropriate\n\npermissions. A new permission of type Hold exists under the permissions for a document in\n\nthe application group permissions, as shown in Figure 16-4 on page 358.", - "page_start": 380, - "page_end": 380, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "Word QS.pdf", - "query": "Where can I find other Microsoft quick start guides?", - "target_page": 4, - "target_passage": "To download our free Quick Start Guides for your other favorite apps, go to https://go.microsoft.com/fwlink/?linkid=2008317.", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "### **Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help you get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team.\n\n**Hit the ground running now!** Build confidence by trying things on your own. Go to the meet now button\n\n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!\n\n**Download** the app for [desktop ](https://www.microsoft.com/microsoft-teams/download-app) and [mobile](https://www.microsoft.com/microsoft-teams/download-app) to access Teams with the best performance anywhere you go.\n\nOnce you [sign in](https://teams.microsoft.com/l/home/_#/) , **connect** with your team in chat, channels, calls, and meetings. **Try out** the different features as you learn about them in this guide. You’ll get the basics in no time!\n\n#### **Set up Explore Practice**", - "page_start": 0, - "page_end": 0, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "#### **Share knowledge**\n\nTeamwork is all about collaboration! **Share with your team best practices** you learn along the way, tips and tricks for how you can best organize your workflows and ask for their own advice to define how you can best use Teams together.\n\n#### **Keep learning Test meetings**\n\nUse the Meet now button in the Calendar tab\n\nThen select “Start meeting”\n\nAnd then \"Join now”\n\n## **Next Steps**\n\nYou will **get the most out of Teams** when you get to truly connect with your team and collaborate together. Keep practicing until each step of your workflow feels natural.\n\nNo matter how you like to learn and practice, we've got resources to support and inspire you:\n\n[Virtual classes:](https://www.microsoft.com/en-us/store/workshops-training-and-events/detail/get-started-with-microsoft-teams?program=Professionals&src=carousel1&pos=0) We have instructors to answer your questions and walk you through all the details. -\n\n-\n\n-\n\n-\n\n[Training series:](https://docs.microsoft.com/learn/paths/teamwork-specialist/) Complete the beginner series of videos at your own pace.\n\n[Support articles and step-by-step guides:](https://support.microsoft.com/teams) To get answers to your most common questions.\n\n[Feature overviews, tutorials, and announcements: ](https://www.youtube.com/c/MicrosoftTeams/featured) Our YouTube channel has carefully curated content to get you excited and show how you can use Teams effortlessly.\n\n1.\n\n2.\n\n3.\n\nHere you can try to share your screen, start a whiteboard or even record yourself while you are practicing a presentation. This is your safe space to test everything out!", - "page_start": 5, - "page_end": 5, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "Find whatever you need\n\nType a keyword or phrase into the **Search** box to quickly find the Word features and ribbon commands you’re looking for, to discover **Help** content, or to get more information online .\n\nGet other Quick Start guides\n\nTo download our free Quick Start Guides for your other favorite apps, go to **https://go.microsoft.com/fwlink/?linkid=2008317.**\n\nShare your work with others\n\nTo invite others to view or edit your documents, select the **Share** button in the top right corner of the app window. Then, you can choose to share a link to your document or send invitations directly to specific people. If someone doesn't have Word, they can use the free Word for the Web app to edit and comment.\n\nNext steps with Word\n\n**See what’s new in Office** Explore the new and improved features in Word and the other Office apps. Visit **https://go.microsoft.com/fwlink/?linkid=871117** for more information.\n\n**Get free training, tutorials, and videos for Office** Ready to dig deeper into the capabilities that Word has to offer? Visit **https://go.microsoft.com/fwlink/?linkid=871123** to explore our free training options.\n\n**Send us your feedback** Love Word? Got an idea for improvement to share with us? On the **File** menu, select **Feedback** and then follow the prompts to send your suggestions directly to the Word product team. Thank you!", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "Quick Start Guide\n\n## New to Word? Use this guide to learn the basics.\n\n**Save your progress**\n\nSave your work on OneDrive\n\nor SharePoint automatically.\n\n**Find whatever you need**\n\nLook up commands from the ribbon,\n\nget Help, or search the web.\n\n**Discover contextual commands**\n\nSelect tables, pictures, or other objects\n\nin a document to reveal additional\n\noptions.\n\n**Share your work with others**\n\nInvite other people to view and edit\n\ncloud-based documents stored in\n\nOneDrive or on SharePoint sites.\n\n**Navigate with ease**\n\nUse the sidebar to manage long or\n\ncomplex documents. **Show or hide the ribbon**\n\nSelect the arrow icon to show\n\nor hide the Quick Access\n\nToolbar, and change ribbon\n\nsettings.\n\n**Format with the mini toolbar**\n\nSelect or right-click text and objects to\n\nquickly format them in place.\n\n**Status bar shortcuts**\n\nSelect any status bar indicator to\n\nnavigate your document, view word\n\ncount statistics, or check your spelling.\n\n**Change your view**\n\nSelect the status bar buttons to\n\nswitch between views, or use the\n\nslider to magnify the page to\n\nyour liking.", - "page_start": 0, - "page_end": 0, - "source_file": "Word QS.pdf" - }, - { - "text": "## **Document history for the Serverless Developer Guide**\n\nThe following table describes notable releases to the Serverless Developer Guide.\n\nChange Description Date\n\nMinor revisions Updated links to Serverless\n\nPatterns workshop (now with\n\nidempotence!). Fixed various\n\nlinks to additional resources.\n\nAugust 28, 2023\n\nWorkshop connections Added links to the related\n\nserverless workshop for\n\nhands-on experience.\n\nApril 12, 2023\n\nInitial release Initial release of the Serverles\n\ns Developer Guide!\n\nFebruary 19, 2023", - "page_start": 90, - "page_end": 90, - "source_file": "serverless-core.pdf" - }, - { - "text": "The ODWEK Java API provides line-of-business operations. For more information, see *IBM*\n\n*Content Manager OnDemand Web Enablement Kit Java APIs: The Basics and Beyond* ,\n\nSG24-7646.\n\n#### **8.1.2 Client infrastructure options**\n\nSeveral basic architectural options, Windows client, Content Navigator, or API-based client\n\nintegration into your line-of-business application, are available.\n\n**Windows client**\n\nConsider the following items when you are planning a Windows client infrastructure:\n\n� It is faster than the web clients and more powerful.\n\n� It requires native installation on each user’s workstation or notebook. Server version\n\nupgrades might also require a new client installation.\n\n� This client supports Citrix and Terminal services environments.\n\n� It does not support the Transforms interface for transforming and converting data formats\n\nbecause the data formats are provided by ODWEK only.\n\n**Content Navigator**\n\nWhen you choose a ready-for-use web client, consider the IBM strategic client, IBM Content\n\nNavigator, because it is the most complete, most recent web client.\n\nSpecial use cases might require the development of a custom client application for Content\n\nManager OnDemand. For more information about development APIs, see 8.3, “Client API\n\noverview” on page 202.\n\nWith Content Navigator, you can run a cross-repository search to search for content across\n\nmultiple types of repositories, including Content Manager OnDemand. For example, Content\n\nManager OnDemand search results can be included in the same hit list as search results\n\nfrom other supported repositories to help provide a comprehensive view of content.\n\nWhen you create a cross-repository search, you can specify the following information:\n\n� Specify the scope of the search on each repository. You can specify the search or the\n\nclasses that you want to include in the cross-repository search by using IBM Content\n\nManager OnDemand. On IBM FileNet Content Manager and IBM Content Manager, you\n\nalso can limit the search to a specific folder.\n\n� Specify how properties from each repository are related to each other.\n\n� Specify any default search criteria that you want displayed when users open the search.\n\nFor more information about how to configure a cross-repository search, see the IBM Content\n\nNavigator Knowledge Center at the following web address:\n\n[http://www.ibm.com/support/knowledgecenter/SSEUEX_2.0.3/contentnavigator_2.0.3.htm](http://www.ibm.com/support/knowledgecenter/SSEUEX_2.0.3/contentnavigator_2.0.3.htm)", - "page_start": 213, - "page_end": 213, - "source_file": "sg246915.pdf" - }, - { - "text": "For help signing in using an IAM Identity Center user, see [Signing in to the AWS access portal](https://docs.aws.amazon.com/signin/latest/userguide/iam-id-center-sign-in-tutorial.html) in\n\nthe *AWS Sign-In User Guide* .\n\n**Assign access to additional users**\n\n1. In IAM Identity Center, create a permission set that follows the best practice of applying least-\n\nprivilege permissions.\n\nFor instructions, see [ Create a permission set](https://docs.aws.amazon.com/singlesignon/latest/userguide/get-started-create-a-permission-set.html) in the *AWS IAM Identity Center User Guide* .\n\n2. Assign users to a group, and then assign single sign-on access to the group.\n\nFor instructions, see [ Add groups](https://docs.aws.amazon.com/singlesignon/latest/userguide/addgroups.html) in the *AWS IAM Identity Center User Guide* .\n\nA common confusion arises when signing in to AWS. Remember, for day to day activities, you\n\nshould **not** be signing in as the root user.\n\n###### **Principals**\n\nIAM implements *authentication* , proving who an entity claims to be, with *principals,* which are\n\nentities such as IAM users, federated users from Google, Facebook, etc, IAM roles, AWS accounts,\n\nand AWS services.\n\nFundamentals", - "page_start": 42, - "page_end": 42, - "source_file": "serverless-core.pdf" - }, - { - "text": "- [ Getting Started Resource Center - Choosing an AWS database service](https://aws.amazon.com/getting-started/decision-guides/databases-on-aws-how-to-choose/) - Choosing the right\n\ndatabase requires you to make a series of decisions based on your organizational needs. This\n\ndecision guide will help you ask the right questions, provide a clear path for implementation, and\n\nhelp you migrate from your existing database.\n\nResources from the serverless community:\n\n- [ Creating a single-table design with Amazon DynamoDB](https://aws.amazon.com/blogs/compute/creating-a-single-table-design-with-amazon-dynamodb/) - blog article by James Beswick (26\n\nJUL 2021) showing how to model many to one and many to many relationships with indexes in\n\nDynamoDB.\n\n- [ Additional Amazon DynamoDB Resources](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/AdditionalResources.html) - more links to blog posts, guides, presentations,\n\ntraining, and tools\n\n#### **Next steps**\n\nIn parallel to this guide, a group of Amazon engineers are building a series of workshops based\n\non architectural and design patterns that customers commonly use in real-world solutions. You\n\nget hands-on experience with infrastructure and code that you could actually deploy as part of a\n\nproduction solution.\n\n**Learn serverless techniques in an online workshop**\n\nLearn by doing in the **[Serverless Patterns Workshop](https://catalog.workshops.aws/serverless-patterns)** . The first module introduces a\n\nserverless microservice to retrieve data from DynamoDB with Lambda and API Gateway.\n\nAdditional modules provide practical examples using infrastructure as code to deploy\n\nresources, test, and build with common architectural patterns used in serverless solutions.\n\nNext steps", - "page_start": 87, - "page_end": 87, - "source_file": "serverless-core.pdf" - }, - { - "text": "Create something\n\nBegin with a **Blank document** to get right to work. Or start with a template to save yourself time and steps. Just select **File** > **New** , and then select or search for the template you want.\n\nAccess files anywhere\n\nNeed to work on the go and across different devices? Click **File** > **Account** to sign in with your Microsoft account and access your recently used files anywhere, on any device, through seamless integration between Office, OneDrive, OneDrive for Business, and SharePoint.\n\nFind recent files\n\nWhether you only work with files stored on your PC’s local hard drive or you store files in multiple shared locations, selecting **File** > **Open** takes you to your recently used documents and any files that you may have pinned to your list.\n\nDiscover related options\n\nWhen you select objects in your document, options related to your selection will appear. For example, selecting a table displays the **Table Design** and **Layout** tabs, which offer additional options.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - }, - { - "text": "**54** IBM Content Manager OnDemand Guide\n\nFor more information, see Technote 1215957, which is available at the following web address:\n\n[http://www.ibm.com/support/docview.wss?uid=swg21215957](http://www.ibm.com/support/docview.wss?uid=swg21215957)\n\n#### **3.1.4 Folders**\n\nA *folder* is the interface that allows a user to search for reports and documents that are stored\n\nin the Content Manager OnDemand system. One or more application groups can be defined\n\nto a folder. The user enters index search criteria into the folder search fields. In the\n\nbackground, an SQL search is issued for each included application group. The results of the\n\nqueries are accumulated, and a document hit list is constructed and returned to the user. The\n\nfolder can be customized to provide the look and feel that is wanted for the users of the\n\nContent Manager OnDemand system. The Content Manager OnDemand administrator can\n\nalso grant specific permissions for users and groups to use the folders.\n\nFigure 3-7 shows the Add a Folder window.\n\n*Figure 3-7 Folder general information*\n\n**Display Document Location**\n\nThe Display Document Location setting (Figure 3-7) determines whether the client shows the\n\nstorage location of each document in the document list by placing an icon next to each entry.\n\nThe possible locations are cache storage (on the library server or an object server) or archive\n\nstorage.\n\n**Note:** For the best indexing results, select a monospacing font with the line data graphical\n\nindexer.\n\nIf the font is changed by using the Administrator Client, the selected font is also used by the\n\nWindows client the next time that the Windows client is started and a line data document is\n\nviewed.", - "page_start": 77, - "page_end": 77, - "source_file": "sg246915.pdf" - } - ] - }, - { - "references": { - "source_file": "Word QS.pdf", - "query": "How to connect to my Microsoft account from Word?", - "target_page": 2, - "target_passage": " Click File > Account to sign in with your Microsoft account", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "### **Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help you get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team.\n\n**Hit the ground running now!** Build confidence by trying things on your own. Go to the meet now button\n\n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!\n\n**Download** the app for [desktop ](https://www.microsoft.com/microsoft-teams/download-app) and [mobile](https://www.microsoft.com/microsoft-teams/download-app) to access Teams with the best performance anywhere you go.\n\nOnce you [sign in](https://teams.microsoft.com/l/home/_#/) , **connect** with your team in chat, channels, calls, and meetings. **Try out** the different features as you learn about them in this guide. You’ll get the basics in no time!\n\n#### **Set up Explore Practice**", - "page_start": 0, - "page_end": 0, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "you will be prompted to create a user ID (your email address) and a password. Once you do that you should have a fresh Web Protégé workspace. Figure 12.1 shows what my Web Protégé workspace currently looks like. Most of the projects are owned by me although note that the CODO project is owned by my colleague Biswanath Dutta. However, I still have complete access to that ontology due to the way Biswanath has configured my access as being able to both view and edit the ontology.\n\nTo upload the Pizza ontology, select the large Create New Project button. This will bring up the window shown in figure 12.2. Fill out the project name and description, then select the Choose File button and navigate to where you have the latest version of the Pizza tutorial with data. Note that in the figure I have already done this navigation so there is a value for the file to load. You can leave the Language field blank. Once you have all the fields set up similar to figure 12.2 click the Create New Project button on this dialog (note this is a different button than the one you started from).\n\nFigure 12.2 The Create New Project Dialog\n\nYour workspace should now include your first project. Click on the three horizontal bars at the far right of the project. This should bring up a pop-up menu. Select the Open option. This should bring you into the main Web Protégé UI to browse an ontology.\n\nBefore you make changes to the ontology you need to make sure the settings for new entities and rendering are consistent with the settings you used for the Pizza ontology. The default in Web Protégé as with Protégé is to use Auto-Generated UUIDs rather than user supplied names. If you aren’t sure about these settings you can go back to exercise 2 at the beginning of chapter 4 and chapter 7 to refresh your memory. There are excellent reasons to use auto-generated UUIDs but for beginners, especially for those who want to learn SPARQL, I think they make learning the basics more difficult so we have been using the alternative of user supplied names. At the top of the Web Protégé UI in the right corner there are", - "page_start": 84, - "page_end": 84, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "Find whatever you need\n\nType a keyword or phrase into the **Search** box to quickly find the Word features and ribbon commands you’re looking for, to discover **Help** content, or to get more information online .\n\nGet other Quick Start guides\n\nTo download our free Quick Start Guides for your other favorite apps, go to **https://go.microsoft.com/fwlink/?linkid=2008317.**\n\nShare your work with others\n\nTo invite others to view or edit your documents, select the **Share** button in the top right corner of the app window. Then, you can choose to share a link to your document or send invitations directly to specific people. If someone doesn't have Word, they can use the free Word for the Web app to edit and comment.\n\nNext steps with Word\n\n**See what’s new in Office** Explore the new and improved features in Word and the other Office apps. Visit **https://go.microsoft.com/fwlink/?linkid=871117** for more information.\n\n**Get free training, tutorials, and videos for Office** Ready to dig deeper into the capabilities that Word has to offer? Visit **https://go.microsoft.com/fwlink/?linkid=871123** to explore our free training options.\n\n**Send us your feedback** Love Word? Got an idea for improvement to share with us? On the **File** menu, select **Feedback** and then follow the prompts to send your suggestions directly to the Word product team. Thank you!", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" - }, - { - "text": "### Share and collaborate\n\nWith this document saved in OneDrive, you can share it with others. They don’t even need Word\n\nto open it.\n\n**Try it:** Select **Share** , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\n\nYou can send the link by typing someone’s email address or by copying the link and pasting it\n\ninto a message or chat. If you want them to read the document but not edit it, set their\n\npermission to view-only.\n\nIf they don’t have Word, the document will open in their web browser, in Word Online.\n\n### Add visuals with pictures from the web\n\nWord works with Bing to give you access to thousands of pictures you can use in your\n\ndocuments.\n\n**Try it:** Hit enter after this line to make a blank line:\n\n**1.** With your cursor in the blank space above, go to the Insert tab, select **Online Pictures** ,\n\nand then search for something, like *puppy clip art* .\n\n**2.** Select the picture you want, and select **Insert** .", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "Quick Start Guide\n\n## New to Word? Use this guide to learn the basics.\n\n**Save your progress**\n\nSave your work on OneDrive\n\nor SharePoint automatically.\n\n**Find whatever you need**\n\nLook up commands from the ribbon,\n\nget Help, or search the web.\n\n**Discover contextual commands**\n\nSelect tables, pictures, or other objects\n\nin a document to reveal additional\n\noptions.\n\n**Share your work with others**\n\nInvite other people to view and edit\n\ncloud-based documents stored in\n\nOneDrive or on SharePoint sites.\n\n**Navigate with ease**\n\nUse the sidebar to manage long or\n\ncomplex documents. **Show or hide the ribbon**\n\nSelect the arrow icon to show\n\nor hide the Quick Access\n\nToolbar, and change ribbon\n\nsettings.\n\n**Format with the mini toolbar**\n\nSelect or right-click text and objects to\n\nquickly format them in place.\n\n**Status bar shortcuts**\n\nSelect any status bar indicator to\n\nnavigate your document, view word\n\ncount statistics, or check your spelling.\n\n**Change your view**\n\nSelect the status bar buttons to\n\nswitch between views, or use the\n\nslider to magnify the page to\n\nyour liking.", - "page_start": 0, - "page_end": 0, - "source_file": "Word QS.pdf" - }, - { - "text": "#### **Share knowledge**\n\nTeamwork is all about collaboration! **Share with your team best practices** you learn along the way, tips and tricks for how you can best organize your workflows and ask for their own advice to define how you can best use Teams together.\n\n#### **Keep learning Test meetings**\n\nUse the Meet now button in the Calendar tab\n\nThen select “Start meeting”\n\nAnd then \"Join now”\n\n## **Next Steps**\n\nYou will **get the most out of Teams** when you get to truly connect with your team and collaborate together. Keep practicing until each step of your workflow feels natural.\n\nNo matter how you like to learn and practice, we've got resources to support and inspire you:\n\n[Virtual classes:](https://www.microsoft.com/en-us/store/workshops-training-and-events/detail/get-started-with-microsoft-teams?program=Professionals&src=carousel1&pos=0) We have instructors to answer your questions and walk you through all the details. -\n\n-\n\n-\n\n-\n\n[Training series:](https://docs.microsoft.com/learn/paths/teamwork-specialist/) Complete the beginner series of videos at your own pace.\n\n[Support articles and step-by-step guides:](https://support.microsoft.com/teams) To get answers to your most common questions.\n\n[Feature overviews, tutorials, and announcements: ](https://www.youtube.com/c/MicrosoftTeams/featured) Our YouTube channel has carefully curated content to get you excited and show how you can use Teams effortlessly.\n\n1.\n\n2.\n\n3.\n\nHere you can try to share your screen, start a whiteboard or even record yourself while you are practicing a presentation. This is your safe space to test everything out!", - "page_start": 5, - "page_end": 5, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" - }, - { - "text": "### Count on Word to count your words\n\n**Try it:** Hit return after this line and type some words.\n\nThe status bar at the bottom of the window keeps a running count of the number of words in\n\nthe document.\n\n### Save this for later, access it anywhere\n\nWhen you save this document in OneDrive, you’ll be able to open it anywhere: on your\n\ncomputer, tablet, or phone. Your changes will be saved automatically.\n\n**Try it:** Select **File** > **Save As** , and then select OneDrive and give this document a name.\n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files.\n\nYou can pick up where you left off… even if you left the document open on the computer you’re\n\nusing now.", - "page_start": 1, - "page_end": 1, - "source_file": "welcome_to_word_template.pdf" - }, - { - "text": "**92** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\n### **4.3 System setup**\n\nThis section provides instructions about how to define the basic settings of the system with\n\nthe system setup wizard, and how to add nodes and optional expansion enclosures.\n\n#### **4.3.1 System setup wizard**\n\nWhether you are redirected from your PC or notebook after completing system initialization or\n\nyou browse to the management IP address manually, you must complete the system setup\n\nwizard to define the basic settings of the system.\n\n**Note:** Make sure that your PC or notebook has a network route to the system IP\n\naddress that you specified. In particular, you can access the management GUI from\n\nany management console that is connected to the same subnet as the system. Enter\n\nthe system IP address on a supported browser to access the management GUI.\n\n**Note:** The first time that you connect to the management GUI, you are prompted to accept\n\nuntrusted certificates because the system certificates are self-signed.\n\nYou can install certificates that are signed by a trusted certificate authority after you\n\ncomplete system setup. For more information about how to perform this task, see 4.5,\n\n“Configuring secure communications” on page 117.", - "page_start": 113, - "page_end": 113, - "source_file": "sg247938.pdf" - }, - { - "text": "For the user to access add-in functionality, the add-in should add a new menu item or a\n\nnew toolbar button to application. When the user selects this menu item or button, the\n\nadd-in should use the Microsoft Office Object Model to obtain a pointer to the active\n\ndocument. It should then call the active document's **ExportAsFixedFormat** method with\n\nan **IUnknown** interface pointer that supports the **IMsoDocExporter** interface through a\n\ncall to the **QueryInterface** method. The object model parameter for the interface pointer\n\nis a VARIANT with VT_UNKNOWN type.\n\n| Note |\n|:---|\n| For OneNote, the add-in calls the Publish method with a string parameter that is the class ID of the add-in's implementation of the IMsoDocExporter interface. OneNote then calls CoCreateInstance with the class ID to get an IUnknown interface pointer from the add-in's class factory. |\n\nAfter Publisher has a pointer to the **IMsoDocExporter** interface, it calls back the add-in\n\nthrough the methods exposed by **IMsoDocExporter** . Through these callbacks, Word\n\nprovides the add-in with document content and other information about the document.\n\nAn excellent source of information about building COM add-ins for Microsoft Office\n\napplications is the codeproject.com article [Building an Office2K COM Add-in with](http://www.codeproject.com/kb/com/outlookaddin.aspx)\n\n[VC++/ATL](http://www.codeproject.com/kb/com/outlookaddin.aspx) .\n\nThe **IMsoDocExporter** interface exposes the following methods.\n\nTable 1. Methods exposed by the IMsoDocExporter interface\n\n| Method Description |\n|:---|\n| HrCreateDoc Called at the start of the fixed-format export process. |\n| HrAddPageFromEmf Called to pass the add-in an enhanced metafile (EMF) that represents a rendered view of the content to export. |\n| HrAddDocumentMetadataString Called to specify string-format metadata for the document. |\n| HrAddDocumentMetadataDate Called to specify date-format metadata for the document. |\n\n**HrSetDefaultLcid** Called to specify the default locale ID (LCID) for the content to\n\nノ **Expand table**\n\n**IMsoDocExporter**\n\nノ **Expand table**", - "page_start": 3, - "page_end": 3, - "source_file": "office-pdf.pdf" - }, - { - "text": "Create something\n\nBegin with a **Blank document** to get right to work. Or start with a template to save yourself time and steps. Just select **File** > **New** , and then select or search for the template you want.\n\nAccess files anywhere\n\nNeed to work on the go and across different devices? Click **File** > **Account** to sign in with your Microsoft account and access your recently used files anywhere, on any device, through seamless integration between Office, OneDrive, OneDrive for Business, and SharePoint.\n\nFind recent files\n\nWhether you only work with files stored on your PC’s local hard drive or you store files in multiple shared locations, selecting **File** > **Open** takes you to your recently used documents and any files that you may have pinned to your list.\n\nDiscover related options\n\nWhen you select objects in your document, options related to your selection will appear. For example, selecting a table displays the **Table Design** and **Layout** tabs, which offer additional options.", - "page_start": 1, - "page_end": 1, - "source_file": "Word QS.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HRL_2004.pdf", - "query": "What are the products of Hormel Foods Corporation?", - "target_page": 4, - "target_passage": "meat and other food product", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "licensed trademarks used in the Company's segments are:\n\nHORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S\n\nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF\n\nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD\n\nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG,\n\nSWEET THING, THICK & EASY and WRANGLERS.\n\n##### **Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up\n\napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS,\n\n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material\n\nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders\n\nare accepted and shipped on a current basis.\n\n##### **Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with\n\nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish.\n\nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and\n\nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc.\n\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong\n\nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then\n\nsupport higher value perceptions from customers.\n\nThe Company competes using this same strategy in international markets around the world.\n\n##### **Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The\n\nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42\n\nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products.\n\n##### **Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "markets its turkey products through its own sales force and independent brokers.\n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003\n\nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest\n\ncompanies providing nutritional products to the U.S. healthcare industry.\n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages\n\nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers.\n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a\n\npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the\n\nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the\n\nPhilippines (Purefoods-Hormel, 40% holding).\n\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the\n\nCompany have been acquired in the ordinary course of business.\n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the\n\nbeginning of the fiscal year.\n\n##### **(b)** * **Industry Segment** *\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other.\n\nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by\n\nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual\n\nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference.\n\n##### **(c)** * **Description of Business** *\n\n##### **Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and\n\ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows:\n\nPerishable meat 50.3% 53.0% 54.7%\n\nNonperishable meat 18.9 19.8 21.0\n\nPoultry 22.1 22.6 20.3\n\nOther 8.7 4.6 4.0\n\n100.0% 100.0% 100.0%\n\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution\n\nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general-\n\npurpose financial statements.\n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon\n\nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen\n\nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and\n\nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin\n\nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003),\n\nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001).\n\nNo new product in fiscal 2003 required a material investment of Company assets.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Diamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001).\n\nNo new product in fiscal 2003 required a material investment of Company assets.\n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned\n\nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of\n\nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by\n\ncommon carrier.\n\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada,\n\nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and\n\noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a\n\nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea.\n\n##### **Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize\n\nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog\n\nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the\n\nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not\n\neliminated the sensitivity of Company results to raw material supply and price fluctuations.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Item 1. BUSINESS\n\nItem 2. PROPERTIES\n\nItem 3. LEGAL PROCEEDINGS\n\nItem 4. SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS\n\n##### **PART II**\n\nItem 5. MARKET FOR THE REGISTRANT'S COMMON STOCK AND RELATED STOCKHOLDER MATTERS\n\nItem 6. SELECTED FINANCIAL DATA\n\nItem 7. MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\n\nItem 7A. QUANTITATIVE AND QUALITATIVE DISCLOSURES ABOUT MARKET RISK\n\nItem 8. FINANCIAL STATEMENTS AND SUPPLEMENTAL DATA\n\nItem 9. CHANGES IN AND DISAGREEMENTS WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE\n\nItem 9A. CONTROLS AND PROCEDURES\n\n##### **PART III**\n\nItem 10. DIRECTORS AND EXECUTIVE OFFICERS OF THE AGREEMENT\n\nItem 11. EXECUTIVE COMPENSATION\n\nItem 12. SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT AND RELATED STOCKHOLDER\n\nMATTERS\n\nItem 13. CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS\n\nItem 14. PRINCIPAL ACCOUNTING FEES AND SERVICES\n\n##### **PART IV**\n\nItem 15. EXHIBITS, FINANCIAL STATEMENT SCHEDULES AND REPORTS ON FORM 8-K\n\n##### **SIGNATURES**\n\n##### **PART I**\n\n##### **Item 1.** * **BUSINESS** *\n\n##### **Available Information**\n\nThe Company makes available, free of charge on its website at *www.hormel.com* , its annual report on Form 10-K, quarterly reports on Form 10-Q,\n\ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of\n\n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such\n\nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours.\n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free\n\nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website,\n\nfree of charge, under the caption \"Investor.\"\n\n##### **(a)** * **General Development of Business** *\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company.\n\nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel\n\nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of\n\nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has\n\nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business.\n\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned\n\nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing\n\nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.\n\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with\n\nthe operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey\n\nprocessing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "##### **(d)** * **Executive Officers of the Registrant** *\n\nJoel W. Johnson 60 Chairman of the Board, President and Chief\n\nExecutive Officer\n\n12/08/95 to Present 1991\n\nMichael J. McCoy 56 Executive Vice President and Chief\n\nFinancial Officer\n\nSenior Vice President and Chief Financial\n\nOfficer\n\nVice President and Controller\n\nVice President and Treasurer\n\n10/29/01 to Present\n\n05/01/00 to 10/28/01\n\n04/27/98 to 04/30/00\n\n01/27/97 to 04/26/98\n\n1996\n\nGary J. Ray 57 Executive Vice President Refrigerated Foods\n\nExecutive Vice President Operations\n\n11/01/99 to Present\n\n07/27/92 to 10/31/99\n\n1988\n\nEric A. Brown 57 Group Vice President Prepared Foods 12/02/96 to Present 1987\n\nSteven G. Binder 46 Group Vice President Foodservice\n\nVice President Foodservice\n\nDirector Foodservice Sales\n\n10/30/00 to Present\n\n11/02/98 to 10/29/00\n\n12/30/96 to 11/01/98\n\n1998\n\nRichard A. Bross 52 Group Vice President Hormel/President\n\nHormel Foods International Corporation\n\nVice President Hormel/President Hormel\n\nFoods International Corporation\n\nVice President Grocery Products\n\n10/29/01 to Present\n\n11/01/99 to 10/28/01\n\n01/30/95 to 10/31/99\n\n1995\n\nJeffrey M. Ettinger 45 Group Vice President Hormel/President and\n\nChief Executive Officer Jennie-O Turkey\n\nStore\n\nGroup Vice President Hormel/President and\n\nChief Operating Officer Jennie-O Turkey\n\nStore\n\nVice President Hormel/President and\n\nChief Operating Officer Jennie-O Turkey\n\nStore\n\nVice President Hormel/President and Chief\n\nExecutive Officer Jennie-O Foods\n\nVice President Hormel/Jennie-O Foods\n\nTreasurer\n\nAssistant Treasurer\n\n03/03/03 to Present\n\n10/29/01 to 03/02/03\n\n04/30/01 to 10/28/01\n\n01/31/00 to 04/29/01\n\n11/01/99 to 01/30/00\n\n04/27/98 to 10/31/99\n\n11/24/97 to 04/26/98\n\n1998\n\nRonald W. Fielding 50 Group Vice President Sales Strategy\n\nGroup Vice President Meat Products\n\nVice President Hormel/President Hormel\n\nFoods International Corporation\n\n06/02/03 to Present\n\n11/01/99 to 06/01/03\n\n01/27/97 to 10/31/99\n\n1997\n\nJames A. Jorgenson 59 Senior Vice President Corporate Staff\n\nVice President Human Resources\n\n11/01/99 to Present\n\n12/30/91 to 10/31/99\n\n1990\n\nMahlon C. Schneider 64 Senior Vice President External Affairs and\n\nGeneral Counsel\n\nVice President and General Counsel\n\n11/01/99 to Present\n\n11/19/90 to 10/31/99\n\n1990\n\nThomas R. Day 45 Vice President Foodservice Sales\n\nDirector Foodservice Sales\n\nDirector Dubuque Foods Incorporated\n\nFoodservice Sales and Marketing\n\n10/30/00 to Present\n\n11/02/98 to 10/29/00\n\n03/07/94 to 11/01/98\n\n2000\n\nForrest D. Dryden 60 Vice President Research and Development 01/26/87 to Present 1987\n\nJody H. Feragen 47 Vice President and Treasurer\n\nTreasurer\n\nAssistant Treasurer, National Computer\n\nSystems in Eden Prairie, Minnesota, a\n\ndata collection and software company\n\n10/29/01 to Present 10/30/00 to\n\n10/28/01\n\n12/01/95 to 10/30/00\n\n2000\n\nDennis B. Goettsch 50 Vice President Foodservice Marketing\n\nDirector Foodservice Marketing\n\n10/30/00 to Present\n\n10/01/90 to 10/29/00\n\n2000\n\nDaniel A. Hartzog 52 Vice President Meat Products Sales\n\nDirector of Meat Products Business\n\nDevelopment\n\nMeat Products Regional Sales Manager\n\n10/30/00 to Present\n\n07/03/00 to 10/29/00\n\n09/19/88 to 07/02/00\n\n2000", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Nordstrom, Inc. and subsidiaries 5\n\n####### **COMPETITIVE CONDITIONS**\n\nWe operate in a highly competitive business environment. We compete with other national, regional, local and online retailers that may carry\n\nsimilar lines of merchandise, including department stores, specialty stores, off-price stores, boutiques and Internet businesses. Our specific\n\ncompetitors vary from market to market. We believe the keys to competing in our industry are providing great customer service and customer\n\nexperiences in stores and online, which includes compelling price and value, fashion newness, quality of products, selection, convenience,\n\ntechnology, product fulfillment, personalization and appealing, relevant store environments in top locations.\n\n####### **INVENTORY**\n\nWe plan our merchandise purchases and receipts to coincide with expected sales trends. For instance, our merchandise purchases and\n\nreceipts increase prior to our Anniversary Sale, which has historically extended over the last two weeks of July. We also purchase and\n\nreceive a larger amount of merchandise in the fall as we prepare for the holiday shopping season (from late November through December).\n\nBeginning in 2012, we increased our investment in pack and hold inventory at Nordstrom Rack, which involves the strategic purchase of\n\nmerchandise from some of our full-line stores’ top brands in advance of the upcoming selling seasons to take advantage of favorable buying\n\nopportunities. This inventory is typically held for six months on average and has contributed to the growth in our Nordstrom Rack business.\n\nWe pay for our merchandise purchases under the terms established with our vendors.\n\nIn order to offer merchandise that our customers want, we purchase from a wide variety of high-quality suppliers, including domestic and\n\nforeign businesses. We also have arrangements with agents and contract manufacturers to produce our private label merchandise. We\n\nexpect our suppliers to meet our “Nordstrom Partnership Guidelines,” which address our corporate social responsibility standards for matters\n\nsuch as legal and regulatory compliance, labor, health and safety and the environment, and are available on our website at Nordstrom.com.\n\n####### **EMPLOYEES**\n\nDuring 2014, we employed approximately 67,000 employees on a full- or part-time basis. Due to the seasonal nature of our business,\n\nemployment increased to approximately 68,000 employees in July 2014 and 73,500 in December 2014. All of our employees are non-union.\n\nWe believe our relationship with our employees is good.\n\n####### **CAUTIONARY STATEMENT**\n\nCertain statements in this Annual Report on Form 10-K contain or may suggest “forward-looking” information (as defined in the Private\n\nSecurities Litigation Reform Act of 1995) that involve risks and uncertainties, including, but not limited to, anticipated financial outlook for the\n\nfiscal year ending January 30, 2016, anticipated annual total and comparable sales rates, anticipated new store openings in existing, new\n\nand international markets, anticipated Return on Invested Capital and trends in our operations. Such statements are based upon the current\n\nbeliefs and expectations of the company’s management and are subject to significant risks and uncertainties. Actual future results may differ\n\nmaterially from historical results or current expectations depending upon factors including, but not limited to:\n\n- successful execution of our customer strategy, including expansion into new markets, acquisitions, investments in our stores and\n\nonline, our ability to realize the anticipated benefits from growth initiatives, our ability to provide a seamless experience across all\n\nchannels, and the timely completion of construction associated with newly planned stores, relocations and remodels, all of which may\n\nbe impacted by the financial health of third parties,", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_JWN_2014.pdf" - }, - { - "text": "Livestock slaughtered by the Company is purchased by Company buyers and commission dealers at sale barns and terminal markets or under long-term\n\nsupply contracts at locations principally in Minnesota, Illinois, Iowa, Nebraska, Colorado and South Dakota. The cost of livestock and the utilization of the\n\nCompany's facilities are affected by both the level and the methods of pork production in the United States. The hog production industry has been rapidly\n\nmoving to very large, vertically integrated, year-round confinement operations operating under long-term supply agreements. This has resulted in fewer\n\nhogs being available on the spot cash market, which decreases the supply of hogs on the open market and can severely diminish the utilization of\n\nslaughter facilities and increase the cost of the raw materials they produce. The Company, along with others in the industry, uses long-term supply\n\ncontracts to manage the effects of this trend and to assure a stable supply of raw materials while minimizing extreme fluctuations in costs over the long-\n\nterm. This may result in costs for live hogs that are either higher or lower than the spot cash market depending on the relationship of the cash spot\n\nmarket to contract prices. Contract costs are fully reflected in the Company's reported financial results. In fiscal 2003, the Company purchased 79 percent\n\nof its hogs under long-term supply contracts.\n\nIn fiscal 2003, JOTS raised approximately 57 percent of the turkeys needed to meet its raw material requirements for whole bird and processed turkey\n\nproducts. Turkeys not sourced within the Company are contracted with independent turkey growers. JOTS' turkey-raising farms are located throughout\n\nMinnesota and Wisconsin. Production costs in raising turkeys are primarily subject to fluctuations in feed grain prices and to a lesser extent fuel costs.\n\n##### **Manufacturing**\n\nThe Company has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China that slaughter livestock for processing. Quality Pork Processors of\n\nDallas, Texas, operates the slaughter facility at Austin under a custom slaughter arrangement.\n\nFacilities that produce manufactured items are located in Algona, Iowa; Aurora, Illinois; Austin, Minnesota; Beloit, Wisconsin; Bondurant, Iowa; Ft. Dodge,\n\nIowa; Fremont, Nebraska; Houston, Texas; Knoxville, Iowa; Mitchellville, Iowa; Osceola, Iowa; Perrysburg, Ohio; Quakertown, Pennsylvania; Rochelle,\n\nIllinois; Savannah, Georgia; Sparta, Wisconsin; Stockton, California; Tucker, Georgia; Visalia, California; Wichita, Kansas; Beijing, China; and Shanghai,\n\nChina. Company products are also custom manufactured by several other companies. The following are the Company's larger custom manufacturers:\n\nLakeside Packing Company, Manitowoc, Wisconsin; Schroeder Milk, Maplewood, Minnesota; Steuben Foods, Jamaica, New York; Power Packaging, St.\n\nCharles, Illinois; Criders, Stilmore, Georgia; Tony Downs, St. James, Minnesota; and Concept Foods, Alma, Kansas. Power\n\nLogistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa.\n\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo,\n\nMinnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota.\n\n##### **Patents and Trademarks**\n\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued\n\npatents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary,\n\nHormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or\n\nlicensed trademarks used in the Company's segments are:", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "3.2 <sup>(1)</sup> Bylaws as amended to date. (Incorporated by reference to Exhibit 3.2 to Hormel's Amendment No. 3 to Registration Statement on\n\nForm S-4, dated November 29, 2001, File No. 333-68498.)\n\n4.1 <sup>(1)</sup> Indenture dated as of June 1, 2001, between Hormel and U.S. Bank Trust National Association, as Trustee relating to certain\n\noutstanding debt securities. (Incorporated by reference to Exhibit 4.1 to Hormel's Registration Statement on Form S-4 dated,\n\nAugust 28, 2001, File No. 333-68498.)\n\n4.2 <sup>(1)</sup> Supplemental Indenture No. 1 dated as of June 4, 2001, to Indenture dated as of June 1, 2001, between Hormel and U.S. Bank\n\nTrust National Association, as Trustee, relating to certain outstanding debt securities. (Incorporated by reference to Exhibit 4.2 to\n\nHormel's Registration Statement on Form S-4 dated August 28, 2001, File No. 333-68498.)\n\n4.3 <sup>(1)</sup> Letter of Representations dated June 5, 2001, among Hormel, U.S. Bank Trust National Association, as Trustee, and The\n\nDepository Trust Company relating to certain outstanding debt securities of Hormel. (Incorporated by reference to Exhibit 4.3 to\n\nHormel's Registration Statement on Form S-4 dated August 28, 2001, File No. 333-68498.)\n\n4.4 <sup>(1)</sup> Pursuant to Item 601 (b)(4)(iii) of Regulation S-K, copies of instruments defining the rights of holders of certain long-term debt are\n\nnot filed. Hormel agrees to furnish copies thereof to the Securities and Exchange Commission upon request.\n\n10.1 <sup>(1)</sup> U.S. $150,000,000 Credit Agreement, dated as of October 20, 2003, between Hormel, the banks identified on the signature pages\n\nthereof, and Citicorp U.S.A. Inc., as Administrative Agent. (Incorporated by Reference to Exhibit 10.1 to Hormel's Current Report\n\non Form 8-K dated October 23, 2003.)\n\n10.2 <sup>(1)(3)</sup> Hormel Foods Corporation Operators' Shares Incentive Compensation Plan. (Incorporated by Reference to Appendix A to\n\nHormel's definitive Proxy Statement filed on December 30, 1997, File No. 001-02402.)\n\n10.3 <sup>(1)(3)</sup> Hormel Foods Corporation Supplemental Executive Retirement Plan (2002 Restatement.) (Incorporated by Reference to\n\nExhibit 10.3 to Hormel's Annual Report on Form 10-K for the fiscal year ended October 26, 2002, file No. 001-02402.)\n\n10.4 <sup>(1)(3)</sup> Hormel Foods Corporation 2000 Stock Incentive Plan. (Incorporated by Reference to Exhibit A to Hormel's definitive Proxy\n\nStatement filed on December 30, 1999, File No. 001-02402.)\n\n(1) Document has previously been filed with the Securities and Exchange Commission and is incorporated herein by reference.\n\n(2) These Exhibits transmitted via EDGAR.\n\n(3) Management compensatory plan", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "###### M A N A G E M E N T ’ S D I S C U S S I O N\n\n*The following discussion of the Company’s financial condition and results of operations should be read together with the other financial*\n\n*information and consolidated financial statements included in this Annual Report. This discussion contains forward-looking statements that*\n\n*involve risks and uncertainties. The Company’s actual results could differ materially from the results anticipated in the forward-looking statements*\n\n*as a result of a variety of factors, including those discussed in “Forward Looking Statements” and elsewhere in this Annual Report.*\n\n**O V E R V I E W**\n\nThe Company designs, develops, manufactures, markets, sells and distributes products and components, primarily for the medical and health care industry.\n\nThe Company markets components to other equipment manufacturers for incorporation in their products and sells finished devices to physicians, hospitals,\n\nclinics and other treatment centers. The Company’s products and services primarily range from ophthalmology and cardiovascular products to fluid delivery\n\ndevices, contract manufacturing and kitting services. In 2003 approximately 26 percent of the Company’s sales were outside the U.S.\n\nThe Company’s products are used in a wide variety of applications by numerous customers, the largest of which accounted for approximately 14 percent\n\nof net sales in 2003. The Company encounters competition in all of its markets and competes primarily on the basis of product quality, price, engineering,\n\ncustomer service and delivery time.\n\nThe Company’s strategy is to provide a broad selection of products and a high level of service in the areas in which it competes. The Company focuses its\n\nresearch and development efforts to improve current products and develop highly-engineered products that meet customer needs and have the potential\n\nfor broad market applications and significant sales. Proposed new products may be subject to regulatory clearance or approval prior to commercialization\n\nand the time period for introducing a new product to the marketplace can be unpredictable. The Company is also focused on controlling costs.\n\nThe Company does this by investing in modern manufacturing technologies and controlling purchasing processes. Over the past three years, the Company\n\nhas continued to be faced with increasing costs associated with all lines of insurance, including group health benefits. The Company has been successful\n\nin consistently generating cash from operations and uses that cash to reduce indebtedness, to fund capital expenditures, to repurchase stock and, starting\n\nin 2003, to pay dividends. During 2003, the Company reduced debt by approximately $6.0 million.\n\nThe Company’s strategic objective is to further enhance its position in its served markets by:\n\n- Focusing on customer needs\n\n- Expanding existing product lines and developing new products\n\n- Maintaining a culture of controlling cost\n\n- Preserving and fostering a collaborative, entrepreneurial management structure\n\nFor the year ended December 31, 2003, the Company reported revenues of $62.8 million, income from continuing operations of $4.9 million and net\n\nincome of $5.1 million, up 5 percent, 20 percent and 95 percent, respectively, from 2002.\n\n**R E S U LT S O F O P E R AT I O N S**\n\nThe Company’s income from continuing operations was $4.9 million, or $2.86 per basic and $2.66 per diluted share, in 2003, compared to income from\n\ncontinuing operations of $4.1 million, or $2.37 per basic and $2.18 per diluted share, in 2002 and $4.3 million, or $2.10 per basic and $1.88 per diluted\n\nshare, in 2001. Net income, including discontinued operations and cumulative effect of accounting change, totaled $5.1 million, or $2.96 per basic and\n\n$2.75 per diluted share, in 2003, compared with $2.6 million, or $1.51 per basic and $1.39 per diluted share, in 2002 and $9.8 million, or $4.80 per", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_ATRI_2003.pdf" - }, - { - "text": "43\n\nH ON I NDUST R I ES I n c. a n d SUB SI DI A R I ES\n\n####### **Nature of Operations**\n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a\n\nprovider of office furniture and hearth products. Both industries are\n\nreportable segments; however, the Company’s office furniture business\n\nis its principal line of business. Refer to the Operating Segment\n\nInformation note for further information. Office furniture products are\n\nsold through a national system of dealers, wholesalers, mass merchan-\n\ndisers, warehouse clubs, retail superstores, end-user customers, and to\n\nfederal and state governments. Dealer, wholesaler, and retail super-\n\nstores are the major channels based on sales. Hearth products include\n\nelectric, wood-, pellet-, and gas-burning factory-built fireplaces, fire-\n\nplace inserts, stoves, and gas logs. These products are sold through a\n\nnational system of dealers, wholesalers, large regional contractors, and\n\nCompany-owned retail outlets. The Company’s products are marketed\n\npredominantly in the United States and Canada. The Company exports\n\nselect products to a limited number of markets outside North America,\n\nprincipally Latin America and the Caribbean, through its export subsid-\n\niary; however, based on sales, these activities are not significant.\n\n####### **Summary of Significant Accounting Policies**\n\n* **PRINCIPLES OF CONSOLIDATION AND FISCAL YEAR-END** *\n\nThe consolidated financial statements include the accounts and trans-\n\nactions of the Company and its subsidiaries. Intercompany accounts\n\nand transactions have been eliminated in consolidation.\n\nThe Company follows a 52/53-week fiscal year which ends\n\non the Saturday nearest December 31. Fiscal year 2003 ended on\n\nJanuary 3, 2004; 2002 ended on December 28, 2002; and 2001 ended\n\non December 29, 2001. The financial statements for fiscal year 2003\n\nare based on a 53-week period; fiscal years 2002 and 2001 are on a\n\n52-week basis.\n\n* **CAS H, CAS H EQ UI VALEN TS , AN D I N VES TMEN TS** *\n\nCash and cash equivalents generally consist of cash, money market\n\naccounts, and debt securities. These securities have original maturity\n\ndates not exceeding three months from date of purchase. The Company\n\nhas short-term investments with maturities of less than one year\n\nand also has investments with maturities greater than one year that\n\nare included in Other Assets on the consolidated balance sheet.\n\nManagement classifies investments in marketable securities at the time\n\nof purchase and reevaluates such classification at each balance sheet\n\ndate. Equity securities are classified as available-for-sale and are stated\n\nat current market value with unrealized gains and losses included as a\n\nseparate component of equity, net of any related tax effect. Debt securi-\n\nties are classified as held-to-maturity and are stated at amortized cost.\n\nThe specific identification method is used to determine realized gains\n\nand losses on the trade date. Short-term investments include municipal\n\nbonds, money market preferred stock, and U.S. treasury notes. Long-\n\nterm investments include U.S. government securities, municipal bonds,\n\ncertificates of deposit, and asset- and mortgage-backed securities.\n\nAt January 3, 2004, and December 28, 2002, cash, cash\n\nequivalents and investments consisted of the following (cost approxi-\n\nmates market value):\n\nCash and Short- Long-\n\ncash term term\n\n*(In thousands)* equivalents investments investments\n\nYEA R -END 2 0 0 3\n\n*Held-to-maturity securities*\n\nMunicipal bonds **$ 31,000 $ - $ 2,396**\n\nU.S. government securities **- - -**\n\nCertificates of deposit **- - 400**\n\n*Available-for-sale securities*\n\nU.S. treasury notes **- 4,259 -**\n\nMoney market preferred stock **- - -**\n\nAsset- and mortgage-backed securities **- 60,949 12,835**\n\n*Cash and money market* *accounts* **107,982 - -**\n\nTotal **$ 138,982 $ 65,208 $ 15,631**\n\nYEA R -END 2 0 0 2\n\n*Held-to-maturity securities*\n\nMunicipal bonds $ 82,300 $ 1,900 $ 5,396", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_HNI_2003.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HRL_2004.pdf", - "query": "Where are Hormel Foods Corporation plants located? ", - "target_page": 5, - "target_passage": "has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "licensed trademarks used in the Company's segments are:\n\nHORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S\n\nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF\n\nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD\n\nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG,\n\nSWEET THING, THICK & EASY and WRANGLERS.\n\n##### **Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up\n\napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS,\n\n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material\n\nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders\n\nare accepted and shipped on a current basis.\n\n##### **Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with\n\nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish.\n\nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and\n\nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc.\n\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong\n\nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then\n\nsupport higher value perceptions from customers.\n\nThe Company competes using this same strategy in international markets around the world.\n\n##### **Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The\n\nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42\n\nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products.\n\n##### **Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "markets its turkey products through its own sales force and independent brokers.\n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003\n\nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest\n\ncompanies providing nutritional products to the U.S. healthcare industry.\n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages\n\nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers.\n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a\n\npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the\n\nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the\n\nPhilippines (Purefoods-Hormel, 40% holding).\n\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the\n\nCompany have been acquired in the ordinary course of business.\n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the\n\nbeginning of the fiscal year.\n\n##### **(b)** * **Industry Segment** *\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other.\n\nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by\n\nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual\n\nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference.\n\n##### **(c)** * **Description of Business** *\n\n##### **Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and\n\ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows:\n\nPerishable meat 50.3% 53.0% 54.7%\n\nNonperishable meat 18.9 19.8 21.0\n\nPoultry 22.1 22.6 20.3\n\nOther 8.7 4.6 4.0\n\n100.0% 100.0% 100.0%\n\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution\n\nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general-\n\npurpose financial statements.\n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon\n\nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen\n\nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and\n\nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin\n\nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003),\n\nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001).\n\nNo new product in fiscal 2003 required a material investment of Company assets.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Diamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001).\n\nNo new product in fiscal 2003 required a material investment of Company assets.\n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned\n\nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of\n\nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by\n\ncommon carrier.\n\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada,\n\nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and\n\noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a\n\nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea.\n\n##### **Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize\n\nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog\n\nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the\n\nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not\n\neliminated the sensitivity of Company results to raw material supply and price fluctuations.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Livestock slaughtered by the Company is purchased by Company buyers and commission dealers at sale barns and terminal markets or under long-term\n\nsupply contracts at locations principally in Minnesota, Illinois, Iowa, Nebraska, Colorado and South Dakota. The cost of livestock and the utilization of the\n\nCompany's facilities are affected by both the level and the methods of pork production in the United States. The hog production industry has been rapidly\n\nmoving to very large, vertically integrated, year-round confinement operations operating under long-term supply agreements. This has resulted in fewer\n\nhogs being available on the spot cash market, which decreases the supply of hogs on the open market and can severely diminish the utilization of\n\nslaughter facilities and increase the cost of the raw materials they produce. The Company, along with others in the industry, uses long-term supply\n\ncontracts to manage the effects of this trend and to assure a stable supply of raw materials while minimizing extreme fluctuations in costs over the long-\n\nterm. This may result in costs for live hogs that are either higher or lower than the spot cash market depending on the relationship of the cash spot\n\nmarket to contract prices. Contract costs are fully reflected in the Company's reported financial results. In fiscal 2003, the Company purchased 79 percent\n\nof its hogs under long-term supply contracts.\n\nIn fiscal 2003, JOTS raised approximately 57 percent of the turkeys needed to meet its raw material requirements for whole bird and processed turkey\n\nproducts. Turkeys not sourced within the Company are contracted with independent turkey growers. JOTS' turkey-raising farms are located throughout\n\nMinnesota and Wisconsin. Production costs in raising turkeys are primarily subject to fluctuations in feed grain prices and to a lesser extent fuel costs.\n\n##### **Manufacturing**\n\nThe Company has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China that slaughter livestock for processing. Quality Pork Processors of\n\nDallas, Texas, operates the slaughter facility at Austin under a custom slaughter arrangement.\n\nFacilities that produce manufactured items are located in Algona, Iowa; Aurora, Illinois; Austin, Minnesota; Beloit, Wisconsin; Bondurant, Iowa; Ft. Dodge,\n\nIowa; Fremont, Nebraska; Houston, Texas; Knoxville, Iowa; Mitchellville, Iowa; Osceola, Iowa; Perrysburg, Ohio; Quakertown, Pennsylvania; Rochelle,\n\nIllinois; Savannah, Georgia; Sparta, Wisconsin; Stockton, California; Tucker, Georgia; Visalia, California; Wichita, Kansas; Beijing, China; and Shanghai,\n\nChina. Company products are also custom manufactured by several other companies. The following are the Company's larger custom manufacturers:\n\nLakeside Packing Company, Manitowoc, Wisconsin; Schroeder Milk, Maplewood, Minnesota; Steuben Foods, Jamaica, New York; Power Packaging, St.\n\nCharles, Illinois; Criders, Stilmore, Georgia; Tony Downs, St. James, Minnesota; and Concept Foods, Alma, Kansas. Power\n\nLogistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa.\n\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo,\n\nMinnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota.\n\n##### **Patents and Trademarks**\n\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued\n\npatents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary,\n\nHormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or\n\nlicensed trademarks used in the Company's segments are:", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Item 1. BUSINESS\n\nItem 2. PROPERTIES\n\nItem 3. LEGAL PROCEEDINGS\n\nItem 4. SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS\n\n##### **PART II**\n\nItem 5. MARKET FOR THE REGISTRANT'S COMMON STOCK AND RELATED STOCKHOLDER MATTERS\n\nItem 6. SELECTED FINANCIAL DATA\n\nItem 7. MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\n\nItem 7A. QUANTITATIVE AND QUALITATIVE DISCLOSURES ABOUT MARKET RISK\n\nItem 8. FINANCIAL STATEMENTS AND SUPPLEMENTAL DATA\n\nItem 9. CHANGES IN AND DISAGREEMENTS WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE\n\nItem 9A. CONTROLS AND PROCEDURES\n\n##### **PART III**\n\nItem 10. DIRECTORS AND EXECUTIVE OFFICERS OF THE AGREEMENT\n\nItem 11. EXECUTIVE COMPENSATION\n\nItem 12. SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT AND RELATED STOCKHOLDER\n\nMATTERS\n\nItem 13. CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS\n\nItem 14. PRINCIPAL ACCOUNTING FEES AND SERVICES\n\n##### **PART IV**\n\nItem 15. EXHIBITS, FINANCIAL STATEMENT SCHEDULES AND REPORTS ON FORM 8-K\n\n##### **SIGNATURES**\n\n##### **PART I**\n\n##### **Item 1.** * **BUSINESS** *\n\n##### **Available Information**\n\nThe Company makes available, free of charge on its website at *www.hormel.com* , its annual report on Form 10-K, quarterly reports on Form 10-Q,\n\ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of\n\n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such\n\nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours.\n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free\n\nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website,\n\nfree of charge, under the caption \"Investor.\"\n\n##### **(a)** * **General Development of Business** *\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company.\n\nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel\n\nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of\n\nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has\n\nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business.\n\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned\n\nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing\n\nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.\n\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with\n\nthe operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey\n\nprocessing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "3.2 <sup>(1)</sup> Bylaws as amended to date. (Incorporated by reference to Exhibit 3.2 to Hormel's Amendment No. 3 to Registration Statement on\n\nForm S-4, dated November 29, 2001, File No. 333-68498.)\n\n4.1 <sup>(1)</sup> Indenture dated as of June 1, 2001, between Hormel and U.S. Bank Trust National Association, as Trustee relating to certain\n\noutstanding debt securities. (Incorporated by reference to Exhibit 4.1 to Hormel's Registration Statement on Form S-4 dated,\n\nAugust 28, 2001, File No. 333-68498.)\n\n4.2 <sup>(1)</sup> Supplemental Indenture No. 1 dated as of June 4, 2001, to Indenture dated as of June 1, 2001, between Hormel and U.S. Bank\n\nTrust National Association, as Trustee, relating to certain outstanding debt securities. (Incorporated by reference to Exhibit 4.2 to\n\nHormel's Registration Statement on Form S-4 dated August 28, 2001, File No. 333-68498.)\n\n4.3 <sup>(1)</sup> Letter of Representations dated June 5, 2001, among Hormel, U.S. Bank Trust National Association, as Trustee, and The\n\nDepository Trust Company relating to certain outstanding debt securities of Hormel. (Incorporated by reference to Exhibit 4.3 to\n\nHormel's Registration Statement on Form S-4 dated August 28, 2001, File No. 333-68498.)\n\n4.4 <sup>(1)</sup> Pursuant to Item 601 (b)(4)(iii) of Regulation S-K, copies of instruments defining the rights of holders of certain long-term debt are\n\nnot filed. Hormel agrees to furnish copies thereof to the Securities and Exchange Commission upon request.\n\n10.1 <sup>(1)</sup> U.S. $150,000,000 Credit Agreement, dated as of October 20, 2003, between Hormel, the banks identified on the signature pages\n\nthereof, and Citicorp U.S.A. Inc., as Administrative Agent. (Incorporated by Reference to Exhibit 10.1 to Hormel's Current Report\n\non Form 8-K dated October 23, 2003.)\n\n10.2 <sup>(1)(3)</sup> Hormel Foods Corporation Operators' Shares Incentive Compensation Plan. (Incorporated by Reference to Appendix A to\n\nHormel's definitive Proxy Statement filed on December 30, 1997, File No. 001-02402.)\n\n10.3 <sup>(1)(3)</sup> Hormel Foods Corporation Supplemental Executive Retirement Plan (2002 Restatement.) (Incorporated by Reference to\n\nExhibit 10.3 to Hormel's Annual Report on Form 10-K for the fiscal year ended October 26, 2002, file No. 001-02402.)\n\n10.4 <sup>(1)(3)</sup> Hormel Foods Corporation 2000 Stock Incentive Plan. (Incorporated by Reference to Exhibit A to Hormel's definitive Proxy\n\nStatement filed on December 30, 1999, File No. 001-02402.)\n\n(1) Document has previously been filed with the Securities and Exchange Commission and is incorporated herein by reference.\n\n(2) These Exhibits transmitted via EDGAR.\n\n(3) Management compensatory plan", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Houston, Texas 93,000 Owned\n\nKnoxville, Iowa 130,000 Owned\n\nOsceola, Iowa 334,000 Owned\n\nQuakertown, Pennsylvania 13,000 Owned\n\nRochelle, Illinois 440,000 Owned\n\nSparta, Wisconsin 185,000 Owned\n\nStockton, California 139,000 Owned\n\nTucker, Georgia 259,000 Owned\n\nWichita, Kansas 80,000 Owned\n\n*Warehouse/Distribution Centers*\n\nAustin, Minnesota—Annex 83,000 Owned\n\nDayton, Ohio 140,000 Owned\n\nEldridge, Iowa 280,000 Leased October, 2005\n\nOsceola, Iowa 233,000 Owned\n\nStockton, California 232,000 Leased July, 2004\n\nTucker, Georgia 96,000 Leased October, 2004\n\n*Research and Development Center*\n\nAustin, Minnesota 59,000 Owned\n\n*Corporate Offices*\n\nAustin, Minnesota 203,000 Owned\n\n##### * **Dan's Prize, Inc.** *\n\nBrowerville, Minnesota—Plant 52,000 Owned\n\nLong Prairie, Minnesota—Plant 80,000 Owned\n\n##### * **Jennie-O Turkey Store, Inc.** *\n\n*Plants*\n\nBarron, Wisconsin 372,000 Owned\n\nFaribault, Minnesota 169,000 Owned\n\nMarshall, Minnesota 142,000 Owned\n\nMelrose, Minnesota 124,000 Owned\n\nMontevideo, Minnesota 85,000 Owned\n\nPelican Rapids, Minnesota 242,000 Owned\n\nWillmar, Minnesota 419,000 Owned\n\n* Acres\n\nMany of these properties are not exclusive to any one of the Company's segments and a few of the properties are utilized in all five segments of the\n\nCompany. The Company has renovation or building projects in progress at Austin, Minnesota; Fremont, Nebraska; Rochelle, Illinois; Osceola, Iowa; Los\n\nAnimas, Colorado; and at various JOTS locations. The Company believes its operating facilities are well maintained and suitable for current production\n\nvolumes and all volumes anticipated in the foreseeable future.\n\n##### **Item 3.** * **LEGAL PROCEEDINGS** *\n\nThe Company knows of no pending material legal proceedings.\n\n##### **Item 4.** * **SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS** *\n\nNo matters were submitted to shareholders during the fourth quarter of the 2003 fiscal year.\n\n##### **PART II**\n\n##### **Item 5.** * **MARKET FOR THE REGISTRANT'S COMMON STOCK AND RELATED STOCKHOLDER MATTERS** *\n\nThe high and low closing price of the Company's Common Stock and the dividends per share declared for each fiscal quarter of 2003 and 2002,\n\nrespectively, are shown below:", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "##### **(d)** * **Executive Officers of the Registrant** *\n\nJoel W. Johnson 60 Chairman of the Board, President and Chief\n\nExecutive Officer\n\n12/08/95 to Present 1991\n\nMichael J. McCoy 56 Executive Vice President and Chief\n\nFinancial Officer\n\nSenior Vice President and Chief Financial\n\nOfficer\n\nVice President and Controller\n\nVice President and Treasurer\n\n10/29/01 to Present\n\n05/01/00 to 10/28/01\n\n04/27/98 to 04/30/00\n\n01/27/97 to 04/26/98\n\n1996\n\nGary J. Ray 57 Executive Vice President Refrigerated Foods\n\nExecutive Vice President Operations\n\n11/01/99 to Present\n\n07/27/92 to 10/31/99\n\n1988\n\nEric A. Brown 57 Group Vice President Prepared Foods 12/02/96 to Present 1987\n\nSteven G. Binder 46 Group Vice President Foodservice\n\nVice President Foodservice\n\nDirector Foodservice Sales\n\n10/30/00 to Present\n\n11/02/98 to 10/29/00\n\n12/30/96 to 11/01/98\n\n1998\n\nRichard A. Bross 52 Group Vice President Hormel/President\n\nHormel Foods International Corporation\n\nVice President Hormel/President Hormel\n\nFoods International Corporation\n\nVice President Grocery Products\n\n10/29/01 to Present\n\n11/01/99 to 10/28/01\n\n01/30/95 to 10/31/99\n\n1995\n\nJeffrey M. Ettinger 45 Group Vice President Hormel/President and\n\nChief Executive Officer Jennie-O Turkey\n\nStore\n\nGroup Vice President Hormel/President and\n\nChief Operating Officer Jennie-O Turkey\n\nStore\n\nVice President Hormel/President and\n\nChief Operating Officer Jennie-O Turkey\n\nStore\n\nVice President Hormel/President and Chief\n\nExecutive Officer Jennie-O Foods\n\nVice President Hormel/Jennie-O Foods\n\nTreasurer\n\nAssistant Treasurer\n\n03/03/03 to Present\n\n10/29/01 to 03/02/03\n\n04/30/01 to 10/28/01\n\n01/31/00 to 04/29/01\n\n11/01/99 to 01/30/00\n\n04/27/98 to 10/31/99\n\n11/24/97 to 04/26/98\n\n1998\n\nRonald W. Fielding 50 Group Vice President Sales Strategy\n\nGroup Vice President Meat Products\n\nVice President Hormel/President Hormel\n\nFoods International Corporation\n\n06/02/03 to Present\n\n11/01/99 to 06/01/03\n\n01/27/97 to 10/31/99\n\n1997\n\nJames A. Jorgenson 59 Senior Vice President Corporate Staff\n\nVice President Human Resources\n\n11/01/99 to Present\n\n12/30/91 to 10/31/99\n\n1990\n\nMahlon C. Schneider 64 Senior Vice President External Affairs and\n\nGeneral Counsel\n\nVice President and General Counsel\n\n11/01/99 to Present\n\n11/19/90 to 10/31/99\n\n1990\n\nThomas R. Day 45 Vice President Foodservice Sales\n\nDirector Foodservice Sales\n\nDirector Dubuque Foods Incorporated\n\nFoodservice Sales and Marketing\n\n10/30/00 to Present\n\n11/02/98 to 10/29/00\n\n03/07/94 to 11/01/98\n\n2000\n\nForrest D. Dryden 60 Vice President Research and Development 01/26/87 to Present 1987\n\nJody H. Feragen 47 Vice President and Treasurer\n\nTreasurer\n\nAssistant Treasurer, National Computer\n\nSystems in Eden Prairie, Minnesota, a\n\ndata collection and software company\n\n10/29/01 to Present 10/30/00 to\n\n10/28/01\n\n12/01/95 to 10/30/00\n\n2000\n\nDennis B. Goettsch 50 Vice President Foodservice Marketing\n\nDirector Foodservice Marketing\n\n10/30/00 to Present\n\n10/01/90 to 10/29/00\n\n2000\n\nDaniel A. Hartzog 52 Vice President Meat Products Sales\n\nDirector of Meat Products Business\n\nDevelopment\n\nMeat Products Regional Sales Manager\n\n10/30/00 to Present\n\n07/03/00 to 10/29/00\n\n09/19/88 to 07/02/00\n\n2000", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "atmosphere of vitality and energy at Chesapeake, important ingredi­\n\nents of our distinctive culture. These attributes, along with a vibrant\n\nand attractive corporate headquarters campus, low levels of bureau­\n\ncracy, great assets and a well-executed corporate strategy combine to\n\ncreate our culture of success and innovation.\n\nThis has generated extremely positive external feedback as\n\nChesapeake was recently recognized for the fourth consecutive year\n\nas one of the FORTUNE 100 Best Companies to Work For <sup>®(3)</sup> in the U.S.\n\nIn fact, we moved up to #32 overall and #1 in our industry — we are\n\nvery proud of having created and sustained what is now considered\n\nthe best place to work in all of the U.S. energy production industry.\n\nIn addition, we were honored in December 2010 at the 12th Annual\n\nPlatts Global Energy Awards as finalists for CEO of the Year, Community\n\nDevelopment Program of the Year, Deal of the Year, Energy Producer\n\nof the Year and the Industry Leadership Award. Chesapeake was one\n\nof only two companies selected as a finalist in five or more categories.\n\nThe company was also honored in 2010 with a Certificate of Recognition\n\nfor our military reserve recruiting efforts, named a 2010 Best Diversity\n\nCompany by Engineering & Information Technology Magazine and rec­\n\nognized for Best Investor Relations in Energy Sector and Best Investor\n\nRelations Website at the 2010 IR Magazine U.S. Awards.\n\n**Recent Events and a Better Way Forward**\n\nYou may be aware that I have been outspoken in attempting to persuade\n\nour country’s political leadership to recognize that the discovery of vast\n\nresources of unconventional natural gas and oil in the U.S. is a complete\n\ngame changer for our country from an economic, national security and\n\nenvironmental perspective. After two years of my best efforts and the\n\nefforts of many others in the industry, most notably T. Boone Pickens,\n\nFrom our beginning 22 years ago with 10\n\nemployees in Oklahoma City to employing\n\nmore than 10,000 people across 15 states\n\ntoday, Chesapeake has always focused on\n\nbuilding first-class human resources within\n\na distinctive corporate culture.\n\n*<<* *A Chesapeake rig drills in the Marcellus Shale, where the company is*\n\n*the leading leasehold owner, largest producer and most active driller.*\n\nwet natural gas and dry natural gas), similar to the components of the\n\nEagle Ford Shale. We have made a large commitment to this play and\n\nhave acquired approximately 1.2 million net leasehold acres and expect\n\nto increase this total to as much as 1.5 million net leasehold acres in the\n\ncoming months. We are currently using three rigs to evaluate the play\n\nand believe our leasehold could support the drilling of up to 12,000 net\n\nwells. This is an area where we anticipate bringing in a joint venture\n\npartner late in 2011 or early in 2012.\n\n**Our People**\n\nGreat assets cannot exist without great people, so we take great pride\n\nin hiring, training, motivating, rewarding and retaining what we regard\n\nas the best employees in the industry. From our beginning 22 years ago\n\nwith 10 employees in Oklahoma City to employing more than 10,000\n\npeople across 15 states today, Chesapeake has always focused on build­\n\ning first-class human resources within a distinctive corporate culture. Talk\n\nto Chesapeake employees and you will note genuine pride and great\n\nenthusiasm about the company and the critical role that we play in deliv­\n\nering increasing quantities of clean and affordable American natural gas\n\nand valuable and reliable liquids to energy consumers across the country.\n\nChesapeake employees are distinctive in other ways as well. They\n\nare much younger than the industry average, with half of our almost\n\n4,000 Oklahoma City-based headquarters employees 33 years old\n\nor younger. Their enthusiasm and willingness to learn create an\n\n**12** | LETTER TO SHAREHOLDERS 2010 ANNUAL REPORT | **13**", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "## **Hormel Foods Annual Report 2004**\n\n### **Form 10-K (NYSE:HRL)**\n\n#### Published: January 23rd, 2004\n\nPDF generated by [stocklight.com](http://stocklight.com?gac=annual_report&gaa=pdf_click&gal=NYSE:HRL)", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_HRL_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_HRL_2004.pdf", - "query": "Does Hormel Food Corporation have any material legal proceedings pending?", - "target_page": 8, - "target_passage": "The Company knows of no pending material legal proceedings.", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "markets its turkey products through its own sales force and independent brokers.\n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003\n\nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest\n\ncompanies providing nutritional products to the U.S. healthcare industry.\n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages\n\nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers.\n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a\n\npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the\n\nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the\n\nPhilippines (Purefoods-Hormel, 40% holding).\n\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the\n\nCompany have been acquired in the ordinary course of business.\n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the\n\nbeginning of the fiscal year.\n\n##### **(b)** * **Industry Segment** *\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other.\n\nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by\n\nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual\n\nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference.\n\n##### **(c)** * **Description of Business** *\n\n##### **Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and\n\ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows:\n\nPerishable meat 50.3% 53.0% 54.7%\n\nNonperishable meat 18.9 19.8 21.0\n\nPoultry 22.1 22.6 20.3\n\nOther 8.7 4.6 4.0\n\n100.0% 100.0% 100.0%\n\nReporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution\n\nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general-\n\npurpose financial statements.\n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon\n\nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen\n\nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and\n\nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin\n\nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003),\n\nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001).\n\nNo new product in fiscal 2003 required a material investment of Company assets.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Diamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001).\n\nNo new product in fiscal 2003 required a material investment of Company assets.\n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned\n\nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of\n\nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by\n\ncommon carrier.\n\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada,\n\nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and\n\noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a\n\nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea.\n\n##### **Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize\n\nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog\n\nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the\n\nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not\n\neliminated the sensitivity of Company results to raw material supply and price fluctuations.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Item 1. BUSINESS\n\nItem 2. PROPERTIES\n\nItem 3. LEGAL PROCEEDINGS\n\nItem 4. SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS\n\n##### **PART II**\n\nItem 5. MARKET FOR THE REGISTRANT'S COMMON STOCK AND RELATED STOCKHOLDER MATTERS\n\nItem 6. SELECTED FINANCIAL DATA\n\nItem 7. MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\n\nItem 7A. QUANTITATIVE AND QUALITATIVE DISCLOSURES ABOUT MARKET RISK\n\nItem 8. FINANCIAL STATEMENTS AND SUPPLEMENTAL DATA\n\nItem 9. CHANGES IN AND DISAGREEMENTS WITH ACCOUNTANTS ON ACCOUNTING AND FINANCIAL DISCLOSURE\n\nItem 9A. CONTROLS AND PROCEDURES\n\n##### **PART III**\n\nItem 10. DIRECTORS AND EXECUTIVE OFFICERS OF THE AGREEMENT\n\nItem 11. EXECUTIVE COMPENSATION\n\nItem 12. SECURITY OWNERSHIP OF CERTAIN BENEFICIAL OWNERS AND MANAGEMENT AND RELATED STOCKHOLDER\n\nMATTERS\n\nItem 13. CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS\n\nItem 14. PRINCIPAL ACCOUNTING FEES AND SERVICES\n\n##### **PART IV**\n\nItem 15. EXHIBITS, FINANCIAL STATEMENT SCHEDULES AND REPORTS ON FORM 8-K\n\n##### **SIGNATURES**\n\n##### **PART I**\n\n##### **Item 1.** * **BUSINESS** *\n\n##### **Available Information**\n\nThe Company makes available, free of charge on its website at *www.hormel.com* , its annual report on Form 10-K, quarterly reports on Form 10-Q,\n\ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of\n\n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such\n\nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours.\n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free\n\nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website,\n\nfree of charge, under the caption \"Investor.\"\n\n##### **(a)** * **General Development of Business** *\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company.\n\nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel\n\nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of\n\nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has\n\nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business.\n\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned\n\nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing\n\nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.\n\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with\n\nthe operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey\n\nprocessing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "licensed trademarks used in the Company's segments are:\n\nHORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S\n\nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF\n\nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD\n\nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG,\n\nSWEET THING, THICK & EASY and WRANGLERS.\n\n##### **Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up\n\napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS,\n\n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material\n\nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders\n\nare accepted and shipped on a current basis.\n\n##### **Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with\n\nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish.\n\nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and\n\nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc.\n\nAll Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong\n\nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then\n\nsupport higher value perceptions from customers.\n\nThe Company competes using this same strategy in international markets around the world.\n\n##### **Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The\n\nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42\n\nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products.\n\n##### **Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees.", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "3.2 <sup>(1)</sup> Bylaws as amended to date. (Incorporated by reference to Exhibit 3.2 to Hormel's Amendment No. 3 to Registration Statement on\n\nForm S-4, dated November 29, 2001, File No. 333-68498.)\n\n4.1 <sup>(1)</sup> Indenture dated as of June 1, 2001, between Hormel and U.S. Bank Trust National Association, as Trustee relating to certain\n\noutstanding debt securities. (Incorporated by reference to Exhibit 4.1 to Hormel's Registration Statement on Form S-4 dated,\n\nAugust 28, 2001, File No. 333-68498.)\n\n4.2 <sup>(1)</sup> Supplemental Indenture No. 1 dated as of June 4, 2001, to Indenture dated as of June 1, 2001, between Hormel and U.S. Bank\n\nTrust National Association, as Trustee, relating to certain outstanding debt securities. (Incorporated by reference to Exhibit 4.2 to\n\nHormel's Registration Statement on Form S-4 dated August 28, 2001, File No. 333-68498.)\n\n4.3 <sup>(1)</sup> Letter of Representations dated June 5, 2001, among Hormel, U.S. Bank Trust National Association, as Trustee, and The\n\nDepository Trust Company relating to certain outstanding debt securities of Hormel. (Incorporated by reference to Exhibit 4.3 to\n\nHormel's Registration Statement on Form S-4 dated August 28, 2001, File No. 333-68498.)\n\n4.4 <sup>(1)</sup> Pursuant to Item 601 (b)(4)(iii) of Regulation S-K, copies of instruments defining the rights of holders of certain long-term debt are\n\nnot filed. Hormel agrees to furnish copies thereof to the Securities and Exchange Commission upon request.\n\n10.1 <sup>(1)</sup> U.S. $150,000,000 Credit Agreement, dated as of October 20, 2003, between Hormel, the banks identified on the signature pages\n\nthereof, and Citicorp U.S.A. Inc., as Administrative Agent. (Incorporated by Reference to Exhibit 10.1 to Hormel's Current Report\n\non Form 8-K dated October 23, 2003.)\n\n10.2 <sup>(1)(3)</sup> Hormel Foods Corporation Operators' Shares Incentive Compensation Plan. (Incorporated by Reference to Appendix A to\n\nHormel's definitive Proxy Statement filed on December 30, 1997, File No. 001-02402.)\n\n10.3 <sup>(1)(3)</sup> Hormel Foods Corporation Supplemental Executive Retirement Plan (2002 Restatement.) (Incorporated by Reference to\n\nExhibit 10.3 to Hormel's Annual Report on Form 10-K for the fiscal year ended October 26, 2002, file No. 001-02402.)\n\n10.4 <sup>(1)(3)</sup> Hormel Foods Corporation 2000 Stock Incentive Plan. (Incorporated by Reference to Exhibit A to Hormel's definitive Proxy\n\nStatement filed on December 30, 1999, File No. 001-02402.)\n\n(1) Document has previously been filed with the Securities and Exchange Commission and is incorporated herein by reference.\n\n(2) These Exhibits transmitted via EDGAR.\n\n(3) Management compensatory plan", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Livestock slaughtered by the Company is purchased by Company buyers and commission dealers at sale barns and terminal markets or under long-term\n\nsupply contracts at locations principally in Minnesota, Illinois, Iowa, Nebraska, Colorado and South Dakota. The cost of livestock and the utilization of the\n\nCompany's facilities are affected by both the level and the methods of pork production in the United States. The hog production industry has been rapidly\n\nmoving to very large, vertically integrated, year-round confinement operations operating under long-term supply agreements. This has resulted in fewer\n\nhogs being available on the spot cash market, which decreases the supply of hogs on the open market and can severely diminish the utilization of\n\nslaughter facilities and increase the cost of the raw materials they produce. The Company, along with others in the industry, uses long-term supply\n\ncontracts to manage the effects of this trend and to assure a stable supply of raw materials while minimizing extreme fluctuations in costs over the long-\n\nterm. This may result in costs for live hogs that are either higher or lower than the spot cash market depending on the relationship of the cash spot\n\nmarket to contract prices. Contract costs are fully reflected in the Company's reported financial results. In fiscal 2003, the Company purchased 79 percent\n\nof its hogs under long-term supply contracts.\n\nIn fiscal 2003, JOTS raised approximately 57 percent of the turkeys needed to meet its raw material requirements for whole bird and processed turkey\n\nproducts. Turkeys not sourced within the Company are contracted with independent turkey growers. JOTS' turkey-raising farms are located throughout\n\nMinnesota and Wisconsin. Production costs in raising turkeys are primarily subject to fluctuations in feed grain prices and to a lesser extent fuel costs.\n\n##### **Manufacturing**\n\nThe Company has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China that slaughter livestock for processing. Quality Pork Processors of\n\nDallas, Texas, operates the slaughter facility at Austin under a custom slaughter arrangement.\n\nFacilities that produce manufactured items are located in Algona, Iowa; Aurora, Illinois; Austin, Minnesota; Beloit, Wisconsin; Bondurant, Iowa; Ft. Dodge,\n\nIowa; Fremont, Nebraska; Houston, Texas; Knoxville, Iowa; Mitchellville, Iowa; Osceola, Iowa; Perrysburg, Ohio; Quakertown, Pennsylvania; Rochelle,\n\nIllinois; Savannah, Georgia; Sparta, Wisconsin; Stockton, California; Tucker, Georgia; Visalia, California; Wichita, Kansas; Beijing, China; and Shanghai,\n\nChina. Company products are also custom manufactured by several other companies. The following are the Company's larger custom manufacturers:\n\nLakeside Packing Company, Manitowoc, Wisconsin; Schroeder Milk, Maplewood, Minnesota; Steuben Foods, Jamaica, New York; Power Packaging, St.\n\nCharles, Illinois; Criders, Stilmore, Georgia; Tony Downs, St. James, Minnesota; and Concept Foods, Alma, Kansas. Power\n\nLogistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa.\n\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo,\n\nMinnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota.\n\n##### **Patents and Trademarks**\n\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued\n\npatents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary,\n\nHormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or\n\nlicensed trademarks used in the Company's segments are:", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "Houston, Texas 93,000 Owned\n\nKnoxville, Iowa 130,000 Owned\n\nOsceola, Iowa 334,000 Owned\n\nQuakertown, Pennsylvania 13,000 Owned\n\nRochelle, Illinois 440,000 Owned\n\nSparta, Wisconsin 185,000 Owned\n\nStockton, California 139,000 Owned\n\nTucker, Georgia 259,000 Owned\n\nWichita, Kansas 80,000 Owned\n\n*Warehouse/Distribution Centers*\n\nAustin, Minnesota—Annex 83,000 Owned\n\nDayton, Ohio 140,000 Owned\n\nEldridge, Iowa 280,000 Leased October, 2005\n\nOsceola, Iowa 233,000 Owned\n\nStockton, California 232,000 Leased July, 2004\n\nTucker, Georgia 96,000 Leased October, 2004\n\n*Research and Development Center*\n\nAustin, Minnesota 59,000 Owned\n\n*Corporate Offices*\n\nAustin, Minnesota 203,000 Owned\n\n##### * **Dan's Prize, Inc.** *\n\nBrowerville, Minnesota—Plant 52,000 Owned\n\nLong Prairie, Minnesota—Plant 80,000 Owned\n\n##### * **Jennie-O Turkey Store, Inc.** *\n\n*Plants*\n\nBarron, Wisconsin 372,000 Owned\n\nFaribault, Minnesota 169,000 Owned\n\nMarshall, Minnesota 142,000 Owned\n\nMelrose, Minnesota 124,000 Owned\n\nMontevideo, Minnesota 85,000 Owned\n\nPelican Rapids, Minnesota 242,000 Owned\n\nWillmar, Minnesota 419,000 Owned\n\n* Acres\n\nMany of these properties are not exclusive to any one of the Company's segments and a few of the properties are utilized in all five segments of the\n\nCompany. The Company has renovation or building projects in progress at Austin, Minnesota; Fremont, Nebraska; Rochelle, Illinois; Osceola, Iowa; Los\n\nAnimas, Colorado; and at various JOTS locations. The Company believes its operating facilities are well maintained and suitable for current production\n\nvolumes and all volumes anticipated in the foreseeable future.\n\n##### **Item 3.** * **LEGAL PROCEEDINGS** *\n\nThe Company knows of no pending material legal proceedings.\n\n##### **Item 4.** * **SUBMISSION OF MATTERS TO A VOTE OF SECURITY HOLDERS** *\n\nNo matters were submitted to shareholders during the fourth quarter of the 2003 fiscal year.\n\n##### **PART II**\n\n##### **Item 5.** * **MARKET FOR THE REGISTRANT'S COMMON STOCK AND RELATED STOCKHOLDER MATTERS** *\n\nThe high and low closing price of the Company's Common Stock and the dividends per share declared for each fiscal quarter of 2003 and 2002,\n\nrespectively, are shown below:", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "53\n\nThe Company has contingent liabilities, which have arisen in\n\nthe course of its business, including pending litigation, preferential\n\npayment claims in customer bankruptcies, environmental remediation,\n\ntaxes, and other claims. The Company currently has a claim for approx-\n\nimately $7.6 million pending against it, arising out of the bankruptcy of\n\na customer filed in 2001. The Company was named a critical vendor by\n\nthe bankruptcy court and, accordingly, was paid in full for all out-\n\nstanding receivables. The claim alleges that the Company received\n\npreferential payments from the customer during the ninety days before\n\nthe customer filed for bankruptcy protection. The claim was brought in\n\nFebruary 2003. The Company has recorded an accrual with respect to\n\nthis contingency, in an amount substantially less than the full amount\n\nof the claim, which represents the best estimate within the range of\n\nlikely exposure, and intends to vigorously defend against the claim.\n\nGiven the nature of this claim, it is possible that the ultimate outcome\n\ncould differ from the recorded amount.\n\n####### **Significant Customer**\n\nOne office furniture customer accounted for approximately 13% of con-\n\nsolidated net sales in 2003 and 14% in 2002 and 2001.\n\n####### **Operating Segment Information**\n\nIn accordance with SFAS No. 131, “Disclosures about Segments of an\n\nEnterprise and Related Information,” management views the Company\n\nas being in two operating segments: office furniture and hearth prod-\n\nucts, with the former being the principal segment. The office furniture\n\nsegment manufactures and markets a broad line of metal and wood\n\ncommercial and home office furniture, which includes storage prod-\n\nucts, desks, credenzas, chairs, tables, bookcases, freestanding office\n\npartitions and panel systems, and other related products. The hearth\n\nproducts segment manufactures and markets a broad line of manufac-\n\ntured gas-, pellet-, and wood-burning fireplaces and stoves, fireplace\n\ninserts, gas logs, and chimney systems, principally for the home.\n\nThe Company’s hearth products segment is somewhat sea-\n\nsonal, with the third (July-September) and fourth (October-December)\n\nfiscal quarters historically having higher sales than the prior quarters.\n\nIn fiscal 2003, 56% of consolidated net sales of hearth products were\n\ngenerated in the third and fourth quarters.\n\nFor purposes of segment reporting, intercompany sales\n\ntransfers between segments are not material, and operating profit is\n\nincome before income taxes exclusive of certain unallocated corporate\n\nexpenses. These unallocated corporate expenses include the net costs of\n\nthe Company’s corporate operations, interest income, and interest\n\nexpense. Management views interest income and expense as corporate\n\nfinancing costs and not as an operating segment cost. In addition, man-\n\nagement applies an effective income tax rate to its consolidated income\n\nbefore income taxes so income taxes are not reported or viewed inter-\n\nnally on a segment basis. Identifiable assets by segment are those assets\n\napplicable to the respective industry segments. Corporate assets consist\n\nprincipally of cash and cash equivalents, short-term investments, and\n\ncorporate office real estate and related equipment.\n\nNo geographic information for revenues from external cus-\n\ntomers or for long-lived assets is disclosed, since the Company’s primary\n\nmarket and capital investments are concentrated in the United States.\n\nReportable segment data reconciled to the consolidated finan-\n\ncial statements for the years ended 2003, 2002, and 2001 is as follows:\n\n*(In thousands)* **2003** 2002 2001\n\nNet sales:\n\nOffice furniture $ 1,279,059 $ 1,366,312\n\n| $ 1,304,054 451,674 |\n|:---|\n| $ 1,755,728 |\n| $ 130,080 54,433 |\n| 184,513 (33,582) |\n| $ 150,931 |\n| $ 54,121 13,599 5,052 |\n| $ 72,772 |\n| $ 17,619 12,577 7,312 |\n| $ 37,508 |\n| $ 452,350 303,811 265,665 |\n| $ 1,021,826 |\n\nHearth products 413,563 426,126", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "Notes to Consolidated Financial Statements 62\n\npremises within the complex. The agreement is subject to the implementation of\n\nproposed gaming law reforms and a tax structure acceptable to the Company, and\n\nobtaining required planning and other approvals.\n\n**Macau.** In connection with the Company’s pending joint venture in Macau (see\n\nNote 1), the Company has committed to invest up to $280 million in the entity\n\nin the form of capital contributions and shareholder loans.\n\n**New York Racing Association.** The Company has an understanding with the New\n\nYork Racing Association (“NYRA”) to manage video lottery terminals (“VLTs”) at\n\nNYRA’s Aqueduct horseracing facility in metropolitan New York. The Company\n\nwould assist in the development of the facility, including providing project\n\nfinancing, and would manage the facility for a fee. Work was halted on the VLT\n\nfacility in August 2003 pending the outcome of an investigation of certain aspects\n\nof NYRA’s operations by Federal prosecutors. In December 2003, NYRA reached\n\nagreement with the Justice Department whereby NYRA was indicted with\n\nprosecution deferred. NYRA agreed to pay a fine and the indictment will be\n\ndismissed with prejudice upon NYRA implementing certain reforms and otherwise\n\ncomplying with the terms of the agreement. The Company’s participation is subject\n\nto a definitive agreement, regulatory approvals and certain legislative changes by the\n\nState of New York.\n\n**The Residences at MGM Grand.** In July 2004, the venture obtained construction\n\nfinancing for up to $210 million for the development of the first tower. The\n\nCompany has provided a guaranty for up to 50% of the interest and principal\n\npayment obligations on the construction financing as well as a joint and several\n\ncompletion guaranty with its partners. The Company recorded the value of the\n\nguaranty obligation, approximately $2 million, in other long-term liabilities.\n\n**Other Guarantees.** The Company is party to various guarantee contracts in the\n\nnormal course of business, which are generally supported by letters of credit issued\n\nby financial institutions. The Company’s Senior Credit Facility limits the amount\n\nof letters of credit that can be issued to $200 million, and the amount of available\n\nborrowings under the Senior Credit Facility is reduced by any outstanding letters\n\nof credit. At December 31, 2004, the Company had provided a $50 million letter\n\nof credit to support the Economic Development Corporation of the City of Detroit\n\nbonds referred to above, which are a liability of the Company.\n\n**Litigation.** The Company is a party to various legal proceedings, most of which\n\nrelate to routine matters incidental to its business. Management does not believe\n\nthat the outcome of such proceedings will have a material adverse effect on the\n\nCompany’s financial position or results of operations.", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "*Certain Investigations and Other Matters*\n\nWe regularly receive requests for information, including subpoenas, from regulators and governmental authorities such\n\nas the National Highway Traffic Safety Administration, the National Transportation Safety Board, the Securities and Exchange\n\nCommission (“SEC”), the Department of Justice (“DOJ”), and various local, state, federal, and international agencies. The\n\nongoing requests for information include topics such as operations, technology (e.g., vehicle functionality, vehicle incidents,\n\nAutopilot and FSD Capability), compliance, finance, data privacy, and other matters related to Tesla’s business, its personnel,\n\nand related parties. We routinely cooperate with such formal and informal requests for information, investigations, and other\n\ninquiries. To our knowledge no government agency in any ongoing investigation has concluded that any wrongdoing occurred.\n\nWe cannot predict the outcome or impact of any ongoing matters. Should the government decide to pursue an enforcement\n\naction, there exists the possibility of a material adverse impact on our business, results of operation, prospects, cash flows,\n\nfinancial position or brand.\n\nWe are also subject to various other legal proceedings, risks and claims that arise from the normal course of business\n\nactivities. For example, during the second quarter of 2023, a foreign news outlet reported that it obtained certain\n\nmisappropriated data including, purportedly non-public Tesla business and personal information. Tesla has made notifications\n\nto potentially affected individuals (current and former employees) and regulatory authorities and we are working with certain\n\nlaw enforcement and other authorities. On August 5, 2023, a putative class action was filed in the United States District Court\n\nfor the Northern District of California, purportedly on behalf of all U.S. individuals impacted by the data incident, followed by\n\nseveral additional lawsuits, that each assert claims under various state laws and seeks monetary damages and other relief. If an\n\nunfavorable ruling or development were to occur in these or other possible legal proceedings, risks and claims, there exists the\n\npossibility of a material adverse impact on our business, results of operations, prospects, cash flows, financial position or brand.\n\n##### **Note 11 - Variable Interest Entity Arrangements**\n\nThe aggregate carrying values of the variable interest entities’ assets and liabilities, after elimination of any\n\nintercompany transactions and balances, in the consolidated balance sheets were as follows (in millions):\n\n**September 30,**\n\n**2024**\n\n**December 31,**\n\n**2023**\n\n##### **Assets**\n\nCurrent assets\n\nCash and cash equivalents $ 51 $ 66\n\nAccounts receivable, net 28 13\n\nPrepaid expenses and other current assets 263 361\n\nTotal current assets 342 440\n\nOperating lease vehicles, net 451 —\n\nSolar energy systems, net 2,524 3,278\n\nOther non-current assets 190 369\n\nTotal assets $ 3,507 $ 4,087\n\n##### **Liabilities**\n\nCurrent liabilities\n\nAccrued liabilities and other $ 36 $ 67\n\nDeferred revenue 7 6\n\nCurrent portion of debt and finance leases 1,930 1,564\n\nTotal current liabilities 1,973 1,637\n\nDeferred revenue, net of current portion 81 99\n\nDebt and finance leases, net of current portion 1,826 2,041\n\nTotal liabilities $ 3,880 $ 3,777\n\n24", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" - } - ] - }, - { - "references": { - "source_file": "Open_Data_Report.pdf", - "query": "What is Mexican Farm Subsidies ?", - "target_page": 9, - "target_passage": "an online tool to analyze how the federal government allocates those subsidies", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "currently in favourable status are in that category or show a strong positive trend. The Commission and the European Environmental Agency will provide guidance to Member States in 2020 on how to select and prioritise species and habitats.\n\n#### *2.2.2.* *Bringing nature back to agricultural land*\n\nAs guardians of our land, farmers play a vital role in preserving biodiversity. They are among the first to feel the consequences when biodiversity is lost but also among the first to reap the benefits when it is restored. Biodiversity enables them to provide us with **safe, sustainable, nutritious and affordable food** and provides them with the income they need to thrive and develop. European farmers are an essential part of the EU’s future and must continue to be the social and economic hub of many communities across our Union.\n\nAt the same time, certain agricultural practices are a key driver of biodiversity decline. This is why it is important to work with farmers to **support and incentivise the transition to fully sustainable practices** . Improving the condition and diversity of agroecosystems will increase the sector’s resilience to climate change, environmental risks and socioeconomic shocks, while creating new jobs, for example in organic farming, rural tourism or recreation.\n\nTo support the long-term sustainability of both nature and farming, this strategy will work in tandem with the new **Farm to Fork Strategy** and the **new Common Agricultural Policy (CAP)** , including by promoting eco-schemes and result-based payment schemes. In implementing the Biodiversity and the Farm to Fork Strategies, the Commission will closely monitor progress and improvements in terms of food security and farmers income. The Commission will ensure that the CAP Strategic plans are assessed against robust climate and environmental criteria, and that Member States set explicit national values for the relevant targets set in this strategy, as well as in the Farm to Fork Strategy. These plans should lead to sustainable practices such as precision agriculture, organic farming, agro-ecology, agro-forestry, low-intensive permanent grassland, and stricter animal welfare standards.\n\nFarmland birds and insects, particularly pollinators, are key indicators of the health of agroecosystems and are vital for agricultural production and food security. Their alarming decline must be reversed. As set out in the Farm to Fork Strategy, the Commission will take action to reduce by **50% the overall use of - and risk from - chemical pesticides by 2030** and reduce by 50% the use of more hazardous pesticides by 2030. This must be supported by the full implementation of the EU Pollinators initiative <sup>31</sup> . By the end of 2020, the Commission will review the initiative and propose additional measures if necessary. To provide space for wild animals, plants, pollinators and natural pest regulators, there is an urgent need to bring back **at least 10% of agricultural area under high-diversity landscape features** . These include, *inter alia* , buffer strips, rotational or non-rotational fallow land, hedges, non-productive trees, terrace walls, and ponds. These help enhance carbon sequestration, prevent soil erosion and depletion, filter air and water, and support climate adaptation. In addition, more biodiversity often helps lead to more agricultural production. Member States will need to translate the 10% EU target to a lower geographical scale to ensure connectivity among habitats, especially through the CAP instruments and CAP Strategic Plans, in line with the Farm to Fork Strategy, and through the implementation of the Habitats Directive. The\n\n[EU Pollinators initiative](https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1528213737113&uri=CELEX:52018DC0395) (COM(2018) 395).", - "page_start": 7, - "page_end": 7, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "progress towards the target will be under constant review, and adjustment if needed, to\n\nmitigate against undue impact on biodiversity, food security and farmers’ competitiveness.\n\nAgroecology can provide healthy food while maintaining productivity, increase soil fertility and biodiversity, and reduce the footprint of food production. Organic farming in particular holds great potential for farmers and consumers alike. The sector creates jobs and attracts young farmers. Organic farming also provides 10-20 % more jobs per hectare than conventional farms, and creates added value for agricultural products <sup>32</sup> . To make the most of this potential, at least **25% of the EU’s agricultural land must be organically farmed by 2030** . In addition to CAP measures, the Commission will put forward an Action Plan on organic farming, helping Member States stimulate both supply and demand of organic products. It will also ensure consumer’s trust through promotion campaigns and green public procurement. In the implementation of the EU-wide agro- ecological targets set out in this strategy and in the Farm to Fork Strategy, the different starting points and differences in progress already made in Member States will be taken into account.\n\nThe uptake of agroforestry support measures under rural development should be increased as it has great potential to provide multiple benefits for biodiversity, people and climate.\n\nThe decline of **genetic diversity** must also be reversed, including by facilitating the use of traditional varieties of crops and breeds. This would also bring health benefits through more varied and nutritious diets. The Commission is considering the revision of marketing rules for traditional crop varieties in order to contribute to their conservation and sustainable use. The Commission will also take measures to facilitate the registration of seed varieties, including for organic farming, and to ensure easier market access for traditional and locally adapted varieties.\n\n#### *2.2.3.* *Addressing land take and restoring soil ecosystems*\n\nSoil is one of the most complex of all ecosystems. It is a habitat in its own right, and home to an incredible diversity of organisms that regulate and control key ecosystem services such as soil fertility, nutrient cycling and climate regulation. **Soil is a hugely important non-renewable resource** , vital for human and economic health, as well as the production of food and new medications.\n\nIn the EU, the degradation of soil is having considerable environmental and economic consequences. Poor land management, such as deforestation, overgrazing, unsustainable farming and forestry practices, construction activities and land sealing are among the main causes of this situation <sup>33</sup> . Despite recent reductions in the pace of soil sealing, fertile soils continue to be lost to land take and urban sprawl <sup>34</sup> . When compounded by\n\n32 OECD (2016), [Farm Management Practices to Foster Green Growth](https://www.oecd.org/publications/farm-management-practices-to-foster-green-growth-9789264238657-en.htm) . European Environment Agency (2019), [EEA Signals 2019: Land and Soil in Europe](https://www.eea.europa.eu/publications/eea-signals-2019-land) . European Environment Agency and Swiss Federal Office for the Environment (FOEN) (2016), [Urban ](https://www.eea.europa.eu/publications/urban-sprawl-in-europe) [sprawl in Europe](https://www.eea.europa.eu/publications/urban-sprawl-in-europe) .", - "page_start": 8, - "page_end": 8, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "Livestock slaughtered by the Company is purchased by Company buyers and commission dealers at sale barns and terminal markets or under long-term\n\nsupply contracts at locations principally in Minnesota, Illinois, Iowa, Nebraska, Colorado and South Dakota. The cost of livestock and the utilization of the\n\nCompany's facilities are affected by both the level and the methods of pork production in the United States. The hog production industry has been rapidly\n\nmoving to very large, vertically integrated, year-round confinement operations operating under long-term supply agreements. This has resulted in fewer\n\nhogs being available on the spot cash market, which decreases the supply of hogs on the open market and can severely diminish the utilization of\n\nslaughter facilities and increase the cost of the raw materials they produce. The Company, along with others in the industry, uses long-term supply\n\ncontracts to manage the effects of this trend and to assure a stable supply of raw materials while minimizing extreme fluctuations in costs over the long-\n\nterm. This may result in costs for live hogs that are either higher or lower than the spot cash market depending on the relationship of the cash spot\n\nmarket to contract prices. Contract costs are fully reflected in the Company's reported financial results. In fiscal 2003, the Company purchased 79 percent\n\nof its hogs under long-term supply contracts.\n\nIn fiscal 2003, JOTS raised approximately 57 percent of the turkeys needed to meet its raw material requirements for whole bird and processed turkey\n\nproducts. Turkeys not sourced within the Company are contracted with independent turkey growers. JOTS' turkey-raising farms are located throughout\n\nMinnesota and Wisconsin. Production costs in raising turkeys are primarily subject to fluctuations in feed grain prices and to a lesser extent fuel costs.\n\n##### **Manufacturing**\n\nThe Company has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China that slaughter livestock for processing. Quality Pork Processors of\n\nDallas, Texas, operates the slaughter facility at Austin under a custom slaughter arrangement.\n\nFacilities that produce manufactured items are located in Algona, Iowa; Aurora, Illinois; Austin, Minnesota; Beloit, Wisconsin; Bondurant, Iowa; Ft. Dodge,\n\nIowa; Fremont, Nebraska; Houston, Texas; Knoxville, Iowa; Mitchellville, Iowa; Osceola, Iowa; Perrysburg, Ohio; Quakertown, Pennsylvania; Rochelle,\n\nIllinois; Savannah, Georgia; Sparta, Wisconsin; Stockton, California; Tucker, Georgia; Visalia, California; Wichita, Kansas; Beijing, China; and Shanghai,\n\nChina. Company products are also custom manufactured by several other companies. The following are the Company's larger custom manufacturers:\n\nLakeside Packing Company, Manitowoc, Wisconsin; Schroeder Milk, Maplewood, Minnesota; Steuben Foods, Jamaica, New York; Power Packaging, St.\n\nCharles, Illinois; Criders, Stilmore, Georgia; Tony Downs, St. James, Minnesota; and Concept Foods, Alma, Kansas. Power\n\nLogistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa.\n\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo,\n\nMinnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota.\n\n##### **Patents and Trademarks**\n\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued\n\npatents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary,\n\nHormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or\n\nlicensed trademarks used in the Company's segments are:", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" - }, - { - "text": "10\n\n**Market price of maize in main countries.** In this study, we elaborate on the endogenous response of our economic models. This response can be theoretically elaborated as: due to the effect of climate change on yield reduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and raising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive (cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond by changing farm-level management practices and increasing (decreasing) the amount of acreage under these crops. At a global scale, the reallocation of production and consumption through international trade further alters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ region due to climate change. In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among different countries and regions under both climate change scenarios (Fig. 7 ). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C scenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed due to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa would decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the domestic production, the climate change will also induce changes in international trade of maize, resulting in changing levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically produced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, the countries that face positive effects on yields and/or are relatively less dependent on imports, are positively (less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would improve under both scenarios (Fig. 8 ). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh and Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline.\n\n**Discussion and conclusion Discussion.** Our analysis highlights the effects of climate change on global- and regional-specific maize yields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the reduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- ing by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. Although the precipitation is also increasing, the evapotranspiration would become more intense. The limitation of water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by 1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought and heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the\n\n**Figure 6.** Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C.", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed9.pdf" - }, - { - "text": "Right now, one of the most active Asian countries in the Open Data arena is India, which also\n\nsigned an [Open Government partnership with the USA](http://www.whitehouse.gov/blog/2010/11/07/a-us-india-partnership-open-government) in November 2010. In January 2011 the\n\nIndian Congress Party announced plans for a new law to fight corruption among public servants and\n\npoliticians. Anti-corruption websites (including ones in local dialects) like\n\n[Indiaagainstcorruption.org](http://www.indiaagainstcorruption.org/) , already existed, including one, [Ipaidabribe.com](http://www.ipaidabribe.com/) , that collected more\n\nthan 3,000 people reports of graft in its first four months.\n\nAs it happens in Asia, even Latin America is currently focused, at least outside Public\n\nAdministration circles, on how to open public data to achieve actual transparency. This appears\n\neven from the way many projects are labeled, that is [ \"Civic Information\"](http://informacioncivica.info/mexico/access-to-information/) instead of Open Data\n\n(which is an idea starting from data *reuse* ) or Open Government.\n\nThe reason is that even where good Freedom of Information laws exist in Latin America, they still\n\nhave too little practical effects. Mexico, for example, already has a digital system to manage\n\nFreedom of Information requests, but there are reports of complaints filed against municipal\n\nofficials that either have no effect at all, or aren't possible in the first place, because relevant\n\ninformation has not been updated in years, or omits key data like (in the case of budget reports)\n\n*\"descriptions of how the money was spent\"* .\n\nEven with these difficulties, the Latin America Open Data/Civic Information landscape is active\n\nand definitely worthwhile following. The list of interesting Civic Information projects in Latin\n\nAmerica include (from Sasaki's [Access to Information: Is Mexico a Model for the Rest of the ](http://informacioncivica.info/mexico/access-to-information/)\n\n[World?](http://informacioncivica.info/mexico/access-to-information/) :\n\n- Mexico\n\n- [Mexican Farm Subsidies](http://www.subsidiosalcampo.org.mx/index.html/) - an online tool to analyze how the federal government\n\nallocates those subsidies\n\n- [Compare Your School](http://www.comparatuescuela.org/) : compares aggregate test results from any school with the\n\nmunicipal, regional, and national averages\n\n- [Rebellion of the Sick](http://www.sonoraciudadana.org.mx/) built for patients with chronic diseases whose expenses are not\n\ncovered by the government subsidized health coverage.\n\n- Argentina: [Public Spending in Bahía](http://gastopublicobahiense.org/acerca-de-gpb/) analyzes how public funds are used.\n\n- Colombia: [Visible Congress](http://www.congresovisible.org/) monitors the actions of the Colombian congress\n\n- Brazil\n\n- [Eleitor 2010](http://eleitor2010.com/) : a website to submit reports of electoral fraud during the Brazil 2010\n\n*9/34*", - "page_start": 8, - "page_end": 8, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "conditions.\n\nEven during the past three decades the trend from agriculture and industry to other service-dominated\n\nsectors continued in the EU, as the following Eurostat figure shows. The share of employees in\n\nagriculture went down from 8% to 4%, and also down in industry from 21% to 15%, construction\n\nremained quite stable between 6% and 7% whilst all the service sectors (except ‘Financial services and\n\ninsurance’) gained a bigger share, particularly ‘Professional, scientific and technical activities’.", - "page_start": 100, - "page_end": 100, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Yield change of maize under global warming by 1.5 °C and 2.0 °C.** Maize production is affected by climate change apparently. According to the simulation results of CERES-maize, the yield of maize would decrease in the worldwide relative to 1986- 2005 under global warming by 2.0 °C; it would increase little under global warming by 1.5 °C. The distributions of maize yield loss under the two scenarios are similar to each other, mostly located in the middle and low latitude, which are the main regions for maize planting in the world. The loss risk of maize under global warming by 2.0 °C is much more serious than that under global warming of 1.5 °C. However, there are increasing potentials of maize yield in many regions, nearly half of the whole maize planting area in the world, in which the climate situation would become more proper for maize under global\n\n**Figure 2.** (continued)", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed9.pdf" - }, - { - "text": "8\n\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should be taken from now on. Food security would be a significant challenge in this century.\n\n**Yield change of maize in main countries.** There are huge differences in impacts on maize yield under climate change, which would influence the food crisis in different regions. There are 159 countries in the whole world which plant maize. The gross yield of maize the top 20 countries accounts for more than 90% of the total yield in the 159 countries. So, the changes in the top 20 countries under future scenarios would influence the food security of the whole world (Fig. 5 ). From the results of simulated by CRESE-maize under global warming by 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become 33.5%. There would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly increase. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which the mean yield loss rate is approximate to that under global warming by 1.5 °C. There would be 77 countries experiencing yield increase; however, the mean yield increase is apparently smaller than that under global warm- ing by 1.5 °C. Generally, the global maize yield would decrease. The results show that the adverse effect of warm- ing up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to develop forward-looking adaptation measures to cope with future climate change. According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. The United States accounts for more than 32%; China accounts for about 24%; Brazil, Argentina and Mexico account for about 23%. The fluctuation of maize production in these five top countries will have a significant impact on the global maize trade. Based on the simulation results, comparing to 1986- 2005, the maize yield in China, Brazil and Argentina would decrease under global warming by 1.5 °C; the yield loss rate would reach more than 20% in Brazil; Argentina would decrease by 14.7%; China would decrease by 3.7%. However, there would be increasing trends in the United States and Mexico; the change in the United States would not be significant and the maize yield would increase by 0.5%; the yield increasing rate would exceed 50% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 2% under global warming\n\n**Figure 5.** Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed9.pdf" - }, - { - "text": "Afforestation, reforestation and tree planting to support biodiversity and ecosystem restoration will be promoted through the CAP Strategic Plans, and the Cohesion Policy funds. The new **European Urban Greening Platform** <sup>38</sup> will also facilitate urban tree planting, including under the LIFE programme.\n\nThe share of forest areas covered by management plans should cover all managed public forests and an increased number of private forests, and biodiversity-friendly practices such as closer-to-nature-forestry should continue and be further developed. To support this, the Commission will develop guidelines on biodiversity-friendly afforestation and reforestation and closer-to-nature-forestry practices. This will be done in parallel with the new EU Forest Strategy.\n\nTo gain a better picture of the health of European forests, the Commission will work with other data providers to further develop the **Forest Information System for Europe** . This will help produce up-to-date assessments of the condition of European forests and link all EU forest-data web-platforms. This will also be presented as part of the EU Forest Strategy.\n\n#### *2.2.5.* *Win-win solutions for energy generation*\n\nDecarbonising the energy system is critical for climate neutrality, as well as for the EU’s recovery from the COVID-19 crisis and long-term prosperity. More sustainably sourced renewable energy will be essential to fight climate change and biodiversity loss. The EU will prioritise solutions such as ocean energy, offshore wind, which also allows for fish stock regeneration, solar-panel farms that provide biodiversity-friendly soil cover, and sustainable bioenergy.\n\nTo mitigate climate and environmental risks created by the increasing use of certain sources for bioenergy, the revised Renewable Energy Directive <sup>39</sup> includes strengthened sustainability criteria. It also promotes the shift to advanced biofuels based on residues and non-reusable and non-recyclable waste. This approach should continue for all forms of bioenergy. The use of whole trees and food and feed crops for energy production - whether produced in the EU or imported - should be minimised.\n\nTo better understand and monitor the potential climate and biodiversity risks, the Commission is assessing the **EU and global biomass supply and demand** and related sustainability <sup>40</sup> . As part of its increased ambition to protect and restore forest ecosystems, the Commission will publish the results of this work on the use of forest biomass for energy production by the end of 2020. This will inform the Commission’s policy- making, including the review and revision, where necessary, of the level of ambition of the Renewable Energy Directive, the Emissions Trading Scheme, and the Regulation on land use, land use change and forestry (LULUCF) set for 2021.\n\nIn line with the Renewable Energy Directive, the Commission will also develop operational guidance in 2021 on the **new sustainability criteria on forest biomass for**\n\nSee Section 2.2.8. [Directive (EU) 2018/2001 on the promotion of the use of energy from renewable sources](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2018.328.01.0082.01.ENG&toc=OJ:L:2018:328:TOC) . [JRC Biomass Assessment Study](https://ec.europa.eu/knowledge4policy/projects-activities/jrc-biomass-assessment-study_en) .", - "page_start": 10, - "page_end": 10, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "donations, volunteerism and scholarships. Last year, we made numerous\n\nin-kind donations of laptops, reconditioned Chesapeake fleet vehicles and\n\nsubsidized office space. These contributions provide essential operating\n\ntools as nonprofit organizations across the nation attempt to serve more\n\npeople — often with lower budgets — in tough economic times.\n\nFor example, in Louisiana we donated 12 vehicles in 2010, including\n\none to the Panola College Oil and Natural Gas Technology Program, which\n\nteaches students about the natural gas industry and provides them with\n\nhands-on technical training. Across many of the company’s operating\n\nareas, we’ve donated computers to deserving students, schools and\n\norganizations through Chesapeake’s Discovering Tomorrow’s Leaders\n\nprogram. In 2010 the company equipped 14 students with laptops and\n\ndonated 70 computers to schools or supporting nonprofit organizations.\n\nChesapeake partners with other companies and organizations to meet\n\nbasic, practical needs in hundreds of communities. An example is our\n\nsponsorship of the annual Day of Caring at the Ganus Center of Harding\n\nUniversity in White County, Arkansas. During the event, approximately\n\n1,200 uninsured or underinsured residents received a day of free medical,\n\ndental and eye screenings.\n\nTo help cultivate an appreciation for the great outdoors, in 2010\n\nChesapeake provided $25,000 to REAL School Gardens, a Fort Worth-\n\nbased organization that establishes gardens at approximately 70 lower\n\nincome elementary schools in North Texas. At I.M. Terrell Elementary\n\nSchool, students, parents, teachers and volunteers from Chesapeake and\n\nother groups worked together to prepare vegetable gardens and flower\n\nbeds. In addition to teamwork skills and gardening, students learned\n\nabout nutrition and took home food from the garden’s bounty.\n\nWe supported servicemen and servicewomen by partnering with the\n\nShreveport Chapter of Operation Support Our Troops, Inc. Our contribution\n\nhelped offset the postage to send more than 100 care packages to troops\n\noverseas. The shipment was the largest in the organization’s history and\n\nincluded Christmas cards, games and nonperishable food items.\n\nBy investing in the communities where we operate and the people\n\nwhose lives we touch, we ensure a stronger today and a more hope-\n\nful tomorrow.\n\n2010 ANNUAL REPORT | **25**\n\n*Putting food on the table — Employees volunteer at the Regional Food Bank*\n\n*of Oklahoma as part of Operation Blue.*", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "Open_Data_Report.pdf", - "query": "What concerns has open data raised in the insurance sector?", - "target_page": 23, - "target_passage": "insurance companies may charge higher fees for life insurance to those among their customers who... put online a family tree from which it shows that they come from families with an average life expectancy lower than usual", - "chunk_present": { - "presence": true, - "index": 2 - } - }, - "top_chunk": [ - { - "text": "there is no mandate to support one group to centralize it.\n\nKenya's own OpenData.go.ke website has only ever seen a small handful of data sets,\n\nnone of which are now (early April 2011) available anymore. Groups like the Ministry\n\nof Education might publish some information on schools, but they won't give anyone\n\nthe location data.\n\n## **3. Emerging trends and issues related to Open**\n\n**Data**\n\nOne of the most common activities for Open Data activists in this moment is the creation of\n\ncountry-wide catalogs of all data sources, to facilitate individuation and correlation of independent\n\ndata sets. Normally, all initiatives of this type are announced on the Open Knowledge Foundation\n\n[blog](http://okfn.org/) and/or its data hub [CKAN](http://ckan.net/) . Another relevant development is the publication of an [Open Data ](http://opendatamanual.org/)\n\n[Manual](http://opendatamanual.org/) that *\"can be used by anyone but is especially designed for those seeking to open up data,*\n\n*since it discusses why to go open, what open is, and the how to 'Open' Data.\"* Activists in several\n\nEuropean countries have already published local versions of the manual, or equivalent documents.\n\nOn this background, several interesting issues, some of which were anticipated in the Open Data,\n\nOpen Society report, are coming in full light. They are presented, one at a time, in the following\n\nsections of this chapter.\n\n### **3.1. Cost of not opening PSI is increasing**\n\nMuch has been said on the *economic* benefits of opening public sector information, and much more\n\nremains to be said and studied. One part of this issue that is becoming more evident over time is that\n\nOpen Data are the simplest, if not the only way, to save Public Administrations from the costs that\n\nthey have *already* (and rightfully!) forced themselves to bear, through assorted laws and official\n\nregulations. This is explained well in the report from LinkedGov about the [economic impact of ](http://wiki.linkedgov.org/index.php/The_economic_impact_of_open_data)\n\n[open data](http://wiki.linkedgov.org/index.php/The_economic_impact_of_open_data) :\n\n*(p. 2) \"As the costs of disseminating and accessing information have declined, the*\n\n*transactions costs associated with charging for access to information, and controlling*\n\n*subsequent redistribution have come to constitute a major barrier to access in*\n\n*themselves. As a result, the case for free (gratis) provision of Public Sector Information*\n\n*is stronger than has already been recognized.*\n\nEaves provides a practical example from Canada in [Access to Information is Fatally Broken… You ](http://eaves.ca/2011/03/30/access-to-information-is-fatally-broken-you-just-dont-know-it-yet/)\n\n[Just Don't Know it Yet](http://eaves.ca/2011/03/30/access-to-information-is-fatally-broken-you-just-dont-know-it-yet/) : *the number of Access to Information Requests (ATIP) has almost tripled*", - "page_start": 10, - "page_end": 10, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "#### **3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen, *before*\n\nthey are published online. The most common concerns of this type are (from [Open Public Data: ](http://blog.okfn.org/2011/01/28/open-public-data-then-what-part-1/)\n\n[Then What? - Part 1](http://blog.okfn.org/2011/01/28/open-public-data-then-what-part-1/) ):\n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as\n\nprivate property by private corporations, because the public agencies whose job was to\n\nproduce those data, can't sell them anymore.\n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of\n\nreducing trust in institutions and inhibiting decision-making even more than today.\n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account\n\nis that, once data are open, routinely used and monitored by as many independent users as possible,\n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the\n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very\n\nexpensive, studies and surveys to update a whole corpus of data in one run.\n\nBesides, and above all, even if opening data always destroyed any source of income for the public\n\noffice that used to create and maintain them, this problem would only exist for the PSI datasets that\n\nare *already* sold today. Such data, even if of strategic importance as is the case with digital\n\ncartography, are only a minimal fraction of all the PSI that could and should be opened to increase\n\ntransparency, reduce the costs of Government and stimulate the economy. In all these other cases:\n\n- the money to generate the data already arrives by some other source than sales and\n\nlicensing(but even with those data it may be possible to generate them by crowdsourcing,\n\nthereby reducing those costs!)\n\n- the only extra expense caused by publishing those data online (assuming they're already\n\navailable in some digital format, of course!), would be the hosting and bandwidth costs, that\n\nmay be greatly reduced by mirroring and other technical solutions like torrents, already\n\nwidely used to distribute Free/Open Source Software (FOSS) through the Internet.\n\n#### **3.6.2. Real impact of data manipulation or misunderstanding**\n\nThe fix for the risk that data is manipulated is to not only open government data and procedures, but\n\nto simplify the latter (which eventually also greatly reduces cost) as much as possible. Abundance\n\nof occasions to secretly play with data and how they are managed is a symptom of excessive, or\n\npeak complexity: again, problems and risks with Open Data are a symptom of a [pre-", - "page_start": 16, - "page_end": 16, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides\n\nthat those from (properly done) Open Data are a really tiny percentage of the total.\n\nThis is a consequence of the fact that data about us end up online from the most different sources\n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never\n\nmind *prove* , that they've been used against our interest. There have been concerns, for example, that\n\ninsurance companies may charge higher fees for life insurance to those among their customers\n\nwho... put online a family tree from which it shows that they come from families with an average\n\nlife expectancy lower than usual.\n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of\n\ndata, that weren't even published by any Public Administration? Of course, publishing online\n\ncomplete, official Census data of several generations, in a way that would make such automatic\n\nanalysis possible would be a totally different matter.\n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is\n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always\n\nremember and explain that:\n\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air\n\npollution measurements....)\n\n2. The majority of data that are directly related to individuals (e.g. things like names and\n\naddress of people with specific diseases, or who were victims of some crime) have no reason\n\nto be published, **nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to\n\npublic offices, Government and Parliament members etc...) already exist in many countries\n\n4. Very often, in practice, Open Data struggles only happen about *when and how* to make\n\navailable in the most effective way for society information that was *already* recognized as\n\npublic. *What* to declare public, hence open, is indeed a serious issue (more on this in the next\n\nparagraph) but is a separate one.\n\n### **3.8. Need to better define what is Public Data**\n\nTogether with citizens education, there is a huge challenge that Governments and the Open Data\n\nmovement will have to face (hopefully together) in 2011 and beyond. This challenge is to update\n\nand expand the definition of Public Data and to have it accepted by lawmakers and public\n\nadministrators.", - "page_start": 22, - "page_end": 22, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "22. [Thinking About Africa's Open Data](http://whiteafrican.com/2011/04/04/thinking-about-africas-open-data/)\n\n23. [Towards EU Benchmarking 2.0 - Transparency and Open Data on Structural Funds in](http://www.luigireggi.eu/Innovation-policies/Home/Entries/2011/3/18_Towards_EU_Benchmarking_2.0_-_Transparency_and_Open_Data_on_Structural_Funds_in_Europe.html)\n\n[Europe](http://www.luigireggi.eu/Innovation-policies/Home/Entries/2011/3/18_Towards_EU_Benchmarking_2.0_-_Transparency_and_Open_Data_on_Structural_Funds_in_Europe.html)\n\n24. [UK Open Government Licence removes barriers to re-use of public sector information](http://www.h-online.com/open/news/item/UK-Open-Government-Licence-removes-barriers-to-re-use-of-public-sector-information-1099278.html)\n\n25. [Western Europe: A journey through tech for transparency projects](http://globalvoicesonline.org/2010/08/30/western-europe-a-journey-through-tech-for-transparency-projects/)\n\n26. [What open data means to marginalized communities](http://www.conversationsforabetterworld.com/2010/05/what-open-data-means-to-marginalized-communities/)\n\n27. [What's in a Name? Open Gov and Good Gov](http://www.huffingtonpost.com/beth-simone-noveck/whats-in-a-name-open-gov-_b_845735.html)\n\n28. [WikiLeaks Relationship With the Media](http://www.nytimes.com/roomfordebate/2010/12/09/what-has-wikileaks-started/wikileaks-relationship-with-the-media)\n\n29. [WikiLeaks, Open Information and Effective Use: Exploring the Limits of Open Government](https://gurstein.wordpress.com/2010/12/29/wikileaks-open-information-and-effective-use-exploring-the-limits-of-open-government/)", - "page_start": 33, - "page_end": 33, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "coal plants. If data are not available, every conclusion is questionable because it relies\n\non assumptions or estimates.\n\n### **2.3. Open Data in Latin America, Asia and Africa**\n\nSeveral countries in Latin America are studying and making experiments with Open Data both at\n\nthe government and at the grassroots level. The same is happening, on a much smaller scale, in a\n\nfew parts of Asia and Africa. On average, the volume of these Open Data experiments and the level\n\nof *local* interest and awareness around them is still lower than what is happening in Europe and\n\nNorth America. In spite of this we suggest that it is important, for public officials and civic activists\n\nin Western Countries, to follow these developments closely. The reason is that they may turn into\n\nvery useful test beds for all the strengths and limits of Open Data, especially those not encountered\n\nyet where the movement was born.\n\nIn fact, the original discourse and arguments around Open Data are heavily Western centric. The\n\nproblem they want to solve is how to make democracy work better *in countries where it already*\n\n*exists and which share a great amount of history and cultural/philosophical values* .\n\nOther countries face very different challenges, from the philosophical level to the practical one. A\n\ncommon issue in developing countries, for example, is that there is very little to open simply\n\nbecause much PSI (Public Sector Information) doesn't exist in digital format yet. Therefore, the first\n\nthing to do is to *create* data, normally through outsourcing and crowd sourcing.\n\nOther issues, that will be discussed in detail in other sections of the report because they are also\n\npresent in Europe in different forms, are related to lack of equal opportunities for access to data and\n\nserious fears (sometimes, concrete, sometimes caused by confusion about what should be open and\n\nhow) that data will be used *against* citizens. A commenter to Gurstein's [Open Data: Empowering ](http://gurstein.wordpress.com/2010/09/02/open-data-empowering-the-empowered-or-effective-data-use-for-everyone/)\n\n[the Empowered or Effective Data Use for Everyone?](http://gurstein.wordpress.com/2010/09/02/open-data-empowering-the-empowered-or-effective-data-use-for-everyone/) said:\n\n*in Delhi and Mumbai, mobs and rioters managed to get information about particular*\n\n*identity groups through voter rolls: openness is, in certain situations, a precarious*\n\n*virtue. It is almost certain that Open Data would be used to rig election but here again*\n\n*openness is not the issue, they would find it anyway...*\n\nSo far, the main interest about Open Data in Asian countries seems limited, so to speak, to its\n\neffects on transparency in politics. At a two-weeks programming contest held at the end of 2010 in\n\nThailand, for example, one of the most appreciated entries was a software scraper of the Thailand's\n\nMember of House of Representative Website, that [made it possible for everybody](http://eaves.ca/2010/12/29/three-stories-of-change-from-the-international-open-data-hackathon/) to create\n\napplications using those data.\n\n*8/34*", - "page_start": 7, - "page_end": 7, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "procurement.\n\nThe same issue is denounced as an obstacle to innovation and cost savings in [New ](http://gov20.govfresh.com/new-recommendations-for-improving-local-open-government-and-creating-online-hubs/)\n\n[recommendations for improving local open government and creating online hubs](http://gov20.govfresh.com/new-recommendations-for-improving-local-open-government-and-creating-online-hubs/) :\n\nJohn Grant focused on a major pain point for government at all levels for tapping into\n\nthe innovation economy: procurement issues, which civic entrepreneurs run into in\n\ncities, statehouses and Washington. \"It is time to look at these procurement rules more\n\nclosely,\" he said, and promote higher levels of innovation. \"There are a lot of ideas are\n\nhappening but a lot of rules restrict vendors from interacting in government,\" said\n\nGrant. Turner-Lee observed that traditional procurement laws may also not be flexible\n\nenough to bring more mobile apps into government.\n\nCurrent procurement laws aren't partially incompatible with an Open Data world only at this level,\n\nthat is when it's time to procure software that makes the data useful. Even bigger problems and\n\ninefficiencies can be introduced at the beginning of data life, that is when data collection and\n\nprocessing services are procured. We've already explained that forgetting to impose the right license\n\nis one of the problems, but it's not the only one. Even future *organization* of all the foreseeable data\n\nmanagement activities should take advantage of the flexibility provided by data openness. Here is\n\nhow Tim Davies [summarizes this point](http://www.practicalparticipation.co.uk/odi/2011/01/four-other-places-to-look-for-the-impact-of-open-government-data/) :\n\nRight now [public] bodies often procure data collection, data publishing and data\n\ninterfaces all in one block (as seems to be the case with Oxfordshires real-time bus\n\ninformation - leading to a roadblock on innovation) - and so without these layers being\n\nseparated in procurement, some of the benefits here stand to be lost.\n\nChanging procurement of information/data-rich public services would be, of course, only the first\n\nstep of a general reform of procurement laws and regulations. After management of Open Data has\n\nbeen simplified, it becomes time to implement similar simplifications to procurement of everything\n\nelse. In fact, in such a scenario, there would be much less possibilities for the loopholes, frauds and\n\ninefficiencies that forced local procurement procedures to become so slow and complicated: since\n\nthe public budget and other relevant public data would already be fully open, errors and other\n\nproblems would surface and be fixed much more quickly and reliably than today, even assuming\n\nthat they would continue to appear with the same frequency.\n\n### **4.5. Educate citizens to understand and use data**\n\nIt is necessary to guarantee the widest possible availability of *all* the pre-requisites for effective use\n\nof Open Data. In other words, it is necessary to provide free and widely accessible training, oriented\n\nto average citizens, on how and why to visualize Public Data and use them to make informed", - "page_start": 29, - "page_end": 29, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "benefit when local businesses make more money) are aware of this opportunity?\n\n## **4. Conclusion: seven Open Data strategy and**\n\n**best practices suggestions**\n\nStarting from the trends and conclusion described in the previous chapter, this section lists, in the\n\nmost synthetic way possible, some strategic actions and best practices for 2011, that we consider\n\nimportant in making Open Data succeed and bring the greatest possible benefits to all citizens and\n\nbusinesses.\n\n### **4.1. Properly define and explain both Open Data and Public**\n\n**Data**\n\nJust because Open Data is becoming more popular (and, we may say, more and more necessary\n\nevery year), it is essential to intensify efforts to explain, both to the general public and to public\n\nadministrators, that\n\n1. **Privacy issues are almost always a non-issue.** Quoting from [What \"open data\" means - ](http://blog.okfn.org/2010/12/10/what-%E2%80%9Copen-data%E2%80%9D-means-%E2%80%93-and-what-it-doesn%E2%80%99t/)\n\n[and what it doesn't](http://blog.okfn.org/2010/12/10/what-%E2%80%9Copen-data%E2%80%9D-means-%E2%80%93-and-what-it-doesn%E2%80%99t/) ): *Privacy and/or security concerns with putting all the government's data*\n\n*out there are a separate issue that shouldn't be confused with Open Data. Whether data*\n\n*should be made publicly available is where privacy concerns come into play. Once it has*\n\n*been determined that government data should be made public, then it should be done*\n\n*openly.*\n\n2. Defining as Public and consequently opening them in the right way, *much more data* than\n\nthose born and stored *inside* Public Administration is an urgent task that is in the best\n\ninterest of all citizens and businesses\n\n### **4.2. Keep political issues separated by economics ones**\n\nOpen Data can reduce the costs of Public Administrations and generate (or at least protect, as in the\n\ncase of deals from local merchants) local jobs in all sectors of the economy, not just high-tech ones.\n\nThere seems to be enough evidence for these two assertions to go for more Open Data *even if* they\n\nhad no effect at all on participation to politics. This should always be kept in mind, also because\n\nsome data that can directly stimulate business are not the same that would be useful for\n\ntransparency.", - "page_start": 26, - "page_end": 26, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "more concrete over time is damage control. In a world that produces digital data without\n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to\n\npredict, practically impossible to avoid and increasingly common. Opening public government data,\n\nthat is providing plenty of officially verified information, becomes therefore also a damage control\n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official\n\nOpen Public Data, individual citizens, political parties or other organizations will start to process\n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different\n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong\n\nconclusions. This is not some theoretical possibility far in the future, as this real world example\n\n(from a comment to an [Open Data discussion in an italian blog](http://www.cottica.net/2010/09/16/spaghetti-open-data-reloaded/) ) proves:\n\n\" *on the* *[non italian]* *Geonames website you can download geo-referenced data*\n\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n\n*that not one was right. What should be done in such cases?*\n\nFrom an Open Data perspective, all these recent stories have (at least) one thing in common: they\n\nsuggest that, considering its current needs and problems, current societies want and need more Open\n\nData than they already have.\n\n### **2.1. Wikileaks and the Open Data movement**\n\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published\n\nby Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence\n\nof a more or less conscious mixing of the two themes, because in a very general sense, both Open\n\nData and Wikileaks are about transparency, accountability and democracy.\n\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks\n\nscandal.\n\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and\n\ntransparency whenever government activities are concerned. Citizens must be able to know what\n\nthe state is *actually* doing but sometimes, be it for careful evaluation of all the alternatives or\n\nbecause of security, it must be possible to work behind closed doors, [at least temporarily](http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/) . We'll\n\ncome back to this point later in this report.\n\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness\n\nand transparency in politics, not only there are deep differences between the two ideas but, in our\n\n*5/34*", - "page_start": 4, - "page_end": 4, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "The biggest difference between Gov 2.0 and OpenGov seems to be how they approach\n\ntransparency. Gov 2.0 is about transparency through open data and the \"government as a\n\nplatform\" idea. \"Open Government\" is about Transparency for the sake of\n\naccountability, but not necessarily interaction, cooperation and reuse of data outside the\n\ngovernment.\n\n[who advocates] Open Data does so in order to make it accessible to citizens\n\nrather than to hold government accountable. This is not to say that one approach is\n\nbetter than another, but this is to say that there seem to be two very different\n\nmotivations for advocating for transparency, and they do seem to correlate to whether\n\npeople label themselves as part of Gov 2.0 or part of OpenGov.\n\nIn general, reflection and debate on this point is accelerating. At the moment, some characteristics\n\nof Open Government on which there is more or less agreement are that Open Government is about:\n\n- deliberation, choice, influence on decisions and participation as a common citizen\n\n- letting *all* citizens use technology to participate, monitor and define government activities.\n\nIn other words, Government is really Open when it's based on interaction, not only on some\n\nset of infrastructures and methods imposed top-down\n\n- diffused, seamless conversations, that are only possible with digital technologies, online\n\nsocial networks and so on, between public employees and citizens.\n\nThe obvious potential limit of these definitions is that they rely on a big, still largely unknown\n\nfactor, that is actual citizen participation. When data are opened, the problem becomes to have\n\neverybody use them, in order to actually realize Open Government as defined above. This issue will\n\nbe explored in detail in the next paragraphs, but we can already say that Open Data are highlighting\n\nthe critical, weak points in the present and future relationship between citizens and governments.\n\nWhile citizens participation is essential, especially in times of social and economic crisis, achieving\n\nit on a large scale won't be easy. Frustration and lack of trust in institutions in many countries are\n\nhigh, so it's no surprise when people express doubts that opening government data won't help much\n\nin fixing things.\n\n### **3.6. Clearer vision of the real risks and limits of Open Data**\n\nOpen Data, we already said, is about reuse. The point is, at least when the goal is Open Government\n\nand transparency in politics, reuse by whom? There is no *automatic* cause-effect relationship\n\nbetween Open Data and real transparency and democracy. On the contrary, several problems may\n\noccur, if administrators and citizens don't pay close attention.", - "page_start": 15, - "page_end": 15, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "by David Osimo in [EU eGov action plan published: the good, the bad and the unknown](http://egov20.wordpress.com/2010/12/22/eu-egov-action-plan-published-the-good-the-bad-and-the-unknown/) , are the\n\nactions on Open Data (a EU portal and a revision of the EU PSI directive), and on citizens control\n\nover their data. However the Action Plan contains no reference to the need for a more open and\n\ncollaborative governance.\n\nIn the case of European Structural Funds, as Luigi Reggi [reported in March 2011](http://www.luigireggi.eu/Innovation-policies/Home/Entries/2011/3/18_Towards_EU_Benchmarking_2.0_-_Transparency_and_Open_Data_on_Structural_Funds_in_Europe.html) :\n\nthere is no single point of access to the data. Hundreds of Managing Authorities are\n\nfollowing different paths and implementing different information strategies when\n\nopening up their data.\n\nMany databases (often simple PDF lists) [...show...] huge variation not only in\n\nthe way they can be accessed but also in content and quality of data provided.\n\n... [...The results of...] an independent web-based survey on the overall\n\nquality of data published by each Managing Authority responsible for the 434\n\nOperational Programmes approved in July 2009... can be summarized as follows:\n\nThe use of open, machine-processable and linked-data formats have unexpected\n\nadvantages in terms of transparency and re-use of the data by the public and private\n\nsector. The application of these technical principles does not need extra budget or major\n\nchanges in government organization and information management; nor does it require\n\nthe update of existing software and infrastructures. What is needed today is the\n\npromotion among national and local authorities of the culture of transparency and the\n\nraising of awareness of the benefits that could derive from opening up existing data and\n\ninformation in a re-usable way.\n\nThe European Cohesion Policy is only halfway to accomplishing a paradigm shift to\n\nopen data, with differences in performance both between and - in some cases - within\n\nEuropean Countries.\n\nThings don't go much better for the European Union in the energy field. Carlo Stagnaro wrote in\n\n[EU Energy Orwellianism: Ignorance Is Strength](http://www.masterresource.org/2011/01/eu-energy-orwellianism/) :\n\nEnergy is an active area of EU public policy. Yet authorities are not revealing\n\ninformation (data is surely has) that is crucial to determine whether its policies are\n\ndistorting the market and come at too high a cost to society. This is a major fault in\n\nEurope's credibility in advancing its policy goals, as well as a serious limitation to the\n\naccountability of the policy making process\n\nWe realized that, while strongly supporting green investments the EU does not know, or\n\ndoes not make it public, how much is spent every year on green subsidies... With regard\n\nto green jobs, several estimates exist, but no official figure is provided.\n\nMore recently... I discovered that Eurostat does not tell how much coal capacity is\n\ninstalled - as opposed to natural gas- or oil-fueled generation plants. It is possible to\n\nknow how much coal is used, but not the amount of fixed capital which is invested in\n\n*7/34*", - "page_start": 6, - "page_end": 6, - "source_file": "Open_Data_Report.pdf" - } - ] - }, - { - "references": { - "source_file": "Open_Data_Report.pdf", - "query": "What are Steinberg's concerns about the government releasing all non-private existing data?", - "target_page": 28, - "target_passage": "The first reasons for Steinberg's concern is that asking for everything as soon as possible would \"stress the system too much, by spreading thin the finite amount of good will, money and political capital\". The second is that many existing old data and data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend resources in opening them", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "### **4.3. Keep past and future separate**\n\nFor the same reason why it is important to always distinguishes between political and economical\n\nadvantages (or disadvantages) of Open Data, it is necessary to keep decisions about *future* data\n\n(those that will arrive in the future, due to new contracts, public services and so on) separate from\n\nthose about data that already exist. At the end of 2010, T. Steinberg [wrote](thttp://steiny.typepad.com/premise/2010/11/open-data-how-not-to-cock-it-up.html) that the idea that\n\nGovernment should publish everything non-private it can **now** is \"rather dangerous\", and that it\n\nwould be much better to release nothing until someone actually asked for it, and at that point doing\n\nit right, that is with an open license and so on. The first reasons for Steinberg's concern is that\n\nasking for everything as soon as possible would *\"stress the system too much, by spreading thin the*\n\n*finite amount of good will, money and political capital\"* . The second is that many existing old data\n\nand data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend\n\nresources in opening them.\n\nEven if these concerns were always true, it is important to realize that they apply (especially the\n\nsecond) to already existing data, not to future ones. The two classes of data have, or can have, very\n\ndifferent constraints. Existing data may still exist only in paper format and/or be locked by closed or\n\nunclear licenses, or not relevant anymore for future decisions.\n\nOpening *future* data, instead, is almost always more important, useful urgent, easier and cheaper\n\nthan digitizing or even only reformatting material that in many cases is already too old to make\n\nimmediate, concrete differences. While this argument is probably not always true when we look at\n\nOpen data for transparency, it probably is when it comes to economic development.\n\nTherefore, features and guidelines that should be present in all future data generation and\n\nmanagement processes include:\n\n- standardization: the less, obviously open, formats are used for data of the same type, the\n\neasier it is to merge and correlate them. The formats that have to be standardized are not\n\nonly those at the pure software level. Even more important is, for example, to adopt by law\n\nstandard identificators for government suppliers, names and machine-readable identifiers of\n\nbudget voices and so on\n\n- preparation for future digitization: new digital systems should explicitly be designed from\n\nthe beginning so that it will be possible, when non-digital records will be digitized, to add\n\nthem to the databases without modifying losses.\n\n- Open licenses", - "page_start": 27, - "page_end": 27, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "more concrete over time is damage control. In a world that produces digital data without\n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to\n\npredict, practically impossible to avoid and increasingly common. Opening public government data,\n\nthat is providing plenty of officially verified information, becomes therefore also a damage control\n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official\n\nOpen Public Data, individual citizens, political parties or other organizations will start to process\n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different\n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong\n\nconclusions. This is not some theoretical possibility far in the future, as this real world example\n\n(from a comment to an [Open Data discussion in an italian blog](http://www.cottica.net/2010/09/16/spaghetti-open-data-reloaded/) ) proves:\n\n\" *on the* *[non italian]* *Geonames website you can download geo-referenced data*\n\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n\n*that not one was right. What should be done in such cases?*\n\nFrom an Open Data perspective, all these recent stories have (at least) one thing in common: they\n\nsuggest that, considering its current needs and problems, current societies want and need more Open\n\nData than they already have.\n\n### **2.1. Wikileaks and the Open Data movement**\n\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published\n\nby Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence\n\nof a more or less conscious mixing of the two themes, because in a very general sense, both Open\n\nData and Wikileaks are about transparency, accountability and democracy.\n\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks\n\nscandal.\n\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and\n\ntransparency whenever government activities are concerned. Citizens must be able to know what\n\nthe state is *actually* doing but sometimes, be it for careful evaluation of all the alternatives or\n\nbecause of security, it must be possible to work behind closed doors, [at least temporarily](http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/) . We'll\n\ncome back to this point later in this report.\n\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness\n\nand transparency in politics, not only there are deep differences between the two ideas but, in our\n\n*5/34*", - "page_start": 4, - "page_end": 4, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides\n\nthat those from (properly done) Open Data are a really tiny percentage of the total.\n\nThis is a consequence of the fact that data about us end up online from the most different sources\n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never\n\nmind *prove* , that they've been used against our interest. There have been concerns, for example, that\n\ninsurance companies may charge higher fees for life insurance to those among their customers\n\nwho... put online a family tree from which it shows that they come from families with an average\n\nlife expectancy lower than usual.\n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of\n\ndata, that weren't even published by any Public Administration? Of course, publishing online\n\ncomplete, official Census data of several generations, in a way that would make such automatic\n\nanalysis possible would be a totally different matter.\n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is\n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always\n\nremember and explain that:\n\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air\n\npollution measurements....)\n\n2. The majority of data that are directly related to individuals (e.g. things like names and\n\naddress of people with specific diseases, or who were victims of some crime) have no reason\n\nto be published, **nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to\n\npublic offices, Government and Parliament members etc...) already exist in many countries\n\n4. Very often, in practice, Open Data struggles only happen about *when and how* to make\n\navailable in the most effective way for society information that was *already* recognized as\n\npublic. *What* to declare public, hence open, is indeed a serious issue (more on this in the next\n\nparagraph) but is a separate one.\n\n### **3.8. Need to better define what is Public Data**\n\nTogether with citizens education, there is a huge challenge that Governments and the Open Data\n\nmovement will have to face (hopefully together) in 2011 and beyond. This challenge is to update\n\nand expand the definition of Public Data and to have it accepted by lawmakers and public\n\nadministrators.", - "page_start": 22, - "page_end": 22, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "What is, exactly, Public Data? A definition that is accepted almost implicitly is *\"data that is of*\n\n*public interest, that belongs to the whole community, data that every citizen is surely entitled to*\n\n*know and use\"* . This definition is so generic that accepting it together with the assumption that all\n\nsuch data should be open as preached by the Open Data movement (online, as soon as possible, in\n\nmachine readable format with an open license etc...) doesn't create any particular problem or\n\nconflict.\n\nReal problems however start as it has happened all too often so far, whenever we assume more or\n\nless consciously that \"Public Data\" in the sense defined above and data directly produced by\n\nGovernments and Public Administrations, that is what's normally called PSI (Public Sector\n\nInformation) are the same thing.\n\nThere is no doubt that Governments and Public Administrations produce huge quantities of Public\n\nData. But this is an age of privatization of many public services, from transportation to healthcare,\n\nenergy and water management. This is an age in which many activities with potentially very serious\n\nimpacts on whole communities, like processing of hazardous substances or toxic waste, happen\n\n*outside* Public Administrations. The paradox is that, as [Sasaki put it](http://informacioncivica.info/mexico/access-to-information/) , this increased privatization is\n\nhappening in the very same period in which *\" we are observing a worldwide diffusion of access to*\n\n*information laws that empower citizens to hold government agencies accountable.\"*\n\nIn such a context, \"Public Data\"is critical just because it is a much bigger set of data than what\n\nconstitutes traditional, official PSI. \"Public Data\" includes all that information *plus* the much bigger\n\namount of data describing and measuring all the activities of private companies, from bus\n\ntimetables to packaged food ingredients, aqueducts performances and composition of fumes\n\nreleased in the atmosphere, that have a *direct impact* on the health and rights of all citizens of the\n\ncommunities affected by the activities of those companies.\n\nAre such data \"Public\" today, in the sense defined at the beginning of this paragraph, that is\n\nsomething every citizen has the right to know without intermediaries or delegates, or not? Should\n\nthey be public? If yes, shouldn't law mandate that all such data be Open (that is, published online as\n\nsoon as possible, in machine readable format with an open license etc...) just like, for example, the\n\nbudget of some Ministry? Answering these questions may be one of the biggest challenges for the\n\nOpen Data community, and for society as a whole, in the next years.\n\nHere are, in order to facilitate reflection on this issue, a few recent, real world examples of \"Public\n\nData\" that are *not* PSI, and of the impacts of their lack of openness.", - "page_start": 23, - "page_end": 23, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "#### **3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen, *before*\n\nthey are published online. The most common concerns of this type are (from [Open Public Data: ](http://blog.okfn.org/2011/01/28/open-public-data-then-what-part-1/)\n\n[Then What? - Part 1](http://blog.okfn.org/2011/01/28/open-public-data-then-what-part-1/) ):\n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as\n\nprivate property by private corporations, because the public agencies whose job was to\n\nproduce those data, can't sell them anymore.\n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of\n\nreducing trust in institutions and inhibiting decision-making even more than today.\n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account\n\nis that, once data are open, routinely used and monitored by as many independent users as possible,\n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the\n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very\n\nexpensive, studies and surveys to update a whole corpus of data in one run.\n\nBesides, and above all, even if opening data always destroyed any source of income for the public\n\noffice that used to create and maintain them, this problem would only exist for the PSI datasets that\n\nare *already* sold today. Such data, even if of strategic importance as is the case with digital\n\ncartography, are only a minimal fraction of all the PSI that could and should be opened to increase\n\ntransparency, reduce the costs of Government and stimulate the economy. In all these other cases:\n\n- the money to generate the data already arrives by some other source than sales and\n\nlicensing(but even with those data it may be possible to generate them by crowdsourcing,\n\nthereby reducing those costs!)\n\n- the only extra expense caused by publishing those data online (assuming they're already\n\navailable in some digital format, of course!), would be the hosting and bandwidth costs, that\n\nmay be greatly reduced by mirroring and other technical solutions like torrents, already\n\nwidely used to distribute Free/Open Source Software (FOSS) through the Internet.\n\n#### **3.6.2. Real impact of data manipulation or misunderstanding**\n\nThe fix for the risk that data is manipulated is to not only open government data and procedures, but\n\nto simplify the latter (which eventually also greatly reduces cost) as much as possible. Abundance\n\nof occasions to secretly play with data and how they are managed is a symptom of excessive, or\n\npeak complexity: again, problems and risks with Open Data are a symptom of a [pre-", - "page_start": 16, - "page_end": 16, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "[with a project called \"Tales of Things\"](http://www.grist.org/article/2011-02-17-norways-facebook-killer-is-for-buses-only) to allow people to leave messages for each other (or just for\n\nthe world) at the bus stops. Scanning the QR code now allows people to see not just the bus\n\ntimetable, but also the notes other travelers have left on that stop, including *\"what's nearby, who's*\n\n*waiting for whom, what number can you call for a good time. It's a cross between bus stop*\n\n*Facebook and digital graffiti\"* , that happened thanks to the openness of the original bus stop data.\n\nThe [Social Life of Data Project](http://www.practicalparticipation.co.uk/odi/2011/05/new-project-the-social-life-of-data/) will study instead how particular datasets have been used, who used\n\nthem, how those people are connected and what conversations happen around Open Data.\n\n### **3.3. Legal issues remain crucial**\n\nProper licensing of Public data is essential. The more Open Data activities continue, the clearer this\n\nrule becomes. What distinguishes Open Data from \"mere\" transparency is reuse. Paraphrasing\n\nEaves, until a government get the licensing issue right, Open Data cannot bring all the possible\n\nbenefits in that country. If there are no guarantees that public data can be used without restriction,\n\nvery little happens in practice, and when it happens it may be something against the public interest.\n\nCanadian Company Public Engines Inc, that is paid by local police departments to collect, process\n\nand analyze official crime data, also publishes online, with a proprietary license, anonymized\n\nsummaries of those data. When in 2010 another company, Report See Inc, scraped those data from\n\ntheir website to reuse them, Public Engines sued.\n\nReporting this, D. Eaves [rightly points out](http://eaves.ca/2010/09/21/does-your-government-and-thus-you-actually-own-its-data/) that *both* companies are right: one is trying to protect its\n\ninvestment, the other is simply trying to reuse what IS public data, by getting it from the ONLY\n\nplace where it's available. This is what happens when public officials leave the ownership of *public*\n\ndata to the third parties hired to collect them. Please note that, in practice, it makes very little\n\ndifference whether those third parties are private, for-profit corporations or even other Public\n\nAdministrations. Unless, of course, there are national laws already in place that define in advance\n\nwhat is the license of all present and future Public Data, *no matter how they were generated and by*\n\n*whom* , those data can be lost in any moment for society. In all other cases, the legal status of data\n\nwill be either officially closed and locked, or uncertain enough to prevent most or all reuses. In\n\nFebruary 2011, the [news came](http://www.techdirt.com/articles/20110221/01191413180/privatization-public-data-sets-bad-precedent.shtml) that, even if they weren't the original copyright holders, Public\n\nEngines had been able to put together enough legal claims to convince Report See to give up.\n\nDisputes like this should not happen and would not happen if all contracts regarding collection and\n\nmanagement of PSI clearly specified that all the resulting data either go directly into the public\n\ndomain (after being anonymized if necessary, of course) or remain exclusive property of the", - "page_start": 12, - "page_end": 12, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "- better procurement\n\nThe first two features have obvious technical advantages regardless of data openness. The last two,\n\nbeing critical, are discussed separately in the next paragraph.\n\n### **4.4. Impose proper licensing and streamline procurement**\n\nAs with the first report prepared for this project, we will not delve into the details of *how* to license\n\ndata because this topic continues to be followed and debated in all details by LAPSI and other\n\nprojects or researchers. We will simply confirm the importance of establishing a proper license, at\n\nthe national level, for all Public Data, that makes them Open in the right way and makes sure that\n\nwhat is opened stays open and that don't demand what isn't possible to enforce (e.g. attribution),\n\nbecause, quoting again [Eaves](http://eaves.ca/2011/02/16/the-state-of-open-data-in-canada-the-year-of-the-license/) , *\"no government should waste precious resources by paying someone*\n\n*to scour the Internet to find websites and apps that don't attribute\"* .\n\nWe want, however, to spend a few words about another legal/administrative side of the issue, that is\n\nprocurement. Traditional procurement laws are very likely not flexible enough, in most countries, to\n\nhandle the implementation of data-based public services. Here's why.\n\nWe know that if Public Data are Open, everybody, from volunteer activists to hired professionals,\n\ncan very quickly write or maintain simple software applications that help to visualize and use them\n\nin all possible ways. Paradoxically, this is a problem when an Administration either wants to set up\n\nan Open Data programming contest (that besides being inexpensive, it's much simpler to organize\n\nand join than traditional tenders or grants) or *needs* to just pay somebody to write from scratch and\n\nmaintain some new program of this type, or customize existing ones.\n\nThe reason is that, just because this type of software development is so quick, even hiring a\n\nprofessional to do it, or setting up a contest would be... too inexpensive to be handled with default\n\nprocurement procedures. Quoting from [Day Two: Follow the Data, Iterating and the $1200 ](http://codeforamerica.org/2011/01/06/day-two-follow-the-data-iterating-and-the-1200-problem/#more-2496)\n\n[problem](http://codeforamerica.org/2011/01/06/day-two-follow-the-data-iterating-and-the-1200-problem/#more-2496) :\n\nA big problem for cities is procuring products under $10,000. How does a city pay for\n\nan awesome application like [SeeClickFix](http://seeclickfix.com/) when it doesn't fit the normal year-long\n\nplanning and two-year implementation in the millions of dollars? In Tuscon, Andrew\n\nGreenhill tapped the Mayor's general budget for it, instead of trying to get the IT\n\ndepartment to shell out. In San Francisco, Ed Reiskin uses discretionary spending. But\n\nevery time, procurement gets messy. In reference to nepotism laws, Ed worries that he'll\n\nappear \"like I'm giving my buddies dollars.\" Building great products for cities has to\n\ninclude finding great strategies to pay for them. In San Francisco, Jay Nath doesn't even\n\nhave a budget…which, he says is 'liberating' because he doesn't need to go through", - "page_start": 28, - "page_end": 28, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "procurement.\n\nThe same issue is denounced as an obstacle to innovation and cost savings in [New ](http://gov20.govfresh.com/new-recommendations-for-improving-local-open-government-and-creating-online-hubs/)\n\n[recommendations for improving local open government and creating online hubs](http://gov20.govfresh.com/new-recommendations-for-improving-local-open-government-and-creating-online-hubs/) :\n\nJohn Grant focused on a major pain point for government at all levels for tapping into\n\nthe innovation economy: procurement issues, which civic entrepreneurs run into in\n\ncities, statehouses and Washington. \"It is time to look at these procurement rules more\n\nclosely,\" he said, and promote higher levels of innovation. \"There are a lot of ideas are\n\nhappening but a lot of rules restrict vendors from interacting in government,\" said\n\nGrant. Turner-Lee observed that traditional procurement laws may also not be flexible\n\nenough to bring more mobile apps into government.\n\nCurrent procurement laws aren't partially incompatible with an Open Data world only at this level,\n\nthat is when it's time to procure software that makes the data useful. Even bigger problems and\n\ninefficiencies can be introduced at the beginning of data life, that is when data collection and\n\nprocessing services are procured. We've already explained that forgetting to impose the right license\n\nis one of the problems, but it's not the only one. Even future *organization* of all the foreseeable data\n\nmanagement activities should take advantage of the flexibility provided by data openness. Here is\n\nhow Tim Davies [summarizes this point](http://www.practicalparticipation.co.uk/odi/2011/01/four-other-places-to-look-for-the-impact-of-open-government-data/) :\n\nRight now [public] bodies often procure data collection, data publishing and data\n\ninterfaces all in one block (as seems to be the case with Oxfordshires real-time bus\n\ninformation - leading to a roadblock on innovation) - and so without these layers being\n\nseparated in procurement, some of the benefits here stand to be lost.\n\nChanging procurement of information/data-rich public services would be, of course, only the first\n\nstep of a general reform of procurement laws and regulations. After management of Open Data has\n\nbeen simplified, it becomes time to implement similar simplifications to procurement of everything\n\nelse. In fact, in such a scenario, there would be much less possibilities for the loopholes, frauds and\n\ninefficiencies that forced local procurement procedures to become so slow and complicated: since\n\nthe public budget and other relevant public data would already be fully open, errors and other\n\nproblems would surface and be fixed much more quickly and reliably than today, even assuming\n\nthat they would continue to appear with the same frequency.\n\n### **4.5. Educate citizens to understand and use data**\n\nIt is necessary to guarantee the widest possible availability of *all* the pre-requisites for effective use\n\nof Open Data. In other words, it is necessary to provide free and widely accessible training, oriented\n\nto average citizens, on how and why to visualize Public Data and use them to make informed", - "page_start": 29, - "page_end": 29, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "The biggest difference between Gov 2.0 and OpenGov seems to be how they approach\n\ntransparency. Gov 2.0 is about transparency through open data and the \"government as a\n\nplatform\" idea. \"Open Government\" is about Transparency for the sake of\n\naccountability, but not necessarily interaction, cooperation and reuse of data outside the\n\ngovernment.\n\n[who advocates] Open Data does so in order to make it accessible to citizens\n\nrather than to hold government accountable. This is not to say that one approach is\n\nbetter than another, but this is to say that there seem to be two very different\n\nmotivations for advocating for transparency, and they do seem to correlate to whether\n\npeople label themselves as part of Gov 2.0 or part of OpenGov.\n\nIn general, reflection and debate on this point is accelerating. At the moment, some characteristics\n\nof Open Government on which there is more or less agreement are that Open Government is about:\n\n- deliberation, choice, influence on decisions and participation as a common citizen\n\n- letting *all* citizens use technology to participate, monitor and define government activities.\n\nIn other words, Government is really Open when it's based on interaction, not only on some\n\nset of infrastructures and methods imposed top-down\n\n- diffused, seamless conversations, that are only possible with digital technologies, online\n\nsocial networks and so on, between public employees and citizens.\n\nThe obvious potential limit of these definitions is that they rely on a big, still largely unknown\n\nfactor, that is actual citizen participation. When data are opened, the problem becomes to have\n\neverybody use them, in order to actually realize Open Government as defined above. This issue will\n\nbe explored in detail in the next paragraphs, but we can already say that Open Data are highlighting\n\nthe critical, weak points in the present and future relationship between citizens and governments.\n\nWhile citizens participation is essential, especially in times of social and economic crisis, achieving\n\nit on a large scale won't be easy. Frustration and lack of trust in institutions in many countries are\n\nhigh, so it's no surprise when people express doubts that opening government data won't help much\n\nin fixing things.\n\n### **3.6. Clearer vision of the real risks and limits of Open Data**\n\nOpen Data, we already said, is about reuse. The point is, at least when the goal is Open Government\n\nand transparency in politics, reuse by whom? There is no *automatic* cause-effect relationship\n\nbetween Open Data and real transparency and democracy. On the contrary, several problems may\n\noccur, if administrators and citizens don't pay close attention.", - "page_start": 15, - "page_end": 15, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "several centuries, in the analog, pre-computer world. Developing countries are good case studies\n\nfrom this point of view, because they are often leapfrogging from oral tradition straight to\n\ncomputers in all fields, not just e-government.\n\nLand ownership in India, discussed by Gurnstein in 2010, is a perfect example of the problems\n\ncarried by digitization that requests for Open Data only expose, without creating them. Digitization\n\ncan certainly increase efficiency, transparency and economic activities, but fully achieves these\n\ngoals only by:\n\n- standardizing as much as possible all concepts, formats and procedures.\n\n- replacing *completely* , at least in standard day to day procedures, whatever other records and\n\nways of working existed before\n\nGurnstein wrote:\n\n*\"The problem of open access in the case of land records in India is... the manner in*\n\n*which the data tends to get encoded. Typically, digitization of land records would mean*\n\n*either scanning the record as it is, or inputting all the data on the record as it is,*\n\n*without changing any fields. But ways of maintaining land records are highly diverse...*\n\n*Private ownership is not the only means of holding a land parcel. When it comes to*\n\n*land ownership, for example, it may eliminate the history of land, how were sub-*\n\n*divisions and usufruct rights negotiated and enforced.\"*\n\nAnother risk of digitization and e-government (without openness, that is) is lack of contact between\n\ncitizens and institutions:\n\n*\"Prior to digitization, land records in India were available to people who made*\n\n*requests with village accountants for them. .. after digitization of several services,*\n\n*village accountants no longer personally visit the villages they are in charge of... What*\n\n*has happened with digitization is a reorganization of earlier forms of social and*\n\n*political relations. Accountability has moved from the immediate village level\"*\n\nOf course, all these problems existed well before computers and return every time the political or\n\nsocial order changes. The demand for Open Data is only increasing, by orders of magnitude, the\n\nnumbers of times in which we meet them.\n\n### **3.5. The nature of Open Government and the relationship**\n\n**between citizens and Government**\n\nOpen Data are an essential part of Open Government. Almost everybody agrees with this.\n\nAgreement on what exactly defines Open Government is, however, less universal. In January 2011\n\nLucas Cioffi, replying to Alex Howard, [wrote](http://gov20.govfresh.com/social-media-fastfwd-defining-gov-2-0-and-open-government-in-2011/) :", - "page_start": 14, - "page_end": 14, - "source_file": "Open_Data_Report.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed4.pdf", - "query": "How did serum estradiol and progesterone levels change during pregnancy?", - "target_page": 2, - "target_passage": "Serum hormone concentrations increased significantly over the course of pregnancy and dropped precipitously postpartum", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "The GMV changes we see across pregnancy far exceed normative brain\n\nvariability (Supplementary Fig. 11). On average, change in cortical GMV\n\nwas nearly three times higher than controls scanned over a similar\n\nduration (Supplementary Fig. 11a,b). This extends to MTL subfields,\n\nwherein change in volume was three to four times greater across gesta-\n\ntion than normative brain variability (Supplementary Fig. 11c,d). We\n\ncontextualized these findings further by comparing gestational GMV\n\nchange against our participant’s preconception brain volumes; average\n\nGMV change during pregnancy was six times (cortical) and three times\n\n(MTL) higher than the variability observed between baseline sessions.\n\nsubcortical structures, including the ventral diencephalon, caudate,\n\nthalamus, putamen and hippocampus. High-resolution imaging and\n\nsegmentation of the medial temporal lobe (MTL) extend these findings\n\nfurther, revealing specific volumetric reductions within hippocampal\n\nsubfields CA1, CA2/CA3 and parahippocampal cortex (PHC). In con-\n\ntrast to widespread decreases in cortical and subcortical GMV, cor -\n\nrelational tractography analyses revealed nonlinear increases in white\n\nmatter quantitative anisotropy (QA) throughout the brain—indicating\n\ngreater tract integrity—as gestational week progressed. Together, these\n\nfindings reveal the highly dynamic changes that unfold in a human\n\nbrain across pregnancy, demonstrating a capacity for extensive neural\n\nremodeling well into adulthood.\n\n### **Results**\n\n#### **Serological evaluations**\n\nSerological evaluations captured canonical hormone fluctuations\n\ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b ).\n\nSerum hormone concentrations increased significantly over the course\n\nof pregnancy and dropped precipitously postpartum (preconcep-\n\ntion, estradiol (E) = 3.42 pg ml <sup>−1</sup> and progesterone (P) = 0.84 ng ml <sup>−1</sup> ;\n\n3 weeks preparturition, E = 12,400 pg ml <sup>−1</sup> and P = 103 ng ml <sup>−1</sup> ; 3 months\n\npostparturition, E = 11.50 pg ml <sup>−1</sup> and P = 0.04 ng ml <sup>−1</sup> ).\n\n#### **Whole-brain dynamics from baseline through postpartum**\n\nTo begin, we characterized broad neuroanatomical changes over the\n\ncourse of the entire experimental window (baseline—2 years postpar-\n\ntum, 26 scans; Fig. 1d ). Generalized additive models revealed strong\n\nnonlinear (effective degrees of freedom > 3) relationships between\n\nweeks since conception and summary brain metrics. Total GMV\n\n( *F* = 27.87, *P* < 0.001, deviance explained = 93.9%, *R* <sup>2</sup> adj <sup>= 0.91), summary</sup>\n\nCT ( *F* = 15.79, *P* < 0.001, deviance explained = 78.6%, *R* <sup>2</sup> adj <sup>= 0.75) and</sup>\n\ntotal brain volume ( *F* = 26.12, *P* < 0.001, deviance explained = 93.4%,\n\n*R* <sup>2</sup> adj <sup>= 0.90) linearly decreased during gestation and appeared to</sup>\n\npartially rebound postpartum. In contrast, global microstructural\n\nintegrity (QA) of white matter increased throughout the first and sec-\n\nond trimesters before returning to baseline levels in the postpartum\n\nperiod (whole-brain QA, *F* = 4.62, *P* = 0.007, deviance explained = 60.2%,\n\n*R* <sup>2</sup> adj <sup>= 0.51). We also observed nonlinear patterns of lateral ventricle</sup>\n\nexpansion *(F* = 10.44, *P* < 0.001, deviance explained = 83.8%, *R* <sup>2</sup> adj <sup>= 0.77)</sup>\n\nand increased cerebrospinal fluid (CSF; *F* = 13.32, *P* < 0.001, deviance\n\nexplained = 83.8%, *R* <sup>2</sup> adj <sup>= 0.79) rising in the second and third trimesters</sup>\n\nbefore dropping sharply postpartum.\n\n#### **Cortical volume and thickness changes tied to gestation**\n\nWe then narrowed the aperture to capture changes unfolding within\n\ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships\n\nbetween summary brain metrics were evident over the gestational\n\nperiod as follows: total brain volume, GMV and CT were positively asso -", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "**2255**\n\n### **Discussion**\n\nConverging evidence across mammalian species points to pregnancy\n\nas a remarkable period of neuroplasticity, revealing the brain’s ability\n\nto undergo adaptive, hormonally-driven neuroanatomical changes\n\nbeyond adolescence <sup>13</sup> <sup>-</sup> <sup>15</sup> <sup>,</sup> <sup>20</sup> <sup>,</sup> <sup>21</sup> <sup>,</sup> <sup>24</sup> <sup>-</sup> <sup>26</sup> . Investigations that compare women\n\nprepregnancy and then again postpartum provide the strongest evi-\n\ndence to date that the human brain undergoes such neural changes <sup>11</sup> <sup>,</sup> <sup>27</sup> .\n\nBut what about pregnancy itself? Over what time course do anatomical\n\nchanges in the maternal brain manifest? Are they tied to the substantial\n\nincrease in sex hormone production? Here we begin to address these\n\nPregnancy stages Sex steroid hormones\n\nProgesterone ng ml\n\n- 1 17 β\n\n-estradiol pg ml\n\n- 1\n\n12,500 100 17 β -estradiol\n\nProgesterone\n\nPre 1st 2nd 3rd Post\n\n<0 0- 13 14- 26 27- 40 >40\n\nGestation weeks\n\n**a b**\n\nWeeks since conception\n\n0 0\n\nBirth\n\n- 1 10 20 30 40 50\n\nStudy overview\n\n//\n\nWhole-brain T1\n\nMTL scan\n\nDifusion MRI\n\nBlood serum\n\nPre/IVF Pregnancy Birth Postpartum\n\n**c**\n\n0 14 27 40 60 93 162\n\nWeeks since conception\n\nSummary brain measures\n\nGMV (×10\n\n5\n\nmm\n\n3 )\n\nCT\n\n(×10 6 mm)\n\nBrain vol (×10 6 mm\n\n3 )\n\nGlobal quant. anisotropy\n\nLat ventricles (mm 3 )\n\nCSF (mm\n\n3 )\n\n**d**\n\nWeeks since conception Weeks since conception\n\n4.60\n\n1.80\n\n1.60\n\n1.29\n\n1.27\n\n4.80\n\n| 0 |\n|---:|\n| 0 |\n\n50 100 150\n\n50 100 150\n\n0 50 100 150\n\n24,500\n\n26,000\n\n0.44\n\n0.38\n\n4,800\n\n3,900\n\n*R* <sup>2</sup> adj <sup>= 0.79,</sup> *<sup>P</sup>* <sup>< 0.001</sup>\n\n*R* <sup>2</sup> adj <sup>= 0.50,</sup> *<sup>P</sup>* <sup>= 0.007</sup>\n\n*R* <sup>2</sup> adj <sup>= 0.77,</sup> *<sup>P</sup>* <sup>< 0.001</sup>\n\n*R* <sup>2</sup> adj <sup>= 0.91,</sup> *<sup>P</sup>* <sup>< 0.001</sup>\n\n*R* <sup>2</sup> adj <sup>= 0.75,</sup> *<sup>P</sup>* <sup>< 0.001</sup>\n\n*R* <sup>2</sup> adj <sup>= 0.90,</sup> *<sup>P</sup>* <sup>< 0.001</sup>\n\nBirth Birth\n\n| 0 |\n|---:|\n| 0 |\n\n50 100 150\n\n0 50 100 150\n\n//\n\n//\n\n//\n\n50 100 150\n\n0\n\n### **Fig. 1 | Precision imaging reveals neuroanatomical changes throughout**\n\n**gestation. a** , Standard medical demarcations for pregnancy stages (that is,\n\ntrimesters) by gestation week (the image is created with BioRender.com).\n\n**b** , Steroid hormones increased significantly throughout pregnancy and dropped\n\nprecipitously postpartum, as is characteristic of the prenatal and postnatal\n\nperiods. **c** , A healthy 38-year-old primiparous woman underwent 26 scanning\n\nsessions from 3 weeks preconception through 2 years postpartum. Scans were\n\ndistributed throughout preconception (four scans), first trimester (four scans),\n\nsecond trimester (six scans), third trimester (five scans) and postpartum\n\n(seven scans); tick marks indicate when major measures were collected and\n\ncolors denote pregnancy stage. The participant underwent IVF to achieve\n\npregnancy, allowing for precise mapping of ovulation, conception and gestation\n\nweek. **d** , Summary (that is, total) of brain measures throughout the experiment.\n\nGeneralized additive models revealed GMV, CT and total brain volume decreased\n\nthroughout pregnancy (see Methods for validation with cubic regression), with\n\na slight recovery postpartum. Global QA, lateral ventricle and CSF volumes\n\ndisplayed nonlinear increases across gestation, with a notable rise in the second\n\nand third trimesters before dropping sharply postpartum. Shaded regions\n\nrepresent 95% confidence bands; solid lines indicate model fit; dashed line\n\nindicates parturition.", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed4.pdf" - }, - { - "text": "**2258**\n\noverlook the full range of changes that unfold within the gestational\n\nwindow, and underrepresent the brain’s metamorphosis during preg-\n\nnancy. Furthermore, although observed changes were largely global,\n\nsome regions displayed notable stability (for example, extrastriate cor-\n\ntex). The subcortical region that displayed the strongest relationship\n\nwith gestation week was the ventral diencephalon, which encompasses\n\nthe hypothalamus and subsequent medial preoptic area and paraven-\n\ntricular nucleus—structures critical for inducing maternal behavior <sup>12</sup> <sup>,</sup> <sup>16</sup> .\n\nThe hippocampus exhibited a reduction in volume across gestation,\n\nand with higher spatial resolution, this reduction was revealed to be\n\ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other\n\nhippocampal subfields remained stable. Adjacent PHC within the\n\nMTL also exhibited volume reduction across gestation. While our hip-\n\npocampal findings are consistent with pre/post studies of pregnancy <sup>13</sup> ,\n\nthe precision lens applied within gestation revealed the nonlinear\n\nnature of this reduction. Recapitulating and clarifying these region-\n\nally specific patterns of volume change throughout the MTL merits\n\nfurther investigation.\n\nSimilar precision imaging studies have captured dynamic brain\n\nreorganization across other neuroendocrine transitions, such as the\n\nmenstrual cycle (see review in ref. 28 ), underscoring the powerful\n\nrole steroid hormones have in shaping the mammalian brain <sup>29</sup> . Endo-\n\ncrine changes across pregnancy dwarf those that occur across the\n\nmenstrual cycle, which highlights the critical need to map the brain’s\n\nresponse to this unique hormonal state. Broad physiological changes\n\noccur in tandem with the rise in steroid hormones, including changes\n\nin body mass composition, water retention, immune function and\n\nsleep patterns <sup>11</sup> . These factors could have a role in the brain changes\n\nobserved here, with some driving neurobiological changes and others,\n\nlike water retention, potentially affecting MRI-based measurements.\n\nNote that, although cortical reductions in GMV over gestation were\n\nstable across analyses, accounting for QC measures influenced the\n\nmagnitude and location of these results. These metrics all fell within\n\nthe standard range, but there may be meaningful reductions in signal\n\nthat accompany volumetric reductions (for example, increased CSF\n\nand decreased GM)—a methodological nuance that goes beyond the\n\nscope of this resource study. Ultimately, identifying the shared and\n\nunique contributions of these factors to the neuroanatomical changes\n\nthat unfold across gestation warrants further investigation. Deeply\n\nphenotyping a large and diverse cohort of women across pregnancy will\n\nopen up new avenues of exploration, for example, allowing research-\n\ners to link blood-based proteomic signatures to pregnancy outcomes;\n\ndeploying wearable devices to monitor changes in sleep, cognition and\n\nmood; and probing the broader social and environmental determinants\n\nof maternal health <sup>27</sup> .\n\nThe neuroanatomical changes that unfold during matrescence\n\nmay have broad implications for understanding individual differences\n\nin parental behavior <sup>13</sup> <sup>,</sup> <sup>24</sup> <sup>,</sup> <sup>30</sup> <sup>,</sup> <sup>31</sup> , vulnerability to mental health disorders <sup>32</sup> <sup>,</sup> <sup>33</sup>\n\nand patterns of brain aging <sup>18</sup> <sup>,</sup> <sup>19</sup> <sup>,</sup> <sup>34</sup> <sup>-</sup> <sup>36</sup> . Decreases in GMV may reflect\n\n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara-\n\ntion for parenthood <sup>26</sup> . For example, in rodents, steroid hormones\n\npromote parental behavior by remodeling specific neural circuits in the\n\nmedial preoptic area of the hypothalamus. These behavioral adapta-\n\ntions are critical to the dam’s ability to meet the demands of caring for\n\n**a b**", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" - }, - { - "text": "results provided in Supplementary Tables 1- 5. Percent change at the\n\nnetwork level was computed by subtracting the final pregnancy value\n\n(36 weeks pregnant) from the first prepregnancy baseline value, then\n\ndividing that difference by said first prepregnancy baseline value. All\n\nanalyses underwent multiple comparisons testing (false discovery rate\n\n(FDR)-corrected at *q* < 0.05).\n\n*Subcortical GMV* . A similar statistical approach was taken for subcorti-\n\ncal volume estimates. We ran a multivariate regression analysis predict-\n\ning GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by\n\ngestation week (FDR-corrected at *q* < 0.05).\n\nTo evaluate the relationship between gestation week and MTL\n\nsubregion volume over pregnancy ( *n* = 7 bilateral subregions and\n\n*n* = 18 MTL scans), we used a combination of linear and nonlinear\n\nmodels based on individual subregion data patterns. Models were\n\ncompared for best fit with each subregion via AIC from the GLM output\n\n(as described in ‘Summary brain metrics’). A linear regression model\n\nwas most appropriate for PHC (AIC diff < 3), whereas a quadratic model\n\nperformed best for CA1 and CA2/CA3. As a control, we repeated the\n\nanalyses with MTL subregion volumes after proportional volume cor-\n\nrection of total GMV calculated by ASHS. Finally, we evaluated the\n\nrelationship between endogenous sex hormones (estrogen and proges-\n\nterone) and subregion volumes using linear regression. Relationships\n\nwere considered significant only if they met FDR correction at *q* < 0.05.\n\n*White matter microstructure* . DSI Studio’s correlational tractography <sup>74</sup>\n\nwas used to analyze the relationship between white matter structure\n\nand gestational week ( *n* = 16). A truncated model was run to examine the\n\nrelationship between white matter and sex steroid hormones ( *n* = 14)\n\nfor the subset of diffusion scans with paired endocrine data during ges-\n\ntation. A nonparametric Spearman’s correlation was used to derive the\n\ncorrelation between gestational week and endocrine factors and our\n\nmetrics of interest (QA and MD; see Supplementary Table 9 and Sup-\n\nplementary Fig. 10 for MD results) because the data were not normally\n\ndistributed. Statistical inference was reached using connectometry,\n\na permutation-based approach that tests the strength of coherent\n\nassociations found between the local connectome and our variables\n\nof interest. It provides higher reliability and replicability by correcting\n\nfor multiple comparisons. This technique provides a high-resolution\n\ncharacterization of local axonal orientation. The correlational trac-\n\ntography was run with the following parameters: *t* score threshold of\n\n2.5, four pruning iterations and a length threshold of 25 voxel distance.\n\nTo estimate the FDR, a total of 4,000 randomized permutations were\n\napplied to obtain the null distribution of the track length. Reported\n\nregions were selected based on FDR cutoff (FDR < 0.2, suggested by\n\nDSI Studio), and contained at least ten tracts. For visualization of global\n\nand tract QA at each gestational stage, mean QA values were extracted\n\nusing DSI Studio’s whole-brain fiber tracking algorithm and ROI-based\n\ntracking using the default HCP842 atlas <sup>78</sup> .\n\n*Day2Day dataset: measurement variability* . To establish a marker of\n\nnormative variability over half a year, we computed metrics of meas-\n\nurement variability using the Day2Day dataset <sup>23</sup> , which provided both\n\nwhole-brain T1 and high-resolution T2 MTL scans. For each region, *j* , of\n\nthe Schaefer parcellation, we assessed across-session variability, *ε* , as\n\nε *j* = 100 × mean ( || *t* *s* −̂ *t* ||\n\n̂ *t* )\n\nWhere *t* *s* is the morphometric measurement of a parcel for session *s*\n\nand <sup>̂</sup> *t* is the mean of *t* across sessions <sup>55</sup> <sup>,</sup> <sup>79</sup> . Thus, we defined variability\n\nas the mean absolute percent difference between each individual and", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - }, - { - "text": "**2257**\n\noutstanding questions. This study and corresponding open-access\n\ndataset offer neuroscientists a detailed map of the human brain across\n\ngestation, a resource for which a wide range of previously unattainable\n\nneurobiological questions can now be explored.\n\nOur findings from this precision imaging study show that preg-\n\nnancy is characterized by reductions in GMV, cortical thinning and\n\nenhanced white matter microstructural integrity that unfold week by\n\nweek. These changes were also tied to the significant rise in steroid hor-\n\nmone concentrations over pregnancy. Some of these changes persist\n\nat 2 years postpartum (for example, global reductions in GMV and CT),\n\nwhile others, including markers of white matter integrity, appear to be\n\ntransient. Ventricular expansion and contraction parallel these cortical\n\nchanges. These widespread patterns, and the notable increase in CSF\n\nvolume across gestation, could reflect increased water retention and\n\nsubsequent compression of cortical tissue. However, the persistence\n\nof these changes at 2 years postpartum and regional variation in GMV,\n\nCT and QA, hint at cellular underpinnings, such as alterations in glia\n\nor neuron number, synaptic density and myelination (for review on\n\nthe latter, see ref. 4 ). Future studies of the relationship between fluid\n\ndynamics and volumetric changes will help clarify the factors that drive\n\nglobal neural changes during pregnancy; such insights will have broad\n\nimplications for maternal health (for example, neurological effects tied\n\nto pre-eclampsia or edema).\n\nCritically, dynamic neural changes occurred within the pregnancy\n\nwindow itself, a nuance not captured by studies limited to comparisons\n\nbetween prepregnancy and postpregnancy. For example, we observed\n\nlarge increases in white matter microstructural integrity (QA) through-\n\nout the first and second trimesters of pregnancy, but these measures\n\nfully returned to baseline values by the first postpartum scan. This\n\npattern may explain why previous studies report no pregnancy-related\n\ndifferences in white matter tractography <sup>14</sup> . Other measures, such as\n\nGMV and CT, decreased throughout gestation and displayed only a\n\nmodest rebound postpartum. These nonlinear patterns suggest that\n\nonly quantifying prepregnancy and postpartum brain structure may\n\nWhole-brain subcortical volumes\n\nGestation + postpartum Gestation\n\nWeek Stage\n\nAvg GMV (mm 3\n\n)\n\n0 10 20 30 Pre 1st 2nd 3rd Post\n\n4,000\n\n3,900\n\n3,800\n\n3,700\n\n3,600\n\n3,500\n\n4,000\n\n3,800\n\n3,600\n\nRight ventral diencephalon\n\nBrain stem\n\n**a**\n\nCA1\n\nWeek\n\n0 10 20 30\n\nStage\n\n1,900\n\n1,800\n\n1,700\n\n1,900\n\n1,800\n\n1,700 Avg GMV (mm\n\n3\n\n)\n\nGestation + postpartum Gestation\n\nPHC CA2/CA3\n\nMedial temporal lobe subregion volumes **b**\n\nGestation + postpartum\n\nWeek Stage\n\n200\n\n180\n\n160\n\n200\n\n180\n\n160 Avg GMV (mm\n\n3 )\n\nGestation Gestation + postpartum\n\nWeek\n\n0 10 20 30\n\nStage\n\nPre Post\n\n540\n\n500\n\n460\n\n540\n\n500\n\n460\n\nAvg GMV (mm\n\n3\n\n)\n\n*R* *<sup>2</sup>* adj <sup>= 0.36,</sup> *<sup>q</sup>* <sup>= 0.031</sup> *R* *<sup>2</sup>* adj <sup>= 0.41,</sup> *<sup>q</sup>* <sup>= 0.027</sup> *R* *<sup>2</sup>* adj <sup>= 0.58,</sup> *<sup>q</sup>* <sup>= 0.001</sup>\n\nGestation\n\nVentral DC\n\n*T* stat\n\nHippocampus\n\nPutamen\n\nThalamus\n\nCaudate\n\nLateral ventricle\n\n- 6\n\n2\n\nPre 1st 2nd 3rd Post Pre Post 0 10 20 30 1st 2nd 3rd 1st 2nd 3rd\n\n### **Fig. 3 | Subcortical GMV changed throughout gestation. a** , Multivariate\n\nregression analyses revealed largely negative relationships between gestation\n\nweek and subcortical GMV regions over pregnancy, including bilateral thalamus,\n\ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus,\n\nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral\n\nventricles displayed the only positive relationships with gestation week\n\n(also depicted in Fig. 1d ). The whole-brain subcortical GMV estimates shown\n\nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR-", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed4.pdf" - }, - { - "text": "**Methods**\n\n**Participant**\n\nOur participant (E.R.C.) was a healthy 38-year-old primiparous woman\n\nwho underwent in-vitro fertilization (IVF) to achieve pregnancy. Pre-\n\nvious studies reported no observable differences in neural changes\n\nfrom prepregnancy to postpregnancy between women who conceived\n\nnaturally versus women who conceived via IVF <sup>13</sup> , and doing so provides\n\na controlled way of monitoring pregnancy status. The participant\n\nexperienced no pregnancy complications (for example, gestational\n\ndiabetes and hypertension), delivered at full term via vaginal birth,\n\nnursed through 16 months postpartum, and had no history of neu-\n\nropsychiatric diagnosis, endocrine disorders, prior head trauma or\n\nhistory of smoking. The participant gave written informed consent and\n\nthe study was approved by the University of California, Irvine Human\n\nSubjects Committee.\n\n**Study design**\n\nThe participant underwent 26 MRI scanning sessions from 3 weeks\n\nbefore conception through 2 years postpartum (162 weeks), during\n\nwhich high-resolution anatomical and diffusion spectrum imaging\n\nscans of the brain were acquired. Scans were distributed throughout\n\nthis period, including prepregnancy (four scans), first trimester (four\n\nscans), second trimester (six scans), third trimester (five scans) and\n\npostpartum (seven scans; Fig. 1c ). The first 6 sessions took place at\n\nthe UCSB Brain Imaging Center (BIC), the final 20 sessions took place\n\nat the UCI Facility for Imaging and Brain Research (FIBRE). The major-\n\nity of scans took place between 9 AM and 2 PM, limiting significant\n\nAM- PM fluctuations <sup>49</sup> . The MRI protocol, scanner (Siemens 3T Prisma)\n\nand software (version MR E11) were identical across sites. Each scan-\n\nner was checked weekly for the duration of the study and passed all\n\nQC reports indicating no significant alterations in the geometry. To\n\nensure the robustness of the findings, after the final study session, the\n\nparticipant completed back-to-back validation scans at UCI and UCSB\n\nwithin a 12-h window to assess reliability between scanners. Intraclass\n\ncorrelation coefficients (two-way, random effects, absolute agreement,\n\nsingle rater) reveal ‘excellent’ test- retest reliability between scanners,\n\nincluding ROI-level GMV (ICC = 0.97, 95% CI: 0.80- 0.99), ROI-level\n\nCT (ICC = 0.96, 95% CI: 0.90- 0.98), MTL subfield volume (ICC = 0.99,\n\n95% CI: 0.97- 0.99) and ROI-level QA (ICC = 0.94, 95% CI: 0.91- 0.97).\n\nFurthermore, when examining the relationship between gestation\n\nweek and GMV among UCI-only gestational sessions, findings were\n\nconsistent (Supplementary Fig. 12), indicating that site differences\n\nare highly unlikely to have contributed meaningfully to the observed\n\neffects. Although not applicable here, we note that having a control\n\nparticipant scanned over a similar duration within the same scanner is\n\ncritical for estimating how much variation in the brain can be attributed\n\nto within-scanner variability.\n\nTo monitor state-dependent mood and lifestyle measures, the\n\nfollowing scales were administered on each experiment day: Perceived\n\nStress Scale <sup>50</sup> , Pittsburgh Sleep Quality Index <sup>51</sup> , State-Trait Anxiety\n\nInventory for Adults <sup>52</sup> and Profile of Mood States <sup>53</sup> . Correlation analy-\n\nses between state-dependent measures, summary brain metrics and\n\ngestation week revealed little to no relationships. The only exception\n\nto this was a moderate negative association between global QA and\n\nstate anxiety (Spearman’s correlation ( *ρ* ) = −0.65, *q* = 0.04; baseline—36\n\nweeks, *n* = 16). By making this data openly accessible, we encourage a\n\nmore nuanced approach toward exploring mood and lifestyle measures\n\nin relation to brain changes over pregnancy.\n\n**Endocrine procedures**\n\nThe participant underwent a blood draw ( *n* = 19; Fig. 1c ) before\n\nMRI scanning. Sex steroid concentrations were determined via", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed4.pdf" - }, - { - "text": "it was correctly specified with regards 6o 1) the choice of basis dimension (k) and 2) the distribution of the model residuals\n\n(see mgcv documentation; Wood, 2017). The general pattern of results held after toggling model parameters; however, we\n\nnote the risk of overinterpreting complex models with small sample sizes (see Sullivan et al., 2015). To address overfitting and\n\ncross-validate our basis type selection, we also fit the data using nonpenalized general linear models (GLM) with both linear\n\nand polynomial terms for gestation week. We compared the performance of each GLM (i.e., models using only a linear term\n\nvs. models with polynomial terms) via the Akaike information criterion (AIC), which revealed that cubic models consistently\n\noutperformed both linear and quadratic models (AICdiff > 3), providing additional evidence for non-linear changes in\n\nstructural brain variables over time.\n\nGray Matter Volume & Cortical Thickness:\n\nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy\n\nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a\n\nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were\n\nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non-\n\ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We\n\nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week\n\n(FDR-corrected at q < 0.05).\n\nT2-weighted MTL scans:\n\nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n =\n\n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual\n\nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" - }, - { - "text": "2.3. FastBlue tracer injections\n\nMice were briefly anesthetized during the procedure, induced with\n\n3%to5%isoflurane,andthenmaintainedat 1.5%to2%asrequired.\n\nHindlimbs were taped with the plantar surface of the paw facing up,\n\nand a custom, 26G removable needle with a 30˚ bevel, attached to\n\na 25- m L Hamilton syringe, was inserted between the 2 distal-most\n\nfootpads, towards the medial aspect of the hindpaw. The needle\n\nwas then rotated 90˚, so the bevel faced medially. Furthermore, 4- m L\n\nFastBlue (FB; 2% in sterile phosphate-buffered saline (PBS); CAS#\n\n73819-41-7; Polysciences, Inc, Warrington, PA) per paw was then\n\nslowly injected, and the needle was left in place for 10 seconds,\n\nbefore rotating and carefully retracting to avoid backflow of FB along\n\nthe needle track. This prevented the FB bolus from contacting the\n\nsural innervation territory of the lateral hindpaw, restricting it largely to\n\nthe tibial innervation territory of the glabrous hindpaw skin.\n\n2.4. Immunohistochemistry and image acquisition\n\nMice were anesthetized with an overdose of pentobarbital (20\n\nmg) and transcardially perfused with a fixative containing 4%\n\nformaldehyde. L3 to L5 DRGs were removed and postfixed for\n\nanother 2 hours, cryoprotected in 30% sucrose overnight, and\n\nthen embedded in optimal cutting temperature media (OCT;\n\nTissue Tek, Alphen aan den Rijn, the Netherlands). Dorsal root\n\nganglia were sectioned on a Leica CM1950 cryostat at 30 m m,\n\nwith every section collected serially on 5 Superfrost Plus slides\n\n(VWR, Lutterworth, United Kingdom) and each slide containing 1\n\nin every 5 sections (4-7 sections per slide). One slide per DRG was\n\nselected at random and was washed with PBS, before being\n\nincubated with appropriate primary antibodies ( Table 2 ) diluted in\n\n5% normal donkey serum and 0.3% Triton X-100 in PBS for\n\n3 days at 4˚C. After PBS washes, slides were incubated with\n\nappropriate secondary antibodies ( Table 2 ) in the same PBS/\n\n(normal donkey serum) NDS/Triton-X100 solution as for prima-\n\nries, overnight at room temperature. Slides were washed and\n\ncoverslipped with VectaShield Vibrance Hardset mounting media\n\n(Vector Labs, Newark, CA), with 4’,6-diamidino-2-phenylindole\n\nincluded in mounting media where FB-labelled cells were not\n\nbeing examined. Sections were imaged using a Zeiss LSM900\n\nAiryscan confocal microscope equipped with 405-, 488-, 561-,\n\nTable 2\n\nPrimary and secondary antibodies used in the study.\n\nAntibody Source Identifiers Working dilution\n\nAnti-GFP (Chicken polyclonal) Abcam, plc, Cambridge, United Kingdom Cat#: ab13970\n\nRRID: AB_300798\n\n1:1000\n\nAnti-NeuN (Guinea pig polyclonal) Synaptic Systems, G¨ottingen, Germany Cat#: 266004\n\nRRID: AB_2619988\n\n1:500\n\nAnti-mCherry (Rat monoclonal) Invitrogen, Waltham, MA; Thermo Fisher Scientific,\n\nUnited Kingdom\n\nCat#: M11217\n\nRRID: AB_2536611\n\n1:500\n\nAnti-Atf3 (Rabbit polyclonal) Novus Biologicals, Minneapolis, MN Cat#: NBP1-85816\n\nRRID: AB_11014863\n\n1:500\n\nAnti-NF200 (Rabbit polyclonal) Sigma-Aldrich, Saint Louis, MO Cat#: N4142\n\nRRID: AB_477272\n\n1:1000\n\nAnti-TrkA (Goat polyclonal) R&D Systems, Minneapolis, MN Cat#: AF1056\n\nRRID: AB_2283049\n\n1:500\n\nAnti-TDP43 (Rabbit polyclonal) Abcam, plc, Cambridge, United Kingdom Cat#: ab133547\n\nRRID: AB_2920621\n\n1:100\n\nAnti-RFP (Mouse monoclonal) Thermo Fisher Scientific, United Kingdom Cat#: MA5-15257\n\nRRID: AB_10999796\n\n1:200\n\nAnti-RFP (Chicken polyclonal) Sigma-Aldrich, United Kingdom Cat#: AB3528\n\nRRID: AB_11212735\n\n1:200\n\nAlexa Fluor 488 Donkey Anti-Chicken IgY\n\n(Donkey polyclonal)\n\nJackson ImmunoResearch, Ely, United Kingdom Cat#: 703-545-155\n\nRRID: AB_2340375\n\n1:500\n\nAlexa Fluor 647 Donkey Anti-Guinea pig IgG\n\n(Donkey polyclonal)\n\nJackson ImmunoResearch, Ely, United Kingdom Cat#: 706-605-148\n\nRRID: AB_2340476\n\n1:250\n\nRhodamine Red-X Donkey Anti-Rat IgG (Donkey\n\npolyclonal)\n\nJackson ImmunoResearch, Ely, United Kingdom Cat#: 712-295-153\n\nRRID: AB_2340676\n\n1:100\n\nAlexa Fluor 647 Donkey Anti-Rabbit IgG (Donkey\n\npolyclonal)", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed2.pdf" - }, - { - "text": "**2259**\n\nthe offspring <sup>12</sup> . Human studies have revealed GMV reductions in areas\n\nof the brain important for social cognition and the magnitude of these\n\nchanges corresponds with increased parental attachment <sup>13</sup> . Deeper\n\nexamination of cellular and systems-level mechanisms will improve\n\nour understanding of how pregnancy remodels specific circuits to\n\npromote maternal behavior.\n\nAlthough studied to a lesser degree, ties between maternal\n\nbehavior and white matter microstructure (particularly connectiv-\n\nity between temporal and occipital lobes) have been noted <sup>31</sup> . Here we\n\nreveal pronounced GMV changes in regions within sensory, attention\n\nand default mode networks over the gestational window. In paral-\n\nlel, we observed increased anisotropy in white matter tracts that\n\nfacilitate communication between emotional and visual processing\n\nhubs <sup>37</sup> <sup>-</sup> <sup>39</sup> , including the inferior longitudinal fasciculus and inferior\n\nfronto-occipital fasciculus. Pinpointing the synchrony of gray and\n\nwhite matter changes that unfold in the maternal brain could be\n\nkey to understanding the behavioral adaptions that emerge during\n\nand after pregnancy, such as honing the brain’s visual and auditory\n\nresponses to infant cues and eliciting maternal behavior. Research\n\ninto other major transition periods supports this idea. For instance,\n\nadolescence is a dynamic period characterized by region-specific,\n\nnonlinear decreases in GMV and increases in WMV, maturational\n\nbrain changes that are tied to gains in executive function and social\n\ncognition <sup>40</sup> . For both adolescence <sup>41</sup> and matrescence, the consider-\n\nable rise in steroid hormone production appears to remodel the brain\n\n(see ref. 25 for comparative analysis), promoting a suite of behaviors\n\nadaptive to that life stage. How specific neural changes give rise to\n\nspecific behavioral adaptations has yet to be fully explored with\n\nrespect to human pregnancy.\n\nThis precision imaging study mapped neuroanatomical changes\n\nacross pregnancy in a single individual, precluding our ability to gen-\n\neralize to the broader population. To benchmark our findings, we com-\n\npared the magnitude of GMV changes observed throughout pregnancy\n\nagainst data from nonpregnant individuals sampled over a similar time\n\ncourse. Doing so provided compelling evidence that pregnancy-related\n\nneuroanatomical shifts far exceed normative day-to-day brain variabil-\n\nity and measurement error. Evidence suggests that white matter micro-\n\nstructure remains fairly stable over a six-month period <sup>42</sup> , but more\n\nstudies are needed to compare the degree of white matter changes\n\nobserved during pregnancy to normative change over time. Further,\n\nsampling larger cohorts of women will generate much-needed norma-\n\ntive models of brain change (akin to ref. 43 ) throughout pregnancy to\n\nestablish what constitutes a typical degree of neuroanatomical change\n\nexpected during gestation and postpartum recovery.\n\nThese findings provide a critical rationale for conducting further\n\nprecision imaging studies of pregnancy in demographically enriched\n\ncohorts to determine the universality and idiosyncrasy of these adap-\n\ntations and their role in maternal health. Are the changes observed in\n\nour participant reflective of the broader population? Do deviations\n\nfrom the norm lead to maladaptive outcomes? A precision imaging\n\napproach can help determine whether the pace of pregnancy-induced\n\nneuroanatomical changes drives divergent brain health outcomes in\n\nwomen, as may be the case during other rapid periods of brain devel-\n\nopment <sup>44</sup> . One in five women experiences perinatal depression <sup>45</sup> and\n\nwhile the first FDA-approved treatment is now available <sup>46</sup> , early detec-\n\ntion remains elusive. Precision imaging studies could offer clues about\n\nan individual’s risk for or resilience to depression before symptom", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "**18** ( *b* )\n\n( *d* )\n\n( *a* ) TXx (°C)\n\nCDD (days)\n\n1.5°C 2°C\n\nTX90p (% time)\n\nRX5day (mm)\n\n3.5 3.0\n\n2.5 2.0\n\n1.5 1.0\n\n0.5 0\n\n2.0\n\n0.0\n\n- 2.0\n\n- 4.0\n\n- 6.0 IPSL-CM5A-LR IPSL-CM5A-MR GFDL-ESM2M MIROC-ESM-CHEM ACCESS1-0 ensemble mean HadGEM2-ES IPSL-CM5A-LR IPSL-CM5A-MR GFDL-ESM2M MIROC-ESM-CHEM ACCESS1-0 ensemble mean HadGEM2-ES\n\nIPSL-CM5A-LR IPSL-CM5A-MR GFDL-ESM2M MIROC-ESM-CHEM ACCESS1-0 ensemble mean HadGEM2-ES IPSL-CM5A-LR IPSL-CM5A-MR GFDL-ESM2M MIROC-ESM-CHEM ACCESS1-0 ensemble mean HadGEM2-ES\n\n8.0\n\n6.0\n\n4.0\n\n2.0\n\n0\n\n35\n\n30\n\n25\n\n20\n\n15 10\n\n5 0\n\n( *c* )\n\n**Figure 12.** Comparison of global mean changes in climate extremes indices relative to 1981- 2010 at 2 ° C and 1.5 ° C global\n\nwarming for individual ensemble members and ensemble mean. ( *a* ) Change in annual daily maximum temperature;\n\n( *b* ) percentage of days with maximum temperature above 90th percentile for 1981- 2010; ( *c* ) change in consecutive dry days;\n\n( *d* ) change in annual maximum 5-day rainfall.\n\nFor precipitation, generally similar changes are seen at 1.5°C global warming as at 2°C, but\n\nsmaller in magnitude (compare figures 16 and 4 ), suggesting that most of these changes are a\n\nresponse to radiatively forced climate change as opposed to internal climate variability. However,\n\nsome localized changes do vary in sign between the GWLs, such as in South Australia, suggesting\n\na possible dominance of internal variability over the global warming signal in these places.\n\nWhere Rx5day increases, the increases are projected to be larger—in some cases approximately\n\ndouble—at 2°C global warming than 1.5°C. Where Rx5day decreases, again the decreases are\n\nprojected to be larger at 2°C global warming than 1.5°C ( figure 17 ).\n\nOf the 122 countries assessed, 93 have smaller ensemble-mean HCVI calculated at 1.5°C global\n\nwarming than at 2°C, indicating an ensemble consensus that 76% of assessed countries would\n\nsee a smaller increase in vulnerability to food insecurity if global warming were limited to 1.5°C\n\n(figures 18 and 19 ). Conversely, 24% of countries would, by this metric, see the same or higher\n\nvulnerability to food insecurity at 1.5°C than 2°C. Of these, some are countries where HCVI\n\nis projected to be lower at 2°C global warming than in the baseline. For example, in Mali the\n\nensemble-mean baseline HCVI of 0.83 increased slightly to 0.85 at 1.5°C then reduced to 0.81\n\nat 2°C. In some countries, the ensemble-mean HCVI happened to be identical at both warming\n\nlevels. In Chad, for example, the baseline HCVI of 0.89 increased to 0.91 at both 1.5°C and 2°C.\n\nAs noted above, four countries saw ensemble-mean HCVI values at 2°C above any seen\n\nin the baseline, and this number increased to seven at 1.5°C. The same four countries with\n\n‘unprecedented’ HCVI values at 2°C also saw ‘unprecedented’ values at 1.5°C; these were Oman,\n\nBangladesh, Mauritania and Yemen. These were joined by Myanmar, India and Cambodia as\n\nhaving ‘unprecedented’ values at 1.5°C. The role of internal climate variability in the HCVI\n\nresults needs to be assessed, as does the effect of potential nonlinear interactions between the\n\nflood and drought metric. Until the reasons behind these country-specific results are understood,", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed11.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed4.pdf", - "query": "Which cortical sub-networks were particularly sensitive to pregnancy?", - "target_page": 2, - "target_passage": "Several sensory and attention subnetworks were particu- larly sensitive to gestation, including the control (subnetwork B), sali- ence ventral attention (subnetwork A), dorsal attention (subnetwork B), default (subnetwork A) and somatomotor (subnetworks A and B) networks", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "between summary brain metrics were evident over the gestational\n\nperiod as follows: total brain volume, GMV and CT were positively asso -\n\nciated with one another, whereas lateral ventricles, CSF and global QA\n\ndemonstrated negative relationships with GMV (Supplementary Fig. 1).\n\nChanges in GMV were near-ubiquitous across the cortical mantle\n\n(Fig. 2a ). Most large-scale brain networks exhibited decreases in GMV\n\n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of\n\ninterest (ROI) demonstrated negative relationships between GMV and\n\ngestation week (Fig. 2a and Supplementary Table 2). Together, these\n\nresults provide evidence of a global decrease in cortical volume across\n\npregnancy. Several sensory and attention subnetworks were particu-\n\nlarly sensitive to gestation, including the control (subnetwork B), sali-\n\nence/ventral attention (subnetwork A), dorsal attention (subnetwork\n\nB), default (subnetwork A) and somatomotor (subnetworks A and B)\n\nnetworks (Supplementary Table 1). Regions driving these network-level\n\nchanges include the bilateral inferior parietal lobe, postcentral gyri,\n\ninsulae, prefrontal cortex, posterior cingulate and somatosensory\n\ncortex (Fig. 2c , Supplementary Table 2 and validation of findings using\n\nalternate pipeline in Supplementary Tables 1 and 3). These regions and", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "The GMV changes we see across pregnancy far exceed normative brain\n\nvariability (Supplementary Fig. 11). On average, change in cortical GMV\n\nwas nearly three times higher than controls scanned over a similar\n\nduration (Supplementary Fig. 11a,b). This extends to MTL subfields,\n\nwherein change in volume was three to four times greater across gesta-\n\ntion than normative brain variability (Supplementary Fig. 11c,d). We\n\ncontextualized these findings further by comparing gestational GMV\n\nchange against our participant’s preconception brain volumes; average\n\nGMV change during pregnancy was six times (cortical) and three times\n\n(MTL) higher than the variability observed between baseline sessions.\n\nsubcortical structures, including the ventral diencephalon, caudate,\n\nthalamus, putamen and hippocampus. High-resolution imaging and\n\nsegmentation of the medial temporal lobe (MTL) extend these findings\n\nfurther, revealing specific volumetric reductions within hippocampal\n\nsubfields CA1, CA2/CA3 and parahippocampal cortex (PHC). In con-\n\ntrast to widespread decreases in cortical and subcortical GMV, cor -\n\nrelational tractography analyses revealed nonlinear increases in white\n\nmatter quantitative anisotropy (QA) throughout the brain—indicating\n\ngreater tract integrity—as gestational week progressed. Together, these\n\nfindings reveal the highly dynamic changes that unfold in a human\n\nbrain across pregnancy, demonstrating a capacity for extensive neural\n\nremodeling well into adulthood.\n\n### **Results**\n\n#### **Serological evaluations**\n\nSerological evaluations captured canonical hormone fluctuations\n\ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b ).\n\nSerum hormone concentrations increased significantly over the course\n\nof pregnancy and dropped precipitously postpartum (preconcep-\n\ntion, estradiol (E) = 3.42 pg ml <sup>−1</sup> and progesterone (P) = 0.84 ng ml <sup>−1</sup> ;\n\n3 weeks preparturition, E = 12,400 pg ml <sup>−1</sup> and P = 103 ng ml <sup>−1</sup> ; 3 months\n\npostparturition, E = 11.50 pg ml <sup>−1</sup> and P = 0.04 ng ml <sup>−1</sup> ).\n\n#### **Whole-brain dynamics from baseline through postpartum**\n\nTo begin, we characterized broad neuroanatomical changes over the\n\ncourse of the entire experimental window (baseline—2 years postpar-\n\ntum, 26 scans; Fig. 1d ). Generalized additive models revealed strong\n\nnonlinear (effective degrees of freedom > 3) relationships between\n\nweeks since conception and summary brain metrics. Total GMV\n\n( *F* = 27.87, *P* < 0.001, deviance explained = 93.9%, *R* <sup>2</sup> adj <sup>= 0.91), summary</sup>\n\nCT ( *F* = 15.79, *P* < 0.001, deviance explained = 78.6%, *R* <sup>2</sup> adj <sup>= 0.75) and</sup>\n\ntotal brain volume ( *F* = 26.12, *P* < 0.001, deviance explained = 93.4%,\n\n*R* <sup>2</sup> adj <sup>= 0.90) linearly decreased during gestation and appeared to</sup>\n\npartially rebound postpartum. In contrast, global microstructural\n\nintegrity (QA) of white matter increased throughout the first and sec-\n\nond trimesters before returning to baseline levels in the postpartum\n\nperiod (whole-brain QA, *F* = 4.62, *P* = 0.007, deviance explained = 60.2%,\n\n*R* <sup>2</sup> adj <sup>= 0.51). We also observed nonlinear patterns of lateral ventricle</sup>\n\nexpansion *(F* = 10.44, *P* < 0.001, deviance explained = 83.8%, *R* <sup>2</sup> adj <sup>= 0.77)</sup>\n\nand increased cerebrospinal fluid (CSF; *F* = 13.32, *P* < 0.001, deviance\n\nexplained = 83.8%, *R* <sup>2</sup> adj <sup>= 0.79) rising in the second and third trimesters</sup>\n\nbefore dropping sharply postpartum.\n\n#### **Cortical volume and thickness changes tied to gestation**\n\nWe then narrowed the aperture to capture changes unfolding within\n\ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships\n\nbetween summary brain metrics were evident over the gestational\n\nperiod as follows: total brain volume, GMV and CT were positively asso -", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "**2257**\n\noutstanding questions. This study and corresponding open-access\n\ndataset offer neuroscientists a detailed map of the human brain across\n\ngestation, a resource for which a wide range of previously unattainable\n\nneurobiological questions can now be explored.\n\nOur findings from this precision imaging study show that preg-\n\nnancy is characterized by reductions in GMV, cortical thinning and\n\nenhanced white matter microstructural integrity that unfold week by\n\nweek. These changes were also tied to the significant rise in steroid hor-\n\nmone concentrations over pregnancy. Some of these changes persist\n\nat 2 years postpartum (for example, global reductions in GMV and CT),\n\nwhile others, including markers of white matter integrity, appear to be\n\ntransient. Ventricular expansion and contraction parallel these cortical\n\nchanges. These widespread patterns, and the notable increase in CSF\n\nvolume across gestation, could reflect increased water retention and\n\nsubsequent compression of cortical tissue. However, the persistence\n\nof these changes at 2 years postpartum and regional variation in GMV,\n\nCT and QA, hint at cellular underpinnings, such as alterations in glia\n\nor neuron number, synaptic density and myelination (for review on\n\nthe latter, see ref. 4 ). Future studies of the relationship between fluid\n\ndynamics and volumetric changes will help clarify the factors that drive\n\nglobal neural changes during pregnancy; such insights will have broad\n\nimplications for maternal health (for example, neurological effects tied\n\nto pre-eclampsia or edema).\n\nCritically, dynamic neural changes occurred within the pregnancy\n\nwindow itself, a nuance not captured by studies limited to comparisons\n\nbetween prepregnancy and postpregnancy. For example, we observed\n\nlarge increases in white matter microstructural integrity (QA) through-\n\nout the first and second trimesters of pregnancy, but these measures\n\nfully returned to baseline values by the first postpartum scan. This\n\npattern may explain why previous studies report no pregnancy-related\n\ndifferences in white matter tractography <sup>14</sup> . Other measures, such as\n\nGMV and CT, decreased throughout gestation and displayed only a\n\nmodest rebound postpartum. These nonlinear patterns suggest that\n\nonly quantifying prepregnancy and postpartum brain structure may\n\nWhole-brain subcortical volumes\n\nGestation + postpartum Gestation\n\nWeek Stage\n\nAvg GMV (mm 3\n\n)\n\n0 10 20 30 Pre 1st 2nd 3rd Post\n\n4,000\n\n3,900\n\n3,800\n\n3,700\n\n3,600\n\n3,500\n\n4,000\n\n3,800\n\n3,600\n\nRight ventral diencephalon\n\nBrain stem\n\n**a**\n\nCA1\n\nWeek\n\n0 10 20 30\n\nStage\n\n1,900\n\n1,800\n\n1,700\n\n1,900\n\n1,800\n\n1,700 Avg GMV (mm\n\n3\n\n)\n\nGestation + postpartum Gestation\n\nPHC CA2/CA3\n\nMedial temporal lobe subregion volumes **b**\n\nGestation + postpartum\n\nWeek Stage\n\n200\n\n180\n\n160\n\n200\n\n180\n\n160 Avg GMV (mm\n\n3 )\n\nGestation Gestation + postpartum\n\nWeek\n\n0 10 20 30\n\nStage\n\nPre Post\n\n540\n\n500\n\n460\n\n540\n\n500\n\n460\n\nAvg GMV (mm\n\n3\n\n)\n\n*R* *<sup>2</sup>* adj <sup>= 0.36,</sup> *<sup>q</sup>* <sup>= 0.031</sup> *R* *<sup>2</sup>* adj <sup>= 0.41,</sup> *<sup>q</sup>* <sup>= 0.027</sup> *R* *<sup>2</sup>* adj <sup>= 0.58,</sup> *<sup>q</sup>* <sup>= 0.001</sup>\n\nGestation\n\nVentral DC\n\n*T* stat\n\nHippocampus\n\nPutamen\n\nThalamus\n\nCaudate\n\nLateral ventricle\n\n- 6\n\n2\n\nPre 1st 2nd 3rd Post Pre Post 0 10 20 30 1st 2nd 3rd 1st 2nd 3rd\n\n### **Fig. 3 | Subcortical GMV changed throughout gestation. a** , Multivariate\n\nregression analyses revealed largely negative relationships between gestation\n\nweek and subcortical GMV regions over pregnancy, including bilateral thalamus,\n\ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus,\n\nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral\n\nventricles displayed the only positive relationships with gestation week\n\n(also depicted in Fig. 1d ). The whole-brain subcortical GMV estimates shown\n\nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR-", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed4.pdf" - }, - { - "text": "**2258**\n\noverlook the full range of changes that unfold within the gestational\n\nwindow, and underrepresent the brain’s metamorphosis during preg-\n\nnancy. Furthermore, although observed changes were largely global,\n\nsome regions displayed notable stability (for example, extrastriate cor-\n\ntex). The subcortical region that displayed the strongest relationship\n\nwith gestation week was the ventral diencephalon, which encompasses\n\nthe hypothalamus and subsequent medial preoptic area and paraven-\n\ntricular nucleus—structures critical for inducing maternal behavior <sup>12</sup> <sup>,</sup> <sup>16</sup> .\n\nThe hippocampus exhibited a reduction in volume across gestation,\n\nand with higher spatial resolution, this reduction was revealed to be\n\ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other\n\nhippocampal subfields remained stable. Adjacent PHC within the\n\nMTL also exhibited volume reduction across gestation. While our hip-\n\npocampal findings are consistent with pre/post studies of pregnancy <sup>13</sup> ,\n\nthe precision lens applied within gestation revealed the nonlinear\n\nnature of this reduction. Recapitulating and clarifying these region-\n\nally specific patterns of volume change throughout the MTL merits\n\nfurther investigation.\n\nSimilar precision imaging studies have captured dynamic brain\n\nreorganization across other neuroendocrine transitions, such as the\n\nmenstrual cycle (see review in ref. 28 ), underscoring the powerful\n\nrole steroid hormones have in shaping the mammalian brain <sup>29</sup> . Endo-\n\ncrine changes across pregnancy dwarf those that occur across the\n\nmenstrual cycle, which highlights the critical need to map the brain’s\n\nresponse to this unique hormonal state. Broad physiological changes\n\noccur in tandem with the rise in steroid hormones, including changes\n\nin body mass composition, water retention, immune function and\n\nsleep patterns <sup>11</sup> . These factors could have a role in the brain changes\n\nobserved here, with some driving neurobiological changes and others,\n\nlike water retention, potentially affecting MRI-based measurements.\n\nNote that, although cortical reductions in GMV over gestation were\n\nstable across analyses, accounting for QC measures influenced the\n\nmagnitude and location of these results. These metrics all fell within\n\nthe standard range, but there may be meaningful reductions in signal\n\nthat accompany volumetric reductions (for example, increased CSF\n\nand decreased GM)—a methodological nuance that goes beyond the\n\nscope of this resource study. Ultimately, identifying the shared and\n\nunique contributions of these factors to the neuroanatomical changes\n\nthat unfold across gestation warrants further investigation. Deeply\n\nphenotyping a large and diverse cohort of women across pregnancy will\n\nopen up new avenues of exploration, for example, allowing research-\n\ners to link blood-based proteomic signatures to pregnancy outcomes;\n\ndeploying wearable devices to monitor changes in sleep, cognition and\n\nmood; and probing the broader social and environmental determinants\n\nof maternal health <sup>27</sup> .\n\nThe neuroanatomical changes that unfold during matrescence\n\nmay have broad implications for understanding individual differences\n\nin parental behavior <sup>13</sup> <sup>,</sup> <sup>24</sup> <sup>,</sup> <sup>30</sup> <sup>,</sup> <sup>31</sup> , vulnerability to mental health disorders <sup>32</sup> <sup>,</sup> <sup>33</sup>\n\nand patterns of brain aging <sup>18</sup> <sup>,</sup> <sup>19</sup> <sup>,</sup> <sup>34</sup> <sup>-</sup> <sup>36</sup> . Decreases in GMV may reflect\n\n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara-\n\ntion for parenthood <sup>26</sup> . For example, in rodents, steroid hormones\n\npromote parental behavior by remodeling specific neural circuits in the\n\nmedial preoptic area of the hypothalamus. These behavioral adapta-\n\ntions are critical to the dam’s ability to meet the demands of caring for\n\n**a b**", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" - }, - { - "text": "*Modeling and controlling the body in maladaptive ways* 5\n\nFigure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive)\n\nsensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with\n\ntemporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding ( Rao and\n\nBallard 1999 , Friston 2005 ), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are\n\nreciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally,\n\nthe pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on\n\nunits encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in\n\ncortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need\n\nto map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower\n\nand intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for\n\nexteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks that process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al.\n\n(2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their\n\nputative neuronal underpinnings. See online article for colored version of this figure.\n\nare reciprocally linked through top-down connections that convey\n\npredictions (black edges) and bottom-up connections that convey\n\nprediction errors (red edges), within and across levels. This predic-\n\ntive coding architecture permits inferring (in the Bayesian sense)\n\nthe most likely causes of sensations, across multiple modalities\n\nand multiple hierarchical levels, by minimizing prediction errors\n\nat all levels. The rationale is that predictions at all levels are con-\n\ntinuously adjusted (and synaptic weights adjusted at a slower time\n\nscale) until they match with incoming multimodal stimuli suf-\n\nficiently well, and, consequently, the prediction errors across all\n\nlevels are minimized. This process entails that even if a predictive\n\ncoding agent starts with an incorrect prediction (e.g. about what\n\nobject it is looking at) the prediction errors that measure a discrep-\n\nancy between the predicted sensations and the actual sensations can help revise the initial predictions. See Parr et al. (2022) for a\n\nmore detailed explanation of how to interpret these schematics.\n\nAnother critical aspect of Fig. 1 is that it illustrates two path-\n\nways in which prediction errors at the proprioceptive and inte-\n\nroceptive levels are used to steer physical actions (reflex arcs)\n\nand autonomic actions (autonomic reflexes). Endowing predictive\n\ncoding with these reflexes—hence realizing an “active inference”\n\narchitecture—permits minimizing prediction errors by changing\n\nthe state of the world (by physically acting) or the internal milieu\n\n(by engaging in autonomic actions) rather than only by changing\n\npredictions, as described later. Equipped with a generative model like the one shown in Fig. 1 ,\n\nan active inference agent can continuously infer (and act upon)\n\nthe state of the world and of the body, including the internal", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed1.pdf" - }, - { - "text": "**2254**\n\nassociated brain networks appear to decrease in volume at a faster\n\nrate than the rest of the brain throughout pregnancy, as determined\n\nby a subsequent analysis controlling for total GMV (Supplementary\n\nTables 1 and 2). GMV reductions were also significantly correlated with\n\nthe participant’s estradiol and progesterone concentrations (Supple-\n\nmentary Table 1). A highly similar pattern of results was observed when\n\nexamining pregnancy-related CT changes (Supplementary Fig. 3 and\n\nSupplementary Tables 4 and 5). Significant reductions in cortical GMV\n\nover gestation remained after controlling for standard quality control\n\n(QC) metrics, albeit with some influence on the magnitude and location\n\nof the observed effects (Supplementary Figs. 4 and 5).\n\nIn contrast, GMV within regions of the default mode (subnetwork\n\nC), limbic (subnetworks A and B) and visual peripheral networks buck\n\nthe global trend by slightly increasing (for example, temporal poles),\n\nremaining constant (for example, orbitofrontal cortex) or reducing at\n\na much slower rate (for example, extrastriate cortex) than total GMV\n\n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these\n\nregions exhibit similar patterns (Supplementary Fig. 3 and Supple-\n\nmentary Tables 4 and 5).\n\n#### **Subcortical GMV changes tied to gestation**\n\nConsistent with the broader cortical reductions in GMV, several subcor-\n\ntical regions significantly reduced in volume across gestation (Fig. 3a ,\n\nleft). This included bilateral ventral diencephalon (right hemisphere\n\nvalues shown in Fig. 3a , right; encompasses hypothalamus, substantia\n\nnigra, mammillary body, lateral geniculate nucleus and red nucleus\n\namong others <sup>22</sup> ), caudate, hippocampus and thalamus, along with left\n\nputamen and brain stem (Supplementary Table 6, *q* < 0.05).\n\nNext, high-resolution segmentation of the MTL allowed us to\n\ninterrogate subcortical structures at a finer resolution, revealing non-\n\nlinear volumetric decreases in CA1 ( *F* (2,15) = 5.84, *q* = 0.031, *R* <sup>2</sup> adj <sup>= 0.36;</sup>\n\nFig. 3b , left) and CA2/CA3 ( *F* (2,15) = 6.82, *q* = 0.027, *R* <sup>2</sup> adj <sup>= 0.41; Fig.</sup> <sup>3b</sup> <sup>,</sup>\n\nmiddle) across gestation. PHC exhibited linear volumetric decreases\n\nacross gestation ( *F* (1,16) = 24.87, *q* < 0.001, *R* <sup>2</sup> adj <sup>= 0.58; Fig.</sup> <sup>3b</sup> <sup>, right)</sup>\n\nwhich was also tied to estradiol ( *F* (1,12) = 20.21, *q* = 0.005, *R* <sup>2</sup> adj <sup>= 0.60).</sup>\n\nAll three relationships remained significant after proportional correc-\n\ntion for total GMV. There was no significant change in other subregions\n\nor total volume of the hippocampal body, or in the parahippocampal\n\ngyrus (Supplementary Table 7 and Supplementary Fig. 8).\n\n#### **White matter microstructure changes tied to gestation**\n\nIn contrast to decreasing global GMV, correlational tractography of\n\nwhite matter, which tests for linear trends in the data, revealed increas-\n\ning microstructural integrity across the whole brain during gestation\n\n(Fig. 4a ), concomitant with the rise in 17β-estradiol and progesterone\n\n(all *q* < 0.001; Supplementary Fig. 9). Tracts displaying robust corre-\n\nlations with gestational week included the corpus callosum, arcuate\n\nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal\n\nfasciculus (Fig. 4b ), as well as the cingulum bundle, middle and superior\n\nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon-\n\ntine tracts (see Supplementary Table 9 for complete list).\n\n#### **Comparing brain changes across pregnancy against controls**\n\nWe then compared the changes in GMV across gestation to that of typi-\n\ncal variability over time, derived from eight densely-sampled controls <sup>23</sup> .\n\nThe GMV changes we see across pregnancy far exceed normative brain\n\nvariability (Supplementary Fig. 11). On average, change in cortical GMV", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "**2259**\n\nthe offspring <sup>12</sup> . Human studies have revealed GMV reductions in areas\n\nof the brain important for social cognition and the magnitude of these\n\nchanges corresponds with increased parental attachment <sup>13</sup> . Deeper\n\nexamination of cellular and systems-level mechanisms will improve\n\nour understanding of how pregnancy remodels specific circuits to\n\npromote maternal behavior.\n\nAlthough studied to a lesser degree, ties between maternal\n\nbehavior and white matter microstructure (particularly connectiv-\n\nity between temporal and occipital lobes) have been noted <sup>31</sup> . Here we\n\nreveal pronounced GMV changes in regions within sensory, attention\n\nand default mode networks over the gestational window. In paral-\n\nlel, we observed increased anisotropy in white matter tracts that\n\nfacilitate communication between emotional and visual processing\n\nhubs <sup>37</sup> <sup>-</sup> <sup>39</sup> , including the inferior longitudinal fasciculus and inferior\n\nfronto-occipital fasciculus. Pinpointing the synchrony of gray and\n\nwhite matter changes that unfold in the maternal brain could be\n\nkey to understanding the behavioral adaptions that emerge during\n\nand after pregnancy, such as honing the brain��s visual and auditory\n\nresponses to infant cues and eliciting maternal behavior. Research\n\ninto other major transition periods supports this idea. For instance,\n\nadolescence is a dynamic period characterized by region-specific,\n\nnonlinear decreases in GMV and increases in WMV, maturational\n\nbrain changes that are tied to gains in executive function and social\n\ncognition <sup>40</sup> . For both adolescence <sup>41</sup> and matrescence, the consider-\n\nable rise in steroid hormone production appears to remodel the brain\n\n(see ref. 25 for comparative analysis), promoting a suite of behaviors\n\nadaptive to that life stage. How specific neural changes give rise to\n\nspecific behavioral adaptations has yet to be fully explored with\n\nrespect to human pregnancy.\n\nThis precision imaging study mapped neuroanatomical changes\n\nacross pregnancy in a single individual, precluding our ability to gen-\n\neralize to the broader population. To benchmark our findings, we com-\n\npared the magnitude of GMV changes observed throughout pregnancy\n\nagainst data from nonpregnant individuals sampled over a similar time\n\ncourse. Doing so provided compelling evidence that pregnancy-related\n\nneuroanatomical shifts far exceed normative day-to-day brain variabil-\n\nity and measurement error. Evidence suggests that white matter micro-\n\nstructure remains fairly stable over a six-month period <sup>42</sup> , but more\n\nstudies are needed to compare the degree of white matter changes\n\nobserved during pregnancy to normative change over time. Further,\n\nsampling larger cohorts of women will generate much-needed norma-\n\ntive models of brain change (akin to ref. 43 ) throughout pregnancy to\n\nestablish what constitutes a typical degree of neuroanatomical change\n\nexpected during gestation and postpartum recovery.\n\nThese findings provide a critical rationale for conducting further\n\nprecision imaging studies of pregnancy in demographically enriched\n\ncohorts to determine the universality and idiosyncrasy of these adap-\n\ntations and their role in maternal health. Are the changes observed in\n\nour participant reflective of the broader population? Do deviations\n\nfrom the norm lead to maladaptive outcomes? A precision imaging\n\napproach can help determine whether the pace of pregnancy-induced\n\nneuroanatomical changes drives divergent brain health outcomes in\n\nwomen, as may be the case during other rapid periods of brain devel-\n\nopment <sup>44</sup> . One in five women experiences perinatal depression <sup>45</sup> and\n\nwhile the first FDA-approved treatment is now available <sup>46</sup> , early detec-\n\ntion remains elusive. Precision imaging studies could offer clues about\n\nan individual’s risk for or resilience to depression before symptom", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" - }, - { - "text": "results provided in Supplementary Tables 1- 5. Percent change at the\n\nnetwork level was computed by subtracting the final pregnancy value\n\n(36 weeks pregnant) from the first prepregnancy baseline value, then\n\ndividing that difference by said first prepregnancy baseline value. All\n\nanalyses underwent multiple comparisons testing (false discovery rate\n\n(FDR)-corrected at *q* < 0.05).\n\n*Subcortical GMV* . A similar statistical approach was taken for subcorti-\n\ncal volume estimates. We ran a multivariate regression analysis predict-\n\ning GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by\n\ngestation week (FDR-corrected at *q* < 0.05).\n\nTo evaluate the relationship between gestation week and MTL\n\nsubregion volume over pregnancy ( *n* = 7 bilateral subregions and\n\n*n* = 18 MTL scans), we used a combination of linear and nonlinear\n\nmodels based on individual subregion data patterns. Models were\n\ncompared for best fit with each subregion via AIC from the GLM output\n\n(as described in ‘Summary brain metrics’). A linear regression model\n\nwas most appropriate for PHC (AIC diff < 3), whereas a quadratic model\n\nperformed best for CA1 and CA2/CA3. As a control, we repeated the\n\nanalyses with MTL subregion volumes after proportional volume cor-\n\nrection of total GMV calculated by ASHS. Finally, we evaluated the\n\nrelationship between endogenous sex hormones (estrogen and proges-\n\nterone) and subregion volumes using linear regression. Relationships\n\nwere considered significant only if they met FDR correction at *q* < 0.05.\n\n*White matter microstructure* . DSI Studio’s correlational tractography <sup>74</sup>\n\nwas used to analyze the relationship between white matter structure\n\nand gestational week ( *n* = 16). A truncated model was run to examine the\n\nrelationship between white matter and sex steroid hormones ( *n* = 14)\n\nfor the subset of diffusion scans with paired endocrine data during ges-\n\ntation. A nonparametric Spearman’s correlation was used to derive the\n\ncorrelation between gestational week and endocrine factors and our\n\nmetrics of interest (QA and MD; see Supplementary Table 9 and Sup-\n\nplementary Fig. 10 for MD results) because the data were not normally\n\ndistributed. Statistical inference was reached using connectometry,\n\na permutation-based approach that tests the strength of coherent\n\nassociations found between the local connectome and our variables\n\nof interest. It provides higher reliability and replicability by correcting\n\nfor multiple comparisons. This technique provides a high-resolution\n\ncharacterization of local axonal orientation. The correlational trac-\n\ntography was run with the following parameters: *t* score threshold of\n\n2.5, four pruning iterations and a length threshold of 25 voxel distance.\n\nTo estimate the FDR, a total of 4,000 randomized permutations were\n\napplied to obtain the null distribution of the track length. Reported\n\nregions were selected based on FDR cutoff (FDR < 0.2, suggested by\n\nDSI Studio), and contained at least ten tracts. For visualization of global\n\nand tract QA at each gestational stage, mean QA values were extracted\n\nusing DSI Studio’s whole-brain fiber tracking algorithm and ROI-based\n\ntracking using the default HCP842 atlas <sup>78</sup> .\n\n*Day2Day dataset: measurement variability* . To establish a marker of\n\nnormative variability over half a year, we computed metrics of meas-\n\nurement variability using the Day2Day dataset <sup>23</sup> , which provided both\n\nwhole-brain T1 and high-resolution T2 MTL scans. For each region, *j* , of\n\nthe Schaefer parcellation, we assessed across-session variability, *ε* , as\n\nε *j* = 100 × mean ( || *t* *s* −̂ *t* ||\n\n̂ *t* )\n\nWhere *t* *s* is the morphometric measurement of a parcel for session *s*\n\nand <sup>̂</sup> *t* is the mean of *t* across sessions <sup>55</sup> <sup>,</sup> <sup>79</sup> . Thus, we defined variability\n\nas the mean absolute percent difference between each individual and", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed4.pdf" - }, - { - "text": "it was correctly specified with regards 6o 1) the choice of basis dimension (k) and 2) the distribution of the model residuals\n\n(see mgcv documentation; Wood, 2017). The general pattern of results held after toggling model parameters; however, we\n\nnote the risk of overinterpreting complex models with small sample sizes (see Sullivan et al., 2015). To address overfitting and\n\ncross-validate our basis type selection, we also fit the data using nonpenalized general linear models (GLM) with both linear\n\nand polynomial terms for gestation week. We compared the performance of each GLM (i.e., models using only a linear term\n\nvs. models with polynomial terms) via the Akaike information criterion (AIC), which revealed that cubic models consistently\n\noutperformed both linear and quadratic models (AICdiff > 3), providing additional evidence for non-linear changes in\n\nstructural brain variables over time.\n\nGray Matter Volume & Cortical Thickness:\n\nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy\n\nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a\n\nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were\n\nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non-\n\ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We\n\nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week\n\n(FDR-corrected at q < 0.05).\n\nT2-weighted MTL scans:\n\nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n =\n\n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual\n\nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" - }, - { - "text": "5\n\nnature portfolio | reporting summary\n\nApril 2023\n\nabove). A linear regression model was most appropriate for PHC (AICdiff < 3), whereas a quadratic model performed best for\n\nCA1 and CA2/3. As a control, we repeated the analyses with MTL subregion volumes after proportional volume correction of\n\ntotal gray matter volume calculated by ASHS. Finally, we evaluated the relationship between endogenous sex hormones\n\n(estrogen and progesterone) and subregion volumes using linear regression. Relationships were considered significant only if\n\nthey met FDR correction at q < .05.\n\nDiffusion imaging:\n\nDSI Studio’s correlational tractography (Yeh et al., 2016) was used to analyze the relationship between white matter\n\nstructure and gestational week (n = 16). A truncated model was run to examine the relationship between white matter and\n\nsex steroid hormones (n = 14) for the subset of diffusion scans with paired endocrine data during gestation. A non-parametric\n\nSpearman correlation was used to derive the correlation between gestational week and endocrine factors and our metrics of\n\ninterest (QA and MD; see Table S9 and Fig. S10 for MD results) because the data were not normally distributed. Statistical\n\ninference was reached using connectometry, a permutation-based approach that tests the strength of coherent associations\n\nfound between the local connectome and our variables of interest. It provides higher reliability and replicability by correcting\n\nfor multiple comparisons. This technique provides a high-resolution characterization of local axonal orientation. The\n\ncorrelational tractography was run with the following parameters: T-score threshold of 2.5, 4 pruning iterations, and a length\n\nthreshold of 25 voxel distance. To estimate the false discovery rate (FDR), a total of 4000 randomized permutations were\n\napplied to obtain the null distribution of the track length. Reported regions were selected based on FDR cutoff (FDR < 0.2,\n\nsuggested by DSI Studio), and contained at least 10 tracts. For visualization of global and tract QA at each gestational stage,\n\nmean QA values were extracted using DSI Studio’s whole brain fiber tracking algorithm and ROI-based tracking using the\n\ndefault HCP842 atlas (Yeh et al., 2013).\n\nEffect(s) tested Predicting global, network, and regional volumetric change (GMV, CT, MTL subregion, microstructure) by pregnancy-related\n\nindicators (gestation week, estrogen, progesterone).\n\nSpecify type of analysis: Whole brain ROI-based Both\n\nAnatomical location(s)\n\nGlobal measures of gray matter volume, cortical thickness, and cerebrospinal fluid were computed by\n\nANTs and validated with FreeSurfer. A whole-brain probabilistic atlas (e.g., Schaefer 400-region\n\nparcellation) was used for ROI analysis of cortical thickness and volume and the Yeo/Schaefer 17-network\n\nscheme was used for network-level analyses. The 'aseg' segmentation was used for ROI analysis of\n\nsubcortical gray matter volume. The Princeton Young Adult 3T ASHS Atlas Template was used to examine\n\nvolume among 7 MTL subfields: CA1, CA 2/3, dentate gyrus, subiculum, entorhinal cortex, perirhinal\n\ncortex, and the parahippocampal gyrus. Whole-brain white matter structure was assessed for the\n\ndiffusion imaging analysis, wherein every tract and bundle was evaluated.\n\nStatistic type for inference\n\n(See Eklund et al. 2016 )\n\nN/A; s and diffusion MRI only.\n\nCorrection FDR-correction\n\nModels & analysis\n\nn/a Involved in the study\n\nFunctional and/or effective connectivity\n\nGraph analysis\n\nMultivariate modeling or predictive analysis\n\nMultivariate modeling and predictive analysis Multivariate regression analyses was used to explore brain structure in relation to gestation. Regional,\n\nnetwork, and summary brain measures (dependent variables) were examined in relation to gestation week\n\n(independent variable). In follow-up statistical analyses (noted in Methods), various quality control metrics", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed4.pdf", - "query": "What may reflect the decrease in GMV during pregnancy?", - "target_page": 6, - "target_passage": " Decreases in GMV may reflect ‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- tion for parenthood", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "**2256**\n\n*T* stat\n\nInferior parietal Control network B\n\n4\n\n- 14\n\n**a** Whole-brain GMV\n\nGMV ~ gestation week\n\nLat Med\n\nL\n\nR\n\nBaseline - 36 weeks\n\nGMV change by network **b**\n\nDMNC VisPeri LimbicA LimbicB DMNB DMNA SomMotB VisCent ContC TempPar DorsAttnA ContA SomMotA SalVentAttnA SalVentAttnB ContB Total DorsAttnB\n\n- 8\n\n- 5\n\n- 3\n\n0\n\n2\n\nPercent\n\n**c**\n\nPostcentral gyrus Dorsal attention network B Frontal eye fields Dorsal attention network B\n\nMedial frontal Salience ventral attention network A Insula Salience ventral attention network B\n\nPrecuneus/posterior cingulate Default mode network A\n\nAvg GMV (zero centered)\n\nRegional GMV\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\nStage\n\n2nd\n\nWeek\n\n30 20 10 0 Pre 1st 3rd Post Stage Week 30 20 10 0\n\nStage Week 30 20 10 0 Avg GMV (zero centered) 2\n\n1\n\n0\n\n- 2\n\n- 1\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\nGestation + postpartum Gestation Gestation + postpartum Gestation Gestation + postpartum Gestation\n\nGestation + postpartum Gestation Gestation + postpartum Gestation Gestation + postpartum Gestation\n\nStage Week\n\n30 20 10 0\n\nStage Week\n\n30 20 10 0\n\nStage Week\n\n30 20 10 0\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\nAvg GMV (zero centered)\n\nAvg GMV (zero centered) Avg GMV (zero centered) Avg GMV (zero centered)\n\n2nd Pre 1st 3rd Post 2nd Pre 1st 3rd Post\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\n2\n\n1\n\n0\n\n- 2\n\n- 1\n\n2nd Pre 1st 3rd Post 2nd Pre 1st 3rd Post 2nd Pre 1st 3rd Post\n\n### **Fig. 2 | Cortical GMV showed widespread change through gestation and**\n\n**postpartum. a** , Multivariate regression analyses reveal largely negative\n\nrelationships between gestation week and regional GMV, with only a minority\n\nof regions unaffected or increasing over the gestational window (baseline—36\n\nweeks). All associations presented here were corrected for multiple comparisons\n\n(FDR at *q* < 0.05; nonsignificant values set to zero for interpretability). **b** , Average\n\nnetwork change was calculated by estimating GMV percent change from baseline\n\n(initial) to 36 weeks gestation (final). Attention and control networks appear\n\nmost affected. **c** , Six representative regions, classified by major subnetworks,\n\nthat exhibit pronounced GMV change across gestation. For each panel, we\n\ndisplay a scatterplot between average GMV of the ROIs and gestation week\n\n(left; gestation sessions only, 19 scans), and summary GMV of ROIs by pregnancy\n\nstage across the whole study (right; gestation and postpartum sessions, 26 scans).\n\nShaded regions in scatterplots represent a 95% confidence interval. Each\n\nboxplot represents IQR for each stage, with a horizontal line representing the\n\nmedian value. The whiskers indicate variability outside (±1.5) of this range.\n\nOutside values are >1.5× and <3× IQR beyond either end of the box. All statistical\n\ntests were corrected for multiple comparisons (FDR at *q* < 0.05) and values\n\nwere *z* scored and transformed to have a mean of zero and s.d. of one for easier\n\ncomparison across regions. Please note that the data values shown here are raw\n\n(see Supplementary Tables 1 and 2 and Supplementary Data 1 for exhaustive list).\n\nBrain visualizations created with R package ggseg <sup>48</sup> . IQR, interquartile range;\n\nLat, lateral; Med, medial; DMN, default mode network; VisPeri, visual peripheral\n\nnetwork; SomMot, somatomotor network; VisCent, visual central network; Cont,\n\ncontrol network; TempPar, temporal parietal network; DorsAttn, dorsal attention\n\nnetwork; SalVentAttn, salience/ventral attention network.", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed4.pdf" - }, - { - "text": "**2257**\n\noutstanding questions. This study and corresponding open-access\n\ndataset offer neuroscientists a detailed map of the human brain across\n\ngestation, a resource for which a wide range of previously unattainable\n\nneurobiological questions can now be explored.\n\nOur findings from this precision imaging study show that preg-\n\nnancy is characterized by reductions in GMV, cortical thinning and\n\nenhanced white matter microstructural integrity that unfold week by\n\nweek. These changes were also tied to the significant rise in steroid hor-\n\nmone concentrations over pregnancy. Some of these changes persist\n\nat 2 years postpartum (for example, global reductions in GMV and CT),\n\nwhile others, including markers of white matter integrity, appear to be\n\ntransient. Ventricular expansion and contraction parallel these cortical\n\nchanges. These widespread patterns, and the notable increase in CSF\n\nvolume across gestation, could reflect increased water retention and\n\nsubsequent compression of cortical tissue. However, the persistence\n\nof these changes at 2 years postpartum and regional variation in GMV,\n\nCT and QA, hint at cellular underpinnings, such as alterations in glia\n\nor neuron number, synaptic density and myelination (for review on\n\nthe latter, see ref. 4 ). Future studies of the relationship between fluid\n\ndynamics and volumetric changes will help clarify the factors that drive\n\nglobal neural changes during pregnancy; such insights will have broad\n\nimplications for maternal health (for example, neurological effects tied\n\nto pre-eclampsia or edema).\n\nCritically, dynamic neural changes occurred within the pregnancy\n\nwindow itself, a nuance not captured by studies limited to comparisons\n\nbetween prepregnancy and postpregnancy. For example, we observed\n\nlarge increases in white matter microstructural integrity (QA) through-\n\nout the first and second trimesters of pregnancy, but these measures\n\nfully returned to baseline values by the first postpartum scan. This\n\npattern may explain why previous studies report no pregnancy-related\n\ndifferences in white matter tractography <sup>14</sup> . Other measures, such as\n\nGMV and CT, decreased throughout gestation and displayed only a\n\nmodest rebound postpartum. These nonlinear patterns suggest that\n\nonly quantifying prepregnancy and postpartum brain structure may\n\nWhole-brain subcortical volumes\n\nGestation + postpartum Gestation\n\nWeek Stage\n\nAvg GMV (mm 3\n\n)\n\n0 10 20 30 Pre 1st 2nd 3rd Post\n\n4,000\n\n3,900\n\n3,800\n\n3,700\n\n3,600\n\n3,500\n\n4,000\n\n3,800\n\n3,600\n\nRight ventral diencephalon\n\nBrain stem\n\n**a**\n\nCA1\n\nWeek\n\n0 10 20 30\n\nStage\n\n1,900\n\n1,800\n\n1,700\n\n1,900\n\n1,800\n\n1,700 Avg GMV (mm\n\n3\n\n)\n\nGestation + postpartum Gestation\n\nPHC CA2/CA3\n\nMedial temporal lobe subregion volumes **b**\n\nGestation + postpartum\n\nWeek Stage\n\n200\n\n180\n\n160\n\n200\n\n180\n\n160 Avg GMV (mm\n\n3 )\n\nGestation Gestation + postpartum\n\nWeek\n\n0 10 20 30\n\nStage\n\nPre Post\n\n540\n\n500\n\n460\n\n540\n\n500\n\n460\n\nAvg GMV (mm\n\n3\n\n)\n\n*R* *<sup>2</sup>* adj <sup>= 0.36,</sup> *<sup>q</sup>* <sup>= 0.031</sup> *R* *<sup>2</sup>* adj <sup>= 0.41,</sup> *<sup>q</sup>* <sup>= 0.027</sup> *R* *<sup>2</sup>* adj <sup>= 0.58,</sup> *<sup>q</sup>* <sup>= 0.001</sup>\n\nGestation\n\nVentral DC\n\n*T* stat\n\nHippocampus\n\nPutamen\n\nThalamus\n\nCaudate\n\nLateral ventricle\n\n- 6\n\n2\n\nPre 1st 2nd 3rd Post Pre Post 0 10 20 30 1st 2nd 3rd 1st 2nd 3rd\n\n### **Fig. 3 | Subcortical GMV changed throughout gestation. a** , Multivariate\n\nregression analyses revealed largely negative relationships between gestation\n\nweek and subcortical GMV regions over pregnancy, including bilateral thalamus,\n\ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus,\n\nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral\n\nventricles displayed the only positive relationships with gestation week\n\n(also depicted in Fig. 1d ). The whole-brain subcortical GMV estimates shown\n\nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR-", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed4.pdf" - }, - { - "text": "it was correctly specified with regards 6o 1) the choice of basis dimension (k) and 2) the distribution of the model residuals\n\n(see mgcv documentation; Wood, 2017). The general pattern of results held after toggling model parameters; however, we\n\nnote the risk of overinterpreting complex models with small sample sizes (see Sullivan et al., 2015). To address overfitting and\n\ncross-validate our basis type selection, we also fit the data using nonpenalized general linear models (GLM) with both linear\n\nand polynomial terms for gestation week. We compared the performance of each GLM (i.e., models using only a linear term\n\nvs. models with polynomial terms) via the Akaike information criterion (AIC), which revealed that cubic models consistently\n\noutperformed both linear and quadratic models (AICdiff > 3), providing additional evidence for non-linear changes in\n\nstructural brain variables over time.\n\nGray Matter Volume & Cortical Thickness:\n\nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy\n\nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a\n\nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were\n\nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non-\n\ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We\n\nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week\n\n(FDR-corrected at q < 0.05).\n\nT2-weighted MTL scans:\n\nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n =\n\n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual\n\nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" - }, - { - "text": "Chapter 11. Advanced Copy Services\n\n� Step 2:\n\na. When an MM/GM relationship is started in the ConsistentStopped state, the MM/GM\n\nrelationship enters the ConsistentSynchronized state. Therefore, no updates (write\n\nI/O) were performed on the master volume while in the ConsistentStopped state.\n\nOtherwise, the **-force** option must be specified, and the MM/GM relationship then\n\nenters the InconsistentCopying state while the background copy is started.\n\nb. When an MM/GM relationship is started in the InconsistentStopped state, the MM/GM\n\nrelationship enters the InconsistentCopying state while the background copy is\n\nstarted.\n\n� Step 3:\n\nWhen the background copy completes, the MM/GM relationship changes from the\n\nInconsistentCopying state to the ConsistentSynchronized state.\n\n� Step 4:\n\na. When a MM/GM relationship is stopped in the ConsistentSynchronized state, the\n\nMM/GM relationship enters the Idling state when you specify the **-access** option,\n\nwhich enables write I/O on the auxiliary volume.\n\nb. When an MM/GM relationship is stopped in the ConsistentSynchronized state without\n\nan **-access** parameter, the auxiliary volumes remain read-only and the state of the\n\nrelationship changes to ConsistentStopped .\n\nc. To enable write I/O on the auxiliary volume, when the MM/GM relationship is in the\n\nConsistentStopped state, issue the **svctask stoprcrelationship** command, which\n\nspecifies the **-access** option, and the MM/GM relationship enters the Idling state.\n\n� Step 5:\n\na. When an MM/GM relationship is started from the Idling state, you must specify the\n\n**-primary** argument to set the copy direction. If no write I/O was performed (to the\n\nmaster or auxiliary volume) while in the Idling state, the MM/GM relationship enters\n\nthe ConsistentSynchronized state.\n\nb. If write I/O was performed to the master or auxiliary volume, the **-force** option must be\n\nspecified and the MM/GM relationship then enters the InconsistentCopying state\n\nwhile the background copy is started. The background process copies only the data\n\nthat changed on the primary volume while the relationship was stopped.\n\n**Stop on Error**\n\nWhen a MM/GM relationship is stopped (intentionally, or because of an error), the state\n\nchanges. For example, the MM/GM relationships in the ConsistentSynchronized state enter\n\nthe ConsistentStopped state, and the MM/GM relationships in the InconsistentCopying state\n\nenter the InconsistentStopped state.\n\nIf the connection is broken between the two systems that are in a partnership, all (intercluster)\n\nMM/GM relationships enter a Disconnected state. For more information, see “Connected\n\nversus disconnected” on page 536.\n\n**State overview**\n\nThe following sections provide an overview of the various MM/GM states.\n\n**Common states:** Stand-alone relationships and Consistency Groups share a common\n\nconfiguration and state model. All MM/GM relationships in a Consistency Group have the\n\nsame state as the Consistency Group.", - "page_start": 556, - "page_end": 556, - "source_file": "sg247938.pdf" - }, - { - "text": "between summary brain metrics were evident over the gestational\n\nperiod as follows: total brain volume, GMV and CT were positively asso -\n\nciated with one another, whereas lateral ventricles, CSF and global QA\n\ndemonstrated negative relationships with GMV (Supplementary Fig. 1).\n\nChanges in GMV were near-ubiquitous across the cortical mantle\n\n(Fig. 2a ). Most large-scale brain networks exhibited decreases in GMV\n\n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of\n\ninterest (ROI) demonstrated negative relationships between GMV and\n\ngestation week (Fig. 2a and Supplementary Table 2). Together, these\n\nresults provide evidence of a global decrease in cortical volume across\n\npregnancy. Several sensory and attention subnetworks were particu-\n\nlarly sensitive to gestation, including the control (subnetwork B), sali-\n\nence/ventral attention (subnetwork A), dorsal attention (subnetwork\n\nB), default (subnetwork A) and somatomotor (subnetworks A and B)\n\nnetworks (Supplementary Table 1). Regions driving these network-level\n\nchanges include the bilateral inferior parietal lobe, postcentral gyri,\n\ninsulae, prefrontal cortex, posterior cingulate and somatosensory\n\ncortex (Fig. 2c , Supplementary Table 2 and validation of findings using\n\nalternate pipeline in Supplementary Tables 1 and 3). These regions and", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "#### **11.6.23 Remote Copy states and events**\n\nThis section describes the various states of a MM/GM relationship and the conditions that\n\ncause them to change. In Figure 11-94, the MM/GM relationship diagram shows an overview\n\nof the status that can apply to a MM/GM relationship in a connected state.\n\n*Figure 11-94 Metro Mirror or Global Mirror mapping state diagram*\n\nWhen the MM/GM relationship is created, you can specify whether the auxiliary volume is\n\nalready in sync with the master volume, and the background copy process is then skipped.\n\nThis capability is useful when MM/GM relationships are established for volumes that were\n\ncreated with the format option.\n\nThe following step identifiers are shown in Figure 11-94:\n\n� Step 1:\n\na. The MM/GM relationship is created with the **-sync** option, and the MM/GM relationship\n\nenters the ConsistentStopped state.\n\nb. The MM/GM relationship is created without specifying that the master and auxiliary\n\nvolumes are in sync, and the MM/GM relationship enters the InconsistentStopped\n\nstate.\n\n| Parameter | Value |\n|:---|:---|\n| Total Volume size per I/O Group | There is a per I/O Group limit of 1024 terabytes (TB) on the quantity of master and auxiliary volume address spaces that can participate in Metro Mirror and Global Mirror relationships. This maximum configuration uses all 512 MiB of bitmap space for the I/O Group and allows 10 MiB of space for all remaining copy services features. |", - "page_start": 555, - "page_end": 555, - "source_file": "sg247938.pdf" - }, - { - "text": "**2254**\n\nassociated brain networks appear to decrease in volume at a faster\n\nrate than the rest of the brain throughout pregnancy, as determined\n\nby a subsequent analysis controlling for total GMV (Supplementary\n\nTables 1 and 2). GMV reductions were also significantly correlated with\n\nthe participant’s estradiol and progesterone concentrations (Supple-\n\nmentary Table 1). A highly similar pattern of results was observed when\n\nexamining pregnancy-related CT changes (Supplementary Fig. 3 and\n\nSupplementary Tables 4 and 5). Significant reductions in cortical GMV\n\nover gestation remained after controlling for standard quality control\n\n(QC) metrics, albeit with some influence on the magnitude and location\n\nof the observed effects (Supplementary Figs. 4 and 5).\n\nIn contrast, GMV within regions of the default mode (subnetwork\n\nC), limbic (subnetworks A and B) and visual peripheral networks buck\n\nthe global trend by slightly increasing (for example, temporal poles),\n\nremaining constant (for example, orbitofrontal cortex) or reducing at\n\na much slower rate (for example, extrastriate cortex) than total GMV\n\n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these\n\nregions exhibit similar patterns (Supplementary Fig. 3 and Supple-\n\nmentary Tables 4 and 5).\n\n#### **Subcortical GMV changes tied to gestation**\n\nConsistent with the broader cortical reductions in GMV, several subcor-\n\ntical regions significantly reduced in volume across gestation (Fig. 3a ,\n\nleft). This included bilateral ventral diencephalon (right hemisphere\n\nvalues shown in Fig. 3a , right; encompasses hypothalamus, substantia\n\nnigra, mammillary body, lateral geniculate nucleus and red nucleus\n\namong others <sup>22</sup> ), caudate, hippocampus and thalamus, along with left\n\nputamen and brain stem (Supplementary Table 6, *q* < 0.05).\n\nNext, high-resolution segmentation of the MTL allowed us to\n\ninterrogate subcortical structures at a finer resolution, revealing non-\n\nlinear volumetric decreases in CA1 ( *F* (2,15) = 5.84, *q* = 0.031, *R* <sup>2</sup> adj <sup>= 0.36;</sup>\n\nFig. 3b , left) and CA2/CA3 ( *F* (2,15) = 6.82, *q* = 0.027, *R* <sup>2</sup> adj <sup>= 0.41; Fig.</sup> <sup>3b</sup> <sup>,</sup>\n\nmiddle) across gestation. PHC exhibited linear volumetric decreases\n\nacross gestation ( *F* (1,16) = 24.87, *q* < 0.001, *R* <sup>2</sup> adj <sup>= 0.58; Fig.</sup> <sup>3b</sup> <sup>, right)</sup>\n\nwhich was also tied to estradiol ( *F* (1,12) = 20.21, *q* = 0.005, *R* <sup>2</sup> adj <sup>= 0.60).</sup>\n\nAll three relationships remained significant after proportional correc-\n\ntion for total GMV. There was no significant change in other subregions\n\nor total volume of the hippocampal body, or in the parahippocampal\n\ngyrus (Supplementary Table 7 and Supplementary Fig. 8).\n\n#### **White matter microstructure changes tied to gestation**\n\nIn contrast to decreasing global GMV, correlational tractography of\n\nwhite matter, which tests for linear trends in the data, revealed increas-\n\ning microstructural integrity across the whole brain during gestation\n\n(Fig. 4a ), concomitant with the rise in 17β-estradiol and progesterone\n\n(all *q* < 0.001; Supplementary Fig. 9). Tracts displaying robust corre-\n\nlations with gestational week included the corpus callosum, arcuate\n\nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal\n\nfasciculus (Fig. 4b ), as well as the cingulum bundle, middle and superior\n\nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon-\n\ntine tracts (see Supplementary Table 9 for complete list).\n\n#### **Comparing brain changes across pregnancy against controls**\n\nWe then compared the changes in GMV across gestation to that of typi-\n\ncal variability over time, derived from eight densely-sampled controls <sup>23</sup> .\n\nThe GMV changes we see across pregnancy far exceed normative brain\n\nvariability (Supplementary Fig. 11). On average, change in cortical GMV", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "The GMV changes we see across pregnancy far exceed normative brain\n\nvariability (Supplementary Fig. 11). On average, change in cortical GMV\n\nwas nearly three times higher than controls scanned over a similar\n\nduration (Supplementary Fig. 11a,b). This extends to MTL subfields,\n\nwherein change in volume was three to four times greater across gesta-\n\ntion than normative brain variability (Supplementary Fig. 11c,d). We\n\ncontextualized these findings further by comparing gestational GMV\n\nchange against our participant’s preconception brain volumes; average\n\nGMV change during pregnancy was six times (cortical) and three times\n\n(MTL) higher than the variability observed between baseline sessions.\n\nsubcortical structures, including the ventral diencephalon, caudate,\n\nthalamus, putamen and hippocampus. High-resolution imaging and\n\nsegmentation of the medial temporal lobe (MTL) extend these findings\n\nfurther, revealing specific volumetric reductions within hippocampal\n\nsubfields CA1, CA2/CA3 and parahippocampal cortex (PHC). In con-\n\ntrast to widespread decreases in cortical and subcortical GMV, cor -\n\nrelational tractography analyses revealed nonlinear increases in white\n\nmatter quantitative anisotropy (QA) throughout the brain—indicating\n\ngreater tract integrity—as gestational week progressed. Together, these\n\nfindings reveal the highly dynamic changes that unfold in a human\n\nbrain across pregnancy, demonstrating a capacity for extensive neural\n\nremodeling well into adulthood.\n\n### **Results**\n\n#### **Serological evaluations**\n\nSerological evaluations captured canonical hormone fluctuations\n\ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b ).\n\nSerum hormone concentrations increased significantly over the course\n\nof pregnancy and dropped precipitously postpartum (preconcep-\n\ntion, estradiol (E) = 3.42 pg ml <sup>−1</sup> and progesterone (P) = 0.84 ng ml <sup>−1</sup> ;\n\n3 weeks preparturition, E = 12,400 pg ml <sup>−1</sup> and P = 103 ng ml <sup>−1</sup> ; 3 months\n\npostparturition, E = 11.50 pg ml <sup>−1</sup> and P = 0.04 ng ml <sup>−1</sup> ).\n\n#### **Whole-brain dynamics from baseline through postpartum**\n\nTo begin, we characterized broad neuroanatomical changes over the\n\ncourse of the entire experimental window (baseline—2 years postpar-\n\ntum, 26 scans; Fig. 1d ). Generalized additive models revealed strong\n\nnonlinear (effective degrees of freedom > 3) relationships between\n\nweeks since conception and summary brain metrics. Total GMV\n\n( *F* = 27.87, *P* < 0.001, deviance explained = 93.9%, *R* <sup>2</sup> adj <sup>= 0.91), summary</sup>\n\nCT ( *F* = 15.79, *P* < 0.001, deviance explained = 78.6%, *R* <sup>2</sup> adj <sup>= 0.75) and</sup>\n\ntotal brain volume ( *F* = 26.12, *P* < 0.001, deviance explained = 93.4%,\n\n*R* <sup>2</sup> adj <sup>= 0.90) linearly decreased during gestation and appeared to</sup>\n\npartially rebound postpartum. In contrast, global microstructural\n\nintegrity (QA) of white matter increased throughout the first and sec-\n\nond trimesters before returning to baseline levels in the postpartum\n\nperiod (whole-brain QA, *F* = 4.62, *P* = 0.007, deviance explained = 60.2%,\n\n*R* <sup>2</sup> adj <sup>= 0.51). We also observed nonlinear patterns of lateral ventricle</sup>\n\nexpansion *(F* = 10.44, *P* < 0.001, deviance explained = 83.8%, *R* <sup>2</sup> adj <sup>= 0.77)</sup>\n\nand increased cerebrospinal fluid (CSF; *F* = 13.32, *P* < 0.001, deviance\n\nexplained = 83.8%, *R* <sup>2</sup> adj <sup>= 0.79) rising in the second and third trimesters</sup>\n\nbefore dropping sharply postpartum.\n\n#### **Cortical volume and thickness changes tied to gestation**\n\nWe then narrowed the aperture to capture changes unfolding within\n\ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships\n\nbetween summary brain metrics were evident over the gestational\n\nperiod as follows: total brain volume, GMV and CT were positively asso -", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" - }, - { - "text": "(independent variable). In follow-up statistical analyses (noted in Methods), various quality control metrics\n\nand global brain volume were included into the model to account for variables of non-interest (e.g., motion)\n\nand to identify highly impacted brain areas (e.g., controlling for total GMV).", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed4.pdf" - }, - { - "text": "**2258**\n\noverlook the full range of changes that unfold within the gestational\n\nwindow, and underrepresent the brain’s metamorphosis during preg-\n\nnancy. Furthermore, although observed changes were largely global,\n\nsome regions displayed notable stability (for example, extrastriate cor-\n\ntex). The subcortical region that displayed the strongest relationship\n\nwith gestation week was the ventral diencephalon, which encompasses\n\nthe hypothalamus and subsequent medial preoptic area and paraven-\n\ntricular nucleus—structures critical for inducing maternal behavior <sup>12</sup> <sup>,</sup> <sup>16</sup> .\n\nThe hippocampus exhibited a reduction in volume across gestation,\n\nand with higher spatial resolution, this reduction was revealed to be\n\ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other\n\nhippocampal subfields remained stable. Adjacent PHC within the\n\nMTL also exhibited volume reduction across gestation. While our hip-\n\npocampal findings are consistent with pre/post studies of pregnancy <sup>13</sup> ,\n\nthe precision lens applied within gestation revealed the nonlinear\n\nnature of this reduction. Recapitulating and clarifying these region-\n\nally specific patterns of volume change throughout the MTL merits\n\nfurther investigation.\n\nSimilar precision imaging studies have captured dynamic brain\n\nreorganization across other neuroendocrine transitions, such as the\n\nmenstrual cycle (see review in ref. 28 ), underscoring the powerful\n\nrole steroid hormones have in shaping the mammalian brain <sup>29</sup> . Endo-\n\ncrine changes across pregnancy dwarf those that occur across the\n\nmenstrual cycle, which highlights the critical need to map the brain’s\n\nresponse to this unique hormonal state. Broad physiological changes\n\noccur in tandem with the rise in steroid hormones, including changes\n\nin body mass composition, water retention, immune function and\n\nsleep patterns <sup>11</sup> . These factors could have a role in the brain changes\n\nobserved here, with some driving neurobiological changes and others,\n\nlike water retention, potentially affecting MRI-based measurements.\n\nNote that, although cortical reductions in GMV over gestation were\n\nstable across analyses, accounting for QC measures influenced the\n\nmagnitude and location of these results. These metrics all fell within\n\nthe standard range, but there may be meaningful reductions in signal\n\nthat accompany volumetric reductions (for example, increased CSF\n\nand decreased GM)—a methodological nuance that goes beyond the\n\nscope of this resource study. Ultimately, identifying the shared and\n\nunique contributions of these factors to the neuroanatomical changes\n\nthat unfold across gestation warrants further investigation. Deeply\n\nphenotyping a large and diverse cohort of women across pregnancy will\n\nopen up new avenues of exploration, for example, allowing research-\n\ners to link blood-based proteomic signatures to pregnancy outcomes;\n\ndeploying wearable devices to monitor changes in sleep, cognition and\n\nmood; and probing the broader social and environmental determinants\n\nof maternal health <sup>27</sup> .\n\nThe neuroanatomical changes that unfold during matrescence\n\nmay have broad implications for understanding individual differences\n\nin parental behavior <sup>13</sup> <sup>,</sup> <sup>24</sup> <sup>,</sup> <sup>30</sup> <sup>,</sup> <sup>31</sup> , vulnerability to mental health disorders <sup>32</sup> <sup>,</sup> <sup>33</sup>\n\nand patterns of brain aging <sup>18</sup> <sup>,</sup> <sup>19</sup> <sup>,</sup> <sup>34</sup> <sup>-</sup> <sup>36</sup> . Decreases in GMV may reflect\n\n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara-\n\ntion for parenthood <sup>26</sup> . For example, in rodents, steroid hormones\n\npromote parental behavior by remodeling specific neural circuits in the\n\nmedial preoptic area of the hypothalamus. These behavioral adapta-\n\ntions are critical to the dam’s ability to meet the demands of caring for\n\n**a b**", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" - } - ] - }, - { - "references": { - "source_file": "6126797.pdf", - "query": "How to light up my sports smart watch?", - "target_page": 2, - "target_passage": "Up button: Short press to light up or turn off the screen", - "chunk_present": { - "presence": true, - "index": 6 - } - }, - "top_chunk": [ - { - "text": "Click “camera” in the app WearPro to wake up the camera mode of the watch, click the camera\n\nbutton on the watch to take photos, and the photos will be automatically saved to the phone\n\nalbum.\n\n**5. Data synchronization**\n\nAfter the watch is successfully bound to the application, the data in the smartwatch can be\n\nsynchronized to the application.\n\n**6. Tilt to wake the screen**\n\nWear the smartwatch correctly on your wrist (left/right hand). when you switch on the feature, you\n\ncan light up the screen when you raise up your wrist.\n\n**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as\n\n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this\n\nperiod.\n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once\n\nor repeatedly on the date (week) setting, and the alarm can be turned on/off.\n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the\n\nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting.\n\nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the\n\nscreen.\n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the\n\nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting\n\nand selecting the date (week) of the water reminder. When the time of drink water reminder is\n\nreached, the watch will vibrate and there will be a water icon on the screen.\n\n**11. Dial push**\n\n11.1.Push an existing watch face\n\nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart\n\nand bind the APP automatically after the synchronization of the watch face.\n\n11.2. Customize the watch face\n\nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch\n\nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the\n\nAPP automatically after the synchronization of the watch face.\n\n**12. Firmware version**", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the\n\nmobile phone, the watch will receive one or more SMS reminders at the same time.\n\n1.5.3. Other application message notifications:\n\nTurn on the corresponding application message notification in the app, such as WeChat, QQ,\n\nOutlook, Facebook and other applications. When the mobile phone receives one/multiple\n\napplication message notifications, the watch will receive one/multiple corresponding message\n\nreminders at the same time.\n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile\n\nphone, then you can synchronize you contacts of your mobile phone to the smartwatch.\n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the\n\nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will\n\nbe wiped out at 00:00 every day in the morning.\n\n**1.8 Sports modes** (walking, running, cycling, rope skipping, badminton,\n\nbasketball, football)\n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the\n\nexercise; click the “Start” button again to pause the recording of the exercise; click the “End”\n\nbutton to end the recording, and save to the data.\n\n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the\n\nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be\n\nsaved.\n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the\n\nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly\n\nfor the measurement.\n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the\n\nECG interface in the app, you can have single measurement at a time. The data of ECG will be\n\nsaved in the mobile phone. This function should be used with the app.\n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other\n\n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to\n\noperate the function).\n\n**2.1 Remote control music**", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest\n\nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on\n\nor off audio Bluetooth for calls.\n\n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and\n\nscroll up and down to find the corresponding function.\n\n5) Long press the watch face interface and swipe to right or left to switch the watch face, select\n\none of them and set it with one-click.\n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the\n\nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of\n\n10 messages can be saved. The messages received after 10 messages will be overwritten one by\n\none.\n\n2) Swipe to the bottom to click the delete icon to clear all message records.\n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu\n\ninterface.\n\n1) Bluetooth connection status; time; power left;\n\n2) About, where you can check the firmware version of watch and the address of the Bluetooth\n\n3) Setting, where you can enter it to set part of the functions;\n\n4) Brightness adjustment; where you can adjust the brightness of the screen;\n\n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize\n\noffline payment.\n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off\n\nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling\n\nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the\n\nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when\n\nthey are successfully bound.\n\n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50\n\ncall records, and it will be automatically overwritten when 128 records are full. Click any call\n\nrecord to call back)\n\n3. Dial the keyboard, you can enter the phone number to make a call.\n\n**1.5 message**\n\nWhen the watch is successfully bound to the app, and you approve notifications of corresponding\n\napps in your mobile phone system, and switch on these apps or callings notifications functions on\n\nyour watch, the notifications on your mobile phone can synchronize to your watch.\n\n1.5.1. Incoming call notification:\n\nTurn on the incoming call reminder in the app. When the phone has a incoming call, the watch\n\nwill light up or vibrate.\n\n1.5.2. SMS notification:", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "## Sports smart watch\n\n## User Manual\n\n### DT3 Mate\n\n**Thank you for choosing our smart watch. You can fully understand**\n\n**the use and operation of the equipment by reading this manual.**\n\n**The company reserves the right to modify the contents of this manual**\n\n**without any prior notice.**\n\nThe product contains: a packing box, a manual, a watch body, and a\n\ncharging cable.\n\n**A. Watch function description**\n\nButton description:", - "page_start": 0, - "page_end": 0, - "source_file": "6126797.pdf" - }, - { - "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous\n\nsong/play next song of your phone.\n\nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the\n\nsmartwatch.\n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be\n\ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be\n\nsynchronized to the APP for you to check.\n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once.\n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the\n\nwatch to display the weather information for the day.\n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the\n\nmobile phone will vibrate or emit a ringtone.\n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of\n\nthe day.\n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button\n\nto end the massage state.\n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose.\n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be\n\nsynchronized with your mobile phone language after the watch successfully binds to the APP.\n\n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and\n\nclick it to set the watch face.\n\n3) Set screen time; a variety of screen time lengths can be selected.\n\n4) Vibration intensity; set reminder vibration intensity.\n\n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to\n\ndecrypt the previous password).\n\n6) Restore factory settings; click √to enable the factory reset, and click X to cancel the factory\n\nreset.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "and view content on demand. They can search content and control their\n\nPVR remotely from their smartphone. They can stream programming to\n\ntheir tablet anywhere in their home. A single Rogers Nextbox serves as\n\na master PVR for the entire home enabling simultaneous viewing and\n\nrecording of up to eight separate shows and storage of over 250 hours\n\nof high-definition programming. And customers can access television\n\nand movie content on-demand from anywhere by laptop, tablet or\n\nsmartphone using the Rogers Anyplace TV app.\n\nTelevision has never been this good, this easy, or this simple to control.\n\nAnd it’s even better when combined with innovative Rogers features,\n\nsuch as the ability to screen phone calls on their TV, listen to voicemail\n\non their tablet, or receive talking text messages on their home phone.\n\nWireless customers can also use Rogers One Number to switch calls\n\namong their computer, home phone and wireless device without\n\ninterruption; manage e-mails; text messages and voicemail; hold live\n\nvideo chats; and combine and sync contacts from across multiple devices.\n\nWhen they’re not at home, more and more customers also rely on\n\nRogers Smart Home Monitoring, a complete monitoring, automation\n\nand security solution that includes the most innovative technology and\n\nfeatures available. Smart Home Monitoring lets customers monitor,\n\ncontrol and receive alerts by smartphone or online, staying connected\n\nto their home from almost anywhere, and enjoying the peace of mind\n\nthat comes with having the most reliable monitoring solution available.\n\nSmart Home Monitoring also gives customers the ability to automate\n\nlights, appliances, thermostats and more, so they know their homes are\n\nnot only secure but more energy-efficient and convenient, also.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 09", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to\n\nreactivate the watch.\n\n**Button down:**\n\nShort press to enter multi-sport mode.\n\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any\n\nbuttons.\n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below.\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the\n\nshortcut.\n\n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth\n\nconnection status, time, power, brightness adjustment and other functions.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "**B** . **Bind to the APP**\n\n**1. APP download method**\n\n1.1 Scan the QR code to download\n\n1.2 Search the application at App market and download\n\nFor Android users:\n\nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download,\n\nremember to check the pop-up box on your phone when installing, and agree to the permission.\n\nFor iOS users:\n\nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your\n\nphone when installing, and agree to the permission.\n\nAfter WearPro is installed, the app icon appears as .\n\n2.Bind Bluetooth\n\n2.1 Unconnected to the APP state:\n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the\n\nAPK/APP, go to Devices > Add Device > click to start searching, select and click the\n\ncorresponding watch device name, and the watch will be successfully bound to the app.\n\n2.2 Connected to the APP state:\n\nWatch time synchronization: the time shown at the smartwatch and your mobile phone will\n\nsynchronized after the smartwatch is bound to the APP successfully.\n\n2.3 Binding the audio/calling Bluetooth\n\nWhen the smartwatch is in the dial interface, you can find the audio/calling Bluetooth icon, and\n\nclick it to turn it on, then go to the Bluetooth settings of your mobile phone and click the name of\n\nthe audio/calling Bluetooth of the smartwatch to bind it.\n\n**3. Find Watch**\n\nAfter the smartwatch is bound to the APP, you click “Find Watch” in the APP, the smartwatch\n\nwill light up and vibrate for once.\n\n**4. Camera**", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "**WIRELESS** EVERYWHERE\n\nROGERS KNOWS THAT NO MATTER WHERE ITS CUSTOMERS\n\nARE, BEING IN TOUCH WITH FRIENDS, FAMILY AND\n\nCOLLEAGUES MAKES THEIR LIVES MORE CONNECTED.\n\nAND BEING CONNECTED ANYTIME, ANYWHERE, TO THE\n\nINFORMATION AND ENTERTAINMENT THAT MATTERS\n\nMOST MAKES LIFE EASIER AND MORE ENJOYABLE.\n\nThat’s why, in the city and around the world, millions of Canadians rely\n\non Rogers to keep them connected, and to put the Internet in their\n\npockets with the most advanced wireless services, blistering-fast\n\nspeeds, and seamless coverage. And they do so with the flexibility and\n\npeace of mind that comes with Rogers Share Everything plans which\n\nallow families and businesses to share wireless data between their\n\nwireless devices and add additional devices to their plans.\n\nWIRELESS\n\nVOICE & DATA\n\nMOBILE\n\nINTERNET\n\nCANADA’S\n\nFASTEST WIRELESS\n\nNETWORK\n\nANYWHERE\n\nTV VIEWING\n\nSMARTPHONES\n\n& TABLETS\n\nSOCIAL MEDIA\n\n& NETWORKING\n\nMOBILE\n\nPAYMENTS\n\nREMOTE HOME\n\nMONITORING\n\n& AUTOMATION\n\nVIRTUAL OFFICE\n\nCONNECTIVITY\n\n06 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Our new wireless Share Everything plans were Canada’s first to let\n\nindividuals, families and small businesses share wireless data and\n\nunlimited nationwide talk and text, with up to 10 wireless devices.\n\nRogers recently further enhanced its exciting One Number service by\n\nintroducing smartphone apps which enable customers to use mobile\n\ndata or Wi-Fi to talk, text and video chat using their existing Rogers\n\nwireless number from any device.\n\nWe also keep customers informed and entertained with Rogers next-\n\ngeneration NextBox 3.0 TV experience which allows customers to view\n\nand record up to eight HD programs simultaneously, store hundreds of\n\nhours of content and enjoy whole-home PVR capability. And with\n\nRogers Anyplace TV, it’s also a wireless experience where viewers can\n\nnavigate their cable guide, use a virtual remote, set PVR recordings and\n\nstream live or on-demand content from a tablet, smartphone, laptop\n\nor gaming console.\n\nRogers continues to be Canada’s innovation leader in rapidly growing\n\nareas such as wireless machine-to-machine communications, remote\n\nhome monitoring and automation, mobile payments, in-car\n\ninfotainment and telematics, and digital media. As well, Rogers has\n\ndeployed a suite of unique local digital services that create virtual\n\nmarketplaces for bringing consumers and businesses together and\n\nprovide location-based targeted offers.\n\nThese are just a few examples of the ways Rogers continues to\n\ninnovate and lead the way, introducing wireless, broadband and digital\n\ntechnologies and services that fundamentally change the way\n\ncustomers stay connected, informed and entertained anywhere they\n\nare. Canadians know there’s one thing to be certain of - if they’re with\n\nRogers, they’ll never miss a thing.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 15", - "page_start": 18, - "page_end": 18, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "6126797.pdf", - "query": "Is my sports smartwatch's fitness data turned on or off by default?", - "target_page": 4, - "target_passage": "Fitness data is turned on by default.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the\n\nmobile phone, the watch will receive one or more SMS reminders at the same time.\n\n1.5.3. Other application message notifications:\n\nTurn on the corresponding application message notification in the app, such as WeChat, QQ,\n\nOutlook, Facebook and other applications. When the mobile phone receives one/multiple\n\napplication message notifications, the watch will receive one/multiple corresponding message\n\nreminders at the same time.\n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile\n\nphone, then you can synchronize you contacts of your mobile phone to the smartwatch.\n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the\n\nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will\n\nbe wiped out at 00:00 every day in the morning.\n\n**1.8 Sports modes** (walking, running, cycling, rope skipping, badminton,\n\nbasketball, football)\n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the\n\nexercise; click the “Start” button again to pause the recording of the exercise; click the “End”\n\nbutton to end the recording, and save to the data.\n\n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the\n\nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be\n\nsaved.\n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the\n\nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly\n\nfor the measurement.\n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the\n\nECG interface in the app, you can have single measurement at a time. The data of ECG will be\n\nsaved in the mobile phone. This function should be used with the app.\n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other\n\n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to\n\noperate the function).\n\n**2.1 Remote control music**", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous\n\nsong/play next song of your phone.\n\nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the\n\nsmartwatch.\n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be\n\ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be\n\nsynchronized to the APP for you to check.\n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once.\n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the\n\nwatch to display the weather information for the day.\n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the\n\nmobile phone will vibrate or emit a ringtone.\n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of\n\nthe day.\n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button\n\nto end the massage state.\n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose.\n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be\n\nsynchronized with your mobile phone language after the watch successfully binds to the APP.\n\n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and\n\nclick it to set the watch face.\n\n3) Set screen time; a variety of screen time lengths can be selected.\n\n4) Vibration intensity; set reminder vibration intensity.\n\n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to\n\ndecrypt the previous password).\n\n6) Restore factory settings; click √to enable the factory reset, and click X to cancel the factory\n\nreset.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "Click “camera” in the app WearPro to wake up the camera mode of the watch, click the camera\n\nbutton on the watch to take photos, and the photos will be automatically saved to the phone\n\nalbum.\n\n**5. Data synchronization**\n\nAfter the watch is successfully bound to the application, the data in the smartwatch can be\n\nsynchronized to the application.\n\n**6. Tilt to wake the screen**\n\nWear the smartwatch correctly on your wrist (left/right hand). when you switch on the feature, you\n\ncan light up the screen when you raise up your wrist.\n\n**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as\n\n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this\n\nperiod.\n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once\n\nor repeatedly on the date (week) setting, and the alarm can be turned on/off.\n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the\n\nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting.\n\nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the\n\nscreen.\n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the\n\nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting\n\nand selecting the date (week) of the water reminder. When the time of drink water reminder is\n\nreached, the watch will vibrate and there will be a water icon on the screen.\n\n**11. Dial push**\n\n11.1.Push an existing watch face\n\nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart\n\nand bind the APP automatically after the synchronization of the watch face.\n\n11.2. Customize the watch face\n\nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch\n\nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the\n\nAPP automatically after the synchronization of the watch face.\n\n**12. Firmware version**", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "**B** . **Bind to the APP**\n\n**1. APP download method**\n\n1.1 Scan the QR code to download\n\n1.2 Search the application at App market and download\n\nFor Android users:\n\nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download,\n\nremember to check the pop-up box on your phone when installing, and agree to the permission.\n\nFor iOS users:\n\nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your\n\nphone when installing, and agree to the permission.\n\nAfter WearPro is installed, the app icon appears as .\n\n2.Bind Bluetooth\n\n2.1 Unconnected to the APP state:\n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the\n\nAPK/APP, go to Devices > Add Device > click to start searching, select and click the\n\ncorresponding watch device name, and the watch will be successfully bound to the app.\n\n2.2 Connected to the APP state:\n\nWatch time synchronization: the time shown at the smartwatch and your mobile phone will\n\nsynchronized after the smartwatch is bound to the APP successfully.\n\n2.3 Binding the audio/calling Bluetooth\n\nWhen the smartwatch is in the dial interface, you can find the audio/calling Bluetooth icon, and\n\nclick it to turn it on, then go to the Bluetooth settings of your mobile phone and click the name of\n\nthe audio/calling Bluetooth of the smartwatch to bind it.\n\n**3. Find Watch**\n\nAfter the smartwatch is bound to the APP, you click “Find Watch” in the APP, the smartwatch\n\nwill light up and vibrate for once.\n\n**4. Camera**", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest\n\nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on\n\nor off audio Bluetooth for calls.\n\n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and\n\nscroll up and down to find the corresponding function.\n\n5) Long press the watch face interface and swipe to right or left to switch the watch face, select\n\none of them and set it with one-click.\n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the\n\nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of\n\n10 messages can be saved. The messages received after 10 messages will be overwritten one by\n\none.\n\n2) Swipe to the bottom to click the delete icon to clear all message records.\n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu\n\ninterface.\n\n1) Bluetooth connection status; time; power left;\n\n2) About, where you can check the firmware version of watch and the address of the Bluetooth\n\n3) Setting, where you can enter it to set part of the functions;\n\n4) Brightness adjustment; where you can adjust the brightness of the screen;\n\n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize\n\noffline payment.\n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off\n\nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling\n\nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the\n\nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when\n\nthey are successfully bound.\n\n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50\n\ncall records, and it will be automatically overwritten when 128 records are full. Click any call\n\nrecord to call back)\n\n3. Dial the keyboard, you can enter the phone number to make a call.\n\n**1.5 message**\n\nWhen the watch is successfully bound to the app, and you approve notifications of corresponding\n\napps in your mobile phone system, and switch on these apps or callings notifications functions on\n\nyour watch, the notifications on your mobile phone can synchronize to your watch.\n\n1.5.1. Incoming call notification:\n\nTurn on the incoming call reminder in the app. When the phone has a incoming call, the watch\n\nwill light up or vibrate.\n\n1.5.2. SMS notification:", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to\n\nreactivate the watch.\n\n**Button down:**\n\nShort press to enter multi-sport mode.\n\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any\n\nbuttons.\n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below.\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the\n\nshortcut.\n\n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth\n\nconnection status, time, power, brightness adjustment and other functions.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "programming across the country’s largest markets, as well\n\nas five OMNI Television stations which deliver multilingual news,\n\ninformation and entertainment to Canada’s multiple language\n\ncommunities.\n\nThe Sportsnet specialty network provides sports programming across\n\nCanada through its four regional television channels and its nationally-\n\ndistributed Sportsnet ONE, Sportsnet World, and Sportsnet 360\n\nstations. Rogers also owns other Canadian specialty television channels,\n\nincluding FX Canada, OLN, The Biography Channel and G4.\n\nThe Shopping Channel - Canada’s only nationally televised and\n\nInternet shopping service - is a leading interactive multi-channel\n\nretailer, offering a vast assortment of exclusive products and top brand\n\nnames. As one of Canada’s most innovative and diversified retailers,\n\nit provides customers with exceptional selections in health/beauty,\n\njewelry, home/lifestyle, fashion/accessories, and electronics.\n\nRogers also publishes many well-known consumer magazines, such as\n\nMaclean’s, Chatelaine, FLARE, L’actualité, and Canadian Business, and is\n\nthe leading publisher of a number of industry, medical and financial\n\npublications. Rogers also controls a suite of fast-growing digital media\n\nassets, including 90+ owned and 300+ premium partnership online\n\nsites, as well as the recently launched Next Issue Canada digital\n\nmagazine platform which provides 100+ of North America’s most\n\ncelebrated titles on an unlimited anytime, anywhere basis.\n\nIn sports entertainment, Rogers owns the Toronto Blue Jays baseball\n\nteam and Rogers Centre stadium, Canada’s largest sports and\n\nentertainment facility and home field of the Blue Jays. Rogers also holds\n\na 37.5% investment in Maple Leaf Sports & Entertainment which owns\n\nthe NHL Maple Leafs, NBA Raptors, MLS Toronto FC and a number of\n\nother sports related assets.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 13", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "### **13.7 Monitoring**\n\nAn important step is to correct any issues that are reported by your IBM Storwize V7000\n\nsystem as soon as possible. Configure your system to send automatic notifications to\n\nstandard Call Home server or to the new Cloud Call Home server when a new event is\n\nreported. To avoid having to monitor the management GUI for new events, select the type of\n\nevent for which you want to be notified. For example, restrict notifications to only events that\n\nrequire action. The following event notification mechanisms are available:\n\n� Call Home\n\nAn event notification can be sent to one or more email addresses. This mechanism notifies\n\nindividuals of problems. Individuals can receive notifications wherever they have email\n\naccess, including mobile devices.\n\n� Cloud Call Home\n\nCloud services for Call Home is the optimal transmission method for error data because it\n\nensures notifications are delivered directly to the IBM support center.\n\n� SNMP\n\nAn SNMP traps report can be sent to a data center management system, such as IBM\n\nSystems Director, that consolidates SNMP reports from multiple systems. With this\n\nmechanism, you can monitor your data center from a single workstation.\n\n� Syslog\n\nA syslog report can be sent to a data center management system that consolidates syslog\n\nreports from multiple systems. With this option, you can monitor your data center from a\n\nsingle location.\n\nIf your system is within warranty or if you have a hardware maintenance agreement, configure\n\nyour IBM Storwize V7000 system to send email events directly to IBM if an issue that requires\n\nhardware replacement is detected. This mechanism is known as *Call Home* . When this event\n\nis received, IBM automatically opens a problem report and, if appropriate, contacts you to\n\nhelp resolve the reported problem.\n\nCloud Call Home is specifically designed to work with new service teams and improves\n\nconnectivity and ultimately should improve customer support.\n\n#### **13.7.1 Email notifications and the Call Home function**\n\nhe Call Home function of IBM Storwize V7000 uses the email notification that is sent to the\n\nspecific IBM support center. Therefore, the configuration is similar to sending emails to the\n\nspecific person or system owner. The following procedure summarizes how to configure email\n\nnotifications and emphasizes what is specific to Call Home:\n\n1. Prepare your contact information that you want to use for the email notification and verify\n\nthe accuracy of the data. From the GUI menu, click **Settings** → **Support** (see\n\nFigure 13-44 on page 711).\n\n**Important:** If you set up Call Home to IBM, ensure that the contact details that you\n\nconfigure are correct and kept updated. Personnel changes can cause delays in IBM\n\nmaking contact.\n\n**Note:** If the customer does not want to open the firewall, Cloud Call Home does not work\n\nand the customer can disable Cloud Call Home. Call Home is used instead.", - "page_start": 731, - "page_end": 731, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 5. Graphical user interface\n\n� Network: Use the Network pane to manage the management IP addresses for the system,\n\nservice IP addresses for the nodes, and iSCSI and Fibre Channel configurations. The\n\nsystem must support Fibre Channel or Fibre Channel over Ethernet connections to your\n\nstorage area network (SAN).\n\n� Security: Use the Security pane to configure and manage remote authentication services.\n\n� System: Navigate to the System menu item to manage overall system configuration\n\noptions, such as licenses, updates, and date and time settings.\n\n� Support: Helps to configure and manage connections, and upload support packages to\n\nthe support center.\n\n� GUI Preferences: Configure welcome message after login, refresh internals and GUI\n\nlogout timeouts.\n\nThese options are described next.\n\n#### **5.10.1 Notifications menu**\n\nIBM Storwize V7000 can use SNMP traps, syslog messages, and Call Home email to notify\n\nyou and the IBM Support Center when significant events are detected. Any combination of\n\nthese notification methods can be used simultaneously.\n\nNotifications are normally sent immediately after an event is raised. However, events can\n\noccur because of service actions that are performed. If a recommended service action is\n\nactive, notifications about these events are sent only if the events are still unfixed when the\n\nservice action completes.\n\n**SNMP notifications**\n\nSNMP is a standard protocol for managing networks and exchanging messages. The system\n\ncan send SNMP messages that notify personnel about an event. You can use an SNMP\n\nmanager to view the SNMP messages that are sent by IBM Storwize V7000.\n\nTo view the SNMP configuration, use the System window. Point to the Settings icon and click\n\n**Notification** → **SNMP** (see Figure 5-54).\n\n*Figure 5-54 Setting SNMP server and traps*", - "page_start": 184, - "page_end": 184, - "source_file": "sg247938.pdf" - }, - { - "text": "**WIRELESS** EVERYWHERE\n\nROGERS KNOWS THAT NO MATTER WHERE ITS CUSTOMERS\n\nARE, BEING IN TOUCH WITH FRIENDS, FAMILY AND\n\nCOLLEAGUES MAKES THEIR LIVES MORE CONNECTED.\n\nAND BEING CONNECTED ANYTIME, ANYWHERE, TO THE\n\nINFORMATION AND ENTERTAINMENT THAT MATTERS\n\nMOST MAKES LIFE EASIER AND MORE ENJOYABLE.\n\nThat’s why, in the city and around the world, millions of Canadians rely\n\non Rogers to keep them connected, and to put the Internet in their\n\npockets with the most advanced wireless services, blistering-fast\n\nspeeds, and seamless coverage. And they do so with the flexibility and\n\npeace of mind that comes with Rogers Share Everything plans which\n\nallow families and businesses to share wireless data between their\n\nwireless devices and add additional devices to their plans.\n\nWIRELESS\n\nVOICE & DATA\n\nMOBILE\n\nINTERNET\n\nCANADA’S\n\nFASTEST WIRELESS\n\nNETWORK\n\nANYWHERE\n\nTV VIEWING\n\nSMARTPHONES\n\n& TABLETS\n\nSOCIAL MEDIA\n\n& NETWORKING\n\nMOBILE\n\nPAYMENTS\n\nREMOTE HOME\n\nMONITORING\n\n& AUTOMATION\n\nVIRTUAL OFFICE\n\nCONNECTIVITY\n\n06 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "6126797.pdf", - "query": "When does my Sport smartwatch start and stop monitoring sleep?", - "target_page": 5, - "target_passage": "Sleep monitoring time period: from 18:00 at night to 10:00 the next day", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous\n\nsong/play next song of your phone.\n\nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the\n\nsmartwatch.\n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be\n\ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be\n\nsynchronized to the APP for you to check.\n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once.\n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the\n\nwatch to display the weather information for the day.\n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the\n\nmobile phone will vibrate or emit a ringtone.\n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of\n\nthe day.\n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button\n\nto end the massage state.\n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose.\n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be\n\nsynchronized with your mobile phone language after the watch successfully binds to the APP.\n\n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and\n\nclick it to set the watch face.\n\n3) Set screen time; a variety of screen time lengths can be selected.\n\n4) Vibration intensity; set reminder vibration intensity.\n\n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to\n\ndecrypt the previous password).\n\n6) Restore factory settings; click √to enable the factory reset, and click X to cancel the factory\n\nreset.", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" - }, - { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the\n\nmobile phone, the watch will receive one or more SMS reminders at the same time.\n\n1.5.3. Other application message notifications:\n\nTurn on the corresponding application message notification in the app, such as WeChat, QQ,\n\nOutlook, Facebook and other applications. When the mobile phone receives one/multiple\n\napplication message notifications, the watch will receive one/multiple corresponding message\n\nreminders at the same time.\n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile\n\nphone, then you can synchronize you contacts of your mobile phone to the smartwatch.\n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the\n\nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will\n\nbe wiped out at 00:00 every day in the morning.\n\n**1.8 Sports modes** (walking, running, cycling, rope skipping, badminton,\n\nbasketball, football)\n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the\n\nexercise; click the “Start” button again to pause the recording of the exercise; click the “End”\n\nbutton to end the recording, and save to the data.\n\n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the\n\nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be\n\nsaved.\n\n**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the\n\nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly\n\nfor the measurement.\n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the\n\nECG interface in the app, you can have single measurement at a time. The data of ECG will be\n\nsaved in the mobile phone. This function should be used with the app.\n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other\n\n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to\n\noperate the function).\n\n**2.1 Remote control music**", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" - }, - { - "text": "Click “camera” in the app WearPro to wake up the camera mode of the watch, click the camera\n\nbutton on the watch to take photos, and the photos will be automatically saved to the phone\n\nalbum.\n\n**5. Data synchronization**\n\nAfter the watch is successfully bound to the application, the data in the smartwatch can be\n\nsynchronized to the application.\n\n**6. Tilt to wake the screen**\n\nWear the smartwatch correctly on your wrist (left/right hand). when you switch on the feature, you\n\ncan light up the screen when you raise up your wrist.\n\n**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as\n\n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this\n\nperiod.\n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once\n\nor repeatedly on the date (week) setting, and the alarm can be turned on/off.\n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the\n\nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting.\n\nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the\n\nscreen.\n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the\n\nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting\n\nand selecting the date (week) of the water reminder. When the time of drink water reminder is\n\nreached, the watch will vibrate and there will be a water icon on the screen.\n\n**11. Dial push**\n\n11.1.Push an existing watch face\n\nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart\n\nand bind the APP automatically after the synchronization of the watch face.\n\n11.2. Customize the watch face\n\nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch\n\nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the\n\nAPP automatically after the synchronization of the watch face.\n\n**12. Firmware version**", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" - }, - { - "text": "**B** . **Bind to the APP**\n\n**1. APP download method**\n\n1.1 Scan the QR code to download\n\n1.2 Search the application at App market and download\n\nFor Android users:\n\nSearch for \"WearPro\" in the Google Play app store or any customized Android store to download,\n\nremember to check the pop-up box on your phone when installing, and agree to the permission.\n\nFor iOS users:\n\nSearch for \"WearPro\" in the APP Store to download, remember to check the pop-up box on your\n\nphone when installing, and agree to the permission.\n\nAfter WearPro is installed, the app icon appears as .\n\n2.Bind Bluetooth\n\n2.1 Unconnected to the APP state:\n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the\n\nAPK/APP, go to Devices > Add Device > click to start searching, select and click the\n\ncorresponding watch device name, and the watch will be successfully bound to the app.\n\n2.2 Connected to the APP state:\n\nWatch time synchronization: the time shown at the smartwatch and your mobile phone will\n\nsynchronized after the smartwatch is bound to the APP successfully.\n\n2.3 Binding the audio/calling Bluetooth\n\nWhen the smartwatch is in the dial interface, you can find the audio/calling Bluetooth icon, and\n\nclick it to turn it on, then go to the Bluetooth settings of your mobile phone and click the name of\n\nthe audio/calling Bluetooth of the smartwatch to bind it.\n\n**3. Find Watch**\n\nAfter the smartwatch is bound to the APP, you click “Find Watch” in the APP, the smartwatch\n\nwill light up and vibrate for once.\n\n**4. Camera**", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" - }, - { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest\n\nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on\n\nor off audio Bluetooth for calls.\n\n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and\n\nscroll up and down to find the corresponding function.\n\n5) Long press the watch face interface and swipe to right or left to switch the watch face, select\n\none of them and set it with one-click.\n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the\n\nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of\n\n10 messages can be saved. The messages received after 10 messages will be overwritten one by\n\none.\n\n2) Swipe to the bottom to click the delete icon to clear all message records.\n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu\n\ninterface.\n\n1) Bluetooth connection status; time; power left;\n\n2) About, where you can check the firmware version of watch and the address of the Bluetooth\n\n3) Setting, where you can enter it to set part of the functions;\n\n4) Brightness adjustment; where you can adjust the brightness of the screen;\n\n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize\n\noffline payment.\n\n**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off\n\nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling\n\nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the\n\nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when\n\nthey are successfully bound.\n\n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50\n\ncall records, and it will be automatically overwritten when 128 records are full. Click any call\n\nrecord to call back)\n\n3. Dial the keyboard, you can enter the phone number to make a call.\n\n**1.5 message**\n\nWhen the watch is successfully bound to the app, and you approve notifications of corresponding\n\napps in your mobile phone system, and switch on these apps or callings notifications functions on\n\nyour watch, the notifications on your mobile phone can synchronize to your watch.\n\n1.5.1. Incoming call notification:\n\nTurn on the incoming call reminder in the app. When the phone has a incoming call, the watch\n\nwill light up or vibrate.\n\n1.5.2. SMS notification:", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" - }, - { - "text": "and view content on demand. They can search content and control their\n\nPVR remotely from their smartphone. They can stream programming to\n\ntheir tablet anywhere in their home. A single Rogers Nextbox serves as\n\na master PVR for the entire home enabling simultaneous viewing and\n\nrecording of up to eight separate shows and storage of over 250 hours\n\nof high-definition programming. And customers can access television\n\nand movie content on-demand from anywhere by laptop, tablet or\n\nsmartphone using the Rogers Anyplace TV app.\n\nTelevision has never been this good, this easy, or this simple to control.\n\nAnd it’s even better when combined with innovative Rogers features,\n\nsuch as the ability to screen phone calls on their TV, listen to voicemail\n\non their tablet, or receive talking text messages on their home phone.\n\nWireless customers can also use Rogers One Number to switch calls\n\namong their computer, home phone and wireless device without\n\ninterruption; manage e-mails; text messages and voicemail; hold live\n\nvideo chats; and combine and sync contacts from across multiple devices.\n\nWhen they’re not at home, more and more customers also rely on\n\nRogers Smart Home Monitoring, a complete monitoring, automation\n\nand security solution that includes the most innovative technology and\n\nfeatures available. Smart Home Monitoring lets customers monitor,\n\ncontrol and receive alerts by smartphone or online, staying connected\n\nto their home from almost anywhere, and enjoying the peace of mind\n\nthat comes with having the most reliable monitoring solution available.\n\nSmart Home Monitoring also gives customers the ability to automate\n\nlights, appliances, thermostats and more, so they know their homes are\n\nnot only secure but more energy-efficient and convenient, also.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 09", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to\n\nreactivate the watch.\n\n**Button down:**\n\nShort press to enter multi-sport mode.\n\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any\n\nbuttons.\n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below.\n\n**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the\n\nshortcut.\n\n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth\n\nconnection status, time, power, brightness adjustment and other functions.", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" - }, - { - "text": "Chapter 13. RAS, monitoring, and troubleshooting\n\nUse the management GUI to manage and service your system. Select **Monitoring** → **Events**\n\nto list events that should be addressed and maintenance procedures that walk you through\n\nthe process of correcting problems. Information in the Events window can be filtered in three\n\nways:\n\n� Recommended Actions\n\nShows only the alerts that require attention. Alerts are listed in priority order and should be\n\nresolved sequentially by using the available fix procedures. For each problem that is\n\nselected, you can perform the following tasks:\n\n- Run a fix procedure\n\n- View the properties\n\n� Unfixed Messages and Alerts\n\nDisplays only the alerts and messages that are not fixed. For each entry that is selected,\n\nyou can perform the following tasks:\n\n- Run a fix procedure\n\n- Mark an event as fixed\n\n- Filter the entries to show them by specific minutes, hours, or dates\n\n- Reset the date filter\n\n- View the properties\n\n� Show All\n\nDisplays all event types whether they are fixed or unfixed. For each entry that is selected,\n\nyou can perform the following tasks:\n\n- Run a fix procedure\n\n- Mark an event as fixed\n\n- Filter the entries to show them by specific minutes, hours, or dates\n\n- Reset the date filter\n\n- View the properties\n\nSome events require a certain number of occurrences in 25 hours before they are displayed\n\nas unfixed. If they do not reach this threshold in 25 hours, they are flagged as *expired* .\n\nMonitoring events are below the coalesce threshold, and are usually transient.\n\n#### **13.6.1 Managing event log**\n\nRegularly check the status of the system using the management GUI. If you suspect a\n\nproblem, first use the management GUI to diagnose and resolve the problem.\n\nUse the views that are available in the management GUI to verify the status of the system, the\n\nhardware devices, the physical storage, and the available volumes by completing the\n\nfollowing steps:\n\n1. Click **Monitoring** → **Events** to see all problems that exist on the system (see Figure 13-34\n\non page 704).\n\n**Important:** The management GUI is the primary tool that is used to *operate* and *service*\n\nyour system. Real-time *monitoring* should be established by using SNMP traps, email\n\nnotifications, or syslog messaging on an automatic manner.", - "page_start": 724, - "page_end": 724, - "source_file": "sg247938.pdf" - }, - { - "text": "## Sports smart watch\n\n## User Manual\n\n### DT3 Mate\n\n**Thank you for choosing our smart watch. You can fully understand**\n\n**the use and operation of the equipment by reading this manual.**\n\n**The company reserves the right to modify the contents of this manual**\n\n**without any prior notice.**\n\nThe product contains: a packing box, a manual, a watch body, and a\n\ncharging cable.\n\n**A. Watch function description**\n\nButton description:", - "page_start": 0, - "page_end": 0, - "source_file": "6126797.pdf" - }, - { - "text": "The version of the watch is displayed on “Firmware upgrade” in the column of “Device”, and\n\nusers can decide to whether upgrade the firmware version.\n\n**13. Unbind**\n\nIn the \"Device\" column of WearPro, scroll down to the \"Unbind\" and click to unbind the APP. The\n\niSO users need to go to the Bluetooth settings of the phone, select the Bluetooth name of the\n\nsmart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind”\n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a\n\nfactory reset after that.\n\n**- Frequently asked questions and answers**\n\n***Please avoid exposing the device to extreme temperatures that are**\n\n**too cold or too hot for a long time, which may cause permanent**\n\n**damage.**\n\n***Why can't I take a hot bath with my watch?**\n\n**The temperature of the bath water is relatively changed, it will**\n\n**produce a lot of water vapor, and the water vapor is in the gas phase,**\n\n**and its molecular radius is small, and it is easy to seep into the gap of**\n\n**the watch case. The internal circuit of the watch is short-circuited,**\n\n**which damages the circuit board of the watch and damages the**\n\n**watch.**\n\n***No power on, no charging**\n\n**If you receive the goods and the watch does not turn on, it may be**\n\n**caused by a collision during the transportation of the watch and the**\n\n**battery Seiko board has been protected, so plug in the charging cable**\n\n**to activate it.**", - "page_start": 7, - "page_end": 7, - "source_file": "6126797.pdf" - } - ] - }, - { - "references": { - "source_file": "OTC_NSANY_2004.pdf", - "query": "Have the operating profits in Japan for Nissan gone up or down in 2004?", - "target_page": 5, - "target_passage": "operating profits in Japan came to ¥341.1 billion, a decrease of 3.2 percent compared to last year", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Due to changes in government regulations, information on risks involved in business operations has been disclosed in the Yukashoken-Houkokusho for the year ended March 31,2005 as follows:\n\nEconomic Factors\n\nThe demand for products manufactured by Nissan is affected by the\n\neconomic conditions in each country or market in which they are offered\n\nfor sale. Nissan conducts its operations all over the world and, in particular,\n\nin the major markets of North America, Europe, and Asia, to say nothing of\n\nJapan. While Nissan strives to develop a comprehensive and integrated\n\nprojection of the global economic outlook, any greater-than-anticipated\n\ndownturn in one of these markets may have a significant effect on Nissan\n\nfinancial position and results of operations.\n\nInternational Activities and Overseas Expansion\n\nNissan’s manufacturing and marketing activities outside Japan are\n\nconducted in the United States, in Europe, and in the developing and\n\nemerging markets of Asia. Nissan forecasts and evaluates a wide variety of\n\nrisks inherent in doing business in such overseas markets including the\n\nfollowing factors, each of which entails a greater-than-anticipated level of\n\nrisk:\n\n- Unfavorable political or economic factors\n\n- Legal or regulatory changes\n\n- Potentially adverse tax consequences\n\n- Labor disputes including strikes\n\n- Difficulties in recruiting and retaining personnel\n\n- Social, political or economic turmoil due to terrorism, war, or other\n\ndestabilizing factors.\n\nResearch and Development\n\nNissan’s technology must be “real world”—useful, pragmatic and easy to\n\nuse. Nissan anticipates the nature and scope of the market demand, and\n\nthen prioritizes and invests in new technologies. Nonetheless, any sudden\n\nand greater-than-anticipated changes in its business environment or in\n\ncustomer preferences may impact negatively on customer satisfaction with\n\nthese new technologies.\n\nProduct Defects\n\nNissan places a high priority on safety and does its best to enhance safety\n\nfrom the standpoint of research and development, manufacturing and\n\nsales. Although Nissan takes out insurance policies to cover product\n\nliability, this does not necessarily mean that all potential defects and the\n\nrelated liabilities are fully covered. If Nissan were to implement strict\n\nproduct recalls for its customers, Nissan would incur significant additional\n\nexpenses which could adversely affect its financial position and results of\n\noperations.\n\nFluctuation in Foreign Currency Exchange Rates\n\nNissan’s Japanese operations export vehicles to various countries around\n\nthe world. In general, the appreciation of the yen against other currencies\n\nadversely affects Nissan’s financial results of operations and, on the\n\ncontrary, the depreciation of the yen against other currencies favorably\n\naffects Nissan’s financial results of operations. Any sharp appreciation of\n\nthe currencies of those countries against the yen could lead to increases in\n\nboth procurement and production costs which would adversely affect\n\nNissan’s competitiveness.\n\nDerivatives\n\nNissan utilizes derivatives transactions for the purpose of hedging its\n\nexposure to fluctuation in foreign exchange rates, interest rates and\n\ncommodity prices. While Nissan can hedge against these risks by using\n\nderivatives transactions, Nissan, by so doing, may miss the potential gains\n\nwhich could result from seizing the market opportunities to profit from such\n\nfluctuation in exchange rates and interest rates.\n\nIn addition, Nissan manages its exposure to credit risk by limiting its\n\ncounterparties to financial institutions with high credit ratings. However, a\n\ndefault by any one of these counterparties could have an adverse effect on\n\nNissan’s financial position and operating results.\n\nLawsuits and Claims\n\nWith respect to various lawsuits and claims which Nissan encounters, the\n\npossibility exists that the position defended by Nissan will not be accepted", - "page_start": 72, - "page_end": 72, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated subsidiaries *As of Mar. 31, 2005*\n\n*Capital* *Nissan*\n\n*Company* *Location* *Principal business* *(millions)* *share*(%)*\n\nJapan\n\nNissan Shatai Co., Ltd. Hiratsuka-shi, Kanagawa Manufacture and sales of automobiles and parts ¥7,904 43.80\n\nAichi Machine Industry Co., Ltd. Nagoya, Aichi Manufacture and sales of automotive parts ¥8,518 41.70\n\nJATCO Ltd. Fuji, Shizuoka Manufacture and sales of automotive parts ¥29,935 81.76\n\nNissan Kohki Co., Ltd. Samukawa, Kanagawa Manufacture and sales of automotive parts ¥2,020 97.73\n\nCalsonic Kansei Corporation Tokyo Manufacture and sales of automotive parts ¥40,606 41.87\n\nNissan Motor Car Carrier Co., Ltd. Tokyo International automobile transport ¥640 60.00\n\nNissan Trading Co., Ltd. Yokohama, Kanagawa Import and export of automobiles, parts, etc. ¥320 100.00\n\nNissan Financial Services Co., Ltd. Chiba, Chiba Automobile financing and leasing ¥16,387 100.00\n\nAutech Japan, Inc. Chigasaki, Kanagawa Development, manufacture and sales of ¥480 100.00\n\nlimited-edition automobiles\n\nNissan Real Estate Development Tokyo Real estate sales, purchase and leasing ¥1,000 70.50\n\nCorporation\n\nNissan Finance Co., Ltd. Tokyo Finance and accounting support ¥2,491 100.00\n\nAichi Nissan Motor Co., Ltd. Nagoya, Aichi Sales of automobiles and parts ¥100 100.00\n\nTokyo Nissan Motor Sales Co., Ltd. Tokyo Sales of automobiles and parts ¥100 100.00\n\nNissan Prince Tokyo Motor Sales Tokyo Sales of automobiles and parts ¥100 100.00\n\nCo., Ltd.\n\nNissan Chuo Parts Sales Co., Ltd. Yokohama, Kanagawa Sales of automobile repair parts ¥545 80.61\n\nUS\n\nNissan North America, Inc. Gardena, California Management of North American subsidiaries, $1,791 100.00\n\nmanufacture and sales of automobiles and parts\n\nNissan Motor Acceptance Corporation Torrance California Finance of wholesale and retail automobile sales $499 100.00\n\nin US\n\nNissan Motor Corporation Honolulu, Hawaii Sales of automobiles and parts $6 100.00\n\nin Hawaii, Ltd.\n\nNissan Capital of America, Inc. Torrance, California Financing for group companies $1 100.00\n\nNissan Technical Center Farmington Hills Research and development, testing $16 100.00\n\nNorth America, Inc. Michigan\n\nNissan Motor Insurance Corporation Honolulu, Hawaii Casualty insurance $10 100.00\n\nNissan Forklift Co., North America Marengo, Illinois Manufacture and sales of forklifts and parts $34 100.00\n\nCanada\n\nNissan Canada, Inc. Mississauga, Ontario Sales of automobiles and parts CAN$68 100.00\n\nMexico\n\nNissan Mexicana, S.A. de C.V. Mexico D.F. Manufacture and sales of automobiles and parts P17,056 100.00\n\n### INFORMATION ON SUBSIDIARIES AND AFFILIATES\n\n**106**\n\nCORPORATE DATA", - "page_start": 107, - "page_end": 107, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Share Performance in Fiscal 2004**\n\nNissan’s share price began at ¥1,143 at the beginning\n\nof fiscal 2004 and ended the fiscal year at ¥1,099,\n\ngenerating a negative return of 3.85 percent. Total\n\nshareholder return (TSR) was -1.67 percent, while the\n\ndividend yield came to 2.18 percent (¥24 per share dividend,\n\ndivided by the ¥1,099 closing price). Adverse movements\n\nin foreign exchange rates and commodity price hikes\n\nadversely affected Nissan’s profitability, which was reflected\n\nin the share price. In addition, specific events relating\n\ndirectly to the company also had a negative impact. Later in\n\nthis report, corporate officers will explain what actions\n\nNissan has undertaken to ensure better performance.\n\n**Payout Policy**\n\nNissan announced its NISSAN Value-Up three-year dividend\n\npolicy, covering the period from fiscal 2005 to fiscal 2007, at\n\nthe annual general meeting of shareholders on June 23,\n\n2004. Nissan proposes a long-term dividend policy to\n\nprovide more visibility and improve transparency into the\n\nways in which Nissan rewards its shareholders. Nissan\n\nbelieves that a long-term dividend policy reduces uncertainty\n\nfor investors who already own or are considering acquiring\n\nNissan stock.\n\n**IR Activities**\n\nUnder NISSAN Value-Up, the IR team’s performance will\n\nbe evaluated based on the price-earnings ratio (PER) and\n\nvolatility relative to our major competitors. PER is used to\n\nmeasure how successfully the IR team manages market\n\nexpectations about Nissan in order to maintain the Nissan\n\nshare price close to an intrinsic value. The other measure,\n\nvolatility, is used to measure the risk investors perceive\n\nwhen considering Nissan stock. If Nissan can successfully\n\nreduce volatility, the minimum return required by investors\n\nshould decline. The IR team believes that a strengthening\n\nof disclosure activities is required to improve both\n\nmeasures. The team plans to disclose not only financial\n\nresults but also more forward-looking information about\n\nNissan fundamentals such as technology and product.\n\nSuch forward-looking information helps investors to\n\nforecast future performance more precisely and reduces\n\nuncertainty about the future. As a consequence, Nissan will\n\nincrease the number of investor conferences, events, and\n\nteleconferences during fiscal 2005.\n\nP E R F O R M A N C E\n\n### FISCAL YEAR 2004 SHARE PERFORMANCE\n\nDESPITE NISSAN’S RECORD OPERATING RESULT IN FISCAL 2004, ITS STOCK PERFORMANCE RETURN WAS\n\nNEGATIVE AND LOWER THAN THE TOPIX INDEX. THE INVESTOR RELATIONS TEAM WAS STRENGTHENED\n\nAT THE START OF FISCAL 2005 TO BETTER ADDRESS THE NEEDS OF INVESTORS AND ENHANCE THEIR\n\nUNDERSTANDING OF NISSAN’S PERFORMANCE. INVESTORS WILL NOW BE ABLE TO GAIN A MORE IN-DEPTH\n\nVIEW OF THE COMPANY’S OPERATIONS AND PERFORMANCE INDICATORS.\n\n120\n\n110\n\n100\n\n90\n\n80 <sup>Apr.</sup> **2004 2005**\n\nMay June July Aug. Sept Oct. Nov Dec. Jan. Feb Mar.\n\nTOPIX Transportation Equipment Index Nissan\n\nTOPIX\n\n**Fiscal Year 2004 Share Performance**\n\n(Index: April 1, 2004=100)\n\n400\n\n300\n\n200\n\n100\n\n0 **’01 ’02 ’03 ’04 ’05**\n\nTOPIX Transportation Equipment Index\n\nNissan\n\nTOPIX\n\n**Five-Year Share Performance**\n\n(Index: April 3, 2000=100)", - "page_start": 16, - "page_end": 16, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "## OUR WORLD\n\nO U R W O R L D\n\nNISSAN HAS A GLOBAL PRESENCE. BORN IN JAPAN, WE ARE PERFECTLY\n\nAT HOME IN THE U.S., THE UK, SPAIN, THAILAND, CHINA, EGYPT, BRAZIL\n\nAND WELL OVER 150 OTHER NATIONS WHERE NISSAN CARS AND\n\nTHEIR COMPONENT PARTS ARE PRODUCED, SOLD AND DRIVEN.\n\nWITH NISSAN, DRIVING PLEASURE IS A SENSATION THAT KNOWS NO BORDERS.\n\nTHIS IS THE NISSAN SHIFT_", - "page_start": 59, - "page_end": 59, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Lawsuits and Claims\n\nWith respect to various lawsuits and claims which Nissan encounters, the\n\npossibility exists that the position defended by Nissan will not be accepted\n\nand that the outcome may be significantly different from that anticipated.\n\nAs a result, any such verdict or settlement could adversely affect Nissan’s\n\nfinancial position and operating results.\n\nGovernment Regulations\n\nThe automobile industry worldwide is influenced by a broad spectrum of\n\nregulations governing the emission levels of exhaust fumes, fuel economy\n\nguidelines, noise level limitations and safety standards, and Nissan expects\n\nthese regulations to become increasingly stringent. In order to ensure\n\ncompliance, it may be necessary for Nissan to make significant ongoing\n\ninvestments in these areas which would have an impact on its financial\n\nposition and results of operations.\n\nIntellectual Property Rights\n\nNissan owns a wide variety of proprietary technologies and has the\n\nexpertise to differentiate Nissan’s products making them unique from\n\nthose of its competitors. These assets have proven their value in the\n\ngrowth of Nissan’s business and will, no doubt, continue to be of value in\n\nthe future. Nissan strives to protect its intellectual property assets;\n\nhowever, in certain markets, Nissan may encounter difficulty in fully\n\nprotecting the proprietary rights to its own technologies. Cases may arise\n\nwhere Nissan finds itself unable to prohibit others from infringing on its\n\nintellectual property rights.\n\nThe Company has established Intellectual Property Rights Management\n\nDepartment for the purpose of protecting intellectual property rights in\n\nspecific areas, strengthening activities to protect Nissan’s intellectual\n\nproperty rights, and abstracting new intellectual property rights. And the\n\ndepartment has been performing various activities to protect and create\n\nNissan Brand.\n\nNatural Disasters\n\nNissan’s corporate headquarters and many of its manufacturing facilities\n\nare located in Japan, where the statistically proven probability of\n\nearthquakes is higher than in many other countries. Nissan has developed\n\nrisk management guidelines relating to earthquake damage and the CEO\n\nhas organized a global task force to direct disaster prevention and recovery\n\nactivities. In addition, the Gruop has begun to strengthen its manufacturing\n\nfacilities with anti-seismic reinforcement. However, if a severe earthquake\n\nwere to hit one of Nissan’s key facilities causing a halt in production, this\n\nwould adversely affect Nissan’s financial position and results of operations.\n\nSales Financing Business Risk\n\nSales financing is an integral part of Nissan’s core business, providing\n\nstrong support to its automotive sales, while maintaining high profitability\n\nand a sound and stable financial condition through strict risk management\n\npolicies. However, the sales financing companies have a high exposure to\n\ninterest-rate risk, residual value risk, and credit risk, any one of which may\n\nadversely affect Nissan’s financial position and results of operations.\n\nCounterparty Credit Risk\n\nNissan does business with a variety of counterparties and manages its\n\ncounterparty credit risk by conducting a comprehensive annual assessment of\n\nits customers’ financial condition based on their financial information.\n\nNonetheless, any significant default by a counterparty would adversely\n\naffect Nissan’s financial position and results of operations.\n\nEmployee Retirement Benefit Expenses and Obligations\n\nThe amount of retirement Nissan’s benefit obligation and related expenses\n\nare calculated using various actuarial assumptions including the discount\n\nrate applied, the projected rate of return on plan assets, and so forth. If\n\nNissan’s actual results differ from those assumptions or if the assumptions\n\nare changed, the resulting effects will be accumulated and recognized\n\nsystematically over future periods. The cumulative effect could adversely", - "page_start": 72, - "page_end": 72, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "declining sales as a result. Still, we do see potential in new\n\nareas within the market. For example, we increased the\n\nnumber of women employed as “carlife” advisors and\n\ntechnical advisors. We did this to put both women and older\n\ncustomers at ease when they have sales and service\n\nissues. Both types of advisors are important to our sales\n\nand service at a dealership because they make the process\n\nmore transparent and understandable. Service is a very\n\nprofitable part of business in Japan, so taking ours to the\n\nnext level is crucial.\n\nWe have two plans to expand sales in a flat market.\n\nThe first is to develop a more efficient marketing strategy\n\nthat is aligned with our quality products. The second is to\n\nbuild a more efficient dealership network, which will boost\n\ncustomer satisfaction. If we succeed at these, we can raise\n\nboth our sales and our customer retention rate.\n\nOur dealers are reporting that the quality of our\n\nvehicles has improved greatly. We knew this from the\n\nupstream side, but it means a great deal to get\n\nconfirmation from the market. Quality is always a risk factor\n\nin Japan; consumers here are unforgiving about quality\n\nproblems. The Internet has accelerated the ability to share\n\ninformation, both good and bad, so the level and rate of\n\ninformation from dealers and consumers have gone up\n\naccordingly. Meanwhile, even prices for used Nissan\n\nvehicles are improving steadily, a major indication that the\n\nNissan brand is recognized and valued.\n\nOur home market is of prime importance to Nissan.\n\nJapan is a major contributor to our total profit, and we will\n\ncontinue to make the upgrades in quality, products and\n\nservice needed to drive sales and profit higher.”\n\n### JAPAN\n\n“Nissan’s performance in\n\nJapan in 2004 was solid.\n\nProfit rose 1.4 percent and\n\nour market share went up\n\n0.4 percent to 14.6 percent.\n\nLaunching six new models in\n\nthe second half boosted our\n\nresults dramatically: we\n\nregistered a 1.1 percent\n\nincrease in market share\n\nover the previous period.\n\nAnd for the first time in 19\n\nyears we had four cars—the Tiida, Note, March and\n\nCube—in the top ten.\n\nOur steady growth has continued into 2005,\n\npowered by positive customer response to both the\n\nMurano and Tiida. These are the kinds of attractive,\n\nunique products that have an immediate impact on\n\nconsumers. We’ve also strengthened our position\n\nin the important small car market, and plan to\n\naugment that with the launch of the Otti, an OEM\n\nproject with Mitsubishi, and the Moco, an OEM\n\nproduct with Suzuki. While we do need to raise our\n\ngame in the SUV market, our overall coverage has\n\nimproved recently.\n\nWe’ve set an ambitious sales target of 933,000 vehicles\n\nfor 2005, which represents an increase of 10 percent. I’m\n\nconfident that we can achieve this because of the strength\n\nof our product lineup. The recently released Serena\n\nunderwent a full model change, for example, which should\n\ngive us more muscle in the minivan market. We also\n\nrecently decided to offer our entire lineup through both our\n\nblue and red sales channels, so customers will be able to\n\nsee every model at any outlet they visit. This is in stark\n\ncontrast to the traditional dealership system in Japan,\n\nwhich has many different sales channels.\n\nThe aging of the population has made the automotive\n\nmarket in Japan much tougher, and we expect flat or even\n\n**Driving Ahead in a Flat Market**\n\nKAZUHIKO TOIDA\n\nSenior Vice President\n\nO U R W O R L D\n\nTIIDA SERENA", - "page_start": 61, - "page_end": 61, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**2**\n\n## LETTER FROM THE PRESIDENT AND CEO\n\nA public company has two key responsibilities to its\n\nshareholders: transparency and value creation.\n\nAt Nissan, transparency is essential to our business.\n\nEspecially in uncertain times, it builds trust between a\n\ncompany and its shareholders. And we believe\n\ntransparency is the best way to encourage long-term\n\ninvestment in our company.\n\nBut transparency is not yet universal. Nissan is still one\n\nof the few large corporations that publicly disclose future\n\nbusiness plans, performance indicators, commitments and\n\nfuture dividends. We trust that these measures give\n\nshareholders a clear view of our company’s future direction.\n\nFrom the start of the Nissan Revival Plan (NRP) in\n\n1999, we have created value by focusing on key value\n\ndrivers—particularly sales growth, operating profit margin,\n\nand return on invested capital.\n\nBy the end of fiscal 2001 we exceeded our NRP\n\ncommitments by returning Nissan to profit one year ahead\n\nof schedule, halving the company’s debt and over-delivering\n\non our commitment to achieve a 4.5 percent operating\n\nprofit margin.\n\nFollowing NRP, we launched a three-year business\n\nplan called NISSAN 180. By the end of the plan in fiscal\n\n2004, we committed to achieve the following:\n\n- An increase in global sales of 1 million units,\n\ncompared to the start of the plan. We are confident of\n\nmeeting this final commitment by the end of the\n\nmeasurement period in September 2005.\n\n- An 8 percent operating profit margin. For every year\n\nof the NISSAN 180 plan our operating margin has\n\nbeen at or above 10 percent topping the performance\n\nof all global automakers.\n\n- Zero net automotive debt. We now have more than\n\n¥200 billion in net cash under the new and more\n\ndemanding accounting standards.\n\nReview of 2004\n\nNissan lived up to its challenges in fiscal 2004, despite a\n\nvery challenging year in the global industry, full of risks\n\nboth anticipated and unexpected.\n\nConsolidated net revenues reached ¥8 trillion 576.3\n\nbillion, up 15.4 percent from last year. Consolidated\n\noperating profit improved by 4.4 percent to a record ¥861.2\n\nbillion. As a percentage of net revenue, our operating profit\n\nmargin came to 10 percent, which remains at the top level\n\namong global automakers. And our net income reached\n\n¥512.3 billion, or ¥125.16 per share, compared to ¥122.02\n\nper share for the previous fiscal year.\n\nNISSAN Value-Up\n\nThe Nissan revival story is now complete. Our next\n\nthree-year business plan, ‘NISSAN Value-Up,’ is focused,\n\nas its name suggests, on delivering sustainable long-term\n\nvalue to all our stakeholders. As such, it is evolutionary\n\nnot revolutionary.\n\nAs with our previous business plans, NISSAN Value-Up\n\nestablishes three core commitments. They are ambitious,\n\nand will require us to stretch our capabilities. But they\n\nare realistic.\n\nProfit: Nissan will maintain the top level of operating\n\nprofit margin among global automakers for each of the\n\nthree years of the plan. Operating profit remains at the\n\ncenter of our management system, as it is the most\n\naccurate measure of business performance.\n\nLETTER FROM CEO", - "page_start": 3, - "page_end": 3, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**4**\n\n## LETTER FROM THE COO\n\nMuch has been written about the Nissan revival. While\n\ninnovative product, an improved cost base, greater\n\nmanufacturing efficiencies and a better-defined brand have all\n\nbeen factors, the strongest element in our revival has been our\n\npeople. And, what we learned during the crisis in the 90s and\n\nthrough the Nissan Revival Plan and Nissan 180 plan, now\n\nguides how we will manage the company in the future. We call\n\nit the Nissan Management Way. It is both a philosophy and set\n\nof disciplines that guide us at all levels of the organization and\n\nwill help Nissan build on the momentum of the past six years.\n\nAlthough our president and CEO Carlos Ghosn has now\n\ntaken on the same responsibilities at Renault, our basic\n\nmanagement style will not change. As in the past, the\n\nExecutive Committee, chaired by Carlos Ghosn, is still the\n\nhighest decision making authority for strategy and\n\nmanagement policy.\n\nThe COO position I now hold was created to provide an\n\n“operating officer” in the truest sense of the title. As COO my\n\nrole is to assist the CEO by executing the business plan,\n\nmonitoring the Company’s performance and supervising day-\n\nto-day operations. The decisions I make are always based on\n\nthe Nissan Management Way and support the commitments\n\nof the NISSAN Value-Up business plan.\n\nWhat distinguishes the Nissan Management Way is that\n\nwe are both profit-driven and customer-focused, and that we\n\nshare our strategy globally and execute in a cross-functional\n\nway. These cross-functional activities are particularly important\n\nto our success; along with cross-functional thinking, they have\n\nhelped create an organization of singular structure, focus and\n\nculture. In this organization, employees representing each of\n\nNissan’s three axis—regional businesses such as Japan and\n\nU.S., functions such as engineering and manufacturing, and\n\nproducts—are actively encouraged to work together to\n\nmaximize profits and to avoid a ‘silo’ mentality that is only\n\nfocused on their immediate operational group.\n\nFiscal 2005 is a year of immense challenges and\n\nuncertainties, but we have still pushed ahead with an\n\nambitious business plan for this period. As COO, my priority is\n\nto keep a close watch on Nissan’s performance to ensure that\n\nwe deliver our commitments. These include achieving the final\n\nNissan 180 commitment of one million additional vehicles by\n\nthe end of September 2005 and hitting our financial targets\n\nfor fiscal 2005. There is no doubt that we have the strong\n\nleadership and management teams capable of sustaining the\n\nhigh level of performance required to reach these goals.\n\nNissan is now a learning organization. We have fully\n\nintegrated the changes that began during the Nissan Revival\n\nPlan and continue to shape our business in the future. Our\n\nemployees continually seek to build a better Nissan and fortify\n\nthe brand, and are not afraid to speak out on issues and\n\nopenly discuss challenges that face the business. Within the\n\nNissan Management Way, we call that “healthy conflict”— and\n\nit strongly related to our belief in transparency and\n\naccountability. This is the essence of the evolution that\n\ncontinues to empower our company.\n\nOur alliance with Renault also continues to be a source of\n\nimmense strength. We expect to further reinforce the Alliance\n\nand to develop new synergies now that Carlos Ghosn is the\n\nCEO of both companies.\n\nWhile we have the kinds of advantages I have mentioned,\n\nwe also have risks. One of those risks is complacency. During\n\nthe last six years, we have made significant achievements and\n\nconsistently met tough commitments, but countless challenges\n\nremain. Our industry is immensely competitive, our customers\n\nmore demanding than ever and we have no time to rest and\n\ncongratulate ourselves. We need to create a culture where\n\nemployees are always motivated to challenge themselves and\n\nthe company and to create value for all our stakeholders.", - "page_start": 5, - "page_end": 5, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "W H O W E A R E\n\nNISSAN IS ABOUT MEETING UNMET NEEDS, CRAFTING SINGULAR PRODUCTS\n\nAND TRANSFORMING BRAND STRENGTH AND INNOVATION INTO NEW BUSINESS\n\nOPPORTUNITIES. WE ARE NISSAN. WE ARE INFINITI. WE ARE NISSAN LIGHT\n\nCOMMERCIAL VEHICLES, EXPANDING OUR RANGE. WE ARE NISSAN INDUSTRIAL\n\nMACHINERY, LEVERAGING OUR EXPERTISE TO BUILD FORKLIFTS AND MARINE\n\nPRODUCTS. AND WE ARE NISSAN FINANCIAL SERVICES, PROVIDING OUR\n\nCUSTOMERS WITH A COMPREHENSIVE LINEUP OF OFFERINGS.\n\nTHIS IS THE NISSAN SHIFT_\n\n## WHO WE ARE", - "page_start": 17, - "page_end": 17, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Our Alliance with Renault has also provided substantial\n\npurchasing benefits and opportunities. Formed in 2001, the\n\nRenault Nissan Purchasing Organization, or RNPO, now\n\naccounts for over 70 percent of all purchasing for Nissan\n\nand Renault. Nissan will further benefit from RNPO through\n\nthe utilization of Renault supply bases in certain LCCs.\n\nAlthough the turnaround in the Nissan business has\n\nbeen profound, we also recognize that our supplier partners\n\nhave played a significant role. Going forward, we intend to\n\nreinforce those relationships, building value on both sides.\n\nFor example, we are reinvigorating our innovative 3-3-3\n\nengineering program.\n\nWe are also deploying a purchasing process that gets\n\nsuppliers involved earlier and further upstream in the\n\nproduct development process, the concept of ‘project\n\npartners’. This is a program that identifies key technologies\n\nand innovations that require substantial investments from\n\nboth sides. Suppliers will be selected as project partners for\n\na specific area and will work closer with us to develop\n\nlower cost and higher quality solutions. This win-win\n\napproach has already started with interior systems and\n\nchassis development projects.\n\nLast year, we faced several challenges with raw\n\nmaterials. Those risks—both price and supply related—are\n\na factor that we have to recognize and address in the\n\ncoming years. Last year, the pressure was concentrated on\n\nthe supply side, going forward we see an increasingly\n\nchallenging cost environment. Working closely with our key\n\nraw material suppliers as well as parts suppliers and\n\naccelerating our cost reduction countermeasures will be\n\nkey during NISSAN Value-Up.\n\nOur purchasing philosophy at Nissan is focused on\n\nvalue, quality and relationships. We want our purchasing\n\nprocess to be transparent and proactive, and create more\n\nvalue for our suppliers and for the company.”\n\n### PURCHASING\n\n“The evolution that took place in Nissan’s purchasing\n\nactivities during the Nissan Revival Plan, or NRP, and\n\ncontinued through NISSAN 180, will stretch even further\n\nduring NISSAN Value-Up. Why evolution and not\n\nrevolution? Because the shift in purchasing that started\n\nsix years ago was not a single action, it was a mindset\n\nchange that continues to drive all our activities.\n\nPurchasing represents the single largest area of\n\ncost for Nissan. Through the NISSAN Value-Up\n\nbusiness plan, we are determined to drive greater\n\nvalue from our purchasing activities and maintain the\n\nmomentum built over the last six years.\n\nDuring the Nissan Revival Plan years, our focus\n\nwas on catching up with the rest of the industry.\n\nNISSAN 180 was focused on reaching the\n\nbenchmarks set during NRP and now as we enter the\n\nNISSAN Value-Up period, that focus evolves towards\n\nbeing the global cost leader.\n\nOne of the key breakthrough strategies of\n\nNISSAN Value-Up is the focus on new and emerging\n\nmarkets. On the sales side, markets like China, India,\n\nRussia and ASEAN represent significant opportunities\n\nfor Nissan. On the purchasing side, we look at the\n\ncost competitiveness of these new markets and how\n\nwe can increasingly use them to enhance our global\n\ncompetitiveness.\n\nOur strategy for what we call ‘Leading Competitive\n\nCountries’, or LCCs, is to focus on those markets that we\n\nsee as trend leaders in both cost, quality and supply\n\nstability. We will focus first on China and then on ASEAN\n\nnations. This will bring cost advantages for our major\n\nregions, such as Japan, North America and Western\n\nEurope, making us more competitive. We’re also\n\ninvestigating sourcing from Eastern Europe, the Mercosur\n\ntrading zone, and India.\n\n**More value, Higher quality,**\n\n**Win-win partnerships** HIROTO SAIKAWA\n\nExecutive Vice President\n\nO U R W O R K", - "page_start": 49, - "page_end": 49, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "Microscope Manual.pdf", - "query": "How can CEDAR Oil be used with the AY11236 microscope?", - "target_page": 10, - "target_passage": "1. Drop some cedar oil on to the top of the 100x objective when the 100x objective is being used. NOTE: To maintain a good quality image, rotate the turret right and left several times to eliminate bubbles in the cedar oil. 2. After finishing the observation, wipe off the cedar oil. 3. Do not use the 40x objective until you have wiped off all of the cedar oil.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "## **17**\n\n##### **Fig. 1 - Objective Parts**\n\nAdjustable\n\nRing\n\nTightening\n\nRing\n\nMark\n\nSleeve\n\nFront\n\nSleeve\n\n### **OPERATION (cont.)**\n\n6. Adjust the interpupillary distance by using the eyepiece\n\ninterpupillary slide adjustment.\n\n7. Observe using the right eyepiece adjusting the coarse and fine\n\nfocus and adjust the diopter ring until image is clear and sharp.\n\n8. Observe with the left eyepiece and adjust the diopter ring until\n\nimage is clear and sharp.\n\n9. Rotate the fine focus adjustment when using other objectives.\n\nNOTE: This instrument is equipped with patent objectives so\n\nthe precision or parfocalization is very high.\n\n10. If the image is in focus with the 10x objective, you can select\n\nother objectives and observe the specimen even if the fine\n\nadjustment knob has not been used by using the following\n\nmethod (See Fig. 1):\n\n1. Unscrew the 40x or 100x objective and remove from\n\nturret.\n\n2. Remove the mark sleeve.\n\n3. Turn the ring on the objective to adjust its parfocal\n\ndistance.\n\n4. Re-insert the objective and compare with the 10x.\n\n5. Adjust until the 40x and 100x objectives image is clear.\n\n##### **USING THE CEDAR OIL**\n\n1. Drop some cedar oil on to the top of the 100x objective when the\n\n100x objective is being used. NOTE: To maintain a good quality\n\nimage, rotate the turret right and left several times to eliminate\n\nbubbles in the cedar oil.\n\n2. After finishing the observation, wipe off the cedar oil.\n\n3. Do not use the 40x objective until you have wiped off all of the\n\ncedar oil.\n\n### **OPERATION (cont.)**\n\n##### **ADJUSTING THE CONDENSER APERTURE**\n\n1. The numerical aperture of the condenser should match the\n\nnumerical aperture of the objective being used.\n\n2. To make sure that the objectives are imaging properly\n\n(especially the 40x and 100x), follow this procedure:\n\n1. Take off the eyepiece.\n\n2. Look through the eyepiece.\n\n3. The smallest circle or light that you can see is the\n\neyepiece's exit pupil.\n\n4. Adjust the aperture of the iris diaphragm in the\n\ncondenser to 70% or 80% for the best contrast for\n\nobservation (See Fig. 2.).\n\n##### **Fig. 2 - Condenser Diaphram Aperture**\n\nExit Pupil\n\nof Objective\n\nAperture of\n\nDiaphragm\n\n### **TROUBLESHOOTING**\n\n**Problem Possible Cause Solution**\n\n1. Image not clear. 1. Re-position specimen.\n\n| 1.Specimen is in incorrect position. 2. Lens is dirty. 3. Cedar oil not placed on immersion objective. 4. Bubbles in Cedar oil. 5. Cedar oil on 40x objective. 6. Iris diaphragm open too wide. |\n|:---|\n| 1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level. |\n| 1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty. |\n| 1. Specimen is in incorrect position. |\n\n2. Clean lens.\n\n3. Put a drop of Cedar oil on\n\nimmersion objective.\n\n4. Rotate turret several times to\n\neliminate bubbles.\n\n5. Clean 40x objective.\n\n6. Reduce size of iris diaphragm.\n\n1. Re-position condenser.\n\n2. Clean lens.\n\n3. Re-position specimen so it is level.\n\n1. Open iris diaphragm wider.\n\n2. Raise condenser.\n\n3. Clean lens.\n\n1. Re-position specimen.\n\n2. Poor illumination.\n\n3. Illumination not bright.\n\n4. Cannot focus at high\n\nmagnification.\n\n1. Stage is too high. 1. Re-position stage. 5. Objective lenses touch\n\nspecimen.\n\n## **18**", - "page_start": 9, - "page_end": 9, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **5**\n\n### **OPERATION (cont.)**\n\n##### **USING THE 5-HOLE DIAPHRAGM**\n\n1. To obtain the best contrast for observing, match the hole size to\n\nthe objective that is being used to view the specimen.\n\n2. Each hole has a corresponding number from 1 to 5. 1 is the\n\nsmallest hole; 5 is the largest hole.\n\nUse the following guidelines to match the hole number to the\n\nobjective that you have selected:\n\n40x objective: Use #5 hole\n\n10x objective: Use #4 or #3 hole\n\n4x objective: Use #2 or #1 hole\n\n##### **COARSE KNOB ADJUSTMENT - Model AY11240**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut\n\n(See Fig.1).\n\n2. To adjust the knob loosen or tighten the nut.\n\nNOTE: Adjusting the nut too tight will make focusing difficult.\n\nAdjusting the nut too loose will cause the tube to slide.\n\nHeavy-Light Adjustment Nut\n\n##### **Fig. 1- Coarse Adjustment Knob**\n\n7. To clearly see the outline of the\n\nspecimen, rotate the coarse\n\nadjustment knob and lower\n\nthe barrel to the space limiter.\n\n8. Rotate the fine adjustment knob\n\nuntil the image is in sharp focus.\n\nWhen using other objectives, rotate\n\nthe fine focus adjustment until the\n\nimage is in focus.\n\n6. To clearly see the outline of the\n\nspecimen, rotate the coarse\n\nadjustment knob and lower\n\nthe barrel to the space limiter.\n\n7. Rotate the fine adjustment knob\n\nuntil the image is in sharp focus.\n\nWhen using other objectives, rotate\n\nthe fine focus adjustment until the\n\nimage is in focus.\n\n**Model AY11240 Model AY11238**\n\n## **6**\n\n### **MODEL AY11228/AY11232**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11228 and Model AY11232 are designed for\n\nbiological studies such as specimen examination. They can also\n\nbe used for examining bacteria and for general clinical and medical\n\nstudies. Simple design and use is especially useful for school\n\nclassroom instruction.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11228 is a fixed power stereo microscope. It is\n\nconstructed with two optical paths at the same angle. It is\n\nequipped with transmitted illumination and oblique illumination.\n\nBy using this instrument, the user can observe and enlarge the\n\nright side stereo image. BARSKA Model AY11232 is a zoom stereo\n\nmicroscope. The object being viewed is enlarged through two\n\nidentical sized sets of right and left eye lenses. The zoom provides\n\ndifferent magnification and features an inversion system which\n\nallows the image to be viewed normally and right side up.\n\n**Model AY11228 Model AY11232**\n\nDiopter\n\nAdjustment\n\nDiopter\n\nAdjustment\n\nPrism\n\nCap\n\nPrism\n\nCap\n\nEyepiece\n\nStage\n\nLens\n\nStage\n\nVertical Pole\n\nIllumination Controls Rotary Case\n\nIllumination Controls\n\nSpring Clips\n\nSpring Clips\n\nFocus Knob\n\nFocus Knob\n\nMagnification Adjustment Knob\n\nFocus Knob\n\nTightening Knob\n\nOblique Illuminator\n\nOblique Illuminator\n\nLens Housing\n\nEyepiece", - "page_start": 3, - "page_end": 3, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **4**\n\n### **PARTS LIST**\n\n### **OPERATION**\n\n1. Remove components from package.\n\nidentify all parts before assembling.\n\n2. Attach 4x, 10x and 40x objectives\n\nto revolving turret.\n\n3. Place the specimen on the stage and\n\nsecure with spring clips. NOTE: The\n\ncover glass must face upward (the\n\nthinner glass is the cover glass),\n\notherwise when the 40x objective is\n\nused the specimen cannot be\n\nobserved. Observation is best when\n\nthe thickness of the cover glass is\n\n0.1-1.1mm and the cover glass is\n\n0.17mm.\n\n4. Adjust the stand to an angle that\n\nprovides comfortable observation.\n\n5. Rotate and adjust concave mirror to\n\nlight the field of view. **NOTE: Do not**\n\n**reflect the Sun with the mirror.**\n\n**This can cause serious eye injury**\n\n**or permanent eye damage.**\n\n6. Observe the specimen using the\n\nlowest magnification objective first.\n\nThe 4x objective provides a larger\n\nfield of view to search specimen.\n\n1. Remove components from package.\n\nidentify all parts before assembling.\n\n2. Attach 4x, 10x and 40x objectives\n\nto revolving turret. 3. Place the\n\nspecimen on the stage and\n\nsecure with spring clips. NOTE: The\n\ncover glass must face upward (the\n\nthinner glass is the cover glass),\n\notherwise when the 40x objective is\n\nused the specimen cannot be\n\nobserved. Observation is best when\n\nthe thickness of the cover glass is\n\n0.1-1.1mm and the cover glass is\n\n0.17mm.\n\n4. Plug power cord into an electrical\n\noutlet. Turn microscope\n\nlamp ON.\n\n5. Observe the specimen using the\n\nlowest magnification objective\n\nfirst. The 4x objective provides a\n\nlarger field of view to search\n\nspecimen.\n\n**Name**\n\n**Model AY11240**\n\n**Model AY11240 Model AY11238**\n\n**Model AY11238**\n\n**Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x |\n|:---|\n| 10x |\n| 40x (s) |\n\n1\n\nPlain Concave Mirror 1\n\nPlastic Dust Cover 1\n\n10x Wide Field Eyepiece 1\n\nLens Cleaning Tissue 1\n\nSpecification 1\n\nInspection Certificate 1\n\nPacking List 1\n\n1\n\n1\n\n1\n\n**Name Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x |\n|:---|\n| 10x |\n| 40x (s) |\n\n1\n\n10x Wide Field Eyepiece 1\n\nPlastic Dust Cover 1\n\nSpare Bulb 1\n\nLens Cleaning Tissue 1\n\nSpecification 1\n\nInspection Certificate 1\n\nPacking List 1\n\n1\n\n1\n\n1", - "page_start": 2, - "page_end": 2, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **15**\n\n### **SPECIFICATIONS**\n\n1. Length of mechanical tube: 160mm\n\n2. Conjugate distance between object and image: 195mm\n\n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion)\n\n4. Illumination: Input 110V or 200V; Output: 20W\n\n5. Fine adjustment range: .002mm\n\n6. Coarse Adjustment Range: 20mm\n\n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm\n\n8. Condenser Elevation Range: 15mm\n\n9. Iris diaphragm aperture: 2mm-30mm\n\n##### **Objective Specifications**\n\n**Classification Working**\n\n**Distance Magnification Optical**\n\n**System Numerical**\n\n**Aperture**\n\n| Dry | 4x Adjustable Focus | 0.1 |\n|:---|:---|---:|\n| Dry | 10x | 0.25 |\n| Dry | 40x Spring Adjustable Focus | 0.65 |\n\n37.42mm\n\n0.57mm\n\nOil\n\nImmer-\n\nsion\n\n1.25 0.18mm 100x Spring\n\nAdjustable\n\nFocus\n\n7.14mm\n\nAchromatic\n\nObjective\n\nNote: For oil immersion, please use the index of refraction 1.515 oil\n\nPlain Field\n\nEyepiece 10x 18mm\n\n##### **Eyepiece Specifications**\n\n**Classification Magnification Field of View (FOV)**\n\n**Diameter**\n\n10x\n\n40x\n\n100x\n\n400x\n\n4x\n\n10x\n\n40x (s)\n\n1000x 100x (oil,s)\n\n##### **Total Magnification**\n\n**Objective**\n\n**Magnification Eyepiece**\n\n## **16**\n\n### **PARTS LIST**\n\n### **OPERATION**\n\n1. Remove all components from package. Identify all parts before\n\nassembling instrument.\n\n2. Attach 4x, 10x and 40x objectives by screwing into revolving\n\nturret. Tighten and secure to maximum finger pressure only.\n\n3. Place the specimen on the stage and secure with spring clips.\n\nNOTE: The cover glass must face upward (the thinner glass is\n\nthe cover glass), otherwise when the 40x objective is used the\n\nspecimen cannot be observed. Observation is best when the\n\nthickness of the cover glass is 0.1-1.1mm and the cover glass\n\nis 0.17mm.\n\n4. Plug power cord into an electrical outlet. Turn microscope\n\nlamp ON.\n\n5. Observe the specimen using the lowest magnification objective\n\nfirst. The 10x objective provides a larger field of view making it\n\neasier to search the specimen.\n\n**Name Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x (parfocal distance adjustable) |\n|:---|\n| 10x |\n| 40x (s) (parfocal distance adjustable) |\n| 100x (oil,s) (parfocal distance adjustable) |\n\n1\n\n1\n\n2\n\n1\n\n1\n\n1\n\n1\n\n1\n\n10x Wide Field Eyepiece w/Pointer\n\nAbbe Condenser NA1.25\n\nPlastic Dust Cover\n\nLens Cleaning Tissue\n\n1 Cedar Oil\n\n1 1A Fuse (spare)\n\nSpare 6V20W Halogen Bulb\n\nSpecification\n\nInspection Certificate\n\nPacking List\n\n1\n\n1\n\n1\n\n1\n\n1", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "### **IMPORTANT NOTES**\n\nCongratulations on your purchase of this high quality BARSKA\n\nmicroscope. With proper care, this microscope will provide many\n\nyears of use. Please read the following instructions before\n\noperating this instrument.\n\n1. Do not attempt to disassemble the instrument. This product has\n\nbeen carefully assembled at the factory and should only be\n\nexamined by a factory-trained technician.\n\n2. This instrument should only be used in an environment with an\n\nindoor temperature range of 32 <sup>o</sup> F to 104 <sup>o</sup> F.\n\n3. Do not use this instrument in an environment with a lot of dust.\n\n##### **Cover the instrument when not in use.**\n\n4. Do not subject the instrument to shock.\n\nMaintenance............................................\n\nModel AY11240/Model AY11238..................\n\nModel AY11228/Model AY11232..................\n\nModel AY11230/Model AY11234..................\n\nModel AY11236........................................\n\nWarranty Information................................\n\n1\n\n2-5\n\n6-9\n\n10-13\n\n14-18\n\nBack Cover\n\n## **1**\n\n### **MAINTENANCE**\n\nProper care and storage of this instrument is essential. Please read\n\nthe following guidelines:\n\n1. Keep the instrument in a dry and moisture-free location.\n\n2. Do not expose to acid, alkali fumes or moisture.\n\n3. Keep optical parts clean and free of dust. To clean optical parts\n\ngently wipe with lens cleaning tissue and a mixture of alcohol\n\nand diethyl ether. Depending on weather conditions, the\n\nfollowing are the recommended mixture ratios:\n\nWet weather: 1:2\n\nDry Weather: 1:1\n\n4. After use, cover the instrument with the plastic dust cover.\n\n5. If instrument is to be stored for an extended period of time,\n\nremove the eyepiece and oculars and store in a moisture-proof\n\ncontainer.\n\n### **MODEL AY11240/AY11238**\n\n## **2**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11240 and Model AY11238 are designed for\n\nbiological studies such as specimen examination. They can also\n\nbe used for examining bacteria and for general clinical and medical\n\nstudies. Simple design and use is especially useful for school\n\nclassroom instruction.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11240 is a fixed tube type. For comfortable observation, the arm can be easily tilted at any angle from 90 <sup>o</sup> vertical to 45 <sup>o</sup> level. It is also equipped with a coarse adjustment\n\nand fine adjustment as well as a space limiter to protect the\n\nobjective from contacting and damaging the specimen. BARSKA Model AY11238 features a monocular tube that is slanted at a 45 <sup>o</sup>\n\nangle. The head rotates 360 <sup>o</sup> . The Eyepiece Set Screw prevents\n\nthe eyepiece from falling out of the tube.\n\nCoarse Adjustment Knob\n\nFine Adjustment Knob\n\nStand\n\n5-Hole Diaphragm and Condenser Concave Mirror\n\nStage\n\nSpring Clips\n\nObjectives\n\nBarrel\n\nRevolving Turret\n\nEyepiece\n\nCoarse\n\nAdjustment\n\nKnob\n\nFine\n\nAdjustment\n\nKnob\n\nStand\n\n5-Hole\n\nDiaphragm\n\nand Condenser\n\nLamp\n\nOn/Off\n\nSwitch\n\nLamp\n\nPower\n\nCord\n\nStage\n\nSpring\n\nClips\n\nObjectives\n\nRotating Head\n\nRevolving\n\nTurret\n\nEyepiece\n\nStage Height\n\nLimit Adjustment\n\nMonocular Tube Eyepiece\n\nSet Screw\n\n**Model AY11240 Model AY11238**", - "page_start": 1, - "page_end": 1, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "the user can observe specimens at magnification from 40x to\n\n1000x by selecting the desired objective lens. Coarse and fine\n\nfocus adjustments provide accuracy and image detail. The rotating\n\nhead allows the user to position the eyepieces for maximum\n\nviewing comfort and easy access to all adjustment knobs.\n\n**Model AY11236**\n\nFine Adjustment Knob\n\nStage\n\nCondenser Focusing Knob\n\nEyepiece\n\nStand\n\nLamp\n\nOn/Off\n\nSwitch\n\nLamp\n\nPower\n\nCord\n\nRotating Head\n\nStage Clip\n\nAdjustment\n\nInterpupillary Slide Adjustment", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "inversion system which allows the image to be viewed normally\n\nand right side up.\n\n## **10 9**\n\n**Model AY11230 Model AY11234**\n\nDiopter\n\nAdjustment Diopter\n\nAdjustment\n\nPrism\n\nCap\n\nPrism\n\nCap\n\nEyepiece\n\nStage\n\nLens\n\nStage\n\nVertical Tube Vertical Tube\n\nIllumination Controls\n\nRotary Case\n\nSpring Clips Spring Clips\n\nFocus Knob\n\nMagnification Adjustment Knob\n\nFocus Knob\n\nTightening Knob\n\nOblique Illuminator Oblique Illuminator\n\nLens Housing\n\nEyepiece\n\nIllumination Controls", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **13**\n\n**USING THE VERTICAL TUBE -**\n\n**MODELS AY11230/11234**\n\n1. The vertical tube can be used for\n\ninstructional viewing or to\n\nphotograph the image witrh a\n\ndigital camera or micro TV\n\nunit.\n\n2. Loosen the retention screw, then rotate\n\nthe adjustment ring to change the\n\nlength of the vertical tube.\n\n3. Make sure that both the images in\n\n### **OPERATION (cont.)**\n\n**SELECTING OBJECTIVE**\n\n**MAGNIFICATION**\n\n1. There are two objectives. The lower\n\nmagnification objective has a greater\n\ndepth of field and view.\n\n2. In order to observe the specimen\n\neasily use the lower magnification\n\nobjective first. Then, by rotating the\n\ncase, the magnification can be\n\nchanged.\n\n**CHANGING THE INTERPUPILLARY**\n\n**DISTANCE**\n\n1. The distance between the observer's\n\npupils is the interpupillary distance.\n\n2. To adjust the interpupillary distance\n\nrotate the prism caps until both eyes\n\ncoincide with the image in the\n\neyepiece.\n\n**FOCUSING**\n\n1. Remove the lens protective cover.\n\n2. Place the specimen on the working\n\nstage.\n\n3. Focus the specimen with the left eye\n\nfirst while turning the focus knob until\n\nthe image appears clear and sharp.\n\n4. Rotate the right eyepiece ring until the\n\nimages in each eyepiece coincide and\n\nare sharp and clear.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate and\n\nreplace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**FOCUSING**\n\n1. Turn the focusing knob away or toward\n\nyou until a clear image is viewed.\n\n2. If the image is unclear, adjust the\n\nheight of the elevator up or down,\n\nthen turn the focusing knob again.\n\n**ZOOM MAGNIFICATION**\n\n1. Turn the zoom magnification knob to\n\nthe desired magnification and field of\n\nview.\n\n2. In most situations, it is recommended\n\nthat you focus at the lowest\n\nmagnification, then move to a higher\n\nmagnification and re-focus as\n\nnecessary.\n\n3. If the image is not clear to both eyes\n\nat the same time, the diopter ring may\n\nneed adjustment.\n\n**DIOPTER RING ADJUSTMENT**\n\n1. To adjust the eyepiece for viewing with\n\nor without eyeglasses and for\n\ndifferences in acuity between the right\n\nand left eyes, follow the following\n\nsteps:\n\na. Observe an image through the left\n\neyepiece and bring a specific point\n\ninto focus using the focus knob.\n\nb. By turning the diopter ring\n\nadjustment for the left eyepiece,\n\nbring the same point into sharp\n\nfocus.\n\nc.Then bring the same point into\n\nfocus through the right eyepiece\n\nby turning the right diopter ring.\n\nd.With more than one viewer, each\n\nviewer should note their own\n\ndiopter ring position for the left\n\nand right eyepieces, then before\n\nviewing set the diopter ring\n\nadjustments to that setting.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord from the\n\nelectrical outlet.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate\n\nand replace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**Model AY11230 Model AY11234**\n\n## **14**\n\nObjectives\n\nRevolving Turret\n\nCoarse Adjustment Knob\n\n### **MODEL AY11236**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound\n\nmicroscope designed for biological studies such as specimen\n\nexamination. It can also be used for examining bacteria and\n\nfor general clinical and medical studies and other scientific uses.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope.\n\nIt is constructed with two optical paths at the same angle. It is\n\nequipped with transmitted illumination. By using this instrument,\n\nthe user can observe specimens at magnification from 40x to\n\n1000x by selecting the desired objective lens. Coarse and fine\n\nfocus adjustments provide accuracy and image detail. The rotating", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "### **OPERATION (cont.)**\n\n**SELECTING OBJECTIVE**\n\n**MAGNIFICATION**\n\n1. There are two objectives. The lower\n\nmagnification objective has a greater\n\ndepth of field and view.\n\n2. In order to observe the specimen\n\neasily use the lower magnification\n\nobjective first. Then, by rotating the\n\ncase, the magnification can be\n\nchanged.\n\n**CHANGING THE INTERPUPILLARY**\n\n**DISTANCE**\n\n1. The distance between the observer's\n\npupils is the interpupillary distance.\n\n2. To adjust the interpupillary distance\n\nrotate the prism caps until both eyes\n\ncoincide with the image in the\n\neyepiece.\n\n**FOCUSING**\n\n1. Remove the lens protective cover.\n\n2. Place the specimen on the working\n\nstage.\n\n3. Focus the specimen with the left eye\n\nfirst while turning the focus knob until\n\nthe image appears clear and sharp.\n\n4. Rotate the right eyepiece ring until the\n\nimages in each eyepiece coincide and\n\nare sharp and clear.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord from the\n\nelectrical outlet before changing the\n\nbulb.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate and\n\nreplace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**FOCUSING**\n\n1. Turn the focusing knob away or toward\n\nyou until a clear image is viewed.\n\n2. If the image is unclear, adjust the\n\nheight of the elevator up or down,\n\nthen turn the focusing knob again.\n\n**ZOOM MAGNIFICATION**\n\n1. Turn the zoom magnification knob to\n\nthe desired magnification and field of\n\nview.\n\n2. In most situations, it is recommended\n\nthat you focus at the lowest\n\nmagnification, then move to a higher\n\nmagnification and re-focus as\n\nnecessary.\n\n3. If the image is not clear to both eyes\n\nat the same time, the diopter ring may\n\nneed adjustment.\n\n**DIOPTER RING ADJUSTMENT**\n\n1. To adjust the eyepiece for viewing with\n\nor without eyeglasses and for\n\ndifferences in acuity between the right\n\nand left eyes, follow the following\n\nsteps:\n\na. Observe an image through the left\n\neyepiece and bring a specific point\n\ninto focus using the focus knob.\n\nb. By turning the diopter ring\n\nadjustment for the left eyepiece,\n\nbring the same point into sharp\n\nfocus.\n\nc.Then bring the same point into\n\nfocus through the right eyepiece\n\nby turning the right diopter ring.\n\nd.With more than one viewer, each\n\nviewer should note their own\n\ndiopter ring position for the left\n\nand right eyepieces, then before\n\nviewing set the diopter ring\n\nadjustments to that setting.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord from the\n\nelectrical outlet.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate\n\nand replace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**Model AY11228 Model AY11232**\n\n### **MODEL AY11230/AY11234**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular\n\nmicroscopes designed for biological studies such as specimen\n\nexamination. They can also be used for examining bacteria and for\n\ngeneral clinical and medical studies. Simple design and use and the\n\nvertical tube make them is useful for school classroom instruction.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11230 is a fixed power trinocular stereo\n\nmicroscope. It is constructed with two optical paths at the same\n\nangle. It is equipped with transmitted illumination and oblique\n\nillumination. By using this instrument, the user can observe and\n\nenlarge the right side stereo image. BARSKA Model AY11234 is a\n\nzoom trinocular stereo microscope. The object being viewed is\n\nenlarged through two identical sized sets of right and left eye\n\nlenses. The zoom provides different magnification and features an\n\ninversion system which allows the image to be viewed normally\n\nand right side up.\n\n## **10 9**\n\n**Model AY11230 Model AY11234**\n\nDiopter\n\nAdjustment Diopter", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "Annual Report 2004 72\n\nNOTES TO THE FINANCIAL STATEMENTS\n\nfor the year ended 31 December 2004\n\n**23. Interests in Joint Ventures**\n\n(a) Santos Ltd and its controlled entities have combined interests in unincorporated joint ventures in the following major areas:\n\n**Joint venture/area Principal activities Average interest**\n\n**%**\n\nAmadeus Basin\n\nMereenie Oil and gas production 65\n\nMereenie Pipeline Oil transportation 65\n\nPalm Valley Gas production 48\n\nBrowse Basin Oil and gas exploration 74\n\nCarnarvon Basin Oil and gas exploration and production 32\n\nCooper Basin Downstream Liquid hydrocarbon transportation and processing 65\n\nCooper Basin Unit\n\nSouth Australia Oil and gas production 65\n\nQueensland Oil and gas production 60\n\nCooper/Eromanga Basins\n\nSouth Australia Oil and gas exploration and production 65\n\nQueensland, ATP 259P Oil and gas exploration and production 60\n\nOther Eromanga Oil and gas exploration and production 74\n\nJackson Moonie Pipeline Oil transportation 83\n\nEastern Queensland\n\nBowen Basin Gas exploration and production 50\n\nSurat Basin Oil and gas exploration and production 48\n\nEgypt\n\nGulf of Suez Oil and gas exploration 50\n\nGippsland Basin Oil and gas exploration and production 35\n\nIndonesia\n\nEast Java Basin Oil and gas exploration and production 42\n\nKutei Basin Oil and gas exploration 35\n\nWest Natuna Basin Oil and gas exploration and production 6\n\nWest Papua Oil and gas exploration 20\n\nOffshore Northern Australia\n\nBonaparte Basin Oil and gas exploration 95\n\nHoutman Basin Oil and gas exploration 42\n\nTimor Gap Oil and gas exploration and production 17\n\nTimor Sea Oil and gas exploration and production 22\n\nOtway Basin Oil and gas exploration and production 36\n\nPapua New Guinea\n\nPDL1 (Part Hides Field) Oil and gas exploration 31\n\nOther interests Oil and gas exploration and production 31\n\nSorell Basin Oil and gas exploration 58\n\nUSA\n\nGulf Coast Oil and gas exploration and production 39\n\nRocky Mountains Oil and gas exploration and production 50\n\n(b) The sales revenue received from the Santos Group’s share of petroleum products produced by the joint ventures is $1,493.5 million\n\n(2003: $1,451.2 million) and the contribution of joint venture business undertakings to profit from ordinary activities before interest and tax\n\nof the Santos Group is $581.3 million (2003: $496.7 million).", - "page_start": 73, - "page_end": 73, - "source_file": "ASX_STO_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "Microscope Manual.pdf", - "query": "For the AY11230 microscope, what is the interpupillary adjustment?", - "target_page": 7, - "target_passage": "Model AY11230 1. Interpupillary Adjustment: 55mm - 75mm", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "the user can observe specimens at magnification from 40x to\n\n1000x by selecting the desired objective lens. Coarse and fine\n\nfocus adjustments provide accuracy and image detail. The rotating\n\nhead allows the user to position the eyepieces for maximum\n\nviewing comfort and easy access to all adjustment knobs.\n\n**Model AY11236**\n\nFine Adjustment Knob\n\nStage\n\nCondenser Focusing Knob\n\nEyepiece\n\nStand\n\nLamp\n\nOn/Off\n\nSwitch\n\nLamp\n\nPower\n\nCord\n\nRotating Head\n\nStage Clip\n\nAdjustment\n\nInterpupillary Slide Adjustment", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **5**\n\n### **OPERATION (cont.)**\n\n##### **USING THE 5-HOLE DIAPHRAGM**\n\n1. To obtain the best contrast for observing, match the hole size to\n\nthe objective that is being used to view the specimen.\n\n2. Each hole has a corresponding number from 1 to 5. 1 is the\n\nsmallest hole; 5 is the largest hole.\n\nUse the following guidelines to match the hole number to the\n\nobjective that you have selected:\n\n40x objective: Use #5 hole\n\n10x objective: Use #4 or #3 hole\n\n4x objective: Use #2 or #1 hole\n\n##### **COARSE KNOB ADJUSTMENT - Model AY11240**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut\n\n(See Fig.1).\n\n2. To adjust the knob loosen or tighten the nut.\n\nNOTE: Adjusting the nut too tight will make focusing difficult.\n\nAdjusting the nut too loose will cause the tube to slide.\n\nHeavy-Light Adjustment Nut\n\n##### **Fig. 1- Coarse Adjustment Knob**\n\n7. To clearly see the outline of the\n\nspecimen, rotate the coarse\n\nadjustment knob and lower\n\nthe barrel to the space limiter.\n\n8. Rotate the fine adjustment knob\n\nuntil the image is in sharp focus.\n\nWhen using other objectives, rotate\n\nthe fine focus adjustment until the\n\nimage is in focus.\n\n6. To clearly see the outline of the\n\nspecimen, rotate the coarse\n\nadjustment knob and lower\n\nthe barrel to the space limiter.\n\n7. Rotate the fine adjustment knob\n\nuntil the image is in sharp focus.\n\nWhen using other objectives, rotate\n\nthe fine focus adjustment until the\n\nimage is in focus.\n\n**Model AY11240 Model AY11238**\n\n## **6**\n\n### **MODEL AY11228/AY11232**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11228 and Model AY11232 are designed for\n\nbiological studies such as specimen examination. They can also\n\nbe used for examining bacteria and for general clinical and medical\n\nstudies. Simple design and use is especially useful for school\n\nclassroom instruction.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11228 is a fixed power stereo microscope. It is\n\nconstructed with two optical paths at the same angle. It is\n\nequipped with transmitted illumination and oblique illumination.\n\nBy using this instrument, the user can observe and enlarge the\n\nright side stereo image. BARSKA Model AY11232 is a zoom stereo\n\nmicroscope. The object being viewed is enlarged through two\n\nidentical sized sets of right and left eye lenses. The zoom provides\n\ndifferent magnification and features an inversion system which\n\nallows the image to be viewed normally and right side up.\n\n**Model AY11228 Model AY11232**\n\nDiopter\n\nAdjustment\n\nDiopter\n\nAdjustment\n\nPrism\n\nCap\n\nPrism\n\nCap\n\nEyepiece\n\nStage\n\nLens\n\nStage\n\nVertical Pole\n\nIllumination Controls Rotary Case\n\nIllumination Controls\n\nSpring Clips\n\nSpring Clips\n\nFocus Knob\n\nFocus Knob\n\nMagnification Adjustment Knob\n\nFocus Knob\n\nTightening Knob\n\nOblique Illuminator\n\nOblique Illuminator\n\nLens Housing\n\nEyepiece", - "page_start": 3, - "page_end": 3, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "inversion system which allows the image to be viewed normally\n\nand right side up.\n\n## **10 9**\n\n**Model AY11230 Model AY11234**\n\nDiopter\n\nAdjustment Diopter\n\nAdjustment\n\nPrism\n\nCap\n\nPrism\n\nCap\n\nEyepiece\n\nStage\n\nLens\n\nStage\n\nVertical Tube Vertical Tube\n\nIllumination Controls\n\nRotary Case\n\nSpring Clips Spring Clips\n\nFocus Knob\n\nMagnification Adjustment Knob\n\nFocus Knob\n\nTightening Knob\n\nOblique Illuminator Oblique Illuminator\n\nLens Housing\n\nEyepiece\n\nIllumination Controls", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **13**\n\n**USING THE VERTICAL TUBE -**\n\n**MODELS AY11230/11234**\n\n1. The vertical tube can be used for\n\ninstructional viewing or to\n\nphotograph the image witrh a\n\ndigital camera or micro TV\n\nunit.\n\n2. Loosen the retention screw, then rotate\n\nthe adjustment ring to change the\n\nlength of the vertical tube.\n\n3. Make sure that both the images in\n\n### **OPERATION (cont.)**\n\n**SELECTING OBJECTIVE**\n\n**MAGNIFICATION**\n\n1. There are two objectives. The lower\n\nmagnification objective has a greater\n\ndepth of field and view.\n\n2. In order to observe the specimen\n\neasily use the lower magnification\n\nobjective first. Then, by rotating the\n\ncase, the magnification can be\n\nchanged.\n\n**CHANGING THE INTERPUPILLARY**\n\n**DISTANCE**\n\n1. The distance between the observer's\n\npupils is the interpupillary distance.\n\n2. To adjust the interpupillary distance\n\nrotate the prism caps until both eyes\n\ncoincide with the image in the\n\neyepiece.\n\n**FOCUSING**\n\n1. Remove the lens protective cover.\n\n2. Place the specimen on the working\n\nstage.\n\n3. Focus the specimen with the left eye\n\nfirst while turning the focus knob until\n\nthe image appears clear and sharp.\n\n4. Rotate the right eyepiece ring until the\n\nimages in each eyepiece coincide and\n\nare sharp and clear.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate and\n\nreplace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**FOCUSING**\n\n1. Turn the focusing knob away or toward\n\nyou until a clear image is viewed.\n\n2. If the image is unclear, adjust the\n\nheight of the elevator up or down,\n\nthen turn the focusing knob again.\n\n**ZOOM MAGNIFICATION**\n\n1. Turn the zoom magnification knob to\n\nthe desired magnification and field of\n\nview.\n\n2. In most situations, it is recommended\n\nthat you focus at the lowest\n\nmagnification, then move to a higher\n\nmagnification and re-focus as\n\nnecessary.\n\n3. If the image is not clear to both eyes\n\nat the same time, the diopter ring may\n\nneed adjustment.\n\n**DIOPTER RING ADJUSTMENT**\n\n1. To adjust the eyepiece for viewing with\n\nor without eyeglasses and for\n\ndifferences in acuity between the right\n\nand left eyes, follow the following\n\nsteps:\n\na. Observe an image through the left\n\neyepiece and bring a specific point\n\ninto focus using the focus knob.\n\nb. By turning the diopter ring\n\nadjustment for the left eyepiece,\n\nbring the same point into sharp\n\nfocus.\n\nc.Then bring the same point into\n\nfocus through the right eyepiece\n\nby turning the right diopter ring.\n\nd.With more than one viewer, each\n\nviewer should note their own\n\ndiopter ring position for the left\n\nand right eyepieces, then before\n\nviewing set the diopter ring\n\nadjustments to that setting.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord from the\n\nelectrical outlet.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate\n\nand replace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**Model AY11230 Model AY11234**\n\n## **14**\n\nObjectives\n\nRevolving Turret\n\nCoarse Adjustment Knob\n\n### **MODEL AY11236**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound\n\nmicroscope designed for biological studies such as specimen\n\nexamination. It can also be used for examining bacteria and\n\nfor general clinical and medical studies and other scientific uses.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope.\n\nIt is constructed with two optical paths at the same angle. It is\n\nequipped with transmitted illumination. By using this instrument,\n\nthe user can observe specimens at magnification from 40x to\n\n1000x by selecting the desired objective lens. Coarse and fine\n\nfocus adjustments provide accuracy and image detail. The rotating", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "### **OPERATION (cont.)**\n\n**SELECTING OBJECTIVE**\n\n**MAGNIFICATION**\n\n1. There are two objectives. The lower\n\nmagnification objective has a greater\n\ndepth of field and view.\n\n2. In order to observe the specimen\n\neasily use the lower magnification\n\nobjective first. Then, by rotating the\n\ncase, the magnification can be\n\nchanged.\n\n**CHANGING THE INTERPUPILLARY**\n\n**DISTANCE**\n\n1. The distance between the observer's\n\npupils is the interpupillary distance.\n\n2. To adjust the interpupillary distance\n\nrotate the prism caps until both eyes\n\ncoincide with the image in the\n\neyepiece.\n\n**FOCUSING**\n\n1. Remove the lens protective cover.\n\n2. Place the specimen on the working\n\nstage.\n\n3. Focus the specimen with the left eye\n\nfirst while turning the focus knob until\n\nthe image appears clear and sharp.\n\n4. Rotate the right eyepiece ring until the\n\nimages in each eyepiece coincide and\n\nare sharp and clear.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord from the\n\nelectrical outlet before changing the\n\nbulb.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate and\n\nreplace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**FOCUSING**\n\n1. Turn the focusing knob away or toward\n\nyou until a clear image is viewed.\n\n2. If the image is unclear, adjust the\n\nheight of the elevator up or down,\n\nthen turn the focusing knob again.\n\n**ZOOM MAGNIFICATION**\n\n1. Turn the zoom magnification knob to\n\nthe desired magnification and field of\n\nview.\n\n2. In most situations, it is recommended\n\nthat you focus at the lowest\n\nmagnification, then move to a higher\n\nmagnification and re-focus as\n\nnecessary.\n\n3. If the image is not clear to both eyes\n\nat the same time, the diopter ring may\n\nneed adjustment.\n\n**DIOPTER RING ADJUSTMENT**\n\n1. To adjust the eyepiece for viewing with\n\nor without eyeglasses and for\n\ndifferences in acuity between the right\n\nand left eyes, follow the following\n\nsteps:\n\na. Observe an image through the left\n\neyepiece and bring a specific point\n\ninto focus using the focus knob.\n\nb. By turning the diopter ring\n\nadjustment for the left eyepiece,\n\nbring the same point into sharp\n\nfocus.\n\nc.Then bring the same point into\n\nfocus through the right eyepiece\n\nby turning the right diopter ring.\n\nd.With more than one viewer, each\n\nviewer should note their own\n\ndiopter ring position for the left\n\nand right eyepieces, then before\n\nviewing set the diopter ring\n\nadjustments to that setting.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord from the\n\nelectrical outlet.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate\n\nand replace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**Model AY11228 Model AY11232**\n\n### **MODEL AY11230/AY11234**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular\n\nmicroscopes designed for biological studies such as specimen\n\nexamination. They can also be used for examining bacteria and for\n\ngeneral clinical and medical studies. Simple design and use and the\n\nvertical tube make them is useful for school classroom instruction.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11230 is a fixed power trinocular stereo\n\nmicroscope. It is constructed with two optical paths at the same\n\nangle. It is equipped with transmitted illumination and oblique\n\nillumination. By using this instrument, the user can observe and\n\nenlarge the right side stereo image. BARSKA Model AY11234 is a\n\nzoom trinocular stereo microscope. The object being viewed is\n\nenlarged through two identical sized sets of right and left eye\n\nlenses. The zoom provides different magnification and features an\n\ninversion system which allows the image to be viewed normally\n\nand right side up.\n\n## **10 9**\n\n**Model AY11230 Model AY11234**\n\nDiopter\n\nAdjustment Diopter", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **17**\n\n##### **Fig. 1 - Objective Parts**\n\nAdjustable\n\nRing\n\nTightening\n\nRing\n\nMark\n\nSleeve\n\nFront\n\nSleeve\n\n### **OPERATION (cont.)**\n\n6. Adjust the interpupillary distance by using the eyepiece\n\ninterpupillary slide adjustment.\n\n7. Observe using the right eyepiece adjusting the coarse and fine\n\nfocus and adjust the diopter ring until image is clear and sharp.\n\n8. Observe with the left eyepiece and adjust the diopter ring until\n\nimage is clear and sharp.\n\n9. Rotate the fine focus adjustment when using other objectives.\n\nNOTE: This instrument is equipped with patent objectives so\n\nthe precision or parfocalization is very high.\n\n10. If the image is in focus with the 10x objective, you can select\n\nother objectives and observe the specimen even if the fine\n\nadjustment knob has not been used by using the following\n\nmethod (See Fig. 1):\n\n1. Unscrew the 40x or 100x objective and remove from\n\nturret.\n\n2. Remove the mark sleeve.\n\n3. Turn the ring on the objective to adjust its parfocal\n\ndistance.\n\n4. Re-insert the objective and compare with the 10x.\n\n5. Adjust until the 40x and 100x objectives image is clear.\n\n##### **USING THE CEDAR OIL**\n\n1. Drop some cedar oil on to the top of the 100x objective when the\n\n100x objective is being used. NOTE: To maintain a good quality\n\nimage, rotate the turret right and left several times to eliminate\n\nbubbles in the cedar oil.\n\n2. After finishing the observation, wipe off the cedar oil.\n\n3. Do not use the 40x objective until you have wiped off all of the\n\ncedar oil.\n\n### **OPERATION (cont.)**\n\n##### **ADJUSTING THE CONDENSER APERTURE**\n\n1. The numerical aperture of the condenser should match the\n\nnumerical aperture of the objective being used.\n\n2. To make sure that the objectives are imaging properly\n\n(especially the 40x and 100x), follow this procedure:\n\n1. Take off the eyepiece.\n\n2. Look through the eyepiece.\n\n3. The smallest circle or light that you can see is the\n\neyepiece's exit pupil.\n\n4. Adjust the aperture of the iris diaphragm in the\n\ncondenser to 70% or 80% for the best contrast for\n\nobservation (See Fig. 2.).\n\n##### **Fig. 2 - Condenser Diaphram Aperture**\n\nExit Pupil\n\nof Objective\n\nAperture of\n\nDiaphragm\n\n### **TROUBLESHOOTING**\n\n**Problem Possible Cause Solution**\n\n1. Image not clear. 1. Re-position specimen.\n\n| 1.Specimen is in incorrect position. 2. Lens is dirty. 3. Cedar oil not placed on immersion objective. 4. Bubbles in Cedar oil. 5. Cedar oil on 40x objective. 6. Iris diaphragm open too wide. |\n|:---|\n| 1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level. |\n| 1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty. |\n| 1. Specimen is in incorrect position. |\n\n2. Clean lens.\n\n3. Put a drop of Cedar oil on\n\nimmersion objective.\n\n4. Rotate turret several times to\n\neliminate bubbles.\n\n5. Clean 40x objective.\n\n6. Reduce size of iris diaphragm.\n\n1. Re-position condenser.\n\n2. Clean lens.\n\n3. Re-position specimen so it is level.\n\n1. Open iris diaphragm wider.\n\n2. Raise condenser.\n\n3. Clean lens.\n\n1. Re-position specimen.\n\n2. Poor illumination.\n\n3. Illumination not bright.\n\n4. Cannot focus at high\n\nmagnification.\n\n1. Stage is too high. 1. Re-position stage. 5. Objective lenses touch\n\nspecimen.\n\n## **18**", - "page_start": 9, - "page_end": 9, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "### **IMPORTANT NOTES**\n\nCongratulations on your purchase of this high quality BARSKA\n\nmicroscope. With proper care, this microscope will provide many\n\nyears of use. Please read the following instructions before\n\noperating this instrument.\n\n1. Do not attempt to disassemble the instrument. This product has\n\nbeen carefully assembled at the factory and should only be\n\nexamined by a factory-trained technician.\n\n2. This instrument should only be used in an environment with an\n\nindoor temperature range of 32 <sup>o</sup> F to 104 <sup>o</sup> F.\n\n3. Do not use this instrument in an environment with a lot of dust.\n\n##### **Cover the instrument when not in use.**\n\n4. Do not subject the instrument to shock.\n\nMaintenance............................................\n\nModel AY11240/Model AY11238..................\n\nModel AY11228/Model AY11232..................\n\nModel AY11230/Model AY11234..................\n\nModel AY11236........................................\n\nWarranty Information................................\n\n1\n\n2-5\n\n6-9\n\n10-13\n\n14-18\n\nBack Cover\n\n## **1**\n\n### **MAINTENANCE**\n\nProper care and storage of this instrument is essential. Please read\n\nthe following guidelines:\n\n1. Keep the instrument in a dry and moisture-free location.\n\n2. Do not expose to acid, alkali fumes or moisture.\n\n3. Keep optical parts clean and free of dust. To clean optical parts\n\ngently wipe with lens cleaning tissue and a mixture of alcohol\n\nand diethyl ether. Depending on weather conditions, the\n\nfollowing are the recommended mixture ratios:\n\nWet weather: 1:2\n\nDry Weather: 1:1\n\n4. After use, cover the instrument with the plastic dust cover.\n\n5. If instrument is to be stored for an extended period of time,\n\nremove the eyepiece and oculars and store in a moisture-proof\n\ncontainer.\n\n### **MODEL AY11240/AY11238**\n\n## **2**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11240 and Model AY11238 are designed for\n\nbiological studies such as specimen examination. They can also\n\nbe used for examining bacteria and for general clinical and medical\n\nstudies. Simple design and use is especially useful for school\n\nclassroom instruction.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11240 is a fixed tube type. For comfortable observation, the arm can be easily tilted at any angle from 90 <sup>o</sup> vertical to 45 <sup>o</sup> level. It is also equipped with a coarse adjustment\n\nand fine adjustment as well as a space limiter to protect the\n\nobjective from contacting and damaging the specimen. BARSKA Model AY11238 features a monocular tube that is slanted at a 45 <sup>o</sup>\n\nangle. The head rotates 360 <sup>o</sup> . The Eyepiece Set Screw prevents\n\nthe eyepiece from falling out of the tube.\n\nCoarse Adjustment Knob\n\nFine Adjustment Knob\n\nStand\n\n5-Hole Diaphragm and Condenser Concave Mirror\n\nStage\n\nSpring Clips\n\nObjectives\n\nBarrel\n\nRevolving Turret\n\nEyepiece\n\nCoarse\n\nAdjustment\n\nKnob\n\nFine\n\nAdjustment\n\nKnob\n\nStand\n\n5-Hole\n\nDiaphragm\n\nand Condenser\n\nLamp\n\nOn/Off\n\nSwitch\n\nLamp\n\nPower\n\nCord\n\nStage\n\nSpring\n\nClips\n\nObjectives\n\nRotating Head\n\nRevolving\n\nTurret\n\nEyepiece\n\nStage Height\n\nLimit Adjustment\n\nMonocular Tube Eyepiece\n\nSet Screw\n\n**Model AY11240 Model AY11238**", - "page_start": 1, - "page_end": 1, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **4**\n\n### **PARTS LIST**\n\n### **OPERATION**\n\n1. Remove components from package.\n\nidentify all parts before assembling.\n\n2. Attach 4x, 10x and 40x objectives\n\nto revolving turret.\n\n3. Place the specimen on the stage and\n\nsecure with spring clips. NOTE: The\n\ncover glass must face upward (the\n\nthinner glass is the cover glass),\n\notherwise when the 40x objective is\n\nused the specimen cannot be\n\nobserved. Observation is best when\n\nthe thickness of the cover glass is\n\n0.1-1.1mm and the cover glass is\n\n0.17mm.\n\n4. Adjust the stand to an angle that\n\nprovides comfortable observation.\n\n5. Rotate and adjust concave mirror to\n\nlight the field of view. **NOTE: Do not**\n\n**reflect the Sun with the mirror.**\n\n**This can cause serious eye injury**\n\n**or permanent eye damage.**\n\n6. Observe the specimen using the\n\nlowest magnification objective first.\n\nThe 4x objective provides a larger\n\nfield of view to search specimen.\n\n1. Remove components from package.\n\nidentify all parts before assembling.\n\n2. Attach 4x, 10x and 40x objectives\n\nto revolving turret. 3. Place the\n\nspecimen on the stage and\n\nsecure with spring clips. NOTE: The\n\ncover glass must face upward (the\n\nthinner glass is the cover glass),\n\notherwise when the 40x objective is\n\nused the specimen cannot be\n\nobserved. Observation is best when\n\nthe thickness of the cover glass is\n\n0.1-1.1mm and the cover glass is\n\n0.17mm.\n\n4. Plug power cord into an electrical\n\noutlet. Turn microscope\n\nlamp ON.\n\n5. Observe the specimen using the\n\nlowest magnification objective\n\nfirst. The 4x objective provides a\n\nlarger field of view to search\n\nspecimen.\n\n**Name**\n\n**Model AY11240**\n\n**Model AY11240 Model AY11238**\n\n**Model AY11238**\n\n**Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x |\n|:---|\n| 10x |\n| 40x (s) |\n\n1\n\nPlain Concave Mirror 1\n\nPlastic Dust Cover 1\n\n10x Wide Field Eyepiece 1\n\nLens Cleaning Tissue 1\n\nSpecification 1\n\nInspection Certificate 1\n\nPacking List 1\n\n1\n\n1\n\n1\n\n**Name Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x |\n|:---|\n| 10x |\n| 40x (s) |\n\n1\n\n10x Wide Field Eyepiece 1\n\nPlastic Dust Cover 1\n\nSpare Bulb 1\n\nLens Cleaning Tissue 1\n\nSpecification 1\n\nInspection Certificate 1\n\nPacking List 1\n\n1\n\n1\n\n1", - "page_start": 2, - "page_end": 2, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **15**\n\n### **SPECIFICATIONS**\n\n1. Length of mechanical tube: 160mm\n\n2. Conjugate distance between object and image: 195mm\n\n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion)\n\n4. Illumination: Input 110V or 200V; Output: 20W\n\n5. Fine adjustment range: .002mm\n\n6. Coarse Adjustment Range: 20mm\n\n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm\n\n8. Condenser Elevation Range: 15mm\n\n9. Iris diaphragm aperture: 2mm-30mm\n\n##### **Objective Specifications**\n\n**Classification Working**\n\n**Distance Magnification Optical**\n\n**System Numerical**\n\n**Aperture**\n\n| Dry | 4x Adjustable Focus | 0.1 |\n|:---|:---|---:|\n| Dry | 10x | 0.25 |\n| Dry | 40x Spring Adjustable Focus | 0.65 |\n\n37.42mm\n\n0.57mm\n\nOil\n\nImmer-\n\nsion\n\n1.25 0.18mm 100x Spring\n\nAdjustable\n\nFocus\n\n7.14mm\n\nAchromatic\n\nObjective\n\nNote: For oil immersion, please use the index of refraction 1.515 oil\n\nPlain Field\n\nEyepiece 10x 18mm\n\n##### **Eyepiece Specifications**\n\n**Classification Magnification Field of View (FOV)**\n\n**Diameter**\n\n10x\n\n40x\n\n100x\n\n400x\n\n4x\n\n10x\n\n40x (s)\n\n1000x 100x (oil,s)\n\n##### **Total Magnification**\n\n**Objective**\n\n**Magnification Eyepiece**\n\n## **16**\n\n### **PARTS LIST**\n\n### **OPERATION**\n\n1. Remove all components from package. Identify all parts before\n\nassembling instrument.\n\n2. Attach 4x, 10x and 40x objectives by screwing into revolving\n\nturret. Tighten and secure to maximum finger pressure only.\n\n3. Place the specimen on the stage and secure with spring clips.\n\nNOTE: The cover glass must face upward (the thinner glass is\n\nthe cover glass), otherwise when the 40x objective is used the\n\nspecimen cannot be observed. Observation is best when the\n\nthickness of the cover glass is 0.1-1.1mm and the cover glass\n\nis 0.17mm.\n\n4. Plug power cord into an electrical outlet. Turn microscope\n\nlamp ON.\n\n5. Observe the specimen using the lowest magnification objective\n\nfirst. The 10x objective provides a larger field of view making it\n\neasier to search the specimen.\n\n**Name Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x (parfocal distance adjustable) |\n|:---|\n| 10x |\n| 40x (s) (parfocal distance adjustable) |\n| 100x (oil,s) (parfocal distance adjustable) |\n\n1\n\n1\n\n2\n\n1\n\n1\n\n1\n\n1\n\n1\n\n10x Wide Field Eyepiece w/Pointer\n\nAbbe Condenser NA1.25\n\nPlastic Dust Cover\n\nLens Cleaning Tissue\n\n1 Cedar Oil\n\n1 1A Fuse (spare)\n\nSpare 6V20W Halogen Bulb\n\nSpecification\n\nInspection Certificate\n\nPacking List\n\n1\n\n1\n\n1\n\n1\n\n1", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "Approximately 65% of the variability in dyspnea\n\nremained unexplained by the factors examined in our\n\nstudy. Most individuals in our study showed normal\n\nspirometry results but still carried a substantial\n\nburden of dyspnea, an inconsistency that needs\n\nexplanation. Several factors not included in our\n\nanalysis may have contributed to the unexplained\n\nvariation. Environmental factors (eg, air pollution,\n\nallergen exposure, seasonal variations in symptoms)\n\nare potential contributors to this unexplained variability. <sup>22</sup> Genetic predispositions could also play a\n\nsigni fi cant role, as suggested by a study that revealed\n\nthat parents with dyspnea were 1.8 times more likely to have offspring with dyspnea. <sup>23</sup> Additionally, fi tness\n\ncould be a contributing factor, especially in\n\nindividuals with undiagnosed PRISm, asthma, or\n\nCOPD who may restrict their activities to avoid\n\ndyspnea, and hence become deconditioned. <sup>6</sup>\n\nThere were signi fi cant but modest differences in mean\n\ndyspnea levels across the 17 study sites (data not\n\nshown), which are not explained by the risk factors we\n\naccounted for in our study. This fi nding is not surprising\n\nbecause some of the potential contributing factors\n\npreviously mentioned and other site-speci fi c factors\n\n(eg, climate, air quality/industrialization, socioeconomic\n\nstatus) of the catchment population tend to vary across\n\nstudy sites.\n\nDyspnea is a complex, subjective symptom that is\n\nmodi fi ed by nonrespiratory factors including\n\npsychosocial, social, and environmental in fl uences. <sup>5</sup>\n\nInterindividual variability in the perception of dyspnea,\n\nin fl uenced by these nonrespiratory factors, may play an\n\nimportant role. A study conducted by Ziegler et al <sup>24</sup>\n\nassessed the perception of dyspnea in 42 healthy\n\nindividuals using a standardized inspiratory resistive\n\nloading stimulus. The study used the modi fi ed Borg\n\nscale to measure dyspnea perception levels. Among the\n\nparticipants subjected to the same inspiratory resistive\n\nload, 31%, 45%, and 24% of participants classi fi ed their\n\nlevel of dyspnea as low, intermediate, and high,\n\nrespectively. The study revealed that differences between\n\nindividuals contribute considerable variability to the\n\nperception of dyspnea, even among healthy participants.\n\nThe affective dimension of dyspnea can be captured\n\nusing additional questionnaires (eg, Multidimensional\n\nDyspnea Pro fi le, Dyspnea-12). Studies have explored the\n\nuse of the Multidimensional Dyspnea Pro fi le in\n\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment\n\nDisease Group Overall P Value\n\n| Reversibility of FEV 1 , % | Post-BD FEV 1 /FVC Ratio | Post-BD FEV 1 % predicted |\n|:---|:---|:---|\n| � 0.163 ( P ¼ .47) 0.186 ( P ¼ .16) 0.545 (P [ .01) 0.392 (P [ .002) � 0.290 ( P ¼ .39) | � 0.274 (P [ .05) 0.240 (P [ .005) 0.107 ( P ¼ .58) � 0.307 (P [ .05) 0.854 (P [ .002) | � 0.090 ( P ¼ .17) � 0.131 (P < .001) � 0.158 ( P ¼ .08) � 0.075 ( P ¼ .37) � 0.650 (P [ .004) |\n\nControl .096\n\nNormal spirometry < .001\n\nAsthma .009\n\nCOPD < .001\n\nPRISm < .001\n\nDyspnea regressed on lung function variables representing severity of impairment, after removing contributions of patient-speci fi c factors and spirometry\n\ndisease group Tables 4 and 5 (1.7% of variability explained). Boldface indicates statitistical signi fi cance. BD ¼ bronchodilator; PRISm ¼ preserved ratio impaired spirometry.\n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)\n\nMeasure\n\nUnadjusted Adjusted\n\nDyspnea Coef fi cient (95% CI) P Value Dyspnea Coef fi cient (95% CI) P Value", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed6_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "Microscope Manual.pdf", - "query": "The illumination of my AY11236 microscope is not very strong, what can I do to solve this?", - "target_page": 10, - "target_passage": "1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "## **5**\n\n### **OPERATION (cont.)**\n\n##### **USING THE 5-HOLE DIAPHRAGM**\n\n1. To obtain the best contrast for observing, match the hole size to\n\nthe objective that is being used to view the specimen.\n\n2. Each hole has a corresponding number from 1 to 5. 1 is the\n\nsmallest hole; 5 is the largest hole.\n\nUse the following guidelines to match the hole number to the\n\nobjective that you have selected:\n\n40x objective: Use #5 hole\n\n10x objective: Use #4 or #3 hole\n\n4x objective: Use #2 or #1 hole\n\n##### **COARSE KNOB ADJUSTMENT - Model AY11240**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut\n\n(See Fig.1).\n\n2. To adjust the knob loosen or tighten the nut.\n\nNOTE: Adjusting the nut too tight will make focusing difficult.\n\nAdjusting the nut too loose will cause the tube to slide.\n\nHeavy-Light Adjustment Nut\n\n##### **Fig. 1- Coarse Adjustment Knob**\n\n7. To clearly see the outline of the\n\nspecimen, rotate the coarse\n\nadjustment knob and lower\n\nthe barrel to the space limiter.\n\n8. Rotate the fine adjustment knob\n\nuntil the image is in sharp focus.\n\nWhen using other objectives, rotate\n\nthe fine focus adjustment until the\n\nimage is in focus.\n\n6. To clearly see the outline of the\n\nspecimen, rotate the coarse\n\nadjustment knob and lower\n\nthe barrel to the space limiter.\n\n7. Rotate the fine adjustment knob\n\nuntil the image is in sharp focus.\n\nWhen using other objectives, rotate\n\nthe fine focus adjustment until the\n\nimage is in focus.\n\n**Model AY11240 Model AY11238**\n\n## **6**\n\n### **MODEL AY11228/AY11232**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11228 and Model AY11232 are designed for\n\nbiological studies such as specimen examination. They can also\n\nbe used for examining bacteria and for general clinical and medical\n\nstudies. Simple design and use is especially useful for school\n\nclassroom instruction.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11228 is a fixed power stereo microscope. It is\n\nconstructed with two optical paths at the same angle. It is\n\nequipped with transmitted illumination and oblique illumination.\n\nBy using this instrument, the user can observe and enlarge the\n\nright side stereo image. BARSKA Model AY11232 is a zoom stereo\n\nmicroscope. The object being viewed is enlarged through two\n\nidentical sized sets of right and left eye lenses. The zoom provides\n\ndifferent magnification and features an inversion system which\n\nallows the image to be viewed normally and right side up.\n\n**Model AY11228 Model AY11232**\n\nDiopter\n\nAdjustment\n\nDiopter\n\nAdjustment\n\nPrism\n\nCap\n\nPrism\n\nCap\n\nEyepiece\n\nStage\n\nLens\n\nStage\n\nVertical Pole\n\nIllumination Controls Rotary Case\n\nIllumination Controls\n\nSpring Clips\n\nSpring Clips\n\nFocus Knob\n\nFocus Knob\n\nMagnification Adjustment Knob\n\nFocus Knob\n\nTightening Knob\n\nOblique Illuminator\n\nOblique Illuminator\n\nLens Housing\n\nEyepiece", - "page_start": 3, - "page_end": 3, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "inversion system which allows the image to be viewed normally\n\nand right side up.\n\n## **10 9**\n\n**Model AY11230 Model AY11234**\n\nDiopter\n\nAdjustment Diopter\n\nAdjustment\n\nPrism\n\nCap\n\nPrism\n\nCap\n\nEyepiece\n\nStage\n\nLens\n\nStage\n\nVertical Tube Vertical Tube\n\nIllumination Controls\n\nRotary Case\n\nSpring Clips Spring Clips\n\nFocus Knob\n\nMagnification Adjustment Knob\n\nFocus Knob\n\nTightening Knob\n\nOblique Illuminator Oblique Illuminator\n\nLens Housing\n\nEyepiece\n\nIllumination Controls", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "### **IMPORTANT NOTES**\n\nCongratulations on your purchase of this high quality BARSKA\n\nmicroscope. With proper care, this microscope will provide many\n\nyears of use. Please read the following instructions before\n\noperating this instrument.\n\n1. Do not attempt to disassemble the instrument. This product has\n\nbeen carefully assembled at the factory and should only be\n\nexamined by a factory-trained technician.\n\n2. This instrument should only be used in an environment with an\n\nindoor temperature range of 32 <sup>o</sup> F to 104 <sup>o</sup> F.\n\n3. Do not use this instrument in an environment with a lot of dust.\n\n##### **Cover the instrument when not in use.**\n\n4. Do not subject the instrument to shock.\n\nMaintenance............................................\n\nModel AY11240/Model AY11238..................\n\nModel AY11228/Model AY11232..................\n\nModel AY11230/Model AY11234..................\n\nModel AY11236........................................\n\nWarranty Information................................\n\n1\n\n2-5\n\n6-9\n\n10-13\n\n14-18\n\nBack Cover\n\n## **1**\n\n### **MAINTENANCE**\n\nProper care and storage of this instrument is essential. Please read\n\nthe following guidelines:\n\n1. Keep the instrument in a dry and moisture-free location.\n\n2. Do not expose to acid, alkali fumes or moisture.\n\n3. Keep optical parts clean and free of dust. To clean optical parts\n\ngently wipe with lens cleaning tissue and a mixture of alcohol\n\nand diethyl ether. Depending on weather conditions, the\n\nfollowing are the recommended mixture ratios:\n\nWet weather: 1:2\n\nDry Weather: 1:1\n\n4. After use, cover the instrument with the plastic dust cover.\n\n5. If instrument is to be stored for an extended period of time,\n\nremove the eyepiece and oculars and store in a moisture-proof\n\ncontainer.\n\n### **MODEL AY11240/AY11238**\n\n## **2**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11240 and Model AY11238 are designed for\n\nbiological studies such as specimen examination. They can also\n\nbe used for examining bacteria and for general clinical and medical\n\nstudies. Simple design and use is especially useful for school\n\nclassroom instruction.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11240 is a fixed tube type. For comfortable observation, the arm can be easily tilted at any angle from 90 <sup>o</sup> vertical to 45 <sup>o</sup> level. It is also equipped with a coarse adjustment\n\nand fine adjustment as well as a space limiter to protect the\n\nobjective from contacting and damaging the specimen. BARSKA Model AY11238 features a monocular tube that is slanted at a 45 <sup>o</sup>\n\nangle. The head rotates 360 <sup>o</sup> . The Eyepiece Set Screw prevents\n\nthe eyepiece from falling out of the tube.\n\nCoarse Adjustment Knob\n\nFine Adjustment Knob\n\nStand\n\n5-Hole Diaphragm and Condenser Concave Mirror\n\nStage\n\nSpring Clips\n\nObjectives\n\nBarrel\n\nRevolving Turret\n\nEyepiece\n\nCoarse\n\nAdjustment\n\nKnob\n\nFine\n\nAdjustment\n\nKnob\n\nStand\n\n5-Hole\n\nDiaphragm\n\nand Condenser\n\nLamp\n\nOn/Off\n\nSwitch\n\nLamp\n\nPower\n\nCord\n\nStage\n\nSpring\n\nClips\n\nObjectives\n\nRotating Head\n\nRevolving\n\nTurret\n\nEyepiece\n\nStage Height\n\nLimit Adjustment\n\nMonocular Tube Eyepiece\n\nSet Screw\n\n**Model AY11240 Model AY11238**", - "page_start": 1, - "page_end": 1, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **4**\n\n### **PARTS LIST**\n\n### **OPERATION**\n\n1. Remove components from package.\n\nidentify all parts before assembling.\n\n2. Attach 4x, 10x and 40x objectives\n\nto revolving turret.\n\n3. Place the specimen on the stage and\n\nsecure with spring clips. NOTE: The\n\ncover glass must face upward (the\n\nthinner glass is the cover glass),\n\notherwise when the 40x objective is\n\nused the specimen cannot be\n\nobserved. Observation is best when\n\nthe thickness of the cover glass is\n\n0.1-1.1mm and the cover glass is\n\n0.17mm.\n\n4. Adjust the stand to an angle that\n\nprovides comfortable observation.\n\n5. Rotate and adjust concave mirror to\n\nlight the field of view. **NOTE: Do not**\n\n**reflect the Sun with the mirror.**\n\n**This can cause serious eye injury**\n\n**or permanent eye damage.**\n\n6. Observe the specimen using the\n\nlowest magnification objective first.\n\nThe 4x objective provides a larger\n\nfield of view to search specimen.\n\n1. Remove components from package.\n\nidentify all parts before assembling.\n\n2. Attach 4x, 10x and 40x objectives\n\nto revolving turret. 3. Place the\n\nspecimen on the stage and\n\nsecure with spring clips. NOTE: The\n\ncover glass must face upward (the\n\nthinner glass is the cover glass),\n\notherwise when the 40x objective is\n\nused the specimen cannot be\n\nobserved. Observation is best when\n\nthe thickness of the cover glass is\n\n0.1-1.1mm and the cover glass is\n\n0.17mm.\n\n4. Plug power cord into an electrical\n\noutlet. Turn microscope\n\nlamp ON.\n\n5. Observe the specimen using the\n\nlowest magnification objective\n\nfirst. The 4x objective provides a\n\nlarger field of view to search\n\nspecimen.\n\n**Name**\n\n**Model AY11240**\n\n**Model AY11240 Model AY11238**\n\n**Model AY11238**\n\n**Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x |\n|:---|\n| 10x |\n| 40x (s) |\n\n1\n\nPlain Concave Mirror 1\n\nPlastic Dust Cover 1\n\n10x Wide Field Eyepiece 1\n\nLens Cleaning Tissue 1\n\nSpecification 1\n\nInspection Certificate 1\n\nPacking List 1\n\n1\n\n1\n\n1\n\n**Name Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x |\n|:---|\n| 10x |\n| 40x (s) |\n\n1\n\n10x Wide Field Eyepiece 1\n\nPlastic Dust Cover 1\n\nSpare Bulb 1\n\nLens Cleaning Tissue 1\n\nSpecification 1\n\nInspection Certificate 1\n\nPacking List 1\n\n1\n\n1\n\n1", - "page_start": 2, - "page_end": 2, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "the user can observe specimens at magnification from 40x to\n\n1000x by selecting the desired objective lens. Coarse and fine\n\nfocus adjustments provide accuracy and image detail. The rotating\n\nhead allows the user to position the eyepieces for maximum\n\nviewing comfort and easy access to all adjustment knobs.\n\n**Model AY11236**\n\nFine Adjustment Knob\n\nStage\n\nCondenser Focusing Knob\n\nEyepiece\n\nStand\n\nLamp\n\nOn/Off\n\nSwitch\n\nLamp\n\nPower\n\nCord\n\nRotating Head\n\nStage Clip\n\nAdjustment\n\nInterpupillary Slide Adjustment", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "## **13**\n\n**USING THE VERTICAL TUBE -**\n\n**MODELS AY11230/11234**\n\n1. The vertical tube can be used for\n\ninstructional viewing or to\n\nphotograph the image witrh a\n\ndigital camera or micro TV\n\nunit.\n\n2. Loosen the retention screw, then rotate\n\nthe adjustment ring to change the\n\nlength of the vertical tube.\n\n3. Make sure that both the images in\n\n### **OPERATION (cont.)**\n\n**SELECTING OBJECTIVE**\n\n**MAGNIFICATION**\n\n1. There are two objectives. The lower\n\nmagnification objective has a greater\n\ndepth of field and view.\n\n2. In order to observe the specimen\n\neasily use the lower magnification\n\nobjective first. Then, by rotating the\n\ncase, the magnification can be\n\nchanged.\n\n**CHANGING THE INTERPUPILLARY**\n\n**DISTANCE**\n\n1. The distance between the observer's\n\npupils is the interpupillary distance.\n\n2. To adjust the interpupillary distance\n\nrotate the prism caps until both eyes\n\ncoincide with the image in the\n\neyepiece.\n\n**FOCUSING**\n\n1. Remove the lens protective cover.\n\n2. Place the specimen on the working\n\nstage.\n\n3. Focus the specimen with the left eye\n\nfirst while turning the focus knob until\n\nthe image appears clear and sharp.\n\n4. Rotate the right eyepiece ring until the\n\nimages in each eyepiece coincide and\n\nare sharp and clear.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate and\n\nreplace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**FOCUSING**\n\n1. Turn the focusing knob away or toward\n\nyou until a clear image is viewed.\n\n2. If the image is unclear, adjust the\n\nheight of the elevator up or down,\n\nthen turn the focusing knob again.\n\n**ZOOM MAGNIFICATION**\n\n1. Turn the zoom magnification knob to\n\nthe desired magnification and field of\n\nview.\n\n2. In most situations, it is recommended\n\nthat you focus at the lowest\n\nmagnification, then move to a higher\n\nmagnification and re-focus as\n\nnecessary.\n\n3. If the image is not clear to both eyes\n\nat the same time, the diopter ring may\n\nneed adjustment.\n\n**DIOPTER RING ADJUSTMENT**\n\n1. To adjust the eyepiece for viewing with\n\nor without eyeglasses and for\n\ndifferences in acuity between the right\n\nand left eyes, follow the following\n\nsteps:\n\na. Observe an image through the left\n\neyepiece and bring a specific point\n\ninto focus using the focus knob.\n\nb. By turning the diopter ring\n\nadjustment for the left eyepiece,\n\nbring the same point into sharp\n\nfocus.\n\nc.Then bring the same point into\n\nfocus through the right eyepiece\n\nby turning the right diopter ring.\n\nd.With more than one viewer, each\n\nviewer should note their own\n\ndiopter ring position for the left\n\nand right eyepieces, then before\n\nviewing set the diopter ring\n\nadjustments to that setting.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord from the\n\nelectrical outlet.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate\n\nand replace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**Model AY11230 Model AY11234**\n\n## **14**\n\nObjectives\n\nRevolving Turret\n\nCoarse Adjustment Knob\n\n### **MODEL AY11236**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound\n\nmicroscope designed for biological studies such as specimen\n\nexamination. It can also be used for examining bacteria and\n\nfor general clinical and medical studies and other scientific uses.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope.\n\nIt is constructed with two optical paths at the same angle. It is\n\nequipped with transmitted illumination. By using this instrument,\n\nthe user can observe specimens at magnification from 40x to\n\n1000x by selecting the desired objective lens. Coarse and fine\n\nfocus adjustments provide accuracy and image detail. The rotating", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "Chapter 8. Hosts\n\nid 4\n\nname RHEL-Host-06\n\nport_count 1\n\ntype generic\n\nmask 1111111111111111111111111111111111111111111111111111111111111111\n\niogrp_count 4\n\nstatus offline\n\nsite_id\n\nsite_name\n\nhost_cluster_id\n\nhost_cluster_name\n\nprotocol scsi\n\niscsi_name iqn.1994-05.com.redhat:e6ff477b58\n\nnode_logged_in_count 0\n\nstate offline\n\nIBM_Storwize:ITSO-V7000:superuser>\n\n**Creating NVMe hosts**\n\nBefore you create an NVMe host, you need to know the NVMe qualified name (NQN) address\n\nof the host. See your host operating system-specific documentation to find the NQN of the\n\nhost.\n\nCreate a host by completing the following steps:\n\n1. Create the NVMe host by using the **mkhost** command, as shown in Example 8-19.\n\n*Example 8-19*\n\nIBM_Storwize:ITSO-V7000:superuser>svctask mkhost -name NVMe-Host-01 -nqn\n\nnqn.2014-08.com.redhat:nvme:nvm-nvmehost01-edf223876 -protocol nvme -type generic\n\nHost, id [6], successfully created\n\nIBM_Storwize:ITSO-V7000:superuser>\n\n2. The NVMe host can be verified by using the **lshost** command, as shown in Example 8-20.\n\n*Example 8-20*\n\nIBM_Storwize:ITSO-V7000:superuser>lshost 6\n\nid 6\n\nname NVMe-Host-01\n\nport_count 1\n\ntype generic\n\nmask 1111111111111111111111111111111111111111111111111111111111111111\n\niogrp_count 4\n\nstatus offline\n\nsite_id\n\n**Note:** When the host is initially configured, the default authentication method is set to no\n\nauthentication, and no CHAP secret is set. To set a CHAP secret for authenticating the\n\niSCSI host with the Storwize V7000 system, use the **chhost** command with the **chapsecret**\n\nparameter. If you must display a CHAP secret for a defined server, use the **lsiscsiauth**\n\ncommand. The **lsiscsiauth** command lists the CHAP secret that is configured for\n\nauthenticating an entity to the Storwize V7000 system.\n\nFC hosts and iSCSI hosts are handled in the same way operationally after they are\n\ncreated.", - "page_start": 396, - "page_end": 396, - "source_file": "sg247938.pdf" - }, - { - "text": "### **OPERATION (cont.)**\n\n**SELECTING OBJECTIVE**\n\n**MAGNIFICATION**\n\n1. There are two objectives. The lower\n\nmagnification objective has a greater\n\ndepth of field and view.\n\n2. In order to observe the specimen\n\neasily use the lower magnification\n\nobjective first. Then, by rotating the\n\ncase, the magnification can be\n\nchanged.\n\n**CHANGING THE INTERPUPILLARY**\n\n**DISTANCE**\n\n1. The distance between the observer's\n\npupils is the interpupillary distance.\n\n2. To adjust the interpupillary distance\n\nrotate the prism caps until both eyes\n\ncoincide with the image in the\n\neyepiece.\n\n**FOCUSING**\n\n1. Remove the lens protective cover.\n\n2. Place the specimen on the working\n\nstage.\n\n3. Focus the specimen with the left eye\n\nfirst while turning the focus knob until\n\nthe image appears clear and sharp.\n\n4. Rotate the right eyepiece ring until the\n\nimages in each eyepiece coincide and\n\nare sharp and clear.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord from the\n\nelectrical outlet before changing the\n\nbulb.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate and\n\nreplace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**FOCUSING**\n\n1. Turn the focusing knob away or toward\n\nyou until a clear image is viewed.\n\n2. If the image is unclear, adjust the\n\nheight of the elevator up or down,\n\nthen turn the focusing knob again.\n\n**ZOOM MAGNIFICATION**\n\n1. Turn the zoom magnification knob to\n\nthe desired magnification and field of\n\nview.\n\n2. In most situations, it is recommended\n\nthat you focus at the lowest\n\nmagnification, then move to a higher\n\nmagnification and re-focus as\n\nnecessary.\n\n3. If the image is not clear to both eyes\n\nat the same time, the diopter ring may\n\nneed adjustment.\n\n**DIOPTER RING ADJUSTMENT**\n\n1. To adjust the eyepiece for viewing with\n\nor without eyeglasses and for\n\ndifferences in acuity between the right\n\nand left eyes, follow the following\n\nsteps:\n\na. Observe an image through the left\n\neyepiece and bring a specific point\n\ninto focus using the focus knob.\n\nb. By turning the diopter ring\n\nadjustment for the left eyepiece,\n\nbring the same point into sharp\n\nfocus.\n\nc.Then bring the same point into\n\nfocus through the right eyepiece\n\nby turning the right diopter ring.\n\nd.With more than one viewer, each\n\nviewer should note their own\n\ndiopter ring position for the left\n\nand right eyepieces, then before\n\nviewing set the diopter ring\n\nadjustments to that setting.\n\n**CHANGING THE BULB**\n\n1. Disconnect the power cord from the\n\nelectrical outlet.\n\n2. When the bulb is cool, remove the\n\noblique illuminator cap and remove\n\nthe halogen bulb with cap.\n\n3. Replace with a new halogen bulb.\n\n4. Open the window in the base plate\n\nand replace the halogen lamp or\n\nfluorescent lamp of transmitted\n\nilluminator.\n\n**Model AY11228 Model AY11232**\n\n### **MODEL AY11230/AY11234**\n\n### **MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular\n\nmicroscopes designed for biological studies such as specimen\n\nexamination. They can also be used for examining bacteria and for\n\ngeneral clinical and medical studies. Simple design and use and the\n\nvertical tube make them is useful for school classroom instruction.\n\n### **CONSTRUCTION**\n\nBARSKA Model AY11230 is a fixed power trinocular stereo\n\nmicroscope. It is constructed with two optical paths at the same\n\nangle. It is equipped with transmitted illumination and oblique\n\nillumination. By using this instrument, the user can observe and\n\nenlarge the right side stereo image. BARSKA Model AY11234 is a\n\nzoom trinocular stereo microscope. The object being viewed is\n\nenlarged through two identical sized sets of right and left eye\n\nlenses. The zoom provides different magnification and features an\n\ninversion system which allows the image to be viewed normally\n\nand right side up.\n\n## **10 9**\n\n**Model AY11230 Model AY11234**\n\nDiopter\n\nAdjustment Diopter", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" - }, - { - "text": "#### **4.6.3 Viewing the local port mask**\n\nTo view the local port mask for the system, use the **lssystem** command, as shown in\n\nExample 4-2.\n\n*Example 4-2 Viewing the local port mask*\n\nIBM_Storwize:ITSO:superuser>lssystem\n\nid 000001003D600126\n\nname ITSO\n\nlocation local\n\npartnership\n\n...\n\n...\n\nlocal_fc_port_mask 0000000000000000000000000000000000000000000000000000000000001111\n\npartner_fc_port_mask 1111111111111111111111111111111111111111111111111111111111111111\n\n...\n\n### **4.7 Other administrative procedures**\n\nIn this section, we discuss other administrative procedures.\n\n#### **4.7.1 Removing a control enclosure from a clustered system**\n\nRemoving a control enclosure from a system causes a loss of access to drives in this control\n\nenclosure and any expansions enclosures connected to this control enclosure. If not planned\n\nand executed carefully and correctly, this procedure can cause disruption in access to storage\n\nor data loss. Make sure that you have current and verified data backups before removing a\n\ncontrol enclosure from a system. Follow carefully the enclosure removal procedure that is\n\nprovided at this IBM Knowledge Center [web page](https://ibm.biz/BdY6QE) .\n\n#### **4.7.2 Shutting down the system**\n\nYou can safely shut down an Storwize V7000 cluster by using the GUI or CLI.\n\nAfter you shut down the entire cluster, you need to power it on manually to start the system\n\nagain. Make sure that someone is available with physical access to the IBM Spectrum\n\nVirtualize hardware who can start the system after it is shut down.\n\nBefore shutting down the cluster, make sure that all hosts that have volumes mapped from the\n\nsystem are prepared for the storage system shutdown. This can be achieved by several\n\nmethods, as shown in the following examples:\n\n� Shutting down the host. This is the safest option.\n\n**Note:** For systems with enabled encryption, ensure that the cluster can access at least one\n\nvalid encryption key provider. Access to an encryption key provider (USB key or a key\n\nserver) is required at start time to unlock encrypted data.\n\nAlso, never shut down your IBM Storwize V7000 system by powering off the PSUs,\n\nremoving both PSUs, or removing both power cables from the enclosure. It can lead to\n\ndata loss.", - "page_start": 145, - "page_end": 145, - "source_file": "sg247938.pdf" - }, - { - "text": "## **15**\n\n### **SPECIFICATIONS**\n\n1. Length of mechanical tube: 160mm\n\n2. Conjugate distance between object and image: 195mm\n\n3. Condenser: Abbe; numerical aperture: NA1.25 (oil immersion)\n\n4. Illumination: Input 110V or 200V; Output: 20W\n\n5. Fine adjustment range: .002mm\n\n6. Coarse Adjustment Range: 20mm\n\n7. Shift or Mechanical Stage: Longitude - 40mm; Transversal - 70mm\n\n8. Condenser Elevation Range: 15mm\n\n9. Iris diaphragm aperture: 2mm-30mm\n\n##### **Objective Specifications**\n\n**Classification Working**\n\n**Distance Magnification Optical**\n\n**System Numerical**\n\n**Aperture**\n\n| Dry | 4x Adjustable Focus | 0.1 |\n|:---|:---|---:|\n| Dry | 10x | 0.25 |\n| Dry | 40x Spring Adjustable Focus | 0.65 |\n\n37.42mm\n\n0.57mm\n\nOil\n\nImmer-\n\nsion\n\n1.25 0.18mm 100x Spring\n\nAdjustable\n\nFocus\n\n7.14mm\n\nAchromatic\n\nObjective\n\nNote: For oil immersion, please use the index of refraction 1.515 oil\n\nPlain Field\n\nEyepiece 10x 18mm\n\n##### **Eyepiece Specifications**\n\n**Classification Magnification Field of View (FOV)**\n\n**Diameter**\n\n10x\n\n40x\n\n100x\n\n400x\n\n4x\n\n10x\n\n40x (s)\n\n1000x 100x (oil,s)\n\n##### **Total Magnification**\n\n**Objective**\n\n**Magnification Eyepiece**\n\n## **16**\n\n### **PARTS LIST**\n\n### **OPERATION**\n\n1. Remove all components from package. Identify all parts before\n\nassembling instrument.\n\n2. Attach 4x, 10x and 40x objectives by screwing into revolving\n\nturret. Tighten and secure to maximum finger pressure only.\n\n3. Place the specimen on the stage and secure with spring clips.\n\nNOTE: The cover glass must face upward (the thinner glass is\n\nthe cover glass), otherwise when the 40x objective is used the\n\nspecimen cannot be observed. Observation is best when the\n\nthickness of the cover glass is 0.1-1.1mm and the cover glass\n\nis 0.17mm.\n\n4. Plug power cord into an electrical outlet. Turn microscope\n\nlamp ON.\n\n5. Observe the specimen using the lowest magnification objective\n\nfirst. The 10x objective provides a larger field of view making it\n\neasier to search the specimen.\n\n**Name Qty**\n\nMicroscope Stand\n\nAchromatic\n\nObjective\n\n| 4x (parfocal distance adjustable) |\n|:---|\n| 10x |\n| 40x (s) (parfocal distance adjustable) |\n| 100x (oil,s) (parfocal distance adjustable) |\n\n1\n\n1\n\n2\n\n1\n\n1\n\n1\n\n1\n\n1\n\n10x Wide Field Eyepiece w/Pointer\n\nAbbe Condenser NA1.25\n\nPlastic Dust Cover\n\nLens Cleaning Tissue\n\n1 Cedar Oil\n\n1 1A Fuse (spare)\n\nSpare 6V20W Halogen Bulb\n\nSpecification\n\nInspection Certificate\n\nPacking List\n\n1\n\n1\n\n1\n\n1\n\n1", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia3.pdf", - "query": "What event marks the beginning of the field of artificial intelligence?", - "target_page": 22, - "target_passage": "The field of AI research was founded at a workshop at Dartmouth College in 1956.", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "[Finding a provably correct or optimal solution is intractable for many important problems.](https://en.wikipedia.org/wiki/Intractability_(complexity)) <sup>[15]</sup> Soft\n\n[computing is a set of techniques, including genetic algorithms, fuzzy logic and neural networks, that are](https://en.wikipedia.org/wiki/Fuzzy_logic)\n\ntolerant of imprecision, uncertainty, partial truth and approximation. Soft computing was introduced in\n\nthe late 1980s and most successful AI programs in the 21st century are examples of soft computing with\n\nneural networks.\n\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and\n\n[superintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these](https://en.wikipedia.org/wiki/Superintelligence)\n\nsolutions will lead indirectly to the field's long-term goals. <sup>[378][379]</sup> General intelligence is difficult to\n\ndefine and difficult to measure, and modern AI has had more verifiable successes by focusing on specific\n\nproblems with specific solutions. The sub-field of artificial general intelligence studies this area\n\nexclusively.\n\n[The philosophy of mind does not know whether a machine can have a mind, consciousness and mental](https://en.wikipedia.org/wiki/Philosophy_of_mind)\n\n[states, in the same sense that human beings do. This issue considers the internal experiences of the](https://en.wikipedia.org/wiki/Philosophy_of_mind)\n\nmachine, rather than its external behavior. Mainstream AI research considers this issue irrelevant because\n\nit does not affect the goals of the field: to build machines that can solve problems using intelligence.\n\n[Russell and Norvig add that \"[t]he additional project of making a machine conscious in exactly the way](https://en.wikipedia.org/wiki/Norvig)\n\nhumans are is not one that we are equipped to take on.\" <sup>[380]</sup> However, the question has become central to\n\n[the philosophy of mind. It is also typically the central question at issue in artificial intelligence in fiction.](https://en.wikipedia.org/wiki/Artificial_intelligence_in_fiction)\n\n[David Chalmers identified two problems in understanding the mind, which he named the \"hard\" and](https://en.wikipedia.org/wiki/David_Chalmers)\n\n\"easy\" problems of consciousness. <sup>[381]</sup> The easy problem is understanding how the brain processes\n\nsignals, makes plans and controls behavior. The hard problem is explaining how this *feels* or why it\n\nshould feel like anything at all, assuming we are right in thinking that it truly does feel like something\n\n[(Dennett's consciousness illusionism says this is an illusion). While human information processing is easy](https://en.wikipedia.org/wiki/Information_processing_(psychology))\n\n[to explain, human subjective experience is difficult to explain. For example, it is easy to imagine a color-](https://en.wikipedia.org/wiki/Subjective_experience)\n\nblind person who has learned to identify which objects in their field of view are red, but it is not clear\n\nwhat would be required for the person to *know what red looks like* . <sup>[382]</sup>\n\n[Computationalism is the position in the philosophy of mind that the human mind is an information](https://en.wikipedia.org/wiki/Philosophy_of_mind)\n\nprocessing system and that thinking is a form of computing. Computationalism argues that the\n\nrelationship between mind and body is similar or identical to the relationship between software and\n\n[hardware and thus may be a solution to the mind- body problem. This philosophical position was inspired](https://en.wikipedia.org/wiki/Mind%E2%80%93body_problem)\n\nby the work of AI researchers and cognitive scientists in the 1960s and was originally proposed by\n\n[philosophers Jerry Fodor and Hilary Putnam.](https://en.wikipedia.org/wiki/Hilary_Putnam) <sup>[383]</sup>\n\n[Philosopher John Searle characterized this position as \"strong AI\": \"The appropriately programmed](https://en.wikipedia.org/wiki/Strong_AI_hypothesis)", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Glossary of artificial intelligence - List of definitions of terms and concepts commonly used](https://en.wikipedia.org/wiki/Glossary_of_artificial_intelligence)\n\nin the study of artificial intelligence\n\n[Intelligence amplification - Use of information technology to augment human intelligence](https://en.wikipedia.org/wiki/Intelligence_amplification)\n\n[Intelligent agent - Software agent which acts autonomously](https://en.wikipedia.org/wiki/Intelligent_agent)\n\n[Mind uploading - Hypothetical process of digitally emulating a brain](https://en.wikipedia.org/wiki/Mind_uploading)\n\n[Organoid intelligence - Use of brain cells and brain organoids for intelligent computing](https://en.wikipedia.org/wiki/Organoid_intelligence)\n\n[Robotic process automation - Form of business process automation technology](https://en.wikipedia.org/wiki/Robotic_process_automation)\n\n[Wetware computer - Computer composed of organic material](https://en.wikipedia.org/wiki/Wetware_computer)\n\na. This list of intelligent traits is based on the topics covered by the major AI textbooks,\n\nincluding: Russell & Norvig (2021), Luger & Stubblefield (2004), Poole, Mackworth & Goebel\n\n(1998) and Nilsson (1998)\n\nb. This list of tools is based on the topics covered by the major AI textbooks, including: Russell\n\n& Norvig (2021), Luger & Stubblefield (2004), Poole, Mackworth & Goebel (1998) and\n\nNilsson (1998)\n\n[c. It is among the reasons that expert systems proved to be inefficient for capturing](https://en.wikipedia.org/wiki/Expert_system)\n\nknowledge. <sup>[30][31]</sup>\n\n[d. \"Rational agent\" is general term used in economics, philosophy and theoretical artificial](https://en.wikipedia.org/wiki/Philosophy)\n\nintelligence. It can refer to anything that directs its behavior to accomplish goals, such as a\n\nperson, an animal, a corporation, a nation, or in the case of AI, a computer program.\n\n[e. Alan Turing discussed the centrality of learning as early as 1950, in his classic paper](https://en.wikipedia.org/wiki/Alan_Turing)\n\n[\"Computing Machinery and Intelligence\".](https://en.wikipedia.org/wiki/Computing_Machinery_and_Intelligence) <sup>[42]</sup> In 1956, at the original Dartmouth AI summer\n\n[conference, Ray Solomonoff wrote a report on unsupervised probabilistic machine learning:](https://en.wikipedia.org/wiki/Ray_Solomonoff)\n\n\"An Inductive Inference Machine\". <sup>[43]</sup>\n\n[f. See AI winter § Machine translation and the ALPAC report of 1966](https://en.wikipedia.org/wiki/AI_winter#Machine_translation_and_the_ALPAC_report_of_1966)\n\ng. Compared with symbolic logic, formal Bayesian inference is computationally expensive. For\n\n[inference to be tractable, most observations must be conditionally independent of one](https://en.wikipedia.org/wiki/Conditionally_independent)\n\n[another. AdSense uses a Bayesian network with over 300 million edges to learn which ads](https://en.wikipedia.org/wiki/AdSense)\n\nto serve. <sup>[93]</sup>\n\nh. Expectation- maximization, one of the most popular algorithms in machine learning, allows\n\n[clustering in the presence of unknown latent variables.](https://en.wikipedia.org/wiki/Latent_variables) <sup>[95]</sup>\n\ni. Some form of deep neural networks (without a specific learning algorithm) were described\n\n[by: Warren S. McCulloch and Walter Pitts (1943)](https://en.wikipedia.org/wiki/Walter_Pitts) <sup>[115]</sup> [ Alan Turing (1948);](https://en.wikipedia.org/wiki/Alan_Turing) <sup>[116]</sup> [ Karl Steinbuch](https://en.wikipedia.org/wiki/Karl_Steinbuch)\n\n[and Roger David Joseph (1961).](https://en.wikipedia.org/w/index.php?title=Roger_David_Joseph&action=edit&redlink=1) <sup>[117]</sup> Deep or recurrent networks that learned (or used\n\n[gradient descent) were developed by: Frank Rosenblatt(1957);](https://en.wikipedia.org/wiki/Frank_Rosenblatt) <sup>[116]</sup> [ Oliver Selfridge](https://en.wikipedia.org/wiki/Oliver_Selfridge)", - "page_start": 28, - "page_end": 28, - "source_file": "wikipedia3.pdf" - }, - { - "text": "## **Artificial intelligence**\n\n**Artificial intelligence** ( **AI** [), in its broadest sense, is intelligence exhibited by machines, particularly](https://en.wikipedia.org/wiki/Machine)\n\n[computer systems. It is a field of research in computer science that develops and studies methods and](https://en.wikipedia.org/wiki/Computer_science)\n\n[software that enable machines to perceive their environment and use learning and intelligence to take](https://en.wikipedia.org/wiki/Machine_learning)\n\nactions that maximize their chances of achieving defined goals. <sup>[1]</sup> Such machines may be called AIs.\n\n[High-profile applications of AI include advanced web search engines (e.g., Google Search);](https://en.wikipedia.org/wiki/Google_Search)\n\n[recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google](https://en.wikipedia.org/wiki/Google_Assistant)\n\n[Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g.,](https://en.wikipedia.org/wiki/Computational_creativity)\n\n[ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However,](https://en.wikipedia.org/wiki/Go_(game))\n\nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general\n\napplications, often without being called AI because once something becomes useful enough and common\n\n[enough it's not labeled AI anymore.\"](https://en.wikipedia.org/wiki/AI_effect) <sup>[2][3]</sup>\n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The\n\n[traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural](https://en.wikipedia.org/wiki/Natural_language_processing)\n\n[language processing, perception, and support for robotics.](https://en.wikipedia.org/wiki/Robotics) <sup>[a]</sup> [ General intelligence—the ability to complete](https://en.wikipedia.org/wiki/Artificial_general_intelligence)\n\nany task performed by a human on an at least equal level—is among the field's long-term goals. <sup>[4]</sup> To\n\nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including\n\n[search and mathematical optimization, formal logic, artificial neural networks, and methods based on](https://en.wikipedia.org/wiki/Artificial_neural_network)\n\n[statistics, operations research, and economics.](https://en.wikipedia.org/wiki/Economics) <sup>[b]</sup> [ AI also draws upon psychology, linguistics, philosophy,](https://en.wikipedia.org/wiki/Philosophy_of_artificial_intelligence)\n\n[neuroscience, and other fields.](https://en.wikipedia.org/wiki/Neuroscience) <sup>[5]</sup>\n\nArtificial intelligence was founded as an academic discipline in 1956, <sup>[6]</sup> and the field went through\n\n[multiple cycles of optimism throughout its history,](https://en.wikipedia.org/wiki/History_of_artificial_intelligence) <sup>[7][8]</sup> followed by periods of disappointment and loss of\n\n[funding, known as AI winters.](https://en.wikipedia.org/wiki/AI_winter) <sup>[9][10]</sup> [ Funding and interest vastly increased after 2012 when deep learning](https://en.wikipedia.org/wiki/Deep_learning)\n\noutperformed previous AI techniques. <sup>[11]</sup> [ This growth accelerated further after 2017 with the transformer](https://en.wikipedia.org/wiki/Transformer_architecture)\n\n[architecture,](https://en.wikipedia.org/wiki/Transformer_architecture) <sup>[12]</sup> and by the early 2020s many billions of dollars were being invested in AI and the field\n\n[experienced rapid ongoing progress in what has become known as the AI boom. The emergence of](https://en.wikipedia.org/wiki/AI_boom)\n\nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed\n\n[several unintended consequences and harms in the present and raised concerns about the risks of AI and](https://en.wikipedia.org/wiki/AI_risk)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "265. Cellan-Jones (2014).\n\n266. Russell & Norvig 2021, p. 1001.\n\n267. Bostrom (2014).\n\n268. Russell (2019).\n\n269. Bostrom (2014); Müller & Bostrom (2014); Bostrom (2015).\n\n270. Harari (2023).\n\n271. Müller & Bostrom (2014).\n\n272. Leaders' concerns about the existential risks of AI around 2015: Rawlinson (2015), Holley\n\n(2015), Gibbs (2014), Sainato (2015)\n\n[273. \" \"Godfather of artificial intelligence\" talks impact and potential of new AI\" (https://www.cbsne](https://www.cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai)\n\n[ws.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai). ](https://www.cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai) *CBS*\n\n*News* [. 25 March 2023. Archived (https://web.archive.org/web/20230328225221/https://www.](https://web.archive.org/web/20230328225221/https://www.cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai)\n\n[cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai)](https://web.archive.org/web/20230328225221/https://www.cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai)\n\nfrom the original on 28 March 2023. Retrieved 28 March 2023.\n\n[274. Pittis, Don (4 May 2023). \"Canadian artificial intelligence leader Geoffrey Hinton piles on](https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302)\n\n[fears of computer takeover\" (https://www.cbc.ca/news/business/ai-doom-column-don-pittis-](https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302)\n\n[1.6829302). ](https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302) *CBC* [. Archived (https://web.archive.org/web/20240707032135/https://www.cbc.](https://web.archive.org/web/20240707032135/https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302)\n\n[ca/news/business/ai-doom-column-don-pittis-1.6829302) from the original on 7 July 2024.](https://web.archive.org/web/20240707032135/https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302)\n\nRetrieved 5 October 2024.\n\n[275. \" '50- 50 chance' that AI outsmarts humanity, Geoffrey Hinton says\" (https://www.bnnbloomb](https://www.bnnbloomberg.ca/50-50-chance-that-ai-outsmarts-humanity-geoffrey-hinton-says-1.2085394)\n\n[erg.ca/50-50-chance-that-ai-outsmarts-humanity-geoffrey-hinton-says-1.2085394).](https://www.bnnbloomberg.ca/50-50-chance-that-ai-outsmarts-humanity-geoffrey-hinton-says-1.2085394)\n\n*Bloomberg BNN* . 14 June 2024. Retrieved 6 July 2024.\n\n276. Valance (2023).\n\n[277. Taylor, Josh (7 May 2023). \"Rise of artificial intelligence is inevitable but should not be](https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says)\n\n[feared, 'father of AI' says\" (https://www.theguardian.com/technology/2023/may/07/rise-of-arti](https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says)\n\n[ficial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says). ](https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says) *The Guardian* .\n\n[Archived (https://web.archive.org/web/20231023061228/https://www.theguardian.com/techn](https://web.archive.org/web/20231023061228/https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says)\n\n[ology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-](https://web.archive.org/web/20231023061228/https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says)", - "page_start": 44, - "page_end": 44, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Vincent van Gogh in watercolour](https://en.wikipedia.org/wiki/Vincent_van_Gogh)\n\ncreated by generative AI software\n\nArtificial intelligent (AI) agents are software entities designed to\n\nperceive their environment, make decisions, and take actions\n\nautonomously to achieve specific goals. These agents can interact\n\nwith users, their environment, or other agents. AI agents are used\n\n[in various applications, including virtual assistants, chatbots,](https://en.wikipedia.org/wiki/Chatbots)\n\n[autonomous vehicles, game-playing systems, and industrial](https://en.wikipedia.org/wiki/Industrial_robotics)\n\n[robotics. AI agents operate within the constraints of their](https://en.wikipedia.org/wiki/Industrial_robotics)\n\nprogramming, available computational resources, and hardware\n\nlimitations. This means they are restricted to performing tasks\n\nwithin their defined scope and have finite memory and processing\n\ncapabilities. In real-world applications, AI agents often face time\n\nconstraints for decision-making and action execution. Many AI\n\nagents incorporate learning algorithms, enabling them to improve\n\ntheir performance over time through experience or training. Using\n\nmachine learning, AI agents can adapt to new situations and\n\noptimise their behaviour for their designated tasks. <sup>[175][176][177]</sup>\n\nThere are also thousands of successful AI applications used to solve specific problems for specific\n\nindustries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in\n\nsome offerings or processes. <sup>[178]</sup> [ A few examples are energy storage, medical diagnosis, military](https://en.wikipedia.org/wiki/Energy_storage)\n\n[logistics, applications that predict the result of judicial decisions, foreign policy, or supply chain](https://en.wikipedia.org/wiki/Foreign_policy)\n\nmanagement.\n\n[AI applications for evacuation and disaster management are growing. AI has been used to investigate if](https://en.wikipedia.org/wiki/Disaster)\n\nand how people evacuated in large scale and small scale evacuations using historical data from GPS,\n\nvideos or social media. Further, AI can provide real time information on the real time evacuation\n\nconditions. <sup>[179][180][181]</sup>\n\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments\n\nor increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict\n\nthe ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct\n\n[predictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests,](https://en.wikipedia.org/wiki/Predictive_analytics)\n\nand save water.\n\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and\n\napplications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the\n\ndevelopment of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting\n\nsolar activity, and distinguishing between signals and instrumental effects in gravitational wave\n\nastronomy. Additionally, it could be used for activities in space, such as space exploration, including the\n\nanalysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance,\n\nand more autonomous operation.\n\n#### **Other industry-specific tasks**", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Gibbs, Samuel (27 October 2014). \"Elon Musk: artificial intelligence is our biggest existential](https://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligence-ai-biggest-existential-threat)\n\n[threat\" (https://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligenc](https://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligence-ai-biggest-existential-threat)\n\n[e-ai-biggest-existential-threat). ](https://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligence-ai-biggest-existential-threat) *The Guardian* [. Archived (https://web.archive.org/web/201510](https://web.archive.org/web/20151030054330/http://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligence-ai-biggest-existential-threat)\n\n[30054330/http://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligen](https://web.archive.org/web/20151030054330/http://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligence-ai-biggest-existential-threat)\n\n[ce-ai-biggest-existential-threat) from the original on 30 October 2015. Retrieved 30 October](https://web.archive.org/web/20151030054330/http://www.theguardian.com/technology/2014/oct/27/elon-musk-artificial-intelligence-ai-biggest-existential-threat)\n\n2015.\n\nGoffrey, Andrew (2008). \"Algorithm\". In Fuller, Matthew (ed.). *[Software studies: a lexicon](https://archive.org/details/softwarestudiesl00full_007)* (http\n\n[s://archive.org/details/softwarestudiesl00full_007). Cambridge, Mass.: MIT Press. pp. 15 (htt](https://archive.org/details/softwarestudiesl00full_007/page/n29)\n\n[ps://archive.org/details/softwarestudiesl00full_007/page/n29)- 20. ISBN 978-1-4356-4787-9.](https://en.wikipedia.org/wiki/Special:BookSources/978-1-4356-4787-9)\n\n[Goldman, Sharon (14 September 2022). \"10 years later, deep learning 'revolution' rages on, say](https://venturebeat.com/ai/10-years-on-ai-pioneers-hinton-lecun-li-say-deep-learning-revolution-will-continue)\n\n[AI pioneers Hinton, LeCun and Li\" (https://venturebeat.com/ai/10-years-on-ai-pioneers-hinto](https://venturebeat.com/ai/10-years-on-ai-pioneers-hinton-lecun-li-say-deep-learning-revolution-will-continue)\n\n[n-lecun-li-say-deep-learning-revolution-will-continue). ](https://venturebeat.com/ai/10-years-on-ai-pioneers-hinton-lecun-li-say-deep-learning-revolution-will-continue) *VentureBeat* [. Archived (https://web.arc](https://web.archive.org/web/20241005171338/https://venturebeat.com/ai/10-years-on-ai-pioneers-hinton-lecun-li-say-deep-learning-revolution-will-continue/)\n\n[hive.org/web/20241005171338/https://venturebeat.com/ai/10-years-on-ai-pioneers-hinton-le](https://web.archive.org/web/20241005171338/https://venturebeat.com/ai/10-years-on-ai-pioneers-hinton-lecun-li-say-deep-learning-revolution-will-continue/)\n\n[cun-li-say-deep-learning-revolution-will-continue/) from the original on 5 October 2024.](https://web.archive.org/web/20241005171338/https://venturebeat.com/ai/10-years-on-ai-pioneers-hinton-lecun-li-say-deep-learning-revolution-will-continue/)\n\nRetrieved 8 December 2023.\n\n[Good, I. J. (1965), ](https://en.wikipedia.org/wiki/I._J._Good) *[Speculations Concerning the First Ultraintelligent Machine](https://exhibits.stanford.edu/feigenbaum/catalog/gz727rg3869)* (https://exhibits.st\n\n[anford.edu/feigenbaum/catalog/gz727rg3869), archived (https://web.archive.org/web/20230](https://web.archive.org/web/20230710131733/https://exhibits.stanford.edu/feigenbaum/catalog/gz727rg3869)\n\n[710131733/https://exhibits.stanford.edu/feigenbaum/catalog/gz727rg3869) from the original](https://web.archive.org/web/20230710131733/https://exhibits.stanford.edu/feigenbaum/catalog/gz727rg3869)\n\non 10 July 2023, retrieved 5 October 2024\n\nGoodfellow, Ian; Bengio, Yoshua; Courville, Aaron (2016), *[Deep Learning](https://web.archive.org/web/20160416111010/http://www.deeplearningbook.org)* (https://web.archive.or", - "page_start": 56, - "page_end": 56, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Some authors have suggested in practice, that the definition of AI is vague and difficult to define, with\n\ncontention as to whether classical algorithms should be categorised as AI, <sup>[367]</sup> with many companies\n\n[during the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not](https://en.wikipedia.org/wiki/Buzzword)\n\nactually use AI in a material way\". <sup>[368]</sup>\n\n[No established unifying theory or paradigm has guided AI research for most of its history.](https://en.wikipedia.org/wiki/Paradigm) <sup>[aa]</sup> The\n\nunprecedented success of statistical machine learning in the 2010s eclipsed all other approaches (so much\n\nso that some sources, especially in the business world, use the term \"artificial intelligence\" to mean\n\n[\"machine learning with neural networks\"). This approach is mostly sub-symbolic, soft and narrow. Critics](https://en.wikipedia.org/wiki/Artificial_general_intelligence)\n\nargue that these questions may have to be revisited by future generations of AI researchers.\n\n[Symbolic AI (or \"GOFAI\")](https://en.wikipedia.org/wiki/GOFAI) <sup>[370]</sup> simulated the high-level conscious reasoning that people use when they\n\nsolve puzzles, express legal reasoning and do mathematics. They were highly successful at \"intelligent\"\n\n[tasks such as algebra or IQ tests. In the 1960s, Newell and Simon proposed the physical symbol systems](https://en.wikipedia.org/wiki/Physical_symbol_systems_hypothesis)\n\n[hypothesis: \"A physical symbol system has the necessary and sufficient means of general intelligent](https://en.wikipedia.org/wiki/Physical_symbol_systems_hypothesis)\n\naction.\" <sup>[371]</sup>\n\nHowever, the symbolic approach failed on many tasks that humans solve easily, such as learning,\n\n[recognizing an object or commonsense reasoning. Moravec's paradox is the discovery that high-level](https://en.wikipedia.org/wiki/Moravec%27s_paradox)\n\n\"intelligent\" tasks were easy for AI, but low level \"instinctive\" tasks were extremely difficult. <sup>[372]</sup>\n\n[Philosopher Hubert Dreyfus had argued since the 1960s that human expertise depends on unconscious](https://en.wikipedia.org/wiki/Dreyfus%27_critique_of_AI)\n\ninstinct rather than conscious symbol manipulation, and on having a \"feel\" for the situation, rather than\n\nexplicit symbolic knowledge. <sup>[373]</sup> Although his arguments had been ridiculed and ignored when they\n\nwere first presented, eventually, AI research came to agree with him. <sup>[ab][16]</sup>\n\n[The issue is not resolved: sub-symbolic reasoning can make many of the same inscrutable mistakes that](https://en.wikipedia.org/wiki/Sub-symbolic)\n\n[human intuition does, such as algorithmic bias. Critics such as Noam Chomsky argue continuing research](https://en.wikipedia.org/wiki/Noam_Chomsky)\n\ninto symbolic AI will still be necessary to attain general intelligence, <sup>[375][376]</sup> in part because sub-\n\n[symbolic AI is a move away from explainable AI: it can be difficult or impossible to understand why a](https://en.wikipedia.org/wiki/Explainable_AI)\n\n[modern statistical AI program made a particular decision. The emerging field of neuro-symbolic artificial](https://en.wikipedia.org/wiki/Neuro-symbolic_AI)\n\n[intelligence attempts to bridge the two approaches.](https://en.wikipedia.org/wiki/Neuro-symbolic_AI)\n\n[\"Neats\" hope that intelligent behavior is described using simple, elegant principles (such as logic,](https://en.wikipedia.org/wiki/Logic)\n\n[optimization, or neural networks). \"Scruffies\" expect that it necessarily requires solving a large number of](https://en.wikipedia.org/wiki/Artificial_neural_network)\n\nunrelated problems. Neats defend their programs with theoretical rigor, scruffies rely mainly on\n\nincremental testing to see if they work. This issue was actively discussed in the 1970s and 1980s, <sup>[377]</sup> but\n\neventually was seen as irrelevant. Modern AI has elements of both.\n\n#### **Evaluating approaches to AI**", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" - }, - { - "text": "160. Alex McFarland: *[7 Best AI for Math Tools.](https://www.unite.ai/best-ai-for-math-tools/)* (https://www.unite.ai/best-ai-for-math-tools/)\n\n[Archived (https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-mat](https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-math-tools/)\n\n[h-tools/) 11 September 2024 at the Wayback Machine unite.ai. Retrieved 2024-08-07](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n161. Matthew Finio & Amanda Downie: IBM Think 2024 Primer, \"What is Artificial Intelligence (AI)\n\nin Finance?\" 8 Dec. 2023\n\n162. M. Nicolas, J. Firzli: Pensions Age/European Pensions magazine, \"Artificial Intelligence: Ask\n\n[the Industry\" May June 2024 https://videovoice.org/ai-in-finance-innovation-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[intended/ Archived (https://web.archive.org/web/20240911125502/https://videovoice.org/ai-i](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[n-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[act-wont-work-as-intended/) 11 September 2024 at the Wayback Machine.](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n163. Congressional Research Service (2019). *[Artificial Intelligence and National Security](https://fas.org/sgp/crs/natsec/R45178.pdf)* (https://f\n\n[as.org/sgp/crs/natsec/R45178.pdf) (PDF). Washington, DC: Congressional Research](https://fas.org/sgp/crs/natsec/R45178.pdf)\n\n[Service.PD-notice](https://en.wikipedia.org/wiki/Template:PD-notice)\n\n164. Slyusar, Vadym (2019). Artificial intelligence as the basis of future control networks\n\n[(Preprint). doi:10.13140/RG.2.2.30247.50087 (https://doi.org/10.13140%2FRG.2.2.30247.5](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[0087).](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[165. Iraqi, Amjad (3 April 2024). \" 'Lavender': The AI machine directing Israel's bombing spree in](https://www.972mag.com/lavender-ai-israeli-army-gaza/)\n\n[Gaza\" (https://www.972mag.com/lavender-ai-israeli-army-gaza/). ](https://www.972mag.com/lavender-ai-israeli-army-gaza/) *+972 Magazine* . Retrieved\n\n6 April 2024.\n\n[166. Davies, Harry; McKernan, Bethan; Sabbagh, Dan (1 December 2023). \" 'The Gospel': how](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[Israel uses AI to select bombing targets in Gaza\" (https://www.theguardian.com/world/2023/](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets). ](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets) *The Guardian* . Retrieved\n\n4 December 2023.\n\n[167. Marti, J Werner (10 August 2024). \"Drohnen haben den Krieg in der Ukraine revolutioniert,](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)\n\n[doch sie sind empfindlich auf Störsender - deshalb sollen sie jetzt autonom operieren\" (http](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Artificial intelligence content detection - Software to detect AI-generated content](https://en.wikipedia.org/wiki/Artificial_intelligence_content_detection)\n\n[Behavior selection algorithm - Algorithm that selects actions for intelligent agents](https://en.wikipedia.org/wiki/Behavior_selection_algorithm)\n\n[Business process automation - Automation of business processes](https://en.wikipedia.org/wiki/Business_process_automation)\n\n[Case-based reasoning - Process of solving new problems based on the solutions of similar](https://en.wikipedia.org/wiki/Case-based_reasoning)\n\npast problems\n\n[Computational intelligence - Ability of a computer to learn a specific task from data or](https://en.wikipedia.org/wiki/Computational_intelligence)\n\nexperimental observation\n\n[Digital immortality - Hypothetical concept of storing a personality in digital form](https://en.wikipedia.org/wiki/Digital_immortality)\n\n[Emergent algorithm - Algorithm exhibiting emergent behavior](https://en.wikipedia.org/wiki/Emergent_algorithm)\n\n[Female gendering of AI technologies - Gender biases in digital technology](https://en.wikipedia.org/wiki/Female_gendering_of_AI_technologies)\n\n### **In fiction**\n\n### **See also**", - "page_start": 27, - "page_end": 27, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the](https://en.wikipedia.org/wiki/Bletchley_Park)\n\nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks. <sup>[314]</sup>\n\n28 countries including the United States, China, and the European Union issued a declaration at the start\n\nof the summit, calling for international co-operation to manage the challenges and risks of artificial\n\nintelligence. <sup>[315][316]</sup> [ In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety](https://en.wikipedia.org/wiki/AI_Seoul_Summit)\n\ncommitments on the development of AI. <sup>[317][318]</sup>\n\nThe study of mechanical or \"formal\" reasoning began with philosophers and mathematicians in antiquity.\n\n[The study of logic led directly to Alan Turing's theory of computation, which suggested that a machine,](https://en.wikipedia.org/wiki/Theory_of_computation)\n\nby shuffling symbols as simple as \"0\" and \"1\", could simulate any conceivable form of mathematical\n\nreasoning. <sup>[319][320]</sup> [ This, along with concurrent discoveries in cybernetics, information theory and](https://en.wikipedia.org/wiki/Information_theory)\n\n[neurobiology, led researchers to consider the possibility of building an \"electronic brain\".](https://en.wikipedia.org/wiki/Neurobiology) <sup>[r]</sup> They\n\ndeveloped several areas of research that would become part of AI, <sup>[322]</sup> [ such as McCullouch and Pitts](https://en.wikipedia.org/wiki/Walter_Pitts)\n\ndesign for \"artificial neurons\" in 1943, <sup>[115]</sup> [ and Turing's influential 1950 paper 'Computing Machinery](https://en.wikipedia.org/wiki/Computing_Machinery_and_Intelligence)\n\n[and Intelligence', which introduced the Turing test and showed that \"machine intelligence\" was](https://en.wikipedia.org/wiki/Turing_test)\n\nplausible. <sup>[323][320]</sup>\n\n[The field of AI research was founded at a workshop at Dartmouth College in 1956.](https://en.wikipedia.org/wiki/Dartmouth_College) <sup>[s][6]</sup> The attendees\n\nbecame the leaders of AI research in the 1960s. <sup>[t]</sup> They and their students produced programs that the\n\npress described as \"astonishing\": <sup>[u]</sup> [ computers were learning checkers strategies, solving word problems](https://en.wikipedia.org/wiki/Checkers)\n\n[in algebra, proving logical theorems and speaking English.](https://en.wikipedia.org/wiki/Theorem) <sup>[v][7]</sup> Artificial intelligence laboratories were\n\nset up at a number of British and U.S. universities in the latter 1950s and early 1960s. <sup>[320]</sup>\n\nResearchers in the 1960s and the 1970s were convinced that their methods would eventually succeed in\n\n[creating a machine with general intelligence and considered this the goal of their field.](https://en.wikipedia.org/wiki/Artificial_general_intelligence) <sup>[327]</sup> In 1965\n\n[Herbert Simon predicted, \"machines will be capable, within twenty years, of doing any work a man can](https://en.wikipedia.org/wiki/Herbert_A._Simon)\n\ndo\". <sup>[328]</sup> [ In 1967 Marvin Minsky agreed, writing that \"within a generation ... the problem of creating](https://en.wikipedia.org/wiki/Marvin_Minsky)\n\n'artificial intelligence' will substantially be solved\". <sup>[329]</sup> They had, however, underestimated the difficulty\n\nof the problem. <sup>[w]</sup> In 1974, both the U.S. and British governments cut off exploratory research in\n\n[response to the criticism of Sir James Lighthill](https://en.wikipedia.org/wiki/Sir_James_Lighthill) <sup>[331]</sup> [ and ongoing pressure from the U.S. Congress to fund](https://en.wikipedia.org/wiki/Mansfield_Amendment)\n\n[more productive projects.](https://en.wikipedia.org/wiki/Mansfield_Amendment) <sup>[332]</sup> [ Minsky's and Papert's book ](https://en.wikipedia.org/wiki/Papert) *[Perceptrons](https://en.wikipedia.org/wiki/Perceptron)* was understood as proving that", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia3.pdf", - "query": "What would a superintelligence need?", - "target_page": 27, - "target_passage": "possess intelligence far surpassing that of the brightest and most gifted human mind.", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "[f1d) from the original on 14 September 2024, retrieved 5 October 2024](https://web.archive.org/web/20240914155020/https://www.nytimes.com/2023/09/20/books/authors-openai-lawsuit-chatgpt-copyright.html?campaign_id=2&emc=edit_th_20230921&instance_id=103259&nl=todaysheadlines®i_id=62816440&segment_id=145288&user_id=ad24f3545dae0ec44284a38bb4a88f1d)\n\n[Altman, Sam; Brockman, Greg; Sutskever, Ilya (22 May 2023). \"Governance of](https://openai.com/blog/governance-of-superintelligence)\n\n[Superintelligence\" (https://openai.com/blog/governance-of-superintelligence). ](https://openai.com/blog/governance-of-superintelligence) *openai.com* .\n\n[Archived (https://web.archive.org/web/20230527061619/https://openai.com/blog/governanc](https://web.archive.org/web/20230527061619/https://openai.com/blog/governance-of-superintelligence)\n\n[e-of-superintelligence) from the original on 27 May 2023. Retrieved 27 May 2023.](https://web.archive.org/web/20230527061619/https://openai.com/blog/governance-of-superintelligence)\n\nAnderson, Susan Leigh (2008). \"Asimov's \"three laws of robotics\" and machine metaethics\". *AI*\n\n*& Society* . **22** [ (4): 477- 493. doi:10.1007/s00146-007-0094-5 (https://doi.org/10.1007%2Fs0](https://doi.org/10.1007%2Fs00146-007-0094-5)\n\n[0146-007-0094-5). S2CID 1809459 (https://api.semanticscholar.org/CorpusID:1809459).](https://api.semanticscholar.org/CorpusID:1809459)\n\nAnderson, Michael; Anderson, Susan Leigh (2011). *Machine Ethics* . Cambridge University\n\nPress.\n\nArntz, Melanie; Gregory, Terry; Zierahn, Ulrich (2016), \"The risk of automation for jobs in OECD\n\ncountries: A comparative analysis\", *OECD Social, Employment, and Migration Working*\n\n*Papers 189*\n\nAsada, M.; Hosoda, K.; Kuniyoshi, Y.; Ishiguro, H.; Inui, T.; Yoshikawa, Y.; Ogino, M.; Yoshida,\n\nC. (2009). \"Cognitive developmental robotics: a survey\". *IEEE Transactions on Autonomous*\n\n*Mental Development* . **1** [ (1): 12- 34. doi:10.1109/tamd.2009.2021702 (https://doi.org/10.110](https://doi.org/10.1109%2Ftamd.2009.2021702)\n\n[9%2Ftamd.2009.2021702). S2CID 10168773 (https://api.semanticscholar.org/CorpusID:101](https://api.semanticscholar.org/CorpusID:10168773)\n\n[68773).](https://api.semanticscholar.org/CorpusID:10168773)\n\n[\"Ask the AI experts: What's driving today's progress in AI?\" (https://www.mckinsey.com/business](https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ask-the-ai-experts-whats-driving-todays-progress-in-ai)\n\n[-functions/mckinsey-analytics/our-insights/ask-the-ai-experts-whats-driving-todays-progress-](https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ask-the-ai-experts-whats-driving-todays-progress-in-ai)\n\n[in-ai). ](https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ask-the-ai-experts-whats-driving-todays-progress-in-ai) *McKinsey & Company* [. Archived (https://web.archive.org/web/20180413190018/http](https://web.archive.org/web/20180413190018/https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ask-the-ai-experts-whats-driving-todays-progress-in-ai)\n\n[s://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ask-the-ai-expert](https://web.archive.org/web/20180413190018/https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ask-the-ai-experts-whats-driving-todays-progress-in-ai)\n\n[s-whats-driving-todays-progress-in-ai) from the original on 13 April 2018. Retrieved 13 April](https://web.archive.org/web/20180413190018/https://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ask-the-ai-experts-whats-driving-todays-progress-in-ai)\n\n2018.\n\nBarfield, Woodrow; Pagallo, Ugo (2018). *Research handbook on the law of artificial intelligence* .\n\n[Cheltenham, UK: Edward Elgar Publishing. ISBN 978-1-7864-3904-8. OCLC 1039480085](https://search.worldcat.org/oclc/1039480085)\n\n[(https://search.worldcat.org/oclc/1039480085).](https://search.worldcat.org/oclc/1039480085)", - "page_start": 52, - "page_end": 52, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Finding a provably correct or optimal solution is intractable for many important problems.](https://en.wikipedia.org/wiki/Intractability_(complexity)) <sup>[15]</sup> Soft\n\n[computing is a set of techniques, including genetic algorithms, fuzzy logic and neural networks, that are](https://en.wikipedia.org/wiki/Fuzzy_logic)\n\ntolerant of imprecision, uncertainty, partial truth and approximation. Soft computing was introduced in\n\nthe late 1980s and most successful AI programs in the 21st century are examples of soft computing with\n\nneural networks.\n\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and\n\n[superintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these](https://en.wikipedia.org/wiki/Superintelligence)\n\nsolutions will lead indirectly to the field's long-term goals. <sup>[378][379]</sup> General intelligence is difficult to\n\ndefine and difficult to measure, and modern AI has had more verifiable successes by focusing on specific\n\nproblems with specific solutions. The sub-field of artificial general intelligence studies this area\n\nexclusively.\n\n[The philosophy of mind does not know whether a machine can have a mind, consciousness and mental](https://en.wikipedia.org/wiki/Philosophy_of_mind)\n\n[states, in the same sense that human beings do. This issue considers the internal experiences of the](https://en.wikipedia.org/wiki/Philosophy_of_mind)\n\nmachine, rather than its external behavior. Mainstream AI research considers this issue irrelevant because\n\nit does not affect the goals of the field: to build machines that can solve problems using intelligence.\n\n[Russell and Norvig add that \"[t]he additional project of making a machine conscious in exactly the way](https://en.wikipedia.org/wiki/Norvig)\n\nhumans are is not one that we are equipped to take on.\" <sup>[380]</sup> However, the question has become central to\n\n[the philosophy of mind. It is also typically the central question at issue in artificial intelligence in fiction.](https://en.wikipedia.org/wiki/Artificial_intelligence_in_fiction)\n\n[David Chalmers identified two problems in understanding the mind, which he named the \"hard\" and](https://en.wikipedia.org/wiki/David_Chalmers)\n\n\"easy\" problems of consciousness. <sup>[381]</sup> The easy problem is understanding how the brain processes\n\nsignals, makes plans and controls behavior. The hard problem is explaining how this *feels* or why it\n\nshould feel like anything at all, assuming we are right in thinking that it truly does feel like something\n\n[(Dennett's consciousness illusionism says this is an illusion). While human information processing is easy](https://en.wikipedia.org/wiki/Information_processing_(psychology))\n\n[to explain, human subjective experience is difficult to explain. For example, it is easy to imagine a color-](https://en.wikipedia.org/wiki/Subjective_experience)\n\nblind person who has learned to identify which objects in their field of view are red, but it is not clear\n\nwhat would be required for the person to *know what red looks like* . <sup>[382]</sup>\n\n[Computationalism is the position in the philosophy of mind that the human mind is an information](https://en.wikipedia.org/wiki/Philosophy_of_mind)\n\nprocessing system and that thinking is a form of computing. Computationalism argues that the\n\nrelationship between mind and body is similar or identical to the relationship between software and\n\n[hardware and thus may be a solution to the mind- body problem. This philosophical position was inspired](https://en.wikipedia.org/wiki/Mind%E2%80%93body_problem)\n\nby the work of AI researchers and cognitive scientists in the 1960s and was originally proposed by\n\n[philosophers Jerry Fodor and Hilary Putnam.](https://en.wikipedia.org/wiki/Hilary_Putnam) <sup>[383]</sup>\n\n[Philosopher John Searle characterized this position as \"strong AI\": \"The appropriately programmed](https://en.wikipedia.org/wiki/Strong_AI_hypothesis)", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" - }, - { - "text": "calculation and qualitative, value-based judgement. <sup>[264]</sup>\n\nIt has been argued AI will become so powerful that humanity may irreversibly lose control of it. This\n\n[could, as physicist Stephen Hawking stated, \"spell the end of the human race\".](https://en.wikipedia.org/wiki/Global_catastrophic_risk) <sup>[265]</sup> This scenario has been\n\ncommon in science fiction, when a computer or robot suddenly develops a human-like \"self-awareness\"\n\n(or \"sentience\" or \"consciousness\") and becomes a malevolent character. <sup>[q]</sup> These sci-fi scenarios are\n\nmisleading in several ways.\n\n[First, AI does not require human-like sentience to be an existential risk. Modern AI programs are given](https://en.wikipedia.org/wiki/Sentience)\n\n[specific goals and use learning and intelligence to achieve them. Philosopher Nick Bostrom argued that if](https://en.wikipedia.org/wiki/Nick_Bostrom)\n\none gives *almost any* goal to a sufficiently powerful AI, it may choose to destroy humanity to achieve it\n\n[(he used the example of a paperclip factory manager).](https://en.wikipedia.org/wiki/Instrumental_convergence#Paperclip_maximizer) <sup>[267]</sup> [ Stuart Russell gives the example of household](https://en.wikipedia.org/wiki/Stuart_J._Russell)\n\nrobot that tries to find a way to kill its owner to prevent it from being unplugged, reasoning that \"you\n\ncan't fetch the coffee if you're dead.\" <sup>[268]</sup> [ In order to be safe for humanity, a superintelligence would have](https://en.wikipedia.org/wiki/Superintelligence)\n\n[to be genuinely aligned with humanity's morality and values so that it is \"fundamentally on our side\".](https://en.wikipedia.org/wiki/AI_alignment) <sup>[269]</sup>\n\n[Second, Yuval Noah Harari argues that AI does not require a robot body or physical control to pose an](https://en.wikipedia.org/wiki/Yuval_Noah_Harari)\n\n[existential risk. The essential parts of civilization are not physical. Things like ideologies, law,](https://en.wikipedia.org/wiki/Law)\n\n[government, money and the economy are built on language; they exist because there are stories that](https://en.wikipedia.org/wiki/Language)\n\n[billions of people believe. The current prevalence of misinformation suggests that an AI could use](https://en.wikipedia.org/wiki/Misinformation)\n\nlanguage to convince people to believe anything, even to take actions that are destructive. <sup>[270]</sup>\n\nThe opinions amongst experts and industry insiders are mixed, with sizable fractions both concerned and\n\nunconcerned by risk from eventual superintelligent AI. <sup>[271]</sup> [ Personalities such as Stephen Hawking, Bill](https://en.wikipedia.org/wiki/Bill_Gates)\n\n[Gates, and Elon Musk,](https://en.wikipedia.org/wiki/Elon_Musk) <sup>[272]</sup> [ as well as AI pioneers such as Yoshua Bengio, Stuart Russell, Demis](https://en.wikipedia.org/wiki/Demis_Hassabis)\n\n[Hassabis, and Sam Altman, have expressed concerns about existential risk from AI.](https://en.wikipedia.org/wiki/Sam_Altman)\n\n[In May 2023, Geoffrey Hinton announced his resignation from Google in order to be able to \"freely speak](https://en.wikipedia.org/wiki/Geoffrey_Hinton)\n\nout about the risks of AI\" without \"considering how this impacts Google.\" <sup>[273]</sup> He notably mentioned\n\n[risks of an AI takeover,](https://en.wikipedia.org/wiki/AI_takeover) <sup>[274]</sup> and stressed that in order to avoid the worst outcomes, establishing safety\n\nguidelines will require cooperation among those competing in use of AI. <sup>[275]</sup>\n\n[In 2023, many leading AI experts endorsed the joint statement that \"Mitigating the risk of extinction from](https://en.wikipedia.org/wiki/Statement_on_AI_risk_of_extinction)\n\nAI should be a global priority alongside other societal-scale risks such as pandemics and nuclear\n\nwar\". <sup>[276]</sup>\n\n[Some other researchers were more optimistic. AI pioneer Jürgen Schmidhuber did not sign the joint](https://en.wikipedia.org/wiki/J%C3%BCrgen_Schmidhuber)", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia3.pdf" - }, - { - "text": "show that even a computer capable of perfectly simulating human behavior would not have a mind. <sup>[387]</sup>\n\n[It is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel),](https://en.wikipedia.org/wiki/Sentient_AI)\n\nand if so, to what degree. <sup>[388]</sup> But if there is a significant chance that a given machine can feel and suffer,\n\nthen it may be entitled to certain rights or welfare protection measures, similarly to animals. <sup>[389][390]</sup>\n\n[Sapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may](https://en.wikipedia.org/wiki/Self-awareness)\n\nprovide another moral basis for AI rights. <sup>[389]</sup> [ Robot rights are also sometimes proposed as a practical](https://en.wikipedia.org/wiki/Robot_rights)\n\nway to integrate autonomous agents into society. <sup>[391]</sup>\n\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI\n\nsystems. Similarly to the legal status of companies, it would have conferred rights but also\n\nresponsibilities. <sup>[392]</sup> Critics argued in 2018 that granting rights to AI systems would downplay the\n\n[importance of human rights, and that legislation should focus on user needs rather than speculative](https://en.wikipedia.org/wiki/Human_rights)\n\nfuturistic scenarios. They also noted that robots lacked the autonomy to take part to society on their\n\nown. <sup>[393][394]</sup>\n\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI\n\n[sentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot](https://en.wikipedia.org/wiki/Moral_blindness)\n\n[analogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created](https://en.wikipedia.org/wiki/Suffering_risks)\n\nand carelessly exploited. <sup>[390][389]</sup>\n\n[A superintelligence is a hypothetical agent that would possess intelligence far surpassing that of the](https://en.wikipedia.org/wiki/Superintelligence)\n\nbrightest and most gifted human mind. <sup>[379]</sup> [ If research into artificial general intelligence produced](https://en.wikipedia.org/wiki/Artificial_general_intelligence)\n\n[sufficiently intelligent software, it might be able to reprogram and improve itself. The improved software](https://en.wikipedia.org/wiki/Recursive_self-improvement)\n\n[would be even better at improving itself, leading to what I. J. Good called an \"intelligence explosion\" and](https://en.wikipedia.org/wiki/Intelligence_explosion)\n\n[Vernor Vinge called a \"singularity\".](https://en.wikipedia.org/wiki/Technological_singularity) <sup>[395]</sup>\n\n[However, technologies cannot improve exponentially indefinitely, and typically follow an S-shaped](https://en.wikipedia.org/wiki/S-shaped_curve)\n\n[curve, slowing when they reach the physical limits of what the technology can do.](https://en.wikipedia.org/wiki/S-shaped_curve) <sup>[396]</sup>\n\n[Robot designer Hans Moravec, cyberneticist Kevin Warwick and inventor Ray Kurzweil have predicted](https://en.wikipedia.org/wiki/Ray_Kurzweil)\n\n[that humans and machines may merge in the future into cyborgs that are more capable and powerful than](https://en.wikipedia.org/wiki/Cyborg)\n\n[either. This idea, called transhumanism, has roots in the writings of Aldous Huxley and Robert](https://en.wikipedia.org/wiki/Robert_Ettinger)\n\n[Ettinger.](https://en.wikipedia.org/wiki/Robert_Ettinger) <sup>[397]</sup>\n\n##### **AI welfare and rights**\n\n### **Future**\n\n#### **Superintelligence and the singularity**\n\n#### **Transhumanism**", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" - }, - { - "text": "intelligence, 2015 has been a landmark year. Computers are smarter and learning faster\n\nthan ever\", and noted that the number of software projects that use machine learning at\n\n[Google increased from a \"sporadic usage\" in 2012 to more than 2,700 projects in 2015.](https://en.wikipedia.org/wiki/Google) <sup>[348]</sup>\n\n[aa. Nils Nilsson wrote in 1983: \"Simply put, there is wide disagreement in the field about what AI](https://en.wikipedia.org/wiki/Nils_Nilsson_(researcher))\n\nis all about.\" <sup>[369]</sup>\n\nab. Daniel Crevier wrote that \"time has proven the accuracy and perceptiveness of some of\n\nDreyfus's comments. Had he formulated them less aggressively, constructive actions they\n\nsuggested might have been taken much earlier.\" <sup>[374]</sup>\n\nac. Searle presented this definition of \"Strong AI\" in 1999. <sup>[384]</sup> Searle's original formulation was\n\n\"The appropriately programmed computer really is a mind, in the sense that computers\n\ngiven the right programs can be literally said to understand and have other cognitive\n\nstates.\" <sup>[385]</sup> [ Strong AI is defined similarly by Russell and Norvig: \"Stong AI - the assertion](https://en.wikipedia.org/wiki/Norvig)\n\nthat machines that do so are *actually* thinking (as opposed to *simulating* thinking).\" <sup>[386]</sup>", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the](https://en.wikipedia.org/wiki/Bletchley_Park)\n\nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks. <sup>[314]</sup>\n\n28 countries including the United States, China, and the European Union issued a declaration at the start\n\nof the summit, calling for international co-operation to manage the challenges and risks of artificial\n\nintelligence. <sup>[315][316]</sup> [ In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety](https://en.wikipedia.org/wiki/AI_Seoul_Summit)\n\ncommitments on the development of AI. <sup>[317][318]</sup>\n\nThe study of mechanical or \"formal\" reasoning began with philosophers and mathematicians in antiquity.\n\n[The study of logic led directly to Alan Turing's theory of computation, which suggested that a machine,](https://en.wikipedia.org/wiki/Theory_of_computation)\n\nby shuffling symbols as simple as \"0\" and \"1\", could simulate any conceivable form of mathematical\n\nreasoning. <sup>[319][320]</sup> [ This, along with concurrent discoveries in cybernetics, information theory and](https://en.wikipedia.org/wiki/Information_theory)\n\n[neurobiology, led researchers to consider the possibility of building an \"electronic brain\".](https://en.wikipedia.org/wiki/Neurobiology) <sup>[r]</sup> They\n\ndeveloped several areas of research that would become part of AI, <sup>[322]</sup> [ such as McCullouch and Pitts](https://en.wikipedia.org/wiki/Walter_Pitts)\n\ndesign for \"artificial neurons\" in 1943, <sup>[115]</sup> [ and Turing's influential 1950 paper 'Computing Machinery](https://en.wikipedia.org/wiki/Computing_Machinery_and_Intelligence)\n\n[and Intelligence', which introduced the Turing test and showed that \"machine intelligence\" was](https://en.wikipedia.org/wiki/Turing_test)\n\nplausible. <sup>[323][320]</sup>\n\n[The field of AI research was founded at a workshop at Dartmouth College in 1956.](https://en.wikipedia.org/wiki/Dartmouth_College) <sup>[s][6]</sup> The attendees\n\nbecame the leaders of AI research in the 1960s. <sup>[t]</sup> They and their students produced programs that the\n\npress described as \"astonishing\": <sup>[u]</sup> [ computers were learning checkers strategies, solving word problems](https://en.wikipedia.org/wiki/Checkers)\n\n[in algebra, proving logical theorems and speaking English.](https://en.wikipedia.org/wiki/Theorem) <sup>[v][7]</sup> Artificial intelligence laboratories were\n\nset up at a number of British and U.S. universities in the latter 1950s and early 1960s. <sup>[320]</sup>\n\nResearchers in the 1960s and the 1970s were convinced that their methods would eventually succeed in\n\n[creating a machine with general intelligence and considered this the goal of their field.](https://en.wikipedia.org/wiki/Artificial_general_intelligence) <sup>[327]</sup> In 1965\n\n[Herbert Simon predicted, \"machines will be capable, within twenty years, of doing any work a man can](https://en.wikipedia.org/wiki/Herbert_A._Simon)\n\ndo\". <sup>[328]</sup> [ In 1967 Marvin Minsky agreed, writing that \"within a generation ... the problem of creating](https://en.wikipedia.org/wiki/Marvin_Minsky)\n\n'artificial intelligence' will substantially be solved\". <sup>[329]</sup> They had, however, underestimated the difficulty\n\nof the problem. <sup>[w]</sup> In 1974, both the U.S. and British governments cut off exploratory research in\n\n[response to the criticism of Sir James Lighthill](https://en.wikipedia.org/wiki/Sir_James_Lighthill) <sup>[331]</sup> [ and ongoing pressure from the U.S. Congress to fund](https://en.wikipedia.org/wiki/Mansfield_Amendment)\n\n[more productive projects.](https://en.wikipedia.org/wiki/Mansfield_Amendment) <sup>[332]</sup> [ Minsky's and Papert's book ](https://en.wikipedia.org/wiki/Papert) *[Perceptrons](https://en.wikipedia.org/wiki/Perceptron)* was understood as proving that", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia3.pdf" - }, - { - "text": "consciousness, namely the neural correlates of various conscious processes. <sup>[22]</sup> This more modest goal is\n\nthe focus of most scientists working on consciousness. <sup>[133]</sup> [ Psychologist Susan Blackmore believes, by](https://en.wikipedia.org/wiki/Susan_Blackmore)\n\ncontrast, that the search for the neural correlates of consciousness is futile and itself predicated on an\n\nerroneous belief in the hard problem of consciousness. <sup>[134]</sup>\n\n[A functionalist view in cognitive science holds that the mind is an information processing system, and](https://en.wikipedia.org/wiki/Cognitive_science)\n\n[that cognition and consciousness together are a form of computation. Cognition, distinct from](https://en.wikipedia.org/wiki/Computation)\n\n[consciousness, is explained by neural computation in the computational theory of cognition. The](https://en.wikipedia.org/wiki/Computational_cognition)\n\ncomputational theory of mind asserts that not only cognition, but also phenomenal consciousness or\n\n[qualia, are computational. While the computation system is realized by neurons rather than electronics, in](https://en.wikipedia.org/wiki/Qualia)\n\ntheory it would be possible for artificial intelligence to be conscious.\n\n[Integrated information theory (IIT), developed by the neuroscientist and psychiatrist Giulio Tononi in](https://en.wikipedia.org/wiki/Giulio_Tononi)\n\n2004 and more recently also advocated by Koch, is one of the most discussed models of consciousness in\n\nneuroscience and elsewhere. <sup>[135][136]</sup> [ The theory proposes an identity between consciousness and](https://en.wikipedia.org/wiki/Identity_(philosophy))\n\nintegrated information, with the latter item (denoted as Φ) defined mathematically and thus in principle\n\nmeasurable. <sup>[136][137]</sup> The hard problem of consciousness, write Tononi and Koch, may indeed be\n\nintractable when working from matter to consciousness. <sup>[15]</sup> However, because IIT inverts this relationship\n\nand works from phenomenological axioms to matter, they say it could be able to solve the hard\n\nproblem. <sup>[15]</sup> In this vein, proponents have said the theory goes beyond identifying human neural\n\ncorrelates and can be extrapolated to all physical systems. Tononi wrote (along with two colleagues):\n\nWhile identifying the \"neural correlates of consciousness\" is undoubtedly important, it is\n\nhard to see how it could ever lead to a satisfactory explanation of what consciousness is and\n\nhow it comes about. As will be illustrated below, IIT offers a way to analyze systems of\n\nmechanisms to determine if they are properly structured to give rise to consciousness, how\n\nmuch of it, and of which kind. <sup>[138]</sup>\n\nAs part of a broader critique of IIT, Michael Cerullo suggested that the theory's proposed explanation is in\n\n[fact for what he dubs (following Scott Aaronson) the \"Pretty Hard Problem\" of methodically inferring](https://en.wikipedia.org/wiki/Scott_Aaronson)\n\nwhich physical systems are conscious—but would not solve Chalmers' hard problem. <sup>[136]</sup> \"Even if IIT is\n\ncorrect,\" he argues, \"it does not explain why integrated information generates (or is) consciousness.\" <sup>[136]</sup>\n\nChalmers agrees that IIT, if correct, would solve the \"Pretty Hard Problem\" rather than the hard\n\nproblem. <sup>[139]</sup>\n\n[Global workspace theory (GWT) is a cognitive architecture and theory of consciousness proposed by the](https://en.wikipedia.org/wiki/Cognitive_architecture)\n\n[cognitive psychologist Bernard Baars in 1988.](https://en.wikipedia.org/wiki/Bernard_Baars) <sup>[140]</sup> Baars explains the theory with the metaphor of a\n\ntheater, with conscious processes represented by an illuminated stage. <sup>[140]</sup> This theater integrates inputs\n\n#### **Computational cognition**\n\n#### **Integrated information theory**\n\n#### **Global workspace theory**", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia2.pdf" - }, - { - "text": "the future to warrant research or that humans will be valuable from the perspective of a superintelligent\n\nmachine. <sup>[282]</sup> However, after 2016, the study of current and future risks and possible solutions became a\n\nserious area of research. <sup>[283]</sup>\n\nFriendly AI are machines that have been designed from the beginning to minimize risks and to make\n\n[choices that benefit humans. Eliezer Yudkowsky, who coined the term, argues that developing friendly AI](https://en.wikipedia.org/wiki/Eliezer_Yudkowsky)\n\nshould be a higher research priority: it may require a large investment and it must be completed before AI\n\nbecomes an existential risk. <sup>[284]</sup>\n\nMachines with intelligence have the potential to use their intelligence to make ethical decisions. The field\n\nof machine ethics provides machines with ethical principles and procedures for resolving ethical\n\ndilemmas. <sup>[285]</sup> The field of machine ethics is also called computational morality, <sup>[285]</sup> and was founded at\n\n[an AAAI symposium in 2005.](https://en.wikipedia.org/wiki/AAAI) <sup>[286]</sup>\n\n[Other approaches include Wendell Wallach's \"artificial moral agents\"](https://en.wikipedia.org/wiki/Wendell_Wallach) <sup>[287]</sup> [ and Stuart J. Russell's three](https://en.wikipedia.org/wiki/Human_Compatible#Russell's_three_principles)\n\n[principles for developing provably beneficial machines.](https://en.wikipedia.org/wiki/Human_Compatible#Russell's_three_principles) <sup>[288]</sup>\n\n[Active organizations in the AI open-source community include Hugging Face,](https://en.wikipedia.org/wiki/Hugging_Face) <sup>[289]</sup> [ Google,](https://en.wikipedia.org/wiki/Google) <sup>[290]</sup>\n\n[EleutherAI and Meta.](https://en.wikipedia.org/wiki/Meta_Platforms) <sup>[291]</sup> [ Various AI models, such as Llama 2, Mistral or Stable Diffusion, have been](https://en.wikipedia.org/wiki/Stable_Diffusion)\n\nmade open-weight, <sup>[292][293]</sup> meaning that their architecture and trained parameters (the \"weights\") are\n\n[publicly available. Open-weight models can be freely fine-tuned, which allows companies to specialize](https://en.wikipedia.org/wiki/Fine-tuning_(deep_learning))\n\nthem with their own data and for their own use-case. <sup>[294]</sup> Open-weight models are useful for research and\n\ninnovation but can also be misused. Since they can be fine-tuned, any built-in security measure, such as\n\nobjecting to harmful requests, can be trained away until it becomes ineffective. Some researchers warn\n\nthat future AI models may develop dangerous capabilities (such as the potential to drastically facilitate\n\n[bioterrorism) and that once released on the Internet, they cannot be deleted everywhere if needed. They](https://en.wikipedia.org/wiki/Bioterrorism)\n\nrecommend pre-release audits and cost-benefit analyses. <sup>[295]</sup>\n\nArtificial Intelligence projects can have their ethical permissibility tested while designing, developing,\n\nand implementing an AI system. An AI framework such as the Care and Act Framework containing the\n\n[SUM values—developed by the Alan Turing Institute tests projects in four main areas:](https://en.wikipedia.org/wiki/Alan_Turing_Institute) <sup>[296][297]</sup>\n\n**Respect** the dignity of individual people\n\n**Connect** with other people sincerely, openly, and inclusively\n\n**Care** for the wellbeing of everyone\n\n**Protect** social values, justice, and the public interest\n\n[Other developments in ethical frameworks include those decided upon during the Asilomar Conference,](https://en.wikipedia.org/wiki/Asilomar_Conference_on_Beneficial_AI)\n\nthe Montreal Declaration for Responsible AI, and the IEEE's Ethics of Autonomous Systems initiative,\n\namong others; <sup>[298]</sup> however, these principles do not go without their criticisms, especially regards to the\n\npeople chosen contributes to these frameworks. <sup>[299]</sup>\n\n#### **Ethical machines and alignment**\n\n#### **Open source**\n\n#### **Frameworks**", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia3.pdf" - }, - { - "text": "The Turing test can provide some\n\nevidence of intelligence, but it\n\npenalizes non-human intelligent\n\nbehavior. <sup>[361]</sup>\n\nU.S. Computer Science PhD graduates have specialized in \"AI\". <sup>[353]</sup> About 800,000 \"AI\"-related U.S. job\n\nopenings existed in 2022. <sup>[354]</sup> [ According to PitchBook research, 22% of newly funded startups in 2024](https://en.wikipedia.org/wiki/Startup_company)\n\nclaimed to be AI companies. <sup>[355]</sup>\n\nPhilosophical debates have historically sought to determine the nature of intelligence and how to make\n\nintelligent machines. <sup>[356]</sup> Another major focus has been whether machines can be conscious, and the\n\nassociated ethical implications. <sup>[357]</sup> Many other topics in philosophy are relevant to AI, such as\n\n[epistemology and free will.](https://en.wikipedia.org/wiki/Free_will) <sup>[358]</sup> Rapid advancements have intensified public discussions on the\n\n[philosophy and ethics of AI.](https://en.wikipedia.org/wiki/Ethics_of_AI) <sup>[357]</sup>\n\n[Alan Turing wrote in 1950 \"I propose to consider the question 'can machines think'?\"](https://en.wikipedia.org/wiki/Alan_Turing) <sup>[359]</sup> He advised\n\nchanging the question from whether a machine \"thinks\", to \"whether or not it is possible for machinery to\n\nshow intelligent behaviour\". <sup>[359]</sup> He devised the Turing test, which measures the ability of a machine to\n\nsimulate human conversation. <sup>[323]</sup> Since we can only observe the behavior of the machine, it does not\n\n[matter if it is \"actually\" thinking or literally has a \"mind\". Turing notes that we can not determine these](https://en.wikipedia.org/wiki/Problem_of_other_minds)\n\n[things about other people but \"it is usual to have a polite convention that everyone thinks.\"](https://en.wikipedia.org/wiki/Problem_of_other_minds) <sup>[360]</sup>\n\n[Russell and Norvig agree with Turing that intelligence must be](https://en.wikipedia.org/wiki/Norvig)\n\ndefined in terms of external behavior, not internal structure. <sup>[1]</sup>\n\nHowever, they are critical that the test requires the machine to\n\n[imitate humans. \"Aeronautical engineering texts\", they wrote, \"do](https://en.wikipedia.org/wiki/Aeronautics)\n\nnot define the goal of their field as making 'machines that fly so\n\n[exactly like pigeons that they can fool other pigeons.'\"](https://en.wikipedia.org/wiki/Pigeon) <sup>[362]</sup> AI\n\nfounder [John ](https://en.wikipedia.org/wiki/John_McCarthy_(computer_scientist)) McCarthy agreed, writing that \"Artificial\n\nintelligence is not, by definition, simulation of human\n\nintelligence\". <sup>[363]</sup>\n\nMcCarthy defines intelligence as \"the computational part of the\n\nability to achieve goals in the world\". <sup>[364]</sup> Another AI founder,\n\n[Marvin Minsky similarly describes it as \"the ability to solve hard](https://en.wikipedia.org/wiki/Marvin_Minsky)\n\nproblems\". <sup>[365]</sup> The leading AI textbook defines it as the study of\n\nagents that perceive their environment and take actions that maximize their chances of achieving defined\n\ngoals. <sup>[1]</sup> These definitions view intelligence in terms of well-defined problems with well-defined\n\nsolutions, where both the difficulty of the problem and the performance of the program are direct\n\nmeasures of the \"intelligence\" of the machine—and no other philosophical discussion is required, or may\n\nnot even be possible.\n\nAnother definition has been adopted by Google, <sup>[366]</sup> a major practitioner in the field of AI. This definition\n\nstipulates the ability of systems to synthesize information as the manifestation of intelligence, similar to\n\nthe way it is defined in biological intelligence.\n\n### **Philosophy**\n\n#### **Defining artificial intelligence**", - "page_start": 23, - "page_end": 23, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Alternatively, dedicated models for mathematical problem solving with higher precision for the outcome\n\nincluding proof of theorems have been developed such as *Alpha Tensor* , *Alpha Geometry* and *Alpha*\n\n*Proof* [ all from Google DeepMind,](https://en.wikipedia.org/wiki/Google_DeepMind) <sup>[157]</sup> *Llemma* from eleuther <sup>[158]</sup> or *Julius* . <sup>[159]</sup>\n\nWhen natural language is used to describe mathematical problems, converters transform such prompts\n\n[into a formal language such as Lean to define mathematical tasks.](https://en.wikipedia.org/wiki/Lean_(proof_assistant))\n\nSome models have been developed to solve challenging problems and reach good results in benchmark\n\ntests, others to serve as educational tools in mathematics. <sup>[160]</sup>\n\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail\n\nonline banking to investment advice and insurance, where automated \"robot advisers\" have been in use\n\nfor some years. <sup>[161]</sup>\n\n[World Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly](https://en.wikipedia.org/wiki/World_Pensions_%26_Investments_Forum)\n\ninnovative AI-informed financial products and services: \"the deployment of AI tools will simply further\n\nautomatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice\n\nin the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension\n\ninnovation.\" <sup>[162]</sup>\n\nVarious countries are deploying AI military applications. <sup>[163]</sup> [ The main applications enhance command](https://en.wikipedia.org/wiki/Command_and_control)\n\n[and control, communications, sensors, integration and interoperability.](https://en.wikipedia.org/wiki/Command_and_control) <sup>[164]</sup> Research is targeting\n\nintelligence collection and analysis, logistics, cyber operations, information operations, and\n\n[semiautonomous and autonomous vehicles.](https://en.wikipedia.org/wiki/Vehicular_automation) <sup>[163]</sup> AI technologies enable coordination of sensors and\n\n[effectors, threat detection and identification, marking of enemy positions, target acquisition, coordination](https://en.wikipedia.org/wiki/Target_acquisition)\n\n[and deconfliction of distributed Joint Fires between networked combat vehicles involving manned and](https://en.wikipedia.org/wiki/Forward_observers_in_the_U.S._military)\n\nunmanned teams. <sup>[164]</sup>\n\nAI has been used in military operations in Iraq, Syria, Israel and Ukraine. <sup>[163][165][166][167]</sup>\n\n[In the early 2020s, generative AI gained widespread prominence. GenAI is AI capable of generating text,](https://en.wikipedia.org/wiki/Generative_AI)\n\n[images, videos, or other data using generative models,](https://en.wikipedia.org/wiki/Generative_model) <sup>[168][169]</sup> [ often in response to prompts.](https://en.wikipedia.org/wiki/Prompt_(natural_language)) <sup>[170][171]</sup>\n\n[In March 2023, 58% of U.S. adults had heard about ChatGPT and 14% had tried it.](https://en.wikipedia.org/wiki/ChatGPT) <sup>[172]</sup> The increasing\n\n[realism and ease-of-use of AI-based text-to-image generators such as Midjourney, DALL-E, and Stable](https://en.wikipedia.org/wiki/Stable_Diffusion)\n\n[Diffusion sparked a trend of viral AI-generated photos. Widespread attention was gained by a fake photo](https://en.wikipedia.org/wiki/Viral_phenomenon)\n\n[of Pope Francis wearing a white puffer coat, the fictional arrest of Donald Trump, and a hoax of an attack](https://en.wikipedia.org/wiki/Donald_Trump)\n\n[on the Pentagon, as well as the usage in professional creative arts.](https://en.wikipedia.org/wiki/The_Pentagon) <sup>[173][174]</sup>\n\n#### **Finance**\n\n#### **Military**\n\n#### **Generative AI**\n\n#### **Agents**", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia3.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia3.pdf", - "query": "Where can I find the Inspect tool to evaluate the safety of our models?", - "target_page": 21, - "target_passage": "The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations available under a MIT open-source licence which is freely available on GitHub", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "### **Safer and healthier technologies and organisation**\n\nTo support the **practical implementation of preventive safety and health measures** , numerous\n\nactors (e.g. organisations of OSH professionals and practitioners, and standardisation institutes such\n\nas the European Committee for Standardisation and the International Organisation for Standardisation)\n\nissued safety and health guidance or standards, or developed new and advanced OSH management\n\nsystems, the engineering sciences worked on better technical preventive technologies, on measuring\n\nand monitoring technologies, the medical sciences introduced better medical diagnosis and treatment\n\nof work-related diseases, and the social sciences contributed with better knowledge on the legal and\n\neconomic determinants of OSH, or analysed the characteristics of awareness raising, knowledge\n\ndevelopment and healthy work organisation.\n\nIt is obvious that **better technical and organisational prevention at work** contributed to more safety\n\nand the evident strong reduction in accidents. **Prominent fields and examples** of such improvements\n\nare: technically safer design of moving vehicles (e.g. for fork lifts or heavy trucks and machines, light\n\nand noise warning signals for moving vehicles); safer design of machines like automatic shutdowns or\n\ndisconnections, two-hand operating of machines (e.g. for pressing and punching), safer cranes including\n\nbetter technologies for communication between co-workers, coverage of moving parts, safer company\n\ncars (e.g. safety belts and airbags), safer tools (e.g. for drilling or cutting); improved personal protective\n\nequipment like air-supplied breathing apparatus, steel mesh gloves for meat workers, trousers for forest\n\nworkers that resist a chainsaw; minimum safety requirements for buildings (e.g. forms and size of stairs\n\nand handrails, fire exits and fire alarms, safer ladders and scaffolds), emergency equipment like eye\n\nwash and emergency showers; better monitoring of acute hazards (e.g. in sewage water systems),\n\nexhaust and ventilation technologies to avoid fumes, dusts, chemicals or contact with hazardous\n\nbiological agents; strong safety obligations for work in confined spaces, or for work at height and work\n\nin trenches; introduction of explosion zones and of non-sparking tools, a comprehensive system of\n\nwarning signals, warning signals for slippery floors and unsafe grounds, better warning systems and\n\nequipment in particularly dangerous work environments like road maintenance, combined with better\n\norganisational measures; quality systems that promote continuous repair and maintenance of tools;\n\nregular instructions by safety representatives and safety coordinators, and guarantee of minimum safety\n\nstandards of machines and products by European standards like CE (‘European Conformity’).\n\n### **Major technological developments**\n\nThe widespread **introduction of new or advanced technologies** — automation, digitalisation/ICT,\n\ngreen technologies, new material technologies and so on — results in substantial changes in work\n\norganisation and work processes, and replacement of (traditional) materials (screws by glues, metal and\n\nwood by plastics, nanomaterials). For OSH regulators and practitioners, it is a constant challenge to\n\nassess these changes regarding their impact on risks for health and safety and to develop adequate\n\nrisk prevention and mitigation measures.\n\n**Foresight studies** (e.g. by EU-OSHA) have shown that such technological change can help improve\n\nworking conditions, for example, by taking over heavy, dangerous or routine work (automation,\n\nrobotisation, exoskeletons), or by better communication and remote control via ICT tools. At the same\n\ntime, they can also pose new risks, creating rigid work processes without much decision latitude, along\n\nwith technical options for extreme surveillance and control (e.g. by constant geolocation), or pose new", - "page_start": 13, - "page_end": 13, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "O U R W O R K\n\nHelps maintain safe driving\n\nRisk has not yet appeared Risk has appeared Crash may occur Crash is unavoidable Crash Post crash\n\nHelps correct to safer condition\n\nIntervenes to safer condition\n\nPrepares for crash Helps Mitigate crash injury Helps mitigate post-crash injury\n\n**Normal Driving Risk Accident Post**\n\n**Accident** Cameras\n\nDisplay\n\nSafety Shield—concept image Around View Monitor\n\n**Safety**\n\nIn the area of safety, we have established Vision Zero, the\n\ngoal of which is to reduce the number of fatal accidents to\n\nzero. As a reference point, we are using the number of\n\nsuch accidents in 1995 that involved Nissan vehicles. We\n\nrealize that accidents cannot be completely avoided, so our\n\nobjective is to be substantially zero in the future. To achieve\n\nthis, we have set a series of milestones, including cutting\n\nthe 1995 fatal accident figure in half by 2015.\n\nInterestingly, while the number of fatal ones is\n\ndecreasing, the number of all accidents in Japan is\n\nincreasing. Our first goal is to decrease the overall accident\n\ncount, which should further reduce the number of fatalities.\n\nSeveral factors contribute to accidents, including driver\n\ninexperience and higher speeds. Based on these factors,\n\nwe came up with the approach of Safety Shield. Safety\n\nShield establishes a timeline for the entire accident,\n\ncovering the safe driving zone, the moment before the\n\naccident, the actual crash, the response time by authorities,\n\nand the time taken for post-accident rescue.\n\nIn the past, safety technology primarily focused on\n\ndealing with damage in and around the vehicle, such as\n\nairbags, body structure design, seatbelts and crumple\n\nzones. Now we are studying normal driving conditions and\n\nresearching how we can keep car and driver in the safe\n\ndriving zone. In cases where the driving environment\n\nbecomes unsafe, some type of warning would usually help\n\nthe driver to return to the safe driving zone. A driver actually\n\nin danger has probably lost control of the car. In the latter\n\ncases, we must focus on safety technologies that prompt\n\nthe vehicle itself to automatically assist the driver. An\n\nexample of this is Nissan’s Lane Departure Prevention\n\nsystem or brake assist: When the vehicle approaches the\n\nlane markers, this system not only warns the driver to pay\n\nattention through a display and an audible buzzer, it also\n\ngenerates part of the necessary yaw movement needed to\n\nreturn the vehicle to its lane and safety.\n\nAnother Nissan safety innovation is the Around\n\nView Monitor. This system offers a 360-degree view on\n\na dashboard display of what is around the vehicle. In\n\naddition to significantly reducing the blind spots in driving,\n\nthe Around View Monitor is helpful when parking, since\n\nit improves the driver’s field of vision and enables\n\nbetter maneuverability.\n\nIn developing safety technologies, we also look at the\n\nconditions that exist seconds before an unavoidable crash.\n\nWith this information, we can provide technologies to\n\nminimize the impact and damage in addition to notifying the\n\nauthorities and calling for assistance afterward. Because\n\nwe are building on actual accident data, the final stage in\n\nthe Safety Shield involves collecting and analyzing the data\n\nand feeding what we learn back into the development\n\nprocess. We have committed ourselves to introducing over\n\nten new safety technologies during the next three years,\n\nspanning the entire driving range from the safe driving\n\nzone to the actual crash.\n\nFor more on safety at Nissan, please see the *2005 Nissan*\n\n*Sustainability Report*", - "page_start": 47, - "page_end": 47, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "### **10.3 Send for checking (PM)**\n\nOnce the SE’s/or PM’s have prepared the national GHG inventory, by entering data into the sectoral grids and the\n\nPM of the Party has checked the complete GHG inventory for consistency and correctness, the following steps allows\n\nthe PM to send the inventory for checking:\n\n1. Log in as PM.\n\n2. Click on “View Inventories Progress” under sub menu “Submission Management”.\n\n3. The “View Inventories Progress” screen appears.\n\n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 58, a).\n\n5. Press the “Send for Checking by NFP” button to send it to the NFP for his review and approval (figure 58, b).\n\n*** Note: A notification email will be sent to the NFP email address, and the status changed to “check”\n\n(figure 59).\n\n* **Figure 58. Work on Inventories screen - Status = Started** *\n\n* **Figure 59. Work on Inventories screen - Status = check** *", - "page_start": 36, - "page_end": 36, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "and noise warning signals for moving vehicles; safer design of machines like automatic shutdowns or\n\ndisconnections, two-hand operating of machines, for example, for pressing and punching, safer cranes\n\nincluding better technologies for communication between co-workers, coverage of moving parts, safer\n\ncompany cars, for example, safety belts, safer tools, for example, for drilling or cutting; improved PPE\n\nlike air-supplied breathing apparatus, steel-made gloves for meat workers, trousers that resist a\n\nchainsaw; minimum requirements for buildings, for example, forms and size of stairs and handrails, fire exits and fire alarms, safer ladders and scaffolds, <sup>126</sup> emergency equipment like eye wash and\n\nemergency shower; better monitoring of acute hazards, for example, in sewage water systems, exhaust\n\nand ventilation technologies, to avoid fumes, dusts, chemicals or contact with hazardous biological\n\nagents; strong safety obligations for work in confined spaces, work at height and work in trenches;\n\nintroduction of explosion zones and of non-sparking tools, a comprehensive system of warning signals,\n\nwarning signals for slippery floors and unsafe grounds, better warning systems and equipment in", - "page_start": 61, - "page_end": 61, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Eurostat has developed under the lead of UNECE a framework to assess the quality of employment in\n\nits multiple facets. <sup>497</sup> Eurostat describes this framework as set of 68 indicators <sup>498</sup> on seven dimensions\n\n*‘that* *address employment quality from the perspective of the employed person. Its design also facilitates*\n\n*international comparisons.’* <sup>499</sup> OSH is covered under the section ‘Safety’ and is based on four indicators\n\nand includes two outcome and two risk indicators: 1) Fatal occupational injuries / Number of fatal\n\naccidents at work (excluding traffic accidents); 2) Non-fatal occupational injuries / Number of non-fatal\n\naccidents at work; 3) Exposure to physical health risk factors; and 4) Exposure to mental health risk\n\nfactors. Eurostat implements the OSH parts of this framework by its ESAW and by the OSH-related ad\n\nhoc modules to the LFS, called ‘Accidents at work and other work-related health problems’ (surveys in\n\n2007, 2013 and 2020).\n\nFor more detailed monitoring at EU level, DG EMPL/ACSH and EU-OSHA developed a structural model\n\nthat uses four groupings: **Generic information** on the basics of the OSH systems and on major context\n\nfactors like age or sectoral structure, main policies for the **Steering of OSH** , an overview on relevant\n\n**Working conditions and Prevention** , and **Outcomes** , that is, accidents, diseases and wellbeing, and\n\nsome elements of the **OSH infrastructure and monitoring capacity** . Currently, the OSH Barometer\n\nworks with 16 quantitative and qualitative indicators in these four groupings. Some of these indicators\n\nare purely descriptive, like the short descriptions of OSH authorities, OSH institutions or OSH-related\n\nsurveys, and others allow qualitative comparisons of structures and policies, for example, the indicator\n\non ‘National strategies’ or ‘Social dialogue’. Many indicators, for example, on working conditions or work\n\naccidents, are based on quantitative data from surveys and statistics. These indicators allow a\n\ncomparison between sectors, occupations, types of enterprises, countries, for example.\n\n**CHAPTERS INDICATORS**\n\n**Generic information** Indicator: **OSH authorities** (descriptive)\n\nIndicator: **Economic and sector profile** (quantitative)\n\nIndicator: **Workforce profile** (quantitative)\n\n**Steering of OSH**\n\nIndicator: **Regulation** (descriptive)\n\nIndicator: **National strategies** (descriptive)\n\nIndicator: **Social dialogue** (descriptive, composite indicator)\n\n**Working conditions and prevention**\n\nIndicator: **Working conditions** (quantitative)\n\nIndicator: **Prevention in companies** (quantitative)\n\nIndicator: **Worker involvement** (quantitative)\n\nIndicator: **OSH culture and health awareness** (quantitative)\n\n**Accidents, diseases and wellbeing**\n\nIndicator: **Work accidents** (quantitative)\n\nIndicator: **Work-related diseases** (quantitative)\n\nIndicator: **Health perception of workers** (quantitative)", - "page_start": 137, - "page_end": 137, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Safety and health at work is everyone’s concern. It’s good for you. It’s good for business.\n\nOccupational safety and health in Europe: state and trends 2023\n\nEuropean Agency for Safety and Health at Work **EN**", - "page_start": 0, - "page_end": 0, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "####### **Changes in Internal Control Over Financial Reporting**\n\nBased on an evaluation, under the supervision and with the participation of our management, including\n\nour Chief Executive OÇcer and Chief Financial OÇcer, there has been no change in our internal control over\n\nÑnancial reporting during our last Ñscal quarter identiÑed in connection with that evaluation, that has\n\nmaterially aÅected, or is reasonably likely to materially aÅect, our internal control over Ñnancial reporting.\n\n####### **ITEM 9B. OTHER INFORMATION**\n\nNone.\n\n88", - "page_start": 95, - "page_end": 95, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Page 9 10/02/2013\n\n3.2.2.1.2 Start a GHG inventory\n\nIn order to START a GHG inventory, please follow the steps below:\n\n- Log in as PM.\n\n- Hover the cursor on the “Submission Management” and click on the “View Inventories Progress” button.\n\n- Click/select the appropriate GHG Inventory in Status = “created” (see figure 7a).\n\n- Click on “Work on Inventories” under Submission Management (see figure 7b).\n\n* **Figure 7: Select an Inventory screen** *\n\n- Left click to select the appropriate Inventory (figure 8a)\n\n- Press the “Start Inventory” button (figure 8b)\n\n* **Figure 8: Start an Inventory screen** *\n\nOnce the “Start Inventory” button is pressed, the status of the selected Inventory change to “started”. (see Figure 9)\n\n* **Figure 9: “Started” status of an Inventory** *", - "page_start": 8, - "page_end": 8, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "Appendix A. Sample lab: Deployment and Pod management **209**\n\n5. The Results window is displayed and shows the progress of the deployment (see\n\nFigure A-7). To continue, click **Close** .\n\n*Figure A-7 Results window*\n\n6. In the Application Console view, browse to the project1 project page by selecting the\n\nproject from the project list, as shown in Figure A-8. Scroll down the list to find your\n\nproject. Click **project1** .\n\n*Figure A-8 Application Console view*", - "page_start": 224, - "page_end": 224, - "source_file": "sg248459.pdf" - }, - { - "text": "## *Figure 5 - Feature Info tool.*\n\nThe different displayed layers can be examined using the “Legend” tool. If the external service\n\nprovides legend graphics, the user can interpret the given symbology and temporarily disable the\n\ndisplay of layers (see Figure 6 ).\n\n## *Figure 6 - Legend tool.*", - "page_start": 39, - "page_end": 39, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" - } - ] - }, - { - "references": { - "source_file": "legal2_opengouvernementlicense.pdf", - "query": "What was the age category of most new opiate/crack users during the crime peak in the mid-1990s?", - "target_page": 9, - "target_passage": "mplying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "3\n\n### Summary\n\n#### **Executive summary**\n\nThis paper uses a range of datasets and methodologies to:\n\n- obtain working estimates for the number of individuals in England who started using opiates/crack from 2005 to 2013; <sup>1</sup>\n\n- examine the characteristics of these individuals.\n\nThe main findings of the paper are as follows.\n\n- It is estimated that around 5,000 to 8,000 individuals started using opiates or crack- cocaine in 2013. There is a high degree of uncertainty around this figure due to the sparse data on this population, but sense-checks based on treatment and criminal justice system data suggest the true figure is unlikely to be much larger than 10,000.\n\n- Data also suggest that the number of current opiate/crack initiates involved with crime may be even lower. The number of arrestees testing positive for the first time for opiates (or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first 11 months of 2013, a fall of around 70 per cent <sup>2</sup> . Furthermore, of the new positive testers in 2013, only 721 were aged 18- 24. <sup>3</sup> Though this arrestee data will capture only a proportion of the true population, it does suggest that the number of new, young initiates involved with crime - those who have the potential to inflict most societal harm - has decreased markedly, probably just to a few thousand per year; and that this group now make up a small minority of the total number of opiate/crack-cocaine users (estimated to be 294,000 in 2011/12), most of whom are older, longer-term users.\n\n- In terms of trends in new opiate/crack-cocaine users, all available data suggest that figures have dipped by at least a fifth since 2005 and have dropped hugely since the late 1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very rapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the epidemic years, published estimates of new opiate/crack-cocaine users in Manchester and Bolton show rates more than 11 times larger.\n\n- However, the findings also suggest that between 2011 and early 2014, the number of new opiate/crack-cocaine users stopped decreasing and instead stabilised at a (historically) low level. Further analysis was conducted to try and determine whether this was a precursor to a new rise in initiates. Though the data are not totally conclusive, the results suggest that a marked increase in new opiate/crack-cocaine users in the near future is unlikely. If anything, findings suggested that the downward trend may be set to resume.\n\n- Analysis also revealed some possible changes in characteristics of the new opiate/crack- cocaine initiates. There is a trend in the treatment data towards new initiates coming to treatment earlier in their drug-using careers than previous cohorts and also to have\n\n1 At the time of writing, data was unavailable for the period after November 2013. 2 It is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data. 3 787 if adjusted for the missing month.", - "page_start": 2, - "page_end": 2, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "4\n\ninitiated use at an older age. Currently it is not possible to determine whether this is a reporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users.\n\n- The report has several important policy implications. Even though numbers of new initiates involved with crime have dropped to the low thousands, putting downward pressure on crime, identification and early diversion to treatment remains paramount. Frontier Economics have estimated that the average <sup>4</sup> lifetime crime cost of an injecting drug user is £445,000, so the potential for social harm - even from a small number of individuals - remains large and potentially long-lasting. This means local areas need to manage both the (relatively large) stock of current users, and the (much smaller) flow of new initiates, whose treatment needs may be different. There is no evidence of any new epidemic in this country, but given the impact of the epidemic of the 80s and early 90s on crime, ongoing monitoring of recent trends is required to spot early signs of any emerging problems.\n\n#### **Aims and Methodology**\n\nPrevious Home Office research has demonstrated the importance of opiate/crack-cocaine use in driving aggregate trends in acquisitive crime (Morgan, 2014). While established estimates exist of the *total* number of opiate/crack-cocaine users (OCUs) in England (Hay *et al* ., 2013), there are no estimates for the number of *new* OCUs each year (throughout this paper the number of new OCUs is also referred to as **‘incidence’** ). This is important for three main reasons.\n\ni) **Stock and flows:** Simply knowing the stock of OCUs tells us nothing about the flows in and out - i.e. if the stock were constant each year that could mean that no one starts using these drugs and no one quits or it could mean *all* existing users quit but that they are wholly replaced by new users, or any similar scenario in between. Clearly the policy response would need to be quite different for each of these cases, so knowing the true situation is important. ii) **Early-warning system:** Research by the Home Office and others has shown that there is generally a lag between the start of a heroin/crack epidemic and the point at which it becomes visible on administrative datasets. Closing this gap is important for policy, and part of the reason for its existence is the lack of incidence estimates. Evidence also suggests epidemics spread from area to area, so it is important to monitor local as well as national trends. iii) **The social harm that can arise:** Though research suggests that not all OCUs resort to acquisitive crime to help finance their drug use, numerous studies show that a proportion consistently do and these individuals can be extremely prolific offenders (Morgan, 2014). One study by Frontier Economics estimated that the average lifetime cost to society of an injecting drug user was £445,000 from crime alone. Hence analysing and identifying new OCUs is a policy priority (Frontier Economics, 2010).\n\nThere are two inter-connected reasons why regular national incidence estimates have not been attempted before <sup>5</sup> . The first is that data on this issue are sparse given the ‘hidden’ nature of opiate/crack markets and that date of first use is not something that gets recorded at the moment it actually occurs. The second reason, which flows from the first, is that current\n\n4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few individuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to acquisitive crime at all (Morgan, 2014). 5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at various different levels of geography, see for example: De Angelis *et al* ., 2004, Millar *et al* ., 2001 and Hickman *et al* ., 2001.", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "between March 2011 and March 2015 can also be seen in the raw numbers for total new OCU treatment presentations. <sup>22</sup>\n\n**Figure 10: New treatment presentations for opiate/crack use.**\n\nFigure 10 shows that, rather than increasing in the current year, new presentations for opiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a decrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics have been missed before (see Morgan, 2014), and the potential social harm that a fresh increase in new OCUs could cause, further analysis was conducted on the most recent data to try and determine whether the apparent flattening in trends was actually caused by the early stages of a significant surge in new users.\n\nThe treatment data was broken down by age to check whether the slight fall in total new presentations in 2014/15 masked an increase in younger treatment presentations. This showed instead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to 3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a faster rate over the last year than for those aged over-25. Furthermore, separate statistics produced for those in treatment aged 18-and-under also show a fall in aggregate numbers in treatment for opiates and crack.\n\nWe also looked at trends at the local level, given that previous epidemics have started in very specific areas and have taken several years to spread nationally. This means that the start of an epidemic can be hidden in the national data because it has not reached enough areas to register.\n\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment before. So unlike our definition of ‘new’ elsewhere it includes individuals who have been to treatment previously.", - "page_start": 26, - "page_end": 26, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "9\n\ncocaine users. In addition, the sharp decline in total DIP tests in 2013 may be due in part to the fact that DIP ceased to be a nationally funded programme in April 2013.\n\nThese data do show, however, that from 2006 onwards, between a third and half of all acquisitive crime arrests involved a drug test and between 15 per cent and 35 per cent of those tests (depending on the year) resulted in a positive result for opiates-only or for both opiates and cocaine (hereafter labelled `positive-for-both’).\n\nThe reason for highlighting only the opiates-only and the `positive-for-both’ test results is that the primary group of interest in this report are opiate and crack-cocaine users. To capture this group, cocaine-only tests must be excluded because DIP tests cannot distinguish between powder- and crack-cocaine, so a cocaine-only positive test could indicate either. Previous evidence has demonstrated that while there is much overlap between heroin and crack-cocaine cohorts (i.e. many of those who use heroin also use crack-cocaine), *powder-* cocaine users have a quite different profile and are far less likely to be involved with acquisitive crime. Excluding the cocaine-only tests means we can be guaranteed not to capture any powder-cocaine users (who are not also using opiates or crack), but it also means we may miss some crack-cocaine-only users, hence the figures may under-estimate the true population of OCUs slightly.\n\nThe fifth row in Table 1 shows that the total number of opiate and opiate/cocaine tests over the period was 364,537. Table 2 shows descriptive statistics for the individuals providing these tests (noting that the same individual may be included several times if they gave multiple positive tests).\n\n**Table 2: Descriptive statistics on all positive opiate-only/positive-for-both tests.**\n\nOpiate/opiate+cocaine positive tests in England 2004- 2013 (all positive tests including repeats by the same individual)\n\nAge Year of birth\n\n| Number of tests | 364,537 | Number of tests | 364,537 |\n|:---|---:|:---|---:|\n| Mean | 32 | Mean | 1977 |\n| Median | 31 | Median | 1977 |\n| Mode | 28 | Mode | 1979 |\n| Minimum | 18 | Minimum | 1960 |\n| Maximum | 53 | Maximum | 1995 |\n\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s. <sup>9</sup> Given evidence suggesting that the average age of initiation for opiate/crack use is around 18- 20 (Millar *et al* ., 2001), this age profile would tentatively suggest that OCU incidence also peaked in the 1990s and that this created a large cohort of users who would be approaching 40 today.\n\nThe minimum and maximum years of birth are fixed by construction, because anyone born\n\n9 Note that the dataset counts tests, not unique individuals, so the same person can appear more than once.", - "page_start": 8, - "page_end": 8, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "### Conclusion\n\nThis report has attempted to draw together available data and evidence to estimate the number of new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look briefly at their characteristics. This is important as previous research has suggested that - mostly through the actions of a minority - this group has the potential to have a large impact on crime trends and therefore to impose significant societal costs.\n\nThough data on this population is imperfect, a number of different data sources and methodologies are available to estimate OCU incidence. From these, three key conclusions emerge:\n\n- The number of new opiate/crack users is clearly far lower now than it was in the 1980s and early 1990s and has even dropped 20-45% since 2005.\n\n- This means numbers of new users in 2013 may be around 5,000-8,000 with an approximate upper bound of 10,000; and numbers involved with prolific criminality will be lower still.\n\n- The downward trend in new OCUs has flattened since about 2011, but available data do not suggest that this is the precursor to a new increase. If anything, the downward trend may resume in 2014, though the situation requires further monitoring.\n\nFor local areas then, this report suggests that it is still important to identify new OCUs as the arrestee data showed that a proportion of these are likely to offend over a long period of time. But also, there was some evidence of a shift to older initiates, which may require a slightly different treatment approach.", - "page_start": 29, - "page_end": 29, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and over, so only using data to 2013 means it would not be possible for anyone to be born in 1996 or afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that positive opiate tests drop off sharply for those born after 1982. This is in line with other evidence suggesting that the number of *new* users of opiates decreased sharply in the 2000s. This needs to be considered when interpreting the analysis that follows. When DIP and the NDTMS treatment system began in the mid-2000s, there already existed a cohort of around 320,000 OCUs, according to available estimates by Hay *et al* ., (2013). And most of these individuals began using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data capture this means it is hard to separate the gradual inclusion of more and more individuals from this original cohort from genuinely new users of these drugs.\n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the average age at positive test is 32, the peak is quite flat, with high numbers of positive tests still being recorded by individuals in their late 30s and even into their 40s.", - "page_start": 9, - "page_end": 9, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "### 2. Estimating an incidence trend from treatment data\n\nThis section uses treatment data from the National Database Treatment Monitoring System (NDTMS) to estimate the number of new OCUs annually. The NDTMS captures data on the numbers of people presenting to services with problem drug misuse and information about the drug treatment they receive. All drug treatment agencies in England provide a basic level of information to the NDTMS on their activities each month. The data for this report included all unique individuals presenting to treatment with opiates or crack-cocaine listed as their primary drug between 2005 and 2014. All individuals whose age of first use was listed as below ten or before 2005 were then excluded. Excluding individuals who started using opiates/crack before 2005 resulted in a large number of records being left out, due to the fact that the majority of the treatment population, even in 2013/14, initiated in the 1980s and 1990s when heroin and crack use surged in the UK. However, this exclusion is necessary for the incidence methodology, as explained later in this section. The remaining dataset included 52,829 individuals, as shown in Table 10.\n\n**Table 10: Descriptive statistics from the NDTMS data.**\n\n| Reason for exclusion | Number of individuals excluded | Total number of individuals analysed |\n|:---|:---|:---|\n| Initial sample prior to exclusion | 0 | 243,588 |\n| No age at first use recorded or age was below 10 or higher than age at first treatment | 443 | 243,145 |\n| Year of first use before 2005 | 190,316 | 52,829 |\n| Percentage of total sample initiating 2005- 14 | n/a | 21.7% |\n\nThe majority of those presenting for treatment between 2005 and 2014 started using opiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014. This suggests an average of just under 5,000 new starters per year during this period. But this would be an under-estimate of incidence because it is likely that some of those who began use between 2005 and 2014 would not yet have come to treatment during that period.\n\nTo correct for this, we use two variants of a methodology employed by researchers in Millar *et* *al* . (2001) and Hickman *et al* . (2001). These papers discuss the methodology in detail.\n\nIn brief, the method uses the lag-to-treatment distribution for the sample coupled with the number of new treatment presentations in a given year to estimate OCU incidence in that year. So, when presenting to treatment, all individuals are asked to provide the year in which they first began using their primary drug, which for this analysis was limited to opiates and/or crack-", - "page_start": 21, - "page_end": 21, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Table 3: Descriptive statistics for the DIP positive opiate-only/positive-for-both tests in which an individual can be identified with a PNC number.**\n\nThe age and year of birth distributions are also similar and are shown in the Appendix. Thus, for the majority of the analysis that follows, tests with no PNC number were excluded. <sup>10</sup>\n\nThe charts and tables above use data from *all* positive tests, so will include cases where the same individual has tested positively on more than one occasion. The following data look just at the *first* test for each individual testing positive for opiates-only or positive-for-both.\n\n**Table 4: Descriptive statistics on first positive opiate-only/positive-for-both tests.**\n\nFirst positive opiate/opiate+cocaine tests (unique individuals)\n\nAge Year of birth\n\n| Number of tests | 104,817 | Number of tests | 104,817 |\n|:---|---:|:---|---:|\n| Mean | 31 | Mean | 1977 |\n| Median | 30 | Median | 1977 |\n| Mode | 27 | Mode | 1980 |\n| Minimum | 18 | Minimum | 1960 |\n| Maximum | 53 | Maximum | 1995 |\n\nThere were just over 100,000 unique individuals who tested positive for opiates-only or positive- for-both between 2004 and 2013. The distribution of the 296,008 positive tests these individuals gave, shows that the vast majority (55%) were only tested once (see Figure 4), which is likely to be why the age statistics are quite similar between Table 3 and Table 4. However, within this\n\n10 Examining the data it is also clear that some areas recorded a higher proportion of cases without a PNC number than others. Thus excluding these cases further affects the variation in geographic coverage across time. See Appendix for more.\n\nAll positive opiate/opiate+cocaine tests (including repeats) that were recorded on PNC; England 2004- 2013\n\nAge Year of birth\n\n| Number of tests | 296,008 | Number of tests | 296,008 |\n|:---|---:|:---|---:|\n| Mean | 32 | Mean | 1977 |\n| Median | 31 | Median | 1977 |\n| Mode | 28 | Mode | 1979 |\n| Minimum | 18 | Minimum | 1960 |\n| Maximum | 53 | Maximum | 1995 |", - "page_start": 11, - "page_end": 11, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "The analysis showed that of the 149 Drug Action Team areas in England, 72 per cent had decreases in new OCU treatment numbers in the year to September 2014 compared to the previous year. Furthermore, of the 42 areas showing an increase, only 11 also showed a rise for the 12 months to September 2010 compared with the 12 months to September 2014, and most of these involved small numbers of individuals.\n\nOverall then, the very recent data on treatment presentations do not currently suggest that the number of new OCUs is on the verge of increasing, merely that it flattened for a period.\n\nA number of factors could explain the flattening. Most importantly, if there was some sort of shock that caused a one-off reduction in the lag-time to treatment this could make it appear as if incidence was rising when in fact new users may be falling but a greater percentage may simply be turning up to treatment faster. Such a shock may have occurred given the reduction in heroin supply seen from the end of 2010 through to 2012 (see Ahmad *et al* ,. 2016). If users unable to obtain heroin used this enforced abstinence as a spur to seek treatment and hence to present to treatment services earlier than they otherwise would have done, this could cause a one-off\n\n‘concertina effect’ in which treatment numbers initially flatten or even rise but then fall again. This would also explain why the downward trend has apparently resumed: evidence suggests the reduction in supply has also ended.\n\nHowever, further analysis revealed some other possibilities based on the characteristics of those attending opiate/crack treatment for the first time in recent years. The Appendix includes a series of graphs with age-of-onset distributions for those who first attended treatment in 2013, and then 2012, and so on back to 2004. These show that the majority of those who presented to treatment in 2004 initiated use in the mid-1990s in line with the likely peak of the epidemic. But by 2012 a far greater number of individuals presenting to treatment say they started using opiates/crack only a year or two before. <sup>23</sup> In other words, there appears to be a shift towards a shorter lag between initiation and treatment. This shift looks even more dramatic when using proportions rather than absolute numbers, see the Appendix.\n\nFurthermore, these individuals (those who seem to have both initiated recently *and* presented to treatment within a year or two of initiation) show a notably different age-of-initiation profile compared to the established profile in the literature, which peaks around 18- 22 (Donmall & Jones, 2005). These individuals have a notably older age profile: see figure 11 chart, which compares recent initiates who presented to treatment in 2005 with recent initiates who presented to treatment in 2013.\n\n23 This shift does not appear to be related to the reduction in heroin supply occurring around 2010/11. As Appendix 1 demonstrates, the pattern emerges far earlier.", - "page_start": 27, - "page_end": 27, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "## **New opiate and crack-cocaine users: characteristics and trends**\n\nResearch Report 90\n\nNick Morgan, Daniel Heap, Amy Elliott, Tim Millar\n\nJanuary 2016", - "page_start": 0, - "page_end": 0, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal2_opengouvernementlicense.pdf", - "query": "According to the National Database Treatment Monitoring System, how many people started using opiates/crack between 2005 and 2014?", - "target_page": 22, - "target_passage": " Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "### 2. Estimating an incidence trend from treatment data\n\nThis section uses treatment data from the National Database Treatment Monitoring System (NDTMS) to estimate the number of new OCUs annually. The NDTMS captures data on the numbers of people presenting to services with problem drug misuse and information about the drug treatment they receive. All drug treatment agencies in England provide a basic level of information to the NDTMS on their activities each month. The data for this report included all unique individuals presenting to treatment with opiates or crack-cocaine listed as their primary drug between 2005 and 2014. All individuals whose age of first use was listed as below ten or before 2005 were then excluded. Excluding individuals who started using opiates/crack before 2005 resulted in a large number of records being left out, due to the fact that the majority of the treatment population, even in 2013/14, initiated in the 1980s and 1990s when heroin and crack use surged in the UK. However, this exclusion is necessary for the incidence methodology, as explained later in this section. The remaining dataset included 52,829 individuals, as shown in Table 10.\n\n**Table 10: Descriptive statistics from the NDTMS data.**\n\n| Reason for exclusion | Number of individuals excluded | Total number of individuals analysed |\n|:---|:---|:---|\n| Initial sample prior to exclusion | 0 | 243,588 |\n| No age at first use recorded or age was below 10 or higher than age at first treatment | 443 | 243,145 |\n| Year of first use before 2005 | 190,316 | 52,829 |\n| Percentage of total sample initiating 2005- 14 | n/a | 21.7% |\n\nThe majority of those presenting for treatment between 2005 and 2014 started using opiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014. This suggests an average of just under 5,000 new starters per year during this period. But this would be an under-estimate of incidence because it is likely that some of those who began use between 2005 and 2014 would not yet have come to treatment during that period.\n\nTo correct for this, we use two variants of a methodology employed by researchers in Millar *et* *al* . (2001) and Hickman *et al* . (2001). These papers discuss the methodology in detail.\n\nIn brief, the method uses the lag-to-treatment distribution for the sample coupled with the number of new treatment presentations in a given year to estimate OCU incidence in that year. So, when presenting to treatment, all individuals are asked to provide the year in which they first began using their primary drug, which for this analysis was limited to opiates and/or crack-", - "page_start": 21, - "page_end": 21, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "3\n\n### Summary\n\n#### **Executive summary**\n\nThis paper uses a range of datasets and methodologies to:\n\n- obtain working estimates for the number of individuals in England who started using opiates/crack from 2005 to 2013; <sup>1</sup>\n\n- examine the characteristics of these individuals.\n\nThe main findings of the paper are as follows.\n\n- It is estimated that around 5,000 to 8,000 individuals started using opiates or crack- cocaine in 2013. There is a high degree of uncertainty around this figure due to the sparse data on this population, but sense-checks based on treatment and criminal justice system data suggest the true figure is unlikely to be much larger than 10,000.\n\n- Data also suggest that the number of current opiate/crack initiates involved with crime may be even lower. The number of arrestees testing positive for the first time for opiates (or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first 11 months of 2013, a fall of around 70 per cent <sup>2</sup> . Furthermore, of the new positive testers in 2013, only 721 were aged 18- 24. <sup>3</sup> Though this arrestee data will capture only a proportion of the true population, it does suggest that the number of new, young initiates involved with crime - those who have the potential to inflict most societal harm - has decreased markedly, probably just to a few thousand per year; and that this group now make up a small minority of the total number of opiate/crack-cocaine users (estimated to be 294,000 in 2011/12), most of whom are older, longer-term users.\n\n- In terms of trends in new opiate/crack-cocaine users, all available data suggest that figures have dipped by at least a fifth since 2005 and have dropped hugely since the late 1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very rapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the epidemic years, published estimates of new opiate/crack-cocaine users in Manchester and Bolton show rates more than 11 times larger.\n\n- However, the findings also suggest that between 2011 and early 2014, the number of new opiate/crack-cocaine users stopped decreasing and instead stabilised at a (historically) low level. Further analysis was conducted to try and determine whether this was a precursor to a new rise in initiates. Though the data are not totally conclusive, the results suggest that a marked increase in new opiate/crack-cocaine users in the near future is unlikely. If anything, findings suggested that the downward trend may be set to resume.\n\n- Analysis also revealed some possible changes in characteristics of the new opiate/crack- cocaine initiates. There is a trend in the treatment data towards new initiates coming to treatment earlier in their drug-using careers than previous cohorts and also to have\n\n1 At the time of writing, data was unavailable for the period after November 2013. 2 It is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data. 3 787 if adjusted for the missing month.", - "page_start": 2, - "page_end": 2, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "between March 2011 and March 2015 can also be seen in the raw numbers for total new OCU treatment presentations. <sup>22</sup>\n\n**Figure 10: New treatment presentations for opiate/crack use.**\n\nFigure 10 shows that, rather than increasing in the current year, new presentations for opiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a decrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics have been missed before (see Morgan, 2014), and the potential social harm that a fresh increase in new OCUs could cause, further analysis was conducted on the most recent data to try and determine whether the apparent flattening in trends was actually caused by the early stages of a significant surge in new users.\n\nThe treatment data was broken down by age to check whether the slight fall in total new presentations in 2014/15 masked an increase in younger treatment presentations. This showed instead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to 3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a faster rate over the last year than for those aged over-25. Furthermore, separate statistics produced for those in treatment aged 18-and-under also show a fall in aggregate numbers in treatment for opiates and crack.\n\nWe also looked at trends at the local level, given that previous epidemics have started in very specific areas and have taken several years to spread nationally. This means that the start of an epidemic can be hidden in the national data because it has not reached enough areas to register.\n\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment before. So unlike our definition of ‘new’ elsewhere it includes individuals who have been to treatment previously.", - "page_start": 26, - "page_end": 26, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "5\n\nmethods for calculating incidence are complicated and imperfect. It should be acknowledged in advance that this paper does not fully resolve these issues. It is merely intended as a first step, to obtain workable estimates upon which to base policy until more sophisticated methods are developed. That said, every effort is made in this analysis to sense-check the results against other available datasets. The datasets used and the structure of the paper is as follows.\n\ni) **Drug Interventions Programme (DIP) data.** In part one, we produce general descriptive statistics from these data, which capture individuals who test positive for opiates/crack-cocaine following arrest or charge. Due to the limitations in coverage of these data over time, we draw only broad conclusions, some of which act as a sense- check for the main results from part two. ii) **Data on presentations to treatment from the National Drug Treatment Monitoring System (NDTMS).** In part two, we use two models based on previous research papers to calculate OCU incidence at the national level between 2005 and 2013. Most of the main conclusions come from this section.", - "page_start": 4, - "page_end": 4, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "9\n\ncocaine users. In addition, the sharp decline in total DIP tests in 2013 may be due in part to the fact that DIP ceased to be a nationally funded programme in April 2013.\n\nThese data do show, however, that from 2006 onwards, between a third and half of all acquisitive crime arrests involved a drug test and between 15 per cent and 35 per cent of those tests (depending on the year) resulted in a positive result for opiates-only or for both opiates and cocaine (hereafter labelled `positive-for-both’).\n\nThe reason for highlighting only the opiates-only and the `positive-for-both’ test results is that the primary group of interest in this report are opiate and crack-cocaine users. To capture this group, cocaine-only tests must be excluded because DIP tests cannot distinguish between powder- and crack-cocaine, so a cocaine-only positive test could indicate either. Previous evidence has demonstrated that while there is much overlap between heroin and crack-cocaine cohorts (i.e. many of those who use heroin also use crack-cocaine), *powder-* cocaine users have a quite different profile and are far less likely to be involved with acquisitive crime. Excluding the cocaine-only tests means we can be guaranteed not to capture any powder-cocaine users (who are not also using opiates or crack), but it also means we may miss some crack-cocaine-only users, hence the figures may under-estimate the true population of OCUs slightly.\n\nThe fifth row in Table 1 shows that the total number of opiate and opiate/cocaine tests over the period was 364,537. Table 2 shows descriptive statistics for the individuals providing these tests (noting that the same individual may be included several times if they gave multiple positive tests).\n\n**Table 2: Descriptive statistics on all positive opiate-only/positive-for-both tests.**\n\nOpiate/opiate+cocaine positive tests in England 2004- 2013 (all positive tests including repeats by the same individual)\n\nAge Year of birth\n\n| Number of tests | 364,537 | Number of tests | 364,537 |\n|:---|---:|:---|---:|\n| Mean | 32 | Mean | 1977 |\n| Median | 31 | Median | 1977 |\n| Mode | 28 | Mode | 1979 |\n| Minimum | 18 | Minimum | 1960 |\n| Maximum | 53 | Maximum | 1995 |\n\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s. <sup>9</sup> Given evidence suggesting that the average age of initiation for opiate/crack use is around 18- 20 (Millar *et al* ., 2001), this age profile would tentatively suggest that OCU incidence also peaked in the 1990s and that this created a large cohort of users who would be approaching 40 today.\n\nThe minimum and maximum years of birth are fixed by construction, because anyone born\n\n9 Note that the dataset counts tests, not unique individuals, so the same person can appear more than once.", - "page_start": 8, - "page_end": 8, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "cocaine. From this information it is possible to create a distribution, for all presentations, of the lag-time between initiation and their first presentation at treatment. This might show - for example - that only ten per cent of all individuals presenting to treatment do so in the first year of use, but that 25 per cent present within two years, and so on. This means that for each year, we can estimate the number of individuals who have begun an opiate-crack career *but who* *have yet to come to treatment* . Adding these to the numbers who began in that year and have come to treatment gives our total incidence estimate for each year.\n\nThe first model uses NDTMS data for the cohort starting use in 2005 (n=8,960), the lag-time distribution for those initiating use in 2005 and presenting to treatment between 2005 and 2014 <sup>18</sup> is shown below.\n\n**Table 11: Time-to-treatment distribution for those initiating use in 2005 and presenting to treatment between 2005 and 2014. <sup>19</sup>**\n\n| Lag time to treatment (years) | 0-1 | 1-2 | 2-3 | 3-4 | 4-5 | 5-6 | 6-7 | 7-8 | 8-9 | 9-10 |\n|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|:---|\n| Percentage | 15% | 17% | 17% | 14% | 10% | 9% | 6% | 5% | 4% | 4% |\n| Cumulative percentage | 15% | 31% | 49% | 62% | 73% | 82% | 88% | 92% | 96% | 100% |\n\nTable 11 shows that 15 per cent of the individuals who started use in 2005 and had presented for treatment by 2014, presented within one year of initiation. A further 17 per cent presented between one and two years after initiation, prior to coming to treatment, meaning that overall 31 per cent of the sample said they came to treatment within two years of first using opiates/crack. (The fact this is not 32% is simply due to rounding).\n\nAs a basis for the total lag-to-treatment distribution, the main limitation with the above analysis is that it assumes all individuals coming to treatment do so within ten years. Examining data from earlier cohorts suggests this is inaccurate, as a small proportion of OCUs will continue to use these drugs for a long time, sometimes two decades or more, before seeking treatment, and some never will. However, we cannot use an earlier cohort for the distribution because this is equivalent to using out-of-date data. The average lag-to-treatment is likely to have reduced over time given the expansion of treatment places and the influence of DIP. Using old data will miss this and bias the estimates. Even using the 2005 cohort’s distribution contains the assumption that the time-to-treatment lag has not altered significantly between 2005 and 2013/14. So, to try and obtain the most accurate model, we used the figures from the 2005 cohort for the first ten years, as above, on the basis that this covers the majority of individuals and for that we want the most up-to-date data possible whilst maintaining a long enough time period. We then index the trend at that point to an older cohort, and use data from that cohort to model the ‘tail’ of the distribution - i.e. those who take longer than ten years to reach treatment. <sup>20</sup> The result is a 20-year lag-to-treatment distribution, shown in Table 12 below.\n\n18 Data for 2014 was available until October 2014. This was converted to annual figures by multiplying up by 1.2 to account for the missing months in a linear fashion. 19 The percentages from this table can be calculated from the numbers in Table 13. 20 In reality there is always a trade-off in this methodology between the up-to-dateness of the cohort used to measure the lag- to-treatment and the number of years of lag measured, i.e. we could use a more recent cohort, say 2008. But that would mean excluding all those who take longer than seven years to come to treatment, an even larger proportion. We are indebted to Tim Millar for providing the dataset used to model the ‘tail’ of the distribution. It contained a longer time series of", - "page_start": 22, - "page_end": 22, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and over, so only using data to 2013 means it would not be possible for anyone to be born in 1996 or afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that positive opiate tests drop off sharply for those born after 1982. This is in line with other evidence suggesting that the number of *new* users of opiates decreased sharply in the 2000s. This needs to be considered when interpreting the analysis that follows. When DIP and the NDTMS treatment system began in the mid-2000s, there already existed a cohort of around 320,000 OCUs, according to available estimates by Hay *et al* ., (2013). And most of these individuals began using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data capture this means it is hard to separate the gradual inclusion of more and more individuals from this original cohort from genuinely new users of these drugs.\n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the average age at positive test is 32, the peak is quite flat, with high numbers of positive tests still being recorded by individuals in their late 30s and even into their 40s.", - "page_start": 9, - "page_end": 9, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "4\n\ninitiated use at an older age. Currently it is not possible to determine whether this is a reporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users.\n\n- The report has several important policy implications. Even though numbers of new initiates involved with crime have dropped to the low thousands, putting downward pressure on crime, identification and early diversion to treatment remains paramount. Frontier Economics have estimated that the average <sup>4</sup> lifetime crime cost of an injecting drug user is £445,000, so the potential for social harm - even from a small number of individuals - remains large and potentially long-lasting. This means local areas need to manage both the (relatively large) stock of current users, and the (much smaller) flow of new initiates, whose treatment needs may be different. There is no evidence of any new epidemic in this country, but given the impact of the epidemic of the 80s and early 90s on crime, ongoing monitoring of recent trends is required to spot early signs of any emerging problems.\n\n#### **Aims and Methodology**\n\nPrevious Home Office research has demonstrated the importance of opiate/crack-cocaine use in driving aggregate trends in acquisitive crime (Morgan, 2014). While established estimates exist of the *total* number of opiate/crack-cocaine users (OCUs) in England (Hay *et al* ., 2013), there are no estimates for the number of *new* OCUs each year (throughout this paper the number of new OCUs is also referred to as **‘incidence’** ). This is important for three main reasons.\n\ni) **Stock and flows:** Simply knowing the stock of OCUs tells us nothing about the flows in and out - i.e. if the stock were constant each year that could mean that no one starts using these drugs and no one quits or it could mean *all* existing users quit but that they are wholly replaced by new users, or any similar scenario in between. Clearly the policy response would need to be quite different for each of these cases, so knowing the true situation is important. ii) **Early-warning system:** Research by the Home Office and others has shown that there is generally a lag between the start of a heroin/crack epidemic and the point at which it becomes visible on administrative datasets. Closing this gap is important for policy, and part of the reason for its existence is the lack of incidence estimates. Evidence also suggests epidemics spread from area to area, so it is important to monitor local as well as national trends. iii) **The social harm that can arise:** Though research suggests that not all OCUs resort to acquisitive crime to help finance their drug use, numerous studies show that a proportion consistently do and these individuals can be extremely prolific offenders (Morgan, 2014). One study by Frontier Economics estimated that the average lifetime cost to society of an injecting drug user was £445,000 from crime alone. Hence analysing and identifying new OCUs is a policy priority (Frontier Economics, 2010).\n\nThere are two inter-connected reasons why regular national incidence estimates have not been attempted before <sup>5</sup> . The first is that data on this issue are sparse given the ‘hidden’ nature of opiate/crack markets and that date of first use is not something that gets recorded at the moment it actually occurs. The second reason, which flows from the first, is that current\n\n4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few individuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to acquisitive crime at all (Morgan, 2014). 5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at various different levels of geography, see for example: De Angelis *et al* ., 2004, Millar *et al* ., 2001 and Hickman *et al* ., 2001.", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "6\n\n### 1. Drug Interventions Programme Data\n\nThe Drug Interventions Programme (DIP) was introduced in April 2003 with the aim of developing and integrating measures for directing adult drug-misusing offenders into drug\n\ntreatment and reducing offending behaviour. Offenders charged with certain ‘trigger offences’ (mostly acquisitive crime or drug offences) were drug tested and those testing positive were required to have a drug treatment assessment.\n\nThis section contains a series of descriptive statistics taken from the DIP dataset covering the years from 2004 to 2013. The particular focus is on analysis that can shed light on trends and characteristics for *new* opiate or crack-cocaine users (OCUs). Because it is a dataset predicated on involvement with the criminal justice system it is only representative of a subset of OCUs: those who have been arrested or charged with an offence - mostly an acquisitive crime offence (around 85 per cent of the offences leading to a positive drugs test are acquisitive <sup>6</sup> ). Research has shown that up to half of all OCUs commit little or no acquisitive crime (Gossop et al, 2003; Morgan, 2014). So the analysis in this section provides only a guide to the numbers, trends and characteristics for the *total* number of new OCUs. But it does provide a helpful picture for the crime-involved subset of new OCUs.\n\nAspects of DIP have changed over time and this affects the data available, so it is important to run through them briefly. In 2005, testing was switched from the point of charge to the point of arrest. DIP was introduced in different areas in waves with the total number of areas increasing\n\nthrough 2004 to 2006. After this point, there was more consistency in DIP’s geographical coverage, though some other areas that were not part of the nationally funded programme, did choose to run their own drug-testing-on-arrest programmes and some of these data have also been collected within the DIP data. This process increased slightly from 2010 when all police forces in England and Wales were given authorisation to conduct drug testing and related treatment interventions. This enabled local partners in all areas to decide whether or not to introduce drug testing as a locally driven approach to reducing drug-related offending. Again, some of these data were also captured alongside the data from the original DIP areas. In April 2013, DIP ceased to be a nationally funded programme. Instead, Police and Crime Commissioners (PCCs) were given the power to decide which local interventions (including drug testing on arrest) they would fund to address Class A drug-related offending. Drug testing continues to operate in many areas across England and Wales, but in some areas there may be drop-off in the data from that point.\n\nA full discussion of DIP’s geographical coverage over time is contained in the Appendix, which also shows how the available data break down by local authority area. While there is some variation in the number of local authorities returning DIP data, particularly post-2006, areas with higher test volumes are well covered throughout the period. So, while any trend should be treated with care, more confidence can be taken in the analysis of the year of birth and age characteristics.\n\n6 See Appendix 3 in: [http://socialwelfare.bl.uk/subject-areas/services-activity/substance-misuse/homeoffice/141816horr02c.pdf](http://socialwelfare.bl.uk/subject-areas/services-activity/substance-misuse/homeoffice/141816horr02c.pdf)", - "page_start": 5, - "page_end": 5, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "### Conclusion\n\nThis report has attempted to draw together available data and evidence to estimate the number of new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look briefly at their characteristics. This is important as previous research has suggested that - mostly through the actions of a minority - this group has the potential to have a large impact on crime trends and therefore to impose significant societal costs.\n\nThough data on this population is imperfect, a number of different data sources and methodologies are available to estimate OCU incidence. From these, three key conclusions emerge:\n\n- The number of new opiate/crack users is clearly far lower now than it was in the 1980s and early 1990s and has even dropped 20-45% since 2005.\n\n- This means numbers of new users in 2013 may be around 5,000-8,000 with an approximate upper bound of 10,000; and numbers involved with prolific criminality will be lower still.\n\n- The downward trend in new OCUs has flattened since about 2011, but available data do not suggest that this is the precursor to a new increase. If anything, the downward trend may resume in 2014, though the situation requires further monitoring.\n\nFor local areas then, this report suggests that it is still important to identify new OCUs as the arrestee data showed that a proportion of these are likely to offend over a long period of time. But also, there was some evidence of a shift to older initiates, which may require a slightly different treatment approach.", - "page_start": 29, - "page_end": 29, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "legal2_opengouvernementlicense.pdf", - "query": "What proportion of opiate users tested in 2004 were still positive a decade later?", - "target_page": 18, - "target_passage": "Nearly ten per cent (8.9%) of individuals who tested positive for opiates at charge in 2004 also tested positive nearly a decade later in 2013 (on arrest)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**Table 3: Descriptive statistics for the DIP positive opiate-only/positive-for-both tests in which an individual can be identified with a PNC number.**\n\nThe age and year of birth distributions are also similar and are shown in the Appendix. Thus, for the majority of the analysis that follows, tests with no PNC number were excluded. <sup>10</sup>\n\nThe charts and tables above use data from *all* positive tests, so will include cases where the same individual has tested positively on more than one occasion. The following data look just at the *first* test for each individual testing positive for opiates-only or positive-for-both.\n\n**Table 4: Descriptive statistics on first positive opiate-only/positive-for-both tests.**\n\nFirst positive opiate/opiate+cocaine tests (unique individuals)\n\nAge Year of birth\n\n| Number of tests | 104,817 | Number of tests | 104,817 |\n|:---|---:|:---|---:|\n| Mean | 31 | Mean | 1977 |\n| Median | 30 | Median | 1977 |\n| Mode | 27 | Mode | 1980 |\n| Minimum | 18 | Minimum | 1960 |\n| Maximum | 53 | Maximum | 1995 |\n\nThere were just over 100,000 unique individuals who tested positive for opiates-only or positive- for-both between 2004 and 2013. The distribution of the 296,008 positive tests these individuals gave, shows that the vast majority (55%) were only tested once (see Figure 4), which is likely to be why the age statistics are quite similar between Table 3 and Table 4. However, within this\n\n10 Examining the data it is also clear that some areas recorded a higher proportion of cases without a PNC number than others. Thus excluding these cases further affects the variation in geographic coverage across time. See Appendix for more.\n\nAll positive opiate/opiate+cocaine tests (including repeats) that were recorded on PNC; England 2004- 2013\n\nAge Year of birth\n\n| Number of tests | 296,008 | Number of tests | 296,008 |\n|:---|---:|:---|---:|\n| Mean | 32 | Mean | 1977 |\n| Median | 31 | Median | 1977 |\n| Mode | 28 | Mode | 1979 |\n| Minimum | 18 | Minimum | 1960 |\n| Maximum | 53 | Maximum | 1995 |", - "page_start": 11, - "page_end": 11, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and over, so only using data to 2013 means it would not be possible for anyone to be born in 1996 or afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that positive opiate tests drop off sharply for those born after 1982. This is in line with other evidence suggesting that the number of *new* users of opiates decreased sharply in the 2000s. This needs to be considered when interpreting the analysis that follows. When DIP and the NDTMS treatment system began in the mid-2000s, there already existed a cohort of around 320,000 OCUs, according to available estimates by Hay *et al* ., (2013). And most of these individuals began using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data capture this means it is hard to separate the gradual inclusion of more and more individuals from this original cohort from genuinely new users of these drugs.\n\n**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the average age at positive test is 32, the peak is quite flat, with high numbers of positive tests still being recorded by individuals in their late 30s and even into their 40s.", - "page_start": 9, - "page_end": 9, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "9\n\ncocaine users. In addition, the sharp decline in total DIP tests in 2013 may be due in part to the fact that DIP ceased to be a nationally funded programme in April 2013.\n\nThese data do show, however, that from 2006 onwards, between a third and half of all acquisitive crime arrests involved a drug test and between 15 per cent and 35 per cent of those tests (depending on the year) resulted in a positive result for opiates-only or for both opiates and cocaine (hereafter labelled `positive-for-both’).\n\nThe reason for highlighting only the opiates-only and the `positive-for-both’ test results is that the primary group of interest in this report are opiate and crack-cocaine users. To capture this group, cocaine-only tests must be excluded because DIP tests cannot distinguish between powder- and crack-cocaine, so a cocaine-only positive test could indicate either. Previous evidence has demonstrated that while there is much overlap between heroin and crack-cocaine cohorts (i.e. many of those who use heroin also use crack-cocaine), *powder-* cocaine users have a quite different profile and are far less likely to be involved with acquisitive crime. Excluding the cocaine-only tests means we can be guaranteed not to capture any powder-cocaine users (who are not also using opiates or crack), but it also means we may miss some crack-cocaine-only users, hence the figures may under-estimate the true population of OCUs slightly.\n\nThe fifth row in Table 1 shows that the total number of opiate and opiate/cocaine tests over the period was 364,537. Table 2 shows descriptive statistics for the individuals providing these tests (noting that the same individual may be included several times if they gave multiple positive tests).\n\n**Table 2: Descriptive statistics on all positive opiate-only/positive-for-both tests.**\n\nOpiate/opiate+cocaine positive tests in England 2004- 2013 (all positive tests including repeats by the same individual)\n\nAge Year of birth\n\n| Number of tests | 364,537 | Number of tests | 364,537 |\n|:---|---:|:---|---:|\n| Mean | 32 | Mean | 1977 |\n| Median | 31 | Median | 1977 |\n| Mode | 28 | Mode | 1979 |\n| Minimum | 18 | Minimum | 1960 |\n| Maximum | 53 | Maximum | 1995 |\n\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s. <sup>9</sup> Given evidence suggesting that the average age of initiation for opiate/crack use is around 18- 20 (Millar *et al* ., 2001), this age profile would tentatively suggest that OCU incidence also peaked in the 1990s and that this created a large cohort of users who would be approaching 40 today.\n\nThe minimum and maximum years of birth are fixed by construction, because anyone born\n\n9 Note that the dataset counts tests, not unique individuals, so the same person can appear more than once.", - "page_start": 8, - "page_end": 8, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "3\n\n### Summary\n\n#### **Executive summary**\n\nThis paper uses a range of datasets and methodologies to:\n\n- obtain working estimates for the number of individuals in England who started using opiates/crack from 2005 to 2013; <sup>1</sup>\n\n- examine the characteristics of these individuals.\n\nThe main findings of the paper are as follows.\n\n- It is estimated that around 5,000 to 8,000 individuals started using opiates or crack- cocaine in 2013. There is a high degree of uncertainty around this figure due to the sparse data on this population, but sense-checks based on treatment and criminal justice system data suggest the true figure is unlikely to be much larger than 10,000.\n\n- Data also suggest that the number of current opiate/crack initiates involved with crime may be even lower. The number of arrestees testing positive for the first time for opiates (or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first 11 months of 2013, a fall of around 70 per cent <sup>2</sup> . Furthermore, of the new positive testers in 2013, only 721 were aged 18- 24. <sup>3</sup> Though this arrestee data will capture only a proportion of the true population, it does suggest that the number of new, young initiates involved with crime - those who have the potential to inflict most societal harm - has decreased markedly, probably just to a few thousand per year; and that this group now make up a small minority of the total number of opiate/crack-cocaine users (estimated to be 294,000 in 2011/12), most of whom are older, longer-term users.\n\n- In terms of trends in new opiate/crack-cocaine users, all available data suggest that figures have dipped by at least a fifth since 2005 and have dropped hugely since the late 1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very rapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the epidemic years, published estimates of new opiate/crack-cocaine users in Manchester and Bolton show rates more than 11 times larger.\n\n- However, the findings also suggest that between 2011 and early 2014, the number of new opiate/crack-cocaine users stopped decreasing and instead stabilised at a (historically) low level. Further analysis was conducted to try and determine whether this was a precursor to a new rise in initiates. Though the data are not totally conclusive, the results suggest that a marked increase in new opiate/crack-cocaine users in the near future is unlikely. If anything, findings suggested that the downward trend may be set to resume.\n\n- Analysis also revealed some possible changes in characteristics of the new opiate/crack- cocaine initiates. There is a trend in the treatment data towards new initiates coming to treatment earlier in their drug-using careers than previous cohorts and also to have\n\n1 At the time of writing, data was unavailable for the period after November 2013. 2 It is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data. 3 787 if adjusted for the missing month.", - "page_start": 2, - "page_end": 2, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "population there exists a small group of frequent repeat users. 1,828 individuals (1.7% of this population) accounted for just over ten per cent of all positive tests (30,471 tests in total). These individuals provided between 16 and 57 positive tests over the period 2004 to 2013.\n\n**Figure 4: Proportion of positive tests by number of times an individual tested positive.**\n\nThe age and year-of-birth distributions for the 104,817 individuals reveals a similar profile to the distribution for total tests (Figures 5 and 6).", - "page_start": 12, - "page_end": 12, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Figure 5: Year of birth for all individuals on their first positive test (opiates-only or positive- for-both.)**\n\n**Figure 6: Age at first positive test (opiates-only or positive-for-both.)**\n\nNote: as a guide to the OCU population, this chart is left-truncated as DIP tests are not given to under-18s.", - "page_start": 13, - "page_end": 13, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "The relationship between the total opiates-only or positive-for-both tests and the individuals responsible for them can also be shown over time, as Table 5 illustrates <sup>11</sup> .\n\n**Table 5: Table showing trends in total positive opiates-only or positive-for-both., in unique individuals testing positive, and in** * **new** * **individuals testing positive.**\n\nOf central interest for this paper is the third row which shows numbers of individuals testing positive for opiates only or were positive-for-both for the first time. All the previous caveats about DIP trends need to be borne in mind when looking at those figures. Clearly the rise in new positive testers in the early period will be affected by the changes to DIP coverage through those years, as possibly will the sharp fall in positive testers in the latter period. However, graphing the data (see the red line in Figure 7 below) shows that the fall from 14,750 new positive testers in 2006 to 4,281 in 2013, is not only large (the drop is around 70 per cent even if we use the adjusted figure for 2013) but also more or less linear. This means that there is no immediate reason to suggest that the 2013 figures are artificially low due to changes in DIP coverage (i.e. the fact that DIP ceased to be a centrally funded programme in April of that year). Taken together, the data from the period post-2006 (when DIP had achieved a high level of coverage) certainly appear to show that the number of new crime-involved OCUs is unlikely to be rising and may be falling markedly, see Figure 7.\n\n11 Individuals may have more than one positive test in a given year, which is why the numbers for tests are higher than the numbers for individuals. Similarly, even new individuals not previously testing positive in a given year, may have multiple positive tests in the first year in which they test positive.", - "page_start": 14, - "page_end": 14, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "cent (25,000/150,000). <sup>14</sup> It is then possible to model how many of the original population of crime-involved OCUs would be likely to test positive in any given year. For example, if there were 150,000 crime-involved OCUs in 2008, the chances of one of that group having a first test in 2013, providing they remained a crime-involved OCU throughout the period 2004- 2013 is given by:\n\n*(1 - probability of arrest)^8 = chance of not getting caught between 2004 and 2012*\n\nMultiplied by:\n\n*Probability that they do get arrested in 2013*\n\nThis can then be calculated for a range of plausible values for the initial number of OCUs, and hence range of arrest rates, to give a range of plausible values for the number of *new* testers in 2013 who were actually longer-term users. The results of this modelling suggest that we would expect about 2,400- 7,000 new positive tests from individuals who are actually longer-term OCUs. <sup>15</sup> So the fact we only see 4,281 in the real data suggests that genuinely new initiates may be a minority within this figure, as many (probably most) will be from the original cohort.\n\nThis is further reinforced by the next set of analyses, which break down the data on new positive tests per year by age. Table 8 shows how numbers of unique individuals testing positive for the first time break down by year and by age group. The age breakdowns are shown first in absolute numbers and in the second table as a proportion of all those with a first test in that year.\n\n**Table 8: Unique individuals testing positive for opiates-only or positive-for-both, by age and by year of first test.**\n\n| Year of first test | Age 18-24 | Age 25-29 | Age 30-34 | Age 35-39 | Age 40 over | Total |\n|:---|:---|:---|:---|:---|:---|:---|\n| 2004 | 3,150 | 3,319 | 2,938 | 1,958 | 881 | 12,246 |\n| 2005 | 2,391 | 2,832 | 2,548 | 1,791 | 977 | 10,539 |\n| 2006 | 3,635 | 3,768 | 3,275 | 2,491 | 1,580 | 14,749 |\n| 2007 | 3,182 | 3,359 | 2,869 | 2,178 | 1,803 | 13,391 |\n| 2008 | 2,912 | 3,197 | 2,857 | 2,425 | 2,238 | 13,629 |\n| 2009 | 2,711 | 2,594 | 2,304 | 1,998 | 2,048 | 11,655 |\n| 2010 | 2,287 | 2,180 | 2,105 | 1,744 | 2,075 | 10,391 |\n| 2011 | 1,772 | 1,519 | 1,622 | 1,274 | 1,726 | 7,913 |\n| 2012 | 1,136 | 1,179 | 1,300 | 1,030 | 1,377 | 6,022 |\n| 2013 | 721 | 850 | 938 | 704 | 1,068 | 4,281 |\n| Total | 23,897 | 24,797 | 22,756 | 17,593 | 15,773 | 104,816 |\n\n14 Note that this rate is, in effect, the rate of arrest-and-testing-positive. 15 The technical annex contains a section on exactly how this range was estimated.", - "page_start": 18, - "page_end": 18, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "4\n\ninitiated use at an older age. Currently it is not possible to determine whether this is a reporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users.\n\n- The report has several important policy implications. Even though numbers of new initiates involved with crime have dropped to the low thousands, putting downward pressure on crime, identification and early diversion to treatment remains paramount. Frontier Economics have estimated that the average <sup>4</sup> lifetime crime cost of an injecting drug user is £445,000, so the potential for social harm - even from a small number of individuals - remains large and potentially long-lasting. This means local areas need to manage both the (relatively large) stock of current users, and the (much smaller) flow of new initiates, whose treatment needs may be different. There is no evidence of any new epidemic in this country, but given the impact of the epidemic of the 80s and early 90s on crime, ongoing monitoring of recent trends is required to spot early signs of any emerging problems.\n\n#### **Aims and Methodology**\n\nPrevious Home Office research has demonstrated the importance of opiate/crack-cocaine use in driving aggregate trends in acquisitive crime (Morgan, 2014). While established estimates exist of the *total* number of opiate/crack-cocaine users (OCUs) in England (Hay *et al* ., 2013), there are no estimates for the number of *new* OCUs each year (throughout this paper the number of new OCUs is also referred to as **‘incidence’** ). This is important for three main reasons.\n\ni) **Stock and flows:** Simply knowing the stock of OCUs tells us nothing about the flows in and out - i.e. if the stock were constant each year that could mean that no one starts using these drugs and no one quits or it could mean *all* existing users quit but that they are wholly replaced by new users, or any similar scenario in between. Clearly the policy response would need to be quite different for each of these cases, so knowing the true situation is important. ii) **Early-warning system:** Research by the Home Office and others has shown that there is generally a lag between the start of a heroin/crack epidemic and the point at which it becomes visible on administrative datasets. Closing this gap is important for policy, and part of the reason for its existence is the lack of incidence estimates. Evidence also suggests epidemics spread from area to area, so it is important to monitor local as well as national trends. iii) **The social harm that can arise:** Though research suggests that not all OCUs resort to acquisitive crime to help finance their drug use, numerous studies show that a proportion consistently do and these individuals can be extremely prolific offenders (Morgan, 2014). One study by Frontier Economics estimated that the average lifetime cost to society of an injecting drug user was £445,000 from crime alone. Hence analysing and identifying new OCUs is a policy priority (Frontier Economics, 2010).\n\nThere are two inter-connected reasons why regular national incidence estimates have not been attempted before <sup>5</sup> . The first is that data on this issue are sparse given the ‘hidden’ nature of opiate/crack markets and that date of first use is not something that gets recorded at the moment it actually occurs. The second reason, which flows from the first, is that current\n\n4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few individuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to acquisitive crime at all (Morgan, 2014). 5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at various different levels of geography, see for example: De Angelis *et al* ., 2004, Millar *et al* ., 2001 and Hickman *et al* ., 2001.", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "**Figure 3: Distribution of tester’s age at positive test for all opiate-only/positive-for-both tests.**\n\nNote: as a guide to the OCU population, this chart is left-truncated as DIP tests are not given to under-18s.\n\nThe above statistics include tests in which no Police National Computer (PNC) number was recorded for an individual. This number is needed to identify an individual and hence to check whether future tests are further tests by that individual or represent a new individual testing positive. Excluding tests in which no PNC number was recorded makes little difference to the descriptive statistics, see Table 3 below.", - "page_start": 10, - "page_end": 10, - "source_file": "legal2_opengouvernementlicense.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia5.pdf", - "query": "Who led the Fronde des princes?", - "target_page": 4, - "target_passage": "It was headed by the highest-ranking French nobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of Montpensier, known as la Grande Mademoiselle; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of Conti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and François, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, and Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld.", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "[Conti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and](https://en.wikipedia.org/wiki/Henri_II_d%27Orl%C3%A9ans,_Duke_of_Longueville)\n\n[François, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne,](https://en.wikipedia.org/wiki/Henri_de_La_Tour_d%27Auvergne,_vicomte_de_Turenne)\n\n[and Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld.](https://en.wikipedia.org/wiki/Fran%C3%A7ois_de_La_Rochefoucauld_(writer))\n\nQueen Anne played the most important role in defeating the Fronde because she wanted to transfer absolute authority to her son.\n\nIn addition, most of the princes refused to deal with Mazarin, who went into exile for a number of years. The *Frondeurs* claimed\n\nto act on Louis's behalf, and in his real interest, against his mother and Mazarin.\n\nQueen Anne had a very close relationship with the Cardinal, and many observers believed that Mazarin became Louis XIV's\n\nstepfather by a secret marriage to Queen Anne. <sup>[30]</sup> [ However, Louis's coming-of-age and subsequent coronation deprived them of](https://en.wikipedia.org/wiki/Coronation)\n\nthe *Frondeurs* ' pretext for revolt. The *Fronde* thus gradually lost steam and ended in 1653, when Mazarin returned triumphantly\n\nfrom exile. From that time until his death, Mazarin was in charge of foreign and financial policy without the daily supervision of\n\nAnne, who was no longer regent. <sup>[31]</sup>\n\n[During this period, Louis fell in love with Mazarin's niece Marie Mancini, but Anne and Mazarin ended the king's infatuation by](https://en.wikipedia.org/wiki/Marie_Mancini)\n\nsending Mancini away from court to be married in Italy. While Mazarin might have been tempted for a short time to marry his\n\nniece to the King of France, Queen Anne was absolutely against this; she wanted to marry her son to the daughter of her brother,\n\n[Philip IV of Spain, for both dynastic and political reasons. Mazarin soon supported the Queen's position because he knew that her](https://en.wikipedia.org/wiki/Philip_IV_of_Spain)\n\nsupport for his power and his foreign policy depended on making peace with Spain from a strong position and on the Spanish\n\nmarriage. Additionally, Mazarin's relations with Marie Mancini were not good, and he did not trust her to support his position. All\n\nof Louis's tears and his supplications to his mother did not make her change her mind. The Spanish marriage would be very", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia5.pdf" - }, - { - "text": "1655 portrait of Louis, the Victor of\n\nthe Fronde, portrayed as the god\n\n[Jupiter](https://en.wikipedia.org/wiki/Jupiter_(mythology))\n\n[Portrait by Justus van Egmont](https://en.wikipedia.org/wiki/Justus_van_Egmont)\n\nbetween the years 1649- 1652.\n\nCondé, attacked the rebels in Paris; the rebels were under the political control of Anne's\n\n[old friend Marie de Rohan. Beaufort, who had escaped from the prison where Anne had](https://en.wikipedia.org/wiki/Marie_de_Rohan)\n\nincarcerated him five years before, was the military leader in Paris, under the nominal\n\n[control of Conti. After a few battles, a political compromise was reached; the Peace of](https://en.wikipedia.org/wiki/Peace_of_Rueil)\n\n[Rueil was signed, and the court returned to Paris.](https://en.wikipedia.org/wiki/Peace_of_Rueil)\n\nUnfortunately for Anne, her partial victory depended on Condé, who wanted to control the\n\nqueen and destroy Mazarin's influence. It was Condé's sister who pushed him to turn\n\nagainst the queen. After striking a deal with her old friend Marie de Rohan, who was able\n\nto impose the nomination of *[Charles de l'Aubespine, marquis de Châteauneuf](https://en.wikipedia.org/wiki/Charles_de_l%27Aubespine,_marquis_de_Ch%C3%A2teauneuf)* as minister\n\n[of justice, Anne arrested Condé, his brother Armand de Bourbon, Prince of Conti, and the](https://en.wikipedia.org/wiki/Armand_de_Bourbon,_Prince_of_Conti)\n\n[husband of their sister Anne Genevieve de Bourbon, duchess of Longueville. This situation](https://en.wikipedia.org/wiki/Duchess_of_Longueville)\n\ndid not last long, and Mazarin's unpopularity led to the creation of a coalition headed\n\nmainly by Marie de Rohan and the duchess of Longueville. This aristocratic coalition was\n\nstrong enough to liberate the princes, exile Mazarin, and impose a condition of virtual\n\nhouse arrest on Queen Anne.\n\nAll these events were witnessed by Louis and\n\nlargely explained his later distrust of Paris and the higher aristocracy. <sup>[27]</sup> \"In one sense,\n\nLouis's childhood came to an end with the outbreak of the Fronde. It was not only that life\n\nbecame insecure and unpleasant - a fate meted out to many children in all ages - but that\n\nLouis had to be taken into the confidence of his mother and Mazarin on political and\n\nmilitary matters of which he could have no deep understanding\". <sup>[28]</sup> \"The family home\n\nbecame at times a near-prison when Paris had to be abandoned, not in carefree outings to\n\nother chateaux but in humiliating flights\". <sup>[28]</sup> The royal family was driven out of Paris\n\ntwice in this manner, and at one point Louis XIV and Anne were held under virtual arrest\n\nin the royal palace in Paris. The Fronde years planted in Louis a hatred of Paris and a\n\nconsequent determination to move out of the ancient capital as soon as possible, never to\n\nreturn. <sup>[29]</sup>\n\nJust as the first *Fronde* (the *Fronde parlementaire* of 1648- 1649) ended, a second one (the\n\n*Fronde des princes* of 1650- 1653) began. Unlike that which preceded it, tales of sordid\n\nintrigue and half-hearted warfare characterized this second phase of upper-class\n\ninsurrection. To the aristocracy, this rebellion represented a protest for the reversal of their\n\n[political demotion from vassals to courtiers. It was headed by the highest-ranking French](https://en.wikipedia.org/wiki/Courtier)\n\n[nobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of](https://en.wikipedia.org/wiki/Anne_Marie_Louise_d%27Orl%C3%A9ans,_Duchess_of_Montpensier)\n\n[Montpensier, known as ](https://en.wikipedia.org/wiki/Anne_Marie_Louise_d%27Orl%C3%A9ans,_Duchess_of_Montpensier) *la Grande Mademoiselle* [; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of](https://en.wikipedia.org/wiki/Armand_de_Bourbon,_Prince_of_Conti)", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia5.pdf" - }, - { - "text": "belief intensified the nobles' resentment.\n\nIn 1648, Anne and Mazarin attempted to tax members of the *Parlement de Paris* . The\n\nmembers refused to comply and ordered all of the king's earlier financial edicts burned.\n\nBuoyed by the victory of *[Louis, duc d'Enghien](https://en.wikipedia.org/wiki/Louis,_Grand_Cond%C3%A9)* (later known as *le Grand Condé* ) at the\n\n[Battle of Lens, Mazarin, on Queen Anne's insistence, arrested certain members in a show](https://en.wikipedia.org/wiki/Battle_of_Lens)\n\nof force. <sup>[24]</sup> [ The most important arrest, from Anne's point of view, concerned Pierre](https://en.wikipedia.org/wiki/Pierre_Broussel)\n\n[Broussel, one of the most important leaders in the ](https://en.wikipedia.org/wiki/Pierre_Broussel) *Parlement de Paris* .\n\nPeople in France were complaining about the expansion of royal authority, the high rate of\n\ntaxation, and the reduction of the authority of the Parlement de Paris and other regional\n\nrepresentative entities. Paris erupted in rioting as a result, and Anne was forced, under\n\nintense pressure, to free Broussel. Moreover, on the night of 9- 10 February 1651, when\n\nLouis was twelve, a mob of angry Parisians broke into the royal palace and demanded to\n\nsee their king. Led into the royal bed-chamber, they gazed upon Louis, who was feigning\n\nsleep, were appeased, and then quietly departed. <sup>[25]</sup> The threat to the royal family\n\nprompted Anne to flee Paris with the king and his courtiers.\n\n[Shortly thereafter, the conclusion of the Peace of Westphalia allowed Condé's army to](https://en.wikipedia.org/wiki/Peace_of_Westphalia)\n\nreturn to aid Louis and his court. Condé's family was close to Anne at that time, and he\n\nagreed to help her attempt to restore the king's authority. <sup>[26]</sup> The queen's army, headed by\n\n#### **Early acts**", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[25. Louis XIII, King of France and Navarre, 1601- 1643](https://en.wikipedia.org/wiki/Louis_XIII_of_France)\n\n26. Louis XIV, King of France and Navarre, 1638- 1715\n\n| Name | Birth | Death | Notes |\n|:---|:---|:---|:---|\n| By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) | By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) | By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) | By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) |\n| Louis, le Grand Dauphin | 1 November 1661 | 14 April 1711 | Fils de France. Dauphin of France (1661- 1711). Had issue. Father of Louis, Dauphin of France, Philip V of Spain and Charles, Duke of Berry. Grandfather of Louis XV of France |\n| Anne Élisabeth | 18 November 1662 | 30 December 1662 | Fille de France. Died in infancy. |\n| Marie Anne | 16 November 1664 | 26 December 1664 | Fille de France. Died in infancy. |\n| Marie Thérèse | 2 January 1667 | 1 March 1672 | Fille de France. Known as Madame Royale and la Petite Madame . Died in childhood. |\n| Philippe Charles, Duke of Anjou | 5 August 1668 | 10 July 1671 | Fils de France. Died in childhood. |\n| Louis François, Duke of Anjou | 14 June 1672 | 4 November 1672 | Fils de France. Died in infancy. |\n\nThis is an incomplete list of Louis XIV's illegitimate children. He reputedly had more, but the difficulty in fully documenting all\n\nsuch births restricts the list only to the better-known and/or legitimised.\n\n#### **Issue**", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia5.pdf" - }, - { - "text": "law and nephew William. Vehemently anti-French, William (now William III of England) pushed his new kingdoms into war, thus\n\n[transforming the League of Augsburg into the Grand Alliance. Before this happened, Louis expected William's expedition to](https://en.wikipedia.org/wiki/Grand_Alliance_(League_of_Augsburg))\n\nEngland to absorb his energies and those of his allies, so he dispatched troops to the Rhineland after the expiry of his ultimatum to\n\nthe German princes requiring confirmation of the Truce of Ratisbon and acceptance of his demands about the succession crises.\n\nThis military manoeuvre was also intended to protect his eastern provinces from Imperial invasion by depriving the enemy army\n\n[of sustenance, thus explaining the preemptive scorched earth policy pursued in much of southwestern Germany (the \"Devastation](https://en.wikipedia.org/wiki/Scorched_earth)\n\nof the Palatinate\"). <sup>[80]</sup>\n\nFrench armies were generally victorious throughout the war because of Imperial commitments in\n\nthe Balkans, French logistical superiority, and the quality of French generals such as Condé's\n\n[famous pupil, François Henri de Montmorency-Bouteville, duc de Luxembourg.](https://en.wikipedia.org/wiki/Fran%C3%A7ois_Henri_de_Montmorency-Bouteville,_duc_de_Luxembourg) <sup>[81]</sup> He triumphed\n\n[at the Battles of Fleurus in 1690, Steenkerque in 1692, and Landen in 1693, although, the battles](https://en.wikipedia.org/wiki/Battle_of_Landen)\n\nproved to be of little of strategic consequence, <sup>[82][83]</sup> mostly due to the nature of late 17th-century\n\nwarfare. <sup>[84]</sup>\n\n[Although an attempt to restore James II failed at the Battle of the Boyne in 1690, France](https://en.wikipedia.org/wiki/Battle_of_the_Boyne)\n\naccumulated a string of victories from Flanders in the north, Germany in the east, and Italy and\n\nSpain in the south, to the high seas and the colonies. Louis personally supervised the captures of\n\n[Mons in 1691 and Namur in 1692. Luxembourg gave France the defensive line of the Sambre by](https://en.wikipedia.org/wiki/Sambre)\n\n[capturing Charleroi in 1693. France also overran most of the Duchy of Savoy after the battles of](https://en.wikipedia.org/wiki/Duchy_of_Savoy)\n\n[Marsaglia and Staffarde in 1693. While naval stalemate ensued after the French victory at the](https://en.wikipedia.org/wiki/Battle_of_Staffarda)\n\n[Battle of Beachy Head in 1690 and the Allied victory at Barfleur-La Hougue in 1692, the Battle of](https://en.wikipedia.org/wiki/Battle_of_Torroella)\n\n[Torroella in 1694 exposed Catalonia to French invasion, culminating in the capture of Barcelona.](https://en.wikipedia.org/wiki/Barcelona)\n\n[The Dutch captured Pondichéry in 1693, but a 1697 French raid on the Spanish treasure port of Cartagena, Spain, yielded a](https://en.wikipedia.org/wiki/Port_of_Cartagena)\n\nfortune of 10,000,000 livres.", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia5.pdf" - }, - { - "text": "his monarchical rule. <sup>[12]</sup>\n\n[During his childhood, he was taken care of by the governesses Françoise de](https://en.wikipedia.org/wiki/Fran%C3%A7oise_de_Lansac)\n\n[Lansac and Marie-Catherine de Senecey. In 1646, Nicolas V de Villeroy](https://en.wikipedia.org/wiki/Nicolas_de_Neufville_de_Villeroy)\n\nbecame the young king's tutor. Louis XIV became friends with Villeroy's young\n\n[children, particularly François de Villeroy, and divided his time between the](https://en.wikipedia.org/wiki/Fran%C3%A7ois_de_Neufville,_duc_de_Villeroy)\n\n[Palais-Royal and the nearby Hotel de Villeroy.](https://en.wikipedia.org/wiki/Palais-Royal)\n\n[Sensing imminent death in the spring of 1643, King Louis XIII decided to put his affairs in](https://en.wikipedia.org/wiki/Louis_XIII)\n\norder for his four-year-old son Louis XIV. Not trusting the judgement of his Spanish wife\n\n[Queen Anne, who would normally have become the sole regent of France, the king](https://en.wikipedia.org/wiki/Regent)\n\ndecreed that a regency council would rule on his son's behalf, with Anne at its head. <sup>[13]</sup>\n\nLouis XIII died on 14 May 1643. On 18 May <sup>[14]</sup> Queen Anne had her husband's will\n\nannulled by the *[Parlement de Paris](https://en.wikipedia.org/wiki/Parlement)* , a judicial body of nobles and high-ranking clergy, <sup>[15]</sup>\n\nand she became sole regent. She exiled her husband's ministers Chavigny and Bouthilier\n\n[and appointed the Count of Brienne as her minister of foreign affairs.](https://en.wikipedia.org/wiki/Henri-Auguste_de_Lom%C3%A9nie,_comte_de_Brienne) <sup>[16]</sup> Anne kept the\n\ndirection of religious policy strongly in hand until her son's majority in 1661.\n\n[She appointed Cardinal Mazarin as chief minister, giving him the daily administration of](https://en.wikipedia.org/wiki/Cardinal_Mazarin)\n\n[policy. She continued the policies of her late husband and Cardinal Richelieu, despite their](https://en.wikipedia.org/wiki/Cardinal_Richelieu)\n\npersecution of her, in order to win absolute authority in France and victory abroad for her\n\n[son. Anne protected Mazarin by exiling her followers the Duke of Beaufort and Marie de](https://en.wikipedia.org/wiki/Marie_de_Rohan)\n\n[Rohan, who conspired against him in 1643.](https://en.wikipedia.org/wiki/Marie_de_Rohan) <sup>[17]</sup>\n\nThe best example of Anne's loyalty to France was her treatment of one of Richelieu's men,\n\n[the Chancellor Pierre Séguier. Séguier had brusquely interrogated Anne in 1637 (like a](https://en.wikipedia.org/wiki/Pierre_S%C3%A9guier)\n\n\"common criminal\", as she recalled) following the discovery that she was giving military secrets to her father in Spain, and Anne\n\nwas virtually under house arrest for years. By keeping the effective Séguier in his post, Anne sacrificed her own feelings for the\n\ninterests of France and her son Louis.\n\n### **Minority and the** * **Fronde** *\n\n#### **Accession**", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Painting from 1667 depicting Louis\n\nas patron of the fine arts\n\nThe *Cour royale* and the *Cour de*\n\n*marbre* at Versailles\n\n[Bust of Louis XIV by Gianlorenzo](https://en.wikipedia.org/wiki/Gianlorenzo_Bernini)\n\n[Bernini](https://en.wikipedia.org/wiki/Gianlorenzo_Bernini)\n\n[famous throughout Europe. Composers and musicians such as Jean-Baptiste Lully, Jacques](https://en.wikipedia.org/wiki/Jacques_Champion_de_Chambonni%C3%A8res)\n\n[Champion de Chambonnières, and François Couperin thrived. In 1661, Louis founded the](https://en.wikipedia.org/wiki/Fran%C3%A7ois_Couperin)\n\n[Académie Royale de Danse, and in 1669, the Académie d'Opéra, important driving events](https://en.wikipedia.org/wiki/Paris_Opera)\n\n[in the evolution of ballet. He also attracted, supported and patronized such artists as André](https://en.wikipedia.org/wiki/Andr%C3%A9_Charles_Boulle)\n\n[Charles Boulle, who revolutionised marquetry with his art of inlay, today known as](https://en.wikipedia.org/wiki/Inlay)\n\n[\"Boulle work\". Always on the lookout for new talent, the king launched music](https://en.wikipedia.org/wiki/Boulle_work)\n\n[competitions: in 1683, Michel-Richard de Lalande thus became deputy master of the Royal](https://en.wikipedia.org/wiki/Michel-Richard_de_Lalande)\n\nChapel, composing his *Symphonies for the Soupers du Roy* along with 77 large scale\n\n*Grand Motets* .\n\nOver the course of four building campaigns, Louis converted a hunting lodge\n\n[commissioned by Louis XIII into the spectacular Palace of Versailles. Except for the](https://en.wikipedia.org/wiki/Palace_of_Versailles)\n\ncurrent Royal Chapel (built near the end of his reign), the palace achieved much of its\n\ncurrent appearance after the third building campaign, which was followed by an official\n\nmove of the royal court to Versailles on 6 May 1682. Versailles became a dazzling, awe-\n\ninspiring setting for state affairs and the reception of foreign dignitaries. At Versailles, the\n\nking alone commanded attention.\n\nSeveral reasons have been suggested for the\n\ncreation of the extravagant and stately palace, as\n\nwell as the relocation of the monarchy's seat. The\n\n[memoirist Saint-Simon speculated that Louis](https://en.wikipedia.org/wiki/Louis_de_Rouvroy,_duc_de_Saint-Simon)\n\nviewed Versailles as an isolated power centre where\n\ntreasonous cabals could be more readily discovered and foiled. <sup>[62]</sup> There has also been\n\nspeculation that the revolt of the *Fronde* caused Louis to hate Paris, which he abandoned\n\nfor a country retreat, but his sponsorship of many public works in Paris, such as the\n\nestablishment of a police force and of street-lighting, <sup>[111]</sup> lend little credence to this theory.\n\nAs a further example of his continued care for the capital, Louis constructed the *[Hôtel des](https://en.wikipedia.org/wiki/Les_Invalides)*\n\n*[Invalides](https://en.wikipedia.org/wiki/Les_Invalides)* , a military complex and home to this day for officers and soldiers rendered\n\ninfirm either by injury or old age. While pharmacology was still quite rudimentary in his\n\nday, the *Invalides* pioneered new treatments and set new standards for hospice treatment.\n\n[The conclusion of the Treaty of Aix-la-Chapelle in 1668 also induced Louis to demolish](https://en.wikipedia.org/wiki/Treaty_of_Aix-la-Chapelle_(1668))\n\nParis's northern walls in 1670 and replace them with wide tree-lined boulevards. <sup>[112]</sup>\n\n[Louis also renovated and improved the Louvre and other royal residences. Gian Lorenzo](https://en.wikipedia.org/wiki/Gian_Lorenzo_Bernini)\n\n[Bernini was originally to plan additions to the Louvre; however, his plans would have meant the destruction of much of the](https://en.wikipedia.org/wiki/Gian_Lorenzo_Bernini)\n\n[existing structure, replacing it with an Italian summer villa in the centre of Paris. Bernini's plans were eventually shelved in](https://en.wikipedia.org/wiki/Villa)", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[1. \"Cicero\" (http://www.thelatinlibrary.com/cicero/fam10.shtml#3). ](http://www.thelatinlibrary.com/cicero/fam10.shtml#3) *Epistulae ad familiares, X.3* . Retrieved\n\n2 January 2020.\n\n[2. \"Répertoire national des élus: les maires\" (https://www.data.gouv.fr/fr/datasets/r/2876a346-d50c-4911-934e-1](https://www.data.gouv.fr/fr/datasets/r/2876a346-d50c-4911-934e-19ee07b0e503)\n\n[9ee07b0e503) (in French). data.gouv.fr, Plateforme ouverte des données publiques françaises. 13 September](https://www.data.gouv.fr/fr/datasets/r/2876a346-d50c-4911-934e-19ee07b0e503)\n\n2022.\n\n[3. \"Comparateur de territoire - Unité urbaine 2020 de Lyon (00760)\" (https://www.insee.fr/fr/statistiques/140559](https://www.insee.fr/fr/statistiques/1405599?geo=UU2020-00760)\n\n[9?geo=UU2020-00760). INSEE. Retrieved 3 April 2022.](https://en.wikipedia.org/wiki/INSEE)\n\n[4. \"Comparateur de territoire - Aire d'attraction des villes 2020 de Lyon (002)\" (https://www.insee.fr/fr/statistique](https://www.insee.fr/fr/statistiques/1405599?geo=AAV2020-002)\n\n[s/1405599?geo=AAV2020-002). INSEE. Retrieved 16 January 2023.](https://en.wikipedia.org/wiki/INSEE)\n\n[5. \"Populations de référence 2022\" (https://www.insee.fr/fr/statistiques/8288323?geo=COM-69123) (in French).](https://www.insee.fr/fr/statistiques/8288323?geo=COM-69123)\n\n[The National Institute of Statistics and Economic Studies. 19 December 2024.](https://en.wikipedia.org/wiki/Institut_national_de_la_statistique_et_des_%C3%A9tudes_%C3%A9conomiques)\n\n### **Notable people**\n\n### **See also**\n\n### **Notes**\n\n### **References**", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia4.pdf" - }, - { - "text": "[of France; by compelling many members of the nobility to reside at his lavish](https://en.wikipedia.org/wiki/French_nobility)\n\n[Palace of Versailles, he succeeded in pacifying the aristocracy, many of whom](https://en.wikipedia.org/wiki/Palace_of_Versailles)\n\n[had participated in the Fronde rebellions during his minority. He thus became](https://en.wikipedia.org/wiki/The_Fronde)\n\none of the most powerful French monarchs and consolidated a system of\n\n[absolute monarchy in France that endured until the French Revolution. Louis](https://en.wikipedia.org/wiki/French_Revolution)\n\n[also enforced uniformity of religion under the Catholic Church. His revocation](https://en.wikipedia.org/wiki/Edict_of_Fontainebleau)\n\n[of the Edict of Nantes abolished the rights of the Huguenot Protestant minority](https://en.wikipedia.org/wiki/Huguenot)\n\n[and subjected them to a wave of dragonnades, effectively forcing Huguenots to](https://en.wikipedia.org/wiki/Dragonnades)\n\nemigrate or convert, virtually destroying the French Protestant community.\n\n[During Louis's long reign, France emerged as the leading European power and](https://en.wikipedia.org/wiki/Great_power)\n\n[regularly made war. A conflict with Spain marked his entire childhood, while](https://en.wikipedia.org/wiki/Franco-Spanish_War_(1635%E2%80%931659))\n\nduring his personal rule, Louis fought three major continental conflicts, each\n\n[against powerful foreign alliances: the Franco-Dutch War, the Nine Years' War,](https://en.wikipedia.org/wiki/Nine_Years%27_War)\n\n[and the War of the Spanish Succession. In addition, France contested shorter](https://en.wikipedia.org/wiki/War_of_the_Spanish_Succession)\n\n[wars such as the War of Devolution and the War of the Reunions. Warfare](https://en.wikipedia.org/wiki/War_of_the_Reunions)\n\ndefined Louis's foreign policy, impelled by his personal ambition for glory and\n\npower: \"a mix of commerce, revenge, and pique\". <sup>[5]</sup> His wars strained France's\n\nresources to the utmost, while in peacetime he concentrated on preparing for\n\nthe next war. He taught his diplomats that their job was to create tactical and\n\nstrategic advantages for the French military. <sup>[6]</sup> Upon his death in 1715,\n\n[Louis XIV left his great-grandson and successor, Louis XV, a powerful but](https://en.wikipedia.org/wiki/Louis_XV)\n\nwar-weary kingdom, in major debt after the War of the Spanish Succession that\n\nhad raged on since 1701.\n\n[Some of his other notable achievements include the construction of the Canal](https://en.wikipedia.org/wiki/Canal_du_Midi)\n\n[du Midi, the patronage of artists, and the founding of the French Academy of](https://en.wikipedia.org/wiki/French_Academy_of_Sciences)\n\n[Sciences.](https://en.wikipedia.org/wiki/French_Academy_of_Sciences)\n\n### **Early years**", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Territorial expansion of France\n\nunder Louis XIV (1643- 1715) is\n\ndepicted in orange.\n\n[illegitimate son Louis-Auguste de Bourbon, Duke of Maine.](https://en.wikipedia.org/wiki/Louis-Auguste_de_Bourbon,_Duke_of_Maine) <sup>[129]</sup> Orléans, however, had Louis's will annulled by the *Parlement of*\n\n*Paris* [ after his death and made himself sole regent. He stripped Maine and his brother, Louis-Alexandre, Count of Toulouse, of](https://en.wikipedia.org/wiki/Louis-Alexandre_de_Bourbon,_comte_de_Toulouse)\n\n[the rank of Prince of the Blood, which Louis had granted them, and significantly reduced Maine's power and privileges.](https://en.wikipedia.org/wiki/Prince_du_Sang) <sup>[130]</sup>\n\nLine of succession to the French throne upon the death of Louis XIV in 1715. Louis XIV's only surviving legitimate grandson,\n\nPhilip V, was not included in the line of succession due to having renounced the French throne after the war of the Spanish\n\n[Succession, which lasted for 13 years after the death of Charles II of Spain in 1700.](https://en.wikipedia.org/wiki/Charles_II_of_Spain) <sup>[131]</sup>\n\n*[Louis XIII (1601- 1643)](https://en.wikipedia.org/wiki/Louis_XIII)*\n\n[ ](https://en.wikipedia.org/wiki/File:Simple_gold_crown.svg) **Louis XIV** *(1638- 1715)*\n\n*[Louis, Grand Dauphin (1661- 1711)](https://en.wikipedia.org/wiki/Louis,_Grand_Dauphin)*\n\n*[Louis, Duke of Burgundy (1682- 1712)](https://en.wikipedia.org/wiki/Louis,_Duke_of_Burgundy)*\n\n*[Louis, Duke of Brittany (1707- 1712)](https://en.wikipedia.org/wiki/Louis,_Duke_of_Brittany_(1707%E2%80%931712))*\n\n**(1)** [ Louis, Duke of Anjou (1710- 1774)](https://en.wikipedia.org/wiki/Louis_XV)\n\n[Philip V of Spain (1683- 1746)](https://en.wikipedia.org/wiki/Philip_V_of_Spain)\n\n*[Charles, Duke of Berry (1686- 1714)](https://en.wikipedia.org/wiki/Charles,_Duke_of_Berry_(1686%E2%80%931714))*\n\n*[Philippe I, Duke of Orléans (1640- 1701)](https://en.wikipedia.org/wiki/Philippe_I,_Duke_of_Orl%C3%A9ans)*\n\n**(2)** [ Philippe II, Duke of Orléans (1674- 1723)](https://en.wikipedia.org/wiki/Philippe_II,_Duke_of_Orl%C3%A9ans)\n\n**(3)** [ Louis, Duke of Chartres (1703- 1752)](https://en.wikipedia.org/wiki/Louis,_Duke_of_Orl%C3%A9ans_(1703%E2%80%931752))\n\n[Further down the French line of succession in 1715 was the House of Condé, followed by the House of Conti (a cadet branch of](https://en.wikipedia.org/wiki/Cadet_branch)\n\n[the House of Condé). Both of these royal houses were descended in the male line from Henri II, Prince of Condé, a second cousin](https://en.wikipedia.org/wiki/Second_cousin)\n\n[of French King Louis XIII (the father of Louis XIV) in the male line.](https://en.wikipedia.org/wiki/Male_line)\n\n[According to Philippe de Courcillon's ](https://en.wikipedia.org/wiki/Philippe_de_Courcillon) *Journal* , Louis on his deathbed advised his heir with these words:\n\nDo not follow the bad example which I have set you; I have often undertaken war too lightly and have sustained it for\n\nvanity. Do not imitate me, but be a peaceful prince, and may you apply yourself principally to the alleviation of the\n\nburdens of your subjects. <sup>[132]</sup>\n\nSome historians point out that it was a customary demonstration of piety in those days to\n\nexaggerate one's sins. Thus they do not place much emphasis on Louis's deathbed\n\ndeclarations in assessing his accomplishments. Rather, they focus on military and\n\ndiplomatic successes, such as how he placed a French prince on the Spanish throne. This,\n\nthey contend, ended the threat of an aggressive Spain that historically interfered in\n\ndomestic French politics. These historians also emphasise the effect of Louis's wars in\n\nexpanding France's boundaries and creating more defensible frontiers that preserved\n\nFrance from invasion until the Revolution. <sup>[132]</sup>\n\nArguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his]\n\nsubjects.\" For example, he patronised the arts, encouraged industry, fostered trade and", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia5.pdf", - "query": "What was one of Louis XIV's most ill-famed decrees?", - "target_page": 6, - "target_passage": "One of Louis's more infamous decrees was the Grande Ordonnance sur les Colonies of 1685, the Code Noir (black code)", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Territorial expansion of France\n\nunder Louis XIV (1643- 1715) is\n\ndepicted in orange.\n\n[illegitimate son Louis-Auguste de Bourbon, Duke of Maine.](https://en.wikipedia.org/wiki/Louis-Auguste_de_Bourbon,_Duke_of_Maine) <sup>[129]</sup> Orléans, however, had Louis's will annulled by the *Parlement of*\n\n*Paris* [ after his death and made himself sole regent. He stripped Maine and his brother, Louis-Alexandre, Count of Toulouse, of](https://en.wikipedia.org/wiki/Louis-Alexandre_de_Bourbon,_comte_de_Toulouse)\n\n[the rank of Prince of the Blood, which Louis had granted them, and significantly reduced Maine's power and privileges.](https://en.wikipedia.org/wiki/Prince_du_Sang) <sup>[130]</sup>\n\nLine of succession to the French throne upon the death of Louis XIV in 1715. Louis XIV's only surviving legitimate grandson,\n\nPhilip V, was not included in the line of succession due to having renounced the French throne after the war of the Spanish\n\n[Succession, which lasted for 13 years after the death of Charles II of Spain in 1700.](https://en.wikipedia.org/wiki/Charles_II_of_Spain) <sup>[131]</sup>\n\n*[Louis XIII (1601- 1643)](https://en.wikipedia.org/wiki/Louis_XIII)*\n\n[ ](https://en.wikipedia.org/wiki/File:Simple_gold_crown.svg) **Louis XIV** *(1638- 1715)*\n\n*[Louis, Grand Dauphin (1661- 1711)](https://en.wikipedia.org/wiki/Louis,_Grand_Dauphin)*\n\n*[Louis, Duke of Burgundy (1682- 1712)](https://en.wikipedia.org/wiki/Louis,_Duke_of_Burgundy)*\n\n*[Louis, Duke of Brittany (1707- 1712)](https://en.wikipedia.org/wiki/Louis,_Duke_of_Brittany_(1707%E2%80%931712))*\n\n**(1)** [ Louis, Duke of Anjou (1710- 1774)](https://en.wikipedia.org/wiki/Louis_XV)\n\n[Philip V of Spain (1683- 1746)](https://en.wikipedia.org/wiki/Philip_V_of_Spain)\n\n*[Charles, Duke of Berry (1686- 1714)](https://en.wikipedia.org/wiki/Charles,_Duke_of_Berry_(1686%E2%80%931714))*\n\n*[Philippe I, Duke of Orléans (1640- 1701)](https://en.wikipedia.org/wiki/Philippe_I,_Duke_of_Orl%C3%A9ans)*\n\n**(2)** [ Philippe II, Duke of Orléans (1674- 1723)](https://en.wikipedia.org/wiki/Philippe_II,_Duke_of_Orl%C3%A9ans)\n\n**(3)** [ Louis, Duke of Chartres (1703- 1752)](https://en.wikipedia.org/wiki/Louis,_Duke_of_Orl%C3%A9ans_(1703%E2%80%931752))\n\n[Further down the French line of succession in 1715 was the House of Condé, followed by the House of Conti (a cadet branch of](https://en.wikipedia.org/wiki/Cadet_branch)\n\n[the House of Condé). Both of these royal houses were descended in the male line from Henri II, Prince of Condé, a second cousin](https://en.wikipedia.org/wiki/Second_cousin)\n\n[of French King Louis XIII (the father of Louis XIV) in the male line.](https://en.wikipedia.org/wiki/Male_line)\n\n[According to Philippe de Courcillon's ](https://en.wikipedia.org/wiki/Philippe_de_Courcillon) *Journal* , Louis on his deathbed advised his heir with these words:\n\nDo not follow the bad example which I have set you; I have often undertaken war too lightly and have sustained it for\n\nvanity. Do not imitate me, but be a peaceful prince, and may you apply yourself principally to the alleviation of the\n\nburdens of your subjects. <sup>[132]</sup>\n\nSome historians point out that it was a customary demonstration of piety in those days to\n\nexaggerate one's sins. Thus they do not place much emphasis on Louis's deathbed\n\ndeclarations in assessing his accomplishments. Rather, they focus on military and\n\ndiplomatic successes, such as how he placed a French prince on the Spanish throne. This,\n\nthey contend, ended the threat of an aggressive Spain that historically interfered in\n\ndomestic French politics. These historians also emphasise the effect of Louis's wars in\n\nexpanding France's boundaries and creating more defensible frontiers that preserved\n\nFrance from invasion until the Revolution. <sup>[132]</sup>\n\nArguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his]\n\nsubjects.\" For example, he patronised the arts, encouraged industry, fostered trade and", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[25. Louis XIII, King of France and Navarre, 1601- 1643](https://en.wikipedia.org/wiki/Louis_XIII_of_France)\n\n26. Louis XIV, King of France and Navarre, 1638- 1715\n\n| Name | Birth | Death | Notes |\n|:---|:---|:---|:---|\n| By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) | By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) | By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) | By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) |\n| Louis, le Grand Dauphin | 1 November 1661 | 14 April 1711 | Fils de France. Dauphin of France (1661- 1711). Had issue. Father of Louis, Dauphin of France, Philip V of Spain and Charles, Duke of Berry. Grandfather of Louis XV of France |\n| Anne Élisabeth | 18 November 1662 | 30 December 1662 | Fille de France. Died in infancy. |\n| Marie Anne | 16 November 1664 | 26 December 1664 | Fille de France. Died in infancy. |\n| Marie Thérèse | 2 January 1667 | 1 March 1672 | Fille de France. Known as Madame Royale and la Petite Madame . Died in childhood. |\n| Philippe Charles, Duke of Anjou | 5 August 1668 | 10 July 1671 | Fils de France. Died in childhood. |\n| Louis François, Duke of Anjou | 14 June 1672 | 4 November 1672 | Fils de France. Died in infancy. |\n\nThis is an incomplete list of Louis XIV's illegitimate children. He reputedly had more, but the difficulty in fully documenting all\n\nsuch births restricts the list only to the better-known and/or legitimised.\n\n#### **Issue**", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia5.pdf" - }, - { - "text": "| Silver coin of Louis XIV, dated 1674 | Silver coin of Louis XIV, dated 1674 |\n|:---|:---|\n| | |\n| Obverse. The Latin inscription is LVDOVICVS XIIII D[EI] GRA[TIA] (\"Louis XIV, by the grace of God\"). | Reverse. The Latin inscription is FRAN[CIÆ] ET NAVARRÆ REX 1674 (\"King of France and of Navarre, 1674\"). |\n\n[The Persian embassy to Louis XIV](https://en.wikipedia.org/wiki/Persian_embassy_to_Louis_XIV)\n\n[sent by Soltan Hoseyn in 1715.](https://en.wikipedia.org/wiki/Soltan_Hoseyn)\n\n*Ambassade de Perse auprès de*\n\n*Louis XIV* [, studio of Antoine Coypel.](https://en.wikipedia.org/wiki/Antoine_Coypel)\n\n[The French were nevertheless forced to retreat from most of the Dutch Republic, which deeply shocked Louis; he retreated to St](https://en.wikipedia.org/wiki/Ch%C3%A2teau_de_Saint-Germain-en-Laye)\n\n[Germain for a time, where no one, except a few intimates, was allowed to disturb him.](https://en.wikipedia.org/wiki/Ch%C3%A2teau_de_Saint-Germain-en-Laye) <sup>[47]</sup> French military advantages allowed\n\nthem however to hold their ground in Alsace and the Spanish Netherlands while retaking Franche-Comté. By 1678, mutual\n\n[exhaustion led to the Treaty of Nijmegen, which was generally settled in France's favour and allowed Louis to intervene in the](https://en.wikipedia.org/wiki/Treaty_of_Nijmegen)\n\n[Scanian War. Despite the military defeat, his ally Sweden regained much of what it had lost under the 1679 treaties of Saint-](https://en.wikipedia.org/wiki/Treaty_of_Saint-Germain-en-Laye_(1679))\n\n[Germain-en-Laye, Fontainebleau and Lund imposed on Denmark- Norway and Brandenburg.](https://en.wikipedia.org/wiki/Denmark%E2%80%93Norway) <sup>[48]</sup> Yet Louis's two primary goals,\n\nthe destruction of the Dutch Republic and the conquest of the Spanish Netherlands, had failed. <sup>[49]</sup>\n\nLouis was at the height of his power, but at the cost of uniting his opponents; this increased as he continued his expansion. In\n\n[1679, he dismissed his foreign minister Simon Arnauld, marquis de Pomponne, because he was seen as having compromised too](https://en.wikipedia.org/wiki/Simon_Arnauld,_marquis_de_Pomponne)\n\nmuch with the allies. Louis maintained the strength of his army, but in his next series of territorial claims avoided using military\n\nforce alone. Rather, he combined it with legal pretexts in his efforts to augment the boundaries of his kingdom. Contemporary\n\n[treaties were intentionally phrased ambiguously. Louis established the Chambers of Reunion to determine the full extent of his](https://en.wikipedia.org/wiki/Chambers_of_Reunion)\n\nrights and obligations under those treaties.\n\n[Cities and territories, such as Luxembourg and Casale, were prized for their strategic](https://en.wikipedia.org/wiki/Casale_Monferrato)\n\npositions on the frontier and access to important waterways. Louis also sought\n\n[Strasbourg, an important strategic crossing on the left bank of the Rhine and theretofore](https://en.wikipedia.org/wiki/Strasbourg)\n\n[a Free Imperial City of the Holy Roman Empire, annexing it and other territories in](https://en.wikipedia.org/wiki/Holy_Roman_Empire)\n\n1681. Although a part of Alsace, Strasbourg was not part of Habsburg-ruled Alsace and\n\nwas thus not ceded to France in the Peace of Westphalia.\n\n[Following these annexations, Spain declared war, precipitating the War of the Reunions.](https://en.wikipedia.org/wiki/War_of_the_Reunions)\n\nHowever, the Spanish were rapidly defeated because the Emperor (distracted by the\n\n[Great Turkish War) abandoned them, and the Dutch only supported them minimally. By](https://en.wikipedia.org/wiki/Great_Turkish_War)\n\n[the Truce of Ratisbon, in 1684, Spain was forced to acquiesce in the French occupation](https://en.wikipedia.org/wiki/Truce_of_Ratisbon)\n\nof most of the conquered territories, for 20 years. <sup>[50]</sup>\n\nLouis's policy of the *Réunions* may have raised France to its greatest size and power", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[existing structure, replacing it with an Italian summer villa in the centre of Paris. Bernini's plans were eventually shelved in](https://en.wikipedia.org/wiki/Villa)\n\n[favour of the elegant Louvre Colonnade designed by three Frenchmen: Louis Le Vau, Charles Le Brun, and Claude Perrault. With](https://en.wikipedia.org/wiki/Claude_Perrault)\n\nthe relocation of the court to Versailles, the Louvre was given over to the arts and the public. <sup>[113]</sup> During his visit from Rome,\n\n[Bernini also executed a renowned portrait bust of the king.](https://en.wikipedia.org/wiki/Bust_of_Louis_XIV_(Bernini))\n\nFew rulers in world history have commemorated themselves in as grand a manner as Louis. <sup>[114]</sup> He cultivated his image as the\n\nSun King ( *le Roi Soleil* ), the centre of the universe \"without equal\". Louis used court ritual and the arts to validate and augment\n\nhis control over France. With his support, Colbert established from the beginning of Louis's personal reign a centralised and\n\ninstitutionalised system for creating and perpetuating the royal image. The King was thus portrayed largely in majesty or at war,\n\nnotably against Spain. This portrayal of the monarch was to be found in numerous media of artistic expression, such as painting,\n\nsculpture, theatre, dance, music, and the almanacs that diffused royal propaganda to the population at large.\n\nOver his lifetime, Louis commissioned numerous works of art to portray himself, among them over 300 formal portraits. The\n\nearliest portrayals of Louis already followed the pictorial conventions of the day in depicting the child king as the majestically\n\nroyal incarnation of France. This idealisation of the monarch continued in later works, which avoided depictions of the effect of\n\n[smallpox that Louis contracted in 1647. In the 1660s, Louis began to be shown as a Roman emperor, the god Apollo, or Alexander](https://en.wikipedia.org/wiki/Alexander_the_Great)\n\n[the Great, as can be seen in many works of Charles Le Brun, such as sculpture, paintings, and the decor of major monuments.](https://en.wikipedia.org/wiki/Charles_Le_Brun)\n\n### **Image and depiction**\n\n#### **Evolution of royal portraiture**", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Apartments were built to house those willing to pay court to the king. <sup>[61]</sup> However, the\n\npensions and privileges necessary to live in a style appropriate to their rank were only\n\npossible by waiting constantly on Louis. <sup>[62]</sup> For this purpose, an elaborate court ritual was\n\ncreated wherein the king became the centre of attention and was observed throughout the\n\nday by the public. With his excellent memory, Louis could then see who attended him at\n\ncourt and who was absent, facilitating the subsequent distribution of favours and positions.\n\nAnother tool Louis used to control his nobility was censorship, which often involved the opening of letters to discern their\n\nauthor's opinion of the government and king. <sup>[61]</sup> Moreover, by entertaining, impressing, and domesticating them with extravagant\n\nluxury and other distractions, Louis not only cultivated public opinion of him, but he also ensured the aristocracy remained under\n\nhis scrutiny.\n\n[Louis's extravagance at Versailles extended far beyond the scope of elaborate court rituals. He took delivery of an African](https://en.wikipedia.org/wiki/African_elephant)\n\n[elephant as a gift from the king of Portugal.](https://en.wikipedia.org/wiki/African_elephant) <sup>[63]</sup> He encouraged leading nobles to live at Versailles. This, along with the prohibition\n\nof private armies, prevented them from passing time on their own estates and in their regional power bases, from which they\n\nhistorically waged local wars and plotted resistance to royal authority. Louis thus compelled and seduced the old military\n\naristocracy (the \"nobility of the sword\") into becoming his ceremonial courtiers, further weakening their power. In their place, he\n\nraised commoners or the more recently ennobled bureaucratic aristocracy (the \"nobility of the robe\"). He judged that royal\n\nauthority thrived more surely by filling high executive and administrative positions with these men because they could be more\n\neasily dismissed than nobles of ancient lineage and entrenched influence. It is believed that Louis's policies were rooted in his\n\n### **Height of power**\n\n#### **Centralisation of power**", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Arguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his]\n\nsubjects.\" For example, he patronised the arts, encouraged industry, fostered trade and\n\ncommerce, and sponsored the founding of an overseas empire. Moreover, the significant\n\nreduction in civil wars and aristocratic rebellions during his reign are seen by these\n\nhistorians as the result of Louis's consolidation of royal authority over feudal elites. In their analysis, his early reforms centralised\n\nFrance and marked the birth of the modern French state. They regard the political and military victories as well as numerous\n\ncultural achievements as how Louis helped raise France to a preeminent position in Europe. <sup>[133]</sup> Europe came to admire France\n\nfor its military and cultural successes, power, and sophistication. Europeans generally began to emulate French manners, values,\n\ngoods, and deportment. French became the universal language of the European elite.\n\nLouis's detractors have argued that his considerable foreign, military and domestic expenditure impoverished and bankrupted\n\nFrance. His supporters, however, distinguish the state, which was impoverished, from France, which was not. As supporting\n\n[evidence, they cite the literature of the time, such as the social commentary in Montesquieu's ](https://en.wikipedia.org/wiki/Montesquieu) *[Persian Letters](https://en.wikipedia.org/wiki/Persian_Letters)* . <sup>[134]</sup>\n\n##### **Line of succession in 1715**\n\n### **Legacy**\n\n#### **Reputation**", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[Éléphante de Louis XIV](https://en.wikipedia.org/wiki/%C3%89l%C3%A9phante_de_Louis_XIV)\n\na. Some monarchs of states that were not fully sovereign for most or all of their reign ruled for longer. For example,\n\n[Sobhuza II of Swaziland at 82 years and Bernard VII of Lippe in the Holy Roman Empire at 81 years.](https://en.wikipedia.org/wiki/Holy_Roman_Empire) <sup>[2]</sup>\n\n[b. The anecdote as circulated after the French Revolution, designed to illustrate the tyrannical character of the](https://en.wikipedia.org/wiki/French_Revolution)\n\n[absolutism of the ](https://en.wikipedia.org/wiki/Absolute_monarchy_in_France) *[Ancien Régime](https://en.wikipedia.org/wiki/Ancien_R%C3%A9gime)* , held that the president of the *[parlement](https://en.wikipedia.org/wiki/Parlement_of_Paris)* began to address the king with the\n\nwords *Sire, l'État [...]* but was cut off by the king interjecting *L'État, c'est moi* .\n\n[1. \"Louis XIV\" (https://web.archive.org/web/20091028021603/http://encarta.msn.com/encyclopedia_761572792/Loui](https://web.archive.org/web/20091028021603/http://encarta.msn.com/encyclopedia_761572792/Louis_XIV.html)\n\n[s_XIV.html). MSN Encarta. 2008. Archived from the original (https://encarta.msn.com/encyclopedia_761572792/Lo](https://encarta.msn.com/encyclopedia_761572792/Louis_XIV.html)\n\n[uis_XIV.html) on 28 October 2009. Retrieved 20 January 2008.](https://encarta.msn.com/encyclopedia_761572792/Louis_XIV.html)\n\n[2. Buchanan, Rose Troup (29 August 2015). \"Longest serving rulers ever\" (https://www.independent.co.uk/news/peo](https://www.independent.co.uk/news/people/queen-elizabeth-ii-to-become-britains-longest-reigning-monarch-longest-serving-rulers-ever-10477985.html)\n\n[ple/queen-elizabeth-ii-to-become-britains-longest-reigning-monarch-longest-serving-rulers-ever-10477985.html).](https://www.independent.co.uk/news/people/queen-elizabeth-ii-to-become-britains-longest-reigning-monarch-longest-serving-rulers-ever-10477985.html)\n\n*[The Independent](https://en.wikipedia.org/wiki/The_Independent)* [. Archived (https://web.archive.org/web/20200214161336/https://www.independent.co.uk/news/p](https://web.archive.org/web/20200214161336/https://www.independent.co.uk/news/people/queen-elizabeth-ii-to-become-britains-longest-reigning-monarch-longest-serving-rulers-ever-10477985.html)\n\n[eople/queen-elizabeth-ii-to-become-britains-longest-reigning-monarch-longest-serving-rulers-ever-10477985.html)](https://web.archive.org/web/20200214161336/https://www.independent.co.uk/news/people/queen-elizabeth-ii-to-become-britains-longest-reigning-monarch-longest-serving-rulers-ever-10477985.html)\n\nfrom the original on 14 February 2020. Retrieved 4 July 2017.\n\n3. Spielvogel 2016, p. 419.\n\n[4. \"Louis XIV\" (http://www.newadvent.org/cathen/09371a.htm). ](http://www.newadvent.org/cathen/09371a.htm) *[Catholic Encyclopedia](https://en.wikipedia.org/wiki/Catholic_Encyclopedia)* [. 2007. Archived (https://web.ar](https://web.archive.org/web/20211216230840/https://www.newadvent.org/cathen/09371a.htm)\n\n[chive.org/web/20211216230840/https://www.newadvent.org/cathen/09371a.htm) from the original on 16](https://web.archive.org/web/20211216230840/https://www.newadvent.org/cathen/09371a.htm)\n\nDecember 2021. Retrieved 19 January 2008.\n\n5. Nathan 1993, pp. 633- 649.\n\n6. Nathan 1993, p. 633.\n\n[7. Brémond, Henri (1908). ](https://en.wikipedia.org/wiki/Henri_Br%C3%A9mond) *[La Provence mystique au XVIIe siècle](https://archive.org/details/laprovencemysti00bremgoog)* (https://archive.org/details/laprovencemysti00brem\n\n[goog) (in French). Paris, France: Plon-Nourrit. pp. 381 (https://archive.org/details/laprovencemysti00bremgoog/pa](https://archive.org/details/laprovencemysti00bremgoog/page/n415)\n\n[ge/n415)- 382.](https://archive.org/details/laprovencemysti00bremgoog/page/n415)\n\n8. Bluche 1990, p. 11.\n\n9. Barentine 2016, p. 129.\n\n10. Panhuysen 2016, p. 26.\n\n11. Fraser 2006, pp. 14- 16.\n\n12. Petitfils 2002, pp. 30- 40\n\n13. Reinhardt 2016, p. 20.", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia5.pdf" - }, - { - "text": "argued with Louis over Gallicanism and criticized the use of violence. Protestants across Europe were horrified at the treatment of\n\ntheir co-religionists, but most Catholics in France applauded the move. Nonetheless, it is indisputable that Louis's public image in\n\nmost of Europe, especially in Protestant regions, was dealt a severe blow.\n\n[In the end, however, despite renewed tensions with the Camisards of south-central France at the end of his reign, Louis may have](https://en.wikipedia.org/wiki/Camisard)\n\nhelped ensure that his successor would experience fewer instances of the religion-based disturbances that had plagued his\n\n[forebears. French society would sufficiently change by the time of his descendant, Louis XVI, to welcome tolerance in the form](https://en.wikipedia.org/wiki/Louis_XVI_of_France)\n\n[of the 1787 Edict of Versailles, also known as the Edict of Tolerance. This restored to non-Catholics their civil rights and the](https://en.wikipedia.org/wiki/Edict_of_Tolerance)\n\nfreedom to worship openly. <sup>[75]</sup> [ With the advent of the French Revolution in 1789, Protestants were granted equal rights with their](https://en.wikipedia.org/wiki/French_Revolution)\n\nRoman Catholic counterparts.\n\n### **Nine Years' War**\n\n#### **Causes and conduct of the war**", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[Royal procession passing the Pont-](https://en.wikipedia.org/wiki/Pont-Neuf)\n\n[Neuf under Louis XIV](https://en.wikipedia.org/wiki/Pont-Neuf)\n\nAlternatively, Louis's critics attribute the social upheaval culminating in the French Revolution to his failure to reform French\n\ninstitutions while the monarchy was still secure. Other scholars counter that there was little reason to reform institutions that\n\nlargely worked well under Louis. They also maintain that events occurring almost 80 years after his death were not reasonably\n\nforeseeable to Louis and that in any case, his successors had sufficient time to initiate reforms of their own. <sup>[135]</sup>\n\n[Louis has often been criticised for his vanity. The memoirist Saint-Simon, who claimed](https://en.wikipedia.org/wiki/Louis_de_Rouvroy,_duc_de_Saint-Simon)\n\nthat Louis slighted him, criticised him thus:\n\nThere was nothing he liked so much as flattery, or, to put it more plainly,\n\nadulation; the coarser and clumsier it was, the more he relished it.\n\n[For his part, Voltaire saw Louis's vanity as the cause for his bellicosity:](https://en.wikipedia.org/wiki/Voltaire)\n\nIt is certain that he passionately wanted glory, rather than the conquests\n\nthemselves. In the acquisition of Alsace and half of Flanders, and of all of\n\nFranche-Comté, what he really liked was the name he made for himself. <sup>[136]</sup>\n\n[Nonetheless, Louis has also received praise. The anti-Bourbon Napoleon described him not only as \"a great king\", but also as \"the](https://en.wikipedia.org/wiki/Napoleon)\n\nonly King of France worthy of the name\". <sup>[137]</sup> [ Leibniz, the German Protestant philosopher, commended him as \"one of the](https://en.wikipedia.org/wiki/Gottfried_Wilhelm_Leibniz)\n\ngreatest kings that ever was\". <sup>[138]</sup> [ And Lord Acton admired him as \"by far the ablest man who was born in modern times on the](https://en.wikipedia.org/wiki/Lord_Acton)\n\nsteps of a throne\". <sup>[139]</sup> The historian and philosopher Voltaire wrote: \"His name can never be pronounced without respect and\n\nwithout summoning the image of an eternally memorable age\". <sup>[140]</sup> Voltaire's history, *[The Age of Louis XIV](https://en.wikipedia.org/wiki/The_Age_of_Louis_XIV)* , named Louis's reign\n\nas not only one of the four great ages in which reason and culture flourished, but the greatest ever. <sup>[141][142]</sup>\n\nNumerous quotes have been attributed to Louis XIV by legend.\n\nThe well-known \"I am the state\" ( *[\"L'État, c'est moi.\"](https://en.wikipedia.org/wiki/L%27%C3%89tat,_c%27est_moi)* ) was reported from at least the late 18th century. <sup>[143]</sup> It was widely repeated\n\n[but also denounced as apocryphal by the early 19th century.](https://en.wikipedia.org/wiki/Apocryphal) <sup>[144][b][145]</sup>\n\n#### **Quotes**", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Royal\n\nMonogram\n\nMembers of the *[Académie des](https://en.wikipedia.org/wiki/French_Academy_of_Sciences)*\n\n*[sciences](https://en.wikipedia.org/wiki/French_Academy_of_Sciences)* with Louis in 1667; in the\n\n[background appears the new Paris](https://en.wikipedia.org/wiki/Paris_Observatory)\n\n[Observatory.](https://en.wikipedia.org/wiki/Paris_Observatory)\n\nimportant both for its role in ending the war between France and Spain, because many of the claims and objectives of Louis's\n\nforeign policy for the next 50 years would be based upon this marriage, and because it was through this marriage that the Spanish\n\nthrone would ultimately be delivered to the House of Bourbon. <sup>[32]</sup>\n\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of\n\nMazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring\n\nthat he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government\n\nof my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers]\n\nwill assist me with your counsels when I ask for them. I request and order you to seal no orders except by my\n\ncommand . . . I order you not to sign anything, not even a passport . . . without my command; to render\n\naccount to me personally each day and to favor no one\". <sup>[33]</sup> Capitalizing on the widespread public yearning\n\nfor peace and order after decades of foreign and civil strife, the young king consolidated central political\n\nauthority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent,\n\n[the historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of](https://en.wikipedia.org/wiki/Fran%C3%A7ois-Ren%C3%A9_de_Chateaubriand)\n\nLouis\". <sup>[34]</sup>\n\nLouis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on\n\n[bankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in](https://en.wikipedia.org/wiki/Controller-General_of_Finances)\n\n[1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances.](https://en.wikipedia.org/wiki/Superintendent_of_Finances)\n\nAlthough Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's\n\n[after him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le-](https://en.wikipedia.org/wiki/Vaux-le-Vicomte)\n\n[Vicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds.](https://en.wikipedia.org/wiki/Embezzlement)\n\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the\n\n[remote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the ](https://en.wikipedia.org/wiki/Belle_%C3%8Ele) *Parlement* found him guilty\n\nand sentenced him to exile; and finally Louis altered the sentence to life imprisonment.\n\nFouquet's downfall gave Colbert a free hand to reduce the national debt through more\n\nefficient taxation. The principal taxes included the *aides* and *douanes* [ (both customs](https://en.wikipedia.org/wiki/Customs)\n\n[duties), the ](https://en.wikipedia.org/wiki/Customs) *[gabelle](https://en.wikipedia.org/wiki/Gabelle)* (salt tax), and the *[taille](https://en.wikipedia.org/wiki/Taille)* (land tax). The *taille* was reduced at first, and\n\ncertain tax-collection contracts were auctioned instead of being sold privately to a\n\nfavoured few. Financial officials were required to keep regular accounts, revising\n\ninventories and removing unauthorized exemptions: up to 1661 only 10 per cent of income\n\nfrom the royal domain reached the king. Reform had to overcome vested interests: the", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "wikipedia5.pdf", - "query": "What did Louis XIV do to avoid the Spanish War of Succession in 1698?", - "target_page": 13, - "target_passage": "In an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided Spain's Italian territories between Louis's son le Grand Dauphin and Archduke Charles, with the rest of the empire awarded to Joseph Ferdinand.", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "Louis XIV\n\nexperiences during the *Fronde* , when men of high birth readily took up the rebel cause against their king, who was actually the\n\nkinsman of some. This victory over the nobility may thus have ensured the end of major civil wars in France until the French\n\nRevolution about a century later.\n\nUnder Louis, France was the leading European power, and most wars pivoted around its\n\naggressiveness. No European state exceeded it in population, and no one could match its\n\nwealth, central location, and very strong professional army. It had largely avoided the\n\ndevastation of the Thirty Years' War. Its weaknesses included an inefficient financial\n\nsystem that was hard-pressed to pay for its military adventures, and the tendency of most\n\nother powers to gang up against it.\n\n[During Louis's reign, France fought three major wars: the Franco-Dutch War, the Nine](https://en.wikipedia.org/wiki/Nine_Years%27_War)\n\n[Years' War, and the War of the Spanish Succession. There were also two lesser conflicts:](https://en.wikipedia.org/wiki/War_of_the_Spanish_Succession)\n\n[the War of Devolution and the War of the Reunions.](https://en.wikipedia.org/wiki/War_of_the_Reunions) <sup>[64]</sup> The wars were very expensive but\n\ndefined Louis XIV's foreign policy, and his personality shaped his approach. Impelled \"by\n\na mix of commerce, revenge, and pique\", Louis sensed that war was the ideal way to\n\nenhance his glory. In peacetime, he concentrated on preparing for the next war. He taught\n\nhis diplomats that their job was to create tactical and strategic advantages for the French\n\nmilitary. <sup>[6]</sup> By 1695, France retained much of its dominance but had lost control of the seas\n\nto England and Holland, and most countries, both Protestant and Catholic, were in alliance\n\n[against it. Sébastien Le Prestre de Vauban, France's leading military strategist, warned](https://en.wikipedia.org/wiki/S%C3%A9bastien_Le_Prestre_de_Vauban)\n\nLouis in 1689 that a hostile \"Alliance\" was too powerful at sea. He recommended that\n\nFrance fight back by licensing French merchant ships to privateer and seize enemy\n\nmerchant ships while avoiding its navies:\n\nFrance has its declared enemies Germany and all the states that it embraces; Spain with all its dependencies in\n\nEurope, Asia, Africa and America; the Duke of Savoy [in Italy], England, Scotland, Ireland, and all their colonies\n\nin the East and West Indies; and Holland with all its possessions in the four corners of the world where it has\n\ngreat establishments. France has ... undeclared enemies, indirectly hostile, hostile, and envious of its greatness,\n\nDenmark, Sweden, Poland, Portugal, Venice, Genoa, and part of the Swiss Confederation, all of which states\n\nsecretly aid France's enemies by the troops that they hire to them, the money they lend them and by protecting\n\nand covering their trade. <sup>[65]</sup>\n\nVauban was pessimistic about France's so-called friends and allies:\n\nFor lukewarm, useless, or impotent friends, France has the Pope, who is indifferent; the King of England\n\n[James II] expelled from his country; the Grand Duke of Tuscany; the Dukes of Mantua, Modena, and Parma [all\n\nin Italy]; and the other faction of the Swiss. Some of these are sunk in the softness that comes of years of\n\npeace, the others are cool in their affections....The English and Dutch are the main pillars of the Alliance; they\n\nsupport it by making war against us in concert with the other powers, and they keep it going by means of the\n\nmoney that they pay every year to... Allies.... We must therefore fall back on privateering as the method of\n\nconducting war which is most feasible, simple, cheap, and safe, and which will cost least to the state, the more\n\nso since any losses will not be felt by the King, who risks virtually nothing....It will enrich the country, train many\n\ngood officers for the King, and in a short time force his enemies to sue for peace. <sup>[66]</sup>", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Territorial expansion of France\n\nunder Louis XIV (1643- 1715) is\n\ndepicted in orange.\n\n[illegitimate son Louis-Auguste de Bourbon, Duke of Maine.](https://en.wikipedia.org/wiki/Louis-Auguste_de_Bourbon,_Duke_of_Maine) <sup>[129]</sup> Orléans, however, had Louis's will annulled by the *Parlement of*\n\n*Paris* [ after his death and made himself sole regent. He stripped Maine and his brother, Louis-Alexandre, Count of Toulouse, of](https://en.wikipedia.org/wiki/Louis-Alexandre_de_Bourbon,_comte_de_Toulouse)\n\n[the rank of Prince of the Blood, which Louis had granted them, and significantly reduced Maine's power and privileges.](https://en.wikipedia.org/wiki/Prince_du_Sang) <sup>[130]</sup>\n\nLine of succession to the French throne upon the death of Louis XIV in 1715. Louis XIV's only surviving legitimate grandson,\n\nPhilip V, was not included in the line of succession due to having renounced the French throne after the war of the Spanish\n\n[Succession, which lasted for 13 years after the death of Charles II of Spain in 1700.](https://en.wikipedia.org/wiki/Charles_II_of_Spain) <sup>[131]</sup>\n\n*[Louis XIII (1601- 1643)](https://en.wikipedia.org/wiki/Louis_XIII)*\n\n[ ](https://en.wikipedia.org/wiki/File:Simple_gold_crown.svg) **Louis XIV** *(1638- 1715)*\n\n*[Louis, Grand Dauphin (1661- 1711)](https://en.wikipedia.org/wiki/Louis,_Grand_Dauphin)*\n\n*[Louis, Duke of Burgundy (1682- 1712)](https://en.wikipedia.org/wiki/Louis,_Duke_of_Burgundy)*\n\n*[Louis, Duke of Brittany (1707- 1712)](https://en.wikipedia.org/wiki/Louis,_Duke_of_Brittany_(1707%E2%80%931712))*\n\n**(1)** [ Louis, Duke of Anjou (1710- 1774)](https://en.wikipedia.org/wiki/Louis_XV)\n\n[Philip V of Spain (1683- 1746)](https://en.wikipedia.org/wiki/Philip_V_of_Spain)\n\n*[Charles, Duke of Berry (1686- 1714)](https://en.wikipedia.org/wiki/Charles,_Duke_of_Berry_(1686%E2%80%931714))*\n\n*[Philippe I, Duke of Orléans (1640- 1701)](https://en.wikipedia.org/wiki/Philippe_I,_Duke_of_Orl%C3%A9ans)*\n\n**(2)** [ Philippe II, Duke of Orléans (1674- 1723)](https://en.wikipedia.org/wiki/Philippe_II,_Duke_of_Orl%C3%A9ans)\n\n**(3)** [ Louis, Duke of Chartres (1703- 1752)](https://en.wikipedia.org/wiki/Louis,_Duke_of_Orl%C3%A9ans_(1703%E2%80%931752))\n\n[Further down the French line of succession in 1715 was the House of Condé, followed by the House of Conti (a cadet branch of](https://en.wikipedia.org/wiki/Cadet_branch)\n\n[the House of Condé). Both of these royal houses were descended in the male line from Henri II, Prince of Condé, a second cousin](https://en.wikipedia.org/wiki/Second_cousin)\n\n[of French King Louis XIII (the father of Louis XIV) in the male line.](https://en.wikipedia.org/wiki/Male_line)\n\n[According to Philippe de Courcillon's ](https://en.wikipedia.org/wiki/Philippe_de_Courcillon) *Journal* , Louis on his deathbed advised his heir with these words:\n\nDo not follow the bad example which I have set you; I have often undertaken war too lightly and have sustained it for\n\nvanity. Do not imitate me, but be a peaceful prince, and may you apply yourself principally to the alleviation of the\n\nburdens of your subjects. <sup>[132]</sup>\n\nSome historians point out that it was a customary demonstration of piety in those days to\n\nexaggerate one's sins. Thus they do not place much emphasis on Louis's deathbed\n\ndeclarations in assessing his accomplishments. Rather, they focus on military and\n\ndiplomatic successes, such as how he placed a French prince on the Spanish throne. This,\n\nthey contend, ended the threat of an aggressive Spain that historically interfered in\n\ndomestic French politics. These historians also emphasise the effect of Louis's wars in\n\nexpanding France's boundaries and creating more defensible frontiers that preserved\n\nFrance from invasion until the Revolution. <sup>[132]</sup>\n\nArguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his]\n\nsubjects.\" For example, he patronised the arts, encouraged industry, fostered trade and", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[25. Louis XIII, King of France and Navarre, 1601- 1643](https://en.wikipedia.org/wiki/Louis_XIII_of_France)\n\n26. Louis XIV, King of France and Navarre, 1638- 1715\n\n| Name | Birth | Death | Notes |\n|:---|:---|:---|:---|\n| By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) | By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) | By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) | By Maria Theresa, Infanta of Spain, Archduchess of Austria, Queen of France and of Navarre (20 September 1638 - 30 July 1683) |\n| Louis, le Grand Dauphin | 1 November 1661 | 14 April 1711 | Fils de France. Dauphin of France (1661- 1711). Had issue. Father of Louis, Dauphin of France, Philip V of Spain and Charles, Duke of Berry. Grandfather of Louis XV of France |\n| Anne Élisabeth | 18 November 1662 | 30 December 1662 | Fille de France. Died in infancy. |\n| Marie Anne | 16 November 1664 | 26 December 1664 | Fille de France. Died in infancy. |\n| Marie Thérèse | 2 January 1667 | 1 March 1672 | Fille de France. Known as Madame Royale and la Petite Madame . Died in childhood. |\n| Philippe Charles, Duke of Anjou | 5 August 1668 | 10 July 1671 | Fils de France. Died in childhood. |\n| Louis François, Duke of Anjou | 14 June 1672 | 4 November 1672 | Fils de France. Died in infancy. |\n\nThis is an incomplete list of Louis XIV's illegitimate children. He reputedly had more, but the difficulty in fully documenting all\n\nsuch births restricts the list only to the better-known and/or legitimised.\n\n#### **Issue**", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Dutch recognition of Philip V. In 1701, Philip transferred the *[asiento](https://en.wikipedia.org/wiki/Asiento_de_Negros)* (the right to supply slaves to Spanish colonies) to France, as\n\n[a sign of the two nations' growing connections. As tensions mounted, Louis decided to acknowledge James Stuart, the son of](https://en.wikipedia.org/wiki/James_Francis_Edward_Stuart)\n\nJames II, as King of England, Scotland and Ireland on the latter's death, infuriating William III. These actions enraged Britain and\n\nthe Dutch Republic. <sup>[96]</sup> With the Holy Roman Emperor and the petty German states, they formed another Grand Alliance and\n\ndeclared war on France in 1702. French diplomacy secured Bavaria, Portugal, and Savoy as Franco-Spanish allies. <sup>[97]</sup>\n\n[Even before war was officially declared, hostilities began with Imperial aggression in Italy. Once finally declared, the War of the](https://en.wikipedia.org/wiki/War_of_the_Spanish_Succession)\n\n[Spanish Succession lasted almost until Louis's death, at great cost to him and France.](https://en.wikipedia.org/wiki/War_of_the_Spanish_Succession)\n\n[The war began with French successes, but the talents of John Churchill, 1st Duke of Marlborough, and Eugene of Savoy checked](https://en.wikipedia.org/wiki/Eugene_of_Savoy)\n\nthese victories and broke the myth of French invincibility. The duo allowed the Palatinate and Austria to occupy Bavaria after\n\n[their victory at the Battle of Blenheim. Maximilian II Emanuel, Elector of Bavaria, had to flee to the Spanish Netherlands. The](https://en.wikipedia.org/wiki/Maximilian_II_Emanuel,_Elector_of_Bavaria)\n\n#### **Acceptance of the will of Charles II and consequences**\n\n#### **Commencement of fighting**", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia5.pdf" - }, - { - "text": "| Silver coin of Louis XIV, dated 1674 | Silver coin of Louis XIV, dated 1674 |\n|:---|:---|\n| | |\n| Obverse. The Latin inscription is LVDOVICVS XIIII D[EI] GRA[TIA] (\"Louis XIV, by the grace of God\"). | Reverse. The Latin inscription is FRAN[CIÆ] ET NAVARRÆ REX 1674 (\"King of France and of Navarre, 1674\"). |\n\n[The Persian embassy to Louis XIV](https://en.wikipedia.org/wiki/Persian_embassy_to_Louis_XIV)\n\n[sent by Soltan Hoseyn in 1715.](https://en.wikipedia.org/wiki/Soltan_Hoseyn)\n\n*Ambassade de Perse auprès de*\n\n*Louis XIV* [, studio of Antoine Coypel.](https://en.wikipedia.org/wiki/Antoine_Coypel)\n\n[The French were nevertheless forced to retreat from most of the Dutch Republic, which deeply shocked Louis; he retreated to St](https://en.wikipedia.org/wiki/Ch%C3%A2teau_de_Saint-Germain-en-Laye)\n\n[Germain for a time, where no one, except a few intimates, was allowed to disturb him.](https://en.wikipedia.org/wiki/Ch%C3%A2teau_de_Saint-Germain-en-Laye) <sup>[47]</sup> French military advantages allowed\n\nthem however to hold their ground in Alsace and the Spanish Netherlands while retaking Franche-Comté. By 1678, mutual\n\n[exhaustion led to the Treaty of Nijmegen, which was generally settled in France's favour and allowed Louis to intervene in the](https://en.wikipedia.org/wiki/Treaty_of_Nijmegen)\n\n[Scanian War. Despite the military defeat, his ally Sweden regained much of what it had lost under the 1679 treaties of Saint-](https://en.wikipedia.org/wiki/Treaty_of_Saint-Germain-en-Laye_(1679))\n\n[Germain-en-Laye, Fontainebleau and Lund imposed on Denmark- Norway and Brandenburg.](https://en.wikipedia.org/wiki/Denmark%E2%80%93Norway) <sup>[48]</sup> Yet Louis's two primary goals,\n\nthe destruction of the Dutch Republic and the conquest of the Spanish Netherlands, had failed. <sup>[49]</sup>\n\nLouis was at the height of his power, but at the cost of uniting his opponents; this increased as he continued his expansion. In\n\n[1679, he dismissed his foreign minister Simon Arnauld, marquis de Pomponne, because he was seen as having compromised too](https://en.wikipedia.org/wiki/Simon_Arnauld,_marquis_de_Pomponne)\n\nmuch with the allies. Louis maintained the strength of his army, but in his next series of territorial claims avoided using military\n\nforce alone. Rather, he combined it with legal pretexts in his efforts to augment the boundaries of his kingdom. Contemporary\n\n[treaties were intentionally phrased ambiguously. Louis established the Chambers of Reunion to determine the full extent of his](https://en.wikipedia.org/wiki/Chambers_of_Reunion)\n\nrights and obligations under those treaties.\n\n[Cities and territories, such as Luxembourg and Casale, were prized for their strategic](https://en.wikipedia.org/wiki/Casale_Monferrato)\n\npositions on the frontier and access to important waterways. Louis also sought\n\n[Strasbourg, an important strategic crossing on the left bank of the Rhine and theretofore](https://en.wikipedia.org/wiki/Strasbourg)\n\n[a Free Imperial City of the Holy Roman Empire, annexing it and other territories in](https://en.wikipedia.org/wiki/Holy_Roman_Empire)\n\n1681. Although a part of Alsace, Strasbourg was not part of Habsburg-ruled Alsace and\n\nwas thus not ceded to France in the Peace of Westphalia.\n\n[Following these annexations, Spain declared war, precipitating the War of the Reunions.](https://en.wikipedia.org/wiki/War_of_the_Reunions)\n\nHowever, the Spanish were rapidly defeated because the Emperor (distracted by the\n\n[Great Turkish War) abandoned them, and the Dutch only supported them minimally. By](https://en.wikipedia.org/wiki/Great_Turkish_War)\n\n[the Truce of Ratisbon, in 1684, Spain was forced to acquiesce in the French occupation](https://en.wikipedia.org/wiki/Truce_of_Ratisbon)\n\nof most of the conquered territories, for 20 years. <sup>[50]</sup>\n\nLouis's policy of the *Réunions* may have raised France to its greatest size and power", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[years. King Charles II ruled a vast empire comprising Spain, Naples, Sicily, Milan, the Spanish Netherlands, and numerous](https://en.wikipedia.org/wiki/Kingdom_of_Sicily)\n\n[Spanish colonies. He produced no children, however, and consequently had no direct heirs.](https://en.wikipedia.org/wiki/Spanish_Empire)\n\nThe principal claimants to the throne of Spain belonged to the ruling families of France and Austria. The French claim derived\n\n[from Louis XIV's mother Anne of Austria (the older sister of Philip IV of Spain) and his wife Maria Theresa (Philip IV's eldest](https://en.wikipedia.org/wiki/Philip_IV_of_Spain)\n\n[daughter). Based on the laws of primogeniture, France had the better claim as it originated from the eldest daughters in two](https://en.wikipedia.org/wiki/Primogeniture)\n\ngenerations. However, their renunciation of succession rights complicated matters. In the case of Maria Theresa, nonetheless, the\n\nrenunciation was considered null and void owing to Spain's breach of her marriage contract with Louis. In contrast, no\n\n[renunciations tainted the claims of Emperor Leopold I's son Charles, Archduke of Austria, who was a grandson of Philip III's](https://en.wikipedia.org/wiki/Philip_III_of_Spain)\n\n[youngest daughter Maria Anna. The English and Dutch feared that a French or Austrian-born Spanish king would threaten the](https://en.wikipedia.org/wiki/Maria_Anna_of_Spain)\n\n[balance of power and thus preferred the Bavarian Prince Joseph Ferdinand, a grandson of Leopold I through his first wife](https://en.wikipedia.org/wiki/Joseph_Ferdinand_of_Bavaria_(1692-1699))\n\n[Margaret Theresa of Spain (the younger daughter of Philip IV).](https://en.wikipedia.org/wiki/Margaret_Theresa_of_Spain)\n\n[In an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided](https://en.wikipedia.org/wiki/Treaty_of_The_Hague_(1698))\n\nSpain's Italian territories between Louis's son *le Grand Dauphin* and Archduke Charles, with the rest of the empire awarded to\n\nJoseph Ferdinand. William III consented to permitting the Dauphin's new territories to become part of France when the latter\n\n#### **Peace of Ryswick**\n\n### **War of the Spanish Succession**\n\n#### **Causes and build-up to the war**", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia5.pdf" - }, - { - "text": "[Philip V of Spain](https://en.wikipedia.org/wiki/Philip_V_of_Spain)\n\nLouis in 1701\n\nsucceeded to his father's throne. <sup>[90]</sup> The signatories, however, omitted to consult the ruler\n\nof these lands, and Charles II was passionately opposed to the dismemberment of his\n\nempire. In 1699, he re-confirmed his 1693 will that named Joseph Ferdinand as his sole\n\nsuccessor. <sup>[91]</sup>\n\nSix months later, Joseph Ferdinand died. Therefore, in 1700, Louis and William III\n\n[concluded a fresh partitioning agreement, the Treaty of London. This allocated Spain, the](https://en.wikipedia.org/wiki/Treaty_of_London_(1700))\n\nLow Countries, and the Spanish colonies to the Archduke. The Dauphin would receive all\n\nof Spain's Italian territories. <sup>[92]</sup> Charles II acknowledged that his empire could only remain\n\nundivided by bequeathing it entirely to a Frenchman or an Austrian. Under pressure from\n\n[his German wife, Maria Anna of Neuburg, Charles II named Archduke Charles as his sole](https://en.wikipedia.org/wiki/Maria_Anna_of_Neuburg)\n\nheir.\n\nOn his deathbed in 1700, Charles II of Spain\n\nunexpectedly changed his will. The clear\n\ndemonstration of French military superiority for\n\nmany decades before this time, the pro-French\n\n[faction at the court of Spain, and even Pope](https://en.wikipedia.org/wiki/Pope_Innocent_XII)\n\n[Innocent XII convinced him that France was more likely to preserve his empire intact. He](https://en.wikipedia.org/wiki/Pope_Innocent_XII)\n\nthus offered the entire empire to the Dauphin's second son Philip, Duke of Anjou, provided\n\nit remained undivided. Anjou was not in the direct line of French succession, thus his\n\naccession would not cause a Franco-Spanish union. <sup>[92]</sup> If Anjou refused, the throne would\n\n[be offered to his younger brother Charles, Duke of Berry. If the Duke of Berry declined it,](https://en.wikipedia.org/wiki/Charles,_Duke_of_Berry_(1686%E2%80%931714))\n\n[it would go to Archduke Charles, then to the distantly related House of Savoy if Charles](https://en.wikipedia.org/wiki/House_of_Savoy)\n\ndeclined it. <sup>[93]</sup>\n\nLouis was confronted with a difficult choice. He could agree to a partition of the Spanish\n\npossessions and avoid a general war, or accept Charles II's will and alienate much of\n\nEurope. He may initially have been inclined to abide by the partition treaties, but the\n\nDauphin's insistence persuaded him otherwise. <sup>[94]</sup> Moreover, Louis's foreign minister,\n\n[Jean-Baptiste Colbert, marquis de Torcy, pointed out that war with the Emperor would](https://en.wikipedia.org/wiki/Jean-Baptiste_Colbert,_marquis_de_Torcy)\n\nalmost certainly ensue whether Louis accepted the partition treaties or Charles II's will. He\n\nemphasised that, should it come to war, William III was unlikely to stand by France since\n\nhe \"made a treaty to avoid war and did not intend to go to war to implement the treaty\". <sup>[91]</sup> Indeed, in the event of war, it might be\n\npreferable to be already in control of the disputed lands. Eventually, therefore, Louis decided to accept Charles II's will. Philip,\n\nDuke of Anjou, thus became Philip V, King of Spain.\n\nMost European rulers accepted Philip as king, some reluctantly. Depending on one's views of the war's inevitability, Louis acted\n\nreasonably or arrogantly. <sup>[95]</sup> He confirmed that Philip V retained his French rights despite his new Spanish position. Admittedly,\n\nhe may only have been hypothesising a theoretical eventuality and not attempting a Franco-Spanish union. But his actions were\n\ncertainly not read as disinterested. Moreover, Louis sent troops to the Spanish Netherlands to evict Dutch garrisons and secure\n\nDutch recognition of Philip V. In 1701, Philip transferred the *[asiento](https://en.wikipedia.org/wiki/Asiento_de_Negros)* (the right to supply slaves to Spanish colonies) to France, as", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia5.pdf" - }, - { - "text": "law and nephew William. Vehemently anti-French, William (now William III of England) pushed his new kingdoms into war, thus\n\n[transforming the League of Augsburg into the Grand Alliance. Before this happened, Louis expected William's expedition to](https://en.wikipedia.org/wiki/Grand_Alliance_(League_of_Augsburg))\n\nEngland to absorb his energies and those of his allies, so he dispatched troops to the Rhineland after the expiry of his ultimatum to\n\nthe German princes requiring confirmation of the Truce of Ratisbon and acceptance of his demands about the succession crises.\n\nThis military manoeuvre was also intended to protect his eastern provinces from Imperial invasion by depriving the enemy army\n\n[of sustenance, thus explaining the preemptive scorched earth policy pursued in much of southwestern Germany (the \"Devastation](https://en.wikipedia.org/wiki/Scorched_earth)\n\nof the Palatinate\"). <sup>[80]</sup>\n\nFrench armies were generally victorious throughout the war because of Imperial commitments in\n\nthe Balkans, French logistical superiority, and the quality of French generals such as Condé's\n\n[famous pupil, François Henri de Montmorency-Bouteville, duc de Luxembourg.](https://en.wikipedia.org/wiki/Fran%C3%A7ois_Henri_de_Montmorency-Bouteville,_duc_de_Luxembourg) <sup>[81]</sup> He triumphed\n\n[at the Battles of Fleurus in 1690, Steenkerque in 1692, and Landen in 1693, although, the battles](https://en.wikipedia.org/wiki/Battle_of_Landen)\n\nproved to be of little of strategic consequence, <sup>[82][83]</sup> mostly due to the nature of late 17th-century\n\nwarfare. <sup>[84]</sup>\n\n[Although an attempt to restore James II failed at the Battle of the Boyne in 1690, France](https://en.wikipedia.org/wiki/Battle_of_the_Boyne)\n\naccumulated a string of victories from Flanders in the north, Germany in the east, and Italy and\n\nSpain in the south, to the high seas and the colonies. Louis personally supervised the captures of\n\n[Mons in 1691 and Namur in 1692. Luxembourg gave France the defensive line of the Sambre by](https://en.wikipedia.org/wiki/Sambre)\n\n[capturing Charleroi in 1693. France also overran most of the Duchy of Savoy after the battles of](https://en.wikipedia.org/wiki/Duchy_of_Savoy)\n\n[Marsaglia and Staffarde in 1693. While naval stalemate ensued after the French victory at the](https://en.wikipedia.org/wiki/Battle_of_Staffarda)\n\n[Battle of Beachy Head in 1690 and the Allied victory at Barfleur-La Hougue in 1692, the Battle of](https://en.wikipedia.org/wiki/Battle_of_Torroella)\n\n[Torroella in 1694 exposed Catalonia to French invasion, culminating in the capture of Barcelona.](https://en.wikipedia.org/wiki/Barcelona)\n\n[The Dutch captured Pondichéry in 1693, but a 1697 French raid on the Spanish treasure port of Cartagena, Spain, yielded a](https://en.wikipedia.org/wiki/Port_of_Cartagena)\n\nfortune of 10,000,000 livres.", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Marshal de Luxembourg\n\n[In July 1695, the city of Namur, occupied for three years by the French, was besieged by an allied](https://en.wikipedia.org/wiki/Siege_of_Namur_(1695))\n\narmy led by William III. Louis XIV ordered the surprise destruction of a Flemish city to divert the\n\n[attention of these troops. This led to the bombardment of Brussels, in which more than 4,000](https://en.wikipedia.org/wiki/Bombardment_of_Brussels_(1695))\n\nbuildings were destroyed, including the entire city centre. The strategy failed, as Namur fell three\n\n[weeks later, but harmed Louis XIV's reputation: a century later, Napoleon deemed the](https://en.wikipedia.org/wiki/Napoleon)\n\nbombardment \"as barbarous as it was useless\". <sup>[85]</sup>\n\nPeace was broached by Sweden in 1690. By 1692, both sides evidently wanted peace, and secret\n\nbilateral talks began, but to no avail. <sup>[86]</sup> Louis tried to break up the alliance against him by dealing\n\n[with individual opponents but did not achieve his aim until 1696 when the Savoyards agreed to the](https://en.wikipedia.org/wiki/Duchy_of_Savoy)\n\nTreaty of Turin and switched sides. Thereafter, members of the League of Augsburg rushed to the\n\n[peace table, and negotiations for a general peace began in earnest, culminating in the Peace of](https://en.wikipedia.org/wiki/Peace_of_Ryswick)\n\n[Ryswick of 1697.](https://en.wikipedia.org/wiki/Peace_of_Ryswick) <sup>[87]</sup>\n\n[The Peace of Ryswick ended the War of the League of Augsburg and disbanded the Grand Alliance. By manipulating their](https://en.wikipedia.org/wiki/Peace_of_Ryswick)\n\nrivalries and suspicions, Louis divided his enemies and broke their power.\n\nThe treaty yielded many benefits for France. Louis secured permanent French sovereignty over all of Alsace, including\n\n[Strasbourg, and established the Rhine as the Franco-German border (as it is to this day). Pondichéry and Acadia were returned to](https://en.wikipedia.org/wiki/Acadia)\n\nFrance, and Louis's *de facto* [ possession of Saint-Domingue was recognised as lawful. However, he returned Catalonia and most of](https://en.wikipedia.org/wiki/Catalonia)\n\nthe Reunions.\n\nFrench military superiority might have allowed him to press for more advantageous terms. Thus, his generosity to Spain with\n\n[regard to Catalonia has been read as a concession to foster pro-French sentiment and may ultimately have induced King Charles II](https://en.wikipedia.org/wiki/Charles_II_of_Spain)\n\n[to name Louis's grandson Philip, Duke of Anjou, heir to the Spanish throne.](https://en.wikipedia.org/wiki/Philip_V_of_Spain) <sup>[88]</sup> In exchange for financial compensation, France\n\n[renounced its interests in the Electorate of Cologne and the Palatinate. Lorraine, which had been occupied by the French since](https://en.wikipedia.org/wiki/Lorraine_(duchy))\n\n[1670, was returned to its rightful Duke Leopold, albeit with a right of way to the French military. William and Mary were](https://en.wikipedia.org/wiki/Leopold,_Duke_of_Lorraine)\n\nrecognised as joint sovereigns of the British Isles, and Louis withdrew support for James II. The Dutch were given the right to\n\ngarrison forts in the Spanish Netherlands that acted as a protective barrier against possible French aggression. Though in some\n\nrespects the Treaty of Ryswick may appear a diplomatic defeat for Louis since he failed to place client rulers in control of the\n\nPalatinate or the Electorate of Cologne, he did fulfil many of the aims laid down in his 1688 ultimatum. <sup>[89]</sup> In any case, peace in\n\n1697 was desirable to Louis, since France was exhausted from the costs of the war.\n\nBy the time of the Peace of Ryswick, the Spanish succession had been a source of concern to European leaders for well over forty\n\n[years. King Charles II ruled a vast empire comprising Spain, Naples, Sicily, Milan, the Spanish Netherlands, and numerous](https://en.wikipedia.org/wiki/Kingdom_of_Sicily)", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia5.pdf" - }, - { - "text": "Louis XIV in 1670,\n\n[engraved portrait by Robert](https://en.wikipedia.org/wiki/Robert_Nanteuil)\n\n[Nanteuil](https://en.wikipedia.org/wiki/Robert_Nanteuil)\n\nThe future Philip V being introduced\n\nas King of Spain by his grandfather,\n\nLouis XIV\n\n[The Battle of Tolhuis, Louis XIV crosses](https://en.wikipedia.org/wiki/Battle_of_Tolhuis)\n\n[the Lower Rhine at Lobith on 12 June](https://en.wikipedia.org/wiki/Lower_Rhine)\n\n[1672; Rijksmuseum Amsterdam](https://en.wikipedia.org/wiki/Rijksmuseum)\n\n[Louis XIV, 1670, by Claude](https://en.wikipedia.org/wiki/Claude_Lef%C3%A8bvre)\n\n[Lefèbvre](https://en.wikipedia.org/wiki/Claude_Lef%C3%A8bvre)\n\n[and Lionne, however, made the renunciation conditional on](https://en.wikipedia.org/wiki/Hugues_de_Lionne)\n\n[the full payment of a Spanish dowry of 500,000 écus.](https://en.wikipedia.org/wiki/%C3%89cu) <sup>[40]</sup>\n\nThe dowry was never paid and would later play a part\n\n[persuading his maternal first cousin Charles II of Spain to](https://en.wikipedia.org/wiki/Charles_II_of_Spain)\n\n[leave his empire to Philip, Duke of Anjou (later Philip V of](https://en.wikipedia.org/wiki/Philip_V_of_Spain)\n\n[Spain), the grandson of Louis XIV and Maria Theresa.](https://en.wikipedia.org/wiki/Philip_V_of_Spain)\n\n[The War of Devolution did not focus on the payment of the](https://en.wikipedia.org/wiki/War_of_Devolution)\n\ndowry; rather, the lack of payment was what Louis XIV\n\nused as a pretext for nullifying Maria Theresa's\n\nrenunciation of her claims, allowing the land to \"devolve\"\n\n[to him. In Brabant (the location of the land in dispute),](https://en.wikipedia.org/wiki/Duchy_of_Brabant)\n\nchildren of first marriages traditionally were not\n\ndisadvantaged by their parents' remarriages and still\n\ninherited property. Louis's wife was Philip IV's daughter by\n\nhis first marriage, while the new king of Spain, Charles II, was his son by a subsequent\n\nmarriage. Thus, Brabant allegedly \"devolved\" to Maria Theresa, justifying France to attack\n\n[the Spanish Netherlands.](https://en.wikipedia.org/wiki/Spanish_Netherlands)\n\n[During the Eighty Years' War with Spain, France supported the Dutch Republic as part](https://en.wikipedia.org/wiki/Dutch_Republic)\n\n[of a general policy of opposing Habsburg power. Johan de Witt, Dutch Grand](https://en.wikipedia.org/wiki/Grand_Pensionary)\n\n[Pensionary from 1653 to 1672, viewed this as crucial for Dutch security and a](https://en.wikipedia.org/wiki/Grand_Pensionary)\n\n[counterweight against his domestic Orangist opponents. Louis provided support in the](https://en.wikipedia.org/wiki/Prince_of_Orange)\n\n[1665-1667 Second Anglo-Dutch War but used the opportunity to launch the War of](https://en.wikipedia.org/wiki/War_of_Devolution)\n\n[Devolution in 1667. This captured Franche-Comté and much of the Spanish](https://en.wikipedia.org/wiki/Spanish_Netherlands)\n\n[Netherlands; French expansion in this area was a direct threat to Dutch economic](https://en.wikipedia.org/wiki/Spanish_Netherlands)\n\ninterests. <sup>[41]</sup>\n\n[The Dutch opened talks with Charles II of England on a common diplomatic front](https://en.wikipedia.org/wiki/Charles_II_of_England)\n\n[against France, leading to the Triple Alliance, between England, the Dutch and](https://en.wikipedia.org/wiki/Triple_Alliance_(1668))\n\n[Sweden. The threat of an escalation and a secret treaty to divide Spanish possessions](https://en.wikipedia.org/wiki/Swedish_Empire)\n\n[with Emperor Leopold, the other major claimant to the throne of Spain, led Louis to relinquish many of his gains in the 1668](https://en.wikipedia.org/wiki/Leopold_I,_Holy_Roman_Emperor)\n\n[Treaty of Aix-la-Chapelle.](https://en.wikipedia.org/wiki/Treaty_of_Aix-la-Chapelle_(1668)) <sup>[42]</sup>\n\n[Louis placed little reliance on his agreement with Leopold and as it was now clear French and Dutch aims were in direct conflict,](https://en.wikipedia.org/wiki/Leopold_I,_Holy_Roman_Emperor)", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia5.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed2.pdf", - "query": "Does nerve transection or crushing affect small afferents within the dorsal root ganglion in the same way?", - "target_page": 5, - "target_passage": "Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) injuries resulted in a rightward shift in population distributions of the cross-sectional area of nucleated, FB-labelled DRG neurons when compared with contralateral DRG, consistent with a loss of small afferents post–nerve injury.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "Separating analysis into intact vs axotomized afferents revealed\n\nthat only axotomized afferents were lost, with no difference\n\nobserved in numbers of intact afferents ( Fig. 1D ). Between 1 and\n\n8 weeks after injury, we observed a 61.0 6 7.0% decrease in the\n\nnumber of GFP 1 neurons. This loss of injured afferents resulted\n\nin a loss of neuron-containing (ie, excluding white matter regions)\n\nDRG volume ( Fig. 1E ), but not neuron density ( Fig. 1F ). Cell loss\n\npredominantly occurred between 1 and 2 weeks postinjury and\n\nstabilized after this timepoint. Population distributions of the\n\ncross-sectional area of nucleated, tdTomato-expressing cell\n\nprofiles were not significantly different at 1 vs 8 weeks post-\n\nSNI trans , in contrast to GFP-expressing/injured afferents, in which\n\na loss of a population of small afferents at 8 weeks postinjury was\n\nobserved ( Fig. 1G ).\n\nSNI trans resulted in a mixed population of axotomized and intact\n\nafferents within the L4 DRG. Therefore, we developed an approach\n\nto restrict our analysis to axotomized afferents, without relying on\n\ntransgenic labelling, and used this as a complementary approach to\n\nconfirm our findings. We injected the neuronal tracer FB into the\n\nglabrous, tibial innervation territory of both hindpaws 1 week before\n\ncommon peroneal and tibial transection (SNI trans ) or crush (SNI crush )\n\nsurgeries ( Figs. 2A and B ). FastBlue-uptake was complete across\n\n[neurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/](http://links.lww.com/PAIN/C84)\n\n[C84), so this approach allowed us to profile a sample of the](http://links.lww.com/PAIN/C84)\n\naxotomized afferents. Both SNI trans ( Fig. 2C ) and SNI crush ( Fig. 2D )\n\ninjuries resulted in a rightward shift in population distributions of the\n\ncross-sectional area of nucleated, FB-labelled DRG neurons when\n\ncompared with contralateral DRG, consistent with a loss of small\n\nafferents post- nerve injury.\n\nAs a third complementary approach, we applied semiauto-\n\nmated volumetric analyses of nuclei size following tissue clearing.\n\nIn this study, whole DRGs were cleared 4 weeks after SNI trans for\n\nnuclei counting in “complete” tissue ( Figs. 2E- H ). Nuclei were labelled by TDP-43, in line with the study by West et al., <sup>67</sup> and\n\nwere quantified using Imaris software ( Fig. 2F , Video 1). We\n\nobserved a slight but significant rightward shift in nuclear spot\n\nvolume population distribution 4 weeks after SNI trans ( Fig. 2G ). In\n\naddition, there was a significant reduction in the number of small\n\nbut not medium or large nuclear spots, in support of a loss of\n\nsmall-diameter neuron populations ( Fig. 2H ).\n\nTogether, our data derived from several different experimental\n\napproaches show that a population of small-diameter afferents\n\nare lost following peripheral nerve injury.\n\n3.2. Spared nerve crush or transection results in death of\n\nMrgprd-expressing neurons\n\nTo date, determining cell loss among specific populations of\n\nafferent neurons has proved challenging due to the down-\n\nregulation of subpopulation-specific marker genes following axonal transection. <sup>37,44</sup> To overcome this issue, we took\n\nadvantage of transgenic strategies to label populations in\n\na manner that persisted after injury. Owing to the bias for the\n\nloss of small neurons and the known loss of IB4-binding central terminals postinjury, <sup>36</sup> we initially focused on nonpeptidergic nociceptive neurons. We used MrgD <sup>ChR2-YFP</sup> mice to identify\n\nneurons belonging to the largest of the 3 classes of non- peptidergic nociceptors, NP1. <sup>55,59</sup> To determine whether these\n\nneurons are lost following nerve injury, we used a stereological method to quantify L4 DRG MrgD-YFP <sup>1</sup> (yellow fluorescent", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "objective quantitative assessment of neuron death after peripheral nerve\n\ninjury. Exp Neurol 2007;203:22- 33.\n\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after\n\nupper limb nerve injury and protective effect of repair: clinical evaluation\n\nusing volumetric magnetic resonance imaging of dorsal root ganglia.\n\nNeurosurgery 2013;73:632- 40.\n\n[67] West SJ, Bonboire D, Bennett DL. StereoMate: 3D stereological\n\nautomated analysis of biological structures. bioRxiv 2020:648337.\n\n[68] Wiberg R, Novikova LN, Kingham PJ. Evaluation of apoptotic pathways in\n\ndorsal root ganglion neurons following peripheral nerve injury.\n\nNeuroreport 2018;29:779- 85.\n\n[69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum\n\nAI. Dorsal root ganglion macrophages contribute to both the initiation and\n\npersistence of neuropathic pain. Nat Commun 2020;11:264.\n\n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia\n\ngelatinosa mediate interaction of signals from primary afferents. J Physiol\n\n2010;588:2065- 75.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.3. Spared nerve injury induces a loss of Trpm8 <sup>1</sup> and calcitonin gene-related peptide <sup>1</sup> but not myelinated dorsal\n\nroot ganglion neurons\n\nLoss restricted to nonpeptidergic nociceptors would not fully\n\naccount for the degree of total neuron loss that we observed.\n\nTherefore, we studied a range of other subpopulations, both\n\nsmall and large in diameter, for their vulnerability to injury-\n\ninduced loss. To investigate potential loss of Trpm8 <sup>1</sup> (cold- sensitive), calcitonin gene-related peptide <sup>1</sup> (CGRP) (peptider-\n\ngic), and myelinated subpopulations of DRG neurons following\n\nnerve injury, we applied our FB-labelling approach in Trpm8 <sup>FlpO</sup> ;\n\nRC::FLTG (FlpO-dependent tdTom expression), Calca <sup>CreERT2</sup> ;\n\nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP\n\nmice, respectively ( Figs. 4A- D ). Trpm8-tdTom was expressed\n\nFigure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous\n\ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNI trans or SNI crush surgery. (B) Representative image of FB labelling and NeuN\n\nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3- m m intervals through the entirety of a 30- m m-thick tissue section. Scale bar 5\n\n100 m m. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNI trans (C) or SNI crush injury (D)\n\nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov- Smirnov tests of cumulative distributions; SNI trans : D 5 0.25, P ,\n\n0.001; n 5 183 or 191 neurons from 3 mice; SNI crush : D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG\n\nvolumetric analyses after SNI trans . (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot\n\ndetection feature. Scale bar 5 100 m m. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNI trans . Kolmogorov- Smirnov tests of\n\ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size,\n\nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F 2,14 5 8.26, P 5 0.004; n 5 4 to 5 mice; <sup>ˇ</sup> S´ıd ´ak multiple comparisons tests:**\nP , 0.01. ANOVA,\n\nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. Figure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgD <sup>ChR2-YFP</sup> L4", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed2.pdf" - }, - { - "text": "Research Paper PAIN 165 (2024) 2863- 2876\n\n### Peripheral nerve injury results in a biased loss of\n\n### sensory neuron subpopulations\n\n#### Andrew H. Cooper <sup>a</sup> , Allison M. Barry <sup>b</sup> , Paschalina Chrysostomidou <sup>a</sup> , Romane Lolignier <sup>a</sup> , Jinyi Wang <sup>a</sup> ,\n\n#### Magdalena Redondo Canales <sup>a</sup> , Heather F. Titterton <sup>a</sup> , David L. Bennett <sup>b</sup> , Greg A. Weir <sup>a,</sup> *\n\nAbstract\n\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability\n\nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury\n\nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label\n\nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared\n\nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron\n\nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of\n\nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%)\n\nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic\n\nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG\n\nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury- induced plasticity and pain.\n\nKeywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury\n\n1. Introduction\n\nDorsal root ganglion (DRG) neurons represent a molecularly\n\nand functionally heterogeneous population. Under normal\n\nconditions, this diversity contributes to the ability of the\n\nsomatosensory nervous system to detect a myriad of sensory\n\nstimuli that result in the perceptions of touch, temperature,\n\nitch, and pain. Following nerve injury, physiological changes in DRG neurons lead to hyperexcitability, <sup>57</sup> which is a key pathological driver of neuropathic pain. <sup>20,63</sup> Concomitant\n\nmolecular changes in discrete subpopulations also occur,\n\nand these have recently been comprehensively described in single-cell <sup>37,44</sup> and subpopulation-specific sequencing stud- ies. <sup>3</sup> These studies describe a transient and generalized\n\nreduction in the expression of subpopulation-specific genes\n\nfollowing nerve injury. <sup>3,37,44</sup>\n\nIn addition to molecular changes, there is a rich literature\n\ndescribing the frank loss of DRG neurons following traumatic\n\nnerve injury in experimental rodent models. <sup>24,50,53,56</sup> Some\n\nstudies have suggested that neuron loss occurs in certain patient cohorts, <sup>48,66</sup> but this is yet to be definitively demonstrated in\n\nhumans. In rodents, most studies support a preferential loss of small cells that give rise to unmyelinated fibers <sup>53</sup> but some contrasting studies describe the preferential loss of large cells <sup>6</sup> or loss of cells of all sizes. <sup>46</sup> Variation is evident across studies in\n\nterms of experimental species, age, type of injury, and quantification methods. <sup>56</sup> Shi et al. <sup>50</sup> used stereological counting\n\nmethods to identify a 54% loss of DRG neuron number 4 weeks\n\nafter “mid-thigh” sciatic nerve transection in C57BL/6 mice.\n\nEstimates for the degree of loss following commonly used nerve\n\ninjury paradigms (eg, spared nerve injury [SNI] and sciatic nerve\n\ncrush) are not available and because of the neurochemical\n\nchanges following injury and the loss of subpopulation marker gene expression, <sup>5,44,50</sup> the vulnerability of molecularly defined", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - }, - { - "text": "Monoranu CM, Bohnert M, Pham M, Antoniadis G, Blum R, Rittner HL.\n\nHuman dorsal root ganglia after plexus injury: either preservation or loss of\n\nthe multicellular unit. bioRxiv 2023.02.06.526934.\n\n[49] Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, Blum R, Aue\n\nA. Unbiased analysis of the dorsal root ganglion after peripheral nerve\n\ninjury: no neuronal loss, no gliosis, but satellite glial cell plasticity. PAIN\n\n2023;164:728- 40.\n\n[50] Shi TJS, Tandrup T, Bergman E, Xu ZQD, Ulfhake B, H ¨okfelt T. Effect of\n\nperipheral nerve injury on dorsal root ganglion neurons in the C57 BL/6J\n\nmouse: marked changes both in cell numbers and neuropeptide\n\nexpression. Neuroscience 2001;105:249- 63.\n\n[51] Song H, Yao E, Lin C, Gacayan R, Chen MH, Chuang PT. Functional\n\ncharacterization of pulmonary neuroendocrine cells in lung development,\n\ninjury, and tumorigenesis. Proc Natl Acad Sci 2012;109:17531- 6.\n\n[52] Takasu K, Sakai A, Hanawa H, Shimada T, Suzuki H. Overexpression of\n\nGDNF in the uninjured DRG exerts analgesic effects on neuropathic pain\n\nfollowing segmental spinal nerve ligation in mice. J Pain 2011;12:\n\n1130- 1139.\n\n[53] Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root\n\nganglion cells after transection of the rat sciatic nerve. J Comp Neurol\n\n2000;422:172- 80.\n\n[54] Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons:\n\ndiagnosis and prevention. J Hand Surg Eur Vol 2011;36:730- 4.\n\n[55] Usoskin D, Furlan A, Islam S, Abdo H, Lonnerberg P, Lou D, Hjerling-\n\nLeffler J, Haeggstrom J, Kharchenko O, Kharchenko PV, Linnarsson S,\n\nErnfors P. Unbiased classification of sensory neuron types by large-scale\n\nsingle-cell RNA sequencing. Nat Neurosci 2015;18:145- 53.\n\n[56] Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent axotomy on\n\nnumber and volume of dorsal root ganglion cell bodies. J Comp Neurol\n\n1997;388:307- 12.\n\n[57] Wall PD, Gutnick M. Properties of afferent nerve impulses originating from\n\na neuroma. Nature 1974;248:740- 43.\n\n[58] Wang C, Gu L, Ruan Y, Geng X, Xu M, Yang N, Yu L, Jiang Y, Zhu C, Yang\n\nY, Zhou Y, Guan X, Luo W, Liu Q, Dong X, Yu G, Lan L, Tang Z. Facilitation\n\nof MrgprD by TRP-A1 promotes neuropathic pain. FASEB J 2019;33:\n\n1360- 73.\n\n[59] Wang H, Zylka MJ. Mrgprd-expressing polymodal nociceptive neurons\n\ninnervate most known classes of substantia gelatinosa neurons.\n\nJ Neurosci 2009;29:13202- 9.\n\n[60] Wang R, Guo W, Ossipov MH, Vanderah TW, Porreca F, Lai J. Glial\n\ncell line-derived neurotrophic factor normalizes neurochemical\n\nchanges in injured dorsal root ganglion neurons and prevents the\n\nexpression of experimental neuropathic pain. Neuroscience 2003;\n\n121:815- 24.\n\n[61] Wang X, Archibald ML, Stevens K, Baldridge WH, Chauhan BC. Cyan\n\nfluorescent protein (CFP) expressing cells in the retina of Thy1-CFP\n\ntransgenic mice before and after optic nerve injury. Neurosci Lett 2010;\n\n468:110- 4.\n\n[62] Warwick C, Cassidy C, Hachisuka J, Wright MC, Baumbauer KM,\n\nAdelman PC, Lee KH, Smith KM, Sheahan TD, Ross SE, Koerber HR.\n\nMrgprdCre lineage neurons mediate optogenetic allodynia through an\n\nemergent polysynaptic circuit. PAIN 2021;162:2120- 31.\n\n[63] Weir GA, Middleton SJ, Clark AJ, Daniel T, Khovanov N, McMahon SB,\n\nBennett DL. Using an engineered glutamate-gated chloride channel to\n\nsilence sensory neurons and treat neuropathic pain at the source. Brain\n\n2017;140:2570- 85.\n\n[64] Welin D, Novikova LN, Wiberg M, Kellerth JO, Novikov LN. Survival and\n\nregeneration of cutaneous and muscular afferent neurons after peripheral\n\nnerve injury in adult rats. Exp Brain Res 2008;186:315- 23.\n\n[65] West CA, Davies KA, Hart AM, Wiberg M, Williams SR, Terenghi G.\n\nVolumetric magnetic resonance imaging of dorsal root ganglia for the\n\nobjective quantitative assessment of neuron death after peripheral nerve\n\ninjury. Exp Neurol 2007;203:22- 33.\n\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "shown that loss is biased across molecularly defined\n\nsubpopulations. Nonpeptidergic nociceptive neurons are\n\nparticularly susceptible to loss, with almost all Mrgprd <sup>1</sup>\n\naxotomized afferents lost following an unrepaired transection\n\ninjury (SNI trans ) and roughly half lost following a model which\n\ncontrastingly allows for nerve regenerations (SNI crush ).\n\nFinally, we have observed that the vulnerability of Mrgprd <sup>1</sup>\n\nneurons extends to the in vitro setting and provide data to\n\nsupport the hypothesis that loss is driven by a lack of\n\nneurotrophic support following injury.\n\n4.1. Neuronal loss\n\nThe question of whether DRG neurons die following traumatic\n\ninjury has been addressed by several groups over the last few\n\ndecades. Despite contrasting findings on the extent, timing, and\n\nform that loss takes, most studies have observed frank loss of DRG neurons. <sup>6,38,46,53</sup> However, more recent studies using\n\nrecombinase driver lines and novel machine-learning approaches have cast doubt on this consensus. <sup>44,49</sup> Our data strongly\n\nsupport the loss hypothesis and suggest that approximately 60%\n\nof axotomized afferents die within 2 weeks of SNI. The\n\ndiscrepancy between our findings and other recent studies may\n\nbe partly explained by the sampling method used to estimate neuronal numbers. For example, Schulte et al. <sup>49</sup> developed\n\na novel machine-learning approach and found no reduction in\n\nneuron density across serial sections of rat DRG following SNI,\n\nand they inferred from this that frank loss did not occur. Our\n\nresults are congruous, in that we also observed no reduction in\n\nneuron density. However, we found a substantial loss in the total\n\nneuron-containing volume of injured DRG, which underlies our\n\ncontrasting conclusion of frank loss. Of note, morphological\n\nvolumetric analysis and MRI have also previously demonstrated\n\nvolume loss in both rodent and human DRG following nerve injury. <sup>35,65,66</sup> These findings occur despite a major increase of nonneuronal cells in the injured DRG <sup>30</sup> and support the notion\n\nthat the total DRG neuron number is decreased.\n\n4.2. Selectivity of neuron loss\n\nWhile definitively characterizing loss of molecularly defined\n\nsubpopulations was challenging before the advent of recombi-\n\nnase driver lines, a consensus emerged that small-diameter\n\nneurons are more vulnerable to nerve injury- induced loss. <sup>50,53</sup>\n\nOur data support this consensus and extend it to reveal that while\n\nthere is a generalized partial loss of C-fiber populations including\n\nCGRP- and Trpm8-expressing neurons, Mrgprd-expressing\n\nneurons are particularly sensitive to loss. This selective vulnera-\n\nbility has been hinted at previously by the stark reduction in the\n\nnumber of DRG neurons and their central terminals that bind IB4\n\nand express canonical markers such as the P2X 3 receptor following nerve injury. <sup>5,8,29,36</sup> Type 1a glomeruli are also reduced\n\nin lamina II, suggesting a structural loss of central terminals and not simply a loss of IB4-binding. <sup>2</sup> However, it was not clear\n\nwhether these data represented phenotypic changes in non-\n\npeptidergic nociceptors or frank loss of neurons. We describe\n\nneuron loss that is delayed (occurring . 7 days postinjury) with\n\nrespect to histochemical and structural changes (occurring 1-\n\n5 days postinjury <sup>2,29</sup> ), suggesting that these changes precede\n\nand are not in themselves indicative of neuron loss.\n\nThe vulnerability of Mrgprd-expressing neurons is congruous\n\nwith recent subpopulation bulk RNA-seq data, which found that", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed2.pdf" - }, - { - "text": "by a population of small-diameter, putative cold-sensitive\n\nneurons ( Fig. 4B ), accounting for 8.3 6 0.27% of FB-labelled\n\nneurons in contralateral DRG. This decreased to 4.2 6 0.96%\n\nipsilateral to SNI trans injury ( Fig. 4E ), indicating a partial loss of Trpm8 <sup>1</sup> afferents. When examining peptidergic afferents, we\n\nfound that 48.1 6 2.42% of FB-labelled neurons in contralateral\n\nDRG were Calca-YFP <sup>1</sup> , compared with 34.3 6 2.54% 4 weeks\n\nafter SNI trans injury ( Figs. 4C and F ), consistent with a partial loss of CGRP <sup>1</sup> afferents. We used a Thy1-CFP line that demon- strates consistent expression postinjury <sup>61</sup> and labels a sample of\n\nmedium/large diameter myelinated afferents. CFP was largely restricted to NF200 <sup>1</sup> neurons, labelling 56% of this population.\n\nExpression was present in a heterogenous population of\n\nnociceptive (TrkA 1 ) and nonnociceptive (TrkA-) myelinated\n\n[neurons (Fig. S5, http://links.lww.com/PAIN/C84). Contralateral](http://links.lww.com/PAIN/C84)\n\nto injury, 15.6 6 1.8% of FB-labelled neurons expressed Thy1-\n\nCFP ( Figs. 4D and G ). In contrast to unmyelinated subpopula-\n\ntions, this proportion was higher in ipsilateral DRG following\n\nSNI trans (23.3 6 3.2%), consistent with no (or minimal) loss of\n\nThy1-CFP-expressing afferents, accompanied by a loss of Thy1-\n\nCFP-negative neurons. We did not observe significant alter-\n\nations in the population distributions of the cross-sectional area\n\nof surviving, damaged Trpm8-tdTom <sup>1</sup> , Calca-YFP <sup>1</sup> , or Thy1- CFP <sup>1</sup> DRG neurons when compared with DRG contralateral to\n\nFigure 4. Spared nerve injury induces a loss of Trpm8 1 and CGRP 1 but not myelinated DRG neurons. (A) Schematic of experimental approach. (B- D) FastBlue\n\nlabelling and Trpm8-tdTom (B), Calca-YFP (C), or Thy1-CFP expression (D) 28 days after SNI trans in the L4 DRG, contralateral (top) or ipsilateral (bottom) to injury.\n\nImages are projections of optical sections at 3- m m intervals through the entirety of 30- m m-thick tissue sections. Scale bars 5 100 m m. (E- G) Quantification of the\n\nproportion of FB-labelled neurons also expressing Trpm8-tdTom (E), Calca-YFP (F), or Thy1-CFP (G) in L4 DRG contralateral or ipsilateral to SNI trans . Paired t tests;\n\nTrpm8-tdTom: t 2 5 5.31, P 5 0.034, n 5 3 mice; Calca-YFP: t 3 5 4.12, P 5 0.026, n 5 4 mice; Thy1-CFP: t 3 5 4.42, P 5 0.022, n 5 4 mice. * P , 0.05. CFP, cyan\n\nfluorescent protein; CGRP, calcitonin gene-related peptide; DRG, dorsal root ganglion; FB, FastBlue.", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed2.pdf" - }, - { - "text": "neuron loss after nerve injury and to test the hypothesis that loss is\n\nnot equally distributed across molecular populations.\n\n2. Methods\n\n2.1. Animals\n\nMice were housed in groups in humidity- and temperature-controlled\n\nrooms with free access to food and water, on a 12-hour light- dark\n\ncycle, and with environmental enrichment. Animal procedures were\n\nperformed under a UK Home Office Project Licence and in\n\naccordance with the UK Home Office (Scientific Procedures) Act\n\n(1986). All studies were approved by the Ethical Review Process\n\nApplicationsPaneloftheUniversityofGlasgoworOxfordandconform\n\nto the ARRIVE guidelines. Experiments were performed on adult male\n\nandfemalemiceaged7to16weeksatthestartoftheexperiments.All\n\nexperimental cohorts contained a mix of male and female mice, apart\n\nfrom the cohort of Mrgprd <sup>CreERT2</sup> ;Ai32 mice that underwent SNI crush\n\nsurgery, which was exclusively female. Details of transgenic lines are\n\nprovided in Table 1 . Tamoxifen was administered by i.p. injection of\n\n20 mg/mL tamoxifen (Sigma-Aldrich) dissolved in wheat germ oil\n\n(doses described in Table 1 ). There were 2 instances where animals\n\nwere excluded from data analysis: One (cyan fluorescent protein)\n\nThy1-CFP died of unknown causes not related to the procedure and\n\nbefore the experimental endpoint, and one MrgD <sup>CreERT2</sup> ;Ai32\n\nexhibited no fluorophore expression and was therefore deemed to\n\nhave been incorrectly genotyped. Group sizes were based on the\n\nextent of neuronal loss 28d following sciatic nerve transection identified by Shi et al. <sup>50</sup> Given a 5 0.05, power 5 0.8, and an effect\n\nsize of 4.81, power analysis projects that a group size of 3 mice would\n\nbe needed.\n\n2.2. Spared nerve transection and crush surgeries\n\nSpared nerve injury (transection of the common peroneal and\n\ntibial branches of the sciatic nerve; SNI trans ) and common\n\nperoneal and tibial crush injury (SNI crush ), in which nerve axons\n\nwere severed but the epineurium remained intact, were performed as previously described. <sup>12</sup> Anesthesia was induced\n\nwith 3% to 5% isoflurane and then maintained at 1.5% to 2% as\n\nrequired. Analgesia, consisting of carprofen (10 mg/kg) and\n\nbuprenorphine (0.05 mg/kg) (Glasgow) or carprofen (5 mg/kg)\n\nand local bupivacaine (2 mg/kg) (Oxford) was provided perioper-\n\natively. The left hindpaw was secured with tape in hip abduction,\n\nand the operative field (lateral surface of the thigh) was shaved.\n\nOphthalmic ointment was applied to the eyes, and the shaved\n\narea was swabbed with chlorhexidine solution. A longitudinal\n\nincision was made in the skin at the lateral mid-thigh. Using blunt\n\ndissection, an opening was made through the biceps femoris,\n\nexposing the sciatic nerve and the 3 peripheral branches (sural,\n\ntibial, and common peroneal nerves). For SNI trans , the common\n\nperoneal and tibial nerves were ligated using a 6-0 Vicryl suture\n\n(Ethicon, Raritan, NJ), and a 1- to 2-mm piece distal to the suture\n\nwas removed using spring scissors. For SNI crush , the exposed\n\ntibial and common peroneal nerves were clamped using a pair of\n\nfine hemostats (Fine Science Tools, Heidelberg, Germany) closed\n\nto their second clip, leaving the nerve branches intact but\n\ntranslucent. The muscle was closed with one 6-0 Vicryl suture\n\n(Ethicon), and the skin incision was closed with one 10 mm\n\nwound clip (Alzet, Cupertino, CA). Animals were monitored daily\n\nfor self-mutilation, and no animals required sacrifice due to tissue\n\ndamage.\n\nTable 1\n\nTransgenic lines used in the study.\n\nUsed name Full name Putative population Ref Source Tamoxifen regime\n\nAtf3 <sup>CreERT2</sup> Atf3 <sup>tm1.1(cre/ERT2)Msra</sup> Axotomised afferents 13 Gift: Dr Franziska Denk 50 mg/kg on days 0, 3, and 7 after surgery\n\nAvil <sup>FlpO</sup> Avil <sup>tm1(flpo)Ddg</sup> Sensory neurons 1 Gift: Prof David Ginty N.A.\n\nMrgD <sup>CreERT2</sup> Mrgprd <sup>tm1.1(cre/ERT2)Wql</sup> Major class of nonpeptidergic\n\nneurons", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed2.pdf" - }, - { - "text": "SNI-related gene expression signatures were less evident in\n\nMrgprd-expressing and C-LTMR neurons at later timepoints, compared with other populations in injured DRG. <sup>3</sup> This could be\n\nexplained by a loss of axotomized neurons of these classes and\n\ntherefore sampling of only uninjured neurons at this time- point. <sup>24,43,64</sup> In terms of the transcriptional response to injury,\n\nnonpeptidergic nociceptors show enrichment of individual proapoptotic factors early after injury, <sup>23,68</sup> and we extend these\n\nresults in this study, by describing a subpopulation-specific\n\nenrichment of GO terms associated with apoptosis that is evident\n\nas early as 3 days after injury. Such data and single-cell\n\ntranscriptomic profiling of all DRG neurons following injury <sup>37,44</sup>\n\nmay offer the opportunity to elucidate the cell death pathways\n\nengaged and upstream effectors that enrich this process to\n\nnonpeptidergic nociceptive neurons.\n\n4.3. Implications for pain pathogenesis\n\nNeuronal loss has been proposed as a key contributor to poor functional recovery following nerve injury, <sup>54</sup> and biased survival of\n\ndifferent afferent types might be expected to contribute to\n\nmodality-specific sensory deficits. Beyond loss of function, does\n\nDRG neuron loss contribute to chronic pain, in either an adaptive or\n\nmaladaptive manner? Intrathecal delivery of GDNF is neuro-\n\nprotective and reverses the reduction in the number of IB4-binding\n\nDRG neurons and central terminals seen following transection. <sup>5</sup>\n\nTreatment is concurrently analgesic and abrogates pain-related behaviors. <sup>7,60</sup> However, the pleiotropic nature of GDNF makes it\n\nimpossible to directly attribute the analgesic effects to the reversal\n\nof neuron loss. Indeed, it is possible that GDNF exerts its effect by actions on intact nonpeptidergic nociceptive afferents, <sup>52</sup> activation\n\nof which is known to drive aversive behaviors in the neuropathic state. <sup>62</sup> These data leave the contribution of nonpeptidergic\n\nnociceptor loss to behavior in the GDNF treatment paradigm\n\nambiguous. Other pharmacological approaches have been found\n\neffective at reversing a neuronal loss in rodent models, but the\n\nimpact on pain behavior was not studied. <sup>21,22</sup>\n\nRodents develop marked mechanical and thermal hypersen-\n\nsitivity rapidly following nerve injury and before timepoints at which neuron loss is observed. <sup>10</sup> This lack of a temporal\n\ncorrelation may suggest a limited contribution to evoked hyper-\n\nsensitivities. The temporal profile of ongoing tonic pain (eg, pain\n\naversiveness as measured by condition place preference\n\nassays <sup>26</sup> ) is less defined and so is its correlation to the timing of\n\nneuron loss.\n\nThere are many anatomical sites within the somatosensory\n\nnervous system where differential loss of sensory neuron\n\npopulations could impact neurobiology. For example, loss of\n\ncutaneous afferents may afford more opportunity for plasticity in\n\nreinnervation patterns, such as collateral sprouting of uninjured or\n\nsurviving afferents, and the types of nerve endings made by different molecular subpopulations. <sup>17,27</sup> It also seems likely that the\n\ndeath of many neurons within a DRG could contribute to the\n\nexpansion and activation of immune cell types, which are known to play a major role in neuropathic pain. <sup>30,69</sup> Finally, under normal\n\nconditions, peripheral sensory input is integrated into the dorsal\n\nhorn of the spinal cord by complex interneuron circuitry. Many\n\nspinal circuits are engaged by convergent input from different afferent types. <sup>9,41,70</sup> Therefore, selective loss of input from discrete\n\nafferent types could undoubtedly impact the normal processing of remaining afferent signals. <sup>34</sup> Experimentally abrogating neuronal\n\nloss may be a fruitful approach to assess the contribution to\n\nnervous system plasticity (adaptive or maladaptive) following injury.", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed2.pdf" - }, - { - "text": "0.001; n 5 310 to 427 neurons from 3 mice. * P , 0.05,**\nP , 0.01, *** P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green\n\nfluorescent protein.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "legal5_eubiodiversity_cc4.pdf", - "query": "What are the EU's key nature conservation commitments for 2030?", - "target_page": 6, - "target_passage": "1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea area and integrate ecological corridors, as part of a true Trans-European Nature Network. 2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU primary and old-growth forests. 3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "States and the European Environment Agency, will put forward in 2020 criteria and guidance for identifying and designating additional areas, including a definition of strict protection, as well as for appropriate management planning. In doing so, it will indicate how other effective area-based conservation measures and greening of cities could contribute to the targets.\n\nThe targets relate to the EU as a whole and could be broken down according to the EU bio-geographical regions and sea basins or at a more local level. **Every Member State will have to do its fair share of the effort** based on objective ecological criteria, recognising that each country has a different quantity and quality of biodiversity. Particular focus will be placed on protecting and restoring the tropical and sub-tropical\n\nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally high biodiversity value.\n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature Network, it will be important to set up **ecological corridors** to prevent genetic isolation, allow for species migration, and maintain and enhance healthy ecosystems. In this context, investments in green and blue infrastructure <sup>27</sup> and cooperation across borders among Member States should be promoted and supported, including through the European Territorial Cooperation.\n\nThe Commission will aim to agree the criteria and guidance for additional designations with Member States by the end of 2021. Member States will then have until the end of 2023 to demonstrate significant progress in legally designating new protected areas and integrating ecological corridors. On this basis, the Commission will assess by 2024 whether the EU is on track to meet its 2030 targets or whether stronger actions, including EU legislation, are needed.\n\nFinally, the **Overseas Countries and Territories** also host important biodiversity hotspots, not governed by EU environmental rules. The Commission encourages relevant Member States to consider promoting equal or equivalent rules in these countries and territories.\n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea area and integrate ecological corridors, as part of a true Trans-European Nature Network. 2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU primary and old-growth forests. 3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.\n\n[Guidance on a strategic framework for further supporting the deployment of EU-level green and blue ](https://ec.europa.eu/environment/nature/ecosystems/pdf/SWD_2019_193_F1_STAFF_WORKING_PAPER_EN_V4_P1_1024680.PDF) [infrastructure](https://ec.europa.eu/environment/nature/ecosystems/pdf/SWD_2019_193_F1_STAFF_WORKING_PAPER_EN_V4_P1_1024680.PDF) (SWD(2019) 193).", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "encouraging cooperation in **education for environmental sustainability** in 2021. This will provide guidance for schools and teachers on how to cooperate and exchange experiences across Member States on biodiversity teaching. The Commission will also provide support materials and facilitate the exchange of good practices in EU networks of teacher-training programmes.\n\n## **4. T HE E UROPEAN U NION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA**\n\nBiodiversity is a priority of the EU’s external action and an integral part of efforts to meet the United Nations Sustainable Development Goals. It will be mainstreamed\n\nthroughout bilateral and multilateral engagements, through the EU’s ‘Green Deal diplomacy’, and forthcoming green alliances <sup>76</sup> . The Commission will work closely with the European Parliament and Member States to ensure a high level of EU ambition and mobilise all efforts for the good of the world’s biodiversity.\n\n### **4.1. Raising the level of ambition and commitment worldwide**\n\nProtecting biodiversity is a global challenge and the next decade will be decisive. Global efforts under the United Nations Convention on Biological Diversity have largely been insufficient. Nature cannot afford any half measures or lack of ambition.\n\nIn this spirit, the EU is ready to lead all efforts - working with like-minded partners in **a high-ambition coalition on biodiversity** - to agree an ambitious new global framework for post-2020 at the upcoming 15 <sup>th</sup> Conference of the Parties to the Convention on Biological Diversity.\n\nWith this strategy, the Commission proposes ambitious commitments for the EU to bring to the table. The EU should also support governments and stakeholders across the globe to significantly step up their ambition and their action.\n\nThe Commission proposes that the EU ensures that the post-2020 global framework includes, at a minimum, the elements outlined below:\n\n- Overarching global goals for biodiversity for 2050, in line with the United Nations 2030 Agenda for Sustainable Development and the vision of ‘living in harmony with nature’. The ambition should be that, **by 2050, all of the world’s ecosystems are restored, resilient, and adequately protected.** The world should commit to the net-gain principle to give nature back more than it takes. The world should commit to no human-induced extinction of species, at minimum where avoidable.\n\n- Ambitious **global 2030 targets in line with EU commitments** in this strategy. These should clearly address the drivers of biodiversity loss and be specific, measurable, actionable, relevant and time-bound.\n\n- A much **stronger implementation, monitoring and review** process. Parties should revise their National Biodiversity Strategies and Action Plans by the end of 2021, or as a minimum, submit national commitments for the most important targets. There should be a **regular review cycle** to look at progress towards the\n\nGreen alliances focus on cooperation with African and other partners to implement the European Green Deal.", - "page_start": 19, - "page_end": 19, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "policies. In addition, by integrating policy coherence for sustainable development in all its policies, the EU will reduce the pressure on biodiversity worldwide. In all of its international cooperation, the EU should promote sustainable agricultural and fisheries\n\npractices and actions to protect and restore the world’s forests. Particular attention will also be paid to sustainable water resource management, the restoration of degraded land, and the protection and restoration of biodiverse areas with high ecosystem services and climate mitigation potential. A better protection of natural ecosystems, coupled with efforts to reduce wildlife trade and consumption, will also help prevent and build up resilience to possible future diseases and pandemics. The EU will enhance its support to global efforts to apply the **One Health approach** <sup>83</sup> , which recognises the intrinsic connection between human health, animal health and healthy resilient nature.\n\nThe EU will step up support to partner countries across the world to achieve the new global targets, fight environmental crime, and tackle the drivers of biodiversity loss. In Africa, the EU will launch the **NaturAfrica** initiative to protect wildlife and key ecosystems while offering opportunities in green sectors for local populations. Similar projects will be developed in other regions. The EU will also support the Western Balkans and EU Neighbourhood countries in their efforts to protect biodiversity.\n\nIn all of its work, the EU will strengthen the links between **biodiversity protection and human rights** , gender, health, education, conflict sensitivity, the rights-based approach, land tenure and the role of indigenous peoples and local communities.\n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and civil society around the world. For example, in March 2020, the Commission launched the **Global Biodiversity Coalition** of national parks, aquariums, botanic gardens, zoos, natural history and sciencemuseums to help raise awareness around the world on the need to protect and nurture biodiversity. The Commission will consider launching or joining other High Ambition Coalitions to help develop the post-2020 framework.\n\n## **5. C ONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and continuity of human life on Earth. The commitments proposed in this strategy pave the way for ambitious and necessary changes - changes that will ensure the wellbeing and economic prosperity of present and future generations in a healthy environment. The implementation of these commitments will take into account the diversity of challenges across sectors, regions and Member States, recognise the need to ensure social justice, fairness and inclusiveness in line with the European Pillar of Social Rights, and will require a sense of responsibility and strong joint efforts from the EU, its Member States, stakeholders and citizens.\n\nThe Commission invites the European Parliament and the Council to endorse this strategy ahead of the 15 <sup>th</sup> Conference of the Parties to the Convention on Biological Diversity. To ensure full political ownership of this strategy, the Commission will suggest a standing progress point at the Council and at the European Parliament. It will review the strategy by 2024 to assess progress and whether further action is needed to meet its objectives.\n\n[https://www.who.int/features/qa/one-health/en/](https://www.who.int/features/qa/one-health/en/)", - "page_start": 22, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "build on the headline ambition to ensure that by 2050 **all of the world’s ecosystems are restored, resilient, and adequately protected.** The world should commit to the net-gain principle to give nature back more than it takes. As part of this, the world should commit to no human-induced extinction of species, at minimum where avoidable.\n\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to ensure that **Europe's biodiversity will be on the path to recovery by 2030** for the benefit of people, the planet, the climate and our economy, in line with the 2030 Agenda for Sustainable Development and with the objectives of the Paris Agreement on Climate Change. It addresses the five main drivers of biodiversity loss, sets out an enhanced governance framework to fill remaining gaps, ensures the full implementation of EU legislation, and pulls together all existing efforts. This strategy is enterprising and incentivising in spirit and action. It reflects the fact that **protecting and restoring nature will need more than regulation alone** . It will require action by citizens, businesses, social partners and the research and knowledge community, as well as strong partnerships between local, regional, national and European level. This strategy is in line with the ambitions and commitment set out in President von der Leyen’s Political Guidelines and in the European Green Deal.\n\nAdopted in the heart of the COVID-19 pandemic, this strategy will also be a central\n\nelement of the EU’s recovery plan. It will be crucial to prevent and build resilience to future zoonosis outbreaks and to provide immediate business and investment opportunities for restoring the EU’s economy.\n\nAll new initiatives and proposals will be underpinned by the Commission’s better regulation tools. Based on public consultations and on the identification of the environmental, social and economic impacts, impact assessments will contribute to ensuring that all initiatives achieve their objectives in the most effective and least burdensome way and live up to a green oath to “do no harm”.\n\n## **2. P ROTECTING AND RESTORING NATURE IN THE E UROPEAN U NION**\n\nThe EU has legal frameworks, strategies and action plans to protect nature and restore habitats and species. But protection has been incomplete, restoration has been small- scale, and the implementation and enforcement of legislation has been insufficient <sup>17</sup> .\n\nTo put biodiversity on the path to recovery by 2030, we need to step up the protection and restoration of nature. This should be done by improving and **widening our network of protected areas** and by developing an ambitious **EU Nature Restoration Plan** .\n\n### **2.1. A coherent network of protected areas**\n\nBiodiversity fares better in protected areas. However, the current network of legally protected areas, including those under strict protection, is not sufficiently large to safeguard biodiversity. Evidence shows that the targets defined under the Convention on Biological Diversity are insufficient to adequately protect and restore nature <sup>18</sup> . Global", - "page_start": 3, - "page_end": 3, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "9. There is a 50% reduction in the number of Red List species threatened by invasive alien species. 10. The losses of nutrients from fertilisers are reduced by 50%, resulting in the reduction ofthe use of fertilisers by at least 20%. 11. Cities with at least 20,000 inhabitants have an ambitious Urban Greening Plan. 12. No chemical pesticides are used in sensitive areas such as EU urban green areas. 13. The negative impacts on sensitive species and habitats, including on the seabed through fishing and extraction activities, are substantially reduced to achieve good environmental status. 14. The by-catch of species is eliminated or reduced to a level that allows species recovery and conservation.\n\n## **3. E NABLING TRANSFORMATIVE CHANGE**\n\n### **3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place **a new European biodiversity governance framework** . This will help map obligations and commitments and set out a roadmap to guide their implementation.\n\nAs part of this new framework, the Commission will put in place a monitoring and review mechanism. This will include a **clear set of agreed indicators** and will enable regular progress assessment and set out corrective action if necessary. This mechanism will feed the Environmental Implementation Review and contribute to the European Semester.\n\nThe new governance framework will ensure co-responsibility and co-ownership by all\n\nrelevant actors in meeting the EU’s biodiversity commitments. It will support administrative capacity building, transparency, stakeholder dialogue, and participatory governance at different levels.\n\nThe Commission will assess the progress and suitability of this approach in 2023, and consider whether a legally binding approach to governance is needed.\n\n### **3.2. Stepping up implementation and enforcement of EU environmental legislation**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the last 30 years, the EU has put in place a solid legislative framework to protect and restore its natural capital. However, recent evaluations show that although legislation is fit for purpose, implementation on the ground is lagging behind <sup>60</sup> . This is having dramatic consequences on biodiversity and comes with a substantial economic cost <sup>61</sup> . **The full implementation and enforcement of EU environmental legislation is therefore at the heart of this strategy** , for which political support and financial and human resources will need to be prioritised.\n\nSee 2015 [State of Nature in the EU report](http://ec.europa.eu/environment/nature/pdf/state_of_nature_en.pdf) (COM (2015)219). [The costs of non-implementation are estimated at EUR 50 billion per year.](http://ec.europa.eu/environment/enveco/economics_policy/pdf/report_sept2011.pdf)", - "page_start": 15, - "page_end": 15, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "### **2.2. An EU Nature Restoration Plan: restoring ecosystems across land and sea**\n\nProtecting the nature we have will not be enough to bring nature back into our lives. To reverse biodiversity loss, the world needs to be more ambitious on nature restoration. With a **new EU Nature Restoration Plan** , Europe will lead the way.\n\nThe plan will help improve the health of existing and new protected areas, and bring diverse and resilient nature back to all landscapes and ecosystems. This means reducing pressures on habitats and species, and ensuring all use of ecosystems is sustainable. It also means supporting the recovery of nature, limiting soil sealing and urban sprawl, and tackling pollution and invasive alien species. The plan will create jobs, reconcile economic activities with nature growth and help ensure the long-term productivity and value of our natural capital.\n\n#### *2.2.1.* *Strengthening the EU legal framework for nature restoration*\n\nNature restoration is already partially required from the Member States in existing EU legislation <sup>28</sup> . However, **significant implementation and regulatory gaps hinder progress** . For instance, there is no requirement for Member States to have biodiversity restoration plans. There are not always clear or binding targets and timelines and no definition or criteria on restoration or on the sustainable use of ecosystems. There is also no requirement to comprehensively map, monitor or assess ecosystem services, health or restoration efforts. These issues are exacerbated by the gaps in implementation that prevent the existing legislation from achieving its objectives <sup>29</sup> . Stronger implementation support and enforcement is required. To ensure that nature restoration across land and sea picks up, increases the EU’s resilience, and contributes to climate change mitigation and adaptation as a key nature-based solution, this strategy puts forward two strands of actions:\n\n- Firstly, and subject to an impact assessment, the Commission will put forward a proposal for legally binding **EU nature restoration targets** in 2021 to restore degraded ecosystems, in particular those with the most potential to capture and store carbon and to prevent and reduce the impact of natural disasters. This will identify the conditions in which the targets must be met, as well as the most effective measures to reach them. The impact assessment will also look at the possibility of an EU-wide methodology to map, assess and achieve good condition of ecosystems so they can deliver benefits such as climate regulation, water regulation, soil health, pollination and disaster prevention and protection.\n\n- In that context, the Commission will request and support Member States to raise the level of implementation of existing legislation within clear deadlines. It will in particular request Member States to ensure **no deterioration in conservation trends and status** of all protected habitats and species by 2030 <sup>30</sup> . In addition, Member States will have to ensure that at least 30% of species and habitats not", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "69 See [Common framework and guidance documents for biodiversity proofing of the EU budget](https://ec.europa.eu/environment/nature/biodiversity/comm2006/proofing.htm) . 70 The cost estimate is based on the 2018 [Impact Assessment of the LIFE Regulation](https://ec.europa.eu/commission/sites/beta-political/files/budget-may2018-life-swd_en.pdf) (SWD(2018) 292), a [Study on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020](https://ieep.eu/uploads/articles/attachments/e597a01d-e34e-4a2e-84ec-68be1222c5fd/Financing_Target_2_Final_Report_without_Annexes_-_FINAL_APPROVED.pdf?v=63664509816) and data submitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will update the estimate, notably based on Member States’ Prioritised Action Frameworks under the Habitats Directive. Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European Maritime and Fisheries Fund, LIFE and external action funds. See [EU taxonomy for sustainable activities](https://ec.europa.eu/info/publications/sustainable-finance-teg-taxonomy_en) . World Wildlife Fund (2019), [The Nature of Risk - A Framework for Understanding Nature-Related ](https://c402277.ssl.cf1.rackcdn.com/publications/1255/files/original/WWF_Nature_of_Risk.FINAL2.pdf?1568216828) [Risk to Business](https://c402277.ssl.cf1.rackcdn.com/publications/1255/files/original/WWF_Nature_of_Risk.FINAL2.pdf?1568216828) .", - "page_start": 17, - "page_end": 17, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection and shall be based on the precautionary principle. 80 [European Parliament Resolution on international ocean governance](https://www.europarl.europa.eu/doceo/document/TA-8-2018-0004_EN.html) (2017/2055(INI)). In line with the Commission Communication on [Stepping up EU Action to Protect and Restore the ](https://ec.europa.eu/info/sites/info/files/communication-eu-action-protect-restore-forests_en.pdf) [World’s Forests](https://ec.europa.eu/info/sites/info/files/communication-eu-action-protect-restore-forests_en.pdf) (COM(2019) 352). Including international financing where biodiversity is the principal objective and where it is a significant secondary objective, in line with [CBD COP11 Decision XI/4](https://www.cbd.int/decision/cop/?id=13165) and EU and Member States financial reports submitted to the Convention on Biological Diversity in 2015 and 2018.", - "page_start": 21, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "climate change, the effects of erosion and losses of soil organic carbon are becoming increasingly apparent. Desertification is also a growing threat in the EU <sup>35</sup> .\n\nIt is therefore essential to step up efforts to **protect soil fertility, reduce soil erosion and increase soil organic matter** . This should be done by adopting sustainable soil management practices, including as part of the CAP. Significant progress is also needed on identifying contaminated soil sites, restoring degraded soils, defining the conditions for their good ecological status, introducing restoration objectives, and improving the monitoring of soil quality.\n\nTo address these issues in a comprehensive way and help to fulfil EU and international commitments on land-degradation neutrality, the Commission will update the **EU Soil Thematic Strategy** <sup>36</sup> in 2021. The **Zero Pollution Action Plan for Air, Water and Soil** that the Commission will adopt in 2021 will also look at these issues. Soil sealing and rehabilitation of contaminated brownfields will be addressed in the upcoming Strategy for a Sustainable Built Environment. A **mission in the area of soil health and food** under Horizon Europe <sup>37</sup> will aim to develop solutions for restoring soil health and functions.\n\n#### *2.2.4.* *Increasing the quantity of forests and improving their health and* *resilience*\n\nForests are hugely important for biodiversity, climate and water regulation, the provision of food, medicines and materials, carbon sequestration and storage, soil stabilisation and the purification of air and water. They are also a natural home for recreation and learning about nature. Foresters have a key role to play in ensuring sustainable forest management and in restoring and sustaining biodiversity in forests.\n\nIn addition to strictly protecting all remaining EU primary and old-growth forests, **the EU must increase the quantity, quality and resilience of its forests** , notably against fires, droughts, pests, diseases and other threats likely to increase with climate change. To retain their function for both biodiversity and climate, all forests need to be preserved in good health. More resilient forests can support a more resilient economy. They also play an important role in providing materials, products and services, which are key for the circular bio-economy.\n\nTo make this happen, the Commission will propose a dedicated **EU Forest Strategy** in 2021 in line with our wider biodiversity and climate neutrality ambitions. It will include a roadmap for **planting at least 3 billion additional trees in the EU by 2030** , in full respect of ecological principles. This will create substantial job opportunities linked to the collecting and cultivating of seeds, planting seedlings, and ensuring their development. Tree planting is particularly beneficial in cities, while in rural areas it can work well with agroforestry, landscape features and increased carbon sequestration. At the same time, the Commission will continue to work with Member States to ensure that the EU is sufficiently equipped to prevent and respond to major forest fires, which can inflict significant damages on forest biodiversity.\n\n35 European Court of Auditors (2018), [Combating desertification in the EU: a growing threat in need of ](https://op.europa.eu/webpub/eca/special-reports/desertification-33-2018/en/) more action , Special Report n°33/2018. [Thematic Strategy for Soil Protection](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52006DC0231) (COM(2006) 231). Horizon Europe mission area on [soil health and food.](https://ec.europa.eu/info/horizon-europe-next-research-and-innovation-framework-programme/mission-area-soil-health-and-food_en)", - "page_start": 9, - "page_end": 9, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "currently in favourable status are in that category or show a strong positive trend. The Commission and the European Environmental Agency will provide guidance to Member States in 2020 on how to select and prioritise species and habitats.\n\n#### *2.2.2.* *Bringing nature back to agricultural land*\n\nAs guardians of our land, farmers play a vital role in preserving biodiversity. They are among the first to feel the consequences when biodiversity is lost but also among the first to reap the benefits when it is restored. Biodiversity enables them to provide us with **safe, sustainable, nutritious and affordable food** and provides them with the income they need to thrive and develop. European farmers are an essential part of the EU’s future and must continue to be the social and economic hub of many communities across our Union.\n\nAt the same time, certain agricultural practices are a key driver of biodiversity decline. This is why it is important to work with farmers to **support and incentivise the transition to fully sustainable practices** . Improving the condition and diversity of agroecosystems will increase the sector’s resilience to climate change, environmental risks and socioeconomic shocks, while creating new jobs, for example in organic farming, rural tourism or recreation.\n\nTo support the long-term sustainability of both nature and farming, this strategy will work in tandem with the new **Farm to Fork Strategy** and the **new Common Agricultural Policy (CAP)** , including by promoting eco-schemes and result-based payment schemes. In implementing the Biodiversity and the Farm to Fork Strategies, the Commission will closely monitor progress and improvements in terms of food security and farmers income. The Commission will ensure that the CAP Strategic plans are assessed against robust climate and environmental criteria, and that Member States set explicit national values for the relevant targets set in this strategy, as well as in the Farm to Fork Strategy. These plans should lead to sustainable practices such as precision agriculture, organic farming, agro-ecology, agro-forestry, low-intensive permanent grassland, and stricter animal welfare standards.\n\nFarmland birds and insects, particularly pollinators, are key indicators of the health of agroecosystems and are vital for agricultural production and food security. Their alarming decline must be reversed. As set out in the Farm to Fork Strategy, the Commission will take action to reduce by **50% the overall use of - and risk from - chemical pesticides by 2030** and reduce by 50% the use of more hazardous pesticides by 2030. This must be supported by the full implementation of the EU Pollinators initiative <sup>31</sup> . By the end of 2020, the Commission will review the initiative and propose additional measures if necessary. To provide space for wild animals, plants, pollinators and natural pest regulators, there is an urgent need to bring back **at least 10% of agricultural area under high-diversity landscape features** . These include, *inter alia* , buffer strips, rotational or non-rotational fallow land, hedges, non-productive trees, terrace walls, and ponds. These help enhance carbon sequestration, prevent soil erosion and depletion, filter air and water, and support climate adaptation. In addition, more biodiversity often helps lead to more agricultural production. Member States will need to translate the 10% EU target to a lower geographical scale to ensure connectivity among habitats, especially through the CAP instruments and CAP Strategic Plans, in line with the Farm to Fork Strategy, and through the implementation of the Habitats Directive. The\n\n[EU Pollinators initiative](https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1528213737113&uri=CELEX:52018DC0395) (COM(2018) 395).", - "page_start": 7, - "page_end": 7, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "legal5_eubiodiversity_cc4.pdf", - "query": "Was there a biodiversity governance framework in place in the EU before the European Commission's proposal?", - "target_page": 16, - "target_passage": "In the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework. ", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "9. There is a 50% reduction in the number of Red List species threatened by invasive alien species. 10. The losses of nutrients from fertilisers are reduced by 50%, resulting in the reduction ofthe use of fertilisers by at least 20%. 11. Cities with at least 20,000 inhabitants have an ambitious Urban Greening Plan. 12. No chemical pesticides are used in sensitive areas such as EU urban green areas. 13. The negative impacts on sensitive species and habitats, including on the seabed through fishing and extraction activities, are substantially reduced to achieve good environmental status. 14. The by-catch of species is eliminated or reduced to a level that allows species recovery and conservation.\n\n## **3. E NABLING TRANSFORMATIVE CHANGE**\n\n### **3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place **a new European biodiversity governance framework** . This will help map obligations and commitments and set out a roadmap to guide their implementation.\n\nAs part of this new framework, the Commission will put in place a monitoring and review mechanism. This will include a **clear set of agreed indicators** and will enable regular progress assessment and set out corrective action if necessary. This mechanism will feed the Environmental Implementation Review and contribute to the European Semester.\n\nThe new governance framework will ensure co-responsibility and co-ownership by all\n\nrelevant actors in meeting the EU’s biodiversity commitments. It will support administrative capacity building, transparency, stakeholder dialogue, and participatory governance at different levels.\n\nThe Commission will assess the progress and suitability of this approach in 2023, and consider whether a legally binding approach to governance is needed.\n\n### **3.2. Stepping up implementation and enforcement of EU environmental legislation**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the last 30 years, the EU has put in place a solid legislative framework to protect and restore its natural capital. However, recent evaluations show that although legislation is fit for purpose, implementation on the ground is lagging behind <sup>60</sup> . This is having dramatic consequences on biodiversity and comes with a substantial economic cost <sup>61</sup> . **The full implementation and enforcement of EU environmental legislation is therefore at the heart of this strategy** , for which political support and financial and human resources will need to be prioritised.\n\nSee 2015 [State of Nature in the EU report](http://ec.europa.eu/environment/nature/pdf/state_of_nature_en.pdf) (COM (2015)219). [The costs of non-implementation are estimated at EUR 50 billion per year.](http://ec.europa.eu/environment/enveco/economics_policy/pdf/report_sept2011.pdf)", - "page_start": 15, - "page_end": 15, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "States and the European Environment Agency, will put forward in 2020 criteria and guidance for identifying and designating additional areas, including a definition of strict protection, as well as for appropriate management planning. In doing so, it will indicate how other effective area-based conservation measures and greening of cities could contribute to the targets.\n\nThe targets relate to the EU as a whole and could be broken down according to the EU bio-geographical regions and sea basins or at a more local level. **Every Member State will have to do its fair share of the effort** based on objective ecological criteria, recognising that each country has a different quantity and quality of biodiversity. Particular focus will be placed on protecting and restoring the tropical and sub-tropical\n\nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally high biodiversity value.\n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature Network, it will be important to set up **ecological corridors** to prevent genetic isolation, allow for species migration, and maintain and enhance healthy ecosystems. In this context, investments in green and blue infrastructure <sup>27</sup> and cooperation across borders among Member States should be promoted and supported, including through the European Territorial Cooperation.\n\nThe Commission will aim to agree the criteria and guidance for additional designations with Member States by the end of 2021. Member States will then have until the end of 2023 to demonstrate significant progress in legally designating new protected areas and integrating ecological corridors. On this basis, the Commission will assess by 2024 whether the EU is on track to meet its 2030 targets or whether stronger actions, including EU legislation, are needed.\n\nFinally, the **Overseas Countries and Territories** also host important biodiversity hotspots, not governed by EU environmental rules. The Commission encourages relevant Member States to consider promoting equal or equivalent rules in these countries and territories.\n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea area and integrate ecological corridors, as part of a true Trans-European Nature Network. 2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU primary and old-growth forests. 3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.\n\n[Guidance on a strategic framework for further supporting the deployment of EU-level green and blue ](https://ec.europa.eu/environment/nature/ecosystems/pdf/SWD_2019_193_F1_STAFF_WORKING_PAPER_EN_V4_P1_1024680.PDF) [infrastructure](https://ec.europa.eu/environment/nature/ecosystems/pdf/SWD_2019_193_F1_STAFF_WORKING_PAPER_EN_V4_P1_1024680.PDF) (SWD(2019) 193).", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "principle <sup>79</sup> and taking into account the call of the European Parliament <sup>80</sup> . In parallel, the EU will continue to fund research on the impact of deep-sea mining activities and on environmentally-friendly technologies. The EU should also advocate for more transparency in international bodies such as the International Seabed Authority.\n\n#### *4.2.2.* *Trade policy*\n\n**Trade policy will actively support and be part of the ecological transition** . In this spirit, the Commission will ensure full implementation and enforcement of the biodiversity provisions in all trade agreements, including through the EU Chief Trade Enforcement Officer. The Commission will better assess the impact of trade agreements on biodiversity, with follow-up action to strengthen the biodiversity provisions of existing and new agreements if relevant. The Commission will also present in 2021 a legislative proposal and other measures to avoid or minimise the placing of products associated with deforestation or forest degradation on the EU market <sup>81</sup> , and to promote forest-friendly imports and value chains. The Commission will take a number of steps to **crack down on illegal wildlife trade** . This trade contributes to the depletion or extinction of entire species, is the world’s fourth most lucrative black market and is thought to be one of the causes behind the emergence of zoonotic diseases. It is a human, economic and environmental duty to dismantle it.\n\nWith this in mind, the Commission will revise the EU Action Plan against Wildlife Trafficking in 2021 and propose a further **tightening of the rules on EU ivory trade** later this year. It will explore a possible revision of the Environmental Crime Directive, including by looking at expanding its scope and introducing specific provisions for types and levels of criminal sanctions. It will consider strengthening the coordinating and investigative capacities of the European Anti-Fraud Office (OLAF) to work with Member States and non-EU countries to prevent illicit trade and the entry of illicit products into the Single Market.\n\nThe Commission will continue to engage with partner countries to ensure a smooth and fair transition, mobilising in particular Aid for Trade to ensure that partners reap the benefits of biodiversity-friendly trade.\n\n#### *4.2.3.* *International cooperation, neighbourhood policy and resource* *mobilisation*\n\nDelivering an ambitious post-2020 global biodiversity framework will require greater cooperation with partners, increased support and financing and phasing out of subsidies harmful to biodiversity. In the last decade, the EU and its Member States collectively upheld their commitment to **double financial flows to developing countries for biodiversity** <sup>82</sup> . The EU is ready to continue working with its partners and further increase its support post-2020. This will be part of its work on biodiversity conservation, restoration, sustainable use and mainstreaming in all development and partnership", - "page_start": 21, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "policies. In addition, by integrating policy coherence for sustainable development in all its policies, the EU will reduce the pressure on biodiversity worldwide. In all of its international cooperation, the EU should promote sustainable agricultural and fisheries\n\npractices and actions to protect and restore the world’s forests. Particular attention will also be paid to sustainable water resource management, the restoration of degraded land, and the protection and restoration of biodiverse areas with high ecosystem services and climate mitigation potential. A better protection of natural ecosystems, coupled with efforts to reduce wildlife trade and consumption, will also help prevent and build up resilience to possible future diseases and pandemics. The EU will enhance its support to global efforts to apply the **One Health approach** <sup>83</sup> , which recognises the intrinsic connection between human health, animal health and healthy resilient nature.\n\nThe EU will step up support to partner countries across the world to achieve the new global targets, fight environmental crime, and tackle the drivers of biodiversity loss. In Africa, the EU will launch the **NaturAfrica** initiative to protect wildlife and key ecosystems while offering opportunities in green sectors for local populations. Similar projects will be developed in other regions. The EU will also support the Western Balkans and EU Neighbourhood countries in their efforts to protect biodiversity.\n\nIn all of its work, the EU will strengthen the links between **biodiversity protection and human rights** , gender, health, education, conflict sensitivity, the rights-based approach, land tenure and the role of indigenous peoples and local communities.\n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and civil society around the world. For example, in March 2020, the Commission launched the **Global Biodiversity Coalition** of national parks, aquariums, botanic gardens, zoos, natural history and sciencemuseums to help raise awareness around the world on the need to protect and nurture biodiversity. The Commission will consider launching or joining other High Ambition Coalitions to help develop the post-2020 framework.\n\n## **5. C ONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and continuity of human life on Earth. The commitments proposed in this strategy pave the way for ambitious and necessary changes - changes that will ensure the wellbeing and economic prosperity of present and future generations in a healthy environment. The implementation of these commitments will take into account the diversity of challenges across sectors, regions and Member States, recognise the need to ensure social justice, fairness and inclusiveness in line with the European Pillar of Social Rights, and will require a sense of responsibility and strong joint efforts from the EU, its Member States, stakeholders and citizens.\n\nThe Commission invites the European Parliament and the Council to endorse this strategy ahead of the 15 <sup>th</sup> Conference of the Parties to the Convention on Biological Diversity. To ensure full political ownership of this strategy, the Commission will suggest a standing progress point at the Council and at the European Parliament. It will review the strategy by 2024 to assess progress and whether further action is needed to meet its objectives.\n\n[https://www.who.int/features/qa/one-health/en/](https://www.who.int/features/qa/one-health/en/)", - "page_start": 22, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "encouraging cooperation in **education for environmental sustainability** in 2021. This will provide guidance for schools and teachers on how to cooperate and exchange experiences across Member States on biodiversity teaching. The Commission will also provide support materials and facilitate the exchange of good practices in EU networks of teacher-training programmes.\n\n## **4. T HE E UROPEAN U NION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA**\n\nBiodiversity is a priority of the EU’s external action and an integral part of efforts to meet the United Nations Sustainable Development Goals. It will be mainstreamed\n\nthroughout bilateral and multilateral engagements, through the EU’s ‘Green Deal diplomacy’, and forthcoming green alliances <sup>76</sup> . The Commission will work closely with the European Parliament and Member States to ensure a high level of EU ambition and mobilise all efforts for the good of the world’s biodiversity.\n\n### **4.1. Raising the level of ambition and commitment worldwide**\n\nProtecting biodiversity is a global challenge and the next decade will be decisive. Global efforts under the United Nations Convention on Biological Diversity have largely been insufficient. Nature cannot afford any half measures or lack of ambition.\n\nIn this spirit, the EU is ready to lead all efforts - working with like-minded partners in **a high-ambition coalition on biodiversity** - to agree an ambitious new global framework for post-2020 at the upcoming 15 <sup>th</sup> Conference of the Parties to the Convention on Biological Diversity.\n\nWith this strategy, the Commission proposes ambitious commitments for the EU to bring to the table. The EU should also support governments and stakeholders across the globe to significantly step up their ambition and their action.\n\nThe Commission proposes that the EU ensures that the post-2020 global framework includes, at a minimum, the elements outlined below:\n\n- Overarching global goals for biodiversity for 2050, in line with the United Nations 2030 Agenda for Sustainable Development and the vision of ‘living in harmony with nature’. The ambition should be that, **by 2050, all of the world’s ecosystems are restored, resilient, and adequately protected.** The world should commit to the net-gain principle to give nature back more than it takes. The world should commit to no human-induced extinction of species, at minimum where avoidable.\n\n- Ambitious **global 2030 targets in line with EU commitments** in this strategy. These should clearly address the drivers of biodiversity loss and be specific, measurable, actionable, relevant and time-bound.\n\n- A much **stronger implementation, monitoring and review** process. Parties should revise their National Biodiversity Strategies and Action Plans by the end of 2021, or as a minimum, submit national commitments for the most important targets. There should be a **regular review cycle** to look at progress towards the\n\nGreen alliances focus on cooperation with African and other partners to implement the European Green Deal.", - "page_start": 19, - "page_end": 19, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "#### *3.3.2.* *Investments, pricing and taxation*\n\nTackling biodiversity loss and restoring ecosystems will require significant public and private investments at national and European level. This will mean making the most of all relevant EU programmes and financing instruments. The Commission will strengthen its **biodiversity proofing framework** <sup>69</sup> , *inter alia* by using in an appropriate way the criteria established under the EU taxonomy, to ensure that EU funding supports biodiversity-friendly investments.\n\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and green infrastructure, **at least €20 billion a year <sup>70</sup> should be unlocked for spending on nature** . This will require mobilising private and public funding at national and EU level <sup>71</sup> , including through a range of different programmes in the next long-term EU budget. Moreover, as nature restoration will make a major contribution to climate objectives, a significant proportion of the 25% of the EU budget dedicated to climate action will be invested on biodiversity and nature-based solutions.\n\nUnder Invest EU, a dedicated natural-capital and circular-economy initiative will be\n\nestablished to mobilise at least €10 billion over the next 10 years, based on public/private blended finance. Nature and biodiversity is also a priority for the European Green Deal Investment Plan. To help unlock the investment needed, the EU must provide long-term certainty for investors and help embed sustainability in the financial system. The EU **sustainable finance taxonomy** will help guide investment towards a green recovery and the deployment of nature-based solutions. In 2021, the Commission will adopt a delegated act under the Taxonomy Regulation <sup>72</sup> to establish a common classification of economic activities that substantially contribute to protecting and restoring biodiversity and ecosystems. This will be further supported by a **Renewed Sustainable Finance Strategy** later this year which will help ensure that the financial system contributes to mitigating existing and future risks to biodiversity and better reflect how biodiversity loss affects companies’ profitability and long-term prospects <sup>73</sup> .\n\nThe Commission will further promote tax systems and pricing that reflect environmental costs, including biodiversity loss. This should encourage changes in national fiscal systems to shift the tax burden from labour to pollution, under-priced resources, and other environmental externalities. The ‘ **user pays’ and ‘polluter pays’ principles** have to be applied to prevent and correct environmental degradation.\n\nPublic authorities’ purchasing power represents 14% of EU GDP and can serve as a powerful driver of demand for the products and services of companies that invest in or contribute to nature-based solutions. To tap into this potential, when proposing further", - "page_start": 17, - "page_end": 17, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection and shall be based on the precautionary principle. 80 [European Parliament Resolution on international ocean governance](https://www.europarl.europa.eu/doceo/document/TA-8-2018-0004_EN.html) (2017/2055(INI)). In line with the Commission Communication on [Stepping up EU Action to Protect and Restore the ](https://ec.europa.eu/info/sites/info/files/communication-eu-action-protect-restore-forests_en.pdf) [World’s Forests](https://ec.europa.eu/info/sites/info/files/communication-eu-action-protect-restore-forests_en.pdf) (COM(2019) 352). Including international financing where biodiversity is the principal objective and where it is a significant secondary objective, in line with [CBD COP11 Decision XI/4](https://www.cbd.int/decision/cop/?id=13165) and EU and Member States financial reports submitted to the Convention on Biological Diversity in 2015 and 2018.", - "page_start": 21, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "69 See [Common framework and guidance documents for biodiversity proofing of the EU budget](https://ec.europa.eu/environment/nature/biodiversity/comm2006/proofing.htm) . 70 The cost estimate is based on the 2018 [Impact Assessment of the LIFE Regulation](https://ec.europa.eu/commission/sites/beta-political/files/budget-may2018-life-swd_en.pdf) (SWD(2018) 292), a [Study on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020](https://ieep.eu/uploads/articles/attachments/e597a01d-e34e-4a2e-84ec-68be1222c5fd/Financing_Target_2_Final_Report_without_Annexes_-_FINAL_APPROVED.pdf?v=63664509816) and data submitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will update the estimate, notably based on Member States’ Prioritised Action Frameworks under the Habitats Directive. Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European Maritime and Fisheries Fund, LIFE and external action funds. See [EU taxonomy for sustainable activities](https://ec.europa.eu/info/publications/sustainable-finance-teg-taxonomy_en) . World Wildlife Fund (2019), [The Nature of Risk - A Framework for Understanding Nature-Related ](https://c402277.ssl.cf1.rackcdn.com/publications/1255/files/original/WWF_Nature_of_Risk.FINAL2.pdf?1568216828) [Risk to Business](https://c402277.ssl.cf1.rackcdn.com/publications/1255/files/original/WWF_Nature_of_Risk.FINAL2.pdf?1568216828) .", - "page_start": 17, - "page_end": 17, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "build on the headline ambition to ensure that by 2050 **all of the world’s ecosystems are restored, resilient, and adequately protected.** The world should commit to the net-gain principle to give nature back more than it takes. As part of this, the world should commit to no human-induced extinction of species, at minimum where avoidable.\n\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to ensure that **Europe's biodiversity will be on the path to recovery by 2030** for the benefit of people, the planet, the climate and our economy, in line with the 2030 Agenda for Sustainable Development and with the objectives of the Paris Agreement on Climate Change. It addresses the five main drivers of biodiversity loss, sets out an enhanced governance framework to fill remaining gaps, ensures the full implementation of EU legislation, and pulls together all existing efforts. This strategy is enterprising and incentivising in spirit and action. It reflects the fact that **protecting and restoring nature will need more than regulation alone** . It will require action by citizens, businesses, social partners and the research and knowledge community, as well as strong partnerships between local, regional, national and European level. This strategy is in line with the ambitions and commitment set out in President von der Leyen’s Political Guidelines and in the European Green Deal.\n\nAdopted in the heart of the COVID-19 pandemic, this strategy will also be a central\n\nelement of the EU’s recovery plan. It will be crucial to prevent and build resilience to future zoonosis outbreaks and to provide immediate business and investment opportunities for restoring the EU’s economy.\n\nAll new initiatives and proposals will be underpinned by the Commission’s better regulation tools. Based on public consultations and on the identification of the environmental, social and economic impacts, impact assessments will contribute to ensuring that all initiatives achieve their objectives in the most effective and least burdensome way and live up to a green oath to “do no harm”.\n\n## **2. P ROTECTING AND RESTORING NATURE IN THE E UROPEAN U NION**\n\nThe EU has legal frameworks, strategies and action plans to protect nature and restore habitats and species. But protection has been incomplete, restoration has been small- scale, and the implementation and enforcement of legislation has been insufficient <sup>17</sup> .\n\nTo put biodiversity on the path to recovery by 2030, we need to step up the protection and restoration of nature. This should be done by improving and **widening our network of protected areas** and by developing an ambitious **EU Nature Restoration Plan** .\n\n### **2.1. A coherent network of protected areas**\n\nBiodiversity fares better in protected areas. However, the current network of legally protected areas, including those under strict protection, is not sufficiently large to safeguard biodiversity. Evidence shows that the targets defined under the Convention on Biological Diversity are insufficient to adequately protect and restore nature <sup>18</sup> . Global", - "page_start": 3, - "page_end": 3, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "targets, with the ability to ratchet up action if needed. These reviews should be based on an independent, science-based gap-analysis and foresight process, with common headline indicators for all Parties.\n\n- **An enabling framework** to bring the ambition to life, across areas such as finance, capacity, research, innovation and technology.\n\n- **Fair and equitable sharing of the benefits** from the use of genetic resources linked to biodiversity.\n\n- **A principle of equality** . This includes respect for the rights and the full and effective participation of indigenous peoples and local communities. There should be an inclusive approach with participation of all stakeholders, including women, youth, civil society, local authorities, the private sector, academia and scientific institutions.\n\n### **4.2. Using external action to promote the EU’s ambition**\n\n#### *4.2.1.* *International Ocean Governance*\n\nIn line with the International Ocean Governance agenda <sup>77</sup> , the EU will support the conclusion of an ambitious legally binding agreement on **marine biological diversity of areas beyond national jurisdiction** (BBNJ) by the end of 2020. It must set clear global procedures for identifying, designating and effectively managing ecologically representative marine protected areas in the high seas. It should be ratified and implemented as quickly as possible.\n\nThe EU should also use all of its diplomatic leverage and outreach capacities to help broker agreement on the designation of three vast **Marine Protected Areas in the Southern Ocean** <sup>78</sup> , two of which were co-proposed by the EU in East Antarctica and in the Weddell Sea. If agreed, this would constitute one of the biggest acts of nature protection in history.\n\nWork will continue with partner countries and regional organisations to put in place measures to protect and sustainably use sensitive maritime ecosystems and species, including in areas beyond national jurisdiction, with a focus on marine biodiversity hotspots. The EU should continue supporting Small Island Developing States and other relevant partner countries to participate in meetings of regional and global organisations and bodies, and to implement relevant international commitments and regulations.\n\nThe EU will apply **zero tolerance towards illegal, unreported and unregulated fishing** and will combat overfishing, including through WTO negotiations on a **global agreement to ban harmful fisheries subsidies** .\n\nIn international negotiations, the EU should advocate that marine minerals in the international seabed area cannot be exploited before the **effects of deep-sea mining** on the marine environment, biodiversity and human activities have been sufficiently researched, the risks are understood and the technologies and operational practices are able to demonstrate no serious harm to the environment, in line with the precautionary\n\n[International ocean governance agenda: an agenda for the future](https://ec.europa.eu/maritimeaffairs/sites/maritimeaffairs/files/join-2016-49_en.pdf) (JOIN(2016) 49). In the framework of the [Commission for the Conservation of Antarctic Marine Living Resources](https://www.ccamlr.org/en) .", - "page_start": 20, - "page_end": 20, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "legal5_eubiodiversity_cc4.pdf", - "query": "What is the EU's tolerance for unauthorised fishing?", - "target_page": 21, - "target_passage": "The EU will apply zero tolerance towards illegal, unreported and unregulated fishing", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "**energy** <sup>41</sup> . It will also review in 2021 the data on biofuels with high indirect land-use change risk and establish a trajectory for their gradual phase out by 2030.\n\nThe overall objective is to ensure that EU regulatory framework on bioenergy is in line with the increased ambition set out in the European Green Deal.\n\n#### *2.2.6.* *Restoring the good environmental status of marine ecosystems*\n\n**Restored and properly protected marine ecosystems** bring substantial health, social and economic benefits to coastal communities and the EU as a whole. The need for stronger action is all the more acute as marine and coastal ecosystem biodiversity loss is severely exacerbated by global warming <sup>42</sup> .\n\nAchieving good environmental status of marine ecosystems, including through strictly protected areas, must involve the restoration of carbon-rich ecosystems as well as important fish spawning and nursery areas. Some of today’s sea uses endanger food security, fishers’ livelihoods, and the fishery and seafood sectors. **Marine resources must be harvested sustainably and there must be zero-tolerance for illegal practices** . In this regard, the full implementation of the EU’s Common Fisheries Policy, the Marine Strategy Framework Directive and the Birds and Habitats Directives is essential.\n\nThe application of an ecosystem-based management approach under EU legislation <sup>43</sup> will reduce the adverse impacts of fishing, extraction and other human activities, especially on sensitive species and seabed habitats. To support this, **national maritime spatial plans** , which Member States have to deliver in 2021, should aim at covering all maritime sectors and activities, as well as area-based conservation-management measures. <sup>44</sup> The Commission will also propose a **new action plan to conserve fisheries resources and protect marine ecosystems** by 2021. Where necessary, measures will be introduced to limit the use of fishing gear most harmful to biodiversity, including on the seabed. It will also look at how to reconcile the use of bottom-contacting fishing gear with biodiversity goals, given it is now the most damaging activity to the seabed. This must be done in a fair and just way for all. The European Maritime and Fisheries Fund should also support the transition to more selective and less damaging fishing techniques.\n\nHealthy fish stocks are key to the long-term prosperity of fishermen and the health of our oceans and biodiversity. This makes it all the more important to maintain or reduce fishing mortality at or under **Maximum Sustainable Yield levels** . This will help achieve a healthy population age and size distribution for fish stocks.\n\nThe **by-catch of species threatened with extinction** must also be eliminated or reduced to a level that allows full recovery. This should also be the case for those in bad conservation status or not in good environmental status. Furthermore, the by-catch of other species <sup>45</sup> must be eliminated or, where this is not possible, minimised so as not to\n\n41 Article 29 of the EU Renewable Energy Directive 2018/2001. 42 See for example Intergovernmental Panel on Climate Change (2019), [Special Report on the Ocean and ](https://www.ipcc.ch/srocc/) [the Cryosphere in a Changing Climate](https://www.ipcc.ch/srocc/) . The Common Fisheries Policy, the [Marine Strategy Framework Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32008L0056) (2008/56/EC) and the [Maritime Spatial Planning Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32014L0089) (2014/89/EU). The Commission will report on the implementation of the Maritime Spatial Planning Directive by March 2022 at the latest, including the application of ecosystem-based management. Protected by international and EU law.", - "page_start": 11, - "page_end": 11, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "amending Regulations (EC) No 2111/2005, (EC) No 1008/2008, (EU) No 996/2010, (EU) No 376/2014 and Directives\n\n2014/30/EU and 2014/53/EU of the European Parliament and of the Council, and repealing Regulations (EC) No 552/2004\n\nand (EC) No 216/2008 of the European Parliament and of the Council and Council Regulation (EEC) No 3922/91.", - "page_start": 41, - "page_end": 41, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "States and the European Environment Agency, will put forward in 2020 criteria and guidance for identifying and designating additional areas, including a definition of strict protection, as well as for appropriate management planning. In doing so, it will indicate how other effective area-based conservation measures and greening of cities could contribute to the targets.\n\nThe targets relate to the EU as a whole and could be broken down according to the EU bio-geographical regions and sea basins or at a more local level. **Every Member State will have to do its fair share of the effort** based on objective ecological criteria, recognising that each country has a different quantity and quality of biodiversity. Particular focus will be placed on protecting and restoring the tropical and sub-tropical\n\nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally high biodiversity value.\n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature Network, it will be important to set up **ecological corridors** to prevent genetic isolation, allow for species migration, and maintain and enhance healthy ecosystems. In this context, investments in green and blue infrastructure <sup>27</sup> and cooperation across borders among Member States should be promoted and supported, including through the European Territorial Cooperation.\n\nThe Commission will aim to agree the criteria and guidance for additional designations with Member States by the end of 2021. Member States will then have until the end of 2023 to demonstrate significant progress in legally designating new protected areas and integrating ecological corridors. On this basis, the Commission will assess by 2024 whether the EU is on track to meet its 2030 targets or whether stronger actions, including EU legislation, are needed.\n\nFinally, the **Overseas Countries and Territories** also host important biodiversity hotspots, not governed by EU environmental rules. The Commission encourages relevant Member States to consider promoting equal or equivalent rules in these countries and territories.\n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea area and integrate ecological corridors, as part of a true Trans-European Nature Network. 2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU primary and old-growth forests. 3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.\n\n[Guidance on a strategic framework for further supporting the deployment of EU-level green and blue ](https://ec.europa.eu/environment/nature/ecosystems/pdf/SWD_2019_193_F1_STAFF_WORKING_PAPER_EN_V4_P1_1024680.PDF) [infrastructure](https://ec.europa.eu/environment/nature/ecosystems/pdf/SWD_2019_193_F1_STAFF_WORKING_PAPER_EN_V4_P1_1024680.PDF) (SWD(2019) 193).", - "page_start": 5, - "page_end": 5, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "principle <sup>79</sup> and taking into account the call of the European Parliament <sup>80</sup> . In parallel, the EU will continue to fund research on the impact of deep-sea mining activities and on environmentally-friendly technologies. The EU should also advocate for more transparency in international bodies such as the International Seabed Authority.\n\n#### *4.2.2.* *Trade policy*\n\n**Trade policy will actively support and be part of the ecological transition** . In this spirit, the Commission will ensure full implementation and enforcement of the biodiversity provisions in all trade agreements, including through the EU Chief Trade Enforcement Officer. The Commission will better assess the impact of trade agreements on biodiversity, with follow-up action to strengthen the biodiversity provisions of existing and new agreements if relevant. The Commission will also present in 2021 a legislative proposal and other measures to avoid or minimise the placing of products associated with deforestation or forest degradation on the EU market <sup>81</sup> , and to promote forest-friendly imports and value chains. The Commission will take a number of steps to **crack down on illegal wildlife trade** . This trade contributes to the depletion or extinction of entire species, is the world’s fourth most lucrative black market and is thought to be one of the causes behind the emergence of zoonotic diseases. It is a human, economic and environmental duty to dismantle it.\n\nWith this in mind, the Commission will revise the EU Action Plan against Wildlife Trafficking in 2021 and propose a further **tightening of the rules on EU ivory trade** later this year. It will explore a possible revision of the Environmental Crime Directive, including by looking at expanding its scope and introducing specific provisions for types and levels of criminal sanctions. It will consider strengthening the coordinating and investigative capacities of the European Anti-Fraud Office (OLAF) to work with Member States and non-EU countries to prevent illicit trade and the entry of illicit products into the Single Market.\n\nThe Commission will continue to engage with partner countries to ensure a smooth and fair transition, mobilising in particular Aid for Trade to ensure that partners reap the benefits of biodiversity-friendly trade.\n\n#### *4.2.3.* *International cooperation, neighbourhood policy and resource* *mobilisation*\n\nDelivering an ambitious post-2020 global biodiversity framework will require greater cooperation with partners, increased support and financing and phasing out of subsidies harmful to biodiversity. In the last decade, the EU and its Member States collectively upheld their commitment to **double financial flows to developing countries for biodiversity** <sup>82</sup> . The EU is ready to continue working with its partners and further increase its support post-2020. This will be part of its work on biodiversity conservation, restoration, sustainable use and mainstreaming in all development and partnership", - "page_start": 21, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "screen equipment (fifth individual Directive within the meaning of Article 16 (1) of Directive 89/391/EEC), [here](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A31990L0270)\n\n80 EU-OSHA’s maintenance campaign revealed that maintenance and repair work has an accident risks far over\n\naverage. EU-OSHA, 2010: [Safe maintenance in practice](https://osha.europa.eu/en/publications/safe-maintenance-practice) (p. 10): *‘Occupational accidents during maintenance*\n\n*work are numerous. Based on the data from several European countries, it is estimated that 10-15% of fatal*\n\n*accidents at work, and 15-20% of all accidents, are connected with maintenance* .’\n\n81 No statistical data available for EU.\n\n82 Persons in employment by main place of work, frequency of working at other locations and working from home,\n\nLFS Ad hoc module: [Work at home, percentage of Employed persons ](https://ec.europa.eu/eurostat/databrowser/view/LFSO_19PLWK26__custom_5003334/default/table?lang=en)\n\n83 Eurostat: [Working from home in the EU](https://ec.europa.eu/eurostat/web/products-eurostat-news/-/DDN-20180620-1)\n\n84 LFS Ad hoc module [Work at home, percentage of Employed persons](https://ec.europa.eu/eurostat/databrowser/view/LFSO_19PLWK26__custom_5003334/default/table?lang=en) and LFS regular data collection [Employed ](https://ec.europa.eu/eurostat/databrowser/view/LFSA_EHOMP__custom_5003341/default/table?lang=en)\n\n[persons working from home as a percentage of the total employment](https://ec.europa.eu/eurostat/databrowser/view/LFSA_EHOMP__custom_5003341/default/table?lang=en)\n\n85 EU-OSHA, 2021: [Home-based teleworking and preventive occupational safety and health measures in ](https://osha.europa.eu/en/publications/home-based-teleworking-and-preventive-occupational-safety-and-health-measures-european-workplaces-evidence-esener-3)\n\n[European workplaces: evidence from ESENER-3](https://osha.europa.eu/en/publications/home-based-teleworking-and-preventive-occupational-safety-and-health-measures-european-workplaces-evidence-esener-3)\n\n86 Employed persons working from home as a percentage of the total employment, by sex, age and professional\n\nstatus (%), [here](https://ec.europa.eu/eurostat/databrowser/view/LFSA_EHOMP__custom_3196126/default/table?lang=en)\n\n87 There are more workers who spend most of their working time in private homes, e.g. technicians for\n\nmaintenance and repair of technical systems like heating water supply or electricity, or gardeners. According to\n\nthe ILO definition of domestic work they are not regarded as such . Care at home can be borderline if the care is\n\nmainly done for a few persons in a few homes.\n\n88 C189 European Alliance, 2021: [Step up efforts towards decent work for domestic workers in the EU: 10th ](http://www.efsi-europe.eu/fileadmin/MEDIA/Event/C189_Alliance/C189_ALLIANCE_REPORT_EN_01.pdf)\n\n[Anniversary of ILO Domestic Workers Convention, 2011 (No. 189)](http://www.efsi-europe.eu/fileadmin/MEDIA/Event/C189_Alliance/C189_ALLIANCE_REPORT_EN_01.pdf)\n\nSee there in the introductory chapter the difficulties to achieve reliable figures. For more info: ILO, 2021: [Making ](https://www.ilo.org/global/publications/books/WCMS_802551/lang--en/index.htm)\n\n[decent work a reality for domestic workers: Progress and prospects ten years after the adoption of the Domestic ](https://www.ilo.org/global/publications/books/WCMS_802551/lang--en/index.htm)\n\n[Workers Convention, 2011 (No. 189)](https://www.ilo.org/global/publications/books/WCMS_802551/lang--en/index.htm)\n\n89 EU-OSHA, 2020: [Well-being at work in the service voucher sector in Belgium](https://osha.europa.eu/en/publications/well-being-work-service-voucher-sector-belgium)", - "page_start": 143, - "page_end": 143, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "targets, with the ability to ratchet up action if needed. These reviews should be based on an independent, science-based gap-analysis and foresight process, with common headline indicators for all Parties.\n\n- **An enabling framework** to bring the ambition to life, across areas such as finance, capacity, research, innovation and technology.\n\n- **Fair and equitable sharing of the benefits** from the use of genetic resources linked to biodiversity.\n\n- **A principle of equality** . This includes respect for the rights and the full and effective participation of indigenous peoples and local communities. There should be an inclusive approach with participation of all stakeholders, including women, youth, civil society, local authorities, the private sector, academia and scientific institutions.\n\n### **4.2. Using external action to promote the EU’s ambition**\n\n#### *4.2.1.* *International Ocean Governance*\n\nIn line with the International Ocean Governance agenda <sup>77</sup> , the EU will support the conclusion of an ambitious legally binding agreement on **marine biological diversity of areas beyond national jurisdiction** (BBNJ) by the end of 2020. It must set clear global procedures for identifying, designating and effectively managing ecologically representative marine protected areas in the high seas. It should be ratified and implemented as quickly as possible.\n\nThe EU should also use all of its diplomatic leverage and outreach capacities to help broker agreement on the designation of three vast **Marine Protected Areas in the Southern Ocean** <sup>78</sup> , two of which were co-proposed by the EU in East Antarctica and in the Weddell Sea. If agreed, this would constitute one of the biggest acts of nature protection in history.\n\nWork will continue with partner countries and regional organisations to put in place measures to protect and sustainably use sensitive maritime ecosystems and species, including in areas beyond national jurisdiction, with a focus on marine biodiversity hotspots. The EU should continue supporting Small Island Developing States and other relevant partner countries to participate in meetings of regional and global organisations and bodies, and to implement relevant international commitments and regulations.\n\nThe EU will apply **zero tolerance towards illegal, unreported and unregulated fishing** and will combat overfishing, including through WTO negotiations on a **global agreement to ban harmful fisheries subsidies** .\n\nIn international negotiations, the EU should advocate that marine minerals in the international seabed area cannot be exploited before the **effects of deep-sea mining** on the marine environment, biodiversity and human activities have been sufficiently researched, the risks are understood and the technologies and operational practices are able to demonstrate no serious harm to the environment, in line with the precautionary\n\n[International ocean governance agenda: an agenda for the future](https://ec.europa.eu/maritimeaffairs/sites/maritimeaffairs/files/join-2016-49_en.pdf) (JOIN(2016) 49). In the framework of the [Commission for the Conservation of Antarctic Marine Living Resources](https://www.ccamlr.org/en) .", - "page_start": 20, - "page_end": 20, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "**GETTING IN TOUCH WITH THE EU**\n\n**In person**\n\nAll over the European Union there are hundreds of Europe Direct centres. You can find the address of the centre nearest you online\n\n(european-union.europa.eu/contact-eu/meet-us_en).\n\nOn the phone or in writing\n\nEurope Direct is a service that answers your questions about the European Union. You can contact this service:\n\n- by freephone: 00 800 6 7 8 9 10 11 (certain operators may charge for these calls),\n\n- at the following standard number: +32 22999696,\n\n- via the following form: european-union.europa.eu/contact-eu/write-us_en.\n\n**FINDING INFORMATION ABOUT THE EU**\n\n**Online**\n\nInformation about the European Union in all the official languages of the EU is available on the Europa website\n\n(european-union.europa.eu).\n\n**EU publications**\n\nYou can view or order EU publications at op.europa.eu/en/publications. Multiple copies of free publications can be obtained by\n\ncontacting Europe Direct or your local documentation centre (european-union.europa.eu/contact-eu/meet-us_en).\n\n**EU law and related documents**\n\nFor access to legal information from the EU, including all EU law since 1951 in all the official language versions, go to EUR-Lex\n\n(eur-lex.europa.eu).\n\n**EU open data**\n\nThe portal data.europa.eu provides access to open datasets from the EU institutions, bodies and agencies. These can be downloaded\n\nand reused for free, for both commercial and non-commercial purposes. The portal also provides access to a wealth of datasets from\n\nEuropean countries.", - "page_start": 162, - "page_end": 162, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "62 Such as the Directives on [Environmental Impact Assessment](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32014L0052) (2014/52/EU), on [Strategic Environmental ](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32001L0042) [Assessment](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32001L0042) (2001/42/EC), on [Environmental Liability](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32004L0035) (2004/35/CE) and on [Environmental Crime](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32008L0099) (2008/99/EC). 63 [https://ec.europa.eu/environment/aarhus/](https://ec.europa.eu/environment/aarhus/) 64 [Study on due diligence requirements through the supply chain - Final Report.](https://ec.europa.eu/info/business-economy-euro/doing-business-eu/company-law-and-corporate-governance_en#studies) [Directive 2014/95/EU amending Directive 2013/34/EU as regards disclosure of non-financial and ](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32014L0095) [diversity information by certain large undertakings](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32014L0095) . Such as the [EU Business @ Biodiversity Platform](https://ec.europa.eu/environment/biodiversity/business/index_en.htm) (B@B). See for example [Business for Nature](https://www.businessfornature.org/) or [One Planet Business for Biodiversity](https://op2b.org/) . BenDor et al. (2015), [Estimating the Size and Impact of the Ecological Restoration Economy](https://www.researchgate.net/publication/278792900_Estimating_the_Size_and_Impact_of_the_Ecological_Restoration_Economy) .", - "page_start": 16, - "page_end": 16, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "28 Notably the EU [Birds Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32009L0147) (2009/147/EC), [Habitats Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:31992L0043) (92/43/EEC), [Water Framework ](https://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:32000L0060) [Directive](https://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:32000L0060) (2000/60/EC), [Floods Directive](https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32007L0060) (2007/60/EC) and [Marine Strategy Framework Directive](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32008L0056) (2008/56/EC). See [Fitness Check of the EU Nature Legislation](https://ec.europa.eu/environment/nature/legislation/fitness_check/docs/nature_fitness_check.pdf) (SWD(2016) 472) and [Fitness Check of the EU Water ](https://ec.europa.eu/environment/water/fitness_check_of_the_eu_water_legislation/documents/Water%20Fitness%20Check%20-%20SWD(2019)439%20-%20web.pdf) [Legislation](https://ec.europa.eu/environment/water/fitness_check_of_the_eu_water_legislation/documents/Water%20Fitness%20Check%20-%20SWD(2019)439%20-%20web.pdf) (SWD(2019) 439). See also below, Section 3.2. Habitats and species listed under the Birds and Habitats Directives.", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" - }, - { - "text": "357 The authors explain the difference between ‘substantive and rule compliance as follows: *‘... “substantive*\n\n*compliance”, which requires compliance with the collective goals underpinning the regulatory scheme (better OSH*\n\n*practice); and “rule compliance”, which envisages compliance with the content of legal standards only* ’ (p. 11).\n\n*358* EU-OSHA, 2021: [Improving compliance with occupational safety and health regulations: an overarching review](https://osha.europa.eu/en/publications/improving-occupational-safety-and-health-changing-world-work-what-works-and-how)\n\n(p. 43).\n\n359 Fundamental Rights Agency (FRA), [here](https://fra.europa.eu/en) , section on [Trafficking and labour exploitation](https://fra.europa.eu/en/themes/trafficking-and-labour-exploitation)\n\n360 Special Eurobarometer 498: [Undeclared Work in the European Union](https://europa.eu/eurobarometer/surveys/detail/2250)\n\n361 European Commission, Directorate-General for Employment, Social Affairs and Inclusion et al., 2018: An\n\nevaluation of the scale of undeclared work in the European Union and its structural determinants : estimates using\n\nthe labour input method, [here](https://data.europa.eu/doi/10.2767/98169)\n\n362 ELA: [European Platform tackling undeclared work](https://www.ela.europa.eu/en/undeclared-work)\n\n363 The OSH Barometer contains a special section on enforcement capacities, [here](https://visualisation.osha.europa.eu/osh-barometer/osh-infrastructure/enforcement-capacity/establishments-inspected/AT/)\n\n364 SLIC, 2015: [Common Principles for Labour Inspection in Relation to Health and Safety In the Workplace](https://ec.europa.eu/social/BlobServlet?docId=15615&langId=en)\n\n365 Cardiff University et al., 2011: Contract to assess the potential impact of emerging trends and risks on labour\n\ninspection methodologies in the domain of occupational health and safety,\n\nEuropean Federation of Public Service Unions (EPSU), 2012: [A mapping report on Labour Inspection Services in ](https://www.epsu.org/sites/default/files/article/files/EPSU_Final_report_on_Labour_Inspection_Services.pdf)\n\n[15 European countries](https://www.epsu.org/sites/default/files/article/files/EPSU_Final_report_on_Labour_Inspection_Services.pdf) (p. 13ff).\n\n366 The Nordic countries (Denmark, Finland, Iceland, Norway and Sweden) are particularly active in this area.\n\nThey have summarised the current challenges for labour inspections and supervision in general, giving extensive\n\nand detailed recommendations; Nordic Future of Work Group, 2020: Work today and in the future : Perspectives\n\non Occupational Safety and Health challenges and opportunities for the Nordic labour inspectorates, [here ](https://julkaisut.valtioneuvosto.fi/handle/10024/162419)\n\nBAuA, 2020: Scientific workshop on the future of smart and effective labour inspection, 3 November 2020, [here](https://www.baua.de/DE/Angebote/Veranstaltungen/Dokumentationen/Digitalisierung/pdf/Dokumentation.pdf?__blob=publicationFile&v=1)", - "page_start": 153, - "page_end": 153, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_SMFG_2011.pdf", - "query": "What are the missions of the Sumitomo Mitsui Financial Group?", - "target_page": 7, - "target_passage": "• To provide optimum added value to our customers and together with them achieve growth • To create sustainable shareholder value through business growth• To create sustainable shareholder value through business growth • To provide a challenging and professionally rewarding work environment for our dedicated employees• To provide a challenging and professionally rewarding work environment for our dedicated employee", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Sumitomo Mitsui Financial Group CSR Report\n\n**Digest version**\n\nwww.smfg.co.jp/english", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "information on CSR activities information on CSR activities\n\n**CSR disclosure**\n\n**through**\n\n**specific examples**\n\n**Comprehensive**\n\n**disclosure of**\n\n**CSR activities**\n\n**Enriched**\n\n**CSR disclosure**\n\n:\n\n:\n\n:\n\nApril 1, 2010 to March 31, 2011 ( “Fiscal 2010” )\n\nNote: Certain items in this report refer to activities taking place after April 2011.\n\nDecember 2011\n\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc.\n\n1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005\n\nTEL: +81-3-3282-8111\n\nSumitomo Mitsui Sumitomo Mitsui\n\nBanking Corporation Banking Corporation\n\nSMBC Nikko Securities SMBC Nikko Securities ORIX Credit ORIX Credit PROMISE * PROMISE * Sumitomo Mitsui Card Sumitomo Mitsui Card Cedyna Cedyna\n\nSMFG Card & Credit SMFG Card & Credit Sumitomo Mitsui Sumitomo Mitsui\n\nFinance and Leasing Finance and Leasing\n\nThe Japan The Japan\n\nResearch Institute Research Institute SMBC Friend Securities SMBC Friend Securities\n\nDaiwa SB Investments Daiwa SB Investments\n\nSumitomo Mitsui Auto Service Sumitomo Mitsui Auto Service\n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\n\nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange.\n\n**CSR report 2011 (digest version)**\n\n**CSR report (online version, Japanese only)**\n\n**CSR report 2011**\n\n**(digest version with examples of activities and**\n\n**statistical performance, online PDF file)**\n\nwww.smfg.co.jp/responsibility\n\n29 **CSR REPORT 2011 CSR REPORT 2011** 30", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "give the poorest in society access to give the poorest in society access to basic medical care. Based on this basic medical care. Based on this\n\ncorporate social responsibility corporate social responsibility DNA embedded in the business DNA embedded in the business\n\nphilosophies of both the Sumitomo philosophies of both the Sumitomo and Mitsui groups over the 400 and Mitsui groups over the 400\n\nyears of their existence, we will years of their existence, we will continue to play our part in solving continue to play our part in solving\n\nproblems facing the international problems facing the international community through our financial community through our financial\n\nservice service operations. operations.\n\n**Priority Issues for Us** As one of Japa As one of Japan’s leading financial services groups, s leading financial services groups,\n\nthe SMFG Group is taking the lead in aggressively addressing the four priority issues the SMFG Group is taking the lead in aggressively addressing the four priority issues\n\nwe have identified as significantly impacting the nation. we have identified as significantly impacting the nation.", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "President and CEO\n\nSumitomo Mitsui Banking Corporation\n\n**A Conversation with Tadao Ando, Takeshi Kunibe and Koichi Miyata**\n\n*Uplifting the nation’s spirits* *Uplifting the nation’s spirits*\n\nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) Japan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan)\n\nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates after the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates\n\nand increasing numbers of the aged. and increasing numbers of the aged.\n\nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. We must now find ways for people to coexist in harmony with nature, based on a global perspective.\n\nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society Sumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society\n\nand the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group. and the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "In fiscal 2010, 150 volunteers from the In fiscal 2010, 150 volunteers from the\n\nSMFG Group participated in beach cleanup SMFG Group participated in beach cleanup\n\nactivities in Kanagawa and Hyogo prefectures activities in Kanagawa and Hyogo prefectures\n\non “SMFG Clean-up Day.” This initiative is on “SMFG Clean-up Day.” This initiative is\n\nnot simply a matter of picking up garbage. It not simply a matter of picking up garbage. It\n\nalso involves inspections and analysis of also involves inspections and analysis of\n\ngarbage to identify pointers for providing garbage to identify pointers for providing\n\nsolutions for environmental issues in the solutions for environmental issues in the\n\nfuture. future.\n\nIn addition to beach cleanup activities in In addition to beach cleanup activities in\n\nChiba and Hyogo prefectures by SMBC Chiba and Hyogo prefectures by SMBC\n\nFriend Securities, Group companies of Friend Securities, Group companies of\n\nCedyna, Sumitomo Mitsui Finance & Leasing, Cedyna, Sumitomo Mitsui Finance & Leasing,\n\nthe Japan Research Institute and SMBC the Japan Research Institute and SMBC\n\nNikko Securities carry out ongoing cleanup Nikko Securities carry out ongoing cleanup\n\nand other activities in the areas around their and other activities in the areas around their\n\noffices and branches. offices and branches.\n\nThe Minato Bank and Kansai Urban Banking The Minato Bank and Kansai Urban Banking\n\nCorporation also engage in cleanup activities Corporation also engage in cleanup activities\n\naround Suma Beach and Lake Biwa, to around Suma Beach and Lake Biwa, to\n\nprotect the regional environment. protect the regional environment.\n\nCardholders and employees of Sumitomo Cardholders and employees of Sumitomo\n\nMitsui Card joined a literary social contribution Mitsui Card joined a literary social contribution\n\ninitiative by participating in the Books To initiative by participating in the Books To\n\nThe People 2010 project operated by BOOKOFF The People 2010 project operated by BOOKOFF\n\nCORP. This project aims to provide CORP. This project aims to provide environ environ-\n\nments in which children can read books in ments in which children can read books in\n\npurpose-built facilities, through donations to purpose-built facilities, through donations to\n\nRoom to Read, a non-governmental organi Room to Read, a non-governmental organi-\n\nzation that supports education in developing zation that supports education in developing\n\ncountries. These NGO donations are pegged countries. These NGO donations are pegged\n\nto total numbers of used books and other to total numbers of used books and other\n\nitems purchased by cardholders. Through items purchased by cardholders. Through\n\nthe Sumitomo Mitsui Card-operated online the Sumitomo Mitsui Card-operated online\n\nshopping mall POINT UP Mall, cardholders shopping mall POINT UP Mall, cardholders\n\nare encouraged to buy used books through are encouraged to buy used books through\n\nBOOKOFF, and employees collect and donate BOOKOFF, and employees collect and donate\n\nused books from their homes and companies. used books from their homes and companies.\n\nIn the fall of 2010, SMBC Nikko Securities In the fall of 2010, SMBC Nikko Securities\n\nestablished its “Green Week” for strength established its “Green Week” for strength-\n\nening environmental protection and social ening environmental protection and social\n\ncontribution activities, with the aim of contribution activities, with the aim of\n\npromoting communication within regional promoting communication within regional\n\nsociety and among participating employees society and among participating employees\n\nand their families, while deepening under and their families, while deepening under-\n\nstanding of environmental protection through standing of environmental protection through\n\nparticipation in social contribution activities. participation in social contribution activities.\n\nBetween November 13 and December 5, Between November 13 and December 5,", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group\n\nis fulfilling as we work to create a sustainable society.\n\nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is\n\nthe essence of business itself, and our initiatives act upon this.\n\nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s\n\nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report\n\n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR\n\nactivities and statistical data omitted in the CSR Report 2011 (digest version).\n\nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in\n\nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand\n\nour CSR and other activities in greater detail.\n\nFrom the current fiscal year, we are including third-party opinions in the website version.\n\n**Editorial Policy**\n\nAt Sumitomo Mitsui Financial Group, three kinds of CSR reports are compiled.\n\n**Our CSR reporting**\n\nGlobal Reporting Initiative (GRI) Sustainability Reporting Guidelines 2006 (G3)\n\n* Global Reporting Initiative (GRI): Established as an international standard for sustainability reporting, compilers set up an international\n\norganization (GRI) in 1997 to encourage its adoption worldwide.\n\n* SMFG plans to make PROMISE a wholly owned subsidiary in April 2012.\n\n**Reference guidelines**\n\n- Sumitomo Mitsui Financial Group, Inc.\n\n- Sumitomo Mitsui Banking Corporation\n\n- SMFG Card & Credit, Inc.\n\n- Sumitomo Mitsui Card Company, Limited\n\n- Cedyna Financial Corporation\n\n- Sumitomo Mitsui Finance and Leasing Co., Ltd.\n\n- The Japan Research Institute, Limited\n\n- SMBC Friend Securities Co., Ltd.\n\n- SMBC Nikko Securities Inc.\n\n- THE MINATO BANK, LTD.\n\n- Kansai Urban Banking Corporation\n\n- Other Group companies\n\n**Scope of this Report**\n\nThroughout this report, **“Sumitomo Mitsui Financial Group”** or **“SMFG”** refers to the holding company alone. **“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates.\n\nCompany name abbreviations and other special terminology\n\n**About this Report**\n\n**Corporate Outline (as of September 30, 2011)**\n\nCompany Name\n\nBusiness Description\n\nEstablished\n\nHead Office\n\nChairman of the Board\n\nPresident\n\nCapital\n\nStock Exchange Listings\n\nSumitomo Mitsui Financial Group, Inc.\n\nManagement of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of\n\nnon-bank subsidiaries, as well as the performance of ancillary functions\n\nDecember 2, 2002\n\n1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan\n\nMasayuki Oku\n\nKoichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation)\n\n¥2,337.8 billion\n\nTokyo Stock Exchange (First Section)\n\nOsaka Securities Exchange (First Section)\n\nNagoya Stock Exchange (First Section)\n\n: :\n\n:\n\n:\n\n:\n\n:\n\n:\n\n:\n\n:\n\n**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nPeriod Covered\n\nPublication Date of\n\nJapanese Document\n\nContact\n\nCovers CSR baselines and CSR activities at SMFG and its Group companies, Covers CSR baselines and CSR activities at SMFG and its Group companies,\n\ncentered on specific examples centered on specific examples\n\nThis is the official version of our CSR report. Covers the full spectrum of This is the official version of our CSR report. Covers the full spectrum of\n\nCSR activities at SMFG CSR activities at SMFG\n\nCovers environment-related statistical data and gives more detailed Covers environment-related statistical data and gives more detailed\n\ninformation on CSR activities information on CSR activities\n\n**CSR disclosure**", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "The Group CSR Department and assigned departments also conduct a joint examination of plans for the following financial year, The Group CSR Department and assigned departments also conduct a joint examination of plans for the following financial year,\n\nthe findings of which are subsequently assessed by the Group CSR Committee. the findings of which are subsequently assessed by the Group CSR Committee.\n\nIn this way, we use the PDCA cycle in our CSR initiatives. In this way, we use the PDCA cycle in our CSR initiatives.\n\n**Our Mission**\n\n**Contributing to the Sustainable Development of Society**\n\n**CSR Group Initiatives**\n\nSolid Management Structure\n\n(corporate governance, internal controls, compliance,\n\nrisk management, information disclosure, etc.)\n\nCustomers Shareholders\n\nand the Market The Environment\n\nand Society Employees\n\nHighly-valued\n\nproducts and\n\nservices\n\nSound\n\nManagement\n\nSocial and community activities and environmental activities\n\nCorporate culture\n\nrespecting\n\nthe individual\n\nBoard of Directors\n\nSumitomo Mitsui Banking Corporation SMFG Card & Credit, Inc. The Japan Research Institute Limited SMBC Friend Securities Co., Ltd. Sumitomo Mitsui Finance and Leasing Co., Ltd.\n\n**Chairman** : Director in charge of SMFG\n\nCorporate Planning Department\n\n**Committee members** : General Managers of SMFG,\n\nSumitomo Mitsui Banking Corporation,\n\nSMFG Card & Credit, Sumitomo Mitsui Card,\n\nCedyna, Sumitomo Mitsui Finance and Leasing,\n\nThe Japan Research Institute,\n\nSMBC Friend Securities, SMBC Nikko Securities,\n\nTHE MINATO BANK and\n\nKansai Urban Banking Corporation\n\n**Administered by** : Group CSR Department of SMFG\n\n**Strategic advisor** :\n\nJRI Center for the Strategy of Emergence\n\nManagement Committee\n\n**Group CSR Committee**\n\n**CSR Liaison Committee**\n\n**SMFG CSR promotion structure**\n\nOur Mission\n\nCustomers\n\nPromoting CSR through\n\ncore operations\n\nShareholders and the Market\n\nThe Environment and Society\n\nEmployees\n\n| Plan |\n|:---|\n| Do |\n\n| Check |\n|:---|\n| Act |\n\nBasic CSR Policy\n\n(Business Ethics)\n\nWe intend to be a financial services group for which all officers and employees work We intend to be a financial services group for which all officers and employees work\n\nwith pride and commitment. For this purpose, we respect people and develop with pride and commitment. For this purpose, we respect people and develop\n\nemployees with extensive professional knowledge and capabilities, thereby creating a employees with extensive professional knowledge and capabilities, thereby creating a\n\nfree and active business environment. free and active business environment. *4.* **Free and Active**\n\n**Business Environment**\n\nWe intend to be a financial services group that maintains fair, transparent, and sound We intend to be a financial services group that maintains fair, transparent, and sound\n\nmanagement based on the principle of self-responsibility. For this purpose, along with management based on the principle of self-responsibility. For this purpose, along with\n\nearning the firm confidence of our shareholders, our customers, and the general public, earning the firm confidence of our shareholders, our customers, and the general public,\n\nwe take a long-term view of our business and operate it efficiently, and actively disclose we take a long-term view of our business and operate it efficiently, and actively disclose\n\naccurate business information about the Group. Through these activities, we work to accurate business information about the Group. Through these activities, we work to\n\nmaintain continued growth based on a sound financial position. maintain continued growth based on a sound financial position. *2.* **<sup>Sound Management</sup>**\n\nWe intend to be a financial services group that contributes to the healthy development We intend to be a financial services group that contributes to the healthy development", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "ties that contribute to society and prioritize ties that contribute to society and prioritize\n\ncommunication between employees. communication between employees.\n\nAccepting middle school students\n\nfor workplace experience programs\n\nSendai Branch\n\nPOINT UP Mall Sumitomo Mitsui\n\nCard staff\n\nBOOKOFF CORP Group\n\nSumitomo Mitsui\n\nCardholders\n\n*Research by Nikko Asset Management Co., Ltd.\n\nSumitomo Mitsui Financial Group CSR Report\n\n**SMFG and**\n\n**its Group companies**\n\n**participate in neighborhood**\n\n**cleanup programs**\n\n**Donations through**\n\n**“The World Bank**\n\n**Green Fund”**\n\n**SMBC Nikko Securities’**\n\n**“Green Week”**\n\n**Supporting education in**\n\n**developing countries,**\n\n**together with our customers**\n\n**and employees**\n\n**SMFG as a corporate citizen: Working to create a prosperous society for all**\n\n#### **Social Contribution**\n\n#### **Activities**\n\n**For further details,**\n\n**please see our website.**\n\nMitsui Sumitomo VISA Card", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "At Sumitomo Mitsui Card, rare earths At Sumitomo Mitsui Card, rare earths\n\nextracted from IC chips from expired credit extracted from IC chips from expired credit\n\ncards are recycled. cards are recycled.\n\nAs part of its core leasing operations, As part of its core leasing operations,\n\nSumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is\n\nhelping reduce customers’ environmental helping reduce customers’ environmental\n\nSMBC jointly organizes the “eco japan cup,” an SMBC jointly organizes the “eco japan cup,” an\n\nenvironmental business contest, together with environmental business contest, together with\n\nthe Ministry of the Environment, the Ministry the Ministry of the Environment, the Ministry\n\nof Internal Affairs and of Internal Affairs and Communi Communications, cations,\n\nthe Ministry of Land, Infrastructure, he Ministry of Land, Infrastructure, Trans Trans-\n\nport and Tourism, Development Bank of port and Tourism, Development Bank of\n\nJapan Inc. and Environmental Business Japan Inc. and Environmental Business\n\nWomen. The competition has four major Women. The competition has four major\n\ncategories - business, culture, lifestyle, and categories - business, culture, lifestyle, and\n\npolicy-making. policy-making.\n\nIn eco japan cup 2010, the “SMBC Eco-Banking In eco japan cup 2010, the “SMBC Eco-Banking\n\nOffice Prize” was launched in the cultural Office Prize” was launched in the cultural\n\ndivision. Entries were solicited on creating division. Entries were solicited on creating\n\neco-friendly bank branches through envi eco-friendly bank branches through envi-\n\nronment protection measures including ronment protection measures including\n\nadvanced energy initiatives and reduction advanced energy initiatives and reduction\n\nof carbon dioxide. Some of the prize-winning of carbon dioxide. Some of the prize-winning\n\nproposals (for example, efficient use of proposals (for example, efficient use of\n\ntimber from forest thinning) have been timber from forest thinning) have been\n\nadopted at environment-friendly model adopted at environment-friendly model\n\nbranches that the bank is developing. branches that the bank is developing.\n\n* After intermediate processing, waste materials\n\nother than the rare earths and the cards with\n\nno IC chips are both sent off for final disposal,\n\nin conformity with established procedures.\n\nThe Eco-Products exhibition, held each The Eco-Products exhibition, held each\n\nDecember, is one of Japan December, is one of Japan’s largest envi s largest envi-\n\nronmental exhibitions. Under it, SMFG held ronmental exhibitions. Under it, SMFG held\n\nthe SMFG Environmental Business Forum, the SMFG Environmental Business Forum,\n\na unique event to which the whole SMFG a unique event to which the whole SMFG\n\nGroup contributed. Group contributed.\n\nThe SMFG Environmental Business Forum The SMFG Environmental Business Forum\n\nenables encounters and information enables encounters and information\n\nexchange in the field of environmental exchange in the field of environmental\n\nbusiness. SMFG and its Group companies business. SMFG and its Group companies\n\nprovide various platforms, including business provide various platforms, including business\n\nmatching events, stands and catalogue matching events, stands and catalogue\n\nexhibitions, and lectures and seminars, exhibitions, and lectures and seminars,\n\nwith the aim of giving new business with the aim of giving new business\n\nopportunities to companies and other opportunities to companies and other\n\norganizations that are considering entering organizations that are considering entering\n\nthe environmental business, expanding the environmental business, expanding\n\ntheir marketing channels within it, or just their marketing channels within it, or just\n\ngathering information. gathering information.\n\nRecycling yields approximately 0.1mg of rare Recycling yields approximately 0.1mg of rare\n\nearth product per expired card. earth product per expired card.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Investor briefings twice a year Investor briefings twice a year\n\nConferences sponsored by securities Conferences sponsored by securities\n\ncompanies, etc., as needed companies, etc., as needed\n\nOnline conferences held as needed Online conferences held as needed\n\nAnnual and interim reports (in Japanese Annual and interim reports (in Japanese\n\nand English) and English)\n\nWe believe that the SMFG Group can contribute We believe that the SMFG Group can contribute\n\nfurther to the creation of a sustainable society further to the creation of a sustainable society\n\nthrough its activities in financial markets. through its activities in financial markets.\n\nFor example, SMBC Friend Securities markets For example, SMBC Friend Securities markets\n\n“Environmental Sustainability Bond” “Environmental Sustainability Bond” <sup>*1</sup> *1 while while\n\nSMBC Nikko Securities markets “WB Green SMBC Nikko Securities markets “WB Green\n\nBonds (Green Bonds)” Bonds (Green Bonds)” <sup>*2</sup> *2 . These are bonds . These are bonds\n\nfor fund procurement that are also intended for fund procurement that are also intended\n\nas tools for contributing to protecting and as tools for contributing to protecting and\n\nconserving the global environment. For conserving the global environment. For\n\ncustomers who wish to invest in companies customers who wish to invest in companies\n\nthat contribute to a sustainable society, that contribute to a sustainable society,\n\nwe offer a wide range of socially responsible we offer a wide range of socially responsible\n\ninvestment vehicles. investment vehicles.\n\nThe The Japan Research Institute analyzes applicant Japan Research Institute analyzes applicant\n\ncompanies’ corporate social responsibility companies’ corporate social responsibility\n\nactivities, and uses the information it gathers activities, and uses the information it gathers\n\nto create a basic file on companies managing to create a basic file on companies managing\n\nsocially responsible investment fund socially responsible investment funds <sup>*3</sup> *3 .\n\nIn November 2010, the Sumitomo Mitsui In November 2010, the Sumitomo Mitsui\n\nFinancial Group listed on the New York Financial Group listed on the New York\n\nStock Exchange. This move, we believe, not Stock Exchange. This move, we believe, not\n\nonly significantly increases convenience for only significantly increases convenience for\n\nour overseas shareholders and investors, our overseas shareholders and investors,\n\nbut also broadens our customer base as it but also broadens our customer base as it\n\nfurther increases the transparency of our further increases the transparency of our\n\nfinancial position. Listing on the New York financial position. Listing on the New York\n\nStock Exchange as a socially responsible Stock Exchange as a socially responsible\n\ncorporation accelerates our evolution into a corporation accelerates our evolution into a\n\nglobal player. global player.\n\n*1 In December 2010, SMBC Friend Securities sold a total of AUD25 million in “Environmental Sustainability Bond.”\n\n*2 This fund is provided by SMBC Nikko Securities under the full name Bond for Contributing to Environmental Protection.\n\n*3 As of the end of June 2011, approximately ¥63.5 billion in total had been invested in nine publicly offered socially responsible investment (SRI) trust funds.\n\nDate of opening Sold by\n\nSMBC Nikko Securities\n\nSumitomo Mitsui Banking Corporation\n\nSMBC Nikko Securities\n\nSMBC Nikko Securities\n\nSumitomo Mitsui Banking Corporation\n\nSMBC Nikko Securities\n\nSMBC Nikko Securities / Sumitomo Mitsui Banking Corporation\n\nSMBC Nikko Securities\n\nAug. 20, 1999\n\nMar. 14, 2006\n\nDec. 20, 2006\n\nAug. 31, 2007\n\nAug. 31, 2007\n\nApr. 28, 2009\n\nFeb. 19, 2010\n\nJun. 30, 2010\n\nNickname\n\nDouble Wing\n\nRising Tomorrow\n\nCool Earth\n\nGlobal Shift\n\nThe World Bank Green Fund\n\nBalance\n\nat March 31, 2011\n\n8,888\n\n1,494\n\n31,810\n\n12,810\n\n20,888\n\n14,935\n\n13,870\n\n1,230\n\nOfficial name of fund\n\nNikko Eco Fund", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_SMFG_2011.pdf", - "query": "Did Katsutoshi Konuma participate in the August 2011 expert roundtable on the role of the Sumitomo Mitsui Financial Group's new Food and Agricultural Assessment Loan? ", - "target_page": 8, - "target_passage": "Key comments of participants Together with Our Customers Katsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "President and CEO\n\nSumitomo Mitsui Banking Corporation\n\n**A Conversation with Tadao Ando, Takeshi Kunibe and Koichi Miyata**\n\n*Uplifting the nation’s spirits* *Uplifting the nation’s spirits*\n\nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) Japan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan)\n\nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates after the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates\n\nand increasing numbers of the aged. and increasing numbers of the aged.\n\nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. We must now find ways for people to coexist in harmony with nature, based on a global perspective.\n\nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society Sumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society\n\nand the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group. and the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "information on CSR activities information on CSR activities\n\n**CSR disclosure**\n\n**through**\n\n**specific examples**\n\n**Comprehensive**\n\n**disclosure of**\n\n**CSR activities**\n\n**Enriched**\n\n**CSR disclosure**\n\n:\n\n:\n\n:\n\nApril 1, 2010 to March 31, 2011 ( “Fiscal 2010” )\n\nNote: Certain items in this report refer to activities taking place after April 2011.\n\nDecember 2011\n\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc.\n\n1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005\n\nTEL: +81-3-3282-8111\n\nSumitomo Mitsui Sumitomo Mitsui\n\nBanking Corporation Banking Corporation\n\nSMBC Nikko Securities SMBC Nikko Securities ORIX Credit ORIX Credit PROMISE * PROMISE * Sumitomo Mitsui Card Sumitomo Mitsui Card Cedyna Cedyna\n\nSMFG Card & Credit SMFG Card & Credit Sumitomo Mitsui Sumitomo Mitsui\n\nFinance and Leasing Finance and Leasing\n\nThe Japan The Japan\n\nResearch Institute Research Institute SMBC Friend Securities SMBC Friend Securities\n\nDaiwa SB Investments Daiwa SB Investments\n\nSumitomo Mitsui Auto Service Sumitomo Mitsui Auto Service\n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\n\nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange.\n\n**CSR report 2011 (digest version)**\n\n**CSR report (online version, Japanese only)**\n\n**CSR report 2011**\n\n**(digest version with examples of activities and**\n\n**statistical performance, online PDF file)**\n\nwww.smfg.co.jp/responsibility\n\n29 **CSR REPORT 2011 CSR REPORT 2011** 30", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Sumitomo Mitsui Financial Group CSR Report\n\n**Digest version**\n\nwww.smfg.co.jp/english", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**5**\n\n## EXECUTIVES\n\n**BOARD OF DIRECTORS AND AUDITORS**\n\n**Representative Board Members**\n\nCarlos Ghosn\n\nPresident and Co-Chairman\n\nItaru Koeda\n\nCo-Chairman\n\nToshiyuki Shiga\n\nCo-Chairman\n\n**Board Members**\n\nTadao Takahashi\n\nHiroto Saikawa\n\nMitsuhiko Yamashita\n\nCarlos Tavares\n\nShemaya Lévy\n\nPatrick Pélata\n\n**Auditors**\n\nHisayoshi Kojima\n\nShinji Ichishima\n\nKeishi Imamura\n\nHaruo Murakami\n\n**EXECUTIVE COMMITTEE MEMBERS**\n\nCarlos Ghosn\n\nToshiyuki Shiga\n\nItaru Koeda\n\nTadao Takahashi\n\nHiroto Saikawa\n\nMitsuhiko Yamashita\n\nCarlos Tavares\n\nAlain-Pierre Raynaud\n\n(As of June 21, 2005)\n\nFrom left: Mitsuhiko Yamashita, Tadao Takahashi, Toshiyuki Shiga, Carlos Ghosn, Itaru Koeda, Hiroto Saikawa, Carlos Tavares\n\nEXECUTIVES", - "page_start": 6, - "page_end": 6, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "In fiscal 2010, 150 volunteers from the In fiscal 2010, 150 volunteers from the\n\nSMFG Group participated in beach cleanup SMFG Group participated in beach cleanup\n\nactivities in Kanagawa and Hyogo prefectures activities in Kanagawa and Hyogo prefectures\n\non “SMFG Clean-up Day.” This initiative is on “SMFG Clean-up Day.” This initiative is\n\nnot simply a matter of picking up garbage. It not simply a matter of picking up garbage. It\n\nalso involves inspections and analysis of also involves inspections and analysis of\n\ngarbage to identify pointers for providing garbage to identify pointers for providing\n\nsolutions for environmental issues in the solutions for environmental issues in the\n\nfuture. future.\n\nIn addition to beach cleanup activities in In addition to beach cleanup activities in\n\nChiba and Hyogo prefectures by SMBC Chiba and Hyogo prefectures by SMBC\n\nFriend Securities, Group companies of Friend Securities, Group companies of\n\nCedyna, Sumitomo Mitsui Finance & Leasing, Cedyna, Sumitomo Mitsui Finance & Leasing,\n\nthe Japan Research Institute and SMBC the Japan Research Institute and SMBC\n\nNikko Securities carry out ongoing cleanup Nikko Securities carry out ongoing cleanup\n\nand other activities in the areas around their and other activities in the areas around their\n\noffices and branches. offices and branches.\n\nThe Minato Bank and Kansai Urban Banking The Minato Bank and Kansai Urban Banking\n\nCorporation also engage in cleanup activities Corporation also engage in cleanup activities\n\naround Suma Beach and Lake Biwa, to around Suma Beach and Lake Biwa, to\n\nprotect the regional environment. protect the regional environment.\n\nCardholders and employees of Sumitomo Cardholders and employees of Sumitomo\n\nMitsui Card joined a literary social contribution Mitsui Card joined a literary social contribution\n\ninitiative by participating in the Books To initiative by participating in the Books To\n\nThe People 2010 project operated by BOOKOFF The People 2010 project operated by BOOKOFF\n\nCORP. This project aims to provide CORP. This project aims to provide environ environ-\n\nments in which children can read books in ments in which children can read books in\n\npurpose-built facilities, through donations to purpose-built facilities, through donations to\n\nRoom to Read, a non-governmental organi Room to Read, a non-governmental organi-\n\nzation that supports education in developing zation that supports education in developing\n\ncountries. These NGO donations are pegged countries. These NGO donations are pegged\n\nto total numbers of used books and other to total numbers of used books and other\n\nitems purchased by cardholders. Through items purchased by cardholders. Through\n\nthe Sumitomo Mitsui Card-operated online the Sumitomo Mitsui Card-operated online\n\nshopping mall POINT UP Mall, cardholders shopping mall POINT UP Mall, cardholders\n\nare encouraged to buy used books through are encouraged to buy used books through\n\nBOOKOFF, and employees collect and donate BOOKOFF, and employees collect and donate\n\nused books from their homes and companies. used books from their homes and companies.\n\nIn the fall of 2010, SMBC Nikko Securities In the fall of 2010, SMBC Nikko Securities\n\nestablished its “Green Week” for strength established its “Green Week” for strength-\n\nening environmental protection and social ening environmental protection and social\n\ncontribution activities, with the aim of contribution activities, with the aim of\n\npromoting communication within regional promoting communication within regional\n\nsociety and among participating employees society and among participating employees\n\nand their families, while deepening under and their families, while deepening under-\n\nstanding of environmental protection through standing of environmental protection through\n\nparticipation in social contribution activities. participation in social contribution activities.\n\nBetween November 13 and December 5, Between November 13 and December 5,", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "give the poorest in society access to give the poorest in society access to basic medical care. Based on this basic medical care. Based on this\n\ncorporate social responsibility corporate social responsibility DNA embedded in the business DNA embedded in the business\n\nphilosophies of both the Sumitomo philosophies of both the Sumitomo and Mitsui groups over the 400 and Mitsui groups over the 400\n\nyears of their existence, we will years of their existence, we will continue to play our part in solving continue to play our part in solving\n\nproblems facing the international problems facing the international community through our financial community through our financial\n\nservice service operations. operations.\n\n**Priority Issues for Us** As one of Japa As one of Japan’s leading financial services groups, s leading financial services groups,\n\nthe SMFG Group is taking the lead in aggressively addressing the four priority issues the SMFG Group is taking the lead in aggressively addressing the four priority issues\n\nwe have identified as significantly impacting the nation. we have identified as significantly impacting the nation.", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group\n\nis fulfilling as we work to create a sustainable society.\n\nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is\n\nthe essence of business itself, and our initiatives act upon this.\n\nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s\n\nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report\n\n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR\n\nactivities and statistical data omitted in the CSR Report 2011 (digest version).\n\nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in\n\nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand\n\nour CSR and other activities in greater detail.\n\nFrom the current fiscal year, we are including third-party opinions in the website version.\n\n**Editorial Policy**\n\nAt Sumitomo Mitsui Financial Group, three kinds of CSR reports are compiled.\n\n**Our CSR reporting**\n\nGlobal Reporting Initiative (GRI) Sustainability Reporting Guidelines 2006 (G3)\n\n* Global Reporting Initiative (GRI): Established as an international standard for sustainability reporting, compilers set up an international\n\norganization (GRI) in 1997 to encourage its adoption worldwide.\n\n* SMFG plans to make PROMISE a wholly owned subsidiary in April 2012.\n\n**Reference guidelines**\n\n- Sumitomo Mitsui Financial Group, Inc.\n\n- Sumitomo Mitsui Banking Corporation\n\n- SMFG Card & Credit, Inc.\n\n- Sumitomo Mitsui Card Company, Limited\n\n- Cedyna Financial Corporation\n\n- Sumitomo Mitsui Finance and Leasing Co., Ltd.\n\n- The Japan Research Institute, Limited\n\n- SMBC Friend Securities Co., Ltd.\n\n- SMBC Nikko Securities Inc.\n\n- THE MINATO BANK, LTD.\n\n- Kansai Urban Banking Corporation\n\n- Other Group companies\n\n**Scope of this Report**\n\nThroughout this report, **“Sumitomo Mitsui Financial Group”** or **“SMFG”** refers to the holding company alone. **“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates.\n\nCompany name abbreviations and other special terminology\n\n**About this Report**\n\n**Corporate Outline (as of September 30, 2011)**\n\nCompany Name\n\nBusiness Description\n\nEstablished\n\nHead Office\n\nChairman of the Board\n\nPresident\n\nCapital\n\nStock Exchange Listings\n\nSumitomo Mitsui Financial Group, Inc.\n\nManagement of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of\n\nnon-bank subsidiaries, as well as the performance of ancillary functions\n\nDecember 2, 2002\n\n1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan\n\nMasayuki Oku\n\nKoichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation)\n\n¥2,337.8 billion\n\nTokyo Stock Exchange (First Section)\n\nOsaka Securities Exchange (First Section)\n\nNagoya Stock Exchange (First Section)\n\n: :\n\n:\n\n:\n\n:\n\n:\n\n:\n\n:\n\n:\n\n**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nPeriod Covered\n\nPublication Date of\n\nJapanese Document\n\nContact\n\nCovers CSR baselines and CSR activities at SMFG and its Group companies, Covers CSR baselines and CSR activities at SMFG and its Group companies,\n\ncentered on specific examples centered on specific examples\n\nThis is the official version of our CSR report. Covers the full spectrum of This is the official version of our CSR report. Covers the full spectrum of\n\nCSR activities at SMFG CSR activities at SMFG\n\nCovers environment-related statistical data and gives more detailed Covers environment-related statistical data and gives more detailed\n\ninformation on CSR activities information on CSR activities\n\n**CSR disclosure**", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Further measures include posting of “green Further measures include posting of “green\n\near” logos at branches to reassure customers ear” logos at branches to reassure customers\n\nthat the bank has facilities for conversing that the bank has facilities for conversing\n\nin in writing. All branches are being equipped writing. All branches are being equipped\n\nwith white boards and special message with white boards and special message\n\ntablets for dialogue with customers who ablets for dialogue with customers who\n\nhave concerns about their hearing and who have concerns about their hearing and who\n\ndislike written conversations. dislike written conversations.\n\nHandheld hearing support device\n\n(The Minato Bank)\n\nTelephone handset-type ATM\n\n(The Minato Bank)\n\n####### **Key comments of participants**\n\n#### **Together with Our Customers**\n\nKatsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd.\n\n“Eating should be something that generates emotion. New potential exists in the world of cuisine.”\n\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences,\n\nThe University of Tokyo\n\n“As consumer tastes go through a time of great change, I think it is important to\n\nprioritize ingredients and the attitude of customers toward eating.”\n\nDaisuke Yamamoto, Vice Senior Consultant, Research Department,\n\nThe Japan Research Institute, Limited\n\n“An important concept is multilateral dialogue as the number of parties involved in food\n\nproduction increases throughout the supply chain.”\n\nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of\n\nthe Corporate Banking Unit & Middle Market Banking Unit, SMBC\n\nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC\n\n**For further details, please see our website.**\n\nIn addition to removing mobility barriers at In addition to removing mobility barriers at\n\nbranches, the bank plans to aggressively branches, the bank plans to aggressively\n\nsupport installation of facilities needed to support installation of facilities needed to\n\ncope with the rapidly rising old-age cope with the rapidly rising old-age\n\ndependency ratio. As a first step, SMBC dependency ratio. As a first step, SMBC\n\nhas established clear guidelines for has established clear guidelines for\n\nsupporting the construction of rental supporting the construction of rental\n\nhousing for the elderly, expected to be a housing for the elderly, expected to be a\n\nfuture growth area. future growth area.\n\nWhile continuing to tailor business While continuing to tailor business\n\nactivities to the needs of the community at activities to the needs of the community at\n\nlarge and ensuring a friendly banking large and ensuring a friendly banking\n\nenvironment for our customers, the SMFG environment for our customers, the SMFG\n\nGroup also plans to support the creation of Group also plans to support the creation of\n\nframeworks that enable the elderly to live frameworks that enable the elderly to live\n\nactive lives with peace of mind. active lives with peace of mind.\n\n**We work as a team to improve customer satisfaction and product quality, and, while supporting the customer,**\n\n**contribute to the sustainable development of society as a whole.**\n\n14", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Mitsui Charity Hospital at its establishment Mitsui Charity Hospital at its establishment\n\nBesshi copper mine in the Meiji era Besshi copper mine in the Meiji era And today And today\n\n**Reconstruction after the earthquake and tsunami**\n\n**Measures for Japan’s regeneration**\n\n####### **Further measures needed**\n\n**Shrinking and aging population**\n\n**Ensuring peace of mind for the future**\n\n**Environmental measures**\n\n**Creating systems for sustainability Global challenges**\n\n**Symbiosis and diversity**\n\nThe March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power The March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power\n\ngeneration capacity and severed manufacturing supply chains across the nation. This was in addition generation capacity and severed manufacturing supply chains across the nation. This was in addition\n\nto the severe damage sustained by agriculture and fisheries in the Northeast. to the severe damage sustained by agriculture and fisheries in the Northeast.\n\nThe disaster also threw into relief many social issues facing the nation. By leveraging our role as The disaster also threw into relief many social issues facing the nation. By leveraging our role as\n\na leading financial services group, we are committing our full range of resources to dealing with the a leading financial services group, we are committing our full range of resources to dealing with the\n\nenormous task of regional reconstruction after the earthquake, in partnership with stakeholders enormous task of regional reconstruction after the earthquake, in partnership with stakeholders\n\nincluding enterprises, local governments and non-profit organizations. including enterprises, local governments and non-profit organizations.\n\nThe SMFG Group has positioned environmental businesses as an area where it can most effectively The SMFG Group has positioned environmental businesses as an area where it can most effectively\n\nleverage its role as a leading financial services group. This is a priority field for the future. leverage its role as a leading financial services group. This is a priority field for the future.\n\nMeasures are being stepped up on a range of fronts — not only involving a low-carbon society, but Measures are being stepped up on a range of fronts — not only involving a low-carbon society, but\n\nalso dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to also dealing with issues such as water supply, soil contamination, energy and biodiversity. We aim to\n\ncontribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired contribute to sustainable development by supporting the worldwide adoption of Japan’s much-admired\n\ntechnological breakthroughs, with a particular focus on the Asian region. technological breakthroughs, with a particular focus on the Asian region.\n\nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create Currently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create\n\nframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle frameworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle\n\nplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound planning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound\n\nbalance between work and care needs, given that many group employees will later need to nurse ailing relatives. balance between work and care needs, given that many group employees will later need to nurse ailing relatives.\n\n-\n\n-\n\n-\n\nWide-ranging financial support for the reconstruction of infrastructure Wide-ranging financial support for the reconstruction of infrastructure", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "The SMFG Group supports environmental The SMFG Group supports environmental\n\nbusinesses in the rapidly growing markets of businesses in the rapidly growing markets of\n\nSoutheast Asia from various perspectives. Southeast Asia from various perspectives.\n\nFor example in Malaysia, SMBC signed an For example in Malaysia, SMBC signed an\n\noperational alliance on environmental operational alliance on environmental\n\nbusinesses with the Federation of Malaysian businesses with the Federation of Malaysian\n\nManufacturers in April 2010, and in October Manufacturers in April 2010, and in October\n\nthat year acted as main sponsor for Malaysia that year acted as main sponsor for Malaysia’s\n\nfirst large-scale international environmental first large-scale international environmental\n\nexhibition, International Greentech & Eco exhibition, International Greentech & Eco\n\nproducts Exhibition & Conference Malaysia products Exhibition & Conference Malaysia\n\n2010 (IGEM). At this event, a keynote 2010 (IGEM). At this event, a keynote\n\nspeech was given by Chairman Teisuke speech was given by Chairman Teisuke\n\nKitayama, and SMBC and Sumitomo Mitsui Kitayama, and SMBC and Sumitomo Mitsui\n\nFinance & Leasing opened booths. Finance & Leasing opened booths. The The\n\nexhibition, visited on successive days exhibition, visited on successive days by by\n\nMalaysia Malaysia’s King, prime minister, some of s King, prime minister, some of\n\nthe regional Kings of Malaysia, the regional Kings of Malaysia, and and\n\ncabinet ministers, raised awareness cabinet ministers, raised awareness of of\n\nenvironmental businesses in the nation. environmental businesses in the nation.\n\nAt the same time, in April 2011, the bank At the same time, in April 2011, the bank’s s\n\nMalaysia unit Sumitomo Mitsui Banking Malaysia unit Sumitomo Mitsui Banking\n\nCorporation Malaysia Berhad began Corporation Malaysia Berhad began\n\noperations. This unit is broadening support operations. This unit is broadening support\n\nmeasures to contribute to the development measures to contribute to the development\n\nof environmental businesses in Malaysia. of environmental businesses in Malaysia.\n\nMeanwhile, in August 2010, the Japan Meanwhile, in August 2010, the Japan\n\nResearch Institute, SMBC and a number of Research Institute, SMBC and a number of\n\nother companies publicly recruited by Japan other companies publicly recruited by Japan’s s\n\nNew Energy and Industrial Technology New Energy and Industrial Technology\n\nDevelopment Organization (NEDO) were Development Organization (NEDO) were\n\njointly commissioned to carry out basic jointly commissioned to carry out basic\n\nresearch into Malaysia research into Malaysia’s Green Township s Green Township\n\nconcept, a national town-planning project concept, a national town-planning project\n\nbacked by NEDO. backed by NEDO.\n\nLooking ahead, SMBC plans to jointly Looking ahead, SMBC plans to jointly\n\ncompile an action plan with the Malaysian compile an action plan with the Malaysian\n\ngovernment and related enterprises for government and related enterprises for\n\nestablishment of “green townships” based establishment of “green townships” based\n\non the cities Putrajaya and Cyberjaya Prime on the cities Putrajaya and Cyberjaya Prime\n\nMinister Najib Razak is promoting. It also Minister Najib Razak is promoting. It also\n\nplans to propose specific projects in the plans to propose specific projects in the\n\nconcept. concept.\n\nIn China, which emits more carbon dioxide In China, which emits more carbon dioxide\n\nthan any other country, finding ways of than any other country, finding ways of\n\npromoting new energy-saving measures promoting new energy-saving measures\n\nand restructuring industry have become and restructuring industry have become\n\npressing issues. pressing issues.\n\nThe Japan Research Institute has built up a The Japan Research Institute has built up a\n\nsuccessful track record in the course of its successful track record in the course of its", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "news2.pdf", - "query": "What is the trend of flood risk in Canada in 2024?", - "target_page": 1, - "target_passage": "(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "2019 ; Muennighoff , 2022 ) or similarity fine-tuning\n\n( Reimers and Gurevych , 2019 ) using a contrastive\n\nframework ( Gao et al. , 2021 ; Neelakantan et al. ,\n\n2022 ; Ni et al. , 2021 ; Wang et al. , 2022 ; Zhang\n\net al. , 2023 ), leveraging prompts ( Wang et al. , 2023 )\n\nor a two steps training process ( Chen et al. , 2024 ;\n\nLee et al. , 2024 ). Few French-language models\n\nhave been proposed in the literature ( Martin et al. ,\n\n1\n\narXiv:2405.20468v2 [cs.CL] 17 Jun 2024", - "page_start": 0, - "page_end": 0, - "source_file": "arxiv4.pdf" - }, - { - "text": "Trois façons dont des\n\ncollectivités au Canada\n\n[réduisent leurs risques](https://www.newscanada.com/en/Trois-fa-ons-dont-des-collectivit-s-au-Canada-r-duisent-leurs-risques-d-inondation-139848)\n\nd’inondation\n\nISSUE\n\nDecember 2024\n\nCATEGORIES\n\n[Home - Safety](https://www.newscanada.com/en/home-safety/content)\n\n[Community Affairs](https://www.newscanada.com/en/community/content)\n\n[Finance - Insurance](https://www.newscanada.com/en/finance-insurance/content)\n\n[Editor's Picks](https://www.newscanada.com/en/editor-picks/content)\n\nFRANÇAIS\n\nHave your say! Complete our\n\n[2025 Media Survey](https://www.newscanada.com/en/have-your-say-complete-our-2025-media-survey-137263)\n\n[Retrain your way to a new job](https://www.newscanada.com/en/retrain-your-way-to-a-new-job-139857)\n\n[The top AI-powered tech trends](https://www.newscanada.com/en/the-top-ai-powered-tech-trends-in-2025-139854)\n\nin 2025\n\nEDITOR'S PICKS\n\n### [](https://facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.newscanada.com%2Fen%2Fthree-ways-canadian-communities-are-reducing-flood-risks-139844)\n\n### [](https://twitter.com/share?url=https%3A%2F%2Fwww.newscanada.com%2Fen%2Fthree-ways-canadian-communities-are-reducing-flood-risks-139844&text=Bloggers%2C%20editors%2C%20broadcasters%20and%20others%20looking%20for%20print%20and%20digital%20content%20%E2%80%93%20News%20Canada%20is%20your%20source%20for%20lifestyle%20content%20that%E2%80%99s%20free%20of%20copyright%20and%20charge.%20Save%20time%20and%20money%20with%20our%20ready-to-use%20articles%2C%20radio%2C%20video%20and%20content%20widgets.)\n\n### [](https://pinterest.com/pin/create/bookmarklet/?&url=https%3A%2F%2Fwww.newscanada.com%2Fen%2Fthree-ways-canadian-communities-are-reducing-flood-risks-139844&description=Bloggers%2C%20editors%2C%20broadcasters%20and%20others%20looking%20for%20print%20and%20digital%20content%20%E2%80%93%20News%20Canada%20is%20your%20source%20for%20lifestyle%20content%20that%E2%80%99s%20free%20of%20copyright%20and%20charge.%20Save%20time%20and%20money%20with%20our%20ready-to-use%20articles%2C%20radio%2C%20video%20and%20content%20widgets.)\n\n### [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.newscanada.com%2Fen%2Fthree-ways-canadian-communities-are-reducing-flood-risks-139844)\n\n## **Three ways Canadian communities are reducing flood**\n\n## **risks**\n\nwww.newscanada.com\n\nWord Count: 281\n\n[Media Attachments](https://www.newscanada.com/en/three-ways-canadian-communities-are-reducing-flood-risks-139844)\n\n[View](https://www.newscanada.com/en/three-ways-canadian-communities-are-reducing-flood-risks-139844)\n\n[Related Posts](https://www.newscanada.com/en/three-ways-canadian-communities-are-reducing-flood-risks-139844)\n\n[Terms of Use](https://www.newscanada.com/en/three-ways-canadian-communities-are-reducing-flood-risks-139844)\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly\n\nexposed. There are large-scale programs available across the country providing flood protection\n\nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This\n\nprogram is helping build the resilience of communities and homes through a variety of\n\npreventative actions.\n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically\n\nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community\n\nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made\n\nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk\n\nby catching and absorbing rainfall and runoff from surrounding surfaces.\n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the\n\nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online\n\nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "[ogy/archive/2023/05/ai-advancements-multimodal-models/674113/) from the original on 18](https://web.archive.org/web/20240918022529/https://www.theatlantic.com/technology/archive/2023/05/ai-advancements-multimodal-models/674113/)\n\nSeptember 2024, retrieved 5 October 2024", - "page_start": 65, - "page_end": 65, - "source_file": "wikipedia3.pdf" - }, - { - "text": "City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online\n\nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn\n\ntips to reduce the risk of flooding around their properties. The portal launched in the summer of\n\n2023 and was viewed 27,000 times in its first year.\n\nRebate programs are a powerful motivation for homeowners to make upgrades that might\n\notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of\n\neligible material and labour costs, up to a maximum of $1,000. More than 90 properties\n\ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and\n\nwater monitors and alarms, to better prepare them for extreme weather events.\n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg.\n\n−\n\n+\n\n+\n\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.\n\nMENU SEARCH [ARTICLES](https://www.newscanada.com/en/articles/content) [RADIO](https://www.newscanada.com/en/radio/content) [VIDEO](https://www.newscanada.com/en/digital-content/content)\n\nEN", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "[ml) from the original on 5 October 2024. Retrieved 5 October 2024.](https://web.archive.org/web/20241005170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/html)\n\n[301. \"AI Safety Institute releases new AI safety evaluations platform\" (https://www.gov.uk/govern](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[ment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform). UK Government.](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[10 May 2024. Archived (https://web.archive.org/web/20241005170207/https://www.gov.uk/g](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[overnment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform) from the](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\noriginal on 5 October 2024. Retrieved 14 May 2024.\n\n302. Regulation of AI to mitigate risks: Berryhill et al. (2019), Barfield & Pagallo (2018), Iphofen &\n\nKritikos (2019), Wirtz, Weyerer & Geyer (2018), Buiten (2019)\n\n303. Law Library of Congress (U.S.). Global Legal Research Directorate (2019).\n\n304. Vincent (2023).\n\n305. Stanford University (2023).\n\n306. UNESCO (2021).\n\n307. Kissinger (2021).\n\n308. Altman, Brockman & Sutskever (2023).\n\n[309. VOA News (25 October 2023). \"UN Announces Advisory Body on Artificial Intelligence\" (http](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[s://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.htm](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[l). Archived (https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-a](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[nnounces-advisory-body-on-artificial-intelligence-/7328732.html) from the original on 18](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\nSeptember 2024. Retrieved 5 October 2024.\n\n[310. \"Council of Europe opens first ever global treaty on AI for signature\" (https://www.coe.int/en/](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature). ](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature) *Council of*\n\n*Europe* [. 5 September 2024. Archived (https://web.archive.org/web/20240917001330/https://](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signat](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[ure) from the original on 17 September 2024. Retrieved 17 September 2024.](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n311. Edwards (2023).\n\n312. Kasperowicz (2023).\n\n313. Fox News (2023).", - "page_start": 46, - "page_end": 46, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Notes to the Financial Statements\n\n**99**\n\nNotes to the Financial Statements\n\ncontinued\n\n### 27. Contingent liabilities\n\nThe Group had contingent liabilities at 30 June 2013 in respect of guarantees. Bank guarantees have been given by Kingsgate’s controlled entities to partici-\n\npating banks in the syndicated loan facility and corporate loan facility as described in Note 16 as part of the security package. These guarantees may give\n\nrise to liabilities in the parent entity if the controlled entities do not meet their obligations under the terms of the loans subject to guarantees. No material\n\nlosses are anticipated in respect of the above contingent liabilities.\n\nIncluded in non-current other asset is $1,838,000 relating to restricted cash deposits against bank guarantees supporting the rehabilitation bond require-\n\nments against the Group’s mining operations.\n\n### 28. Financial risk management and instruments\n\nFinancial risk management\n\nThe Group’s activities expose it to a variety of financial risks: market risk (including foreign currency risk, price risk, fair value risk, and interest rate risk),\n\ncredit risk and liquidity risk.\n\nAt this point, the Directors believe that it is in the interest of shareholders to expose the Group to foreign currency risk, price risk and interest rate risk.\n\nTherefore, the Group does not employ any derivative hedging of foreign currency or interest rate risks though has entered into forward gold sale contracts to\n\nmanage Australian gold price risk in respect of the forecast production from the Challenger Mine (refer “commodity price risk” section below). The Directors and\n\nmanagement monitor these risks, in particular market forecasts of future movements in foreign currency and prices movements and if it is to be believed to be\n\nin the interests of shareholders will implement risk management strategies to minimise potential adverse effects on the financial performance of the Group.\n\nRisk management is carried out by the senior executive team. The Board provides written principles for overall risk management, as well as policies covering\n\nspecific areas, such as foreign exchange risk, interest rate risk, credit risk, use of derivative financial instruments and non-derivative financial instruments,\n\nand investment of excess liquidity.\n\nThe Group holds the following financial instruments:\n\n2013\n\n$’000\n\n2012\n\n$’000\n\nFinancial assets\n\nCash and cash equivalents 32,987 90,623\n\nReceivables 9,431 12,226\n\nRestricted cash 5,474 -\n\nAvailable-for-sale financial assets 767 1,751\n\nOther financial assets 7,808 4,670\n\nTotal financial assets 56,467 109,270\n\nFinancial liabilities\n\nPayables (47,106) (49,278)\n\nBorrowings (202,565) (157,544)\n\nDerivatives held for trading (1,271) (2,685)\n\nTotal financial liabilities (250,942) (209,507)\n\n(a) Market risk\n\nForeign exchange risk\n\nThe Group operates internationally and is exposed to foreign exchange risk arising from currency exposures, primarily with respect to the US dollar and Thai\n\nBaht and as discussed earlier, no financial instruments are employed to mitigate the exposed risks. This is the Group’s current policy and it is reviewed regu-\n\nlarly including forecast movements in these currencies by management and the Board.\n\nCurrent year foreign exchange risks arise primarily from:\n\n〉 〉 the sale of gold, which is in US dollars;\n\n〉 〉 payables denominated in US dollars; and\n\n〉 〉 cash balances in US dollars.\n\nThe functional currency of the Thai subsidiaries is Thai Baht.", - "page_start": 100, - "page_end": 100, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "## **5. Previous Projections**\n\nAt the end of September 2014 the published prison population was within 1.8 % of the 2013 Scenario 2 (central) projection, and within 3.4 % of the 2013 Scenario 1 projection and 0.2 % of the 2013 Scenario 3 projection. This does not indicate which scenario the actual prison population will track going forward.\n\nDifferences between the 2013 projections and the actual population could be explained by changes, different to those projected, in overall demand, offence mix, age and gender of defendants, court routes, custody rates or sentence lengths.\n\nChart 3 plots the 2014 Central Scenario projection against the three 2013 prison population projections. The 2014-2020 Central Scenario projection is above all three scenarios from last year. The higher level of the new projections can be attributed to a more serious case mix coming into the courts with a resulting increase in average custodial sentence lengths. The projection for June 2019 in the Central Scenario this year is 10.2 % above the equivalent scenario (Scenario 2) last year.\n\n**Chart 3: Comparing 2013 and 2014 projections (November 2014 - December 2020)**\n\n**Total Prison Population**\n\n**Prison population projections from November 2014 to December 2020**\n\n70,000\n\n75,000\n\n80,000\n\n85,000\n\n90,000\n\n95,000\n\nNov-14 Mar-15 Jul-15 Nov-15 Mar-16 Jul-16 Nov-16 Mar-17 Jul-17 Nov-17 Mar-18 Jul-18 Nov-18 Mar-19 Jul-19 Nov-19 Mar-20 Jul-20 Nov-20\n\n**Month End**\n\n**Prison Population**\n\n2014 Central Scenario 2013 Scenario 1 2013 Scenario 2 2013 Scenario 3\n\n13", - "page_start": 14, - "page_end": 14, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "[s.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-2](https://www.reuters.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-21)\n\n[1). Reuters. 21 May 2024. Retrieved 23 May 2024.](https://www.reuters.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-21)\n\n[318. \"Frontier AI Safety Commitments, AI Seoul Summit 2024\" (https://web.archive.org/web/2024](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[0523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024). gov.uk. 21 May](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[2024. Archived from the original (https://www.gov.uk/government/publications/frontier-ai-safe](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[ty-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-202](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[4) on 23 May 2024. Retrieved 23 May 2024.](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n319. Russell & Norvig 2021, p. 9.\n\n320. Copeland, J., ed. (2004). *The Essential Turing: the ideas that gave birth to the computer*\n\n*age* [. Oxford, England: Clarendon Press. ISBN 0-1982-5079-7.](https://en.wikipedia.org/wiki/Special:BookSources/0-1982-5079-7)\n\n[321. \"Google books ngram\" (https://books.google.com/ngrams/graph?content=electronic+brain&](https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[year_start=1930&year_end=2019&corpus=en-2019&smoothing=3). Archived (https://web.ar](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[chive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3) from the original](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\non 5 October 2024. Retrieved 5 October 2024.\n\n322. AI's immediate precursors: McCorduck (2004, pp. 51- 107), Crevier (1993, pp. 27- 32),\n\nRussell & Norvig (2021, pp. 8- 17), Moravec (1988, p. 3)\n\n[323. Turing's original publication of the Turing test in \"Computing machinery and intelligence\":](https://en.wikipedia.org/wiki/Computing_machinery_and_intelligence)\n\nTuring (1950) Historical influence and philosophical implications: Haugeland (1985, pp. 6-\n\n9), Crevier (1993, p. 24), McCorduck (2004, pp. 70- 71), Russell & Norvig (2021, pp. 2, 984)\n\n324. Crevier (1993), pp. 47- 49.\n\n325. Russell & Norvig (2003), p. 17.\n\n326. Russell & Norvig (2003), p. 18.\n\n327. Newquist (1994), pp. 86- 86.\n\n328. Simon (1965, p. 96) quoted in Crevier (1993, p. 109)\n\n329. Minsky (1967, p. 2) quoted in Crevier (1993, p. 109)\n\n330. Russell & Norvig (2021), p. 21.\n\n331. Lighthill (1973).", - "page_start": 47, - "page_end": 47, - "source_file": "wikipedia3.pdf" - }, - { - "text": "As of September 30, 2024 and December 31, 2023, the total outstanding balance of MyPower customer notes receivable,\n\nnet of allowance for expected credit losses, was $250 million and $266 million, respectively, of which $5 million was due in the\n\nnext 12 months. As of September 30, 2024 and December 31, 2023, the allowance for expected credit losses was $36 million.\n\n*Concentration of Risk*\n\n*Credit Risk*\n\nFinancial instruments that potentially subject us to a concentration of credit risk consist of cash, cash equivalents,\n\ninvestments, restricted cash, accounts receivable and other finance receivables. Our cash and investments balances are\n\nprimarily on deposit at high credit quality financial institutions or invested in highly rated, investment-grade securities. These\n\ndeposits are typically in excess of insured limits. As of September 30, 2024 and December 31, 2023, no entity represented 10%\n\nor more of our total receivables balance.\n\n*Supply Risk*\n\nWe are dependent on our suppliers, including single source suppliers, and the inability of these suppliers to deliver\n\nnecessary components of our products in a timely manner at prices, quality levels and volumes acceptable to us, or our inability\n\nto efficiently manage these components from these suppliers, could have a material adverse effect on our business, prospects,\n\nfinancial condition and operating results.\n\n*Warranties*\n\nAccrued warranty activity consisted of the following (in millions):\n\n**Three Months Ended September 30, Nine Months Ended September 30,**\n\n**2024 2023 2024 2023**\n\nAccrued warranty - beginning of period $ 5,795 $ 4,465 $ 5,152 $ 3,505\n\nWarranty costs incurred (380) (335) (1,048) (911)\n\nNet changes in liability for pre-existing warranties,\n\nincluding expirations and foreign exchange impact 231 15 295 426\n\nProvision for warranty 717 577 1,964 1,702\n\nAccrued warranty - end of period $ 6,363 $ 4,722 $ 6,363 $ 4,722\n\n*Recent Accounting Pronouncements*\n\n*Recently issued accounting pronouncements not yet adopted*\n\nIn November 2023, the Financial Accounting Standards Board (“FASB”) issued Accounting Standards Update (“ASU”)\n\nNo. 2023-07, Improvements to Reportable Segment Disclosures (Topic 280). This ASU updates reportable segment disclosure\n\nrequirements by requiring disclosures of significant reportable segment expenses that are regularly provided to the Chief\n\nOperating Decision Maker (“CODM”) and included within each reported measure of a segment's profit or loss. This ASU also\n\nrequires disclosure of the title and position of the individual identified as the CODM and an explanation of how the CODM\n\nuses the reported measures of a segment’s profit or loss in assessing segment performance and deciding how to allocate\n\nresources. The ASU is effective for annual periods beginning after December 15, 2023, and interim periods within fiscal years\n\nbeginning after December 15, 2024. Adoption of the ASU should be applied retrospectively to all prior periods presented in the\n\nfinancial statements. Early adoption is also permitted. This ASU will likely result in us including the additional required\n\ndisclosures when adopted. We are currently evaluating the provisions of this ASU and expect to adopt them for the year ending\n\nDecember 31, 2024.\n\n14", - "page_start": 18, - "page_end": 18, - "source_file": "tesla_form_10q.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**2014 Outlook**\n\n**Economic Growth Opportunities in Atlantic Canada**\n\nLarge economic projects, either proposed or underway in Atlantic Canada, are expected to drive economic and population growth. Highlights\n\nfrom the five largest projects are included below:\n\nv Continued progress on the $25 billion Irving Shipbuilding project is expected to generate growth in Nova Scotia in 2014, 2015 and beyond.\n\nPresently, Irving is investing approximately $350 million modernizing the Halifax Shipyard to begin cutting steel in 2015.\n\nv The $7.8 billion Muskrat Falls hydro project is driving strong economic growth in Newfoundland and Labrador (“NL”) and recently the\n\n$1.52 billion Maritime Link subsea cable designed to transport electricity from NL to Nova Scotia has been approved.\n\nv Shell Canada has been awarded the exploration rights for eight parcels offshore Nova Scotia and has committed to spending more than\n\n$1 billion exploring these parcels over the next six years.\n\nv BP Exploration Company Ltd (“BP”) was awarded another four deep water parcels for a total exploration spending commitment of nearly\n\n$1.1 billion over six years. This offshore oil activity has the potential for long‑term spending and employment opportunities in the region\n\ndepending on the results of the exploration activity over the coming years.\n\nv The proposed Energy East Pipeline Project is positive economic news for the Saint John, New Brunswick market.\n\nKillam’s Atlantic portfolio is also poised to benefit from the continued migration to urban centers, which is generating population growth in\n\nKillam’s core markets in Atlantic Canada.\n\n**Occupancy Gains Expected**\n\nKillam expects to see modest gains in occupancy levels in the first and second quarter of 2014 compared to 2013. These gains are expected from\n\nfurther expansion of marketing and leasing activities, including a focus on tenant retention. Killam expects to see continued positive results\n\nfrom its Ontario portfolio throughout the next year as the Company’s Ottawa properties acquired in 2012 and early 2013 have stabilized. Killam\n\nforecasts to operate these properties at an average vacancy rate of approximately 2%, consistent with market norms in this region. Furthermore,\n\nthe Company expects to continue to outperform CMHC in its core markets located in Atlantic Canada. Trending in the first quarter of 2014 has\n\nshown steady occupancy gains in all New Brunswick markets as well as PEI, more than offsetting a slight decrease in occupancy in Halifax. Rental\n\nrevenue growth is expected in the range of 1% ‑ 2% across the portfolio in 2014, given Ontario’s rental increases are capped at 0.8% for 2014 and\n\nmarket pressures from new supply in Killam’s core markets in Atlantic Canada.\n\n**Natural Gas Volatility**\n\nThe Company expects to see continued volatility in natural gas pricing in Nova Scotia and New Brunswick until additional pipeline capacity is built\n\nto alleviate supply constraints in Atlantic Canada and the Northeastern US, bringing pricing more in‑line with other areas of North America. In\n\nthe short‑term, Management will continue to manage properties to maximize energy efficiencies. In addition, where dual‑fired heating systems\n\nexist, the Company will switch to oil when the economics support the change and will explore investing in increasing the base of dual‑fired\n\nsystems.\n\n**Acquisition Activity With a Focus in Ontario and Two New Developments Underway**\n\nThe Company expects to purchase a minimum of $75 million in assets in 2014. The concentration of acquisition activity is expected to take place\n\nin Ontario, in‑line with the Company’s long‑term strategic goal of increasing NOI generated from outside of Atlantic Canada to 50%. Killam also\n\nhas two new development projects underway, including a two building 101‑unit complex located in St. John’s, expected to be completed in Q3", - "page_start": 27, - "page_end": 27, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "news2.pdf", - "query": "How flooding was prevented in Vancouver? ", - "target_page": 1, - "target_passage": "In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown’s east side, an area historically prone to flooding. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online\n\nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn\n\ntips to reduce the risk of flooding around their properties. The portal launched in the summer of\n\n2023 and was viewed 27,000 times in its first year.\n\nRebate programs are a powerful motivation for homeowners to make upgrades that might\n\notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of\n\neligible material and labour costs, up to a maximum of $1,000. More than 90 properties\n\ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and\n\nwater monitors and alarms, to better prepare them for extreme weather events.\n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg.\n\n−\n\n+\n\n+\n\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.\n\nMENU SEARCH [ARTICLES](https://www.newscanada.com/en/articles/content) [RADIO](https://www.newscanada.com/en/radio/content) [VIDEO](https://www.newscanada.com/en/digital-content/content)\n\nEN", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "about challenging our comfort-zone . (ID4, EDSS: 0)\n\nThe natural environment was also described as taking focus\n\naway from MS symptoms. Cold, rainy or snowy weather\n\nconditions required planning of adequate clothing; in addition,\n\nthese conditions led some participants to use cautious behavior\n\nwhen the ground was slippery and led a few to omit sessions.\n\nHowever, mastering outdoor exercise was highlighted in positive\n\nterms, such as discovering new ways to become active.\n\n3.4 Professional leadership, tailoring and\n\nco-creation of enjoyment\n\nThe way the physiotherapists led the group and, in particular,\n\ninteracted with each participant were regarded as helpful for\n\nimproving their bodily functions and activity levels. Some\n\nparticipants reported being afraid to try out new activities or\n\ntraining at high intensities after being diagnosed with MS but felt\n\nsafe to explore when supervised by the physiotherapist because of\n\ntheir trust in the relationship between them and in the\n\nphysiotherapist ’ s professional knowledge.\n\nHow the physiotherapist approached the participants\n\nindividually was described as important from this perspective. In\n\nparticular, bodily interactions in which the physiotherapist\n\ndemonstrated with his or her own body or placed his or her\n\nhands on the participant ’ s body to correct a movement were\n\nreported to be successful, as it helped to increase speed and gave\n\nparticipants a sense of performing better or for a longer duration.\n\nIf they did an exercise in a suboptimal way, participants reported\n\nreceiving precise supervision, or if they expressed pain or were\n\ninjured, the physiotherapist was supportive, assessed them and\n\nDahl et al. [10.3389/fresc.2024.1303094](https://doi.org/10.3389/fresc.2024.1303094)\n\n[Frontiers in Rehabilitation Sciences](https://www.frontiersin.org/journals/rehabilitation-sciences) 07 [frontiersin.org](https://www.frontiersin.org/)", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed13.pdf" - }, - { - "text": "participants ’ experiences, following a phenomenological approach.\n\nThe interviewer asked for both negative and positive experiences\n\nTABLE 4 Interview guide.\n\n| Theme | Potential questions |\n|:---|:---|\n| Overall experiences and re fl ections from participation | Generally, what are your main experiences of participation? |\n| Overall experiences and re fl ections from participation | What did you perceive as meaningful? |\n| Overall experiences and re fl ections from participation | What did you perceive as negative? |\n| Content | How did you experience: |\n| Content | - The content of the sessions in general - The high-intensity walking/running - The speci fi c exercises - The combination of speci fi c exercises and intervals of running/walking - The exercise intensity |\n| Content | How did you respond to the exercises? How did you experience getting tired? |\n| Content | How do you perceive your speci fi c movement impairments (if any) being addressed? |\n| Content | Please elaborate on situations where you experienced the feeling of mastery/failure. |\n| Content | If anything: What was challenging? What would you prefer to have been done differently? What did you enjoy? |\n| Content | What was the value of participating in the indoor exercise group beforehand? |\n| Content | How did you experience this kind of exercise intervention compared to other type of exercise you may have experience with? |\n| The role of the physiotherapists | What did the physiotherapists do? What was the value of this to you? |\n| The group setting | How did you experience the group setting? |\n| The group setting | How did you perceive the atmosphere in the group? |\n| The outdoor environment | How was it to exercise outdoors? |\n| The outdoor environment | How did you perceive the city park environment for exercise? |\n| Closing questions | Are there any experiences from participation that you would like to elaborate on? Is anything related to this project that we have not talked about that you would like to say? |\n| Closing questions | How did you experience this interview? |\n\nOverall participants were asked to describe situations to exemplify their answers,\n\nand follow-up questions were used to capture in-depth re fl ections, for example,\n\nWhat was positive/negative?, How did it feel?, What do you think of that?, What\n\ndoes it mean to you?, Can you elaborate on that? .\n\nTABLE 3 Participant demographic information.\n\n| Variable | Total ( n = 15) |\n|:---|:---|\n| Age in years | Mean 47.6 (SD 6.04) |\n| Gender (women/men) | 12 woman/3 men (80%/20%) |\n| Type of MS | Relapsing remitting 15 (100%) |\n| EDSS | Mean 1.8 (SD 0.9) |\n| Years since diagnosis | Mean 10.4 (SD 7.8) |\n| Participation in the outdoor group | Mean 4.6 sessions/total mean attendance 57.3% |\n\nDahl et al. [10.3389/fresc.2024.1303094](https://doi.org/10.3389/fresc.2024.1303094)\n\n[Frontiers in Rehabilitation Sciences](https://www.frontiersin.org/journals/rehabilitation-sciences) 04 [frontiersin.org](https://www.frontiersin.org/)", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" - }, - { - "text": "Ice on the Saône, 2012\n\nPanorama of the inner city of Lyon, taken from the basilica of Notre-Dame de Fourvière's roof\n\n[Lyon has a humid subtropical climate (Köppen: ](https://en.wikipedia.org/wiki/K%C3%B6ppen_climate_classification) *Cfa* [), bordering an oceanic climate](https://en.wikipedia.org/wiki/Oceanic_climate)\n\n( *Köppen* : *Cfb* [, Trewartha: ](https://en.wikipedia.org/wiki/Trewartha_climate_classification) *Do* ). <sup>[38]</sup> The mean temperature in Lyon in the coldest month\n\nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F).\n\nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter\n\nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13\n\nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22\n\nDecember 1938. <sup>[39]</sup>\n\n#### **Climate**", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia4.pdf" - }, - { - "text": "**Proved Reserve Growth**\n\nBcfe at end of year **Production Growth**\n\nAverage mmcfe per day for year **Total Resource Base Growth** <sup>*</sup>\n\nBcfe at end of year\n\n* Proved and unrisked, unproved reserves\n\n**FIVE-YEAR PERFORMANCE**\n\nAs of December 31\n\nCHK 2010 Peer Group <sup>(1)</sup> S&P 500\n\n**TEN-YEAR PERFORMANCE**\n\nAs of December 31\n\nCHK 2010 Peer Group <sup>(1)</sup> S&P 500\n\n20,000\n\n40,000\n\n60,000\n\n100,000\n\n80,000\n\n120,000\n\n0\n\n500\n\n1,000\n\n1,500\n\n2,000\n\n2,500\n\n3,000\n\n0\n\n500\n\n1000\n\n1500\n\n2000\n\n2500\n\n3000\n\n0\n\n5000\n\n10000\n\n15000\n\n20000\n\n0\n\n20000\n\n40000\n\n60000\n\n80000\n\n100000\n\n120000\n\n00 01 02 03 04 05 06 07 08 09 10 0\n\n5,000\n\n10,000\n\n15,000\n\n20,000\n\n00 01 02 03 04 05 06 07 08 09 10 0 00 01 02 03 04 05 06 07 08 09 10\n\n20,000\n\n40,000\n\n60,000\n\n100,000\n\n80,000\n\n120,000\n\n0\n\n500\n\n1,000\n\n1,500\n\n2,000\n\n2,500\n\n3,000\n\n0\n\n500\n\n1000\n\n1500\n\n2000\n\n2500\n\n3000\n\n0\n\n5000\n\n10000\n\n15000\n\n20000\n\n0\n\n20000\n\n40000\n\n60000\n\n80000\n\n100000\n\n120000\n\n00 01 02 03 04 05 06 07 08 09 10 0\n\n5,000\n\n10,000\n\n15,000\n\n20,000\n\n00 01 02 03 04 05 06 07 08 09 10 0 00 01 02 03 04 05 06 07 08 09 10\n\n50,000\n\n100,000\n\n150,000\n\n250,000\n\n200,000\n\n300,000\n\n0\n\n5000\n\n10000\n\n15000\n\n20000\n\n0\n\n50000\n\n100000\n\n150000\n\n200000\n\n250000\n\n300000\n\n00 01 02 03 04 05 06 07 08 09 10 0\n\n5,000\n\n10,000\n\n15,000\n\n20,000\n\n00 01 02 03 04 05 06 07 08 09 10 0 00 01 02 03 04 05 06 07 08 09 10\n\n0\n\n10\n\n20\n\n30\n\n40\n\n50\n\n60\n\n70\n\n80\n\n0\n\n5\n\n10\n\n15\n\n20\n\n$ 0\n\n$ 10\n\n$ 20\n\n$ 30\n\n$ 40\n\n$ 50\n\n$ 60\n\n$ 70\n\nDEC 00 DEC 01 DEC 02 DEC 03 DEC 04 DEC 05 DEC 06 DEC 07 DEC 08 DEC 09 DEC 10\n\nCHK Stock Price\n\n$ 0\n\n$ 2.50\n\n$ 5.00\n\n$ 7.50\n\n$ 10.00\n\n$ 12.50\n\n$ 15.00\n\n$ 17.50\n\n$/mcf\n\n**Chesapeake’s Stock Price** Chesapeake’s Stock Price at Month End Henry Hub Natural Gas Spot Price at Month End\n\n(1)\n\n\u0007 The 2010 peer group is comprised of Anadarko Petroleum Corp., Apache Corp., Devon Energy Corp., Encana Corp. and EOG Resources, Inc.\n\nXTO Energy, Inc. was not included in the 2010 peer group due to its acquisition by Exxon Mobil Corp.\n\n**Chesapeake’s Five-Year and Ten-Year Common Stock Performance**\n\nThe graphs below compare the performance of our common stock to the S&P 500 Stock Index and a group of peer companies for the past five and 10 years.\n\nThe graph on the left assumes an investment of $100 on December 31, 2004 and the reinvestment of all dividends. The graph on the right assumes an invest­\n\nment of $100 on December 31, 1999 and the reinvestment of all dividends. The graphs show the value of the investment at the end of each year.\n\n$ 0\n\n$ 100\n\n$ 200\n\n$ 300\n\n$ 400\n\n$ 500\n\n400\n\n500\n\n00 02 04 06 08 01 03 05 07 09 10\n\n400\n\n500\n\n$ 0\n\n$ 30\n\n$ 60\n\n$ 90\n\n$ 120\n\n$ 150\n\n120\n\n150\n\n120\n\n150\n\n05 06 07 08 09 10\n\n2010 ANNUAL REPORT | **3**", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**21.** —(1) Workers engaged in essential or emergency works—\n\n(a) related to water supplies and sewerage services; and\n\n(b) carried out by, for, or on behalf of a water undertaker, sewerage undertaker, water supply\n\nlicensee, sewerage licensee or local authority,\n\nwhere they have travelled to the United Kingdom in the course of their work.\n\n(2) For the purposes of sub-paragraph (1)—\n\n(a) “essential or emergency works” includes—\n\n(i) inspections, maintenance, repairs, and asset replacement activities,\n\n(ii) monitoring, sampling and analysis of water supplies under the Private Water\n\nSupplies (England) Regulations 2016( **a** ), the Water Supply (Water Quality)\n\nRegulations 2016( **b** ), the Private Water Supplies (Wales) Regulations 2017( **c** ), or the\n\nWater Supply (Water Quality) Regulations 2018( **d** );\n\n(b) “sewerage licensee” means the holder of a sewerage licence under section 17BA of the\n\nWater Industry Act 1991( **e** );\n\n(c) “sewerage services” has the meaning given in section 219(1) of the Water Industry Act\n\n1991( **f** );\n\n(d) “water supply licensee” has the meaning given in sections 17A(7) and 219(1) of the\n\nWater Industry Act 1991( **g** ).\n\n**22.** —(1) Workers engaged in essential or emergency works relating to flood and coastal erosion\n\nrisk management on behalf of—\n\n(a) the Environment Agency; or\n\n(b) a lead local flood authority in England.\n\n(2) For the purposes of sub-paragraph (1)—\n\n(a) “flood” and “coastal erosion” have the meanings given in section 1 of the Flood and\n\nWater Management Act 2010( **h** );\n\n(b) “lead local flood authority” has the meaning given in section 6(7) of that Act;\n\n(c) “risk management” has the meaning given in section 3 of that Act( **i** ).\n\n**23.** —(1) Workers engaged in essential or emergency works—\n\n(a) related to—\n\n(i) a generating station,\n\n(ii) an electricity interconnector,\n\n(iii) a district heat network as defined in regulation 2 of the Heat Network (Metering and\n\nBilling) Regulations 2014( **j** ),\n\n(iv) communal heating as defined in regulation 2 of the Heat Network (Metering and\n\nBilling) Regulations 2014,\n\n(v) automated ballast cleaning and track re-laying systems on a network, or\n\n(vi) the commissioning, maintenance and repair of industrial machinery for use on a\n\nnetwork; or\n\n( **a** ) S.I. 2016/618; relevant amending instruments are S.I. 2017/506, 2018/707 and 2019/558.\n\n( **b** ) S.I. 2016/614; relevant amending instruments are S.I. 2017/506, 2018/706 and 378, 2019/526 and 558.\n\n( **c** ) S.I. 2017/1041 (W. 270), as amended by S.I. 2018/647 (W. 121), S.I. 2019/460 (W. 110) and S.I. 2019/463 (W. 111).\n\n( **d** ) S.I. 2018/647 (W. 121), as amended by S.I. 2019/463 (W. 111).\n\n( **e** ) 1991 c. 56. Section 17BA(6) was inserted by section 4(1) of the Water Act 2014 (c. 21). The reference to “sewerage\n\nlicensee” was inserted in section 219(1) by paragraph 120(2)(f) of Schedule 7 to the Water Act 2014.\n\n( **f** ) The definition of “sewerage services” was amended by paragraph 120 of Schedule 7 to the Water Act 2014.\n\n( **g** ) Section 17A was inserted by section 1 of the Water Act 2014.\n\n( **h** ) 2010 c. 29.\n\n( **i** ) And see section 2 of the Flood and Water Management Act 2010 for the meaning of “risk”.\n\n( **j** ) S.I. 2014/3120. There are no relevant amending instruments.", - "page_start": 39, - "page_end": 39, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "**7** In the present study, processing errors in the input data for one ensemble member, the\n\nHadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the\n\nHCVI are, therefore, not presented here.\n\n### (d) Freshwater resources: run-off\n\nImpacts on freshwater were assessed with a version of the JULES land surface model [ 24 , 25 ], a\n\ncoupled ecosystem- hydrology- surface exchange model which simulates land-atmosphere fluxes\n\nof water, energy and carbon in an internally consistent way, typically applied at global scales.\n\nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System\n\nModels [ 26 , 27 ] and have been used to assess impacts of climate change on global terrestrial\n\necosystems and hydrology [ 28 - 30 ] within such models. JULES can also be used outside of the\n\nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of\n\na wider range of climate projections [ 6 , 8 ]. Here we use a new, higher-resolution configuration of\n\nJULES on a global grid of 0.5° resolution [ 31 ].\n\nIt has been noted that hydrological impacts models driven by climate-change projections\n\nfrom climate models tend to give more severe drying than simulated in the climate models\n\nthemselves [ 32 - 34 ]. This is largely attributed to the inclusion of plant stomatal closure in\n\nresponse to elevated CO 2 in the climate model land surface schemes, which generally reduces\n\nevapotranspiration relative to climate projections without this process and hence further increases\n\nrun-off/streamflow or ameliorates decreases [ 34 ]. This process is often omitted from standard\n\nhydrological models. Plant physiological responses to CO 2 are included in the JULES model, so\n\nour projections of changes in run-off here do account for this process.\n\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to\n\nthe effects of climate change and CO 2 rise on precipitation, evaporation and transpiration. We\n\nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to\n\npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for\n\nthe lowest 10% of time).\n\n### (e) Correctingbiasesinclimatemodeloutputandimplicationsfordefininglevelsofglobal\n\nwarming\n\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed\n\nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there\n\nwere some differences in how these data were applied, with different approaches to the treatment\n\nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered\n\nimportant to assess changes in the raw climate model output, because this directly represents\n\nthe behaviour of the model itself. The main focus was on the changes relative to the present-\n\nday baseline climate, defined as 1981- 2010, with absolute values in either the baseline or the\n\nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off\n\nanalyses, however, it was considered important to correct for systematic biases in the climate\n\nmodel output, because these can lead to unrealistic representations of the key quantities in the\n\npresent-day simulation [ 35 ]. A bias-correction methodology was, therefore, applied for these two\n\nparts of the analysis, whereby the model output was adjusted to make it consistent with an\n\nobserved climatology [ 36 ]. We used a multi-segment statistical bias-correction methodology for\n\nprecipitation [ 37 ], and a modification of this for other variables [ 37 ].\n\nThis difference in approach led to inconsistencies in the definitions of the dates of GWLs\n\nin the two parts of the study. In the extremes analysis using raw model output, the dates of\n\npassing GWLs were defined on the basis of the global mean temperatures in the driving CMIP5", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" - }, - { - "text": "###### CHAPTER 10:\n\nLANGUAGE SKILLS AT WORK HOW TO WRITE A COVER LETTER\n\nIf you’ve ever applied for a job, you’ll know that writing\n\nthe cover letter is the most difficult part of almost any job\n\napplication. Your cover letter creates the first impression, and\n\noften determines whether an employer will even look at your CV.\n\nYou need to use this opportunity to introduce yourself and your\n\nskills, and to set yourself apart from all the other candidates.\n\nYou can also use this opportunity to explain any gaps in your CV,\n\nand to motivate why you are the right person for the job.\n\ntips tips tips tips tips tips tips tips tips tips tips tips tips", - "page_start": 44, - "page_end": 44, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "**Figure 1.** Changes of global temperature of 20 years moving average from 2020 to 2099 simulated by 5 ESMs under 4 RCP scenarios. Note: The black horizontal dashed lines: global warming by 1.5 °C and 2.0 °C; the black vertical solid line: the years when global warming reaches 1.5 °C and 2.0 °C simulated by the selected models and scenarios.", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" - }, - { - "text": "threaten their conservation status. To support this, data collection on by-catch for all sensitive species needs to be stepped up.\n\nIn addition, **fisheries-management measures** must be established in all marine protected areas according to clearly defined conservation objectives and on the basis of the best available scientific advice.\n\n#### *2.2.7.* *Restoring freshwater ecosystems*\n\nThe EU’s legal framework on water is ambitious but implementation is lagging behind and enforcement must be stepped up <sup>46</sup> . Greater efforts are needed to **restore freshwater ecosystems and the natural functions of rivers** in order to achieve the objectives of the Water Framework Directive. This can be done by removing or adjusting barriers that prevent the passage of migrating fish and improving the flow of water and sediments. To help make this a reality, **at least 25,000 km of rivers will be restored into free-flowing rivers by 2030** <sup>47</sup> through the removal of primarily obsolete barriers and the restoration of floodplains and wetlands. Technical guidance and support to the Member States to identify sites and help mobilise funding will be provided by the Commission in 2021, in consultation with all relevant authorities <sup>48</sup> . Member State authorities should review water abstraction and impoundment permits to implement ecological flows in order to achieve good status or potential of all surface waters and good status of all groundwater by 2027 at the latest, as required by the Water Framework Directive <sup>49</sup> . To that effect, the Commission will provide technical support to Member States on their measures by 2023.\n\nOverall, large-scale river and floodplain restoration investments <sup>50</sup> can provide a major economic boost for the restoration sector and for local socioeconomic activities such as tourism and recreation. At the same time, these investments can improve water regulation, flood protection, nursery habitats for fish, and the removal of nutrient pollution.\n\n#### *2.2.8.* *Greening urban and peri-urban areas*\n\n**Green urban spaces** , from parks and gardens to green roofs and urban farms, provide a wide range of benefits for people. They also provide opportunities for businesses and a refuge for nature. They reduce air, water and noise pollution, provide protection from flooding, droughts and heat waves, and maintain a connection between humans and nature <sup>51</sup> .\n\nThe recent lockdowns due to the COVID-19 pandemic have shown us the **value of green urban spaces for our physical and mental wellbeing** . While protection of some urban\n\n46 [Fitness Check of the EU Water Legislation](https://ec.europa.eu/environment/water/fitness_check_of_the_eu_water_legislation/documents/Water%20Fitness%20Check%20-%20SWD(2019)439%20-%20web.pdf) (SWD(2019) 439); [Evaluation of the Urban Waste Water ](https://ec.europa.eu/environment/water/water-urbanwaste/pdf/UWWTD%20Evaluation%20SWD%20448-701%20web.pdf) [Treatment Directive](https://ec.europa.eu/environment/water/water-urbanwaste/pdf/UWWTD%20Evaluation%20SWD%20448-701%20web.pdf) (SWD(2019) 700). 47 The target of 25,000 km is based on the Commission’s assessment of what is achievable in the EU by 2030. 48 The guidelines will take a wide range of issues into account, including hydropower generation, flood management, water supply, agriculture and navigability. 49 These measures should be planned in the 3 rd River Basin Management Plans to be adopted by Member States in 2021, under the Water Framework Directive. [Fitness Check of the EU Water Legislation](https://ec.europa.eu/environment/water/fitness_check_of_the_eu_water_legislation/documents/Water%20Fitness%20Check%20-%20SWD(2019)439%20-%20web.pdf) (SWD(2019) 439). [EnRoute project.](https://oppla.eu/groups/enroute/publications-and-deliverables)", - "page_start": 12, - "page_end": 12, - "source_file": "legal5_eubiodiversity_cc4.pdf" - } - ] - }, - { - "references": { - "source_file": "news2.pdf", - "query": "How can citizens in Fredericton easily access flood risk data?", - "target_page": 1, - "target_passage": "New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online\n\nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn\n\ntips to reduce the risk of flooding around their properties. The portal launched in the summer of\n\n2023 and was viewed 27,000 times in its first year.\n\nRebate programs are a powerful motivation for homeowners to make upgrades that might\n\notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of\n\neligible material and labour costs, up to a maximum of $1,000. More than 90 properties\n\ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and\n\nwater monitors and alarms, to better prepare them for extreme weather events.\n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg.\n\n−\n\n+\n\n+\n\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.\n\nMENU SEARCH [ARTICLES](https://www.newscanada.com/en/articles/content) [RADIO](https://www.newscanada.com/en/radio/content) [VIDEO](https://www.newscanada.com/en/digital-content/content)\n\nEN", - "page_start": 0, - "page_end": 0, - "source_file": "news2.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**Investment in the Urban Centres of New Brunswick and PEI**\n\n26% of Killam’s apartment NOI is currently generated in New Brunswick, split principally between the province’s three major urban centres,\n\nFredericton, Moncton and Saint John. Fredericton and Moncton both experienced high population growth over the last number of years,\n\nposting 9.3% and 8.7% growth, respectively, between the 2006 and 2011 Census periods. Fredericton is the provincial capital and home to\n\nthe province’s largest university. Moncton is the largest city and a transportation and distribution hub for Atlantic Canada. Population growth\n\nin Moncton in recent years has been driven by urbanization from French communities in Northern New Brunswick. The Saint John market,\n\nrepresenting 5.6% of Killam’s apartment NOI, is focused on industry and energy. After strong energy investments in the city in the mid‑2000s,\n\nthe city has seen a reduction in economic projects over the last three years. Home to Irving Oil’s refinery operations, the proposed Energy East\n\nPipeline project to bring oil from Western Canada to refineries in Quebec and New Brunswick, has potential for strong economic growth for the\n\ncity and the province.\n\nKillam also has a 19% market share in Charlottetown, the capital and economic center of Prince Edward Island.\n\n**Expanding Ownership in Ontario**\n\nKillam’s apartment portfolio includes 1,359 apartment units in Ontario, up from 225 units three years ago, and includes properties in Ottawa,\n\nToronto, London and Cambridge. In addition to apartments, 42% of Killam’s MHC sites are located in Ontario. Killam is focused on increasing its\n\ngeographic diversification by acquiring more properties in Ontario.\n\n**A Diversified Portfolio of Apartment Properties**\n\nKillam’s apartment portfolio includes a variety of property types, including high‑rise (24% of units), mid‑rise with elevators (33%) , walk‑ups (41%)\n\nand a small number of townhouses (2%). The portfolio includes rents ranging from affordable to high‑end Class A properties. The average rent\n\nfor Killam’s apartment units at the end of 2013 was $915.\n\nThe average age of Killam’s apartment portfolio is 28 years. With a focus on both developing and acquiring newer properties, 23% of Killam’s\n\napartments are considered new (built after 2001), on a unit count basis. Compared to the national average of 7%, as per CMHC’s 2010 Housing\n\nObserver, Killam’s portfolio is considerably newer and should result in lower capital and maintenance costs for the foreseeable future. 43% of\n\nKillam’s NOI is generated from apartment units that are considered new, with 20% of the Company’s NOI generated from units built in the last\n\nfive years.\n\n**MHCs Compliment Killam’s Apartment Portfolio**\n\nWith MHCs, Killam owns the land and infrastructure supporting each community and leases the sites to the tenants, who own their own homes\n\nand pay Killam a monthly rent. In addition to site rent, the tenant may have a mortgage payment to a financial institution for their home. The\n\naverage site rent in Killam’s MHC portfolio was $222 per month, which offers value and affordability to tenants. The homeowner is responsible\n\nfor property taxes based on the assessed value of their home and Killam is responsible for the property tax on the land.\n\nMHCs require less recurring capital investment and deliver a more predictable and stable cash flow than apartments. MHC home owners are\n\nresponsible for the repair, maintenance and operating costs of their homes, which removes significant variable costs that are typically borne\n\nby Killam for apartments. The operating profit margin in Killam’s MHC business averaged 62.4% over the last two years, compared to 58.9% for\n\napartments.\n\nThe most significant costs to operate MHCs are water, land property tax and general repairs and maintenance to the water and sewer", - "page_start": 32, - "page_end": 32, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides\n\nthat those from (properly done) Open Data are a really tiny percentage of the total.\n\nThis is a consequence of the fact that data about us end up online from the most different sources\n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never\n\nmind *prove* , that they've been used against our interest. There have been concerns, for example, that\n\ninsurance companies may charge higher fees for life insurance to those among their customers\n\nwho... put online a family tree from which it shows that they come from families with an average\n\nlife expectancy lower than usual.\n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of\n\ndata, that weren't even published by any Public Administration? Of course, publishing online\n\ncomplete, official Census data of several generations, in a way that would make such automatic\n\nanalysis possible would be a totally different matter.\n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is\n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always\n\nremember and explain that:\n\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air\n\npollution measurements....)\n\n2. The majority of data that are directly related to individuals (e.g. things like names and\n\naddress of people with specific diseases, or who were victims of some crime) have no reason\n\nto be published, **nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to\n\npublic offices, Government and Parliament members etc...) already exist in many countries\n\n4. Very often, in practice, Open Data struggles only happen about *when and how* to make\n\navailable in the most effective way for society information that was *already* recognized as\n\npublic. *What* to declare public, hence open, is indeed a serious issue (more on this in the next\n\nparagraph) but is a separate one.\n\n### **3.8. Need to better define what is Public Data**\n\nTogether with citizens education, there is a huge challenge that Governments and the Open Data\n\nmovement will have to face (hopefully together) in 2011 and beyond. This challenge is to update\n\nand expand the definition of Public Data and to have it accepted by lawmakers and public\n\nadministrators.", - "page_start": 22, - "page_end": 22, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "What is, exactly, Public Data? A definition that is accepted almost implicitly is *\"data that is of*\n\n*public interest, that belongs to the whole community, data that every citizen is surely entitled to*\n\n*know and use\"* . This definition is so generic that accepting it together with the assumption that all\n\nsuch data should be open as preached by the Open Data movement (online, as soon as possible, in\n\nmachine readable format with an open license etc...) doesn't create any particular problem or\n\nconflict.\n\nReal problems however start as it has happened all too often so far, whenever we assume more or\n\nless consciously that \"Public Data\" in the sense defined above and data directly produced by\n\nGovernments and Public Administrations, that is what's normally called PSI (Public Sector\n\nInformation) are the same thing.\n\nThere is no doubt that Governments and Public Administrations produce huge quantities of Public\n\nData. But this is an age of privatization of many public services, from transportation to healthcare,\n\nenergy and water management. This is an age in which many activities with potentially very serious\n\nimpacts on whole communities, like processing of hazardous substances or toxic waste, happen\n\n*outside* Public Administrations. The paradox is that, as [Sasaki put it](http://informacioncivica.info/mexico/access-to-information/) , this increased privatization is\n\nhappening in the very same period in which *\" we are observing a worldwide diffusion of access to*\n\n*information laws that empower citizens to hold government agencies accountable.\"*\n\nIn such a context, \"Public Data\"is critical just because it is a much bigger set of data than what\n\nconstitutes traditional, official PSI. \"Public Data\" includes all that information *plus* the much bigger\n\namount of data describing and measuring all the activities of private companies, from bus\n\ntimetables to packaged food ingredients, aqueducts performances and composition of fumes\n\nreleased in the atmosphere, that have a *direct impact* on the health and rights of all citizens of the\n\ncommunities affected by the activities of those companies.\n\nAre such data \"Public\" today, in the sense defined at the beginning of this paragraph, that is\n\nsomething every citizen has the right to know without intermediaries or delegates, or not? Should\n\nthey be public? If yes, shouldn't law mandate that all such data be Open (that is, published online as\n\nsoon as possible, in machine readable format with an open license etc...) just like, for example, the\n\nbudget of some Ministry? Answering these questions may be one of the biggest challenges for the\n\nOpen Data community, and for society as a whole, in the next years.\n\nHere are, in order to facilitate reflection on this issue, a few recent, real world examples of \"Public\n\nData\" that are *not* PSI, and of the impacts of their lack of openness.", - "page_start": 23, - "page_end": 23, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "decisions. Ideally, this training should be provided at a local level with local programs, in a way that\n\nmakes it possible to use it on local issues, for the reasons and in the ways discussed in the next\n\nparagraph. For example, visualization techniques like those used by ABC News to show the effects\n\nof the [March 2011 Japan Earthquake](http://www.abc.net.au/news/events/japan-quake-2011/beforeafter.htm) , in which all the user has to do to compare scenes from before\n\nand after the earthquake is to move a slider, should be routinely used to explain proposals about\n\nurban planning, zoning and related topics.\n\n### **4.6. Focus on local, specific issues to raise interest for Open**\n\n**Data**\n\nConsidering the continuous evidence and concerns about scarce interest and preparation of citizens\n\nto use Open Data in their political, economic and professional decisions, one of the final\n\nrecommendations of the Open Data, Open Society report confirms its importance and needs to be\n\nrepeated: it is very effective, if not simply necessary if the goal is to generate a critical mass of\n\ncitizens that demand and use Open Data in the shortest possible time, to practice all the\n\nrecommendations of this report *at the local level* ,\n\nMost people encounter their local governments much more often then their national ones. When\n\nworking within a single city or region it is much easier to inform citizens, raise their interest and\n\ninvolve them, because they would be searching *local* solutions to improve *local* services and/or\n\nsave *local* money. There may also be much more opportunities to do so, especially in this period of\n\nfinancial crisis that will see substantial decreases both in credit by financial institutions and in\n\nsubsidies from central governments. Concreteness and, as they say in marketing, \"customer focus\"\n\nmust be the keys for local activists and public employees working on local Open Data:\n\n- work on specific issues and with precise objectives\n\n- focus on immediate usefulness\n\n- work on demand, on the *services* that people want. Required services define what data must\n\nbe open, not the contrary\n\nThis is the most effective, if not the only strategy, to solve one of the biggest debates in open data:\n\n*\"how do we get people to use the data that we publish?\"* . The right question, instead, is \"what data\n\ndo people want?\". Even if citizens don't realize yet that what they actually want is more Open Data,\n\nor that what they need can be done more quickly and cheaply by releasing some information in that\n\nway.\n\nA great example of what all this means is the [Great British Public Toilet Map](http://www.guardian.co.uk/technology/2011/mar/29/toilets-government-open-data) : a public participation", - "page_start": 30, - "page_end": 30, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n**Urbanization Leading to Population Growth in Killam’s Core Markets**\n\nThe urbanization trend is strong across Atlantic Canada, driving population growth in each of the core cities. The net change in population in\n\nKillam’s core markets, as measured by Statistics Canada in the 2011 Census, is shown in the following graph. Immigration is also contributing to\n\npopulation growth in the urban centres.\n\n4.7%\n\n8.8% 9.7%\n\n4.4%\n\n9.3% 8.7%\n\n0.0%\n\n2.0%\n\n4.0%\n\n6.0%\n\n8.0%\n\n10.0%\n\n12.0%\n\n‑\n\n50,000\n\n100,000\n\n150,000\n\n200,000\n\n250,000\n\n300,000\n\n350,000\n\n400,000\n\n450,000\n\nHalifax st. John's moncton saint John F redericton\n\n**47% of Killam’s Apartment NOI Generated in Halifax**\n\n47% of Killam’s 2013 apartment NOI was earned in Halifax. Killam’s investment in Halifax corresponds to the city’s rental unit base as a\n\npercentage of the rental units in Atlantic Canada, with Halifax rental units accounting for 46% of the total rental universe as measured by CMHC.\n\nHalifax is the largest city in the region and home to 17% of Atlantic Canadians. It is the economic hub of the region and attracts a diverse\n\npopulation base, both from rural areas of Nova Scotia and internationally. With six degree‑granting universities and three large community\n\ncollege campuses, Halifax is home to approximately 35,000 students per year, including 4,000 international students.\n\nHalifax’s employment base is well diversified, with jobs focused around retail and wholesale trade, health care, public administration and\n\neducation among the largest sectors. Halifax is home to the largest Canadian Forces Base by number of personnel in Canada and the Department\n\nof National Defence is the largest employer in the city.\n\nManagement expects population growth in Halifax to exceed recent growth levels due to large‑scale projects taking place in the region. Irving\n\nShipyard’s award of the $25 billion, 25‑year shipbuilding contract will have positive long‑term implications for Halifax and Atlantic Canada. The\n\ncontract is expected to generate an average of 8,500 direct and indirect jobs, and up to 11,500 jobs during its peak year in 2020. The shipyard\n\nis scheduled to begin to cut steel in 2015. In the meantime, Irving is working on $350 million in infrastructure upgrades to facilitate the work.\n\nInvestment in offshore energy in Nova Scotia is also projected to lead to future growth for both Halifax and Nova Scotia with $2 billion in\n\nexploration commitments awarded in the last two years.\n\nWith a diversified asset base of almost 5,000 centrally located apartment units in Halifax and 1,100 MHC sites in and around the city, Killam\n\nexpects to benefit from increased demand for housing that will come from economic and population growth.\n\n**Growing Investment in St. John’s**\n\nSt. John’s, NL has been transformed by offshore investments, with exceptionally strong economic growth in recent years. The strength of the oil\n\nbusiness has resulted in both a growing population base in the city and a 21% increase in the average home price over the last three years as per\n\nCMHC’s Fall 2013 Housing Market Outlook. The decrease in home affordability coupled with an absence of new rental unit construction for the\n\nlast twenty years, is generating strong demand for rental units in St. John’s.\n\nWith 813 apartment units in the city, Killam has a 22% market share of the rental product, as measured by CMHC, including a new 71‑unit\n\nproperty development which opened in 2013. The Company’s highest rental growth and NOI growth has been earned in St. John’s over the last\n\nfour years. Despite this, the current average rent for a two‑bedroom unit in St. John’s is $864 per CMHC, which is very affordable.", - "page_start": 31, - "page_end": 31, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "more concrete over time is damage control. In a world that produces digital data without\n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to\n\npredict, practically impossible to avoid and increasingly common. Opening public government data,\n\nthat is providing plenty of officially verified information, becomes therefore also a damage control\n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official\n\nOpen Public Data, individual citizens, political parties or other organizations will start to process\n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different\n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong\n\nconclusions. This is not some theoretical possibility far in the future, as this real world example\n\n(from a comment to an [Open Data discussion in an italian blog](http://www.cottica.net/2010/09/16/spaghetti-open-data-reloaded/) ) proves:\n\n\" *on the* *[non italian]* *Geonames website you can download geo-referenced data*\n\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n\n*that not one was right. What should be done in such cases?*\n\nFrom an Open Data perspective, all these recent stories have (at least) one thing in common: they\n\nsuggest that, considering its current needs and problems, current societies want and need more Open\n\nData than they already have.\n\n### **2.1. Wikileaks and the Open Data movement**\n\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published\n\nby Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence\n\nof a more or less conscious mixing of the two themes, because in a very general sense, both Open\n\nData and Wikileaks are about transparency, accountability and democracy.\n\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks\n\nscandal.\n\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and\n\ntransparency whenever government activities are concerned. Citizens must be able to know what\n\nthe state is *actually* doing but sometimes, be it for careful evaluation of all the alternatives or\n\nbecause of security, it must be possible to work behind closed doors, [at least temporarily](http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/) . We'll\n\ncome back to this point later in this report.\n\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness\n\nand transparency in politics, not only there are deep differences between the two ideas but, in our\n\n*5/34*", - "page_start": 4, - "page_end": 4, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "[with a project called \"Tales of Things\"](http://www.grist.org/article/2011-02-17-norways-facebook-killer-is-for-buses-only) to allow people to leave messages for each other (or just for\n\nthe world) at the bus stops. Scanning the QR code now allows people to see not just the bus\n\ntimetable, but also the notes other travelers have left on that stop, including *\"what's nearby, who's*\n\n*waiting for whom, what number can you call for a good time. It's a cross between bus stop*\n\n*Facebook and digital graffiti\"* , that happened thanks to the openness of the original bus stop data.\n\nThe [Social Life of Data Project](http://www.practicalparticipation.co.uk/odi/2011/05/new-project-the-social-life-of-data/) will study instead how particular datasets have been used, who used\n\nthem, how those people are connected and what conversations happen around Open Data.\n\n### **3.3. Legal issues remain crucial**\n\nProper licensing of Public data is essential. The more Open Data activities continue, the clearer this\n\nrule becomes. What distinguishes Open Data from \"mere\" transparency is reuse. Paraphrasing\n\nEaves, until a government get the licensing issue right, Open Data cannot bring all the possible\n\nbenefits in that country. If there are no guarantees that public data can be used without restriction,\n\nvery little happens in practice, and when it happens it may be something against the public interest.\n\nCanadian Company Public Engines Inc, that is paid by local police departments to collect, process\n\nand analyze official crime data, also publishes online, with a proprietary license, anonymized\n\nsummaries of those data. When in 2010 another company, Report See Inc, scraped those data from\n\ntheir website to reuse them, Public Engines sued.\n\nReporting this, D. Eaves [rightly points out](http://eaves.ca/2010/09/21/does-your-government-and-thus-you-actually-own-its-data/) that *both* companies are right: one is trying to protect its\n\ninvestment, the other is simply trying to reuse what IS public data, by getting it from the ONLY\n\nplace where it's available. This is what happens when public officials leave the ownership of *public*\n\ndata to the third parties hired to collect them. Please note that, in practice, it makes very little\n\ndifference whether those third parties are private, for-profit corporations or even other Public\n\nAdministrations. Unless, of course, there are national laws already in place that define in advance\n\nwhat is the license of all present and future Public Data, *no matter how they were generated and by*\n\n*whom* , those data can be lost in any moment for society. In all other cases, the legal status of data\n\nwill be either officially closed and locked, or uncertain enough to prevent most or all reuses. In\n\nFebruary 2011, the [news came](http://www.techdirt.com/articles/20110221/01191413180/privatization-public-data-sets-bad-precedent.shtml) that, even if they weren't the original copyright holders, Public\n\nEngines had been able to put together enough legal claims to convince Report See to give up.\n\nDisputes like this should not happen and would not happen if all contracts regarding collection and\n\nmanagement of PSI clearly specified that all the resulting data either go directly into the public\n\ndomain (after being anonymized if necessary, of course) or remain exclusive property of the", - "page_start": 12, - "page_end": 12, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "**Chart showing lag-to-treatment distribution (in absolute numbers) by year of first treatment presentation**\n\n#### The coverage of the DIP data\n\nThe DIP data will not capture all OCUs for several reasons.\n\ni) It is predicated on arrest or charge, so OCUs who do not commit crime will not be captured in the data. ii) Data are not available for all months in each year - data for 2013 are only available for the first 11 months of that year. iii) Its geographical coverage is not 100 per cent and varies across the period in question. iv) The data do not cover all ages. DIP tests are given to those aged 18 and over only (and we excluded those over 60 for various reasons). iv) Other factors, like data-entry error. In particular, the exclusion of those without an entry on the Police National Computer (PNC) will affect DIP coverage.\n\nThis section tries to assess the seriousness of these issues when interpreting the DIP data and drawing conclusions. Regarding the first and fourth points, it is clear that the DIP data presented in this report are only informative about a subset of OCUs, those who commit crime and are aged between 18 and 59, and all inferences from the data must reflect this. Point ii) has been dealt with throughout the paper by adjusting 2013 figures in a linear fashion to account for the missing month. This also needs to be borne in mind when interpreting the findings.\n\nThe impact of point iii) is perhaps the largest potentially and also the most important in terms of validation of conclusions, hence we explore its effect further here, along with point v).", - "page_start": 32, - "page_end": 32, - "source_file": "legal2_opengouvernementlicense.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nAUDIT CORPORATE\n\nGOVERNANCE\n\nNOMINATING HUMAN\n\nRESOURCES\n\nEXECUTIVE FINANCE PENSION\n\nCHAIR MEMBER **BOARD OF DIRECTORS AND ITS COMMITTEES**\n\nAS OF FEBRUARY 11, 2014\n\nAlan D. Horn\n\nJohn A. MacDonald\n\nIsabelle Marcoux\n\nThomas I. Hull\n\nPeter C. Godsoe, O.C., O. Ont.\n\nC. William D. Birchall\n\nStephen A. Burch\n\nJohn H. Clappison, FCPA, FCA\n\nGuy Laurence\n\nPhilip B. Lind, CM\n\nThe Hon. David R. Peterson, PC, QC\n\nEdward S. Rogers\n\nLoretta A. Rogers\n\nMartha L. Rogers\n\nMelinda M. Rogers\n\nDr. Charles Sirois\n\nJohn H. Tory, O. Ont.\n\n, CPA, CA\n\nRISK MANAGEMENT\n\nWe are committed to continually strengthening our risk management\n\ncapabilities to protect and enhance shareholder value. The purpose of\n\nrisk management is not to eliminate risk but to optimize trade-offs\n\nbetween risk and return to maximize value to the organization.\n\n####### **Risk Governance**\n\nThe Board has overall responsibility for risk governance and oversees\n\nmanagement in identifying the principal risks we face in our business\n\nand implementing appropriate risk assessment processes to manage\n\nthese risks. It delegates certain duties to the Audit Committee.\n\nThe Audit Committee discusses risk policies with management and the\n\nBoard, and assists the Board in overseeing our compliance with legal\n\nand regulatory requirements.\n\nThe Audit Committee also reviews:\n\n- the adequacy of the internal controls that have been adopted to\n\nsafeguard assets from loss and unauthorized use, to prevent, deter\n\nand detect fraud and to verify the accuracy of the financial records\n\n- the processes for identifying, assessing and managing risks\n\n- our exposure to major risks and trends and management’s\n\nimplementation of risk policies and procedures to monitor and\n\ncontrol these exposures\n\n- our business continuity and disaster recovery plans\n\n- any special audit steps adopted due to material weaknesses or\n\nsignificant deficiencies that may be identified\n\n- other risk management matters from time to time as determined by\n\nthe Committee or directed by the Board.\n\n####### **Enterprise Risk Management**\n\nOur Enterprise Risk Management program seeks to ensure we identify,\n\nassess, manage, monitor and communicate risk consistently throughout\n\nthe company and that we manage risk in a way that supports our\n\nstrategic and business goals. This program supports the Audit\n\nCommittee and the Board’s responsibility for risk by facilitating a formal\n\nstrategic risk assessment process.\n\nWe carry out an annual strategic risk assessment to identify our\n\nprincipal risks and their potential impact on our ability to achieve our\n\nstrategic plans. This assessment includes reviewing risk reports, audit\n\nreports and industry benchmarks, and interviewing key risk owners. We\n\nalso conduct a formal survey every two years to get management\n\nfeedback on the key risks facing the organization and identify emerging\n\nrisks. Then we prioritize the risks using standard risk assessment criteria.\n\nEnterprise Risk Management reports the results of the strategic risk\n\nassessment to the Executive Leadership Team and the Audit Committee.\n\nThe Executive Leadership Team is responsible for approving our\n\nenterprise risk policies and for identifying and assessing the key risks\n\nthat affect our ability to meet our corporate objectives. It is also\n\nresponsible for monitoring these key risks and our action plans to\n\nmitigate these risks.\n\nManagement develops risk management plans. They are responsible for\n\nidentifying, assessing, managing and monitoring risks in the business\n\nunits impacting our strategic and business plans, and reporting to the\n\nExecutive Leadership Team and Enterprise Risk Management.\n\n72 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 75, - "page_end": 75, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed2.pdf", - "query": "In these mice, which lumbar levels were the dorsal root ganglion removed from?", - "target_page": 3, - "target_passage": "L3 to L5 DRGs were removed and postfixed for another 2 hours", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "objective quantitative assessment of neuron death after peripheral nerve\n\ninjury. Exp Neurol 2007;203:22- 33.\n\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after\n\nupper limb nerve injury and protective effect of repair: clinical evaluation\n\nusing volumetric magnetic resonance imaging of dorsal root ganglia.\n\nNeurosurgery 2013;73:632- 40.\n\n[67] West SJ, Bonboire D, Bennett DL. StereoMate: 3D stereological\n\nautomated analysis of biological structures. bioRxiv 2020:648337.\n\n[68] Wiberg R, Novikova LN, Kingham PJ. Evaluation of apoptotic pathways in\n\ndorsal root ganglion neurons following peripheral nerve injury.\n\nNeuroreport 2018;29:779- 85.\n\n[69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum\n\nAI. Dorsal root ganglion macrophages contribute to both the initiation and\n\npersistence of neuropathic pain. Nat Commun 2020;11:264.\n\n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia\n\ngelatinosa mediate interaction of signals from primary afferents. J Physiol\n\n2010;588:2065- 75.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "0.001; n 5 310 to 427 neurons from 3 mice. * P , 0.05,**\nP , 0.01, *** P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green\n\nfluorescent protein.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" - }, - { - "text": "Monoranu CM, Bohnert M, Pham M, Antoniadis G, Blum R, Rittner HL.\n\nHuman dorsal root ganglia after plexus injury: either preservation or loss of\n\nthe multicellular unit. bioRxiv 2023.02.06.526934.\n\n[49] Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, Blum R, Aue\n\nA. Unbiased analysis of the dorsal root ganglion after peripheral nerve\n\ninjury: no neuronal loss, no gliosis, but satellite glial cell plasticity. PAIN\n\n2023;164:728- 40.\n\n[50] Shi TJS, Tandrup T, Bergman E, Xu ZQD, Ulfhake B, H ¨okfelt T. Effect of\n\nperipheral nerve injury on dorsal root ganglion neurons in the C57 BL/6J\n\nmouse: marked changes both in cell numbers and neuropeptide\n\nexpression. Neuroscience 2001;105:249- 63.\n\n[51] Song H, Yao E, Lin C, Gacayan R, Chen MH, Chuang PT. Functional\n\ncharacterization of pulmonary neuroendocrine cells in lung development,\n\ninjury, and tumorigenesis. Proc Natl Acad Sci 2012;109:17531- 6.\n\n[52] Takasu K, Sakai A, Hanawa H, Shimada T, Suzuki H. Overexpression of\n\nGDNF in the uninjured DRG exerts analgesic effects on neuropathic pain\n\nfollowing segmental spinal nerve ligation in mice. J Pain 2011;12:\n\n1130- 1139.\n\n[53] Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root\n\nganglion cells after transection of the rat sciatic nerve. J Comp Neurol\n\n2000;422:172- 80.\n\n[54] Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons:\n\ndiagnosis and prevention. J Hand Surg Eur Vol 2011;36:730- 4.\n\n[55] Usoskin D, Furlan A, Islam S, Abdo H, Lonnerberg P, Lou D, Hjerling-\n\nLeffler J, Haeggstrom J, Kharchenko O, Kharchenko PV, Linnarsson S,\n\nErnfors P. Unbiased classification of sensory neuron types by large-scale\n\nsingle-cell RNA sequencing. Nat Neurosci 2015;18:145- 53.\n\n[56] Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent axotomy on\n\nnumber and volume of dorsal root ganglion cell bodies. J Comp Neurol\n\n1997;388:307- 12.\n\n[57] Wall PD, Gutnick M. Properties of afferent nerve impulses originating from\n\na neuroma. Nature 1974;248:740- 43.\n\n[58] Wang C, Gu L, Ruan Y, Geng X, Xu M, Yang N, Yu L, Jiang Y, Zhu C, Yang\n\nY, Zhou Y, Guan X, Luo W, Liu Q, Dong X, Yu G, Lan L, Tang Z. Facilitation\n\nof MrgprD by TRP-A1 promotes neuropathic pain. FASEB J 2019;33:\n\n1360- 73.\n\n[59] Wang H, Zylka MJ. Mrgprd-expressing polymodal nociceptive neurons\n\ninnervate most known classes of substantia gelatinosa neurons.\n\nJ Neurosci 2009;29:13202- 9.\n\n[60] Wang R, Guo W, Ossipov MH, Vanderah TW, Porreca F, Lai J. Glial\n\ncell line-derived neurotrophic factor normalizes neurochemical\n\nchanges in injured dorsal root ganglion neurons and prevents the\n\nexpression of experimental neuropathic pain. Neuroscience 2003;\n\n121:815- 24.\n\n[61] Wang X, Archibald ML, Stevens K, Baldridge WH, Chauhan BC. Cyan\n\nfluorescent protein (CFP) expressing cells in the retina of Thy1-CFP\n\ntransgenic mice before and after optic nerve injury. Neurosci Lett 2010;\n\n468:110- 4.\n\n[62] Warwick C, Cassidy C, Hachisuka J, Wright MC, Baumbauer KM,\n\nAdelman PC, Lee KH, Smith KM, Sheahan TD, Ross SE, Koerber HR.\n\nMrgprdCre lineage neurons mediate optogenetic allodynia through an\n\nemergent polysynaptic circuit. PAIN 2021;162:2120- 31.\n\n[63] Weir GA, Middleton SJ, Clark AJ, Daniel T, Khovanov N, McMahon SB,\n\nBennett DL. Using an engineered glutamate-gated chloride channel to\n\nsilence sensory neurons and treat neuropathic pain at the source. Brain\n\n2017;140:2570- 85.\n\n[64] Welin D, Novikova LN, Wiberg M, Kellerth JO, Novikov LN. Survival and\n\nregeneration of cutaneous and muscular afferent neurons after peripheral\n\nnerve injury in adult rats. Exp Brain Res 2008;186:315- 23.\n\n[65] West CA, Davies KA, Hart AM, Wiberg M, Williams SR, Terenghi G.\n\nVolumetric magnetic resonance imaging of dorsal root ganglia for the\n\nobjective quantitative assessment of neuron death after peripheral nerve\n\ninjury. Exp Neurol 2007;203:22- 33.\n\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "cell death and apoptosis with more than 10 genes were\n\nexamined. Filtered count data of expressed and nondifferentially\n\nexpressed genes were used as a background.\n\n2.8. Dorsal root ganglion culture\n\nDorsal root ganglia were dissected from MrgD <sup>CreERT2</sup> ;Ai32 and\n\nCalca <sup>CreERT2</sup> ;Ai32 mice . 1 week after dosing with tamoxifen and\n\nenzymatically digested at 37˚˚C for 80 minutes in dispase type II\n\n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington Biochemical), as described previously. <sup>63</sup> Mechanically dissoci-\n\nated cells were plated onto laminin/poly-D-lysine (R&D Systems,\n\nMinneapolis, MN) treated coverslips in complete Neurobasal Plus\n\nmedium (Neurobasal Plus media supplemented with 2% (vol/vol)\n\nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic- antimycotic\n\n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth\n\nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech,\n\nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor\n\n(GDNF, PeproTech) were added to the media under some\n\nconditions. Cytosine b -D-arabinofuranoside (4 m M) was added to\n\nthe media for 24 hours the day after plating to reduce the\n\nproliferation of nonneuronal cells. Media was refreshed 3 times\n\nper week thereafter. Cultures were fixed for 10 minutes at room\n\ntemperature with 4% paraformaldehyde and subsequently\n\nprocessed by immunocytochemistry (described earlier).\n\n2.9. Statistical analysis\n\nData are expressed as mean 6 SEM unless otherwise specified,\n\nand P values of less than 0.05 were considered significant. Power calculations were performed using G*Power 3.1.9.7. <sup>15</sup> A quantitative Venn diagram was created using BioVenn. <sup>25</sup> All\n\nother statistical analyses were performed in Prism 10 (GraphPad\n\nSoftware, Inc, Boston, MA) or R using paired t tests or 1- or 2-way\n\nRM ANOVAs (repeated measures analysis of variance), where\n\nappropriate. Normality was assessed by the Shapiro- Wilk test. If\n\nthe main analysis of variance effect was significant, <sup>ˇ</sup> S´ıd ´ak or\n\nTukey multiple comparisons tests were performed. To compare\n\npopulation distributions of soma cross-sectional area or volume,\n\nKolmogorov- Smirnov tests were performed.\n\n3. Results\n\n3.1. Peripheral nerve injury induces a loss of small neurons\n\nfrom the dorsal root ganglion\n\nTo assess the gross loss of neurons from DRG following nerve\n\ninjury, we generated the Avil <sup>FlpO</sup> ;Atf3 <sup>CreERT2</sup> ;RC::FLTG mouse\n\nline in which na¨ıve and axotomized sensory neurons were\n\ndifferentially labelled. In this mouse line, all neurons express\n\ntdTomato (Flp-dependent) in the na¨ıve state and switch to\n\nexpressing green fluorescent protein (GFP) upon axonal damage\n\nand concurrent tamoxifen treatment (Flp- and Cre-dependent)\n\n( Figs. 1A and B ). Following pilot experiments to optimize\n\ntamoxifen dosing regimen, this approach was both highly efficient\n\nand specific (with the caveat that it was necessary to wait for\n\nseveral days after nerve injury for Cre-induced GFP expression):\n\n14 days after SNI trans surgery, GFP was expressed by 99.1 6\n\n0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we\n\nobserved GFP in only 4.6 6 0.7% of contralateral DRG neurons\n\n[(Figs. S2A- D, http://links.lww.com/PAIN/C84). We then used](http://links.lww.com/PAIN/C84)\n\na stereological approach to quantify the total number of neurons\n\nin L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNI trans, as\n\nwell as contralateral to injury. One week after SNI trans , we\n\nobserved 7809 6 153 neurons per DRG; this was not significantly\n\ndifferent to the number of neurons in the contralateral DRG\n\n(7917 6 349), whereas cell number approximately halved by\n\n8 weeks postinjury to 3963 6 410 neurons per DRG ( Fig. 1C ).\n\nSeparating analysis into intact vs axotomized afferents revealed\n\nthat only axotomized afferents were lost, with no difference\n\nobserved in numbers of intact afferents ( Fig. 1D ). Between 1 and", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "neuron loss after nerve injury and to test the hypothesis that loss is\n\nnot equally distributed across molecular populations.\n\n2. Methods\n\n2.1. Animals\n\nMice were housed in groups in humidity- and temperature-controlled\n\nrooms with free access to food and water, on a 12-hour light- dark\n\ncycle, and with environmental enrichment. Animal procedures were\n\nperformed under a UK Home Office Project Licence and in\n\naccordance with the UK Home Office (Scientific Procedures) Act\n\n(1986). All studies were approved by the Ethical Review Process\n\nApplicationsPaneloftheUniversityofGlasgoworOxfordandconform\n\nto the ARRIVE guidelines. Experiments were performed on adult male\n\nandfemalemiceaged7to16weeksatthestartoftheexperiments.All\n\nexperimental cohorts contained a mix of male and female mice, apart\n\nfrom the cohort of Mrgprd <sup>CreERT2</sup> ;Ai32 mice that underwent SNI crush\n\nsurgery, which was exclusively female. Details of transgenic lines are\n\nprovided in Table 1 . Tamoxifen was administered by i.p. injection of\n\n20 mg/mL tamoxifen (Sigma-Aldrich) dissolved in wheat germ oil\n\n(doses described in Table 1 ). There were 2 instances where animals\n\nwere excluded from data analysis: One (cyan fluorescent protein)\n\nThy1-CFP died of unknown causes not related to the procedure and\n\nbefore the experimental endpoint, and one MrgD <sup>CreERT2</sup> ;Ai32\n\nexhibited no fluorophore expression and was therefore deemed to\n\nhave been incorrectly genotyped. Group sizes were based on the\n\nextent of neuronal loss 28d following sciatic nerve transection identified by Shi et al. <sup>50</sup> Given a 5 0.05, power 5 0.8, and an effect\n\nsize of 4.81, power analysis projects that a group size of 3 mice would\n\nbe needed.\n\n2.2. Spared nerve transection and crush surgeries\n\nSpared nerve injury (transection of the common peroneal and\n\ntibial branches of the sciatic nerve; SNI trans ) and common\n\nperoneal and tibial crush injury (SNI crush ), in which nerve axons\n\nwere severed but the epineurium remained intact, were performed as previously described. <sup>12</sup> Anesthesia was induced\n\nwith 3% to 5% isoflurane and then maintained at 1.5% to 2% as\n\nrequired. Analgesia, consisting of carprofen (10 mg/kg) and\n\nbuprenorphine (0.05 mg/kg) (Glasgow) or carprofen (5 mg/kg)\n\nand local bupivacaine (2 mg/kg) (Oxford) was provided perioper-\n\natively. The left hindpaw was secured with tape in hip abduction,\n\nand the operative field (lateral surface of the thigh) was shaved.\n\nOphthalmic ointment was applied to the eyes, and the shaved\n\narea was swabbed with chlorhexidine solution. A longitudinal\n\nincision was made in the skin at the lateral mid-thigh. Using blunt\n\ndissection, an opening was made through the biceps femoris,\n\nexposing the sciatic nerve and the 3 peripheral branches (sural,\n\ntibial, and common peroneal nerves). For SNI trans , the common\n\nperoneal and tibial nerves were ligated using a 6-0 Vicryl suture\n\n(Ethicon, Raritan, NJ), and a 1- to 2-mm piece distal to the suture\n\nwas removed using spring scissors. For SNI crush , the exposed\n\ntibial and common peroneal nerves were clamped using a pair of\n\nfine hemostats (Fine Science Tools, Heidelberg, Germany) closed\n\nto their second clip, leaving the nerve branches intact but\n\ntranslucent. The muscle was closed with one 6-0 Vicryl suture\n\n(Ethicon), and the skin incision was closed with one 10 mm\n\nwound clip (Alzet, Cupertino, CA). Animals were monitored daily\n\nfor self-mutilation, and no animals required sacrifice due to tissue\n\ndamage.\n\nTable 1\n\nTransgenic lines used in the study.\n\nUsed name Full name Putative population Ref Source Tamoxifen regime\n\nAtf3 <sup>CreERT2</sup> Atf3 <sup>tm1.1(cre/ERT2)Msra</sup> Axotomised afferents 13 Gift: Dr Franziska Denk 50 mg/kg on days 0, 3, and 7 after surgery\n\nAvil <sup>FlpO</sup> Avil <sup>tm1(flpo)Ddg</sup> Sensory neurons 1 Gift: Prof David Ginty N.A.\n\nMrgD <sup>CreERT2</sup> Mrgprd <sup>tm1.1(cre/ERT2)Wql</sup> Major class of nonpeptidergic\n\nneurons", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed2.pdf" - }, - { - "text": "2.3. FastBlue tracer injections\n\nMice were briefly anesthetized during the procedure, induced with\n\n3%to5%isoflurane,andthenmaintainedat 1.5%to2%asrequired.\n\nHindlimbs were taped with the plantar surface of the paw facing up,\n\nand a custom, 26G removable needle with a 30˚ bevel, attached to\n\na 25- m L Hamilton syringe, was inserted between the 2 distal-most\n\nfootpads, towards the medial aspect of the hindpaw. The needle\n\nwas then rotated 90˚, so the bevel faced medially. Furthermore, 4- m L\n\nFastBlue (FB; 2% in sterile phosphate-buffered saline (PBS); CAS#\n\n73819-41-7; Polysciences, Inc, Warrington, PA) per paw was then\n\nslowly injected, and the needle was left in place for 10 seconds,\n\nbefore rotating and carefully retracting to avoid backflow of FB along\n\nthe needle track. This prevented the FB bolus from contacting the\n\nsural innervation territory of the lateral hindpaw, restricting it largely to\n\nthe tibial innervation territory of the glabrous hindpaw skin.\n\n2.4. Immunohistochemistry and image acquisition\n\nMice were anesthetized with an overdose of pentobarbital (20\n\nmg) and transcardially perfused with a fixative containing 4%\n\nformaldehyde. L3 to L5 DRGs were removed and postfixed for\n\nanother 2 hours, cryoprotected in 30% sucrose overnight, and\n\nthen embedded in optimal cutting temperature media (OCT;\n\nTissue Tek, Alphen aan den Rijn, the Netherlands). Dorsal root\n\nganglia were sectioned on a Leica CM1950 cryostat at 30 m m,\n\nwith every section collected serially on 5 Superfrost Plus slides\n\n(VWR, Lutterworth, United Kingdom) and each slide containing 1\n\nin every 5 sections (4-7 sections per slide). One slide per DRG was\n\nselected at random and was washed with PBS, before being\n\nincubated with appropriate primary antibodies ( Table 2 ) diluted in\n\n5% normal donkey serum and 0.3% Triton X-100 in PBS for\n\n3 days at 4˚C. After PBS washes, slides were incubated with\n\nappropriate secondary antibodies ( Table 2 ) in the same PBS/\n\n(normal donkey serum) NDS/Triton-X100 solution as for prima-\n\nries, overnight at room temperature. Slides were washed and\n\ncoverslipped with VectaShield Vibrance Hardset mounting media\n\n(Vector Labs, Newark, CA), with 4’,6-diamidino-2-phenylindole\n\nincluded in mounting media where FB-labelled cells were not\n\nbeing examined. Sections were imaged using a Zeiss LSM900\n\nAiryscan confocal microscope equipped with 405-, 488-, 561-,\n\nTable 2\n\nPrimary and secondary antibodies used in the study.\n\nAntibody Source Identifiers Working dilution\n\nAnti-GFP (Chicken polyclonal) Abcam, plc, Cambridge, United Kingdom Cat#: ab13970\n\nRRID: AB_300798\n\n1:1000\n\nAnti-NeuN (Guinea pig polyclonal) Synaptic Systems, G¨ottingen, Germany Cat#: 266004\n\nRRID: AB_2619988\n\n1:500\n\nAnti-mCherry (Rat monoclonal) Invitrogen, Waltham, MA; Thermo Fisher Scientific,\n\nUnited Kingdom\n\nCat#: M11217\n\nRRID: AB_2536611\n\n1:500\n\nAnti-Atf3 (Rabbit polyclonal) Novus Biologicals, Minneapolis, MN Cat#: NBP1-85816\n\nRRID: AB_11014863\n\n1:500\n\nAnti-NF200 (Rabbit polyclonal) Sigma-Aldrich, Saint Louis, MO Cat#: N4142\n\nRRID: AB_477272\n\n1:1000\n\nAnti-TrkA (Goat polyclonal) R&D Systems, Minneapolis, MN Cat#: AF1056\n\nRRID: AB_2283049\n\n1:500\n\nAnti-TDP43 (Rabbit polyclonal) Abcam, plc, Cambridge, United Kingdom Cat#: ab133547\n\nRRID: AB_2920621\n\n1:100\n\nAnti-RFP (Mouse monoclonal) Thermo Fisher Scientific, United Kingdom Cat#: MA5-15257\n\nRRID: AB_10999796\n\n1:200\n\nAnti-RFP (Chicken polyclonal) Sigma-Aldrich, United Kingdom Cat#: AB3528\n\nRRID: AB_11212735\n\n1:200\n\nAlexa Fluor 488 Donkey Anti-Chicken IgY\n\n(Donkey polyclonal)\n\nJackson ImmunoResearch, Ely, United Kingdom Cat#: 703-545-155\n\nRRID: AB_2340375\n\n1:500\n\nAlexa Fluor 647 Donkey Anti-Guinea pig IgG\n\n(Donkey polyclonal)\n\nJackson ImmunoResearch, Ely, United Kingdom Cat#: 706-605-148\n\nRRID: AB_2340476\n\n1:250\n\nRhodamine Red-X Donkey Anti-Rat IgG (Donkey\n\npolyclonal)\n\nJackson ImmunoResearch, Ely, United Kingdom Cat#: 712-295-153\n\nRRID: AB_2340676\n\n1:100\n\nAlexa Fluor 647 Donkey Anti-Rabbit IgG (Donkey\n\npolyclonal)", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed2.pdf" - }, - { - "text": "Research Paper PAIN 165 (2024) 2863- 2876\n\n### Peripheral nerve injury results in a biased loss of\n\n### sensory neuron subpopulations\n\n#### Andrew H. Cooper <sup>a</sup> , Allison M. Barry <sup>b</sup> , Paschalina Chrysostomidou <sup>a</sup> , Romane Lolignier <sup>a</sup> , Jinyi Wang <sup>a</sup> ,\n\n#### Magdalena Redondo Canales <sup>a</sup> , Heather F. Titterton <sup>a</sup> , David L. Bennett <sup>b</sup> , Greg A. Weir <sup>a,</sup> *\n\nAbstract\n\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability\n\nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury\n\nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label\n\nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared\n\nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron\n\nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of\n\nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%)\n\nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic\n\nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG\n\nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury- induced plasticity and pain.\n\nKeywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury\n\n1. Introduction\n\nDorsal root ganglion (DRG) neurons represent a molecularly\n\nand functionally heterogeneous population. Under normal\n\nconditions, this diversity contributes to the ability of the\n\nsomatosensory nervous system to detect a myriad of sensory\n\nstimuli that result in the perceptions of touch, temperature,\n\nitch, and pain. Following nerve injury, physiological changes in DRG neurons lead to hyperexcitability, <sup>57</sup> which is a key pathological driver of neuropathic pain. <sup>20,63</sup> Concomitant\n\nmolecular changes in discrete subpopulations also occur,\n\nand these have recently been comprehensively described in single-cell <sup>37,44</sup> and subpopulation-specific sequencing stud- ies. <sup>3</sup> These studies describe a transient and generalized\n\nreduction in the expression of subpopulation-specific genes\n\nfollowing nerve injury. <sup>3,37,44</sup>\n\nIn addition to molecular changes, there is a rich literature\n\ndescribing the frank loss of DRG neurons following traumatic\n\nnerve injury in experimental rodent models. <sup>24,50,53,56</sup> Some\n\nstudies have suggested that neuron loss occurs in certain patient cohorts, <sup>48,66</sup> but this is yet to be definitively demonstrated in\n\nhumans. In rodents, most studies support a preferential loss of small cells that give rise to unmyelinated fibers <sup>53</sup> but some contrasting studies describe the preferential loss of large cells <sup>6</sup> or loss of cells of all sizes. <sup>46</sup> Variation is evident across studies in\n\nterms of experimental species, age, type of injury, and quantification methods. <sup>56</sup> Shi et al. <sup>50</sup> used stereological counting\n\nmethods to identify a 54% loss of DRG neuron number 4 weeks\n\nafter “mid-thigh” sciatic nerve transection in C57BL/6 mice.\n\nEstimates for the degree of loss following commonly used nerve\n\ninjury paradigms (eg, spared nerve injury [SNI] and sciatic nerve\n\ncrush) are not available and because of the neurochemical\n\nchanges following injury and the loss of subpopulation marker gene expression, <sup>5,44,50</sup> the vulnerability of molecularly defined", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.3. Spared nerve injury induces a loss of Trpm8 <sup>1</sup> and calcitonin gene-related peptide <sup>1</sup> but not myelinated dorsal\n\nroot ganglion neurons\n\nLoss restricted to nonpeptidergic nociceptors would not fully\n\naccount for the degree of total neuron loss that we observed.\n\nTherefore, we studied a range of other subpopulations, both\n\nsmall and large in diameter, for their vulnerability to injury-\n\ninduced loss. To investigate potential loss of Trpm8 <sup>1</sup> (cold- sensitive), calcitonin gene-related peptide <sup>1</sup> (CGRP) (peptider-\n\ngic), and myelinated subpopulations of DRG neurons following\n\nnerve injury, we applied our FB-labelling approach in Trpm8 <sup>FlpO</sup> ;\n\nRC::FLTG (FlpO-dependent tdTom expression), Calca <sup>CreERT2</sup> ;\n\nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP\n\nmice, respectively ( Figs. 4A- D ). Trpm8-tdTom was expressed\n\nFigure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous\n\ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNI trans or SNI crush surgery. (B) Representative image of FB labelling and NeuN\n\nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3- m m intervals through the entirety of a 30- m m-thick tissue section. Scale bar 5\n\n100 m m. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNI trans (C) or SNI crush injury (D)\n\nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov- Smirnov tests of cumulative distributions; SNI trans : D 5 0.25, P ,\n\n0.001; n 5 183 or 191 neurons from 3 mice; SNI crush : D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG\n\nvolumetric analyses after SNI trans . (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot\n\ndetection feature. Scale bar 5 100 m m. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNI trans . Kolmogorov- Smirnov tests of\n\ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size,\n\nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F 2,14 5 8.26, P 5 0.004; n 5 4 to 5 mice; <sup>ˇ</sup> S´ıd ´ak multiple comparisons tests:**\nP , 0.01. ANOVA,\n\nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. Figure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgD <sup>ChR2-YFP</sup> L4", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed2.pdf" - }, - { - "text": "[30] Liang Z, Hore Z, Harley P, Uchenna Stanley F, Michrowska A, Dahiya M,\n\nLa Russa F, Jager SE, Villa-Hernandez S, Denk F. A transcriptional\n\ntoolbox for exploring peripheral neuroimmune interactions. PAIN 2020;\n\n161:2089- 106.\n\n[31] Love MI, Huber W, Anders S. Moderated estimation of fold change and\n\ndispersion for RNA-seq data with DESeq2. Genome Biol 2014;15:550.\n\n[32] Madisen L, Mao T, Koch H, Zhuo J, Berenyi A, Fujisawa S, Hsu YWA,\n\nGarcia AJ, Gu X, Zanella S, Kidney J, Gu H, Mao Y, Hooks BM, Boyden\n\nES, Buzs ´aki G, Ramirez JM, Jones AR, Svoboda K, Han X, Turner EE,\n\nZeng H. A toolbox of Cre-dependent optogenetic transgenic mice for\n\nlight-induced activation and silencing. Nat Neurosci 2012;15:793- 802.\n\n[33] Madisen L, Zwingman TA, Sunkin SM, Oh SW, Zariwala HA, Gu H, Ng LL,\n\nPalmiter RD, Hawrylycz MJ, Jones AR, Lein ES, Zeng H. A robust and\n\nhigh-throughput Cre reporting and characterization system for the whole\n\nmouse brain. Nat Neurosci 2010;13:133- 40.\n\n[34] McCoy ES, Taylor-Blake B, Street SE, Pribisko AL, Zheng J, Zylka MJ.\n\nPeptidergic CGRP a primary sensory neurons encode heat and itch and\n\ntonically suppress sensitivity to cold. Neuron 2013;78:138- 51.\n\n[35] McKay Hart A, Brannstrom T, Wiberg M, Terenghi G. Primary sensory\n\nneurons and satellite cells after peripheral axotomy in the adult rat:\n\ntimecourse of cell death and elimination. Exp Brain Res 2002;142:308- 18.\n\n[36] Molander C, Wang H, Rivero-Meli ´an C, Grant G. Early decline and late\n\nrestoration of spinal cord binding and transganglionic transport of\n\nisolectin B4 from Griffonia simplicifolia I after peripheral nerve\n\ntransection or crush. Restor Neurol Neurosci 1996;10:123- 33.\n\n[37] Nguyen MQ, Le Pichon CE, Ryba N. Stereotyped transcriptomic\n\ntransformation of somatosensory neurons in response to injury. Elife\n\n2019;8:e49679.\n\n[38] Oliveira ALR. Apoptosis of sensory neurons and satellite cells after sciatic\n\nnerve transection in C57BL/6J mice. Braz J Med Biol Res 2001;34:\n\n375- 80.\n\n[39] Olson W, Abdus-Saboor I, Cui L, Burdge J, Raabe T, Ma M, Luo W.\n\nSparse genetic tracing reveals regionally specific functional organization\n\nof mammalian nociceptors. Elife 2017;6:e29507.\n\n[40] Plummer NW, Evsyukova IY, Robertson SD, de Marchena J, Tucker CJ,\n\nJensen P. Expanding the power of recombinase-based labeling to\n\nuncover cellular diversity. Development 2015;142:4385- 93.\n\n[41] Prescott SA, Ratt ´e S. Pain processing by spinal microcircuits: afferent\n\ncombinatorics. Curr Opin Neurobiol 2012;22:631- 9.\n\n[42] Qi L, Iskols M, Shi D, Reddy P, Walker C, Lezgiyeva K, Voisin T, Pawlak M,\n\nKuchroo VK, Chiu I, Ginty DD, Sharma N. A DRG genetic toolkit reveals\n\nmolecular, morphological, and functional diversity of somatosensory\n\nneuron subtypes. bioRxiv 2023.2023.04.22.537932.\n\n[43] Reid AJ, Mantovani C, Shawcross SG, Terenghi G, Wiberg M. Phenotype\n\nof distinct primary sensory afferent subpopulations and caspase-3\n\nexpression following axotomy. Histochem Cell Biol 2011;136:71- 8.\n\n[44] Renthal W, Tochitsky I, Yang L, Cheng YC, Li E, Kawaguchi R,\n\nGeschwind DH, Woolf CJ. Transcriptional reprogramming of distinct\n\nperipheral sensory neuron subtypes after axonal injury. Neuron 2020;\n\n108:128- 44.e9.\n\n[45] Schindelin J, Arganda-Carreras I, Frise E, Kaynig V, Longair M, Pietzsch\n\nT, Preibisch S, Rueden C, Saalfeld S, Schmid B, Tinevez J-Y, White DJ,\n\nHartenstein V, Eliceiri K, Tomancak P, Cardona A. Fiji: an open-source\n\nplatform for biological-image analysis. Nat Methods 2012;9:676- 82.\n\n[46] Schmalbruch H. Loss of sensory neurons after sciatic nerve section in the\n\nrat. Anat Rec 1987;219:323- 9.\n\n[47] Schmitz C, Hof PR. Design-based stereology in neuroscience.\n\nNeuroscience 2005;130:813- 31.\n\n[48] Schulte A, Degenbeck J, Aue A, Schindeh ¨utte M, Schlott F, Schneider M,\n\nMonoranu CM, Bohnert M, Pham M, Antoniadis G, Blum R, Rittner HL.\n\nHuman dorsal root ganglia after plexus injury: either preservation or loss of\n\nthe multicellular unit. bioRxiv 2023.02.06.526934.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "DRGs 4 weeks after SNI, contralateral or ipsilateral to injury. Images are projections of optical sections at 3- m m intervals through the entirety of 30- m m-thick tissue\n\nsections. Scale bars 5 100 m m. (C) Quantification of total number of MrgD-YFP 1 cells per L4 DRG 4 weeks after SNI revealed a significant loss in ipsilateral DRG.\n\nTwo-way RM ANOVA with <sup>ˇ</sup> S´ıd ´ak multiple comparisons tests; Side x Treatment interaction: F 1,5 5 9.23, P 5 0.029; n 5 3 mice. (D) The experimental approach\n\nused to generate data presented in (E- G). (E and F) MrgD-YFP expression and FB labelling in the L4 DRG, 14 days after SNI or crush surgery or contralateral to\n\ninjury. White boxes represent regions enlarged in (F). Scale bars 5 100 m m (E) or 20 m m (F). (G) The proportion of FB-labelled DRG neurons decreased after spared\n\nnerve crush injury, and co-labelling is almost completely absent after SNI. Two-way RM ANOVA with <sup>ˇ</sup> S´ıd ´ak multiple comparisons tests; side 3 injury interaction:\n\nF 1,4 5 7.80, P 5 0.049; n 5 3 mice. Posttests: * P , 0.05,**\nP , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; SNI, spared nerve injury; FB,\n\nFastBlue; RM, repeated measures.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed2.pdf", - "query": "Did the researcher responsible for quantifying the cells in the dorsal root ganglion know which group each mouse belonged to?", - "target_page": 4, - "target_passage": "During all image quantification, the experimenter was blind to the experimental groups.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "0.001; n 5 310 to 427 neurons from 3 mice. * P , 0.05,**\nP , 0.01, *** P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green\n\nfluorescent protein.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" - }, - { - "text": "objective quantitative assessment of neuron death after peripheral nerve\n\ninjury. Exp Neurol 2007;203:22- 33.\n\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after\n\nupper limb nerve injury and protective effect of repair: clinical evaluation\n\nusing volumetric magnetic resonance imaging of dorsal root ganglia.\n\nNeurosurgery 2013;73:632- 40.\n\n[67] West SJ, Bonboire D, Bennett DL. StereoMate: 3D stereological\n\nautomated analysis of biological structures. bioRxiv 2020:648337.\n\n[68] Wiberg R, Novikova LN, Kingham PJ. Evaluation of apoptotic pathways in\n\ndorsal root ganglion neurons following peripheral nerve injury.\n\nNeuroreport 2018;29:779- 85.\n\n[69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum\n\nAI. Dorsal root ganglion macrophages contribute to both the initiation and\n\npersistence of neuropathic pain. Nat Commun 2020;11:264.\n\n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia\n\ngelatinosa mediate interaction of signals from primary afferents. J Physiol\n\n2010;588:2065- 75.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "Monoranu CM, Bohnert M, Pham M, Antoniadis G, Blum R, Rittner HL.\n\nHuman dorsal root ganglia after plexus injury: either preservation or loss of\n\nthe multicellular unit. bioRxiv 2023.02.06.526934.\n\n[49] Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, Blum R, Aue\n\nA. Unbiased analysis of the dorsal root ganglion after peripheral nerve\n\ninjury: no neuronal loss, no gliosis, but satellite glial cell plasticity. PAIN\n\n2023;164:728- 40.\n\n[50] Shi TJS, Tandrup T, Bergman E, Xu ZQD, Ulfhake B, H ¨okfelt T. Effect of\n\nperipheral nerve injury on dorsal root ganglion neurons in the C57 BL/6J\n\nmouse: marked changes both in cell numbers and neuropeptide\n\nexpression. Neuroscience 2001;105:249- 63.\n\n[51] Song H, Yao E, Lin C, Gacayan R, Chen MH, Chuang PT. Functional\n\ncharacterization of pulmonary neuroendocrine cells in lung development,\n\ninjury, and tumorigenesis. Proc Natl Acad Sci 2012;109:17531- 6.\n\n[52] Takasu K, Sakai A, Hanawa H, Shimada T, Suzuki H. Overexpression of\n\nGDNF in the uninjured DRG exerts analgesic effects on neuropathic pain\n\nfollowing segmental spinal nerve ligation in mice. J Pain 2011;12:\n\n1130- 1139.\n\n[53] Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root\n\nganglion cells after transection of the rat sciatic nerve. J Comp Neurol\n\n2000;422:172- 80.\n\n[54] Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons:\n\ndiagnosis and prevention. J Hand Surg Eur Vol 2011;36:730- 4.\n\n[55] Usoskin D, Furlan A, Islam S, Abdo H, Lonnerberg P, Lou D, Hjerling-\n\nLeffler J, Haeggstrom J, Kharchenko O, Kharchenko PV, Linnarsson S,\n\nErnfors P. Unbiased classification of sensory neuron types by large-scale\n\nsingle-cell RNA sequencing. Nat Neurosci 2015;18:145- 53.\n\n[56] Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent axotomy on\n\nnumber and volume of dorsal root ganglion cell bodies. J Comp Neurol\n\n1997;388:307- 12.\n\n[57] Wall PD, Gutnick M. Properties of afferent nerve impulses originating from\n\na neuroma. Nature 1974;248:740- 43.\n\n[58] Wang C, Gu L, Ruan Y, Geng X, Xu M, Yang N, Yu L, Jiang Y, Zhu C, Yang\n\nY, Zhou Y, Guan X, Luo W, Liu Q, Dong X, Yu G, Lan L, Tang Z. Facilitation\n\nof MrgprD by TRP-A1 promotes neuropathic pain. FASEB J 2019;33:\n\n1360- 73.\n\n[59] Wang H, Zylka MJ. Mrgprd-expressing polymodal nociceptive neurons\n\ninnervate most known classes of substantia gelatinosa neurons.\n\nJ Neurosci 2009;29:13202- 9.\n\n[60] Wang R, Guo W, Ossipov MH, Vanderah TW, Porreca F, Lai J. Glial\n\ncell line-derived neurotrophic factor normalizes neurochemical\n\nchanges in injured dorsal root ganglion neurons and prevents the\n\nexpression of experimental neuropathic pain. Neuroscience 2003;\n\n121:815- 24.\n\n[61] Wang X, Archibald ML, Stevens K, Baldridge WH, Chauhan BC. Cyan\n\nfluorescent protein (CFP) expressing cells in the retina of Thy1-CFP\n\ntransgenic mice before and after optic nerve injury. Neurosci Lett 2010;\n\n468:110- 4.\n\n[62] Warwick C, Cassidy C, Hachisuka J, Wright MC, Baumbauer KM,\n\nAdelman PC, Lee KH, Smith KM, Sheahan TD, Ross SE, Koerber HR.\n\nMrgprdCre lineage neurons mediate optogenetic allodynia through an\n\nemergent polysynaptic circuit. PAIN 2021;162:2120- 31.\n\n[63] Weir GA, Middleton SJ, Clark AJ, Daniel T, Khovanov N, McMahon SB,\n\nBennett DL. Using an engineered glutamate-gated chloride channel to\n\nsilence sensory neurons and treat neuropathic pain at the source. Brain\n\n2017;140:2570- 85.\n\n[64] Welin D, Novikova LN, Wiberg M, Kellerth JO, Novikov LN. Survival and\n\nregeneration of cutaneous and muscular afferent neurons after peripheral\n\nnerve injury in adult rats. Exp Brain Res 2008;186:315- 23.\n\n[65] West CA, Davies KA, Hart AM, Wiberg M, Williams SR, Terenghi G.\n\nVolumetric magnetic resonance imaging of dorsal root ganglia for the\n\nobjective quantitative assessment of neuron death after peripheral nerve\n\ninjury. Exp Neurol 2007;203:22- 33.\n\n[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "cell death and apoptosis with more than 10 genes were\n\nexamined. Filtered count data of expressed and nondifferentially\n\nexpressed genes were used as a background.\n\n2.8. Dorsal root ganglion culture\n\nDorsal root ganglia were dissected from MrgD <sup>CreERT2</sup> ;Ai32 and\n\nCalca <sup>CreERT2</sup> ;Ai32 mice . 1 week after dosing with tamoxifen and\n\nenzymatically digested at 37˚˚C for 80 minutes in dispase type II\n\n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington Biochemical), as described previously. <sup>63</sup> Mechanically dissoci-\n\nated cells were plated onto laminin/poly-D-lysine (R&D Systems,\n\nMinneapolis, MN) treated coverslips in complete Neurobasal Plus\n\nmedium (Neurobasal Plus media supplemented with 2% (vol/vol)\n\nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic- antimycotic\n\n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth\n\nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech,\n\nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor\n\n(GDNF, PeproTech) were added to the media under some\n\nconditions. Cytosine b -D-arabinofuranoside (4 m M) was added to\n\nthe media for 24 hours the day after plating to reduce the\n\nproliferation of nonneuronal cells. Media was refreshed 3 times\n\nper week thereafter. Cultures were fixed for 10 minutes at room\n\ntemperature with 4% paraformaldehyde and subsequently\n\nprocessed by immunocytochemistry (described earlier).\n\n2.9. Statistical analysis\n\nData are expressed as mean 6 SEM unless otherwise specified,\n\nand P values of less than 0.05 were considered significant. Power calculations were performed using G*Power 3.1.9.7. <sup>15</sup> A quantitative Venn diagram was created using BioVenn. <sup>25</sup> All\n\nother statistical analyses were performed in Prism 10 (GraphPad\n\nSoftware, Inc, Boston, MA) or R using paired t tests or 1- or 2-way\n\nRM ANOVAs (repeated measures analysis of variance), where\n\nappropriate. Normality was assessed by the Shapiro- Wilk test. If\n\nthe main analysis of variance effect was significant, <sup>ˇ</sup> S´ıd ´ak or\n\nTukey multiple comparisons tests were performed. To compare\n\npopulation distributions of soma cross-sectional area or volume,\n\nKolmogorov- Smirnov tests were performed.\n\n3. Results\n\n3.1. Peripheral nerve injury induces a loss of small neurons\n\nfrom the dorsal root ganglion\n\nTo assess the gross loss of neurons from DRG following nerve\n\ninjury, we generated the Avil <sup>FlpO</sup> ;Atf3 <sup>CreERT2</sup> ;RC::FLTG mouse\n\nline in which na¨ıve and axotomized sensory neurons were\n\ndifferentially labelled. In this mouse line, all neurons express\n\ntdTomato (Flp-dependent) in the na¨ıve state and switch to\n\nexpressing green fluorescent protein (GFP) upon axonal damage\n\nand concurrent tamoxifen treatment (Flp- and Cre-dependent)\n\n( Figs. 1A and B ). Following pilot experiments to optimize\n\ntamoxifen dosing regimen, this approach was both highly efficient\n\nand specific (with the caveat that it was necessary to wait for\n\nseveral days after nerve injury for Cre-induced GFP expression):\n\n14 days after SNI trans surgery, GFP was expressed by 99.1 6\n\n0.6% of Atf3-expressing ipsilateral L4 DRG neurons, while we\n\nobserved GFP in only 4.6 6 0.7% of contralateral DRG neurons\n\n[(Figs. S2A- D, http://links.lww.com/PAIN/C84). We then used](http://links.lww.com/PAIN/C84)\n\na stereological approach to quantify the total number of neurons\n\nin L4 DRG ipsilateral to injury 1, 2, 4, and 8 weeks after SNI trans, as\n\nwell as contralateral to injury. One week after SNI trans , we\n\nobserved 7809 6 153 neurons per DRG; this was not significantly\n\ndifferent to the number of neurons in the contralateral DRG\n\n(7917 6 349), whereas cell number approximately halved by\n\n8 weeks postinjury to 3963 6 410 neurons per DRG ( Fig. 1C ).\n\nSeparating analysis into intact vs axotomized afferents revealed\n\nthat only axotomized afferents were lost, with no difference\n\nobserved in numbers of intact afferents ( Fig. 1D ). Between 1 and", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" - }, - { - "text": "Research Paper PAIN 165 (2024) 2863- 2876\n\n### Peripheral nerve injury results in a biased loss of\n\n### sensory neuron subpopulations\n\n#### Andrew H. Cooper <sup>a</sup> , Allison M. Barry <sup>b</sup> , Paschalina Chrysostomidou <sup>a</sup> , Romane Lolignier <sup>a</sup> , Jinyi Wang <sup>a</sup> ,\n\n#### Magdalena Redondo Canales <sup>a</sup> , Heather F. Titterton <sup>a</sup> , David L. Bennett <sup>b</sup> , Greg A. Weir <sup>a,</sup> *\n\nAbstract\n\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability\n\nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury\n\nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label\n\nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared\n\nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron\n\nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of\n\nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%)\n\nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic\n\nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG\n\nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury- induced plasticity and pain.\n\nKeywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury\n\n1. Introduction\n\nDorsal root ganglion (DRG) neurons represent a molecularly\n\nand functionally heterogeneous population. Under normal\n\nconditions, this diversity contributes to the ability of the\n\nsomatosensory nervous system to detect a myriad of sensory\n\nstimuli that result in the perceptions of touch, temperature,\n\nitch, and pain. Following nerve injury, physiological changes in DRG neurons lead to hyperexcitability, <sup>57</sup> which is a key pathological driver of neuropathic pain. <sup>20,63</sup> Concomitant\n\nmolecular changes in discrete subpopulations also occur,\n\nand these have recently been comprehensively described in single-cell <sup>37,44</sup> and subpopulation-specific sequencing stud- ies. <sup>3</sup> These studies describe a transient and generalized\n\nreduction in the expression of subpopulation-specific genes\n\nfollowing nerve injury. <sup>3,37,44</sup>\n\nIn addition to molecular changes, there is a rich literature\n\ndescribing the frank loss of DRG neurons following traumatic\n\nnerve injury in experimental rodent models. <sup>24,50,53,56</sup> Some\n\nstudies have suggested that neuron loss occurs in certain patient cohorts, <sup>48,66</sup> but this is yet to be definitively demonstrated in\n\nhumans. In rodents, most studies support a preferential loss of small cells that give rise to unmyelinated fibers <sup>53</sup> but some contrasting studies describe the preferential loss of large cells <sup>6</sup> or loss of cells of all sizes. <sup>46</sup> Variation is evident across studies in\n\nterms of experimental species, age, type of injury, and quantification methods. <sup>56</sup> Shi et al. <sup>50</sup> used stereological counting\n\nmethods to identify a 54% loss of DRG neuron number 4 weeks\n\nafter “mid-thigh” sciatic nerve transection in C57BL/6 mice.\n\nEstimates for the degree of loss following commonly used nerve\n\ninjury paradigms (eg, spared nerve injury [SNI] and sciatic nerve\n\ncrush) are not available and because of the neurochemical\n\nchanges following injury and the loss of subpopulation marker gene expression, <sup>5,44,50</sup> the vulnerability of molecularly defined", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - }, - { - "text": "3.3. Spared nerve injury induces a loss of Trpm8 <sup>1</sup> and calcitonin gene-related peptide <sup>1</sup> but not myelinated dorsal\n\nroot ganglion neurons\n\nLoss restricted to nonpeptidergic nociceptors would not fully\n\naccount for the degree of total neuron loss that we observed.\n\nTherefore, we studied a range of other subpopulations, both\n\nsmall and large in diameter, for their vulnerability to injury-\n\ninduced loss. To investigate potential loss of Trpm8 <sup>1</sup> (cold- sensitive), calcitonin gene-related peptide <sup>1</sup> (CGRP) (peptider-\n\ngic), and myelinated subpopulations of DRG neurons following\n\nnerve injury, we applied our FB-labelling approach in Trpm8 <sup>FlpO</sup> ;\n\nRC::FLTG (FlpO-dependent tdTom expression), Calca <sup>CreERT2</sup> ;\n\nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP\n\nmice, respectively ( Figs. 4A- D ). Trpm8-tdTom was expressed\n\nFigure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous\n\ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNI trans or SNI crush surgery. (B) Representative image of FB labelling and NeuN\n\nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3- m m intervals through the entirety of a 30- m m-thick tissue section. Scale bar 5\n\n100 m m. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNI trans (C) or SNI crush injury (D)\n\nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov- Smirnov tests of cumulative distributions; SNI trans : D 5 0.25, P ,\n\n0.001; n 5 183 or 191 neurons from 3 mice; SNI crush : D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG\n\nvolumetric analyses after SNI trans . (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot\n\ndetection feature. Scale bar 5 100 m m. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNI trans . Kolmogorov- Smirnov tests of\n\ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size,\n\nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F 2,14 5 8.26, P 5 0.004; n 5 4 to 5 mice; <sup>ˇ</sup> S´ıd ´ak multiple comparisons tests:**\nP , 0.01. ANOVA,\n\nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. Figure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgD <sup>ChR2-YFP</sup> L4", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed2.pdf" - }, - { - "text": "sensory neuron-spinal cord connectivity. Neuroscience 2009;163:\n\n1220- 32.\n\n[10] Cobos EJ, Nickerson CA, Gao F, Chandran V, Bravo-Caparr ´os I,\n\nGonz ´alez-Cano R, Riva P, Andrews NA, Latremoliere A, Seehus CR,\n\nPerazzoli G, Nieto FR, Joller N, Painter MW, Ma CHE, Omura T, Chesler\n\nEJ, Geschwind DH, Coppola G, Rangachari M, Woolf CJ, Costigan M.\n\nMechanistic differences in neuropathic pain modalities revealed by\n\ncorrelating behavior with global expression profiling. Cell Rep 2018;22:\n\n1301- 12.\n\n[11] Coggeshall RE. A consideration of neural counting methods. Trends\n\nNeurosci 1992;15:9- 13.\n\n[12] Decosterd I, Woolf CJ. Spared nerve injury: an animal model of persistent\n\nperipheral neuropathic pain. PAIN 2000;87:149- 58.\n\n[13] Denk F, Ramer LM, Erskine ELKS, Nassar MA, Bogdanov Y, Signore M,\n\nWood JN, McMahon SB, Ramer MS. Tamoxifen induces cellular stress in\n\nthe nervous system by inhibiting cholesterol synthesis. Acta Neuropathol\n\nCommun 2015;3:74.\n\n[14] Dobin A, Davis CA, Schlesinger F, Drenkow J, Zaleski C, Jha S, Batut P,\n\nChaisson M, Gingeras TR. STAR: ultrafast universal RNA-seq aligner.\n\nBioinformatics 2013;29:15- 21.\n\n[15] Faul F, Erdfelder E, Lang AG, Buchner A. G*Power 3: a flexible statistical\n\npower analysis program for the social, behavioral, and biomedical\n\nsciences. Behav Res Methods 2007;39:175- 91.\n\n[16] Feng G, Mellor RH, Bernstein M, Keller-Peck C, Nguyen QT, Wallace M,\n\nNerbonne JM, Lichtman JW, Sanes JR. Imaging neuronal subsets in\n\ntransgenic mice expressing multiple spectral variants of GFP. Neuron\n\n2000;28:41- 51.\n\n[17] Gangadharan V, Zheng H, Taberner FJ, Landry J, Nees TA, Pistolic J,\n\nAgarwal N, M ¨annich D, Benes V, Helmstaedter M, Ommer B, Lechner\n\nSG, Kuner T, Kuner R. Neuropathic pain caused by miswiring and\n\nabnormal end organ targeting. Nature 2022;606:137- 45.\n\n[18] Guillery RW. On counting and counting errors. J Comp Neurol 2002;447:\n\n1- 7.\n\n[19] Hall BE, Macdonald E, Cassidy M, Yun S, Sapio MR, Ray P, Doty M, Nara\n\nP, Burton MD, Shiers S, Ray-Chaudhury A, Mannes AJ, Price TJ, Iadarola\n\nMJ, Kulkarni AB. Transcriptomic analysis of human sensory neurons in\n\npainful diabetic neuropathy reveals inflammation and neuronal loss. Sci\n\nRep 2022;12:4729.\n\n[20] Haroutounian S, Nikolajsen L, Bendtsen TF, Finnerup NB, Kristensen AD,\n\nHasselstrøm JB, Jensen TS. Primary afferent input critical for maintaining\n\nspontaneous pain in peripheral neuropathy. PAIN 2014;155:1272- 9.\n\n[21] Hart AM, Terenghi G, Kellerth JO, Wiberg M. Sensory neuroprotection,\n\nmitochondrial preservation, and therapeutic potential of n-acetyl-cysteine\n\nafter nerve injury. Neuroscience 2004;125:91- 101.\n\n[22] Hart AM, Wiberg M, Youle M, Terenghi G. Systemic acetyl-l-carnitine\n\neliminates sensory neuronal loss after peripheral axotomy: a new clinical\n\napproach in the management of peripheral nerve trauma. Exp Brain Res\n\n2002;145:182- 9.\n\n[23] Hu G, Huang K, Hu Y, Du G, Xue Z, Zhu X, Fan G. Single-cell RNA-seq\n\nreveals distinct injury responses in different types of DRG sensory\n\nneurons. Sci Rep 2016;6:31851.\n\n[24] Hu P, McLachlan EM. Selective reactions of cutaneous and muscle\n\nafferent neurons to peripheral nerve transection in rats. J Neurosci 2003;\n\n23:10559- 67.\n\n[25] Hulsen T, de Vlieg J, Alkema W. BioVenn—a web application for the\n\ncomparison and visualization of biological lists using area-proportional\n\nVenn diagrams. BMC Genomics 2008;9:488.\n\n[26] King T, Vera-Portocarrero L, Gutierrez T, Vanderah TW, Dussor G, Lai J,\n\nFields HL, Porreca F. Unmasking the tonic-aversive state in neuropathic\n\npain. Nat Neurosci 2009;12:1364- 6.\n\n[27] Leibovich H, Buzaglo N, Tsuriel S, Peretz L, Caspi Y, Katz B, Lev S,\n\nLichtstein D, Binshtok AM. Abnormal reinnervation of denervated areas\n\nfollowing nerve injury facilitates neuropathic pain. Cells 2020;9:1007.\n\n[28] Li H, Handsaker B, Wysoker A, Fennell T, Ruan J, Homer N, Marth G,\n\nAbecasis G, Durbin R; 1000 Genome Project Data Processing Subgroup.", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed2.pdf" - }, - { - "text": "[30] Liang Z, Hore Z, Harley P, Uchenna Stanley F, Michrowska A, Dahiya M,\n\nLa Russa F, Jager SE, Villa-Hernandez S, Denk F. A transcriptional\n\ntoolbox for exploring peripheral neuroimmune interactions. PAIN 2020;\n\n161:2089- 106.\n\n[31] Love MI, Huber W, Anders S. Moderated estimation of fold change and\n\ndispersion for RNA-seq data with DESeq2. Genome Biol 2014;15:550.\n\n[32] Madisen L, Mao T, Koch H, Zhuo J, Berenyi A, Fujisawa S, Hsu YWA,\n\nGarcia AJ, Gu X, Zanella S, Kidney J, Gu H, Mao Y, Hooks BM, Boyden\n\nES, Buzs ´aki G, Ramirez JM, Jones AR, Svoboda K, Han X, Turner EE,\n\nZeng H. A toolbox of Cre-dependent optogenetic transgenic mice for\n\nlight-induced activation and silencing. Nat Neurosci 2012;15:793- 802.\n\n[33] Madisen L, Zwingman TA, Sunkin SM, Oh SW, Zariwala HA, Gu H, Ng LL,\n\nPalmiter RD, Hawrylycz MJ, Jones AR, Lein ES, Zeng H. A robust and\n\nhigh-throughput Cre reporting and characterization system for the whole\n\nmouse brain. Nat Neurosci 2010;13:133- 40.\n\n[34] McCoy ES, Taylor-Blake B, Street SE, Pribisko AL, Zheng J, Zylka MJ.\n\nPeptidergic CGRP a primary sensory neurons encode heat and itch and\n\ntonically suppress sensitivity to cold. Neuron 2013;78:138- 51.\n\n[35] McKay Hart A, Brannstrom T, Wiberg M, Terenghi G. Primary sensory\n\nneurons and satellite cells after peripheral axotomy in the adult rat:\n\ntimecourse of cell death and elimination. Exp Brain Res 2002;142:308- 18.\n\n[36] Molander C, Wang H, Rivero-Meli ´an C, Grant G. Early decline and late\n\nrestoration of spinal cord binding and transganglionic transport of\n\nisolectin B4 from Griffonia simplicifolia I after peripheral nerve\n\ntransection or crush. Restor Neurol Neurosci 1996;10:123- 33.\n\n[37] Nguyen MQ, Le Pichon CE, Ryba N. Stereotyped transcriptomic\n\ntransformation of somatosensory neurons in response to injury. Elife\n\n2019;8:e49679.\n\n[38] Oliveira ALR. Apoptosis of sensory neurons and satellite cells after sciatic\n\nnerve transection in C57BL/6J mice. Braz J Med Biol Res 2001;34:\n\n375- 80.\n\n[39] Olson W, Abdus-Saboor I, Cui L, Burdge J, Raabe T, Ma M, Luo W.\n\nSparse genetic tracing reveals regionally specific functional organization\n\nof mammalian nociceptors. Elife 2017;6:e29507.\n\n[40] Plummer NW, Evsyukova IY, Robertson SD, de Marchena J, Tucker CJ,\n\nJensen P. Expanding the power of recombinase-based labeling to\n\nuncover cellular diversity. Development 2015;142:4385- 93.\n\n[41] Prescott SA, Ratt ´e S. Pain processing by spinal microcircuits: afferent\n\ncombinatorics. Curr Opin Neurobiol 2012;22:631- 9.\n\n[42] Qi L, Iskols M, Shi D, Reddy P, Walker C, Lezgiyeva K, Voisin T, Pawlak M,\n\nKuchroo VK, Chiu I, Ginty DD, Sharma N. A DRG genetic toolkit reveals\n\nmolecular, morphological, and functional diversity of somatosensory\n\nneuron subtypes. bioRxiv 2023.2023.04.22.537932.\n\n[43] Reid AJ, Mantovani C, Shawcross SG, Terenghi G, Wiberg M. Phenotype\n\nof distinct primary sensory afferent subpopulations and caspase-3\n\nexpression following axotomy. Histochem Cell Biol 2011;136:71- 8.\n\n[44] Renthal W, Tochitsky I, Yang L, Cheng YC, Li E, Kawaguchi R,\n\nGeschwind DH, Woolf CJ. Transcriptional reprogramming of distinct\n\nperipheral sensory neuron subtypes after axonal injury. Neuron 2020;\n\n108:128- 44.e9.\n\n[45] Schindelin J, Arganda-Carreras I, Frise E, Kaynig V, Longair M, Pietzsch\n\nT, Preibisch S, Rueden C, Saalfeld S, Schmid B, Tinevez J-Y, White DJ,\n\nHartenstein V, Eliceiri K, Tomancak P, Cardona A. Fiji: an open-source\n\nplatform for biological-image analysis. Nat Methods 2012;9:676- 82.\n\n[46] Schmalbruch H. Loss of sensory neurons after sciatic nerve section in the\n\nrat. Anat Rec 1987;219:323- 9.\n\n[47] Schmitz C, Hof PR. Design-based stereology in neuroscience.\n\nNeuroscience 2005;130:813- 31.\n\n[48] Schulte A, Degenbeck J, Aue A, Schindeh ¨utte M, Schlott F, Schneider M,\n\nMonoranu CM, Bohnert M, Pham M, Antoniadis G, Blum R, Rittner HL.\n\nHuman dorsal root ganglia after plexus injury: either preservation or loss of\n\nthe multicellular unit. bioRxiv 2023.02.06.526934.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed2.pdf" - }, - { - "text": "DRGs 4 weeks after SNI, contralateral or ipsilateral to injury. Images are projections of optical sections at 3- m m intervals through the entirety of 30- m m-thick tissue\n\nsections. Scale bars 5 100 m m. (C) Quantification of total number of MrgD-YFP 1 cells per L4 DRG 4 weeks after SNI revealed a significant loss in ipsilateral DRG.\n\nTwo-way RM ANOVA with <sup>ˇ</sup> S´ıd ´ak multiple comparisons tests; Side x Treatment interaction: F 1,5 5 9.23, P 5 0.029; n 5 3 mice. (D) The experimental approach\n\nused to generate data presented in (E- G). (E and F) MrgD-YFP expression and FB labelling in the L4 DRG, 14 days after SNI or crush surgery or contralateral to\n\ninjury. White boxes represent regions enlarged in (F). Scale bars 5 100 m m (E) or 20 m m (F). (G) The proportion of FB-labelled DRG neurons decreased after spared\n\nnerve crush injury, and co-labelling is almost completely absent after SNI. Two-way RM ANOVA with <sup>ˇ</sup> S´ıd ´ak multiple comparisons tests; side 3 injury interaction:\n\nF 1,4 5 7.80, P 5 0.049; n 5 3 mice. Posttests: * P , 0.05,**\nP , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; SNI, spared nerve injury; FB,\n\nFastBlue; RM, repeated measures.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed2.pdf" - }, - { - "text": "crush) are not available and because of the neurochemical\n\nchanges following injury and the loss of subpopulation marker gene expression, <sup>5,44,50</sup> the vulnerability of molecularly defined\n\nsubpopulations has not been characterized. Moreover, more\n\nrecent studies have cast doubt on the extent or even presence of\n\nDRG neuron death following nerve injury. One study which\n\ndeveloped a deep learning approach to assess rat DRG cellular\n\nplasticity found no loss of neurons up to 2 weeks post-SNI, <sup>49</sup>\n\nwhile another observed no loss of genetically labelled damaged\n\nDRG neurons 2 months after sciatic nerve crush. <sup>44</sup>\n\nThe issue of whether neuron loss occurs, and if so, in what\n\nsubpopulations, is important. It will likely have implications for our\n\nunderstanding of reinnervation and functional recovery in patients.\n\nFurthermore, better insight will provide critical context for those\n\ninvestigating the plasticity that occurs following nerve injury and\n\nmay inform therapeutic targeting of sensory neuron populations.\n\nAn expanding repertoire of transgenic recombinase driver lines\n\nnow makes it possible to permanently label DRG neuron\n\nsubpopulations and study their fate in rodent nerve injury paradigms.\n\nThe aim of this study was to use this technology to characterize\n\nSponsorships or competing interests that may be relevant to content are disclosed\n\nat the end of this article.\n\na School of Psychology and Neuroscience, University of Glasgow, Glasgow, United Kingdom, <sup>b</sup> Nuffield Department of Clinical Neurosciences, University of\n\nOxford, Oxford, United Kingdom\n\n*Corresponding author. Address: School of Psychology and Neuroscience,\n\nUniversity of Glasgow, Glasgow G12 8QQ, United Kingdom. Tel.: 1 44 (0) 141 330\n\n[7023. E-mail address: gregory.weir@glasgow.ac.uk (G.A. Weir).](mailto:gregory.weir@glasgow.ac.uk)\n\nSupplemental digital content is available for this article. Direct URL citations appear\n\nin the printed text and are provided in the HTML and PDF versions of this article on\n\n[the journal’s Web site (www.painjournalonline.com).](http://www.painjournalonline.com)\n\nCopyright © 2024 The Author(s). Published by Wolters Kluwer Health, Inc. on behalf\n\nof the International Association for the Study of Pain. This is an open access article\n\n[distributed under the Creative Commons Attribution License 4.0 (CCBY), which](http://creativecommons.org/licenses/by/4.0/)\n\npermits unrestricted use, distribution, and reproduction in any medium, provided the\n\noriginal work is properly cited.\n\n[http://dx.doi.org/10.1097/j.pain.0000000000003321](http://dx.doi.org/10.1097/j.pain.0000000000003321)\n\nDecember 2024 · Volume 165 · Number 12 www.painjournalonline.com 2863", - "page_start": 0, - "page_end": 0, - "source_file": "pubmed2.pdf" - } - ] - }, - { - "references": { - "source_file": "basic-english-language-skills.PDF", - "query": "Does the Oxbridge Academy have a guide on how to apply to college?", - "target_page": 21, - "target_passage": "To make the college registration process easier for you, we’ve compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/).", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "###### CHAPTER 5:\n\nTIPS FOR FILLING IN YOUR COLLEGE REGISTRATION FORM\n\nApplying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a\n\ndaunting experience. Not only do you need to choose a course, but you\n\nalso need to make sure that you:\n\n- meet the entry requirements\n\n- meet the deadlines\n\n- fill in the forms correctly\n\n- send the forms to the right address\n\n- include all the necessary attachments\n\nTo make the college registration process easier for you, we’ve compiled a\n\ncomprehensive guide on how to register at Oxbridge Academy\n\n(www.oxbridgeacademy.co.za/enrol-now/) . The guide also includes general\n\ntips that will be relevant to the application and registration processes at\n\nother colleges.\n\n**There are 4 steps you need to follow when you want to register as a student at Oxbridge Academy:**\n\n**1.** Select Your Course\n\n**2.** Fill in Your Student Details\n\n**3.** Select Your Delivery Option\n\n**4.** Pay Your Registration Fee and Send in Your Form", - "page_start": 20, - "page_end": 20, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "###### Did you enjoy reading this book?\n\nJoin our online social community and share your opinion:\n\nwww.facebook.com/oxbridgeacademysa\n\ntwitter.com/oxbridgeEdu\n\nwww.linkedin.com/company/oxbridge-academy\n\nOxbridge Academy is an established distance learning college offer­\n\ning skills courses, national qualifications, and internationally recognised\n\ncourses to students in South Africa and abroad.\n\nWith our head office in Stellenbosch in the Western Cape, we cater to our\n\nstudents’ needs by recruiting industry-expert tutors to provide academic\n\nassistance via telephone and e-mail, as well as by designing our study\n\nmaterial in such a way that it is clear, simple, and easy for our students\n\nto understand.\n\nWith us, studying from home is easy, affordable, and convenient.\n\nCONTACT NUMBERS:\n\nTel: 021 1100 200\n\nTel:+2721 883 2454 (international)\n\nFax: 086 111 2121\n\nFax: +2721 883 2378 (international)\n\nWhatsapp: 0605671585\n\nEmail: info@oxbridgeacademy.co.za\n\nPostal Address:\n\nPO Box 12723, Die Boord, Stellenbosch, 7613\n\nWe are registered with the Department of Higher Education and Training as a Private College in terms of Section\n\n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070.\n\n*Developed for Oxbridge Academy*", - "page_start": 58, - "page_end": 58, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "SEND YOUR REGISTRATION FORM\n\nCHOOSE YOUR COURSE **1**\n\nFILL IN THE\n\nREGISTRATION FORM\n\n## **2**\n\nThe registration form follows an easy-to-complete four step layout.\n\n## **3**\n\n## **4 5**\n\nIF YOU ARE REGISTERING\n\nFOR an ICB, or NATED\n\nCOURSE\n\nmake sure to indicate your preferred exam centre.\n\nIF YOU ARE UNDER\n\n18, OR IF YOU ARE\n\nUNEMPLOYED\n\nmake sure that your parent/guardian/guarantor signs the form.\n\nATTACH THE FOLLOWING\n\nDOCUMENTS\n\n1. Copy of your ID\n\n2. Proof of highest grade passed\n\n3. Proof of other qualifications\n\n4. Proof of payment\n\nPAY YOUR\n\nREGISTRATION FEE\n\nSend your registration form to the\n\nregistrations office at Oxbridge Academy via\n\none of the following channels:\n\nFax: 086 262 5550\n\nPost: PO Box 12723, Die Boord, 7613\n\nE-mail: registrar@oxbridgeacademy.co.za\n\n## **6**\n\nA Summary of the Registration Process at Oxbridge Academy\n\nAs soon as your details\n\nhave been captured\n\non our system you will\n\nreceive confirmation\n\nof your registration via\n\ne-mail or SMS", - "page_start": 26, - "page_end": 26, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "STEP 1 - SELECT YOUR COURSE\n\nBefore you start filling in the registration form, you need to choose your\n\ncourse. Once you’ve identified the course that you would like to study,\n\nremember to check that you meet the entry requirements.\n\nYou can find the course name and course code for your chosen course on\n\nthe relevant detailed course information page on our website. Have a look\n\nat the example in the screenshot below (the course name and course code\n\nare circled in red):\n\nPlease make sure to check the accreditation status of your chosen course.\n\nSome of our courses are non-credit bearing skills development courses,\n\nwhich are neither accredited by external bodies nor registered on the NQF.\n\nPlease go to our website: *oxbridgeacademy.co.za* for more information\n\nabout our skills development courses.\n\nOxbridge Academy Short Course: Marketing Management\n\nADV101", - "page_start": 21, - "page_end": 21, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "STEP 4 - PAY YOUR REGISTRATION FEE AND SEND IN YOUR FORM\n\nDifferent courses have different registration fees. Please check the course\n\nfees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to\n\nfind out how much you need to pay to register for your chosen course, and\n\npay this amount using the banking details provided at the bottom of the\n\nregistration form. Remember to attach your proof of payment.\n\nIf you are under the age of 18, your parent or guardian will need to sign\n\nthis section of the form to state that they are aware of your registration\n\nwith Oxbridge Academy, and that they do not have any objections. If you\n\nare unemployed, you will need a guarantor to sign this section of the\n\nform. Your parent or guarantor will be held responsible if you miss any of\n\nyour payments in relation to your course fees.", - "page_start": 25, - "page_end": 25, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "IN THIS E-BOOK, WE’LL BE HELPING YOU TO:\n\n- Develop your basic English language skills.\n\n- Improve your English grammar.\n\nApply your language and communication skills in a business contexT.\n\n(www.oxbridgeacademy.co.za/find-a- course/business-administration-\n\ncourses/)\n\n*“Grammar is a litmus test. If job hopefuls can’t distinguish*\n\n*between ‘to’ and too’, their applications go into the bin”*\n\nKyle Wiens, CEO of iFixit\n\n*“Grammar often seems to be a low priority in education. Are*\n\n*school undervaluing grammar, given that employers may rule out*\n\n*applications with sloppy writing?”*\n\nThe New York Times", - "page_start": 5, - "page_end": 5, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "###### CHAPTER 7:\n\nHOW TO ASK FOR HELP FROM YOUR TUTOR\n\nAs a student, you are going to experience times when you need help\n\nwith your studies. You might be unsure about an assignment question,\n\nyou might be confused by a particular concept, or you might be stressed\n\nabout the upcoming exams.\n\nAnd if you are studying via distance learning (www.oxbridgeacademy.co.\n\nza/distance-learning/), where you don’t have any face-to-face interac­\n\ntion with lecturers, you will need to rely on your tutors for the necessary\n\nacademic support.", - "page_start": 32, - "page_end": 32, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "HERE ARE 10 TIPS FOR HOW YOU CAN ACHIEVE HIGHER MARKS FOR YOUR WRITTEN ASSIGNMENTS:\n\n1. Read (and follow) the instructions carefully.\n\nIf you are an Oxbridge Academy student, the general assignment\n\nguidelines will be provided in your “Success” Study Guide. Specific\n\ninstructions will also be included at the beginning of each of your\n\nassignments.\n\n2. Read the questions carefully.\n\nMake sure you understand what is being asked of you, so that you\n\nfocus on answering the right questions, instead of providing irrelevant\n\ninformation.\n\n3. Remember that presentation is important.\n\nNeatness, spelling, and the structure of your assignment will all count\n\ntoward the mark that you receive for your assignment.\n\n4. Use your course material and other external sources to find answers\n\nto the assignment questions.\n\nBut make sure to use your own words - don’t just copy. You need to show\n\nthe person marking your assignment that you have developed a sound\n\nunderstanding of the subject.\n\n5. When you use external resources, remember to reference them\n\nproperly, and to include them in a bibliography.\n\nIf you don’t, you may be guilty of plagiarism (www.oxforddictionaries.\n\ncom/definition/english/plagiarism), which is a serious offence.\n\n6. Always hand in your own work, and make sure that you use your\n\nown words when you formulate your answers.\n\n7. When it comes to essay questions:\n\n- Plan/outline your answer before doing the final draft.\n\n- Remember that essays have titles, introductions, bodies, and\n\nconclusions.\n\n- Use headings and paragraphs to structure your answer.", - "page_start": 37, - "page_end": 37, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "###### CHAPTER 8:\n\nTIPS FOR COMPLETING YOUR WRITTEN ASSIGNMENTS\n\nDepending on which course you study, you will either be assessed\n\nby means of written assignments, or through a combination of\n\nwritten assignments and exams. Assignments not only help to\n\ndeepen your understanding of the work, but they often also count\n\ntoward your final mark.\n\nIt is therefore important that you put effort into your assignments,\n\nand that you complete them to the best of your ability.\n\nWe realise that, like many other students, you might be unsure of\n\nhow to go about completing your assignments, or that you might be\n\nafraid of failure.\n\nIf you are an Oxbridge Academy student, we’d like you to know\n\nthat we are here to help you every step of the way, and that we will\n\ngive you the opportunity to resubmit your assignments if you don’t\n\nachieve a pass mark the first time around.", - "page_start": 36, - "page_end": 36, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "ASSIGNMENT\n\n1. Identify the verb in the following sentence:\n\nThe grey elephant drinks water from the largest lake in Africa.\n\n2. Identify the collective noun in the following sentence:\n\nThe board of directors voted in favour of the decision.\n\n3. Correct the punctuation in the following sentence:\n\nAnthea will you please buy bread milk and eggs when you go to the\n\nshop.\n\n4. Choose the correct word:\n\nCharles was accepted/excepted into the engineering studies course at\n\nOxbridge Academy.\n\n5. Choose the correct word:\n\nIts/It’s time to go home now.\n\n6. Choose the correct word:\n\nThey were late for work, because there/their train was delayed.\n\n7. Choose the correct word:\n\nYou’re/Your going to write your exam next week.", - "page_start": 54, - "page_end": 54, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "basic-english-language-skills.PDF", - "query": "I have trouble writing effective summaries in English, do you have any tips?", - "target_page": 29, - "target_passage": "To make a good summary, you need to: • Keep it brief. • Make sure to use main headings and keywords. • Focus on the main ideas. • Classify and organise the information in a logical manner. • Use your own words where possible. • Include examples. • Remember that your summaries are there to help you", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "###### CHAPTER 10:\n\nLANGUAGE SKILLS AT WORK HOW TO WRITE A COVER LETTER\n\nIf you’ve ever applied for a job, you’ll know that writing\n\nthe cover letter is the most difficult part of almost any job\n\napplication. Your cover letter creates the first impression, and\n\noften determines whether an employer will even look at your CV.\n\nYou need to use this opportunity to introduce yourself and your\n\nskills, and to set yourself apart from all the other candidates.\n\nYou can also use this opportunity to explain any gaps in your CV,\n\nand to motivate why you are the right person for the job.\n\ntips tips tips tips tips tips tips tips tips tips tips tips tips", - "page_start": 44, - "page_end": 44, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "9. Use correct grammar and spelling.\n\nThis will contribute to the clarity of your answers, and will prevent the\n\nperson marking your paper from having to guess what you mean.\n\n10. For longer questions and essay-style questions: plan your answers be­ fore you start writing.\n\nThis will help you to formulate logical arguments, as well as to structure your answers clearly. In essay questions, you will get marks for using the correct format, which includes making sure that you have an intro­ duction, sub-headings and paragraphs, and a conclusion.\n\n11. Where relevant, give examples.\n\nThis will help to demonstrate that you understand the topic.\n\n12. If you are writing an open-book exam, keep in mind that you won’t have\n\nenough time to look up all the answers.\n\nMake sure that you know your work, and that you know where to look\n\nfor key information. These types of exams are more focused on testing\n\nyour understanding than on testing your knowledge, which means that\n\nyou need to have a thorough grasp of the work.\n\n13. If you have to answer multiple-choice questions, make sure that you read the questions very carefully.\n\nTry to think of the correct answer before you read through the options, as you are less likely to become confused. When in doubt, go with your first instinct. If there is more than one correct answer, go with the an­ swer that appears to be most correct.\n\n14. If you start running out of time towards the end of the exam, write short notes as answers to each of the remaining questions, instead of trying to answer each question perfectly.\n\nThis way, you should still earn some marks for writing down the most important points.\n\n15. If you have time left at the end of the exam, go back and read through your answers to make sure that you are happy with them.\n\ntips tips tips tips tips tips tips tips tips tips tips tips tips", - "page_start": 43, - "page_end": 43, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "##### TABLE OF CONTENTS:\n\n1. General Language Tips to Get You Started\n\n2. Parts of Speech\n\n3. Punctuation\n\n4. Commonly Confused Words and Phrases\n\n5. Tips for Filling in Your College Registration Form\n\n6. Learn How to Summarise Your Study Material\n\n7. How to Ask for Help from Your Tutor\n\n8. Tips for Completing Your Written Assignments\n\n9. Tips for Answering Exam Questions\n\n10. Language Skills at Work - How to Write a Cover Letter\n\n11. Language Skills at Work - How to Write a Resignation Letter\n\n12. Language Skills at Work - Sending E-mails to Your Colleagues", - "page_start": 2, - "page_end": 2, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "SUMMARIES\n\nGeneral Tips for Making Summaries\n\n- Underline or highlight key points as you work through your study material, and make notes.\n\n- When you come across a word or concept you don’t understand,\n\nlook it up in a dictionary, or do some research on the concept, and\n\nadd your own definition to your summary.", - "page_start": 31, - "page_end": 31, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "To start off with, here are a few tips for improving your general\n\nlanguage and communication skills:\n\n1. Read as much as possible. Reading improves your vocabulary,\n\nand helps you to become familiar with sentence structure,\n\nword order, and the correct use of punctuation.\n\n2. Invest in a good dictionary. When you are unsure of the\n\nmeaning of a word, or when you come across an unfamiliar\n\nword, make sure to look it up in your dictionary.\n\n3. Keep a journal. This will give you an opportunity to practice\n\nyour writing skills on a regular basis.", - "page_start": 6, - "page_end": 6, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "19. You cannot use a dictionary when summarising your study material.\n\n20. Plagiarism is not a serious offence.\n\n21. When writing an exam, you should always answer the questions in\n\nnumerical order.\n\n22. E-mail etiquette is important in the workplace.\n\n23. Mind maps help you to understand the relationships between con­\n\ncepts.\n\n24. When you answer an essay question, you should try to include as\n\nmuch information as possible.\n\nDo the following:\n\n25. Create a mind map to summarise Chapter 7 (How to Ask for Help\n\nfrom Your Tutor). (5)\n\n26. List 3 things you need to do if you want to earn good marks for your\n\nwritten assignments. (3)\n\n27. List 5 important things to keep in mind when writing a cover letter.\n\n(5)\n\n28. List 5 of the things that you should include in a resignation letter.\n\n(5)\n\n29. List 3 methods you can use to summarise your study material. (3)\n\n30. Give 2 examples of how good language skills can benefit your ca­\n\nreer. (2)\n\n31. Complete the following sentence:\n\nSummarising your study material gives you the opportunity to", - "page_start": 57, - "page_end": 57, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "HERE ARE 10 TIPS FOR HOW YOU CAN ACHIEVE HIGHER MARKS FOR YOUR WRITTEN ASSIGNMENTS:\n\n1. Read (and follow) the instructions carefully.\n\nIf you are an Oxbridge Academy student, the general assignment\n\nguidelines will be provided in your “Success” Study Guide. Specific\n\ninstructions will also be included at the beginning of each of your\n\nassignments.\n\n2. Read the questions carefully.\n\nMake sure you understand what is being asked of you, so that you\n\nfocus on answering the right questions, instead of providing irrelevant\n\ninformation.\n\n3. Remember that presentation is important.\n\nNeatness, spelling, and the structure of your assignment will all count\n\ntoward the mark that you receive for your assignment.\n\n4. Use your course material and other external sources to find answers\n\nto the assignment questions.\n\nBut make sure to use your own words - don’t just copy. You need to show\n\nthe person marking your assignment that you have developed a sound\n\nunderstanding of the subject.\n\n5. When you use external resources, remember to reference them\n\nproperly, and to include them in a bibliography.\n\nIf you don’t, you may be guilty of plagiarism (www.oxforddictionaries.\n\ncom/definition/english/plagiarism), which is a serious offence.\n\n6. Always hand in your own work, and make sure that you use your\n\nown words when you formulate your answers.\n\n7. When it comes to essay questions:\n\n- Plan/outline your answer before doing the final draft.\n\n- Remember that essays have titles, introductions, bodies, and\n\nconclusions.\n\n- Use headings and paragraphs to structure your answer.", - "page_start": 37, - "page_end": 37, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "###### CHAPTER 1:\n\nGENERAL LANGUAGE TIPS TO GET YOU STARTED\n\nThis chapter focuses on the importance of language skills in the\n\nworkplace, and covers basic tips for how you can improve your\n\ncommand of the English language.\n\n*“The English language is nobody’s special property.*\n\n*It is the property of the imagination.*\n\n*It is the property of the language itself”*\n\n*Derek Walcott*", - "page_start": 3, - "page_end": 3, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "- Each paragraph should contain one main thought or idea, and there\n\nshould be a logical link between each paragraph and the next.\n\n- Make sure that you focus on answering the question - only include\n\nrelevant information, and remember to present logical arguments in\n\nsupport of your answer.\n\n8. Proofread your assignment before handing it in. Tip: read your\n\nanswers out loud to make sure that they sound logical.\n\n9. Always keep a copy or electronic backup of your assignment.\n\nThis way, you won’t have to start over if your computer crashes, or\n\nredo the whole assignment if the original goes missing.\n\n10. When you get your assignment back from your tutor:\n\nRead through the feedback, and learn from your mistakes. This will\n\nhelp you to prepare for your exams (if you have to write them), as well\n\nas to help you achieve better marks in future assignments.\n\nTYPES OF QUESTIONS THAT YOU WILL FREQUENTLY COME ACROSS IN ASSIGNMENTS\n\nIn your assignments, you will often be asked to write short paragraphs or\n\nlonger essays in which you have to “explain” a particular concept, “iden­\n\ntify” certain features, or “prove” a certain point.\n\nIt’s sometimes difficult to figure out exactly what these questions mean\n\n-- which is why we are providing you with the following explanations:", - "page_start": 38, - "page_end": 38, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "HERE ARE 15 THINGS YOU CAN DO TO IMPROVE YOUR RESULTS IN YOUR NEXT EXAM:\n\n1. Check that you have received the correct exam paper.\n\nYou don’t want to waste precious time (and energy) by starting with\n\nthe wrong paper.\n\n2. Read the instructions.\n\nYou don’t want to answer all the questions, only to realise halfway\n\nthrough the last essay that you were supposed to choose only one out\n\nof the three topics for Question 3.\n\n3. Read through the whole question paper before you start writing, and work out how much time you will have to answer each question.\n\nAs you read through the paper, highlight key words and phrases, so that you know what to focus on in each of your answers.\n\n4. Read the questions carefully, to make sure that you understand what is being asked of you.\n\nYou won’t get marks for providing information that, despite being cor­ rect, is irrelevant to the question.\n\n5. Remember that you don’t have to answer the questions in numerical order.\n\nJust make sure that you number your answers clearly.\n\n6. If you get stuck on a particular question, leave it and move on.\n\nYou can always go back to it later if you have time left over at the end\n\nof the exam.\n\n7. Be clear and concise in your answers.\n\nLook at the mark allocation to gauge how detailed your answers should\n\nbe. Make sure that you focus on answering the question, instead of\n\nsimply writing down everything that you know about the topic.\n\n8. Write neatly.\n\nThe person marking your paper won’t have time to sit and decipher\n\nuntidy handwriting.", - "page_start": 42, - "page_end": 42, - "source_file": "basic-english-language-skills.PDF" - } - ] - }, - { - "references": { - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", - "query": "Is exposure to risk factors that may affect mental wellbeing at work comparable across European countries?", - "target_page": 25, - "target_passage": "The country data vary significantly. Sweden, Greece and Luxembourg report over two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.", - "chunk_present": { - "presence": true, - "index": 3 - } - }, - "top_chunk": [ - { - "text": "Some of these groups are **directly addressed by European and national legislation** , for example,\n\nworkers with disabilities, young workers or pregnant women. For other groups of workers, for example,\n\nfor women or migrant workers, the legislative protection is formulated as a general ‘equal treatment’\n\nprescription, like to provide preventive measures for all groups in an enterprise (Framework Directive,\n\nArticle 15 ‘Risk groups’), or to provide solutions that fit to the individual (Framework Directive, Art. 6.2.d.).\n\nThere are some prescriptions that refer to specific preventive activities, for example, to provide written\n\ninstructions in different languages for safe work with chemicals.\n\n### **3.6 Conclusions**\n\nThe exposure **to psychosocial risks** is increasing, with mental health prevalence still emerging. Major\n\nwork-related exposures have grown in the past 15 to 25 years that is, time pressure, difficult clients,\n\nlonger working hours and poor communication. There is also some evidence that countries with over-\n\naverage employment in sectors like health and care or other human and client-oriented services\n\n(education, social work, tourism, entertainment) suffer from longer working hours and more mental\n\nburden. The northern countries are at the top of the countries with highest mental burden. The southern\n\ncountries have a high share of specific psychosocial risks related to work in tourism and entertainment,\n\ncharacterised by atypical working times and issues with difficult clients.\n\nEU-OSHA found in its ESENER 2014 data analysis: <sup>112</sup>\n\n*‘Concerning the sectors, national context appears to be related to differences in psychosocial risk*\n\n*management in all types of organisations, although in some sectors this relationship is weak. In the*\n\n*agriculture, forestry and fishing sector and the sectors of mining, construction, electricity, trade,*\n\n*transport, and accommodation and food, the low level of psychosocial risk management is observed*\n\n*also in a favourable national context. An explanation for this finding might relate to the large proportion*\n\n*of small organisations in these sectors, which, as concluded earlier, have poorer psychosocial risk*\n\n*management independently of the national context.’*\n\nThere is a stable **block of ‘conventional’ physical health risks** — ergonomics and risk from the work\n\nenvironment — and ergonomic risks that did not significantly change since 1990. It varies between 15%\n\nfor exposure to smoke, fumes and dusts to over 60% for repetitive hand/arm movements. **Ergonomic**\n\n**risks** develop in two directions: 1) traditional risks stagnate in total, that is, lifting and moving heavy\n\nloads, painful or tiring positions, and shifts between sectors (from industry to transport, health and care);\n\n2) risks of inactivity and highly repetitive hand/arm movements increase. Beside sectoral and\n\noccupational differences, it can be noted that in general higher percentages of exposed employed\n\npersons (workers and self-employed) are working in eastern and southern Member States.\n\nSince 2006 the average **working time** per week went down by 15 minutes for employees, and a slight\n\nreduction of most atypical — or unsocial — working times can be observed. Work intensification has\n\nemerged until 2005 but seems to stagnate since then. There are strong indications but no quantitative\n\nevidence on the extent to which working long hours, work at atypical times and probably also work with\n\nhigher risks were **transferred to workers in non-standard types of employment** .\n\n**Non-standard forms of employment** are — according to EU-OSHA — characterised by a non-\n\npermanent employment contract and the work not being performed at the premises of the employer.\n\nMost studies that dealt with the **connection between the employment forms and health outcomes**\n\nand in particular safety and health aspects found significant correlations. **New forms of employment**", - "page_start": 58, - "page_end": 58, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Figure 3: ‘Exposure to risk factors adversely affecting mental wellbeing’ - LFS Ad hoc survey 2020 <sup>14</sup>**\n\nESENER 2019 reveals that several **psychosocial risk factors** are reported to be present in a significant\n\nshare of establishments in the EU27, namely having to deal with difficult customers, patients and pupils\n\n(59%) and time pressure (45%).\n\nThe aspects **‘Difficult clients’, ‘Poor communication’ and ‘Long working hours’** are major psycho-\n\nsocial risks. The increase of workforce in communicative and client-oriented occupations — social work,\n\neducation, tourism and entertainment, health and care — during the last 30 years adds to the\n\nconventional work with clients in service, sales and health occupations.\n\nThe next table shows the top seven EU Member states with the highest share of these risks for all\n\nsectors and for the sector ‘Human health and social work activities’ (HHSW).\n\n**Table 1: Psychosocial risks, Top countries ‘All Sectors’ and ‘Human health and social work’ - ESENER**\n\n**2019**\n\n**Difficult customers, patients and pupils (‘clients’)** seem to be the most widespread psychosocial\n\nburden, with workers in Portugal, Malta and Cyprus are most exposed. In the sector HHSW, eastern\n\nEuropean countries are much more present, Slovenia at the top, followed by Portugal, Estonia, Poland\n\nand Bulgaria.", - "page_start": 25, - "page_end": 25, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "## **3 Status of working conditions**\n\nThis chapter on health and safety-related working conditions provides an overview on status and\n\ndevelopment of working conditions; it is mainly based on the indicators that were **selected for the data**\n\n**visualisation in the OSH Barometer** . This is a quite limited selection of major data; in surveys and\n\nstatistics many more indicators on working conditions are provided, particularly at national level.\n\nPractically all working conditions influence **mental health** , that is, they involve **psychosocial risks** , and\n\nall also involve **‘physical risks’** , including safety aspects of these risks. Mental health risks are\n\nillustrated in the OSH Barometer by datasets on time pressure, poor communication, dealing with difficult\n\nclients, discrimination and harassment, and similar. **Physical risks** include datasets on accidents at\n\nwork, exposures to chemical and biological substances, exposure to noise, vibrations, high or low\n\ntemperatures, and working tasks with ergonomic risks, like carrying, lifting heavy loads or work in tiring\n\nor painful positions; and also permanent physical inactivity, mainly sitting or long standing. <sup>2</sup>\n\nThe figure below shows the percentage of enterprises reporting OSH risks ‘present in the establishment’,\n\ncompared between 2014 and 2019 (ESENER) and covering mental and physical risks. <sup>3</sup>\n\n**Figure 1: Risk factors present (% of establishments) - ESENER 2014 and 2019**\n\nNote: Prolonged sitting was a new item in the 2019 survey.\n\nBetween 2014 and 2019, some risk factors increased, like ‘Repetitive hand and arm movements’, ‘Lifting\n\nor moving people of heavy loads’, and ‘Having to deal with difficult customer, patient and pupils; many\n\nothers showed no changes, like ‘Risk of accidents with machines or hand tools’, ‘Chemical or biological\n\nsubstances’, and ‘Loud noise’, or minor decreases like ‘Risk of accidents with vehicles’.", - "page_start": 22, - "page_end": 22, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "In 2007, 2013 and 2020, **Eurostat** asked employed persons in its ad hoc surveys to the Labour Force\n\nSurvey (LFS) whether they had **‘… exposure to risk factors that can adversely affect mental well-**\n\n**being’** . <sup>10</sup> In 2007 and 2013, the questions covered four items (time pressure and overload of work,\n\nviolence or threat of violence, harassment and bullying, other factors). In the 2020 survey, <sup>11</sup> ‘Mental\n\nwell-being’ was operationalised by an additional four response options, resulting in a total of eight\n\noptions: <sup>12</sup>\n\n*1. Severe time pressure or overload of work;*\n\n*2. Violence or threat of violence;*\n\n*3. Harassment or bullying;*\n\n*4. Poor communication or cooperation within the organisation;*\n\n*5. Having to deal with difficult customers, patients, pupils etc.;*\n\n*6. Job insecurity;*\n\n*7. Lack of autonomy, or lack of influence over the work pace or work processes; and*\n\n*8. Another significant risk factor for mental well-being.*\n\nForty-five per cent of the employed persons reported being exposed to risk factors that can adversely\n\naffect mental wellbeing. The country data vary significantly. Sweden, Greece and Luxembourg report\n\nover two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less. <sup>13</sup>\n\n© Quality Stock Arts/Adobe Stock", - "page_start": 24, - "page_end": 24, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "Looking at the data, it is quite obvious that the **northern and the central European countries are**\n\n**underrepresented** in the group of countries with the highest share of physical and ergonomic risks. The\n\ncentral European countries (Austria, Germany, the Netherlands, Belgium, Luxembourg and France, and\n\nthe two northern European countries Denmark and Sweden) are practically not present in these lists.\n\nThe picture changes if it is about lifting or moving of people, a consequence of the relatively larger\n\nrelevance of care work in these countries.\n\n**Physical inactivity and permanent or prolonged sitting or standing** is a specific ergonomic risk with\n\nhealth impacts for the musculoskeletal system but also contributing to other health impacts like\n\ncardiovascular diseases, tendency to overweight and so on. <sup>60</sup> According to ESENER 2019, the second\n\nmost frequently reported risk factor in the EU27 was **prolonged sitting** . By sector, it was most frequently\n\nreported by enterprises in financial and insurance activities (92% of establishments in the sector in the\n\nEU28), information and communication (92%), and public administration (89%). On average, three to\n\nfour hours of this sedentary behaviour occurs at work. In the EU, 28% of workers report that their work\n\ninvolves sitting almost all the time and a further 30% report sitting a quarter to three quarters of the time,\n\nand throughout Europe 18% of the workers sit more than 7.5 hours a day.\n\nAs mentioned in previous chapters, there exists a **share of workers exposed to physical risks** that is\n\nprevalent in spite of all structural and sectoral changes. Some of the structural changes of the economy,\n\nfor example, from industrial production to maintenance and repair, <sup>61</sup> might even cause higher ergonomic\n\nrisks; in general it will be more difficult to use technical help tools in varying maintenance and repair\n\nsituations, compared to more homogenous tasks in industry. Growing sectors, for example, home care\n\nof ill or elderly people, involve ergonomic risks due to transport and moving of patients and/or tiring\n\npositions.\n\n**OSH Barometer - Physical risks:**\n\n[https://visualisation.osha.europa.eu/osh-barometer/working-conditions-preventions/physical-](https://visualisation.osha.europa.eu/osh-barometer/working-conditions-preventions/physical-risk/vibrations-loud-noise-and-temperature)\n\n[risk/vibrations-loud-noise-and-temperature](https://visualisation.osha.europa.eu/osh-barometer/working-conditions-preventions/physical-risk/vibrations-loud-noise-and-temperature)\n\n**ESENER - Data visualisation:**\n\n[https://visualisation.osha.europa.eu/esener/en/survey/datavisualisation/2019](https://visualisation.osha.europa.eu/esener/en/survey/datavisualisation/2019)\n\n**EU-OSHA Themes - Musculoskeletal disorders:**\n\n[https://osha.europa.eu/en/themes/musculoskeletal-disorders](https://osha.europa.eu/en/themes/musculoskeletal-disorders)\n\n### **3.3 Contract types and work locations**\n\nThe chapter deals with the impact of **non-standard types** of work on working conditions in comparison\n\nto standard work, focusing on the impact of the ‘Conditions of employment’ on OSH.\n\nMost studies that dealt with the **connection between the employment forms and health outcomes**\n\nand in particular safety and health aspects found significant correlations. <sup>62</sup> A census-based study from\n\nBelgium on non-standard forms of work and mortality from Belgium concluded (2021):\n\n‘ *Our study, which to our knowledge is the first one to assess associations between forms of non-*\n\n*standard employment and mortality using population-wide data, revealed considerable mortality*\n\n*inequalities within the salaried employee population in Belgium. Over the subsequent 13 years and three*\n\n*months of follow-up, certain non-standard workers were at increased risk of death compared to*\n\n*permanently employed workers.’* <sup>63</sup>", - "page_start": 44, - "page_end": 44, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "And there are also **emerging and new risks** where health data will **not be available until a certain**\n\n**number of workers are exposed for quite a while** . Some prominent examples are nanotechnologies,\n\nthe significant increase of new chemically based technologies, vision impairment due to long hours of\n\nwork under artificial light at the same distance with small digital equipment, <sup>183</sup> more exposure to ‘global’\n\nbiological agents due to more interactional tasks, and travel and transport between countries and\n\ncontinents. On that note, the Covid-19 pandemic could also be used as an example. In 2022, the\n\nCommission proposed an update of the Recommendation on the ESOD to recognise Covid-19 as an\n\noccupational disease for workers particularly concerned: health and social care, home help or where\n\nthere is a proven risk of infection (during a pandemic) in other sectors <sup>184</sup> .\n\nIt adds to these difficulties that workers are often not only exposed to one disease causing exposure but\n\nto **several exposures** at the same time (exposure is understood here in a broad sense: ranging from\n\nlong working hours over postures and movements to harassment and violence and to noise and\n\nchemical and biological substances, etc.). **In theory, a single risk** — if below the threshold limit values\n\nand in line with legislation and standards — **will not cause harm — given that it is the only exposure** .\n\nThe impact of this single exposure is not strong enough to generate a disease on the level of severity\n\nof a recognised occupational disease. A **combination of several risks** might add several exposures,\n\nworsen the impact and cause serious harm.\n\nQuite well studied is the increased prevalence of musculoskeletal diseases, if not only ergonomic risks\n\nbut also high psychosocial risks are prevalent at the workplace. <sup>185</sup> Research has also found unexpected\n\nconnections like the synergistic effect of noise and certain chemicals on hearing impairments. Such\n\noutcomes of multi-risk profiles are often particularly difficult to identify and understand. Obviously, most\n\nsectors and occupations involve workplaces with **multi-risk profiles** . Some prominent major risks in\n\ncertain sectors or occupations are:\n\n- agriculture = accidents, chemical and biological agents, UV exposure;\n\n- delivery services = traffic accidents, ergonomics, time pressure, exhaust fumes;\n\n- decentralised renewable energy construction and maintenance = falls from height, electricity;\n\n- waste and recycling = biological and chemical agents, cuts and accidents;\n\n- mobile work = ergonomics, work without time and space limits;\n\n- care at home = emotional, ergonomic, difficult clients, unsafe household situations, infection\n\nrisks;\n\n- healthcare = emotional, ergonomics, biological;\n\n- personal and household services = emotional, ergonomic, unsafe household situations, e.g.\n\nunsafe electrical equipment, exposure to unknown chemicals;\n\n- long-haul sea, train, road or air transport = atypical working times, shift work, monotony, long\n\nphases of physical inactivity;\n\n- car repair = ergonomics, dust and fumes, chemicals;\n\n- construction = falls from height, accidents with machinery or vehicles, slips, trips and falls,\n\nergonomics, noise, chemicals, dust, UV exposure, etc.\n\n**ILO ‘List of Occupational Diseases Recommendation’**\n\n*2.4. Mental and behavioural disorders*\n\n- *2.4.1. Post-traumatic stress disorder*\n\n- *2.4.2. Other mental or behavioural disorders not mentioned in the preceding item where a*\n\n*direct link is established scientifically, or determined by methods appropriate to national*\n\n*conditions and practice, between the exposure to risk factors arising from work activities and*\n\n*the mental and behavioural disorder(s) contracted by the worker*", - "page_start": 75, - "page_end": 75, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "### **3.1 Psychosocial risks at work**\n\nDuring the last 30 years, the scientific, political and practical discussions on **psychosocial risks** and\n\npreventive measures against psychosocial risks have gained strong importance. After a period of doubts\n\nand resistance, today they are regarded as risks of the same severity as the classical physical safety\n\nand health risks. <sup>4</sup> (Chapter 1 covers the psychosocial risk aspect; for the prevalence of mental diseases\n\nand the burden of mental diseases see Chapter 2.2. <sup>5</sup> )\n\nLooking at the steady increase of certain psychosocial risk indicators at workplace level, either the **risks**\n\n**have increased** and/or the **number of people working in occupations** with higher psychosocial risks\n\nhas increased. <sup>6,7</sup> This is valid, for example, for the indicator time pressure, for example, in delivery\n\nservices, transport, and often also clerical work; the workforce has grown in sectors where emotional\n\ndemands from dealing with difficult clients, customers, pupils or patients are common; there are also\n\nmore workers employed (or self-employed) in interactional occupations, for example, in call centres, or\n\nin occupations with a high level of emotional tensions, for example, education, health and care.\n\n**Figure 2: Risk factors that can adversely affect mental wellbeing - EWCS <sup>8</sup> and ESENER <sup>9</sup>**\n\nA major difference between the ESENER and the EWCS survey is the respondent. In ESENER those\n\npersons who are most familiar with OSH or responsible for OSH in an enterprise were asked whether a\n\ncertain risk factor exists in the enterprise; in the EWCS survey workers themselves were asked whether\n\nthey are exposed to a risk factor.", - "page_start": 23, - "page_end": 23, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "If **a risk assessment is conducted just for compliance purposes** , and not used appropriately for the\n\nsuccessful management of OSH and reduction of accidents and occupational diseases, the risk\n\nassessment may lose its dynamic nature, and findings may be neither implemented nor communicated\n\nappropriately to employees.\n\nThe **types of risks included in risk assessments** are related to the risk profiles of different sectors,\n\nfor example, it is likely that risk assessments in heavy industries and manual occupations focus more\n\non safety risks. However, while sectoral risk profiles will naturally bias the identification of risks, smaller\n\nestablishments seem to have **less of a focus on MSDs or psychosocial risk factors** , which would\n\nsuggest that they are less well recognised or understood, in particular for MSEs. <sup>415</sup> Establishments also\n\nreport that psychosocial risk factors are more difficult to manage than other OSH risks, while as business\n\nsize grows, so does the proportion of respondents who perceive psychosocial risks as more difficult to\n\nmanage than other OSH risks. <sup>416</sup>\n\nESENER 2019 shows that a **reluctance to talk openly** about these issues seems to be the main\n\ndifficulty for addressing psychosocial risks (60% of establishments in the EU27). This, as with all the\n\nother difficulties considered (lack of awareness among staff/management and lack of expertise or\n\nspecialist support), is reported in all enterprise sizes but more frequently as establishment size grows.\n\nSpecifically, among those establishments that report having to deal with difficult customers, patients or\n\npupils, 51% of those employing 20 or more workers report having a procedure in place to deal with\n\npossible cases of threats, abuse or assaults by clients, patients or other external persons. This share\n\nrises to 74% among establishments in human health and social work activities.\n\nThe development of concrete outputs such as measures to better manage risks that can result in\n\n**musculoskeletal diseases** has actually seen a decline between 2014 and 2019, as follows:\n\n- 85% to 77% on the measure of ‘provision of equipment to help with the lifting or moving of loads\n\nor other physical heavy work’; <sup>417</sup>\n\n- 73% to 67% concerning ‘provision of ergonomic equipment’; and\n\n- 66% to 60% regarding ‘encouraging regular breaks for people in uncomfortable or static\n\npostures including prolonged sitting’. <sup>418</sup>\n\n© chokniti/Adobe Stock", - "page_start": 127, - "page_end": 127, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "*you off work because of your health problem in this period?’*\n\n260 Ibid., the value for Finland is from 2013, 2020 data are not provided’\n\n261 Ibid., Filter 6 months or over.\n\n**262** Eurostat: Self-reported work-related health problems and risk factors - key statistics, [here](https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Self-reported_work-related_health_problems_and_risk_factors_-_key_statistics#Prevalence_and_ramifications)\n\n263 Eurofound: European Working Conditions Survey 6 (EWCS 6), 2015, the exact question was: *‘Do you think*\n\n*you will be able to do your current job or a similar one until you are 60 years old?’* : Eurofound 2017: [Sixth ](https://www.eurofound.europa.eu/publications/report/2016/working-conditions/sixth-european-working-conditions-survey-overview-report)\n\n[European Working Conditions Survey - Overview report](https://www.eurofound.europa.eu/publications/report/2016/working-conditions/sixth-european-working-conditions-survey-overview-report) (2017 Update) (p. 48).\n\n264 Andersen et al., 2020: [Barriers and opportunities for prolonging working life across different occupational ](https://doi.org/10.1093%2Feurpub%2Fckz146)\n\n[groups: the SeniorWorkingLife study](https://doi.org/10.1093%2Feurpub%2Fckz146)\n\n265 Definition: ‘Administrative’ and ‘manual’ work is used throughout the report as a — quite colloquial —\n\nplaceholder to characterise the difference between two major types of work; it is only one of several options.\n\nInternational and European institutions developed categories with several levels of aggregation or granularity that\n\nare applied based on context and the objectives of the analysis. Eurostat uses the European Socio-Economic\n\nGroups (ESEG) or the International Standard Classification of Occupations (ISCO), EU agencies often use the\n\nUNESCO International Standard Classification of Education (ISCED) that describes not the occupation but the\n\nlevel of skills and education on an aggregated level, and in many international studies and reports the ILO\n\nInternational Standard Classification of Occupations (ISCO) is used.\n\n266 Eurostat: [Which sector is the main employer in the EU Member States?](https://ec.europa.eu/eurostat/web/products-eurostat-news/-/DDN-20171024-1) Data source: [Employment by A*10 ](https://ec.europa.eu/eurostat/databrowser/view/nama_10_a10_e/default/table?lang=en)\n\n[industry breakdowns](https://ec.europa.eu/eurostat/databrowser/view/nama_10_a10_e/default/table?lang=en)\n\n267 The development of questions in the ESENER and EWCS surveys between 2005 and 2015 (EWCS) and 2009\n\nand 2019 (ESENER) show this development: Questions on industry-related exposures were reduced and\n\nquestions on the impact of work organisation and psychosocial risks extended.\n\n268 Dixon, 2012: [“Emotion”: The History of a Keyword in Crisis](https://doi.org/10.1177/1754073912445814)\n\nDixon writes: *‘The word “emotion” has named a psychological category and a subject for systematic enquiry only*\n\n*since the 19th century. Before then, relevant mental states were categorised variously as “appetites,” “passions,”*\n\n*“affections,” or “sentiments.” The word “emotion” has existed in English since the 17th century, originating as a*\n\n*translation of the French émotion, meaning a physical disturbance.’*\n\n269 European Parliament, 2019: [EU policies - Delivering for citizens: Digital transformation](https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2019)633171)\n\n270 Cedefop, 2016: [The great divide: Digitalisation and digital skill gaps in the EU workforce](https://www.cedefop.europa.eu/files/esj_insight_9_digital_skills_final.pdf)", - "page_start": 150, - "page_end": 150, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**References and notes**\n\n1 OSH Barometer data visualisation tool: [https://visualisation.osha.europa.eu/osh-barometer](https://visualisation.osha.europa.eu/osh-barometer)\n\n2 Methodological remark: Many workers in the service sectors have similar physically demanding work like workers\n\nin manufacturing, construction and agriculture. The statistical assignment of enterprises of a certain type to the\n\nservice sectors and the sectors industry/construction/agriculture is a too rough approach to describe and analyse\n\nworking conditions, particularly if more detailed data on working conditions are available. For that reason, when\n\ntalking about health outcomes, in this report often more informative categories are used, for example, managerial\n\njobs (LFS, Eurostat terminology), or high-, medium- and low-skilled clerical work (EWCS), or high-skilled manual\n\nand low-skilled manual work (Eurostat), independent on the sector where this work is performed.\n\n3 EU-OSHA - European Agency for Safety and Health at Work: Third European Survey of Enterprises on New\n\nand Emerging Risks (ESENER 3), [ESENER Data visualisation](https://visualisation.osha.europa.eu/esener/en/survey/comparisons/2014/osh-management/en_1/company-size/E3Q200_5/EU27_2020/1) , section ‘Comparisons 2014-2019’; for ‘Prolonged\n\nsitting’ value from ‘Data visualisation 2019’ not from ‘Comparisons’.\n\n4 Some of the very first OSH regulations on psychosocial risks at workplaces were issued by Denmark in the early\n\n1980s, dealing with monotony at work, stress, risk of violence at work and risks of working alone.\n\n5 Psychosocial risks are regarded as reason, and mental health/disease as consequence or outcome of these\n\nrisks.\n\n6 OSHWiki, 2022: [Psychosocial issues - the changing world of work](https://oshwiki.osha.europa.eu/en/themes/psychosocial-issues-changing-world-work) ; OSHWiki, 2022: [Psychosocial risks and ](https://oshwiki.osha.europa.eu/en/themes/psychosocial-risks-and-workers-health)\n\n[workers health](https://oshwiki.osha.europa.eu/en/themes/psychosocial-risks-and-workers-health)\n\n7 EU-OSHA, 2007: [Expert forecast on emerging psychosocial risks related to occupational safety and health](https://osha.europa.eu/sites/default/files/report535_en.pdf)\n\n8 Eurofound, 2017: [Sixth European Working Conditions Survey - Overview report (2017 Update)](https://www.eurofound.europa.eu/publications/report/2016/working-conditions/sixth-european-working-conditions-survey-overview-report) (p. 48). Raw\n\ndata for 2015: Eurofound: [European Working Conditions Survey - Data Visualisation](https://www.eurofound.europa.eu/data/european-working-conditions-survey) ; Data for 2005: Eurofound:\n\n[Fourth European Working Conditions Survey](https://www.eurofound.europa.eu/surveys/european-working-conditions-surveys/fourth-european-working-conditions-survey-2005)\n\n9 EU-OSHA: [ESENER Data visualisation](https://visualisation.osha.europa.eu/esener/en/survey/comparisons/2014/osh-management/en_1/company-size/E3Q200_5/EU27_2020/1) , Comparisons 2014-2019.\n\n10 Due to the change of possible response items, the data for the three surveys cannot be compared; the number\n\nof mental risk factors increased from three in 2007 and 2013 to eight in 2020.\n\n11 Eurostat, 2021: [EU labour force survey 2020 module on accidents at work and other work-related health ](https://data.europa.eu/doi/10.2785/79618)\n\n[problems : assessment report : 2021 edition](https://data.europa.eu/doi/10.2785/79618)\n\n*12* *Eurostat: Persons reporting exposure to risk factors that can adversely affect mental well-being by sex, age and*\n\n*factor, data* *[here](https://ec.europa.eu/eurostat/databrowser/view/hsw_exp3/default/table?lang=en)* *and explanatory metadata* *[here](https://ec.europa.eu/eurostat/cache/metadata/en/lfso_20_esms.htm)*\n\n13 It has to be noted that in 2007 and 2013 the interviews were done face-to-face. In 2020 the interviews were", - "page_start": 140, - "page_end": 140, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", - "query": "Has the average working week for employees working full-time decreased since 2006?", - "target_page": 31, - "target_passage": ". The statistical data (Eurostat) show a slight decrease of the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019.", - "chunk_present": { - "presence": true, - "index": 8 - } - }, - "top_chunk": [ - { - "text": "**Figure 9: Average working time and work during unsocial hours - Eurostat LFS**\n\nTwo country examples might illustrate these developments (all data for 2019): Slovakia, a country with\n\na high share of process-based industries, reports that 15.0% of its workforce is working at night and 29%\n\nin shifts; for the EU27 this rate is 5.2% respectively and 18.3%. <sup>25</sup> Regarding work on Sundays three\n\nother countries are at the top of the EU27, the Netherlands, Ireland and Spain; they report between 18%\n\nand 21% (EU27 average = 13.5%); all three countries have an above-average share of sectors like\n\ntransport, tourism and agriculture. <sup>26</sup>\n\nFor all these types of work it should be take into account that other groups of **workers under non-**\n\n**standard types of employment contracts** (self-employed, agency workers, students, pensioners,\n\nundeclared workers) might have taken over work at these atypical working times.\n\nConcluding, it can be stated that there is a **slight trend towards a reduction of weekly working hours**\n\n**for regularly employed** workers, including a stable commuting time. Working hours at atypical times\n\nshow a mixed picture. Looking at most types of employees, **atypical working time decreased, except**\n\n**work on Sundays** . For self-employed with employees, the working time at atypical hours is in general\n\nat a higher level. The number of employees in night work is decreasing. More employees in service and\n\nclient-related occupations at night or in shifts but also here the atypical times are slightly decreasing.\n\nProbably these changes **mirror the structural economic changes** , that is, the shift of workforce\n\nbetween sectors. Night work was common in many industries as part of a three 8-hours shifts, not only\n\nin industries with permanent production processes (steel, chemicals, etc.). <sup>27</sup> Moreover night work is and\n\nwas common in essential services like health, transport, technical infrastructure and security. The", - "page_start": 31, - "page_end": 31, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Figure 7: Psychosocial risk factors - Differences between skill groups (Skill discretion)**\n\nFor ‘Decision authority’ and ‘Skill discretion’, the authors found a stable situation since 1995, even a\n\nsmall rise of skill discretion for manual workers after 2010. Regarding ‘Psychological demands’ and ‘Job\n\nstrain’, the major increase for all groups took place between 1995 and 2005. This growth decelerated\n\nafter 2005, this observation is also valid for other working conditions, like work intensity.\n\n#### * **3.1.1 Working time in hours and at atypical times** *\n\n**Too many hours of working time and/or working hours at atypical or unsocial times** can put **the**\n\n**mental** and **the physical health** of humans at risk. It is also regarded as a major **contributing factor**\n\n**to work accidents** , due to fatigue or exhaustion. <sup>16</sup>\n\nThe main indicator to describe working time is the **number of the weekly average working hours** of\n\nfull-time employees. However, regarding its impact on health and safety, **other aspects of working**\n\n**time are of the same relevance** :\n\n- How long is the average working day?\n\n- At which times and days is this work done (typical, atypical times)?\n\n- How often do long working hours take place?\n\n- Is the work split between two jobs?\n\n- How flexible are start and end?\n\n- How intense is the work during this time (breaks, deadlines)?\n\n- Which groups of workers have standard working times and which do not (e.g. depending on the\n\nsector or the type of contract, e.g. sub-contracted workers or self-employed)?\n\nThere is a **slight trend towards fewer working hours** for full-time **employees** (not ‘Employed persons’)\n\nin the EU27; between 2006 and 2019 the average weekly working time dropped from 40.2 to 39.9 hours,\n\na decrease of approximately 15 minutes. <sup>17</sup>\n\nRegarding the weekly hours, there are **no striking differences** between the EU27 Member States. In\n\n2019, Cyprus, Austria and Malta with a high share of workers in the sector of tourism (accommodation)\n\nhad the highest number of working hours per week (above 41 hours), and Denmark, the Netherlands\n\nand Italy the lowest number (39 or fewer) (full-time, employees, 15-64 years, all NACE codes). <sup>18</sup>", - "page_start": 28, - "page_end": 28, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "In several occupations, **classical safety risks often add to the above-mentioned exposures** , that is,\n\nslips, trips and falls, risks related to moving parts of machinery, moving vehicles, exposure to hot, cold,\n\nor hazardous materials, loud noise, chemical or biological substances, and in general physically\n\nexhaustive work.\n\nA certain **ergonomic risk** of many administrative and supervisory jobs is **physical inactivity** (61%), in\n\npractice meaning sitting most of the working time in front of digital equipment, sitting to make phone\n\ncalls or sitting in meetings. Not only administrative tasks but also many occupations in transport and\n\nindustry require prolonged sitting (transport, cashiers, parts assembly, etc.).\n\nIn the 10-year period before 2005, EU-wide surveys found a significant increase in work intensity. Major\n\ndifferences in work intensity and working time patterns can be seen between occupations, forms of work,\n\nsectors and enterprise size, for example. The length of the daily or weekly working time and its allocation\n\nwith the 24 hours of a day or at night are important factors for health and wellbeing. The Eurostat data\n\nshow a slight decrease **in the average weekly working time for full-time employees** (15-64 years)\n\nfrom 40.2 to 39.9 hours between 2006 and 2019.\n\nEurostat reports for all types of **‘employment at atypical working time’** a minor decrease between\n\n2011 and 2019, from 38.8% to 37.2% (EU27 average), for all employed workforce and all types of such\n\natypical time. The data also document slight increases or decreases of the different types of work during\n\natypical times > on Saturdays the percentage decreased from 28% to 25%, working in the evenings\n\ndecreased from 19% to 15%, working on Sundays remained stable at around 13.5%, work at night fell\n\nfrom 7% to 5%, and shift work increased slightly from 17% to 18%. Some **groups of self-employed**\n\nshow a higher rate of atypical working times: for **high-managerial self-employed** , this rate is 43.2%\n\nand for **low-managerial self-employed** 64.5%.\n\n**Significant differences also exist between eastern/southern and central/northern/western**\n\n**European countries.** More physical and ergonomic risks (except inactivity) are reported from eastern\n\nand southern EU Member States but more emotional demands (e.g. difficult clients, poor communication\n\nand long working hours) in northern and central European countries. One of the major reasons might\n\nbe the reallocation of industrial production to eastern countries after the EU extension to 24 and later to\n\n27 Member States.\n\n### **Conditions of employment and workforce development**\n\nDuring the past decades and at faster pace after 1990, a **greater variety of non-standard contractual**\n\n**relations** has emerged. Typical characteristics of non-standard work are part-time work, temporary (or\n\nfixed-term) work, seasonal work, casual work, home-based work, telework, self-employment or family\n\nwork. Currently, high public awareness is directed to those types of non-standard work that are\n\nconnected either to **new forms of contracts** (voucher, platform, zero-hours, portfolio, etc.) or increasing\n\n**types of work not bound to the premises of the employer** (mobile, at home, at client’s place), mostly\n\nmade possible by the increased use of modern information and communication technologies (ICT).\n\nThese forms of work often have as a — additional — major characteristic a **less clear employer-**\n\n**worker relationship** .\n\nHowever, in 2019 the conventional employment contract still accounted for around 86% of the workforce\n\n(EU27), 9% are ‘own-account’ workers, that is, self-employed without employees. The remaining 4%\n\nwere self-employed with employees (employers) and less than 1% were contributing family workers. Of\n\nall employed workers, 17.2% worked part-time and 13.3% had temporary contracts.", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "strategic approaches the objective to reach these enterprises/self-employed. The reason for the\n\ncontinued levels of intensification of work from 2005 onwards might be that the related tasks were\n\ncontracted out or put on the shoulders of non-standard workers, for example, self-employed, temporary\n\nand seasonal workers.\n\nSome **EU OSH legislation** may be adapted and modernised to cope with the changes in technologies,\n\nemployment conditions, longer working life, and a growing share of mobile and remote work. Many of\n\nthese changes in the world of work have caused higher insecurity, less clear employer- worker relations,\n\nand a higher burden of psychosocial and ergonomic risks.\n\n### **Which are the areas of concern?**\n\n**Incomplete compliance with OSH regulation is more noticeable in** certain sectors and types of work.\n\nMost of these types of work — mobile and home-based work, domestic work, care work and long-term\n\ndomestic care work, seasonal work, platform work, non-voluntary self-employed — are growing in terms\n\nof workforce. But many of these work and employment formats are until now not covered in the same", - "page_start": 17, - "page_end": 17, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "employed and contracted work, military, public sector, mining, workers in the marine sector and offshore\n\ninstallations, family members, personal and household services, work in charitable organisations,\n\nvolunteers in general, and domestic and mobile workplaces. In addition to these existing exemptions,\n\nwe can observe in the last two to three decades an accelerating trend of erosion of the conventional\n\nemployer- employee relation. Examples are outsourcing of work to contractors, often to self-employed,\n\nor platform work.", - "page_start": 121, - "page_end": 121, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "were self-employed with employees (employers) and less than 1% were contributing family workers. Of\n\nall employed workers, 17.2% worked part-time and 13.3% had temporary contracts.\n\nNon-standard types of work that are characterised by the circumstance that **the work is not taking**\n\n**place at the premises of the employer** are mobile and home-based work, domestic work, care work\n\nand long-term domestic care work, and online platform work. In 2019, approximately 77% worked at the\n\nemployer’s premises, 5% at home, 9% at the clients’ places and 8% at non-fixed workplaces. With the\n\nonset of the COVID-19 pandemic in 2020, the share of work at home more than doubled; in the EU27 it\n\nincreased from 5.4% in 2019 to 13.4% in 2021.\n\nCompared to work at the premises of the employer, such non-standard workplaces often miss basic\n\nOSH facilities (Minimum requirements at workplaces directive), availability and suitability of help tools\n\n(Work equipment directive and Personal protective equipment directive), or provision of adequate digital\n\nand mobile tools (Display screen equipment directive).", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Figure 18: Employment types in EU27, development 2005 to 2022 <sup>65</sup>**\n\n**- Eurostat**\n\nThe minor deviation of the sum of the different types of employment to the 100% ‘Employed persons’ is due to ‘No\n\nresponse’ answers. The data of part-time employees and of employees with a temporary contract are for the full\n\nyear 2019, not for Q4.\n\nThe group ‘employees’ is characterised by **two major contractual distinctions** that are important for\n\nOSH: 1) **full- or part-time** work, and 2) the **time limit of the contract** (indefinite or temporary).\n\nMoreover, in many Member States there are major differences between employment contracts of private\n\nemployers in comparison to public employers.\n\n**Definitions Eurostat <sup>66</sup>**\n\n**Employers = self-employed with employee:** employing one or more employees: persons who work\n\nin their own business, professional practice or farm for the purpose of earning a profit and who employ\n\nat least one other person.\n\n**Self-employed:** not employing any employees (self-employed without employees): persons who work\n\nin their business, professional practices or farm for the purpose of earning a profit and who employ no\n\nother persons.\n\n**Employees:** persons who work for a public or private employer and who receive compensation in the\n\nform of wages, salaries, fees, gratuities, payment by result or in kind.\n\nContributing family workers: persons who help another member of the family to run a farm or\n\nbusiness, provided they are not classed as employees.", - "page_start": 46, - "page_end": 46, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "methodology, the OSH practitioners who were asked in ESENER seem to have a different view on time\n\npressure than the workers themselves who are respondents in the LFS.\n\n**Figure 15: Percentage of employed persons with working time under pressure (per country, sum of**\n\n**responses ‘Always’ and ‘Often’) - LFS Ad hoc 2019**\n\nOne hypothesis to explain the increased time pressure is to draw a direct **connection between short**\n\n**weekly working time and more intense work** ; or in other words, a short weekly working time leads to\n\nmore **intensification of work or more long hours or atypical working times** (‘trading flexibility for\n\neffort’). <sup>38</sup>\n\nThe analysis of EU survey data shows **a mixed picture** : Firstly, ESENER data corroborate this\n\nhypothesis, the three countries with highest percentage of work under time constraints — that is, Finland,\n\nSweden and Denmark — all have working hours under the EU average. Secondly, LFS data show a\n\ndifferent picture; a country like Greece has the longest working hours and also reports the highest time\n\npressure, the same ‘combination’ — but less extreme — applies to Austria, Cyprus and Malta. Trends\n\nof low or less than average working time and no time constraints are reported for Lithuania, and medium\n\nworking time and low time constraints for Italy and Ireland.\n\nAn analysis of EWCS data concluded <sup>39</sup> that in general intensity increases with long working hours, in\n\nenterprises with 1-19 the work intensity index (on a scale between 0 and 12) is 4.4, in larger enterprises\n\nwith above 40 employees it is 6.3. This is in line with ESENER data that corroborate the importance of\n\nthe **size of the enterprise** for time pressure and long working hours.\n\nLiterature — from very diverse disciplines — on work intensification points to **reasons for**\n\n**intensification on developments as: <sup>40</sup>**\n\n- Economic developments, particularly the dominance of neoliberalist policies and enhanced\n\ncompetition between workers, companies and states; reduction of state influence and\n\nprivatisation. <sup>41</sup>\n\n- Pressure due to substantial organisational changes, for example, introduction of short-term\n\neconomic objectives in enterprise policies, <sup>42</sup> expansion into new markets or new countries,\n\nacquiring other enterprises or merging, being acquired, restructuring of management or of basic\n\nstaff working conditions (contracts, working time, flexibility). <sup>43</sup>\n\n- Decrease of trade union influence or worker participation regarding labour relations.\n\n- Liberalisation of labour legislation, creation of ‘new forms of work’ and new contract types,\n\nbeyond the permanent full-time employment. <sup>44</sup>\n\n- New forms of management, application of management concepts like just-in-time production or\n\nlean management, higher flexibility of production and higher customer orientation, <sup>45</sup>", - "page_start": 35, - "page_end": 35, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Figure 8: Hours worked per week of full-time employment, EU27 - Eurostat**\n\nThe **commuting time** between home and workplace is quite stable; in 2005 at EU27 level, it stood at\n\n42.4 minutes, and in 2015 Eurostat reports 40.2 minutes (time for both ways, to the workplace and\n\nback). <sup>19</sup>\n\n**Work at atypical working times** is in general regarded as a working condition with negative health\n\nimpact, called **work extensity** . The two major indicators of atypical working times are work at **‘atypical**\n\n**working times’** and **‘long working hours’** .\n\nEurostat reports for **‘Employment at atypical working time’** <sup>20</sup> a minor decrease between 2011 and\n\n2019, from 38.8% to 37.2% (EU27), for all employed workforce and all types of such atypical time. <sup>21</sup>\n\nSome **groups of self-employed** show a higher rate of atypical working times but also for most of the\n\ncategories of self-employed the rates decreased during the period 2011 to 2019. **High managerial self-**\n\n**employed** had a slight increase from 42.1% to 43.2% in this period. For the **low managerial self-**\n\n**employed** Eurostat finds a decrease from 69.2% to 64.5%. The figures for **small entrepreneurs**\n\ndropped slightly from 56.6% to 54.1%, the same applies for employed persons in **personal care work**\n\nwith a minor change (50.6% to 49.8%). **Agricultural self-employed** had the highest level of such\n\nworking times; they showed a decrease from 68.4% to 63.4%.\n\nThe length of the daily or weekly working time, its allocation over the 24 hours of a day or at night are\n\nimportant factors for health and wellbeing. The statistical data (Eurostat) show a slight decrease **of the**\n\n**average weekly working time for full-time employees** (15-64 years) from 40.2 to 39.9 hours between\n\n2006 and 2019. <sup>22</sup> The data also document slight increases and decreases of work at atypical times\n\n(response option for frequency: ‘usual’). <sup>23</sup> In 2006 and 2019, the following percentages of all employed\n\npersons worked at atypical times: on **Saturdays** the percentage decreased from 28% to 25%, **working**\n\n**on Sundays** remained stable at around 13.5%, **working in the evenings** decreased from 19% to 15%,\n\n**work at night** fell from 7% to 5% and **shift work** increased slightly from 17% to 18%. <sup>24</sup>", - "page_start": 30, - "page_end": 30, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "use of modern and powerful ICT technologies, or a combination of those two forms. Depending on the\n\nwork tasks, ICT infrastructures enable complete independence and separation from the premises of the\n\nemployer. In addition, they open opportunities for new forms of contracts and can go along with blurred\n\nOSH responsibilities.\n\nThese forms of work often have as a major quality (feature) a **less clear employer- employee relation** .\n\nThe main structural element of the EU OSH legislation is the dual role of employers and employees in\n\nOSH. The **employer has the overall responsibility** for OSH (Framework Directive Article 5: *‘… duty*\n\n*to ensure the safety and health of workers in every aspect related to the work …’* ), and the **worker the**\n\n**obligation to contribute** (Framework Directive Article 13 … *‘to take care as far as possible of his own*\n\n*safety and health and that of other persons affected by his acts or omissions …’* ). Where OSH legislation\n\nhas to be applied in less clear employer- employee relations, for example, in the case of self-employed,\n\nthe relevance and impact of ‘dyadic’ OSH regulations seem to fade.\n\nNot only the EU is struggling with this development, but Australia also introduced the legal identity of a\n\n**PCBU** : ‘Significantly, the primary duty of care will shift from the “employer” to the broader **“person**\n\n**conducting a business or undertaking”** (PCBU) and duties previously owed to “employees” will now\n\napply to all workers.’ <sup>64</sup>\n\nDuring the past decades, and especially after 1990, a much **greater variety of such contractual**\n\n**relations** has emerged. However, in 2019 the conventional employment contract (part- or full-time) still\n\naccounts for around 86% of the workforce (EU27), they are employees. Seventeen per cent of these\n\nemployed persons have a part-time contract, 13% of the employees have a temporary contract, or both\n\ncombined. Nine per cent are self-employed without employees. The remaining 4% are self-employed\n\nwith employees (employers) and 1% are contributing family workers. The number of self-employed in\n\nagriculture halved between 2005 and 2019, which is the biggest factor in the reduction of contributing\n\nfamily workers and the stagnation of the number of self-employed.\n\n© FotoAndalucia/Adobe Stock", - "page_start": 45, - "page_end": 45, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", - "query": "What is the definition of a work accident according to the International Labour Organisation?", - "target_page": 38, - "target_passage": "ILO Definition of accident: ‘An occupational accident is an unexpected and unplanned occurrence, including acts of violence, arising out of or in connection with work, which results in one or more workers incurring a personal injury, disease or death.’", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "home workers but as workers at the premises of clients (Eurostat). In some important OSH aspects, it\n\nis similar to the work of the other professions; these service workers fulfil their work tasks in a private\n\nenvironment where the employer can hardly perform a risk assessment, for example, of the electrical\n\nappliances or safety of floors, handrails or roofs. The risk assessment is done by the worker on the spot,\n\nbased on experience. This is similar to short-term care work.", - "page_start": 48, - "page_end": 48, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "strategic approaches the objective to reach these enterprises/self-employed. The reason for the\n\ncontinued levels of intensification of work from 2005 onwards might be that the related tasks were\n\ncontracted out or put on the shoulders of non-standard workers, for example, self-employed, temporary\n\nand seasonal workers.\n\nSome **EU OSH legislation** may be adapted and modernised to cope with the changes in technologies,\n\nemployment conditions, longer working life, and a growing share of mobile and remote work. Many of\n\nthese changes in the world of work have caused higher insecurity, less clear employer- worker relations,\n\nand a higher burden of psychosocial and ergonomic risks.\n\n### **Which are the areas of concern?**\n\n**Incomplete compliance with OSH regulation is more noticeable in** certain sectors and types of work.\n\nMost of these types of work — mobile and home-based work, domestic work, care work and long-term\n\ndomestic care work, seasonal work, platform work, non-voluntary self-employed — are growing in terms\n\nof workforce. But many of these work and employment formats are until now not covered in the same", - "page_start": 17, - "page_end": 17, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "*8.7 Take immediate and effective measures to eradicate forced labour, end modern slavery and*\n\n*human trafficking and secure the prohibition and elimination of the worst forms of child labour,*\n\n*including recruitment and use of child soldiers, and by 2025 end child labour in all its forms*\n\n*8.8 Protect labour rights and promote safe and secure working environments for all workers,*\n\n*including migrant workers, in particular women migrants, and those in precarious employment*\n\nThe **WHO** is following a global approach towards **occupational health** . They summarised their base of\n\nevidence on global working conditions in some **key facts** : <sup>332</sup>\n\n- *In many countries more than half of workers are employed in the informal sector with no social*\n\n*protection for seeking health care and lack of regulatory enforcement of occupational health and*\n\n*safety standards.*\n\n- *Occupational health services to advise employers on improving working conditions and*\n\n*monitoring the health of workers cover mostly big companies in the formal sector and more than*\n\n*85% of workers in small enterprises, informal sector, agriculture and migrants worldwide do not*\n\n*have any occupational health coverage.*\n\n- *Work-related health problems result in an economic loss of 4- 6% of GDP for most countries.*\n\n*The basic health services to prevent occupational and work-related diseases cost on average*\n\n*between US$ 18 and US$ 60 (purchasing power parity) per worker.*\n\n- *About 70% of workers do not have any insurance to compensate them in case of occupational*\n\n*diseases and injuries.*\n\n- *Research has demonstrated that workplace health initiatives can help reduce sick leave*\n\n*absenteeism by 27% and health-care costs for companies by 26%.*\n\nBased on this evidence, the WHO Global Assembly agreed on a ‘Worker health global plan of action’ in\n\n2007 <sup>333</sup> (updated 2013) that included targets like better prevention at workplaces, that is, Objective 2:\n\n*to protect and promote health at the workplace.* The WHO has worked together with the ILO to estimate\n\nthe burden of diseases from work and published the ‘WHO/ILO joint estimates of the work-related\n\nburden of disease and injury’.\n\nWhen looking at the work of global institutions during the past two to three decades — and for the ILO\n\nalso much further back — many important **agreements, conventions, government actions and**\n\n**global business** programmes have been negotiated, agreed and issued. The objectives and necessary\n\nmeasures at a global level have been made much more concrete by these efforts. OSH and working\n\nconditions are on the agenda of these organisations, and general and concrete targets and indicators\n\nhave been set. The **task is the implementation of these principles and programmes** in every region\n\nand country of the world in a way that it reaches all workplaces.\n\n**OSH Barometer - OSH Infrastructure - International organisations and international programmes**\n\n[https://visualisation.osha.europa.eu/osh-barometer/osh-infrastructure/international-organisations](https://visualisation.osha.europa.eu/osh-barometer/osh-infrastructure/international-organisations)\n\n[https://visualisation.osha.europa.eu/osh-barometer/osh-infrastructure/international-programmes ](https://visualisation.osha.europa.eu/osh-barometer/osh-infrastructure/international-programmes)\n\n**ESENER - Data visualisation**\n\n[https://visualisation.osha.europa.eu/esener/en/survey/datavisualisation/2019](https://visualisation.osha.europa.eu/esener/en/survey/datavisualisation/2019)", - "page_start": 116, - "page_end": 116, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "**Women**\n\n· Most women in the EU bear the main responsibility of household work and childcare. The health\n\nrisks from this non-paid work add up to the risks from their paid work; this double burden in general is\n\nnot, however, considered when addressing occupational health problems faced by women.\n\n· In surveys, about 6% of women under 30 in the EU have reported sexual harassment at work\n\n(though this may be an under-estimate).\n\n· Overall, women report fewer work-related accidents than men, but higher levels of work-related\n\nhealth problems, including MSDs and stress (see also the overview in the EIGE ‘Gender statistics\n\ndatabase’, section: Working conditions). <sup>99,100</sup>\n\n**Migrants**\n\nWhile a minority of migrant workers hold high-skilled jobs, many have jobs that are “dirty, dangerous\n\nand demanding” and consequently face high risks of work-related accidents and disease.\n\n· Language and cultural barriers also contribute to higher risks for migrant workers.\n\n· While EU-wide statistics are not available, country studies confirm that migrant workers suffer higher\n\nlevels of work-related accidents and disease. Health and safety risks are believed to be higher for\n\nundocumented migrant workers although, because of their situation, there is a lack of data on their\n\nconditions.\n\n**Low-qualified workers**\n\n· Low-qualified workers are found mainly in traditional sectors, including manufacturing, agriculture,\n\nconstruction, wholesale and retail trades.\n\n· Very often these workers have high-risk or elementary occupations that expose them to a higher rate\n\nof injuries and health-related problems.\n\n· Low-qualified workers have less autonomy, less responsibility and overall experience less job\n\nsatisfaction than workers with higher qualifications. Most low-qualified workers have low-paid jobs and\n\nmany have temporary contracts.\n\n**Ageing workers**\n\n· Ageing workers are more at risk of occupational health problems than younger workers because they\n\nhave been exposed longer to certain hazards. Older workers report more work-related health\n\nproblems than younger workers, with backache and muscular pain for more than 70% of workers aged\n\n55 and more.\n\n· Older workers are at lesser risk of non-fatal accidents because they have greater experience;\n\nhowever fatal accidents are more frequent than for younger workers.\n\n· Recovery time and return to work after illness are key issues to address when aiming to increase the\n\nemployment rate of ageing workers.\n\n**Young workers <sup>101</sup>**\n\n· Overall, young workers have a higher rate of non-fatal injuries than older workers.\n\n· Young workers are more likely to be employed under non-standard forms of contractual\n\narrangements such as part-time or temporary contracts.\n\n· Younger workers have less training, experience and maturity in their job, which puts them at risk of\n\noverestimating their physical capacities or underestimating the safety and health risks associated with\n\ntheir tasks.\n\n· A further concern is that exposure to workplace risks when young can contribute to later disease -\n\nthis factor is not, however, addressed by worker health and safety surveillance.", - "page_start": 54, - "page_end": 54, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "## **1 Executive summary**\n\n### **How can the ‘state of OSH’ in the EU be assessed?**\n\nThis report describes the **state of OSH in the EU** , and accordingly the **trends and the developments** ,\n\nthat is, the changes in state over time. The report refers to different periods in time, mostly to the situation\n\nbetween 2005 — after the substantive enlargement of the EU in 2004 — and 2019; if the use of earlier\n\nor more recent start or endpoints was reasonable and data were available, a different time frame was\n\napplied.\n\n**Two criteria were crucial for the selection of these indicators: availability of reliable data and the**\n\n**relevance of the indicators.** An ideal and complete set of indicators would cover even more indicators\n\nthan presented in this report, but major limits were set by the availability of reliable data.\n\nThe main data sources **comprise a large variety of quantitative datasets** , for example, Eurostat\n\nstatistics and EU-wide surveys (e.g. EU-OSHA’s European Survey of Enterprises on New and Emerging\n\nRisks (ESENER), Eurofound’s European Working Conditions Survey (EWCS), Eurostat’s Labour Force\n\nSurvey (LFS) and its ad hoc modules, and the Flash Eurobarometer, detailed background reports on\n\nrisks, groups of workers, OSH systems and infrastructures (e.g. by EU-OSHA, Eurofound, the\n\nFundamental Rights Agency, etc.), and evaluations and assessments of the level of implementation of\n\nOSH directives (e.g. by the Directorate-General for Employment, Social Affairs and Inclusion (DG\n\nEMPL) or the Senior Labour Inspectors Committee (SLIC) surveys facilitated by the National Labour\n\nInspectorates). Regarding the description of developments beyond the EU, data were taken from the\n\nInternational Labour Organisation (ILO), the World Health Organisation (WHO), the International Social\n\nSecurity Association (ISSA), the United Nations (UN), the Organisation for Economic Co-operation and\n\nDevelopment (OECD), the International Commission on Occupational Health (ICOH) and the\n\nInternational Association of Labour Inspection (IALI).\n\nPlease note that Eurostat employment data and ICOH data were retrieved in 2023. Current figures\n\nmight slightly deviate due to updates and corrections.\n\n### **Working conditions - Risk factors at work**\n\n**Shifts in work tasks and workforce between sectors, technological progress and the develop-**\n\n**ment of higher skill levels** have led to less work in manual occupations and more work in administrative\n\n(clerical, professional, managerial, etc.) occupations as well as in client-oriented and communicative\n\noccupations.\n\nConsequently, these developments caused a **shift of risks to psychosocial and emotional**\n\n**challenges** . This can be documented by the growing percentage of workers who report difficult clients\n\n(60%), long or irregular working hours (22%), and poor communication in the organisation (18%) (all\n\ndata from ESENER 2019 or EWCS 2015) The OSH risks for these occupations — gradually but also\n\nsignificantly — shifted from safety risks to health risks. The psychosocial risks for mental health and the\n\nemotional challenges increased; they clearly correlate with more work in emotionally demanding and/or\n\nclient-oriented sectors, be it in tourism, entertainment or education, public transport, social work, or\n\nhealth and care.\n\nThe trend towards more psychosocial and emotional challenges at work **does not mean that ‘classical’**\n\n**exposures** or **ergonomically burdensome work has disappeared** . There is a large number of\n\nworkers in all sectors — between 40% and 75% in ESENER and the EWCS — who report **ergonomic**\n\n**risks** . These are, for example, repetitive hand and arm movements in industry and service occupations,\n\nwhere a particularly high percentage is reported by low-skilled manual workers; moving heavy loads in\n\ncraft occupations, or patients in health and care occupations, where a particularly high percentage is", - "page_start": 9, - "page_end": 9, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "segmentation of enterprises into profit centres, quality management obligations,\n\nexternalisation/subcontracting of service areas like cleaning, canteen, security and so on.\n\n- Increased communication and interdependency, time coordination and synchronisation\n\nrequirements between units, enterprises and in supply chains.\n\n- Less direct supervision and more objective and results-based management.\n\n- Last but not least the massive introduction of ICT and other work-intensifying technologies.\n\n**The main reasons for stagnation after 2005 might be** that many of the above-mentioned concepts or\n\npolicies were developed or had their peak during the 1980s, 1990s or the first decade of the 21st century.\n\nSome of them lost their dynamic (e.g. privatisation), or have become a kind of standard (management\n\nby objectives), or were widely implemented in the first decade of the 21 <sup>st</sup> century (ICT facilities at most\n\nworkplaces); also, some negative impacts on working time were mitigated by state interventions (i.e. the\n\nEU Working time directive <sup>46</sup> ) or labour agreements. <sup>47</sup>\n\nOf particular interest for OSH probably is that the changes in labour legislation, the production in\n\ninternational supply chains and technological improvements were sufficiently developed to shift quite a\n\nrelevant part of work to other types of contracts, that is, to **subcontractors, self-employed or**\n\n**temporary agent workers** and other forms of non-standard work contracts. Reasons were economic\n\nsavings but also better management of **intense work periods, peak times and risky work** .\n\nThese developments are probably the main reason that work intensity **stayed at a similar level for the**\n\n**employed workers** with a standard contract while the working conditions of other types of work\n\ndegraded. EU-OSHA has **taken this conclusion** already in 2002 in its report <sup>48</sup> on ‘New Forms of\n\nContractual Relationships and the Implications for Occupational Safety and Health’:\n\n*‘1. the transfer of risks in the (practical) conditions of work to non-permanent employees and to*\n\n*subcontractors;*\n\n*2. segmentation in the workforce based on differences in contractual conditions of employment (working*\n\n*hours, job insecurity, and qualifications).*\n\n*In the first scenario, risks directly related to working conditions (bad ambient and ergonomic conditions)*\n\n© MaciejBledowski/Adobe Stock", - "page_start": 36, - "page_end": 36, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "## **6 OSH legislation and OSH infrastructure in the EU**\n\n### **6.1 Foundation, legislation, compliance and supervision**\n\nThe **ethical and economic importance of safe and healthy working conditions** led to an integration\n\nof this target in international conventions and agreements; it is also embedded in the treaties of the EU.\n\n**UN** has included **‘Safe and secure work environment’** as an indicator for **Goal 8** of their 17 global\n\n**‘Sustainable Development Goals** ’ for 2030. Goal 8 aims to *‘Promote sustained, inclusive and*\n\n*sustainable economic growth, full and productive employment and decent work for all’* . <sup>334</sup> It requests in\n\nits target 8.8 to *‘Protect labour rights and promote safe and secure working environments for all workers,*\n\n*including migrant workers, in particular women migrants, and those in precarious employment.’*\n\nThe **Preamble to the Constitution** <sup>335</sup> **of the ILO** includes as an objective *‘* … *the protection of the*\n\n*worker against sickness, disease and injury arising out of his employment ...’* [. In 2022, the objective of ](https://www.ilo.org/wcmsp5/groups/public/---ed_norm/---declaration/documents/normativeinstrument/wcms_716594.pdf)\n\na safe and healthy working environment became part of the ‘Declaration on Fundamental Principles and\n\nRights at Work’, adding OSH to the existing four basic principles, that is, 1) freedom of association and\n\nright to collective bargaining, 2) the elimination of all forms of forced or compulsory labour, 3) the\n\neffective abolition of child labour, and 4) the elimination of discrimination. Between the year of the\n\nfoundation in 1919 and today, the ILO agreed on more than 40 conventions and recommendations\n\naddressing OSH, be it either general provisions or provisions for specific groups and sectors or specific\n\nrisks. <sup>336</sup>\n\nThe **EU and its predecessors** have enshrined health and safety of workers in their **founding treaties** .\n\nAlready in 1951, it was stated in Article 3 of the European Coal and Steel Community (ECSC) Treaty\n\nthat *‘The institutions of the Community shall, within the limits of their respective powers, in the common*\n\n*interest … promote improved working conditions and an improved standard of living for the workers in*\n\n*each of the industries for which it is responsible …’* . <sup>337</sup> During the development of the European\n\ninstitutions and the EU from those years until today, references to working conditions and safety and\n\nhealth were always part of the treaties, and also in the latest Treaty of Lisbon from 2009. <sup>338</sup>\n\nIn **Article 151 of the Lisbon Treaty,** it is stated that *‘The Union and the Member States, shall have as*\n\n*their objectives the promotion of employment, improved living and working conditions …’* . The areas of\n\nsuch promotion are set out in **Article 153** , where two bullet points refer to OSH: (a) *improvement in*\n\n*particular of the working environment to protect workers’ health and safety; (b) working conditions.* In\n\n2017, the European Commission launched an initiative to agree on the **‘European Pilar of Social**\n\n**Rights’** (EPSR), comprising 20 key principles guiding the EU in the field of social policy. <sup>339</sup> These pillars\n\nwere agreed by the Member States; **Principle 10 refers to a** ‘ **Healthy, safe and well-adapted work**\n\n**environment** and data protection.’\n\nThese European and international agreements and treaties regard **safety and health** as essential for\n\nhuman development, a **basic human right** . The main reasoning is to eliminate or reduce as much as\n\npossible suffering, sickness, disability and death of workers. Often the reasoning refers to intertwined\n\nobjectives, that is, to economic growth (UN), or to reduce the economic burden of incomplete health and\n\nsafety at work, be it the burden for enterprises or the society as a whole, that is, by *‘Promotion of*", - "page_start": 117, - "page_end": 117, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "The rate for fatal accidents was much lower for young workers; in 2019 it stood at 1.28 for workers under\n\n25, compared to 1.86 for workers between 25 and 54 years.\n\nThe main reason for this difference is a high employment rate of young workers in sectors that are more\n\nprone to accidents than others, that is, wholesale and trade and hotels and restaurants. Moreover, they\n\nhave a much higher rate of precarious types of employment, particularly temporary contracts, that is,\n\nthey are often less trained and less experienced regarding risks at the workplace.\n\nOften one, two or more of these characterisations add to each other, that is, migrant, low-skilled and\n\nwoman. The table below is one example of such ‘crossovers’.\n\n**Table 13: Crossovers of health and safety risks among groups of workers (2010) - DG for Internal**\n\n**policies, policy department <sup>111</sup>**\n\nIn general, a **weak position in the labour market** bears the risk of a low level of safety and health\n\nmeasures. Safety and health risks due to individual characteristics might also be underestimated if the\n\nmainstream of OSH measures is designed and implemented for the dominant group in an enterprise or\n\nsector. In many enterprises awareness and knowledge of OSH is focused on the core business while\n\nother groups are regarded as auxiliary, for example, cleaning, canteen and drivers, also low-skilled\n\nclerical workers might experience a missing awareness for ‘minority issues’ in production-dominated\n\nenterprises. It can also be the other way around for manual workers who work in highly administratively\n\ndominated enterprises.", - "page_start": 57, - "page_end": 57, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "EU-OSHA and practically all national and international OSH organisations have published studies and\n\nprovided fact sheets and guidance documents. An overview on such publications shows that awareness,\n\nknowledge and policies in and outside enterprises have substantially developed and increased, but\n\nthere is less evidence about progress in practice.\n\nThe textbox below shows some of these specific characteristics for five groups: women, migrants, low-\n\nqualified workers, ageing workers and young workers. The Directorate-General for Internal Policies of\n\nthe Union compiled this in 2010, based on several EU and OECD background documents. <sup>98</sup>", - "page_start": 53, - "page_end": 53, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "way by OSH legislation or OSH practice. The principle of employer responsibility for working conditions\n\nof workers is undermined or at least blurred in such situations.\n\nFuture solutions could focus on several aspects — a **new definition of ‘work’ or of ‘employment’,**\n\n**stronger individual responsibility, or extended state interventions to guarantee OSH** also in such\n\nworking and employment conditions. There are some examples of such solutions but to date most of\n\nthem focus on better information, that is, stronger individual responsibility.\n\n**Undeclared and illegal employment is scarcely visible** in the statistics. Due to the difficult conditions\n\nfor research, the overall OSH situation in these types of work is widely unknown; in case study-based\n\ninvestigative studies, the working conditions — including safety and health — for this group are mostly\n\nregarded as worse compared to workers with a regular work contract. It seems to be necessary to\n\nconsider different research and action initiatives for this type of work, also in collaboration with other\n\nstate supervising authorities.\n\nThe health data clearly show an ever-growing **share of work tasks that go along with or even require**\n\n**physical inactivity** . Inactive work is often characterised by permanent sitting combined with high\n\nrequirements for visual and mental focusing during work, for example, towards digital equipment or to\n\ntraffic situations. Serious indirect health consequences of such inactivity can be seen in the strong\n\nincrease in certain widespread diseases or disease-supporting factors, like obesity.\n\nEven 15 years after the enlargement of the EU in 2004, **significant differences between Member**\n\n**States** can still be observed regarding several working conditions. The data demonstrate that the worst\n\nstatus concerning physical risks, wellbeing, and expectations to do the job until the age of 60 — is almost\n\nalways present in eastern EU Member States, followed by southern Member States, all compared to the\n\nstatus in central, western and northern Member States **.** For psychosocial risks, it is just the other way\n\naround, these are more often reported in central, western and northern Member States.\n\n**International organisations complain about an unfair divide of OSH risks in globalised supply**\n\n**chains** , be it in mining, metallurgy, textile production, disposal of hazardous waste or other sectors. The\n\nILO decided in June 2022 to make OSH one of the Fundamental Principles and Rights at Work. In this\n\ncontext, 10 ILO conventions and instruments are considered now as fundamental, including two OSH\n\nconventions: the Occupational Safety and Health Convention, of 1981 (No. 155) and the Promotional\n\nFramework for Occupational Safety and Health Convention, of 2006 (No. 187). Ethical, fairness and\n\njustice considerations have led to more activities on decent, safe and healthy work in developing\n\ncountries and a fair share of risks at work in global supply chains. These are important initiatives, but\n\nuntil now they only slightly changed the overall situation when looking at the global scale of the issue.", - "page_start": 18, - "page_end": 18, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic5.pdf", - "query": "Was knowledge domain agnosticism a goal in the development of OLAF?", - "target_page": 1, - "target_passage": "Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations represented largely depend on one or more business use cases. As we designed our framework with industry application in mind, we need to consider it within its real-world usage context.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "of being conscious is merely an error in perception, held by brains which evolved to hold erroneous and\n\nincomplete models of their own internal workings, just as they hold erroneous and incomplete models of\n\ntheir own bodies and of the external world. <sup>[77][78]</sup>\n\nThe main criticisms of eliminative materialism and illusionism hinge on the counterintuitive nature of the\n\nview. Arguments of this form are called *Moorean Arguments* . A Moorean argument seeks to undermine\n\n[the conclusion of an argument by asserting that the negation of that conclusion is more certain than the](https://en.wikipedia.org/wiki/Negation)\n\n[premises of the argument.](https://en.wikipedia.org/wiki/Premise) <sup>[79]</sup>\n\n[The roots of the Moorean Argument against illusionism extend back to Augustine of Hippo who stated](https://en.wikipedia.org/wiki/Augustine_of_Hippo)\n\nthat he could not be deceived regarding his own existence, since the very act of being deceived secures\n\nthe existence of a being there to be the recipient of that deception. <sup>[note 1][80]</sup>\n\n[In the Early-Modern era, these arguments were repopularized by René Descartes, who coined the now](https://en.wikipedia.org/wiki/Ren%C3%A9_Descartes)\n\nfamous phrase *\"Je pense, donc je suis\"* (\"I think, therefore I am\"). <sup>[81]</sup> Descartes argued that even if he\n\nwas maximally deceived (because, for example, an evil demon was manipulating all his senses) he would\n\nstill know with certainty that his mind exists, because the state of being deceived requires a mind as a\n\nprerequisite. <sup>[82]</sup>\n\nThis same general argumentative structure is still in use today. For example, in 2002 David Chalmers\n\npublished an explicitly Moorean argument against illusionism. The argument goes like this: The reality of\n\nconsciousness is more certain than any theoretical commitments (to, for example, physicalism) that may\n\nbe motivating the illusionist to deny the existence of consciousness. The reason for this is because we\n\nhave direct \"acquaintance\" with consciousness, but we do not have direct acquaintance with anything else\n\n(including anything that could inform our beliefs in consciousness being an illusion). In other words:\n\nconsciousness can be known directly, so the reality of consciousness is more certain than any\n\nphilosophical or scientific theory that says otherwise. <sup>[83]</sup> Chalmers concludes that \"there is little doubt\n\nthat something like the Moorean argument is the reason that most people reject illusionism and many find\n\nit crazy.\" <sup>[84]</sup>\n\nEliminative materialism and illusionism have been the subject of criticism within the popular press. One\n\n[highly cited example comes from the philosopher Galen Strawson who wrote an article in the New York](https://en.wikipedia.org/wiki/New_York_Review_of_Books)\n\n[Review of Books titled \"The Consciousness Deniers\". In it, Strawson describes illusionism as the \"silliest](https://en.wikipedia.org/wiki/New_York_Review_of_Books)\n\nclaim ever made\", next to which \"every known religious belief is only a little less sensible than the belief\n\nthat the grass is green.\" <sup>[85]</sup> [ Another notable example comes from Christof Koch (a neuroscientist and one](https://en.wikipedia.org/wiki/Christof_Koch)\n\n[of the leading proponents of Integrated Information Theory) in his popular science book ](https://en.wikipedia.org/wiki/Integrated_Information_Theory) *The Feeling of*\n\n*Life Itself* . In the early pages of the book, Koch describes eliminativism as the \"metaphysical counterpart\n\nto Cotard's syndrome, a psychiatric condition in which patients deny being alive.\" <sup>[86]</sup> Koch takes the\n\nprevalence of eliminativism as evidence that \"much of twentieth-century analytic philosophy has gone to\n\nthe dogs\". <sup>[87]</sup>\n\nType-B Materialism, also known as *Weak Reductionism* or *[A Posteriori Physicalism](https://en.wikipedia.org/wiki/A_priori_and_a_posteriori)* , is the view that the", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[Finding a provably correct or optimal solution is intractable for many important problems.](https://en.wikipedia.org/wiki/Intractability_(complexity)) <sup>[15]</sup> Soft\n\n[computing is a set of techniques, including genetic algorithms, fuzzy logic and neural networks, that are](https://en.wikipedia.org/wiki/Fuzzy_logic)\n\ntolerant of imprecision, uncertainty, partial truth and approximation. Soft computing was introduced in\n\nthe late 1980s and most successful AI programs in the 21st century are examples of soft computing with\n\nneural networks.\n\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and\n\n[superintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these](https://en.wikipedia.org/wiki/Superintelligence)\n\nsolutions will lead indirectly to the field's long-term goals. <sup>[378][379]</sup> General intelligence is difficult to\n\ndefine and difficult to measure, and modern AI has had more verifiable successes by focusing on specific\n\nproblems with specific solutions. The sub-field of artificial general intelligence studies this area\n\nexclusively.\n\n[The philosophy of mind does not know whether a machine can have a mind, consciousness and mental](https://en.wikipedia.org/wiki/Philosophy_of_mind)\n\n[states, in the same sense that human beings do. This issue considers the internal experiences of the](https://en.wikipedia.org/wiki/Philosophy_of_mind)\n\nmachine, rather than its external behavior. Mainstream AI research considers this issue irrelevant because\n\nit does not affect the goals of the field: to build machines that can solve problems using intelligence.\n\n[Russell and Norvig add that \"[t]he additional project of making a machine conscious in exactly the way](https://en.wikipedia.org/wiki/Norvig)\n\nhumans are is not one that we are equipped to take on.\" <sup>[380]</sup> However, the question has become central to\n\n[the philosophy of mind. It is also typically the central question at issue in artificial intelligence in fiction.](https://en.wikipedia.org/wiki/Artificial_intelligence_in_fiction)\n\n[David Chalmers identified two problems in understanding the mind, which he named the \"hard\" and](https://en.wikipedia.org/wiki/David_Chalmers)\n\n\"easy\" problems of consciousness. <sup>[381]</sup> The easy problem is understanding how the brain processes\n\nsignals, makes plans and controls behavior. The hard problem is explaining how this *feels* or why it\n\nshould feel like anything at all, assuming we are right in thinking that it truly does feel like something\n\n[(Dennett's consciousness illusionism says this is an illusion). While human information processing is easy](https://en.wikipedia.org/wiki/Information_processing_(psychology))\n\n[to explain, human subjective experience is difficult to explain. For example, it is easy to imagine a color-](https://en.wikipedia.org/wiki/Subjective_experience)\n\nblind person who has learned to identify which objects in their field of view are red, but it is not clear\n\nwhat would be required for the person to *know what red looks like* . <sup>[382]</sup>\n\n[Computationalism is the position in the philosophy of mind that the human mind is an information](https://en.wikipedia.org/wiki/Philosophy_of_mind)\n\nprocessing system and that thinking is a form of computing. Computationalism argues that the\n\nrelationship between mind and body is similar or identical to the relationship between software and\n\n[hardware and thus may be a solution to the mind- body problem. This philosophical position was inspired](https://en.wikipedia.org/wiki/Mind%E2%80%93body_problem)\n\nby the work of AI researchers and cognitive scientists in the 1960s and was originally proposed by\n\n[philosophers Jerry Fodor and Hilary Putnam.](https://en.wikipedia.org/wiki/Hilary_Putnam) <sup>[383]</sup>\n\n[Philosopher John Searle characterized this position as \"strong AI\": \"The appropriately programmed](https://en.wikipedia.org/wiki/Strong_AI_hypothesis)", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[In Chinese philosophy, the School of Names and Mohism were particularly influential. The School of](https://en.wikipedia.org/wiki/Mohism)\n\n[Names focused on the use of language and on paradoxes. For example, Gongsun Long proposed the](https://en.wikipedia.org/wiki/Gongsun_Long)\n\n[white horse paradox, which defends the thesis that a white horse is not a horse. The school of Mohism](https://en.wikipedia.org/wiki/White_horse_paradox)\n\nalso acknowledged the importance of language for logic and tried to relate the ideas in these fields to the\n\nrealm of ethics. <sup>[197]</sup>\n\n[In India, the study of logic was primarily pursued by the schools of Nyaya, Buddhism, and Jainism. It](https://en.wikipedia.org/wiki/Jainism)\n\nwas not treated as a separate academic discipline and discussions of its topics usually happened in the\n\ncontext of epistemology and theories of dialogue or argumentation. <sup>[198]</sup> In Nyaya, inference is understood\n\n[as a source of knowledge (pramā](https://en.wikipedia.org/wiki/Pram%C4%81%E1%B9%87a) ṇ a). It follows the perception of an object and tries to arrive at\n\nconclusions, for example, about the cause of this object. <sup>[199]</sup> A similar emphasis on the relation to\n\nepistemology is also found in Buddhist and Jainist schools of logic, where inference is used to expand the\n\nknowledge gained through other sources. <sup>[200]</sup> Some of the later theories of Nyaya, belonging to the\n\n[Navya-Nyāya school, resemble modern forms of logic, such as Gottlob Frege's distinction between sense](https://en.wikipedia.org/wiki/Sense_and_reference)\n\n[and reference and his definition of number.](https://en.wikipedia.org/wiki/Sense_and_reference) <sup>[201]</sup>\n\nThe syllogistic logic developed by Aristotle predominated in the West until the mid-19th century, when\n\ninterest in the foundations of mathematics stimulated the development of modern symbolic logic. <sup>[202]</sup>\n\nMany see Gottlob Frege's *[Begriffsschrift](https://en.wikipedia.org/wiki/Begriffsschrift)* [ as the birthplace of modern logic. Gottfried Wilhelm Leibniz's](https://en.wikipedia.org/wiki/Gottfried_Wilhelm_Leibniz)\n\n[idea of a universal formal language is often considered a forerunner. Other pioneers were George Boole,](https://en.wikipedia.org/wiki/George_Boole)\n\n[who invented Boolean algebra as a mathematical system of logic, and Charles Peirce, who developed the](https://en.wikipedia.org/wiki/Charles_Peirce)\n\n[logic of relatives. Alfred North Whitehead and Bertrand Russell, in turn, condensed many of these](https://en.wikipedia.org/wiki/Logic_of_relatives)\n\ninsights in their work *[Principia Mathematica](https://en.wikipedia.org/wiki/Principia_Mathematica)* [. Modern logic introduced novel concepts, such as functions,](https://en.wikipedia.org/wiki/Function_(mathematics))\n\nquantifiers, and relational predicates. A hallmark of modern symbolic logic is its use of formal language\n\nto precisely codify its insights. In this regard, it departs from earlier logicians, who relied mainly on\n\nnatural language. <sup>[203]</sup> Of particular influence was the development of first-order logic, which is usually\n\ntreated as the standard system of modern logic. <sup>[204]</sup> Its analytical generality allowed the formalization of\n\n[mathematics and drove the investigation of set theory. It also made Alfred Tarski's approach to model](https://en.wikipedia.org/wiki/Model_theory)\n\n[theory possible and provided the foundation of modern mathematical logic.](https://en.wikipedia.org/wiki/Model_theory) <sup>[205]</sup>\n\n* **[Philosophy portal](https://en.wikipedia.org/wiki/Portal:Philosophy)** *\n\n### **See also**", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia1.pdf" - }, - { - "text": "An ontology represents knowledge as a set\n\nof concepts within a domain and the\n\nrelationships between those concepts.\n\nThe general problem of simulating (or creating) intelligence has been broken into subproblems. These\n\nconsist of particular traits or capabilities that researchers expect an intelligent system to display. The traits\n\ndescribed below have received the most attention and cover the scope of AI research. <sup>[a]</sup>\n\nEarly researchers developed algorithms that imitated step-by-step reasoning that humans use when they\n\n[solve puzzles or make logical deductions.](https://en.wikipedia.org/wiki/Deductive_reasoning) <sup>[13]</sup> By the late 1980s and 1990s, methods were developed for\n\n[dealing with uncertain or incomplete information, employing concepts from probability and](https://en.wikipedia.org/wiki/Probability)\n\n[economics.](https://en.wikipedia.org/wiki/Economics) <sup>[14]</sup>\n\nMany of these algorithms are insufficient for solving large reasoning problems because they experience a\n\n\"combinatorial explosion\": They become exponentially slower as the problems grow. <sup>[15]</sup> Even humans\n\nrarely use the step-by-step deduction that early AI research could model. They solve most of their\n\nproblems using fast, intuitive judgments. <sup>[16]</sup> Accurate and efficient reasoning is an unsolved problem.\n\n[Knowledge representation and knowledge engineering](https://en.wikipedia.org/wiki/Knowledge_engineering) <sup>[17]</sup>\n\nallow AI programs to answer questions intelligently and\n\nmake deductions about real-world facts. Formal knowledge\n\nrepresentations are used in content-based indexing and\n\nretrieval, <sup>[18]</sup> scene interpretation, <sup>[19]</sup> clinical decision\n\nsupport, <sup>[20]</sup> knowledge discovery (mining \"interesting\" and\n\n[actionable inferences from large databases),](https://en.wikipedia.org/wiki/Database) <sup>[21]</sup> and other\n\nareas. <sup>[22]</sup>\n\n[A knowledge base is a body of knowledge represented in a](https://en.wikipedia.org/wiki/Knowledge_base)\n\n[form that can be used by a program. An ontology is the set](https://en.wikipedia.org/wiki/Ontology_(information_science))\n\nof objects, relations, concepts, and properties used by a\n\nparticular domain of knowledge. <sup>[23]</sup> Knowledge bases need\n\nto represent things such as objects, properties, categories,\n\nand relations between objects; <sup>[24]</sup> situations, events, states,\n\nand time; <sup>[25]</sup> causes and effects; <sup>[26]</sup> knowledge about\n\nknowledge (what we know about what other people\n\nknow); <sup>[27]</sup> [ default reasoning (things that humans assume are true until they are told differently and will](https://en.wikipedia.org/wiki/Default_reasoning)\n\nremain true even when other facts are changing); <sup>[28]</sup> and many other aspects and domains of knowledge.\n\nAmong the most difficult problems in knowledge representation are the breadth of commonsense\n\nknowledge (the set of atomic facts that the average person knows is enormous); <sup>[29]</sup> and the sub-symbolic\n\nform of most commonsense knowledge (much of what people know is not represented as \"facts\" or\n\n\"statements\" that they could express verbally). <sup>[16]</sup> [ There is also the difficulty of knowledge acquisition,](https://en.wikipedia.org/wiki/Knowledge_acquisition)\n\nthe problem of obtaining knowledge for AI applications. <sup>[c]</sup>\n\n#### **Reasoning and problem-solving**\n\n#### **Knowledge representation**\n\n#### **Planning and decision-making**", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Figure 4.15 Domain and Range inferred by the reasoner\n\nIt is possible to specify more than one class as the domain or range of a property. One of the\n\nmost common mistakes of new users is to do this and expect that the resulting domain/range is\n\nthe union of the two classes. However, note that next to the Domain and Range in the\n\nDescription view it says (intersection). This is because the semantics of having 2 or more classes\n\nas the domain or range is the *intersection* of those classes *not* the union. E.g., if one defined the\n\ndomain for a property to be Pizza and then added another domain IceCream that would\n\nmean that for something to be in the domain of that property it would have to be an instance of\n\n*both* Pizza *and* IceCream not (as people often expect) the *union* of those two sets which\n\nwould be *either* the class Pizza *or* the class IceCream . Also, note that the domain and range\n\nare for inferencing, they are not data integrity constraints. This distinction will be explained in\n\nmore detail below in the section on SHACL.", - "page_start": 28, - "page_end": 28, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "meta-problem will solve or dissolve the hard problem. A weaker line holds that it will not\n\nremove the hard problem, but it will constrain the form of a solution.\n\nIn other words, the 'strong line' holds that the solution to the meta-problem would provide an explanation\n\nof our beliefs about consciousness that is independent of consciousness. That would debunk our beliefs\n\nabout consciousness, in the same way that explaining beliefs about god in evolutionary terms may\n\nprovide arguments against theism itself. <sup>[144]</sup>\n\n[Tom Stoppard's play ](https://en.wikipedia.org/wiki/Tom_Stoppard) *[The Hard Problem](https://en.wikipedia.org/wiki/The_Hard_Problem)* , first produced in 2015, is named after the hard problem of\n\nconsciousness, which Stoppard defines as having \"subjective First Person experiences\". <sup>[145]</sup>\n\n* **[Philosophy portal](https://en.wikipedia.org/wiki/Portal:Philosophy)** *\n\n[Animal consciousness](https://en.wikipedia.org/wiki/Animal_consciousness)\n\n[Artificial consciousness](https://en.wikipedia.org/wiki/Artificial_consciousness)\n\n[Binding problem](https://en.wikipedia.org/wiki/Binding_problem)\n\n[Blindsight](https://en.wikipedia.org/wiki/Blindsight)\n\n[Chinese room](https://en.wikipedia.org/wiki/Chinese_room)\n\n*[Cogito, ergo sum](https://en.wikipedia.org/wiki/Cogito,_ergo_sum)*\n\n[Cryonics](https://en.wikipedia.org/wiki/Cryonics)\n\n[Free will](https://en.wikipedia.org/wiki/Free_will)\n\n[Ideasthesia](https://en.wikipedia.org/wiki/Ideasthesia)\n\n[Introspection](https://en.wikipedia.org/wiki/Introspection)\n\n[Knowledge by acquaintance](https://en.wikipedia.org/wiki/Knowledge_by_acquaintance)\n\n[List of unsolved problems in biology](https://en.wikipedia.org/wiki/List_of_unsolved_problems_in_biology)\n\n[Mind- body problem](https://en.wikipedia.org/wiki/Mind%E2%80%93body_problem)\n\n[Phenomenalism](https://en.wikipedia.org/wiki/Phenomenalism)\n\n[Philosophy of self](https://en.wikipedia.org/wiki/Philosophy_of_self)\n\n[Primary- secondary quality distinction](https://en.wikipedia.org/wiki/Primary%E2%80%93secondary_quality_distinction)\n\n[Problem of mental causation](https://en.wikipedia.org/wiki/Problem_of_mental_causation)\n\n[Problem of other minds](https://en.wikipedia.org/wiki/Problem_of_other_minds)\n\n[Vertiginous question](https://en.wikipedia.org/wiki/Vertiginous_question)\n\n[Von Neumann- Wigner interpretation](https://en.wikipedia.org/wiki/Von_Neumann%E2%80%93Wigner_interpretation)\n\n1. \"But, without any delusive representations of images or phantasms, I am most certain that I\n\nam, and that I know and delight in this. In respect to these truths I am not at all afraid of the\n\narguments of the Academians, who say, What if you are deceived? For if I am deceived, I\n\nam. For he who is not, cannot be deceived...\"\n\n2. There has been debate over how best to characterize James' position. The *Stanford*\n\n*Encyclopedia of Philosophy* states: \"James’s commitment to panpsychism remains\n\nsomewhat controversial, since he also advanced a cogent set of objections against a\n\nversion of the view, which he labelled the 'mind dust' theory, in chapter six of The Principles\n\nof Psychology ([1890] 1981). These objections are the inspiration for the so-called\n\n'combination problem', around which much of the twenty first century literature on\n\npanpsychism focuses.\"\n\n### **In popular culture**\n\n### **See also**\n\n### **Notes**\n\n### **References**", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[psychology (i.e., common-sense ways of discussing the mind) do not, upon scientific examination,](https://en.wikipedia.org/wiki/Folk_psychology)\n\ncorrespond to real brain mechanisms. <sup>[59]</sup> [ According the 2020 PhilPapers survey, 4.51% of philosophers](https://en.wikipedia.org/wiki/PhilPapers)\n\nsurveyed subscribe to eliminativism. <sup>[25]</sup>\n\n[While Patricia Churchland and Paul Churchland have famously applied eliminative materialism to](https://en.wikipedia.org/wiki/Paul_Churchland)\n\n[propositional attitudes, philosophers including Daniel Dennett, Georges Rey, and Keith Frankish have](https://en.wikipedia.org/wiki/Keith_Frankish)\n\n[applied it to qualia or phenomenal consciousness (i.e., conscious experience).](https://en.wikipedia.org/wiki/Phenomenal_consciousness) <sup>[59]</sup> On their view, it is\n\nmistaken not only to believe there is a hard problem of consciousness, but to believe phenomenal\n\nconsciousness exists at all. <sup>[19][61]</sup>\n\n##### **Eliminative materialism / Illusionism**", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia2.pdf" - }, - { - "text": "Bertrand Russell made various\n\ncontributions to mathematical\n\nlogic. <sup>[163]</sup>\n\nto use logic to analyze mathematical reasoning or to establish\n\n[logic-based foundations of mathematics.](https://en.wikipedia.org/wiki/Foundations_of_mathematics) <sup>[165]</sup> The latter was a\n\nmajor concern in early 20th-century mathematical logic, which\n\n[pursued the program of logicism pioneered by philosopher-](https://en.wikipedia.org/wiki/Logicism)\n\n[logicians such as Gottlob Frege, Alfred North Whitehead, and](https://en.wikipedia.org/wiki/Alfred_North_Whitehead)\n\n[Bertrand Russell. Mathematical theories were supposed to be](https://en.wikipedia.org/wiki/Bertrand_Russell)\n\n[logical tautologies, and their program was to show this by means](https://en.wikipedia.org/wiki/Tautology_(logic))\n\nof a reduction of mathematics to logic. Many attempts to realize\n\nthis program failed, from the crippling of Frege's project in his\n\n*Grundgesetze* [ by Russell's paradox, to the defeat of Hilbert's](https://en.wikipedia.org/wiki/Hilbert%27s_program)\n\n[program by Gödel's incompleteness theorems.](https://en.wikipedia.org/wiki/G%C3%B6del%27s_incompleteness_theorem) <sup>[166]</sup>\n\n[Set theory originated in the study of the infinite by Georg Cantor,](https://en.wikipedia.org/wiki/Georg_Cantor)\n\nand it has been the source of many of the most challenging and\n\n[important issues in mathematical logic. They include Cantor's](https://en.wikipedia.org/wiki/Cantor%27s_theorem)\n\n[theorem, the status of the Axiom of Choice, the question of the](https://en.wikipedia.org/wiki/Axiom_of_Choice)\n\n[independence of the continuum hypothesis, and the modern debate](https://en.wikipedia.org/wiki/Continuum_hypothesis)\n\n[on large cardinal axioms.](https://en.wikipedia.org/wiki/Large_cardinal) <sup>[167]</sup>\n\nComputability theory is the branch of mathematical logic that\n\nstudies effective procedures to solve calculation problems. One of\n\nits main goals is to understand whether it is possible to solve a given problem using an algorithm. For\n\ninstance, given a certain claim about the positive integers, it examines whether an algorithm can be found\n\nto determine if this claim is true. Computability theory uses various theoretical tools and models, such as\n\n[Turing machines, to explore this type of issue.](https://en.wikipedia.org/wiki/Turing_machines) <sup>[168]</sup>\n\n[Computational logic is the branch of logic and computer science that studies how to implement](https://en.wikipedia.org/wiki/Computer_science)\n\n[mathematical reasoning and logical formalisms using computers. This includes, for example, automatic](https://en.wikipedia.org/wiki/Automatic_theorem_prover)\n\n[theorem provers, which employ rules of inference to construct a proof step by step from a set of premises](https://en.wikipedia.org/wiki/Automatic_theorem_prover)\n\nto the intended conclusion without human intervention. <sup>[169]</sup> [ Logic programming languages are designed](https://en.wikipedia.org/wiki/Logic_programming)\n\nspecifically to express facts using logical formulas and to draw inferences from these facts. For example,\n\n[Prolog is a logic programming language based on predicate logic.](https://en.wikipedia.org/wiki/Prolog) <sup>[170]</sup> Computer scientists also apply\n\n[concepts from logic to problems in computing. The works of Claude Shannon were influential in this](https://en.wikipedia.org/wiki/Claude_Shannon)\n\n[regard. He showed how Boolean logic can be used to understand and implement computer circuits.](https://en.wikipedia.org/wiki/Boolean_logic) <sup>[171]</sup>\n\n[This can be achieved using electronic logic gates, i.e. electronic circuits with one or more inputs and](https://en.wikipedia.org/wiki/Logic_gates)\n\nusually one output. The truth values of propositions are represented by voltage levels. In this way, logic\n\nfunctions can be simulated by applying the corresponding voltages to the inputs of the circuit and", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia1.pdf" - }, - { - "text": "David Chalmers calls this form of idealism one of \"the handful of promising approaches to the mind-\n\nbody problem.\" <sup>[127]</sup>\n\n[New mysterianism, most significantly associated with the philosopher Colin McGinn, proposes that the](https://en.wikipedia.org/wiki/Colin_McGinn)\n\nhuman mind, in its current form, will not be able to explain consciousness. <sup>[128][11]</sup> McGinn draws on\n\n[Noam Chomsky's distinction between problems, which are in principle solvable, and mysteries, which](https://en.wikipedia.org/wiki/Noam_Chomsky)\n\n[human cognitive faculties are unequipped to ever understand, and places the mind- body problem in the](https://en.wikipedia.org/wiki/Mind%E2%80%93body_problem)\n\nlatter category. <sup>[128]</sup> [ His position is that a naturalistic explanation does exist but that the human mind is](https://en.wikipedia.org/wiki/Metaphysical_naturalism)\n\n[cognitively closed to it due to its limited range of intellectual abilities.](https://en.wikipedia.org/wiki/Cognitive_closure_(philosophy)) <sup>[128]</sup> [ He cites Jerry Fodor's concept](https://en.wikipedia.org/wiki/Jerry_Fodor)\n\n[of the modularity of mind in support of cognitive closure.](https://en.wikipedia.org/wiki/Modularity_of_mind) <sup>[128]</sup>\n\nWhile in McGinn's strong form, new mysterianism states that the relationship between consciousness and\n\nthe material world can *never* be understood by the human mind, there are also weaker forms that argue it\n\ncannot be understood within existing paradigms but that advances in science or philosophy may open the\n\nway to other solutions (see above). <sup>[43]</sup> [ The ideas of Thomas Nagel and Joseph Levine fall into the second](https://en.wikipedia.org/wiki/Joseph_Levine_(philosopher))\n\ncategory. <sup>[43]</sup> Steven Pinker has also endorsed this weaker version of the view, summarizing it as\n\nfollows: <sup>[9]</sup>\n\nAnd then there is the theory put forward by philosopher Colin McGinn that our vertigo when\n\npondering the Hard Problem is itself a quirk of our brains. The brain is a product of\n\nevolution, and just as animal brains have their limitations, we have ours. Our brains can't\n\nhold a hundred numbers in memory, can't visualize seven-dimensional space and perhaps\n\ncan't intuitively grasp why neural information processing observed from the outside should\n\ngive rise to subjective experience on the inside. This is where I place my bet, though I admit\n\nthat the theory could be demolished when an unborn genius—a Darwin or Einstein of\n\nconsciousness—comes up with a flabbergasting new idea that suddenly makes it all clear to\n\nus.\n\nPhilosopher Raamy Majeed argued in 2016 that the hard problem is associated with two \"explanatory\n\ntargets\": <sup>[54]</sup>\n\n1. [PQ] Physical processing gives rise to experiences with a phenomenal character.\n\n2. [Q] Our phenomenal qualities are thus-and-so.\n\nThe first fact concerns the relationship between the physical and the phenomenal (i.e., how and why are\n\n[some physical states felt states), whereas the second concerns the very nature of the phenomenal itself](https://en.wikipedia.org/wiki/Feeling)\n\n[(i.e., what does the felt state feel like?).](https://en.wikipedia.org/wiki/What_Is_it_Like_to_Be_a_Bat%3F)\n\nWolfgang Fasching argues that the hard problem is not about qualia, but about the what-it-is-like-ness of\n\nexperience in Nagel's sense—about the givenness of phenomenal contents:\n\n#### **New mysterianism**\n\n#### **Commentary on the problem's explanatory targets**", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia2.pdf" - }, - { - "text": "[Paraconsistent logics are logical systems that can deal with contradictions. They are formulated to avoid](https://en.wikipedia.org/wiki/Paraconsistent_logic)\n\nthe principle of explosion: for them, it is not the case that anything follows from a contradiction. <sup>[139]</sup>\n\n[They are often motivated by dialetheism, the view that contradictions are real or that reality itself is](https://en.wikipedia.org/wiki/Dialetheism)\n\n[contradictory. Graham Priest is an influential contemporary proponent of this position and similar views](https://en.wikipedia.org/wiki/Graham_Priest)\n\n[have been ascribed to Georg Wilhelm Friedrich Hegel.](https://en.wikipedia.org/wiki/Georg_Wilhelm_Friedrich_Hegel) <sup>[140]</sup>\n\n[Informal logic is usually carried out in a less systematic way. It often focuses on more specific issues, like](https://en.wikipedia.org/wiki/Informal_logic)\n\ninvestigating a particular type of fallacy or studying a certain aspect of argumentation. Nonetheless, some\n\nframeworks of informal logic have also been presented that try to provide a systematic characterization of\n\nthe correctness of arguments. <sup>[141]</sup>\n\nThe *pragmatic* or *dialogical approach* [ to informal logic sees arguments as speech acts and not merely as](https://en.wikipedia.org/wiki/Speech_act)\n\na set of premises together with a conclusion. <sup>[142]</sup> As speech acts, they occur in a certain context, like a\n\n[dialogue, which affects the standards of right and wrong arguments.](https://en.wikipedia.org/wiki/Dialogue) <sup>[143]</sup> [ A prominent version by Douglas](https://en.wikipedia.org/wiki/Douglas_N._Walton)\n\n[N. Walton understands a dialogue as a game between two players. The initial position of each player is](https://en.wikipedia.org/wiki/Douglas_N._Walton)\n\ncharacterized by the propositions to which they are committed and the conclusion they intend to prove.\n\nDialogues are games of persuasion: each player has the goal of convincing the opponent of their own\n\nconclusion. <sup>[144]</sup> This is achieved by making arguments: arguments are the moves of the game. <sup>[145]</sup> They\n\naffect to which propositions the players are committed. A winning move is a successful argument that\n\ntakes the opponent's commitments as premises and shows how one's own conclusion follows from them.\n\nThis is usually not possible straight away. For this reason, it is normally necessary to formulate a\n\nsequence of arguments as intermediary steps, each of which brings the opponent a little closer to one's\n\nintended conclusion. Besides these positive arguments leading one closer to victory, there are also\n\nnegative arguments preventing the opponent's victory by denying their conclusion. <sup>[144]</sup> Whether an\n\nargument is correct depends on whether it promotes the progress of the dialogue. Fallacies, on the other\n\nhand, are violations of the standards of proper argumentative rules. <sup>[146]</sup> These standards also depend on\n\nthe type of dialogue. For example, the standards governing the scientific discourse differ from the\n\nstandards in business negotiations. <sup>[147]</sup>\n\nThe *epistemic approach* to informal logic, on the other hand, focuses on the epistemic role of\n\narguments. <sup>[148]</sup> It is based on the idea that arguments aim to increase our knowledge. They achieve this\n\nby linking justified beliefs to beliefs that are not yet justified. <sup>[149]</sup> Correct arguments succeed at\n\nexpanding knowledge while fallacies are epistemic failures: they do not justify the belief in their\n\nconclusion. <sup>[150]</sup> [ For example, the fallacy of begging the question is a ](https://en.wikipedia.org/wiki/Fallacy_of_begging_the_question) *fallacy* because it fails to provide\n\nindependent justification for its conclusion, even though it is deductively valid. <sup>[151]</sup> In this sense, logical", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia1.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic5.pdf", - "query": "Is OLAF a specific strategy for ontological learning or is it a toolbox of different strategies?", - "target_page": 1, - "target_passage": "Our vision is to implement a toolbox of methods we can gather to build pipelines. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you have as well as the standards established by your organization or organizations that you work with.\n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have worked with most modern programming languages such as Python or Java, you are already familiar with the concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming conflicts between different ontologies. For example, you may have a class called Network in an ontology\n\nabout telecommunications. You might also have a class called Network in an ontology about graph\n\ntheory. The two concepts are related but are different. Just as with programming languages you use namespace prefixes to determine what specific namespace a name refers to. E.g., in this example you might have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when\n\nyou referred to the Network class for the Telecom ontology you would use tc:Network and\n\ngt:Network for the graph theory class.\n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl\n\nand is used to refer to classes such as owl:Thing and owl:Nothing . The Resource Description\n\nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that ontologies use such as rdfs:label leverage this namespace.\n\nIn the bottom view of the Active ontology tab there is a tab called Ontology Prefixes. This tab shows all the current namespace mappings in your ontology. There are certain concepts from OWL, RDF, RDFS, XML and XSD that are required for every ontology, so those namespaces are by default mapped in every new Protégé ontology. There is also a mapping to the empty string for whatever the namespace is for your ontology. This allows you to display and refer to entities in your ontology without entering a namespace prefix. If you look at that tab now you should see a row where the first column is blank, and the second column has the base IRI for your ontology. It should be the same IRI as the Ontology IRI at the top of the Active ontology tab, except it also has a # sign at the end. E.g., the Pizza tutorial developed for this tutorial has an IRI of: [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial) and the row that has a blank first column in Ontology Prefixes has the IRI: [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial) .", - "page_start": 61, - "page_end": 61, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two parts. The first part at the beginning consists of several namespace prefixes. These statements consist of the prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that these concepts were described in chapter 7. You may be wondering where all these prefixes came from\n\nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of\n\nnamespaces and prefixes that are required to define the ontology.\n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been discussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any language or database there is a lower level that describes how the concepts are mapped to actual data. In a relational database the fundamental construct to represent data is a table. In OWL the fundamental construct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF (Resource Description Framework) is a language to describe graphs (in the mathematical sense of the term). I.e., to describe nodes and links.\n\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in what is called an undirected or network graph because objects can be subjects and vice versa. Whenever you define a property in OWL you are defining a predicate. An individual can be a subject or an object (or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1 . In this example\n\nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object.\n\nHowever, classes and properties themselves are also represented as triples. So for example, when you create the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to\n\nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class . Similarly when you add\n\nNamedPizza as a subclass of Pizza , Protégé adds the triple: NamedPizza rdfs: **s** ubClassOf\n\nPizza .\n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities that are the subjects of triples where the predicate is rdfs: **s** ubClassOf and the object is any other\n\nentity. The *?* before a name indicates that the name is a wildcard that can match anything that fits with the rest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate or even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this case our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the name of a class while in others it is a class expression with an orange circle in front of it. This is because when defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL axioms.\n\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query determines what to match in the query. If you want to display everything matched in the WHERE clause you can just use a * for the SELECT clause. The initial default query in this tab is set up with no knowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes regardless of the ontology. To get information about Pizzas the first thing we need to do is to add\n\nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a mapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab discussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement:\n\nPREFIX pizza: < [http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial#>](http://www.semanticweb.org/pizzatutorial/ontologies/2020/PizzaTutorial)", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "### Chapter 4 Building an OWL Ontology\n\nThis chapter describes how to create an ontology of Pizzas. We use Pizzas because it is something almost everyone is familiar with.\n\n###### **Exercise 1: Create a new OWL Ontology**\n\n_____________________________________________________________________________________\n\n1. Start Protégé. When Protégé opens for the first time each day it puts up a screen of all the available plugins. You can also bring this up at any time by using File>Check for plugins. You won’t need any plugins at this point of the tutorial so just click the Not now button.\n\n2. The Protégé user-interface consists of several tabs such as Active ontology, Entities, etc. When you start Protégé you should be in the Active Ontology tab. This is for overview information about the entire ontology. Protégé always opens with a new untitled ontology you can start with. Your ontology should have an IRI something like: http://www.semanticweb.org/yourname/ontologies/2020/4/untitled-ontology- 27 Edit the name of the ontology (the part after the last “/” in this case untitled-ontology-27) and change it to something like PizzaTutorial. Note: the Pizza ontology IRIs shown below (e.g., figure 4.3) show the IRI after I edited the default that Protégé generated for me. Your IRI will look different and will be based on your name or the name of your organization.\n\n3. Now you want to save your new ontology. Select File>Save. This should bring up a window that says: Choose a format to use when saving the ‘PizzaTutorial’ ontology. There is a drop down menu of formats to use. The default RDF/XML Syntax should be selected by clicking the OK button. This should bring up the standard dialog your operating system uses for saving files. Navigate to the folder you want to use and then type in the file name, something like Pizza Tutorial and select Save. ____________________________________________________________________________________\n\nThe next step is to set some preferences related to the names of new entities. Remember than in Protégé any class, individual, object property, data property, annotation property, or rule is referred to as an entity. The term name in OWL can actually refer to two different concepts. It can be the last part of the IRI <sup>3</sup> or it can refer to the annotation property (usually rdfs:label ) used to provide a more user friendly name for\n\nthe entity. We will discuss this in more detail below in chapter 7. For now, we just want to set the parameters correctly so that future parts of the tutorial (especially the section on SPARQL queries) will work appropriately.\n\n3 An IRI is similar to a URL. This will be discussed in detail below in chapter 7.\n\nAs with any file you work on it is a good idea to save your work at regular intervals so that if\n\nsomething goes wrong you don’t lose your work. At certain points in the tutorial where saving\n\nis especially important the tutorial will prompt you to do so but it is a good idea to save your\n\nwork often, not just when prompted.", - "page_start": 10, - "page_end": 10, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "### Chapter 13 Conclusion: Some Personal Thoughts and Opinions\n\nThis tutorial is just the entry point to a technology that is entering the *Slope of Enlightenment* in the Gartner technology hype cycle [Gartner Hype Cycle]. Tim Berners-Lee published his paper on the Semantic Web [Berners-Lee 2001] way back in 2001. At least in my experience for most large US corporations the excitement around Machine Learning seemed for a while to eclipse serious interest in OWL, SPARQL, and other Semantic Web technologies in the United States. Then influential technology companies such as Google [Singhal 2012], Facebook [Olanof 2013], and Amazon [Neptune 2017] started to embrace the technology using the term Knowledge Graphs [Noy 2019] and the corporate world is finally realizing that machine learning and knowledge graphs are complimentary not competitive technologies.\n\nThe term knowledge graph itself can be used in different ways. The best definition I’ve heard is that an\n\nontology provides the vocabulary (i.e., essentially the T-Box) and a knowledge graph is an ontology combined with data (A-Box). Although in the corporate world I often hear people simply talk about knowledge graphs without much interest in the distinction between the vocabulary and the data.\n\nThere are a number of vendors emerging who are using the technology in very productive ways and are providing the foundation for federated knowledge graphs that can scale to hundreds of millions of triples or more and provide a framework for all corporate data. I’ve listed several in the bibliography but those\n\nare only the ones I’ve had some experience with. I’m sure there are many others. One of the products I’ve\n\nhad the best experience with is the AllegroGraph triplestore and the Gruff visualization tool from Franz Inc. Although Allegro is a commercial tool, the free version supports most of the core capabilities of the commercial version. I’ve found the Allegro triplestore easy to use on a Windows PC with the Docker tool to emulate a Linux server.\n\nI first started working with classification-based languages when I worked at the Information Sciences Institute (ISI) and used the Loom language [Macgregor 91] to develop B2B systems for the US Department of Defense and their contractors. Since then, I’ve followed the progress of the technology, especially the DARPA knowledge sharing initiative [Neches 91] and always thought there was great promise in the technology. When I first discovered Protégé it was a great experience. It is one of the best supported and most usable free tools I’ve ever seen, and it always surprised me that there weren’t more corporate users leveraging it in major ways. I think we are finally starting to see this happen and I hope this tutorial helps in a small way to accelerate the adoption of this powerful and robust tool.", - "page_start": 88, - "page_end": 88, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "SO WHAT EXACTLY IS A SUMMARY?\n\nA summary is more than just a condensed or shortened version of your\n\nwork. A summary requires you to analyse your study material, to identify\n\nthe key concepts, and to explain it in your own words.\n\nTo make a good summary, you need to:\n\n- Keep it brief.\n\n- Make sure to use main headings and keywords.\n\n- Focus on the main ideas.\n\n- Classify and organise the information in a logical manner.\n\n- Use your own words where possible.\n\n- Include examples.\n\n- Remember that your summaries are there to help you.\n\nYOU CAN MAKE YOUR SUMMARIES IN DIFFERENT FOR­ MATS. HERE ARE SOME EXAMPLES:\n\nMind Maps (Spider Diagrams)\n\nA mind map is a visual expression of thoughts, ideas and concepts. It\n\nusually takes the form of a diagram, with the main concept in the centre,\n\nand the related concepts branching out from there. Here is an example:\n\nPayroll Contracts\n\n**HR**\n\n**Manager’s Duties**\n\nStaff\n\nTraining\n\nDiscipline", - "page_start": 28, - "page_end": 28, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "types of enterprises. The role and power of all actors in these systems varies substantially, defining\n\nsuch roles specifically for employers, workers’ representatives and safety representatives.\n\nDuring the last two decades, nearly all EU Member States have developed strategic approaches, mostly\n\ncalled **‘National OSH Strategies’** or ‘National OSH Plans’. In most cases, these strategies have helped\n\nto identify and mitigate recognised structural weaknesses of the national OSH system, for example, low\n\nlevels of implementation of existing legislation, insufficient reporting and monitoring tools, or specific\n\nsector or risk-related actions, and finally also regulatory improvements. The EU OSH strategies and\n\nOSH strategic frameworks have often been used as orientation for objectives and actions of national\n\nstrategies; the first started in 2002 (‘Communication from the Commission - Adapting to change in work\n\nand society: a new Community strategy on health and safety at work 2002-2006’). The latest **EU**\n\n**Strategic Framework on Health and Safety at Work 2021-2027** puts the focus on changes; it is titled\n\n‘Occupational safety and health in a changing world of work’ and focuses on three key objectives for the\n\ncoming years: *(1) anticipating and managing change in the new world of work brought about by the*", - "page_start": 15, - "page_end": 15, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" - }, - { - "text": "capital eÇcient means for us to build our business. This includes not only expanding landÑll and\n\ntransfer capacity and investing in trucks and containers, but also includes investing in information tools\n\nand training needed to ensure high productivity and quality service throughout all functional areas of\n\nour business.\n\n‚ * **Strategic Acquisitions.** * We have and will continue to pursue strategic acquisitions that augment our\n\nexisting business platform.\n\n2", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "fallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". <sup>[39]</sup> Some\n\ntheorists state that formal logic studies the general form of arguments while informal logic studies\n\nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of\n\n#### **Informal logic**", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" - }, - { - "text": "7\n\nrelations, transitive relations, and many more. An understanding of the basic concepts of set theory will help the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents an intuitive GUI that enables domain experts to define models without a background in set theory. However, developers are encouraged to refresh their knowledge on logic and set theory. A good source is the first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another good source is the PDF document *Overview of Set Theory* available at: [https://www.michaeldebellis.com/post/owl-theoretical-basics](https://www.michaeldebellis.com/post/owl-theoretical-basics)\n\n3.1.1 Individuals Individuals represent objects in the domain of interest. An important difference between OWL and most programming and knowledge representation languages is that OWL does not use the Unique Name Assumption (UNA). This means that two different names could actually refer to the same individual. For\n\nexample, “Queen Elizabeth”, “The Queen” and “Elizabeth Windsor” might all refer to the same\n\nindividual. In OWL, it must be explicitly stated that individuals are the same as each other, or different from each other. Figure 3.1 shows a representation of some individuals in a domain of people, nations, and relations — in this tutorial we represent individuals as diamonds.\n\nFigure 3.1: Representation of Individuals\n\nMichael\n\nJenna\n\nDiane\n\nTim\n\nUSA\n\nIndia\n\nItaly\n\nIndividuals are also known as *instances* . Individuals can be referred to as *instances of classes* .\n\nFigure 3.2: Representation of Properties\n\nMichael\n\nBiswanath\n\nlivesIn\n\nIndia\n\nhasFriend", - "page_start": 7, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "**OLAF**\n\n**Ontology based-system**\n\nOntology Use Cases Final Application\n\n**Knowledge sources**\n\nText Corpus Seed Ontology\n\nOntology\n\nPipeline Building Pipeline Optimisation Pipeline Execution\n\n###### * **C-value-based filtering** *\n\n###### * **Linguistic-based filtering** *\n\n###### * **TF-IDF value-based filtering** *\n\n###### * **ConceptNet-based extraction** *\n\n###### * **Grouping terms based on synonyms** *\n\n###### * **Term cooccurrences-based extraction** *\n\n###### * **Similarity-based extraction** *\n\n*Formal concept Analysis*\n\n###### * **Term subsumption algorithm** *\n\n*Hierarchical clustering*\n\n###### * **Rule-based axiom extraction** *\n\n*Inductive Logic Programming*\n\n**OLAF : Ontology Learning Applied Framework** Marion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr)\n\n#### Jean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK\n\nTerm Extraction\n\nTerm Enrichment\n\nConcept/Relation\n\nExtraction\n\nHierarchisation\n\nAxiom\n\nData preprocessing\n\nText Corpus\n\nOntology\n\n##### **OLAF**\n\nActivity Ressource\n\nArtifact Optional\n\n### **CAPTION**\n\n### **STATE OF THE ART**\n\nSystem Overview Pros and cons\n\nText2Onto,\n\n2005, [1]\n\nIt is the reference in the field as it defines a\n\nrepresentation-agnostic structure with modular\n\nsteps and takes into account uncertainty. The\n\nsystem is implemented as a GATE module.\n\nOntologies can be exported in\n\nvarious formats. GATE system\n\nadds great visualisations. But it is\n\nnot maintained since 2011.\n\nOntoLearn\n\n(Reloaded),\n\n2013, [3]\n\nIt focuses on \"lexicalised ontologies\" and uses seed\n\nknowledge. It implements 5 steps: terminology\n\nextraction, hypernym graph construction, domain\n\nfiltering of hypernyms, hypernym graph pruning and\n\nedge recovery.\n\nIt relies on WordNet and POS\n\ntags and does not distinguish\n\nbetween terms and concepts.\n\nIt implements different\n\nadaptable approaches.\n\nOntoGain,\n\n2010, [2]\n\nIt focuses on multiword terms to construct a\n\n\"lexicalised ontology\" by adapting an agglomerative\n\nclustering and an FCA method. It implements 4\n\nsteps: text preprocessing, concept extraction (C/NC-\n\nvalue), taxonomy construction, and non-taxonomic\n\nrelation acquisition (rule-based and probabilistic).\n\nIt considers only multiword\n\nterms and relies on WordNet\n\nand POS tags. It does not\n\ndistinguish between terms and\n\nconcepts and implements\n\ndifferent adaptable approaches.\n\nCimiano P, Völker J. Text2Onto. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005.p. 227-238. ISBN: 978-3-540-32110-1\n\nDrymonas E, Zervanou K, Petrakis EGM. Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System. Natural Language Processing and Information Systems. Berlin, Heidelberg:\n\nSpringer Berlin Heidelberg; 2010. p. 277-87. ISBN: 978-3-642-13881-2\n\nPaola Velardi, Stefano Faralli, Roberto Navigli; OntoLearn Reloaded: A Graph-Based Algorithm for Taxonomy Induction. Computational Linguistics 2013; 39 (3): 665- 707. DOI:\n\n[10.1162/COLI_a_00146](https://doi.org/10.1162/COLI_a_00146)\n\nMuhammad Nabeel Asim, Muhammad Wasim, Muhammad Usman Ghani Khan, Waqar Mahmood, Hafiza Mahnoor Abbasi, A survey of ontology learning techniques and applications,\n\n[Database, Volume 2018, 2018, bay101, DOI: 10.1093/database/bay101](https://doi.org/10.1093/database/bay101)\n\n1.\n\n2.\n\n3.\n\n4.\n\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically **extracting and structuring knowledge**\n\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a **modular ontology**\n\n**learning framework** considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning\n\nsystems as tools to help the domain expert, we developed the proposed framework with **full automation** in mind. An implementation as an **open-**", - "page_start": 0, - "page_end": 0, - "source_file": "infographic5.pdf" - } - ] - }, - { - "references": { - "source_file": "infographic5.pdf", - "query": "Is Text2Onto still updated nowadays?", - "target_page": 1, - "target_passage": "But it is not maintained since 2011.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "| Type of content Tags |\n|:---|\n| Table without Alt Text <Table> <THead> <TR> <TH> text content <TH> text content <TBody> <TR> <TH> text content <TD> text content <TFoot> <TR> <TH> text content <TD> text content |\n| Table Header Cell <TH> Scope=Row, Column, or Both |\n| Table Merged Cell <TH> or <TD> Row span= r Column span= c |\n| Group without Alt Text tags for child objects |\n| Summary Zoom, Section Zoom, and Slide Zoom <TOC> Alt= alt text <TOCI> <Link> Link - OBJR <Span> |", - "page_start": 51, - "page_end": 51, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Type of content Tags |\n|:---|\n| Table <Table> <THead> <TR> <TH> text content <TH> text content <TBody> <TR> <TH> text content <TD> text content |\n| Table Header Cell <TH> |\n| Decorative Graphical Object no tags |\n| Graphical Object with Alt Text <Figure> Alt= alt text (object type) |\n| Graphical Object other than Shape without Alt Text <Figure> Alt= blank |\n| Shape without Alt Text with text <Sect> text content |\n| Shape with Alt Text with text <Figure> Alt= alt text + text (shape type) |", - "page_start": 58, - "page_end": 58, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Type of content Tags |\n|:---|\n| Shape without Alt Text with whitespace text or no text <Figure> Alt= blank |\n| Shape without Alt Text with Equation <Formula> Alt= equation spelled out in words |\n| Shape without Alt Text with non-whitespace text without Equation <Sect> text content |\n| Shape with Alt Text with non-whitespace text without Equation <Figure> Alt= alt text + text (shape type) |\n| WordArt without Alt Text or Decorative <Sect> text content |\n| Group without Alt Text tags for child objects |\n| Group with Alt Text <Figure> Alt= alt text (object type) tags for child objects |\n| Decorative Picture in Cell <TD> no tags |\n| Picture without Alt Text in Cell <TD> no tags |", - "page_start": 46, - "page_end": 46, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Type of content Tags |\n|:---|\n| WordArt without Alt Text or Decorative <Sect> text content |\n| Picture with Attribution <Figure> Alt= alt tex <Sect> text content |\n| Group without Alt Text tags for child objects |\n| Hyperlink on Text <Link> Link - OBJR text content |\n| Hyperlink on Object tag for object <Link> Link - OBJR alt text Note: the <Link> is a sibling of the tag for the object. |\n\nThe following types of content are marked as <Artifact> in the PDF Content Tree and\n\nhave no PDF/UA tags:\n\nHeader and footer\n\nDecorative graphical objects\n\nGray space on the right side of the page for comments\n\nPictures in picture bullets\n\nUnderlines\n\nBorders around text and quote paragraphs\n\nLines above footnotes/endnotes\n\nText in SmartArt objects\n\n**Artifacts**", - "page_start": 59, - "page_end": 59, - "source_file": "office-pdf.pdf" - }, - { - "text": "bge-m3-custom-fr Yes multilingual 5.68e+08 2.271019008 8192.0 1024.0 MIT Yes\n\nTable 7: Models included in the benchmark with their main characteristics. The size in Gb is estimated using the\n\nnumber of parameters counted as float32 numbers. *Sentence sim* refers to the fact that the model was trained on a\n\ntask that favors semantic similarity.\n\n**Task type Prompt**\n\nClassification \"Classify the following task: \"\n\nClustering \"Identify the topic or theme based on the text: \"\n\nRetrieval \"Retrieve semantically similar text: \"\n\nReranking \"Re-rank the following text: \"\n\nPair Classification \"Classify the following pair of text: \"\n\nSTS \"Determine the similarity between the following text:\n\n\"\n\nSummarization \"Summarize the following text: \"\n\nBitext Mining \"Translate the following text: \"\n\nTable 8: Prompts used for the evaluation of *e5-mistral-7b-instruct* .", - "page_start": 19, - "page_end": 19, - "source_file": "arxiv4.pdf" - }, - { - "text": "| Type of content Tags |\n|:---|\n| Picture with Alt Text in Cell <TD> <Figure> Alt= alt text |\n| Hyperlink on Cell <TD> <P> <Link> Link - OBJR <Span> text content |\n| Hyperlink on Object tag for object <Link> Link - OBJR |\n\nThe following types of content are marked as <Artifact> in the PDF Content Tree and\n\nhave no PDF/UA tags:\n\nSlicer scrollbar\n\nGrid lines\n\nCell borders\n\nCell shading\n\nDecorative graphical objects\n\nText in SmartArt objects\n\nThe information in this article is applicable to the following versions of Excel.\n\nExcel for Windows Version 2408 and later.\n\nExcel for Mac Version 16.89 and later.\n\nExcel for iOS Version 2.89 and later.\n\nExcel for Android Build 16.0.18025.XXXXX or later.\n\n**Artifacts**\n\n**Availability**", - "page_start": 47, - "page_end": 47, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Type of content Tags |\n|:---|\n| Paragraph, Subtitle, Content Controls, and Legacy Controls <P> |\n| Paragraph Quote and Intense Quote <BlockQuote> |\n| Inline Quote ( Version ≥ 16.0.17004.20000 ) <Quote> |\n| Table of Contents <TOC> <TOCI> Table of Contents <TOCI> <Link> Link - OBJR <Span> Complete line text <Span> empty <TOCI> ... <TOCI> ... |\n| Header and Footer no tags |\n| Comment ( Version ≥ 16.0.16831.20002 ) <P> paragraph content <CommentAnchor> <Span> anchor text <Annot> comment content |\n\nFootnotes and Endnotes\n\n<P>\n\n*paragraph content*\n\n<Link>\n\nLink - OBJR", - "page_start": 56, - "page_end": 56, - "source_file": "office-pdf.pdf" - }, - { - "text": "| Number Improvement Word Excel PowerPoint |\n|:---|\n| Text, or Decorative has <Sect> tag with text content |\n| 15 Shape with Alt Text and non-whitespace text without Equation has <Figure> tag with Alt Text Yes Yes |\n| 16 Table Cell with Equation in a Table without Alt Text has <Formula> tag with Alt Text Yes |\n| 17 Summary Zoom, Section Zoom, and Slide Zoom has <TOC> tag without Alt Text Yes |\n| 18 WordArt preserved as text Yes Yes Yes |\n| 19 Alt Text includes the Alt Text Title as well as Alt Text Description Yes Yes Yes |\n| 20 Alt Text includes the Object type Yes Yes Yes |\n| 21 Alt Text for Shape with Alt Text includes the text content Yes Yes |\n| 22 Header Row in a Table has <THead> tag Yes |\n| 23 Total Row in a Table has <TFoot> tag Yes |\n| 24 Header Cell in Table has Scope=Row, Column, or Both in <TH> tag Yes |\n| 25 Cell in a Table has Row span and Column span set properly on <TH> or <TD> tag Yes |\n| 26 For lists in PowerPoint, bullet or number is in <Lbl> tag Yes |\n| 27 For lists in Word, bullet or number is in <Lbl> tag Yes |\n| 28 For picture bullets, no <Lbl> tag is included Yes Yes |\n| 29 For nested lists, <L> tag is in <LBody> tag Yes Yes |\n| 30 Document language in PDF set as the document language in PowerPoint Yes |\n| 31 Document language in PDF set as the document language in Word Yes |\n| 32 Text in different language has <Span> tag with Lang property in PowerPoint Yes |\n| 33 Text in different language has <Span> tag with Lang property in Word Yes |", - "page_start": 38, - "page_end": 38, - "source_file": "office-pdf.pdf" - }, - { - "text": "[1/ai-uses-a-lot-of-energy-experts-expect-it-to-double-in-just-a-few-years) from the original](https://web.archive.org/web/20240703080555/https://www.vox.com/climate/2024/3/28/24111721/ai-uses-a-lot-of-energy-experts-expect-it-to-double-in-just-a-few-years)\n\non 3 July 2024. Retrieved 5 October 2024.\n\n[205. Halper, Evan; O'Donovan, Caroline (21 June 2024). \"AI is exhausting the power grid. Tech](https://www.washingtonpost.com/business/2024/06/21/artificial-intelligence-nuclear-fusion-climate/?utm_campaign=wp_post_most&utm_medium=email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F3e0d678%2F6675a2d2c2c05472dd9ec0f4%2F596c09009bbc0f20865036e7%2F12%2F52%2F6675a2d2c2c05472dd9ec0f4)\n\n[firms are seeking a miracle solution\" (https://www.washingtonpost.com/business/2024/06/2](https://www.washingtonpost.com/business/2024/06/21/artificial-intelligence-nuclear-fusion-climate/?utm_campaign=wp_post_most&utm_medium=email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F3e0d678%2F6675a2d2c2c05472dd9ec0f4%2F596c09009bbc0f20865036e7%2F12%2F52%2F6675a2d2c2c05472dd9ec0f4)\n\n[1/artificial-intelligence-nuclear-fusion-climate/?utm_campaign=wp_post_most&utm_medium](https://www.washingtonpost.com/business/2024/06/21/artificial-intelligence-nuclear-fusion-climate/?utm_campaign=wp_post_most&utm_medium=email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F3e0d678%2F6675a2d2c2c05472dd9ec0f4%2F596c09009bbc0f20865036e7%2F12%2F52%2F6675a2d2c2c05472dd9ec0f4)\n\n[=email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingto](https://www.washingtonpost.com/business/2024/06/21/artificial-intelligence-nuclear-fusion-climate/?utm_campaign=wp_post_most&utm_medium=email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F3e0d678%2F6675a2d2c2c05472dd9ec0f4%2F596c09009bbc0f20865036e7%2F12%2F52%2F6675a2d2c2c05472dd9ec0f4)\n\n[npost.com%2Fcar-ln-tr%2F3e0d678%2F6675a2d2c2c05472dd9ec0f4%2F596c09009bbc0f](https://www.washingtonpost.com/business/2024/06/21/artificial-intelligence-nuclear-fusion-climate/?utm_campaign=wp_post_most&utm_medium=email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F3e0d678%2F6675a2d2c2c05472dd9ec0f4%2F596c09009bbc0f20865036e7%2F12%2F52%2F6675a2d2c2c05472dd9ec0f4)\n\n[20865036e7%2F12%2F52%2F6675a2d2c2c05472dd9ec0f4). ](https://www.washingtonpost.com/business/2024/06/21/artificial-intelligence-nuclear-fusion-climate/?utm_campaign=wp_post_most&utm_medium=email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F3e0d678%2F6675a2d2c2c05472dd9ec0f4%2F596c09009bbc0f20865036e7%2F12%2F52%2F6675a2d2c2c05472dd9ec0f4) *Washington Post* .\n\n[206. Davenport, Carly. \"AI Data Centers and the Coming YS Power Demand Surge\" (https://web.](https://web.archive.org/web/20240726080428/https://www.goldmansachs.com/intelligence/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf)\n\n[archive.org/web/20240726080428/https://www.goldmansachs.com/intelligence/pages/gs-res](https://web.archive.org/web/20240726080428/https://www.goldmansachs.com/intelligence/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf)\n\n[earch/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf)](https://web.archive.org/web/20240726080428/https://www.goldmansachs.com/intelligence/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf)\n\n(PDF). *Goldman Sachs* [. Archived from the original (https://www.goldmansachs.com/intellige](https://www.goldmansachs.com/intelligence/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf)", - "page_start": 41, - "page_end": 41, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Appendix A. Performance data and statistics gathering\n\n� Nv_stats_< *node_id* >_< *date* >_< *time* > for Volumes statistics\n\n� Nn_stats_< *node_id* >_< *date* >_< *time* > for node statistic\n\n� Nd_stats_< *node_id* >_< *date* >_< *time* > for drives statistic\n\nThe *node_id* is the name of the node on which the statistics were collected. The date is in the\n\nform < *yymmdd* > and the time is in the form < *hhmmss* > . The following example shows an MDisk\n\nstatistics file name:\n\nNm_stats_113986_161024_151832\n\nExample A-3 shows typical MDisk, volume, node, and disk drive statistics file names.\n\n*Example A-3 File names of per node statistics*\n\nIBM_Storwize:ITSO-V7k:superuser>lsdumps -prefix /dumps/iostats\n\nid filename\n\n0 Nd_stats_7822DFF-2_181101_173808\n\n1 Nn_stats_7822DFF-2_181101_173808\n\n2 Nv_stats_7822DFF-2_181101_173808\n\n3 Nm_stats_7822DFF-2_181101_173808\n\n4 Nm_stats_7822DFF-2_181101_175308\n\n5 Nv_stats_7822DFF-2_181101_175308\n\n6 Nd_stats_7822DFF-2_181101_175308\n\n7 Nn_stats_7822DFF-2_181101_175308\n\n...\n\n60 Nm_stats_7822DFF-2_181101_212314\n\n61 Nn_stats_7822DFF-2_181101_212314\n\n62 Nd_stats_7822DFF-2_181101_212314\n\n63 Nv_stats_7822DFF-2_181101_212314\n\n#### **Real-time performance monitoring**\n\nIBM Storwize V7000 supports real-time performance monitoring. Real-time performance\n\nstatistics provide short-term status information for the Storwize V7000. The statistics are\n\nshown as graphs in the management GUI, or can be viewed from the CLI.\n\nWith system-level statistics, you can quickly view the CPU usage and the bandwidth of\n\nvolumes, interfaces, and MDisks. Each graph displays the current bandwidth in megabytes\n\nper second (MBps) or I/Os operations per second (IOPS), and a view of bandwidth over time.\n\nEach node collects various performance statistics (mostly at 5-second intervals) and the\n\nstatistics that are available from the config node in a clustered environment. This information\n\ncan help you determine the performance effect of a specific node.\n\n**Tip:** The performance statistics files can be copied from the Storwize V7000 nodes to a\n\nlocal drive on your workstation by using pscp.exe (included with PuTTY) from an MS-DOS\n\ncommand line, as shown in this example:\n\nC:\\Program Files\\PuTTY> **pscp -unsafe -load ITSO-V7K**\n\n**superuser@192.168.100.100:/dumps/iostats/* c:\\statsfiles**\n\nUse the **-load** parameter to specify the session that is defined in PuTTY.\n\nSpecify the **-unsafe** parameter when you use wildcards.\n\nYou can obtain PuTTY from [this website](http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html) .", - "page_start": 764, - "page_end": 764, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RCI_2013.pdf", - "query": "What was the proportion of revenue generated by wireless telecommunications operations in 2009?", - "target_page": 91, - "target_passage": "6,685", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nNetwork revenue was higher this year compared to last year. This was\n\nthe net effect of:\n\n- higher data revenue related to an increase in subscriber levels and\n\nhigher usage of wireless data services\n\n- partially offset by our introduction of new lower priced US and\n\ninternational roaming plans and rates which offer consumers more\n\nvalue, and\n\n- the continued adoption of customer friendly simplified plans, which\n\noften bundle in certain features like voicemail, caller ID and long\n\ndistance that we have charged for separately in the past.\n\nExcluding the decline in US and international roaming revenue this year,\n\nnetwork revenue would have increased 1%.\n\nData revenue was 17% higher this year mainly because of the\n\ncontinued penetration and growing use of smartphones, tablet devices\n\nand wireless laptops, which increased the use of e-mail, wireless,\n\nInternet access, text messaging and other wireless data services. Data\n\nrevenue represented approximately 47% of total network revenue this\n\nyear, compared to approximately 41% last year.\n\nPostpaid churn was 1.24% this year, compared to 1.29% in 2012. The\n\nlower churn rate is partly attributable to the new simplified plans and\n\nthe roaming plans we introduced.\n\nGross postpaid subscriber additions were 1.4 million this year, or 3%\n\nlower than last year, which reduced net postpaid subscriber additions to\n\n228,000, despite a lower postpaid churn. We believe the industry\n\ntransition from three year to two year plans resulting from the recent\n\nadoption of the Canadian Radio-television and Telecommunications\n\nCommission (CRTC) Wireless Code may have slowed our overall\n\nwireless subscriber growth from the second half of the year. See\n\n“Regulation in Our Industry” for more information on the Wireless\n\nCode.\n\nWe activated and upgraded approximately 2.7 million smartphones this\n\nyear, compared to approximately 2.9 million in 2012. Approximately\n\n34% of these were for new subscribers. The decrease was mainly\n\nbecause there was a 10% reduction in hardware upgrades by existing\n\nsubscribers during the year, which we also believe is at least partly due\n\nto the move from three to two year contracts and the associated pricing\n\nchanges.\n\nThe percentage of subscribers with smartphones increased to 75% of\n\nour overall postpaid subscriber base, compared to 69% at the end of\n\n2012. Smartphone subscribers typically generate significantly higher\n\nARPU and are less likely to churn.\n\n(%)\n\n**SMARTPHONES AS A PERCENTAGE OF POSTPAID SUBSCRIBERS**\n\n**2013**\n\n2012\n\n2011\n\n**75%**\n\n69%\n\n56%\n\nThe decrease in prepaid subscriber net additions was mainly because of\n\nincreasing competition at the lower end of the wireless market where\n\nprepaid products are mainly sold.\n\nBlended ARPU was down slightly this year compared to last year because\n\nthe voice component declined at a faster rate than the data component\n\nincreased.\n\n(IN MILLIONS OF DOLLARS)\n\n**WIRELESS DATA REVENUE**\n\n**2013**\n\n2012\n\n2011\n\n**$3,175**\n\n$2,722\n\n$2,325\n\n(%)\n\n**DATA REVENUE PERCENT OF BLENDED ARPU**\n\n**2013**\n\n2012\n\n2011\n\n**47%**\n\n41%\n\n35%\n\n*Lower Equipment Sales*\n\nEquipment sales (net of subsidies) include revenue from sales to:\n\n- independent dealers, agents and retailers\n\n- directly to subscribers through fulfillment by Wireless’ customer\n\nservice groups, websites, telesales and corporate stores.\n\nRevenue from equipment sales was lower this year, mainly because\n\nfewer existing subscribers upgraded their devices and there were fewer\n\ngross activations.\n\n####### **Lower Operating Expenses**\n\nWe assess operating expenses in two categories:\n\n- the cost of wireless handsets and equipment\n\n- all other expenses involved in day-to-day operations, to service\n\nexisting subscriber relationships and attract new subscribers.\n\nThe cost of equipment was $50 million lower than last year, or 3%,\n\nmainly because fewer existing subscribers upgraded hardware and", - "page_start": 43, - "page_end": 43, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**MANAGEMENT’S DISCUSSION AND ANALYSIS** INDUSTRY TRENDS\n\nThe telecommunications industry in Canada, and our business segments, is affected by several overarching trends.\n\nCHANGING TECHNOLOGIES AND CONSUMER DEMANDS\n\nConsumer demand for mobile devices, digital media and on-demand\n\ncontent across platforms is pushing providers to build networks that can\n\nprovide more data faster, cheaper and more easily. Increased adoption\n\nof smartphones and double digit growth in our data revenue continued\n\nthis year, reflecting expanded use of applications, mobile video,\n\nmessaging and other wireless data.\n\nCOMPETITION\n\nCompetition in wireless from national and regional operators as well as\n\nsmaller new entrants changes how we compete for wireless services.\n\nThis puts downward pressure on pricing affecting profit margins and\n\nimpacts customer churn.\n\nTraditional wireline telephone and television services are now offered\n\nover the Internet, opening the door to more non-traditional\n\ncompetitors, and changing how traditional providers compete. This is\n\nchanging the mix of packages and pricing that service providers offer,\n\naffecting profit margins and customer churn.\n\nIn the media industry, there continues to be a shift towards on-line\n\nmedia consumption by consumers which in turn drives advertisers to\n\nspend more on-line versus traditional media. In addition, there are more\n\nmedia competitors as additional on-line media companies enter the\n\nmarket, including large global companies.\n\nREGULATION\n\nMost areas of our business are highly regulated, which affects who we\n\ncompete with, the programming we can offer, where and how we use\n\nour networks, how we build our businesses and the spectrum we\n\npurchase. The telecommunications industry is being affected by more\n\nregulation and more reviews of the current regulations.\n\nECONOMIC CONDITIONS\n\nOur businesses are affected by general economic conditions and\n\nconsumer confidence and spending, especially in our Media segment,\n\nwhere advertising revenue is directly affected by the economy.\n\n####### **WIRELESS TRENDS**\n\nMore sophisticated wireless\n\nnetworks, devices and\n\napplications are making it easier\n\nand faster to receive data, driving\n\ngrowth in wireless data services.\n\nWireless providers are investing in\n\nthe next generation of broadband\n\nwireless data networks, such as\n\nLTE, to support the growing data\n\ndemand.\n\nWireless market penetration in\n\nCanada is approximately 80% of\n\nthe population, and is expected to\n\ngrow at an estimated 2%\n\nannually.\n\nThe new CRTC code of conduct\n\nhas limited wireless term contracts\n\nto two years from three years.\n\nAlthough the code of conduct has\n\nonly been in place for a month,\n\nwe believe this is currently\n\nreducing churn and slowing\n\ngrowth in the wireless\n\nmarketplace.\n\n####### **MEDIA TRENDS**\n\nConsumer demand for digital\n\nmedia, mobile devices and on-\n\ndemand content is pushing\n\nadvertisers to shift some of their\n\nspending to digital platforms.\n\nTraditional media assets in\n\nCanada have become\n\nincreasingly controlled by a small\n\nnumber of competitors with\n\nsignificant scale and financial\n\nresources, while technology has\n\nallowed new entrants and even\n\nindividuals to become media\n\nplayers in their own right. Across\n\nboth traditional and emerging\n\nplatforms, many players have\n\nbecome more vertically\n\nintegrated, as both providers and\n\npurchasers of content.\n\nAccess to premium content has\n\nbecome even more important for\n\nacquiring audiences that attract\n\nadvertisers and subscribers.\n\nOwnership of content or long-\n\nterm agreements with content\n\nowners, have also become\n\nincreasingly important to Media\n\ncompanies.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 31", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "##### **General**\n\nShenandoah Telecommunications Company is a diversified telecommunications company providing both regulated and unregulated telecommunications services through its nine wholly owned subsidiaries. These subsidiaries provide local exchange telephone services, wireless personal communications services (PCS), as well as cable television, paging, Internet access, long distance, fiber optics facilities, and leased tower facilities. The Company is the exclusive provider of wireless mobility communications network products and services under the Sprint brand from Harrisonburg, Virginia to Harrisburg, York and Altoona, Pennsylvania. The Company refers to the Hagerstown, Maryland; Martinsburg, West Virginia; and Harrisonburg and Winchester, Virginia markets as its Quad State markets. The Company refers to the Altoona, Harrisburg, and York, Pennsylvania markets as its Central Penn markets. Competitive local exchange carrier (CLEC) services were established on a limited basis during 2002. In addition, the Company sells and leases equipment, mainly related to services it provides, and also participates in emerging services and technologies by direct investment in non-affiliated companies.\n\nThe Company reports revenues as wireless, wireline and other revenues. These revenue classifications are defined as follows: Wireless revenues are made up of the Personal Communications Company (a PCS Affiliate of Sprint), and the Mobile Company. Wireline revenues include the following subsidiary revenues in the financial results: Telephone Company, Network Company, Cable Television Company, and the Long Distance Company. Other revenues are comprised of the revenues of ShenTel Service Company, the Leasing Company, ShenTel Communications Company and the Holding Company. For additional information on the Company's business segments, see Note 14 to audited consolidated financial statements appearing elsewhere in this report.\n\nThe Company participates in the telecommunications industry, which requires substantial investment in fixed assets or plant. This significant capital requirement may preclude profitability during the initial years of operation. The strategy of the Company is to grow and diversify the business by adding services and geographic areas that can leverage the existing plant, but to do so within the opportunities and constraints presented by the industry. For many years the Company focused on reducing reliance on the regulated telephone operation, which up until 1981 was the primary business within the Company. This initial diversification was concentrated in other wireline businesses, such as the cable television and regional fiber facility businesses, but in 1990 the Company made its first significant investment in the wireless sector through its former investment in the Virginia 10 RSA Limited partnership. By 1998, revenues of the regulated telephone operation had decreased to 59.2% of total revenues. In that same year more than 76.6% of the Company’s total revenue was generated by wireline operations, and initiatives were already underway to make wireless a more significant contributor to total revenues.", - "page_start": 40, - "page_end": 40, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "**MANAGEMENT’S DISCUSSION AND ANALYSIS** COMPETITION\n\nWe compete on quality of service, scope of services, network coverage,\n\nsophistication of wireless technology, breadth of distribution, selection\n\nof devices, branding and positioning, and price.\n\n- Wireless technology: we were the first carrier in Canada to launch an\n\nLTE network catering to customers seeking the increased capacity\n\nand speed it provides. We compete with Bell, Telus MTS and Eastlink,\n\nall of whom operate LTE networks and we expect competition to\n\ngrow over time as LTE becomes the prevailing technology in Canada.\n\nWe also compete with these providers and other regional providers\n\nsuch as Wind Mobile, on HSPA and GSM networks and with\n\nproviders that use alternative wireless technologies, like Wi-Fi\n\n“hotspots”.\n\n- Product, branding and pricing: we compete nationally with Bell and\n\nTelus. We also complete with newer entrants, various regional\n\nplayers and resellers.\n\n- Distribution: we compete with other service providers for both\n\ndealers and prime locations for our own stores as well as third party\n\nretail distribution shelf space outlets.\n\n- Wireless networks and handset devices: the parity of wireless devices\n\nacross networks has dramatically transformed the competitive\n\nlandscape, and we expect this to continue and even intensify.\n\nConsolidation among new entrants or with incumbent carriers could\n\nalter the competitive landscape for Wireless regionally or nationally.\n\n- Spectrum: we are currently participating in an auction for 700 MHz\n\nspectrum. Industry Canada has also announced an auction for\n\nadditional 2500 MHz spectrum in 2015 in which we may be\n\nrestricted from participating in the geographic areas where we\n\nalready hold more than 40 MHz of 2500 MHz spectrum. The\n\noutcomes of both of these auctions may increase competition.\n\nWIRELESS FINANCIAL RESULTS\n\n(In millions of dollars, except percentages)\n\nYears ended December 31\n\n**2013** 2012 % Chg\n\nOperating revenue\n\nNetwork revenue **$ 6,748** $ 6,719 -\n\nEquipment sales **522** 561 (7)\n\n**Operating revenue - Wireless 7,270** 7,280 -\n\nOperating expenses\n\nCost of equipment <sup>1</sup> **(1,535)** (1,585) (3)\n\nOther operating expenses **(2,578)** (2,632) (2)\n\n**(4,113)** (4,217) (2)\n\n**Adjusted operating profit - Wireless $ 3,157** $ 3,063 3\n\nAdjusted operating profit margin as\n\n% of network revenue **46.8%** 45.6%\n\nAdditions to property, plant and equipment **$ 865** $ 1,123 (23)\n\nData revenue included in network revenue **$ 3,175** $ 2,722 17\n\nData revenue as % of network revenue **47%** 41%\n\n1 Includes the cost of equipment sales and direct channel subsidies.\n\n(IN MILLIONS OF DOLLARS)\n\n**WIRELESS NETWORK REVENUE**\n\n**2013**\n\n2012\n\n2011\n\n**$6,748**\n\n$6,719\n\n$6,601\n\nWIRELESS SUBSCRIBER RESULTS <sup>1, 2</sup>\n\n(Subscriber statistics in thousands, except ARPU and churn)\n\nYears ended December 31\n\n**2013** 2012 Chg\n\n**Postpaid**\n\nGross additions **1,409** 1,457 (48)\n\nNet additions **228** 268 (40)\n\nTotal postpaid subscribers **8,074** 7,846 228\n\nMonthly churn **1.24%** 1.29% (0.05)pts\n\nMonthly average revenue per user\n\n(ARPU) **$ 67.76** $ 69.30 $ (1.54)\n\n**Prepaid**\n\nGross additions **525** 627 (102)\n\nNet losses **(162)** (170) 8\n\nTotal prepaid subscribers **1,429** 1,591 (162)\n\nMonthly churn **3.85%** 3.98% (0.13)pts\n\nARPU **$ 15.64** $ 15.84 $ (0.20)\n\n**Blended ARPU $ 59.58** $ 59.79 $ (0.21)\n\n1 Does not include subscribers from our wireless home phone product.\n\n2 ARPU, subscriber counts and subscriber churn are key performance indicators. See\n\n“Key Performance Indicators *”* .\n\n(IN THOUSANDS)\n\n**WIRELESS POSTPAID AND PREPAID SUBSCRIBERS**\n\n**2013**\n\n2012\n\n2011\n\n**1,429 8,074**\n\n1,591 7,846\n\n1,761 7,574\n\nPostpaid Prepaid\n\n($)\n\n**WIRELESS POSTPAID MONTHLY ARPU**\n\n**2013**\n\n2012\n\n2011\n\n**$67.76**\n\n$69.30\n\n$70.26\n\n(%)\n\n**WIRELESS POSTPAID MONTHLY CHURN**\n\n**2013**\n\n2012\n\n2011\n\n**1.24%**\n\n1.29%\n\n1.32%\n\n####### **Operating Revenue**", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "attributed to losses on the repayment of debt, foreign exchange gains\n\nor losses, changes in the fair value of derivative instruments, other\n\nincome and expenses, impairment of assets and changes in income tax\n\nexpense.\n\n####### **Wireless**\n\nThe trends in Wireless revenue and adjusted operating profit reflect:\n\n- the growing number of wireless voice and data subscribers\n\n- decreased churn\n\n- higher usage of wireless data\n\n- higher handset subsidies as more consumers shift to smartphones\n\n- a slight decrease in blended ARPU due to changes in wireless price\n\nplans.\n\nWe continue to target higher value postpaid subscribers, which has\n\ncontributed to the significantly heavier mix of postpaid versus prepaid\n\nsubscribers. Growth in our customer base and overall market\n\npenetration have resulted in higher costs over time for customer service,\n\nretention, credit and collection; however, most of the cost increases\n\nhave been offset by gains in operating efficiencies.\n\nWireless’ operating results are influenced by the timing of our\n\nmarketing and promotional expenditures and higher levels of subscriber\n\nadditions and related subsidies, resulting in higher subscriber acquisition\n\nand activation-related expenses in certain periods. This increased activity\n\ngenerally occurs in the third and fourth quarters, and can also occur or\n\nbe accentuated by the launch of popular new wireless handset models.\n\n####### **Cable**\n\nThe trends in Cable services revenue and operating profit increases are\n\nprimarily due to:\n\n- higher penetration and usage of Internet, digital and telephony\n\nproducts and services\n\n- offset by competitive losses of television subscribers and pricing\n\nchanges over the past year.\n\nCable’s operating results are affected by modest seasonal fluctuations\n\nin subscriber additions and disconnections, typically caused by:\n\n- university and college students moving\n\n- individuals temporarily suspending service for extended vacations or\n\nseasonal relocations\n\n- the concentrated marketing we generally conduct in our fourth\n\nquarter.\n\n####### **Business Solutions**\n\nThe trends in Business Solutions operating profit margin primarily reflect\n\nthe ongoing shift from lower-margin, off-net legacy long distance and\n\ndata services to higher-margin, on-net next generation IP-based\n\nservices.\n\nBusiness Solutions does not generally have any unique seasonal aspects\n\nto its business.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 55", - "page_start": 58, - "page_end": 58, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nExecutive Summary\n\nABOUT ROGERS COMMUNICATIONS INC.\n\nRogers Communications is one of Canada’s leading diversified communications and media companies.\n\nWe provide a broad range of services: wireless and wired voice and data\n\ncommunications, cable television, high-speed Internet, cable telephony,\n\nwired telecom and data networking services to consumers and\n\nbusinesses. We also compete in television and radio broadcasting,\n\nmulti-platform shopping, sports media and entertainment, digital media\n\nand consumer, trade and professional publications.\n\nAlmost all of our operations and sales are in Canada. We have a highly\n\nskilled and diversified workforce of approximately 28,000 employees.\n\nOur head-office is in Toronto, Ontario and we have numerous offices\n\nacross Canada.\n\nFOUR BUSINESS SEGMENTS\n\nWe report our results of operations in four segments.\n\nWireless Wireless telecommunications operations\n\nfor consumers and businesses\n\n| Cable | Cable telecommunications operations, including cable television, Internet and cable telephony for Canadian consumers and businesses |\n|:---|:---|\n| Business Solutions | Network connectivity through our fibre network assets to support a range of voice, data, networking, data centre and cloud-based services for medium and large Canadian businesses, governments, and other telecommunications providers |\n| Media | A diversified portfolio of media properties, including television and radio broadcasting, digital media, multi- platform shopping, publishing and sports media and entertainment |\n\n$12.7 BILLION\n\n(%)\n\n**2013 CONSOLIDATED REVENUE BY SEGMENT**\n\nWIRELESS **57%**\n\nCABLE **27%**\n\nMEDIA **13%**\n\nBUSINESS SOLUTIONS **3%**\n\n$5.0 BILLION\n\n(%)\n\n**2013 CONSOLIDATED ADJUSTED OPERATING PROFIT BY SEGMENT**\n\nWIRELESS **61%**\n\nCABLE **33%**\n\nMEDIA **4%**\n\nBUSINESS SOLUTIONS **2%**\n\n26 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Other revenues, primarily consisting of Internet and 511Virginia service revenues were $5.8 million in 2003, an increase of $0.7 million or 13.5%. The Company had 17,420 dial-up Internet subscribers at December 31, 2003, compared to 18,050 at the end of the previous year. During 2003, the Company’s DSL high-speed Internet access subscriber count increased to 1,298 from 646. Total Internet service revenue was $4.5 million, an increase of $0.3 million or 10.7%. The 511Virginia contract with the Virginia Department of Transportation contributed $1.3 million to other revenues, an increase of $0.4 million or 41.3%. Telecommunications equipment sales, services and lease revenues were $1.1 million, which reflects a $0.1 million decrease from 2002 results.\n\nWireline revenues from cable television services were $4.4 million, an increase of $0.1 million or 1.7%. The number of subscribers and service plan prices remained relatively constant during 2003.\n\nBilling and collection services and other revenues contributed $0.4 million to wireline revenues, which was the same as 2002 results. Revenues from this service had declined in recent years, with interexchange carriers now issuing a greater proportion of their bills directly to their customers.\n\nFacility lease revenue contributed $5.5 million to wireline revenues, a decrease of $0.2 million or 3.5%. The decrease was primarily the result of the prolonged decline of lease rates associated with competitive pricing pressures and the economic downturn in the telecommunications industry. During 2002 the Company completed a second, diverse fiber route to its existing interconnection point in the Dulles airport area of Northern Virginia. This fiber route provides increased reliability for customers in the event of fiber cuts or breaks, and extends the availability of the Company’s fiber network to additional market locations but to date has not added additional revenue to the Company’s operation.\n\n47 ■ 2003 ANNUAL REPORT\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 48, - "page_end": 48, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "##### * **Income Taxes** *\n\nThe Company defers direct subscriber activation costs on subscribers whose activation falls within the SAB 101 guidelines. The activation costs are deferred when incurred, and then amortized using the straight-line method over 30 months, which is the estimated average life of a subscriber. Direct subscriber activation costs also include the activation charge from Sprint, and credit check fees. These fees are charged to the Company by Sprint at approximate $12.50 per subscriber.\n\nTotal revenue was $105.9 million in 2003, an increase of $12.9 million or 13.9%. Total revenues included $70.0 million of wireless revenues, an increase of $12.0 million or 20.7%; wireline revenues of $29.0 million, an increase of $0.3 million or 0.9%; and other revenues of $7.0 million, an increase of $0.6 million or 9.7%.\n\nWithin wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS service revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the increase in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 subscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the churn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the after sales support. Competition in the wireless industry continues to have a significant impact on the results of the Company’s PCS operation.\n\nPCS travel revenue, including reseller revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party’s network, was $16.8 million, an increase of $0.3 million or 1.8%. Travel revenue is impacted by the geographic size of the Company’s network service area, the overall number of Sprint wireless customers, their travel patterns and the travel exchange rate. The rate received on travel was $0.058 per minute in 2003, compared to $0.10 per minute in 2002. As a part of the amended management agreement signed on January 30, 2004, Sprint and the Company agreed to maintain the travel rate at $0.058 per minute through December 31, 2006.\n\n## **2003 compared to 2002**\n\n##### **Results of Continuing Operations**\n\nThe Company does not have any unrecorded off-balance sheet transactions or arrangements, however, the Company has commitments under operating leases and is subject to certain capital calls under one of its investments.\n\n##### * **Other** *\n\nsubsidy. The Company does not receive any revenues from the sale of handsets and accessories by national retailers. The Company classifies these handset subsidy charges as a cost of goods expense.\n\nThrough December 31, 2003, the Agreement provided that Sprint retains 8% of collected service revenues from subscribers based in the Company's markets and from non-Sprint wholesale subscribers who roam onto the Company's network. The amount of revenue retained by Sprint is recorded as an offset to the revenues recorded. All revenues derived from the sale of handsets and accessories by the Company and from certain roaming services (outbound roaming and travel revenues from Sprint and its PCS Affiliate subscribers) are retained by the Company.\n\n45 ■ 2003 ANNUAL REPORT\n\n**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT’S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS**", - "page_start": 46, - "page_end": 46, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "For the Company’s wireless customers that purchase and activate their service through a channel not covered by EITF 00-21, the wireless customers generally pay an activation fee to the Company when they initiate service. The Company defers the activation fee revenue (except when a special promotion reduces or waives the fee) over the average life of its subscribers, which is estimated to be 30 months. The Company recognizes service revenue from its subscribers as they use the service. The Company provides a reduction of recorded revenue for billing adjustments and the portion of revenue (8%) that is retained by Sprint. The Company also reduces recorded revenue for rebates and discounts given to subscribers on wireless handset sales in accordance with (\"EITF\") Issue No. 01-9 “Accounting for Consideration Given by a Vendor to a Subscriber (Including a Reseller of the Vendor's Products).” The Company\n\n##### * **Revenue Recognition** *\n\nBad Debt expense summary, net of recoveries for the three years ended December 31, 2003:\n\nIn thousands **2003** 2002 2001 PCS subscribers **$1,716** $ 3,744 $ 1,241 Interexchange carriers **48** 488 - Other subscribers and entities **71** 170 82 Total bad debt expense **$1,835** $ 4,402 $ 1,323\n\ncarrier accounts, but due to the telecommunication industry down-turn of the last few years, the Company experienced write-offs in this area of the business totaling $0.5 million in 2002, due to bankruptcy filings of several significant telecommunications companies. In 2003, the inter-carrier segment of the business improved and the Company recovered $240 thousand of bad debt from the sale of certain accounts that were previously written-off.\n\n**2003** 2002 2001", - "page_start": 45, - "page_end": 45, - "source_file": "NASDAQ_SHEN_2003.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\n####### **Key Achievements**\n\n####### **Higher Operating Revenue and Adjusted Operating Profit**\n\n- Consolidated operating revenue was 2% higher this year compared\n\nto 2012, led by an increase in data revenue at Wireless, higher\n\nInternet revenue at Cable, higher Next Generation revenue at\n\nBusiness Solutions and higher subscriber revenue at Media. Revenue\n\ngrew by 3% in Cable, 7% in Business Solutions and 5% in Media,\n\nwhile revenue at Wireless remained unchanged as the increase in\n\ndata revenue was offset by the decrease in voice revenue.\n\n- Consolidated adjusted operating profit rose 3% this year to $4,993\n\nmillion, with consolidated adjusted operating profit margins of 39.3%,\n\nresulting from higher revenue, the realization of cost efficiencies and\n\nshifts in the mix of revenue from products and services sold.\n\n- Postpaid Wireless subscriber growth continued with net additions of\n\n228,000 and lower churn of 1.24%.\n\n- Cable high-speed Internet subscribers grew by 97,000 and cable\n\ntelephony lines grew by 79,000, while television households\n\ndecreased by 87,000 compared to 2012.\n\n####### **Strong Cash Flow**\n\n- Pre-tax free cash flow, defined as adjusted operating profit less\n\nspending on property, plant and equipment, and interest on long-\n\nterm debt (net of capitalized interest), increased by 1% compared to\n\n2012 to $2,044 million due to a 3% increase in adjusted operating\n\nprofit offset by higher spending on property, plant and equipment.\n\nAfter-tax cash flow decreased by 6% from 2012 levels to $1,548 due\n\nto a 31% increase in cash taxes.\n\n####### **Strong Balance Sheet and Liquidity Position**\n\n- Issued and fully hedged US$2.5 billion of ten and thirty year senior\n\nnotes at some of the lowest coupon rates ever achieved for Rogers\n\ncorporate debt, in two separate offerings comprising:\n\n- US$500 million of 3.00% senior notes due 2023 and US$500\n\nmillion of 4.50% senior notes due 2043\n\n- US$850 million of 4.10% senior notes due 2023 and US$650\n\nmillion of 5.45% senior notes due 2043\n\n- Our overall weighted average cost of debt was 5.50% at\n\nDecember 31, 2013 compared to 6.10% at December 31, 2012 and\n\nthe weighted average term to maturity on our debt was 11.3 years,\n\ncompared to 9.2 years at December 31, 2012.\n\n- Ended the year with $4.5 billion of available liquidity, comprised of\n\n$2.3 billion cash on hand, $2 billion available under our bank credit\n\nfacility and $0.2 billion available under our $0.9 billion accounts\n\nreceivable securitization program.\n\n- In May 2013, each of Fitch Ratings and Standard and Poor’s Ratings\n\nServices upgraded RCI’s senior unsecured debt to BBB+ (from BBB) with\n\na stable outlook, while Moody’s Investors Service’s comparable rating is\n\nBaa1 with a stable outlook remained unchanged from last year.\n\n####### **Growing Dividends**\n\n- We increased our annualized dividend rate in February 2013 by 10%\n\nto $1.74 per Class A Voting and Class B Non-Voting share and paid a\n\nquarterly dividend of $0.435 per share during 2013. We further\n\nincreased our annualized dividend on February 12, 2014, by 5%\n\nto $1.83.\n\n####### **New CEO**\n\n- Guy Laurence joined Rogers in December 2013, as our new President\n\nand Chief Executive Officer, succeeding Nadir Mohamed who retired\n\nfrom Rogers. Mr. Laurence brings 30 years of global experience in\n\nthe telecommunications and media industries.\n\n####### **Significant Developments**\n\n- Exclusive 12-year licensing agreement to broadcast national NHL\n\ngames, beginning with the 2014-2015 season was signed. The\n\nagreement grants Rogers the exclusive distribution rights of all\n\nnational regular season and playoff games within Canada, in multiple\n\nlanguages, across all platforms. At the same time, we executed\n\nseparate agreements to sublicence certain of these broadcasting\n\nrights to TVA Sports and CBC.\n\n- Strategic acquisitions of Score Media Inc. (theScore), Mountain", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RCI_2013.pdf", - "query": "What has Rogers Communications done to improve its television platform?", - "target_page": 2, - "target_passage": "Launched NextBox 3.0 delivering a superior TV experience and leveraged the success of Rogers AnyPlace TV, our Internet and mobile on-demand TV service.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "##### **ROGERS COMMUNICATIONS INC.** AT A GLANCE\n\n####### **Rogers Communications (TSX: RCI; NYSE: RCI) is a diversified Canadian**\n\n####### **telecommunications and media company. As discussed in the following**\n\n####### **pages, Rogers Communications is engaged in the telecom and media**\n\n####### **businesses through its primary operating segments Rogers Wireless,**\n\n####### **Rogers Cable, Rogers Business Solutions and Rogers Media.**\n\n**ROGERS COMMUNICATIONS**\n\n**ROGERS COMMUNICATIONS**\n\n**CABLE BUSINESS SOLUTIONS WIRELESS MEDIA**\n\nWIRELESS SEGMENT\n\nRogers Wireless provides wireless voice and data communications services across\n\nCanada to approximately 9.5 million customers under the Rogers Wireless, Fido\n\nand chatr brands. Rogers Wireless is Canada’s largest wireless provider and the\n\nonly national carrier operating on the combined global standard GSM/HSPA+/LTE\n\ntechnology platforms. Rogers Wireless is Canada’s leader in innovative wireless\n\nservices, and provides customers with the best and latest wireless devices and\n\napplications and the fastest network speeds. Rogers Wireless also provides\n\nseamless wireless roaming across the U.S. and more than 200 other countries,\n\nand is the Canadian leader in the deployment of mobile commerce and machine-\n\nto-machine communications.\n\nCABLE AND BUSINESS SOLUTIONS SEGMENTS\n\nRogers Cable is a leading Canadian cable services provider, whose service\n\nterritory covers approximately 4.0 million homes in Ontario, New Brunswick and\n\nNewfoundland representing approximately 30% of the Canadian cable market.\n\nOur advanced digital hybrid fibre-coax network provides market leading high-\n\nspeed broadband Internet access speeds, the most innovative selection of digital\n\ntelevision and online viewing and telephony services to millions of residential\n\nand small business customers. Together with Rogers Business Solutions, it also\n\nprovides scalable carrier-grade business telecom, networking, hosting and\n\nmanaged data services, and IP connectivity and solutions to medium and large\n\nenterprise, government and carrier customers.\n\nMEDIA SEGMENT\n\nRogers Media is Canada’s premier destination for category-leading television and\n\nradio broadcasting, sports entertainment, publishing, and digital media properties.\n\nTelevision assets include national City network which reaches more than 80% of\n\nCanadians, five OMNI Television multilingual channels, seven regional and national\n\nSportsnet channels, as well as specialty channels FX Canada, OLN, The Biography\n\nChannel and G4. Rogers Media also owns The Shopping Channel, Canada’s only\n\nnationally televised and online shopping service. It operates more than 50 Canadian\n\nradio stations, publishes 50+ well known consumer and business magazines, and\n\nowns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball\n\nClub and Rogers Centre, Canada’s largest sports and entertainment facility. Rogers\n\nalso holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL\n\nToronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Our new wireless Share Everything plans were Canada’s first to let\n\nindividuals, families and small businesses share wireless data and\n\nunlimited nationwide talk and text, with up to 10 wireless devices.\n\nRogers recently further enhanced its exciting One Number service by\n\nintroducing smartphone apps which enable customers to use mobile\n\ndata or Wi-Fi to talk, text and video chat using their existing Rogers\n\nwireless number from any device.\n\nWe also keep customers informed and entertained with Rogers next-\n\ngeneration NextBox 3.0 TV experience which allows customers to view\n\nand record up to eight HD programs simultaneously, store hundreds of\n\nhours of content and enjoy whole-home PVR capability. And with\n\nRogers Anyplace TV, it’s also a wireless experience where viewers can\n\nnavigate their cable guide, use a virtual remote, set PVR recordings and\n\nstream live or on-demand content from a tablet, smartphone, laptop\n\nor gaming console.\n\nRogers continues to be Canada’s innovation leader in rapidly growing\n\nareas such as wireless machine-to-machine communications, remote\n\nhome monitoring and automation, mobile payments, in-car\n\ninfotainment and telematics, and digital media. As well, Rogers has\n\ndeployed a suite of unique local digital services that create virtual\n\nmarketplaces for bringing consumers and businesses together and\n\nprovide location-based targeted offers.\n\nThese are just a few examples of the ways Rogers continues to\n\ninnovate and lead the way, introducing wireless, broadband and digital\n\ntechnologies and services that fundamentally change the way\n\ncustomers stay connected, informed and entertained anywhere they\n\nare. Canadians know there’s one thing to be certain of - if they’re with\n\nRogers, they’ll never miss a thing.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 15", - "page_start": 18, - "page_end": 18, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC.\n\n**2013 ANNUAL REPORT**\n\nMEDIA WIRELESS CABLE **ROGERS.COM**", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "With Canada’s first and fastest LTE wireless network - the global gold\n\nstandard in wireless network technology - Rogers makes “place-\n\nshifting” a reality so customers can connect to their communications,\n\ninformation and entertainment from almost anywhere, easily and\n\nseamlessly. With Rogers, watching TV on the train, conducting a virtual\n\nwhite-boarding session from the beach, disarming a home monitoring\n\nsystem from a smartphone, or answering a home phone from 5,000\n\nkilometers away are becoming everyday activities. Rogers customers no\n\nlonger have to pick up the phone to check their voicemail; they don’t\n\nneed to be in town to catch their local news; and they don’t have to be\n\nat their PCs to access their e-mail. And with Rogers, businesses no\n\nlonger need to work in traditional offices because we help them to\n\nquickly set up virtual workspaces, with complete access to customers,\n\ncolleagues, files and corporate applications, so they are as productive\n\non the road as they are in the office.\n\nAnd now, small businesses as well as households can enjoy the flexibility\n\nand value of Rogers new Wireless Home and Small Business Phone\n\nproducts as well.\n\nCustomers know that Rogers makes it easy and seamless to connect\n\nwith the same personalized information, communications and\n\nentertainment experiences no matter where they are - at work, at\n\nschool, at home or away, including when travelling to more than 200\n\ncountries around the world. And they know that only Rogers is there\n\nfirst with innovative new services, such as mobile TV, remote home\n\nmonitoring, and Rogers One Number, which allows them to switch calls\n\nbetween their wireless device, computer, and home phone without\n\ninterruption; manage e-mails, text messages and voicemail; hold live\n\nvideo chats; and combine and sync contacts from across multiple\n\ndevices - no matter where they are.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 07", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "MEDIA WIRELESS CABLE **ROGERS.COM**", - "page_start": 131, - "page_end": 131, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "####### **MEDIA**\n\nsee page 47\n\nA diversified Canadian media\n\ncompany that engages in\n\ntelevision and radio\n\nbroadcasting, multi-platform\n\nshopping, publishing, digital,\n\nand sports media and\n\nentertainment.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 29", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**CONNECTED** HOME\n\nROGERS CONTINUES TO DEFINE HOW FAMILIES COME\n\nTOGETHER AND CONNECT WITH THEIR WORLD. MILLIONS OF\n\nCANADIANS DEPEND ON ROGERS TO KEEP THEM INFORMED,\n\nCONNECTED AND ENTERTAINED WITH A COMBINATION OF\n\nTHE FASTEST INTERNET SPEEDS AND THE MOST INNOVATIVE\n\nTELEVISION, TELEPHONY AND HOME MONITORING\n\nSOLUTIONS AVAILABLE.\n\nThe core of Rogers connected home strategy is to provide customers\n\nwith the fastest broadband connections, together with the ability to\n\nseamlessly shift - to shift time, to shift screens and to shift places so they\n\naccess what they want, when they want, on the screen of their choice.\n\nRogers offers the best in on-demand, sports, movies, specialty, episodic\n\nand multicultural programming. Customers can schedule, pause, rewind\n\nBROADBAND\n\nINTERNET\n\nE-MAIL\n\n& MESSAGING\n\nWHOLE HOME\n\nPVR\n\nCATEGORY-\n\nLEADING MEDIA\n\nCONTENT\n\nHOME\n\nTELEPHONY\n\nANY SCREEN\n\nSTREAMING TV\n\nON-DEMAND\n\nVIDEO CONTENT\n\nHOME\n\nMONITORING\n\n& AUTOMATION\n\nCONVERGED\n\nWIRELESS/\n\nWIRELINE\n\n08 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "knows how businesses work, we also offer a choice of specifically\n\ndesigned plans and options that allow users to share buckets of voice\n\nand data, connect directly with team members, establish wireless\n\nbackup for point-of-sale and other systems, and roam frequently with\n\ncost certainty.\n\nFor hundreds of thousands of smaller businesses located in and around\n\nRogers cable footprint, Rogers offers a compelling set of wired\n\ntelephony and Internet solutions that provide enterprise-grade\n\ndependability and value. With voice, data, hosting and online security\n\nsolutions built specifically for business, Rogers provides a single reliable\n\nsource for innovative, dependable communications solutions that are\n\nbacked up by around-the-clock live agent support.\n\nLarger enterprises also increasingly rely on Rogers to deliver corporate-\n\ncritical voice, Internet, networking and managed data centre solutions\n\nacross its fibre-optic network that connects thousands of commercial\n\nand municipal buildings. These next generation on-net services for\n\nenterprise customers are backed by dedicated, around-the-clock\n\nsupport and connectivity to Rogers high-speed national fibre-optic\n\nbackbone that provides redundancy as well as seamless connectivity\n\ninto the United States and Europe.\n\nRogers also provides the most extensive set of advanced wireless\n\nmachine-to-machine connectivity solutions which help businesses to\n\nincrease productivity, reduce costs and optimize operations. As well,\n\nRogers remains at the forefront of mobile commerce and electronic\n\npayments solutions in the Canadian market.\n\nBusinesses across Canada also connect with customers through Rogers\n\nleading media brands as the one-stop solution for all their local and\n\nnational radio, television, online and print advertising needs.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 11", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ROGERS IS COMMITTED TO DELIVERING WORLD-CLASS\n\nCONTENT AND EXPERIENCES TO CONSUMERS AND\n\nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY\n\nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA\n\nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH\n\nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE.\n\nToday, businesses across Canada connect with customers through Rogers\n\ncategory-leading television and radio assets, sports entertainment,\n\ntelevised and online shopping, publishing, and digital media properties as\n\nthe one-stop solution for all their local and national advertising needs.\n\nRogers Media is Canada’s premier combination of diversified broadcast,\n\nspecialty, sports, print and online media assets which together touch\n\nnearly 90% of Canadians every week. This includes over 50 popular AM\n\nand FM radio stations across Canada. In television, it includes the seven\n\nstation City network which broadcasts intensely local, urban-oriented\n\n**LEADING** CONTENT\n\nLEADING\n\nSPORTSNET TV\n\nFRANCHISE\n\nOMNI\n\nMULTICULTURAL\n\nNETWORK\n\nCITY NATIONAL\n\nTELEVISION\n\nNETWORK\n\nTORONTO\n\nBLUE JAYS\n\nBASEBALL TEAM\n\nNATIONAL\n\nRADIO\n\nPORTFOLIO\n\nTELEVISED\n\nSHOPPING\n\nNETWORK\n\n37.5% OWNERSHIP\n\nOF LEAFS,\n\nRAPTORS & TFC\n\nDIGITAL MEDIA\n\nPORTFOLIO\n\nICONIC\n\nMAGAZINE\n\nBRANDS\n\n12 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**BUSINESS** SOLUTIONS\n\nIN TODAY’S FAST-PACED DIGITAL WORLD OF BUSINESS,\n\nTHE ABILITY TO COMMUNICATE AND ACCESS INFORMATION\n\nANYTIME, ANYPLACE IS A COMPETITIVE ADVANTAGE THAT\n\nBUSINESS PROFESSIONALS LOOK TO ROGERS TO PROVIDE.\n\nROGERS ENSURES THE INFORMATION THAT DRIVES\n\nCOMMERCE FORWARD IS ALWAYS ON HAND AND HELPS\n\nBUSINESSES DEFINE HOW TO WIN IN THE DIGITAL WORLD.\n\nRogers provides a single reliable source for advanced business-focused\n\nvoice, Internet and data networking solutions designed specifically for\n\nthe most demanding of wireless and wired commercial requirements.\n\nBusinesses across Canada rely on Rogers for its national wireless\n\nnetwork, world-leading LTE technology, seamless global connectivity,\n\nand the broadest array of wireless applications and devices, because\n\nthey know that their mobility and remote connectivity needs are always\n\ncovered with the most advanced solutions available. Because Rogers\n\nWIRELESS\n\nVOICE & DATA\n\nMOBILE INTERNET\n\n& E-MAIL\n\nADVERTISING\n\nMEDIA SOLUTIONS\n\nDATA CENTRE &\n\nCLOUD SERVICES\n\nBUSINESS\n\nTELEPHONY\n\nADVANCED\n\nM2M SOLUTIONS\n\nBUSINESS IP\n\nSOLUTIONS DATA\n\nNETWORKING VIRTUAL\n\nOFFICE\n\n10 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_RCI_2013.pdf", - "query": "Until what NHL season will the Vancouver's ice hockey team be a Rogers Communications partner?", - "target_page": 39, - "target_passage": "Sportsnet announced a 10-year partnership extension with the Vancouver Canucks through the 2022-2023 NHL seasons", - "chunk_present": { - "presence": true, - "index": 1 - } - }, - "top_chunk": [ - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nACQUISITIONS\n\n- Closed our agreement to acquire Metro 14 Montreal for $10 million\n\non February 4, 2013, and relaunched the station as City Montreal,\n\nexpanding the City broadcast TV network into the largest market in\n\nQuebec and increasing the City television network reach to over\n\n80% of Canadian households.\n\n- Finalized our purchase of theScore, Canada’s third largest specialty\n\nsports channel, for $167 million. We later rebranded theScore as\n\nSportsnet 360.\n\nNHL\n\n- Advanced our strategy of delivering highly sought-after sports\n\ncontent anywhere, anytime, on any platform and strengthening the\n\nvalue of our sports brand by entering into an exclusive 12-year\n\nlicensing agreement with the NHL which begins with the 2014-2015\n\nseason and grants Rogers the following:\n\n- national rights across television broadcasts, wireless and\n\nmobile tablets and Internet streaming\n\n- national rights to all regular season games, all playoff games\n\nand the Stanley Cup Final, and all special events and non-\n\ngame events (e.g. NHL All-Star Game, NHL Draft) - in multiple\n\nlanguages\n\n- out-of-market rights for all regional games\n\n- ownership of all linear and digital highlights, including\n\ncondensed games and video archives\n\n- NHL broadcast assets: Rogers to operate NHL Centre Ice and\n\nNHL Game Centre Live\n\n- sponsorship rights to the NHL Shield logo as an official partner\n\nof the NHL\n\n- Canadian representation of ad sales for NHL.com\n\n- ownership of all commercial inventories for the television\n\nbroadcasts\n\n- rights to sublicense broadcasting rights to TVA and CBC\n\n- rights to use the Hockey Night In Canada brand through the\n\nCBC sublicense agreement.\n\nThrough this agreement, Rogers plans to provide Canadians with a\n\nunique viewing experience that will feature expanded pre- and post-\n\ngame coverage of regular season and playoff games and other\n\nenhanced NHL content. We expect this agreement to drive Sportsnet\n\nsubscriber growth and to provide highly sought after content in\n\nmultiple languages across all of Rogers’ platforms.\n\nMEDIA FINANCIAL RESULTS\n\nYears ended December 31\n\n(In millions of dollars, except percentages) **2013 <sup>1</sup>** 2012 % Chg\n\n**Operating revenue - Media $ 1,704** $ 1,620 5\n\nOperating expenses **(1,543)** (1,430) 8\n\n**Adjusted operating profit - Media $ 161** $ 190 (15)\n\nAdjusted operating profit margin **9.4%** 11.7%\n\nAdditions to property, plant and equipment **$ 79** $ 55 44\n\n1 Results of operations include theScore’s operating results as of April 30, 2013 (the\n\ndate of acquisition).\n\n(IN MILLIONS OF DOLLARS)\n\n**MEDIA REVENUE**\n\n**2013**\n\n2012\n\n2011\n\n**$1,704**\n\n$1,620\n\n$1,611\n\n####### **Higher Operating Revenue**\n\nMedia generates revenue in five areas:\n\n- advertising sales across its television, radio, publishing and digital\n\nmedia properties\n\n- circulation\n\n- subscriptions\n\n- retail product sales\n\n- ticket sales, receipts of MLB revenue sharing and concession sales\n\nassociated with Rogers Sports Entertainment.\n\nOperating revenue was 5% higher this year, mainly because of:\n\n- higher subscription and advertising revenue generated by the\n\nSportsnet properties, including the acquisition of theScore, and\n\noverall growth in distribution of our other specialty channels\n\n- higher advertising revenue of $21 million resulting from timing of\n\nNHL hockey games. Advertising revenue last year was lower than\n\nnormal due to the NHL player lockout which resulted in no NHL\n\ngames being aired, and higher than normal this year due to the\n\ncompressed 2012-2013 season which started in January 2013 and\n\nthe compressed 2013-2014 NHL schedule in advance of the\n\nupcoming winter Olympics\n\n- higher attendance and merchandise sales at Blue Jays games\n\n- higher sales at The Shopping Channel.\n\nThe increases in revenue were partially offset by continuing volatility in\n\nadvertising spending across most industry sectors, driven by a continued\n\nslow economy.", - "page_start": 51, - "page_end": 51, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "centre in Calgary.\n\n- SIP Trunking, a new IP-based voice solution, was announced for\n\nenterprises designed to complement our fibre-based Internet and\n\nWAN connectivity services. Merging voice services with a business\n\ndata network, SIP Trunking solutions dynamically allocate bandwidth\n\nas needed to support voice and/or data needs depending upon\n\ncapacity requirements during peak hours and also provide a platform\n\nfor next generation IP-based video, mobile and productivity\n\napplications and services.\n\nMEDIA\n\n- Exclusive NHL 12-year licensing agreement to broadcast national NHL\n\ngames beginning with the 2014-2015 season was signed. The\n\nagreement grants Rogers the exclusive distribution of all national live\n\nand in-progress regular season and playoff games within Canada, in\n\nmultiple languages, across all platforms. We executed separate\n\nagreements to sublicense certain of these broadcasting rights to TVA\n\nSports and CBC.\n\n- Sportsnet 360 was launched, which is comprised of the rebranded\n\ntheScore assets. The acquisition of theScore received final regulatory\n\napproval in the first half of this year.\n\n- Sportsnet announced a 10-year partnership extension with the\n\nVancouver Canucks through the 2022-2023 NHL seasons, continuing\n\na 14-year network tradition as the regional television broadcaster of\n\nCanucks hockey. The new agreement features a comprehensive suite\n\nof multimedia rights including television, online and mobile,\n\ndelivering up to 60 regular season Vancouver Canucks games each\n\nseason. Sportsnet is also the official regional television broadcast\n\nrights holder for the Toronto Maple Leafs, Calgary Flames and\n\nEdmonton Oilers.\n\n- Next Issue Canada, an innovative, all-you-can-read subscription\n\ndigital magazine service that provides consumers with exclusive and\n\nunlimited access to a catalogue of more than 100 premium Canadian\n\nand US titles was launched. Next Issue Canada delivers access to our\n\nleading publishing brands alongside many of the most popular US\n\nmagazine titles.\n\n- The Shopping Channel launched a brighter, easier, and more\n\nengaging multi-channel retail experience and a refreshed on-air and\n\nonline look, an all-new mobile app, special-themed programming\n\nand improved shipping. The leading interactive and only national\n\nCanadian multi-channel retailer also added on-air social media\n\nengagement, new leading brands and more celebrity guest\n\nappearances.\n\n- Sportsnet announced an eight-year multi-platform broadcast rights\n\nextension with MLB Properties and MLB Advanced Media to show\n\nlive and in-progress regular season and playoff baseball games and\n\nhighlights within Canada.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 35", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "programming across the country’s largest markets, as well\n\nas five OMNI Television stations which deliver multilingual news,\n\ninformation and entertainment to Canada’s multiple language\n\ncommunities.\n\nThe Sportsnet specialty network provides sports programming across\n\nCanada through its four regional television channels and its nationally-\n\ndistributed Sportsnet ONE, Sportsnet World, and Sportsnet 360\n\nstations. Rogers also owns other Canadian specialty television channels,\n\nincluding FX Canada, OLN, The Biography Channel and G4.\n\nThe Shopping Channel - Canada’s only nationally televised and\n\nInternet shopping service - is a leading interactive multi-channel\n\nretailer, offering a vast assortment of exclusive products and top brand\n\nnames. As one of Canada’s most innovative and diversified retailers,\n\nit provides customers with exceptional selections in health/beauty,\n\njewelry, home/lifestyle, fashion/accessories, and electronics.\n\nRogers also publishes many well-known consumer magazines, such as\n\nMaclean’s, Chatelaine, FLARE, L’actualité, and Canadian Business, and is\n\nthe leading publisher of a number of industry, medical and financial\n\npublications. Rogers also controls a suite of fast-growing digital media\n\nassets, including 90+ owned and 300+ premium partnership online\n\nsites, as well as the recently launched Next Issue Canada digital\n\nmagazine platform which provides 100+ of North America’s most\n\ncelebrated titles on an unlimited anytime, anywhere basis.\n\nIn sports entertainment, Rogers owns the Toronto Blue Jays baseball\n\nteam and Rogers Centre stadium, Canada’s largest sports and\n\nentertainment facility and home field of the Blue Jays. Rogers also holds\n\na 37.5% investment in Maple Leaf Sports & Entertainment which owns\n\nthe NHL Maple Leafs, NBA Raptors, MLS Toronto FC and a number of\n\nother sports related assets.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 13", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "coverage\n\n- other specialty channels\n\n- other distant Canadian signals and US border stations given the time-\n\nshifting capacity available to digital subscribers\n\n- other media, including newspapers, magazines, radio and outdoor\n\nadvertising\n\n- content available on the Internet.\n\nCompetition in Sports Entertainment includes:\n\n- other Toronto professional teams, for attendance at Blue Jays games\n\n- other Major League Baseball teams, for Blue Jays players and fans\n\n- other local sporting and special event venues.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 47", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "##### **ROGERS COMMUNICATIONS INC.** AT A GLANCE\n\n####### **Rogers Communications (TSX: RCI; NYSE: RCI) is a diversified Canadian**\n\n####### **telecommunications and media company. As discussed in the following**\n\n####### **pages, Rogers Communications is engaged in the telecom and media**\n\n####### **businesses through its primary operating segments Rogers Wireless,**\n\n####### **Rogers Cable, Rogers Business Solutions and Rogers Media.**\n\n**ROGERS COMMUNICATIONS**\n\n**ROGERS COMMUNICATIONS**\n\n**CABLE BUSINESS SOLUTIONS WIRELESS MEDIA**\n\nWIRELESS SEGMENT\n\nRogers Wireless provides wireless voice and data communications services across\n\nCanada to approximately 9.5 million customers under the Rogers Wireless, Fido\n\nand chatr brands. Rogers Wireless is Canada’s largest wireless provider and the\n\nonly national carrier operating on the combined global standard GSM/HSPA+/LTE\n\ntechnology platforms. Rogers Wireless is Canada’s leader in innovative wireless\n\nservices, and provides customers with the best and latest wireless devices and\n\napplications and the fastest network speeds. Rogers Wireless also provides\n\nseamless wireless roaming across the U.S. and more than 200 other countries,\n\nand is the Canadian leader in the deployment of mobile commerce and machine-\n\nto-machine communications.\n\nCABLE AND BUSINESS SOLUTIONS SEGMENTS\n\nRogers Cable is a leading Canadian cable services provider, whose service\n\nterritory covers approximately 4.0 million homes in Ontario, New Brunswick and\n\nNewfoundland representing approximately 30% of the Canadian cable market.\n\nOur advanced digital hybrid fibre-coax network provides market leading high-\n\nspeed broadband Internet access speeds, the most innovative selection of digital\n\ntelevision and online viewing and telephony services to millions of residential\n\nand small business customers. Together with Rogers Business Solutions, it also\n\nprovides scalable carrier-grade business telecom, networking, hosting and\n\nmanaged data services, and IP connectivity and solutions to medium and large\n\nenterprise, government and carrier customers.\n\nMEDIA SEGMENT\n\nRogers Media is Canada’s premier destination for category-leading television and\n\nradio broadcasting, sports entertainment, publishing, and digital media properties.\n\nTelevision assets include national City network which reaches more than 80% of\n\nCanadians, five OMNI Television multilingual channels, seven regional and national\n\nSportsnet channels, as well as specialty channels FX Canada, OLN, The Biography\n\nChannel and G4. Rogers Media also owns The Shopping Channel, Canada’s only\n\nnationally televised and online shopping service. It operates more than 50 Canadian\n\nradio stations, publishes 50+ well known consumer and business magazines, and\n\nowns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball\n\nClub and Rogers Centre, Canada’s largest sports and entertainment facility. Rogers\n\nalso holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL\n\nToronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC.", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**MANAGEMENT’S DISCUSSION AND ANALYSIS** MEDIA\n\nDIVERSIFIED CANADIAN MEDIA COMPANY\n\nWe have a broad portfolio of media properties, which most\n\nsignificantly includes:\n\n- category-leading television and radio broadcasting properties\n\n- multi-platform shopping\n\n- publishing including Next Issue Canada\n\n- digital media\n\n- sports media and entertainment\n\n- exclusive 12-year licensing agreement with the NHL to\n\nbroadcast all national live hockey games within Canada in\n\nmultiple languages on all platforms beginning with the 2014-\n\n2015 season.\n\n$1.7 BILLION\n\n(%)\n\n**2013 MEDIA REVENUE MIX**\n\nTELEVISION **42%**\n\nTHE SHOPPING CHANNEL **17%**\n\nPUBLISHING **14%**\n\nRADIO **13%**\n\nSPORTS ENTERTAINMENT **14%**\n\nA NETWORK OF MEDIA ASSETS THAT REACHES CANADIANS COAST-TO-COAST\n\nRadio We operate more than 50 AM and FM radio stations in markets across Canada, including popular radio brands such as 98.1 CHFI,\n\n680 News, Sportsnet 590, The FAN, KISS 92.5, JACK FM and SONiC.\n\nTelevision We operate several conventional and specialty television networks:\n\n- City network, which together with affiliated stations, has distribution to over 80% of Canadian households\n\n- OMNI multicultural television stations\n\n- Specialty channels that include Outdoor Life Network, The Biography Channel (Canada), G4 Canada and FX (Canada)\n\n- Sportsnet’s four regional networks and Sportsnet One, Sportsnet World and Sportsnet 360\n\n- The Shopping Channel, Canada’s only national televised shopping channel which generates a significant and growing portion of its\n\nrevenues from online sales.\n\nPublishing - We publish many well-known consumer magazines such as Maclean’s, Chatelaine, Flare, Hello! Canada and Canadian Business\n\n- We are a leading publisher of marketing, medical, financial and trade publications\n\n- We also have a broad digital presence with a number of online publications, and are extending content across new platforms\n\n- We deliver exclusive and unlimited access to a catalogue of more than 100 premium Canadian and US magazine titles through Next\n\nIssue Canada digital magazine service offering.\n\nDigital Media Our online and mobile digital media platforms include digital advertising across websites and mobile platforms, digital content\n\nsubscriptions, and commerce solutions.\n\nSports Entertainment We own the Toronto Blue Jays, Canada’s only Major League Baseball team, and the Rogers Centre event venue, which hosts the\n\nToronto Blue Jays’ home games and other professional league games, concerts, trade shows and special events.\n\nCOMPETITION\n\nOur radio stations compete mainly with individual stations in local\n\nmarkets, but they also compete:\n\n- nationally with other large radio operators, including satellite radio\n\noperator Sirius/XM, the CBC, Bell Media and Corus Entertainment\n\n- with other media, including newspapers, magazines, television and\n\noutdoor advertising\n\n- with new technologies such as online web information services,\n\nmusic downloading, portable media players and online music\n\nstreaming services.\n\nThe Shopping Channel competes with:\n\n- retail stores, catalogue, Internet and direct mail retailers\n\n- infomercials that sell products on television\n\n- other television channels, for channel placement, viewer attention\n\nand loyalty.\n\nOur magazines and other publications compete for readership and\n\nadvertisers with:\n\n- other Canadian magazines\n\n- foreign, mostly US, titles that sell in significant quantities in Canada\n\n- online information and entertainment websites.\n\nTelevision and specialty services compete for viewers and advertisers\n\nwith:\n\n- other Canadian television stations that broadcast in their local\n\nmarkets, including those owned and operated by the CBC, Bell\n\nMedia and Shaw Media, some of which have greater national\n\ncoverage\n\n- other specialty channels\n\n- other distant Canadian signals and US border stations given the time-\n\nshifting capacity available to digital subscribers", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ROGERS IS COMMITTED TO DELIVERING WORLD-CLASS\n\nCONTENT AND EXPERIENCES TO CONSUMERS AND\n\nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY\n\nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA\n\nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH\n\nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE.\n\nToday, businesses across Canada connect with customers through Rogers\n\ncategory-leading television and radio assets, sports entertainment,\n\ntelevised and online shopping, publishing, and digital media properties as\n\nthe one-stop solution for all their local and national advertising needs.\n\nRogers Media is Canada’s premier combination of diversified broadcast,\n\nspecialty, sports, print and online media assets which together touch\n\nnearly 90% of Canadians every week. This includes over 50 popular AM\n\nand FM radio stations across Canada. In television, it includes the seven\n\nstation City network which broadcasts intensely local, urban-oriented\n\n**LEADING** CONTENT\n\nLEADING\n\nSPORTSNET TV\n\nFRANCHISE\n\nOMNI\n\nMULTICULTURAL\n\nNETWORK\n\nCITY NATIONAL\n\nTELEVISION\n\nNETWORK\n\nTORONTO\n\nBLUE JAYS\n\nBASEBALL TEAM\n\nNATIONAL\n\nRADIO\n\nPORTFOLIO\n\nTELEVISED\n\nSHOPPING\n\nNETWORK\n\n37.5% OWNERSHIP\n\nOF LEAFS,\n\nRAPTORS & TFC\n\nDIGITAL MEDIA\n\nPORTFOLIO\n\nICONIC\n\nMAGAZINE\n\nBRANDS\n\n12 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "**MANAGEMENT’S DISCUSSION AND ANALYSIS Higher Operating Expenses**\n\nWe assess Media operating expenses in four areas:\n\n- the cost of broadcast content (including sports programming)\n\n- the cost of retail products sold by The Shopping Channel and Sports\n\nEntertainment\n\n- Blue Jays player payroll\n\n- all other expenses involved in day-to-day operations.\n\nOperating expenses were 8% higher than 2012, mainly because of\n\nhigher programming costs at Sportsnet, higher Toronto Blue Jays player\n\nsalaries, higher merchandise spending at The Shopping Channel and\n\ncosts associated with our launch of Next Issue Canada.\n\nThe higher programming costs this year are a combination of lower\n\ncosts in 2012 because of the NHL player lockout, and higher costs this\n\nyear because more hockey games than normal were aired because of\n\nthe compressed NHL hockey schedule due in part to upcoming winter\n\nOlympics. Approximately $62 million of Media’s year over year increase\n\nin operating expense this year resulted from the 2012 NHL lockout and\n\nthe timing of games aired in 2013. Player salaries at the Toronto Blue\n\nJays were $34 million higher this year.\n\n(IN MILLIONS OF DOLLARS)\n\n**MEDIA ADJUSTED OPERATING PROFIT**\n\n**2013**\n\n2012\n\n2011\n\n**$161**\n\n$190\n\n$180\n\n####### **Lower Adjusted Operating Profit**\n\nAdjusted operating profit was down compared to last year mainly\n\nbecause of revenue and expenses changes described above.\n\nExcluding the impact of the 2012 NHL lockout and the compressed NHL\n\nschedule:\n\n- operating revenue would have been 4% higher this year compared\n\nto last year, instead of 5% higher as reported\n\n- adjusted operating profit would have been 7% higher this year\n\ncompared to last year, instead of 15% lower as reported.\n\nExcluding the acquisition of theScore:\n\n- operating revenue would have been 4% higher this year compared\n\nto last year, instead of 5% higher as reported\n\n- adjusted operating profit would have been 19% lower this year\n\ncompared to last year, instead of 15% lower as reported.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 49", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ROGERS COMMUNICATIONS INC.\n\n**2013 ANNUAL REPORT**\n\nMEDIA WIRELESS CABLE **ROGERS.COM**", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "positive health, safety and wellness culture. In 2013, Rogers was\n\nrecognized as one of Canada’s Top 100 Employers and one of the\n\nBest Diversity Employers.\n\nIn support of positive change in communities across Canada, Rogers\n\nprovided cash and in-kind donations to support various organizations\n\nand causes, including youth education through our flagship program\n\nRogers Youth Fund. This fund supports after-school homework clubs,\n\nacademic tutoring and alternative schooling that help youth excel.\n\nAs a natural extension of our business, we also contribute significant\n\nfunding to encourage the development of innovative and creative\n\nCanadian content for film, television and wireless mobile devices.\n\nEnvironmental stewardship is a key pillar of our CSR strategy. With a\n\nfocus on continually improving our environmental performance, we\n\nmeasure our carbon footprint each year and undertake initiatives to\n\nreduce our greenhouse gas emissions, paper consumption and waste.\n\nAnd, as a service provider to millions of customers each month, we’ve\n\nbeen an early and strong proponent of paperless electronic billing.\n\nIn 2013, Rogers was also named one of Canada’s Greenest Employers,\n\nan award recognizing companies that lead the nation in incorporating\n\nenvironmental values into their corporate culture.\n\nAcross our supply chain, we are committed to ethical procurement\n\nand have a strong framework in place to achieve this. Rogers continually\n\nworks with our partners through our agreements, relationships and\n\nSupplier Code of Conduct to ensure that we collectively adhere to\n\nsound sourcing, production and environmental standards.\n\n*For a complete description of Rogers CSR priorities and performance,*\n\n*go to* * **rogers.com/csr** *\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 17", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EMMS_2004.pdf", - "query": "I am a shareholder of Emmis Communication, but I will be available from the 20th of June to the 4th of July, will the Annual Meeting take place during this period?", - "target_page": 6, - "target_passage": "The Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis’ Corporate office.", - "chunk_present": { - "presence": true, - "index": 5 - } - }, - "top_chunk": [ - { - "text": "pany better than any other.\n\nIn other words, you can count on Emmis to continue to do\n\nwhat it has always done: Outperform.\n\nThank you for your belief and investment in Emmis.\n\n##### what it has always done: outperform.\n\nJeffrey H. Smulyan\n\nchairman & ceo emmis communications", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "###### Outperform Emmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "emmis communications\n\none emmis plaza\n\n40 monument circle\n\nindianapolis, indiana 46204\n\n®", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "#### about emmis\n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM\n\ndomestic radio stations serving the nation’s largest markets of New\n\nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin,\n\nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television\n\nstations, award-winning regional and specialty magazines, a radio net-\n\nwork, international radio interests, and ancillary businesses in broadcast\n\nsales and publishing.\n\nEmmis was founded in 1980, and the company launched its first radio\n\nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for\n\n“truth”) acquired more radio stations across the nation, it established a\n\nreputation for sound operations and emerged as a radio industry leader\n\nand innovator. Emmis was the first broadcast company to own top-\n\nrated radio stations in both L.A. and New York, and it pioneered such\n\nconcepts as the all-sports format.\n\nThe company launched its magazine division in 1988 with the purchase\n\nof *Indianapolis Monthly* , and moved into the world of international radio\n\nin 1997, when it was awarded a license to operate a national radio\n\nnetwork in Hungary. In 1998, Emmis expanded into television by buying\n\nsix television stations in markets throughout the United States. In the last\n\nsix years, the company has added properties in each of its divisions.\n\nWith its emphasis on solid operations, integrity, community involvement\n\nand fun, the company’s culture has been repeatedly lauded by both its\n\nemployees and its peers. Trade publications have regularly cited the\n\ncompany’s leaders as being among the best in the business.\n\nEmmis became a public company in 1994. It maintains its worldwide\n\nheadquarters in Indianapolis, where the company was founded.\n\n*This annual report contains certain non-GAAP measures. For a presen-*\n\n*tation of the directly comparable GAAP measure and a reconciliation of*\n\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n\n*the back of our Form 10-K in this Annual Report.*", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "by doing something unusual, but by operating the way Emmis\n\nhas always operated, and the way we always will.\n\nFirst of all, we focus on assembling and maintaining the best\n\nteams in our markets. We have traditionally had the top\n\nsalespeople, creative and technical professionals, news\n\nstaffs, managers and support staff in every city where we\n\noperate. Their peers turn to them for industry leadership,\n\nhonor them with awards and copy them at every opportunity.\n\nWe invest in these people, giving them industry-leading ben-\n\nefits packages, great opportunities and the tools they need to\n\nsucceed. This has always been a hallmark of Emmis, and it\n\nwon’t change.\n\n##### you can count on emmis to continue to do", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Executive Officers\n\nJeffrey H. Smulyan\n\nChairman of the Board,\n\nPresident and Chief Executive Officer\n\nWalter Z. Berger\n\nExecutive Vice President,\n\nChief Financial Officer and Treasurer\n\nRandall Bongarten\n\nTelevision Division President\n\nRichard F. Cummings\n\nRadio Division President\n\nGary L. Kaseff\n\nExecutive Vice President,\n\nGeneral Counsel\n\nPaul W. Fiddick\n\nInternational Division President\n\nMichael Levitan\n\nSenior Vice President,\n\nHuman Resources\n\nGary Thoe\n\nPublishing Division President\n\nBoard of Directors\n\nJeffrey H. Smulyan\n\nChairman of the Board,\n\nPresident and Chief Executive Officer\n\nSusan B. Bayh\n\nFormer Commissioner of the International Joint\n\nCommission of the United States and Canada\n\nWalter Z. Berger\n\nExecutive Vice President,\n\nChief Financial Officer and Treasurer\n\nGary L. Kaseff\n\nExecutive Vice President,\n\nGeneral Counsel\n\nRichard A. Leventhal\n\nPresident and Majority Owner,\n\nLMCS, LLC\n\nPeter A. Lund\n\nMedia consultant and former\n\nPresident of CBS Inc.\n\nGreg A. Nathanson\n\nMedia consultant and former\n\nPresident of Fox Television Stations and\n\nEmmis Television\n\nFrank V. Sica\n\nSenior Advisor\n\nSoros Fund Management LLC\n\nLawrence B. Sorrel\n\nManaging Partner and Co-CEO\n\nTailwind Capital Partners\n\nCorporate Office\n\nOne Emmis Plaza, 40 Monument Circle, Suite 700, Indianapolis, Indiana 46204,\n\n317.266.0100.\n\nBusiness\n\nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award-\n\nwinning radio broadcasting, television broadcasting and magazine publishing\n\noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest\n\nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin,\n\nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in\n\nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.;\n\nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.;\n\nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes\n\n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles* and Country\n\nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio\n\nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of\n\nthe population in the Flanders region of Belgium; and has ancillary businesses in\n\nbroadcast sales, publishing and interactive products.\n\nTransfer Agent Register\n\nWachovia Bank N.A., Shareholder Services Group,\n\n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153.\n\nAnnual Meeting\n\nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on\n\nWednesday, June 30, 2004, at Emmis’ Corporate office.\n\nForm 10-K\n\nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29,\n\n2004, which was filed with the Securities and Exchange Commission, will be sent\n\nto shareholders without charge upon written request to Kate Healey, Emmis\n\nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700,\n\nIndianapolis, Indiana 46204, or ir@emmis.com.\n\nMarket and Dividend Information\n\nThe Company’s Class A Common Stock is traded in the over-the-counter market\n\nand is quoted on the National Association of Securities Dealers Automated\n\nQuotation (NASDAQ) National Market System under the symbol EMMS.\n\nThe following table sets forth the high and low bid prices of the Class A Common\n\nStock for the periods indicated. No dividends were paid during any such periods.\n\nQuarter Ended High Low\n\nMay 2002 31.85 26.15\n\nAugust 2002 30.15 11.65\n\nNovember 2002 24.05 14.25\n\nFebruary 2003 24.86 17.82\n\nMay 2003 21.24 14.84\n\nAugust 2003 23.87 18.68\n\nNovember 2003 24.06 18.00\n\nFebruary 2004 28.65 22.74\n\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A\n\nCommon Stock and one record holder of the Class B Common Stock.\n\nEmmis intends to retain future earnings for use in its business and does not anticipate", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Dear Shareholders,\n\nOn our year-end conference call, I said that last year was the\n\nbest in Emmis Communications’ history. And while that might\n\nhave sounded like the usual Wall Street hyperbole - like any\n\nother CEO bragging about his company’s performance - the\n\ndifference is, I believed it. And I still do.\n\nBut I’ve been in this business long enough to know two\n\nthings for sure: What I believe is not as important as what I\n\ncan prove, and what we did last year is only meaningful if it\n\nreflects on how we will do in the coming year. The good\n\nnews is, Emmis does have the results to back up my high\n\npraise, and what we did to perform last year does directly\n\nrelate to how we’ll perform in the year ahead.\n\n**The best year**\n\nThe bottom line is this: Emmis Communications turned in a\n\nremarkable performance last year. Again and again, and by a\n\nnumber of measures, we outperformed our peers, our mar-\n\nkets and our own solid track record.\n\nAnd we did this in a year that was challenging in just about\n\nevery way. The economy was unstable, public companies\n\ncame under continuing scrutiny, indecency issues hounded\n\nbroadcasters, competition for tight ad dollars increased and\n\ntechnology continued to reshape the media world.\n\nBut our people refused to be slowed by those challenges.\n\nInstead, they worked through them. They innovated, hustled\n\nand focused. And they produced.\n\nOur radio division’s revenue growth led our markets and the\n\nindustry - in our fiscal year, our group was up 4.5 percent\n\nwhile our markets were up 2.7 percent and the industry only\n\n1 percent. Based on this kind of performance, we have con-\n\nsistently ranked among the nation’s leaders in per-station\n\nrevenue, and we continue to produce top-rated programming\n\nin markets across the nation.\n\nOur TV performance was even more impressive. The Emmis\n\ntelevision group’s revenues were up 0.5 percent in calendar\n\n2003, a year when our markets saw a 2.3 percent decrease\n\nin revenues, and the industry experienced a 4.7 percent\n\nrevenue decline. This industry-leading result made us one of\n\nthe few groups in the nation to post positive growth. In addi-\n\ntion, we gained revenue share at 11 of our 13 measured\n\nstations and held the line on expenses, giving us a 1.2\n\npercent increase in fiscal-year cash flow.\n\nOur publishing and international divisions also posted strong\n\nresults. In a tough publishing market, our magazines boosted\n\ntheir division’s revenues by 4.6 percent over last year and\n\nincreased cash flow by 3.3 percent. Our international division\n\nturned in a revenue increase of 27 percent and a cash flow\n\nincrease of 31 percent.\n\nIn addition to boosting performance in our divisions, we\n\nhoned our corporate operations by continuing to build one\n\nof the most adept and hardest-working corporate groups in\n\nAmerican media. With this team in place, we’ve brought\n\nour leverage and cost of capital down to more manageable\n\nlevels, found ways to combat the continually increasing\n\ncosts of health insurance and, in a truly top-notch effort,\n\nsmoothly integrated our new Austin radio properties - in just\n\nunder a year as a part of Emmis, the Austin properties are\n\nenjoying significant ratings and revenue increases.\n\nOf course, for you, the real bottom line on our performance is\n\nits impact on your investment. I’m proud to say that we saw\n\na 27 percent increase in our share price over the course of\n\nthe last fiscal year - we ended fiscal ’03 at 19.79, and closed\n\nthe book on fiscal ’04 at 25.17.\n\n**How we did it**\n\nOperationally, we were on top of our game last year. However,\n\nas I said, I know that the past year’s performance really only\n\nmatters if it reflects on what we’ll do in the coming year. The\n\ngood news is, it does. We performed at these high levels not\n\nby doing something unusual, but by operating the way Emmis\n\nhas always operated, and the way we always will.\n\nFirst of all, we focus on assembling and maintaining the best", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Orders Medications, consults, and radiology results\n\nAbbreviations: EM, emergency medicine; IP, inpatient.\n\na Automated EM handoff notes are generated from\n\nthe curation of the data through both rule-based and\n\nlarge language model- summarization approaches.\n\nDecember 3, 2024 4/12", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" - }, - { - "text": "In addition, we commit ourselves to creating the best content\n\nin our markets. Our magazines routinely dominate their\n\nindustry awards ceremonies - last year, *Texas Monthly* won a\n\ncoveted National Magazine Award, and Emmis publications\n\nclaimed more than half of the awards at the City and\n\nRegional Magazine competition. Our radio stations feature\n\nsome of the industry’s most popular personalities - in 2003,\n\nEmmis people and stations were awarded three Marconi\n\nRadio Awards. And our television operations are regularly\n\nhonored by journalism organizations for their news gathering\n\nand community service. In short, we provide our markets\n\nwith reliable, high-quality content - content that helps us\n\nassemble the audiences our advertisers want to reach.\n\nWe then generate revenue by overallocating to sales. We\n\ngive our teams well-developed strategies, clearly defined\n\nbrands and solid products. We build bigger, better sales\n\nforces and put a greater emphasis on local dollars than our\n\ncompetitors. We hire aggressive managers, set ambitious\n\ngoals and then watch our people work harder and smarter\n\nthan anyone else.\n\nWe also seize the right opportunities and make the most\n\nof them. As the cost of buying radio properties has gone\n\nthrough the roof, we have been careful about buying.\n\nHowever, when we had a chance to acquire the LBJ stations\n\nin Austin, we knew it was the right fit: good stations, a\n\ntremendous heritage and a great culture, all with an opportu-\n\nnity for growth. And we’ve already built on that group’s track\n\nrecord - since we bought them, we’ve reformatted one sta-\n\ntion and quickly sent it to No. 1 in the market, and we’ve\n\npushed revenues up 9 percent for the entire group.\n\nFinally, we innovate. Why has Emmis, traditionally a radio\n\ncompany, become the company to emulate in TV? Because\n\nwe approached TV in a way it’s never been approached\n\nbefore. Why do we operate leading hip-hop stations in mar-\n\nkets across the nation? Because we pioneered the concept.\n\nWhy have we created a new “Music with Class” format in St.\n\nLouis’ Red 104.1? Because we believe we see a new oppor-\n\ntunity. We know that successful companies don’t follow the\n\npack. They lead it, and that’s what we’ll always do.\n\n**The year ahead**\n\nThat last point - innovation - is an important one, especially\n\nfor the future of Emmis, because we are planning something\n\nthat could change the face of American TV and once again\n\ndemonstrate that Emmis is a company that leads the way.\n\nForty years ago, Americans began taking down their TV\n\nantennas and severing broadcasters’ direct link to television\n\naudiences. Since then, the cable companies—the middlemen\n\nwho replaced us—have created more than $300 billion of\n\nvalue for themselves. However, changes in technology have\n\ngiven broadcasters the ability to provide the American public\n\nwith the most popular TV channels, without the middlemen\n\nand at a more reasonable price.\n\nWe are developing an innovative model that will leverage\n\nthat technology to get broadcast companies back into the\n\ngame. I believe it has the potential to revolutionize the\n\ntelevision industry. I also believe it will add substantial value\n\nto your investment.\n\nWe unveiled this concept at the National Association of\n\nBroadcasters meeting in April. I am proud to say that 11\n\nother television companies joined us at that meeting to\n\nexpress their support for what we’re calling the Broadcasters’\n\nInitiative, and more are signing on each week. Once again,\n\nEmmis has leveraged innovation to take a leading role in our\n\nindustries.\n\nWe’ll continue to use innovation to push us forward.\n\nMeanwhile, we’ll also build and maintain the best teams, pro-\n\nduce the best media content, outhustle and outsell our com-\n\npetitors, seize the best opportunities and operate this com-\n\npany better than any other.\n\nIn other words, you can count on Emmis to continue to do\n\nwhat it has always done: Outperform.\n\nThank you for your belief and investment in Emmis.", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Common Stock and one record holder of the Class B Common Stock.\n\nEmmis intends to retain future earnings for use in its business and does not anticipate\n\npaying any dividends on shares of its common stock in the foreseeable future.", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EMMS_2004.pdf", - "query": "Who is the President of the TV Department of Emmis Communications?", - "target_page": 6, - "target_passage": "Randall Bongarten Television Division President", - "chunk_present": { - "presence": true, - "index": 4 - } - }, - "top_chunk": [ - { - "text": "pany better than any other.\n\nIn other words, you can count on Emmis to continue to do\n\nwhat it has always done: Outperform.\n\nThank you for your belief and investment in Emmis.\n\n##### what it has always done: outperform.\n\nJeffrey H. Smulyan\n\nchairman & ceo emmis communications", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "emmis communications\n\none emmis plaza\n\n40 monument circle\n\nindianapolis, indiana 46204\n\n®", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "###### Outperform Emmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "#### about emmis\n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM\n\ndomestic radio stations serving the nation’s largest markets of New\n\nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin,\n\nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television\n\nstations, award-winning regional and specialty magazines, a radio net-\n\nwork, international radio interests, and ancillary businesses in broadcast\n\nsales and publishing.\n\nEmmis was founded in 1980, and the company launched its first radio\n\nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for\n\n“truth”) acquired more radio stations across the nation, it established a\n\nreputation for sound operations and emerged as a radio industry leader\n\nand innovator. Emmis was the first broadcast company to own top-\n\nrated radio stations in both L.A. and New York, and it pioneered such\n\nconcepts as the all-sports format.\n\nThe company launched its magazine division in 1988 with the purchase\n\nof *Indianapolis Monthly* , and moved into the world of international radio\n\nin 1997, when it was awarded a license to operate a national radio\n\nnetwork in Hungary. In 1998, Emmis expanded into television by buying\n\nsix television stations in markets throughout the United States. In the last\n\nsix years, the company has added properties in each of its divisions.\n\nWith its emphasis on solid operations, integrity, community involvement\n\nand fun, the company’s culture has been repeatedly lauded by both its\n\nemployees and its peers. Trade publications have regularly cited the\n\ncompany’s leaders as being among the best in the business.\n\nEmmis became a public company in 1994. It maintains its worldwide\n\nheadquarters in Indianapolis, where the company was founded.\n\n*This annual report contains certain non-GAAP measures. For a presen-*\n\n*tation of the directly comparable GAAP measure and a reconciliation of*\n\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n\n*the back of our Form 10-K in this Annual Report.*", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Executive Officers\n\nJeffrey H. Smulyan\n\nChairman of the Board,\n\nPresident and Chief Executive Officer\n\nWalter Z. Berger\n\nExecutive Vice President,\n\nChief Financial Officer and Treasurer\n\nRandall Bongarten\n\nTelevision Division President\n\nRichard F. Cummings\n\nRadio Division President\n\nGary L. Kaseff\n\nExecutive Vice President,\n\nGeneral Counsel\n\nPaul W. Fiddick\n\nInternational Division President\n\nMichael Levitan\n\nSenior Vice President,\n\nHuman Resources\n\nGary Thoe\n\nPublishing Division President\n\nBoard of Directors\n\nJeffrey H. Smulyan\n\nChairman of the Board,\n\nPresident and Chief Executive Officer\n\nSusan B. Bayh\n\nFormer Commissioner of the International Joint\n\nCommission of the United States and Canada\n\nWalter Z. Berger\n\nExecutive Vice President,\n\nChief Financial Officer and Treasurer\n\nGary L. Kaseff\n\nExecutive Vice President,\n\nGeneral Counsel\n\nRichard A. Leventhal\n\nPresident and Majority Owner,\n\nLMCS, LLC\n\nPeter A. Lund\n\nMedia consultant and former\n\nPresident of CBS Inc.\n\nGreg A. Nathanson\n\nMedia consultant and former\n\nPresident of Fox Television Stations and\n\nEmmis Television\n\nFrank V. Sica\n\nSenior Advisor\n\nSoros Fund Management LLC\n\nLawrence B. Sorrel\n\nManaging Partner and Co-CEO\n\nTailwind Capital Partners\n\nCorporate Office\n\nOne Emmis Plaza, 40 Monument Circle, Suite 700, Indianapolis, Indiana 46204,\n\n317.266.0100.\n\nBusiness\n\nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award-\n\nwinning radio broadcasting, television broadcasting and magazine publishing\n\noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest\n\nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin,\n\nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in\n\nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.;\n\nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.;\n\nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes\n\n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles* and Country\n\nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio\n\nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of\n\nthe population in the Flanders region of Belgium; and has ancillary businesses in\n\nbroadcast sales, publishing and interactive products.\n\nTransfer Agent Register\n\nWachovia Bank N.A., Shareholder Services Group,\n\n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153.\n\nAnnual Meeting\n\nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on\n\nWednesday, June 30, 2004, at Emmis’ Corporate office.\n\nForm 10-K\n\nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29,\n\n2004, which was filed with the Securities and Exchange Commission, will be sent\n\nto shareholders without charge upon written request to Kate Healey, Emmis\n\nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700,\n\nIndianapolis, Indiana 46204, or ir@emmis.com.\n\nMarket and Dividend Information\n\nThe Company’s Class A Common Stock is traded in the over-the-counter market\n\nand is quoted on the National Association of Securities Dealers Automated\n\nQuotation (NASDAQ) National Market System under the symbol EMMS.\n\nThe following table sets forth the high and low bid prices of the Class A Common\n\nStock for the periods indicated. No dividends were paid during any such periods.\n\nQuarter Ended High Low\n\nMay 2002 31.85 26.15\n\nAugust 2002 30.15 11.65\n\nNovember 2002 24.05 14.25\n\nFebruary 2003 24.86 17.82\n\nMay 2003 21.24 14.84\n\nAugust 2003 23.87 18.68\n\nNovember 2003 24.06 18.00\n\nFebruary 2004 28.65 22.74\n\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A\n\nCommon Stock and one record holder of the Class B Common Stock.\n\nEmmis intends to retain future earnings for use in its business and does not anticipate", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "by doing something unusual, but by operating the way Emmis\n\nhas always operated, and the way we always will.\n\nFirst of all, we focus on assembling and maintaining the best\n\nteams in our markets. We have traditionally had the top\n\nsalespeople, creative and technical professionals, news\n\nstaffs, managers and support staff in every city where we\n\noperate. Their peers turn to them for industry leadership,\n\nhonor them with awards and copy them at every opportunity.\n\nWe invest in these people, giving them industry-leading ben-\n\nefits packages, great opportunities and the tools they need to\n\nsucceed. This has always been a hallmark of Emmis, and it\n\nwon’t change.\n\n##### you can count on emmis to continue to do", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "In addition, we commit ourselves to creating the best content\n\nin our markets. Our magazines routinely dominate their\n\nindustry awards ceremonies - last year, *Texas Monthly* won a\n\ncoveted National Magazine Award, and Emmis publications\n\nclaimed more than half of the awards at the City and\n\nRegional Magazine competition. Our radio stations feature\n\nsome of the industry’s most popular personalities - in 2003,\n\nEmmis people and stations were awarded three Marconi\n\nRadio Awards. And our television operations are regularly\n\nhonored by journalism organizations for their news gathering\n\nand community service. In short, we provide our markets\n\nwith reliable, high-quality content - content that helps us\n\nassemble the audiences our advertisers want to reach.\n\nWe then generate revenue by overallocating to sales. We\n\ngive our teams well-developed strategies, clearly defined\n\nbrands and solid products. We build bigger, better sales\n\nforces and put a greater emphasis on local dollars than our\n\ncompetitors. We hire aggressive managers, set ambitious\n\ngoals and then watch our people work harder and smarter\n\nthan anyone else.\n\nWe also seize the right opportunities and make the most\n\nof them. As the cost of buying radio properties has gone\n\nthrough the roof, we have been careful about buying.\n\nHowever, when we had a chance to acquire the LBJ stations\n\nin Austin, we knew it was the right fit: good stations, a\n\ntremendous heritage and a great culture, all with an opportu-\n\nnity for growth. And we’ve already built on that group’s track\n\nrecord - since we bought them, we’ve reformatted one sta-\n\ntion and quickly sent it to No. 1 in the market, and we’ve\n\npushed revenues up 9 percent for the entire group.\n\nFinally, we innovate. Why has Emmis, traditionally a radio\n\ncompany, become the company to emulate in TV? Because\n\nwe approached TV in a way it’s never been approached\n\nbefore. Why do we operate leading hip-hop stations in mar-\n\nkets across the nation? Because we pioneered the concept.\n\nWhy have we created a new “Music with Class” format in St.\n\nLouis’ Red 104.1? Because we believe we see a new oppor-\n\ntunity. We know that successful companies don’t follow the\n\npack. They lead it, and that’s what we’ll always do.\n\n**The year ahead**\n\nThat last point - innovation - is an important one, especially\n\nfor the future of Emmis, because we are planning something\n\nthat could change the face of American TV and once again\n\ndemonstrate that Emmis is a company that leads the way.\n\nForty years ago, Americans began taking down their TV\n\nantennas and severing broadcasters’ direct link to television\n\naudiences. Since then, the cable companies—the middlemen\n\nwho replaced us—have created more than $300 billion of\n\nvalue for themselves. However, changes in technology have\n\ngiven broadcasters the ability to provide the American public\n\nwith the most popular TV channels, without the middlemen\n\nand at a more reasonable price.\n\nWe are developing an innovative model that will leverage\n\nthat technology to get broadcast companies back into the\n\ngame. I believe it has the potential to revolutionize the\n\ntelevision industry. I also believe it will add substantial value\n\nto your investment.\n\nWe unveiled this concept at the National Association of\n\nBroadcasters meeting in April. I am proud to say that 11\n\nother television companies joined us at that meeting to\n\nexpress their support for what we’re calling the Broadcasters’\n\nInitiative, and more are signing on each week. Once again,\n\nEmmis has leveraged innovation to take a leading role in our\n\nindustries.\n\nWe’ll continue to use innovation to push us forward.\n\nMeanwhile, we’ll also build and maintain the best teams, pro-\n\nduce the best media content, outhustle and outsell our com-\n\npetitors, seize the best opportunities and operate this com-\n\npany better than any other.\n\nIn other words, you can count on Emmis to continue to do\n\nwhat it has always done: Outperform.\n\nThank you for your belief and investment in Emmis.", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "MANAGEMENT’S DISCUSSION AND ANALYSIS\n\nExecutive Summary\n\nABOUT ROGERS COMMUNICATIONS INC.\n\nRogers Communications is one of Canada’s leading diversified communications and media companies.\n\nWe provide a broad range of services: wireless and wired voice and data\n\ncommunications, cable television, high-speed Internet, cable telephony,\n\nwired telecom and data networking services to consumers and\n\nbusinesses. We also compete in television and radio broadcasting,\n\nmulti-platform shopping, sports media and entertainment, digital media\n\nand consumer, trade and professional publications.\n\nAlmost all of our operations and sales are in Canada. We have a highly\n\nskilled and diversified workforce of approximately 28,000 employees.\n\nOur head-office is in Toronto, Ontario and we have numerous offices\n\nacross Canada.\n\nFOUR BUSINESS SEGMENTS\n\nWe report our results of operations in four segments.\n\nWireless Wireless telecommunications operations\n\nfor consumers and businesses\n\n| Cable | Cable telecommunications operations, including cable television, Internet and cable telephony for Canadian consumers and businesses |\n|:---|:---|\n| Business Solutions | Network connectivity through our fibre network assets to support a range of voice, data, networking, data centre and cloud-based services for medium and large Canadian businesses, governments, and other telecommunications providers |\n| Media | A diversified portfolio of media properties, including television and radio broadcasting, digital media, multi- platform shopping, publishing and sports media and entertainment |\n\n$12.7 BILLION\n\n(%)\n\n**2013 CONSOLIDATED REVENUE BY SEGMENT**\n\nWIRELESS **57%**\n\nCABLE **27%**\n\nMEDIA **13%**\n\nBUSINESS SOLUTIONS **3%**\n\n$5.0 BILLION\n\n(%)\n\n**2013 CONSOLIDATED ADJUSTED OPERATING PROFIT BY SEGMENT**\n\nWIRELESS **61%**\n\nCABLE **33%**\n\nMEDIA **4%**\n\nBUSINESS SOLUTIONS **2%**\n\n26 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "Dear Shareholders,\n\nOn our year-end conference call, I said that last year was the\n\nbest in Emmis Communications’ history. And while that might\n\nhave sounded like the usual Wall Street hyperbole - like any\n\nother CEO bragging about his company’s performance - the\n\ndifference is, I believed it. And I still do.\n\nBut I’ve been in this business long enough to know two\n\nthings for sure: What I believe is not as important as what I\n\ncan prove, and what we did last year is only meaningful if it\n\nreflects on how we will do in the coming year. The good\n\nnews is, Emmis does have the results to back up my high\n\npraise, and what we did to perform last year does directly\n\nrelate to how we’ll perform in the year ahead.\n\n**The best year**\n\nThe bottom line is this: Emmis Communications turned in a\n\nremarkable performance last year. Again and again, and by a\n\nnumber of measures, we outperformed our peers, our mar-\n\nkets and our own solid track record.\n\nAnd we did this in a year that was challenging in just about\n\nevery way. The economy was unstable, public companies\n\ncame under continuing scrutiny, indecency issues hounded\n\nbroadcasters, competition for tight ad dollars increased and\n\ntechnology continued to reshape the media world.\n\nBut our people refused to be slowed by those challenges.\n\nInstead, they worked through them. They innovated, hustled\n\nand focused. And they produced.\n\nOur radio division’s revenue growth led our markets and the\n\nindustry - in our fiscal year, our group was up 4.5 percent\n\nwhile our markets were up 2.7 percent and the industry only\n\n1 percent. Based on this kind of performance, we have con-\n\nsistently ranked among the nation’s leaders in per-station\n\nrevenue, and we continue to produce top-rated programming\n\nin markets across the nation.\n\nOur TV performance was even more impressive. The Emmis\n\ntelevision group’s revenues were up 0.5 percent in calendar\n\n2003, a year when our markets saw a 2.3 percent decrease\n\nin revenues, and the industry experienced a 4.7 percent\n\nrevenue decline. This industry-leading result made us one of\n\nthe few groups in the nation to post positive growth. In addi-\n\ntion, we gained revenue share at 11 of our 13 measured\n\nstations and held the line on expenses, giving us a 1.2\n\npercent increase in fiscal-year cash flow.\n\nOur publishing and international divisions also posted strong\n\nresults. In a tough publishing market, our magazines boosted\n\ntheir division’s revenues by 4.6 percent over last year and\n\nincreased cash flow by 3.3 percent. Our international division\n\nturned in a revenue increase of 27 percent and a cash flow\n\nincrease of 31 percent.\n\nIn addition to boosting performance in our divisions, we\n\nhoned our corporate operations by continuing to build one\n\nof the most adept and hardest-working corporate groups in\n\nAmerican media. With this team in place, we’ve brought\n\nour leverage and cost of capital down to more manageable\n\nlevels, found ways to combat the continually increasing\n\ncosts of health insurance and, in a truly top-notch effort,\n\nsmoothly integrated our new Austin radio properties - in just\n\nunder a year as a part of Emmis, the Austin properties are\n\nenjoying significant ratings and revenue increases.\n\nOf course, for you, the real bottom line on our performance is\n\nits impact on your investment. I’m proud to say that we saw\n\na 27 percent increase in our share price over the course of\n\nthe last fiscal year - we ended fiscal ’03 at 19.79, and closed\n\nthe book on fiscal ’04 at 25.17.\n\n**How we did it**\n\nOperationally, we were on top of our game last year. However,\n\nas I said, I know that the past year’s performance really only\n\nmatters if it reflects on what we’ll do in the coming year. The\n\ngood news is, it does. We performed at these high levels not\n\nby doing something unusual, but by operating the way Emmis\n\nhas always operated, and the way we always will.\n\nFirst of all, we focus on assembling and maintaining the best", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "14 **Guy Laurence**\n\nPresident and Chief\n\nExecutive Officer\n\n15 **Robert F. Berner**\n\nExecutive Vice President,\n\nNetwork and Chief Technology Officer\n\n16 **Robert W. Bruce**\n\nPresident,\n\nCommunications Division\n\n17 **Linda P. Jojo**\n\nExecutive Vice President,\n\nInformation Technology and\n\nChief Information Officer\n\n18 **Philip B. Lind, CM**\n\nExecutive Vice President,\n\nRegulatory and Vice Chairman\n\n19 **David P. Miller**\n\nSenior Vice President,\n\nLegal and General Counsel\n\n20 **Keith W. Pelley**\n\nPresident, Rogers Media\n\n21 **Jim M. Reid**\n\nSenior Vice President,\n\nHuman Resources and\n\nChief Human Resources Officer\n\n22 **Edward S. Rogers**\n\nDeputy Chairman and\n\nExecutive Vice President,\n\nEmerging Business,\n\nCorporate Development\n\n23 **Melinda M. Rogers**\n\nSenior Vice President,\n\nStrategy and Development\n\n24 **Anthony Staffieri, FCPA, FCA**\n\nExecutive Vice President\n\nand Chief Financial Officer\n\n25 **Terrie L. Tweddle**\n\nVice President,\n\nCorporate Communications\n\nAS OF FEBRUARY 11, 2014\n\n##### **SENIOR EXECUTIVE OFFICERS** OF ROGERS COMMUNICATIONS INC.\n\n14\n\n20\n\n15\n\n21\n\n16\n\n22\n\n17\n\n23\n\n18\n\n24\n\n19\n\n25\n\nFor detailed biographical information\n\nof Rogers Executive Officers, go to\n\n**rogers.com/investors**\n\nSENIOR **EXECUTIVE OFFICERS**\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 21", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NASDAQ_EMMS_2004.pdf", - "query": "Does the radio station 93.7 in Austin belong to Emmis Communication?", - "target_page": 7, - "target_passage": "KLBJ-FM (93.7), Album Oriented Rock", - "chunk_present": { - "presence": true, - "index": 7 - } - }, - "top_chunk": [ - { - "text": "#### about emmis\n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM\n\ndomestic radio stations serving the nation’s largest markets of New\n\nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin,\n\nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television\n\nstations, award-winning regional and specialty magazines, a radio net-\n\nwork, international radio interests, and ancillary businesses in broadcast\n\nsales and publishing.\n\nEmmis was founded in 1980, and the company launched its first radio\n\nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for\n\n“truth”) acquired more radio stations across the nation, it established a\n\nreputation for sound operations and emerged as a radio industry leader\n\nand innovator. Emmis was the first broadcast company to own top-\n\nrated radio stations in both L.A. and New York, and it pioneered such\n\nconcepts as the all-sports format.\n\nThe company launched its magazine division in 1988 with the purchase\n\nof *Indianapolis Monthly* , and moved into the world of international radio\n\nin 1997, when it was awarded a license to operate a national radio\n\nnetwork in Hungary. In 1998, Emmis expanded into television by buying\n\nsix television stations in markets throughout the United States. In the last\n\nsix years, the company has added properties in each of its divisions.\n\nWith its emphasis on solid operations, integrity, community involvement\n\nand fun, the company’s culture has been repeatedly lauded by both its\n\nemployees and its peers. Trade publications have regularly cited the\n\ncompany’s leaders as being among the best in the business.\n\nEmmis became a public company in 1994. It maintains its worldwide\n\nheadquarters in Indianapolis, where the company was founded.\n\n*This annual report contains certain non-GAAP measures. For a presen-*\n\n*tation of the directly comparable GAAP measure and a reconciliation of*\n\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n\n*the back of our Form 10-K in this Annual Report.*", - "page_start": 1, - "page_end": 1, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "emmis communications\n\none emmis plaza\n\n40 monument circle\n\nindianapolis, indiana 46204\n\n®", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "###### Outperform Emmis Communications 2004 Annual Report", - "page_start": 0, - "page_end": 0, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "pany better than any other.\n\nIn other words, you can count on Emmis to continue to do\n\nwhat it has always done: Outperform.\n\nThank you for your belief and investment in Emmis.\n\n##### what it has always done: outperform.\n\nJeffrey H. Smulyan\n\nchairman & ceo emmis communications", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "by doing something unusual, but by operating the way Emmis\n\nhas always operated, and the way we always will.\n\nFirst of all, we focus on assembling and maintaining the best\n\nteams in our markets. We have traditionally had the top\n\nsalespeople, creative and technical professionals, news\n\nstaffs, managers and support staff in every city where we\n\noperate. Their peers turn to them for industry leadership,\n\nhonor them with awards and copy them at every opportunity.\n\nWe invest in these people, giving them industry-leading ben-\n\nefits packages, great opportunities and the tools they need to\n\nsucceed. This has always been a hallmark of Emmis, and it\n\nwon’t change.\n\n##### you can count on emmis to continue to do", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "Executive Officers\n\nJeffrey H. Smulyan\n\nChairman of the Board,\n\nPresident and Chief Executive Officer\n\nWalter Z. Berger\n\nExecutive Vice President,\n\nChief Financial Officer and Treasurer\n\nRandall Bongarten\n\nTelevision Division President\n\nRichard F. Cummings\n\nRadio Division President\n\nGary L. Kaseff\n\nExecutive Vice President,\n\nGeneral Counsel\n\nPaul W. Fiddick\n\nInternational Division President\n\nMichael Levitan\n\nSenior Vice President,\n\nHuman Resources\n\nGary Thoe\n\nPublishing Division President\n\nBoard of Directors\n\nJeffrey H. Smulyan\n\nChairman of the Board,\n\nPresident and Chief Executive Officer\n\nSusan B. Bayh\n\nFormer Commissioner of the International Joint\n\nCommission of the United States and Canada\n\nWalter Z. Berger\n\nExecutive Vice President,\n\nChief Financial Officer and Treasurer\n\nGary L. Kaseff\n\nExecutive Vice President,\n\nGeneral Counsel\n\nRichard A. Leventhal\n\nPresident and Majority Owner,\n\nLMCS, LLC\n\nPeter A. Lund\n\nMedia consultant and former\n\nPresident of CBS Inc.\n\nGreg A. Nathanson\n\nMedia consultant and former\n\nPresident of Fox Television Stations and\n\nEmmis Television\n\nFrank V. Sica\n\nSenior Advisor\n\nSoros Fund Management LLC\n\nLawrence B. Sorrel\n\nManaging Partner and Co-CEO\n\nTailwind Capital Partners\n\nCorporate Office\n\nOne Emmis Plaza, 40 Monument Circle, Suite 700, Indianapolis, Indiana 46204,\n\n317.266.0100.\n\nBusiness\n\nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award-\n\nwinning radio broadcasting, television broadcasting and magazine publishing\n\noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest\n\nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin,\n\nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in\n\nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.;\n\nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.;\n\nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes\n\n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles* and Country\n\nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio\n\nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of\n\nthe population in the Flanders region of Belgium; and has ancillary businesses in\n\nbroadcast sales, publishing and interactive products.\n\nTransfer Agent Register\n\nWachovia Bank N.A., Shareholder Services Group,\n\n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153.\n\nAnnual Meeting\n\nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on\n\nWednesday, June 30, 2004, at Emmis’ Corporate office.\n\nForm 10-K\n\nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29,\n\n2004, which was filed with the Securities and Exchange Commission, will be sent\n\nto shareholders without charge upon written request to Kate Healey, Emmis\n\nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700,\n\nIndianapolis, Indiana 46204, or ir@emmis.com.\n\nMarket and Dividend Information\n\nThe Company’s Class A Common Stock is traded in the over-the-counter market\n\nand is quoted on the National Association of Securities Dealers Automated\n\nQuotation (NASDAQ) National Market System under the symbol EMMS.\n\nThe following table sets forth the high and low bid prices of the Class A Common\n\nStock for the periods indicated. No dividends were paid during any such periods.\n\nQuarter Ended High Low\n\nMay 2002 31.85 26.15\n\nAugust 2002 30.15 11.65\n\nNovember 2002 24.05 14.25\n\nFebruary 2003 24.86 17.82\n\nMay 2003 21.24 14.84\n\nAugust 2003 23.87 18.68\n\nNovember 2003 24.06 18.00\n\nFebruary 2004 28.65 22.74\n\nOn April 23, 2004, there were approximately 4,841 record holders of the Class A\n\nCommon Stock and one record holder of the Class B Common Stock.\n\nEmmis intends to retain future earnings for use in its business and does not anticipate", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "In addition, we commit ourselves to creating the best content\n\nin our markets. Our magazines routinely dominate their\n\nindustry awards ceremonies - last year, *Texas Monthly* won a\n\ncoveted National Magazine Award, and Emmis publications\n\nclaimed more than half of the awards at the City and\n\nRegional Magazine competition. Our radio stations feature\n\nsome of the industry’s most popular personalities - in 2003,\n\nEmmis people and stations were awarded three Marconi\n\nRadio Awards. And our television operations are regularly\n\nhonored by journalism organizations for their news gathering\n\nand community service. In short, we provide our markets\n\nwith reliable, high-quality content - content that helps us\n\nassemble the audiences our advertisers want to reach.\n\nWe then generate revenue by overallocating to sales. We\n\ngive our teams well-developed strategies, clearly defined\n\nbrands and solid products. We build bigger, better sales\n\nforces and put a greater emphasis on local dollars than our\n\ncompetitors. We hire aggressive managers, set ambitious\n\ngoals and then watch our people work harder and smarter\n\nthan anyone else.\n\nWe also seize the right opportunities and make the most\n\nof them. As the cost of buying radio properties has gone\n\nthrough the roof, we have been careful about buying.\n\nHowever, when we had a chance to acquire the LBJ stations\n\nin Austin, we knew it was the right fit: good stations, a\n\ntremendous heritage and a great culture, all with an opportu-\n\nnity for growth. And we’ve already built on that group’s track\n\nrecord - since we bought them, we’ve reformatted one sta-\n\ntion and quickly sent it to No. 1 in the market, and we’ve\n\npushed revenues up 9 percent for the entire group.\n\nFinally, we innovate. Why has Emmis, traditionally a radio\n\ncompany, become the company to emulate in TV? Because\n\nwe approached TV in a way it’s never been approached\n\nbefore. Why do we operate leading hip-hop stations in mar-\n\nkets across the nation? Because we pioneered the concept.\n\nWhy have we created a new “Music with Class” format in St.\n\nLouis’ Red 104.1? Because we believe we see a new oppor-\n\ntunity. We know that successful companies don’t follow the\n\npack. They lead it, and that’s what we’ll always do.\n\n**The year ahead**\n\nThat last point - innovation - is an important one, especially\n\nfor the future of Emmis, because we are planning something\n\nthat could change the face of American TV and once again\n\ndemonstrate that Emmis is a company that leads the way.\n\nForty years ago, Americans began taking down their TV\n\nantennas and severing broadcasters’ direct link to television\n\naudiences. Since then, the cable companies—the middlemen\n\nwho replaced us—have created more than $300 billion of\n\nvalue for themselves. However, changes in technology have\n\ngiven broadcasters the ability to provide the American public\n\nwith the most popular TV channels, without the middlemen\n\nand at a more reasonable price.\n\nWe are developing an innovative model that will leverage\n\nthat technology to get broadcast companies back into the\n\ngame. I believe it has the potential to revolutionize the\n\ntelevision industry. I also believe it will add substantial value\n\nto your investment.\n\nWe unveiled this concept at the National Association of\n\nBroadcasters meeting in April. I am proud to say that 11\n\nother television companies joined us at that meeting to\n\nexpress their support for what we’re calling the Broadcasters’\n\nInitiative, and more are signing on each week. Once again,\n\nEmmis has leveraged innovation to take a leading role in our\n\nindustries.\n\nWe’ll continue to use innovation to push us forward.\n\nMeanwhile, we’ll also build and maintain the best teams, pro-\n\nduce the best media content, outhustle and outsell our com-\n\npetitors, seize the best opportunities and operate this com-\n\npany better than any other.\n\nIn other words, you can count on Emmis to continue to do\n\nwhat it has always done: Outperform.\n\nThank you for your belief and investment in Emmis.", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "emmis entities\n\n**RADIO**\n\n**Austin**\n\nKDHT-FM (93.3), Rhythmic CHR\n\nKEYI-FM (103.5), Oldies\n\nKGSR-FM (107.1), Adult Alternative\n\nKLBJ-AM (590), News/Talk\n\nKLBJ-FM (93.7), Album Oriented Rock\n\nKROX-FM (101.5), Alternative Rock\n\n**Chicago**\n\nWKQX-FM (101.1), Alternative Rock\n\n**Indianapolis**\n\nWENS-FM (97.1), Adult Contemporary\n\nWIBC-AM (1070), News/Talk/Sports\n\nWNOU-FM (93.1), CHR\n\nWYXB-FM (105.7), Soft Adult Contemporary\n\nNetwork Indiana, Statewide news network\n\n**Los Angeles**\n\nKPWR-FM (105.9), Hip-Hop/R&B\n\nKZLA-FM (93.9), Country\n\n**New York**\n\nWQCD-FM (101.9), Smooth Jazz\n\nWQHT-FM (97.7), Hip-Hop\n\nWRKS-FM(98.7), Classic Soul/Today’s R&B\n\n**Phoenix**\n\nKKFR-FM(92.3), Rhythmic CHR\n\nKKLT-FM (98.7), Adult Contemporary\n\nKMVP-AM (860), Sports\n\nKTAR-AM (620), News/Talk/Sports\n\n**St. Louis**\n\nKFTK-FM (97.1), Talk\n\nKIHT-FM (96.3), Classic Hits\n\nKPNT-FM (105.7), Alternative Rock\n\nKSHE-FM (94.7), Album Oriented Rock\n\nWRDA-FM (104.1), New Standards\n\n**Terre Haute**\n\nWTHI-FM (99.9), Country\n\nWWVR-FM (105.5), Classic Rock\n\n**TELEVISION**\n\nAlbuquerque, N.M., KRQE-TV (Channel 13),\n\nCBS programming/local news\n\nFort Myers, Fla., WFTX-TV (Channel 4),\n\nFox programming/local news\n\nGreen Bay, Wis., WLUK-TV (Channel 11),\n\nFox programming/local news\n\nHonolulu, KHON-TV (Channel 2),\n\nFox programming/local news\n\nHonolulu, KGMB-TV (Channel 9),\n\nCBS programming/local news\n\nHuntington/Charleston, W.Va., WSAZ-TV (Channel 3),\n\nNBC programming/local news\n\nMobile, Ala./Pensacola, Fla., WALA-TV (Channel 10),\n\nFox programming/local news\n\nMobile, Ala./Pensacola, Fla., WBPG-TV (Channel\n\n55), WB programming\n\nNew Orleans, WVUE-TV (Channel 8),\n\nFox programming/local news\n\nOmaha, Neb., KMTV-TV (Channel 3),\n\nCBS programming/local news\n\nOrlando, Fla., WKCF-TV (Channel 18),\n\nWB programming\n\nPortland, Ore., KOIN-TV (Channel 6),\n\nCBS programming/local news\n\nTerre Haute, Ind., WTHI-TV (Channel 10),\n\nCBS programming/local news\n\nTopeka, Kan., KSNT-TV (Channel 27),\n\nNBC programming/local news\n\nTucson, Ariz., KGUN-TV (Channel 9),\n\nABC programming/local news\n\nWichita, Kan., KSNW-TV (Channel 3),\n\nNBC programming/local news\n\n**PUBLISHING**\n\n*Atlanta*\n\n*Country Sampler*\n\n*Cincinnati*\n\n*Indianapolis Monthly*\n\n*Los Angeles*\n\n*Texas Monthly*\n\n**INTERNATIONAL**\n\nHungary, Sláger Rádió, Classic Rock/local programming\n\nBelgium, nine stations serving the Flanders region\n\n**RELATED BUSINESSES**\n\nEmmis Books\n\nEmmis Interactive\n\nRDS", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" - }, - { - "text": "**MANAGEMENT’S DISCUSSION AND ANALYSIS** MEDIA\n\nDIVERSIFIED CANADIAN MEDIA COMPANY\n\nWe have a broad portfolio of media properties, which most\n\nsignificantly includes:\n\n- category-leading television and radio broadcasting properties\n\n- multi-platform shopping\n\n- publishing including Next Issue Canada\n\n- digital media\n\n- sports media and entertainment\n\n- exclusive 12-year licensing agreement with the NHL to\n\nbroadcast all national live hockey games within Canada in\n\nmultiple languages on all platforms beginning with the 2014-\n\n2015 season.\n\n$1.7 BILLION\n\n(%)\n\n**2013 MEDIA REVENUE MIX**\n\nTELEVISION **42%**\n\nTHE SHOPPING CHANNEL **17%**\n\nPUBLISHING **14%**\n\nRADIO **13%**\n\nSPORTS ENTERTAINMENT **14%**\n\nA NETWORK OF MEDIA ASSETS THAT REACHES CANADIANS COAST-TO-COAST\n\nRadio We operate more than 50 AM and FM radio stations in markets across Canada, including popular radio brands such as 98.1 CHFI,\n\n680 News, Sportsnet 590, The FAN, KISS 92.5, JACK FM and SONiC.\n\nTelevision We operate several conventional and specialty television networks:\n\n- City network, which together with affiliated stations, has distribution to over 80% of Canadian households\n\n- OMNI multicultural television stations\n\n- Specialty channels that include Outdoor Life Network, The Biography Channel (Canada), G4 Canada and FX (Canada)\n\n- Sportsnet’s four regional networks and Sportsnet One, Sportsnet World and Sportsnet 360\n\n- The Shopping Channel, Canada’s only national televised shopping channel which generates a significant and growing portion of its\n\nrevenues from online sales.\n\nPublishing - We publish many well-known consumer magazines such as Maclean’s, Chatelaine, Flare, Hello! Canada and Canadian Business\n\n- We are a leading publisher of marketing, medical, financial and trade publications\n\n- We also have a broad digital presence with a number of online publications, and are extending content across new platforms\n\n- We deliver exclusive and unlimited access to a catalogue of more than 100 premium Canadian and US magazine titles through Next\n\nIssue Canada digital magazine service offering.\n\nDigital Media Our online and mobile digital media platforms include digital advertising across websites and mobile platforms, digital content\n\nsubscriptions, and commerce solutions.\n\nSports Entertainment We own the Toronto Blue Jays, Canada’s only Major League Baseball team, and the Rogers Centre event venue, which hosts the\n\nToronto Blue Jays’ home games and other professional league games, concerts, trade shows and special events.\n\nCOMPETITION\n\nOur radio stations compete mainly with individual stations in local\n\nmarkets, but they also compete:\n\n- nationally with other large radio operators, including satellite radio\n\noperator Sirius/XM, the CBC, Bell Media and Corus Entertainment\n\n- with other media, including newspapers, magazines, television and\n\noutdoor advertising\n\n- with new technologies such as online web information services,\n\nmusic downloading, portable media players and online music\n\nstreaming services.\n\nThe Shopping Channel competes with:\n\n- retail stores, catalogue, Internet and direct mail retailers\n\n- infomercials that sell products on television\n\n- other television channels, for channel placement, viewer attention\n\nand loyalty.\n\nOur magazines and other publications compete for readership and\n\nadvertisers with:\n\n- other Canadian magazines\n\n- foreign, mostly US, titles that sell in significant quantities in Canada\n\n- online information and entertainment websites.\n\nTelevision and specialty services compete for viewers and advertisers\n\nwith:\n\n- other Canadian television stations that broadcast in their local\n\nmarkets, including those owned and operated by the CBC, Bell\n\nMedia and Shaw Media, some of which have greater national\n\ncoverage\n\n- other specialty channels\n\n- other distant Canadian signals and US border stations given the time-\n\nshifting capacity available to digital subscribers", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_RCI_2013.pdf" - }, - { - "text": "ROGERS IS COMMITTED TO DELIVERING WORLD-CLASS\n\nCONTENT AND EXPERIENCES TO CONSUMERS AND\n\nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY\n\nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA\n\nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH\n\nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE.\n\nToday, businesses across Canada connect with customers through Rogers\n\ncategory-leading television and radio assets, sports entertainment,\n\ntelevised and online shopping, publishing, and digital media properties as\n\nthe one-stop solution for all their local and national advertising needs.\n\nRogers Media is Canada’s premier combination of diversified broadcast,\n\nspecialty, sports, print and online media assets which together touch\n\nnearly 90% of Canadians every week. This includes over 50 popular AM\n\nand FM radio stations across Canada. In television, it includes the seven\n\nstation City network which broadcasts intensely local, urban-oriented\n\n**LEADING** CONTENT\n\nLEADING\n\nSPORTSNET TV\n\nFRANCHISE\n\nOMNI\n\nMULTICULTURAL\n\nNETWORK\n\nCITY NATIONAL\n\nTELEVISION\n\nNETWORK\n\nTORONTO\n\nBLUE JAYS\n\nBASEBALL TEAM\n\nNATIONAL\n\nRADIO\n\nPORTFOLIO\n\nTELEVISED\n\nSHOPPING\n\nNETWORK\n\n37.5% OWNERSHIP\n\nOF LEAFS,\n\nRAPTORS & TFC\n\nDIGITAL MEDIA\n\nPORTFOLIO\n\nICONIC\n\nMAGAZINE\n\nBRANDS\n\n12 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed1.pdf", - "query": "What are the two components considered in the expected free energy?", - "target_page": 4, - "target_passage": "The former (utilitarian) objective is to realize one’s preferences, such as being satiated or safe, by minimizing the discrepancy between preferred sensa- tions (encoded as “priors over observations” in active inference) and current sensations in different modalities (e.g. interoceptive or exteroceptive). The latter (epistemic) objective is to reduce uncertainty about one’s estimated state", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "5 of 33\n\nquantities as its target: the variational free energy ( *VFE* ) in the case of perception and the\n\nexpected free energy ( *EFE* ) in the case of action. The *VFE* is the free energy associated with\n\na given sensory observation and is resolved perceptually by updating beliefs about the\n\nenvironment. The *EFE* is the free energy that is expected in the future, contingent on a\n\ngiven policy or course of action. Choosing action policies associated with a low *EFE* lead\n\nto reducing uncertainty about the environment, as well as making preferred observations\n\nmore likely.\n\n### *2.1. POMDPs in Active Inference*\n\nIn AIF, the POMDP is one of the most common families of generative models used\n\nto make inferences about the environment. It is a Markovian discrete state-space model,\n\nwhere employing it means representing the environment and observations as inhabiting\n\none among a set of possible (possibly multidimensional) states, and that the changes\n\nin these states can only depend on the system’s previous state and the agent’s actions.\n\nEnvironmental states are not directly observable, so they have to be inferred based on\n\nincoming sensory observations. In AIF for POMDPs and other generative models in general,\n\nboth perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3 ), as well\n\nas the learning of parameters of the generative model (see Section 2.4 ). Crucially, an agent’s\n\ngenerative model does not a priori have to be isomorphic to the true environment (i.e.,\n\nthe data-generating process), although this will generally lead to a successful inference,\n\nand that the generative model will therefore often come to resemble the environment\n\nthrough learning.\n\nA discrete state-space POMDP in AIF is conventionally defined by five main sets of\n\nparameters: **A** , **B** , **C** , **D** and **E** [ 1 , 33 ], see Figure 1 . Together, these parametrise the agent’s\n\nprior beliefs about the prior probability of different states in the environment, how states\n\nof the environment change and how they generate observations. Typically, they will be\n\nvectors, matrices or tensors; however, henceforth we denote them by their corresponding\n\nletter in bold. These make up the components needed for the agent to perform AIF.\n\n**A** , also called the *observation model* , represents the state-to-observation likelihood model.\n\nThis describes how observations depend on or are generated by states of the environment.\n\nIt is structured as a matrix with a column for each possible environmental state *s* , and a row\n\nfor each possible observation *o* . Each column is then a categorical probability distribution\n\nover the observations that will occur given the environmental state (meaning that each\n\ncolumn must contain non-negative values that sum to 1). If the observations are multidi-\n\nmensional (i.e., multiple observations are made at each time point), there is a matrix for\n\neach observation modality. If two or more states determine the observation, the likelihood\n\nmodel then becomes a tensor. If **A** is imprecise (i.e., the probabilities are highly entropic and\n\nevenly distributed), observations are taken to carry less information about the environment,\n\nin many cases leading to more uncertain inferences, and vice versa.\n\n**B** , also called the *transition model* , describes the state-to-state transition probabilities of\n\nenvironmental states *s* . **B** encodes the agent’s assumptions about how the environment\n\nchanges over time, depending on its actions. It has a column and a row for each environ-\n\nmental state *s* , where each column is a categorical probability distribution over the states\n\nthe environment will take on the next time step, given the state it is currently in. If the envi-\n\nronment is modelled as multidimensional, there will be a matrix for each environmental\n\nstate factor. Additionally, there is a separate matrix for each possible action (making each", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n* **Apartment Property Expenses** *\n\nSame store apartment property expenses increased 5.5% for the year ended December 31, 2013, due primarily to increased utility and fuel\n\nexpenses as a result of high natural gas prices in Atlantic Canada, and higher electricity costs.\n\n**Utility and Fuel Expense ‑ Same Store**\n\nFor the years ended December 31,\n\n**2013** 2012 % Change\n\nNatural gas **$4,565** $2,729 67.3%\n\nOil **1,523** 2,095 (27.3)%\n\nElectricity **5,197** 4,671 11.3%\n\nWater **3,582** 3,474 3.1%\n\nOther **30** 33 (9.1)%\n\nTotal utility and fuel expenses **$14,897** $13,002 14.6%\n\nKillam’s apartment properties are heated with a combination of natural gas (55%), electricity (36%), oil (8%) and other sources (1%).\n\nElectricity costs at the unit level are usually paid directly by tenants, reducing Killam’s exposure to the majority of the 4,500 units heated with\n\nelectricity. Fuel costs associated with natural gas or oil fired heating plants are paid by Killam. As such, the Company is exposed to fluctuations\n\nin natural gas and oil costs, which represent 40.9% of total same store utility and fuel costs in 2013. Killam invests in green initiatives at its\n\nproperties to maximize efficiencies, including converting many of its Halifax properties to natural gas from oil over the last three years as natural\n\ngas infrastructure has been expanded in the city. The decision to convert was supported by the substantial price difference between the cost of\n\nnatural gas and oil in recent years.\n\nAs noted in the table above, Killam’s utility and fuel expenses increased 14.6% in 2013 compared to 2012. The increase was primarily attributable\n\nto higher natural gas, electricity costs and water costs.\n\nKillam’s natural gas expenses increased by 67.3% in 2013 due to higher gas prices in Atlantic Canada and an increase in properties burning\n\nnatural gas following conversions of certain Halifax heating plants from oil to gas in 2012 and 2013. The reduction in oil expense in the quarter\n\nand year‑to‑date reflects this reduction in oil exposure.\n\nAs the following chart highlights, the per gigajoule (Gj) commodity cost for natural gas in New Brunswick and Nova Scotia was much higher\n\nthan NYMEX in 2013 and less correlated to NYMEX than in previous years. (NYMEX is the New York Mercantile Exchange, a commodity futures\n\nexchange. Henry Hub, a gas distribution hub in Louisiana is the pricing point for natural gas futures contracts traded on NYMEX). The cost of\n\nnatural gas in Atlantic Canada and New England experienced a spike from December 2012 until late spring 2013 and a second spike in December\n\n2013, compared to other areas of Canada. Those spikes were both due to increased demand from utilities in Northeast New England and a\n\nshortage of gas pipeline capacity in Northeastern New England and Atlantic Canada. A temporary decline in gas supply off the coast of Nova\n\nScotia further contributed to the high pricing in the first part of the year.\n\n####### **Historic Natural Gas Pricing ($ per Gj) Henry Hub Vs. Heritage Gas**\n\n$4.40\n\n$9.97\n\n$15.49\n\n$0\n\n$2\n\n$4\n\n$6\n\n$8\n\n$10\n\n$12\n\n$14\n\n$16\n\n$18\n\nDec 2009 Feb 2010 apr 2010 Jun 2010 aug 2010 oct 2010 Dec 2010 Feb 2011 apr 2011 Jun 2011 aug 2011 oct 2011 Dec 2011 Feb 2012 apr 2012 Jun 2012 aug 2012 oct 2012 Dec 2012 Feb 2013 apr 2013 Jun 2013 aug 2013 oct 2013 Dec 2013\n\nHenry Hub new Brunswick Gas", - "page_start": 37, - "page_end": 37, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "2 of 33\n\nminimisation [ 9 ]. Choosing actions that minimise the expected free energy ( *EFE* ) of their\n\nconsequences provides a natural balance between exploratory and exploitative behaviour;\n\ngeneralises descriptive approaches to behavioural modelling, like reinforcement learning\n\nand expected utility maximisation; and provides a singular approach to adaptive behaviour\n\nthat can be used across different environments. AIF was argued to be applicable to any self-\n\norganising system that actively maintains a stable boundary that defines its integrity [ 10 ],\n\na broad category that includes cells and plants [ 11 ], as well as humans [ 2 ] and even\n\ncollectives [ 12 ]. Owing to its generality, AIF has seen a rise in popularity across multiple\n\nfields. It is used for theoretical simulations of the mechanisms underlying various types of\n\nbehaviour [ 2 ], computational phenotyping in computational psychiatry [ 13 , 14 ], and agent-\n\nbased simulations of population dynamics [ 15 ], as well as in engineering and robotics [ 16 ].\n\nIn AIF, perception and concurrent action are based on performing a variational Bayesian\n\ninversion of a generative model of the environment (i.e., a model of how the environment\n\nchanges and brings about sensory observations). This belief updating includes inferring\n\n(hidden) states of the environment, learning parameters of the generative model and\n\nlearning the structure of the generative model. Since the requisite inference schemes come\n\npre-specified, the main task in AIF modelling becomes specifying an appropriate generative\n\nmodel. This includes specifying priors over environmental states, as well as what might\n\nbe called *prior preferences* , *preference priors* or *goal priors* : immutable prior expectations that\n\nmake up an agents’ preferences by furnishing a set of predictions over future states or\n\nobservations; in fulfilling these predictions, free energy is minimised. The space of possible\n\ngenerative models is vast, and they often have to be handcrafted for a given environment.\n\nHowever, there are some families of generative models that can be considered “universal”\n\nin the sense that they can be used for most environments. Currently, the most popular of\n\nthese is the discrete state-space Partially Observable Markov Decision Process (POMDP)-\n\nbased generative models. Since they are ubiquitous in the literature, we focus here on\n\nmaking these types of generative models available to researchers. There are, however, other\n\ntypes of universal generative models, like generalised filtering models [ 17 ] or Hierarchical\n\nGaussian Filtering-based models [ 18 , 19 ], that will be implemented in the future.\n\nTools for simulating POMDP-AIF models were originally developed as part of the\n\nDEM [ 20 ] library for M ATLAB [ 21 ] (part of the larger SPM library [ 22 ]). Since then, a\n\nmodal and flexible software package pymdp [ 23 ] was created for Python [ 24 ], as well as a\n\nperformance-oriented package cpp-AIF [ 25 ] for C++ [ 26 ] that can be used across platforms.\n\nFinally, the factor graph library RxInfer [ 27 ] for Julia [ 28 ] has also been used to implement\n\nsome AIF models on an efficient factor graph back-end [ 29 - 31 ]. The important tools\n\nthat these packages provide make AIF available for researchers to perform simulation\n\nstudies and for use in engineering contexts. They do not, however, usually allow for\n\nfitting models to empirically observed data, which is a fundamental method used in\n\ncognitive modelling [ 32 ], often in the context of computational psychiatry [ 13 ], to infer the\n\nmechanisms underlying variations in behaviour or to investigate the differences between\n\n(for example, clinical) populations. Smith and colleagues [ 33 ] provided a guide for manually\n\ndoing variational Bayesian parameter estimation based on empirical data, but only in\n\nM ATLAB and restricted to a particular class of variational parameter estimation methods", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "FIG. 2: Distribution functions in four cases (a) BCSI model,\n\nwhere one can see that for ε > 0, SC > NS implying KE in-\n\ncreases in the SCS. (b) The original MFLI model of Ref. 30,\n\nwhere for ε > 0, SC < NS, implying KE decreases in the SCS.\n\n(c) Our version of MFLI model (see text) and (d) the CB\n\nmodel. In both cases, SC > NS, implying KE increases in the\n\nSCS. Observe that in the impurity-free CB model there is no\n\njump in n ( ǫ ) indicating lack of fermionic coherence. This is\n\nconsistent with ARPES <sup>39</sup>\n\nA. The BCS case\n\nIn BCS theory the quantity Z ( ω ) is given by\n\nZ BCSI ( ω ) = 1 + Γ\n\n� ∆ <sup>2</sup> − ( ω + iδ ) <sup>2</sup> (11)\n\nand\n\nΣ BCSI ( ω ) = ω ( Z ( ω ) − 1) = i Γ ω\n\n� ( ω + iδ ) <sup>2</sup> − ∆ <sup>2</sup> (12)\n\nThis is consistent with having in the NS, Σ = i Γ in accor-\n\ndance with Eq 6. In the SCS, Σ( ω ) is purely imaginary\n\nfor ω > ∆and purely real for ω < ∆. The self-energy\n\nhas a square-root singularity at ω = ∆.\n\nIt is worth noting that Eq.12 is derived from the in-\n\ntegration over infinite band. If one uses Eq.6 for finite\n\nband, Eq.12 acquires an additional frequency dependence\n\nat large frequencies of the order of bandwidth (the low\n\nfrequency structure still remains the same as in Eq.12).\n\nIn principle, in a fully self-consistent analysis, one should\n\nindeed evaluate the self-energy using a finite bandwidth.\n\nIn practice, however, the self-energy at frequencies of or-\n\nder bandwidth is generally much smaller than ω and con-\n\ntribute very little to optical conductivity which predom-\n\ninantly comes from frequencies where the self-energy is\n\ncomparable or even larger than ω . Keeping this in mind,\n\nbelow we will continue with the form of self-energy de-\n\nrived form infinite band. We use the same argument for\n\nall four models for the self-energy.\n\nFor completeness, we first present some well known\n\nresults about the conductivity and optical integral for a\n\nconstant DOS and then extend the discussion to the case\n\nwhere the same calculations are done in the presence of\n\na particular lattice dispersion.\n\n0.1 0.2 0.3 0.4\n\n−4\n\n−2\n\n0\n\nω in eV\n\nW SC −W NS\n\n∆ W (BCSI without lattice)\n\nΓ =70 meV\n\nΓ =50 meV\n\nΓ =3.5 meV\n\nFIG. 3: The BCSI case with a dispersion linearized around the\n\nFermi surface. Evolution of the difference of optical integrals\n\nin the SCS and the NS with the upper cut-off ω c Observe\n\nthat the zero crossing point increases with impurity scattering\n\nrate Γ and also the ‘dip’ spreads out with increasing Γ. ∆=\n\n30 meV\n\nFor a constant DOS, ∆ W ( ω c ) = W SC ( ω c ) − W NS ( ω c )\n\nis zero at ω c = ∞ and Kubo sum rule reduces to FGT\n\nsum rule. In Fig. 3 we plot for this case ∆ W ( ω c ) as a\n\nfunction of the cutoff ω c for different Γ <sup>′</sup> s . The plot shows\n\nthe two well known features: zero-crossing point is below\n\n2∆in the clean limit Γ << ∆and is roughly 2Γ in the dirty limit <sup>21,40</sup> The magnitude of the ‘dip’ decreases quite\n\nrapidly with increasing Γ. Still, there is always a point\n\nof zero crossing and ∆ W ( ω c ) at large ω c approaches zero\n\nfrom below.\n\nWe now perform the same calculations in the presence\n\nof lattice dispersion. The results are summarized in Figs\n\n4,5, and 6.\n\nFig 4 shows conductivities σ ( ω ) in the NS and the SCS\n\nand Kubo sums W K plotted against impurity scattering\n\nΓ. We see that the optical integral in the NS is always\n\ngreater than in the SCS. The negative sign of ∆ W K is\n\nsimply the consequence of the fact that n k is larger in the\n\nNS for ǫ k < 0 and smaller for ǫ k < 0, and ∇ <sup>2</sup> ε ⃗k closely follows − ε ⃗k for our choice of dispersion <sup>38</sup> ), Hence n k is\n\nlarger in the NS for ∇ <sup>2</sup> ε ⃗k > 0 and smaller for ∇ <sup>2</sup> ε ⃗k < 0 and the Kubo sum rule, which is the integral of the\n\nproduct of n k and ∇ <sup>2</sup> ε ⃗k (Eq. 3), is larger in the normal state.\n\nWe also see from Fig. 4 that ∆ W K decreases with Γ\n\nreflecting the fact that with too much impurity scattering", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0764.pdf" - }, - { - "text": "6 of 33\n\nit means that the transitions of the environment are expected to be uncertain (and therefore,\n\noften transition to new states). In this sense, volatile and unstable environments will lead\n\nto less certain predictions about the future.\n\n**C** , also called the *preference prior* , is a prior preference over possible observations. It encodes\n\nthe types of observations that an agent a priori expects to encounter; since minimising ex-\n\npected free energy through AIF entails taking actions that make the predicted observations\n\ncome about, **C** also encodes the agent’s preferences. It is a single categorical probability\n\ndistribution over possible observations; if the observations are multidimensional, there\n\nis a separate *preference prior* for each observation modality. If **C** is imprecise (i.e., highly\n\nentropic), its preferences are weak and it will prioritise collecting information over realising\n\nits preferences; if it has low entropy, the agent will have stronger preferences and instead\n\nprioritise preferred outcomes or goals.\n\n**D** , also called the *state prior* , is the agent’s prior belief about the states of the environment. It\n\nspecifies the agent’s belief about the environmental state before receiving any observations.\n\nThere is a separate *state prior* over environmental states for each factor. With a more precise\n\n**A** , the influence of the **D** quickly diminishes since the likelihood overwhelms the prior in\n\nthe Bayesian inference.\n\n**E** , also called the *habit prior* , is the prior over policies or paths. In the AIF vernacular,\n\npolicies are allowable sequences of actions, with some specified policy length or temporal\n\ndepth. **E** encodes the agent’s preferences for choosing certain policies in the absence of\n\nplans based upon *expected free energy* , sometimes called the agent’s “habits”. It is a single\n\nprobability distribution over each possible policy.\n\nIn addition to the five matrices, there are several hyper-parameters that are not part\n\nof the generative model, but are part of the inference algorithm. Here, we include two of\n\nthe most common: the *γ* and *α* (inverse) temperature parameters. *γ* , the precision over\n\npolicies, is the inverse temperature of a softmax transformation of expected free energies\n\nover policies, which is covered later in this section. After policies have been selected for a\n\ngiven time step, they are marginalised to calculate the probabilities of taking each possible\n\naction in the next time step. *α* , the action precision, is the inverse temperature of a softmax\n\ntransformation on these final action probabilities, with higher values resulting in more\n\nstochastic action selection.\n\nAs noted, here we focus specifically on the POMDP-based generative models often\n\nused in the AIF literature. However, the basic steps when performing AIF—perception,\n\naction and learning—remain the same across generative models. In the remainder of this\n\nsection, we describe each of these three steps in turn.", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "In April 2011, John Farrell [wrote](http://www.renewableenergyworld.com/rea/blog/post/2011/04/if-you-like-solar-tell-your-utility-to-publish-this-map) :\n\nsolar and other renewable energy developers must find the best places to plug in to the\n\ngrid, e.g. where demand is high or infrastructure is stressed. The cost to connect\n\ndistributed generation may also be lower in these areas. Unfortunately, data about a\n\nutility's grid system is rarely public.\n\nCalifornia utilities are changing the game. Southern California Edison (SCE) rolled out\n\na map of its grid system, highlighting (in red) areas that \"could potentially minimize\n\nyour costs of interconnection to the SCE system.\" Since as much as a third of the cost of\n\nPV can be recaptured via its benefits to the electric grid when properly placed in the\n\ndistribution system, having this information is crucial for solar developers. *Public data*\n\n*also levels the playing field between independent power producers and the utilities,*\n\n*since the latter can use federal tax credits and their proprietary knowledge of the*\n\n*electric grid to build their own distributed renewable energy at the most attractive*\n\n*locations.*\n\nHaving public data on distribution grid hot spots can make renewable energy\n\ndevelopment more cost effective and more democratic. Tell your utility to publish its\n\nmap.\n\nThis, instead, is an excerpt of [This Data isn't dull. It improves lives](http://www.nytimes.com/2011/03/13/business/13view.html) (March 2011, New York Times)\n\nthat looks at public transportation and consumer safety:\n\nThe USA Department of Transportation is considering a new rule requiring airlines to\n\nmake all of their prices public and immediately available online. The postings would\n\ninclude both ticket prices and the fees for \"extras\" like baggage, movies, food and\n\nbeverages. The data would then be accessible to travel Web sites, and thus to all\n\nshoppers.\n\nThe airlines would retain the right to decide how and where to sell their products and\n\nservices. But many of them are insisting that they should be able to decide where and\n\nhow to display these extra fees. The issue is likely to grow in importance as airlines\n\nexpand their lists of possible extras, from seats with more legroom to business-class\n\nmeals served in coach.\n\nElectronic disclosure of all fees can make it much easier for consumers to figure out\n\nwhat a trip really costs, and thus make markets more efficient, without requiring new\n\nrules and regulations.\n\nAnother initiative has been proposed by the Consumer Product Safety Commission. In\n\n2008, Congress overwhelmingly passed and President George W. Bush signed\n\nlegislation mandating an online database of reported safety issues in products, at\n\nsaferproducts.gov. The Web site ran for a few months in a \"soft launch\" and went into\n\nfull operation on Friday.\n\nThirteen years ago, two parents were told that their 18-month-old son had died in an\n\naccident in a model of crib in which other children had died, yet there was no easy way\n\nfor any parent or child-care provider to know that.", - "page_start": 24, - "page_end": 24, - "source_file": "Open_Data_Report.pdf" - }, - { - "text": "� � # Set center (column 1) and cue (column 4) to give no reward observation (row 1)\n\n# Set reward and loss probabilities to 0.5 for the arm locations\n\n# For reward condition right\n\nA[ 2 ][:,:, 1 ] = [ 1.0 0 .0 0 .0 1 .0\n\n0.0 0 .5 0 .5 0 .0\n\n0.0 0 .5 0 .5 0 .0 ]\n\n# For reward condition left\n\nA[ 2 ][:,:, 2 ] = [ 1.0 0 .0 0 .0 1 .0\n\n0.0 0 .5 0 .5 0 .0\n\n0.0 0 .5 0 .5 0 .0 ] � �\n\n**Figure 3.** Reward probabilities for the four locations. The centre (column 1) and cue (column 4)\n\nlocations always resulted in the “no reward” observation (row 1). The two arms (columns 3 and\n\n4) resulted in either rewards (row 2) or losses (row 3), with some probability. Left: the agent’s\n\nagnostic starting beliefs about reward probabilities. Right: the true reward probabilities for the\n\nreward condition left arm, which the agent needed to learn over time. The amount of saturation of\n\nthe green color represent the likelihood of a specific observation in a give state.\n\nThe third and last modality was the cue modality, which mapped the cue observations\n\nonto the location and reward condition states. This resulted in an **A** that was two cue\n\nobservations by four location states by two reward conditions, i.e., a 2 *×* 4 *×* 2 tensor. The observations in this modality were correctly assumed by the agent to truthfully reveal the\n\ncurrent reward condition—i.e., whether the right or left arm was better—when standing at\n\nthe cue location. We implemented this by giving each cue observation equal probabilities\n\nat all locations except the cue location, where there was a perfect correspondence between\n\nthe reward condition and the observation: � � # Set cue observation probabilities to be equal at all\n\n# locations except the cue location (column 4).\n\n# Let cue locations correspond to reward conditions.\n\n# For reward condition right\n\nA[ 3 ][:,:, 1 ] = [ 0.5 0 .5 0 .5 1 .0\n\n0.5 0 .5 0 .5 0 .0 ]\n\n# For reward condition left\n\nA[ 3 ][:,:, 2 ] = [ 0.5 0 .5 0 .5 0 .0\n\n0.5 0 .5 0 .5 1 .0 ] � � Having created all three modalities of **A** , we could continue to **B** , or the transition model.\n\nEach of the two state factors of **B** —the location factor and reward condition factor—needed\n\nto be defined separately. We started with the location factor, which contained the transition\n\nto and from four possible location states under four different actions: a 4 *×* 4 *×* 4 tensor. The agent could control these states perfectly with its four movement actions, independently", - "page_start": 19, - "page_end": 19, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Arts and Entertainment](https://about.newsusa.com/taxonomy/term/78) / New Artificial Intelligence Summit Series Begins With Energy\n\n## New Artificial Intelligence Summit Series Begins With\n\n## Energy\n\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain\n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative\n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit\n\nSeries.\n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington,\n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and\n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant\n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote\n\npartnerships between AI and energy stakeholders.\n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy\n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in\n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced\n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research.\n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy,\n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and\n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American\n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts.\n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan.\n\nArticle Link\n\n[https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…](https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with-energy)\n\n[ARTS AND ENTERTAINMENT](https://about.newsusa.com/taxonomy/term/78)\n\n07/31/2024\n\n[Celebrate St. Patrick's Day with](https://about.newsusa.com/celebrate-st-patricks-day-with-no-booze-just-pure-irish-fun-and-entertainment)\n\nNo Booze, Just Pure Irish Fun and\n\nEntertainment\n\nMar 06, 2024\n\nSay Hello to Your Big Break at the\n\nStapleton Library Job Fair in\n\n[Vocation, Trade, or Civil Service](https://about.newsusa.com/say-hello-to-your-big-break-at-the-stapleton-library-job-fair-in-vocation-trade-or-civil-service)\n\nMar 06, 2024\n\nLocal Artists Collaborate for a\n\n[Unique Fusion of Groove and](https://about.newsusa.com/local-artists-collaborate-for-a-unique-fusion-of-groove-and-collage)\n\nCollage\n\nMar 06, 2024\n\n[Explore Downtown San Pedro](https://about.newsusa.com/explore-downtown-san-pedro-with-flair-ride-the-iconic-red-car-trolley-for-free)\n\nwith Flair: Ride the Iconic Red Car\n\nTrolley for Free\n\nMar 06, 2024\n\nRetrain Your Emotional Brain: A\n\n[Natural Alternative to Weight](https://about.newsusa.com/retrain-your-emotional-brain-a-natural-alternative-to-weight-loss-drugs)\n\nLoss Drugs\n\nFeb 22, 2024\n\nSerial Entrepreneur Teaches Us\n\n[How to Go the Distance in](https://about.newsusa.com/serial-entrepreneur-teaches-us-how-to-go-the-distance-in-business-and-in-life)\n\nBusiness and in Life\n\nFeb 21, 2024\n\n[FASHION](https://about.newsusa.com/taxonomy/term/1)\n\n[BUSINESS](https://about.newsusa.com/taxonomy/term/2)\n\n[INFOGRAPHIC](https://about.newsusa.com/taxonomy/term/16)\n\n[ENVIRONMENT](https://about.newsusa.com/taxonomy/term/17)\n\n[HEALTH](https://about.newsusa.com/taxonomy/term/18)", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "Plan Assets\n\nThe fair value of each major class of plan assets for the Company’s Qualified Benefit Retirement Plan are valued using quoted market\n\nprices in active markets for identical instruments, or Level 1 in the fair value hierarchy. Following are the fair values and target\n\nallocation as of June 30:\n\nTarget Allocation Fair Value\n\n**2012** 2011\n\nAsset Class:\n\nEquity securities 40 - 70% **$ 3,735**\n\n$ 3,876\n\nDebt securities 20 - 50% **2,382**\n\n1,756\n\nOther 0 - 20% **322**\n\n424\n\nTotal 100% **$ 6,439**\n\n$ 6,056\n\nEquity securities do not include any Company common stock.\n\nThe Company has established an investment policy and regularly monitors the performance of the assets of the trust maintained in\n\nconjunction with the Qualified Defined Benefit Retirement Plan. The strategy implemented by the trustee of the Qualified Defined\n\nBenefit Retirement Plan is to achieve long-term objectives and invest the pension assets in accordance with ERISA and fiduciary\n\nstandards. The long-term primary objectives are to provide for a reasonable amount of long-term capital, without undue exposure\n\nto risk; to protect the Qualified Defined Benefit Retirement Plan assets from erosion of purchasing power; and to provide investment\n\nresults that meet or exceed the actuarially assumed long-term rate of return. The expected long-term rate of return on assets\n\nassumption was developed by considering the historical returns and the future expectations for returns of each asset class as well as\n\nthe target asset allocation of the pension portfolio.\n\nCash Flows\n\nEmployer Contributions\n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in\n\n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets.\n\nEstimated Future Benefit Payments\n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next\n\nfive years and in the aggregate for the subsequent five years:\n\nDuring Fiscal Years Pension Benefits Retiree Health Care\n\nBenefits\n\n2013 $ 6,200\n\n$ 240\n\n2014 5,900\n\n240\n\n2015 5,700\n\n240\n\n2016 4,500\n\n240\n\n2017 1,700\n\n260\n\n2018 through 2022 15,200\n\n1,420\n\n34\n\n#### NOTES TO CONSOLIDATED FINANCIAL STATEMENTS (Continued)\n\n(In thousands, except per share amounts)", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_AIT_2012.pdf" - }, - { - "text": "green energy, <sup>4</sup> underscoring the need for energy efficient model architectures and training paradigms. Strubell et al. also examine the cost of these models vs. their accuracy gains. For the task of machine translation where large LMs have resulted in performance gains, they estimate that an increase in 0.1 BLEU score using neural architecture search for English to German translation results in an increase of $150,000 compute cost in addition to the carbon emissions. To encourage more equitable access to NLP research and reduce carbon footprint, the authors give recommendations to report training time and sensitivity to hyperparameters when the released model is meant to be re-trained for downstream use. They also urge governments to invest in compute clouds to provide equitable access to researchers. Initiatives such as the SustainNLP workshop <sup>5</sup> have since taken up the goal of prioritizing computationally efficient hardware and algorithms. Schwartz et al. [ 115 ] also call for the development of green AI, similar to other environmentally friendly scientific de- velopments such as green chemistry or sustainable computing. As shown in [ 5 ], the amount of compute used to train the largest deep learning models (for NLP and other applications) has increased 300,000x in 6 years, increasing at a far higher pace than Moore’s Law. To promote green AI, Schwartz et al. argue for promoting efficiency as an evaluation metric and show that most sampled papers from ACL 2018, NeurIPS 2018, and CVPR 2019 claim accu- racy improvements alone as primary contributions to the field, and none focused on measures of efficiency as primary contributions. Since then, works such as [ 57 , 75 ] have released online tools to help researchers benchmark their energy usage. Among their rec- ommendations are to run experiments in carbon friendly regions, consistently report energy and carbon metrics, and consider energy- performance trade-offs before deploying energy hungry models. In addition to these calls for documentation and technical fixes, Bietti and Vatanparast underscore the need for social and political engagement in shaping a future where data driven systems have minimal negative impact on the environment [16]. While [ 129 ] benchmarks the training process in a research set- ting, many LMs are deployed in industrial or other settings where the cost of inference might greatly outweigh that of training in the long run. In this scenario, it may be more appropriate to de- ploy models with lower energy costs during inference even if their training costs are high. In addition to benchmarking tools, works estimating the cost increase associated with the introduction of LMs for particular applications, and how they compare to alternative NLP methods, will be important for understanding the trade-offs. When we perform risk/benefit analyses of language technology, we must keep in mind how the risks and benefits are distributed, because they do not accrue to the same people. On the one hand, it is well documented in the literature on environmental racism that the negative effects of climate change are reaching and impacting the world’s most marginalized communities first [ 1 , 27 ]. <sup>6</sup> Is it fair or just to ask, for example, that the residents of the Maldives (likely to be underwater by 2100 [ 6 ]) or the 800,000 people in Sudan affected", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv5_ccby4license.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed1.pdf", - "query": "How could the heart rate be estimated by means of an active inference paradigm?", - "target_page": 6, - "target_passage": "The second panel of Fig. 2 shows the Shannon surprise of an inference model that estimates the current heart rate using the two standard components of a generative model. The for- mer component is the prior, which encodes the person’s a priori probabilistic belief (i.e. probability distribution) about her “nor- mal” heart rate range; here, the prior is a Gaussian centered on 67 and has a precision of 0.11. The latter component is the likeli- hood, which encodes the probabilistic mapping between sensory (heartbeat) observations and the hidden state (heart rate); here, the likelihood is a Gaussian centered on the current heart rate with an additional bias of 15 pulses, and the panel shows the results for 10 values for precision obtained by subdividing the range [0.1,10] into equal intervals.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "might be incorrect. An incorrect setting of precisions has been\n\nassociated with various psychopathological conditions, such as psychosis ( Adams et al. 2013 ), eating disorders ( Barca and Pezzulo\n\n2020 ), panic disorders ( Maisto et al. 2021 ), symptom perception ( Pezzulo et al. 2019 ), depression ( Barrett et al. 2016 ), and many others ( Khalsa et al. 2018 , Paulus et al. 2019 ). Intuitively, assign-\n\ning excessively high weight to noisy sensations yields an incorrect\n\ninference that tracks the noise rather than the correct state of\n\nthe estimated variable system (i.e. overfitting), whereas assigning\n\nexcessively low weight to sensations (or excessively high weight to\n\nprior knowledge) makes the system poorly responsive to incom-\n\ning observations that might signal a change in the state of the\n\nsystem—and both are examples of aberrant inference ( Friston et al. 2014 ). Figure 2 provides a formal illustration of the above by plot-\n\nting some examples of Bayesian inference using generative models\n\nunder various levels of precision of the model components. For\n\nsimplicity, we focus on a simplified example of inference of an\n\ninteroceptive variable: one’s heart rate. Heart rate is a “hidden\n\nvariable” in Bayesian parlance since it is not directly observable\n\nbut needs to be inferred through two sources of information:\n\nprior knowledge about the most likely heart rate and sensory (heartbeat) observations. The top panel of Fig. 2 shows a series\n\nof (noisy) heartbeat observations. In the beginning, they are\n\nin the normal range for an adult (time steps 1- 10), then they\n\nincrease significantly, simulating tachycardia (time steps 11- 20),\n\nthen they go back to the normal range (time steps 21- 30), then\n\nthey decrease significantly, simulating bradycardia (time steps\n\n31- 40), and finally, they go back to the normal range (time steps\n\n41- 50). The second panel of Fig. 2 shows the Shannon surprise of\n\nan inference model that estimates the current heart rate using\n\nthe two standard components of a generative model. The for-\n\nmer component is the prior, which encodes the person’s a priori probabilistic belief (i.e. probability distribution) about her “nor-\n\nmal” heart rate range; here, the prior is a Gaussian centered on\n\n67 and has a precision of 0.11. The latter component is the likeli-\n\nhood, which encodes the probabilistic mapping between sensory\n\n(heartbeat) observations and the hidden state (heart rate); here,\n\nthe likelihood is a Gaussian centered on the current heart rate\n\nwith an additional bias of 15 pulses, and the panel shows the\n\nresults for 10 values for precision obtained by subdividing the\n\nrange [0.1,10] into equal intervals. The results shown in the second panel of Fig. 2 show that Shannon surprise increases dramatically\n\nduring episodes of tachycardia and bradycardia, which are far\n\nfrom the normal range. The pattern of results is the same across\n\nall levels of likelihood precision. However, the inference with a\n\nvery high precision (a precision of 10) tracks more closely the noise\n\nsensory signals and can therefore lead to more extreme results.\n\nThe third panel shows the Bayesian surprise (or the Kullback-\n\nLeibler divergence between posterior and prior probability distri-\n\nbutions) over time. This is a measure of how much dissimilar the\n\nposterior and the prior are, and it always decreases as a result of\n\ninference, but note that it decreases much more rapidly when the\n\nprecision of the likelihood is 10, which is another indication that\n\nthe posterior is “overfitting,” meaning that the inference result is\n\nexcessively biased by the likelihood distribution.\n\nFinally, the two bottom series of panels are organized in two\n\n(left and right) columns, which show the first five time steps of\n\ninference for the two cases with high precision (of 10) and low pre-\n\ncision (of 0.1) of the likelihood, respectively. In these plots, the prior\n\ndistributions are in blue, the posterior distributions are in green,", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "*Modeling and controlling the body in maladaptive ways* 7\n\nFigure 2. A simplified example of (Bayesian) inference of one’s heart rate. First panel: simulated time series of heartbeat observations. Second panel:\n\nShannon surprise of a generative model composed of a fixed prior about heart rate (a Gaussian with a mean of 67 and a precision of 0.11) and a\n\nlikelihood (a Gaussian centered on the current heart rate with an additional bias of 15 pulses, with various precisions that vary between 0.47 and 10,\n\nsee the legend). Third panel: Bayesian surprise, which measures the discrepancy between posterior and prior probabilities over time. Bottom panels:\n\nthe two series of panels are organized in two (left and right) columns, which show the first five time steps of inference for the two cases with high\n\nprecision (of 10) and low precision (of 0.1) of the likelihood, respectively. See the main text for an explanation and online article for colored version of\n\nthis figure.\n\nthe current model generate significant surprise, and sometimes,\n\nthe surprise can remain relatively high for long periods before the\n\nmodel adapts (or the world changes), especially with some param-\n\neterizations of the generative model. This is particularly relevant\n\nin this context since active inference agents strive to minimize\n\ntheir surprise (and the long-term average of surprise, entropy,\n\nwhich is a measure of uncertainty) by changing their model, or\n\nchanging the world, or both.\n\nSecond, these examples illustrate the importance of precision\n\ncontrol and the appropriate setting of precision parameters in\n\nguiding inference. Remarkably, the inference can be more or less\n\naccurate or fast using the same data, depending on the precision parameters. Note that in Fig. 2 , we manipulated only the precision\n\nof the likelihood. However, it would also be possible to manipulate\n\nthe precision of the prior, together or in alternative to the precision\n\nof the likelihood. Generally speaking, when the precision of the", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed1.pdf" - }, - { - "text": "cision (of 0.1) of the likelihood, respectively. In these plots, the prior\n\ndistributions are in blue, the posterior distributions are in green,\n\nand the likelihoods are in red. It is possible to note that in the left\n\n(high precision) panels, the posterior inference closely follows the\n\nlikelihood (it “overfits”) after five time steps and the inferred heart rate is slightly biased (i.e. it is 79). Differently, in the right (low\n\nprecision) panels, the inference converges much slower to a high\n\nprecision posterior, but without overfitting.\n\nThese simple examples of Bayesian inference illustrate two\n\nthings. First, sensory observations that are unpredictable given", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "**Figure 5. A** learning for the actual reward condition (reward condition left). The agent correctly\n\nlearned the probability of receiving rewards in the rewarding arm. It did not learn the probabilities of\n\nthe non-rewarding arm since it did not explore that option. The color grading signifies the likelihood\n\nof an observation being generated by a specific state. The more saturated the color, the higher\n\nthe likelihood.\n\n### *4.3. Fitting the Model to the Data*\n\nSimulations are useful for a variety of purposes, like exploring the consequences of\n\ndifferent priors and parameters and establishing the face validity of hypothetical mech-\n\nanisms underlying behavioural phenomena. However, we often want to use models to\n\nmake inferences about specific observed phenomena, like the differences in behaviour\n\nbetween various populations, as in computational psychiatry [ 14 ]. One standard method\n\nhere is model fitting, where we estimate the parameter values (e.g., prior beliefs) of an AIF\n\nmodel that are the most likely given some observed behaviour of a participant. This is often\n\nperformed with approximate Bayesian methods. In the cognitive and behavioural sciences,\n\nthe predominant method is Markov Chain Monte Carlo (MCMC) methods [ 34 ], which are\n\nslower but in the limit can estimate parameter posteriors without making assumptions\n\nabout their functional form. An alternative, which is more often used in other fields and\n\nalso available in ActiveInference is variational methods, which are faster but require mak-\n\ning assumptions about the functional form of the posterior. In general, MCMC methods\n\nare favourable when making parameter inferences (i.e., comparing parameters of the same\n\nmodel fitted to different data, like two groups of subjects). When performing a Bayesian\n\nmodel comparison (i.e., comparing different models fitted to the same data), the different\n\napproaches rely on different approximations of the model evidence, with the variational", - "page_start": 23, - "page_end": 23, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "6 Barca *et* *al.*\n\nparticipants processed faces expressing fear (but not neutral\n\nfaces or faces expressing other emotions) when their heart rate\n\nwas high—hence congruent with the fearful expression ( Pez- zulo et al. 2018 , Yu et al. 2021 ). The generative model shown in Fig. 1 could support this kind of inference by using interocep- tive information from the heart (i.e. high heart rate) as evidence\n\nthat “there might be something fearful out there” ( Pezzulo 2013 ).\n\nAnother more complex example regards emotional awareness\n\nand self-awareness—which significantly engage the brain regions\n\ninvolved in interoception and the representation of physiologi- cal processes ( Garfinkel et al. 2013 ). The generative model shown in Fig. 1 might support processes of emotional awareness in a way that is neither purely bottom-up (i.e. as if interoceptive sig- nals cause emotional awareness) nor top-down (i.e. as if emotional\n\nawareness causes interoceptive signals), but rather through a\n\ncircular causality between central predictions about bodily state—\n\nthat engage autonomic reflexes—and interoceptive streams—that\n\nupdate the predictions ( Seth and Friston 2016 ). In this perspec-\n\ntive, any representation that induces interoceptive predictions\n\ncould be associated with emotional or affective content; cru-\n\ncially, this is also the case with some aspects of self-awareness\n\n(e.g. recognizing one’s own face) that require integrating intero-\n\nceptive streams with concurrent exteroceptive (e.g. visual) and\n\nproprioceptive cues. These examples illustrate that the genera- tive model of Fig. 1 natively implements both the multisensory\n\nintegration required to unite (for example) interoceptive and exte-\n\nroceptive streams and the active aspects that are supposed to\n\nsupport emotional and self-processing—and the construction of an “embodied self” (i.e. the circular causality between engag-\n\ning autonomic reflexes and capturing the ensuing interoceptive\n\nsignals).\n\nIn general, the accuracy of the inference of hidden bodily\n\nstates, the “embodied self,” or other aspects of the model depends\n\non the signal-to-noise ratio of the sensations and on the quality of\n\nthe model. For example, it is difficult to self-localize in a city if it\n\nis dark (low signal-to-noise ratio) or if one does not know the city\n\nwell (poor model). The inference of hidden bodily and emotional\n\nstates might function in an analogous manner. If the quality of\n\nthe afferent interoceptive (e.g. cardiac) signals is low, or if one has\n\na poor model of how one’s body functions, then it would estimate\n\none’s bodily states such as fatigue incorrectly (which in turn would\n\nalso impair its adaptive regulation of the same bodily states). Inte-\n\nroceptive signals could be “too noisy” for various reasons, which\n\nmight be related to physiology, inflammation, or stress. The body\n\nmodel can be poor in various ways, too. For example, it could\n\npoorly characterize the statistical relations between interoceptive\n\nsensations and hidden bodily states (e.g. systematically mischar-\n\nacterize high heart rate as caused by hunger but not fatigue\n\nor joy).\n\nFinally, there is a third essential element that determines the\n\naccuracy of the inference: precision control. In predictive cod-\n\ning, the influence of prediction errors on inference is weighted by their precision, i.e. inverse variance (pink triangles in Fig. 1 ).\n\nThis weighting would ensure that very reliable sensations have\n\nmore impact on inference than unreliable sensations. However,\n\nprecision (like all other variables) needs to be estimated, but this\n\nmight be incorrect. An incorrect setting of precisions has been\n\nassociated with various psychopathological conditions, such as psychosis ( Adams et al. 2013 ), eating disorders ( Barca and Pezzulo", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" - }, - { - "text": "5 of 33\n\nquantities as its target: the variational free energy ( *VFE* ) in the case of perception and the\n\nexpected free energy ( *EFE* ) in the case of action. The *VFE* is the free energy associated with\n\na given sensory observation and is resolved perceptually by updating beliefs about the\n\nenvironment. The *EFE* is the free energy that is expected in the future, contingent on a\n\ngiven policy or course of action. Choosing action policies associated with a low *EFE* lead\n\nto reducing uncertainty about the environment, as well as making preferred observations\n\nmore likely.\n\n### *2.1. POMDPs in Active Inference*\n\nIn AIF, the POMDP is one of the most common families of generative models used\n\nto make inferences about the environment. It is a Markovian discrete state-space model,\n\nwhere employing it means representing the environment and observations as inhabiting\n\none among a set of possible (possibly multidimensional) states, and that the changes\n\nin these states can only depend on the system’s previous state and the agent’s actions.\n\nEnvironmental states are not directly observable, so they have to be inferred based on\n\nincoming sensory observations. In AIF for POMDPs and other generative models in general,\n\nboth perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3 ), as well\n\nas the learning of parameters of the generative model (see Section 2.4 ). Crucially, an agent’s\n\ngenerative model does not a priori have to be isomorphic to the true environment (i.e.,\n\nthe data-generating process), although this will generally lead to a successful inference,\n\nand that the generative model will therefore often come to resemble the environment\n\nthrough learning.\n\nA discrete state-space POMDP in AIF is conventionally defined by five main sets of\n\nparameters: **A** , **B** , **C** , **D** and **E** [ 1 , 33 ], see Figure 1 . Together, these parametrise the agent’s\n\nprior beliefs about the prior probability of different states in the environment, how states\n\nof the environment change and how they generate observations. Typically, they will be\n\nvectors, matrices or tensors; however, henceforth we denote them by their corresponding\n\nletter in bold. These make up the components needed for the agent to perform AIF.\n\n**A** , also called the *observation model* , represents the state-to-observation likelihood model.\n\nThis describes how observations depend on or are generated by states of the environment.\n\nIt is structured as a matrix with a column for each possible environmental state *s* , and a row\n\nfor each possible observation *o* . Each column is then a categorical probability distribution\n\nover the observations that will occur given the environmental state (meaning that each\n\ncolumn must contain non-negative values that sum to 1). If the observations are multidi-\n\nmensional (i.e., multiple observations are made at each time point), there is a matrix for\n\neach observation modality. If two or more states determine the observation, the likelihood\n\nmodel then becomes a tensor. If **A** is imprecise (i.e., the probabilities are highly entropic and\n\nevenly distributed), observations are taken to carry less information about the environment,\n\nin many cases leading to more uncertain inferences, and vice versa.\n\n**B** , also called the *transition model* , describes the state-to-state transition probabilities of\n\nenvironmental states *s* . **B** encodes the agent’s assumptions about how the environment\n\nchanges over time, depending on its actions. It has a column and a row for each environ-\n\nmental state *s* , where each column is a categorical probability distribution over the states\n\nthe environment will take on the next time step, given the state it is currently in. If the envi-\n\nronment is modelled as multidimensional, there will be a matrix for each environmental\n\nstate factor. Additionally, there is a separate matrix for each possible action (making each", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" - }, - { - "text": "8 Barca *et* *al.*\n\nprior is very high, the posterior will closely reflect the prior, ren-\n\ndering the inference rigid and incapable of adapting to changing\n\nenvironmental conditions—which might be especially problem-\n\natic in periods of significant changes, such as adolescence or more\n\nsimply when one changes city, working environment, and friends. Furthermore, as shown in Fig. 1 , hierarchical predictive coding\n\narchitectures have precision values associated with every hierar- chical level (whereas, for simplicity, the inference shown in Fig. 2\n\nis not hierarchical). The correct balance of precision parameters\n\nwithin and across layers is crucial for accurate inference, as it\n\nensures that the correct levels of confidence are assigned to data\n\nand prior information.\n\nFinally, and importantly, aberrant precision control (as well\n\nas various combinations of other factors discussed earlier, such\n\nas noisy bodily sensations and poor bodily mode) can render\n\ninference not just incorrect but also highly ambiguous, leaving a\n\nperson in a permanent condition of uncertainty about whether\n\none is fatigued (when considering the bodily state), happy, or sad\n\n(when considering the emotional state), what kind of person one\n\nis or what are one’s desires (when considering self-models), etc.\n\nImportantly, this condition of uncertainty is not limited to percep-\n\ntual inference but has a cascade effect on decision-making and\n\naction selection. Indeed, an uncertain estimate of one’s state auto-\n\nmatically implies that one has low confidence in the effects of\n\none’s plans; for example, it renders more difficult the prediction\n\nof whether a run would be too fatiguing or a party too stressful.\n\nIt is exactly this kind of uncertainty (about the present and the\n\nfuture, the body state or the outcomes of social interactions, etc.)\n\nthat active inference agents strive to avoid.\n\n#### **Avoiding excessive uncertainty in maladaptive ways**\n\nOur previous discussion clarified that active inference agents have\n\nsophisticated (hierarchically deep, temporally extended) models\n\nof themselves that permit making inferences at multiple levels\n\nabout hidden bodily states (which comprise both the classical\n\n“body schema” and other states that are relevant for allostasis,\n\nsuch as hunger, thirst, and fatigue) and other states related to\n\nthe emotional and embodied self. These models are essential for\n\nensuring effective regulation and control at multiple levels, from\n\nsimple reflexes to sophisticated goal-directed behaviors ( Tschantz et al. 2022 ). However, in some cases, the aforementioned inferen-\n\ntial process might not work properly (e.g. if the sensory channels\n\nare too noisy or are assigned excessively high or low precision).\n\nAs a consequence, a person could experience an excessive or\n\nirreducible uncertainty about her bodily and emotional states or\n\nabout the self, which in turn translates into a loss of confidence\n\nabout which future courses of action could produce desired out-\n\ncomes. Crucially, active inference agents follow the imperative\n\nto avoid such an uncertainty about the present or the future.\n\nNormally, uncertainty minimization strategies are adaptive (e.g.\n\nseeking advice if one is uncertain about the direction of the pre-\n\nferred restaurant). However, in some conditions, such as when\n\na person experiences excessive and irreducible uncertainty and\n\nwhen the uncertainty is particularly distressing or related to fun-\n\ndamental life concerns, she might potentially seek “maladaptive”\n\nways to reduce it—or methods that reduce uncertainty at the cost\n\nof hindering fundamental imperatives of well-being and survival\n\n(see also Linson et al. 2020 ).\n\nIn this perspective, apparently paradoxical actions, such as\n\nfood restriction and self-injurious behaviors, might be pursued\n\nbecause they could contribute to reducing the (otherwise unman-\n\nageable) uncertainty about bodily and emotional states or the self.", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed1.pdf" - }, - { - "text": "and current sensations in different modalities (e.g. interoceptive\n\nor exteroceptive). The latter (epistemic) objective is to reduce\n\nuncertainty about one’s estimated state. This means that active\n\ninference agents tend to avoid ambiguous states, encompass-\n\ning the avoidance of ambiguous places where self-localization is\n\nchallenging, ambiguous social situations where safety is uncer-\n\ntain, and ambiguous bodily states, such as unsure feelings of\n\nfatigue. However, one apparent exception to this aversion to ambi-\n\nguity arises when exploring novel states implies the opportunity to learn new things and enhance one’s model; see Friston et al.\n\n(2017) for a discussion. Furthermore, and importantly, active infer-\n\nence agents will actively operate in the environment to reduce\n\ntheir ambiguity; for example, by actively seeking informative sen-\n\nsations that disambiguate in which location they are (e.g. by\n\nlooking for traffic signs), whether their social context is safe\n\nor unsafe (e.g. by trying to understand other’s intentions from\n\ntheir facial expressions and actions), or whether they are cur-\n\nrently fatigued (e.g. by putting attention to one’s heart), happy,\n\nor sad.\n\nThe last examples—disambiguating one’s fatigue and emo-\n\ntional states—may seem strange if one assumes that we do have\n\ndirect access to the body- and allostasis-related states (e.g. states\n\nof satiation, thirst, and fatigue) and to our emotions (e.g. we\n\nautomatically know whether we are happy or sad). However, one\n\nassumption of active inference is that one’s bodily and emotional\n\nstates are not necessarily observable but, instead, “hidden states”\n\nthat need to be inferred on the basis of sensations (especially,\n\nbut not exclusively, of interoceptive sensations from the inside\n\nof the body) and of an implicit, unconscious model of how the body functions ( Barrett and Simmons 2015 , Pezzulo et al. 2015 ,\n\nSeth and Friston 2016 ). In other words, the same inferential pro-\n\ncess that allows active inference agents to estimate the hidden\n\nstate of the external environment (e.g. the presence or absence of\n\nan object in the environment) is also used to estimate other hid-\n\nden states, such as fatigue, happiness, or sadness. This implies\n\nthat one can also be wrong, or be fooled, about these states; for\n\nexample, we could experience the “interoceptive illusion” of feel-\n\ning more fatigued than our physiological parameters would afford ( Iodice et al. 2019 ).\n\nExtending this idea even further, one can assume that cer-\n\ntain emotional states, as well as self-awareness and the (embod-\n\nied) sense of self—and the feeling of continually being the same\n\nperson—could be constructed similarly: it would be the result of\n\nan inferential process that integrates bodily sensations and other experiences over time ( Gu et al. 2013 , Seth 2013 , Stephan et al.\n\n2016 , Barrett 2017 ). Figure 1 illustrates graphically this perspective\n\nby showing a (schematic) hierarchical generative model that links\n\n(exteroceptive, interoceptive, and proprioceptive) sensations at\n\nlower levels with multimodal models of hidden bodily states, such\n\nas fatigue and hunger at intermediate layers, and, finally, with\n\ntemporally extended, integrative models of the emotional and\n\nembodied self at the higher hierarchical level. The hierarchical\n\ngenerative model recapitulates a simple predictive coding archi-\n\ntecture, which includes various putative brain areas or networks\n\n(gray ovals) arranged hierarchically. In the schematic, networks for\n\nunimodal (exteroceptive, proprioceptive, and interoceptive) pro-\n\ncessing are situated at the lowest hierarchical level, multimodal\n\nnetworks are at an intermediate level, and networks for process-\n\ning a persistent model of the self are at the highest level. Note\n\nthat this simple schematic is not supposed to recapitulate brain\n\nanatomy but to illustrate the basic principles of hierarchical gen-\n\nerative models and predictive coding; (for a discussion of the", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "*Modeling and controlling the body in maladaptive ways* 9\n\n### Discussion\n\nCurrent theories of predictive processing and active inference\n\nassume that, to steer adaptive perception and action, the brain\n\nforms internal generative models of the environment and of the\n\nbody within it. Various studies reveal that the brain has rich\n\nmodels of the body; for example, it integrates somatosensory\n\nand proprioceptive information into a coherent representation\n\nof things like body size and limb position—i.e. a “body schema.”\n\nMore recently, this model-based perspective has been extended to\n\ninteroception—and the rich sensations we constantly receive from\n\nthe internal body. Theories of interoceptive processing propose\n\nthat the brain continuously estimates key bodily and homeo-\n\nstatic variables, such as thirst or fatigue levels, perhaps forming\n\nsomething like an “interoceptive schema.”\n\nA key reason for forming bodily or interoceptive models is\n\nthat they permit us to exert accurate control over the variety of\n\nsignals (e.g. somatosensory and interoceptive) that the body pro-\n\nduces. Forming an accurate body schema is prominent for motor\n\ncontrol, whereas modeling interoceptive variables (e.g. thirst)\n\nis key to keeping them under control by engaging autonomic\n\nreflexes (e.g. vasodilation) and allostatic or goal-directed actions\n\n(e.g. drinking) when they have incorrect values. The generative\n\nmodeling perspective can also be extended hierarchically to con-\n\nsider richer models of multimodal experiences and “embodied\n\nself” that persists in time and anchors our experiences, permit-\n\nting us to select adaptive courses of action to achieve our favorite\n\ngoals.\n\nWhile it seems obvious that controlling bodily variables and\n\nachieving goals are crucial for survival, this perspective poses a\n\nfundamental challenge. In control theory and active inference,\n\n“controlling” the body ensures that the body generates the pre- ferred outcomes with high (hedonic or pragmatic) value, e.g. safe\n\nlevels for thirst and fatigue. This idea applies naturally to many\n\nof our activities that pursue some form of biologically adaptive\n\nfunction or well-being, such as ensuring that we keep our bodies\n\nhealthy and consume good food ( Sterling and Eyer 1988 , Sterling\n\n2012 ). However, it fails to explain why we engage in some activi-\n\nties that are apparently maladaptive and contradict our primary\n\nbiological imperative to ensure body health. Perhaps the most\n\npuzzling examples are pathological behaviors (e.g. non-suicidal\n\nself-harm or starvation), which are common across psychopatho-\n\nlogical conditions. In these cases, the control exerted over the\n\nbody and its sensations might serve the purpose of generating out-\n\ncomes with high (hedonic or pragmatic) values that nevertheless\n\nrun against our homeostatic and survival imperatives (e.g. pain\n\nand excessive levels of hunger).\n\nIn this article, we started with formal accounts of brain pro-\n\ncessing based on active inference to discuss the mechanisms and\n\nfunctional purpose of the (apparently) maladaptive ways to “con-\n\ntrol the body” that arise in these and other psychopathological\n\nbehaviors. We first discussed how we build models of the world,\n\nof our bodily and interoceptive processes, of our emotions, and\n\nof the embodied self, which provides a sense of understanding of\n\nreality and affords adaptive control at many levels, from the allo-\n\nstatic regulation of our physiological states to the achievement of\n\nour individual and social goals. Then, we discussed under which\n\nconditions we can become highly uncertain about our current\n\nstate and the future course of action. These conditions include\n\nboth contextual factors (e.g. periods of noteworthy changes or\n\nstress) and factors related to the person’s internal models (e.g.\n\npoor models in which precision parameters are incorrectly set).\n\nWe next turned to active inference and discussed how reduc-", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed1.pdf" - }, - { - "text": "an active inference agent can continuously infer (and act upon)\n\nthe state of the world and of the body, including the internal\n\nmilieu, at multiple time scales. Of particular interest, here are\n\nmultimodal inferences that unite exteroceptive and interocep-\n\ntive sources of evidence. One example of this is the percep-\n\ntion of faces expressing emotions. Two studies reported that", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed1.pdf" - } - ] - }, - { - "references": { - "source_file": "pubmed1.pdf", - "query": "At what stage of childhood does the construction of narrative identity take place?", - "target_page": 3, - "target_passage": "Among the challenges that adolescents have to face are the structuring of a “narrative identity” or self-story, featuring the development of a sense of personal identity that integrates past experiences with current, and future goals and meanings in a coherent whole over time ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "4 Barca *et* *al.*\n\nreciprocity with caregivers and peers. Thus, in parallel to the\n\nnegotiation of identity with caregivers (through a relative detach-\n\nment from them, a renegotiation of intimacy, and the questioning\n\nof their confirmatory authority), the modifications of friendship\n\nstructures—from childhood to adolescence—lay the ground for\n\nthe progressive recognition of social contexts and peer relation-\n\nships as the elite territories for the modulation and exploration\n\nof personal identity. The redefinition that the adolescent has to\n\nface in these territories of exploration (of the self as an individ-\n\nual separated from the other and of the self with the other) might\n\npass through a phase of reduced coherence in the narration of\n\nthe self and hence an increased level of uncertainty. Coherence\n\nin the self’s narrative is considered a measure of well-being and\n\nhas been associated with psychopathology in adulthood ( Klim- stra and Denissen 2017 ) and adolescence ( Lind et al. 2020 , Shiner et al. 2021 ). For example, narrative incoherence has been found\n\nto be associated with personality disorders in adolescents ( Lind et al. 2019 ), where “identity diffusion” (e.g. feelings of emptiness\n\nand being fragmented and lack of a sense of continuity over time)\n\nmight be considered an expression of high levels of uncertainty of\n\nthe self.\n\nEmotion-wise, a developmental trend toward an increased\n\nspecificity of emotion-related maps of bodily sensations ( Barca et al. 2023 )—a proxy of interoceptive representations of\n\nemotions—has been reported from children aged 6 years to adult- hood ( Hietanen et al. 2016 ). Pubertal changes encompass dramatic\n\nbodily and neuroendocrine system changes, comprising—but not\n\nreduced to—changes in the reproductive, adrenal, and growth\n\naxes ( Cameron 2004 ). Thus, adolescents might face at least four\n\nsources of uncertainty: (i) the uncertainty due to physiological\n\nalterations related to bodily changes and to modification in hor-\n\nmonal levels leading to sexual maturity; (ii) the uncertainty in self- identity (i.e. the structure of self-awareness) and personal identity\n\n(i.e, the narrative diachronic self) ( Drummond 2021 ), which might\n\nbe coupled with changes in body image and the development of\n\ngender identity; (iii) the uncertainty in affect regulation, with the\n\nemergence of new forms of affectivity as feelings of love and sex-\n\nual attraction toward a partner; and (iv) uncertainty in the social\n\ncontext, with respect to their social status and role expectations\n\nin the adult society. Such high levels of uncertainty might lead\n\nto a poorly defined sense of self, with unclear boundaries and a\n\nsense of emptiness. In this context, pain becomes a possible way\n\nto recover a bodily sense of self, and self-injurious behavior might\n\nbe instantiated as an attempt to reduce the rise in the levels of\n\nuncertainty in these (and potentially other) domains, toward the transition to adulthood (see Miller et al. 2020 for a closely related\n\napproach on addiction).\n\n### Active inference, interoceptive processing, and uncertainty reduction\n\nActive inference is based on the idea that in order to engage in\n\nadaptive allostatic regulation and goal-directed behavior, living\n\norganisms continuously strive to minimize the surprise of their\n\nsensations or, more formally, an upper bound to surprise: varia- tional free energy ( Parr et al. 2022 ). Notably, the (expected) free\n\nenergy minimization processes that drive active inference jointly\n\nconsider two complementary objectives. The former (utilitarian)\n\nobjective is to realize one’s preferences, such as being satiated\n\nor safe, by minimizing the discrepancy between preferred sensa-\n\ntions (encoded as “priors over observations” in active inference)\n\nand current sensations in different modalities (e.g. interoceptive\n\nor exteroceptive). The latter (epistemic) objective is to reduce\n\nuncertainty about one’s estimated state. This means that active", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" - }, - { - "text": "the development of a sense of personal identity that integrates\n\npast experiences with current, and future goals and meanings in\n\na coherent whole over time ( McAdams and McLean 2013 , McLean\n\nand Lilgendahl 2019 ). The definition of the new boundaries of\n\nadolescents’ personal identity involves significant changes in the", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed1.pdf" - }, - { - "text": "obtaining land and developing plans for the permanent facility. The design, budget\n\nand schedule of the permanent facility are not finalized, and the ultimate timing, cost\n\nand scope of the facility are subject to risks attendant to large-scale projects.\n\nThe ability to construct the permanent casino facility is currently subject to resolu-\n\ntion of the Lac Vieux litigation. The 6th Circuit Court of Appeals has issued an\n\ninjunction prohibiting the City and the developers from commencing construction\n\npending further action of the 6th Circuit Court. Therefore, we do not know when\n\nwe will be able to commence construction of, or complete, the permanent facility.", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_MGM_2004.pdf" - }, - { - "text": "## * **3. Why Books are Important to Training AI** *\n\nDespite the proliferation of online content and some speculating that books would simply die\n\nout with the advent of the Internet, books remain a critical vehicle for disseminating 9\n\nknowledge. The more scientists study how books can impact people, the less surprising this\n\nis. Our brains have been shown to interact with longform books in meaningful ways: we\n\ndevelop bigger vocabularies when we read books; we develop more empathy when we read\n\nliterary fiction; and connectivity between different regions of our brain increases when we\n\nread. 10\n\nIn that light, it might be unsurprising that books are important for training AI models. A\n\nbroadly accessible books dataset could be useful not only for building LLMs, but also for\n\nmany other types of AI research and development.\n\n###### *Performance and Quality*\n\nThe performance and versatility of an AI model can significantly depend on whether the\n\ntraining corpus includes books or not. Books are uniquely valuable for AI training due to\n\nseveral characteristics.\n\n- **Length:** Books tend to represent longer-form content, and fiction books, in particular,\n\nrepresent long-form narrative. An AI trained on this longer-form, narrative type of\n\ncontent is able to make connections over a longer context, so instead of putting\n\nwords together to form a single sentence, the AI becomes more able to string\n\nconcepts together into a coherent whole; even after a book is divided into many\n\n“chunks” before the process of tokenization, that will still provide long stretches of\n\ntext that are longer than the average web page. While Web documents, for instance,\n\ntend to be longer than a single sentence, they are not typically hundreds of pages long\n\nlike a book.\n\n- **Quality:** The qualities of the training data impact the outputs a tool can produce.\n\nConsider an LLM trained on gibberish; it can learn the patterns of that gibberish and,\n\nin turn, produce related gibberish, but will not be very useful for writing an argument\n\nor a story, for instance. In contrast, training an LLM on books with well-constructed\n\narguments or crafted stories could serve those purposes. While “well-constructed”\n\nand “crafted” are necessarily subjective, the traditional role of editors and the\n\npublishing process can provide a useful indicator for the quality of writing inside of\n\nbooks. What’s more, metadata for books — information such as the title, author and\n\nyear of publication — is often more comprehensive than metadata for information\n\n“the novel, too, as we know it, has come to its end” — “The End of Books.” *Archive.nytimes.com* , 21 June 9\n\n1992, [archive.nytimes.com/www.nytimes.com/books/98/09/27/specials/coover-end.html](http://archive.nytimes.com/www.nytimes.com/books/98/09/27/specials/coover-end.html) . Accessed\n\n27 Aug. 2021.\n\nStanborough, Rebecca Joy. “Benefits of Reading Books: For Your Physical and Mental Health.” 10\n\n*Healthline* , 15 Oct. 2019, www.healthline.com/health/benefits-of-reading-books#prevents-cognitive-\n\ndecline .", - "page_start": 5, - "page_end": 5, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "(ii) to access critical public services, including—\n\n(aa) social services,\n\n(bb) services provided to victims (such as victims of crime),\n\n(iii) to move to a different place for self-isolation where it becomes impracticable to\n\nremain at the address at which they are self-isolating;\n\n(j) for the purposes of, or connected with, undertaking a test in accordance with Schedule 8\n\nor Schedule 10;\n\n(k) if self-isolating in a goods vehicle by virtue of paragraph (3)(d)—\n\n(i) for sanitary reasons,\n\n(ii) to take exercise outside,\n\n(iii) where required or permitted by that paragraph, to move to a different place for self-\n\nisolation,\n\n(iv) to inspect the vehicle or its load or to carry out any other task required for the safe\n\nand continued operation of the vehicle, including refuelling, and\n\n(v) for any other reason or purpose specified in this paragraph.\n\n(12) For the purposes of this regulation, the place referred to in paragraph (3) includes the\n\npremises where P is self-isolating together with any garden, yard, passage, stair, garage, outhouse,\n\nor other appurtenance of such premises.\n\n(13) If P is a child, any person who has custody or charge of P during P’s period of self-isolation\n\nmust ensure, so far as reasonably practicable, that P self-isolates in accordance with this\n\nregulation.\n\n(14) If P has arrived from Wales or Scotland and is in England, temporarily, for a reason which\n\nwould constitute an exception under paragraph (11), P is not required to comply with this\n\nregulation.\n\n(15) If P is a person described—\n\n(a) in paragraph 1(1) of Schedule 4—\n\n(i) where P is a person described in paragraph 1(1)(a) to (k) of, and meets the conditions\n\nset out in paragraph 1(3) of, that Schedule, P is not required to comply with this\n\nregulation,\n\n(ii) in any other case, paragraph (3)(b) and (c) does not apply to P;\n\n(b) in paragraph 1(2) of Schedule 4 (essential work for foreign country etc), P is not required\n\nto comply with this regulation;\n\n(c) in paragraph 33 of Schedule 4 (healthcare), paragraph (2) does not require P to remain in\n\nisolation in the circumstances set out in paragraph 33 of that Schedule;\n\n(d) in paragraph 43 of Schedule 4 (horticultural work)—\n\n(i) paragraph (2) does not require P to remain in isolation from any other person who is\n\nliving or working on the specified farm,\n\n(ii) paragraph (3)(a)(i) applies with the modification that the address specified by P as\n\nthe address at which they intend to self-isolate must be the specified farm, where\n\n“specified farm” has the meaning given in paragraph 43 of Schedule 4;\n\n(e) either—\n\n(i) in paragraph 44 of Schedule 4 (elite sports),\n\n(ii) in sub-paragraphs (1)(h) to (l) of paragraph 2 of Schedule 11 (exemptions from\n\nadditional measures applicable to arrivals from category 3 countries and territories),\n\nP satisfies the requirements of paragraph (2) if P complies with the relevant conditions\n\nspecified in paragraph 44(4) of Schedule 4;", - "page_start": 15, - "page_end": 15, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "and rephrased and asked follow-up questions to clarify and con fi rm\n\nthe correct understanding of participants ’ answers.\n\nAs similar themes arose repeatedly and no new themes\n\nemerged in the fi nal interviews, data saturation was achieved ( 23 ).\n\n#### 2.7 Analysis\n\nThe transcribed material was analyzed using systematic text\n\ncondensation (STC) ( 30 ) and was organized utilizing NVivo\n\n(version 1.7.1). STC is a method for cross-case analysis inspired\n\nby phenomenology. It involves four-steps: (1) identi fi cation\n\noverall themes from the empirical material, (2) extraction of\n\nmeaning units from the text which were then coded into groups,\n\n(3) condensation of all meaning units within the subgroups into\n\nan arti fi cial quotation, that summarize and represents\n\nparticipants ’ voices, (4) recontextualization of the material into\n\ncategories, presented as analytical texts. The process is iterative,\n\nresulting in continuous movement between the transcripts and\n\nwithin different steps of the analysis. An example of the STC\n\nprocess is illustrated in Figure 1 .\n\nThe fi rst author (SSHD) transcribed the interviews and read\n\nall material several times, while BN and ECA read most of the\n\ninterviews before preliminary themes were agreed on. SSHD\n\nidenti fi ed meaning units adhering to these themes and\n\ncoded them into groups. Condensates of the subgroups were\n\nwritten by SSHD and discussed by all researchers. SSHD then\n\nrecontextualized the material by forming categories\n\ndescribed as analytical texts supplemented by quotes, a process\n\nthat was discussed and revised several times by all authors.\n\nAll authors contributed to writing the manuscript.\n\nEnactive theory was used to interpret the results, aiming at\n\nextracting new knowledge beyond what the informants\n\nhad provided ( 28 ).\n\n### 3 Results\n\nParticipants were interviewed one-on-one by the fi rst author\n\n(SSHD) in November and December 2021 (mean = 14 days post-\n\noutdoor group). The time and place of the interviews were\n\nagreed upon according to participants ’ preferences (undisturbed\n\nof fi ce ( n = 14), participant ’ s home ( n = 1)). None dropped out.\n\nThe interviews lasted between 40 and 70 min (mean = 54, total =\n\n822) and were audio-recorded.\n\nThe results are presented as four categories summarized in\n\nFigure 2 and described below as analytic texts and illustrative\n\nquotes referenced with the participant ID and EDSS score.\n\nFIGURE 1\n\nExample of the analysis process (excerpts).\n\nDahl et al. [10.3389/fresc.2024.1303094](https://doi.org/10.3389/fresc.2024.1303094)\n\n[Frontiers in Rehabilitation Sciences](https://www.frontiersin.org/journals/rehabilitation-sciences) 05 [frontiersin.org](https://www.frontiersin.org/)", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed13.pdf" - }, - { - "text": "**33.** —(1) Any of the following—\n\n(a) a person (“P”) who—\n\n(i) before travelling to the United Kingdom has made arrangements with a provider in\n\nthe United Kingdom to receive healthcare (or, where P is a child, on whose behalf\n\nsuch arrangements have been made),\n\n(ii) is in possession of written confirmation of the arrangements from the provider,\n\n(iii) has travelled to the United Kingdom to receive that healthcare, and\n\n(iv) is attending a place to receive that healthcare or is travelling directly between that\n\nplace and the place where they are self-isolating;\n\n(b) a person who—\n\n(i) is accompanying P for the purpose of providing necessary care or support to P in the\n\ncircumstances referred to in sub-paragraph (1)(a)(iv), or\n\n(ii) is travelling, for the purpose of so accompanying P, directly between the place where\n\nthey are self-isolating and either of the places referred to in sub-paragraph (1)(a)(iv),\n\nwhere that person has travelled to the United Kingdom for that purpose and is in\n\npossession of the confirmation referred to in sub-paragraph (1)(a)(ii) or a copy of it;\n\n(c) an accompanying child who is accompanying P or, where P is a child, is accompanying a\n\nperson referred to in sub-paragraph (1)(b);\n\n(d) a live donor who is attending a place for the purpose referred to in the definition of “live\n\ndonor” or is travelling directly between that place and the place where they are self-\n\nisolating.\n\n(2) For the purposes of this paragraph—\n\n(a) “accompanying child”, in relation to P, means a child who has arrived in England with P\n\nand for whom P has responsibility, or where P is a child, a child who has arrived in\n\nEngland with the person referred to in sub-paragraph (1)(b) and for whom that person has\n\nresponsibility;\n\n(b) “healthcare” means all forms of healthcare provided for individuals, whether relating to\n\nmental or physical health, including healthcare in connection with giving birth;\n\n(c) “live donor” means a person who—\n\n(i) has travelled to the United Kingdom for the purpose of donation of material which\n\nconsists of or includes their human cells pursuant to arrangements made with a\n\nprovider in the United Kingdom before travelling to the United Kingdom, and which\n\nare to be used by the provider for the purpose of providing healthcare, and\n\n(ii) is in possession of written confirmation of the arrangements from the provider;\n\n(d) “provider” means a provider of healthcare;\n\n(e) references to a place where a person is self-isolating are to a place where they are\n\nrequired to self-isolate, or permitted to be at, by virtue of regulation 9.\n\n**34.** —(1) A person who has travelled to the United Kingdom for the purpose of transporting\n\nmaterial which consists of, or includes, human cells or blood and which is to be used for the\n\nprovision of healthcare by a provider.\n\n(2) For the purposes of sub-paragraph (1)—\n\n(a) “blood” includes blood components;\n\n(b) “healthcare” and “provider” have the meanings given in paragraph 33(2).\n\n**35.** A person who is an “inspector” within the meaning given in regulation 8(1) of the Human\n\nMedicines Regulations 2012( **a** ), or who has been appointed as an inspector under regulation 33 of\n\n( **a** ) S.I. 2012/1916.", - "page_start": 43, - "page_end": 43, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "potential problems at the engineering stage, at the supplier\n\nlevel, and in design models. We realize, of course, that\n\nproblems will still be found during the later stages.\n\nTherefore, feedback must be submitted quickly.\n\nThe third way is to take integration to a higher level.\n\nA vehicle consists of thousands of parts, so integration is\n\nneeded between various departments, such as design and\n\nengineering and engineering and production.\n\nThe other three elements of the Way are to reinforce a\n\nstrong sense of responsibility, standardize our engineering\n\nprocess to establish a higher level of quality, and seek\n\ncontinuous improvement. These are all basic but essential.\n\nOne other new means of ensuring quality we’ve\n\nestablished is the Project Quality Director or “PQD” system.\n\nI’ve assigned six PQDs to each of our vehicle lines,\n\nincluding overseas projects. The PQDs establish quality\n\ntargets at the initial stages of development and at certain\n\nmilestones. They also conduct quality clinic drives and test\n\npre-production models.\n\nIn the end, quality assurance involves more than just\n\nreacting to problems; we need to prevent them from ever\n\noccurring. To accomplish that, we test out countless\n\npossible scenarios, including collecting automotive parts\n\nthat have had quality problems and installing them on\n\nvehicles. This allows us to really understand the problem.\n\nWe also examine used cars at several stages to evaluate\n\nhow well our parts have endured under typical conditions\n\nsuch as sunlight and acid rain, and in comparison to those\n\nof the competition.\n\nAlthough we have standards and criteria for these\n\npotential concerns, we must assess actual trends and\n\nidentify our weak points if we are going to meet customer\n\nexpectations, which are getting higher all the time. To fulfill\n\nour commitments on quality, we need to examine every\n\nproduct throughout its entire life cycle. We must do this on\n\na global basis, and better than before.”\n\n### QUALITY\n\n“Quality is a crucial factor in Nissan’s success. Along\n\nwith trust, familiarity and differentiation, it is one of\n\nthe ways we express our brand. Quality builds the\n\ntrust of our customers and stakeholders, so it is also\n\na major element in promoting the brand.\n\nQuality was a major issue for us in 2004. We were\n\nunable to reach the global goals we set because a\n\ngreat deal of time was spent addressing issues that\n\narose, particularly in the U.S. The good news is that in\n\nall our newly launched vehicles, including those from\n\nthe U.S., we are seeing radically better quality. This is\n\na direct result of implementing a global quality\n\nmanagement system. While such positive outcomes\n\nare welcome, we must continue to upgrade the\n\nquality of Nissan automobiles.\n\nTo be frank, the quality programs of the past no longer suit\n\nour organization. During the NISSAN 180 period, we\n\nredefined the Nissan Product Quality Policy and\n\nreorganized its elements. The new Quality Policy sets three\n\ngoals. First, our product quality must be in the top three\n\namong automakers. Second, we will establish uniform\n\nglobal quality standards; this is not a single-fix solution,\n\nhowever, since each region may have its own requirements.\n\nAnd third, we will implement and continuously improve\n\nthe Nissan Quality Assurance Way, a global quality\n\nassurance system.\n\nThe Quality Policy is a top-down process, whereas the\n\nAssurance Way is bottom up. The Assurance Way can be\n\nsummarized as follows:\n\nFirst, we will set clear, reasonable, understandable\n\ntargets for each activity, and review milestones along\n\nthe way.\n\nSecond, because problems are usually discovered late\n\nin the process, we want to front-load the problem-discovery\n\nprocess by moving it further upstream. We must predict\n\n**The Quest for Improved Quality**\n\nEIJI IMAI\n\nSenior Vice President\n\nO U R W O R K", - "page_start": 50, - "page_end": 50, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "(iv) in the goods vehicle or a hotel, hostel or bed and breakfast accommodation while not\n\nundertaking the work described in that paragraph if P is travelling with another\n\nperson in a goods vehicle with a sleeper cab.\n\n(4) The address specified by P in the Passenger Locator Form pursuant to paragraph 2(a) of\n\nSchedule 6 must be—\n\n(a) their home;\n\n(b) the home of a friend or family member;\n\n(c) a hotel, hostel, bed and breakfast accommodation, holiday apartment or home, campsite,\n\ncaravan park or boarding house, canal boat or any other vessel;\n\n(d) a military site or establishment;\n\n(e) accommodation facilitated by the Secretary of State for the purposes of P’s self-isolation;\n\n(f) where P is an asylum seeker, accommodation provided or arranged under section 4, 95 or\n\n98 of the Immigration and Asylum Act 1999; or\n\n(g) where P is a person described in paragraph 9(1) of Schedule 10 to the Immigration Act\n\n2016 (powers of Secretary of State to enable person to meet bail conditions),\n\naccommodation provided or arranged under that paragraph.\n\n(5) More than one address may be specified as the place at which P intends to self-isolate in the\n\nPassenger Locator Form where—\n\n(a) a legal obligation requires P to change addresses; or\n\n(b) it is necessary for P to stay overnight at an address on their arrival in England before\n\ntravelling directly to another address at which they will be self-isolating.\n\n(6) In paragraph (3)(a)(ii) “a place at which they intend to self-isolate while in England”\n\nmeans—\n\n(a) where the person has completed a Passenger Locator Form, at an intended place of self-\n\nisolation specified in that form;\n\n(b) where the person has completed a form equivalent to a Passenger Locator Form pursuant\n\nto an enactment in Scotland, Wales or Northern Ireland, at an intended place of self-\n\nisolation specified in that form;\n\n(c) in any other case at a place described in paragraph (4)(a) to (c).\n\n(7) P must, on their arrival in England, travel directly to the place at which they are to self-\n\nisolate, and must then self-isolate until whichever is the earlier of—\n\n(a) the end of the 10th day after the day on which they arrived in England or, if later, the end\n\nof any period that applies by virtue of paragraph 2 or 3 of Schedule 8;\n\n(b) their departure from England; or\n\n(c) the beginning of P’s period of self-isolation, where P or R, where P is a child, is notified\n\nunder regulation 2A or 2B of the Self-Isolation Regulations( **a** ).\n\n(8) In paragraph (7)(c), “period of self-isolation” and “R” have the meanings given for the\n\npurposes of Part 1 of the Self-Isolation Regulations (see regulations 3 and 5 of those Regulations).\n\n(9) Paragraph (2) does not require P to remain in isolation—\n\n(a) from any person with whom they were travelling when they arrived in England and who\n\nis also self-isolating in the place where P is self-isolating;\n\n(b) where P is self-isolating in their home, from any member of their household;\n\n(c) where P is self-isolating in the home of a friend or family member, from any member of\n\nthe household of that friend or family member;\n\n( **a** ) A person notified, or a child in respect of whom a notification is given, under regulation 2A or 2B will be required to self-\n\nisolate in accordance with those Regulations from the moment the notification is given. Regulations 2A and 2B were\n\ninserted by S.I. 2021/364.", - "page_start": 13, - "page_end": 13, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "## **Part 3 Practical scenarios**\n\nThis part builds on the previous sections by describing some of the typical next steps and use\n\ncases. It also provides an overview of some specific deployment scenarios.\n\nThe following chapters are included in this part:\n\n� Chapter 7, “Use cases” on page 163\n\n� Chapter 8, “Special topics” on page 191\n\n**Part 3**", - "page_start": 176, - "page_end": 176, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "OTC_NSANY_2004.pdf", - "query": "What was the indicator related to increasing Nissan's research and development activities in terms of publication of scientific articles in 2004?", - "target_page": 46, - "target_passage": "And the number of research papers we present at societies such as The Japan Society of Mechanical Engineers rose dramatically in fiscal 2004. ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Due to changes in government regulations, information on risks involved in business operations has been disclosed in the Yukashoken-Houkokusho for the year ended March 31,2005 as follows:\n\nEconomic Factors\n\nThe demand for products manufactured by Nissan is affected by the\n\neconomic conditions in each country or market in which they are offered\n\nfor sale. Nissan conducts its operations all over the world and, in particular,\n\nin the major markets of North America, Europe, and Asia, to say nothing of\n\nJapan. While Nissan strives to develop a comprehensive and integrated\n\nprojection of the global economic outlook, any greater-than-anticipated\n\ndownturn in one of these markets may have a significant effect on Nissan\n\nfinancial position and results of operations.\n\nInternational Activities and Overseas Expansion\n\nNissan’s manufacturing and marketing activities outside Japan are\n\nconducted in the United States, in Europe, and in the developing and\n\nemerging markets of Asia. Nissan forecasts and evaluates a wide variety of\n\nrisks inherent in doing business in such overseas markets including the\n\nfollowing factors, each of which entails a greater-than-anticipated level of\n\nrisk:\n\n- Unfavorable political or economic factors\n\n- Legal or regulatory changes\n\n- Potentially adverse tax consequences\n\n- Labor disputes including strikes\n\n- Difficulties in recruiting and retaining personnel\n\n- Social, political or economic turmoil due to terrorism, war, or other\n\ndestabilizing factors.\n\nResearch and Development\n\nNissan’s technology must be “real world”—useful, pragmatic and easy to\n\nuse. Nissan anticipates the nature and scope of the market demand, and\n\nthen prioritizes and invests in new technologies. Nonetheless, any sudden\n\nand greater-than-anticipated changes in its business environment or in\n\ncustomer preferences may impact negatively on customer satisfaction with\n\nthese new technologies.\n\nProduct Defects\n\nNissan places a high priority on safety and does its best to enhance safety\n\nfrom the standpoint of research and development, manufacturing and\n\nsales. Although Nissan takes out insurance policies to cover product\n\nliability, this does not necessarily mean that all potential defects and the\n\nrelated liabilities are fully covered. If Nissan were to implement strict\n\nproduct recalls for its customers, Nissan would incur significant additional\n\nexpenses which could adversely affect its financial position and results of\n\noperations.\n\nFluctuation in Foreign Currency Exchange Rates\n\nNissan’s Japanese operations export vehicles to various countries around\n\nthe world. In general, the appreciation of the yen against other currencies\n\nadversely affects Nissan’s financial results of operations and, on the\n\ncontrary, the depreciation of the yen against other currencies favorably\n\naffects Nissan’s financial results of operations. Any sharp appreciation of\n\nthe currencies of those countries against the yen could lead to increases in\n\nboth procurement and production costs which would adversely affect\n\nNissan’s competitiveness.\n\nDerivatives\n\nNissan utilizes derivatives transactions for the purpose of hedging its\n\nexposure to fluctuation in foreign exchange rates, interest rates and\n\ncommodity prices. While Nissan can hedge against these risks by using\n\nderivatives transactions, Nissan, by so doing, may miss the potential gains\n\nwhich could result from seizing the market opportunities to profit from such\n\nfluctuation in exchange rates and interest rates.\n\nIn addition, Nissan manages its exposure to credit risk by limiting its\n\ncounterparties to financial institutions with high credit ratings. However, a\n\ndefault by any one of these counterparties could have an adverse effect on\n\nNissan’s financial position and operating results.\n\nLawsuits and Claims\n\nWith respect to various lawsuits and claims which Nissan encounters, the\n\npossibility exists that the position defended by Nissan will not be accepted", - "page_start": 72, - "page_end": 72, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Share Performance in Fiscal 2004**\n\nNissan’s share price began at ¥1,143 at the beginning\n\nof fiscal 2004 and ended the fiscal year at ¥1,099,\n\ngenerating a negative return of 3.85 percent. Total\n\nshareholder return (TSR) was -1.67 percent, while the\n\ndividend yield came to 2.18 percent (¥24 per share dividend,\n\ndivided by the ¥1,099 closing price). Adverse movements\n\nin foreign exchange rates and commodity price hikes\n\nadversely affected Nissan’s profitability, which was reflected\n\nin the share price. In addition, specific events relating\n\ndirectly to the company also had a negative impact. Later in\n\nthis report, corporate officers will explain what actions\n\nNissan has undertaken to ensure better performance.\n\n**Payout Policy**\n\nNissan announced its NISSAN Value-Up three-year dividend\n\npolicy, covering the period from fiscal 2005 to fiscal 2007, at\n\nthe annual general meeting of shareholders on June 23,\n\n2004. Nissan proposes a long-term dividend policy to\n\nprovide more visibility and improve transparency into the\n\nways in which Nissan rewards its shareholders. Nissan\n\nbelieves that a long-term dividend policy reduces uncertainty\n\nfor investors who already own or are considering acquiring\n\nNissan stock.\n\n**IR Activities**\n\nUnder NISSAN Value-Up, the IR team’s performance will\n\nbe evaluated based on the price-earnings ratio (PER) and\n\nvolatility relative to our major competitors. PER is used to\n\nmeasure how successfully the IR team manages market\n\nexpectations about Nissan in order to maintain the Nissan\n\nshare price close to an intrinsic value. The other measure,\n\nvolatility, is used to measure the risk investors perceive\n\nwhen considering Nissan stock. If Nissan can successfully\n\nreduce volatility, the minimum return required by investors\n\nshould decline. The IR team believes that a strengthening\n\nof disclosure activities is required to improve both\n\nmeasures. The team plans to disclose not only financial\n\nresults but also more forward-looking information about\n\nNissan fundamentals such as technology and product.\n\nSuch forward-looking information helps investors to\n\nforecast future performance more precisely and reduces\n\nuncertainty about the future. As a consequence, Nissan will\n\nincrease the number of investor conferences, events, and\n\nteleconferences during fiscal 2005.\n\nP E R F O R M A N C E\n\n### FISCAL YEAR 2004 SHARE PERFORMANCE\n\nDESPITE NISSAN’S RECORD OPERATING RESULT IN FISCAL 2004, ITS STOCK PERFORMANCE RETURN WAS\n\nNEGATIVE AND LOWER THAN THE TOPIX INDEX. THE INVESTOR RELATIONS TEAM WAS STRENGTHENED\n\nAT THE START OF FISCAL 2005 TO BETTER ADDRESS THE NEEDS OF INVESTORS AND ENHANCE THEIR\n\nUNDERSTANDING OF NISSAN’S PERFORMANCE. INVESTORS WILL NOW BE ABLE TO GAIN A MORE IN-DEPTH\n\nVIEW OF THE COMPANY’S OPERATIONS AND PERFORMANCE INDICATORS.\n\n120\n\n110\n\n100\n\n90\n\n80 <sup>Apr.</sup> **2004 2005**\n\nMay June July Aug. Sept Oct. Nov Dec. Jan. Feb Mar.\n\nTOPIX Transportation Equipment Index Nissan\n\nTOPIX\n\n**Fiscal Year 2004 Share Performance**\n\n(Index: April 1, 2004=100)\n\n400\n\n300\n\n200\n\n100\n\n0 **’01 ’02 ’03 ’04 ’05**\n\nTOPIX Transportation Equipment Index\n\nNissan\n\nTOPIX\n\n**Five-Year Share Performance**\n\n(Index: April 3, 2000=100)", - "page_start": 16, - "page_end": 16, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Lawsuits and Claims\n\nWith respect to various lawsuits and claims which Nissan encounters, the\n\npossibility exists that the position defended by Nissan will not be accepted\n\nand that the outcome may be significantly different from that anticipated.\n\nAs a result, any such verdict or settlement could adversely affect Nissan’s\n\nfinancial position and operating results.\n\nGovernment Regulations\n\nThe automobile industry worldwide is influenced by a broad spectrum of\n\nregulations governing the emission levels of exhaust fumes, fuel economy\n\nguidelines, noise level limitations and safety standards, and Nissan expects\n\nthese regulations to become increasingly stringent. In order to ensure\n\ncompliance, it may be necessary for Nissan to make significant ongoing\n\ninvestments in these areas which would have an impact on its financial\n\nposition and results of operations.\n\nIntellectual Property Rights\n\nNissan owns a wide variety of proprietary technologies and has the\n\nexpertise to differentiate Nissan’s products making them unique from\n\nthose of its competitors. These assets have proven their value in the\n\ngrowth of Nissan’s business and will, no doubt, continue to be of value in\n\nthe future. Nissan strives to protect its intellectual property assets;\n\nhowever, in certain markets, Nissan may encounter difficulty in fully\n\nprotecting the proprietary rights to its own technologies. Cases may arise\n\nwhere Nissan finds itself unable to prohibit others from infringing on its\n\nintellectual property rights.\n\nThe Company has established Intellectual Property Rights Management\n\nDepartment for the purpose of protecting intellectual property rights in\n\nspecific areas, strengthening activities to protect Nissan’s intellectual\n\nproperty rights, and abstracting new intellectual property rights. And the\n\ndepartment has been performing various activities to protect and create\n\nNissan Brand.\n\nNatural Disasters\n\nNissan’s corporate headquarters and many of its manufacturing facilities\n\nare located in Japan, where the statistically proven probability of\n\nearthquakes is higher than in many other countries. Nissan has developed\n\nrisk management guidelines relating to earthquake damage and the CEO\n\nhas organized a global task force to direct disaster prevention and recovery\n\nactivities. In addition, the Gruop has begun to strengthen its manufacturing\n\nfacilities with anti-seismic reinforcement. However, if a severe earthquake\n\nwere to hit one of Nissan’s key facilities causing a halt in production, this\n\nwould adversely affect Nissan’s financial position and results of operations.\n\nSales Financing Business Risk\n\nSales financing is an integral part of Nissan’s core business, providing\n\nstrong support to its automotive sales, while maintaining high profitability\n\nand a sound and stable financial condition through strict risk management\n\npolicies. However, the sales financing companies have a high exposure to\n\ninterest-rate risk, residual value risk, and credit risk, any one of which may\n\nadversely affect Nissan’s financial position and results of operations.\n\nCounterparty Credit Risk\n\nNissan does business with a variety of counterparties and manages its\n\ncounterparty credit risk by conducting a comprehensive annual assessment of\n\nits customers’ financial condition based on their financial information.\n\nNonetheless, any significant default by a counterparty would adversely\n\naffect Nissan’s financial position and results of operations.\n\nEmployee Retirement Benefit Expenses and Obligations\n\nThe amount of retirement Nissan’s benefit obligation and related expenses\n\nare calculated using various actuarial assumptions including the discount\n\nrate applied, the projected rate of return on plan assets, and so forth. If\n\nNissan’s actual results differ from those assumptions or if the assumptions\n\nare changed, the resulting effects will be accumulated and recognized\n\nsystematically over future periods. The cumulative effect could adversely", - "page_start": 72, - "page_end": 72, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "## OUR WORLD\n\nO U R W O R L D\n\nNISSAN HAS A GLOBAL PRESENCE. BORN IN JAPAN, WE ARE PERFECTLY\n\nAT HOME IN THE U.S., THE UK, SPAIN, THAILAND, CHINA, EGYPT, BRAZIL\n\nAND WELL OVER 150 OTHER NATIONS WHERE NISSAN CARS AND\n\nTHEIR COMPONENT PARTS ARE PRODUCED, SOLD AND DRIVEN.\n\nWITH NISSAN, DRIVING PLEASURE IS A SENSATION THAT KNOWS NO BORDERS.\n\nTHIS IS THE NISSAN SHIFT_", - "page_start": 59, - "page_end": 59, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Our Alliance with Renault has also provided substantial\n\npurchasing benefits and opportunities. Formed in 2001, the\n\nRenault Nissan Purchasing Organization, or RNPO, now\n\naccounts for over 70 percent of all purchasing for Nissan\n\nand Renault. Nissan will further benefit from RNPO through\n\nthe utilization of Renault supply bases in certain LCCs.\n\nAlthough the turnaround in the Nissan business has\n\nbeen profound, we also recognize that our supplier partners\n\nhave played a significant role. Going forward, we intend to\n\nreinforce those relationships, building value on both sides.\n\nFor example, we are reinvigorating our innovative 3-3-3\n\nengineering program.\n\nWe are also deploying a purchasing process that gets\n\nsuppliers involved earlier and further upstream in the\n\nproduct development process, the concept of ‘project\n\npartners’. This is a program that identifies key technologies\n\nand innovations that require substantial investments from\n\nboth sides. Suppliers will be selected as project partners for\n\na specific area and will work closer with us to develop\n\nlower cost and higher quality solutions. This win-win\n\napproach has already started with interior systems and\n\nchassis development projects.\n\nLast year, we faced several challenges with raw\n\nmaterials. Those risks—both price and supply related—are\n\na factor that we have to recognize and address in the\n\ncoming years. Last year, the pressure was concentrated on\n\nthe supply side, going forward we see an increasingly\n\nchallenging cost environment. Working closely with our key\n\nraw material suppliers as well as parts suppliers and\n\naccelerating our cost reduction countermeasures will be\n\nkey during NISSAN Value-Up.\n\nOur purchasing philosophy at Nissan is focused on\n\nvalue, quality and relationships. We want our purchasing\n\nprocess to be transparent and proactive, and create more\n\nvalue for our suppliers and for the company.”\n\n### PURCHASING\n\n“The evolution that took place in Nissan’s purchasing\n\nactivities during the Nissan Revival Plan, or NRP, and\n\ncontinued through NISSAN 180, will stretch even further\n\nduring NISSAN Value-Up. Why evolution and not\n\nrevolution? Because the shift in purchasing that started\n\nsix years ago was not a single action, it was a mindset\n\nchange that continues to drive all our activities.\n\nPurchasing represents the single largest area of\n\ncost for Nissan. Through the NISSAN Value-Up\n\nbusiness plan, we are determined to drive greater\n\nvalue from our purchasing activities and maintain the\n\nmomentum built over the last six years.\n\nDuring the Nissan Revival Plan years, our focus\n\nwas on catching up with the rest of the industry.\n\nNISSAN 180 was focused on reaching the\n\nbenchmarks set during NRP and now as we enter the\n\nNISSAN Value-Up period, that focus evolves towards\n\nbeing the global cost leader.\n\nOne of the key breakthrough strategies of\n\nNISSAN Value-Up is the focus on new and emerging\n\nmarkets. On the sales side, markets like China, India,\n\nRussia and ASEAN represent significant opportunities\n\nfor Nissan. On the purchasing side, we look at the\n\ncost competitiveness of these new markets and how\n\nwe can increasingly use them to enhance our global\n\ncompetitiveness.\n\nOur strategy for what we call ‘Leading Competitive\n\nCountries’, or LCCs, is to focus on those markets that we\n\nsee as trend leaders in both cost, quality and supply\n\nstability. We will focus first on China and then on ASEAN\n\nnations. This will bring cost advantages for our major\n\nregions, such as Japan, North America and Western\n\nEurope, making us more competitive. We’re also\n\ninvestigating sourcing from Eastern Europe, the Mercosur\n\ntrading zone, and India.\n\n**More value, Higher quality,**\n\n**Win-win partnerships** HIROTO SAIKAWA\n\nExecutive Vice President\n\nO U R W O R K", - "page_start": 49, - "page_end": 49, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "W H O W E A R E\n\nNISSAN IS ABOUT MEETING UNMET NEEDS, CRAFTING SINGULAR PRODUCTS\n\nAND TRANSFORMING BRAND STRENGTH AND INNOVATION INTO NEW BUSINESS\n\nOPPORTUNITIES. WE ARE NISSAN. WE ARE INFINITI. WE ARE NISSAN LIGHT\n\nCOMMERCIAL VEHICLES, EXPANDING OUR RANGE. WE ARE NISSAN INDUSTRIAL\n\nMACHINERY, LEVERAGING OUR EXPERTISE TO BUILD FORKLIFTS AND MARINE\n\nPRODUCTS. AND WE ARE NISSAN FINANCIAL SERVICES, PROVIDING OUR\n\nCUSTOMERS WITH A COMPREHENSIVE LINEUP OF OFFERINGS.\n\nTHIS IS THE NISSAN SHIFT_\n\n## WHO WE ARE", - "page_start": 17, - "page_end": 17, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "### EUROPE\n\n**Making Profit as a Smaller Player**\n\nO U R W O R L D\n\n“Europe is one of the most\n\nfragmented automotive\n\nmarket in the world and\n\na highly competitive one\n\nbesides. Despite our\n\nrelatively small size,\n\nhowever, we have begun to\n\ndemonstrate that it is\n\npossible to make money in\n\nEurope. In fact, although\n\nNissan does not yet deliver\n\nthe levels of profitability here\n\nthat the U.S. or other markets generate, we surpassed\n\nour NISSAN 180 business targets in fiscal 2004. Our\n\nprofitability is now on par with the best European\n\nmanufacturers. Nissan has a foundation for increasing\n\nprofitability further in the coming years in Europe.\n\nNissan is already an established name around the\n\nregion, and the brand is strongly associated with 4x4\n\ntechnology, off-road vehicles and pickup trucks.\n\nHowever, there is also a solid heritage built around\n\nthe Micra, a model designed for urban driving. Both\n\nthe first and second generations of this car were very\n\nsuccessful, and the third generation is performing\n\nwell. To leverage our 4x4 heritage and SUV strength\n\ninto the passenger car segment, Nissan is developing\n\na series of crossover vehicles that blend car-like\n\nperformance with 4x4 versatility. The Qashqai concept\n\nvehicle introduced at the 2004 Geneva Motor Show is\n\nthe first of these—smaller, more affordable, and\n\nbetter adapted to European roads. The Qashqai will\n\ngo into production in our plant in Sunderland in the\n\nUK in early 2007. The Murano, launched this year, is\n\na precursor to the Qashqai in the larger executive\n\nsegment. Europeans have already taken to the\n\nMurano, driving sales far past our initial forecasts in\n\nall markets. This car is helping make Nissan a brand\n\nthat people aspire to own.\n\nNissan is still a small player in the region, selling 550,000\n\ncars across a very large and diverse territory that stretches\n\nfrom the Atlantic Ocean to Russia, and from Finland to\n\nIsrael. In the past we covered the area through multiple\n\ndistribution channels, which we are currently in the process\n\nof simplifying. A few aspects of the European market have\n\nmade profitability more difficult to achieve. For example,\n\nautomakers must provide models with much diversity:\n\ndiesel and gasoline powertrains; manual and automatic\n\ntransmissions. The cars must also be engineered to suit the\n\nhigh driving speeds typical in the region and ensure\n\nsuperior handling, which results in higher costs.\n\nAs in many other mature markets, an incentive war is\n\nraging in Europe. Nissan’s position here, as elsewhere, is to\n\nuse incentives selectively and to always protect profitability.\n\nProviding products which customers recognize and\n\nappreciate for their style and attributes rather than being the\n\nbest deal is the foundation of Nissan’s profitable growth. We\n\nnow have a wide range of products, five of which were newly\n\nlaunched in 2005, including the Pathfinder and the Navara\n\npickup. We will release the Micra C+C at the Frankfurt Motor\n\nShow in September, giving customers the option of a unique\n\nstandard glass roof in a fully retracting hard convertible top.\n\nNissan’s manufacturing still defines the leading edge in\n\nEurope. According to *The Harbour Report* , our plant in\n\nSunderland is the most productive plant in Europe.\n\nSunderland will start production on a new B-segment car\n\nbased on the Tone concept car in early 2006, followed by\n\nthe Qashqai crossover vehicle in early 2007. Our Barcelona\n\nplant, which manufactures SUVs, 4x4s and light\n\ncommercial vehicles, will reach full capacity in mid-2005.\n\nFinally, our truck plant in Avila, Spain, which specializes in\n\nlight-duty trucks, will start producing a replacement for the\n\npopular Cabstar in late 2006. This efficient production\n\nbase is a critical part of our profitable growth scenario.\n\nNISSAN Value-Up has given us a plan for building both\n\nprofit and volume. We will not, however, sacrifice profit to\n\ngain volume. How far we can go depends on how fast we", - "page_start": 62, - "page_end": 62, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**4**\n\n## LETTER FROM THE COO\n\nMuch has been written about the Nissan revival. While\n\ninnovative product, an improved cost base, greater\n\nmanufacturing efficiencies and a better-defined brand have all\n\nbeen factors, the strongest element in our revival has been our\n\npeople. And, what we learned during the crisis in the 90s and\n\nthrough the Nissan Revival Plan and Nissan 180 plan, now\n\nguides how we will manage the company in the future. We call\n\nit the Nissan Management Way. It is both a philosophy and set\n\nof disciplines that guide us at all levels of the organization and\n\nwill help Nissan build on the momentum of the past six years.\n\nAlthough our president and CEO Carlos Ghosn has now\n\ntaken on the same responsibilities at Renault, our basic\n\nmanagement style will not change. As in the past, the\n\nExecutive Committee, chaired by Carlos Ghosn, is still the\n\nhighest decision making authority for strategy and\n\nmanagement policy.\n\nThe COO position I now hold was created to provide an\n\n“operating officer” in the truest sense of the title. As COO my\n\nrole is to assist the CEO by executing the business plan,\n\nmonitoring the Company’s performance and supervising day-\n\nto-day operations. The decisions I make are always based on\n\nthe Nissan Management Way and support the commitments\n\nof the NISSAN Value-Up business plan.\n\nWhat distinguishes the Nissan Management Way is that\n\nwe are both profit-driven and customer-focused, and that we\n\nshare our strategy globally and execute in a cross-functional\n\nway. These cross-functional activities are particularly important\n\nto our success; along with cross-functional thinking, they have\n\nhelped create an organization of singular structure, focus and\n\nculture. In this organization, employees representing each of\n\nNissan’s three axis—regional businesses such as Japan and\n\nU.S., functions such as engineering and manufacturing, and\n\nproducts—are actively encouraged to work together to\n\nmaximize profits and to avoid a ‘silo’ mentality that is only\n\nfocused on their immediate operational group.\n\nFiscal 2005 is a year of immense challenges and\n\nuncertainties, but we have still pushed ahead with an\n\nambitious business plan for this period. As COO, my priority is\n\nto keep a close watch on Nissan’s performance to ensure that\n\nwe deliver our commitments. These include achieving the final\n\nNissan 180 commitment of one million additional vehicles by\n\nthe end of September 2005 and hitting our financial targets\n\nfor fiscal 2005. There is no doubt that we have the strong\n\nleadership and management teams capable of sustaining the\n\nhigh level of performance required to reach these goals.\n\nNissan is now a learning organization. We have fully\n\nintegrated the changes that began during the Nissan Revival\n\nPlan and continue to shape our business in the future. Our\n\nemployees continually seek to build a better Nissan and fortify\n\nthe brand, and are not afraid to speak out on issues and\n\nopenly discuss challenges that face the business. Within the\n\nNissan Management Way, we call that “healthy conflict”— and\n\nit strongly related to our belief in transparency and\n\naccountability. This is the essence of the evolution that\n\ncontinues to empower our company.\n\nOur alliance with Renault also continues to be a source of\n\nimmense strength. We expect to further reinforce the Alliance\n\nand to develop new synergies now that Carlos Ghosn is the\n\nCEO of both companies.\n\nWhile we have the kinds of advantages I have mentioned,\n\nwe also have risks. One of those risks is complacency. During\n\nthe last six years, we have made significant achievements and\n\nconsistently met tough commitments, but countless challenges\n\nremain. Our industry is immensely competitive, our customers\n\nmore demanding than ever and we have no time to rest and\n\ncongratulate ourselves. We need to create a culture where\n\nemployees are always motivated to challenge themselves and\n\nthe company and to create value for all our stakeholders.", - "page_start": 5, - "page_end": 5, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Nissan’s position today is much different than it was six years ago or even three years ago. In\n\n1999, we were in crisis, and the Nissan Revival Plan was needed to revive our company and\n\nbuild a future. In April 2002, when NISSAN 180 began, we wanted to complete the revival\n\nprocess, with an emphasis on profitable growth.\n\nNISSAN Value-Up is about sustaining performance. About taking all the gains we have\n\nmade in connecting with our customers, in growing volumes, in creating value, in earning profits,\n\nin improving management— and then building upon these gains.\n\nWith NISSAN Value-Up, you will not see a radical break from NISSAN 180. This plan is\n\nevolutionary, not revolutionary. We will take the core elements that got us to this point—namely,\n\nmore revenue, less cost, more quality and speed, and maximized Alliance benefit with Renault—\n\nand build upon them.\n\nNISSAN Value-Up has three critical commitments:\n\nProfit: Nissan will maintain the top level of operating profit margin among global automakers\n\nfor each of the three years of the plan.\n\nVolume: Nissan will achieve global sales of 4.2 million units measured in fiscal 2008.\n\nROIC: Nissan will achieve a 20 percent ROIC on average over the course of the plan, based\n\non the new formula that excludes cash on hand from the denominator.\n\nNISSAN Value-Up will oversee 28 new models, resulting in the start of production of 70\n\nmodels worldwide, over two dozen more than the 44 production starts during NISSAN 180. Of\n\nthe 28 new models, 18 will be replacements for existing models and 10 will be completely new\n\n“conquest” models. We will enter more new segments, and we will introduce six models that will\n\ndelight customers by being completely innovative in their concept and benefits.\n\nWe will pursue four major breakthroughs while implementing NISSAN Value-Up:\n\n- Our Infiniti luxury brand will extend its reach into new markets such as China and Russia and\n\ncontinue to establish its credibility as a Tier-1 luxury player.\n\n- We will develop our Light Commercial Vehicle (LCV) business into a fully competitive global\n\noperation through new market and product entries. By 2007, we plan to increase our LCV\n\nvolume by 40 percent from fiscal 2004 to 434,000 units. During this period, operating margin\n\nis targeted to double from 4 percent to 8 percent.\n\n- We will take a more efficient global sourcing approach to maximize our opportunities and\n\nminimize our overall costs as we grow. Our engineering, production and purchasing functions\n\nwill continue their acceleration toward being fully integrated global operations.\n\n- We will continue to invest in new and emerging markets, including China, India and Russia.\n\nP E R F O R M A N C E\n\n**NISSAN Value-Up: Sustaining Performance**", - "page_start": 11, - "page_end": 11, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Motorsports MOTORSPORTS\n\nMotorsports is a dynamic form of marketing that\n\noffers a natural forum for presenting the Nissan\n\nbrand. On the track, Nissan’s technologies are\n\npushed to the limit—and sometimes beyond—\n\nunder grueling conditions.\n\nNissan participates in a wide range of\n\nmotorsports, including the Super GT Series.\n\nThis is the most popular racing series in Japan,\n\nand is increasingly broadcast around the world.\n\nMotorsports will remain an important marketing\n\noutlet that enhances both Nissan’s brand\n\npresence and our engineering capabilities.\n\nO U R W O R K\n\nJUNICHI ENDO\n\nSenior Vice President\n\n**Aftersales**\n\n“Aftersales was established in 2002 because Nissan\n\nwanted to expand the scope of what was once the\n\nParts Division. Our primary objective is to extend the\n\nvalue chain. We are trying to engage new-car owners\n\nfor a longer time by offering an extensive range of\n\nattractive aftersales products. These products\n\ninclude parts, service contracts, conversion—both\n\naccessories and customization—and new service\n\nmethods such as quick inspection and quick body\n\nrepair. Global Aftersales covers the downstream\n\nbusiness in cooperation with other marketing and\n\nsales divisions.\n\nThis has become an increasingly global function as we\n\ndeploy and monitor various programs throughout the world.\n\nFor example, Project SX, the new Nissan service standard,\n\nshould drastically improve dealer service operations. This\n\nprogram educates dealers on how to be more customer-\n\noriented by providing insights into productivity, marketing\n\nand management. To increase service productivity and\n\nefficiency, we send former factory foremen and engineers\n\nto various service workshops to analyze service staff\n\nperformance. This will help cut repair times and improve\n\ncustomer satisfaction. The Nissan Sales and Service Way is\n\nalso a tool used to increase the quality of service provided\n\nby all dealers. Its successful implementation has enhanced\n\ncustomer satisfaction worldwide.\n\nThe conversion business in Japan looks very promising.\n\nWe discovered that 50 percent of car owners want to\n\ncustomize their vehicles, and 28 percent already had. Such\n\na high penetration rate illustrates how much people want a\n\ncar that’s different from everyone else’s. The Rider series—\n\ncustomized versions of Nissan cars developed by our\n\nwholly owned subsidiary Autech—are very popular,\n\nespecially among younger Japanese. The series\n\nexemplifies the major potential of the conversion business.\n\nGlobal Aftersales is a young division, but we’ve\n\nperformed well from the start, meeting our global\n\ncommitments every year during NISSAN 180 and\n\ncontributing to the Company’s growth. We have expanded\n\nnearly 20 percent year-on-year between 2001 and 2004,\n\nand intend to continue this momentum during NISSAN\n\nValue-Up. We will optimize our cost structure by sourcing\n\nparts from the leading competitive countries. We are\n\nstriving to develop an even tighter relationship with our\n\ncustomers and to provide them with new services\n\nthroughout the ownership cycle. I believe this broader\n\nrange of aftersales services will provide sustainable growth\n\nin Nissan’s revenues and profit.”", - "page_start": 43, - "page_end": 43, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "OTC_NSANY_2004.pdf", - "query": "What was Nissan's vehicle production in Mexico in 2003?", - "target_page": 72, - "target_passage": "308,322", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "## OUR WORLD\n\nO U R W O R L D\n\nNISSAN HAS A GLOBAL PRESENCE. BORN IN JAPAN, WE ARE PERFECTLY\n\nAT HOME IN THE U.S., THE UK, SPAIN, THAILAND, CHINA, EGYPT, BRAZIL\n\nAND WELL OVER 150 OTHER NATIONS WHERE NISSAN CARS AND\n\nTHEIR COMPONENT PARTS ARE PRODUCED, SOLD AND DRIVEN.\n\nWITH NISSAN, DRIVING PLEASURE IS A SENSATION THAT KNOWS NO BORDERS.\n\nTHIS IS THE NISSAN SHIFT_", - "page_start": 59, - "page_end": 59, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "W H O W E A R E\n\nNISSAN IS ABOUT MEETING UNMET NEEDS, CRAFTING SINGULAR PRODUCTS\n\nAND TRANSFORMING BRAND STRENGTH AND INNOVATION INTO NEW BUSINESS\n\nOPPORTUNITIES. WE ARE NISSAN. WE ARE INFINITI. WE ARE NISSAN LIGHT\n\nCOMMERCIAL VEHICLES, EXPANDING OUR RANGE. WE ARE NISSAN INDUSTRIAL\n\nMACHINERY, LEVERAGING OUR EXPERTISE TO BUILD FORKLIFTS AND MARINE\n\nPRODUCTS. AND WE ARE NISSAN FINANCIAL SERVICES, PROVIDING OUR\n\nCUSTOMERS WITH A COMPREHENSIVE LINEUP OF OFFERINGS.\n\nTHIS IS THE NISSAN SHIFT_\n\n## WHO WE ARE", - "page_start": 17, - "page_end": 17, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "### EUROPE\n\n**Making Profit as a Smaller Player**\n\nO U R W O R L D\n\n“Europe is one of the most\n\nfragmented automotive\n\nmarket in the world and\n\na highly competitive one\n\nbesides. Despite our\n\nrelatively small size,\n\nhowever, we have begun to\n\ndemonstrate that it is\n\npossible to make money in\n\nEurope. In fact, although\n\nNissan does not yet deliver\n\nthe levels of profitability here\n\nthat the U.S. or other markets generate, we surpassed\n\nour NISSAN 180 business targets in fiscal 2004. Our\n\nprofitability is now on par with the best European\n\nmanufacturers. Nissan has a foundation for increasing\n\nprofitability further in the coming years in Europe.\n\nNissan is already an established name around the\n\nregion, and the brand is strongly associated with 4x4\n\ntechnology, off-road vehicles and pickup trucks.\n\nHowever, there is also a solid heritage built around\n\nthe Micra, a model designed for urban driving. Both\n\nthe first and second generations of this car were very\n\nsuccessful, and the third generation is performing\n\nwell. To leverage our 4x4 heritage and SUV strength\n\ninto the passenger car segment, Nissan is developing\n\na series of crossover vehicles that blend car-like\n\nperformance with 4x4 versatility. The Qashqai concept\n\nvehicle introduced at the 2004 Geneva Motor Show is\n\nthe first of these—smaller, more affordable, and\n\nbetter adapted to European roads. The Qashqai will\n\ngo into production in our plant in Sunderland in the\n\nUK in early 2007. The Murano, launched this year, is\n\na precursor to the Qashqai in the larger executive\n\nsegment. Europeans have already taken to the\n\nMurano, driving sales far past our initial forecasts in\n\nall markets. This car is helping make Nissan a brand\n\nthat people aspire to own.\n\nNissan is still a small player in the region, selling 550,000\n\ncars across a very large and diverse territory that stretches\n\nfrom the Atlantic Ocean to Russia, and from Finland to\n\nIsrael. In the past we covered the area through multiple\n\ndistribution channels, which we are currently in the process\n\nof simplifying. A few aspects of the European market have\n\nmade profitability more difficult to achieve. For example,\n\nautomakers must provide models with much diversity:\n\ndiesel and gasoline powertrains; manual and automatic\n\ntransmissions. The cars must also be engineered to suit the\n\nhigh driving speeds typical in the region and ensure\n\nsuperior handling, which results in higher costs.\n\nAs in many other mature markets, an incentive war is\n\nraging in Europe. Nissan’s position here, as elsewhere, is to\n\nuse incentives selectively and to always protect profitability.\n\nProviding products which customers recognize and\n\nappreciate for their style and attributes rather than being the\n\nbest deal is the foundation of Nissan’s profitable growth. We\n\nnow have a wide range of products, five of which were newly\n\nlaunched in 2005, including the Pathfinder and the Navara\n\npickup. We will release the Micra C+C at the Frankfurt Motor\n\nShow in September, giving customers the option of a unique\n\nstandard glass roof in a fully retracting hard convertible top.\n\nNissan’s manufacturing still defines the leading edge in\n\nEurope. According to *The Harbour Report* , our plant in\n\nSunderland is the most productive plant in Europe.\n\nSunderland will start production on a new B-segment car\n\nbased on the Tone concept car in early 2006, followed by\n\nthe Qashqai crossover vehicle in early 2007. Our Barcelona\n\nplant, which manufactures SUVs, 4x4s and light\n\ncommercial vehicles, will reach full capacity in mid-2005.\n\nFinally, our truck plant in Avila, Spain, which specializes in\n\nlight-duty trucks, will start producing a replacement for the\n\npopular Cabstar in late 2006. This efficient production\n\nbase is a critical part of our profitable growth scenario.\n\nNISSAN Value-Up has given us a plan for building both\n\nprofit and volume. We will not, however, sacrifice profit to\n\ngain volume. How far we can go depends on how fast we", - "page_start": 62, - "page_end": 62, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Europe\n\nNissan Europe S.A.S. Trappes, France Management of European manufacturing and sales €1,626 100.00\n\nNissan International Finance Amsterdam, Financing for group companies €13 100.00\n\n(Netherlands) B.V. The Netherlands\n\nNissan France S.A. Trappes, France Sales of automobiles and parts €4 94.77\n\nNissan Motor (GB) Ltd. Rickmansworth, UK Sales of automobiles and parts £136 100.00\n\nNissan Holding (UK) Ltd. Sunderland, UK Holding company for English subsidiaries €870 100.00\n\nNissan Italia S.p.A. Rome, Italy Sales of automobiles and parts €5 100.00\n\nNissan Motor Manufacturing Sunderland, UK Manufacture and sales of automobiles and parts £250 100.00\n\n(UK) Ltd.\n\nNissan Technical Center Granfield, UK Research and development, testing £15 100.00\n\nEurope Ltd.\n\nNissan Forklift Europe B.V. Amsterdam, Sales of forklifts and parts €6 100.00\n\nThe Netherlands\n\nNissan Motor Iberica, S.A. Barcelona, Spain Manufacture and sales of automobiles and parts €725 99.76\n\nNissan Motor Espana, S.A. Barcelona, Spain Sales of automobiles and parts €12 100.00\n\nNissan Forklift Espana, S.A. Noain, Spain Manufacture and sales of forklifts and parts €9 100.00\n\nAustralia\n\nNissan Motor Co. (Australia) Pty. Ltd. Dandenong, Victoria Sales of automobiles and parts A$290 100.00\n\nNew Zealand\n\nNissan New Zealand Ltd. Auckland Managing New Zealand subsidiaries; NZ$51 100.00\n\nautomobile sales\n\nSouth Africa\n\nNissan Motor Company Rosslyn Managing South African subsidiaries; R39 100.00\n\nSouth Africa (Pty) Ltd. automobile manufacturing and sales\n\nMiddle East\n\nNissan Middle East F.Z.E. Dubai, UAE Automobile sales Dh2 100.00\n\nChina\n\nNissan Motor (China) Ltd. Hong Kong Automobile sales HK$16 100.00\n\nDongfeng Motor Co., Ltd. Hubei Manufacture and sales of automobiles and parts RMB16,700 50.00\n\nTaiwan\n\nYulon Nissan Motor Co., Ltd. Miao Li Hsien Manufacture and sales of automobiles and parts NT$3,000 40.00\n\nThailand\n\nSiam Nissan Automobile Co., Ltd. Samuthprakarn Manufacture and sales of automobiles and parts THB1,931 75.00\n\nOther consolidated subsidiaries 156 companies\n\nTotal consolidated subsidiaries 200 companies\n\n**107**\n\nCORPORATE DATA", - "page_start": 108, - "page_end": 108, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Lawsuits and Claims\n\nWith respect to various lawsuits and claims which Nissan encounters, the\n\npossibility exists that the position defended by Nissan will not be accepted\n\nand that the outcome may be significantly different from that anticipated.\n\nAs a result, any such verdict or settlement could adversely affect Nissan’s\n\nfinancial position and operating results.\n\nGovernment Regulations\n\nThe automobile industry worldwide is influenced by a broad spectrum of\n\nregulations governing the emission levels of exhaust fumes, fuel economy\n\nguidelines, noise level limitations and safety standards, and Nissan expects\n\nthese regulations to become increasingly stringent. In order to ensure\n\ncompliance, it may be necessary for Nissan to make significant ongoing\n\ninvestments in these areas which would have an impact on its financial\n\nposition and results of operations.\n\nIntellectual Property Rights\n\nNissan owns a wide variety of proprietary technologies and has the\n\nexpertise to differentiate Nissan’s products making them unique from\n\nthose of its competitors. These assets have proven their value in the\n\ngrowth of Nissan’s business and will, no doubt, continue to be of value in\n\nthe future. Nissan strives to protect its intellectual property assets;\n\nhowever, in certain markets, Nissan may encounter difficulty in fully\n\nprotecting the proprietary rights to its own technologies. Cases may arise\n\nwhere Nissan finds itself unable to prohibit others from infringing on its\n\nintellectual property rights.\n\nThe Company has established Intellectual Property Rights Management\n\nDepartment for the purpose of protecting intellectual property rights in\n\nspecific areas, strengthening activities to protect Nissan’s intellectual\n\nproperty rights, and abstracting new intellectual property rights. And the\n\ndepartment has been performing various activities to protect and create\n\nNissan Brand.\n\nNatural Disasters\n\nNissan’s corporate headquarters and many of its manufacturing facilities\n\nare located in Japan, where the statistically proven probability of\n\nearthquakes is higher than in many other countries. Nissan has developed\n\nrisk management guidelines relating to earthquake damage and the CEO\n\nhas organized a global task force to direct disaster prevention and recovery\n\nactivities. In addition, the Gruop has begun to strengthen its manufacturing\n\nfacilities with anti-seismic reinforcement. However, if a severe earthquake\n\nwere to hit one of Nissan’s key facilities causing a halt in production, this\n\nwould adversely affect Nissan’s financial position and results of operations.\n\nSales Financing Business Risk\n\nSales financing is an integral part of Nissan’s core business, providing\n\nstrong support to its automotive sales, while maintaining high profitability\n\nand a sound and stable financial condition through strict risk management\n\npolicies. However, the sales financing companies have a high exposure to\n\ninterest-rate risk, residual value risk, and credit risk, any one of which may\n\nadversely affect Nissan’s financial position and results of operations.\n\nCounterparty Credit Risk\n\nNissan does business with a variety of counterparties and manages its\n\ncounterparty credit risk by conducting a comprehensive annual assessment of\n\nits customers’ financial condition based on their financial information.\n\nNonetheless, any significant default by a counterparty would adversely\n\naffect Nissan’s financial position and results of operations.\n\nEmployee Retirement Benefit Expenses and Obligations\n\nThe amount of retirement Nissan’s benefit obligation and related expenses\n\nare calculated using various actuarial assumptions including the discount\n\nrate applied, the projected rate of return on plan assets, and so forth. If\n\nNissan’s actual results differ from those assumptions or if the assumptions\n\nare changed, the resulting effects will be accumulated and recognized\n\nsystematically over future periods. The cumulative effect could adversely", - "page_start": 72, - "page_end": 72, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Consolidated subsidiaries *As of Mar. 31, 2005*\n\n*Capital* *Nissan*\n\n*Company* *Location* *Principal business* *(millions)* *share*(%)*\n\nJapan\n\nNissan Shatai Co., Ltd. Hiratsuka-shi, Kanagawa Manufacture and sales of automobiles and parts ¥7,904 43.80\n\nAichi Machine Industry Co., Ltd. Nagoya, Aichi Manufacture and sales of automotive parts ¥8,518 41.70\n\nJATCO Ltd. Fuji, Shizuoka Manufacture and sales of automotive parts ¥29,935 81.76\n\nNissan Kohki Co., Ltd. Samukawa, Kanagawa Manufacture and sales of automotive parts ¥2,020 97.73\n\nCalsonic Kansei Corporation Tokyo Manufacture and sales of automotive parts ¥40,606 41.87\n\nNissan Motor Car Carrier Co., Ltd. Tokyo International automobile transport ¥640 60.00\n\nNissan Trading Co., Ltd. Yokohama, Kanagawa Import and export of automobiles, parts, etc. ¥320 100.00\n\nNissan Financial Services Co., Ltd. Chiba, Chiba Automobile financing and leasing ¥16,387 100.00\n\nAutech Japan, Inc. Chigasaki, Kanagawa Development, manufacture and sales of ¥480 100.00\n\nlimited-edition automobiles\n\nNissan Real Estate Development Tokyo Real estate sales, purchase and leasing ¥1,000 70.50\n\nCorporation\n\nNissan Finance Co., Ltd. Tokyo Finance and accounting support ¥2,491 100.00\n\nAichi Nissan Motor Co., Ltd. Nagoya, Aichi Sales of automobiles and parts ¥100 100.00\n\nTokyo Nissan Motor Sales Co., Ltd. Tokyo Sales of automobiles and parts ¥100 100.00\n\nNissan Prince Tokyo Motor Sales Tokyo Sales of automobiles and parts ¥100 100.00\n\nCo., Ltd.\n\nNissan Chuo Parts Sales Co., Ltd. Yokohama, Kanagawa Sales of automobile repair parts ¥545 80.61\n\nUS\n\nNissan North America, Inc. Gardena, California Management of North American subsidiaries, $1,791 100.00\n\nmanufacture and sales of automobiles and parts\n\nNissan Motor Acceptance Corporation Torrance California Finance of wholesale and retail automobile sales $499 100.00\n\nin US\n\nNissan Motor Corporation Honolulu, Hawaii Sales of automobiles and parts $6 100.00\n\nin Hawaii, Ltd.\n\nNissan Capital of America, Inc. Torrance, California Financing for group companies $1 100.00\n\nNissan Technical Center Farmington Hills Research and development, testing $16 100.00\n\nNorth America, Inc. Michigan\n\nNissan Motor Insurance Corporation Honolulu, Hawaii Casualty insurance $10 100.00\n\nNissan Forklift Co., North America Marengo, Illinois Manufacture and sales of forklifts and parts $34 100.00\n\nCanada\n\nNissan Canada, Inc. Mississauga, Ontario Sales of automobiles and parts CAN$68 100.00\n\nMexico\n\nNissan Mexicana, S.A. de C.V. Mexico D.F. Manufacture and sales of automobiles and parts P17,056 100.00\n\n### INFORMATION ON SUBSIDIARIES AND AFFILIATES\n\n**106**\n\nCORPORATE DATA", - "page_start": 107, - "page_end": 107, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Motorsports MOTORSPORTS\n\nMotorsports is a dynamic form of marketing that\n\noffers a natural forum for presenting the Nissan\n\nbrand. On the track, Nissan’s technologies are\n\npushed to the limit—and sometimes beyond—\n\nunder grueling conditions.\n\nNissan participates in a wide range of\n\nmotorsports, including the Super GT Series.\n\nThis is the most popular racing series in Japan,\n\nand is increasingly broadcast around the world.\n\nMotorsports will remain an important marketing\n\noutlet that enhances both Nissan’s brand\n\npresence and our engineering capabilities.\n\nO U R W O R K\n\nJUNICHI ENDO\n\nSenior Vice President\n\n**Aftersales**\n\n“Aftersales was established in 2002 because Nissan\n\nwanted to expand the scope of what was once the\n\nParts Division. Our primary objective is to extend the\n\nvalue chain. We are trying to engage new-car owners\n\nfor a longer time by offering an extensive range of\n\nattractive aftersales products. These products\n\ninclude parts, service contracts, conversion—both\n\naccessories and customization—and new service\n\nmethods such as quick inspection and quick body\n\nrepair. Global Aftersales covers the downstream\n\nbusiness in cooperation with other marketing and\n\nsales divisions.\n\nThis has become an increasingly global function as we\n\ndeploy and monitor various programs throughout the world.\n\nFor example, Project SX, the new Nissan service standard,\n\nshould drastically improve dealer service operations. This\n\nprogram educates dealers on how to be more customer-\n\noriented by providing insights into productivity, marketing\n\nand management. To increase service productivity and\n\nefficiency, we send former factory foremen and engineers\n\nto various service workshops to analyze service staff\n\nperformance. This will help cut repair times and improve\n\ncustomer satisfaction. The Nissan Sales and Service Way is\n\nalso a tool used to increase the quality of service provided\n\nby all dealers. Its successful implementation has enhanced\n\ncustomer satisfaction worldwide.\n\nThe conversion business in Japan looks very promising.\n\nWe discovered that 50 percent of car owners want to\n\ncustomize their vehicles, and 28 percent already had. Such\n\na high penetration rate illustrates how much people want a\n\ncar that’s different from everyone else’s. The Rider series—\n\ncustomized versions of Nissan cars developed by our\n\nwholly owned subsidiary Autech—are very popular,\n\nespecially among younger Japanese. The series\n\nexemplifies the major potential of the conversion business.\n\nGlobal Aftersales is a young division, but we’ve\n\nperformed well from the start, meeting our global\n\ncommitments every year during NISSAN 180 and\n\ncontributing to the Company’s growth. We have expanded\n\nnearly 20 percent year-on-year between 2001 and 2004,\n\nand intend to continue this momentum during NISSAN\n\nValue-Up. We will optimize our cost structure by sourcing\n\nparts from the leading competitive countries. We are\n\nstriving to develop an even tighter relationship with our\n\ncustomers and to provide them with new services\n\nthroughout the ownership cycle. I believe this broader\n\nrange of aftersales services will provide sustainable growth\n\nin Nissan’s revenues and profit.”", - "page_start": 43, - "page_end": 43, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "**Building on World-Class**\n\n**Productivity and Efficiency** TADAO TAKAHASHI\n\nExecutive Vice President\n\n### MANUFACTURING\n\nO U R W O R K\n\n“By following the Nissan Production Way and the\n\nprinciple of *doukiseisan* —meaning synchronization\n\nwith the customer—manufacturing at Nissan remains\n\nflexible and integrated, and keeps lead times short.\n\nThe Nissan Production Way incorporates integration at\n\nthe supplier, global and logistic levels. That is why we\n\nremain the most productive manufacturer in the world.\n\nWe’ve also become much more efficient, as our\n\nutilization rates show. In Japan, we were operating at\n\n54 percent of capacity in 1999. In fiscal 2004 that\n\nfigure increased to 86 percent, which is just about the\n\nmaximum possible. During NISSAN Value-Up, we will\n\nincrease our global utilization rate from approximately\n\n74 percent to over 80 percent. We will not achieve that\n\ntarget by closing facilities, either. In fact, we’ve opened\n\nnew plants in the U.S. and China, and increased\n\ncapacity at our other facilities.\n\nManufacturing achieved a series of milestones during\n\nNISSAN 180. One of the biggest was opening the Canton\n\nplant in the U.S., which got up to speed quickly, launching\n\nfive new vehicles in a period of just eight months. We built\n\ntwo plants in China, and restarted operations in Egypt. We\n\ndramatically expanded the Decherd, Tennessee engine\n\nplant in the U.S., and all engines for North America are now\n\nbuilt at Decherd or at our plant in Mexico.\n\nWe also commenced cross-production with Renault:\n\nNissan began building Renault’s Platina in Mexico and its\n\nTraffic in Spain, while Renault began building our Pickup\n\nand Xterra at its factory in Brazil. We also started\n\nproduction of common engines with Renault, with our\n\nsubsidiary Aichi Kikai and the Yokohama plant producing\n\nthe four-cylinder engines used in our new Tiida, Note and\n\nLafesta models. In Japan, we launched six new models in\n\njust six months—the Murano, Fuga, Lafesta, Tiida, Tiida\n\nLatio and Note. We also launched three vehicles—the Tiida,\n\nTeana and Tiida Latio—in China.\n\nWhile we were successful in Japan and China, we did\n\nhave quality issues at the Canton facility. This was\n\nunfortunate, since it affected our ratings in the J. D. Power\n\nand Associates Initial Quality Study. We’ve since taken\n\neffective measures to resolve these problems. More\n\nimportantly, we learned from them. We created new\n\nsystems and new approaches to quality, which we then\n\napplied in Japan and to the new factories in China.\n\nIncidentally, the factories in China opened with no\n\nsignificant quality issues. This highlights one of our ‘never-\n\nending’ quests at Nissan, which is to identify problems and\n\nrapidly get solutions for them in place.\n\nWe do not rely solely on external quality evaluations.\n\nIn cooperation with Renault, we created AVES, the Alliance\n\nVehicle Evaluation System. AVES is a sophisticated\n\nprocess involving two people taking four to five hours to\n\nevaluate a vehicle. Because it is time-intensive, we also\n\ndevised a short version of AVES that only takes an hour\n\nand can be done at the factory.\n\nThe second major area of focus is logistics, which is\n\nbecoming more complicated. We send engine parts to the\n\nU.S., and soon we will be shipping more parts from leading\n\ncompetitive countries, or LCCs. During 2004, we\n\nencountered cargo-handling problems on the U.S. West\n\nCoast, which highlighted the need for a more sophisticated\n\ntracking system. If we had had such a system in place, we\n\ncould have anticipated those problems and made the\n\nnecessary adjustments.\n\nWhile Nissan’s productivity leads the world, we have\n\nnot stopped working to improve the process. One system\n\nwe have implemented is the Design Standard Time Ratio,\n\nwhich allows us to calculate the ideal standard time for\n\nevery operation. By applying this globally, we have brought\n\nall our branches around the world to nearly the same level.\n\nThis in turn illustrated that we can produce vehicles more", - "page_start": 51, - "page_end": 51, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "“In the last four years the Nissan Production\n\nWay has become the international standard for\n\nmanufacturing in the world. This system makes\n\nsense everywhere, including Japan, the UK,\n\nSpain, and the U.S. It’s a system that everyone\n\nembraces and feels is theirs, not one that was\n\nimposed on them. The Sunderland plant is the\n\nmost productive automotive plant in the Western\n\nworld, and while we have great people working\n\nfor us, the Nissan Production Way is what made\n\nthis success possible.\n\nEurope is an incredibly competitive market,\n\nwith 15 companies trying to gain market share.\n\nWe decided not to compete directly in\n\nfundamental segments. Instead, we chose to\n\nbuild unique, profitable vehicles, like the new\n\ncrossover vehicle, based on the Qashqai\n\nconcept car, which will be released in early\n\n2007. This is one of the three launches for the\n\nupcoming year from the Sunderland plant, along\n\nwith the Tone and the Micra C+C coupe and\n\ncabriolet. NISSAN 180 was a great success for\n\nus. Today, our Spanish factory is in full\n\nproduction and our Sunderland plant is\n\npreparing to turn out the three new models.”\n\nCOLIN DODGE\n\nSenior Vice President\n\nNissan Europe\n\nEurope MANUFACTURING IN EUROPE\n\nO U R W O R K\n\nThe above are all part of the Nissan Integrated\n\nManufacturing System, known as NIMS, which provides\n\nmore flexibility in manufacturing. Using NIMS, for example,\n\nwe can produce eight models on a single line. During\n\nNISSAN 180, we introduced 16 NIMS lines worldwide into\n\nour 18 total major lines. For NISSAN Value-Up, we will\n\nincrease this to 22 NIMS lines.\n\nWe will need that flexibility during NISSAN Value-Up,\n\nbecause twice a month we will be launching new cars\n\nsomewhere—a total of 70 production starts. We cannot do\n\nthis with our old system. The launch stage can be a difficult\n\nperiod, and too often problems arise that can cause panic\n\non the line. To cope with these problems, we’ve devised\n\nwhat we call the Global Launching Expert system. The\n\nlaunch expert can stand back and analyze the situation and\n\ncome up with solutions. We are now identifying, educating\n\nand dispatching launch experts from around the world. In\n\n2006, we will further refine our launch procedures by\n\nopening the Global Production Engineering Center.\n\nCurrently, if we produce the same car in several markets,\n\nthe launches are separate activities. In the future, we will\n\n‘bundle’ all launches by developing the launch process and\n\ncreating the dies in Japan. This bundle will then be\n\nreproduced and forwarded to the various factories\n\nproducing the car.\n\nWe have established four key factors for success\n\nduring NISSAN Value-Up: quality, timely delivery, cost, and\n\nthe environment. Regarding the environment, we have\n\nidentified three environmental issues, which are CO 2 ,\n\nrecycling, and emissions such as chemical emissions and\n\nvolatile organic compounds. This is our newest challenge,\n\nsince we do not yet have concrete targets on a global scale\n\nas we do for Japan.\n\nOur goal is to maintain Nissan’s status as the world\n\nleader in manufacturing by aggressively implementing new\n\ntechnologies and expertise. Our processes are designed\n\nto require low investment costs and generate fast product\n\nlaunches, which would result in a faster return on\n\ninvestment in addition to a top-quality product.”", - "page_start": 53, - "page_end": 53, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Due to changes in government regulations, information on risks involved in business operations has been disclosed in the Yukashoken-Houkokusho for the year ended March 31,2005 as follows:\n\nEconomic Factors\n\nThe demand for products manufactured by Nissan is affected by the\n\neconomic conditions in each country or market in which they are offered\n\nfor sale. Nissan conducts its operations all over the world and, in particular,\n\nin the major markets of North America, Europe, and Asia, to say nothing of\n\nJapan. While Nissan strives to develop a comprehensive and integrated\n\nprojection of the global economic outlook, any greater-than-anticipated\n\ndownturn in one of these markets may have a significant effect on Nissan\n\nfinancial position and results of operations.\n\nInternational Activities and Overseas Expansion\n\nNissan’s manufacturing and marketing activities outside Japan are\n\nconducted in the United States, in Europe, and in the developing and\n\nemerging markets of Asia. Nissan forecasts and evaluates a wide variety of\n\nrisks inherent in doing business in such overseas markets including the\n\nfollowing factors, each of which entails a greater-than-anticipated level of\n\nrisk:\n\n- Unfavorable political or economic factors\n\n- Legal or regulatory changes\n\n- Potentially adverse tax consequences\n\n- Labor disputes including strikes\n\n- Difficulties in recruiting and retaining personnel\n\n- Social, political or economic turmoil due to terrorism, war, or other\n\ndestabilizing factors.\n\nResearch and Development\n\nNissan’s technology must be “real world”—useful, pragmatic and easy to\n\nuse. Nissan anticipates the nature and scope of the market demand, and\n\nthen prioritizes and invests in new technologies. Nonetheless, any sudden\n\nand greater-than-anticipated changes in its business environment or in\n\ncustomer preferences may impact negatively on customer satisfaction with\n\nthese new technologies.\n\nProduct Defects\n\nNissan places a high priority on safety and does its best to enhance safety\n\nfrom the standpoint of research and development, manufacturing and\n\nsales. Although Nissan takes out insurance policies to cover product\n\nliability, this does not necessarily mean that all potential defects and the\n\nrelated liabilities are fully covered. If Nissan were to implement strict\n\nproduct recalls for its customers, Nissan would incur significant additional\n\nexpenses which could adversely affect its financial position and results of\n\noperations.\n\nFluctuation in Foreign Currency Exchange Rates\n\nNissan’s Japanese operations export vehicles to various countries around\n\nthe world. In general, the appreciation of the yen against other currencies\n\nadversely affects Nissan’s financial results of operations and, on the\n\ncontrary, the depreciation of the yen against other currencies favorably\n\naffects Nissan’s financial results of operations. Any sharp appreciation of\n\nthe currencies of those countries against the yen could lead to increases in\n\nboth procurement and production costs which would adversely affect\n\nNissan’s competitiveness.\n\nDerivatives\n\nNissan utilizes derivatives transactions for the purpose of hedging its\n\nexposure to fluctuation in foreign exchange rates, interest rates and\n\ncommodity prices. While Nissan can hedge against these risks by using\n\nderivatives transactions, Nissan, by so doing, may miss the potential gains\n\nwhich could result from seizing the market opportunities to profit from such\n\nfluctuation in exchange rates and interest rates.\n\nIn addition, Nissan manages its exposure to credit risk by limiting its\n\ncounterparties to financial institutions with high credit ratings. However, a\n\ndefault by any one of these counterparties could have an adverse effect on\n\nNissan’s financial position and operating results.\n\nLawsuits and Claims\n\nWith respect to various lawsuits and claims which Nissan encounters, the\n\npossibility exists that the position defended by Nissan will not be accepted", - "page_start": 72, - "page_end": 72, - "source_file": "OTC_NSANY_2004.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_SEA_2014.pdf", - "query": "Why did Sundance Energy's oil sales improve in 2014?", - "target_page": 18, - "target_passage": "The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a decrease in product pricing ($15.7 million). ", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "The combination of these vast new discoveries of unconventional\n\nnatural gas and liquids provides America with a unique future path­\n\nway toward greater energy independence, an industrial renaissance,\n\neconomic rejuvenation and greater national security. I remain fully con­\n\nfident that the marketplace understands this and that over time the U.S.\n\nwill more fully embrace and utilize clean, affordable, abundant American\n\nnatural gas and increased domestic oil production as the best alterna­\n\ntives to burning environmentally challenged coal and expensive and\n\ndangerous foreign oil.\n\nThere is now a clear road ahead toward a more sustainable, afford­\n\nable, dynamic and independent future if America embraces the remark­\n\nable gift of energy abundance that Chesapeake has helped discover in\n\nthe U.S. You have my commitment, and the commitment of more than\n\n10,000 other Chesapeake employees, that every day we are working\n\nhard to create shareholder value and a better future for our communi­\n\nties, our states and our country through the continued discovery and\n\ndevelopment of unconventional natural gas and liquids.\n\nfor a new energy future with greater natural gas usage and increased\n\ndomestic oil production as two of its primary attributes, it is encouraging\n\nto see our political leadership finally grasp that natural gas stands alone\n\nas the only affordable, scalable and immediately available alternative to\n\nforeign oil and that U.S. oil production can be increased significantly in\n\nthe years ahead.\n\nThe events of the past few months have unmistakably driven home\n\nthe fact that it is insanity to rely on the Middle East to provide our econ­\n\nomy’s lifeline of oil. This should be especially obvious when one realizes\n\nthat during the next 10 years, America will likely export at least another\n\n$4 trillion in national wealth to oil exporters around the world. Clearly,\n\nour country must demand from its leaders a new and more sustainable\n\nenergy future.\n\nThe good news, however, is that America can now secure a new\n\nenergy future thanks to Chesapeake and a handful of other leading U.S.\n\nE&P companies that have reinvented the process of finding natural gas\n\nand oil during the past five years. In doing so, we have discovered twice\n\nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil.\n\nFurthermore, these same few companies that led the unconventional\n\nnatural gas revolution have in just the past two years also reinvented\n\nthe way in which we can find large new oil resources onshore in the U.S.\n\nIn fact, I believe the U.S. can possibly increase its production of oil from\n\nthe current 5.8 million barrels per day by 30- 50% during the next 5- 10\n\nyears, thereby potentially reaching the President’s 2025 goal of reducing\n\nforeign oil imports by 33%, 5- 10 years earlier than hoped.\n\nThe combination of these vast new discoveries\n\nof unconventional natural gas and liquids\n\nprovides America with a unique future path-\n\nway toward greater energy independence,\n\nan industrial renaissance, economic rejuvenation\n\nand greater national security.\n\nBest regards,\n\nAubrey K. McClendon\n\nChairman and Chief Executive Officer\n\nApril 15, 2011\n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n\n*telemetry systems that provide pumpers with real-time information on oil and water*\n\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\n2010 ANNUAL REPORT | **15**", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "TSR will be compared to a set of 22 oil and gas exploration and production companies headquartered in the United States and\n\nAustralia. The Australian-headquartered companies are highlighted. The chart on the right depicts the TSR over a three year\n\nperiod ending 31 December 2014. Diamondback Energy Inc, Matador Resources Co and Midstates Petroleum Co Inc were\n\nexcluded from the chart as there was not enough historical data to measure the defined TSR.\n\n| Company |\n|:---|\n| Abraxas Petroleum Corp/NV |\n| Approach Resources Inc |\n| Austex Oil Ltd |\n| Beach Energy Ltd |\n| Bonanza Creek Energy Inc. |\n| Callon Petroleum CO/DE |\n| Carrizo Oil & Gas Inc |\n| Contango Oil & Gas Co |\n| Diamondback Energy Inc |\n| Drillsearch Energy Ltd |\n| Emerald Oil Inc |\n| Goodrich Petroleum Corp |\n| Lonestar Resources Ltd |\n| Matador Resources Co |\n| Midstates Petroleum Co Inc |\n| Panhandle Oil & Gas Inc |\n| Red Fork Energy Ltd |\n| Rex Energy Corp |\n| Sanchez Energy Corp |\n| Senex Energy Ltd |\n| Synergy Resources Corp |\n| Triangle Petroleum Corp |\n\n*Retirement and Other Benefits*\n\nExecutive management participates in the same benefit plans and on the same basis as other employees. Those plans include\n\nhealth, dental and vision insurance (for which a premium contribution is required by the participant) and a 401(k) retirement plan\n\nunder which the Company makes an annual contribution equal to 3 percent of the participant’s eligible compensation.\n\n*Post-Termination and Change In Control Benefits*\n\nThe Managing Director’s employment contract provides for payment of his base salary through the end of the contract term in\n\nthe event he is terminated as a result of a change in control event. Additionally, in the event of a corporate take-over or change\n\nin control (as defined in the RSU Plan), our board in its discretion may cause all unvested RSUs to vest and be satisfied by the\n\nissue of one share each or provide for the cancellation of outstanding RSUs and a cash payment equal to the then-fair market\n\nvalue of the RSUs.", - "page_start": 39, - "page_end": 39, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Annual Report 2004 72\n\nNOTES TO THE FINANCIAL STATEMENTS\n\nfor the year ended 31 December 2004\n\n**23. Interests in Joint Ventures**\n\n(a) Santos Ltd and its controlled entities have combined interests in unincorporated joint ventures in the following major areas:\n\n**Joint venture/area Principal activities Average interest**\n\n**%**\n\nAmadeus Basin\n\nMereenie Oil and gas production 65\n\nMereenie Pipeline Oil transportation 65\n\nPalm Valley Gas production 48\n\nBrowse Basin Oil and gas exploration 74\n\nCarnarvon Basin Oil and gas exploration and production 32\n\nCooper Basin Downstream Liquid hydrocarbon transportation and processing 65\n\nCooper Basin Unit\n\nSouth Australia Oil and gas production 65\n\nQueensland Oil and gas production 60\n\nCooper/Eromanga Basins\n\nSouth Australia Oil and gas exploration and production 65\n\nQueensland, ATP 259P Oil and gas exploration and production 60\n\nOther Eromanga Oil and gas exploration and production 74\n\nJackson Moonie Pipeline Oil transportation 83\n\nEastern Queensland\n\nBowen Basin Gas exploration and production 50\n\nSurat Basin Oil and gas exploration and production 48\n\nEgypt\n\nGulf of Suez Oil and gas exploration 50\n\nGippsland Basin Oil and gas exploration and production 35\n\nIndonesia\n\nEast Java Basin Oil and gas exploration and production 42\n\nKutei Basin Oil and gas exploration 35\n\nWest Natuna Basin Oil and gas exploration and production 6\n\nWest Papua Oil and gas exploration 20\n\nOffshore Northern Australia\n\nBonaparte Basin Oil and gas exploration 95\n\nHoutman Basin Oil and gas exploration 42\n\nTimor Gap Oil and gas exploration and production 17\n\nTimor Sea Oil and gas exploration and production 22\n\nOtway Basin Oil and gas exploration and production 36\n\nPapua New Guinea\n\nPDL1 (Part Hides Field) Oil and gas exploration 31\n\nOther interests Oil and gas exploration and production 31\n\nSorell Basin Oil and gas exploration 58\n\nUSA\n\nGulf Coast Oil and gas exploration and production 39\n\nRocky Mountains Oil and gas exploration and production 50\n\n(b) The sales revenue received from the Santos Group’s share of petroleum products produced by the joint ventures is $1,493.5 million\n\n(2003: $1,451.2 million) and the contribution of joint venture business undertakings to profit from ordinary activities before interest and tax\n\nof the Santos Group is $581.3 million (2003: $496.7 million).", - "page_start": 73, - "page_end": 73, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "##### * **Dear Fellow Shareholders,** *\n\n##### *I am pleased to present Sundance Energy Australia Limited’s*\n\n##### *Annual Report for the 12 months ended 31 December 2014. It*\n\n##### *has been another year of significant progress for Sundance*\n\n##### *across our portfolio of liquids rich oil and gas assets in the US.*\n\nThe Company’s strategic focus on growing production, cash flows and reserves from\n\nlarge, repeatable resource plays in North America continues to deliver positive results\n\nwith growth in production, cash flows, and reserves.\n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston\n\nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent;\n\nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado\n\nfor $114 million which realised an internal rate of return of 104 percent. These divestitures\n\nof smaller, less scalable positions enabled us to focus on developing and growing our\n\nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma.\n\nDespite the reduction in crude oil and liquids prices towards the end of the year\n\nand continuing into 2015, the operational performance and focused, value-adding\n\ntransactions during the past year have positioned the Company very favourably for\n\nfuture growth in net asset value and shareholder returns.\n\n####### **A year of growing production, cash flow and reserves**\n\nIn line with our strategy we continued to increase the level of company operated assets,\n\nand successfully maintained a very strong focus on optimising our operations and reducing\n\ncosts. This resulted in an impressive improvement in well performance combined with a\n\ntop tier cost structure.\n\nThrough our operated development program, we ended 2014 with record production\n\nof 9,434 barrels of oil equivalent per day (BOEPD) compared with an exit rate of 5,028\n\nBOEPD in December 2013 and an average annual production of 6,635 BOEPD compared\n\nto 3,015 BOEPD in 2013. During 2014 we drilled and completed 42.7 net wells, primarily\n\nin the Eagle Ford, bringing our total well count to 81.3 by 31 December 2014. High\n\nvalue oil comprised approximately 69 percent of our total 2014 annual production\n\nand production from Sundance-operated projects accounted for 89 percent of total\n\nproduction for the year.\n\nCorresponding with the growth in annual production, the Company’s full year revenues\n\nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million.\n\nThe Company’s development program also generated significant growth in Constant Case\n\nreserves during the year. More details are contained elsewhere in this Annual Report,\n\nbut in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1\n\nMBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6\n\nMBOE, and 92.8 MBOE, respectively, at the end of 2013.\n\nIn the current price environment, we have elected to scale back our drilling program to\n\nmainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will\n\nenable us to maintain our low leverage profile, which was approximately 1.03x debt to\n\nAdjusted EBITDAX at year end, and focus on growing our drilling inventory in an environ-\n\nment with less competition for leases and small acquisitions. Liquidity was $84 million at\n\nyear end, with a borrowing base redetermination in 2015 expected to materially increase\n\ndebt availability if the use of such funds is justified in line with our strategy.\n\n####### **The Eagle Ford - driving value and production growth**\n\nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the\n\nbasin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014\n\nwhich includes the acquisition of approximately 18,000 net acreage in 2014. By the end of\n\nthe first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**3**\n\nAt year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford\n\nacreage where we continue to pursue operational and drilling efficiencies, opportunities\n\nto further improve well economics by improving recoveries and reducing costs. In 2014\n\nthis included a switch to pad drilling with zipper fracs and new completion techniques\n\nthat have provided significant upside in production.\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance\n\nat 7,850 - 8,500 BOEPD, an increase from the previous year of some 13 - 17 percent,\n\nbut a target that we believe is achievable while maintaining acceptable levels of liquidity\n\ngiven our demonstrated abilities and growing footprint in the Eagle Ford.\n\n####### **Safety and Environment**\n\nSundance has a strong culture throughout the organisation of ensuring that high standards\n\nof safety are maintained and that our operations are conducted in an environmentally\n\nresponsible way. During 2014 our comprehensive safety program was enhanced and\n\nfurther improvements will be a strong focus throughout 2015.\n\n####### **A strong financial position**\n\nSundance is well placed for future growth in the Eagle Ford. The Company has a strong\n\nbalance sheet to withstand the current low oil price environment, and our sound financial\n\nmanagement strategy has seen the Company well supported by both new and existing\n\ninvestors in Australia and internationally.\n\nWe expect that Sundance will grow organically and also through further leasing or\n\nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative\n\nbalance sheet parameters.\n\n####### **Positive outlook for 2015**\n\nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth\n\ntrajectory looks very positive.\n\nWe can demonstrate this through:\n\n- A track record of capital efficient growth\n\n- A track record of value creation\n\n- Being a low cost/high margin operator\n\n- Having top tier Eagle Ford assets with an extensive drilling inventory\n\n- Having a clean balance sheet\n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index,\n\nand with the increasing interest and support from institutional and retail investors. I believe\n\nthat Sundance will deliver significant long-term value from our assets for our shareholders.\n\n####### **Thank you for your support**\n\nWe have had a busy year at Sundance and I would like to recognise the efforts and valued\n\ncontribution of the Board of Directors, management team and all staff and contractors of\n\nthe Company in helping us achieve our strategic goals. I am confident that we have the\n\nright team and excellent assets in place to execute our clear and focused strategy that we\n\nexpect to deliver significant value for our shareholders.\n\nOn behalf of the Board and Company, I would like to thank our shareholders for your\n\nstrong support of the Company throughout the year. We are committed to delivering\n\nlong-term value for our shareholders and I look forward to reporting over the rest of the\n\ncoming year on the continued value creation and growth of Sundance.\n\nYours sincerely,\n\n**M IKE H ANNELL**\n\n*Chairman*\n\n*The Company has a*\n\n*strong balance sheet to*\n\n*withstand the current low*\n\n*oil price environment,*\n\n*and our sound financial*\n\n*management strategy*\n\n*has seen the Company*\n\n*well supported by*\n\n*both new and existing*\n\n*investors in Australia*\n\n*and internationally.*", - "page_start": 4, - "page_end": 4, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**What advantages does CHK’s unique vertical integration strategy provide?**\n\nChesapeake has built a large inventory of low-risk natural gas and liquids-rich plays that we plan to develop\n\naggressively over the next two decades. As a result, we know that our company will consistently utilize a tremen­\n\ndous (and growing) amount of oilfield services for this resource development. This high level of planned drilling\n\nactivity will create value for the provider of oilfield services, and Chesapeake’s strategy is to capture a portion\n\nof this value for our shareholders rather than transfer it to third-party vendors whose interests and investments\n\nare not always aligned with ours. To date, Chesapeake has invested in drilling rigs, rental tools, water manage­\n\nment equipment, trucking, compression equipment, midstream services, and most recently pressure pumping and\n\nfracture stimulation equipment. Chesapeake’s activities require a high level of planning and project coordination\n\nthat is best accomplished through vertical integration and ownership of the oilfield services we utilize. This approach\n\ncreates a multitude of cost savings, an alignment of interests, operational synergies, greater capacity of equipment,\n\nincreased safety and better coordinated logistics. In addition, Chesapeake’s control of a large portion of the oilfield\n\nservice equipment it utilizes provides a unique advantage to control the timing of leasehold development. Simply\n\nput, faster development of resources maximizes the present value of leasehold. This has been a key advantage for\n\nChesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures.\n\n**Will U.S. natural gas prices reconnect with world natural gas prices?**\n\nNatural gas is a premium product and a cleaner-burning fuel than coal or oil-related products, including gasoline,\n\ndiesel and heating oil. Despite this fact, over the past two years natural gas has received a low price in the U.S.\n\nmarket relative to coal and oil-related products, primarily as a result of a temporary surplus of production. This\n\nsurplus has been principally caused by high levels of drilling activity as producers focused on holding by produc­\n\ntion (HBP) leasehold in new highly productive, low cost natural gas shale plays. In essence, producers reinvented\n\nU.S. supply ahead of reinventing of U.S. demand. We believe HBP-incentivized drilling on natural gas plays will\n\nlargely come to an end in 2012, and U.S. demand will soon also be reinvented to allow U.S. natural gas prices to\n\nreconnect to price parity with world natural gas prices that have risen to more than double U.S. natural gas prices.\n\nThis surge in world natural gas prices has been in response to $100+ oil prices and surging global liquefied\n\nnatural gas (LNG) demand. In our view, the arbitrage in value between competing fuels is simply too wide. Capital\n\nand ideas will flow toward projects that make the most of this price disparity. Chesapeake and other companies are\n\nworking to create the ability to export natural gas from the U.S. Gulf Coast and other regions in the form of LNG to\n\npremium Pacific Rim, European and South American markets, perhaps as soon as 2015. This initiative will also be\n\naided by the widening of the Panama Canal to accommodate large LNG vessels. Furthermore, we believe that the\n\ncurrent price disparity between natural gas and oil will increasingly lead to greater use of natural gas in the U.S. transportation system. Whether it\n\nbe compressed natural gas (CNG) for medium and light-duty vehicles, LNG for heavy-duty vehicles or the commercialization of gas-to-liquids (GTL)\n\nnatural gas refineries that supplement the U.S. liquid fuel supply stream, we believe that the marketplace will increasingly utilize and embrace natural\n\ngas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "optimisation during 2004 to\n\nimprove product delivery and\n\nrecovery in order to reduce\n\nproduction costs per unit.\n\nTo this end, further reductions\n\nin costs for 2005 are targeted\n\nby increasing the focus on\n\nfit for purpose rigs and larger\n\ncampaigns. These efforts will be\n\nsupported by a significant boost\n\nin 3D seismic acquisition that\n\ncommenced at the end of 2003\n\nand continues in 2005.\n\nCoiled tubing underbalanced\n\ndrilling operations were performed\n\nat three gas wells and one oil\n\nwell, while multiple pinpoint\n\nfracture stimulations were\n\nperformed at five new gas wells,\n\nwith between three and six fracs\n\nperformed in each well.\n\nThese introductory programs\n\nare providing encouraging initial\n\nresults. The underbalanced drilling\n\nprogram achieved better than\n\npredicted rate improvements\n\nfor all three gas wells.\n\nThese programs will now be\n\nextended to a variety of more\n\ncomplex and possibly harsher\n\noil and gas wellbore/reservoir\n\nenvironments during 2005.\n\nSantos increased gas well\n\ndeliverability in the Cooper\n\nBasin by 63 TJ per day through\n\nnumerous projects brought on\n\nline during 2004. Some 8 PJ\n\nof incremental gas production\n\nresulted during 2004 from this\n\noptimisation program. These\n\nresults were achieved at a\n\nsignificantly lower cost than\n\nconventional development drilling\n\nand substantially exceeded\n\ntargets set at the beginning\n\nof the year.\n\nWhile the Cooper Basin\n\nis a mature hydrocarbon area,\n\nSantos is drilling wells which can\n\nbe commercialised quickly and\n\ncost-effectively, delivering strong\n\ncash flow which can be applied\n\nto other growth opportunities.\n\nA further focus in 2004 was\n\nto leverage Cooper Basin\n\ninfrastructure; for example, via\n\ngas swaps, and increase prices\n\nunder existing agreements.\n\nAn increased Gas Sales Agreement\n\nwas reached with CS Energy which\n\nresulted in an additional seven\n\nwells being drilled at the Scotia\n\ncoal seam methane gas field in\n\neastern Queensland.\n\n## Leveraging Base Business\n\nHARNESSING VALUE FROM OPERATIONS", - "page_start": 13, - "page_end": 13, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n* **Apartment Property Expenses** *\n\nSame store apartment property expenses increased 5.5% for the year ended December 31, 2013, due primarily to increased utility and fuel\n\nexpenses as a result of high natural gas prices in Atlantic Canada, and higher electricity costs.\n\n**Utility and Fuel Expense ‑ Same Store**\n\nFor the years ended December 31,\n\n**2013** 2012 % Change\n\nNatural gas **$4,565** $2,729 67.3%\n\nOil **1,523** 2,095 (27.3)%\n\nElectricity **5,197** 4,671 11.3%\n\nWater **3,582** 3,474 3.1%\n\nOther **30** 33 (9.1)%\n\nTotal utility and fuel expenses **$14,897** $13,002 14.6%\n\nKillam’s apartment properties are heated with a combination of natural gas (55%), electricity (36%), oil (8%) and other sources (1%).\n\nElectricity costs at the unit level are usually paid directly by tenants, reducing Killam’s exposure to the majority of the 4,500 units heated with\n\nelectricity. Fuel costs associated with natural gas or oil fired heating plants are paid by Killam. As such, the Company is exposed to fluctuations\n\nin natural gas and oil costs, which represent 40.9% of total same store utility and fuel costs in 2013. Killam invests in green initiatives at its\n\nproperties to maximize efficiencies, including converting many of its Halifax properties to natural gas from oil over the last three years as natural\n\ngas infrastructure has been expanded in the city. The decision to convert was supported by the substantial price difference between the cost of\n\nnatural gas and oil in recent years.\n\nAs noted in the table above, Killam’s utility and fuel expenses increased 14.6% in 2013 compared to 2012. The increase was primarily attributable\n\nto higher natural gas, electricity costs and water costs.\n\nKillam’s natural gas expenses increased by 67.3% in 2013 due to higher gas prices in Atlantic Canada and an increase in properties burning\n\nnatural gas following conversions of certain Halifax heating plants from oil to gas in 2012 and 2013. The reduction in oil expense in the quarter\n\nand year‑to‑date reflects this reduction in oil exposure.\n\nAs the following chart highlights, the per gigajoule (Gj) commodity cost for natural gas in New Brunswick and Nova Scotia was much higher\n\nthan NYMEX in 2013 and less correlated to NYMEX than in previous years. (NYMEX is the New York Mercantile Exchange, a commodity futures\n\nexchange. Henry Hub, a gas distribution hub in Louisiana is the pricing point for natural gas futures contracts traded on NYMEX). The cost of\n\nnatural gas in Atlantic Canada and New England experienced a spike from December 2012 until late spring 2013 and a second spike in December\n\n2013, compared to other areas of Canada. Those spikes were both due to increased demand from utilities in Northeast New England and a\n\nshortage of gas pipeline capacity in Northeastern New England and Atlantic Canada. A temporary decline in gas supply off the coast of Nova\n\nScotia further contributed to the high pricing in the first part of the year.\n\n####### **Historic Natural Gas Pricing ($ per Gj) Henry Hub Vs. Heritage Gas**\n\n$4.40\n\n$9.97\n\n$15.49\n\n$0\n\n$2\n\n$4\n\n$6\n\n$8\n\n$10\n\n$12\n\n$14\n\n$16\n\n$18\n\nDec 2009 Feb 2010 apr 2010 Jun 2010 aug 2010 oct 2010 Dec 2010 Feb 2011 apr 2011 Jun 2011 aug 2011 oct 2011 Dec 2011 Feb 2012 apr 2012 Jun 2012 aug 2012 oct 2012 Dec 2012 Feb 2013 apr 2013 Jun 2013 aug 2013 oct 2013 Dec 2013\n\nHenry Hub new Brunswick Gas", - "page_start": 37, - "page_end": 37, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "horizontal wells drilled just to the Bossier may not always hold Haynes­\n\nville rights. Therefore, Chesapeake and other producers have been drilling\n\naggressively to hold all rights through the Haynesville before the initial\n\nthree-year term of a typical lease expires. As a result, there has not been\n\nmuch drilling to the Bossier to date. However, once our leases are held by\n\nproduction (HBP) by Haynesville drilling (we expect to be largely complete\n\nwith HBP drilling by year-end 2011 and completely finished by year-end\n\n2012), we will begin developing the Bossier Shale more aggressively in\n\n2013. In the Bossier play, we own 205,000 net leasehold acres and esti­\n\nmate we could drill up to 2,600 net wells in the years ahead.\n\nMarcellus Shale — We first became aware of the Marcellus in 2005\n\nwhen we were negotiating our $2.2 billion acquisition of Appalachia’s\n\nsecond-largest natural gas producer, Columbia Natural Resources, LLC.\n\nIn 2007 we aggressively accelerated our Marcellus leasehold acquisition\n\nefforts and began to prepare for our first drilling activities. By early 2008,\n\nwe had determined the Marcellus could be prospective over an area of\n\napproximately 15 million net acres (approximately five times larger\n\nthan the prospective Haynesville core area and 10 times larger than the\n\nBarnett core area).\n\nAfter acquiring 1.8 million net leasehold acres, we entered into a\n\njoint venture agreement in late 2008 with Oslo-based Statoil, one of the\n\nlargest and most respected European energy companies. In this trans­\n\naction, we sold Statoil 32.5% of our Marcellus assets for $3.375 billion\n\nin cash and drilling carries. Today, having sold 32.5% of our original 1.8\n\nmillion net leasehold acres, we have returned to owning 1.7 million net\n\nleasehold acres in the play and are the industry’s leading leasehold\n\nowner, largest producer and most active developer. We are producing\n\nfrom more than 100 net wells in the Marcellus on our 1.7 million net acres,\n\nare currently drilling with 32 rigs and estimate we could drill up to 21,000\n\nadditional net wells in the years ahead.\n\nColony and Texas Panhandle Granite Wash — These\n\nliquids-rich plays generate the company’s highest returns\n\n(routinely more than 100%) and provided the inspiration\n\nfor the company to find other liquids-rich plays in 2010.\n\nThe Granite Wash, and other plays with liquids-rich gas\n\nproduction streams, provide the strongest economics in\n\nthe industry today because they possess the best of both\n\nworlds: high-volume natural gas production along with\n\nsignificant volumes of highly valued liquids that dramatically increase\n\ninvestment returns.\n\nWe are producing from approximately 150 net Granite Wash\n\nwells, are currently drilling with 16 rigs and estimate we could drill\n\nup to 1,700 additional net wells on our 215,000 net leasehold acres in\n\nthe years ahead. Based on current NYMEX futures prices for natu­\n\nral gas and oil, each Granite Wash well should generate approxi-\n\nmately $11.5 million of present value (or up to an undiscounted\n\ntotal of $19.5 billion for all 1,700 wells), making it obvious why finding,\n\nleasing and developing more unconventional liquids-rich plays was\n\nChesapeake’s number one priority for 2010. We were very successful\n\n2010 ANNUAL REPORT | **9**\n\nThe very significant upward\n\ntrajectory of value creation that\n\nChesapeake is on today is primarily\n\ndriven by the quality of our assets,\n\nwhich feature dominant positions\n\nin 16 of the 20 most important\n\nmajor unconventional natural gas\n\nand liquids plays in the U.S.\n\n*Generating the highest returns in the company, plays like the Oklahoma Colony Granite*\n\n*Wash inspire Chesapeake to find other liquids-rich opportunities.*", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "####### * **Financial Position** *\n\nIn May 2014, the borrowing capacity under our credit facilities increased from an aggregate of $63 million to $135 million. The\n\nincrease in the borrowing capacity was driven by the significant uplift of the Company’s proved oil and gas reserves as at 31\n\nDecember 2013. In conjunction with the increase in the Company’s borrowing capacity, the Company expanded the syndicate\n\nof banks under the Senior Credit Facility. Bank of America Merrill Lynch and the Bank of Nova Scotia have now joined the bank\n\ngroup which is led by Wells Fargo.\n\nIn July 2014, the borrowing capacity increased an additional net $10 million, to $145 million, after taking into consideration\n\nthe removal of proved oil and gas reserves associated with the DJ and Williston Basin dispositions and the development of\n\nproved oil and gas reserves in the Eagle Ford Formation.\n\nAt 31 December 2014, the Company had $130 million outstanding under our credit facilities and $15 million available under\n\nour borrowing capacity. Ending cash at 31 December 2014 was $69.2 million.\n\n####### * **Cashflow** *\n\nCash provided by operating activities for the year ended 31 December 2014 increased 104.5% to $128.1 million compared to\n\nthe prior year. This increase was primarily due to receipts from sales increasing $85.7 million, or 101.2%, to $170.4 million,\n\nwhile keeping payments to suppliers and employees relatively stable with an increase of $8.2 million, or 37.7%, to $30.0 million.\n\nSee Review of Operations for more information.\n\nCash used in investing activities for the year ended 31 December 2014 increased $158.9 million, or 96.7%, to $323.2 million.\n\nThis increase is due to successful implementation of the Company’s strategy to develop and grow the reserves from our high\n\nworking interest, repeatable resource plays, primarily in the Eagle Ford. Due to funding available to the Company through\n\nasset sales, capital raises and credit facilities, the Company was able to accelerate its 2015 drilling program into 2014. However,\n\ndue to the reduction in crude oil prices in the fourth quarter of 2014 and continuing into early 2015, the Company will scale\n\nback its drilling program to concentrate on limited drilling obligations to hold Eagle Ford acreage during the 2015 year.\n\nCash provided by financing activities for the year ended 31 December 2014 increased $123.1 million, or 277.0%, to $167.6\n\nmillion. This increase is a result of the increased availability and draws under the Company’s credit facilities and proceeds\n\nreceived in a private placement of shares. In February 2014, the Company completed a private placement in which we sold\n\n84.2 million ordinary shares at A$0.95 per share, resulting in net proceeds of approximately $68.4 million. The first tranche of\n\n63.7 million shares was issued in March 2014 and the second tranche of 20.5 million shares was issued in April 2014.\n\n####### **Matters Subsequent to the End of the Financial Year**\n\nSubsequent to 31 December 2014, an additional $13.9 million was drawn-down the credit facilities, bringing total outstanding\n\ndebt to $143.9 million, with undrawn funds of $1.1 million.\n\nIn January 2015, the company acquired three leases totalling approximately 14,180 net acres in the Eagle Ford for\n\napproximately $13.4 million.\n\n####### **Future Developments, Prospects and Business Strategies**\n\nThe Group’s business strategies and prospects for growth in future financial years are presently concentrated on growing the\n\nvalue of the Group’s current resource plays through direct leasing from mineral owners, small acquisitions of producing\n\nproperties, drilling inventory within the Group’s current balance sheet capabilities, and development of the Group’s current\n\nacreage. Further information on likely development in the operations of the Group and expected results of operations has not\n\nbeen included because the Directors believe it would result in unreasonable prejudice to the Group.", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_SEA_2014.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_SEA_2014.pdf", - "query": "I heard that Sundance Energy has acquired land in South Texas in July 2014, where is it?", - "target_page": 21, - "target_passage": "In July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South Texas", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "TSR will be compared to a set of 22 oil and gas exploration and production companies headquartered in the United States and\n\nAustralia. The Australian-headquartered companies are highlighted. The chart on the right depicts the TSR over a three year\n\nperiod ending 31 December 2014. Diamondback Energy Inc, Matador Resources Co and Midstates Petroleum Co Inc were\n\nexcluded from the chart as there was not enough historical data to measure the defined TSR.\n\n| Company |\n|:---|\n| Abraxas Petroleum Corp/NV |\n| Approach Resources Inc |\n| Austex Oil Ltd |\n| Beach Energy Ltd |\n| Bonanza Creek Energy Inc. |\n| Callon Petroleum CO/DE |\n| Carrizo Oil & Gas Inc |\n| Contango Oil & Gas Co |\n| Diamondback Energy Inc |\n| Drillsearch Energy Ltd |\n| Emerald Oil Inc |\n| Goodrich Petroleum Corp |\n| Lonestar Resources Ltd |\n| Matador Resources Co |\n| Midstates Petroleum Co Inc |\n| Panhandle Oil & Gas Inc |\n| Red Fork Energy Ltd |\n| Rex Energy Corp |\n| Sanchez Energy Corp |\n| Senex Energy Ltd |\n| Synergy Resources Corp |\n| Triangle Petroleum Corp |\n\n*Retirement and Other Benefits*\n\nExecutive management participates in the same benefit plans and on the same basis as other employees. Those plans include\n\nhealth, dental and vision insurance (for which a premium contribution is required by the participant) and a 401(k) retirement plan\n\nunder which the Company makes an annual contribution equal to 3 percent of the participant’s eligible compensation.\n\n*Post-Termination and Change In Control Benefits*\n\nThe Managing Director’s employment contract provides for payment of his base salary through the end of the contract term in\n\nthe event he is terminated as a result of a change in control event. Additionally, in the event of a corporate take-over or change\n\nin control (as defined in the RSU Plan), our board in its discretion may cause all unvested RSUs to vest and be satisfied by the\n\nissue of one share each or provide for the cancellation of outstanding RSUs and a cash payment equal to the then-fair market\n\nvalue of the RSUs.", - "page_start": 39, - "page_end": 39, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**Subjective or Disclosure**\n\n**Policy Description Complex Judgments Reference**\n\n####### **Business Combinations**\n\nWe make decisions to acquire or invest in businesses based on Ñnancial and strategic considerations.\n\nBusinesses acquired are accounted for under the purchase method of accounting and are included in our\n\nConsolidated Financial Statements from the date of acquisition.\n\nWe acquired various solid waste businesses during the years ended December 31, 2004, 2003 and 2002.\n\nThe aggregate purchase prices we paid for these transactions was $47.4 million, $51.5 million and\n\n$55.8 million, respectively.\n\nCost in excess of fair value of net assets acquired (goodwill) for 2004 acquisitions totaled approximately\n\n$13.2 million. As of December 31, 2004 we had goodwill, net of accumulated amortization, of\n\n$1,562.7 million.\n\nDuring 2004, $28.2 million of the total purchase price paid for acquisitions and contingent payments to\n\nformer owners was allocated to landÑll airspace. As of December 31, 2004, we had $743.6 million of landÑll\n\ndevelopment costs, net of accumulated depletion and amortization, which includes purchase price allocated to\n\nlandÑll airspace as well as other capitalized landÑll costs. When a landÑll is acquired as part of a group of\n\nassets, purchase price is allocated to airspace based upon the discounted expected future cash Öows of the\n\nlandÑll relative to the other assets within the acquired group and is adjusted for other non-depletable landÑll\n\nassets and liabilities acquired (primarily Ñnal capping, closure and post-closure liabilities). LandÑll purchase\n\nprice is amortized using the units-of-consumption method over total available airspace, which includes\n\nprobable expansion airspace where appropriate.\n\n33", - "page_start": 40, - "page_end": 40, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "Annual Report 2004 8\n\n## THE WORLD OF SANTOS\n\n**United States**\n\nSouth Texas, Texas/\n\nLouisiana Gulf Coast\n\nDeer Creek Montana\n\nUnited States Egypt West Natuna Basin East Java\n\nHoutman Basin Duntroon Basin Otway Basin Sorell Basin\n\n**KEY TO MAPS**\n\nExploration\n\nProduction\n\nOil field\n\nGas field\n\nOil pipeline\n\nGas pipeline", - "page_start": 9, - "page_end": 9, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n*Property Acquisitions*\n\nWhen investment properties are acquired, Management considers whether the acquisition represents the acquisition of an asset or a business.\n\nThe Company accounts for an acquisition as a business combination where an integrated set of activities is acquired in addition to the property.\n\nMore specifically, consideration is made of the extent to which significant processes are acquired and, in particular, the extent of ancillary\n\nservices provided by the subsidiary (e.g., maintenance, cleaning, security, bookkeeping, leasing operations, etc.).\n\nManagement believes that the majority of the Company’s acquisitions will be classified as asset acquisitions. During the acquisition of most\n\nproperties, Killam buys the asset itself and any short‑term leases that are in place. Generally, Killam does not purchase any business systems or\n\nprocesses with a property. Management would consider an acquisition to be a business combination if all the following criteria were met:\n\n- The acquisition includes a property portfolio (multiple buildings),\n\n- A significant staff complement is included, including a maintenance team, leasing representatives and property management personnel, and\n\n- Systems are acquired and continue to be incorporated into operations.\n\n*Investment Properties*\n\nThe Company’s accounting policies relating to investment properties are described in Note 2(F). In applying this policy, judgment is applied in\n\ndetermining whether certain costs are additions to the carrying amount of the property and, for properties under construction, identifying\n\nthe point at which substantial completion of the property occurs and identifying the directly attributable borrowing costs to be included in the\n\ncarrying value of the development property. Judgment is also applied in determining the extent and frequency of independent appraisals.\n\n*Leases*\n\nThe Company has entered into residential property leases on its investment property portfolio. The Company has determined, based on an\n\nevaluation of the terms and conditions of the arrangements, that it has not transferred all the significant risks and rewards of ownership of these\n\nproperties and accounts for the contracts with tenants as operating leases.\n\n*Financial Instruments*\n\nThe Company’s accounting policies relating to financial instruments are described in Note 2(K). The critical judgments inherent in these policies\n\nrelate to applying the criteria set out in IAS 39 to designate financial instruments as fair value through profit and loss “FVTPL”, and determining\n\nwhether the Company has significant influence over investees with which it has contractual relationships in addition to the financial instrument it\n\nholds.\n\n*Taxes*\n\nThe Company is subject to income and capital gains taxes in numerous jurisdictions. Significant judgment is required to determine the total\n\nprovision for current and deferred taxes. There are many transactions and calculations for which the ultimate tax determination and timing of\n\npayment is uncertain. The Company recognizes liabilities for current taxes based on estimates of whether additional taxes will be due. Where\n\nthe final tax outcome of these matters is different from the amounts that were initially recorded, such differences will impact the income and\n\ndeferred tax provisions in the period in which the determination is made. Deferred tax assets and liabilities are recognized on a net basis to the\n\nextent they are relating to the same fiscal entity and fall due in approximately the same period.\n\n*Consolidation and joint arrangements*\n\nThe Company has determined that it controls and consolidates the subsidiaries where it owns a majority of the shares. The Company is part\n\nowner of one property in which it has a 47% interest. The Company has determined that it does control this property as it operates and manages", - "page_start": 60, - "page_end": 60, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "Annual Report 2004 20\n\nOn top of exploration and new\n\nventures growth opportunities,\n\nSantos has a large inventory of\n\ngas fields that are yet to be\n\ncommitted to gas contracts.\n\nThese fields, known as contingent\n\nresources, represent significant\n\nopportunities for Santos.\n\nEach year Santos works towards\n\ncommercialising these fields by\n\nfinding new gas contracts or\n\nextending existing contracts\n\nso that they can be booked as\n\nProven (1P) or Proven plus\n\nProbable (2P) reserves.\n\nSantos’ contingent gas resources\n\nare largely located offshore\n\nsouthern Australia and Western\n\nAustralia, in the Bonaparte Basin\n\noffshore northern Australia and\n\nonshore Papua New Guinea.\n\nSantos continued to deliver on\n\ngas commercialisation during\n\n2004, commercialising 27 million\n\nboe during the year. Santos also\n\nachieved positive contract price\n\nreviews for gas sales that were\n\nwell above the indexed levels.\n\n**UNIQUE ENERGY HUBS DELIVER**\n\n**GAS SWAPS**\n\nSome of the most important gas\n\ncommercialisation achievements\n\nfor the year were the innovative\n\ngas swaps agreements that were\n\nonly possible because of Santos’\n\nunique spread of assets across key\n\nAustralian gas hubs.\n\nSantos and the other South\n\nWest Queensland Gas Producers\n\nannounced a coal seam methane\n\ngas swap in May to allow each\n\nparty to supply the other party’s\n\ncontractual obligations in\n\ndifferent states via the Moomba\n\ngas hub in central Australia. This\n\narrangement for 200 PJ meant\n\nthat Origin could avoid building\n\na pipeline and that Santos could\n\ncapture a share of the saving.\n\nGas swapping will commence in\n\n2005 and could continue until the\n\nend of 2011.\n\nA second gas swap, from eastern\n\nQueensland to Gippsland, moved\n\ngas through three states and five\n\njoint ventures, expanding market\n\nhorizons for partners and\n\nproviding backup options\n\nto customers.\n\n**EXPANDED CASINO CONTRACT**\n\n**ENHANCES VALUE**\n\nThe commercialisation of the\n\nCasino gas field in the Otway\n\nBasin, offshore southern Australia,\n\ncontinued during 2004 with an\n\nincrease in the quantity of gas\n\nbeing sold under the initial term\n\nsheet signed in September 2003\n\nwith TXU for 293 PJ.\n\nWhen the project was sanctioned\n\nin October 2004, the joint venture\n\nannounced an extension to the\n\noriginal Gas Sales Agreement to\n\nsupply up to 420 PJ of gas, and\n\npossibly another 105 PJ, over 12\n\nyears for the Victorian or South\n\nAustralian markets.\n\nThe Casino contracts are unique\n\nin that the reserves have been\n\ncontracted prior to the field being\n\nfully appraised to confirm the\n\nquantity of gas available. This\n\nhas allowed the joint venture\n\nto undertake appraisal drilling\n\nand near field exploration\n\nprograms with the knowledge\n\nthat all of the gas likely to be\n\ndiscovered will be taken, thereby\n\nsignificantly reducing the risk.\n\nThis shortens the time from\n\ndiscovery to production and\n\ndelivers profits to Santos and\n\nits shareholders sooner.\n\n**WA CONTRACTS FAST-TRACK**\n\n**JOHN BROOKES**\n\nSantos and its co-venturer\n\nApache won two significant gas\n\ncontracts in Western Australia\n\nwhich resulted in the fast\n\ntracking and sanctioning of the\n\nJohn Brookes gas field in the\n\nCarnarvon Basin.\n\nThe successful appraisal of the\n\nfield in late 2003 and early 2004\n\nsignificantly increased the\n\navailable gas reserves. The\n\ndecision to bring the field into\n\nproduction by mid-2005 enabled\n\nactive marketing of gas above\n\nthat already allocated to support\n\nthe declining East Spar field.\n\nIn a separate move, designed to\n\nenhance future commercialisation\n\nopportunities, the joint venture\n\nequity interests in the East Spar\n\nand the John Brookes fields were\n\naligned through an acquisition\n\nprogram which created an\n\nimportant production hub\n\nat Varanus Island.\n\nJohn Brookes has an expected\n\nfield life of more than 15 years\n\nwhich could be further extended\n\nby a development of the Reindeer\n\nfield in later years.\n\nIn the first contract, the joint\n\nventure agreed to supply\n\nNewcrest Mining with 120 PJ of\n\ngas over 15 years at a maximum", - "page_start": 21, - "page_end": 21, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "horizontal wells drilled just to the Bossier may not always hold Haynes­\n\nville rights. Therefore, Chesapeake and other producers have been drilling\n\naggressively to hold all rights through the Haynesville before the initial\n\nthree-year term of a typical lease expires. As a result, there has not been\n\nmuch drilling to the Bossier to date. However, once our leases are held by\n\nproduction (HBP) by Haynesville drilling (we expect to be largely complete\n\nwith HBP drilling by year-end 2011 and completely finished by year-end\n\n2012), we will begin developing the Bossier Shale more aggressively in\n\n2013. In the Bossier play, we own 205,000 net leasehold acres and esti­\n\nmate we could drill up to 2,600 net wells in the years ahead.\n\nMarcellus Shale — We first became aware of the Marcellus in 2005\n\nwhen we were negotiating our $2.2 billion acquisition of Appalachia’s\n\nsecond-largest natural gas producer, Columbia Natural Resources, LLC.\n\nIn 2007 we aggressively accelerated our Marcellus leasehold acquisition\n\nefforts and began to prepare for our first drilling activities. By early 2008,\n\nwe had determined the Marcellus could be prospective over an area of\n\napproximately 15 million net acres (approximately five times larger\n\nthan the prospective Haynesville core area and 10 times larger than the\n\nBarnett core area).\n\nAfter acquiring 1.8 million net leasehold acres, we entered into a\n\njoint venture agreement in late 2008 with Oslo-based Statoil, one of the\n\nlargest and most respected European energy companies. In this trans­\n\naction, we sold Statoil 32.5% of our Marcellus assets for $3.375 billion\n\nin cash and drilling carries. Today, having sold 32.5% of our original 1.8\n\nmillion net leasehold acres, we have returned to owning 1.7 million net\n\nleasehold acres in the play and are the industry’s leading leasehold\n\nowner, largest producer and most active developer. We are producing\n\nfrom more than 100 net wells in the Marcellus on our 1.7 million net acres,\n\nare currently drilling with 32 rigs and estimate we could drill up to 21,000\n\nadditional net wells in the years ahead.\n\nColony and Texas Panhandle Granite Wash — These\n\nliquids-rich plays generate the company’s highest returns\n\n(routinely more than 100%) and provided the inspiration\n\nfor the company to find other liquids-rich plays in 2010.\n\nThe Granite Wash, and other plays with liquids-rich gas\n\nproduction streams, provide the strongest economics in\n\nthe industry today because they possess the best of both\n\nworlds: high-volume natural gas production along with\n\nsignificant volumes of highly valued liquids that dramatically increase\n\ninvestment returns.\n\nWe are producing from approximately 150 net Granite Wash\n\nwells, are currently drilling with 16 rigs and estimate we could drill\n\nup to 1,700 additional net wells on our 215,000 net leasehold acres in\n\nthe years ahead. Based on current NYMEX futures prices for natu­\n\nral gas and oil, each Granite Wash well should generate approxi-\n\nmately $11.5 million of present value (or up to an undiscounted\n\ntotal of $19.5 billion for all 1,700 wells), making it obvious why finding,\n\nleasing and developing more unconventional liquids-rich plays was\n\nChesapeake’s number one priority for 2010. We were very successful\n\n2010 ANNUAL REPORT | **9**\n\nThe very significant upward\n\ntrajectory of value creation that\n\nChesapeake is on today is primarily\n\ndriven by the quality of our assets,\n\nwhich feature dominant positions\n\nin 16 of the 20 most important\n\nmajor unconventional natural gas\n\nand liquids plays in the U.S.\n\n*Generating the highest returns in the company, plays like the Oklahoma Colony Granite*\n\n*Wash inspire Chesapeake to find other liquids-rich opportunities.*", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "Annual Report 2004 23\n\nIn 2004, Santos continued its\n\nnormal business of actively\n\nmanaging its portfolio through\n\nthe divestment of non-core assets\n\nand the acquisition of assets that\n\nfit well with existing Santos\n\nassets or can add to the ability\n\nof the Company to meet its\n\nstrategic goals.\n\nAs a result of this activity,\n\nSantos realised an after-tax profit\n\nof $47.4 million on oil and gas\n\nasset sales and will continue to\n\nhigh-grade its portfolio on an\n\nongoing basis.\n\nSantos entered into an agreement\n\nwith PT Medco during the first\n\nhalf of 2004 to acquire some of\n\nNovus Petroleum’s Indonesian and\n\nCooper Basin assets conditional\n\non the success of PT Medco’s\n\ntakeover offer for Novus, which\n\nwas ultimately successful.\n\nSpecifically, Santos announced\n\nin September 2004 that it had\n\nexecuted formal agreements to\n\nacquire an additional 4.75% of\n\nthe South Australian Cooper\n\nBasin, 18% of the Brantas PSC\n\nand 9% of the Kakap PSC from\n\nMedco for US$110 million. On\n\n31 December 2004, Santos paid\n\nMedco US$98 million for the\n\nmajority of the assets, with\n\npayment for the remaining 2.75%\n\nof Kakap PSC expected to be\n\nmade in the first quarter of 2005.\n\nThis acquisition was an important\n\npiece in the strategic puzzle to\n\ntie up access to follow-up\n\npotential from the successful\n\nexploration at Jeruk and to\n\nprovide a production base for\n\nthe newly established Indonesian\n\ncore area.\n\nAlso during the first half of 2004,\n\nSantos divested its remaining\n\n18.4% shareholding in Magellan\n\nPetroleum Australia Ltd, raising\n\napproximately $10.6 million.\n\nEarly in the second half of 2004,\n\nSantos concluded the sale of its\n\nnon-core onshore Otway Basin\n\ninterests to Origin Energy for\n\n$25.75 million. This sale\n\nresulted in an after-tax profit\n\nof $18 million that was booked\n\nin 2004.\n\nIn addition, an exploration\n\njoint venture was formed with\n\nConocoPhillips in the NT/P61\n\nblock offshore Darwin, Northern\n\nTerritory, to drill the Caldita well\n\nand provide Santos with access\n\nrights to a potential expansion of\n\nthe Wickham Point LNG facility.\n\nThis deal further enhances Santos’\n\ninfrastructure strategy to leverage\n\nits position within vital\n\ninfrastructure to improve\n\nshareholder value while reducing\n\nthe risk profile of the wildcat\n\nexploration program.\n\nDuring the third quarter, Santos\n\nexpanded its offshore Victorian\n\ngas interests to 50% in both the\n\nPatricia-Baleen and the Sole gas\n\nfields through the acquisition\n\nfrom Trinity Gas Resources of an\n\nadditional 30% interest in the\n\nPatricia-Baleen gas field and\n\nassociated processing facilities in\n\neastern Victoria and an additional\n\n15% interest in the Sole gas field.\n\nSantos earned its 30% additional\n\nequity in the Patricia-Baleen gas\n\nfield by meeting Trinity’s\n\nremaining share of drilling costs\n\non the Baleen 4 well which was\n\ndrilled successfully as a sidetrack\n\nwell of Baleen 3. Santos will earn\n\nits 15% additional equity in the\n\nSole gas field by meeting certain\n\ndevelopment costs on behalf of\n\nTrinity, if and when the Sole joint\n\nventure partners proceed to\n\ndevelop this gas resource.\n\nThe acquisition of these Victorian\n\ngas interests strengthens Santos’\n\ndomestic gas and infrastructure\n\nstrategy that was further\n\nenhanced by the OMV purchase\n\nannounced early in 2005.\n\nImportantly, Santos is now the\n\noperator of the strategic Orbost\n\ngas processing facility.\n\nLate in the year, Santos sold its\n\n18.02% share in the Carpentaria\n\nGas Pipeline between Ballera\n\nand Mount Isa in Queensland\n\nto Australian Pipeline Trust for\n\n$59 million, resulting in a\n\n$21 million after-tax profit\n\nthat was booked in the 2004\n\nfinancial year.\n\nENHANCING THE PORTFOLIO\n\n**BRANTAS PSC**", - "page_start": 24, - "page_end": 24, - "source_file": "ASX_STO_2004.pdf" - }, - { - "text": "with these new play efforts, the most notable of which are described\n\nin the sections below.\n\nEagle Ford Shale — This South Texas shale is distinctive from the other\n\nshale plays described above because it has three components: an oil\n\nplay, a wet natural gas play and a dry natural gas play. During 2009- 10,\n\nChesapeake acquired approximately 600,000 Eagle Ford net leasehold\n\nacres, all of which were in the liquids-rich portions of the play. Our initial\n\nwells were very successful, and in late 2010 we sold 33.3% of our assets\n\nin the play to Beijing-based Chinese National Offshore Oil Company\n\n(CNOOC) for $2.2 billion in cash and drilling carries. This was CNOOC’s\n\nfirst investment in the U.S. onshore E&P industry, and we are proud that\n\nit chose Chesapeake as its first U.S. onshore partner. We are currently\n\ndrilling with 16 rigs in this play and expect to accelerate our drilling to\n\n40 rigs by year-end 2013. We believe our 470,000 net leasehold acre\n\nposition could support the drilling of up to 5,500 additional net wells\n\nin the years ahead.\n\nPearsall Shale — This shale underlies most of our Eagle Ford acreage\n\nand is the second “sleeper” of our natural gas shale plays. We have two\n\nrigs dedicated to testing this formation, and our first few wells have\n\nsignificantly exceeded our expectations. This formation is found about\n\n3,000- 4,000 feet deeper than the Eagle Ford and so for the play to\n\nbecome competitive with our other natural gas shale plays, we will need\n\nnatural gas prices to strengthen from where they are today. We believe\n\nthis will likely occur in 2013 at the latest. We believe our 350,000 net\n\nacre Pearsall leasehold position could support the drilling of up to 3,000\n\nadditional net wells.\n\nNiobrara Shale — The Niobrara is a two-basin play, covering substan­\n\ntial portions of both the Powder River Basin of east-central Wyoming\n\nand the DJ Basin of southeastern Wyoming and northeastern Colorado.\n\nDuring 2008- 10, Chesapeake acquired approximately 800,000 net lease-\n\nhold acres in these two liquids-rich basins, and in early 2011 we sold\n\n33.3% of our assets in the play to CNOOC for approximately $1.3 billion\n\n**10** | LETTER TO SHAREHOLDERS\n\n*A Chesapeake discovery, Louisiana’s Haynesville Shale recently passed the Barnett Shale to become the nation’s largest producing shale play. The Haynesville*\n\n*comes with an added attraction — much of it is overlain by another prolific natural gas-producing formation, the Bossier Shale.*", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "*Transfer and Disposal Services.* We own or operate 96 transfer stations. We deposit waste at these\n\nstations, as do other private haulers and municipal haulers, for compaction and transfer to trailers for transport\n\nto disposal sites or recycling facilities. As of December 31, 2004, we owned or operated 58 landÑlls, which had\n\napproximately 8,904 permitted acres and total available permitted and probable expansion disposal capacity of\n\napproximately 1.7 billion in-place cubic yards. The in-place capacity of our landÑlls is subject to change based\n\non engineering factors, requirements of regulatory authorities and the ability to expand our sites successfully.\n\nSome of our landÑlls accept non-hazardous special waste, including utility ash, asbestos and contaminated\n\nsoils. See \"\"Ì Properties.''\n\nMost of our existing landÑll sites have the potential for expanded disposal capacity beyond the currently\n\npermitted acreage. We monitor the availability of permitted disposal capacity at each of our landÑlls and\n\nevaluate whether to pursue expansion at a given landÑll based on estimated future waste volumes and prices,\n\nmarket needs, remaining capacity and likelihood of obtaining an expansion. To satisfy future disposal demand,\n\nwe are currently seeking to expand permitted capacity at certain of our landÑlls, although no assurances can be\n\nmade that all future expansions will be permitted as designed.\n\n*Other Services.* We have 35 materials recovery facilities and other recycling operations, which are\n\ngenerally required to fulÑll our obligations under long-term municipal contracts for residential collection\n\nservices. These facilities sort recyclable paper, aluminum, glass and other materials. Most of these recyclable\n\nmaterials are internally collected by our residential collection operations. In some areas, we receive\n\ncommercial and industrial solid waste that is sorted at our facilities into recyclable materials and non-\n\nrecyclable waste. The recyclable materials are salvaged, repackaged and sold to third parties and the non-\n\nrecyclable waste is disposed of at landÑlls or incinerators. Wherever possible, our strategy is to reduce our\n\nexposure to Öuctuations in recyclable commodity prices by utilizing third party recycling facilities, thereby\n\nminimizing our recycling investment.\n\nWe provide remediation and other heavy construction services primarily through our subsidiary located in\n\nMissouri.\n\nWe also have a Texas-based compost, mulch and soil business at which yard, mill and other waste is\n\nprocessed, packaged and sold as various products.\n\n####### **Sales and Marketing**\n\nWe seek to provide quality services that will enable our company to maintain high levels of customer\n\nsatisfaction. We derive our business from a broad customer base which we believe will enable our company to\n\nexperience stable growth. We focus our marketing eÅorts on continuing and expanding business with existing\n\ncustomers, as well as attracting new customers.\n\nWe employ approximately 500 sales and marketing employees. Our sales and marketing strategy is to\n\nprovide high-quality, comprehensive solid waste collection, recycling, transfer and disposal services to our\n\ncustomers at competitive prices. We target potential customers of all sizes, from small quantity generators to\n\nlarge \"\"Fortune 500'' companies and municipalities.\n\nMost of our marketing activity is local in nature. However, in 2000 we initiated a national accounts\n\nprogram in response to our customers' needs.\n\nWe generally do not change the tradenames of the local businesses we acquire, and therefore we do not\n\noperate nationally under any one mark or tradename. Rather, we rely on the goodwill associated with the\n\nacquired companies' local tradenames as used in each geographic market in which we operate.\n\n####### **Customers**\n\nWe provide services to commercial, industrial, municipal and residential customers. No one customer has", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RSG_2004.pdf" - }, - { - "text": "**8** | LETTER TO SHAREHOLDERS\n\n$2.25 billion in cash and drilling carries for its 25% stake in the\n\nBarnett, and we are extremely proud to have Total as one of our\n\npremier joint venture partners.\n\nHaynesville Shale — The Haynesville Shale in Northwest Louisi­\n\nana and East Texas is the shale play of which we are most proud\n\n(to date) because it was discovered by Chesapeake’s own geo­\n\nscientists and engineers. We conducted our geoscientific inves­\n\ntigation of the Haynesville in 2005- 06 and tested our theories\n\nthrough drilling in 2007. In 2008 we formed an innovative joint\n\nventure agreement with our well-respected industry partner,\n\nHouston-based Plains Exploration & Production Company, to\n\nwhich we sold 20% of our Haynesville (and Bossier) assets for\n\napproximately $3.2 billion in cash and drilling carries.\n\nThe Haynesville Shale is now the nation’s largest producing\n\nnatural gas shale play, having just recently passed the Barnett\n\nShale in production (in last year’s letter, I incorrectly estimated\n\nit would take until 2014 for the Haynesville to reach this achieve­\n\nment, a testament to the play’s enormous productive poten­\n\ntial). Ultimate recoveries from the Haynesville could exceed 250\n\ntcfe, likely making it one of the five largest natural gas fields\n\nin the world. Today, we are producing from more than 260 net\n\nwells in the Haynesville on our 530,000 net leasehold acres,\n\nare currently drilling with 35 rigs and estimate we could drill\n\nup to 6,300 additional net wells in the years ahead. Our gross\n\noperated production in the Haynesville recently set a record of\n\nnearly 1.6 bcfe per day.\n\nBossier Shale — This shale\n\noverlies about one-third\n\nof our Haynesville acre­\n\nage and is the first of our\n\ntwo “sleeper” natural gas\n\nshale plays. The reason is\n\nthat in Louisiana, leases\n\noften restrict the lessee\n\n(i.e., the producer) to only\n\nholding future drilling\n\nrights down through the\n\ndeepest formation drilled.\n\nBecause the Bossier lies\n\nabove the Haynesville,\n\n*One producing and one on the way: the Texas Panhandle Granite*\n\n*Wash offers high volumes of natural gas accompanied by highly*\n\n*valued liquids production as well.*\n\n**Growing Demand for U.S. Natural Gas Will Drive**\n\n**Improved Prices in the Years Ahead**\n\nSeveral factors are emerging in the U.S. that will drive increased\n\ndemand for natural gas, which in turn could improve out year\n\nnatural gas prices:\n\n**Growing momentum for CNG passenger and LNG long-haul**\n\n**truck vehicles**\n\nEnormous cost savings are available to consumers and business-\n\nes that chose to use natural gas as an alternative transportation\n\nfuel ($1.39 per gallon for CNG in Oklahoma, for example, compared\n\nto $3.75- $4.00 per gallon for gasoline and diesel).\n\n**Growing industrial demand**\n\nWith recent low prices for domestic natural gas, U.S. industries\n\nthat utilize natural gas as a feedstock in their manufacturing pro-\n\ncesses have a significant cost advantage compared with inter-\n\nnational peers whose feedstock is indexed either to oil or global\n\nnatural gas prices.\n\n**Continuing and accelerating shift from coal to natural gas for**\n\n**U.S. electrical power generation**\n\nTo clean our environment, dozens of aging coal-powered elec-\n\ntricity plants will be retired in the next decade and replaced\n\nwith the cleaner alternative of natural gas. A combination of\n\nshifting power sources and higher utilization within existing\n\ngas-fired power plants will likely increase natural gas demand by\n\n10- 15 bcf per day over the next decade.\n\n**Conversion of U.S. LNG import facilities to LNG export**\n\n**facilities**\n\nWith increasing demand for natural gas around the\n\nworld and the abundance of U.S. natural gas reserves,\n\nproducers will be able to tap into higher-margin markets\n\nin Europe, South America and Asia once export capa-\n\nbilities are available potentially beginning in 2015.\n\n**Construction of U.S. gas-to-liquids (GTL) plants**\n\nConverting natural gas to a room temperature liquid", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "ASX_SEA_2014.pdf", - "query": "I am the CFO of Sundance Energy, will my base increase in 2015 as it did in 2014?", - "target_page": 31, - "target_passage": "No increases to Managing Director’s or KMP’s base salary", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "**3**\n\nAt year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford\n\nacreage where we continue to pursue operational and drilling efficiencies, opportunities\n\nto further improve well economics by improving recoveries and reducing costs. In 2014\n\nthis included a switch to pad drilling with zipper fracs and new completion techniques\n\nthat have provided significant upside in production.\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance\n\nat 7,850 - 8,500 BOEPD, an increase from the previous year of some 13 - 17 percent,\n\nbut a target that we believe is achievable while maintaining acceptable levels of liquidity\n\ngiven our demonstrated abilities and growing footprint in the Eagle Ford.\n\n####### **Safety and Environment**\n\nSundance has a strong culture throughout the organisation of ensuring that high standards\n\nof safety are maintained and that our operations are conducted in an environmentally\n\nresponsible way. During 2014 our comprehensive safety program was enhanced and\n\nfurther improvements will be a strong focus throughout 2015.\n\n####### **A strong financial position**\n\nSundance is well placed for future growth in the Eagle Ford. The Company has a strong\n\nbalance sheet to withstand the current low oil price environment, and our sound financial\n\nmanagement strategy has seen the Company well supported by both new and existing\n\ninvestors in Australia and internationally.\n\nWe expect that Sundance will grow organically and also through further leasing or\n\nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative\n\nbalance sheet parameters.\n\n####### **Positive outlook for 2015**\n\nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth\n\ntrajectory looks very positive.\n\nWe can demonstrate this through:\n\n- A track record of capital efficient growth\n\n- A track record of value creation\n\n- Being a low cost/high margin operator\n\n- Having top tier Eagle Ford assets with an extensive drilling inventory\n\n- Having a clean balance sheet\n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index,\n\nand with the increasing interest and support from institutional and retail investors. I believe\n\nthat Sundance will deliver significant long-term value from our assets for our shareholders.\n\n####### **Thank you for your support**\n\nWe have had a busy year at Sundance and I would like to recognise the efforts and valued\n\ncontribution of the Board of Directors, management team and all staff and contractors of\n\nthe Company in helping us achieve our strategic goals. I am confident that we have the\n\nright team and excellent assets in place to execute our clear and focused strategy that we\n\nexpect to deliver significant value for our shareholders.\n\nOn behalf of the Board and Company, I would like to thank our shareholders for your\n\nstrong support of the Company throughout the year. We are committed to delivering\n\nlong-term value for our shareholders and I look forward to reporting over the rest of the\n\ncoming year on the continued value creation and growth of Sundance.\n\nYours sincerely,\n\n**M IKE H ANNELL**\n\n*Chairman*\n\n*The Company has a*\n\n*strong balance sheet to*\n\n*withstand the current low*\n\n*oil price environment,*\n\n*and our sound financial*\n\n*management strategy*\n\n*has seen the Company*\n\n*well supported by*\n\n*both new and existing*\n\n*investors in Australia*\n\n*and internationally.*", - "page_start": 4, - "page_end": 4, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "##### * **Dear Fellow Shareholders,** *\n\n##### *I am pleased to present Sundance Energy Australia Limited’s*\n\n##### *Annual Report for the 12 months ended 31 December 2014. It*\n\n##### *has been another year of significant progress for Sundance*\n\n##### *across our portfolio of liquids rich oil and gas assets in the US.*\n\nThe Company’s strategic focus on growing production, cash flows and reserves from\n\nlarge, repeatable resource plays in North America continues to deliver positive results\n\nwith growth in production, cash flows, and reserves.\n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston\n\nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent;\n\nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado\n\nfor $114 million which realised an internal rate of return of 104 percent. These divestitures\n\nof smaller, less scalable positions enabled us to focus on developing and growing our\n\nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma.\n\nDespite the reduction in crude oil and liquids prices towards the end of the year\n\nand continuing into 2015, the operational performance and focused, value-adding\n\ntransactions during the past year have positioned the Company very favourably for\n\nfuture growth in net asset value and shareholder returns.\n\n####### **A year of growing production, cash flow and reserves**\n\nIn line with our strategy we continued to increase the level of company operated assets,\n\nand successfully maintained a very strong focus on optimising our operations and reducing\n\ncosts. This resulted in an impressive improvement in well performance combined with a\n\ntop tier cost structure.\n\nThrough our operated development program, we ended 2014 with record production\n\nof 9,434 barrels of oil equivalent per day (BOEPD) compared with an exit rate of 5,028\n\nBOEPD in December 2013 and an average annual production of 6,635 BOEPD compared\n\nto 3,015 BOEPD in 2013. During 2014 we drilled and completed 42.7 net wells, primarily\n\nin the Eagle Ford, bringing our total well count to 81.3 by 31 December 2014. High\n\nvalue oil comprised approximately 69 percent of our total 2014 annual production\n\nand production from Sundance-operated projects accounted for 89 percent of total\n\nproduction for the year.\n\nCorresponding with the growth in annual production, the Company’s full year revenues\n\nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million.\n\nThe Company’s development program also generated significant growth in Constant Case\n\nreserves during the year. More details are contained elsewhere in this Annual Report,\n\nbut in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1\n\nMBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6\n\nMBOE, and 92.8 MBOE, respectively, at the end of 2013.\n\nIn the current price environment, we have elected to scale back our drilling program to\n\nmainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will\n\nenable us to maintain our low leverage profile, which was approximately 1.03x debt to\n\nAdjusted EBITDAX at year end, and focus on growing our drilling inventory in an environ-\n\nment with less competition for leases and small acquisitions. Liquidity was $84 million at\n\nyear end, with a borrowing base redetermination in 2015 expected to materially increase\n\ndebt availability if the use of such funds is justified in line with our strategy.\n\n####### **The Eagle Ford - driving value and production growth**\n\nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the\n\nbasin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014\n\nwhich includes the acquisition of approximately 18,000 net acreage in 2014. By the end of\n\nthe first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "TSR will be compared to a set of 22 oil and gas exploration and production companies headquartered in the United States and\n\nAustralia. The Australian-headquartered companies are highlighted. The chart on the right depicts the TSR over a three year\n\nperiod ending 31 December 2014. Diamondback Energy Inc, Matador Resources Co and Midstates Petroleum Co Inc were\n\nexcluded from the chart as there was not enough historical data to measure the defined TSR.\n\n| Company |\n|:---|\n| Abraxas Petroleum Corp/NV |\n| Approach Resources Inc |\n| Austex Oil Ltd |\n| Beach Energy Ltd |\n| Bonanza Creek Energy Inc. |\n| Callon Petroleum CO/DE |\n| Carrizo Oil & Gas Inc |\n| Contango Oil & Gas Co |\n| Diamondback Energy Inc |\n| Drillsearch Energy Ltd |\n| Emerald Oil Inc |\n| Goodrich Petroleum Corp |\n| Lonestar Resources Ltd |\n| Matador Resources Co |\n| Midstates Petroleum Co Inc |\n| Panhandle Oil & Gas Inc |\n| Red Fork Energy Ltd |\n| Rex Energy Corp |\n| Sanchez Energy Corp |\n| Senex Energy Ltd |\n| Synergy Resources Corp |\n| Triangle Petroleum Corp |\n\n*Retirement and Other Benefits*\n\nExecutive management participates in the same benefit plans and on the same basis as other employees. Those plans include\n\nhealth, dental and vision insurance (for which a premium contribution is required by the participant) and a 401(k) retirement plan\n\nunder which the Company makes an annual contribution equal to 3 percent of the participant’s eligible compensation.\n\n*Post-Termination and Change In Control Benefits*\n\nThe Managing Director’s employment contract provides for payment of his base salary through the end of the contract term in\n\nthe event he is terminated as a result of a change in control event. Additionally, in the event of a corporate take-over or change\n\nin control (as defined in the RSU Plan), our board in its discretion may cause all unvested RSUs to vest and be satisfied by the\n\nissue of one share each or provide for the cancellation of outstanding RSUs and a cash payment equal to the then-fair market\n\nvalue of the RSUs.", - "page_start": 39, - "page_end": 39, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Complete a minimum\n\nof $75 million in\n\nacquisitions.\n\nAcquire over 50%\n\nof 2014 acquisitions\n\noutside Atlantic\n\nCanada, with a focus\n\nin Ontario.\n\nGrow same store\n\nNOI by up to 2%.\n\nContinue to invest\n\nin development\n\nwith two projects\n\nunderway, managing\n\nprojects on schedule\n\nand on budget.\n\ndevelopment program to a maximum of 5% of our balance sheet per year. We\n\nhave three other developments projects in various planning stages, but don’t\n\nexpect to begin construction on any additional new projects until late 2014 or\n\ninto 2015.\n\n####### **Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic\n\nCanada is the foundation of the Company; however, with Atlantic Canada\n\nrepresenting only 5% of the Canadian rental market, our growth opportunities\n\nincrease significantly by expanding our target markets outside of this region.\n\nWith its strong operating platform, Killam can support a larger and more\n\ngeographically diverse portfolio. We are actively growing a portfolio of\n\napartments in Ontario in three target markets: Ottawa, the Greater Toronto\n\nArea, and Southwestern Ontario. An increased investment outside Atlantic\n\nCanada will increase not only Killam’s growth potential, it will also expand the\n\nCompany’s diversification and exposure to higher growth markets.\n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition\n\nto 1,359 apartment units in the province, we also have 2,144 manufactured\n\nhome community sites, representing 29% of the MHC NOI last year. Based on\n\nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario,\n\ncompared to our longer-term goal of generating 50% of NOI outside Atlantic\n\nCanada. We expect to reach this goal by focusing acquisition activity in\n\nOntario, with the majority of future investment anticipated in the province over\n\nthe next few years. We will look for additional development opportunities in\n\nOntario and we are exploring opportunities in Western Canada, attracted by\n\nthe strong population growth trends in Alberta’s urban markets.\n\nI would like to thank all Killam employees for their contributions and\n\ncommitment over the last year and our board of directors for their governance.\n\nAlso, I would like to thank you, our shareholders, for your continued investment\n\nin Killam. I invite you to attend the Company’s annual meeting on May 7, 2014\n\nat 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in\n\nperson or via webcast.\n\nYours truly,\n\nPhilip Fraser\n\nOur Goals for 2014 Portfolio Facts", - "page_start": 10, - "page_end": 10, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "gas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural\n\ngas is clean, affordable, abundant and American. Why *shouldn’t* it trade at a BTU premium in the years ahead?\n\n**Why is an investment grade rating on its debt securities important to CHK?**\n\nWe believe that Chesapeake will benefit in multiple ways from an investment grade rating on our debt\n\nsecurities, which we hope to achieve in 2012 or 2013. First, a higher rating would obviously lower the company’s\n\nborrowing costs over time. In addition, other less easily quantifiable benefits will also accrue to Chesapeake.\n\nHigher debt ratings would result in lower costs on long-term firm transportation contracts that we enter into in\n\norder to market our natural gas and oil production as well as facilitate our ability to enter into long-term contracts\n\nto sell our natural gas production to international buyers in the form of LNG. An improved rating will also enhance\n\nChesapeake’s ability to further attract world-class energy companies to participate in our joint venture projects,\n\nwhich profitably monetize a portion of our leasehold investments and also accelerate the development of our\n\nresource base. Finally, and perhaps most importantly, we believe that reduced financial leverage and an invest­\n\nment grade rating will lead to a higher stock price and provide further interest from worldwide equity investors.\n\nJeff Fisher\n\nSenior Vice President - Production\n\nNick Dell’Osso\n\nExecutive Vice President\n\nand Chief Financial Officer\n\nJeff Mobley\n\nSenior Vice President -\n\nInvestor Relations and Research\n\n2010 ANNUAL REPORT | **21**", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "horizontal wells drilled just to the Bossier may not always hold Haynes­\n\nville rights. Therefore, Chesapeake and other producers have been drilling\n\naggressively to hold all rights through the Haynesville before the initial\n\nthree-year term of a typical lease expires. As a result, there has not been\n\nmuch drilling to the Bossier to date. However, once our leases are held by\n\nproduction (HBP) by Haynesville drilling (we expect to be largely complete\n\nwith HBP drilling by year-end 2011 and completely finished by year-end\n\n2012), we will begin developing the Bossier Shale more aggressively in\n\n2013. In the Bossier play, we own 205,000 net leasehold acres and esti­\n\nmate we could drill up to 2,600 net wells in the years ahead.\n\nMarcellus Shale — We first became aware of the Marcellus in 2005\n\nwhen we were negotiating our $2.2 billion acquisition of Appalachia’s\n\nsecond-largest natural gas producer, Columbia Natural Resources, LLC.\n\nIn 2007 we aggressively accelerated our Marcellus leasehold acquisition\n\nefforts and began to prepare for our first drilling activities. By early 2008,\n\nwe had determined the Marcellus could be prospective over an area of\n\napproximately 15 million net acres (approximately five times larger\n\nthan the prospective Haynesville core area and 10 times larger than the\n\nBarnett core area).\n\nAfter acquiring 1.8 million net leasehold acres, we entered into a\n\njoint venture agreement in late 2008 with Oslo-based Statoil, one of the\n\nlargest and most respected European energy companies. In this trans­\n\naction, we sold Statoil 32.5% of our Marcellus assets for $3.375 billion\n\nin cash and drilling carries. Today, having sold 32.5% of our original 1.8\n\nmillion net leasehold acres, we have returned to owning 1.7 million net\n\nleasehold acres in the play and are the industry’s leading leasehold\n\nowner, largest producer and most active developer. We are producing\n\nfrom more than 100 net wells in the Marcellus on our 1.7 million net acres,\n\nare currently drilling with 32 rigs and estimate we could drill up to 21,000\n\nadditional net wells in the years ahead.\n\nColony and Texas Panhandle Granite Wash — These\n\nliquids-rich plays generate the company’s highest returns\n\n(routinely more than 100%) and provided the inspiration\n\nfor the company to find other liquids-rich plays in 2010.\n\nThe Granite Wash, and other plays with liquids-rich gas\n\nproduction streams, provide the strongest economics in\n\nthe industry today because they possess the best of both\n\nworlds: high-volume natural gas production along with\n\nsignificant volumes of highly valued liquids that dramatically increase\n\ninvestment returns.\n\nWe are producing from approximately 150 net Granite Wash\n\nwells, are currently drilling with 16 rigs and estimate we could drill\n\nup to 1,700 additional net wells on our 215,000 net leasehold acres in\n\nthe years ahead. Based on current NYMEX futures prices for natu­\n\nral gas and oil, each Granite Wash well should generate approxi-\n\nmately $11.5 million of present value (or up to an undiscounted\n\ntotal of $19.5 billion for all 1,700 wells), making it obvious why finding,\n\nleasing and developing more unconventional liquids-rich plays was\n\nChesapeake’s number one priority for 2010. We were very successful\n\n2010 ANNUAL REPORT | **9**\n\nThe very significant upward\n\ntrajectory of value creation that\n\nChesapeake is on today is primarily\n\ndriven by the quality of our assets,\n\nwhich feature dominant positions\n\nin 16 of the 20 most important\n\nmajor unconventional natural gas\n\nand liquids plays in the U.S.\n\n*Generating the highest returns in the company, plays like the Oklahoma Colony Granite*\n\n*Wash inspire Chesapeake to find other liquids-rich opportunities.*", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "####### * **Financial Position** *\n\nIn May 2014, the borrowing capacity under our credit facilities increased from an aggregate of $63 million to $135 million. The\n\nincrease in the borrowing capacity was driven by the significant uplift of the Company’s proved oil and gas reserves as at 31\n\nDecember 2013. In conjunction with the increase in the Company’s borrowing capacity, the Company expanded the syndicate\n\nof banks under the Senior Credit Facility. Bank of America Merrill Lynch and the Bank of Nova Scotia have now joined the bank\n\ngroup which is led by Wells Fargo.\n\nIn July 2014, the borrowing capacity increased an additional net $10 million, to $145 million, after taking into consideration\n\nthe removal of proved oil and gas reserves associated with the DJ and Williston Basin dispositions and the development of\n\nproved oil and gas reserves in the Eagle Ford Formation.\n\nAt 31 December 2014, the Company had $130 million outstanding under our credit facilities and $15 million available under\n\nour borrowing capacity. Ending cash at 31 December 2014 was $69.2 million.\n\n####### * **Cashflow** *\n\nCash provided by operating activities for the year ended 31 December 2014 increased 104.5% to $128.1 million compared to\n\nthe prior year. This increase was primarily due to receipts from sales increasing $85.7 million, or 101.2%, to $170.4 million,\n\nwhile keeping payments to suppliers and employees relatively stable with an increase of $8.2 million, or 37.7%, to $30.0 million.\n\nSee Review of Operations for more information.\n\nCash used in investing activities for the year ended 31 December 2014 increased $158.9 million, or 96.7%, to $323.2 million.\n\nThis increase is due to successful implementation of the Company’s strategy to develop and grow the reserves from our high\n\nworking interest, repeatable resource plays, primarily in the Eagle Ford. Due to funding available to the Company through\n\nasset sales, capital raises and credit facilities, the Company was able to accelerate its 2015 drilling program into 2014. However,\n\ndue to the reduction in crude oil prices in the fourth quarter of 2014 and continuing into early 2015, the Company will scale\n\nback its drilling program to concentrate on limited drilling obligations to hold Eagle Ford acreage during the 2015 year.\n\nCash provided by financing activities for the year ended 31 December 2014 increased $123.1 million, or 277.0%, to $167.6\n\nmillion. This increase is a result of the increased availability and draws under the Company’s credit facilities and proceeds\n\nreceived in a private placement of shares. In February 2014, the Company completed a private placement in which we sold\n\n84.2 million ordinary shares at A$0.95 per share, resulting in net proceeds of approximately $68.4 million. The first tranche of\n\n63.7 million shares was issued in March 2014 and the second tranche of 20.5 million shares was issued in April 2014.\n\n####### **Matters Subsequent to the End of the Financial Year**\n\nSubsequent to 31 December 2014, an additional $13.9 million was drawn-down the credit facilities, bringing total outstanding\n\ndebt to $143.9 million, with undrawn funds of $1.1 million.\n\nIn January 2015, the company acquired three leases totalling approximately 14,180 net acres in the Eagle Ford for\n\napproximately $13.4 million.\n\n####### **Future Developments, Prospects and Business Strategies**\n\nThe Group’s business strategies and prospects for growth in future financial years are presently concentrated on growing the\n\nvalue of the Group’s current resource plays through direct leasing from mineral owners, small acquisitions of producing\n\nproperties, drilling inventory within the Group’s current balance sheet capabilities, and development of the Group’s current\n\nacreage. Further information on likely development in the operations of the Group and expected results of operations has not\n\nbeen included because the Directors believe it would result in unreasonable prejudice to the Group.", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "Woodford results, higher overall unit costs, and depressed pricing at year end, we\n\nrecognized an impairment charge of ~$60 million on these assets at year 2014. Had\n\nprices maintained their strength, we likely would have been in a position to recover our\n\ninvestment from these assets.\n\n**CEO’S REPORT**\n\n**4**\n\n**Sundance’s Performance versus the ASX 200**\n\n**ANNUAL PERCENTAGE CHANGE**\n\nIN 2P PV10\n\n(NET ASSET VALUE) IN SUNDANCE\n\n**YEAR** PER DEBT ADJUSTED SHARE PRICE PER SHARE IN ASX200\n\n2014 21.6% -48.0% 1.1%\n\n2013 63.3% 29.9% 15.1%\n\n2012 -15.6% 87.8% 14.6%\n\n2011 59.7% -44.6% -14.5%", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "short-term incentives, long-term incentives, benefits and perquisites. Amounts paid to Meridian for these services during fiscal\n\nyear 2014 was di minimis. Meridian did not provide any other services to the Company.\n\nIn order to ensure that any remuneration recommendations made by Meridian were free from undue influence by management,\n\nthe Remuneration and Nominations Committee engaged Meridian and any advice, work or recommendations made by Meridian\n\nwere provided to the committee chairman.\n\n*Elements of Remuneration*\n\n| Component Description |\n|:---|\n| Cash Base Salary (Fixed) Competitive pay to attract and retain talented executives. |\n| Remuneration Short-Term Incentives (Performance Based) Annual incentive plan designed to provide executives with an opportunity to earn an annual cash incentive based on Company financial and operational performance. |\n| Equity Remuneration Long-Term Incentives (Performance Based) Restricted share awards that are tied to achievement of specific performance metrics, intended to reward strong, sustained underlying share value, and reward increasing shareholder value. Equity awards further align the interests of our executives with those of our shareholders. |\n| Other Benefits Health and Welfare Benefit Plans (Other) Executives are eligible to participate in health and welfare benefit plans generally available to other employees. |\n\n*Base Salary*\n\nBase salaries for executives recognize their qualifications, experience and responsibilities as well as their unique value and\n\nhistorical contributions to Sundance. In addition to being important to attracting and retaining executives, setting base salaries\n\nat appropriate levels motivates employees to aspire to and accept enlarged opportunities. We do not consider base salaries to\n\nbe part of performance-based remuneration. In setting the amount, the individuals' performance is considered as well as the\n\nlength of time in their current position without a salary increase.\n\n*2013 Base Salaries and 2014 Salary Adjustments*\n\n| Name Title 2014 Salary 2013 Salary % Change Rationale |\n|:---|\n| E. McCrady MD/CEO $370,000 $275,000 35 % Mr. McCrady’s salary was increased effective January 2014 reflecting his significant contribution to our performance and to bring his pay closer to the 25 th percentile of the Company’s U.S. and Australian market peer group. This is Mr. McCrady’s first base pay increase since 2011. |\n| C. Anderson CFO $295,000 $225,000 31 % Ms. Anderson’s salary was increased effective January 2014 to bring her closer to the 50 th percentile of the Company’s U.S. market peer group. This is Ms. Anderson’s first base pay increase since 2011. |\n| G. Ford VP of Exploration and Development $295,000 $230,000 28% Ms. Ford’s salary was increased effective January 2014 to bring her closer to the 50 th percentile of the Company’s U.S. market peer group. This is Ms. Ford’s first base pay increase since 2011. |", - "page_start": 34, - "page_end": 34, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\nKillam spent $1,482 per unit for the year ended December 31, 2013, compared to $1,683 per unit for the year ended December 31, 2012.\n\nApproximately 40% of the capital spend during the year was invested in suite renovations. The increase year‑over‑year was a result of unit\n\nupgrades to improve quality and increase occupancy, increase yields on properties identified for repositioning, and support the Company’s\n\ncommitment to increasing unit quality to maximize rental increases.\n\nAs an example, in 2013 the Company has been actively working to reposition Brentwood Apartments, a 45‑year old, 240‑unit, property located in\n\nHalifax, that was acquired in 2012. The Company identified that significant value could be created at this property by improving the quality of the\n\nunits and generating increased NOI through higher rents. Unit upgrades have averaged $15,000 per unit and have consisted of new appliances,\n\nflooring and kitchen and bathroom upgrades. The Company has achieved a corresponding lift in rents of approximately 15% on the 53 units it has\n\ncompleted to date. Based on a 5‑year project timeline, with 20% of the units renovated each year, the Company expects to see the return on the\n\ntotal investment improve 145 bps from 6.25% to 7.70%.\n\nKillam has also invested in suite renovations to reposition an Ottawa portfolio acquired in 2012. Kitchen, bathroom, flooring and appliance\n\nupgrades have improved the quality of the Ottawa units, leading to a 1,100 bps increase in occupancy in the past 12 months. Excluding the\n\nrepositioning of the Brentwood and the Ottawa portfolio in 2013, suite renovation costs would have been $6.0 million, or a 21% increase from\n\n2012.\n\nThe Company has also identified additional properties in the Atlantic region as well as Ontario for repositioning and will continue to invest in\n\nupgrades where these higher yields can be achieved. One such property identified for 2014 is Shaunslieve, the 154‑unit property adjacent to S2\n\nin Halifax. Killam expects to recover the renovation costs through increased rental rates. Capital spend on appliances increased in 2013 as well,\n\nwhich was directly correlated to the increased suite renovation work.\n\nBoiler and heating equipment costs have decreased significantly in 2013, as the Company converted twenty properties to natural gas in 2012,\n\ncompared to one in 2013.\n\nThe majority of the remaining capital expenditures during 2013 related to exterior building repairs, including roofing and balcony upgrades, brick\n\nreplacement and exterior facade upgrades. The timing of capital spending is influenced by tenant turnover, market conditions, and individual\n\nproperty requirements, causing variability. In addition, the length of time that Killam has owned a property and the age of the property also\n\ninfluences the capital requirements.\n\n$‑\n\n$500\n\n$1000\n\n$1500\n\n$2000\n\n$2500\n\n**Average Capital Spend Per Unit by Building Age**\n\n2011 2012 2013\n\n0 ‑ 10 years\n\n11 ‑ 20 years\n\n21 ‑ 30 years\n\n31 ‑ 40 years\n\n41 + years\n\nAs the above chart highlights, the capital spend per unit is less for newer properties, averaging $364 per unit in 2013, compared to $2,248 per\n\nunit for buildings over 40 years old. This analysis excludes capital spending on development and energy projects. Killam’s continual focus on\n\ndeveloping and acquiring new properties aids in maintaining lower capital requirements on a per unit basis. 20% of Killam’s apartments as of\n\nDecember 31, 2013, have been built in the past ten years.\n\nKillam expects to invest approximately $22 million to $24 million during 2014 on apartment portfolio capital investments.", - "page_start": 50, - "page_end": 50, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "sg247938.pdf", - "query": "What are the physical requirements for installing the Storwize V7000?", - "target_page": 70, - "target_passage": "You must consider several key factors when you are planning the physical site of a Storwize V7000 installation. The physical site must have the following characteristics: \u0002 Meets power, cooling, and location requirements of the Storwize V7000 nodes. \u0002 Has two separate power sources. \u0002 Sufficient rack space exists for the installation of controller and disk expansion enclosures. \u0002 Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not exceed maximum power rating of the rack. For more information about the power and environmental requirements, see this website", - "chunk_present": { - "presence": true, - "index": 9 - } - }, - "top_chunk": [ - { - "text": "Chapter 3. Planning **81**\n\n- 2076-92F\n\n- 2076-A9F\n\nThe control enclosures can connect to 8 Gbps and 16 Gbps SAN switches. With an optional\n\n10 Gbps Ethernet card to 10 Gbps Ethernet switch (for iSCSI traffic) and FCoE switches.\n\nModel 2076-624 with 25 Gb Ethernet card can be used for RDMA (iSER). For more\n\ninformation, see 3.7.4, “iSCSI Extensions for RDMA (iSER)” on page 62.\n\n#### **3.19.2 Back-end storage subsystems**\n\nWhen connecting a back-end storage subsystem to IBM Storwize V7000, follow these\n\nguidelines:\n\n� Connect all storage ports to the switch up to a maximum of 16, and zone them to all of the\n\nStorwize V7000 ports.\n\n� Zone all ports on the disk back-end storage to all ports on the Storwize V7000 nodes in a\n\nclustered system.\n\n� Ensure that you configure the storage subsystem LUN-masking settings to map all LUNs\n\nthat are used by the Storwize V7000 to all the Storwize V7000 WWPNs in the clustered\n\nsystem.\n\nThe Storwize V7000 is designed to handle many paths to the back-end storage.\n\nIn most cases, the Storwize V7000 can improve performance, especially of mid-sized to\n\nlow-end disk subsystems, older disk subsystems with slow controllers, or uncached disk\n\nsystems, for the following reasons:\n\n� The Storwize V7000 can stripe across disk arrays, and it can stripe across the entire set of\n\nconfigured physical disk resources.\n\n� The Storwize V7000 control enclosure 2076-524 has 32 GB of cache and 2076-624 has\n\n32 GB of cache (upgradeable to 64 GB).\n\n� The Storwize V7000 can provide automated performance optimization of hot spots by\n\nusing flash drives and Easy Tier.\n\nThe Storwize V7000 large cache and advanced cache management algorithms also allow it\n\nto improve the performance of many types of underlying disk technologies. The Storwize\n\nV7000 capability to asynchronously manage destaging operations that are incurred by writes\n\nwhile maintaining full data integrity can be important in achieving good database\n\nperformance.\n\nBecause hits to the cache can occur in the upper (Storwize V7000) and the lower (back-end\n\nstorage disk controller) level of the overall system, the system as a whole can use the larger\n\namount of cache wherever it is located. Therefore, Storwize V7000 cache also provides more\n\nperformance benefits for back-end storage systems with extensive cache banks.\n\nAlso, regardless of their relative capacities, both levels of cache tend to play an important role\n\nin enabling sequentially organized data to flow smoothly through the system.\n\nHowever, Storwize V7000 cannot increase the throughput potential of the underlying disks in\n\nall cases. Performance benefits depend on the underlying storage technology and the\n\nworkload characteristics, including the degree to which the workload exhibits hotspots or\n\nsensitivity to cache size or cache algorithms.", - "page_start": 102, - "page_end": 102, - "source_file": "sg247938.pdf" - }, - { - "text": "**64** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\nApply the following general guidelines for back-end storage subsystem configuration\n\nplanning:\n\n� In the SAN, storage controllers that are used by the Storwize V7000 clustered system\n\nmust be connected through SAN switches. Direct connection between the Storwize V7000\n\nand the storage controller is not supported.\n\n� Enhanced Stretched Cluster configurations have additional requirements and\n\nconfiguration guidelines. For more information about performance and preferred practices\n\nfor the Storwize V7000, see *IBM System Storage SAN Volume Controller and Storwize*\n\n*V7000 Best Practices and Performance Guidelines* , SG24-7521.\n\nIf your back-end storage system does not support the Storwize V7000 round-robin algorithm,\n\nensure that the number of MDisks per storage pool is a multiple of the number of storage\n\nports that are available. This approach ensures sufficient bandwidth for the storage controller,\n\nand an even balance across storage controller ports.\n\nIn general, configure disk subsystems as though Storwize V7000 was not used. However,\n\nthere might be specific requirements or limitations as to the features usable in the specific\n\nback-end storage system when it is attached to Storwize V7000. Review the appropriate\n\nsection of documentation to verify that your back-end storage is supported and to check for\n\nany special requirements at [this website](https://ibm.biz/Bdjm8H) .\n\nObserve the following general rules:\n\n� Disk drives\n\nExercise caution with the use of large hard disk drives so that you do not have too few\n\nspindles to handle the load.\n\n� Array sizes:\n\n- Storwize V7000 does not queue more than 60 I/O operations per MDisk. Therefore,\n\nmake sure that the MDisks presented to Storwize V7000 can handle about this many\n\nrequests, which corresponds to about 8 HDDs. If your array can handle higher load,\n\nsplit it in several LUNs of equal size to better match back-end storage capabilities with\n\nthe load that Storwize V7000 can generate.\n\nFor more information about back-end storage LUN presentation to Storwize V7000,\n\nsee *IBM System Storage SAN Volume Controller and Storwize V7000 Best Practices*\n\n*and Performance Guidelines* , SG24-7521.\n\n- Since version 7.3, the system uses autobalancing to restripe volume extents evenly\n\nacross all MDisks in the storage pools.\n\n**MDisks within storage pools:** Software versions 6.1 and later provide for better load\n\ndistribution across paths within storage pools.\n\nIn previous code levels, the path to MDisk assignment was made in a round-robin fashion\n\nacross all MDisks that are configured to the clustered system. With that method, no\n\nattention is paid to how MDisks within storage pools are distributed across paths.\n\nTherefore, it was possible and even likely that certain paths were more heavily loaded than\n\nothers.\n\nStarting with software version 6.1, the code contains logic that considers which MDisks are\n\nprovided by which back-end storage systems. Therefore, the code more effectively\n\ndistributes active paths based on the storage controller ports that are available.\n\nThe **Detect MDisk** commands must be run following the creation or modification (addition\n\nof or removal of MDisk) of storage pools for paths to be redistributed.", - "page_start": 85, - "page_end": 85, - "source_file": "sg247938.pdf" - }, - { - "text": "#### **13.4.4 Updating IBM Storwize V7000 drive code**\n\nAfter completing the Storwize V7000 software update as described in 13.4, “Software update”\n\non page 687, the firmware of the Storwize V7000 drives also must be updated. The upgrade\n\ntest utility identified that downlevel drives are in the system, as shown in Figure 13-25.\n\nHowever, this fact does not stop the system software from being performed.\n\n*Figure 13-25 Upgrade test utility drive firmware warning*\n\nTo update the IBM Storwize V7000 drive code, complete the following steps:\n\n1. Download the latest Drive firmware package for [IBM Storwize V7000 from Fix Central](https://ibm.biz/BdY8if) .\n\n2. On the Storwize V7000 GUI, navigate to **Pools** → **Internal Storage** and select **All**\n\n**Internal.**", - "page_start": 717, - "page_end": 717, - "source_file": "sg247938.pdf" - }, - { - "text": "**80** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\n### **3.18 Storwize V7000 configuration backup procedure**\n\nSave the configuration before and after any change to the clustered system, such as adding\n\nnodes and back-end storage. Saving the configuration is a crucial part of Storwize V7000\n\nmanagement, and various methods can be applied to back up your Storwize V7000\n\nconfiguration. The preferred practice is to implement an automatic configuration backup using\n\nthe configuration backup command. Make sure that you save the configuration to storage that\n\nis not dependent on the SAN Virtualization Controller.\n\nFor more information, see Chapter 13, “RAS, monitoring, and troubleshooting” on page 673.\n\n### **3.19 Performance considerations**\n\nStorage virtualization with the Storwize V7000 improves flexibility and simplifies management\n\nof storage infrastructure, and can provide a substantial performance advantage. The Storwize\n\nV7000 caching capability and its ability to stripe volumes across multiple disk arrays are the\n\nreasons why usually significant performance improvements are observed when Storwize\n\nV7000 is used to virtualize midrange back-end storage subsystems.\n\nTo ensure the performance that you want and verify the capacity of your storage\n\ninfrastructure, analyze performance and capacity to reveal the business requirements of your\n\nstorage environment. Use the analysis results and the guidelines in this chapter to design a\n\nsolution that meets the business requirements of your organization.\n\nWhen considering performance for a system, always identify the bottleneck and, therefore,\n\nthe limiting factor of a specific system. This is a multidimensional analysis that needs to be\n\nperformed for each of your workload patterns. There can be different bottleneck components\n\nfor different workloads.\n\nWhen you are designing a storage infrastructure with the Storwize V7000 or implementing a\n\nStorwize V7000 in an existing storage infrastructure, you must ensure that the performance\n\nand capacity of the SAN, back-end disk subsystems, and Storwize V7000 meets\n\nrequirements for the set of known or expected workloads.\n\n#### **3.19.1 SAN**\n\nThe following Storwize V7000 models are supported for V8.2.1:\n\n� Control enclosures:\n\n- 2076-524\n\n- 2076-624\n\n� Expansion enclosures:\n\n- 2076-12F\n\n- 2076-24F\n\n**Tip:** Technically, almost all storage controllers provide both striping (in the form of RAID 5,\n\nRAID 6, or RAID 10) and a form of caching. The real benefit of Storwize V7000 is the\n\ndegree to which you can stripe the data across disks in a storage pool, even if they are\n\ninstalled in different back-end storage systems. This technique maximizes the number of\n\nactive disks available to service I/O requests. The Storwize V7000 provides more caching,\n\nbut its impact is secondary for sustained workloads.", - "page_start": 101, - "page_end": 101, - "source_file": "sg247938.pdf" - }, - { - "text": "**44** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\n### **3.1 General planning rules**\n\nTo maximize the benefit that is realized from the Storwize V7000, pre-installation planning\n\nmust include several important steps. These steps ensure that the Storwize V7000 provides\n\nthe best possible performance, reliability, and ease of management for your application\n\nneeds. The correct configuration also helps minimize downtime by avoiding changes to the\n\nStorwize V7000 and the storage area network (SAN) environment to meet future growth\n\nneeds.\n\nThis book is *not* intended to provide in-depth information about the described topics. For an\n\nenhanced analysis of advanced topics, see *IBM System Storage SAN Volume Controller and*\n\n*Storwize V7000 Best Practices and Performance Guidelines* , [SG24-7521](http://www.redbooks.ibm.com/abstracts/sg247521.html) .\n\n#### **3.1.1 Basic planning flow**\n\nThe general rule of planning is to define your goals, and then, plan a solution that can be\n\nshown to meet these goals. Always remember to verify that each element of your\n\nconfiguration is supported.\n\nConsider the following points when planning for the Storwize V7000:\n\n� Collect and document the number of hosts (application servers) to attach to the Storwize\n\nV7000. Identify the traffic profile activity (read or write, sequential, or random), and the\n\nperformance requirements (bandwidth and input/output [I/O] operations per second\n\n[IOPS]) for each host.\n\n� Decide whether you are going to use Storwize V7000 to virtualize external storage. If you\n\ndo, collect and document the following items:\n\n- Information on the back-end storage that exists in the environment and is intended to\n\nbe virtualized by the Storwize V7000.\n\n- Whether you must configure image mode volumes. If you want to use image mode\n\nvolumes, decide whether and how you plan to migrate them into managed mode\n\nvolumes.\n\n- Information about the planned new back-end storage to be virtualized by the Storwize\n\nV7000.\n\n- The required virtual storage capacity for fully provisioned and space-efficient (SE)\n\nvolumes.\n\n- The required storage capacity for:\n\n- Local mirror copy (volume mirroring)\n\n- Point-in-time copy (IBM FlashCopy)\n\n- Remote copy (Metro Mirror and Global Mirror)\n\n- Compressed volumes\n\n- Encrypted volumes\n\n**Important:** At the time of this writing, the statements that are provided in this book are\n\naccurate but can change. Always verify any statements that are made in this book with the\n\nIBM Storwize V7000 supported hardware list, device driver, firmware, and recommended\n\nsoftware levels information that are available at the following websites:\n\n� [Support Information for Storwize V7000](http://www.ibm.com/support/docview.wss?uid=ssg1S1003741)\n\n� [IBM System Storage Interoperation Center (SSIC)](https://www.ibm.com/systems/support/storage/ssic/interoperability.wss)", - "page_start": 65, - "page_end": 65, - "source_file": "sg247938.pdf" - }, - { - "text": "**70** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\nA thin-provisioned volume feature that is called *zero detect* provides clients with the ability to\n\nreclaim unused allocated disk space (zeros) when they are converting a fully allocated\n\nvolume to a thin-provisioned volume by using volume mirroring.\n\n### **3.12 Host attachment planning**\n\nThe typical FC host attachment to the Storwize V7000 is done through SAN fabric. However,\n\nthe system allows direct attachment connectivity between its 8 Gb or 16 Gb Fibre Channel\n\nports and host ports. No special configuration is required for host systems that are using this\n\nconfiguration. However, the maximum number of directly attached hosts is severely limited by\n\nthe number of FC ports on Storwize V7000’s nodes.\n\nThe Storwize V7000 imposes no particular limit on the distance between the Storwize V7000\n\nnodes and host servers. However, for host attachment, the Storwize V7000 supports up to\n\nthree ISL hops in the fabric. This capacity means that the server to the Storwize V7000 can\n\nbe separated by up to five FC links, four of which can be 10 km long (6.2 miles) if long wave\n\nSmall Form-factor Pluggables (SFPs) are used.\n\nFigure 3-9 shows an example of a supported configuration with Storwize V7000 nodes using\n\nshortwave SFPs.\n\n*Figure 3-9 Example of host connectivity*\n\nIn Figure 3-9, the optical distance between Storwize V7000 Node 1 and Host 2 is slightly over\n\n40 km (24.85 miles).\n\nTo avoid latencies that lead to degraded performance, avoid ISL hops whenever possible. In\n\nan optimal setup, the servers connect to the same SAN switch as the Storwize V7000 nodes.\n\n**Note:** Before attaching host systems to Storwize V7000, review the Configuration Limits\n\nand Restrictions for the IBM System Storage Storwize V7000 at this [IBM Support web ](https://www.ibm.com/support/docview.wss?uid=ssg1S1010643)\n\n[page](https://www.ibm.com/support/docview.wss?uid=ssg1S1010643) .", - "page_start": 91, - "page_end": 91, - "source_file": "sg247938.pdf" - }, - { - "text": "**52** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\nFigure 3-2 shows the Storwize V7000 zoning classes.\n\n*Figure 3-2 Storwize V7000 zoning classes*\n\nThe fundamental rules of Storwize V7000 zoning are described next. However, also review\n\nthe latest zoning guidelines and requirements when designing zoning for the planned solution\n\nby searching for “SAN configuration and zoning rules summary” at [IBM Knowledge Center](https://www.ibm.com/support/knowledgecenter/) .\n\n#### **3.6.3 Storwize V7000 cluster system zone**\n\nThe Storwize V7000 cluster system zone is required only if you deploy solution with more\n\nthan one control enclosure. The purpose of cluster system zone is to enable traffic between\n\nall Storwize V7000 nodes within the clustered system. This traffic consists of heartbeats,\n\ncache synchronization, and other data that nodes must exchange to maintain a healthy\n\ncluster state.\n\nEach Storwize V7000 port must be zoned so that it can be used for internode\n\ncommunications. A system node cannot have more than 16 paths to another node in the\n\nsame system.\n\nMixed port speeds are not possible for intracluster communication. All node ports within a\n\nclustered system must be running at the same speed.\n\nStorwize V7000 supports the use of mixed fabrics for communication between nodes. The\n\n10 GbE FCoE ports of one Storwize V7000 can be zoned to the FC ports of another node that\n\nis part of the same clustered system.\n\n**Note:** Configurations that use Metro Mirror, Global Mirror, N_Port ID Virtualization, or\n\nlong-distance links have extra zoning requirements. Do not follow only the general zoning\n\nrules if you plan to use any of these.\n\nThe FCoE fabric uses the same set of zoning rules as the Fibre Channel fabric.", - "page_start": 73, - "page_end": 73, - "source_file": "sg247938.pdf" - }, - { - "text": "## **Chapter 2. System overview**\n\nThis chapter provides an overview of IBM Spectrum Virtualize software and IBM Storwize\n\nV7000 architecture and components. The chapter shows the software elements that build the\n\nIBM Storwize V7000 platform and provides an overview of the useful management and\n\nsupport tools that helps to maintain and operate the IBM Storwize V7000.\n\nThis chapter includes the following topics:\n\n� 2.1, “IBM Spectrum Virtualize” on page 10\n\n� 2.2, “Storage virtualization” on page 10\n\n� 2.3, “IBM Storwize V7000 overview” on page 12\n\n� 2.4, “IBM Storwize V7000 hardware” on page 19\n\n� 2.5, “IBM Storwize V7000 components” on page 19\n\n� 2.6, “Business continuity” on page 39\n\n� 2.7, “Management and support tools” on page 40\n\n� 2.8, “Useful IBM Storwize V7000 websites” on page 42\n\n**2**", - "page_start": 30, - "page_end": 30, - "source_file": "sg247938.pdf" - }, - { - "text": "Chapter 2. System overview **13**\n\nAn IBM Storwize V7000 solution provides a choice of up to 760 disk drives per system or\n\n1024 disk drives per clustered system (by using dense drawers). The solution uses SAS\n\ncables and connectors to attach to the optional expansion enclosures.\n\nThe IBM Storwize V7000 system supports a range of external disk systems similar to what\n\nIBM SAN Volume Controller supports today. A view of an IBM Storwize V7000 control\n\nenclosure is shown in Figure 2-4.\n\n*Figure 2-4 Top-front view of a Storwize V7000 control enclosure*\n\nThe IBM Storwize V7000 solution consists of 1 - 4 control enclosures and optionally, up to 36\n\nexpansion enclosures. It supports the intermixing of the different expansion enclosures. Each\n\nenclosure contains two canisters. Control enclosures contain two node canisters, and\n\nexpansion enclosures contain two expansion canisters.\n\n#### **2.3.1 IBM Storwize V7000 models**\n\nThe IBM Storwize V7000 consists of enclosures and drives. An enclosure contains two\n\ncanisters that are seen as part of the enclosure, although they can be replaced\n\nindependently.\n\nThe IBM Storwize V7000 models are listed in Table 2-1.\n\n*Table 2-1 IBM Storwize V7000 models*\n\n**More information:** For the most up-to-date information about features, benefits, and\n\nspecifications of IBM Storwize V7000 models, see [this web page](https://www.ibm.com/us-en/marketplace/storage-workload) .\n\nThe information in this IBM Redbooks publication is valid at the time of this writing and\n\ncovers IBM Spectrum Virtualize V8.2. As IBM Storwize V7000 matures, expect to see new\n\nfeatures and enhanced specifications.\n\n| Model | Cache | Fibre Channel (FC) / iSCSI / SAS ports | Drive slots | Power supply |\n|:---|:---|:---|:---|:---|\n| 2076-AF1 (with two node canisters Gen2+) | 64, 128, or 256 gigabytes (GB) | 16 x 16 Gb / 6 x 1 Gb + 8x 10 Gb / 4 x 12 Gb | 24 x 2.5-inch (All Flash) | Integrated dual power supplies with battery |", - "page_start": 34, - "page_end": 34, - "source_file": "sg247938.pdf" - }, - { - "text": "**48** Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n\nWhen you plan deployment of Storwize V7000, identify networking technologies that you will\n\nuse.\n\n### **3.4 Physical planning**\n\nYou must consider several key factors when you are planning the physical site of a Storwize\n\nV7000 installation. The physical site must have the following characteristics:\n\n� Meets power, cooling, and location requirements of the Storwize V7000 nodes.\n\n� Has two separate power sources.\n\n� Sufficient rack space exists for the installation of controller and disk expansion enclosures.\n\n� Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not\n\nexceed maximum power rating of the rack. For more information about the power and\n\nenvironmental requirements, see [this website](https://ibm.biz/BdjGTt) .\n\nYour Storwize V7000 2076-524 and Storwize V7000 2076-624 order includes a printed copy\n\nof the IBM Storwize V7000 Gen2 and Gen2+ Quick Installation Guide, which also provides\n\ninformation about environmental and power requirements.\n\n#### **3.4.1 Cabling**\n\nCreate a cable connection table that follows your environment’s documentation procedure to\n\ntrack all of the following connections that are required for the setup:\n\n� Power\n\n� Ethernet\n\n� SAS\n\n� iSCSI or Fibre Channel over Ethernet (FCoE) connections\n\n� Switch ports (FC, Ethernet, and FCoE)\n\nDistribute your disk expansion enclosures evenly between control enclosures, nodes within\n\ncontrol enclosures, and SAS channels within nodes. For more information, search for “SAS\n\ncabling guidelines” at this [IBM Knowledge Center page](https://www.ibm.com/support/knowledgecenter/ST3FR7) .\n\nWhen planning SAN cabling make sure that your physical topology allows you to observe\n\nzoning rules and recommendations.\n\nIf the data center provides more than one power source, make sure that you use that capacity\n\nwhen planning power cabling for your system.\n\n### **3.5 Planning IP connectivity**\n\nSystem management is performed through an embedded graphical user interface (GUI) that\n\nis running on the nodes. To access the management GUI, direct a web browser to the system\n\nmanagement IP address.\n\n**Note:** With Spectrum Virtualize V8.1.1.1 and later, RDMA (iSER) is supported by 25 Gb\n\nEthernet iSCSI adapter cards with V7000 Gen2+ only. For more information, see 3.7.4,\n\n“iSCSI Extensions for RDMA (iSER)” on page 62.", - "page_start": 69, - "page_end": 69, - "source_file": "sg247938.pdf" - } - ] - }, - { - "references": { - "source_file": "sg247938.pdf", - "query": "Is '1oijizer--10108453535318919918883384---jhjjzhiuhzrh--14584joiz///KK ' valid for a pool?", - "target_page": 218, - "target_passage": "Naming rules: When you choose a name for a pool, the following rules apply: \u0002 Names must begin with a letter. \u0002 The first character cannot be numeric. \u0002 The name can be a maximum of 63 characters. \u0002 Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), underscore (_), period (.), hyphen (-), and space. \u0002 Names must not begin or end with a space. \u0002 Object names must be unique within the object type. For example, you can have a volume that is named ABC and a storage pool that is calledvolumes that are calledvolumes called ABC. \u0002 The default object name is valid (object prefix with an integer). \u0002 Objects can be renamed to their current names", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Chapter 6. Installing Red Hat OpenShift 3.11 on IBM PowerVC **115**\n\nuser_public_key = \"ssh-rsa\n\nAAAAB3NzaC1yc2EAAAABIwAAAQEA09+YMqJ8VHX3HC7qy6HSxs3JjTGKbEgK+CExpf811uxsq+uJYbfXEKH19/NCf/U\n\nvpkozJBDDXDIxJ4uqOEBWDG4mUuu5U9a4lXgb6qaPYyXwVTygL/IcB0poSGEQQaJzhB05g71uZrya++sG1xHUjSQAQz\n\nhDuKrs4Bc3gcN4184UR+BX1pVgCls3NRn9hLrfLWS37M/kn+b/n6VMYYVpHsZ2XVydAn2nwuzktaEuWYaY/1cNd4xuu\n\nyVu08GQOon6t5KQ1EZBheADdSsyamulLqW9z4j6Y1wwDe4GPDc5zIW++ASDAZB0eEfbKGDLVdpFsI5YV8nLV1r/T0Y/\n\nFiFZqQ== Bogdan Savu;IBMROO45771;IBMROZZ014E826;J;\"\n\ndns1 = \"192.168.11.210\" # DNS server 1\n\ndns_domain = \"domain.example.com\" # DNS Domain Name\n\n#Network configuration\n\n#---------------------------------\n\nnet1_name = \"net_ocp_cluster1\" # Network Name\n\nnet1_vlan_id = \"1\" # VLAN ID\n\nnet1_subnet = \"192.168.11.0/21\" # Network/Mask\n\nnet1_gateway = \"192.168.11.1\" # Gateway\n\nnet1_start = \"192.168.11.223\" # First IP from Pool\n\nnet1_end = \"192.168.11.223\" # Last IP from Pool\n\n#VM1 configuration (OCP - Master Nodes)\n\n#---------------------------------\n\nvm1_number = \"1\" # Number of VMs\n\nvm1_memory = \"32\" # Memory GB\n\nvm1_cpu = \"8\" # Virtual CPU\n\nvm1_vcpu_ratio = \"4\" # vCPU RATIO 1:4 1 vCPU = 0.25 eCPU (cores)\n\nvm1_name = \"bsocp\" # Hostname prefix\n\nvm1_first_ip = \"192.168.11.223\" # Fist IP from a consecutive pool of IPs\n\nvm1_image_name = \"xiv_p9_image_rhel76\" # The image name\n\nvm1_remote_restart = \"true\" # Enable Auto Remote Restart\n\nvm1_storage_name = \"xiv_StoragePool\" # Storage Template\n\nvm1_dockerdisk1 = \"0\" # Docker disk size in GB for ephemeral storage\n\n#VM2 configuration (OCP - Infra Nodes)\n\n#---------------------------------\n\nvm2_number = \"0\" # Number of VMs\n\nvm2_memory = \"16\" # Memory GB\n\nvm2_cpu = \"4\" # Virtual CPU\n\nvm2_vcpu_ratio = \"4\" # vCPU RATIO 1:4 1 vCPU = 0.25 eCPU (cores)\n\nvm2_name = \"infnode\" # Hostname prefix\n\nvm2_first_ip = \"192.168.11.205\" # Fist IP from a consecutive pool of IPs\n\nvm2_image_name = \"xiv_p9_image_rhel76\" # The image name\n\nvm2_remote_restart = \"true\" # Enable Auto Remote Restart\n\nvm2_storage_name = \"xiv_StoragePool\" # Storage Template\n\nvm2_dockerdisk1 = \"68\" # Docker disk size in GB for ephemeral storage\n\n#VM3 configuration (OCP - Workers(App) Nodes)\n\n#---------------------------------\n\nvm3_number = \"0\" # Number of VMs\n\nvm3_memory = \"32\" # Memory GB\n\nvm3_cpu = \"4\" # Virtual CPU\n\nvm3_vcpu_ratio = \"4\" # vCPU RATIO 1:4 1 vCPU = 0.25 eCPU (cores)\n\nvm3_name = \"appnode\" # Hostname prefix\n\nvm3_first_ip = \"192.168.11.208\" # Fist IP from a consecutive pool of IPs\n\nvm3_image_name = \"xiv_p9_image_rhel76\" # The image name\n\nvm3_remote_restart = \"false\" # Disable Auto Remote Restart\n\nvm3_storage_name = \"xiv_StoragePool\" # Storage Template\n\nvm3_dockerdisk1 = \"34\" # Docker disk size in GB for ephemeral storage\n\n#VM4 configuration (OCP - Load Balancer Node)\n\n#---------------------------------\n\nvm4_number = \"0\" # Number of VMs", - "page_start": 130, - "page_end": 130, - "source_file": "sg248459.pdf" - }, - { - "text": "See discussions, stats, and author profiles for this publication at: [https://www.researchgate.net/publication/351037551](https://www.researchgate.net/publication/351037551_A_Practical_Guide_to_Building_OWL_Ontologies_Using_Protege_55_and_Plugins?enrichId=rgreq-7ed60925595faf4aa7e40c17bac992b1-XXX&enrichSource=Y292ZXJQYWdlOzM1MTAzNzU1MTtBUzoxMDE1MTA5MzkyNTUxOTM4QDE2MTkwMzIzNDc4MTg%3D&el=1_x_2&_esc=publicationCoverPdf)\n\n#### [A Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins](https://www.researchgate.net/publication/351037551_A_Practical_Guide_to_Building_OWL_Ontologies_Using_Protege_55_and_Plugins?enrichId=rgreq-7ed60925595faf4aa7e40c17bac992b1-XXX&enrichSource=Y292ZXJQYWdlOzM1MTAzNzU1MTtBUzoxMDE1MTA5MzkyNTUxOTM4QDE2MTkwMzIzNDc4MTg%3D&el=1_x_3&_esc=publicationCoverPdf)\n\n**Preprint** · April 2021\n\nCITATIONS\n\n0\n\nREADS\n\n36,030\n\n**1 author:**\n\n[Michael Debellis](https://www.researchgate.net/profile/Michael-Debellis?enrichId=rgreq-7ed60925595faf4aa7e40c17bac992b1-XXX&enrichSource=Y292ZXJQYWdlOzM1MTAzNzU1MTtBUzoxMDE1MTA5MzkyNTUxOTM4QDE2MTkwMzIzNDc4MTg%3D&el=1_x_5&_esc=publicationCoverPdf)\n\n**21** PUBLICATIONS **194** CITATIONS\n\n[SEE PROFILE](https://www.researchgate.net/profile/Michael-Debellis?enrichId=rgreq-7ed60925595faf4aa7e40c17bac992b1-XXX&enrichSource=Y292ZXJQYWdlOzM1MTAzNzU1MTtBUzoxMDE1MTA5MzkyNTUxOTM4QDE2MTkwMzIzNDc4MTg%3D&el=1_x_7&_esc=publicationCoverPdf)\n\nAll content following this page was uploaded by [Michael Debellis](https://www.researchgate.net/profile/Michael-Debellis?enrichId=rgreq-7ed60925595faf4aa7e40c17bac992b1-XXX&enrichSource=Y292ZXJQYWdlOzM1MTAzNzU1MTtBUzoxMDE1MTA5MzkyNTUxOTM4QDE2MTkwMzIzNDc4MTg%3D&el=1_x_10&_esc=publicationCoverPdf) on 21 April 2021.\n\nThe user has requested enhancement of the downloaded file.", - "page_start": 0, - "page_end": 0, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" - }, - { - "text": "21. Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistent\n\nmusculoskeletal pain at 12 months: a secondary analysis of the Optimal\n\nScreening for Prediction of Referral and Outcome (OSPRO) validation cohort\n\nstudy. Phys Ther. 2018;98:290 - 301.\n\n22. Freburger JK, Holmes GM, Agans RP, Jackman AM, Darter JD, Wallace AS, et\n\nal. The rising prevalence of chronic low back pain. Arch Intern Med. 2009;\n\n169:251 - 8.\n\n23. Carey TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al.\n\nRace, care seeking, and utilization for chronic back and neck pain:\n\npopulation perspectives. J Pain Off J Am Pain Soc. 2010;11:343 - 50.\n\n24. Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and\n\nvalidity of chronic pain intensity measures. Pain. 1999;83:157 - 62.\n\n25. Bolton JE. Accuracy of recall of usual pain intensity in back pain patients.\n\nPain. 1999;83:533 - 9.\n\n26. Childs JD, Piva SR, Fritz JM. Responsiveness of the numeric pain rating scale\n\nin patients with low back pain. Spine. 2005;30:1331 - 4.\n\n27. Vernon H. The neck disability index: state-of-the-art, 1991-2008. J Manip\n\nPhysiol Ther. 2008;31:491 - 502.\n\n28. Vernon H, Mior S. The neck disability index: a study of reliability and validity.\n\nJ Manip Physiol Ther. 1991;14:409 - 15.\n\n29. Hudson-Cook N, Tomes-Nicholson K, Breen A. A revised Oswestry disability\n\nquestionnaire. In: Roland M, Jenner J, editors. Back pain: new approaches to\n\nrehabilitation and education. New York: Manchester University Press; 1989.\n\np. 187 - 204.\n\n30. Fritz JM, Irrgang JJ. A comparison of a modified Oswestry low back pain\n\ndisability questionnaire and the Quebec back pain disability scale. Phys\n\nTher. 2001;81:776 - 88.\n\n31. Beaton DE, Wright JG, Katz JN, Upper Extremity Collaborative Group.\n\nDevelopment of the QuickDASH: comparison of three item-reduction\n\napproaches. J Bone Joint Surg Am. 2005;87:1038 - 46.\n\n32. Irrgang JJ, Anderson AF, Boland AL, Harner CD, Kurosaka M, Neyret P, et al.\n\nDevelopment and validation of the international knee documentation\n\ncommittee subjective knee form. Am J Sports Med. 2001;29:600 - 13.\n\n33. Butera KA, Lentz TA, Beneciuk JM, George SZ. Preliminary evaluation of a\n\nmodified STarT back screening tool across different musculoskeletal pain\n\nconditions. Phys Ther. 2016;96:1251 - 61.\n\n34. Charlson ME, Pompei P, Ales KL, MacKenzie CR. A new method of classifying\n\nprognostic comorbidity in longitudinal studies: development and validation.\n\nJ Chronic Dis. 1987;40:373 - 83.\n\n35. Katz JN, Chang LC, Sangha O, Fossel AH, Bates DW. Can comorbidity be\n\nmeasured by questionnaire rather than medical record review? Med Care.\n\n1996;34:73 - 84.\n\n36. George SZ, Beneciuk JM, Bialosky JE, Lentz TA, Zeppieri G, Pei Q, et al.\n\nDevelopment of a review-of-systems screening tool for orthopaedic\n\nphysical therapists: results from the Optimal Screening for Prediction of\n\nReferral and Outcome (OSPRO) cohort. J Orthop Sports Phys Ther. 2015;45:\n\n512 - 26.\n\n37. Lentz TA, Beneciuk JM, Bialosky JE, Zeppieri G, Dai Y, Wu SS, et al.\n\nDevelopment of a yellow flag assessment tool for orthopaedic physical\n\ntherapists: results from the Optimal Screening for Prediction of Referral and\n\nOutcome (OSPRO) cohort. J Orthop Sports Phys Ther. 2016;46:327 - 43.\n\n38. Beneciuk JM, Fritz JM, George SZ. The STarT back screening tool for\n\nprediction of 6-month clinical outcomes: relevance of change patterns in\n\noutpatient physical therapy settings. J Orthop Sports Phys Ther. 2014;44:\n\n656 - 64.\n\n39. Myers RH. Classical and modern regression with applications. 2nd ed. Pacific\n\nGrove: Duxbury Press; 2000.\n\n40. Weuve J, Tchetgen Tchetgen EJ, Glymour MM, Beck TL, Aggarwal NT,\n\nWilson RS, et al. Accounting for bias due to selective attrition: the example\n\nof smoking and cognitive decline. Epidemiol Camb Mass. 2012;23:119 - 28.\n\n41. Hernán MA, Hernández-Díaz S, Robins JM. A structural approach to\n\nselection bias. Epidemiol Camb Mass. 2004;15:615 - 25.", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" - }, - { - "text": "32. Mercer RAJ , Russell JL , McGuigan LC , Coutts AJ , Strack DS ,\n\nMcLean BD. Finding the signal in the noise — interday reliability and\n\nseasonal sensitivity of 84 countermovement jump variables in pro-\n\nfessional basketball players. J Strength Cond Res 37: 394 - 402,\n\n2023. doi: [10.1519/jsc.0000000000004182](https://doi.org/10.1519/jsc.0000000000004182) .\n\n33. Cabarkapa D , Philipp N , Cabarkapa D , Eserhaut D , Fry A.\n\nComparison of force-time metrics between countermovement verti-\n\ncal jump with and without an arm swing in professional male basket-\n\nball players. Int J Strength Cond 3: 1 - 7, 2023. doi: [10.47206/ijsc.](https://doi.org/10.47206/ijsc.v3i1.197)\n\n[v3i1.197](https://doi.org/10.47206/ijsc.v3i1.197) .\n\n34. Tillin NA , Pain MT , Folland J. Explosive force production during iso-\n\nmetric squats correlates with athletic performance in rugby union play-\n\ners. J Sports Sci 31: 66 - 76, 2013. doi: [10.1080/02640414.2012.720704](https://doi.org/10.1080/02640414.2012.720704) .\n\n35. Morris CG , Weber JA , Netto KJ. Relationship between mechani-\n\ncal effectiveness in sprint running and force-velocity characteris-\n\ntics of a countermovement jump in Australian rules football\n\nathletes. J Strength Cond Res 36: e59 - e65, 2022. doi: [10.1519/](https://doi.org/10.1519/jsc.0000000000003583)\n\n[jsc.0000000000003583](https://doi.org/10.1519/jsc.0000000000003583) .\n\n36. Johnson DL , Bahamonde R. Power output estimate in university ath-\n\nletes. J Strength Cond Res 10: 161 - 166, 1996. doi: [10.1519/1533-4287](https://doi.org/10.1519/1533-4287(1996)010%3C0161:poeiua%3E2.3.co;2)\n\n[(1996)010](https://doi.org/10.1519/1533-4287(1996)010%3C0161:poeiua%3E2.3.co;2) < 0161:poeiua > 2.3.co;2 .\n\n37. Mkaouer B , Jemni M , Amara S , Chaab � en H , Tabka Z. Kinematic\n\nand kinetic analysis of counter movement jump versus two different\n\ntypes of standing back somersault. Sci Gymnast J 4: 61 - 71, 2012.\n\nhttps://www.fsp.uni-lj.si/en/research/scienti fi [c-magazines/science-](https://www.fsp.uni-lj.si/en/research/scientific-magazines/science-of-gymnastics/previous-issues/2012102209114244/)\n\n[of-gymnastics/previous-issues/2012102209114244/](https://www.fsp.uni-lj.si/en/research/scientific-magazines/science-of-gymnastics/previous-issues/2012102209114244/) .\n\n38. Walsh MS , B € ohm H , Butter fi eld MM , Santhosam J. Gender bias in\n\nthe effects of arms and countermovement on jumping performance.\n\nJ Strength Cond Res 21: 362 - 366, 2007. doi: [10.1519/00124278-](https://doi.org/10.1519/00124278-200705000-00012)\n\n[200705000-00012](https://doi.org/10.1519/00124278-200705000-00012) .\n\n39. Vadgaonkar R , Prameela MD , Kumar CG , Blossom V , Tonse M ,\n\nMurlimanju BV , Pai MM , Prabhu LV. Dimensions of pes anserinus\n\nof the lower extremity, an anatomical study with its surgical implica-\n\ntions. Anat Cell Biol 54: 178 - 183, 2021. doi: [10.5115/acb.20.275](https://doi.org/10.5115/acb.20.275) .\n\n40. Heinemeier KM , Schjerling P , Heinemeier J , Magnusson SP , Kjaer\n\nM. Lack of tissue renewal in human adult Achilles tendon is revealed by nuclear bomb <sup>14</sup> C. FASEB J 27: 2074 - 2079, 2013. doi: [10.1096/](https://doi.org/10.1096/fj.12-225599)\n\n[fj.12-225599](https://doi.org/10.1096/fj.12-225599) .\n\n41. Balshaw TG , Funnell MP , McDermott EJ , Maden-Wilkinson TM ,\n\nMassey GJ , Abela S , Quteishat B , Edsey M , James LJ , Folland JP.\n\nThe effect of speci fi c bioactive collagen peptides on tendon remodel-\n\ning during 15 wk of lower body resistance training. Med Sci Sports\n\nExerc 55: 2083 - 2095, 2023. doi: [10.1249/mss.0000000000003242](https://doi.org/10.1249/mss.0000000000003242) .\n\n42. Welle S , Totterman S , Thornton C. Effect of age on muscle hyper-\n\ntrophy induced by resistance training. J Gerontol A Biol Sci M � ed Sci\n\n51: M270 - M275, 1996. doi: [10.1093/gerona/51a.6.m270](https://doi.org/10.1093/gerona/51a.6.m270) .\n\n799", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed12.pdf" - }, - { - "text": "Monthly tables of overall projected prison population\n\n**Table A14: Monthly values of the overall projected prison population (end of month figures)**\n\n| | Sentencing Scenarios | Sentencing Scenarios | Sentencing Scenarios |\n|:---|:---|:---|:---|\n| | Scenario 1 | Central | Scenario 2 |\n| Nov-14 Dec-14 Jan-15 Feb-15 Mar-15 Apr-15 May-15 Jun-15 Jul-15 Aug-15 Sep-15 Oct-15 Nov-15 Dec-15 Jan-16 Feb-16 Mar-16 Apr-16 May-16 Jun-16 Jul-16 Aug-16 Sep-16 Oct-16 Nov-16 Dec-16 Jan-17 Feb-17 Mar-17 Apr-17 May-17 Jun-17 Jul-17 Aug-17 Sep-17 Oct-17 Nov-17 | 85,800 84,300 85,900 86,400 86,700 86,700 86,900 87,100 87,100 87,300 87,400 87,300 87,200 85,500 86,900 87,100 87,100 87,000 86,900 86,800 86,500 86,700 86,800 86,500 86,300 84,400 85,600 85,600 85,600 85,400 85,300 85,200 85,000 85,200 85,200 84,900 84,700 | 86,100 84,600 86,200 86,800 87,200 87,400 87,500 87,700 88,000 88,400 88,700 88,600 88,600 87,000 88,500 88,900 89,000 89,000 89,100 89,100 89,200 89,400 89,600 89,400 89,400 87,600 88,900 89,200 89,200 89,300 89,300 89,300 89,300 89,600 89,800 89,600 89,500 | 86,100 84,800 86,700 87,400 87,900 88,300 88,600 88,900 89,100 89,600 90,100 90,000 90,200 88,900 90,500 91,100 91,400 91,600 91,800 92,000 92,100 92,400 92,600 92,600 92,800 91,300 92,800 93,200 93,300 93,300 93,500 93,600 93,900 94,200 94,500 94,500 94,600 |\n\n| | Sentencing Scenarios | Sentencing Scenarios | Sentencing Scenarios |\n|:---|:---|:---|:---|\n| | Scenario 1 | Central | Scenario 2 |\n| Dec-17 Jan-18 Feb-18 Mar-18 Apr-18 May-18 Jun-18 Jul-18 Aug-18 Sep-18 Oct-18 Nov-18 Dec-18 Jan-19 Feb-19 Mar-19 Apr-19 May-19 Jun-19 Jul-19 Aug-19 Sep-19 Oct-19 Nov-19 Dec-19 Jan-20 Feb-20 Mar-20 Apr-20 May-20 Jun-20 Jul-20 Aug-20 Sep-20 Oct-20 Nov-20 Dec-20 | 82,900 84,200 84,200 84,100 84,100 84,000 83,900 83,700 83,700 83,800 83,400 83,400 81,600 82,900 83,000 83,000 83,000 82,800 82,600 82,600 82,800 82,800 82,400 82,200 80,300 81,500 81,700 81,800 81,700 81,500 81,400 81,400 81,600 81,800 81,300 81,100 79,200 | 87,800 89,200 89,500 89,600 89,600 89,700 89,700 89,800 90,100 90,300 90,100 90,100 88,300 89,700 90,000 90,100 90,100 90,100 90,100 90,200 90,500 90,700 90,500 90,400 88,600 89,900 90,200 90,300 90,300 90,300 90,200 90,300 90,600 90,700 90,500 90,400 88,700 | 92,900 94,400 94,800 95,100 95,500 95,700 95,800 96,000 96,400 96,800 96,700 96,800 95,100 96,500 97,200 97,400 97,300 97,500 97,600 97,600 98,000 98,100 98,100 98,300 96,700 98,200 98,500 98,700 98,800 98,800 98,900 98,900 99,300 99,500 99,500 99,600 97,900 |\n\n20", - "page_start": 21, - "page_end": 21, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "peripheral neuropathic pain. Clin J Pain. 2015;31:273 - 9.\n\n18. Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and\n\nresponse to treatment. Phys Ther. 2011;91:712 - 21.\n\n19. George SZ, Beneciuk JM, Lentz TA, Wu SS. The Optimal Screening for\n\nPrediction of Referral and Outcome (OSPRO) in patients with\n\nmusculoskeletal pain conditions: a longitudinal validation cohort from the\n\nUSA. BMJ Open. 2017;7:e015188.\n\n20. George SZ, Beneciuk JM, Lentz TA, Wu SS, Dai Y, Bialosky JE, Zeppieri G Jr.\n\nOptimal Screening for Prediction of Referral and Outcome (OSPRO) for\n\nMusculoskeletal Pain Conditions: Results From the Validation Cohort. J\n\nOrthop Sports Phys Ther. 2018;48(6):460 - 75.\n\nPage 13 of 14", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" - }, - { - "text": "[181. Zhao, Xilei; Lovreglio, Ruggiero; Nilsson, Daniel (1 May 2020). \"Modelling and interpreting](https://www.sciencedirect.com/science/article/pii/S0926580519313184)\n\n[pre-evacuation decision-making using machine learning\" (https://www.sciencedirect.com/sci](https://www.sciencedirect.com/science/article/pii/S0926580519313184)\n\n[ence/article/pii/S0926580519313184). ](https://www.sciencedirect.com/science/article/pii/S0926580519313184) *Automation in Construction* . **113** : 103140.\n\n[doi:10.1016/j.autcon.2020.103140 (https://doi.org/10.1016%2Fj.autcon.2020.103140).](https://doi.org/10.1016%2Fj.autcon.2020.103140)\n\n[hdl:10179/17315 (https://hdl.handle.net/10179%2F17315). ISSN 0926-5805 (https://search.](https://search.worldcat.org/issn/0926-5805)\n\n[worldcat.org/issn/0926-5805). Archived (https://web.archive.org/web/20240519121548/http](https://web.archive.org/web/20240519121548/https://www.sciencedirect.com/science/article/abs/pii/S0926580519313184)\n\n[s://www.sciencedirect.com/science/article/abs/pii/S0926580519313184) from the original on](https://web.archive.org/web/20240519121548/https://www.sciencedirect.com/science/article/abs/pii/S0926580519313184)\n\n19 May 2024. Retrieved 5 October 2024.\n\n[182. \"India's latest election embraced AI technology. Here are some ways it was used](https://www.pbs.org/newshour/world/indias-latest-election-embraced-ai-technology-here-are-some-ways-it-was-used-constructively)\n\n[constructively\" (https://www.pbs.org/newshour/world/indias-latest-election-embraced-ai-tech](https://www.pbs.org/newshour/world/indias-latest-election-embraced-ai-technology-here-are-some-ways-it-was-used-constructively)\n\n[nology-here-are-some-ways-it-was-used-constructively). ](https://www.pbs.org/newshour/world/indias-latest-election-embraced-ai-technology-here-are-some-ways-it-was-used-constructively) *PBS News* . 12 June 2024.\n\nRetrieved 28 October 2024.\n\n[183. Müller, Vincent C. (30 April 2020). \"Ethics of Artificial Intelligence and Robotics\" (https://plat](https://plato.stanford.edu/archives/fall2023/entries/ethics-ai/)\n\n[o.stanford.edu/archives/fall2023/entries/ethics-ai/). ](https://plato.stanford.edu/archives/fall2023/entries/ethics-ai/) *Stanford Encyclopedia of Philosophy*\n\n*Archive* [. Archived (https://web.archive.org/web/20241005165650/https://plato.stanford.edu/a](https://web.archive.org/web/20241005165650/https://plato.stanford.edu/archives/fall2023/entries/ethics-ai/)\n\n[rchives/fall2023/entries/ethics-ai/) from the original on 5 October 2024. Retrieved 5 October](https://web.archive.org/web/20241005165650/https://plato.stanford.edu/archives/fall2023/entries/ethics-ai/)\n\n2024.\n\n184. Simonite (2016).\n\n185. Russell & Norvig (2021), p. 987.\n\n186. Laskowski (2023).\n\n187. GAO (2022).\n\n188. Valinsky (2019).\n\n189. Russell & Norvig (2021), p. 991.\n\n190. Russell & Norvig (2021), pp. 991- 992.\n\n191. Christian (2020), p. 63.\n\n192. Vincent (2022).\n\n[193. Kopel, Matthew. \"Copyright Services: Fair Use\" (https://guides.library.cornell.edu/copyright/f](https://guides.library.cornell.edu/copyright/fair-use)\n\n[air-use). ](https://guides.library.cornell.edu/copyright/fair-use) *Cornell University Library* [. Archived (https://web.archive.org/web/20240926194057/](https://web.archive.org/web/20240926194057/https://guides.library.cornell.edu/copyright/fair-use)\n\n[https://guides.library.cornell.edu/copyright/fair-use) from the original on 26 September 2024.](https://web.archive.org/web/20240926194057/https://guides.library.cornell.edu/copyright/fair-use)\n\nRetrieved 26 April 2024.\n\n[194. Burgess, Matt. \"How to Stop Your Data From Being Used to Train AI\" (https://www.wired.co](https://www.wired.com/story/how-to-stop-your-data-from-being-used-to-train-ai)\n\n[m/story/how-to-stop-your-data-from-being-used-to-train-ai). ](https://www.wired.com/story/how-to-stop-your-data-from-being-used-to-train-ai) *Wired* [. ISSN 1059-1028 (https://](https://search.worldcat.org/issn/1059-1028)", - "page_start": 40, - "page_end": 40, - "source_file": "wikipedia3.pdf" - }, - { - "text": "*NAIIS-User-Manual.Docx* Page 49 07/08/2013\n\n## **Annex 4: Default values**\n\n**1. Fraction of carbon stored for reference approach**\n\nBitumen - 1\n\nCoal oils and tars (from coking coal - 0.75\n\nEthane - 0.8\n\nGas/Diesel oil - 0.5\n\nLPG - 0.8\n\nLubricants - 0.5\n\nNaphtha - 0.8\n\nNatural gas - 0.33\n\n**2. Conversion factors**\n\na. CH 4 volume  CH 4 Gg = 0.67\n\nb. *Conversion factors for energy*\n\n| From | To | Multiply by |\n|:---|:---|:---|\n| J | TJ | 10 -12 |\n| KJ | TJ | 10 -9 |\n| MJ | TJ | 10 -6 |\n| GJ | TJ | 10 -3 |\n| TJ | TJ | 1 |\n| cal | TJ | 4.1868 x 10 -12 |\n| kcal | TJ | 4.1868 x 10 -9 |\n| Mcal | TJ | 4.1868 x 10 -6 |\n| Gcal | TJ | 4.1868 x 10 -3 |\n| Tcal | TJ | 4.1868 |\n| kWh | TJ | 3.6 x 10 -6 |\n| MWh | TJ | 3.6 x 10 -3 |\n| GWh | TJ | 3.6 |\n| Btu | TJ | 1.0551 x 10 -9 |\n| kBtu | TJ | 1.0551 x 10 -6 |\n| MBtu | TJ | 1.0551 x 10 -3 |\n| GBtu | TJ | 1.0551 |\n| toe | TJ | 41.868 x 10 -3 |\n| ktoe | TJ | 41.868 |\n| Mtoe | TJ | 4.1868 x 10 4 |\n| TJ | J | 10 12 |\n| TJ | KJ | 10 9 |\n| TJ | MJ | 10 6 |\n| TJ | GJ | 10 3 |\n| TJ | cal | 238.8 x 10 9 |\n| TJ | kcal | 238.8 x 10 6 |\n| TJ | Mcal | 238.8 x 10 3 |\n| TJ | Gcal | 238.8 |\n| TJ | Tcal | 238.8 x 10 -3 |\n| TJ | kWh | 277.8 x 10 3 |\n| TJ | MWh | 277.8 |\n| TJ | GWh | 277.8 x 10 -3 |\n| TJ | Btu | 947.8 x 10 6 |\n| TJ | kBtu | 947.8 x 10 3 |\n| TJ | MBtu | 947.8 |\n| TJ | GBtu | 947.8 x 10 -3 |\n| TJ | toe | 23.88 |\n| TJ | ktoe | 23.88 x x 10 -3 |\n| TJ | Mtoe | 23.88 x 10 -6 |", - "page_start": 48, - "page_end": 48, - "source_file": "maiis-user-manual.pdf" - }, - { - "text": "**Table A10: Projected male 21 years and over prison population (end of June figures)**\n\n| Scenario | Males 21 years and over | Males 21 years and over | Males 21 years and over | Males 21 years and over | Males 21 years and over | Males 21 years and over |\n|:---|:---|:---|:---|:---|:---|:---|\n| Scenario | Total Population | Total Population | Total Population | Determinates | Determinates | Determinates |\n| Scenario | Scenario 1 | Central | Scenario 2 | Scenario 1 | Central | Scenario 2 |\n| Jun-15 Jun-16 Jun-17 Jun-18 Jun-19 Jun-20 | 76,500 75,800 74,400 73,200 72,200 71,100 | 77,100 78,300 78,500 78,900 79,300 79,400 | 78,700 82,000 83,700 85,800 87,500 88,700 | 47,400 46,800 45,900 45,200 44,600 44,000 | 48,200 49,500 50,400 51,300 52,000 52,600 | 49,800 53,300 55,700 58,200 60,300 62,000 |\n| | | | | | | |\n| Scenario | Indeterminates | Indeterminates | Indeterminates | Remand | Remand | Remand |\n| Jun-15 Jun-16 Jun-17 Jun-18 Jun-19 Jun-20 | 11,700 11,200 10,500 10,100 9,600 9,200 | 11,700 11,200 10,500 10,100 9,600 9,200 | 11,700 11,200 10,500 10,100 9,600 9,200 | 10,800 10,800 10,800 10,800 10,900 10,800 | 10,200 10,200 10,200 10,200 10,200 10,200 | 9,600 9,600 9,500 9,600 9,600 9,600 |\n| Scenario | Recall | Recall | Recall | Non Criminal | Non Criminal | Non Criminal |\n| Jun-15 Jun-16 Jun-17 Jun-18 Jun-19 Jun-20 | 4,900 5,200 5,300 5,300 5,300 5,300 | 5,200 5,500 5,600 5,600 5,600 5,600 | 5,800 6,100 6,100 6,100 6,100 6,100 | 1,700 1,700 1,700 1,700 1,700 1,700 | 1,700 1,700 1,700 1,700 1,700 1,700 | 1,700 1,700 1,700 1,700 1,700 1,700 |\n\n**Table A11: Projected male 18-20 years old prison population (end of June figures)**\n\n| | Sentencing Scenarios | Sentencing Scenarios | Sentencing Scenarios |\n|:---|:---|:---|:---|\n| | Scenario 1 | Central | Scenario 2 |\n| Jun-15 Jun-16 Jun-17 Jun-18 Jun-19 Jun-20 | 5,700 6,300 6,200 6,200 6,100 6,000 | 5,700 5,900 5,900 5,900 5,900 5,900 | 5,300 4,900 4,700 4,800 4,800 4,800 |\n\n18", - "page_start": 19, - "page_end": 19, - "source_file": "legal4_opengouvernementlicense.pdf" - }, - { - "text": "35. Di Paolo E, Cuffari E, Jaegher H. Linguistic Bodies: The Continuity between Life\n\nand Language . Cambridge: MIT press (2018).\n\n36. Colombetti G. The embodied and situated nature of moods. Philosophia (Ramat\n\nGan) . (2017) 45(4):1437 - [51. doi: 10.1007/s11406-017-9817-0](https://doi.org/10.1007/s11406-017-9817-0)\n\n37. Bandura A. Health promotion by social cognitive means. Health Educ Behav .\n\n(2004) 31(2):143 - [64. doi: 10.1177/1090198104263660](https://doi.org/10.1177/1090198104263660)\n\n38. Casey B, Coote S, Hayes S, Gallagher S. Changing physical activity behavior in\n\npeople with multiple sclerosis: a systematic review and meta-analysis. Arch Phys Med\n\nRehabil . (2018) 99(10):2059 - [75. doi: 10.1016/j.apmr.2017.12.013](https://doi.org/10.1016/j.apmr.2017.12.013)\n\n39. Silveira SL, Cederberg KLJ, Jeng B, Sikes EM, Sandroff BM, Jones CD, et al. Do\n\nphysical activity and social cognitive theory variable scores differ across symptom\n\ncluser severity groups in multiple sclerosis? Disabil Health J . (2021) 14(4):101163.\n\n[doi: 10.1016/j.dhjo.2021.101163](https://doi.org/10.1016/j.dhjo.2021.101163)\n\n40. Learmonth YC, Motl RW. Exercise training for multiple sclerosis: a narrative\n\nreview of history, bene fi ts, safety, guidelines, and promotion. Int J Environ Res\n\nPublic Health [. (2021) 18(24):13245. doi: 10.3390/ijerph182413245](https://doi.org/10.3390/ijerph182413245)\n\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical\n\nactivity interventions among persons with multiple sclerosis. Neurorehabil Neural\n\nRepair . (2019) 33(1):3 - [14. doi: 10.1177/1545968318818904](https://doi.org/10.1177/1545968318818904)\n\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in fi tness,\n\nmobility and cognition with exercise-training in MS. Acta Neurol Scand . (2019) 139\n\n(2):183 - [91. doi: 10.1111/ane.13041](https://doi.org/10.1111/ane.13041)\n\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based,\n\nindividualized physiotherapy intervention for people with multiple sclerosis: a\n\nqualitative study. Physiother Res Int [. (2019) 25(3):e1829. doi: 10.1002/pri.1829](https://doi.org/10.1002/pri.1829)\n\n44. Normann B. Facilitation of movement: new perspectives provide expanded\n\ninsights to guide clinical practice. Physiother Theory Pract . (2020) 36(7):769 - 78.\n\n[doi: 10.1080/09593985.2018.1493165](https://doi.org/10.1080/09593985.2018.1493165)\n\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in\n\nphysical therapy. Physiother Theory Pract . (2015) 31(4):244 - [52. doi: 10.3109/](https://doi.org/10.3109/09593985.2014.1002873)\n\n[09593985.2014.1002873](https://doi.org/10.3109/09593985.2014.1002873)\n\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported\n\nphysical activity correlates in Swedish adults with multiple sclerosis: a\n\ncross-sectional study. BMC Neurol [. (2017) 17(1):204. doi: 10.1186/s12883-017-](https://doi.org/10.1186/s12883-017-0981-4)\n\n[0981-4](https://doi.org/10.1186/s12883-017-0981-4)\n\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for\n\npersons with multiple sclerosis: a review and agenda for future research. Int J MS\n\nCare . (2021) 23(4):186 - [92. doi: 10.7224/1537-2073.2020-066](https://doi.org/10.7224/1537-2073.2020-066)\n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among\n\nFive Approaches . 4th ed. California: Sage (2018).\n\nDahl et al. [10.3389/fresc.2024.1303094](https://doi.org/10.3389/fresc.2024.1303094)\n\n[Frontiers in Rehabilitation Sciences](https://www.frontiersin.org/journals/rehabilitation-sciences) 11 [frontiersin.org](https://www.frontiersin.org/)", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" - } - ] - }, - { - "references": { - "source_file": "news4.pdf", - "query": "I want to start a company that automates kitchen tasks, does that sound like a good idea for 2025?", - "target_page": 1, - "target_passage": "Smart home automation Smart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "Example:\n\n“I have been offered an opportunity to work as an IT Manager abroad,\n\nand I have decided to accept the offer.”\n\n4.\n\nA sentence or two in which you thank your employer for the opportunities\n\nyou have been given during your time with the organisation.\n\nExample:\n\n“I would like to thank you for the wonderful opportunities you have given\n\nme, both to develop my skills, and to work with such knowledgeable and\n\ninspiring people.”\n\n5.\n\nAn offer to help with the transition.\n\nOnly include this if you are sincere, and don’t make any promises\n\nthat you won’t be able to keep. You could, for example, assure your\n\nemployer that you will finish your current projects or hand them over to\n\na colleague. You could also offer to train the person who will be replacing\n\nyou.\n\nExample:\n\n“During the next two weeks, I will do everything I can to ensure a\n\nsmooth transition for the company. If required, I am more than willing to\n\nassist with the hiring and training of the new Assistant IT Manager.”\n\n6.\n\nA suitable closing.\n\nIt is important to use a closing that is appropriate in the circumstances.\n\nIf you have a good relationship with your employer, you may want to\n\nwish him/her well for the future, and provide contact details that he/she\n\ncan use to get in touch with you once you have left the organisation. You\n\ncan then end your letter with a greeting such as “Kind regards,” followed\n\nby your signature.", - "page_start": 49, - "page_end": 49, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "O U R W O R K\n\n10 New\n\nConquest Models\n\n18 Replacement\n\nModels\n\n28 28\n\nNISSAN 180\n\nNew Products\n\nStart of Production\n\nNISSAN Value-Up\n\n70 70 44\n\n28 28 31\n\n**Nre Global Product Launches 28 All-New Models**\n\nThe Process and Resource Management division is one\n\nof Nissan’s greatest assets. They are sometimes perceived\n\nas too rigid, and it is true that the division has established\n\nquite a number of rules. However, I easily imagine what can\n\nhappen to a company without rules. The point, really, is to\n\nkeep the structure and provide some freedom when\n\nneeded. The core creative divisions can add great value to\n\na process, such as when they interact with the advanced\n\nengineering team. When the creative people are happy with\n\nwhat they have developed, however, someone has to\n\nsupport the complex process of creating added value. That\n\nresponsibility belongs to the Process and Resource\n\nManagement division. Otherwise, a nicely crafted process\n\nmay never be implemented. But at Nissan, employees in the\n\nProcess and Resource Management division serve as the\n\nguardians of the timelines and support the implementation\n\nof processes. If a process is not working as we planned,\n\nthey get the project back on track in a smooth and efficient\n\nmanner. If a process is no longer relevant, they quickly\n\norganize a taskforce to update it.\n\nSo Corporate Planning provides the direction, Design\n\nand Product Planning create products with value, and Market\n\nIntelligence and Process and Resource Management\n\nsupport the creative teams. Someone has to drive the\n\nimplementation, and that role belongs to our six program\n\ndirectors in Program Management. The program directors\n\nare involved from the beginning. They are businesspeople,\n\nthe CEOs of their own platform businesses. Each has a\n\ndifferent part of the vehicle lineup, but the substance of their\n\nmutual targets and commitments is simple: profit. Program\n\ndirectors make it happen. They ensure that everybody in the\n\nCompany keeps each project consistently profitable through\n\nall phases: planning, development and launch, right through\n\nto the end of the lifecycle. Our program directors are\n\npersuasive people with strong characters, special skills and\n\nattributes, and they are not afraid to challenge the system.\n\nTheir diversity contributes tremendously to Nissan’s\n\nsuccess. The cumulative work of all these divisions results in\n\na very consistent organization with an upstream process\n\nthat creates value.\n\nLooking at Nissan’s global output over the last six years,\n\nit is clear that some terrific products have been created, and\n\nthe value of the Company as a whole is greater. There are\n\nmany scorecards that reflect this, and our stakeholders\n\ncertainly know Nissan’s success first-hand. At the same\n\ntime, we must prepare for the future. We need to reinforce\n\nthe strength of our program management groups and\n\nestablish more precise, accurate groups to standardize and\n\nimprove processes for the future. Ironically, our\n\nachievements have created uncertainty for the future.\n\nSuccess creates risk, and the more we highlight our\n\nsuccesses, the more we raise the anxiety level of investors.\n\nHow can our new products be as good as those already\n\nreleased? How can we keep it all going?\n\nOne way to sustain our strong pace is to take greater\n\nadvantage of the Alliance. The value is there, in areas such\n\nas purchasing, development, benchmarking, sales networks,\n\nmarket knowledge and even financial strategy. Yet we must\n\nmaintain both a balance and a clear separation between the\n\nbrand identities of Renault and Nissan. Neither company\n\nwants to make the same cars, or have the same corporate\n\nculture, or have its brand mistaken for the other. We will\n\ncontinue to derive benefits from this strategic partnership\n\nwhile remaining Nissan.", - "page_start": 36, - "page_end": 36, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "20\n\nH ON I NDUST R I ES 2 0 0 3\n\nGreat, high-quality design creates better work environments\n\nand happier end-users. Whether we’re building lateral files (the\n\nfirst product for which we became known) or designing award-\n\nwinning seating, like our #19 ® chair, the Allsteel core message\n\nremains constant: the highest quality in functionality, dura-\n\nbility, and service.\n\nToday’s Allsteel is about a broad array of workplace\n\nfurniture solutions: new, exciting panel and desking systems,\n\nstorage, seating, and tables that offer a unique counterpoint to\n\nthe sea of sameness provided by most office furniture. Working\n\nclosely with architects and designers, we target the contract\n\nmarket, providing project-driven and design-oriented office\n\nsolutions. Our rapid modeling and prototyping allows for\n\nequally rapid product development, a reflection of our agile,\n\nlean culture. As innovative as many of our products are, design\n\ninnovation — for us — is simply what happens along the way to\n\nsolving customer problems.\n\nSome of our products, like the #19 ® chair, are icono-\n\ngraphically associated with the Allsteel name, and are quite\n\ninfluential in our brand building efforts. Our two newest enter-\n\nprises are Terrace ® 2.6 — a fast-growing systems line providing\n\nenormous flexibility and durability — and Get Set TM — an incred-\n\nibly versatile line of multi-purpose room tables, chairs, and\n\nA LLST EEL: A N A NT I DOT E T O T H E OR DI NA R Y\n\ncommunication products. All of our products respond com-\n\npletely to the needs of end-users because that’s where the\n\ndesign process starts.\n\nIn all that we do, our main focus is to identify end-user\n\nproblems and solve them better than anyone else. The majority\n\nof our customers are large corporations with multiple locations\n\nworldwide. According to the senior vice president responsible\n\nfor the global design, construction, and project management\n\nof an internationally renowned financial services company,\n\n“Allsteel offers extremely attractive, cost-effective furniture\n\nsolutions. Your manufacturing and service are best in class —\n\nyou turn everything around with impressive swiftness. There’s\n\nreally not much in the market to beat you.”\n\nWell-designed, forward-thinking, and glad to be of\n\nservice. Allsteel is proud to uphold our long heritage of quality.\n\nA CA SE ST UDY I N QUA LI T Y", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HNI_2003.pdf" - }, - { - "text": "### PLANNING\n\n**Building on Strengths**\n\n**and Being Innovative** CARLOS TAVARES\n\nExecutive Vice President\n\nO U R W O R K\n\n“The Planning Group covers a great deal of corporate\n\nterritory and handles a number of key responsibilities\n\nwithin Nissan. Our Corporate Planning division, for\n\nexample, oversees strategy, setting the Company’s\n\nlong-term course under the Executive Committee’s\n\ndirection. The two creative divisions, Design and\n\nProduct Planning, create value for the customer.\n\nTogether, those three divisions form the core of our\n\ngroup, surrounded by several other key divisions.\n\nMarket Intelligence supports Design and Product\n\nPlanning in customer understanding. The people in\n\nProcess and Resource Management provide the\n\npractical direction and restraint a company of our size\n\nmust have when deploying its resources. And Program\n\nManagement drives the implementation process,\n\nturning the work of all the other divisions into reality.\n\nThe role of Corporate Planning is to look to the\n\nfuture and devise ways to take advantage of the\n\nbusiness opportunities we identify. In the past, the\n\ndivision relied primarily on three-year plans such the\n\nNissan Revival Plan and NISSAN 180. That strategy\n\nserved the interests of Nissan stakeholders well.\n\nThe Company is now sound, and the power and\n\nconstancy of vision Corporate Planning provides will\n\ndetermine how well Nissan maintains its strength.\n\nHowever, in addition to the mid-term plan, we have\n\nnow entered a phase that requires us to extend that\n\nvision and implement a longer-term plan. Corporate\n\nPlanning is working closely with the Executive\n\nCommittee on this matter.\n\nDesign and Product Planning are central to the creation of\n\nNissan’s strength. Both focus on satisfying the consumer’s\n\nunmet needs, and create value in the process. Our product\n\nplanning DNA is to identify and target our customers, and\n\ndo it better than our competitors. Rather than simply\n\nthrowing a product into the market and waiting for a\n\nresponse, we first seek a deep understanding of the\n\nexpected response. Only then can we create a product\n\nconsistent with that understanding.\n\nOne key for both creative divisions is to focus on\n\n“customer clusters.” We refuse to spend our money to\n\ndevelop products that should please everyone. In fact, we\n\nmay invest in a certain innovation because we understand\n\nthat a particular subset of customers will appreciate the\n\nperformance it provides. Our process is very focused, and may\n\neven target a smaller customer cluster that no one else is\n\naddressing. The marketing process for these two divisions is\n\ndeep and accurate. This creates value through differentiation.\n\nThe NISSAN Value-Up plan is about focusing on strong\n\nproducts that reinforce our brand, pursuing new concepts\n\nand innovation, and expanding geographically in a stronger\n\nand faster way. During the Nissan Revival Plan and NISSAN\n\n180, we introduced some influential and innovative models—\n\nthe Murano, the Z, the FX and the X-TRAIL, to name a few.\n\nIt would be a mistake not to capitalize on those successes\n\nand reinforce the brand. At the same time, we cannot rely\n\nsolely on our current concepts. Launching a new product\n\nnaturally requires significant expenditures, because\n\nawareness and understanding must be created for the new\n\nproduct. We must differentiate to succeed, devise new\n\nproducts and concepts, and venture into areas that others\n\nhave not. During the NISSAN Value-Up period, we will offer\n\nproducts that build on past successes—without being\n\nconservative—as well as products that are new and\n\ninnovative. Our brand pyramid shows us the way to be both\n\n‘bold and thoughtful.’\n\nOur Market Intelligence division, which supports the\n\nDesign and Product Planning teams as well as other\n\ndivisions throughout the Company, is relatively new. The\n\ndivision’s experts not only supply research data, they also\n\nhelp shape surveys to answer precise questions and identify", - "page_start": 35, - "page_end": 35, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "within one particular sector. We regard within one particular sector. We regard\n\nthis process of engagement as forming a this process of engagement as forming a\n\nsingle undertaking and act accordingly. single undertaking and act accordingly.\n\nWe believe this initiative can contribute We believe this initiative can contribute\n\nto the sustainable development of Asia to the sustainable development of Asia\n\nand the rest of the world. and the rest of the world.\n\n**Miyata** : SMFG unit Japan Research : SMFG unit Japan Research\n\nInstitute serves as an adviser to the Institute serves as an adviser to the\n\nTianjin Eco-City project in China, and Tianjin Eco-City project in China, and\n\nSMBC and our securities units can SMBC and our securities units can\n\nprovide funding when needed. Through provide funding when needed. Through\n\nsuch organic assistance, we provide such organic assistance, we provide\n\nsupport through our core operations as support through our core operations as\n\na comprehensive financial services group. a comprehensive financial services group.\n\n**Kunibe** : Mr. Ando pointed out that : Mr. Ando pointed out that\n\nJapanese companies hold a lot of good Japanese companies hold a lot of good\n\ntechnology. I think that technology. I think that’s true. With the s true. With the\n\nabove-mentioned “Growing Industrial above-mentioned “Growing Industrial\n\nCluster Project Team,” for example, if Cluster Project Team,” for example, if\n\ntechnologies are being exported to Asia technologies are being exported to Asia\n\nfor an infrastructure project, bank for an infrastructure project, bank\n\nemployees will be involved from the employees will be involved from the\n\nproject planning stage. I think this is one project planning stage. I think this is one\n\nof the roles of a financial institution. of the roles of a financial institution.\n\n**Ando** : I think that the role of financial : I think that the role of financial\n\ninstitutions is significant. They do indeed institutions is significant. They do indeed\n\nhave the power to get things moving, and have the power to get things moving, and\n\nit is a very great power. it is a very great power.\n\nWe need somebody to instill in the people We need somebody to instill in the people\n\nthe idea that as long as they have hope, the idea that as long as they have hope,\n\nthey can go forward; and to lead them. they can go forward; and to lead them.\n\nI believe individuals must realize that if I believe individuals must realize that if\n\nthey have hope in their hearts, they will they have hope in their hearts, they will\n\nsee that progress is possible. We must see that progress is possible. We must\n\nensure that students are educated with a ensure that students are educated with a\n\nglobal perspective and a sense of hope global perspective and a sense of hope\n\nas well. as well.\n\nThere is trust in the strength of Japanese There is trust in the strength of Japanese\n\ntechnology and the humanity of the technology and the humanity of the\n\nJapanese people. The question is who will Japanese people. The question is who will\n\ntake the leading role in harnessing these take the leading role in harnessing these\n\nassets, in all their aspects? assets, in all their aspects?\n\n**M i y a t a** : T h e g r o u p h a s b e e n : T h e g r o u p h a s b e e n\n\nimplementing systems such as allowing implementing systems such as allowing\n\nemployees to take time off for volunteer employees to take time off for volunteer\n\nactivities, or take care of a family member activities, or take care of a family member\n\nwhile working. while working.\n\nOne more thing, how can you contribute One more thing, how can you contribute\n\nby bringing together the power of a by bringing together the power of a\n\ncomprehensive financial services group comprehensive financial services group\n\nand making it work on behalf of the and making it work on behalf of the\n\ncommunity? How do you harness that community? How do you harness that", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "NISSAN Value-Up has set aggressive objectives for sustainable growth at Nissan, and Alliance\n\nsupport is a key to attaining those objectives. While its role is not rigidly defined, the Alliance will\n\nnevertheless be an integral player in the process.\n\nA major change in the Alliance is that Carlos Ghosn now serves as CEO of Renault and\n\nNissan. As the chair of the executive committees for both companies, he has an invaluable dual\n\nperspective that will help us solve major issues, identify fresh opportunities, and create more\n\nstrategic discussions within the Alliance board. “Synergy” is an overused word, but in this case\n\nan entirely appropriate one.\n\nAn example of this purposeful fusion is in benchmarking competition. Confidentiality\n\neffectively prevents the accurate comparison of performance between two different companies.\n\nHowever, the Alliance transparency policy between Nissan and Renault makes such disclosures\n\nnatural and beneficial, presenting opportunities to identify avenues of progress from two angles.\n\nEngineering is one specific area where the Alliance presents opportunities for better\n\ncoordination and resource optimization. Powertrains offer a practical example by combining the\n\nexpertise and industrial capacity of the current Renault and Nissan workforce, both partners can\n\nupgrade the quantity and quality of their output. When engineers challenge each other, better\n\nconcepts are the rule rather than the exception.\n\nAnother prospective area for synergy is in General Overseas Markets (GOM). Further\n\noptimization of the Alliance will help us to penetrate these widely dispersed markets, particularly\n\nwhere one partner is present and the other is not. For totally new markets, both companies will\n\nmeet to decide which will enter first. This is more than just a sales and marketing strategy; it is\n\nalso about production optimization. One company can use the other’s production capacity to test\n\na new market, which lowers cost and risk.\n\nA key here is that both companies must operate in tandem. We will only pursue\n\nopportunities that offer a win-win situation. If it is not mutually beneficial, we will either find a way\n\nto balance the equation or abandon the project.\n\nIn 2004, the Alliance released its Vision-Destination paper to clarify the cooperative aspects\n\nthat would make both partners successful. It reinforced this unique partnership and set precise\n\ntargets for the Alliance, including becoming one of the top three automotive groups in quality,\n\nkey technologies, and total operating profit. Vision-Destination created a positive environment of\n\nintramural competition.\n\nThe real importance of the Alliance lies in its potential. The two companies do not exist in\n\nseparate worlds, but they do possess different cultures and strengths. Renault is strong in\n\nEurope, which is good for Nissan. Nissan is strong in Japan and North America, which is good\n\nfor Renault. We can challenge each other, and in doing so, drive ourselves to greater heights.\n\n### RENAULT-NISSAN ALLIANCE\n\nW H O W E A R E\n\n**Allied for Independent Success**\n\n**Various Models**\n\n**From the B Platform**\n\n**From the C Platform**\n\nMEGANE\n\nCLIO\n\nSERENA\n\nMARCH/MICRA", - "page_start": 32, - "page_end": 32, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Arts and Entertainment](https://about.newsusa.com/taxonomy/term/78) / New Artificial Intelligence Summit Series Begins With Energy\n\n## New Artificial Intelligence Summit Series Begins With\n\n## Energy\n\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain\n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative\n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit\n\nSeries.\n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington,\n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and\n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant\n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote\n\npartnerships between AI and energy stakeholders.\n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy\n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in\n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced\n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research.\n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy,\n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and\n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American\n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts.\n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan.\n\nArticle Link\n\n[https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…](https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with-energy)\n\n[ARTS AND ENTERTAINMENT](https://about.newsusa.com/taxonomy/term/78)\n\n07/31/2024\n\n[Celebrate St. Patrick's Day with](https://about.newsusa.com/celebrate-st-patricks-day-with-no-booze-just-pure-irish-fun-and-entertainment)\n\nNo Booze, Just Pure Irish Fun and\n\nEntertainment\n\nMar 06, 2024\n\nSay Hello to Your Big Break at the\n\nStapleton Library Job Fair in\n\n[Vocation, Trade, or Civil Service](https://about.newsusa.com/say-hello-to-your-big-break-at-the-stapleton-library-job-fair-in-vocation-trade-or-civil-service)\n\nMar 06, 2024\n\nLocal Artists Collaborate for a\n\n[Unique Fusion of Groove and](https://about.newsusa.com/local-artists-collaborate-for-a-unique-fusion-of-groove-and-collage)\n\nCollage\n\nMar 06, 2024\n\n[Explore Downtown San Pedro](https://about.newsusa.com/explore-downtown-san-pedro-with-flair-ride-the-iconic-red-car-trolley-for-free)\n\nwith Flair: Ride the Iconic Red Car\n\nTrolley for Free\n\nMar 06, 2024\n\nRetrain Your Emotional Brain: A\n\n[Natural Alternative to Weight](https://about.newsusa.com/retrain-your-emotional-brain-a-natural-alternative-to-weight-loss-drugs)\n\nLoss Drugs\n\nFeb 22, 2024\n\nSerial Entrepreneur Teaches Us\n\n[How to Go the Distance in](https://about.newsusa.com/serial-entrepreneur-teaches-us-how-to-go-the-distance-in-business-and-in-life)\n\nBusiness and in Life\n\nFeb 21, 2024\n\n[FASHION](https://about.newsusa.com/taxonomy/term/1)\n\n[BUSINESS](https://about.newsusa.com/taxonomy/term/2)\n\n[INFOGRAPHIC](https://about.newsusa.com/taxonomy/term/16)\n\n[ENVIRONMENT](https://about.newsusa.com/taxonomy/term/17)\n\n[HEALTH](https://about.newsusa.com/taxonomy/term/18)", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "Motivated, passionate people are Nissan’s greatest asset. The high performance of the\n\ncompany reflects the attitudes of our people, and we work hard to maintain their passion and\n\nmotivation in several ways. First, we clearly define our corporate vision. People must understand\n\nand internalize this vision, because even in the most difficult of times a compelling vision inspires\n\neveryone to move in the same direction.\n\nSecond, we strive for honest, effective two-way communication. Relationships, inside or\n\noutside the company, are based on mutual respect and trust. This is fostered by open\n\nexchanges. New communications channels at Nissan now allow employees to access company\n\ninformation in a faster, more effective manner, and to swiftly share what they know with\n\ninvestors, shareholders, suppliers, the media and other interested parties.\n\nThird, we keep our management consistent and promote empowerment. Consistent\n\nmanagement sets a solid foundation and inspires trust in the actions and decisions of the\n\ncompany. Empowerment builds on this by encouraging employee participation in the decision-\n\nmaking process. Employees understand the management structure and feel confident in\n\nexpressing their own opinions and ideas.\n\nFourth, employees are evaluated fairly. We are focused on results and real performance as\n\nthe true measures of success. Nissan has become a leader in Japan by moving away from the\n\ntraditional seniority-based employment and compensation system toward a system that rewards\n\nachievement. We even go a step further and reward actions that exemplify Nissan’s vision.\n\nNissan now serves as the benchmark for other companies striving to create more modern,\n\ndynamic employment systems.\n\nLastly, Nissan’s brand identity is now clearly defined. After our people, our brand is the most\n\nvaluable asset we possess, of greater worth than any of the company’s tangible assets.\n\nThose are the elements of our philosophy—a system of thinking that will stretch as Nissan\n\ncontinues to pursue sustainable and profitable growth. Our vision is to become the top\n\nautomaker in the world—the leader in quality, brand strength, profitability and performance.\n\nThe Nissan Management Way has mapped out the course to this goal, yet along the way we will\n\nalways retain the flexibility to redefine who we are, based on the needs and desires of the\n\ncustomers we serve.\n\nW H O W E A R E", - "page_start": 20, - "page_end": 20, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "### OUR WAY\n\nOne thing about Nissan is very clear: this is a company that sets its own distinctive\n\ncourse, and that course defines the modern automotive company. Our philosophy\n\ncomes from within, and its principles are based not on tradition but on our own\n\nknowledge and experience, drawing on the powerful flow of information that runs\n\nthrough divisions, business areas and the Alliance with Renault.\n\nAt the core of our philosophy is the Nissan Management Way. As one senior\n\nexecutive remarked, “This is *our* way, a commonsense way that anyone in the company\n\ncan take as their own.” The guiding principle here is both flexible and simple: inspire\n\neffective performance. To create value for customers, for example, employees must be\n\ncustomer-focused.\n\nTo produce the necessary shift in thinking, we must have management of the highest caliber.\n\nThe actions and comments of the senior executives appearing in this annual report reflect that\n\nstrength of leadership. You will see it in the way they convey their individual visions, commit to\n\naction plans, manage with accountability, assess progress, and recognize high performance. The\n\nsame management practices are deeply embedded at every level of the company.\n\nThe first key concept in the Nissan Management Way is cross-functionality. Cross-functional\n\nteams—CFTs—and the V-Up program are powerful management tools, developed within Nissan,\n\nthat reach across the functions and organizations of this global company. When employees are\n\nbrought together across corporate and physical borders to form a CFT, what we call “healthy\n\nconflict” often arises. Healthy conflict is cooperative, not combative, and sparks innovative ways\n\nof thinking. Again, it all springs from looking at challenges in a customer-centric way. After all, no\n\nsingle division can produce what customers want—an outstanding automobile backed by\n\nexcellent service and support. Cross-functional activities are at the core of all operations within\n\nNissan, making the process more active and direct.\n\nAnother key concept at Nissan is “stretch.” Stretch occurs when an activity spans the entire\n\ncompany and draws on a variety of viewpoints aimed at meeting customer expectations.\n\nCombining diverse backgrounds and ways of thinking creates solutions that stretch the\n\norganization in new directions.\n\nSince the first days of the Nissan Revival Plan, everything we do at Nissan is based on\n\ncommitments. People must commit themselves to achieving goals. Some goals are internal,\n\nwhile others are of importance to a wider association of employees, shareholders, suppliers,\n\ncustomers and others. Setting a goal and developing the process to achieve it go beyond simply\n\nmeeting a target, however. These actions are meant to develop confidence and the desire to\n\nreach still higher levels of performance.\n\nW H O W E A R E\n\n**The Nissan Way of Doing Business**", - "page_start": 19, - "page_end": 19, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "Chapter 3. IBM Cloud Paks: Middleware anywhere **47**\n\n#### **3.3.2 Core capabilities**\n\nIntegral to the IBM Cloud Pak for Automation is a set of containerized software, both IBM and\n\nopen source, which includes the following components:\n\n� IBM Business Automation Workflow\n\nManual workflows can easily disrupt or slow operations. Lack of transparency and\n\ndependencies on employees leave businesses vulnerable to various bottlenecks that\n\ncreate inefficiencies. Automating workflows safeguards against potential barriers and\n\nempowers business professionals to directly participate in designing business solutions.\n\nWorkflow automation orchestrates multiple business processes straight-through,\n\nhuman-assisted or case management within operations and provides visibility into each\n\nstep.\n\n� IBM Operational Decision Manager\n\nA business rules management system (BRMS) enables businesses to create and manage\n\nbusiness logic independently from applications and processes. Through business rules,\n\nyour team can specify decision logic in simple terms, close to natural language. Because\n\nrules are easily integrated with other IT systems, your applications can scale and run\n\nautomated decisions across multiple channels.\n\nWhen changes to business rules are required, business users can quickly update them,\n\nwhich provides the agility and speed that is needed to meet changing business demands.\n\nDecision automation uses business rules to remove manual work from a decision process,\n\nwhich improves business agility and reducing IT reliance.\n\n� IBM Business Automation Content Analyzer\n\nTo reinvent under-performing, high-friction business processes, enterprises are investing\n\nin digital transformation. This investment requires processes and applications to access\n\nand control a wide range of content, including documents, images, and audio files.\n\nContent services are accessible in multiple ways, including mobile devices and desktops,\n\nand as discrete capabilities embedded in workflows or applications, such as Enterprise\n\nResource Planning (ERP) systems. This content analyzer enables efficient, consistent,\n\nand accurate content collaboration and decision-making across the organization. Content\n\nservices are capabilities for collecting, governing, managing, and enriching enterprise\n\ncontent to be deployed efficiently across any cloud and within any application.\n\n� Process Mapping\n\nInefficient processes cost you time and money. Bottlenecks, complexities, and a lack of\n\nunderstanding mask opportunities for process improvement. Process modeling helps you\n\nto gain better visibility into business operations, which helps you create efficiencies at\n\nscale. Process mapping is any automation strategy’s first step. It enables non-technical\n\npeople to work across departments to see a process landscape.\n\n� Data Capture\n\nEnterprises produce and receive massive volumes of new information every day to make\n\ndecisions, manage operations, and create value. Most that information is inaccessible and\n\ninvisible to the business applications that need it most, which undermines the ability of\n\ndecision makers to truly understand the opportunities and constraints that are affecting\n\ntheir organization.", - "page_start": 62, - "page_end": 62, - "source_file": "sg248459.pdf" - } - ] - }, - { - "references": { - "source_file": "news4.pdf", - "query": "I want to help my parents who are in residential care, are there any trendy AI-related devices I could help them with? ", - "target_page": 1, - "target_passage": "Wearable devices equipped with this technology can offer real-time health insights, helping individuals make informed decisions about their well-being", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "[Vincent van Gogh in watercolour](https://en.wikipedia.org/wiki/Vincent_van_Gogh)\n\ncreated by generative AI software\n\nArtificial intelligent (AI) agents are software entities designed to\n\nperceive their environment, make decisions, and take actions\n\nautonomously to achieve specific goals. These agents can interact\n\nwith users, their environment, or other agents. AI agents are used\n\n[in various applications, including virtual assistants, chatbots,](https://en.wikipedia.org/wiki/Chatbots)\n\n[autonomous vehicles, game-playing systems, and industrial](https://en.wikipedia.org/wiki/Industrial_robotics)\n\n[robotics. AI agents operate within the constraints of their](https://en.wikipedia.org/wiki/Industrial_robotics)\n\nprogramming, available computational resources, and hardware\n\nlimitations. This means they are restricted to performing tasks\n\nwithin their defined scope and have finite memory and processing\n\ncapabilities. In real-world applications, AI agents often face time\n\nconstraints for decision-making and action execution. Many AI\n\nagents incorporate learning algorithms, enabling them to improve\n\ntheir performance over time through experience or training. Using\n\nmachine learning, AI agents can adapt to new situations and\n\noptimise their behaviour for their designated tasks. <sup>[175][176][177]</sup>\n\nThere are also thousands of successful AI applications used to solve specific problems for specific\n\nindustries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in\n\nsome offerings or processes. <sup>[178]</sup> [ A few examples are energy storage, medical diagnosis, military](https://en.wikipedia.org/wiki/Energy_storage)\n\n[logistics, applications that predict the result of judicial decisions, foreign policy, or supply chain](https://en.wikipedia.org/wiki/Foreign_policy)\n\nmanagement.\n\n[AI applications for evacuation and disaster management are growing. AI has been used to investigate if](https://en.wikipedia.org/wiki/Disaster)\n\nand how people evacuated in large scale and small scale evacuations using historical data from GPS,\n\nvideos or social media. Further, AI can provide real time information on the real time evacuation\n\nconditions. <sup>[179][180][181]</sup>\n\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments\n\nor increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict\n\nthe ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct\n\n[predictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests,](https://en.wikipedia.org/wiki/Predictive_analytics)\n\nand save water.\n\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and\n\napplications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the\n\ndevelopment of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting\n\nsolar activity, and distinguishing between signals and instrumental effects in gravitational wave\n\nastronomy. Additionally, it could be used for activities in space, such as space exploration, including the\n\nanalysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance,\n\nand more autonomous operation.\n\n#### **Other industry-specific tasks**", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" - }, - { - "text": "160. Alex McFarland: *[7 Best AI for Math Tools.](https://www.unite.ai/best-ai-for-math-tools/)* (https://www.unite.ai/best-ai-for-math-tools/)\n\n[Archived (https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-mat](https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-math-tools/)\n\n[h-tools/) 11 September 2024 at the Wayback Machine unite.ai. Retrieved 2024-08-07](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n161. Matthew Finio & Amanda Downie: IBM Think 2024 Primer, \"What is Artificial Intelligence (AI)\n\nin Finance?\" 8 Dec. 2023\n\n162. M. Nicolas, J. Firzli: Pensions Age/European Pensions magazine, \"Artificial Intelligence: Ask\n\n[the Industry\" May June 2024 https://videovoice.org/ai-in-finance-innovation-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[intended/ Archived (https://web.archive.org/web/20240911125502/https://videovoice.org/ai-i](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[n-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[act-wont-work-as-intended/) 11 September 2024 at the Wayback Machine.](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n163. Congressional Research Service (2019). *[Artificial Intelligence and National Security](https://fas.org/sgp/crs/natsec/R45178.pdf)* (https://f\n\n[as.org/sgp/crs/natsec/R45178.pdf) (PDF). Washington, DC: Congressional Research](https://fas.org/sgp/crs/natsec/R45178.pdf)\n\n[Service.PD-notice](https://en.wikipedia.org/wiki/Template:PD-notice)\n\n164. Slyusar, Vadym (2019). Artificial intelligence as the basis of future control networks\n\n[(Preprint). doi:10.13140/RG.2.2.30247.50087 (https://doi.org/10.13140%2FRG.2.2.30247.5](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[0087).](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[165. Iraqi, Amjad (3 April 2024). \" 'Lavender': The AI machine directing Israel's bombing spree in](https://www.972mag.com/lavender-ai-israeli-army-gaza/)\n\n[Gaza\" (https://www.972mag.com/lavender-ai-israeli-army-gaza/). ](https://www.972mag.com/lavender-ai-israeli-army-gaza/) *+972 Magazine* . Retrieved\n\n6 April 2024.\n\n[166. Davies, Harry; McKernan, Bethan; Sabbagh, Dan (1 December 2023). \" 'The Gospel': how](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[Israel uses AI to select bombing targets in Gaza\" (https://www.theguardian.com/world/2023/](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets). ](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets) *The Guardian* . Retrieved\n\n4 December 2023.\n\n[167. Marti, J Werner (10 August 2024). \"Drohnen haben den Krieg in der Ukraine revolutioniert,](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)\n\n[doch sie sind empfindlich auf Störsender - deshalb sollen sie jetzt autonom operieren\" (http](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" - }, - { - "text": "Example:\n\n“I have been offered an opportunity to work as an IT Manager abroad,\n\nand I have decided to accept the offer.”\n\n4.\n\nA sentence or two in which you thank your employer for the opportunities\n\nyou have been given during your time with the organisation.\n\nExample:\n\n“I would like to thank you for the wonderful opportunities you have given\n\nme, both to develop my skills, and to work with such knowledgeable and\n\ninspiring people.”\n\n5.\n\nAn offer to help with the transition.\n\nOnly include this if you are sincere, and don’t make any promises\n\nthat you won’t be able to keep. You could, for example, assure your\n\nemployer that you will finish your current projects or hand them over to\n\na colleague. You could also offer to train the person who will be replacing\n\nyou.\n\nExample:\n\n“During the next two weeks, I will do everything I can to ensure a\n\nsmooth transition for the company. If required, I am more than willing to\n\nassist with the hiring and training of the new Assistant IT Manager.”\n\n6.\n\nA suitable closing.\n\nIt is important to use a closing that is appropriate in the circumstances.\n\nIf you have a good relationship with your employer, you may want to\n\nwish him/her well for the future, and provide contact details that he/she\n\ncan use to get in touch with you once you have left the organisation. You\n\ncan then end your letter with a greeting such as “Kind regards,” followed\n\nby your signature.", - "page_start": 49, - "page_end": 49, - "source_file": "basic-english-language-skills.PDF" - }, - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Arts and Entertainment](https://about.newsusa.com/taxonomy/term/78) / New Artificial Intelligence Summit Series Begins With Energy\n\n## New Artificial Intelligence Summit Series Begins With\n\n## Energy\n\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain\n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative\n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit\n\nSeries.\n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington,\n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and\n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant\n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote\n\npartnerships between AI and energy stakeholders.\n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy\n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in\n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced\n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research.\n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy,\n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and\n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American\n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts.\n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan.\n\nArticle Link\n\n[https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…](https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with-energy)\n\n[ARTS AND ENTERTAINMENT](https://about.newsusa.com/taxonomy/term/78)\n\n07/31/2024\n\n[Celebrate St. Patrick's Day with](https://about.newsusa.com/celebrate-st-patricks-day-with-no-booze-just-pure-irish-fun-and-entertainment)\n\nNo Booze, Just Pure Irish Fun and\n\nEntertainment\n\nMar 06, 2024\n\nSay Hello to Your Big Break at the\n\nStapleton Library Job Fair in\n\n[Vocation, Trade, or Civil Service](https://about.newsusa.com/say-hello-to-your-big-break-at-the-stapleton-library-job-fair-in-vocation-trade-or-civil-service)\n\nMar 06, 2024\n\nLocal Artists Collaborate for a\n\n[Unique Fusion of Groove and](https://about.newsusa.com/local-artists-collaborate-for-a-unique-fusion-of-groove-and-collage)\n\nCollage\n\nMar 06, 2024\n\n[Explore Downtown San Pedro](https://about.newsusa.com/explore-downtown-san-pedro-with-flair-ride-the-iconic-red-car-trolley-for-free)\n\nwith Flair: Ride the Iconic Red Car\n\nTrolley for Free\n\nMar 06, 2024\n\nRetrain Your Emotional Brain: A\n\n[Natural Alternative to Weight](https://about.newsusa.com/retrain-your-emotional-brain-a-natural-alternative-to-weight-loss-drugs)\n\nLoss Drugs\n\nFeb 22, 2024\n\nSerial Entrepreneur Teaches Us\n\n[How to Go the Distance in](https://about.newsusa.com/serial-entrepreneur-teaches-us-how-to-go-the-distance-in-business-and-in-life)\n\nBusiness and in Life\n\nFeb 21, 2024\n\n[FASHION](https://about.newsusa.com/taxonomy/term/1)\n\n[BUSINESS](https://about.newsusa.com/taxonomy/term/2)\n\n[INFOGRAPHIC](https://about.newsusa.com/taxonomy/term/16)\n\n[ENVIRONMENT](https://about.newsusa.com/taxonomy/term/17)\n\n[HEALTH](https://about.newsusa.com/taxonomy/term/18)", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "[The first global AI Safety Summit was held](https://en.wikipedia.org/wiki/AI_Safety_Summit)\n\nin 2023 with a declaration calling for\n\ninternational cooperation.\n\nPromotion of the wellbeing of the people and communities that these technologies affect requires\n\nconsideration of the social and ethical implications at all stages of AI system design, development and\n\nimplementation, and collaboration between job roles such as data scientists, product managers, data\n\nengineers, domain experts, and delivery managers. <sup>[300]</sup>\n\n[The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations](https://en.wikipedia.org/wiki/AI_Safety_Institute_(United_Kingdom))\n\navailable under a MIT open-source licence which is freely available on GitHub and can be improved with\n\nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge,\n\nability to reason, and autonomous capabilities. <sup>[301]</sup>\n\nThe regulation of artificial intelligence is the development\n\nof public sector policies and laws for promoting and\n\nregulating AI; it is therefore related to the broader regulation\n\nof algorithms. <sup>[302]</sup> The regulatory and policy landscape for\n\nAI is an emerging issue in jurisdictions globally. <sup>[303]</sup>\n\n[According to AI Index at Stanford, the annual number of](https://en.wikipedia.org/wiki/Stanford)\n\nAI-related laws passed in the 127 survey countries jumped\n\nfrom one passed in 2016 to 37 passed in 2022\n\nalone. <sup>[304][305]</sup> Between 2016 and 2020, more than 30\n\ncountries adopted dedicated strategies for AI. <sup>[306]</sup> Most EU\n\nmember states had released national AI strategies, as had\n\nCanada, China, India, Japan, Mauritius, the Russian\n\nFederation, Saudi Arabia, United Arab Emirates, U.S., and\n\nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia\n\nand Tunisia. <sup>[306]</sup> [ The Global Partnership on Artificial Intelligence was launched in June 2020, stating a](https://en.wikipedia.org/wiki/Global_Partnership_on_Artificial_Intelligence)\n\nneed for AI to be developed in accordance with human rights and democratic values, to ensure public\n\nconfidence and trust in the technology. <sup>[306]</sup> [ Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher](https://en.wikipedia.org/wiki/Daniel_Huttenlocher)\n\npublished a joint statement in November 2021 calling for a government commission to regulate AI. <sup>[307]</sup>\n\nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they\n\nbelieve may happen in less than 10 years. <sup>[308]</sup> In 2023, the United Nations also launched an advisory\n\nbody to provide recommendations on AI governance; the body comprises technology company\n\nexecutives, governments officials and academics. <sup>[309]</sup> [ In 2024, the Council of Europe created the first](https://en.wikipedia.org/wiki/Council_of_Europe)\n\n[international legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence](https://en.wikipedia.org/wiki/Framework_Convention_on_Artificial_Intelligence_and_Human_Rights,_Democracy_and_the_Rule_of_Law)\n\n[and Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United](https://en.wikipedia.org/wiki/Framework_Convention_on_Artificial_Intelligence_and_Human_Rights,_Democracy_and_the_Rule_of_Law)\n\nStates, the United Kingdom, and other signatories. <sup>[310]</sup>\n\n[In a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only](https://en.wikipedia.org/wiki/Ipsos)\n\n35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\". <sup>[304]</sup>\n\n[A 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to](https://en.wikipedia.org/wiki/Reuters)", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**33.** —(1) Any of the following—\n\n(a) a person (“P”) who—\n\n(i) before travelling to the United Kingdom has made arrangements with a provider in\n\nthe United Kingdom to receive healthcare (or, where P is a child, on whose behalf\n\nsuch arrangements have been made),\n\n(ii) is in possession of written confirmation of the arrangements from the provider,\n\n(iii) has travelled to the United Kingdom to receive that healthcare, and\n\n(iv) is attending a place to receive that healthcare or is travelling directly between that\n\nplace and the place where they are self-isolating;\n\n(b) a person who—\n\n(i) is accompanying P for the purpose of providing necessary care or support to P in the\n\ncircumstances referred to in sub-paragraph (1)(a)(iv), or\n\n(ii) is travelling, for the purpose of so accompanying P, directly between the place where\n\nthey are self-isolating and either of the places referred to in sub-paragraph (1)(a)(iv),\n\nwhere that person has travelled to the United Kingdom for that purpose and is in\n\npossession of the confirmation referred to in sub-paragraph (1)(a)(ii) or a copy of it;\n\n(c) an accompanying child who is accompanying P or, where P is a child, is accompanying a\n\nperson referred to in sub-paragraph (1)(b);\n\n(d) a live donor who is attending a place for the purpose referred to in the definition of “live\n\ndonor” or is travelling directly between that place and the place where they are self-\n\nisolating.\n\n(2) For the purposes of this paragraph—\n\n(a) “accompanying child”, in relation to P, means a child who has arrived in England with P\n\nand for whom P has responsibility, or where P is a child, a child who has arrived in\n\nEngland with the person referred to in sub-paragraph (1)(b) and for whom that person has\n\nresponsibility;\n\n(b) “healthcare” means all forms of healthcare provided for individuals, whether relating to\n\nmental or physical health, including healthcare in connection with giving birth;\n\n(c) “live donor” means a person who—\n\n(i) has travelled to the United Kingdom for the purpose of donation of material which\n\nconsists of or includes their human cells pursuant to arrangements made with a\n\nprovider in the United Kingdom before travelling to the United Kingdom, and which\n\nare to be used by the provider for the purpose of providing healthcare, and\n\n(ii) is in possession of written confirmation of the arrangements from the provider;\n\n(d) “provider” means a provider of healthcare;\n\n(e) references to a place where a person is self-isolating are to a place where they are\n\nrequired to self-isolate, or permitted to be at, by virtue of regulation 9.\n\n**34.** —(1) A person who has travelled to the United Kingdom for the purpose of transporting\n\nmaterial which consists of, or includes, human cells or blood and which is to be used for the\n\nprovision of healthcare by a provider.\n\n(2) For the purposes of sub-paragraph (1)—\n\n(a) “blood” includes blood components;\n\n(b) “healthcare” and “provider” have the meanings given in paragraph 33(2).\n\n**35.** A person who is an “inspector” within the meaning given in regulation 8(1) of the Human\n\nMedicines Regulations 2012( **a** ), or who has been appointed as an inspector under regulation 33 of\n\n( **a** ) S.I. 2012/1916.", - "page_start": 43, - "page_end": 43, - "source_file": "uksi_20210582_en.pdf" - }, - { - "text": "## **Artificial intelligence**\n\n**Artificial intelligence** ( **AI** [), in its broadest sense, is intelligence exhibited by machines, particularly](https://en.wikipedia.org/wiki/Machine)\n\n[computer systems. It is a field of research in computer science that develops and studies methods and](https://en.wikipedia.org/wiki/Computer_science)\n\n[software that enable machines to perceive their environment and use learning and intelligence to take](https://en.wikipedia.org/wiki/Machine_learning)\n\nactions that maximize their chances of achieving defined goals. <sup>[1]</sup> Such machines may be called AIs.\n\n[High-profile applications of AI include advanced web search engines (e.g., Google Search);](https://en.wikipedia.org/wiki/Google_Search)\n\n[recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google](https://en.wikipedia.org/wiki/Google_Assistant)\n\n[Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g.,](https://en.wikipedia.org/wiki/Computational_creativity)\n\n[ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However,](https://en.wikipedia.org/wiki/Go_(game))\n\nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general\n\napplications, often without being called AI because once something becomes useful enough and common\n\n[enough it's not labeled AI anymore.\"](https://en.wikipedia.org/wiki/AI_effect) <sup>[2][3]</sup>\n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The\n\n[traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural](https://en.wikipedia.org/wiki/Natural_language_processing)\n\n[language processing, perception, and support for robotics.](https://en.wikipedia.org/wiki/Robotics) <sup>[a]</sup> [ General intelligence—the ability to complete](https://en.wikipedia.org/wiki/Artificial_general_intelligence)\n\nany task performed by a human on an at least equal level—is among the field's long-term goals. <sup>[4]</sup> To\n\nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including\n\n[search and mathematical optimization, formal logic, artificial neural networks, and methods based on](https://en.wikipedia.org/wiki/Artificial_neural_network)\n\n[statistics, operations research, and economics.](https://en.wikipedia.org/wiki/Economics) <sup>[b]</sup> [ AI also draws upon psychology, linguistics, philosophy,](https://en.wikipedia.org/wiki/Philosophy_of_artificial_intelligence)\n\n[neuroscience, and other fields.](https://en.wikipedia.org/wiki/Neuroscience) <sup>[5]</sup>\n\nArtificial intelligence was founded as an academic discipline in 1956, <sup>[6]</sup> and the field went through\n\n[multiple cycles of optimism throughout its history,](https://en.wikipedia.org/wiki/History_of_artificial_intelligence) <sup>[7][8]</sup> followed by periods of disappointment and loss of\n\n[funding, known as AI winters.](https://en.wikipedia.org/wiki/AI_winter) <sup>[9][10]</sup> [ Funding and interest vastly increased after 2012 when deep learning](https://en.wikipedia.org/wiki/Deep_learning)\n\noutperformed previous AI techniques. <sup>[11]</sup> [ This growth accelerated further after 2017 with the transformer](https://en.wikipedia.org/wiki/Transformer_architecture)\n\n[architecture,](https://en.wikipedia.org/wiki/Transformer_architecture) <sup>[12]</sup> and by the early 2020s many billions of dollars were being invested in AI and the field\n\n[experienced rapid ongoing progress in what has become known as the AI boom. The emergence of](https://en.wikipedia.org/wiki/AI_boom)\n\nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed\n\n[several unintended consequences and harms in the present and raised concerns about the risks of AI and](https://en.wikipedia.org/wiki/AI_risk)", - "page_start": 0, - "page_end": 0, - "source_file": "wikipedia3.pdf" - }, - { - "text": "different rightsholders and authors. Managing opt-outs for so many different interests within\n\none book may get overly complicated very fast.\n\nIn any event, creating an opt-out system will need some ways of authenticating whether\n\nsomeone has the relevant authority to make choices about inclusion of a work.\n\n###### *Who would get to use the books data commons? For what?*\n\nA commons might be made publicly available to all, as has been done with datasets like The\n\nPile. Another possible design choice is to restrict access only to authorized users and to\n\nenforce particular responsibilities or obligations in return for authorization. Three particular\n\ndimensions of permitted uses and users came up in our discussions:\n\n- **Defining and ensuring acceptable and ethical use:** Participants discussed to what\n\nextent restrictions should be put on use of the resource. In the case of HathiTrust,\n\nacceptable use is implicitly ensured by limiting access to researchers from member\n\ninstitutions; other forms of “gated access” are possible, allowing access only to\n\ncertain types of users and for certain uses. One can imagine more fine-grained 39\n\nmechanisms, based on a review of the purpose for which datasets are used. This\n\nimagined resource could become a useful lever to demand responsible development\n\nand use of AI; alongside “sticks” like legal penalties, this would be a “carrot” that\n\ncould incentivize good behavior. At the same time, drawing the lines around, let alone\n\nenforcing, “good behavior” would constitute a significant challenge.\n\n- **Charging for use to support sustainability of the training corpus itself:** While wanting\n\nto ensure broad access to this resource, it is important to consider economic\n\nsustainability, including support for continuing to update the resource with new works\n\nand appropriate tooling for AI training. Requiring some form of payment to use the\n\nresource could support sustainability, perhaps with different requirements for\n\ndifferent types of users (e.g., differentiating between non-commercial and\n\ncommercial users, or high-volume, well-resourced users and others). 40\n\n- **Ensuring benefits of AI are broadly shared, including with book authors or**\n\n**publishers:** The creation of a training resource might lower barriers to the\n\ndevelopment of AI tools, and in that way support broadly shared benefits by\n\nfacilitating greater competition and mitigating concentration of power. On the other\n\nhand, just as concentration of technology industries is already a significant challenge,\n\nAI might not look much different, and the benefits of this resource may still simply go\n\nto a few large firms in “winner takes all-or-most” markets. The workshops discussed\n\nhow, for instance, large commercial users might be expected to contribute to a fund\n\nthat supported contributors of training data, or more generally to fund writers, to\n\nensure everyone contributing to the development of AI benefits.\n\nFor examples of gated access to AI models, see [https://huggingface.co./docs/hub/en/models-gated](https://huggingface.co./docs/hub/en/models-gated) . 39\n\nAs an analogy, consider for instance Wikimedia Enterprise, which “build[s] services for high-volume 40\n\ncommercial reusers of Wikimedia content” and charges for that access. https://meta.wikimedia.org/\n\nwiki/Wikimedia_Enterprise .", - "page_start": 18, - "page_end": 18, - "source_file": "creative_common_ai.pdf" - }, - { - "text": "[opportunity for agentic AI\" (https://venturebeat.com/ai/why-jensen-huang-and-marc-benioff-s](https://venturebeat.com/ai/why-jensen-huang-and-marc-benioff-see-gigantic-opportunity-for-agentic-ai/)\n\n[ee-gigantic-opportunity-for-agentic-ai/). ](https://venturebeat.com/ai/why-jensen-huang-and-marc-benioff-see-gigantic-opportunity-for-agentic-ai/) *VentureBeat* [. Archived (https://web.archive.org/web/](https://web.archive.org/web/20241005165649/https://venturebeat.com/ai/why-jensen-huang-and-marc-benioff-see-gigantic-opportunity-for-agentic-ai/)\n\n[20241005165649/https://venturebeat.com/ai/why-jensen-huang-and-marc-benioff-see-gigan](https://web.archive.org/web/20241005165649/https://venturebeat.com/ai/why-jensen-huang-and-marc-benioff-see-gigantic-opportunity-for-agentic-ai/)\n\n[tic-opportunity-for-agentic-ai/) from the original on 5 October 2024. Retrieved 4 October](https://web.archive.org/web/20241005165649/https://venturebeat.com/ai/why-jensen-huang-and-marc-benioff-see-gigantic-opportunity-for-agentic-ai/)\n\n2024.\n\n[130. Davenport, T; Kalakota, R (June 2019). \"The potential for artificial intelligence in healthcare\"](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6616181)\n\n[(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6616181). ](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6616181) *Future Healthc J* . **6** (2): 94- 98.\n\n[doi:10.7861/futurehosp.6-2-94 (https://doi.org/10.7861%2Ffuturehosp.6-2-94).](https://doi.org/10.7861%2Ffuturehosp.6-2-94)\n\n[PMC 6616181 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6616181). PMID 31363513](https://pubmed.ncbi.nlm.nih.gov/31363513)\n\n[(https://pubmed.ncbi.nlm.nih.gov/31363513).](https://pubmed.ncbi.nlm.nih.gov/31363513)", - "page_start": 34, - "page_end": 34, - "source_file": "wikipedia3.pdf" - }, - { - "text": "and view content on demand. They can search content and control their\n\nPVR remotely from their smartphone. They can stream programming to\n\ntheir tablet anywhere in their home. A single Rogers Nextbox serves as\n\na master PVR for the entire home enabling simultaneous viewing and\n\nrecording of up to eight separate shows and storage of over 250 hours\n\nof high-definition programming. And customers can access television\n\nand movie content on-demand from anywhere by laptop, tablet or\n\nsmartphone using the Rogers Anyplace TV app.\n\nTelevision has never been this good, this easy, or this simple to control.\n\nAnd it’s even better when combined with innovative Rogers features,\n\nsuch as the ability to screen phone calls on their TV, listen to voicemail\n\non their tablet, or receive talking text messages on their home phone.\n\nWireless customers can also use Rogers One Number to switch calls\n\namong their computer, home phone and wireless device without\n\ninterruption; manage e-mails; text messages and voicemail; hold live\n\nvideo chats; and combine and sync contacts from across multiple devices.\n\nWhen they’re not at home, more and more customers also rely on\n\nRogers Smart Home Monitoring, a complete monitoring, automation\n\nand security solution that includes the most innovative technology and\n\nfeatures available. Smart Home Monitoring lets customers monitor,\n\ncontrol and receive alerts by smartphone or online, staying connected\n\nto their home from almost anywhere, and enjoying the peace of mind\n\nthat comes with having the most reliable monitoring solution available.\n\nSmart Home Monitoring also gives customers the ability to automate\n\nlights, appliances, thermostats and more, so they know their homes are\n\nnot only secure but more energy-efficient and convenient, also.\n\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 09", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_RCI_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "news4.pdf", - "query": "Is the topic of finance trending among AI topics for 2015 in Canada?", - "target_page": 1, - "target_passage": "Financial services", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "160. Alex McFarland: *[7 Best AI for Math Tools.](https://www.unite.ai/best-ai-for-math-tools/)* (https://www.unite.ai/best-ai-for-math-tools/)\n\n[Archived (https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-mat](https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-math-tools/)\n\n[h-tools/) 11 September 2024 at the Wayback Machine unite.ai. Retrieved 2024-08-07](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n161. Matthew Finio & Amanda Downie: IBM Think 2024 Primer, \"What is Artificial Intelligence (AI)\n\nin Finance?\" 8 Dec. 2023\n\n162. M. Nicolas, J. Firzli: Pensions Age/European Pensions magazine, \"Artificial Intelligence: Ask\n\n[the Industry\" May June 2024 https://videovoice.org/ai-in-finance-innovation-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-](https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[intended/ Archived (https://web.archive.org/web/20240911125502/https://videovoice.org/ai-i](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[n-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-](https://web.archive.org/web/20240911125502/https://videovoice.org/ai-in-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as-intended/)\n\n[act-wont-work-as-intended/) 11 September 2024 at the Wayback Machine.](https://en.wikipedia.org/wiki/Wayback_Machine)\n\n163. Congressional Research Service (2019). *[Artificial Intelligence and National Security](https://fas.org/sgp/crs/natsec/R45178.pdf)* (https://f\n\n[as.org/sgp/crs/natsec/R45178.pdf) (PDF). Washington, DC: Congressional Research](https://fas.org/sgp/crs/natsec/R45178.pdf)\n\n[Service.PD-notice](https://en.wikipedia.org/wiki/Template:PD-notice)\n\n164. Slyusar, Vadym (2019). Artificial intelligence as the basis of future control networks\n\n[(Preprint). doi:10.13140/RG.2.2.30247.50087 (https://doi.org/10.13140%2FRG.2.2.30247.5](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[0087).](https://doi.org/10.13140%2FRG.2.2.30247.50087)\n\n[165. Iraqi, Amjad (3 April 2024). \" 'Lavender': The AI machine directing Israel's bombing spree in](https://www.972mag.com/lavender-ai-israeli-army-gaza/)\n\n[Gaza\" (https://www.972mag.com/lavender-ai-israeli-army-gaza/). ](https://www.972mag.com/lavender-ai-israeli-army-gaza/) *+972 Magazine* . Retrieved\n\n6 April 2024.\n\n[166. Davies, Harry; McKernan, Bethan; Sabbagh, Dan (1 December 2023). \" 'The Gospel': how](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[Israel uses AI to select bombing targets in Gaza\" (https://www.theguardian.com/world/2023/](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets)\n\n[dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets). ](https://www.theguardian.com/world/2023/dec/01/the-gospel-how-israel-uses-ai-to-select-bombing-targets) *The Guardian* . Retrieved\n\n4 December 2023.\n\n[167. Marti, J Werner (10 August 2024). \"Drohnen haben den Krieg in der Ukraine revolutioniert,](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)\n\n[doch sie sind empfindlich auf Störsender - deshalb sollen sie jetzt autonom operieren\" (http](https://www.nzz.ch/international/die-ukraine-setzt-auf-drohnen-die-autonom-navigieren-und-toeten-koennen-ld.1838731)", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[s.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-2](https://www.reuters.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-21)\n\n[1). Reuters. 21 May 2024. Retrieved 23 May 2024.](https://www.reuters.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-21)\n\n[318. \"Frontier AI Safety Commitments, AI Seoul Summit 2024\" (https://web.archive.org/web/2024](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[0523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024). gov.uk. 21 May](https://web.archive.org/web/20240523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[2024. Archived from the original (https://www.gov.uk/government/publications/frontier-ai-safe](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[ty-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-202](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n[4) on 23 May 2024. Retrieved 23 May 2024.](https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024)\n\n319. Russell & Norvig 2021, p. 9.\n\n320. Copeland, J., ed. (2004). *The Essential Turing: the ideas that gave birth to the computer*\n\n*age* [. Oxford, England: Clarendon Press. ISBN 0-1982-5079-7.](https://en.wikipedia.org/wiki/Special:BookSources/0-1982-5079-7)\n\n[321. \"Google books ngram\" (https://books.google.com/ngrams/graph?content=electronic+brain&](https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[year_start=1930&year_end=2019&corpus=en-2019&smoothing=3). Archived (https://web.ar](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[chive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\n[+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3) from the original](https://web.archive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3)\n\non 5 October 2024. Retrieved 5 October 2024.\n\n322. AI's immediate precursors: McCorduck (2004, pp. 51- 107), Crevier (1993, pp. 27- 32),\n\nRussell & Norvig (2021, pp. 8- 17), Moravec (1988, p. 3)\n\n[323. Turing's original publication of the Turing test in \"Computing machinery and intelligence\":](https://en.wikipedia.org/wiki/Computing_machinery_and_intelligence)\n\nTuring (1950) Historical influence and philosophical implications: Haugeland (1985, pp. 6-\n\n9), Crevier (1993, p. 24), McCorduck (2004, pp. 70- 71), Russell & Norvig (2021, pp. 2, 984)\n\n324. Crevier (1993), pp. 47- 49.\n\n325. Russell & Norvig (2003), p. 17.\n\n326. Russell & Norvig (2003), p. 18.\n\n327. Newquist (1994), pp. 86- 86.\n\n328. Simon (1965, p. 96) quoted in Crevier (1993, p. 109)\n\n329. Minsky (1967, p. 2) quoted in Crevier (1993, p. 109)\n\n330. Russell & Norvig (2021), p. 21.\n\n331. Lighthill (1973).", - "page_start": 47, - "page_end": 47, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Arts and Entertainment](https://about.newsusa.com/taxonomy/term/78) / New Artificial Intelligence Summit Series Begins With Energy\n\n## New Artificial Intelligence Summit Series Begins With\n\n## Energy\n\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain\n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative\n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit\n\nSeries.\n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington,\n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and\n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant\n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote\n\npartnerships between AI and energy stakeholders.\n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy\n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in\n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced\n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research.\n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy,\n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and\n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American\n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts.\n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan.\n\nArticle Link\n\n[https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…](https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with-energy)\n\n[ARTS AND ENTERTAINMENT](https://about.newsusa.com/taxonomy/term/78)\n\n07/31/2024\n\n[Celebrate St. Patrick's Day with](https://about.newsusa.com/celebrate-st-patricks-day-with-no-booze-just-pure-irish-fun-and-entertainment)\n\nNo Booze, Just Pure Irish Fun and\n\nEntertainment\n\nMar 06, 2024\n\nSay Hello to Your Big Break at the\n\nStapleton Library Job Fair in\n\n[Vocation, Trade, or Civil Service](https://about.newsusa.com/say-hello-to-your-big-break-at-the-stapleton-library-job-fair-in-vocation-trade-or-civil-service)\n\nMar 06, 2024\n\nLocal Artists Collaborate for a\n\n[Unique Fusion of Groove and](https://about.newsusa.com/local-artists-collaborate-for-a-unique-fusion-of-groove-and-collage)\n\nCollage\n\nMar 06, 2024\n\n[Explore Downtown San Pedro](https://about.newsusa.com/explore-downtown-san-pedro-with-flair-ride-the-iconic-red-car-trolley-for-free)\n\nwith Flair: Ride the Iconic Red Car\n\nTrolley for Free\n\nMar 06, 2024\n\nRetrain Your Emotional Brain: A\n\n[Natural Alternative to Weight](https://about.newsusa.com/retrain-your-emotional-brain-a-natural-alternative-to-weight-loss-drugs)\n\nLoss Drugs\n\nFeb 22, 2024\n\nSerial Entrepreneur Teaches Us\n\n[How to Go the Distance in](https://about.newsusa.com/serial-entrepreneur-teaches-us-how-to-go-the-distance-in-business-and-in-life)\n\nBusiness and in Life\n\nFeb 21, 2024\n\n[FASHION](https://about.newsusa.com/taxonomy/term/1)\n\n[BUSINESS](https://about.newsusa.com/taxonomy/term/2)\n\n[INFOGRAPHIC](https://about.newsusa.com/taxonomy/term/16)\n\n[ENVIRONMENT](https://about.newsusa.com/taxonomy/term/17)\n\n[HEALTH](https://about.newsusa.com/taxonomy/term/18)", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "Complete a minimum\n\nof $75 million in\n\nacquisitions.\n\nAcquire over 50%\n\nof 2014 acquisitions\n\noutside Atlantic\n\nCanada, with a focus\n\nin Ontario.\n\nGrow same store\n\nNOI by up to 2%.\n\nContinue to invest\n\nin development\n\nwith two projects\n\nunderway, managing\n\nprojects on schedule\n\nand on budget.\n\ndevelopment program to a maximum of 5% of our balance sheet per year. We\n\nhave three other developments projects in various planning stages, but don’t\n\nexpect to begin construction on any additional new projects until late 2014 or\n\ninto 2015.\n\n####### **Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic\n\nCanada is the foundation of the Company; however, with Atlantic Canada\n\nrepresenting only 5% of the Canadian rental market, our growth opportunities\n\nincrease significantly by expanding our target markets outside of this region.\n\nWith its strong operating platform, Killam can support a larger and more\n\ngeographically diverse portfolio. We are actively growing a portfolio of\n\napartments in Ontario in three target markets: Ottawa, the Greater Toronto\n\nArea, and Southwestern Ontario. An increased investment outside Atlantic\n\nCanada will increase not only Killam’s growth potential, it will also expand the\n\nCompany’s diversification and exposure to higher growth markets.\n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition\n\nto 1,359 apartment units in the province, we also have 2,144 manufactured\n\nhome community sites, representing 29% of the MHC NOI last year. Based on\n\nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario,\n\ncompared to our longer-term goal of generating 50% of NOI outside Atlantic\n\nCanada. We expect to reach this goal by focusing acquisition activity in\n\nOntario, with the majority of future investment anticipated in the province over\n\nthe next few years. We will look for additional development opportunities in\n\nOntario and we are exploring opportunities in Western Canada, attracted by\n\nthe strong population growth trends in Alberta’s urban markets.\n\nI would like to thank all Killam employees for their contributions and\n\ncommitment over the last year and our board of directors for their governance.\n\nAlso, I would like to thank you, our shareholders, for your continued investment\n\nin Killam. I invite you to attend the Company’s annual meeting on May 7, 2014\n\nat 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in\n\nperson or via webcast.\n\nYours truly,\n\nPhilip Fraser\n\nOur Goals for 2014 Portfolio Facts", - "page_start": 10, - "page_end": 10, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "[The first global AI Safety Summit was held](https://en.wikipedia.org/wiki/AI_Safety_Summit)\n\nin 2023 with a declaration calling for\n\ninternational cooperation.\n\nPromotion of the wellbeing of the people and communities that these technologies affect requires\n\nconsideration of the social and ethical implications at all stages of AI system design, development and\n\nimplementation, and collaboration between job roles such as data scientists, product managers, data\n\nengineers, domain experts, and delivery managers. <sup>[300]</sup>\n\n[The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations](https://en.wikipedia.org/wiki/AI_Safety_Institute_(United_Kingdom))\n\navailable under a MIT open-source licence which is freely available on GitHub and can be improved with\n\nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge,\n\nability to reason, and autonomous capabilities. <sup>[301]</sup>\n\nThe regulation of artificial intelligence is the development\n\nof public sector policies and laws for promoting and\n\nregulating AI; it is therefore related to the broader regulation\n\nof algorithms. <sup>[302]</sup> The regulatory and policy landscape for\n\nAI is an emerging issue in jurisdictions globally. <sup>[303]</sup>\n\n[According to AI Index at Stanford, the annual number of](https://en.wikipedia.org/wiki/Stanford)\n\nAI-related laws passed in the 127 survey countries jumped\n\nfrom one passed in 2016 to 37 passed in 2022\n\nalone. <sup>[304][305]</sup> Between 2016 and 2020, more than 30\n\ncountries adopted dedicated strategies for AI. <sup>[306]</sup> Most EU\n\nmember states had released national AI strategies, as had\n\nCanada, China, India, Japan, Mauritius, the Russian\n\nFederation, Saudi Arabia, United Arab Emirates, U.S., and\n\nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia\n\nand Tunisia. <sup>[306]</sup> [ The Global Partnership on Artificial Intelligence was launched in June 2020, stating a](https://en.wikipedia.org/wiki/Global_Partnership_on_Artificial_Intelligence)\n\nneed for AI to be developed in accordance with human rights and democratic values, to ensure public\n\nconfidence and trust in the technology. <sup>[306]</sup> [ Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher](https://en.wikipedia.org/wiki/Daniel_Huttenlocher)\n\npublished a joint statement in November 2021 calling for a government commission to regulate AI. <sup>[307]</sup>\n\nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they\n\nbelieve may happen in less than 10 years. <sup>[308]</sup> In 2023, the United Nations also launched an advisory\n\nbody to provide recommendations on AI governance; the body comprises technology company\n\nexecutives, governments officials and academics. <sup>[309]</sup> [ In 2024, the Council of Europe created the first](https://en.wikipedia.org/wiki/Council_of_Europe)\n\n[international legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence](https://en.wikipedia.org/wiki/Framework_Convention_on_Artificial_Intelligence_and_Human_Rights,_Democracy_and_the_Rule_of_Law)\n\n[and Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United](https://en.wikipedia.org/wiki/Framework_Convention_on_Artificial_Intelligence_and_Human_Rights,_Democracy_and_the_Rule_of_Law)\n\nStates, the United Kingdom, and other signatories. <sup>[310]</sup>\n\n[In a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only](https://en.wikipedia.org/wiki/Ipsos)\n\n35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\". <sup>[304]</sup>\n\n[A 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to](https://en.wikipedia.org/wiki/Reuters)", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" - }, - { - "text": "265. Cellan-Jones (2014).\n\n266. Russell & Norvig 2021, p. 1001.\n\n267. Bostrom (2014).\n\n268. Russell (2019).\n\n269. Bostrom (2014); Müller & Bostrom (2014); Bostrom (2015).\n\n270. Harari (2023).\n\n271. Müller & Bostrom (2014).\n\n272. Leaders' concerns about the existential risks of AI around 2015: Rawlinson (2015), Holley\n\n(2015), Gibbs (2014), Sainato (2015)\n\n[273. \" \"Godfather of artificial intelligence\" talks impact and potential of new AI\" (https://www.cbsne](https://www.cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai)\n\n[ws.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai). ](https://www.cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai) *CBS*\n\n*News* [. 25 March 2023. Archived (https://web.archive.org/web/20230328225221/https://www.](https://web.archive.org/web/20230328225221/https://www.cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai)\n\n[cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai)](https://web.archive.org/web/20230328225221/https://www.cbsnews.com/video/godfather-of-artificial-intelligence-talks-impact-and-potential-of-new-ai)\n\nfrom the original on 28 March 2023. Retrieved 28 March 2023.\n\n[274. Pittis, Don (4 May 2023). \"Canadian artificial intelligence leader Geoffrey Hinton piles on](https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302)\n\n[fears of computer takeover\" (https://www.cbc.ca/news/business/ai-doom-column-don-pittis-](https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302)\n\n[1.6829302). ](https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302) *CBC* [. Archived (https://web.archive.org/web/20240707032135/https://www.cbc.](https://web.archive.org/web/20240707032135/https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302)\n\n[ca/news/business/ai-doom-column-don-pittis-1.6829302) from the original on 7 July 2024.](https://web.archive.org/web/20240707032135/https://www.cbc.ca/news/business/ai-doom-column-don-pittis-1.6829302)\n\nRetrieved 5 October 2024.\n\n[275. \" '50- 50 chance' that AI outsmarts humanity, Geoffrey Hinton says\" (https://www.bnnbloomb](https://www.bnnbloomberg.ca/50-50-chance-that-ai-outsmarts-humanity-geoffrey-hinton-says-1.2085394)\n\n[erg.ca/50-50-chance-that-ai-outsmarts-humanity-geoffrey-hinton-says-1.2085394).](https://www.bnnbloomberg.ca/50-50-chance-that-ai-outsmarts-humanity-geoffrey-hinton-says-1.2085394)\n\n*Bloomberg BNN* . 14 June 2024. Retrieved 6 July 2024.\n\n276. Valance (2023).\n\n[277. Taylor, Josh (7 May 2023). \"Rise of artificial intelligence is inevitable but should not be](https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says)\n\n[feared, 'father of AI' says\" (https://www.theguardian.com/technology/2023/may/07/rise-of-arti](https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says)\n\n[ficial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says). ](https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says) *The Guardian* .\n\n[Archived (https://web.archive.org/web/20231023061228/https://www.theguardian.com/techn](https://web.archive.org/web/20231023061228/https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says)\n\n[ology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-](https://web.archive.org/web/20231023061228/https://www.theguardian.com/technology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says)", - "page_start": 44, - "page_end": 44, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[Stanford University (2023). \"Artificial Intelligence Index Report 2023/Chapter 6: Policy and](https://aiindex.stanford.edu/wp-content/uploads/2023/04/HAI_AI-Index-Report-2023_CHAPTER_6-1.pdf)\n\n[Governance\" (https://aiindex.stanford.edu/wp-content/uploads/2023/04/HAI_AI-Index-Report](https://aiindex.stanford.edu/wp-content/uploads/2023/04/HAI_AI-Index-Report-2023_CHAPTER_6-1.pdf)\n\n[-2023_CHAPTER_6-1.pdf) (PDF). AI Index. Archived (https://web.archive.org/web/2023061](https://web.archive.org/web/20230619013609/https://aiindex.stanford.edu/wp-content/uploads/2023/04/HAI_AI-Index-Report-2023_CHAPTER_6-1.pdf)\n\n[9013609/https://aiindex.stanford.edu/wp-content/uploads/2023/04/HAI_AI-Index-Report-202](https://web.archive.org/web/20230619013609/https://aiindex.stanford.edu/wp-content/uploads/2023/04/HAI_AI-Index-Report-2023_CHAPTER_6-1.pdf)\n\n[3_CHAPTER_6-1.pdf) (PDF) from the original on 19 June 2023. Retrieved 19 June 2023.](https://web.archive.org/web/20230619013609/https://aiindex.stanford.edu/wp-content/uploads/2023/04/HAI_AI-Index-Report-2023_CHAPTER_6-1.pdf)\n\nTao, Jianhua; Tan, Tieniu (2005). *Affective Computing and Intelligent Interaction* . Affective\n\nComputing: A Review. Lecture Notes in Computer Science. Vol. 3784. Springer. pp. 981-\n\n[995. doi:10.1007/11573548 (https://doi.org/10.1007%2F11573548). ISBN 978-3-5402-9621-](https://en.wikipedia.org/wiki/Special:BookSources/978-3-5402-9621-8)\n\n[8.](https://en.wikipedia.org/wiki/Special:BookSources/978-3-5402-9621-8)\n\n[Taylor, Josh; Hern, Alex (2 May 2023). \" 'Godfather of AI' Geoffrey Hinton quits Google and](https://www.theguardian.com/technology/2023/may/02/geoffrey-hinton-godfather-of-ai-quits-google-warns-dangers-of-machine-learning)\n\n[warns over dangers of misinformation\" (https://www.theguardian.com/technology/2023/may/](https://www.theguardian.com/technology/2023/may/02/geoffrey-hinton-godfather-of-ai-quits-google-warns-dangers-of-machine-learning)\n\n[02/geoffrey-hinton-godfather-of-ai-quits-google-warns-dangers-of-machine-learning). ](https://www.theguardian.com/technology/2023/may/02/geoffrey-hinton-godfather-of-ai-quits-google-warns-dangers-of-machine-learning) *[The](https://en.wikipedia.org/wiki/The_Guardian)*\n\n*[Guardian](https://en.wikipedia.org/wiki/The_Guardian)* [. Archived (https://web.archive.org/web/20241005171343/https://www.theguardian.](https://web.archive.org/web/20241005171343/https://www.theguardian.com/technology/2023/may/02/geoffrey-hinton-godfather-of-ai-quits-google-warns-dangers-of-machine-learning)\n\n[com/technology/2023/may/02/geoffrey-hinton-godfather-of-ai-quits-google-warns-dangers-of](https://web.archive.org/web/20241005171343/https://www.theguardian.com/technology/2023/may/02/geoffrey-hinton-godfather-of-ai-quits-google-warns-dangers-of-machine-learning)\n\n[-machine-learning) from the original on 5 October 2024. Retrieved 5 October 2024.](https://web.archive.org/web/20241005171343/https://www.theguardian.com/technology/2023/may/02/geoffrey-hinton-godfather-of-ai-quits-google-warns-dangers-of-machine-learning)\n\n[Thompson, Derek (23 January 2014). \"What Jobs Will the Robots Take?\" (https://www.theatlanti](https://www.theatlantic.com/business/archive/2014/01/what-jobs-will-the-robots-take/283239)\n\n[c.com/business/archive/2014/01/what-jobs-will-the-robots-take/283239). ](https://www.theatlantic.com/business/archive/2014/01/what-jobs-will-the-robots-take/283239) *The Atlantic* .\n\n[Archived (https://web.archive.org/web/20180424202435/https://www.theatlantic.com/busine](https://web.archive.org/web/20180424202435/https://www.theatlantic.com/business/archive/2014/01/what-jobs-will-the-robots-take/283239)\n\n[ss/archive/2014/01/what-jobs-will-the-robots-take/283239) from the original on 24 April](https://web.archive.org/web/20180424202435/https://www.theatlantic.com/business/archive/2014/01/what-jobs-will-the-robots-take/283239)\n\n2018. Retrieved 24 April 2018.", - "page_start": 63, - "page_end": 63, - "source_file": "wikipedia3.pdf" - }, - { - "text": "[ml) from the original on 5 October 2024. Retrieved 5 October 2024.](https://web.archive.org/web/20241005170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/html)\n\n[301. \"AI Safety Institute releases new AI safety evaluations platform\" (https://www.gov.uk/govern](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[ment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform). UK Government.](https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[10 May 2024. Archived (https://web.archive.org/web/20241005170207/https://www.gov.uk/g](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\n[overnment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform) from the](https://web.archive.org/web/20241005170207/https://www.gov.uk/government/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform)\n\noriginal on 5 October 2024. Retrieved 14 May 2024.\n\n302. Regulation of AI to mitigate risks: Berryhill et al. (2019), Barfield & Pagallo (2018), Iphofen &\n\nKritikos (2019), Wirtz, Weyerer & Geyer (2018), Buiten (2019)\n\n303. Law Library of Congress (U.S.). Global Legal Research Directorate (2019).\n\n304. Vincent (2023).\n\n305. Stanford University (2023).\n\n306. UNESCO (2021).\n\n307. Kissinger (2021).\n\n308. Altman, Brockman & Sutskever (2023).\n\n[309. VOA News (25 October 2023). \"UN Announces Advisory Body on Artificial Intelligence\" (http](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[s://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.htm](https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[l). Archived (https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-a](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\n[nnounces-advisory-body-on-artificial-intelligence-/7328732.html) from the original on 18](https://web.archive.org/web/20240918071530/https://www.voanews.com/a/un-announces-advisory-body-on-artificial-intelligence-/7328732.html)\n\nSeptember 2024. Retrieved 5 October 2024.\n\n[310. \"Council of Europe opens first ever global treaty on AI for signature\" (https://www.coe.int/en/](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature). ](https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature) *Council of*\n\n*Europe* [. 5 September 2024. Archived (https://web.archive.org/web/20240917001330/https://](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signat](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n[ure) from the original on 17 September 2024. Retrieved 17 September 2024.](https://web.archive.org/web/20240917001330/https://www.coe.int/en/web/portal/-/council-of-europe-opens-first-ever-global-treaty-on-ai-for-signature)\n\n311. Edwards (2023).\n\n312. Kasperowicz (2023).\n\n313. Fox News (2023).", - "page_start": 46, - "page_end": 46, - "source_file": "wikipedia3.pdf" - }, - { - "text": "**9**\n\nFinance Report\n\nFinance Report\n\nFinance costs\n\nFinance costs increased to $18.8 million (2012:\n\n$9.4 million). Finance costs comprise interest on\n\nborrowings the Group has in place, unwinding of\n\ndiscount on provisions as required by Accounting\n\nStandards and amortisation of borrowings set-up\n\ncosts. The main contributor to the increase in\n\nfinance costs was accelerated amortisation of\n\nborrowing costs required due to debt restruc-\n\ntures undertaken during the year and planned for\n\nthe next financial year. Borrowing costs relating\n\nto the previous finance facilities were expensed\n\nin full prior to new facilities being put in place.\n\nIncome Tax\n\nKingsgate’s Thai subsidiary company, Akara\n\nResources Public Company Limited (“Akara”),\n\nhas received approval from The Royal Thai Board\n\nof Investment (BOI) of the Office of the Prime\n\nMinister for promotion of Chatree. Subject to\n\nmeeting the BOI conditions and based on an\n\nannual production limit of 178,416 ounces of\n\ngold and 583,733 ounces of silver, Akara’s\n\nChatree Gold Mine is entitled to:\n\na) an eight year full corporate tax holiday\n\ncommencing at first gold pour on metal\n\nsales. The full tax holiday expired in\n\nNovember 2009;\n\nb) a further five years half tax holiday following\n\na) above; and\n\nc) other benefits.\n\nThe start of the promotion period was\n\n27 November 2001.\n\nAkara also received on 18 June 2010 a BOI\n\npromotion for the Chatree Plant #2. Based on\n\nannual production limit from the new processing\n\nplant of 185,200 ounces of gold and 1,080,400\n\nounces of silver, Akara is entitled to:\n\na) an eight year tax holiday on income derived\n\nfrom the new processing plant with tax\n\nsavings limited to the capital cost of the new\n\ntreatment plant;\n\nb) 25% investment allowance on the capital\n\ncost of certain assets of the new processing\n\nplant; and\n\nc) other benefits.\n\nThe taxable loss from the Australian operations\n\nhas not been recognised as a deferred tax asset\n\nthough has been added to the Group’s brought\n\nforward tax losses, leaving a balance of $212\n\nmillion of taxable losses (unrecognised tax asset\n\nof $63 million) to be carried forward to future\n\nyears.\n\nCash Flow\n\nNet operating cash inflow was $85.0 million.\n\nInvesting cash outflow for property, plant,\n\nequipment and exploration, evaluation and\n\ndevelopment was $133.7 million. Net cash\n\noutflows from financing activities was\n\n$1.7 million, including a net drawdown (net\n\nof transaction costs) of $36.7 million of the\n\nmulti-currency and syndicated loan facilities\n\nfollowing a loan restructure by the Group’s\n\nThai subsidiary, Akara, net repayment (net of\n\ntransaction costs) of $20.0 million corporate\n\nloan facility, and $19.4 million dividends paid\n\nduring the year. Income tax paid increased to\n\n$15.6 million due primarily to the timing of\n\ntax payments in Thailand with a significant\n\namount of the prior year’s tax charge being paid\n\nthis year in addition to payment of the current\n\nyear’s tax charge.\n\n-20 <sup>-14</sup>\n\n19 37 18\n\n-48\n\n46\n\n-32\n\nOperating Cash Flow\n\n2012/13 2006/07 2007/08 2008/09 2009/10 2010/11\n\n34\n\n-108\n\n165\n\n-221\n\n85\n\n-142\n\n2011/12\n\nInvesting Cash Flow\n\n-250\n\n-300\n\n-200\n\n-150\n\n-100\n\nA$ Million -50\n\n0\n\n50\n\n100\n\n150\n\n200\n\n250\n\n120\n\n-13 -20\n\n36 19\n\n73 46 25 33 18\n\nProfit/(loss)\n\n2006/07 2007/08 2008/09 2009/10 2010/11\n\n21 <sup>34</sup> <sup>28</sup>\n\n75\n\n165\n\n19\n\n-324\n\n85\n\n19\n\n2011/12 2012/13\n\nOperating Cash Flow Cash Dividend Paid\n\n-40\n\n-80\n\n-120\n\n-160\n\n-200\n\n-240\n\n-280\n\n-320\n\n-360\n\n0\n\n40\n\nA$ Million\n\n80\n\n160\n\n200\n\n240\n\nOperating and Investing Cash Flow\n\nOperating Profit and Cash Flow", - "page_start": 10, - "page_end": 10, - "source_file": "ASX_KCN_2013.pdf" - }, - { - "text": "significant premium for quality assets.\n\n**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada,\n\nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is\n\nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase\n\nsignificantly when considering assets outside Atlantic Canada.\n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building\n\na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in\n\nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on\n\nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing\n\nthe amount of NOI generated outside of Atlantic Canada to 50%.\n\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive\n\ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by\n\naccretively growing its apartment portfolio in Ontario.", - "page_start": 28, - "page_end": 28, - "source_file": "TSX_KMP_2013.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_CHK_2010.pdf", - "query": "Is there any chance that my cousin has been granted financial aid from Chesapeak Energy? He's studying at a college in Oklahoma.", - "target_page": 26, - "target_passage": "hat’s why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "We also hire locally whenever possible to help stimulate the local\n\neconomy, and we provide training when the local work force isn’t yet\n\nqualified for the jobs we have open. For example, when Chesapeake\n\nbegan operating in the Marcellus Shale of West Virginia and Pennsyl­\n\nvania, finding experienced rig workers was a challenge. To meet that\n\nneed, Chesapeake’s wholly owned subsidiary, Nomac Drilling, built\n\nthe 40,000-square-foot Eastern Training Center and Housing Facility in\n\nBradford County, near Sayre, Pennsylvania. The campus opened in 2010\n\nand serves as a housing facility and training ground for 266 workers at\n\na time. Nomac and Chesapeake host regular job fairs in the region and\n\nthe lines of interested candidates often extend out the door.\n\n**Educational Impact**\n\nWe are also proud to help prepare tomorrow’s leaders today. In 2010\n\nChesapeake supported universities, schools, academic chairs, scholarships\n\nand other educational programs with contributions totaling $5.4 million.\n\nInvesting in programs that promote technology and innovation is a\n\nkey to our country’s success. That’s why we gave $1.0 million to establish\n\nthe Chesapeake Energy dormitory for students at the Oklahoma School for\n\nScience and Mathematics (OSSM), a public, tuition-free, residential high\n\nschool located in Oklahoma City for juniors and seniors with exceptional\n\nabilities. The extremely competitive school is helping train the next gen-\n\neration of scientists and mathematicians.\n\nWe also established the Chesapeake Energy Presidential Scholars Pro­\n\ngram at the Oklahoma City University Meinders School of Business, making\n\na $5.0 million commitment to be distributed over the next five years. The\n\nChesapeake Scholars Program will provide up to $25,000 per year in tuition", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "to selected students pursuing careers in finance, economics, accounting,\n\nmarketing, business administration, computer science and information\n\ntechnology. In addition, scholars will take part in a Chesapeake Presiden­\n\ntial Leadership Course facilitated by faculty members in coordination with\n\ndesignated Chesapeake leadership coaches, including a Chesapeake senior\n\nvice president and OCU alumni.\n\nIn 2007 Chesapeake launched a scholarship program in Texas with an\n\ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal­\n\nlas to match its gift within a year. The cities responded and matched the gift,\n\nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the\n\ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the\n\ncost of higher education for 48 minority students. The fund provides each\n\nstudent $20,000 a year for up to four years at the school of their choice. To\n\ndate more than $1.0 million has been distributed to deserving local students.\n\nTo help ensure the training of qualified geologists, engineers, land­\n\nmen and energy lawyers in the next generation, we award scholarships\n\nto students pursuing energy-related degrees. We also help mentor them\n\nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship\n\nrecipients are paired with Chesapeake employee mentors who help devel­\n\nop students’ knowledge and provide career advice. There are currently 25\n\nmentors and 40 scholarship recipients participating in the Peak Program.\n\nOur recruiting team also initiated a strategic military recruitment\n\neffort during the past two years to hire former military personnel to\n\nwork in a variety of leadership and crew positions. This effort earned\n\nChesapeake an honor from G.I. JOBS magazine when we were named a\n\n2011 Top 100 Military-Friendly Employer. Chesapeake currently employs\n\n37 men and women who formerly served as junior military officers and\n\nmore than 100 former servicemen and servicewomen who joined the\n\ncompany through a program called Troops 2 Roughnecks.\n\nIn addition to our specific scholarship programs, one-time educational\n\ndonations and recruitment efforts, in 2010 we gave more than $1.8 million\n\nto fund higher education for nearly 400 other students in 12 states through\n\nour Chesapeake Scholars program. Chesapeake’s scholarships help recruit\n\nthe best and brightest students and provide educational opportunities in\n\ncommunities where we operate. In Oklahoma City, more than 400 em­\n\nployees volunteer for up to an hour a week on company time at four local\n\npublic schools. Chesapeake’s program has grown to become the largest\n\ncorporate mentoring program in Oklahoma.\n\n**Community Impact**\n\nChesapeake employees have been enriching their hometowns as volun­\n\nteers for many years. We formalized those efforts in 2009 by establishing\n\nan official employee volunteer program, the H.E.L.P. (Helping Energize\n\nLocal Progress) Initiative, wherein employees are invited to volunteer\n\neach month for a variety of organizations from food pantries to animal\n\nshelters. Through that program, employees donated more than 26,000\n\nhours to their communities in 2009.\n\nIn the summer of 2010, Chesapeake took the H.E.L.P. Initiative to a\n\nhigher level through the launch of Operation Blue. From Memorial Day\n\nthrough Labor Day, each employee was given four hours of company time\n\nto complete the volunteer project of their choice. Our employees eagerly\n\naccepted the challenge, and in three months more than 4,900 employ­\n\nees donated 30,900 hours of service to 519 organizations in more than\n\n96 communities across the country. Operation Blue is now an annual\n\nvolunteer program in which employees roll up their sleeves in the com­\n\nmunities they call home.\n\nChesapeake’s contributions take many forms: financial and equipment\n\ndonations, volunteerism and scholarships. Last year, we made numerous\n\nin-kind donations of laptops, reconditioned Chesapeake fleet vehicles and", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "financing costs related to the Senior Credit Facility, which offset the principal balance. As at 31 December 2014 there\n\nwas $95.0 million outstanding under the Company’s Senior Credit Facility. As at 31 December 2014, the Company\n\nwas in compliance with all restrictive financial and other covenants under the Senior Credit Facility.\n\nThe Company capitalised $3.4 million and $1.3 million of interest expense during the years ended 31 December\n\n2014 and 2013, respectively.\n\n- 87 -", - "page_start": 88, - "page_end": 88, - "source_file": "ASX_SEA_2014.pdf" - }, - { - "text": "donations, volunteerism and scholarships. Last year, we made numerous\n\nin-kind donations of laptops, reconditioned Chesapeake fleet vehicles and\n\nsubsidized office space. These contributions provide essential operating\n\ntools as nonprofit organizations across the nation attempt to serve more\n\npeople — often with lower budgets — in tough economic times.\n\nFor example, in Louisiana we donated 12 vehicles in 2010, including\n\none to the Panola College Oil and Natural Gas Technology Program, which\n\nteaches students about the natural gas industry and provides them with\n\nhands-on technical training. Across many of the company’s operating\n\nareas, we’ve donated computers to deserving students, schools and\n\norganizations through Chesapeake’s Discovering Tomorrow’s Leaders\n\nprogram. In 2010 the company equipped 14 students with laptops and\n\ndonated 70 computers to schools or supporting nonprofit organizations.\n\nChesapeake partners with other companies and organizations to meet\n\nbasic, practical needs in hundreds of communities. An example is our\n\nsponsorship of the annual Day of Caring at the Ganus Center of Harding\n\nUniversity in White County, Arkansas. During the event, approximately\n\n1,200 uninsured or underinsured residents received a day of free medical,\n\ndental and eye screenings.\n\nTo help cultivate an appreciation for the great outdoors, in 2010\n\nChesapeake provided $25,000 to REAL School Gardens, a Fort Worth-\n\nbased organization that establishes gardens at approximately 70 lower\n\nincome elementary schools in North Texas. At I.M. Terrell Elementary\n\nSchool, students, parents, teachers and volunteers from Chesapeake and\n\nother groups worked together to prepare vegetable gardens and flower\n\nbeds. In addition to teamwork skills and gardening, students learned\n\nabout nutrition and took home food from the garden’s bounty.\n\nWe supported servicemen and servicewomen by partnering with the\n\nShreveport Chapter of Operation Support Our Troops, Inc. Our contribution\n\nhelped offset the postage to send more than 100 care packages to troops\n\noverseas. The shipment was the largest in the organization’s history and\n\nincluded Christmas cards, games and nonperishable food items.\n\nBy investing in the communities where we operate and the people\n\nwhose lives we touch, we ensure a stronger today and a more hope-\n\nful tomorrow.\n\n2010 ANNUAL REPORT | **25**\n\n*Putting food on the table — Employees volunteer at the Regional Food Bank*\n\n*of Oklahoma as part of Operation Blue.*", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**Management’s Discussion and Analysis** *Dollar amounts are in thousands of Canadian dollars (except as noted)*\n\n* **Apartment Property Expenses** *\n\nSame store apartment property expenses increased 5.5% for the year ended December 31, 2013, due primarily to increased utility and fuel\n\nexpenses as a result of high natural gas prices in Atlantic Canada, and higher electricity costs.\n\n**Utility and Fuel Expense ‑ Same Store**\n\nFor the years ended December 31,\n\n**2013** 2012 % Change\n\nNatural gas **$4,565** $2,729 67.3%\n\nOil **1,523** 2,095 (27.3)%\n\nElectricity **5,197** 4,671 11.3%\n\nWater **3,582** 3,474 3.1%\n\nOther **30** 33 (9.1)%\n\nTotal utility and fuel expenses **$14,897** $13,002 14.6%\n\nKillam’s apartment properties are heated with a combination of natural gas (55%), electricity (36%), oil (8%) and other sources (1%).\n\nElectricity costs at the unit level are usually paid directly by tenants, reducing Killam’s exposure to the majority of the 4,500 units heated with\n\nelectricity. Fuel costs associated with natural gas or oil fired heating plants are paid by Killam. As such, the Company is exposed to fluctuations\n\nin natural gas and oil costs, which represent 40.9% of total same store utility and fuel costs in 2013. Killam invests in green initiatives at its\n\nproperties to maximize efficiencies, including converting many of its Halifax properties to natural gas from oil over the last three years as natural\n\ngas infrastructure has been expanded in the city. The decision to convert was supported by the substantial price difference between the cost of\n\nnatural gas and oil in recent years.\n\nAs noted in the table above, Killam’s utility and fuel expenses increased 14.6% in 2013 compared to 2012. The increase was primarily attributable\n\nto higher natural gas, electricity costs and water costs.\n\nKillam’s natural gas expenses increased by 67.3% in 2013 due to higher gas prices in Atlantic Canada and an increase in properties burning\n\nnatural gas following conversions of certain Halifax heating plants from oil to gas in 2012 and 2013. The reduction in oil expense in the quarter\n\nand year‑to‑date reflects this reduction in oil exposure.\n\nAs the following chart highlights, the per gigajoule (Gj) commodity cost for natural gas in New Brunswick and Nova Scotia was much higher\n\nthan NYMEX in 2013 and less correlated to NYMEX than in previous years. (NYMEX is the New York Mercantile Exchange, a commodity futures\n\nexchange. Henry Hub, a gas distribution hub in Louisiana is the pricing point for natural gas futures contracts traded on NYMEX). The cost of\n\nnatural gas in Atlantic Canada and New England experienced a spike from December 2012 until late spring 2013 and a second spike in December\n\n2013, compared to other areas of Canada. Those spikes were both due to increased demand from utilities in Northeast New England and a\n\nshortage of gas pipeline capacity in Northeastern New England and Atlantic Canada. A temporary decline in gas supply off the coast of Nova\n\nScotia further contributed to the high pricing in the first part of the year.\n\n####### **Historic Natural Gas Pricing ($ per Gj) Henry Hub Vs. Heritage Gas**\n\n$4.40\n\n$9.97\n\n$15.49\n\n$0\n\n$2\n\n$4\n\n$6\n\n$8\n\n$10\n\n$12\n\n$14\n\n$16\n\n$18\n\nDec 2009 Feb 2010 apr 2010 Jun 2010 aug 2010 oct 2010 Dec 2010 Feb 2011 apr 2011 Jun 2011 aug 2011 oct 2011 Dec 2011 Feb 2012 apr 2012 Jun 2012 aug 2012 oct 2012 Dec 2012 Feb 2013 apr 2013 Jun 2013 aug 2013 oct 2013 Dec 2013\n\nHenry Hub new Brunswick Gas", - "page_start": 37, - "page_end": 37, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "economic growth” loan program. The bank economic growth” loan program. The bank\n\nresponds proactively to funding demand responds proactively to funding demand\n\nfrom from local companies wishing to expand local companies wishing to expand\n\ninto into areas such as medical and nursing care, areas such as medical and nursing care,\n\nenvironment and energy environment and energy technologies, and technologies, and\n\nAsia-related businesses, on a priority basis. Asia-related businesses, on a priority basis.\n\nAs of June 30, 2011, loans totaling ¥8.8 billion As of June 30, 2011, loans totaling ¥8.8 billion\n\nhad been made from the Kansai Genki Fund had been made from the Kansai Genki Fund\n\nfor 38 projects, of which 76.3% fell into the for 38 projects, of which 76.3% fell into the\n\nabove three priority categories. The Kansai above three priority categories. The Kansai\n\nGenki Fund is used to help customers develop Genki Fund is used to help customers develop\n\na wide range of businesses. The bank will a wide range of businesses. The bank will\n\ncontinue to play its role as a regional financial continue to play its role as a regional financial\n\ninstitution dedicated to supporting customers institution dedicated to supporting customers\n\nthat show originality and energy in helping that show originality and energy in helping\n\ndevelop the Kansai economy. develop the Kansai economy.\n\n**Financial education**\n\n**through teaching of**\n\n**investment skills**\n\nSMBC Friend Securities runs an online SMBC Friend Securities runs an online\n\neducation program, “You education program, “You ・ You Toshi” You Toshi”\n\n(Self-composed Investment), for (Self-composed Investment), for inexperi inexperi-\n\nenced investors. enced investors.\n\nThe service is free and includes a training The service is free and includes a training\n\nprogram that can be used as a tool for program that can be used as a tool for\n\nlifelong study of investment skills. lifelong study of investment skills.\n\nEnvironmental and\n\nenergy businesses:\n\n34.2%\n\nOthers:\n\n23.7%\n\nMedical, nursing and healthcare businesses:\n\n31.6%\n\nInvestment and business expansion in Asia, etc.: 10.5%\n\nKansai Genki Fund Financing by sector\n\n(June 30, 2011)\n\nWe provide financing support We provide financing support\n\nto local care businesses to local care businesses\n\n“You “You ・ You Toshi” website You Toshi” website\n\n(SMBC Friend Securities) (SMBC Friend Securities)\n\n#### **Together with Our Customers**\n\nFiscal 2011 is the 20th anniversary of the Fiscal 2011 is the 20th anniversary of the\n\n“Chikyuni Yasashii Card,” a social contribution “Chikyuni Yasashii Card,” a social contribution\n\nand donation-type credit card launched by and donation-type credit card launched by\n\nCedyna in 1991. Donations made through Cedyna in 1991. Donations made through\n\nthe card totaled over ¥500 million by 2006, the card totaled over ¥500 million by 2006,\n\nand are expected to surpass ¥600 million and are expected to surpass ¥600 million\n\nin the coming fiscal year—a tribute to the in the coming fiscal year—a tribute to the\n\ngenerosity of cardholders. generosity of cardholders.\n\n“Chikyuni Yasashii Cards” fall into 14 “Chikyuni Yasashii Cards” fall into 14\n\ncategories, based on a global environmental categories, based on a global environmental\n\nprotection theme. These range from major protection theme. These range from major\n\nissues affecting the entire planet, such as issues affecting the entire planet, such as\n\nglobal warming and ozone layer protection, global warming and ozone layer protection,\n\nto specific campaigns for designated to specific campaigns for designated\n\nenvironments and ecosystems (turtle and environments and ecosystems (turtle and\n\ndragonfly sanctuary protection programs). dragonfly sanctuary protection programs).\n\nCardholders choose categories of interest Cardholders choose categories of interest\n\nto them when to them when\n\nthey subscribe. they subscribe.\n\nMerely by using Merely by using", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Lottery License # AGD231844\n\nmeet ezekiel and his big sister.\n\nHe is currently receiving medical\n\ncare at the iWK.\n\nin support of children like ezekiel,\n\nwe are having a **Caring for Kids Lott ery** to raise funds for the iWK.\n\nEach $20 ti cket off ers you\n\na chance to **win free rent for a year!** Purchase ti ckets before November\n\n30. the draw date is monday,\n\nDecember 2, 2013.\n\nall current residents of\n\nKillam Properti es in Nova Scoti a\n\nare eligible to parti cipate.\n\n**Visit killamforkids.eventbrite.com or ask your Resident Manager.**\n\nAll proceeds will benefi t the\n\nIWK Health Centre Foundati on\n\nand pati ents like Ezekiel.\n\nphoto: wildfl owerphoto.ca\n\nkillamproperti es.com | tsx: kmp\n\n**Support the IWK and Win Free Rent for a Year!**\n\nAt Killam we are investing in our communities, as\n\nwell as our real estate. We believe that giving back\n\nto the community is an important part of being a\n\nresponsible corporate citizen.\n\n**Supporting Killam Families with**\n\n**Scholarship Program**\n\nKillam’s Scholarship Program awards three $3,000\n\nscholarships to children or grandchildren of Killam\n\nemployees on an annual basis. After a competitive\n\napplication process in 2013, Bradley Price, Hayley\n\nGillis and Georgia Telman were selected for\n\ndemonstrating an outstanding combination of\n\nacademic excellence and community involvement.\n\n**Home Away from Home**\n\nOn an annual basis, Killam donates six fully furnished\n\napartments to hospitals in Halifax, Saint John,\n\nMoncton, Fredericton and Charlottetown. These\n\nunits are used by families of patients who need to\n\ntravel away from home for health care.\n\n**Red Cross**\n\nKillam has partnered with the Red Cross in many\n\nof its core markets. The Red Cross is on hand to\n\nhelp when emergencies and disasters impact\n\ncommunities. Over the last six years, Killam has\n\nprovided the Red Cross with financial assistance to\n\nfund their operations. In return, the Red Cross has\n\nprovided emergency training to Killam staff, helping\n\nus react effectively to emergencies when required.\n\n**Supporting Higher Education in**\n\n**Atlantic Canada**\n\nOn an annual basis, Killam’s board of directors\n\njoin together to support a common charity or\n\norganization. During 2013 the board members\n\ntogether donated $100,000 to establish an\n\nendowment at Mount Allison University in\n\nSackville, New Brunswick, providing an annual\n\nentrance scholarship to the university. Previous\n\n$100,000 board donations supported the Boys\n\nand Girls Clubs of Prince Edward Island, the YMCA\n\nof Greater Halifax/Dartmouth and Saint Mary’s\n\nUniversity in Halifax.\n\n**Caring for Kids**\n\nDuring 2013 Killam organized the Caring for Kids Lottery, a\n\nfundraiser in support of the IWK Health Centre in Halifax. The IWK\n\nHealth Centre provides quality medical care to women, children,\n\nyouth and families in the Maritime provinces. Killam tenants\n\nsupported the cause through the purchase of lottery tickets for the\n\nchance to win free rent for a year. All funds raised went directly to\n\nthe IWK Foundation.\n\nDoing the Right Thing **Management’s Discussion and Analysis**", - "page_start": 19, - "page_end": 19, - "source_file": "TSX_KMP_2013.pdf" - }, - { - "text": "atmosphere of vitality and energy at Chesapeake, important ingredi­\n\nents of our distinctive culture. These attributes, along with a vibrant\n\nand attractive corporate headquarters campus, low levels of bureau­\n\ncracy, great assets and a well-executed corporate strategy combine to\n\ncreate our culture of success and innovation.\n\nThis has generated extremely positive external feedback as\n\nChesapeake was recently recognized for the fourth consecutive year\n\nas one of the FORTUNE 100 Best Companies to Work For <sup>®(3)</sup> in the U.S.\n\nIn fact, we moved up to #32 overall and #1 in our industry — we are\n\nvery proud of having created and sustained what is now considered\n\nthe best place to work in all of the U.S. energy production industry.\n\nIn addition, we were honored in December 2010 at the 12th Annual\n\nPlatts Global Energy Awards as finalists for CEO of the Year, Community\n\nDevelopment Program of the Year, Deal of the Year, Energy Producer\n\nof the Year and the Industry Leadership Award. Chesapeake was one\n\nof only two companies selected as a finalist in five or more categories.\n\nThe company was also honored in 2010 with a Certificate of Recognition\n\nfor our military reserve recruiting efforts, named a 2010 Best Diversity\n\nCompany by Engineering & Information Technology Magazine and rec­\n\nognized for Best Investor Relations in Energy Sector and Best Investor\n\nRelations Website at the 2010 IR Magazine U.S. Awards.\n\n**Recent Events and a Better Way Forward**\n\nYou may be aware that I have been outspoken in attempting to persuade\n\nour country’s political leadership to recognize that the discovery of vast\n\nresources of unconventional natural gas and oil in the U.S. is a complete\n\ngame changer for our country from an economic, national security and\n\nenvironmental perspective. After two years of my best efforts and the\n\nefforts of many others in the industry, most notably T. Boone Pickens,\n\nFrom our beginning 22 years ago with 10\n\nemployees in Oklahoma City to employing\n\nmore than 10,000 people across 15 states\n\ntoday, Chesapeake has always focused on\n\nbuilding first-class human resources within\n\na distinctive corporate culture.\n\n*<<* *A Chesapeake rig drills in the Marcellus Shale, where the company is*\n\n*the leading leasehold owner, largest producer and most active driller.*\n\nwet natural gas and dry natural gas), similar to the components of the\n\nEagle Ford Shale. We have made a large commitment to this play and\n\nhave acquired approximately 1.2 million net leasehold acres and expect\n\nto increase this total to as much as 1.5 million net leasehold acres in the\n\ncoming months. We are currently using three rigs to evaluate the play\n\nand believe our leasehold could support the drilling of up to 12,000 net\n\nwells. This is an area where we anticipate bringing in a joint venture\n\npartner late in 2011 or early in 2012.\n\n**Our People**\n\nGreat assets cannot exist without great people, so we take great pride\n\nin hiring, training, motivating, rewarding and retaining what we regard\n\nas the best employees in the industry. From our beginning 22 years ago\n\nwith 10 employees in Oklahoma City to employing more than 10,000\n\npeople across 15 states today, Chesapeake has always focused on build­\n\ning first-class human resources within a distinctive corporate culture. Talk\n\nto Chesapeake employees and you will note genuine pride and great\n\nenthusiasm about the company and the critical role that we play in deliv­\n\nering increasing quantities of clean and affordable American natural gas\n\nand valuable and reliable liquids to energy consumers across the country.\n\nChesapeake employees are distinctive in other ways as well. They\n\nare much younger than the industry average, with half of our almost\n\n4,000 Oklahoma City-based headquarters employees 33 years old\n\nor younger. Their enthusiasm and willingness to learn create an\n\n**12** | LETTER TO SHAREHOLDERS 2010 ANNUAL REPORT | **13**", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "George Marti\n\nFounder Marti Enterprises Cleburne, Texas 6\n\nFirst Financial Bankshares customers and shareholders also know a thing or two about Value and Values - and we learn from them every day. We’re proud to share in their success. Here are just a few of their stories.\n\nGeorge Marti believes in doing things. Good things.\n\nBorn to humble roots on his parents’ farm in 1920, Marti has accomplished much, including found-\n\ning three radio stations (and investing in 10 more) and developing a remote pickup device that\n\nbecame standard equipment in 80 percent of all radio stations worldwide. He still has part own-\n\nership of KCLE in Cleburne, Texas (the town where he was once mayor for 12 years).\n\nMarti’s dedication to his hometown is part of the reason why he bought Cleburne State Bank in\n\n1992. His business skills (and success in the broadcasting industry) gave him the resources to\n\nturn the bank into yet another winning venture. Five years later, he sold it to First Financial, which\n\nmerged it with their existing First Financial Bank, Cleburne.\n\nThe proceeds from the sale helped Marti complete the funding for his proudest achievement: the\n\nMarti Foundation, which he created in the 1970s to help send students from Johnson County to\n\ncollege. “We help over 100 students a year … most are the first from their family ever to attend\n\ncollege,” says Marti. “I know what education did for me, so it’s a great thing to help these young\n\npeople.” Marti says that when he dies, the Foundation will live on, $20 million strong.\n\nMarti still serves on the board of First Financial Bank, Cleburne. “First Financial’s merger of the\n\nbanks was positive for the community. They have a good customer base. They are friendly, help-\n\nful and creative. They are growing, and the branches in Alvarado and Burleson are both doing well.\n\nThose are all good things.”\n\n#### “They are friendly, helpful and creative. Those are all good things.”", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_FFIN_2002.pdf" - }, - { - "text": "gas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural\n\ngas is clean, affordable, abundant and American. Why *shouldn’t* it trade at a BTU premium in the years ahead?\n\n**Why is an investment grade rating on its debt securities important to CHK?**\n\nWe believe that Chesapeake will benefit in multiple ways from an investment grade rating on our debt\n\nsecurities, which we hope to achieve in 2012 or 2013. First, a higher rating would obviously lower the company’s\n\nborrowing costs over time. In addition, other less easily quantifiable benefits will also accrue to Chesapeake.\n\nHigher debt ratings would result in lower costs on long-term firm transportation contracts that we enter into in\n\norder to market our natural gas and oil production as well as facilitate our ability to enter into long-term contracts\n\nto sell our natural gas production to international buyers in the form of LNG. An improved rating will also enhance\n\nChesapeake’s ability to further attract world-class energy companies to participate in our joint venture projects,\n\nwhich profitably monetize a portion of our leasehold investments and also accelerate the development of our\n\nresource base. Finally, and perhaps most importantly, we believe that reduced financial leverage and an invest­\n\nment grade rating will lead to a higher stock price and provide further interest from worldwide equity investors.\n\nJeff Fisher\n\nSenior Vice President - Production\n\nNick Dell’Osso\n\nExecutive Vice President\n\nand Chief Financial Officer\n\nJeff Mobley\n\nSenior Vice President -\n\nInvestor Relations and Research\n\n2010 ANNUAL REPORT | **21**", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_SMFG_2011.pdf", - "query": "Has the Sumitomo Mitsui Financial Group offered help to the elderly?", - "target_page": 6, - "target_passage": "Currently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create frameworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycleframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle planning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a soundplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound balance between work and care needs, given that many group employees will later need to nurse ailing relatives.balance between work and care needs, given that many group employees will later need to nurse ailing relatives", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "information on CSR activities information on CSR activities\n\n**CSR disclosure**\n\n**through**\n\n**specific examples**\n\n**Comprehensive**\n\n**disclosure of**\n\n**CSR activities**\n\n**Enriched**\n\n**CSR disclosure**\n\n:\n\n:\n\n:\n\nApril 1, 2010 to March 31, 2011 ( “Fiscal 2010” )\n\nNote: Certain items in this report refer to activities taking place after April 2011.\n\nDecember 2011\n\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc.\n\n1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005\n\nTEL: +81-3-3282-8111\n\nSumitomo Mitsui Sumitomo Mitsui\n\nBanking Corporation Banking Corporation\n\nSMBC Nikko Securities SMBC Nikko Securities ORIX Credit ORIX Credit PROMISE * PROMISE * Sumitomo Mitsui Card Sumitomo Mitsui Card Cedyna Cedyna\n\nSMFG Card & Credit SMFG Card & Credit Sumitomo Mitsui Sumitomo Mitsui\n\nFinance and Leasing Finance and Leasing\n\nThe Japan The Japan\n\nResearch Institute Research Institute SMBC Friend Securities SMBC Friend Securities\n\nDaiwa SB Investments Daiwa SB Investments\n\nSumitomo Mitsui Auto Service Sumitomo Mitsui Auto Service\n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\n\nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange.\n\n**CSR report 2011 (digest version)**\n\n**CSR report (online version, Japanese only)**\n\n**CSR report 2011**\n\n**(digest version with examples of activities and**\n\n**statistical performance, online PDF file)**\n\nwww.smfg.co.jp/responsibility\n\n29 **CSR REPORT 2011 CSR REPORT 2011** 30", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "Sumitomo Mitsui Financial Group CSR Report\n\n**Digest version**\n\nwww.smfg.co.jp/english", - "page_start": 0, - "page_end": 0, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "President and CEO\n\nSumitomo Mitsui Banking Corporation\n\n**A Conversation with Tadao Ando, Takeshi Kunibe and Koichi Miyata**\n\n*Uplifting the nation’s spirits* *Uplifting the nation’s spirits*\n\nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) Japan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan)\n\nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates after the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates\n\nand increasing numbers of the aged. and increasing numbers of the aged.\n\nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. We must now find ways for people to coexist in harmony with nature, based on a global perspective.\n\nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society Sumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society\n\nand the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group. and the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group.", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "give the poorest in society access to give the poorest in society access to basic medical care. Based on this basic medical care. Based on this\n\ncorporate social responsibility corporate social responsibility DNA embedded in the business DNA embedded in the business\n\nphilosophies of both the Sumitomo philosophies of both the Sumitomo and Mitsui groups over the 400 and Mitsui groups over the 400\n\nyears of their existence, we will years of their existence, we will continue to play our part in solving continue to play our part in solving\n\nproblems facing the international problems facing the international community through our financial community through our financial\n\nservice service operations. operations.\n\n**Priority Issues for Us** As one of Japa As one of Japan’s leading financial services groups, s leading financial services groups,\n\nthe SMFG Group is taking the lead in aggressively addressing the four priority issues the SMFG Group is taking the lead in aggressively addressing the four priority issues\n\nwe have identified as significantly impacting the nation. we have identified as significantly impacting the nation.", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "In fiscal 2010, 150 volunteers from the In fiscal 2010, 150 volunteers from the\n\nSMFG Group participated in beach cleanup SMFG Group participated in beach cleanup\n\nactivities in Kanagawa and Hyogo prefectures activities in Kanagawa and Hyogo prefectures\n\non “SMFG Clean-up Day.” This initiative is on “SMFG Clean-up Day.” This initiative is\n\nnot simply a matter of picking up garbage. It not simply a matter of picking up garbage. It\n\nalso involves inspections and analysis of also involves inspections and analysis of\n\ngarbage to identify pointers for providing garbage to identify pointers for providing\n\nsolutions for environmental issues in the solutions for environmental issues in the\n\nfuture. future.\n\nIn addition to beach cleanup activities in In addition to beach cleanup activities in\n\nChiba and Hyogo prefectures by SMBC Chiba and Hyogo prefectures by SMBC\n\nFriend Securities, Group companies of Friend Securities, Group companies of\n\nCedyna, Sumitomo Mitsui Finance & Leasing, Cedyna, Sumitomo Mitsui Finance & Leasing,\n\nthe Japan Research Institute and SMBC the Japan Research Institute and SMBC\n\nNikko Securities carry out ongoing cleanup Nikko Securities carry out ongoing cleanup\n\nand other activities in the areas around their and other activities in the areas around their\n\noffices and branches. offices and branches.\n\nThe Minato Bank and Kansai Urban Banking The Minato Bank and Kansai Urban Banking\n\nCorporation also engage in cleanup activities Corporation also engage in cleanup activities\n\naround Suma Beach and Lake Biwa, to around Suma Beach and Lake Biwa, to\n\nprotect the regional environment. protect the regional environment.\n\nCardholders and employees of Sumitomo Cardholders and employees of Sumitomo\n\nMitsui Card joined a literary social contribution Mitsui Card joined a literary social contribution\n\ninitiative by participating in the Books To initiative by participating in the Books To\n\nThe People 2010 project operated by BOOKOFF The People 2010 project operated by BOOKOFF\n\nCORP. This project aims to provide CORP. This project aims to provide environ environ-\n\nments in which children can read books in ments in which children can read books in\n\npurpose-built facilities, through donations to purpose-built facilities, through donations to\n\nRoom to Read, a non-governmental organi Room to Read, a non-governmental organi-\n\nzation that supports education in developing zation that supports education in developing\n\ncountries. These NGO donations are pegged countries. These NGO donations are pegged\n\nto total numbers of used books and other to total numbers of used books and other\n\nitems purchased by cardholders. Through items purchased by cardholders. Through\n\nthe Sumitomo Mitsui Card-operated online the Sumitomo Mitsui Card-operated online\n\nshopping mall POINT UP Mall, cardholders shopping mall POINT UP Mall, cardholders\n\nare encouraged to buy used books through are encouraged to buy used books through\n\nBOOKOFF, and employees collect and donate BOOKOFF, and employees collect and donate\n\nused books from their homes and companies. used books from their homes and companies.\n\nIn the fall of 2010, SMBC Nikko Securities In the fall of 2010, SMBC Nikko Securities\n\nestablished its “Green Week” for strength established its “Green Week” for strength-\n\nening environmental protection and social ening environmental protection and social\n\ncontribution activities, with the aim of contribution activities, with the aim of\n\npromoting communication within regional promoting communication within regional\n\nsociety and among participating employees society and among participating employees\n\nand their families, while deepening under and their families, while deepening under-\n\nstanding of environmental protection through standing of environmental protection through\n\nparticipation in social contribution activities. participation in social contribution activities.\n\nBetween November 13 and December 5, Between November 13 and December 5,", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group\n\nis fulfilling as we work to create a sustainable society.\n\nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is\n\nthe essence of business itself, and our initiatives act upon this.\n\nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s\n\nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report\n\n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR\n\nactivities and statistical data omitted in the CSR Report 2011 (digest version).\n\nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in\n\nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand\n\nour CSR and other activities in greater detail.\n\nFrom the current fiscal year, we are including third-party opinions in the website version.\n\n**Editorial Policy**\n\nAt Sumitomo Mitsui Financial Group, three kinds of CSR reports are compiled.\n\n**Our CSR reporting**\n\nGlobal Reporting Initiative (GRI) Sustainability Reporting Guidelines 2006 (G3)\n\n* Global Reporting Initiative (GRI): Established as an international standard for sustainability reporting, compilers set up an international\n\norganization (GRI) in 1997 to encourage its adoption worldwide.\n\n* SMFG plans to make PROMISE a wholly owned subsidiary in April 2012.\n\n**Reference guidelines**\n\n- Sumitomo Mitsui Financial Group, Inc.\n\n- Sumitomo Mitsui Banking Corporation\n\n- SMFG Card & Credit, Inc.\n\n- Sumitomo Mitsui Card Company, Limited\n\n- Cedyna Financial Corporation\n\n- Sumitomo Mitsui Finance and Leasing Co., Ltd.\n\n- The Japan Research Institute, Limited\n\n- SMBC Friend Securities Co., Ltd.\n\n- SMBC Nikko Securities Inc.\n\n- THE MINATO BANK, LTD.\n\n- Kansai Urban Banking Corporation\n\n- Other Group companies\n\n**Scope of this Report**\n\nThroughout this report, **“Sumitomo Mitsui Financial Group”** or **“SMFG”** refers to the holding company alone. **“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates.\n\nCompany name abbreviations and other special terminology\n\n**About this Report**\n\n**Corporate Outline (as of September 30, 2011)**\n\nCompany Name\n\nBusiness Description\n\nEstablished\n\nHead Office\n\nChairman of the Board\n\nPresident\n\nCapital\n\nStock Exchange Listings\n\nSumitomo Mitsui Financial Group, Inc.\n\nManagement of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of\n\nnon-bank subsidiaries, as well as the performance of ancillary functions\n\nDecember 2, 2002\n\n1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan\n\nMasayuki Oku\n\nKoichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation)\n\n¥2,337.8 billion\n\nTokyo Stock Exchange (First Section)\n\nOsaka Securities Exchange (First Section)\n\nNagoya Stock Exchange (First Section)\n\n: :\n\n:\n\n:\n\n:\n\n:\n\n:\n\n:\n\n:\n\n**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nPeriod Covered\n\nPublication Date of\n\nJapanese Document\n\nContact\n\nCovers CSR baselines and CSR activities at SMFG and its Group companies, Covers CSR baselines and CSR activities at SMFG and its Group companies,\n\ncentered on specific examples centered on specific examples\n\nThis is the official version of our CSR report. Covers the full spectrum of This is the official version of our CSR report. Covers the full spectrum of\n\nCSR activities at SMFG CSR activities at SMFG\n\nCovers environment-related statistical data and gives more detailed Covers environment-related statistical data and gives more detailed\n\ninformation on CSR activities information on CSR activities\n\n**CSR disclosure**", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "ties that contribute to society and prioritize ties that contribute to society and prioritize\n\ncommunication between employees. communication between employees.\n\nAccepting middle school students\n\nfor workplace experience programs\n\nSendai Branch\n\nPOINT UP Mall Sumitomo Mitsui\n\nCard staff\n\nBOOKOFF CORP Group\n\nSumitomo Mitsui\n\nCardholders\n\n*Research by Nikko Asset Management Co., Ltd.\n\nSumitomo Mitsui Financial Group CSR Report\n\n**SMFG and**\n\n**its Group companies**\n\n**participate in neighborhood**\n\n**cleanup programs**\n\n**Donations through**\n\n**“The World Bank**\n\n**Green Fund”**\n\n**SMBC Nikko Securities’**\n\n**“Green Week”**\n\n**Supporting education in**\n\n**developing countries,**\n\n**together with our customers**\n\n**and employees**\n\n**SMFG as a corporate citizen: Working to create a prosperous society for all**\n\n#### **Social Contribution**\n\n#### **Activities**\n\n**For further details,**\n\n**please see our website.**\n\nMitsui Sumitomo VISA Card", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "The Group CSR Department and assigned departments also conduct a joint examination of plans for the following financial year, The Group CSR Department and assigned departments also conduct a joint examination of plans for the following financial year,\n\nthe findings of which are subsequently assessed by the Group CSR Committee. the findings of which are subsequently assessed by the Group CSR Committee.\n\nIn this way, we use the PDCA cycle in our CSR initiatives. In this way, we use the PDCA cycle in our CSR initiatives.\n\n**Our Mission**\n\n**Contributing to the Sustainable Development of Society**\n\n**CSR Group Initiatives**\n\nSolid Management Structure\n\n(corporate governance, internal controls, compliance,\n\nrisk management, information disclosure, etc.)\n\nCustomers Shareholders\n\nand the Market The Environment\n\nand Society Employees\n\nHighly-valued\n\nproducts and\n\nservices\n\nSound\n\nManagement\n\nSocial and community activities and environmental activities\n\nCorporate culture\n\nrespecting\n\nthe individual\n\nBoard of Directors\n\nSumitomo Mitsui Banking Corporation SMFG Card & Credit, Inc. The Japan Research Institute Limited SMBC Friend Securities Co., Ltd. Sumitomo Mitsui Finance and Leasing Co., Ltd.\n\n**Chairman** : Director in charge of SMFG\n\nCorporate Planning Department\n\n**Committee members** : General Managers of SMFG,\n\nSumitomo Mitsui Banking Corporation,\n\nSMFG Card & Credit, Sumitomo Mitsui Card,\n\nCedyna, Sumitomo Mitsui Finance and Leasing,\n\nThe Japan Research Institute,\n\nSMBC Friend Securities, SMBC Nikko Securities,\n\nTHE MINATO BANK and\n\nKansai Urban Banking Corporation\n\n**Administered by** : Group CSR Department of SMFG\n\n**Strategic advisor** :\n\nJRI Center for the Strategy of Emergence\n\nManagement Committee\n\n**Group CSR Committee**\n\n**CSR Liaison Committee**\n\n**SMFG CSR promotion structure**\n\nOur Mission\n\nCustomers\n\nPromoting CSR through\n\ncore operations\n\nShareholders and the Market\n\nThe Environment and Society\n\nEmployees\n\n| Plan |\n|:---|\n| Do |\n\n| Check |\n|:---|\n| Act |\n\nBasic CSR Policy\n\n(Business Ethics)\n\nWe intend to be a financial services group for which all officers and employees work We intend to be a financial services group for which all officers and employees work\n\nwith pride and commitment. For this purpose, we respect people and develop with pride and commitment. For this purpose, we respect people and develop\n\nemployees with extensive professional knowledge and capabilities, thereby creating a employees with extensive professional knowledge and capabilities, thereby creating a\n\nfree and active business environment. free and active business environment. *4.* **Free and Active**\n\n**Business Environment**\n\nWe intend to be a financial services group that maintains fair, transparent, and sound We intend to be a financial services group that maintains fair, transparent, and sound\n\nmanagement based on the principle of self-responsibility. For this purpose, along with management based on the principle of self-responsibility. For this purpose, along with\n\nearning the firm confidence of our shareholders, our customers, and the general public, earning the firm confidence of our shareholders, our customers, and the general public,\n\nwe take a long-term view of our business and operate it efficiently, and actively disclose we take a long-term view of our business and operate it efficiently, and actively disclose\n\naccurate business information about the Group. Through these activities, we work to accurate business information about the Group. Through these activities, we work to\n\nmaintain continued growth based on a sound financial position. maintain continued growth based on a sound financial position. *2.* **<sup>Sound Management</sup>**\n\nWe intend to be a financial services group that contributes to the healthy development We intend to be a financial services group that contributes to the healthy development", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" - }, - { - "text": "**5**\n\n## EXECUTIVES\n\n**BOARD OF DIRECTORS AND AUDITORS**\n\n**Representative Board Members**\n\nCarlos Ghosn\n\nPresident and Co-Chairman\n\nItaru Koeda\n\nCo-Chairman\n\nToshiyuki Shiga\n\nCo-Chairman\n\n**Board Members**\n\nTadao Takahashi\n\nHiroto Saikawa\n\nMitsuhiko Yamashita\n\nCarlos Tavares\n\nShemaya Lévy\n\nPatrick Pélata\n\n**Auditors**\n\nHisayoshi Kojima\n\nShinji Ichishima\n\nKeishi Imamura\n\nHaruo Murakami\n\n**EXECUTIVE COMMITTEE MEMBERS**\n\nCarlos Ghosn\n\nToshiyuki Shiga\n\nItaru Koeda\n\nTadao Takahashi\n\nHiroto Saikawa\n\nMitsuhiko Yamashita\n\nCarlos Tavares\n\nAlain-Pierre Raynaud\n\n(As of June 21, 2005)\n\nFrom left: Mitsuhiko Yamashita, Tadao Takahashi, Toshiyuki Shiga, Carlos Ghosn, Itaru Koeda, Hiroto Saikawa, Carlos Tavares\n\nEXECUTIVES", - "page_start": 6, - "page_end": 6, - "source_file": "OTC_NSANY_2004.pdf" - }, - { - "text": "At Sumitomo Mitsui Card, rare earths At Sumitomo Mitsui Card, rare earths\n\nextracted from IC chips from expired credit extracted from IC chips from expired credit\n\ncards are recycled. cards are recycled.\n\nAs part of its core leasing operations, As part of its core leasing operations,\n\nSumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is\n\nhelping reduce customers’ environmental helping reduce customers’ environmental\n\nSMBC jointly organizes the “eco japan cup,” an SMBC jointly organizes the “eco japan cup,” an\n\nenvironmental business contest, together with environmental business contest, together with\n\nthe Ministry of the Environment, the Ministry the Ministry of the Environment, the Ministry\n\nof Internal Affairs and of Internal Affairs and Communi Communications, cations,\n\nthe Ministry of Land, Infrastructure, he Ministry of Land, Infrastructure, Trans Trans-\n\nport and Tourism, Development Bank of port and Tourism, Development Bank of\n\nJapan Inc. and Environmental Business Japan Inc. and Environmental Business\n\nWomen. The competition has four major Women. The competition has four major\n\ncategories - business, culture, lifestyle, and categories - business, culture, lifestyle, and\n\npolicy-making. policy-making.\n\nIn eco japan cup 2010, the “SMBC Eco-Banking In eco japan cup 2010, the “SMBC Eco-Banking\n\nOffice Prize” was launched in the cultural Office Prize” was launched in the cultural\n\ndivision. Entries were solicited on creating division. Entries were solicited on creating\n\neco-friendly bank branches through envi eco-friendly bank branches through envi-\n\nronment protection measures including ronment protection measures including\n\nadvanced energy initiatives and reduction advanced energy initiatives and reduction\n\nof carbon dioxide. Some of the prize-winning of carbon dioxide. Some of the prize-winning\n\nproposals (for example, efficient use of proposals (for example, efficient use of\n\ntimber from forest thinning) have been timber from forest thinning) have been\n\nadopted at environment-friendly model adopted at environment-friendly model\n\nbranches that the bank is developing. branches that the bank is developing.\n\n* After intermediate processing, waste materials\n\nother than the rare earths and the cards with\n\nno IC chips are both sent off for final disposal,\n\nin conformity with established procedures.\n\nThe Eco-Products exhibition, held each The Eco-Products exhibition, held each\n\nDecember, is one of Japan December, is one of Japan’s largest envi s largest envi-\n\nronmental exhibitions. Under it, SMFG held ronmental exhibitions. Under it, SMFG held\n\nthe SMFG Environmental Business Forum, the SMFG Environmental Business Forum,\n\na unique event to which the whole SMFG a unique event to which the whole SMFG\n\nGroup contributed. Group contributed.\n\nThe SMFG Environmental Business Forum The SMFG Environmental Business Forum\n\nenables encounters and information enables encounters and information\n\nexchange in the field of environmental exchange in the field of environmental\n\nbusiness. SMFG and its Group companies business. SMFG and its Group companies\n\nprovide various platforms, including business provide various platforms, including business\n\nmatching events, stands and catalogue matching events, stands and catalogue\n\nexhibitions, and lectures and seminars, exhibitions, and lectures and seminars,\n\nwith the aim of giving new business with the aim of giving new business\n\nopportunities to companies and other opportunities to companies and other\n\norganizations that are considering entering organizations that are considering entering\n\nthe environmental business, expanding the environmental business, expanding\n\ntheir marketing channels within it, or just their marketing channels within it, or just\n\ngathering information. gathering information.\n\nRecycling yields approximately 0.1mg of rare Recycling yields approximately 0.1mg of rare\n\nearth product per expired card. earth product per expired card.", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_SMFG_2011.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_CHK_2010.pdf", - "query": "Does Chesapeake Energy have a project to reduce excessive water use?", - "target_page": 28, - "target_passage": "Created to meet the challenge of reducing our water usage, Chesapeake’s Aqua Renew® program uses state-of-the-art technology to recycle pro- duced water.", - "chunk_present": { - "presence": true, - "index": 0 - } - }, - "top_chunk": [ - { - "text": "**26** | ENVIRONMENTAL, HEALTH & SAFETY\n\nAs we explore for and produce clean, affordable, abundant, American\n\nnatural gas, we provide an important solution to our nation’s energy\n\nchallenges and its quest for energy independence. With at least a 200-\n\nyear supply of natural gas located right here in the U.S., this versatile\n\nfuel can be used to not only heat homes, create electricity and meet\n\nAmerica’s transportation needs, but also to fuel the country’s future\n\nby creating jobs and stimulating local and national economies through\n\ninvestment and taxes.\n\n**Environmentally Friendly Operations**\n\nAt Chesapeake, we realize that the way a great product is produced is\n\nas important as the product itself. For example, we have helped pioneer\n\nthe use of multiwell padsites to drill up to 16 wells from a single loca­\n\ntion, greatly reducing our land and road use and overall environmental\n\nfootprint. We use the latest horizontal and directional drilling technology\n\nto place wells at a safe distance from homes, schools and businesses. In\n\naddition, we build and maintain access roads and work to eliminate soil\n\nerosion near our sites, as well as restore local vegetation.\n\nWe implement advanced, modern protective measures known as Best\n\nManagement Practices (BMPs) to help ensure energy development is con­\n\nducted in an environmentally responsible manner. Procedures are imple­\n\nmented throughout our operations to protect freshwater aquifers and\n\nreduce environmental impacts. BMPs protect wildlife, air quality, water and\n\nlandscapes as we work to develop vitally needed domestic energy sources.\n\nImplemented throughout the entire life cycle of a well, BMPs can be\n\nas simple as strategically placing a berm, or land barrier, on locations\n\nto control surface water runoff. Others involve cutting-edge operational\n\ntechnologies such as utilizing the most advanced techniques offered in\n\ndrilling fluids, well casing and cement design. Regardless of complex­\n\nity, all BMPs are based on the idea that the environmental footprint of\n\nenergy development should be as small and temporary as possible.\n\nThese practices are continually evolving and further improving as\n\nChesapeake and the industry develop new innovative techniques and\n\napproaches to business.\n\nIn addition to our BMPs, Chesapeake has also initiated several\n\ninnovative internal programs focused on water recycling and greener\n\nhydraulic fracturing processes.\n\n* **Aqua Renew** * **<sup>®</sup>**\n\nCreated to meet the challenge of reducing our water usage, Chesapeake’s\n\n*Aqua Renew* <sup>®</sup> program uses state-of-the-art technology to recycle pro­\n\nduced water. Since the\n\ncompany’s preliminary\n\nreclamation project in\n\n2006, our focus on water reuse and conservation has become a company-\n\nwide endeavor, stretching from the Barnett Shale of North Texas to the\n\nMarcellus Shale of northern Pennsylvania.\n\nThe *Aqua Renew* program has yet to find a limit to how much\n\nrecycled water could be used without compromising well production.\n\nIn fact, our Marcellus Shale operations are treating and recycling virtu­\n\nally 100% of produced water (more than 10 million gallons per month)\n\nfor reuse in our hydraulic fracturing operations. Properly conducted\n\nmodern fracking is a highly engineered, controlled, sophisticated and\n\nsafe procedure.\n\nWith such large volumes of recycled water, the company is see­\n\ning more than just environmental advantages. We estimate that this\n\n##### INVESTING IN OUR WORLD AND OUR PEOPLE »\n\n*Green operations — Chesapeake’s Best Management Practices ensure our*\n\n*operations are as environmentally friendly as possible, while protecting*\n\n*our employees, neighbors and the areas where we operate.*", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "We also hire locally whenever possible to help stimulate the local\n\neconomy, and we provide training when the local work force isn’t yet\n\nqualified for the jobs we have open. For example, when Chesapeake\n\nbegan operating in the Marcellus Shale of West Virginia and Pennsyl­\n\nvania, finding experienced rig workers was a challenge. To meet that\n\nneed, Chesapeake’s wholly owned subsidiary, Nomac Drilling, built\n\nthe 40,000-square-foot Eastern Training Center and Housing Facility in\n\nBradford County, near Sayre, Pennsylvania. The campus opened in 2010\n\nand serves as a housing facility and training ground for 266 workers at\n\na time. Nomac and Chesapeake host regular job fairs in the region and\n\nthe lines of interested candidates often extend out the door.\n\n**Educational Impact**\n\nWe are also proud to help prepare tomorrow’s leaders today. In 2010\n\nChesapeake supported universities, schools, academic chairs, scholarships\n\nand other educational programs with contributions totaling $5.4 million.\n\nInvesting in programs that promote technology and innovation is a\n\nkey to our country’s success. That’s why we gave $1.0 million to establish\n\nthe Chesapeake Energy dormitory for students at the Oklahoma School for\n\nScience and Mathematics (OSSM), a public, tuition-free, residential high\n\nschool located in Oklahoma City for juniors and seniors with exceptional\n\nabilities. The extremely competitive school is helping train the next gen-\n\neration of scientists and mathematicians.\n\nWe also established the Chesapeake Energy Presidential Scholars Pro­\n\ngram at the Oklahoma City University Meinders School of Business, making\n\na $5.0 million commitment to be distributed over the next five years. The\n\nChesapeake Scholars Program will provide up to $25,000 per year in tuition", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "atmosphere of vitality and energy at Chesapeake, important ingredi­\n\nents of our distinctive culture. These attributes, along with a vibrant\n\nand attractive corporate headquarters campus, low levels of bureau­\n\ncracy, great assets and a well-executed corporate strategy combine to\n\ncreate our culture of success and innovation.\n\nThis has generated extremely positive external feedback as\n\nChesapeake was recently recognized for the fourth consecutive year\n\nas one of the FORTUNE 100 Best Companies to Work For <sup>®(3)</sup> in the U.S.\n\nIn fact, we moved up to #32 overall and #1 in our industry — we are\n\nvery proud of having created and sustained what is now considered\n\nthe best place to work in all of the U.S. energy production industry.\n\nIn addition, we were honored in December 2010 at the 12th Annual\n\nPlatts Global Energy Awards as finalists for CEO of the Year, Community\n\nDevelopment Program of the Year, Deal of the Year, Energy Producer\n\nof the Year and the Industry Leadership Award. Chesapeake was one\n\nof only two companies selected as a finalist in five or more categories.\n\nThe company was also honored in 2010 with a Certificate of Recognition\n\nfor our military reserve recruiting efforts, named a 2010 Best Diversity\n\nCompany by Engineering & Information Technology Magazine and rec­\n\nognized for Best Investor Relations in Energy Sector and Best Investor\n\nRelations Website at the 2010 IR Magazine U.S. Awards.\n\n**Recent Events and a Better Way Forward**\n\nYou may be aware that I have been outspoken in attempting to persuade\n\nour country’s political leadership to recognize that the discovery of vast\n\nresources of unconventional natural gas and oil in the U.S. is a complete\n\ngame changer for our country from an economic, national security and\n\nenvironmental perspective. After two years of my best efforts and the\n\nefforts of many others in the industry, most notably T. Boone Pickens,\n\nFrom our beginning 22 years ago with 10\n\nemployees in Oklahoma City to employing\n\nmore than 10,000 people across 15 states\n\ntoday, Chesapeake has always focused on\n\nbuilding first-class human resources within\n\na distinctive corporate culture.\n\n*<<* *A Chesapeake rig drills in the Marcellus Shale, where the company is*\n\n*the leading leasehold owner, largest producer and most active driller.*\n\nwet natural gas and dry natural gas), similar to the components of the\n\nEagle Ford Shale. We have made a large commitment to this play and\n\nhave acquired approximately 1.2 million net leasehold acres and expect\n\nto increase this total to as much as 1.5 million net leasehold acres in the\n\ncoming months. We are currently using three rigs to evaluate the play\n\nand believe our leasehold could support the drilling of up to 12,000 net\n\nwells. This is an area where we anticipate bringing in a joint venture\n\npartner late in 2011 or early in 2012.\n\n**Our People**\n\nGreat assets cannot exist without great people, so we take great pride\n\nin hiring, training, motivating, rewarding and retaining what we regard\n\nas the best employees in the industry. From our beginning 22 years ago\n\nwith 10 employees in Oklahoma City to employing more than 10,000\n\npeople across 15 states today, Chesapeake has always focused on build­\n\ning first-class human resources within a distinctive corporate culture. Talk\n\nto Chesapeake employees and you will note genuine pride and great\n\nenthusiasm about the company and the critical role that we play in deliv­\n\nering increasing quantities of clean and affordable American natural gas\n\nand valuable and reliable liquids to energy consumers across the country.\n\nChesapeake employees are distinctive in other ways as well. They\n\nare much younger than the industry average, with half of our almost\n\n4,000 Oklahoma City-based headquarters employees 33 years old\n\nor younger. Their enthusiasm and willingness to learn create an\n\n**12** | LETTER TO SHAREHOLDERS 2010 ANNUAL REPORT | **13**", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "to selected students pursuing careers in finance, economics, accounting,\n\nmarketing, business administration, computer science and information\n\ntechnology. In addition, scholars will take part in a Chesapeake Presiden­\n\ntial Leadership Course facilitated by faculty members in coordination with\n\ndesignated Chesapeake leadership coaches, including a Chesapeake senior\n\nvice president and OCU alumni.\n\nIn 2007 Chesapeake launched a scholarship program in Texas with an\n\ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal­\n\nlas to match its gift within a year. The cities responded and matched the gift,\n\nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the\n\ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the\n\ncost of higher education for 48 minority students. The fund provides each\n\nstudent $20,000 a year for up to four years at the school of their choice. To\n\ndate more than $1.0 million has been distributed to deserving local students.\n\nTo help ensure the training of qualified geologists, engineers, land­\n\nmen and energy lawyers in the next generation, we award scholarships\n\nto students pursuing energy-related degrees. We also help mentor them\n\nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship\n\nrecipients are paired with Chesapeake employee mentors who help devel­\n\nop students’ knowledge and provide career advice. There are currently 25\n\nmentors and 40 scholarship recipients participating in the Peak Program.\n\nOur recruiting team also initiated a strategic military recruitment\n\neffort during the past two years to hire former military personnel to\n\nwork in a variety of leadership and crew positions. This effort earned\n\nChesapeake an honor from G.I. JOBS magazine when we were named a\n\n2011 Top 100 Military-Friendly Employer. Chesapeake currently employs\n\n37 men and women who formerly served as junior military officers and\n\nmore than 100 former servicemen and servicewomen who joined the\n\ncompany through a program called Troops 2 Roughnecks.\n\nIn addition to our specific scholarship programs, one-time educational\n\ndonations and recruitment efforts, in 2010 we gave more than $1.8 million\n\nto fund higher education for nearly 400 other students in 12 states through\n\nour Chesapeake Scholars program. Chesapeake’s scholarships help recruit\n\nthe best and brightest students and provide educational opportunities in\n\ncommunities where we operate. In Oklahoma City, more than 400 em­\n\nployees volunteer for up to an hour a week on company time at four local\n\npublic schools. Chesapeake’s program has grown to become the largest\n\ncorporate mentoring program in Oklahoma.\n\n**Community Impact**\n\nChesapeake employees have been enriching their hometowns as volun­\n\nteers for many years. We formalized those efforts in 2009 by establishing\n\nan official employee volunteer program, the H.E.L.P. (Helping Energize\n\nLocal Progress) Initiative, wherein employees are invited to volunteer\n\neach month for a variety of organizations from food pantries to animal\n\nshelters. Through that program, employees donated more than 26,000\n\nhours to their communities in 2009.\n\nIn the summer of 2010, Chesapeake took the H.E.L.P. Initiative to a\n\nhigher level through the launch of Operation Blue. From Memorial Day\n\nthrough Labor Day, each employee was given four hours of company time\n\nto complete the volunteer project of their choice. Our employees eagerly\n\naccepted the challenge, and in three months more than 4,900 employ­\n\nees donated 30,900 hours of service to 519 organizations in more than\n\n96 communities across the country. Operation Blue is now an annual\n\nvolunteer program in which employees roll up their sleeves in the com­\n\nmunities they call home.\n\nChesapeake’s contributions take many forms: financial and equipment\n\ndonations, volunteerism and scholarships. Last year, we made numerous\n\nin-kind donations of laptops, reconditioned Chesapeake fleet vehicles and", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**What advantages does CHK’s unique vertical integration strategy provide?**\n\nChesapeake has built a large inventory of low-risk natural gas and liquids-rich plays that we plan to develop\n\naggressively over the next two decades. As a result, we know that our company will consistently utilize a tremen­\n\ndous (and growing) amount of oilfield services for this resource development. This high level of planned drilling\n\nactivity will create value for the provider of oilfield services, and Chesapeake’s strategy is to capture a portion\n\nof this value for our shareholders rather than transfer it to third-party vendors whose interests and investments\n\nare not always aligned with ours. To date, Chesapeake has invested in drilling rigs, rental tools, water manage­\n\nment equipment, trucking, compression equipment, midstream services, and most recently pressure pumping and\n\nfracture stimulation equipment. Chesapeake’s activities require a high level of planning and project coordination\n\nthat is best accomplished through vertical integration and ownership of the oilfield services we utilize. This approach\n\ncreates a multitude of cost savings, an alignment of interests, operational synergies, greater capacity of equipment,\n\nincreased safety and better coordinated logistics. In addition, Chesapeake’s control of a large portion of the oilfield\n\nservice equipment it utilizes provides a unique advantage to control the timing of leasehold development. Simply\n\nput, faster development of resources maximizes the present value of leasehold. This has been a key advantage for\n\nChesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures.\n\n**Will U.S. natural gas prices reconnect with world natural gas prices?**\n\nNatural gas is a premium product and a cleaner-burning fuel than coal or oil-related products, including gasoline,\n\ndiesel and heating oil. Despite this fact, over the past two years natural gas has received a low price in the U.S.\n\nmarket relative to coal and oil-related products, primarily as a result of a temporary surplus of production. This\n\nsurplus has been principally caused by high levels of drilling activity as producers focused on holding by produc­\n\ntion (HBP) leasehold in new highly productive, low cost natural gas shale plays. In essence, producers reinvented\n\nU.S. supply ahead of reinventing of U.S. demand. We believe HBP-incentivized drilling on natural gas plays will\n\nlargely come to an end in 2012, and U.S. demand will soon also be reinvented to allow U.S. natural gas prices to\n\nreconnect to price parity with world natural gas prices that have risen to more than double U.S. natural gas prices.\n\nThis surge in world natural gas prices has been in response to $100+ oil prices and surging global liquefied\n\nnatural gas (LNG) demand. In our view, the arbitrage in value between competing fuels is simply too wide. Capital\n\nand ideas will flow toward projects that make the most of this price disparity. Chesapeake and other companies are\n\nworking to create the ability to export natural gas from the U.S. Gulf Coast and other regions in the form of LNG to\n\npremium Pacific Rim, European and South American markets, perhaps as soon as 2015. This initiative will also be\n\naided by the widening of the Panama Canal to accommodate large LNG vessels. Furthermore, we believe that the\n\ncurrent price disparity between natural gas and oil will increasingly lead to greater use of natural gas in the U.S. transportation system. Whether it\n\nbe compressed natural gas (CNG) for medium and light-duty vehicles, LNG for heavy-duty vehicles or the commercialization of gas-to-liquids (GTL)\n\nnatural gas refineries that supplement the U.S. liquid fuel supply stream, we believe that the marketplace will increasingly utilize and embrace natural\n\ngas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**LIQUIDS-RICH AREAS**\n\nAnadarko Basin The Anadarko Basin is home to four of Chesapeake’s liquids-rich plays,\n\nwhich we anticipate will become significant contributors to our growth in the years ahead.\n\nChesapeake was one of the first to utilize modern horizontal drilling methods and has assembled\n\nan unrivaled leasehold position in numerous horizontal liquids-rich plays in the basin. Chesapeake\n\nwill continue drilling with a focus on the Granite Wash, where rates of return are the highest in our\n\ncompany, and with an increasing focus on the Cleveland, Tonkawa and Mississippian liquids-rich\n\nunconventional plays. We estimate we could drill up to 11,400 net wells on our Anadarko Basin\n\nacreage in the future and plan to utilize an average of 31 operated rigs in 2011 to further develop\n\nour current 1.7 million net leasehold acres.\n\nRockies Chesapeake is the second-largest leasehold owner in the Niobrara Shale,\n\nFrontier and Codell plays in the Powder River and Denver Julesburg (DJ) basins of Wyoming\n\nand Colorado. In February 2011, Chesapeake completed a $1.3 billion joint venture agreement with\n\nCNOOC, whereby CNOOC acquired a 33.3% interest in Chesapeake’s approximately 800,000 net\n\nleasehold acres in the Powder River and DJ basins. CNOOC paid Chesapeake approximately $570 million\n\nin cash at closing and will pay an additional $697 million in carries by funding 66.7% of Chesapeake’s\n\nshare of drilling and completion expenditures, which\n\nChesapeake expects to occur by year-end 2014. We plan\n\nto utilize an average of approximately 11 rigs in 2011 to\n\ndevelop our current 535,000 net leasehold acres with\n\nour partner and estimate that we could drill up to 7,600 net wells.\n\n## **8**\n\nPermian Basin Chesapeake has built a strong position of approx­\n\nimately 1.2 million net leasehold acres in the Permian Basin including\n\n560,000 net leasehold acres in the Bone Spring, Avalon, Wolfcamp and Wolfberry\n\nunconventional liquids plays. This area has the potential to deliver significant\n\nupside as we move toward increasing our oil production substantially in the years\n\nahead. We have developed multiple new horizontal oil projects in this area, where\n\nwe plan to utilize an average of approximately eight operated rigs in 2011 to further\n\ndevelop our leasehold in the Permian and Delaware basins and estimate we could drill\n\nup to 4,400 net wells.\n\n## **7**\n\nEagle Ford Shale As part of a growing emphasis on increasing oil and natural gas liquids\n\nproduction, Chesapeake has built the industry’s second-largest leasehold position in the Eagle\n\nFord Shale play in South Texas. In 2010 Chesapeake increased its leasehold from 80,000 net acres at the\n\nbeginning of the year to more than 600,000 net acres. In November 2010, Chesapeake completed\n\na $2.2 billion Eagle Ford Shale joint venture agreement with Beijing-based CNOOC Limited\n\n(NYSE:CEO), whereby CNOOC acquired a 33.3% interest in 600,000 net leasehold acres in the Eagle\n\nFord Shale. CNOOC paid Chesapeake approximately $1.12 billion in cash at closing and will pay 75%\n\nof Chesapeake’s share of drilling and completion expenditures until the $1.08 billion carry obligation\n\nhas been funded, which Chesapeake expects to occur by year-end 2012. Our focus has been in the wet gas and\n\noil prone portions of the play. We estimate we could drill up to 5,500 net wells on our Eagle Ford acreage and plan\n\nto utilize an average of 23 operated rigs in 2011 to further develop our leasehold position in the Eagle Ford Shale. In addition,\n\nwe believe that the Pearsall Shale should be prospective for natural gas underneath approximately 75% of our Eagle Ford leasehold.\n\n## **6**\n\n**5** 2010 Total Production:\n\n145 bcfe, +4%, 14%\n\n12/31/10 Proved Reserves:\n\n2,440 bcfe, +21%, 14%\n\n12/31/10 Net Leasehold Acres:\n\n1,420,000, +15%, 11%\n\n2010 Total Production:\n\n0 bcfe, NM, NM\n\n12/31/10 Proved Reserves:\n\n10 bcfe, NM, NM\n\n12/31/10 Net Leasehold Acres:\n\n800,000, +135%, 6%\n\n2010 Total Production:\n\n60 bcfe, -20%, 6%", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "gas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural\n\ngas is clean, affordable, abundant and American. Why *shouldn’t* it trade at a BTU premium in the years ahead?\n\n**Why is an investment grade rating on its debt securities important to CHK?**\n\nWe believe that Chesapeake will benefit in multiple ways from an investment grade rating on our debt\n\nsecurities, which we hope to achieve in 2012 or 2013. First, a higher rating would obviously lower the company’s\n\nborrowing costs over time. In addition, other less easily quantifiable benefits will also accrue to Chesapeake.\n\nHigher debt ratings would result in lower costs on long-term firm transportation contracts that we enter into in\n\norder to market our natural gas and oil production as well as facilitate our ability to enter into long-term contracts\n\nto sell our natural gas production to international buyers in the form of LNG. An improved rating will also enhance\n\nChesapeake’s ability to further attract world-class energy companies to participate in our joint venture projects,\n\nwhich profitably monetize a portion of our leasehold investments and also accelerate the development of our\n\nresource base. Finally, and perhaps most importantly, we believe that reduced financial leverage and an invest­\n\nment grade rating will lead to a higher stock price and provide further interest from worldwide equity investors.\n\nJeff Fisher\n\nSenior Vice President - Production\n\nNick Dell’Osso\n\nExecutive Vice President\n\nand Chief Financial Officer\n\nJeff Mobley\n\nSenior Vice President -\n\nInvestor Relations and Research\n\n2010 ANNUAL REPORT | **21**", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**Chesapeake’s $25 million**\n\n**of charitable giving in 2010**\n\nChesapeake’s sense of civic commitment provides a bountiful harvest of\n\nbenefits to cities large and small. We partner with groups and organizations\n\nacross all of our operating areas to improve the communities our employ­\n\nees, contractors, vendors, land and mineral owners call home. We believe\n\nthe success of our business depends on the strength, goodwill and vitality\n\nof those communities. Most importantly, we believe it is the responsibility\n\nof every successful business to share success with its neighbors.\n\nIn 2010 we gave more than $25 million to charitable organizations\n\nand projects across our operating areas, primarily focusing on community\n\ndevelopment, education, health and medical and social services.\n\n**Economic Impact**\n\nWhile much of the U.S. is still struggling to recover from the economic re­\n\ncession, the positive impact of natural gas and oil operations has provided\n\na valuable economic recovery stimulus for states that are home to explora­\n\ntion and development activities. As the nation’s second-largest producer\n\nof natural gas, a Top 15 producer of liquids and most active driller of new\n\nwells, Chesapeake’s arrival in a new play stimulates economic activity,\n\naugments personal income through jobs and royalty payments, gen-\n\nerates substantial tax revenue and sustains communities throughout its\n\noperating areas.\n\nIn addition to the general economic impact of our activities on local\n\neconomies, the company’s tax contributions are substantial. In 2010\n\nChesapeake paid approximately $675 million in taxes, including ad valorem,\n\nseverance, sales, employer, and corporate income and franchise taxes. These\n\ntaxes pay for ongoing government services and also build and maintain\n\nschools, recreational facilities, and parks and roads — at a time when state\n\nand local governments are still feeling the pinch of recession. We are proud\n\nto support America’s economy with our growth while also helping to protect\n\nthe environment through the greater use of clean-burning natural gas and\n\nreducing the country’s dependence on expensive foreign oil.\n\nChesapeake also makes contributions that help improve lives and\n\neconomies in cities where we operate: $25 million in 2010 alone. For ex­\n\nample, this past year we donated $200,000 to establish the Chesapeake\n\nEnvironmental and Recycling Center at Goodwill Industries of Central\n\nOklahoma. The center will provide an additional 80 jobs to disabled Okla­\n\nhomans, as well as help Goodwill recycle 10 million pounds a year, which\n\n**24** | COMMUNITY RELATIONS\n\n##### INVESTING IN OUR COMMUNITIES »\n\nCommunity Development\n\nEducation\n\nHealth and Medical\n\nSocial Services\n\n*Equipping the next generation — West Virginia*\n\n*students hold their new laptops from*\n\n*Chesapeake as part of the company’s*\n\n*Discovering Tomorrow’s Leaders program.*\n\n**54%**\n\n**24%**\n\n**7%**\n\n**15%**\n\nequates to one-third of\n\nthe goods that other-\n\nwise would have been\n\ndestined for Oklahoma\n\nCity-area landfills. In\n\nWest Virginia, we helped\n\nfund construction of\n\nthe Morgantown Market\n\nPlace, a permanent site for the city’s farmers’ market, creating more busi­\n\nness opportunities for local farmers.\n\nChesapeake also supports local chambers of commerce and city\n\ncouncils in all of its operating areas. In the Haynesville Shale last year, we\n\nawarded grants to the Shelby County, Sabine Parish and Coushatta-Red\n\nRiver chambers of commerce to help fund tourism, business communi­\n\ncations and chamber events. In Texas, we assisted more than 250 civic,\n\nprofessional and community service organizations throughout Johnson,\n\nTarrant and western Dallas counties, and sponsored memberships in\n\n35 local Texas chambers of commerce. By helping local chambers and\n\nbusinesses grow and thrive, we are creating stronger economies.\n\nWe also hire locally whenever possible to help stimulate the local\n\neconomy, and we provide training when the local work force isn’t yet", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "The combination of these vast new discoveries of unconventional\n\nnatural gas and liquids provides America with a unique future path­\n\nway toward greater energy independence, an industrial renaissance,\n\neconomic rejuvenation and greater national security. I remain fully con­\n\nfident that the marketplace understands this and that over time the U.S.\n\nwill more fully embrace and utilize clean, affordable, abundant American\n\nnatural gas and increased domestic oil production as the best alterna­\n\ntives to burning environmentally challenged coal and expensive and\n\ndangerous foreign oil.\n\nThere is now a clear road ahead toward a more sustainable, afford­\n\nable, dynamic and independent future if America embraces the remark­\n\nable gift of energy abundance that Chesapeake has helped discover in\n\nthe U.S. You have my commitment, and the commitment of more than\n\n10,000 other Chesapeake employees, that every day we are working\n\nhard to create shareholder value and a better future for our communi­\n\nties, our states and our country through the continued discovery and\n\ndevelopment of unconventional natural gas and liquids.\n\nfor a new energy future with greater natural gas usage and increased\n\ndomestic oil production as two of its primary attributes, it is encouraging\n\nto see our political leadership finally grasp that natural gas stands alone\n\nas the only affordable, scalable and immediately available alternative to\n\nforeign oil and that U.S. oil production can be increased significantly in\n\nthe years ahead.\n\nThe events of the past few months have unmistakably driven home\n\nthe fact that it is insanity to rely on the Middle East to provide our econ­\n\nomy’s lifeline of oil. This should be especially obvious when one realizes\n\nthat during the next 10 years, America will likely export at least another\n\n$4 trillion in national wealth to oil exporters around the world. Clearly,\n\nour country must demand from its leaders a new and more sustainable\n\nenergy future.\n\nThe good news, however, is that America can now secure a new\n\nenergy future thanks to Chesapeake and a handful of other leading U.S.\n\nE&P companies that have reinvented the process of finding natural gas\n\nand oil during the past five years. In doing so, we have discovered twice\n\nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil.\n\nFurthermore, these same few companies that led the unconventional\n\nnatural gas revolution have in just the past two years also reinvented\n\nthe way in which we can find large new oil resources onshore in the U.S.\n\nIn fact, I believe the U.S. can possibly increase its production of oil from\n\nthe current 5.8 million barrels per day by 30- 50% during the next 5- 10\n\nyears, thereby potentially reaching the President’s 2025 goal of reducing\n\nforeign oil imports by 33%, 5- 10 years earlier than hoped.\n\nThe combination of these vast new discoveries\n\nof unconventional natural gas and liquids\n\nprovides America with a unique future path-\n\nway toward greater energy independence,\n\nan industrial renaissance, economic rejuvenation\n\nand greater national security.\n\nBest regards,\n\nAubrey K. McClendon\n\nChairman and Chief Executive Officer\n\nApril 15, 2011\n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n\n*telemetry systems that provide pumpers with real-time information on oil and water*\n\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\n2010 ANNUAL REPORT | **15**", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "happen to manage some of the world’s largest pools of capital and have\n\na very long-term investment horizon. Their support is an important\n\nvalidation of our strategy.\n\n**Short-Term Pain for Long-Term Gain**\n\nDespite this all-star lineup of global partners and investors, some other\n\ninvestors have not yet fully recognized the benefits of our industry\n\nleadership in acquiring unconventional natural gas and liquids assets.\n\nWhether it was our leveraged balance sheet during recent tough reces­\n\nsionary times, our heavy focus on natural gas during a time of persistent\n\nmarket pessimism about natural gas prices or our large capital invest-\n\nments in undeveloped liquids-rich leasehold undertaken to enable\n\nChesapeake to remain an industry leader in the years ahead, it is clear\n\nthat we were less popular in the stock market in 2010 than we were in\n\n2009, when our stock price increased by 60%.\n\nWe anticipated that some market unpopularity in 2010 would\n\nlikely be the price we would pay as we positioned Chesapeake to be\n\nthe leader not only in unconventional U.S. natural gas, but also in\n\nunconventional U.S. liquids. However, now that we have largely com-\n\npleted the investments needed to accomplish this transition to a port-\n\nfolio balanced with liquids, the rebound in our stock price could be sharp\n\nas investors begin to focus more clearly on Chesapeake’s three-way\n\ntransition from an asset gatherer to an asset harvester, from less natural\n\ngas exposure to more liquids exposure and from a leveraged balance\n\nsheet to one worthy of an investment grade rating.\n\nAccordingly, in early January 2011, we announced our “25/25 Plan,”\n\na two-year plan designed to reduce our long-term debt by 25% while\n\nstill growing the company’s production by 25%. We designed this plan\n\nto articulate very clearly the benefits of becoming an asset harvester\n\n**Strong Partners**\n\nOver the past few years, in addition to gathering the industry’s best\n\nassets, Chesapeake has also built the industry’s finest collection of global\n\nenergy partners and energy stock investors. We have now entered into\n\ntransactions with PXP, BP, Statoil, Total, CNOOC and BHP Billiton. Collec­\n\ntively, we have sold these companies certain assets for total consider­\n\nation of $20.5 billion in the form of cash and drilling and completion\n\ncarries for which our net cost was only $6.1 billion resulting in overall\n\nvalue creation of $14.4 billion. While these transactions have been very\n\nrewarding to our buyers, they have been truly outstanding for Chesapeake,\n\nproviding us an attractive source of capital, a reduction of risk, a quick\n\nrecovery of our leasehold investment in new plays and a much greater\n\nability to capture a large resource base with decades of highly profitable\n\ndrilling opportunities.\n\nIn addition, we are the only U.S. E&P company that has attracted\n\nto its stock ownership roster some of the world’s leading government-\n\nsponsored investors: Temasek Holdings (Singapore), China Investment\n\nCorporation, Korea Investment Corporation and Abu Dhabi Investment\n\nAuthority. Along with our largest shareholder, Memphis, Tennessee-\n\nbased Southeastern Asset Management (12%), these shareholders are\n\nsome of the world’s largest and most astute investors, and who also\n\n2010 ANNUAL REPORT | **5**\n\nThrough a wide variety of transactions,\n\nincluding several led by Chesapeake,\n\nthe global energy industry made it clear\n\nthat the assets owned by Chesapeake and\n\nsome of its peers are the most attractive\n\nin the world.\n\n*<< Aubrey K. McClendon, Co-Founder, Chairman and Chief Executive Officer*", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - }, - { - "references": { - "source_file": "NYSE_CHK_2010.pdf", - "query": "Has the CEO of Chesapeake Energy met with the US President about America's energy production?", - "target_page": 16, - "target_passage": "I am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable.", - "chunk_present": { - "presence": false, - "index": null - } - }, - "top_chunk": [ - { - "text": "atmosphere of vitality and energy at Chesapeake, important ingredi­\n\nents of our distinctive culture. These attributes, along with a vibrant\n\nand attractive corporate headquarters campus, low levels of bureau­\n\ncracy, great assets and a well-executed corporate strategy combine to\n\ncreate our culture of success and innovation.\n\nThis has generated extremely positive external feedback as\n\nChesapeake was recently recognized for the fourth consecutive year\n\nas one of the FORTUNE 100 Best Companies to Work For <sup>®(3)</sup> in the U.S.\n\nIn fact, we moved up to #32 overall and #1 in our industry — we are\n\nvery proud of having created and sustained what is now considered\n\nthe best place to work in all of the U.S. energy production industry.\n\nIn addition, we were honored in December 2010 at the 12th Annual\n\nPlatts Global Energy Awards as finalists for CEO of the Year, Community\n\nDevelopment Program of the Year, Deal of the Year, Energy Producer\n\nof the Year and the Industry Leadership Award. Chesapeake was one\n\nof only two companies selected as a finalist in five or more categories.\n\nThe company was also honored in 2010 with a Certificate of Recognition\n\nfor our military reserve recruiting efforts, named a 2010 Best Diversity\n\nCompany by Engineering & Information Technology Magazine and rec­\n\nognized for Best Investor Relations in Energy Sector and Best Investor\n\nRelations Website at the 2010 IR Magazine U.S. Awards.\n\n**Recent Events and a Better Way Forward**\n\nYou may be aware that I have been outspoken in attempting to persuade\n\nour country’s political leadership to recognize that the discovery of vast\n\nresources of unconventional natural gas and oil in the U.S. is a complete\n\ngame changer for our country from an economic, national security and\n\nenvironmental perspective. After two years of my best efforts and the\n\nefforts of many others in the industry, most notably T. Boone Pickens,\n\nFrom our beginning 22 years ago with 10\n\nemployees in Oklahoma City to employing\n\nmore than 10,000 people across 15 states\n\ntoday, Chesapeake has always focused on\n\nbuilding first-class human resources within\n\na distinctive corporate culture.\n\n*<<* *A Chesapeake rig drills in the Marcellus Shale, where the company is*\n\n*the leading leasehold owner, largest producer and most active driller.*\n\nwet natural gas and dry natural gas), similar to the components of the\n\nEagle Ford Shale. We have made a large commitment to this play and\n\nhave acquired approximately 1.2 million net leasehold acres and expect\n\nto increase this total to as much as 1.5 million net leasehold acres in the\n\ncoming months. We are currently using three rigs to evaluate the play\n\nand believe our leasehold could support the drilling of up to 12,000 net\n\nwells. This is an area where we anticipate bringing in a joint venture\n\npartner late in 2011 or early in 2012.\n\n**Our People**\n\nGreat assets cannot exist without great people, so we take great pride\n\nin hiring, training, motivating, rewarding and retaining what we regard\n\nas the best employees in the industry. From our beginning 22 years ago\n\nwith 10 employees in Oklahoma City to employing more than 10,000\n\npeople across 15 states today, Chesapeake has always focused on build­\n\ning first-class human resources within a distinctive corporate culture. Talk\n\nto Chesapeake employees and you will note genuine pride and great\n\nenthusiasm about the company and the critical role that we play in deliv­\n\nering increasing quantities of clean and affordable American natural gas\n\nand valuable and reliable liquids to energy consumers across the country.\n\nChesapeake employees are distinctive in other ways as well. They\n\nare much younger than the industry average, with half of our almost\n\n4,000 Oklahoma City-based headquarters employees 33 years old\n\nor younger. Their enthusiasm and willingness to learn create an\n\n**12** | LETTER TO SHAREHOLDERS 2010 ANNUAL REPORT | **13**", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "The combination of these vast new discoveries of unconventional\n\nnatural gas and liquids provides America with a unique future path­\n\nway toward greater energy independence, an industrial renaissance,\n\neconomic rejuvenation and greater national security. I remain fully con­\n\nfident that the marketplace understands this and that over time the U.S.\n\nwill more fully embrace and utilize clean, affordable, abundant American\n\nnatural gas and increased domestic oil production as the best alterna­\n\ntives to burning environmentally challenged coal and expensive and\n\ndangerous foreign oil.\n\nThere is now a clear road ahead toward a more sustainable, afford­\n\nable, dynamic and independent future if America embraces the remark­\n\nable gift of energy abundance that Chesapeake has helped discover in\n\nthe U.S. You have my commitment, and the commitment of more than\n\n10,000 other Chesapeake employees, that every day we are working\n\nhard to create shareholder value and a better future for our communi­\n\nties, our states and our country through the continued discovery and\n\ndevelopment of unconventional natural gas and liquids.\n\nfor a new energy future with greater natural gas usage and increased\n\ndomestic oil production as two of its primary attributes, it is encouraging\n\nto see our political leadership finally grasp that natural gas stands alone\n\nas the only affordable, scalable and immediately available alternative to\n\nforeign oil and that U.S. oil production can be increased significantly in\n\nthe years ahead.\n\nThe events of the past few months have unmistakably driven home\n\nthe fact that it is insanity to rely on the Middle East to provide our econ­\n\nomy’s lifeline of oil. This should be especially obvious when one realizes\n\nthat during the next 10 years, America will likely export at least another\n\n$4 trillion in national wealth to oil exporters around the world. Clearly,\n\nour country must demand from its leaders a new and more sustainable\n\nenergy future.\n\nThe good news, however, is that America can now secure a new\n\nenergy future thanks to Chesapeake and a handful of other leading U.S.\n\nE&P companies that have reinvented the process of finding natural gas\n\nand oil during the past five years. In doing so, we have discovered twice\n\nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil.\n\nFurthermore, these same few companies that led the unconventional\n\nnatural gas revolution have in just the past two years also reinvented\n\nthe way in which we can find large new oil resources onshore in the U.S.\n\nIn fact, I believe the U.S. can possibly increase its production of oil from\n\nthe current 5.8 million barrels per day by 30- 50% during the next 5- 10\n\nyears, thereby potentially reaching the President’s 2025 goal of reducing\n\nforeign oil imports by 33%, 5- 10 years earlier than hoped.\n\nThe combination of these vast new discoveries\n\nof unconventional natural gas and liquids\n\nprovides America with a unique future path-\n\nway toward greater energy independence,\n\nan industrial renaissance, economic rejuvenation\n\nand greater national security.\n\nBest regards,\n\nAubrey K. McClendon\n\nChairman and Chief Executive Officer\n\nApril 15, 2011\n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n\n*telemetry systems that provide pumpers with real-time information on oil and water*\n\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\n2010 ANNUAL REPORT | **15**", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "gas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural\n\ngas is clean, affordable, abundant and American. Why *shouldn’t* it trade at a BTU premium in the years ahead?\n\n**Why is an investment grade rating on its debt securities important to CHK?**\n\nWe believe that Chesapeake will benefit in multiple ways from an investment grade rating on our debt\n\nsecurities, which we hope to achieve in 2012 or 2013. First, a higher rating would obviously lower the company’s\n\nborrowing costs over time. In addition, other less easily quantifiable benefits will also accrue to Chesapeake.\n\nHigher debt ratings would result in lower costs on long-term firm transportation contracts that we enter into in\n\norder to market our natural gas and oil production as well as facilitate our ability to enter into long-term contracts\n\nto sell our natural gas production to international buyers in the form of LNG. An improved rating will also enhance\n\nChesapeake’s ability to further attract world-class energy companies to participate in our joint venture projects,\n\nwhich profitably monetize a portion of our leasehold investments and also accelerate the development of our\n\nresource base. Finally, and perhaps most importantly, we believe that reduced financial leverage and an invest­\n\nment grade rating will lead to a higher stock price and provide further interest from worldwide equity investors.\n\nJeff Fisher\n\nSenior Vice President - Production\n\nNick Dell’Osso\n\nExecutive Vice President\n\nand Chief Financial Officer\n\nJeff Mobley\n\nSenior Vice President -\n\nInvestor Relations and Research\n\n2010 ANNUAL REPORT | **21**", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "[Log in](https://about.newsusa.com/user/login)\n\n[Home](https://about.newsusa.com/) / [Arts and Entertainment](https://about.newsusa.com/taxonomy/term/78) / New Artificial Intelligence Summit Series Begins With Energy\n\n## New Artificial Intelligence Summit Series Begins With\n\n## Energy\n\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain\n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative\n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit\n\nSeries.\n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington,\n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and\n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant\n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote\n\npartnerships between AI and energy stakeholders.\n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy\n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in\n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced\n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research.\n\nSCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy,\n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and\n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American\n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts.\n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan.\n\nArticle Link\n\n[https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…](https://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with-energy)\n\n[ARTS AND ENTERTAINMENT](https://about.newsusa.com/taxonomy/term/78)\n\n07/31/2024\n\n[Celebrate St. Patrick's Day with](https://about.newsusa.com/celebrate-st-patricks-day-with-no-booze-just-pure-irish-fun-and-entertainment)\n\nNo Booze, Just Pure Irish Fun and\n\nEntertainment\n\nMar 06, 2024\n\nSay Hello to Your Big Break at the\n\nStapleton Library Job Fair in\n\n[Vocation, Trade, or Civil Service](https://about.newsusa.com/say-hello-to-your-big-break-at-the-stapleton-library-job-fair-in-vocation-trade-or-civil-service)\n\nMar 06, 2024\n\nLocal Artists Collaborate for a\n\n[Unique Fusion of Groove and](https://about.newsusa.com/local-artists-collaborate-for-a-unique-fusion-of-groove-and-collage)\n\nCollage\n\nMar 06, 2024\n\n[Explore Downtown San Pedro](https://about.newsusa.com/explore-downtown-san-pedro-with-flair-ride-the-iconic-red-car-trolley-for-free)\n\nwith Flair: Ride the Iconic Red Car\n\nTrolley for Free\n\nMar 06, 2024\n\nRetrain Your Emotional Brain: A\n\n[Natural Alternative to Weight](https://about.newsusa.com/retrain-your-emotional-brain-a-natural-alternative-to-weight-loss-drugs)\n\nLoss Drugs\n\nFeb 22, 2024\n\nSerial Entrepreneur Teaches Us\n\n[How to Go the Distance in](https://about.newsusa.com/serial-entrepreneur-teaches-us-how-to-go-the-distance-in-business-and-in-life)\n\nBusiness and in Life\n\nFeb 21, 2024\n\n[FASHION](https://about.newsusa.com/taxonomy/term/1)\n\n[BUSINESS](https://about.newsusa.com/taxonomy/term/2)\n\n[INFOGRAPHIC](https://about.newsusa.com/taxonomy/term/16)\n\n[ENVIRONMENT](https://about.newsusa.com/taxonomy/term/17)\n\n[HEALTH](https://about.newsusa.com/taxonomy/term/18)", - "page_start": 0, - "page_end": 0, - "source_file": "news1.pdf" - }, - { - "text": "We also hire locally whenever possible to help stimulate the local\n\neconomy, and we provide training when the local work force isn’t yet\n\nqualified for the jobs we have open. For example, when Chesapeake\n\nbegan operating in the Marcellus Shale of West Virginia and Pennsyl­\n\nvania, finding experienced rig workers was a challenge. To meet that\n\nneed, Chesapeake’s wholly owned subsidiary, Nomac Drilling, built\n\nthe 40,000-square-foot Eastern Training Center and Housing Facility in\n\nBradford County, near Sayre, Pennsylvania. The campus opened in 2010\n\nand serves as a housing facility and training ground for 266 workers at\n\na time. Nomac and Chesapeake host regular job fairs in the region and\n\nthe lines of interested candidates often extend out the door.\n\n**Educational Impact**\n\nWe are also proud to help prepare tomorrow’s leaders today. In 2010\n\nChesapeake supported universities, schools, academic chairs, scholarships\n\nand other educational programs with contributions totaling $5.4 million.\n\nInvesting in programs that promote technology and innovation is a\n\nkey to our country’s success. That’s why we gave $1.0 million to establish\n\nthe Chesapeake Energy dormitory for students at the Oklahoma School for\n\nScience and Mathematics (OSSM), a public, tuition-free, residential high\n\nschool located in Oklahoma City for juniors and seniors with exceptional\n\nabilities. The extremely competitive school is helping train the next gen-\n\neration of scientists and mathematicians.\n\nWe also established the Chesapeake Energy Presidential Scholars Pro­\n\ngram at the Oklahoma City University Meinders School of Business, making\n\na $5.0 million commitment to be distributed over the next five years. The\n\nChesapeake Scholars Program will provide up to $25,000 per year in tuition", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "to selected students pursuing careers in finance, economics, accounting,\n\nmarketing, business administration, computer science and information\n\ntechnology. In addition, scholars will take part in a Chesapeake Presiden­\n\ntial Leadership Course facilitated by faculty members in coordination with\n\ndesignated Chesapeake leadership coaches, including a Chesapeake senior\n\nvice president and OCU alumni.\n\nIn 2007 Chesapeake launched a scholarship program in Texas with an\n\ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal­\n\nlas to match its gift within a year. The cities responded and matched the gift,\n\nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the\n\ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the\n\ncost of higher education for 48 minority students. The fund provides each\n\nstudent $20,000 a year for up to four years at the school of their choice. To\n\ndate more than $1.0 million has been distributed to deserving local students.\n\nTo help ensure the training of qualified geologists, engineers, land­\n\nmen and energy lawyers in the next generation, we award scholarships\n\nto students pursuing energy-related degrees. We also help mentor them\n\nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship\n\nrecipients are paired with Chesapeake employee mentors who help devel­\n\nop students’ knowledge and provide career advice. There are currently 25\n\nmentors and 40 scholarship recipients participating in the Peak Program.\n\nOur recruiting team also initiated a strategic military recruitment\n\neffort during the past two years to hire former military personnel to\n\nwork in a variety of leadership and crew positions. This effort earned\n\nChesapeake an honor from G.I. JOBS magazine when we were named a\n\n2011 Top 100 Military-Friendly Employer. Chesapeake currently employs\n\n37 men and women who formerly served as junior military officers and\n\nmore than 100 former servicemen and servicewomen who joined the\n\ncompany through a program called Troops 2 Roughnecks.\n\nIn addition to our specific scholarship programs, one-time educational\n\ndonations and recruitment efforts, in 2010 we gave more than $1.8 million\n\nto fund higher education for nearly 400 other students in 12 states through\n\nour Chesapeake Scholars program. Chesapeake’s scholarships help recruit\n\nthe best and brightest students and provide educational opportunities in\n\ncommunities where we operate. In Oklahoma City, more than 400 em­\n\nployees volunteer for up to an hour a week on company time at four local\n\npublic schools. Chesapeake’s program has grown to become the largest\n\ncorporate mentoring program in Oklahoma.\n\n**Community Impact**\n\nChesapeake employees have been enriching their hometowns as volun­\n\nteers for many years. We formalized those efforts in 2009 by establishing\n\nan official employee volunteer program, the H.E.L.P. (Helping Energize\n\nLocal Progress) Initiative, wherein employees are invited to volunteer\n\neach month for a variety of organizations from food pantries to animal\n\nshelters. Through that program, employees donated more than 26,000\n\nhours to their communities in 2009.\n\nIn the summer of 2010, Chesapeake took the H.E.L.P. Initiative to a\n\nhigher level through the launch of Operation Blue. From Memorial Day\n\nthrough Labor Day, each employee was given four hours of company time\n\nto complete the volunteer project of their choice. Our employees eagerly\n\naccepted the challenge, and in three months more than 4,900 employ­\n\nees donated 30,900 hours of service to 519 organizations in more than\n\n96 communities across the country. Operation Blue is now an annual\n\nvolunteer program in which employees roll up their sleeves in the com­\n\nmunities they call home.\n\nChesapeake’s contributions take many forms: financial and equipment\n\ndonations, volunteerism and scholarships. Last year, we made numerous\n\nin-kind donations of laptops, reconditioned Chesapeake fleet vehicles and", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**ON THE COVER**\n\n*Moving west, a Chesapeake rig*\n\n*drills toward the Niobrara Shale*\n\n*in the Powder River Basin of*\n\n*southeastern Wyoming, one of*\n\n*several new liquids-rich plays*\n\n*that are enabling the company*\n\n*to increase its profitability and*\n\n*return on capital.*\n\n**CONTENTS**\n\n1 Financial Review\n\n4 Letter to Shareholders\n\n16 Operating Areas\n\n20 Investor Q&A\n\n22 Social Responsibility\n\n24 Community Relations\n\n26 \u0007Environmental, Health & Safety\n\n28 Board of Directors\n\n28 Governance\n\n29 Officers\n\n30 Employees\n\n45 Form 10-K\n\nInside Back Cover\n\nCorporate Information\n\n#### Chesapeake Energy Corporation is the second-largest producer of\n\n#### natural gas, a Top 15 producer of oil and natural gas liquids and\n\n#### the most active driller of new wells in the U.S.\n\nHeadquartered in Oklahoma City, the company’s operations are focused on discovering and developing\n\nunconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in\n\nthe Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite\n\nWash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford,\n\nNiobrara and Utica unconventional liquids-rich plays.\n\nThe company has also vertically integrated its oper-\n\nations and owns substantial midstream, compression,\n\ndrilling and oilfield service assets. Chesapeake’s stock\n\nis listed on the New York Stock Exchange under\n\nthe symbol CHK. Further information is available at\n\n**www.chk.com** where Chesapeake routinely posts\n\nannouncements, updates, events, investor informa-\n\ntion, presentations and press releases.\n\n**CORPORATE PROFILE**", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**What advantages does CHK’s unique vertical integration strategy provide?**\n\nChesapeake has built a large inventory of low-risk natural gas and liquids-rich plays that we plan to develop\n\naggressively over the next two decades. As a result, we know that our company will consistently utilize a tremen­\n\ndous (and growing) amount of oilfield services for this resource development. This high level of planned drilling\n\nactivity will create value for the provider of oilfield services, and Chesapeake’s strategy is to capture a portion\n\nof this value for our shareholders rather than transfer it to third-party vendors whose interests and investments\n\nare not always aligned with ours. To date, Chesapeake has invested in drilling rigs, rental tools, water manage­\n\nment equipment, trucking, compression equipment, midstream services, and most recently pressure pumping and\n\nfracture stimulation equipment. Chesapeake’s activities require a high level of planning and project coordination\n\nthat is best accomplished through vertical integration and ownership of the oilfield services we utilize. This approach\n\ncreates a multitude of cost savings, an alignment of interests, operational synergies, greater capacity of equipment,\n\nincreased safety and better coordinated logistics. In addition, Chesapeake’s control of a large portion of the oilfield\n\nservice equipment it utilizes provides a unique advantage to control the timing of leasehold development. Simply\n\nput, faster development of resources maximizes the present value of leasehold. This has been a key advantage for\n\nChesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures.\n\n**Will U.S. natural gas prices reconnect with world natural gas prices?**\n\nNatural gas is a premium product and a cleaner-burning fuel than coal or oil-related products, including gasoline,\n\ndiesel and heating oil. Despite this fact, over the past two years natural gas has received a low price in the U.S.\n\nmarket relative to coal and oil-related products, primarily as a result of a temporary surplus of production. This\n\nsurplus has been principally caused by high levels of drilling activity as producers focused on holding by produc­\n\ntion (HBP) leasehold in new highly productive, low cost natural gas shale plays. In essence, producers reinvented\n\nU.S. supply ahead of reinventing of U.S. demand. We believe HBP-incentivized drilling on natural gas plays will\n\nlargely come to an end in 2012, and U.S. demand will soon also be reinvented to allow U.S. natural gas prices to\n\nreconnect to price parity with world natural gas prices that have risen to more than double U.S. natural gas prices.\n\nThis surge in world natural gas prices has been in response to $100+ oil prices and surging global liquefied\n\nnatural gas (LNG) demand. In our view, the arbitrage in value between competing fuels is simply too wide. Capital\n\nand ideas will flow toward projects that make the most of this price disparity. Chesapeake and other companies are\n\nworking to create the ability to export natural gas from the U.S. Gulf Coast and other regions in the form of LNG to\n\npremium Pacific Rim, European and South American markets, perhaps as soon as 2015. This initiative will also be\n\naided by the widening of the Panama Canal to accommodate large LNG vessels. Furthermore, we believe that the\n\ncurrent price disparity between natural gas and oil will increasingly lead to greater use of natural gas in the U.S. transportation system. Whether it\n\nbe compressed natural gas (CNG) for medium and light-duty vehicles, LNG for heavy-duty vehicles or the commercialization of gas-to-liquids (GTL)\n\nnatural gas refineries that supplement the U.S. liquid fuel supply stream, we believe that the marketplace will increasingly utilize and embrace natural\n\ngas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "**Chesapeake’s $25 million**\n\n**of charitable giving in 2010**\n\nChesapeake’s sense of civic commitment provides a bountiful harvest of\n\nbenefits to cities large and small. We partner with groups and organizations\n\nacross all of our operating areas to improve the communities our employ­\n\nees, contractors, vendors, land and mineral owners call home. We believe\n\nthe success of our business depends on the strength, goodwill and vitality\n\nof those communities. Most importantly, we believe it is the responsibility\n\nof every successful business to share success with its neighbors.\n\nIn 2010 we gave more than $25 million to charitable organizations\n\nand projects across our operating areas, primarily focusing on community\n\ndevelopment, education, health and medical and social services.\n\n**Economic Impact**\n\nWhile much of the U.S. is still struggling to recover from the economic re­\n\ncession, the positive impact of natural gas and oil operations has provided\n\na valuable economic recovery stimulus for states that are home to explora­\n\ntion and development activities. As the nation’s second-largest producer\n\nof natural gas, a Top 15 producer of liquids and most active driller of new\n\nwells, Chesapeake’s arrival in a new play stimulates economic activity,\n\naugments personal income through jobs and royalty payments, gen-\n\nerates substantial tax revenue and sustains communities throughout its\n\noperating areas.\n\nIn addition to the general economic impact of our activities on local\n\neconomies, the company’s tax contributions are substantial. In 2010\n\nChesapeake paid approximately $675 million in taxes, including ad valorem,\n\nseverance, sales, employer, and corporate income and franchise taxes. These\n\ntaxes pay for ongoing government services and also build and maintain\n\nschools, recreational facilities, and parks and roads — at a time when state\n\nand local governments are still feeling the pinch of recession. We are proud\n\nto support America’s economy with our growth while also helping to protect\n\nthe environment through the greater use of clean-burning natural gas and\n\nreducing the country’s dependence on expensive foreign oil.\n\nChesapeake also makes contributions that help improve lives and\n\neconomies in cities where we operate: $25 million in 2010 alone. For ex­\n\nample, this past year we donated $200,000 to establish the Chesapeake\n\nEnvironmental and Recycling Center at Goodwill Industries of Central\n\nOklahoma. The center will provide an additional 80 jobs to disabled Okla­\n\nhomans, as well as help Goodwill recycle 10 million pounds a year, which\n\n**24** | COMMUNITY RELATIONS\n\n##### INVESTING IN OUR COMMUNITIES »\n\nCommunity Development\n\nEducation\n\nHealth and Medical\n\nSocial Services\n\n*Equipping the next generation — West Virginia*\n\n*students hold their new laptops from*\n\n*Chesapeake as part of the company’s*\n\n*Discovering Tomorrow’s Leaders program.*\n\n**54%**\n\n**24%**\n\n**7%**\n\n**15%**\n\nequates to one-third of\n\nthe goods that other-\n\nwise would have been\n\ndestined for Oklahoma\n\nCity-area landfills. In\n\nWest Virginia, we helped\n\nfund construction of\n\nthe Morgantown Market\n\nPlace, a permanent site for the city’s farmers’ market, creating more busi­\n\nness opportunities for local farmers.\n\nChesapeake also supports local chambers of commerce and city\n\ncouncils in all of its operating areas. In the Haynesville Shale last year, we\n\nawarded grants to the Shelby County, Sabine Parish and Coushatta-Red\n\nRiver chambers of commerce to help fund tourism, business communi­\n\ncations and chamber events. In Texas, we assisted more than 250 civic,\n\nprofessional and community service organizations throughout Johnson,\n\nTarrant and western Dallas counties, and sponsored memberships in\n\n35 local Texas chambers of commerce. By helping local chambers and\n\nbusinesses grow and thrive, we are creating stronger economies.\n\nWe also hire locally whenever possible to help stimulate the local\n\neconomy, and we provide training when the local work force isn’t yet", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_CHK_2010.pdf" - }, - { - "text": "As a result of these efforts, young professionals in a wide range of disciplines, from scientists and engineers to land management and legal\n\nspecialists, are being groomed to take over the reins as they learn the business through mentoring, extensive training, development opportunities\n\nand challenging work assignments. They are generously rewarded with excellent compensation and benefits, as well as an industry-leading working\n\nenvironment that encourages camaraderie and teamwork. The success of Chesapeake’s strategy is apparent: the average age of the company’s\n\ngeoscience, land and engineering departments has dropped from 49 in 2000 to 36 today. In addition, the average age of the company’s 4,000\n\nOklahoma City headquarters employees is 33. Even as some of Chesapeake’s employees retire, the company is well equipped with a seasoned work\n\nforce that is prepared to support and lead the way in Chesapeake’s continued growth.\n\n##### CHESAPEAKE MANAGEMENT PERSPECTIVES »\n\nSteve Dixon\n\nExecutive Vice President -\n\nOperations and Geosciences and\n\nChief Operating Officer\n\n**20** | INVESTOR Q&A", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_CHK_2010.pdf" - } - ] - } - ] -] \ No newline at end of file